Blog


← Back to BLOG

08
May
2026
Safeguarding Your Business from Email Spoofing with MS 365

Safeguarding Your Business from Email Spoofing with MS 365

What are Spoofed Emails?

Email spoofing is a technique phishers use to trick email recipients into thinking that they received legitimate messages from a trusted person or business¹. Suppose you receive an email from a sender spoofing the airline on which you booked a flight to Chicago for an upcoming trade show. If you take the fraudulent sender’s address at face value without inspecting the header more closely, you will not realize that this email is forged¹. Additionally, if you receive an email from someone you recognize, chances are you will trust it more than emails from parties you do not recognize¹. Unfortunately, trusting spoofed emails leads users to inadvertently send sensitive business or personal data, click harmful malicious links, and open dangerous malware-laden attachments¹. Now that you know what spoofed emails are, we will outline how Microsoft’s anti-spoofing tools can help you identify them and protect your business from malicious cyberactivity.

  1. Email Authentication

One core component of MS 365’s anti-spoofing efforts is email authentication². Also known as email validation, authentication utilizes your DKIM, DMARC, and SPF records in DNS². You can easily configure these records to make sure email systems receiving messages claiming to be from senders within your organization can check whether these emails are valid or legitimate². Meanwhile, MS 365 also requires email authentication for senders’ domains². This demonstrates how MS 365 helps keep spoofing at bay.

  1. Spoof Intelligence Insight

MS 365 Business Premium also offers spoof intelligence insight, which allows you to review detected spoofed emails across both your internal and external domains during the past week². This automatically protects your business’s inbound emails from spoofing. You must block attackers who spoof senders within your organization’s domains to send harmful phishing or spam emails, but there are some legitimate spoofing scenarios that we will cover next³.

  1. Legitimate Exceptions

Non-Microsoft senders may utilize your company’s domain name to send messages in bulk, such as for company polls³. Another example of legitimate spoofing occurs when external firms generate and send advertising, product updates, or both on your behalf³. Meanwhile, if you have an assistant who regularly sends emails on behalf of other colleagues, this is also a legitimate form of spoofing³. Additionally, if you receive legitimate emails from spoofed senders that do not pass Microsoft’s authentication checks, MS Defender lets you quickly and easily identify them, as well as permitting these senders to send you further emails³. In summary, MS 365 lets you block harmful spoofed emails while permitting legitimate exceptions.

  1. Anti-Phishing Policies

Microsoft also offers comprehensive anti-phishing policies for Business Premium users’ cloud mailboxes and MS Defender². For example, you can turn spoof intelligence on or off, specify actions for spoofed senders whom Microsoft has blocked, and turn Outlook’s indicators for unauthenticated email senders on or off as you see fit². Defender for MS 365 also includes impersonation protection, which defines trusted domains and senders so you can better protect your business’s emails from malicious impersonators⁴. Additionally, while Microsoft’s anti-phishing policy applies to every recipient by default, you can also create custom anti-phishing policies for specific domains, groups, or users⁴. This shows that MS 365 Business Premium is an investment well worth making to enhance your business’s email security.

  1. Spoof Detections Report

Finally, Microsoft offers spoof detection reports, so you can learn more about email messages that MS 365 has allowed or blocked due to spoofing⁵. This lets you see information about any spoofed messages you have received over the past 90 days⁵. Keep in mind, however, that you will not have the most recent data at your fingertips, as the latest data available in any spoof detections report is at least three days old⁵. In conclusion, MS 365 Business Premium offers a variety of features that safeguard your business from malicious spoofed emails.

How navitend Can Help

If you need protection against email spoofing, navitend can help. We offer secure and compliant MS 365 deployments, licensing, and administration to clients in New Jersey, New York, eastern Pennsylvania, and the greater Nashville, Tennessee area. Our top priority is keeping your applications, data, devices, and networks secure 24 hours a day and seven days a week.

Navitend can help you. Call 973.448.0070, 877.448.0070, or setup an appointment today.

30
Mar
2026

Shermie the Sherminator in March Malware Madness

Shermie: Hi, everyone, my name’s Shermie. I’m the mascot and Predictably Awesome IT Ambassador for navitend. Today, we’ll learn more about malware and best practices you can follow to prevent it from wreaking havoc on your organization.

Coach: All right, team, it’s time for our pregame huddle!

Player #1: What’s the plan, coach?

Coach: All right, everyone, remember that the Spiders have the best three-point average in their division. If our defense isn’t strong enough, they can capitalize and win this game in a runaway. We made it to the Big Dance, but if we lose, we won’t advance to the next round.

Player #2: Good talk, sir.

Coach: OK. All right – “Shields” on three. Ready?

Coach and Players: One, two, three, Shields!

Coach: Who are you?

Shermie: My name’s Shermie, and I’m here at Madison Square Garden for the first-round game between the Northeast Cybersecurity University Shields and the Malware State College Spiders.

Coach: OK. The tipoff’s in five minutes.

Shermie: Well, I finally made it to my seat. This is going to be a great game. Go, Shields, go!

Announcer: Welcome to Madison Square Garden for Round 1 of March Madness 2026. Tonight, the Northeast Cybersecurity University Shields and Malware State College Spiders face off in their first-ever appearance in the Big Dance.

Shermie: Go Shields!

Player #3 (on bench): What’s this? “Dear Chris, this is your coach, Maxwell J. Security. Congratulations on scoring more three-point baskets than anyone else on the team. Click the link and you’ll find a $1000 gift card. Sincerely, Coach Security.” Wow, that’s awesome. I’ll have to click it and claim my prize.

Shermie: Holy malware! An email with a link to a $1000 gift card? Do these basketball players not know the havoc that viruses and other malicious programs can wreak on their team? This looks like a job for the one, the only, the predictably awesome Sherminator!

Chris: Who are you?

Shermie: I’m the Sherminator, and I’m here to tell you about best practices you can follow to prevent harmful malware attacks!

Chris: You look like a sheep in a superhero outfit.

Shermie: Yes, I’m a sheep, but I’ve come to tell you and your teammates about the best practices you can follow to keep malware attacks at bay.

Chris: I just received an email claiming to be from Coach Security, with a link to a $1000 gift card as a reward for scoring the most three-point baskets of anyone on the team.

Shermie: I see, but this is a trap. Do you and your teammates regularly receive cybersecurity training?

Chris: Yes, sir. It’s even in our school’s name – Northeast Cybersecurity University.

Shermie: I understand, but all businesses – including colleges and universities – must train employees, students, and other key users on whom and what they should and shouldn’t trust¹. Everyone in the organization must learn not to fall for phishing emails – like the one you received – or other malicious schemes. Additionally, you must install multi-factor authentication (MFA) to safeguard your applications, data, devices, and networks from malware attacks¹.

Chris: Well said. Are there any other best practices we should follow to prevent malware attacks?

Shermie: You must also follow the university’s policies and best practices for application, device, and network security¹. For example, you should create unique passwords with at least 16 characters¹. Meanwhile, you must also use a password manager, so you can more easily keep track of passwords and prevent them from falling into malicious hands¹.

Chris: Well, my teammates and I started using a password manager last year.

Shermie: Good. Do you know which type of malware is the most dangerous?

Player #4: Let me guess – ransomware?

Shermie: You’re correct. Ransomware is the most dangerous type of malware to any organization, including yours². If you fall victim to a ransomware attack, your files will be encrypted, and your computer system locked until you pay the ransom to regain access thereto².

Player #4: That sounds scary.

Shermie: Yes, but the scarier part is that ransomware can be transmitted through email attachments, malicious websites, social engineering attacks, and vulnerabilities in the software you use every day².

Chris: You made a great point. I took a course in ransomware prevention last semester, and I finished with a 98 – the best average in the class.

Shermie: That’s outstanding, Chris. However, I have another question for you. Do you know how important backup processes are for ensuring your team’s statistics and other critical data don’t fall into the wrong hands?

Chris: Yes. This morning, Coach Security told us that with network-based ransomware worms and other cyber threats intensifying every day, data protection solutions are more important than ever before¹. We update our desktops, laptops, and phones every time updates become available, so we can remediate any issues and recover from them more quickly when they do occur¹.

Shermie: Excellent. Meanwhile, you must also have multiple security layers in place to defend the university’s digital infrastructure from harmful malware attacks¹.

Chris and Player #4: Tell us more.

Shermie: Just as wearing multiple layers of clothing keeps you warm on a chilly March evening, installing multiple security layers better protects your applications, data, devices, and networks from malware¹. For example, you must have AMP for Endpoints, an intrusion prevention system (or IPS, for short), next-generation firewalls, and other endpoint monitoring tools in place to protect the university’s digital infrastructure¹.

Chris: We already have next-generation Sophos firewalls and AMP for Endpoints, and our university president told us that she plans to have an IPS installed campuswide before the Fall 2026 semester. Are there any other best practices we should follow to prevent malware attacks?

Shermie: Yes. You must know that ransomware infections are primarily spread through malicious downloads or email attachments¹. Therefore, you should use a university-sanctioned file sharing program like MS SharePoint, as well as the layered security approach I already mentioned, to diligently block malicious attachments, emails, and websites¹.

Chris: Thank you, Mr. Sherminator. Coach Security told us that the entire basketball team has used SharePoint since the fall 2018 semester.

Shermie: Good. Anyway, are you familiar with zero-trust security?

Player #4: Yes. We’ve had a campuswide zero-trust security framework since the fall 2024 semester.

Shermie: Excellent. A zero-trust security approach secures access not just from you, but from APIs, containers, end-user devices, IoT (Internet of Things) appliances, microservices, and more¹. Since you must verify their trustworthiness before accessing them, zero-trust security keeps your applications, data, devices, and networks secure, and prevents malware from infiltrating the university’s digital infrastructure¹.

Player #4: Thanks so much, Mr. Sherminator! You were a tremendous help tonight.

Shermie: You’re welcome, my friend.

Coach Security: Chris? Alan? The Spiders are a point ahead of us, so go out there and show them what you’re made of!

Chris and Alan: Yes, sir.

Announcer: Maxwell Protection, Jr. has reached the three-point line – he shoots toward the Spiders’ basket, and it’s nothing but net. What an incredible three-point shot from Max Protection, Jr.! The Shields now lead the Spiders 39-37.

Shermie: Well, it’s time for this digital-savvy sheep to enjoy the rest of the game. I paid good money for my seat, you know. Just remember the best practices I mentioned, and you can enjoy predictably awesome digital experiences while keeping malware at bay every day. Now, go, Shields, go!

Navitend can help you. Call 973.448.0070, 877.448.0070, or setup an appointment today.

24
Mar
2026
Botnet Attacks – What They Are and How to Prevent Them

Botnet Attacks – What They Are and How to Prevent Them

What are Botnet Attacks?

A botnet is any group or network of internet-connected devices, be they desktops, laptops, or mobile devices¹. Hackers infect these devices with harmful malware and turn them into an army to execute their malicious orders¹. Botnet attacks allow one or more hackers to control multiple devices (often referred to as “zombie bots”) remotely¹. With every new device the attacker’s malware infects, attacks grow stronger and thus more dangerous to your business¹. Now that you know what botnet attacks are, we will highlight how they work.

How Do Botnet Attacks Work?

Keep in mind that botnet attacks occur in three stages. First, cybercriminals find vulnerabilities in a website or application of their choice¹. Next, these malicious actors hijack their unsuspecting victims by delivering harmful malware, turning them into zombie bots¹. For example, attackers may send phishing emails to trick users into downloading malware such as Trojan viruses¹. Third, once attackers have infected a few devices, they can network these devices together and control them remotely to wreak even more havoc¹. Additionally, since botnet attacks infect hundreds, thousands, or sometimes even millions of devices simultaneously, they pose a much greater threat to your business than malware attacks on individual devices¹. We will now explore best practices so you can prevent botnet attacks from devastating your business.

  1. Regularly Update Your Applications, Devices, and Networks

One best practice for preventing botnet attacks is to keep all your applications, devices, and networks updated¹. Since botnets are designed to exploit your networks’ vulnerabilities, you must keep your company’s devices secure by frequently patching your software and installing antivirus programs at the earliest opportunity¹. You should also keep every device within your business’s digital infrastructure up to date, even legacy ones that you use only infrequently¹. Not surprisingly, this reduces the number of avenues hackers can take to unleash botnet attacks and infiltrate your business.

  1. Provide Comprehensive Cybersecurity Training

You must also provide comprehensive cybersecurity training for everyone in your organization¹. Make sure all your employees know how to identify phishing, spam, and unsecured links, so that they do not inadvertently fall victim to botnet attacks and other dangerous cyberactivity¹. Thankfully, we at navitend offer end-user cybersecurity training for our small and medium-sized business clients, providing them with a strong line of defense against cybercriminals and their armies of zombie bots. In short, cybersecurity training is an essential tool to prevent botnet attacks from wreaking havoc on your business.

  1. Always Use Strong Passwords

Still another best practice to prevent botnet attacks is to utilize strong passwords². If you use a simple password like “123456,” it will only open doors for hackers to unleash malicious botnet attacks on your company’s devices. Fortunately, we at navitend offer a comprehensive password management platform so you can create and manage strong passwords for everyone in your organization. After the initial onboarding process, you can securely access passwords by only remembering a single, secure password which only you know. This demonstrates the importance of effective password management for protecting your business against harmful botnet attacks.

  1. Implement MFA (Multi-Factor Authentication)

While effective password management is essential, strong passwords alone are not enough to safeguard your business from botnet attacks². Therefore, you must also implement multi-factor authentication across all your company’s devices². As we discussed in previous articles, MFA combines two or more authentication factors to ensure that users can log in securely even if one factor is compromised³. You can select from a variety of MFA frameworks, such as FIDO2, where you can use a FIDO Security Key or biometric tools like facial recognition or fingerprints to log into your applications, devices, or networks¹. Alternatively, you can choose U2F (Universal Second Factor), where you insert a USB key into a USB port of your choice and then authenticate your account at the touch of a button¹. In conclusion, by following the best practices we outlined, you can safeguard your business from botnet attacks and ensure predictably awesome digital experiences for everyone in your organization.

How navitend can Help

If you need security tools to protect your business from dangerous botnet attacks, navitend can help. We offer a variety of managed IT services and support – including cybersecurity training, DNS filtering, firewalls, MFA, password management, and more – for clients in New Jersey, New York, eastern Pennsylvania, and the greater Nashville, Tennessee area. Our top priority is keeping your applications, data, devices, and networks secure, 24 hours a day and seven days a week.

Navitend can help you. Call 973.448.0070, 866.448.0070, or setup an appointment today.

31
Dec
2025
Shermie’s 2026 Resolutions for Safer Web Browsing and Data Security

Shermie’s 2026 Resolutions for Safer Web Browsing and Data Security

Hi, everyone, this is Shermie. As navitend’s mascot and predictably awesome IT ambassador, I’ve decided to share my 2026 resolutions for safer web browsing and data security. Here are some helpful practices you can follow to make sure your business or personal data doesn’t fall into the wrong hands and become a target for malicious actors.

  1. One Letter Makes all the Difference

Whether you’re browsing the web for business or personal purposes, you should only visit websites starting with HTTPS, especially if you need to access confidential information or transmit it to other parties¹. If you see a small lock icon alongside the URL for a given website, you can tell that it’s an HTTPS site¹. Additionally, the “S” at the end of HTTPS means “secure,” letting you know that your browser’s connection to the website server is encrypted while simultaneously keeping malicious actors at bay¹. Keep in mind, though, that HTTPS websites are not always safe¹. You must look closely at the domain name to make sure it matches the website you wish to visit¹. For example, “it.wisc.edu” is the correct URL for the University of Wisconsin’s IT department, but “it.wics.edu” is misspelled slightly and instead leads you to a dangerous, malicious site¹. In short, one letter makes all the difference for safer web browsing.

  1. Watch Out for Fake Warning Messages

You should also watch out for fake pop-up messages designed to resemble real antivirus warnings¹. As their nickname “scareware” suggests, hackers create these messages to frighten you and me into clicking or otherwise interacting with them¹. Suppose you see a message that says, ‘Your computer is infected; click here to run a virus scan!’¹. Don’t click it – if you do, you won’t run a virus scan but rather download harmful malware¹. When you see these messages, remember that fake warnings ask you to click a link or download an update, but real browser warnings ask you not to do something – like visit a dangerous website¹. If you see a warning and think it’s fake, you must close it immediately and scan your computer for any viruses¹. If the warning is real, don’t visit the website and close the pop-up¹. This shows that you must beware of fake warning messages, as they only do more harm than good.

  1. Use a VPN (Virtual Private Network)

Another resolution to stay safe online is to always use a VPN, or virtual private network². Since VPNs encrypt all your traffic and mask your IP address, cybercriminals cannot easily access your browsing data and exploit it maliciously². VPNs also use DNS-level ad blocking; therefore, they not only make your experience more private and secure, but they also allow for a faster connection². Meanwhile, if you travel frequently like me, VPNs are also helpful because they add a layer of protection when using public Wi-Fi networks³, whether you’re at a trade show in Traverse City, a hotel lobby in Houston, or an airport lounge just about anywhere. Fortunately for you, we at navitend offer VPN solutions so you can access your business’s information securely, whether you are working from home, in the office, or on the road. In summary, VPNs allow for predictably awesome online experiences anytime, anywhere, on any equipped device.

Implement Strong Access Controls
While my resolutions for safer web browsing in 2026 are all fine and dandy, I also have some for enhancing your business’s data security. First, make sure that only the appropriate parties within your organization can access the applications, data, and networks they need to perform their everyday duties by implementing strong access controls⁴. For instance, you can ensure that only your marketing team can access the company’s marketing plan, while keeping sensitive accounting information off-limits to everyone except the accounting team⁴. You can confirm users’ identities using biometric scans, passwords, or multifactor authentication⁴, which we discussed in previous articles. Once users are authenticated, authorization protocols allow them to access the necessary data or resources⁴. Also consider implementing the principle of least privilege (PoLP), which requires that users should only have the minimum levels of access necessary to perform their daily tasks⁴. This demonstrates the value of strong access controls for your business.

  1. Encrypt Your Data Whenever Possible

You should also make sure to encrypt your data whenever possible⁴. When your data is encrypted, it becomes unreadable, and only those who have the correct key can decrypt the data and make it readable again⁴. If you regularly transmit sensitive business data over unsecured networks, encryption is crucial, because it makes sure that malicious interceptors cannot decrypt your data and use it for their diabolical digital deeds⁴. Whether your business’s data is at rest or in transit, encryption provides next-level security⁴. However, you must manage encryption keys securely, because if you lose them, you lose your data forever⁴. Also, if these keys fall into the wrong hands, the consequences can be dire. Considering that the average data breach worldwide costs $4.44 million⁵, data encryption is well worth your company’s investment.

  1. Use DLP (Data Loss Prevention) Technology

Finally, data loss prevention (DLP) technology ensures that unauthorized users cannot access and/or misuse your business’s most sensitive information⁴. By blocking, detecting, and monitoring sensitive data 24/7/365, DLP can detect potential breaches and stop them in their tracks⁴. For example, DLP can prevent your employees from sending emails containing sensitive business information to those outside your organization, or uploading files filled with trade secrets or sensitive financial data to cloud storage services⁴. We at navitend offer DLP tools so you can keep your business’s sensitive data from falling into unauthorized – and sometimes malicious – hands⁴. In conclusion, by following the best practices I outlined in this article, you can make greater cybersecurity your top resolution for 2026.

How navitend Can Help

If your resolution for 2026 is to enhance your business’s cybersecurity and browse the internet more securely, navitend can help. We offer a variety of managed IT services and support – including DLP tools, encryption, MFA, and VPNs – for clients in New Jersey, New York, eastern Pennsylvania, and the greater Nashville, Tennessee area. Our top priority is keeping your applications, data, devices, and networks secure, 24 hours a day and seven days a week.

Navitend can help you. Call 973.448.0070, 866.448.0070, or setup an appointment today.

11
Dec
2025
Shermie the Sherminator: No Phishing at the North Pole

Shermie the Sherminator: No Phishing at the North Pole

Concerned about phishing attacks this holiday season? In this article, our mascot Shermie the Sheep visits the North Pole and shares best practices you can follow to prevent dangerous phishing and spear phishing attacks from wreaking havoc on your business.

Shermie: Hi, my name is Shermie. I’m the mascot and predictably awesome IT ambassador for navitend. Today, I’m visiting Santa’s Workshop at the North Pole to talk about how phishing and spear-phishing attacks can ruin your business, not just during the holidays, but any day.

Receptionist Elf: Good morning, sir. How are you?

Shermie: I can’t complain, ma’am. How about you?

Receptionist Elf: I’m doing well, thanks. Are you here to speak with Santa?

Shermie: Yes.

Receptionist Elf: Well, I’m sorry, sir, he’s in a meeting right now. It’s almost Christmas and he’s booked all day every day from now until the 25th. Would you like to take a tour with Mrs. Claus?

Shermie: That sounds like a plan.

Receptionist Elf: Mrs. Claus, could you please show this visitor around the office and workshop?

Mrs. Claus: Why, certainly. (to Shermie) Why don’t you come with me?

Shermie: Gladly, Mrs. C.

Mrs. Claus: On your left, you’ll find the finance office. On the right is our marketing office. At the end of the hall, you’ll find the product development office. I need to speak with our product development team.

(Upon reaching the product development office, Shermie and Mrs. Claus find an elf reviewing emails).

Product Development Elf (reading emails): “Dear Paul, Congratulations, you have successfully booked round-trip flights on Caribbean Air Express from the North Pole to Nassau, Bahamas, departing December 26, 2025, and returning January 3, 2026. Please click below to confirm your reservation.”

Shermie: Holy malware, what’s this? A phishing email? This looks like a job for the one, the only, the predictably awesome Sherminator!

Paul: Who are you?

Shermie: I am the Sherminator, and I am here to protect you and all the employees of Santa Claus & Associates, Inc. from harmful phishing attacks!

Paul: You look like a sheep in a superhero outfit.

Shermie: Yes, I am, but I’m here to tell you that if you click that link, you may unwittingly share sensitive business and/or personal information¹. That includes not only your name and password, but in some cases, your bank account number as well¹.

Paul: Thank you, Mr. Sherminator. I’ll delete that email.

Shermie: Smart move. That email is a phishing email and clicking it could spell disaster for you and your business. In short, if you find a suspicious link or attachment in any emails you receive, don’t click them. Just ignore or delete them and move on¹. Now, do you know what percentage of data breaches result from phishing?

Paul: Let me guess – fifteen percent?

Shermie: Close enough. Phishing attacks account for 16 percent of all data breaches, with the average phishing-related breach costing $4.8 million².

Paul: Well, I learned something new today. Thank you, Mr. Sherminator.

Shermie: You’re welcome, sir.

(Mrs. Claus and Shermie continue down the hall to the accounting office)

Mrs. Claus: Now, Shermie, this is our accounting office, and if you continue down the hall and through the second door to the right, you’ll find our warehouse.

Shermie: I guess we could stop by the accounting office.

Mrs. Claus: Now, Shermie, this is Holly, our accounts payable manager. Holly, this is Shermie the Sheep.

Holly: Hi, Shermie.

Shermie: Hi to you, too, Holly.

Holly: What’s with the superhero costume?

Shermie: I’m the Sherminator, and I’m here to keep your business safe from dangerous cyberattacks!

Holly: Well, I was just checking my email when I saw one that claimed to be from the boss, but it didn’t look like his email.

Shermie: Let me take a closer look. You’re right – it’s not his email. Let me take the mouse and hover over the sender’s address – it says the email is from santa@sclausass0ciates.com.

Holly: Do you mind if I read the email to you?

Shermie: Not at all.

Holly: It says, “Dear Holly, I know you process the invoices from 1225 Lumber, LLC³. ‘They just let me know that they’re updating their payment process and need all future payments to go to a new bank account³. Here’s their latest invoice with the new account details³.’ Can you please send me the payment today³? Sincerely, Mr. C.”

Shermie: Thank you, Holly. This is a spear phishing email, and I know spear phishing when I see it.

Holly: What’s spear phishing?

Shermie: Unlike regular phishing attacks, spear phishing attacks are personalized to target specific individuals, groups, and businesses like yours³. Malicious actors send emails like the one you received to trick you into sending them money, downloading dangerous malware, or sharing your sensitive business and/or personal information³.

Holly: That’s scary, Mr. Sherminator.

Shermie: I agree, but what’s even scarier is that during the second quarter of this year, manufacturing accounted for 26 percent of all email attacks – more than any other industry⁴.

Holly: You’re right. That is scary.

Shermie: Well, to prevent scary spear phishing attacks, there are a few simple steps you should follow.

Holly: What would those be?

Shermie: Your supervisors should provide ample cybersecurity training to strengthen your company’s defenses against dangerous phishing and spear-phishing attacks³. For example, these programs help you and your coworkers identify email spoofing, errors in spelling and grammar, unusual requests, and other signs that an email may be malicious³.

Holly: Tell me more, Mr. Sherminator.

Shermie: This training should also include simulated spear-phishing attacks and penetration tests³. These can help you and your coworkers apply what you have learned in your training courses³. It also helps the security team identify your business’s most pressing vulnerabilities so they can remediate them³.

Holly: Well, Mr. Sherminator, my coworkers and I are all required to take cybersecurity training courses every six months.

Shermie: Well, that’s good to know. If you need any additional support, give me a call or send me an email. I’m with navitend, and we also offer next-generation Sophos firewalls, endpoint encryption, endpoint security, and all the other tools your business needs to keep phishers at bay.

Holly: Thank you, Mr. Sherminator, for all your help today. I learned so much about phishing and spear phishing attacks.  

Shermie: You’re welcome, Holly. Thanks for meeting with me and have a predictably awesome holiday season.

Holly: You’re welcome, Mr. Sherminator.

Shermie: Well, friends, just follow the best practices I mentioned, and I guarantee that your business will be safe from devastating phishing and spear phishing attacks. I wish you all a predictably awesome holiday season.

Navitend can help you. Call 973.448.0070, 866.448.0070, or setup an appointment today.

07
Nov
2025
What Threats are Lurking in the Field?

What Threats are Lurking in the Field?

  1. Social Engineering

One major cyberthreat to your business is social engineering¹. Since they rely on human error instead of technical vulnerabilities, social engineering attacks are especially dangerous to businesses like yours¹. Consider that 85 percent of all data breaches involve some degree of human interaction, and 75 percent of targeted cyberattacks begin with email¹. For example, suppose you receive an email claiming to be from the airline on which you booked a flight to Las Vegas for your company’s upcoming trade show. However, after clicking a link on the email, you are taken to a webpage asking for your Social Security number, credit card details, and other personally identifiable information (PII). This practice is called phishing, and it can be detrimental to your business. Keep in mind, too, that the average phishing-related data breach costs $4.80 million². Thankfully, however, navitend offers end-user security training courses, so you and your team can not only identify threats such as phishing emails, but more importantly, stop them in their tracks.

  1. Poor Cyber Hygiene

While social engineering is a dangerous threat to your business, the same is true for poor cyber hygiene¹. Astonishingly, 60 percent of organizations rely solely on employees’ memory to manage their passwords, while 42 percent use sticky notes for password management¹. However, this approach can be dangerous¹. For instance, if you use sticky notes to remember passwords while working in public spaces outside your office, such as a client’s office, your favorite neighborhood café, or an airport lounge like the one pictured below, someone can steal the note and use your login credentials maliciously¹. Additionally, just 45 percent of Americans would change their compromised passwords after a data breach, and only 34 percent change passwords frequently¹. Considering that the average data breach resulting from compromised or stolen passwords costs $4.67 million², you must recognize the dangers of poor cyber hygiene before they can wreak havoc on your organization.
 

  1. Navitend’s Cyber Hygiene Solutions

Fortunately, however, navitend offers a variety of solutions to improve your cyber hygiene. Our password management software helps you manage employees’ passwords more securely. Once you have decided to install this password management software, we will work with you to ensure that everyone in your organization can securely access passwords by only remembering a single, secure password that only you know. We also offer VPNs (virtual private networks), so you can keep your business data secure anywhere, whether you are working from home, in the office, or on the road. Meanwhile, our MFA (multi-factor authentication) solutions allow you to login more securely anytime, anywhere, on any equipped device. This demonstrates the value of navitend’s comprehensive security solutions for improving your business’s overall cyber hygiene.

  1. Threats to Mobile Devices

Of course, cybercriminals do not always target desktops and laptops. With 75 percent of all U.S. employees using their personal mobile devices for work, and 51 percent utilizing company-mandated apps on their smartphones to perform essential work tasks³, mobile devices have become a prime target for cyberattacks¹. Consider that 97 percent of businesses have faced cyberattacks involving mobile devices, according to Check Point Solutions⁴. Meanwhile, 46 percent of companies faced security incidents resulting from their employees’ malicious mobile application downloads at some point during 2021⁴. Now, you may ask, “How can I keep my employees’ mobile devices secure?”

  1. Navitend’s Mobile Device Management Solutions

Fortunately, we at navitend offer comprehensive mobile device management powered by Microsoft InTune and Sophos, so you can effectively manage your employees’ mobile devices 24 hours a day and seven days a week. In short, mobile device management is key to ensuring secure and predictably awesome work experiences for everyone in your organization – anytime, anywhere, and on any device.

  1. Ransomware and How We Can Prevent It

Finally, you must not overlook the dangers ransomware poses to your business. According to a recent Ponemon Institute survey featured in the HIPAA Journal, 88 percent of surveyed organizations experienced at least one ransomware attack in 2024⁵. Meanwhile, the average ransomware demand last year was an alarming $1.2 million⁵. Additionally, with the advent of ransomware as a service (RaaS), hackers no longer need to write their own ransomware code. RaaS allows them to utilize pre-written code, so they can launch and maintain their malicious campaigns more quickly and easily than ever⁶. Thankfully, however, we offer ransomware prevention software and training, so you can detect harmful ransomware attacks before they can wreak havoc on your business.

How Navitend Can Help

No matter what security vulnerabilities your business faces, navitend can help. We offer a variety of managed IT services and support for clients throughout New Jersey, New York, eastern Pennsylvania, and the greater Nashville, Tennessee area. Our top priority is keeping your company’s digital infrastructure secure 24 hours a day and seven days a week.

Navitend can help you. Call 973.448.0070 or setup an appointment today.

25
Sep
2025
What You Need to Know About Windows 10 End Of Life

What You Need to Know About Windows 10 End Of Life

 

If you are like me, chances are you use Windows 10 every day. As of August 2025, approximately 39.9% of Windows business clients still utilized Windows 10 as their platform of choice¹.However, Microsoft plans to end support for Windows 10 on October 14, 2025². Now, you may ask yourself, “How can I prepare for the upcoming Windows 10 EOL?”

Fortunately, we at navitend are here to help. In this article, we will outline best steps you can take to keep your organization’s PCs running like clockwork after the official end-of-life (EOL) for Windows 10.

https://www.ek.co/publications/is-your-business-prepared-for-the-end-of-windows-10-support/

If you continue running Windows 10 after the EOL date of October 14, you will no longer receive any new security patches³. According to Paddy Harrington, a senior analyst at Forrester, “if a new bug comes out that is a security vulnerability, there’s no patch coming³,” which can spell disaster if malicious actors exploit such vulnerabilities and wreak havoc on your system. Keep in mind, too, that the average data breach resulting from exploited vulnerabilities costs $4.24 million, according to IBM⁴. Furthermore, once Windows 10 support ends, you will need to rely on other cybersecurity tools to address and mitigate your system’s vulnerabilities³.

Thankfully, we at navitend offer a variety of cybersecurity tools, including Sophos MDR (managed detection and response), next-generation Sophos firewalls, Datto data backup and recovery devices, and many more. Our managed security services can help you detect harmful cyberthreats and stop them in their tracks, even after Windows 10 support officially ends.

Meanwhile, if you plan to make the transition from Windows 10 to 11, you should ensure that your company’s hardware is Windows 11-compatible³. Consider, too, that while “new hardware from the past three to four years can support Windows 11,” even these newer PCs require significant “application and user acceptance testing” before officially implementing the new OS³. Fortunately, we at navitend will work with you to make sure all your business’s hardware and software are compatible with Windows 11. If not, we can help you procure such equipment and successfully implement Windows 11 on your desktops and/or laptops. Once you have Windows 11 up and running, our 24/7 IT help desk support will help you make the most of your new OS and its capabilities. In short, navitend can make your transition from Windows 10 to 11 seamless and predictably awesome.

Sure, upgrading your applications can help your business avoid reliance on obsolete systems, but what if you cannot afford an entire suite of new hardware and software? In this case, we recommend that you sign up for Microsoft’s Windows 10 Extended Security Updates (ESU) program⁵. Please note, however, that you must be running the latest version of Windows 10 (22H2) on your company’s devices; otherwise, they will not be eligible for ESU updates⁵. Additionally, the ESU program costs $61 per device for the first year before doubling to $122 in year two and doubling again to $244 for year three⁵. If you have any Windows 10 virtual machines, such as those on Azure Virtual Desktop or Windows 365, you can register for ESU free of charge⁵. In summary, the Windows 10 ESU program offers your business extended protection from dangerous cyberthreats while you plan your transition to Windows 11.

If you need to make the transition from Windows 10 to 11, or enroll in the Windows 10 ESU program, navitend can help. We offer a variety of managed IT services and support to clients throughout New Jersey, New York, and eastern Pennsylvania, plus the greater Nashville, Tennessee area. Our priority is making sure you are comfortable with your operating system of choice, so you can provide predictably awesome experiences for everyone in your organization.  

navitend can help you. Call 973.448.0070 or setup an appointment today.

05
Sep
2025
Alleviating Your Business’s IT Pain Points with navitend

Alleviating Your Business’s IT Pain Points with navitend

Is your business hurting from outdated tech infrastructure, subpar cybersecurity measures, or any other IT pain points? In this article, we will outline how navitend’s managed IT services and support can help you alleviate these pain points and turn your company’s IT from awful to predictably awesome.

  1. Reliance on Legacy Systems

One major IT pain point for businesses like yours is continued reliance on outdated legacy systems¹, be the servers, software, or other digital infrastructure². Chances are that if you have a functional tech infrastructure in place, you will not spend money on costly new models and systems, instead opting to continue updating your existing platforms as you see fit¹. However, this approach is flawed, as the patches and updates you need eventually run out¹. Once they do, your legacy devices are more vulnerable to cyberattacks². This is especially worrisome considering the average data breach resulting from exploited vulnerabilities costs $4.24 million³.

Thankfully, we at navitend offer project management services, so you can easily procure new equipment to replace your outdated legacy hardware and software. We can also help you implement your new systems and make the most of their capabilities with our 24/7 help desk support. In short, navitend can help ensure a seamless transition from legacy systems to the newest, most capable technologies for your business.

  1. Short-Staffed IT Teams

Another pain point businesses like yours must face is a lack of available IT talent in-house¹. If you are missing key specializations on your internal IT team, or your IT team is short-staffed in general, consider trusting navitend for managed IT services and support¹. We offer remote services to clients throughout the United States, plus in-person services within 100 miles of our offices in Byram, NJ and Brentwood, TN. Meanwhile, if you are looking to upskill your existing IT staff¹, we also offer end-user cybersecurity training programs designed with your small or medium-sized business in mind. This demonstrates the value navitend’s managed IT services have for your organization.

  1. Lack of Proper Security Defenses

While legacy systems and short-staffed internal IT teams can hamper your business, the same is true if your digital infrastructure is not properly secured against harmful cyberthreats¹. Consider that the average data breach worldwide costs $4.44 million, according to IBM³. Keep in mind, too, that there were 3,158 data breaches last year in the U.S. alone⁴. Fortunately for you, we at navitend offer a variety of cybersecurity services, including Managed Detection and Response (MDR), endpoint security, and next-generation firewalls from Sophos. We also provide clients with Datto data backup and recovery solutions, multi-factor authentication (MFA), ransomware prevention software and training, and many more. In summary, we can help you create a strong line of defense against phishing, ransomware, and other dangerous cyberthreats.

  1. Unreliable or User-Unfriendly Software and Websites

Meanwhile, if your company’s software and websites are unreliable or otherwise user-unfriendly, it can also be a major pain point¹. For instance, if your in-house IT system fails regularly, the resulting downtime can reduce your productivity¹. It can also hurt your budget, as one minute of downtime can average anywhere from $427 for small businesses to $9,000 for larger enterprises⁵. Alternatively, your business’s website may be difficult to navigate, making it frustrating for customers and employees alike¹. Thankfully, navitend’s web development team is here to help. We can provide your business with an intuitive and reliable website, so you can provide predictably awesome online experiences for everyone in your organization.

  1. The Tangled Web of Regulations

Finally, if you are in a regulated industry such as healthcare, you must comply with a variety of complex regulations surrounding your organization². Even if your business is on the small side, chances are your firm is held to the same stringent standards as large regional healthcare systems and financial service providers². Fortunately, we at navitend offer comprehensive security risk assessments, so you can easily comply with the relevant regulations surrounding your business. If you are a HIPAA-covered entity or Business Associate, for example, we offer HIPAA compliance audits so you can make sure your business meets all the necessary standards. In conclusion, navitend can help you maintain compliance and navigate the tangled web of business regulations.

If you are suffering from any of the pain points outlined in this article, navitend can help. We offer a variety of managed IT services and support to clients in New Jersey, New York, and eastern Pennsylvania, plus the greater Nashville, Tennessee area. Our top priority is helping you ensure predictably awesome digital experiences for all your business’s stakeholders, 24 hours a day and seven days a week.

Navitend can help you. Call 973.448.0070 or setup an appointment today.

08
Aug
2025
TOAD Attacks: What They Are and How to Prevent Them

TOAD Attacks: What They Are and How to Prevent Them

What are TOAD Attacks? 

TOAD is short for telephone-oriented attack delivery, a phishing method combining email and voice techniques¹. The attackers’ objective here is to trick users like you and me into disclosing sensitive business or personal information by impersonating a legitimate business or authority figure¹. Suppose you receive an email claiming to be from the airline on which you booked a flight to Phoenix for an upcoming trade show. You then notice that the email includes a phony invoice for your ticket purchase, prompting you to call the customer service number included therein². After calling the listed number, you then encounter a scammer impersonating the airline’s customer service agents, who then encourage you to download malicious files disguised as a support tool². This enables the scammer to infiltrate your computer and access all the sensitive business or personal information on it². 

Meanwhile, TOAD attacks have severe repercussions for your business. They can result in ransomware attacks, significant financial losses, and damage to your company’s reputation³. Keep in mind, too, that the average phishing-related data breach costs $4.88 million, according to IBM⁴. Now that you know what TOAD attacks are, and how detrimental they are, we will outline five helpful best practices you can follow to prevent them. 

Employee Training 

One best practice to prevent TOAD attacks is to continuously educate your staff about the dangers of phishing and TOAD attacks⁵. Thankfully, we at navitend offer comprehensive end-user security training for our clients, helping employees identify common phishing tactics and techniques without being hooked into malicious schemes⁵. This demonstrates the value of employee training for preventing harmful TOAD attacks. 

Multi-Factor Authentication (MFA) 

Another helpful practice is to enable MFA (multi-factor authentication) across your business’s entire digital infrastructure⁵. As we discussed in previous articles, MFA requires users to provide two or more authentication factors to verify their respective identities, such as smart cards or biometrics like fingerprints and facial recognition⁶. By requiring these additional factors, you can keep TOAD attackers and other malicious actors at bay, even if your username and password are compromised⁵. In short, MFA is essential for stopping TOAD attacks in their tracks. 

Incident Response and Monitoring 

You should also create and maintain a comprehensive incident response plan for your business⁵. Make sure you regularly monitor your systems for suspicious activity and incorporate simulated phishing attacks into your cybersecurity training programs to determine how susceptible your employees are to such schemes⁵. Fortunately, we at navitend offer Sophos MDR (managed detection and response) services to our clients, providing you with a key line of defense against TOAD infestations. 

Communication Protocols  

Meanwhile, you must implement clear communication protocols for everyone within your organization, specifically regarding any requests to disclose sensitive information such as trade secrets⁵. If you or anyone within your business receives a phone call from an unknown number or a request for confidential business information, never respond without first verifying the caller’s identity⁷. Instead, you should look up the company’s official phone number via a reputable source and then call back through that verified channel⁷. This shows how important strong communication protocols are for thwarting TOAD attacks.   

Security Audits  

Finally, you should regularly perform security audits and updates to find and fix any underlying vulnerabilities that TOAD attackers could exploit². We at navitend offer comprehensive security risk assessments for our clients, including HIPAA compliance assessments for covered healthcare providers and their business associates. In conclusion, by following the best practices we outlined in this article, you can keep TOAD attackers from infiltrating your business. 

If you seek the cybersecurity solutions necessary to prevent dangerous TOAD attacks, navitend can help. We offer a variety of managed security solutions and support, including cybersecurity training programs, MFA, and Sophos MDR deployments, to clients throughout New Jersey, New York, and eastern Pennsylvania. We have also expanded into the greater Nashville, Tennessee area with an office in Brentwood. Our top priority is keeping your business’s applications, data, devices, and networks secure, 24 hours a day and seven days a week. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

(Image courtesy of https://www.threatfabric.com/blogs/toad-fraud)  

09
May
2025
Cryptojacking: What It Is and Best Practices to Prevent It

Cryptojacking: What It Is and Best Practices to Prevent It

Concerned about cryptojacking and how it could damage your business? in this article, we will outline what cryptojacking is, as well as six best practices you can follow to prevent it from wreaking havoc on your organization. 

What is Cryptojacking? 

Cryptojacking is a practice in which malicious actors infiltrate your computer to mine digital or virtual money known as cryptocurrency¹. Some cryptojackers utilize phishing and other social engineering tactics to deploy dangerous code, while others inject malicious scripts into websites or online ads. Still others exploit vulnerabilities in unsuspecting businesses’ server software, injecting harmful cryptomining scripts therein to mine on a greater scale than they would be simply utilizing social engineering or injection techniques². Now that you know what cryptojacking is, we will now highlight six helpful practices you can follow to prevent it.  

(Image courtesy of https://blog.paessler.com/how-cryptojacking-impacts-you-and-what-you-can-do-about-it)  

Use Anti-Cryptomining Extensions: Since cryptojackers typically deploy their malicious mining code through web browsers, there are a variety of browser extensions you can utilize to stop them in their tracks¹. These extensions, such as minerBlock and No Coin, block cryptominers and their devious deeds¹, giving you much-needed peace of mind as you search the web for new sales prospects or blog article topics. 

Avoid Suspicious Websites: Another best practice is to avoid visiting dangerous websites, such as those designed for illegally streaming movies and TV programs³. Since such websites do not have proper security measures in place, you may accidentally download malicious code while visiting them³. Meanwhile, we at navitend offer DNS filtering and managed content filtering with Cisco Umbrella, helping ensure secure and predictably awesome web experiences for everyone in your business. 

Enable Endpoint Protection: To prevent cryptojackers from wreaking havoc on your organization, you must secure all the endpoints for your business’s communication networks, including desktops, laptops, smartphones, and tablets³. Fortunately for you, navitend offers endpoint encryption and Sophos endpoint security solutions, so you can keep your company’s devices safe from dangerous cryptojacking attacks. 

Use a VPN (Virtual Private Network): Still another best practice to prevent cryptojacking is to always use a virtual private network, or VPN, to access your network when outside the office². By utilizing our capable VPN solutions, you can ensure that your company’s web traffic remains encrypted and that would-be cryptojackers cannot use public Wi-Fi to access and infiltrate your network². In short, if you have not done so already, you should implement navitend’s VPN solutions to ensure secure connections and keep cryptojackers at bay, whether you are working from home, in the office, or on the road. 

Educate Employees About the Dangers of Cryptojacking: Since cryptojackers often use phishing attacks to execute their malicious schemes, you should educate your employees about the dangers of phishing and how to distinguish phishing emails – including those laden with cryptojacking code – from their legitimate counterparts². Thankfully, we at navitend offer comprehensive cybersecurity training programs, providing everyone in your organization with a strong line of defense against cryptojacking attacks and other harmful cyberactivity. 

Only Install Software from Reputable Sources: Finally, you must not install software from any disreputable websites or platforms³. If you download any illegitimate software programs on your devices, chances are they are laden with harmful crypto malware, which cryptojackers use to perform their devious deeds after you install them³. Therefore, make sure to only install software from reputable providers and check any reviews beforehand³. In conclusion, by following the six best practices we outlined in this article, you can prevent dangerous cryptojacking attacks from wreaking havoc on your business. 

If you need security solutions to defend your business against harmful cryptojacking attacks, navitend can help. We offer a variety of cybersecurity tools – including endpoint encryption, managed content filtering, and VPNs – to clients throughout New Jersey, New York, and eastern Pennsylvania. Starting this summer, we will also begin providing these services in the greater Nashville, Tennessee area. Our top priority is ensuring that everyone in your organization can enjoy safe, reliable, and predictably awesome digital experiences, 24 hours a day and seven days a week. 

navitend can help you. Call 973.448.0070 or setup an appointment today. 

18
Apr
2025
Best Practices to Prevent Travel Scams

Best Practices to Prevent Travel Scams

1. One Letter Makes All the Difference
When booking your next business trip or vacation, you must make sure the travel websites you visit begin with “https:” instead of just “http:” ¹. You should also check for a padlock icon next to the website’s URL, as this indicates that the site you are visiting is secure¹. Additionally, make sure to read online reviews from Google and other third-party platforms before you book the trip¹. This shows that when it comes to keeping online booking secure, one letter truly makes all the difference.

2. Avoid Public Wi-Fi Networks
If you are traveling for business, chances are you will need to log into your company’s devices from public spaces such as a convention center in Cleveland, a hotel lobby in Houston, or an airport lounge like the one in Newark pictured below¹. However, you must avoid using public Wi-Fi networks, especially for online banking, shopping, or other sensitive activities². Instead, use a VPN (virtual private network) to keep cybercriminals from stealing your valuable business or personal information². In short, by avoiding public Wi-Fi networks while traveling, you can ensure that your information does not fall into the wrong hands.  

3. Update Passwords

Another helpful practice to prevent travel scams is to regularly update passwords on both your business and personal devices¹. This includes passwords for any accounts your company has on hotel loyalty program and travel booking websites¹. Meanwhile, consider using navitend‘s password manager to create and maintain strong passwords, as we mentioned in a previous article. With our password management tool, you can access all the passwords you need with a single, secure password that only you know. Considering that the average data breach resulting from compromised or stolen passwords costs $4.81 million³, effective password management is invaluable for preventing travel scams.

4. Enable 2FA/MFA

While creating and maintaining strong passwords is paramount, it is still not enough to prevent dangerous travel scams. Therefore, you should also enable MFA (multi-factor authentication, which we discussed in previous articles) on all your company’s accounts and devices¹. By providing extra security layers beyond your username and password, MFA makes it more difficult for travel scammers to access and infiltrate your sensitive business or personal data, even if they steal your login credentials⁴. This demonstrates the value of MFA for preventing harmful travel scams.

5. Regularly Back Up Your Data

Still another best practice to prevent travel scams is to regularly back up your data². By doing so, you can protect valuable business and/or personal information from loss and theft². Suppose you are in the airport en route to a tech conference in Nashville, only to realize you left your laptop on the plane. If you do not retrieve your laptop, the consequences can be dire, as data breaches resulting from lost or stolen devices cost an average of $4.28 million³. Thankfully, we at navitend offer mobile device management with InTune and Sophos, plus Datto data backup and recovery solutions, so your information stays safe even if your devices are lost or stolen. In conclusion, frequent data backup is essential to prevent travel scams from wreaking havoc on you and your business.

If you need cybersecurity solutions to keep your business information safe while traveling, navitend can help. We offer a variety of managed security solutions and support – including MFA, VPNs, password management, mobile device management, and data backup and recovery – to clients in New Jersey, New York, and eastern Pennsylvania. Our top priority is keeping your applications, data, devices, and networks secure 24 hours a day and seven days a week.

Navitend can help you. Call 973.448.0070 or setup an appointment today.

21
Mar
2025
navitend’s Managed IT Services for Your Car Dealership

navitend’s Managed IT Services for Your Car Dealership

Whether you run a small, independent dealership or a portfolio of dealers spanning multiple locations and automotive brands, here are some reasons why navitend should be your car dealership’s predictably awesome IT service provider.

  1. Reduced Costs

One benefit of navitend’s managed IT services for your dealership is that they save you money¹. While you may be tempted to manage all your technology in-house, keep in mind that you must not only pay to acquire the necessary software and services, but also to hire, train, and maintain a dedicated internal IT team¹. Thankfully, however, navitend offers a more affordable solution than any in-house IT team can offer¹. We can also help you minimize cyber risks and avoid dangerous cyber disasters¹. Considering the average data breach worldwide costs $4.88 million², trusting navitend for your dealership’s IT needs is well worth the investment.

  1. Enhanced Security

Another advantage navitend provides your dealership is our comprehensive array of security solutions¹. If you suffer a ransomware attack, you will be unable to access your system until you pay the attackers’ desired ransom, consequently devastating your business¹. Data breaches can be even more catastrophic to your dealership, as they cost U.S. businesses an alarming $9.36 million on average². Fortunately, we at navitend can provide you with a variety of cybersecurity tools, including endpoint encryption, multifactor authentication (MFA), data backup and recovery systems, and many more. In short, trusting navitend to handle your cybersecurity needs will save you time, money, and headaches.

  1. Improved Compliance and Data Security Standards

While managed IT service providers like navitend can help your dealership cut costs and enhance its overall cybersecurity, they also help you comply with the data security standards and regulations surrounding it³. Chances are you handle a variety of sensitive customer data, such as credit applications, financial records, and personally identifiable information (PII), every day³. Therefore, you must adhere to the FTC Safeguards Rule, which outlines and requires strong cybersecurity measures for car dealerships and other businesses that regularly handle customers’ financial data³. Fortunately for you, we offer comprehensive security risk assessments, so you can ensure that your dealership meets all the required security standards. This demonstrates the value of navitend’s managed IT services for your dealership.

  1. Reliable Tech Support

Another benefit navitend offers your car dealership is our reliable, 24/7/365 tech support¹. Our dedicated IT Helpdesk team can help you solve your dealership’s most pressing problems with both remote support and on-site visits. We provide support for your desktops, laptops, mobile devices, networks, printers, and servers, so you can keep them all running like clockwork. Considering that one minute of downtime costs an average of $427 for small businesses and $9,000 for larger ones⁴, navitend’s 24/7 IT help desk support helps eliminate unnecessary downtime and keeps your dealership’s digital infrastructure up and running.  

  1. Scalability and Adaptability

We at navitend also offer your dealership scalability and flexibility¹. When you select navitend as your managed IT service provider, you can choose which of our services you want most for your dealership¹. This allows you to create a customized IT service plan meeting your exact needs. For instance, if you already have a small in-house IT team in place, you can use our services to supplement your existing ones¹. Additionally, if you plan to expand your dealership by adding more locations or brands, or you anticipate future shifts in IT needs, you can always adjust your plan or expand your services as you see fit¹. This shows that our managed IT services offer your dealership unmatched scalability and adaptability.

  1. Increased Focus on Sales and Service

Finally, by trusting a managed service provider like navitend for your IT needs, you have more time and resources to focus on your dealership’s core competencies⁵. You can concentrate on selling cars and providing predictably awesome service for every customer, every day⁵. In turn, delegating your IT services to navitend allows you to streamline your operations and ultimately benefit from increased sales⁵. In conclusion, navitend manages your IT services so you can focus on what your dealership does best.

If you are a car dealership seeking a predictably awesome MSP for your business, navitend can help. We offer a variety of managed IT services and support for clients in New Jersey, New York, and eastern Pennsylvania. Our top priority is keeping your dealership’s digital infrastructure compliant, fully secure, and running like clockwork, 24 hours a day and seven days a week.

Navitend can help you. Call 973.448.0070 or setup an appointment today.

31
Jan
2025
Managing Your Remote Organization’s IT with Navitend

Managing Your Remote Organization’s IT with Navitend

If your organization works primarily or entirely remotely, here are some reasons why navitend should be your predictably awesome IT provider.

  1. We Secure Your Digital Infrastructure

We at navitend can help you secure your remote organization’s digital infrastructure¹. Since 92 percent of U.S. employees work remotely at least one day every week, security is essential for your business². Consider that the average data breach worldwide costs $4.88 million, according to IBM³. Thankfully, we at navitend offer a variety of managed security services and support, including Datto data backup and recovery systems, end-user security training, and multi-factor authentication (MFA), as we discussed in previous articles. This demonstrates how navitend can keep your business’s remote workforce secure.

  1. We Help You Maintain Regulatory Compliance

Additionally, we offer security risk assessments to help you maintain compliance with all the necessary regulations surrounding your business. For example, if you are a telehealth provider, health insurer, or business associate of a covered entity, navitend offers HIPAA compliance assessments. In short, our risk assessments can help ensure that you comply with all relevant regulatory requirements, including HIPAA and PCI DSS (the Payment Card Industry Data Security Standard).

  1. Unparalleled Cloud Access

Still another benefit of selecting navitend as your remote workforce’s MSP is unparalleled access to the latest cloud-based technologies⁴. We at navitend provide clients with a variety of cloud computing platforms and services, from VPNs (virtual private networks) ensuring secure remote work to VoIP phone system consulting and deployment. Keep in mind, however, that migrating business data from your on-premises infrastructure to the cloud can be quite cumbersome, especially since you must juggle this task with data security and everyday operations⁴. Fortunately, we offer cloud computing consulting so you can easily shift your data to the cloud and implement the cloud-based solutions you need to keep your remote organization running like clockwork. This shows that when you trust navitend for your remote business’s IT needs, you will feel as if you have reached cloud nine.

  1. Seamless Integration for Remote Employees

While MSPs like navitend offer all the benefits we previously mentioned, they also leverage technology to seamlessly integrate remote employees into your daily operations¹. We at navitend can help your business adopt the predictably awesome tools you need to collaborate and coordinate with your teammates anywhere, whether you are working from home, at a client’s office, or in a hotel lobby or airport lounge while traveling for business¹. Additionally, we can guide you toward selecting and subsequently implementing the communication tools – such as instant messaging applications, project management software, and video conferencing platforms – your business needs¹. For instance, you have the option to implement MS Teams across your organization’s desktops, laptops, smartphones, and tablets. While you must pay licensing and management fees, we will deploy and manage Teams for you. In summary, by trusting navitend for your remote business’s IT needs, you can collaborate and communicate seamlessly with all your colleagues, anytime, anywhere, and on any device.

  1. We Can Establish Remote Work Policies

Still another benefit that MSPs like navitend provide for your business is that they can help you establish comprehensive guidelines and policies governing remote work¹. We at navitend can create a clear set of protocols and expectations for all your remote team members, giving them the resources, support, and technology necessary to perform their assigned roles more effectively and efficiently than ever¹. In short, navitend is an MSP you can trust to manage your remote workforce’s IT needs.

  1. Benefits for Newly Remote Organizations

Sure, MSPs like navitend have their advantages for all remote organizations, they are especially helpful if you recently shifted from an in-office to a hybrid or fully remote work environment⁵. We offer comprehensive end-user security training, as well as 24/7 support, so you can reduce downtime and quickly return to working like clockwork⁵. Considering that one minute of downtime costs an average of $427 for small businesses and $9,000 for large enterprises⁶, our managed IT services are well worth the investment if you recently adopted a remote work model.

How We Can Help

If you are a hybrid or fully remote organization seeking a predictably awesome MSP for your business, navitend can help. We offer a variety of managed IT services and support – from comprehensive security training programs to mobile device management and data loss prevention software and training – for clients in New Jersey, New York, and eastern Pennsylvania. Our top priority is keeping your remote employees compliant, connected, and fully secure, 24 hours a day and seven days a week.

Navitend can help you. Call 973.448.0070 or setup an appointment today.

Sources:

¹LinkedIn Pulse. “Remote Workforce Management: How MSPs Can Transform Your Hiring Strategy” by Scott Ortes. Retrieved from https://www.linkedin.com/pulse/remote-workforce-management-how-msps-can-transform-your-scott-ortes-i4uye/

²Zippia. “25 Trending Remote Work Statistics [2023]: Facts, Trends, and Projections” by Jack Flynn. Retrieved from https://www.zippia.com/advice/remote-work-statistics/

³IBM Security. “Cost of a Data Breach Report 2024.” Retrieved from https://www.ibm.com/downloads/documents/us-en/107a02e94948f4ec.

⁴CSG Technologies. “5 Benefits of Managed Services for the Remote Workforce” by Matt Parks. Retrieved from https://csgtechnologies.net/2021/05/5-benefits-of-managed-services-for-the-remote-workforce/

⁵CurrentWire. “How an IT Managed Service Provider Helps Newly Remote Organizations” by Dale Strickland. Retrieved from https://www.currentware.com/blog/benefits-of-msp/

⁶SolarWinds Worldwide, LLC. “Micro-Outages Uncovered: Exploring the Real Cost of Downtime for Your Business” by Sean Sebring. Retrieved from https://orangematter.solarwinds.com/2023/07/12/true-cost-of-downtime/

13
Dec
2024
Best Practices to Prevent Holiday Scams

Best Practices to Prevent Holiday Scams

  1. One Letter Makes All the Difference

When shopping online this holiday season, remember to only visit websites starting with “https:” instead of simply “http:” ¹. The added “s” indicates that a website is secure¹. You should also make sure there is a padlock icon in your browser window, another sign that you are visiting a secure, trustworthy website¹. In short, one letter makes all the difference when you shop online.

  1. Avoid Public Wi-Fi Networks

If you are shopping on your mobile device in a restaurant, mall, airport lounge (like the one pictured below), or other public place, avoid connecting to public Wi-Fi networks that are not properly secured¹. However, if you must connect to public Wi-Fi, use a VPN (virtual private network) for a more secure connection². We at navitend offer VPNs so you can securely access your company’s network while working from home or on the road. In short, avoiding public Wi-Fi networks keeps hackers from ruining the holidays by stealing your valuable personal and/or business information.

  1. Create and Maintain Strong Passwords

Another best practice to prevent holiday scams is to create and maintain strong passwords¹. If you use a simple password such as “mypassword2024” or “123456,” chances are hackers can easily crack it and subsequently steal your business and/or personal information³. Consider that the average data breach resulting from stolen or compromised passwords costs $4.81 million, according to IBM⁴. Therefore, you must create strong, unique passwords, at least eight characters long, featuring a mix of letters, numbers, and symbols³. Also avoid using words from the dictionary (in any language) when crafting your passwords³. This demonstrates the importance of effective password management.

  1. Use Navitend’s Password Manager

While the password management practices that we outlined above are all fine and dandy, you should also consider using navitend’s password management software. Once you have installed our password management platform, we will work with you to ensure that everyone in your organization can securely access their passwords by remembering a single secure password that only you know. In summary, our password management platform can help ensure a secure holiday season.

  1. Enable MFA (Multi-Factor Authentication)

Still another best practice for preventing holiday scams is to enable multi-factor authentication (MFA)¹. As we discussed in previous articles, MFA combines two or more security factors, ensuring that your overall system is secure even if one factor is compromised⁵. For example, MFA can supplement your username and password with single-use passwords, smart cards, or biometrics like fingerprint scanning⁶. This shows that installing MFA wherever and whenever available keeps both your business and personal devices secure, not just during the holidays, but all year round.

  1. Keep Security Software Up to Date

You should also regularly update your security software, preferably as quickly as possible whenever updates become available¹. This protects both your business and personal devices – be they desktops, laptops, smartphones, or tablets – against harmful cyberattacks⁷. Meanwhile, if your device’s operating system offers automatic software updates, enable them⁷. This ensures that the updates are installed quickly so that malicious actors cannot exploit your system’s underlying vulnerabilities⁷. In short, keeping your security software updated is essential not just during the holidays, but all year round.

  1. Watch Out for Phone Scams

The holiday season is a prime time for scammers to engage in dangerous phone scams, also known as “vishing” ⁸. If you receive an unsolicited phone call, do not answer it by any means. Rather, if you do not recognize the party calling you, hang up⁸. Then, find the agency or business’s official phone number and call them back there⁸. By watching out for potential vishing attacks, you can keep sensitive business and/or personal information from inadvertently becoming a malicious actor’s holiday gift.

  1. Keep An Eye Open for Unfamiliar Emails and Texts

Finally, if you receive a legitimate-looking email or text message but do not recognize the sender, do not open any attachments or click any links within said messages⁸. Also, remember that you should never email anyone your sensitive business or personal information⁸. In conclusion, when you consider that the average phishing-related data breach costs $4.88 million⁴, following the best practices we outlined will pay great dividends this holiday season.

If you are looking for the security solutions you need to avoid falling victim to holiday scams, navitend can help. We offer a variety of managed IT services and support – including password management solutions, VPNs, and MFA deployments – to clients in New Jersey, New York, and eastern Pennsylvania. Our top priority is keeping your applications, data, devices, and networks secure, 24/7.

We at navitend wish you a predictably awesome holiday season. Call 973.448.0070 or setup an appointment today.

Sources:

¹Internal Revenue Service (IRS). “IRS warns of holiday scams, encourages protecting sensitive personal information as 9th annual National Tax Security Awareness Week starts.” Retrieved from https://www.irs.gov/newsroom/irs-warns-of-holiday-scams-encourages-protecting-sensitive-personal-information-as-9th-annual-national-tax-security-awareness-week-starts.   

²Solutions Review. “7 Essential Mobile Security Best Practices for Businesses” by Daniel Hein. Retrieved from https://solutionsreview.com/mobile-device-management/7-essential-mobile-security-best-practices-for-businesses/.

³Bitwarden. “HIPAA Password Requirements Explained” by Andrea Lebron. Retrieved from https://bitwarden.com/blog/hipaa-password-requirements/.

⁴IBM Security. “Cost of a Data Breach Report 2024.” Retrieved from https://www.ibm.com/downloads/documents/us-en/107a02e94948f4ec

⁵Security Intelligence. “Multifactor Authentication Delivers the Convenience and Security Online Shoppers Demand” by Pier Luigi Rotondo. Retrieved from https://www.navitend.com/blog/article/the-power-of-more-benefits-of-two-factor-authentication.

⁶Medium. “How Multi-Factor Authentication Can Protect the Hospitality Industry” by Phone Suite. Retrieved from https://medium.com/@phonesuites/how-multi-factor-authentication-can-protect-the-hospitality-industry.

⁷CISA (Cybersecurity & Infrastructure Security Agency). “Understanding Patches and Software Updates.” Retrieved from https://www.cisa.gov/news-events/news/understanding-patches-and-software-updates.

⁸Aura. “How To Avoid The 15 Most Common Holiday Scams (2023 Update)” by J.R. Tietsort. Retrieved from https://www.aura.com/learn/holiday-scams.

14
Nov
2024
Don’t fumble Enterprise IT during M&A hand-off

Don’t fumble Enterprise IT during M&A hand-off

Bringing two Information Technology organizations together is easier said than done.

Perfoming IT work in the M&A space has a number of challenges, perhaps the largest being that we have to "replace or upgrade the engine" while the car is still going down the road. These projects are more challenging than standing up a new system. Further complicating matters, users don't like change. Who does, really?

And there is often a "winner" and a "loser" in an M&A scenario.

Guess who is happy during these projects?

Wrong. No one is happy during these projects.

OK, enough commentary for the moment.

Let's consider some common Enterprise IT elements to keep your business running; 

Email - typically Microsoft 365 or Google Apps

Document Management - on premises or cloud servers, SharePoint, Egnyte, Google Docs

Customer Relationship Management (CRM) - Microsoft DynamicsSalesforce, Nutshell

Accounting such as QuickBooks, NetSuite, Microsoft Business Central

End point management and automation

Encryption

Policy Management

Identity Management

Mulfifactor Authentication

Print Management

File Backup

Cloud SaaS backup

Training

License Management

Remote Access

Auditing

Both organizations have "answers" for each of these categories.

Each of these areas touches data, vendors, license terms, workflow, and of course user experience.

You may be wondering "where is security, you forgot it"

Great observation -- you're so smart! The truth is that every one of those items requires intentional investment in security.

You may be tempted by the "Not a problem, we're both on Microsoft email" scenario.

That is cousin to "hold my drink".

You see, those accounts must be consolidated to optimize procurement, management, productivity, security, collaboration and more.

Email may stop flowing.

Email rules can get lost.

Spam filtering "training" can be lost.

Even being "the same" is a challenge.

There is no better way to get a merger off to a bad start than to mess with user experience. And unfortunately, you don't have to look too far for some "bad experience".

Hot tip, treat each technology transition as a project, not as an "extra task" for an overworked person in the accounting department.

Each step needs a plan.

It needs an owner.

It needs a definition of complete.

Oh, and it needs a contingency if things are not going well -- what will you do and when.

Here are a couple of suggestions for a successful migration/consolidation. 

#1 Do not neglect to communicate to your users:

Who is reaching out to them

What is happening

When it is happening

Where this work will take place

Why it is happening.

As the business manager, you are responsible to communicate with your users early and often.

Ideally you work with an awesome IT provider with a caring and experienced project manager to lead you and equip you through this process. 

#2 Do not send half-baked emails to your users with out-of-date attachments covering what they have to do. Wrong. Lead them with clear instructions, webinars, videos and if possible, just do the work for them. 

Enough for now. Tune in next time for some more thoughts on Identity Management.

08
Nov
2024
The Benefits of Cybersecurity Training for Your Healthcare Organization

The Benefits of Cybersecurity Training for Your Healthcare Organization

Considering cybersecurity training for your healthcare organization, or revamping your organization’s existing training programs? Here are some benefits that cybersecurity training programs offer for everyone in your healthcare organization.

The Benefits of Cybersecurity Training for Your Healthcare Organization

(Image courtesy of https://www.myamericannurse.com/cybersecurity-awareness/)

1. Reduces Probability of Dangerous Cyberthreats

Cybersecurity training reduces the likelihood your organization will fall victim to cyberthreats such as phishing and ransomware attacks¹. These programs not only educate your employees on information security best practices, but they also increase your team’s awareness of phishing and other harmful social engineering attacks¹. You should also reinforce this knowledge by incorporating penetration testing and/or simulated phishing attacks into your organization’s training courses¹. In short, considering that the average phishing-related data breach costs $4.88 million², cybersecurity training is well worth your organization’s investment.

2. Helps Maintain Regulatory Compliance

Security training programs also help you comply with relevant regulations, such as HIPAA (the Health Insurance Portability and Accountability Act) ¹. If you are a New Jersey healthcare provider or health insurer, you must also adhere to NJ S562, which requires you to encrypt patients’ personal information³. If you do not comply with HIPAA, you could face fines starting at $134 for Tier 1 violations, or at least $68,298 per violation for serious Tier 4 offenses⁴. Additionally, if you violate NJS562, you must pay $10,000 for the first offense and up to $20,000 for the second and all subsequent offenses³.

However, cybersecurity training programs reinforce your employees’ knowledge of essential healthcare compliance standards¹. They also help your employees learn how to properly handle colleagues’ and patients’ private information to ensure compliance with all relevant regulations¹. This demonstrates the importance of cybersecurity training in maintaining all necessary compliance.

3. Prevents Unnecessary Downtime

Another benefit cybersecurity training programs offer your healthcare organization is that they prevent unnecessary downtime¹. Consider that one minute of downtime costs small businesses an average of $427 and larger firms an average of $9,000⁵. If your system is down for an hour, you will lose $25,260 on average if you are a small independent provider, or $540,000 if you are a large hospital or regional healthcare system⁵. Thankfully, however, cybersecurity training programs help you prevent these massive losses¹. By regularly training your employees on key security principles and practices, you will drastically reduce your risk of cyberattacks and subsequent downtime¹. This keeps your operations running like clockwork. In conclusion, you must not underestimate the value of cybersecurity training for your healthcare organization.

If you need a comprehensive cybersecurity training program for your healthcare organization, navitend can help. We offer end-user security training for small and medium-sized businesses in New Jersey, New York, and eastern Pennsylvania. Our top priority is providing you with a strong line of defense against phishing, ransomware, and other harmful cyberactivity, 24 hours a day and seven days a week. Navitend can help you. Call 973.448.0070 or setup an appointment today.

Sources:

¹Techumen. “Five Benefits of Cyber Awareness Training in Healthcare.” Retrieved from https://techumen.com/benefits-cyber-security-awareness-training/.

²IBM Security. “Cost of a Data Breach Report 2024.” Retrieved from https://www.ibm.com/downloads/documents/us-en/107a02e94948f4ec.

³Norton Rose Fulbright LLP. “Encryption of patient personal information to be the law of the land in New Jersey.” Retrieved from https://www.dataprotectionreport.com/2015/01/encryption-of-patients-personal-information-to-be-the-law-of-the-land-in-new-jersey/.

⁴HIPAA Journal. “What are the Penalties for HIPAA Violations?” Retrieved from https://www.hipaajournal.com/what-are-the-penalties-for-hipaa-violations-7096/.

⁵SolarWinds Worldwide, LLC. “Micro-Outages Uncovered: Exploring the Real Cost of Downtime for Your Business” by Sean Sebring. Retrieved from https://orangematter.solarwinds.com/2023/07/12/true-cost-of-downtime/.

28
Oct
2024
Meet the Team

Meet the Team

Every organization has a story -- ours has many stories.

Some of us have been around for a while. Others are just embarking on their careers.

Some love to write code. Others woud rather troubleshoot a printer than debug javascript. Admiittedly, only a few would pick the printer.

Regardless of their individual skills and preferences, we are all striving to deliver a Predictably Awesome IT Experience for our clients.

Some new changes in the past year include two team members who are making their second tour here with us and five just embarking on their careers. Oh, and one long-tenured team member earned a promotion!

The next team member to be highlighted wins the award for "best interview shirt" ever. Jesse, our new Service Manager, interviewed with navitend about 7 years ago and spent about 5 years working on our help desk. He explored some other opportunties and then rejoined navitend as our Service Manager. OK, back to Jesse's original interview. We had a nice conversation with Jesse and then, I just knew we had to hire him. You see, his shirt had very small R2D2 images on it. How cool is that? Naturally, Vin, our long-time Service Manager and now newly promoted MSP Manager protested as he is staunchly in favor of anything that walks or talks like BATMAN. While there are endless debates between which caped personna would win at scrabble or a fight to the death, Vin and Jesse can be found advancing the cause of our clients and moving us towards our objective of delivering Predictably Awesome IT Experiences for our clients, team members and partners.

About a year ago, after some LinkedIn job-posting gymnastics, we met De'Ana. A math major, De'Ana expressed interest in an Assistant Business Manager role. De'Ana is a Villanova grad who is an avid sports fan and possesses a deadly can-do-attitude. Have a job to do? Ask De'Ana, she will respond with "definitely". Some days she's wearing her cool Villanova kicks and other days she is sporting her Shermie Shoes. Either way, it's game-on for De'Ana who is now working with our Account Management team.

Two additions to our helpdesk team include Jay and JP. Both Jay and JP are recent graduates from NJIT. Jay can be found hooping it up and JP is a cricket-master. Today they are working with our help desk team, but not so long ago they were part of our first Shermie inspired game -- Shermie Man.

More recently, we welcomed Julian to our team. Julian is also a graduate from NJIT and spent some time with the Shermie Kong team, dreaming up nearly impossible levels. We liked his skills so much, that we asked Julian to join our software development team. Julian is focused on our partnership with EEO Training -- an online platform delivering compliance training for EEO related topics.

Lastly, we invited Abigail to join our team to assist with important tasks related to HR and managing our Shermie Store. Abigal graduates from FDU soon and is very active with her church community and is our liaison to Summit International School of Ministry where Shermie gear is becoming increasingly popular.

Not finding your favorite team member, have a look at our roster.

Want to join our team or know someone who would be a great fit, give us a call.

30
Sep
2024
When WiFi needs more than power

When WiFi needs more than power

Thanks to WiFi, I bet your laptop doesn't even have an ethernet port anymore. WiFi is great but know when to call in the WiFi experts.

My Macbook Pro doesn't have an ethernet port.

Of course, Apple devices tend to push the envelope a bit more than Windows machines, so as each Mac device gets more and more pricey, the number of ports seems to be shrinking.

We can of course thank both faster and faster USB-C and of course wireless for this trend.

WiFi is everywhere -- it just works. Except. When. It. Doesn't.

If your home or office is small (< 1,500 square feet) just about any WiFi solution will "get the job done".

However, there are a handful of scenarios to be mindful of when deploying "wifi" to your network. In any of these circumstances, you will want to consider having an experienced team conduct a wireless audit of your location:

Your location is larger than 1,500 square feet

 

Your location has lots of "wireless neighbors"

 

Your location has "special circumstance" such as tall shelving full of product, aka a warehouse

 

Your location needs to support multiple, distinct "networks" for different teams and or "guests"

A network survey is helpful to get an "intended" performance, rather than just a "yeah, it should be fine" experience.

The top 5 things to consider when deploying a wireless network:

1. Integrate your wireless security into your organization's Identity Management. You don't want to have a "wifi password" which you need to change everytime someone on the team quits or is terminated.

 

2. Have a reliable and tested ethernet cable run to ALL of your Access Points (WAPs). Don't wire some and "extend" the others via some wireless mechanism.

 

3. Use Power over Ethernet (PoE) connections to make wiring your devices easy and also making it easier to "reboot" your devices. Remember, your devices are likely to be deployed in hard-to-reach places.

 

4. Include an isolated "Guest" network. Always. Never allow guests on to your corporate network. 

 

5. Know when you need a wireless expert and when you can get away with a simple wifi experience. If you're running a business in professional office space, you need a professional network.

WiFi is great. Using it is simple. Managing it is not always so simple. navitend has been designing and deploying wireless networks for over 20 years. Let us help.

20
Sep
2024
Switching Your Business from Google Workspace to MS 365

Switching Your Business from Google Workspace to MS 365

Considering switching from Google Workspace to Microsoft 365 for your business? Here’s why it might be a smart move.

Both platforms offer essential productivity tools like email, cloud storage, and apps, but Microsoft 365 provides additional advantages. Unlike Google’s cloud-native focus, Microsoft 365 gives you access to familiar Office apps (Word, Excel, PowerPoint) across desktop, web, and mobile versions, allowing for greater flexibility.

Microsoft 365 also offers a variety of plans tailored to different needs. Starting at just $6/user/month for Business Basic, it provides 1TB of storage—far more than Google’s 30GB. For more advanced features, like hosting webinars or securing data, Business Premium delivers top-notch protection and business tools for $19.80/user/month.

Security is another strong point for Microsoft 365. With enterprise-grade protection in Outlook and OneDrive, including encryption and ransomware detection, it keeps your data safe. Plus, tools like MS Teams outperform Google Meet, offering more participants and better collaboration features.

Overall, Microsoft 365 combines enhanced security, flexible storage, and robust business tools, making it a strong alternative to Google Workspace for businesses looking to enhance productivity.

(Image courtesy of https://metroairportnews.com/air-canadas-latest-maple-leaf-lounge-opens-in-new-york-laguardia-airports-new-terminal/)

              Navitend can help you. Call 973.448.0070 or setup an appointment today.

Sources:

¹Zippia. “25 Amazing Cloud Adoption Statistics [2023]: Cloud Migration, Computing, And More” by Jack Flynn. Retrieved from https://www.zippia.com/advice/cloud-adoption-statistics/.

²ZDNet. “Microsoft 365 vs. Google Workspace: Which productivity suite is best for your business?” by Ed Bott. Retrieved from https://www.zdnet.com/article/office-365-vs-g-suite-which-productivity-suite-is-best-for-your-business/.

³Microsoft. “Compare All Microsoft 365 Plans | Microsoft.” Retrieved from https://www.microsoft.com/en-us/microsoft-365/business/compare-all-microsoft-365-business-products.

⁴Microsoft. “Compare Microsoft 365 Nonprofit Plans | Microsoft.” Retrieved from https://www.microsoft.com/en-us/microsoft-365/enterprise/nonprofit-plans-and-pricing.

⁵Microsoft. “Microsoft 365 for Frontline Workers Plans and Pricing | Microsoft.” Retrieved from https://www.microsoft.com/en-us/microsoft-365/enterprise/frontline-plans-and-pricing.

⁶Android Authority. “Outlook vs. Gmail: How do they compare?” by Adam Birney. Retrieved from https://www.androidauthority.com/outlook-vs-gmail-3336795/.

⁷IBM Security. “Cost of a Data Breach Report 2024.” Retrieved from https://www.ibm.com/downloads/cas/1KZ3XE9D.

⁸Microsoft. “Personal Vault: Store Sensitive Files – Microsoft OneDrive.” Retrieved from https://www.microsoft.com/en-us/microsoft-365/onedrive/personal-vault.

30
Jul
2024
Risk Management

Risk Management

In the aftermath of the Crowdstrike-triggered outage, how should you respond?

While your business may not have been impacted directly with your computers crashing, you may have missed a meeting due to flight delays.

There are a number of things you can do to respond to events like this.

One is to be thankful it didn't happen to you.

Another is to take a serious look at the security measures you have in place.

A great way to do this is to conduct a "Table Top Exercise". A Table Top Exercise is an team-based session where your leadership walks through a number of "emergency" or "disaster" scenarios to determine just how resilient your organization is to the "unexpected". 

Here are a few questions to consider:

What happens if a key team member is unavailable for an extended period of time?

What happens if you have equipment stolen from your organization? Is it a reportable PHI or PII breach?

What happens if your bank has a security event and you lose access to your corporate checking account(s)? Do  you have enough liquidity to cover a month's worth of expenses?

Answering these questions might make you break a sweat -- better to do it on the practice field than during game day.

A Table Top Exercise is best when it is facilitated -- call navitend for help.

01
Jul
2024
MSPs vs. In-House IT: Which is Better for Your Business?

MSPs vs. In-House IT: Which is Better for Your Business?

MSPs vs. In-House IT: Which is Better for Your Business?

You may ask yourself, “Which is better for my business – hiring and maintaining an in-house IT team or outsourcing to an MSP?”

In this article, we will explore the benefits that both MSPs and internal IT teams have to offer.

The first consideration is your organization's size. If you have a relatively small team, the economics of having an internal IT resource are often challenging, unless there are special circumstances. For example, if you are a small team of highly profitable day traders and lost computer time translates to tens of thousands of dollars, you may consider having a full time team member on staff. There's not a good reason to not do so.

Response time is the next topic. If you are a law firm with a response time mandate of 5 minutes or less, you should give consideration to an internal resource as a third party is going to struggle to staff to those response times on a consistent basis. Is that response time really needed? Maybe.

Large scale manufacturers can also have a strong reason to have an internal resource to aid with specialized equipment to keep production operating.

When working as desired, an in-house IT resource is also a good cultural fit with your team and technically competent. These are very valuable attributes. Recruiting, hiring, training, managing and retaining quality IT resources is difficult for any organization -- even more so if your expertise lies in another field.

When you have an "IT resource", you generally need to consider having more than a single individual to provide the desired level of service when your primary team member is taking PTO or is busy with another user. This holds true also if you have more than a single location.

The reasons companies outsource their IT support include:

Scalable teams -- navitend has a large number of qualified staff to assist your user base, even after hours.

Experience and qualifications - navitend has team members equipped to handle a wide variety of technologies, vendors, equipment and software.

Leadership - You need guidance not only for your current needs but to be prepared to respond to shifing needs of the marketplace. navitend leads clients through a comprehensive business, technology and security review to help you navigate obstacles and opportunities.

Cost - navitend provides service at a fraction of the cost of adequately staffing an internal team.

After this discussion of MSP versus In-house IT, there is one other alternative worth considering -- Co-Managed.

With Co-Managed IT support, there is typically a W2 team member available to do things like wrestle with a printer jam with timeliness backed up by a professional team from navitend.

Not sure if an MSP is right for you, give us a call to explore your options. Not ready for a call, consider these four questions:

1. Do you trust the guidance and service you are receiving from your internal or external IT team?

2. Do you get adequate responsiveness for your business?

3. Are your IT needs resolved in a time-frame which works for your business needs?

4. Are you receiving Value from your investment in Information Technology? Value is Benefit divided by Cost. 

If you can answer all four of these questions to your satisfaction, congratulations, you're doing great. If not, consider giving navitend a call.

14
Jun
2024
The Power of More: Benefits of MFA for Your Hospitality Business

The Power of More: Benefits of MFA for Your Hospitality Business

The Power of More: Benefits of MFA for Your Hospitality Business

Whether you run a charming bed-and-breakfast, a trendy boutique hotel, or a luxury resort with endless amenities and activities like the one pictured below, chances are technology is essential to your everyday operations. The average hotel, motel, or resort uses 20 different software applications daily¹. For example, suppose you utilize a property management system, or PMS. The PMS is a central hub where your staff can perform key hotel operations – such as guest check-in and check-out, reservation management, and profile management – without needlessly switching between platforms¹. Meanwhile, chances are you also have electronic point-of-sale (POS) systems installed in your restaurant and/or gift shop. Unfortunately, this influx of technology into the hospitality industry makes your hotel, motel, or resort more vulnerable than ever to dangerous cyberthreats, which could result in costly data breaches and even costlier financial losses². Now, you may ask yourself, “How can I protect my hospitality business from data breaches and other digital disasters?”

(Image courtesy of https://www.marriott.com/en-us/hotels/ctdca-jw-marriott-desert-springs-resort-and-spa/overview/)

Meet multi-factor authentication, or MFA for short. As we outlined in a previous article, MFA requires users to provide at least two authentication factors to verify their respective identities². For instance, in addition to a username and password, these factors can include things users have – such as

smart cards – plus something they are, including biometrics like fingerprints or facial recognition². In this article, we will explore the benefits that MFA has for your hospitality business.

(Image courtesy of https://www.globalsign.com/en/blog/what-is-multi-factor-authentication)

One benefit of MFA for your hotel, motel, or resort is that it enhances your overall security². By providing additional layers of security besides a simple username and password, MFA makes it more difficult for cybercriminals to access and infiltrate your business’s sensitive data, even if they steal your login credentials². Considering the average hospitality data breach costs $3.36 million, and the average breach resulting from stolen or compromised credentials costs $4.62 million³, MFA is an investment well worth making to ensure that your hospitality business is secure.

Another advantage MFA offers hotels, motels, and resorts like yours is that it helps you comply with the relevant regulations surrounding your business². Chances are you process credit and debit card payments every day, not only for guest reservations, but also in places like your onsite gift shop, fitness center, restaurant, and spa, if you have them. Therefore, you must comply with the Payment Card Industry Data Security Standard (PCI DSS) ². Meanwhile, if you conduct business within the European Union, you must adhere to the EU’s General Data Protection Regulation (GDPR) ². Keep in mind, too, that PCI DSS violations range from $5,000 per month for one to three months of noncompliance to $50,000 per month if you fail to comply for seven months or longer⁴. Thankfully, however, MFA can help your hotel, motel, or resort maintain compliance and avoid hefty fines for violating them².

While MFA improves hospitality businesses’ overall security and helps ensure regulatory compliance, it is also more user-friendly than ever before². Many MFA solutions easily authenticate users – be they guests or hotel staff – with only a single tap or instant facial recognition². This not only

streamlines the login process, but it also reduces the risk of user error². In short, MFA can help you create seamless, predictably awesome login experiences for guests and employees alike.

Still another benefit of MFA for your hotel, motel, or resort is that it protects against dangerous insider threats². By implementing MFA across your hotel’s digital platforms, you can prevent employees from accessing any sensitive information or systems they do not need for their daily work tasks². For example, your housekeeping and restaurant staff need not access trade secrets or sensitive financial records. This in turn reduces the probability that your employees will steal or sabotage data maliciously². When you consider that the average malicious insider attack costs $4.90 million, according to IBM³, you must not overlook the value MFA has for your hospitality business.

You can also benefit from customizing MFA to meet your hotel, motel, or resort’s exact needs². For instance, you may require guests to use a smart card, single-use passcode, or biometric authentication like fingerprint scanning – in addition to room keys – to access their rooms². This demonstrates how MFA can help you create secure and predictably awesome experiences for everyone in your organization.

Meanwhile, MFA is a versatile tool for your hospitality business². With MFA, you can seamlessly protect a variety of applications and services throughout your hotel, motel, or resort, including cloud storage, email, and payment systems². This makes it a perfect security solution to implement across your property, or across every property in your portfolio if you run a hotel chain².

Finally, if you already have security solutions in place for your hotel, motel, or resort, you can easily integrate MFA with them². For example, if you currently use firewalls (like the next-generation ones from Sophos we mentioned in another article) and intrusion detection systems, you can add MFA to create a comprehensive security suite². By incorporating MFA into your cybersecurity arsenal, you can identify, detect, and prevent threats to your hospitality business’s security before they can wreak havoc on the organization². In conclusion, MFA is an investment well worth making for hotels, motels, and resorts like yours.

If you are a hotel, motel, or resort seeking to implement MFA across your digital platforms, navitend can help. We offer MFA deployments for clients throughout New Jersey, New York, and eastern Pennsylvania. Our top priority is keeping your business’s applications, data, devices, and networks secure, 24 hours a day and seven days a week. Navitend can help you. Call 973.448.0070 or setup an appointment today.

Sources:

¹HotelTechReport. “The Ultimate Guide to Hospitality Technology (2024)” by Jordan Hollander. Retrieved from https://hoteltechreport.com/news/hospitality-technology.

²Medium. “How Multi-Factor Authentication Can Protect the Hospitality Industry” by Phone Suite. Retrieved from https://medium.com/@phonesuites/how-multi-factor-authentication-can-protect-the-hospitality-industry.

³IBM Security. “Cost of a Data Breach Report 2023.” Retrieved from https://www.ibm.com/downloads/cas/E3G5JMBP.

⁴CSO Online. “PCI DSS explained: Requirements, fines, and steps to compliance” by Josh Fruhlinger. Retrieved from https://www.csoonline.com/article/569591/pci-dss-explained-requirements-fines-and-steps-to-compliance.html.

23
May
2024
Is Security Important for My Company Size?

Is Security Important for My Company Size?

Whether you run an airline, a corner grocery store, or a sports medicine practice, technology plays a key role in your business’s operations. According to the U.S. Chamber of Commerce, 95 percent of small businesses use computers or similar technology platforms every day¹. Unfortunately, no matter your company’s size, hackers and other malicious actors lurk across cyberspace, lying in wait to steal sensitive business and/or personal information. If your data falls into malicious hands, the consequences can be dire. Consider that the average data breach worldwide costs $4.45 million, according to IBM². For smaller businesses, the damage can even be terminal, as 60 percent of small companies must close their doors forever within six months if they are attacked³. Now, you may ask yourself, “Is security important for my size company?”

(Image courtesy of https://www.linkedin.com/pulse/importance-cybersecurity-business-teamleasedigital/)

                The answer is simple: it is. Cybersecurity – the art and science of protecting your business’s data from malicious actors both inside and outside the organization – is essential for every company⁴. Whether you run a small neighborhood café or a large multinational automotive manufacturer, you must have a cybersecurity strategy in place to ensure the availability, confidentiality, and integrity of your business’s data. In this article, we will explore why security is important for businesses of all sizes.

                If you are a small business owner, you must invest in cybersecurity starting on day one⁵. With today’s business environment more reliant on technology than ever before and known weaknesses totaling in the hundreds of thousands at any moment, you must not overlook data security when starting a new company⁵. When establishing a new business, you must create a comprehensive security plan, including penetration testing to find and identify known weaknesses⁵. Aside from penetration testing, your cybersecurity arsenal should include firewalls (such as the next-generation ones from Sophos we mentioned in a previous article), anti-phishing and anti-spam software, and data encryption, which ensures that attackers cannot read and infiltrate your data even if they slip past your company’s firewalls⁴. Considering that 51 percent of small businesses do not have any cybersecurity measures in place, ample security measures protect your company from harmful cyberactivity so you can grow and prosper⁶.

                While cybersecurity benefits small businesses from the beginning, mid-sized businesses must not overlook the essential role cybersecurity plays for them. If you run a mid-sized company, chances are you already have cybersecurity tools in place, such as advanced access management policies or MFA (multi-factor authentication, as we discussed in another article) ⁵. However, no matter how many security tools you have in place, you must devote a set percentage of your budget for cybersecurity, including penetration testing⁵. Additionally, with an influx of new devices, networks, and smart products into the marketplace, you must include them in your cybersecurity strategy or else create more avenues for malicious actors to infiltrate your business⁵. This demonstrates the crucial role cybersecurity plays for medium-sized organizations.

                Sure, cybersecurity plays a pivotal role for small and medium-sized businesses, but it is especially critical for large enterprises with tens or hundreds of thousands of employees⁵. If you do not have a comprehensive array of security policies and practices in place, such as routine penetration testing, it will only spell disaster for your business⁵. For example, you should implement a system use policy outlining exactly how your organization’s IT system should – and should not – be used⁴. This policy should not only require the passwords on all company-owned devices – from desktops and laptops to smartphones and tablets – but also prohibit your employees from copying business data and removing it from the office without your prior approval⁴. Furthermore, should you endure a breach or other cyberattack, you must not only create and implement plans to identify and detect these events, but to mitigate their effects on your organization⁴. In summary, cybersecurity is paramount if you run a large enterprise.

                While your business’s cybersecurity needs often depend on its size, there are some cybersecurity policies, procedures, and tools your company should implement regardless of size⁴. For instance, you must have policies in place to manage your business’s data repositories, as well as the data backup and recovery processes⁴. Additionally, we at navitend offer Datto data backup and recovery appliances, so you can keep your company’s data secure from breaches, natural disasters, or any catastrophic event that comes your way. In short, having devices, policies, and procedures in place to keep your data safe from disaster is a key component of your business’s cybersecurity equation, whether you run a small antiques shop or a large aircraft manufacturer.

                Meanwhile, you should also implement policies governing your employees’ email and internet usage⁴. For example, you must prohibit employees from using their personal email accounts for business communications⁴. Additionally, if you or your employees receive email attachments from sources you do not recognize, do not open them – or allow anyone else to open them, lest they contain harmful malware⁴. Considering that the average phishing-related data breach costs $4.76 million², it is essential to have a cohesive, comprehensive email use policy for your business. Furthermore, you must also make sure your employees only use the Internet for business purposes, such as researching blog article topics⁴. Your business’s internet use policy should also ensure that you and your employees can only download files from safe, reputable websites, while prohibiting downloads of any files that may contain malicious software⁴. This demonstrates the importance of creating and maintaining policies to govern email and internet usage within your business.

                Finally, you must not overlook the benefits of a comprehensive remote access policy⁴. Chances are you have been forced to work from home at some point over the past four-plus years due to current events, or when inclement weather makes commuting impossible. Therefore, you should create and implement a stringent access policy for all your remote employees, as well as in-office employees who occasionally work remotely⁴. This policy should include requiring you to physically secure every device your business supplies to remote workers, in addition to installing software that protects remote devices from cybercriminals’ malicious exploits⁴. Additionally, while creating a remote access policy for your business, you must require employees to report any security breaches or unauthorized access to your company’s network⁴. Keep in mind, too, that data breaches involving remote work increase the average cost of a data breach by $173,074². In conclusion, you must create, implement, and maintain a remote access policy for your employees so they can easily and securely access your business’s networks, anytime, anywhere, on any device.

                If you need security tools to safeguard your business from data breaches and other cyber disasters, navitend can help. We offer a variety of managed cybersecurity solutions and support for clients in New Jersey, New York, and eastern Pennsylvania. For example, our Datto data backup and recovery appliances make sure your data is stored securely should a breach, malware attack, or natural disaster occur. We also offer endpoint security and next-generation firewalls from Sophos, along with mobile device management from Sophos and Microsoft InTune so you can protect your company-owned smartphones and tablets. Meanwhile, we provide comprehensive end-user security training, plus data loss prevention and ransomware prevention training, so you can recognize phishing schemes, ransomware attacks, and other cyberthreats before they can wreak havoc on your organization. Furthermore, our VPN (virtual private network) deployments let you and everyone in your business access your company’s network while working from home or on the road, whether you are at a client’s office in Cleveland, a hotel lobby in Houston, or an airport lounge in Newark like the one pictured below. No matter your business’s size, we at navitend are dedicated to keeping your applications, data, devices, and networks secure, 24 hours a day and seven days a week.

                Navitend can help you. Call 973.448.0070 or setup an appointment today.

Sources:

¹U.S. Chamber of Commerce. “Empowering Small Business: The Impact of Technology on U.S. Small Business (Second Edition).” Retrieved from https://www.uschamber.com/small-business/smallbusinesstech.

²IBM Security. “Cost of a Data Breach Report 2023.” Retrieved from https://www.ibm.com/downloads/cas/E3G5JMBP.

³Cybersecurity Ventures. “60 Percent of Small Companies Close Within 6 Months of Being Hacked” by Robert Johnson, III. Retrieved from https://cybersecurityventures.com/60-percent-of-small-companies-close-within-6-months-of-being-hacked/.

⁴International Federation of Accountants (IFAC). “Cybersecurity Is Critical for all Organizations – Large and Small” by Steve Ursillo, Jr., and Christopher Arnold. Retrieved from https://www.ifac.org/knowledge-gateway/preparing-future-ready-professionals/discussion/cybersecurity-critical-all-organizations-large-and-small.

⁵Core Security. “Security for Any Business Size.” Retrieved from https://www.coresecurity.com/blog/security-any-business-size.

⁶StrongDM. “35 Alarming Small Business Cybersecurity Statistics for 2024” by Komron Rahmonbek. Retrieved from https://www.strongdm.com/blog/small-business-cyber-security-statistics.

02
May
2024
Beating the High Cost of In-House IT with navitend

Beating the High Cost of In-House IT with navitend

Whether you run an antiques shop, a household appliance manufacturer, or an oceanfront resort like the one pictured below, chances are technology plays a key role in your business’s operations. According to the U.S. Chamber of Commerce, 95 percent of small businesses nationwide use computers or similar technology platforms every day¹. It should not come as a surprise, then, that IT (information technology) is more integral to your business than ever before. While you could hire one or more staff to manage your IT internally, this approach is not feasible for all companies. For example, you may run a business too small to support an in-house IT team, instead relying on a managed service provider (MSP) to handle your IT needs². Now, you may ask yourself, “Are MSPs really more cost-effective for my business than an in-house IT team?”

The answer is simple: they are. In this article, we will explore the cost benefits of trusting an MSP like navitend to manage your digital infrastructure and how this approach can help your business beat the often-prohibitive cost of in-house IT.

One benefit MSPs like navitend offer in-house IT teams is that they save you money. For instance, by trusting navitend for your company’s IT needs, you need not waste money hiring, training, and maintaining an internal IT team². We offer managed IT services and support from skilled professionals – including consulting, project management, and security system deployment – all for a

fraction of the price you would pay to handle all these in-house². This demonstrates why MSPs are crucial for small and medium-sized businesses like yours.

While MSPs are helpful for for-profit businesses and nonprofit organizations of all kinds, they are especially beneficial to companies with multiple locations². For example, suppose you run a chain of seven hair salons across New Jersey, namely in Byram, Boonton, Bayonne, Bridgewater, Brick, Burlington, and Bridgeton. Since MSPs like navitend primarily work remotely, you will save money by not having to hire separate IT staff for each location². Additionally, our skilled IT professionals are well-versed in keeping your applications, devices, and networks running smoothly 24 hours a day and seven days a week, eliminating the need for you to unnecessarily spend money on repairs or replacements². In short, trusting a managed service provider for your IT needs saves you the financial hassle of hiring and maintaining an in-house IT team, so you can focus on creating predictably awesome experiences for customers, employees, and vendors alike.

Another advantage MSPs like navitend offer over an internal IT team is that they help you budget more effectively². When you trust navitend to manage your business’s IT services, you only pay for the resources and staff you need, instead of maintaining your own IT team who may see their workload dwindle to zero between major projects². Additionally, since most of our services are priced monthly or annually, you will benefit from predictable – and predictably awesome – pricing, in turn allowing you to budget and plan your business’s IT expenses more effectively³. Meanwhile, we at navitend also offer FlightPlan, a comprehensive planning process that can help guide your company’s short-, medium-, and long-term actions. Our objective is to collaboratively identify your upcoming investments so you can adequately prepare and budget for them, as well as helping you understand these investments and the benefits you can reap from them over time. This shows that navitend’s reliable managed IT services are the predictably awesome choice to meet your business’s IT needs.

Sure, managed IT service providers can help you streamline your business’s budgeting, but they also let you access economies of scale³. For instance, we at navitend have a wealth of tech expertise, plus the resources necessary to manage IT operations for all our clients, allowing us to leverage economies of scale while providing predictably awesome services for every client³. By trusting navitend to manage your business’s IT, you need not spend thousands – if not tens or hundreds of thousands – of dollars on expensive hardware, software, and in-house IT staff, allowing you to focus on creating value for your organization³. In summary, MSPs’ economies of scale give them a clear advantage for your business over an in-house IT team.

Still another benefit MSPs like navitend offer over creating and maintaining an internal IT team is that they proactively maintain and monitor your business’s IT systems, not only preventing issues but reducing your company’s downtime³. Consider that one minute of downtime costs small businesses an average of $427, and larger firms approximately $9,000 on average⁴. If your systems are down for an hour, it can cost you an average of $25,260 if you are a small business owner, or an alarming $540,000 on average if you run a large enterprise⁴. In other words, your business can easily lose more than half a million dollars from an hour of downtime⁴. Thankfully, however, we at navitend offer #toolmaster, a dedicated automation specialist focused on keeping your computers up to date with all the services you need to protect your network from ransomware, spyware, and other cyberthreats. #toolmaster works 24 hours a day and seven days a week, keeping a watchful eye on your network and automatically

protecting against any threats that could wreak havoc on your organization. This demonstrates how our managed IT services keep your business’s digital infrastructure secure and running like clockwork.

Finally, outsourcing your IT needs to a dedicated MSP like navitend will boost your business’s ROI (return on investment) ³. For example, our managed services allow you to offload time-consuming routine IT tasks so you can focus on your core business activities³. With our team of experts managing your IT applications and systems, your employees can focus on creating predictably awesome value for everyone in your organization, including colleagues, customers, and vendors³. Additionally, as we previously mentioned, navitend’s proactive maintenance and monitoring ensure that your IT systems are running smoothly 24/7, in turn enhancing your operational efficiency and increasing your customers’ overall satisfaction³. Not surprisingly, these increases in efficiency and satisfaction will lead to higher ROI for your business³. Meanwhile, our managed IT services and support enable you to access our wealth of technology and tech expertise that you could not afford as easily with an in-house IT team³. With navitend’s array of services ranging from security system deployments to phone system consulting and project management, you will be empowered not only to innovate and differentiate your business from competitors but gain a competitive advantage in the marketplace³. This in turn increases your business’s growth and strengthens your ROI³. In conclusion, trusting an MSP like navitend to handle your IT needs is an investment well worth making for your business.

If you are seeking a dedicated, reliable MSP to handle your company’s IT needs, navitend can help. We provide a variety of managed IT support and services – from end-user cybersecurity training and mobile device management to phone consulting – for clients throughout New Jersey, New York, and eastern Pennsylvania. Our top priority is ensuring that your business’s applications, data, devices, and networks are secure and running like clockwork 24/7, so you can focus on creating predictably awesome experiences for all your organization’s stakeholders. Navitend can help you. Call 973.448.0070 or setup an appointment today.

Sources:

¹U.S. Chamber of Commerce. “Empowering Small Business: The Impact of Technology on U.S. Small Business (Second Edition).” Retrieved from https://www.uschamber.com/small-business/smallbusinesstech.

²Frontline, LLC. “Long-Term ROI of Working With a Managed Information Technology Services Provider.” Retrieved from https://www.frontlineinc.com/managed-information-technology-services/.

³Boyer Associates. “Benefits of Managed Services: Cost Savings, Security & Expertise.” Retrieved from https://www.boyerassoc.com/blog/benefits-of-managed-services-cost-savings-security-expertise.

⁴SolarWinds Worldwide, LLC. “Micro-Outages Uncovered: Exploring the Real Cost of Downtime for Your Business” by Sean Sebring. Retrieved from https://orangematter.solarwinds.com/2023/07/12/true-cost-of-downtime/.

15
Mar
2024
Shermie the Sherminator – Attacking IT Problems in Real-Time!

Shermie the Sherminator – Attacking IT Problems in Real-Time!

If you are like me, chances are computers and other digital devices like smartphones and tablets are an essential part of our everyday life. We use computers for a variety of business and personal tasks, from communicating with colleagues via MS Teams to sending emails, crafting blog articles in MS Word, and ordering takeout or delivery from our favorite local restaurants online. Not surprisingly, 94.6 percent of all U.S. households currently own computers¹, while 95 percent of small businesses nationwide use them in their daily operations². However, we must always be careful, as hackers and other malicious actors lurk across cyberspace, lying in wait to steal your sensitive business or personal information. Now, you may ask yourself, “How can I ensure my computing experiences are safe and predictably awesome?”

Fortunately, we at navitend are here to help. In our newest blog article series, our mascot Shermie the Sheep will explore some best practices you can follow for predictably awesome IT experiences every day. Here, Shermie will discuss helpful hints for safe computing anytime, anywhere, and on any device.

Shermie: Hi, everyone. My name is Shermie. I am the mascot and Predictably Awesome IT Ambassador for navitend. Today, we will learn about best practices you can follow to make your computing experience as safe and predictably awesome as possible.

PA Announcer: Welcome to Newark Liberty International Airport. The next flight departing from Gate B47 will be Sunchaser Airlines’ 8:54 AM flight to Tampa.

Shermie: What have we here? An unattended laptop? Holy malware, Bat-Cat, this looks like a major security issue. No, wait a minute, this is a major security issue. This looks like a job for the one, the only, the predictably awesome Sherminator!

I.M. Clumsy: Ah, there is nothing like a little coffee and a breakfast sandwich for that morning energy boost. Now I can sit back, eat my sandwich, drink my coffee, and check those work emails before my flight to Las Vegas. I cannot miss the National Hospitality Tech Expo tomorrow, you know!

Shermie: Pardon me, friend, but did you leave your laptop out in the open when you went to buy that cup of coffee?

I.M. Clumsy: Yes. Yes, I did. I am so sorry about that.

Shermie: Well, saying you are sorry does not cut it. Leaving your laptop unattended is a bad move³. From now on, sir, you should always keep your work laptop and other devices – including smartphones and tablets – with you while traveling, even if you leave the boarding area to order coffee and a breakfast sandwich³.

I.M. Clumsy: Thank you so much for your advice. I will never leave my work laptop unattended while traveling again. I do have one question, though: who are you?

Shermie: I am the Sherminator, your cybersecurity superhero!

I.M. Clumsy: You look like a sheep in a superhero outfit.

Shermie: Yes. I am a sheep in a superhero outfit, but my job is to make sure folks like you can enjoy predictably awesome computing experiences every day, anytime, anywhere, and on any device.

I.M. Clumsy: Wow! That is awesome! Could you please explain why I should not leave my laptop unattended?

Shermie: Well, if you leave your laptop unattended – as you did when you left to grab your breakfast – someone can steal it and access your email, your work files, and even your company’s sensitive information like trade secrets or confidential financial data³. Even worse, a hacker or other malicious actor could have stolen your laptop and installed harmful malware, ransomware, or spyware on it³. If your laptop fell into malicious hands, it would surely be a disaster for your company. Now, my friend, do you know how much it would cost your business if the data on your laptop was breached?

Please do not let this happen to you!

(Image courtesy of https://securitytoday.com/articles/2017/09/08/what-happens-when-your-employees-equipment-is-left-unattended.aspx)

I.M. Clumsy: Let me guess. Four million dollars?

Shermie: Not quite.

I.M. Clumsy: Four and a half million dollars?

Shermie: Close enough. The average data breach resulting from lost or stolen devices – such as your laptop if I had not found it and given it back to you – costs $4.46 million, according to IBM⁴.

I.M. Clumsy: Wow, that makes me glad you found my laptop before any hackers could steal it. Thank you so much, Mr. Sherminator.

Shermie: You’re welcome. I am always glad to lend a helping hand, or in my case, a helping hoof. Anyway, what do we have in your suitcase? CD-ROMs? Flash drives? I wonder what is on this flash drive.

I.M. Clumsy: Please do not touch that flash drive! My only copy of the PowerPoint I am presenting at the National Hospitality Tech Expo in Las Vegas is on there.

Shermie: I am sorry, sir. I just wanted to explain that you should never keep your company’s sensitive information on flash drives or other portable devices, like your tablet, your phone, or even your laptop itself, without securing them first³. Also, since you said that one flash drive includes the only copy of your upcoming trade show presentation, I must warn you that if you have only one copy of a critical file or project like that presentation, do not store that on a portable device, either³.

I.M. Clumsy: Why not?

Shermie: Well, if you keep your business’s trade secrets, financial information, or important projects like your trade show presentation on CD-ROMs and flash drives like the ones in your luggage, you can easily lose these items if you do not keep track of them³. This opens doors for cybercriminals to steal your data, files, and projects and then use them in their malicious schemes³.

I.M. Clumsy: Again, thank you very much, Mr. Sherminator! You were a tremendous help to me this morning.

Shermie: You’re welcome, but I am not done here yet.

I.M. Clumsy: Why not?

Shermie: I still need to tell you one more thing. When you return to the office after your business trip, you must lock your screen and set a password to protect your computer, along with all the data, files, and software applications you use every day³. Meanwhile, if you need to leave your computer in your office because you have a meeting across the hall or you must go to the break room for lunch, please lock the door behind you so nobody can steal it while you are away.

I.M. Clumsy: Once again, thank you for all your helpful advice! I learned some important lessons today.

Shermie: You’re welcome, my friend. I hope you have a safe and predictably awesome business trip!

I.M. Clumsy: You, too, Mr. Sherminator.

PA Announcer: Sunchaser Airlines passengers on Flight 1230, the 8:54 AM departure to Tampa, will begin boarding in approximately 15 minutes.

Shermie: Well, it is time for this digital-savvy sheep to fly. Just follow the security tips I mentioned, and I guarantee you will enjoy safe and predictably awesome computing experiences, no matter whether you are working from home, in the office, or on the road.

Navitend can help you. Call 973.448.0070 or setup an appointment today.

Sources:

¹IBISWorld. “Percentage of Households With At Least One Computer – United States | IBISWorld.” Retrieved from https://www.ibisworld.com/us/bed/percentage-of-households-with-at-least-one-computer/4068/.

²U.S. Chamber of Commerce. “Empowering Small Business: The Impact of Technology on U.S. Small Business (Second Edition).” Retrieved from https://www.uschamber.com/small-business/smallbusinesstech.

³California State University San Marcos. “Safe Computing Practices | Instructional and Information Technology Services (IITS) | CSUSM.” Retrieved from https://www.csusm.edu/iits/services/security/security-guidance/safe-computing.html.

⁴IBM Security. “Cost of a Data Breach Report 2023.” Retrieved from https://www.ibm.com/downloads/cas/E3G5JMBP.

27
Feb
2024
Press Your Luck: The Dangers of Security Noncompliance for Your Business

Press Your Luck: The Dangers of Security Noncompliance for Your Business

                Whether you run an antiques shop, a sports medicine practice, or a tax accounting firm, chances are you must adhere to relevant cybersecurity rules and regulations every day. For example, regulations such as HIPAA (the Health Insurance Accountability and Portability Act) outline the vital steps businesses must take to secure their sensitive information¹. If you fail or outright refuse to comply with these standards, that opens doors for an array of security threats – or “whammies” – to wreak havoc on your organization¹. Hackers and other malicious actors can infiltrate your systems, disrupting operations and losing you valuable revenue¹. Additionally, if you do not comply with industry-relevant security regulations, you are at greater risk of suffering a data breach¹. Keep in mind, too, that the average data breach worldwide costs $4.45 million, and the average U.S. data breach an alarming $9.48 million, according to IBM². Now, you may ask yourself, “What kinds of ‘whammies’ does my business face for non-compliance?” and “How can I make sure my business complies with cybersecurity requirements?”

(Image courtesy of https://www.tvinsider.com/gallery/press-your-luck-whammys-abc-game-of-thrones-bachelor-oprah/#8)

                Thankfully, we at navitend are here to help. In this article, we will outline the penalties that businesses like yours face if you fail to comply with relevant regulations, and how we can help you comply with these requirements.

                Two main types of “whammies” can strike your business if you fail to comply with relevant cybersecurity rules and regulations¹. First, regulatory authorities can fine non-compliant businesses hundreds, thousands, or even millions of dollars. For example, Tier 1 HIPAA violations – the least severe – range from $100 to $50,000 per offense, depending on severity³. However, Tier 4 violations – the most severe – result in a minimum fine of $50,000 per violation, and for serious offenses, this figure can reach six or even seven figures³. If you are a healthcare provider or health insurer who willfully neglects HIPAA, you must pay up to $2,067,813 in fines³, making it a double “whammy” for everyone in your organization.

                Meanwhile, if you are a retailer or any other business accepting credit and debit card payments, such as the Snowshoe Mountain Resort in West Virginia pictured below, you must adhere to PCI DSS – the Payment Card Industry Data Security Standard⁴. Although it can be difficult to pinpoint an exact amount per violation, fines are based on each month of non-compliance and increase significantly the longer your business fails to comply⁴. For instance, if you do not comply with PCI DSS standards for between one and three months, you must pay $5,000 to $10,000 each month⁵. If you fail to comply for four to six months, you must pay between $25,000 and $50,000 in fines for each month after the first three months of noncompliance⁵. Finally, if you refuse to comply with PCI DSS for seven months or longer, you are required to pay $50,000 per month⁵. This shows how devastating the “whammy” of noncompliance fines can be for your business.

(Image courtesy of https://wvtourism.com/company/snowshoe-mountain/)

                Sure, regulatory noncompliance can result in fines of five, six, or sometimes seven figures, but there is another “whammy” you must not overlook: legal troubles¹. If you fail to comply with the cybersecurity requirements surrounding your business, you must face lawsuits from angry customers or other affected parties seeking reparations for the damage your negligence has caused, including compromised PII (personally identifiable information) and other data¹. Not only does navigating this legal labyrinth waste time and money best spent creating predictably awesome value for your business, but it also damages your company’s reputation, prompting customers to abandon you en masse in favor of competitors¹. Now that we have identified the two main types of “whammies,” we will explain how to prevent them from wreaking havoc on your business.

                Fortunately, there are four steps you can take to maintain regulatory compliance and thus prevent “whammies” like fines and lawsuits from destroying your company’s reputation and revenues¹. First, you must strengthen your business network’s defenses using MFA (multi-factor authentication, which we discussed in a previous article) or another secure authentication protocol, advanced firewalls (as we mentioned in a different article), and other comprehensive security measures¹. You should also regularly update your software and systems while ensuring that only authorized parties can access them¹. By taking these proactive steps, you can stop hackers and other malicious hackers from infiltrating your organization.

                Second, you must educate everyone in your business about the importance of cybersecurity threats, as well as best practices for addressing and preventing such threats¹. We at navitend offer comprehensive end-user security training, plus DLP (data loss prevention) and ransomware prevention software training programs. Our training programs will shield your team from the dangers of social engineering, phishing, and other malicious tactics hackers use daily¹. In short, you must not overlook the importance of creating a vigilant, security-focused culture for your organization¹.

                Third, you must encrypt your business’s sensitive data both at rest and in transit¹. If your data is encrypted, malicious parties cannot read it or otherwise use it, even if a breach occurs¹. Furthermore, if you are a healthcare provider or health insurance agency authorized to issue health benefit plans in New Jersey, you must adhere to New Jersey S562⁶. NJ S562 requires health insurers and care providers statewide to encrypt patient data or utilize “any other method or technology” rendering this “information unreadable, undecipherable, or otherwise unusable by” unauthorized parties⁶. This demonstrates the importance of encrypting your data so that it does not fall into the wrong hands.

                Finally, you must regularly assess your business’s regulatory compliance and identify any vulnerabilities by conducting routine security audits¹. Thankfully, we at navitend perform comprehensive security assessments for our clients, ensuring that they comply with all relevant cybersecurity regulations surrounding their organizations. Furthermore, if you are a HIPAA-covered entity or business associate, we will make sure that you comply with all HIPAA security requirements. In summary, frequent security audits help stop “whammies” from infiltrating your business’s digital infrastructure.

                If your business is at risk of noncompliance, navitend can help. We offer a variety of managed security services – including advanced Sophos firewalls, end-user security training, and comprehensive security risk assessments – for clients throughout New Jersey, New York, and eastern Pennsylvania. Our top priority is helping you maintain if not exceed required security standards, 24 hours a day and seven days a week.

                Navitend can help you. Call 973.448.0070 or setup an appointment today.

Sources:

¹Fortra, LLC. “The Consequences of Non-Compliance in Cybersecurity: Risks and Penalties” by Stephanie Shank. Retrieved from https://www.tripwire.com/state-of-security/consequences-non-compliance-cybersecurity-risks-and-penalties.

²IBM Security. “Cost of a Data Breach Report 2023.” Retrieved from https://www.ibm.com/downloads/cas/E3G5JMBP

³HIPAA Journal. “What are the Penalties for HIPAA Violations?” Retrieved from https://www.hipaajournal.com/what-are-the-penalties-for-hipaa-violations-7096/.

⁴CSO Online. “PCI DSS explained: Requirements, fines, and steps to compliance” by Josh Fruhlinger. Retrieved from https://www.csoonline.com/article/569591/pci-dss-explained-requirements-fines-and-steps-to-compliance.html.

I.S. Partners LLC. “PCI Non-Compliance Fines & Consequences” by Mike Mariano. Retrieved from https://www.ispartnersllc.com/blog/pci-non-compliance-fines-consequences/.

⁶Norton Rose Fulbright LLP. “Encryption of patient personal information to be the law of the land in New Jersey.” Retrieved from https://www.dataprotectionreport.com/2015/01/encryption-of-patients-personal-information-to-be-the-law-of-the-land-in-new-jersey/.

12
Feb
2024
Safeguarding Your Business Data and Devices with Sophos Central Device Encryption

Safeguarding Your Business Data and Devices with Sophos Central Device Encryption

Whether you run an antiques shop, a neighborhood café, or a tax accounting firm, your data is not just the lifeblood of your business. Your data is your business. If your company’s most sensitive information, such as trade secrets, is lost or stolen, the consequences can be dire. Consider that the average data breach worldwide costs $4.35 million, according to IBM¹. You therefore need a solution that safeguards every device and the data stored therein from your business’s most pressing cyberthreats. 

Enter Sophos Central Device Encryption. This secure, convenient platform provides with a powerful defense against malicious activities such as phishing, ransomware, and spyware attacks². In this article, we will highlight the benefits of Sophos Central Device Encryption for your business. 

One key benefit of Sophos Central Device Encryption is its simplicity². Since Sophos does not require you to deploy any servers or configure back-end key servers, you can set up and manage Central Device Encryption quickly and easily². Additionally, you can start securing your company’s devices – including desktops, laptops, smartphones, and tablets – in mere minutes instead of hours². In short, Sophos makes protecting your devices from malware and other threats a breeze. 

Another advantage of Sophos Central Device Encryption for your business is that its comprehensive full disk encryption gives you an added layer of security, especially when working remotely². Chances are you have been forced to work from home at some point during the past three years due to current events, or when inclement weather makes commuting impossible. With 66 percent of U.S. employees working remotely at least part-time, and 26 percent fully remotely³, securing your business’s computers and the data stored therein has become paramount². Fortunately, Sophos provides you with full disk encryption for both Windows and macOS, which you can conveniently manage within the Sophos Central interface alongside your other Sophos security products, like MDR (Managed Detection & Response), Cloud Optix, Intercept X, and the next-gen firewalls we described in a previous article². This demonstrates the power of Sophos Central Device Encryption for your business, whether you are working from home, in the office, or on the road. 

Sure, working from a client’s office in Cleveland, a hotel lobby in Houston, or an airport lounge in Newark like the one pictured below is all fine and dandy, but what if your devices are lost or stolen? For example, suppose you travel to Phoenix for a conference only to realize you left your laptop on the plane upon arrival. This opens doors for hackers to infiltrate it and wreak havoc on your company’s apps, files, and other sensitive information stored therein. Keep in mind, too, that data breaches resulting from lost or stolen devices cost an average of $3.94 million¹. Thankfully, Sophos Central Device Encryption leverages BitLocker and macOS FileVault to keep your devices secure, even if they fall into the wrong hands². In summary, Sophos Central Device Encryption secures your data and devices wherever you are, from Byram to Brasilia, Brussels, and Beijing. 

(Image courtesy of https://upgradedpoints.com/travel/airports/newark-liberty-ewr-airport-lounges/)  

Still another benefit of Sophos Central Device Encryption is that it helps you save money on costly IT (Information Technology) help desk calls². With its integrated self-service portal, Sophos Central Device Encryption lets your users easily regain access to their devices so they can keep working without any assistance from your IT team². Considering that help desk calls cost an average of $15.56⁴, and password resets a staggering $70 each⁵, Sophos Central Device Encryption is well worth the investment for your business. 

Sophos Central Device Encryption also gives your business an added layer of visibility². Because Central Device Encryption is integrated into the Sophos Central console, your admins can see and manage devices across the entire organization². Additionally, you can ensure all your company’s computers are encrypted, or drill down for valuable insights into your disks and encryption methods². In summary, providing administrators with clearer visibility, Sophos Central Device Encryption gives you much-needed peace of mind when you need it most. 

Not to be overlooked, Sophos Central Device Encryption makes sharing your files securely a breeze². With a password-protected HTML wrapper guarding your files, Sophos ensures that only recipients with the correct passwords can access these documents². This shows that Central Disk Encryption helps you share business information confidentially within your company, without it falling into the wrong hands. 

Finally, Sophos Central Device Encryption helps you comply with the relevant regulations surrounding your business². If you are a healthcare provider, for instance, HIPAA (the Health Insurance Portability and Accountability Act) requires you to encrypt your patients’ protected health information (PHI) and electronic PHI (ePHI) when the data is at rest, whether you have it stored on a disk, USB drive, or other storage platform⁶. Fortunately, as shown below, Sophos Central Device Encryption helps make verifying your encryption status – and demonstrating compliance – easier than ever². Additionally, if your laptop is lost or stolen, Sophos’ full-disk encryption can save you from a serious data breach⁷. When you consider that the average healthcare data breach costs $10.10 million, deploying Sophos Central Device Encryption can help you comply with HIPAA or any other regulations relevant to your organization¹. Any way you slice it, Sophos Central Device Encryption is essential for safeguarding your business’s valuable data and devices. 

(Image courtesy of https://www.sophos.com/en-us/products/central-device-encryption)  

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹IBM Security. “Cost of a Data Breach Report 2022.” Retrieved from https://www.ibm.com/downloads/cas/3R8N1DZJ.  

²Sophos. “Full Disk Encryption: Sophos Central Device Encryption.” Retrieved from https://www.sophos.com/en-us/products/central-device-encryption.  

³Zippia. “25 Trending Remote Work Statistics [2023]: Facts, Trends, And Projections” by Jack Flynn. Retrieved from https://www.zippia.com/advice/remote-work-statistics/.  

⁴BMC Software, Inc. “Cost Per Ticket: The Ultimate Service Desk Metric” by Chrissy Kidd. Retrieved from https://www.bmc.com/blogs/cost-per-ticket/.  

⁵Ping Identity. “Top Benefits of SSO and Why It’s Important for Your Business” by Emily McKeown. Retrieved from https://www.pingidentity.com/en/resources/blog/post/top-benefits-sso.html.  

⁶Security Boulevard. “HIPAA Encryption: Requirements, Best Practices & Software” by Vince Lau. Retrieved from https://securityboulevard.com/2022/10/hipaa-encryption-requirements-best-practices-software-2/.  

⁷Compliancy Group. “HIPAA Encryption: What You Should Know.” Retrieved from https://compliancy-group.com/hipaa-encryption/.  

29
Jan
2024
Spam to Come

Spam to Come

26
Jan
2024
Fortifying Your Enterprise: Unlocking the Strategic Advantages of Cybersecurity Training

Fortifying Your Enterprise: Unlocking the Strategic Advantages of Cybersecurity Training

Whether you run an airline, a tax accounting firm, or an iconic mountain resort like Snowshoe Mountain in West Virginia as pictured below, chances are you provide new employees with at least one training session during the onboarding process. Additionally, while training is essential in every area of your business, it is especially crucial in cybersecurity. If your employees are not trained in fundamental security principles and practices, they will be prone to making costly mistakes. Consider that 90 percent of all data breaches and other security threats involve some degree of human error¹. Now, you may ask yourself, “How important is cybersecurity training for my business?”

(Image courtesy of https://wvtourism.com/company/snowshoe-mountain/)

The answer is simple. Cybersecurity training is more essential for your business than ever before. Keep in mind that the average data breach worldwide costs $4.45 million, and the average U.S. data breach a staggering $9.48 million, according to IBM². Therefore, safeguarding your business from threats like malware, ransomware, and spyware attacks is imperative. In this article, we will learn about the benefits that cybersecurity training has for businesses like yours.

One key benefit of cybersecurity training is that it protects your business’s most sensitive information³. Chances are you handle a variety of sensitive business and personal information every day, from customers’ names and contact information to financial records³. Furthermore, it is especially

important to protect your customer data, because it includes details such as credit card information as well as personally identifiable information (PII) like names and Social Security numbers³. Not surprisingly, this abundance of sensitive information makes your business a prime target for cybercriminals³. Thankfully, however, cybersecurity training helps you keep these malicious actors at bay. For example, security training programs teach your employees how to identify cyberthreats - such as phishing emails – as they arise³. Such programs also educate your staff about the importance of creating and managing strong passwords, as well as only using secure devices and networks³. This demonstrates the value of cybersecurity training for your business.

Meanwhile, cybersecurity training also helps your company improve its overall cyber resiliency¹. Chances are your business must face increasingly sophisticated cyberthreats – such as phishing and ransomware attacks – daily¹. While these complex attacks are difficult for you and your team to comprehend, ample security training can help you better identify such threats before they can wreak havoc on your organization¹. Additionally, when combined with AI-powered behavioral learning technology, a comprehensive training program is essential to stop phishers from hooking your business into their malicious schemes¹.

Sure, cybersecurity training helps you stop cybercriminals from infiltrating your business as we mentioned earlier, but it also helps you recover more quickly if you are attacked¹. If you fall victim to a data breach or other security incident, you will not only need to pay costly legal fees, but your reputation will collapse, and your customers will desert you en masse in favor of competitors¹. This results in lost revenues as well. For smaller businesses, the consequences can even be terminal, as 60 percent of small businesses must close their doors forever within six months after a data breach⁴.

Fortunately, however, cybersecurity training programs help you prevent data breaches and reduce the costs associated with such incidents when they do occur¹. With comprehensive security training programs in place, your employees will be well-versed in identifying potential security risks and reporting them to your IT department¹. By taking these proactive measures, you can better safeguard your company’s finances and prevent devastating losses in revenue, reputation, and trust¹. This shows that proper cybersecurity training is essential for your business.

Still another benefit of cybersecurity training for your business is that it helps your employees identify your organization’s most pressing cyber threats, including malware, phishing, and ransomware attacks³. With comprehensive training programs in place, you can educate your employees to recognize suspicious emails as well as potentially harmful links and/or attachments therein³. This in turn makes them less likely to click on malicious links (such as one claiming to be from the airline on which you booked a flight to Cleveland for your company’s upcoming trade show, for instance), accidentally download malware, or share your business’s most sensitive information with unauthorized parties³. In short, cybersecurity training ensures your employees are well-versed in identifying potential cyber threats so that they do not inadvertently create new ones for your business.

While cybersecurity training programs provide your employees with up-to-date knowledge about the latest security trends, not all of them are created equal¹. For example, if your company’s security training only includes long, boring videos followed by punishment-based phishing simulations and then more boring videos, it is highly ineffective¹. Therefore, you must create or select a cybersecurity training program comprised of short video clips, drawing your team into a compelling story that teaches them valuable security principles and practices throughout¹.

One way to ensure a compelling security training experience is to incorporate gamification into your training programs¹. By integrating game mechanics into your business’s cybersecurity training, you can create a dynamic, predictably awesome learning environment where your employees can apply the security principles that they have learned in an engaging manner¹. Furthermore, rewarding your employees as they gain valuable security knowledge results in measurable improvement¹. Keep in mind, too, that employees who regularly receive cybersecurity training are five times more likely to identify malicious links and avoid clicking on them than those who do not¹. In summary, comprehensive security training programs delivered in an engaging format will pay dividends for everyone in your organization.

(Image courtesy of https://www.welivesecurity.com/2020/04/21/how-gamification-can-boost-cybersecurity-training/)

Additionally, cybersecurity training programs help boost your employees’ overall productivity³. When given ample training on how to identify cyber threats and stop them in their tracks, your employees need not waste their precious time addressing security incidents³. This in turn frees them to focus on their core responsibilities, enhancing productivity and ultimately increasing your company’s bottom line as well³. This demonstrates the value of security training for creating a more productive business.

Finally, cybersecurity training programs help your business maintain valuable customer trust³. If your data is breached, customers will distrust and then abandon your business, thus resulting in lost revenues³. Fortunately, by investing in security training programs, you can show customers that you make data protection a top priority and take the necessary proactive measures to prevent harmful cyberattacks before they can wreak havoc on your company³. In conclusion, cybersecurity training is essential for helping you maintain your customers’ trust.

If you need a comprehensive cybersecurity training program for your business, navitend can help. We offer end user security training for small and medium-sized businesses throughout New Jersey, New York, and eastern Pennsylvania. Our top priority is providing you with a strong line of defense against phishing, ransomware, and other harmful cyberactivity, 24 hours a day and seven days a week. Navitend can help you. Call 973.448.0070 or setup an appointment today.

Sources:

¹Security Magazine. “Top benefits of cybersecurity training” by Maria Henriquez. Retrieved from https://www.securitymagazine.com/articles/98530-top-benefits-of-cybersecurity-training.

²IBM Security. “Cost of a Data Breach Report 2023.” Retrieved from https://www.ibm.com/downloads/cas/E3G5JMBP.

³AwareGO. “5 Benefits of Cyber Security Awareness Training for Small Businesses” by Svjetlana Vukic. Retrieved from https://awarego.com/5-benefits-of-cyber-security-awareness-training-for-small-businesses/.

⁴Cybersecurity Ventures. “60 Percent of Small Companies Close Within 6 Months Of Being Hacked” by Robert Johnson, III. Retrieved from https://cybersecurityventures.com/60-percent-of-small-companies-close-within-6-months-of-being-hacked/.

10
Jan
2024
Hiring Approach

Hiring Approach

navitend embraces enjoys a long history of employing a diverse population of team members in various roles. Current and former team members include individuals of diverse ethnic, gender, age, and faith backgrounds. We are committed to providing equal employment opportunities to all employees and applicants for employment and prohibit discrimination and harassment based on race, color, religion, national origin, gender, and any other characteristics or status protected by applicable local, state, or federal law.

navitend is a financial and technology partner in an online training business dedicated to delivering training related to Equal Employment Opportunity content to businesses and non-profits to help those organizations meet both the regulatory and best-practice needs of cultivating a healthy and diverse workplace (https://www.eeotraining.com). 

27
Dec
2023
Switching Your Business from Google Workspace to MIcrosoft 365

Switching Your Business from Google Workspace to MIcrosoft 365

Whether you run an antiques shop, a hair salon, or a neighborhood café, chances are you utilize cloud-based productivity tools every day. Ninety-four percent of businesses worldwide use some type of cloud-based services¹. However, not all these services are created equal. Consider MS 365 and Google Workspace, for example. While both platforms offer the same basic functionalities, including business email services, online storage, and productivity apps, they are built quite differently².

    For instance, Google takes a cloud-native approach, emphasizing tools like Gmail, Google Drive, Google Docs, and Google Sheets, which support offline email and document storage when used on the Chrome browser². Microsoft, however, centers MS 365 around its familiar Office franchise, including both desktop and web-based versions of Excel, Outlook, PowerPoint, and Word².

    If you are a Google Workspace user, you may ask yourself, “Is MS 365 really better than Workspace for my business?” Fortunately, MS 365 offers a variety of solutions designed with your company’s specific needs in mind. In this article, we will explore the benefits of switching your business from Google Workspace to MS 365.One benefit of switching your business to MS 365 is that, unlike Google, it offers the familiar MS Office suite of applications, including Word, Excel, and PowerPoint². In addition to the latest desktop versions of these apps on Windows PCs and Macs, you can utilize full-featured web versions of applications like Excel, PowerPoint, and Word². Furthermore, MS 365’s Business Basic, Standard, and Premium plans also include mobile versions of Office apps, so you can work seamlessly from anywhere on any device³. This demonstrates the power of MS 365 for your organization.
    Another advantage to transitioning your company from Google Workspace to MS 365 is that it provides you with a diverse array of plans tailored to meet your business’s needs. For example, if you seek a simple, affordable cloud-based productivity platform, select Business Basic, which costs only $6/user/month for an annual subscription³. Meanwhile, Business Standard offers the same features as its low-budget counterpart, plus desktop Office apps (including Publisher and Access on Windows PCs), seamless webinar-hosting abilities, and document personalization tools, for $12.50/user/month with a yearly subscription³. Furthermore, if your business requires advanced security, data control, and protection from harmful cyberthreats, select Business Premium, which starts at $19.80/user/month with an annual subscription³. No matter which of these three plans you select, MS 365 gives you tools for predictably awesome business collaboration, communication, and productivity.

    Of course, MS 365’s plans are not just limited to Business Basic, Standard, and Premium. Microsoft also offers specialized subscription plans for nonprofit organizations, government agencies, and frontline businesses. For instance, if you are an eligible nonprofit, you can qualify for a free MS 365 Business Basic plan for up to 300 users, or a free Business Premium plan for up to 10 users⁴. If you prefer the Business Standard tier, you can pay only $3/month/user for a yearly subscription. Meanwhile, if your company is a healthcare provider, manufacturer, or retailer, you can select from MS 365 F1 for $2.25/user/month, or MS 365 F3 for $8/user/month⁵. Both plans include the familiar Office suite, Teams, and OneDrive cloud storage, plus MS Bookings, Viva Connections, Viva Engage, and Viva Insights⁵. With these helpful tools, you can easily secure your organization and predictably awesome collaboration, communication, and productivity experiences for everyone in your company⁵. This shows the value MS 365 has over Google Workspace for your business.

    Still another benefit of making MS 365 your go-to cloud platform is its enhanced security. For example, Microsoft’s Outlook email platform offers a variety of enterprise-grade security features designed to shield your business from harmful cyberthreats⁶. Notably, Outlook automatically deactivates potentially malicious email links, thwarting phishers from hooking you into their schemes⁶. Considering the average data breach costs $4.76 million, according to IBM, switching your business’s email from Gmail to Outlook is an investment well worth making⁷.

    However, MS 365’s enhanced security features are not just limited to Outlook. Microsoft OneDrive also offers robust security tools, including file encryption, monitoring for suspicious activity, ransomware detection and recovery, and scanning for viruses, so you can enjoy comprehensive cloud storage without worrying about your information falling into the wrong hands⁸. Furthermore, OneDrive’s Personal Vault feature uses identity verification such as fingerprints, face recognition, and SMS codes to protect and store your most sensitive files in the cloud⁸. Personal Vault also gives you easy accessibility to your files, whether from your web browser, the OneDrive mobile app, or directly from File Explorer if you have a Windows 11 PC⁸. In short, MS 365’s security features make it easier to collaborate and communicate securely, anytime and on any device, whether you are at a client’s office, a trade show in Tulsa, or an airport lounge like the one at New York’s LaGuardia Airport pictured below.
 
(Image courtesy of https://metroairportnews.com/air-canadas-latest-maple-leaf-lounge-opens-in-new-york-laguardia-airports-new-terminal/) 

    A further advantage of switching to MS 365 is that while the Business Basic plan and Google’s Business Starter plan both cost $6/month/user for an annual subscription, Business Basic offers you increased cloud storage³. While Google Workspace Business Starter gives you 30GB of storage per user across Drive and Gmail², MS 365 provides you with 1TB of OneDrive for Business storage per user, making it easier to store and access your business documents anywhere, anytime, on any device³. This demonstrates the value of MS 365 for affordable business cloud storage.

    While MS 365’s Business Basic plan offers 1TB of cloud storage versus 30GB of storage for Google’s Business Starter plan, it also provides you the opportunity to organize MS Teams calls, chats, and video meetings with up to 300 attendees³. Google, on the other hand, only allows up to 100 participants for Google Meet communications with Business Starter². This shows that if you need a reliable tool for predictably awesome business communications, MS 365 is the way to go.

    In this article, we explored the benefits of switching your business from Google Workspace to MS 365. Microsoft’s cloud-based collaboration, communication, and productivity platform offers you unparalleled security, comprehensive file storage, enhanced meeting capabilities with MS Teams, and a variety of affordable plans tailored to your company’s needs. No matter how you slice it, transitioning from Google Workspace to MS 365 is your business’s key to predictably awesome communication, collaboration, and productivity.
    Navitend can help you. Call 973.448.0070 or setup an appointment today.

Sources:
¹Zippia. “25 Amazing Cloud Adoption Statistics [2023]: Cloud Migration, Computing, And More” by Jack Flynn. Retrieved from https://www.zippia.com/advice/cloud-adoption-statistics/.

²ZDNet. “Microsoft 365 vs. Google Workspace: Which productivity suite is best for your business?” by Ed Bott. Retrieved from https://www.zdnet.com/article/office-365-vs-g-suite-which-
productivity-suite-is-best-for-your-business/. 

³Microsoft. “Compare All Microsoft 365 Plans | Microsoft.” Retrieved from https://www.microsoft.com/en-us/microsoft-365/business/compare-all-microsoft-365-business-products. 

⁴Microsoft. “Compare Microsoft 365 Nonprofit Plans | Microsoft.” Retrieved from https://www.microsoft.com/en-us/microsoft-365/enterprise/nonprofit-plans-and-pricing. 

⁵Microsoft. “Microsoft 365 for Frontline Workers Plans and Pricing | Microsoft.” Retrieved from https://www.microsoft.com/en-us/microsoft-365/enterprise/frontline-plans-and-pricing.

⁶Android Authority. “Outlook vs. Gmail: How do they compare?” by Adam Birney. Retrieved from https://www.androidauthority.com/outlook-vs-gmail-3336795/. 

⁷IBM Security. “Cost of a Data Breach Report 2023.” Retrieved from https://www.ibm.com/downloads/cas/E3G5JMBP. 

⁸Microsoft. “Personal Vault: Store Sensitive Files – Microsoft OneDrive.” Retrieved from https://www.microsoft.com/en-us/microsoft-365/onedrive/personal-vault.

05
Dec
2023
Festive Best Practices for a Zero-Trust Secret Santa

Festive Best Practices for a Zero-Trust Secret Santa

If you work in an office, chances are you and your coworkers have played Secret Santa at some point during the holidays. Every year between Thanksgiving and Christmas, colleagues participate in this game to boost their morale and strengthen interpersonal connections¹. However, your office’s Secret Santa is far from a secure environment. For example, your coworkers may wish to steal gifts that you have purchased for your chosen recipient, or you might claim a colleague’s intended gift as your own. Additionally, with cybersecurity threats and vulnerabilities growing faster than evergreen branches, organizations worldwide have begun implementing zero-trust principles and practices for enhanced security². In this article, we will explain best practices for organizing a festive, secure, and predictably awesome Secret Santa this holiday season.

 (Image courtesy of https://www.drawnames.com/secret-santa-office-party)

                When organizing your office’s Secret Santa, you can go the old-fashioned route and randomly select names out of a hat, but a more modern approach would entail calling, emailing, or texting your coworkers their designated giver and/or recipient names after creating a top-secret list of who is assigned to whom³. Here is where the zero-trust part kicks in. After making your list in Word or Excel and preferably checking it twice, you must utilize a blockchain application to ensure that it is created and stored properly⁴.

                Compiling a list matching your office’s Secret Santas to their designated recipients is essential, but what if you accidentally delete this file, or a disgruntled colleague deletes it maliciously? If the data in your Secret Santa gift list is breached, the consequences can be disastrous, or even terminal for smaller companies⁴. Consider that the average data breach worldwide costs $4.45 million, according to IBM, and the average U.S. data breach a staggering $9.48 million⁵. Keep in mind, too, that 60 percent of all small businesses must close their doors forever within six months if they are attacked⁶. In short, you need a zero-trust policy in place to keep malicious parties from infiltrating your business’s sensitive files – including the Secret Santa list.

                Additionally, when creating the Secret Santa list, you may be tempted to do so on your smartphone, be it on your phone’s proprietary note-taking app, Google’s Keep Notes, or Google Docs⁴. However, utilizing a mobile device to track office gift-giving and receiving poses even more risks for your business’s security⁴. According to Kiersten Todt, the Cyber Readiness Institute’s managing director, “There is technology that exists that encrypts not just messaging but video, phone, etc., and that’s where we have to go” ⁴. Consider downloading an encrypted messaging and calling app like Signal, an encrypted email app such as ProtonMail, and a file encryption app like CoverMe to protect your Secret Santa list and other sensitive business files from theft⁷. In summary, data encryption is paramount for ensuring your office’s Secret Santa is secure.

(Image courtesy of https://www.howtogeek.com/howto/33949/htg-explains-what-is-encryption-and-how-does-it-work/)

                Zero-trust security models encrypt your data both at rest and in transit before moving it to cloud-based storage⁸. Even if the data in your company’s Secret Santa list is breached, no one can read it except you and your intended recipients⁸. Additionally, returning to mobile security risks, Todt says, “You can no longer absolve yourself of responsibility in the tech space if you’re using a phone to do anything” ⁴. Just as lack of compliance on Santa’s part would spell disaster, you will find yourself in trouble if you fail to take appropriate precautions in creating and storing your Secret Santa list⁴.

                Once you know all your designated Secret Santas and recipients, you must then craft guidelines for purchasing the gifts themselves. One best practice is to establish a price limit for every gift. For example, you should keep your colleague’s Secret Santa gift less than $25¹. Why $25, you ask? According to etiquette expert Maggie Oldham, the $25 limit is neither “too small where you’re getting someone a junk gift” nor “too large where it might put someone out of their budget,” especially if that budget is tight¹. On a related note, you may be tempted to splurge on gifts for close friends, but you should keep your Secret Santa gift within the designated price limit regardless¹. Furthermore, you must not purchase too inexpensive a gift, either. Buying a $5 item when the price limit is $25 will only sully your reputation¹. In short, establishing proper gift-buying rules will help you and all your colleagues keep your respective bank accounts and reputations intact.

                Finally, while you can conduct the office Secret Santa under a zero-trust model, you must conduct a risk assessment before implementing your plan⁴. Treat this like any other security initiative for your business, be it installing new Sophos firewalls as we described in a previous article, or a data loss prevention (DLP) system like those we highlighted in a different article⁴. Although hackers and other malicious actors lurk across the dark web, the chances of them stealing your Secret Santa list and gift purchase-related credit card information are slim⁴. Now ask yourself if the risk is “truly high enough to merit the investment” in a zero-trust system for your business⁴.

                The answer is simple: it is. While chances are your Secret Santa list and gift-buying information such as emailed transaction summaries will not be exposed in a data breach, you must still clearly identify your business’s sensitive data and protect it from any such exposure². Then, and only then, can you guarantee a festive, secure, and predictably awesome office Secret Santa this holiday season.

                Navitend can help you. Call 973.448.0070 or setup an appointment today.

Sources:

¹Entrepreneur. “The Do’s and Don’ts of the Office Secret Santa” by Lisa Evans. Retrieved from https://www.entrepreneur.com/growing-a-business/the-dos-and-donts-of-the-office-secret-santa/253819.

²CSO Online. “Five Best Practices for Implementing Zero Trust” by Megha Kalsi and Jon Medina. Retrieved from https://www.csoonline.com/article/3656800/five-best-practices-for-implementing-zero-trust.html#:~:text=Five%20Best%20Practices%20for%20A%20Zero%20Trust%20Implementation,5%205%29%20Consistently%20Monitor%20Traffic%20and%20Sustain%20.

³Elfster. “What Is Secret Santa? Rules for How to Play a Secret Santa Gift Exchange Online.” Retrieved from https://www.elfster.com/content/secret-santa-rules/.

⁴Informa PLC. “Santa and the Zero-Trust Model: A Christmas Story” by Curtis Franklin. Retrieved from https://www.darkreading.com/edge-articles/santa-and-the-zero-trust-model-a-christmas-story.

⁵IBM Security. “Cost of a Data Breach Report 2023.” Retrieved from https://www.ibm.com/downloads/cas/E3G5JMBP.

⁶Cybersecurity Ventures. “60 Percent of Small Companies Close Within 6 Months of Being Hacked” by Robert Johnson III. Retrieved from https://cybersecurityventures.com/60-percent-of-small-companies-close-within-6-months-of-being-hacked/.

⁷Digital Guardian. “15 Free Mobile Encryption Apps to Protect Your Digital Privacy” by Nate Lord. Retrieved from https://digitalguardian.com/blog/15-free-mobile-encryption-apps-protect-your-digital-privacy.

⁸Encryption Consulting. “Zero Trust Security.” Retrieved from https://www.encryptionconsulting.com/education-center/zero-trust-security/#:~:text=The%20Zero%20Trust%20Security%20model%20protects%20the%20data,can%20read%20the%20data%20except%20the%20intended%20person

17
Nov
2023
Does my business need IT DRP (Disaster Recovery Planning)?

Does my business need IT DRP (Disaster Recovery Planning)?

Whether you run an antiques shop, a neighborhood café, or a tax accounting firm, your data is not just the lifeblood of your business. Your data is your business. Chances are you collect data from a variety of sources, including point-of-sale (POS) systems like the one pictured below if you are a retailer. If you lose this data, however, the consequences for your business can be dire. Consider that the average data breach worldwide costs $4.45 million, according to IBM¹. For smaller firms, the damage can even be terminal, as 60 percent of small businesses must close their doors forever within six months after a breach². Now, you may ask, “How can I protect my business’s data from breaches and other disasters?”

(Image courtesy of https://safnow.org/business-advice/florist-point-of-sale-pos-systems/)

Enter disaster recovery planning, or DRP for short. This proactive approach to security allows your business to adequately prepare for a variety of disasters, ranging from data breaches and ransomware attacks to natural disasters like hurricanes and tornadoes³. DRP also mitigates these disasters’ effects when they do occur³. In this article, we will highlight the benefits of DRP for your business.

One major benefit of DRP is that it provides your business with valuable actionable insights³. If you are creating and implementing a DRP across your organization, you should analyze compliance requirements, data storage systems, external relationships, internal communications, insurance coverage, and IT budgets³. By regularly examining your company’s digital infrastructure, you can locate weaknesses within the system and stop data breaches in their tracks³. Likewise, if you already have a DRP in place, evaluating it frequently allows you to optimize your recovery objectives and improve your overall outcome if your data is lost or stolen³. This demonstrates the importance of DRP for your business.

Another advantage of DRP for your business is that facilitates quicker recovery than ever before³. In today’s fast-paced digital environment, you cannot afford even a single minute of downtime³. For example, one minute of downtime can cost you $427 on average if you run a small business, or up to $9,000 for larger organizations⁴. If your systems are down for an hour, it can cost small businesses an average of $25,620, and larger firms $540,000 on average – more than half a million dollars wasted⁴. Therefore, if your business does not have a DRP, minor breaches can quickly escalate and start wreaking havoc, forcing you to waste valuable time formulating recovery plans and reassuring frazzled customers³. Thankfully, DRP allows you to recover more quickly, so you can rapidly return to providing predictably awesome experiences for customers and employees alike³.

While DRP provides your business with valuable insights and helps you recover more quickly, it also saves your organization money³. Keep in mind that data breaches resulting from accidental data loss or stolen devices cost an average of $4.46 million¹. Therefore, many companies opt to invest in DRP solutions, as they will prevent these businesses from incurring the long-term costs of breaches and other disasters³. Not surprisingly, the cost of DRP depends on the time it demands your organization. You may spend this time conducting business impact analysis, developing subplans, initial testing, ongoing maintenance, and vulnerability assessments, though not in that order³. While each step takes your employees’ valuable time and attention, these tasks are all essential for improving your business’s disaster response capabilities³. Sure, the initial cost may be a setback at first, but DRP’s benefits far outweigh its costs in the long run³. In short, DRP is the firm foundation your business needs to cut costs and secure its tech infrastructure.

DRP helps your business reduce costs, but its ability to minimize damage – reputational or otherwise – must not be overlooked³. If your data is breached, customers will distrust you and abandon you in masse in favor of competitors³. Indeed, 65 percent of data breach victims surveyed in a recent Centrify study lost trust in an organization after the breach, while IDC discovered that 80 percent of consumers in the U.S. and other developed nations would abandon a business if their data was breached⁵. Additionally, you will land fewer clients if your business’s data is lost or stolen³. This shows that data loss, be it through phishing, ransomware, or other such attacks, can devastate your business’s reputation. Fortunately, however, DRP makes your IT team more aware of weaknesses within your tech infrastructure, so they can implement the necessary security measures³. Meanwhile, DRPs help you respond to disasters more quickly and better equip you to get your business processes running like clockwork once again³. This shows the value of DRP for your business.

Still another benefit of DRP is that it enhances your business’s security³. Chances are your company’s data recovery plan differs from your competitors’, which may be entirely different from another organization’s plan³. Larger, data-intensive firms generally prefer cloud-based and Data Recovery as a Service (DRaaS) solutions, while smaller businesses tend to take an internal approach focusing on employees’ actions and their individual responsibilities to prevent disasters³. However, no matter the size of your business, DRP must enhance your existing security tools, minimizing the risk of harmful breaches and ransomware attacks to your business³. For instance, if you have software or other tools you do not regularly use, DRP helps you locate and remove them to reduce the surface area for attacks³. Additionally, DRP provides valuable insights into weaknesses within your system that require greater security³. Furthermore, with a DRP in place, your business can better prioritize and store organizational data. In summary, DRPs improve your company’s security, giving you much-needed peace of mind.

(Image courtesy of https://www.axiom.tech/7-components-that-make-a-great-disaster-recovery-plan/)

If you need to implement DRP for your business, navitend can help. We offer a variety of IT services and support – including Datto backup and recovery systems, as well as data loss and ransomware prevention software and training – for clients in New Jersey, New York, and eastern Pennsylvania. Our goal is to provide you with the tools you need so you can defend your data against disasters and create predictably awesome experiences for everyone in your organization.

Navitend can help you. Call 973.448.0070 or setup an appointment today.

Sources:

¹IBM Security. “Cost of a Data Breach Report 2023.” Retrieved from https://www.ibm.com/downloads/cas/E3G5JMBP.

²Cybersecurity Ventures. “60 Percent of Small Companies Close Within 6 Months of Being Hacked” by Robert Johnson, III. Retrieved from https://cybersecurityventures.com/60-percent-of-small-companiesclose-within-6-months-of-being-hacked/.

³Nexstor. “7 Benefits of Disaster Recovery Planning” by Troy Platts. Retrieved from https://nexstor.com/benefits-of-disaster-recovery/.

⁴Orange Matter. “Micro-Outages Uncovered: Exploring the Real Cost of Downtime for Your Business” by Sean Sebring. Retrieved from https://orangematter.solarwinds.com/2023/07/12/true-cost-ofdowntime/.

⁵Varonis. “Analyzing Company Reputation After a Data Breach” by Michael Buckbee. Retrieved from https://www.varonis.com/blog/company-reputation-after-a-data-breach.

03
Nov
2023
What’s New in Microsoft Teams?

What’s New in Microsoft Teams?

If you are like me, chances are you use MS Teams every day. Approximately 300 million people worldwide utilize Microsoft’s comprehensive communication and collaboration platform at least once a month¹. However, Microsoft recently reimagined Teams from the ground up to enhance performance for business, education, and personal users alike².

(Image courtesy of https://www.microsoft.com/en-us/microsoft-365/blog/2023/03/27/welcome-to-the-new-era-of-microsoft-teams/)

                The new Teams is currently available for Windows and Mac². However, it will launch on the web for Google Chrome and MS Edge users in November 2023². Safari and Firefox users can begin using the new MS Teams for Web in March 2024². In this article, we will highlight key new features in MS Teams and how they can benefit you and your business.

                Notably, the new MS Teams is twice as fast as the classic version you are familiar with³. However, it surprisingly uses less of your computer’s CPU (Central Processing Unit) ³. Since the new Teams is designed with efficiency in mind, it reduces the burden on your device’s memory and disk storage, freeing you up to focus on creating predictably awesome value for everyone in your business². This demonstrates the importance of Microsoft’s new Teams client for your organization.

                Microsoft has also streamlined the communication experience within Teams channels⁴. While new channel posts in Teams appear at the bottom of the “Posts” tab by default, you can select “More channel options… > Sort posts from top” if you prefer to view your recent activity there⁴. Additionally, the new Teams makes it easier to post with more options, reply to existing posts, view recent replies to these posts, and immerse yourself in conversations simply by clicking the link below any channel post you choose⁴. Furthermore, if you wish to focus on a specific conversation away from the main channel, you can easily do so in two ways⁴. You can either navigate to the top of a post and select “More options…,” followed by “Pop Out Conversation,” or you can click on the conversation of your choice and select “Pop out conversation” there to view it in a separate window⁴. Either way, the new MS Teams gives you tools for predictably awesome business communications every day.

                While the overall experience in MS Teams channels is more streamlined than ever, the new MS Teams also lets you search within those specific channels, as well as text-chat conversations³. By using Ctrl + F on Windows PC or Cmd + F on Mac, you can focus on searching within the channel or chat you are in, instead of needlessly perusing the entire Teams app³. With this new function, you can streamline your searches and quickly get back to creating predictably awesome value for your organization³.

                The new Teams also makes managing your contacts a breeze³. You can now manage all your contacts in one place rather than scrambling around the app to find them³. Simply navigate to the left side of the Teams interface, then select “More apps… > People” ³. Now, you can easily add new contacts and better manage your existing ones. This shows the value that Microsoft’s latest version of Teams has for your business.

                Meanwhile, the new MS Teams allows you to receive calls and notifications on multiple devices³. For example, if you prefer to receive calls on a dedicated Teams Phone, you can go into “Settings” and choose the option to receive incoming Teams calls there instead of – or in addition to – on your computer³. You can also opt to receive your incoming calls on mobile devices, such as your smartphone or tablet. In short, the new MS Teams makes it easier to communicate and collaborate on any device, anywhere, whether you are in a client’s office in Cleveland, a hotel lobby in Houston, or an airport lounge in Newark like the one pictured below.

(Image courtesy of https://thriftytraveler.com/reviews/airport-lounges/united-polaris-lounge-newark/)

                Sure, Teams chat is already a predictably awesome tool for communicating with colleagues, but the new Teams lets you start chats with yourself as well³. For instance, you can utilize Teams chat to take notes or set helpful reminders, such as reminding yourself to send a daily summary email to your supervisor at 4:15 PM³. This demonstrates that the new MS Teams is your business’s go-to communication platform.

                While MS Teams already provides you with an effective and efficient platform for business communications, the new Teams has some extra features that reduce distractions so you can work smarter, not harder³. For example, new Teams includes a noise suppression tool, letting you eliminate any sounds you do not want your microphone to pick up³. For instance, you can block the sound of your children, pets, household appliances, or the neighbor’s leaf blower while working from home³. Meanwhile, you can also use this feature to block out chattering customers at your local coffee shop, or locomotive horns and PA system announcements at a train station if you are using Teams there. By eliminating annoying background noise, you can better focus on predictably awesome communication with your colleagues, anytime and anywhere.

                The new MS Teams also helps you reduce distractions by muting non-priority notifications³. When you set your status in Teams to “Do Not Disturb,” the app automatically mutes your non-priority notifications so you can better focus on the task at hand³. in summary, the newest version of MS Teams reduces unnecessary distractions so you can work smarter, not harder – on any device, anywhere and anytime you need.

                Navitend can help you. Call 973.448.0070 or setup an appointment today.

Sources:

¹Business of Apps. “Microsoft Teams Revenue and Usage Statistics (2023)” by David Curry. Retrieved from https://www.businessofapps.com/data/microsoft-teams-statistics/.

²Microsoft. “The new Microsoft Teams desktop client – Microsoft Teams | Microsoft Learn.” Retrieved from https://learn.microsoft.com/en-us/microsoftteams/new-teams-desktop-admin.

³Microsoft. “What’s new in the new Teams app – Microsoft Support.” Retrieved from https://support.microsoft.com/en-us/office/what-s-new-in-the-new-teams-app-efcc9353-d900-4061-b3f1-1341bc988e63.

⁴Microsoft. “Get to know the new channels experience in Microsoft Teams – Microsoft Support.” Retrieved from https://support.microsoft.com/en-us/office/get-to-know-the-new-channels-experience-in-microsoft-teams-d1036ef9-8295-41e4-848a-cb92e3431912.

13
Oct
2023
The Benefits of Application Software Training for Your Team

The Benefits of Application Software Training for Your Team

Whether you run an airline, a convenience store, or a tax accounting firm, chances are you and your employees have participated in some form of workplace training. The global corporate training industry is currently worth $345.56 billion and projected to reach a staggering $493.32 billion by 2028¹. However, if you do not provide your team with proper and adequate training, especially for software programs, it can be detrimental to your organization¹. According to Zippia, only 41 percent of U.S. employees receive formal training, and this lack thereof results in higher turnover rates and decreased productivity¹. You need a solution that not only helps your team learn new software applications, but also boosts their on-the-job competence and confidence.
    Enter application software training platforms. They offer your team the opportunity to learn a new software program – or a new version of your company’s existing software – quickly and easily, while retaining greater knowledge than they would without training². In this article, we will highlight the benefits of application software training programs for your team.
    One key benefit of application software training programs is that they boost your team’s engagement². If you only train your team using simple PowerPoint presentations like the one shown below, chances are they will not remember as much as they would using more interactive learning methods². Fortunately, however, software training programs let your team learn the chosen platform through hands-on experience². This will help them build confidence in the platform, thus encouraging them to complete your training program more quickly². Keep in mind, too, that 92 percent of employees believe well-planned training programs increase engagement, and this higher engagement enhances productivity by 21 percent on average¹. In short, if your employees are engaged in the training, they will be more engaged in their jobs, helping them deliver predictably awesome solutions for your business every day.



(Image courtesy of https://support.microsoft.com/en-us/office/create-a-presentation-in-powerpoint-422250f8-5721-4cea-92cc-202fa7b89617)

Another advantage of application software training is that it helps your employees build confidence through hands-on learning experiences². Since these programs are controlled virtual environments, your team can immerse themselves in the software and try new features without the risk of damaging your business’s infrastructure². Additionally, enabling your employees to perform real-world tasks using your software helps them learn from their errors³. Furthermore, if your team members are well-versed in what they should and should not do on your chosen software platform, they will be more self-confident and thus less likely to make mistakes on the job³. This demonstrates the importance of application software training for everyone in your business.
    While application software training platforms boost employee engagement and build confidence through hands-on experience, they also accelerate the adoption rate for your chosen software platform². Chances are your team members represent a variety of technical abilities, from novices to experienced experts². If your training is inadequate, it will unsurprisingly take longer for new users to become well-versed in your software programs². Meanwhile, if your employees do not understand the chosen software platform, they will shun it altogether². Thankfully, however, application software training lets your team use the software themselves to gain experience, leading to quicker product adoption and onboarding². Since effective software training can increase product usage rates by up to 68 percent, these programs are essential for building employees’ competence on your platform of choice².

Still another benefit of application software training is that it helps your employees retain the knowledge they need to get their jobs done². For example, training platforms let you create dynamic and engaging content quickly and easily². Because software programs are updated with new features regularly, you must let your team learn them at their own pace, so they can manage it more easily². Furthermore, since application software training platforms allow users to learn with continuous practice, they will help your team build lasting software knowledge². In short, application software training helps your employees gain and retain valuable knowledge so they can perform their jobs more competently than ever.

(Image courtesy of https://elearningindustry.com/tips-develop-software-online-training)

                If you are seeking predictably awesome software training for your team, navitend can help. We offer two main types of software application training – public and private – for clients in New Jersey, New York, and eastern Pennsylvania. Our free public training sessions give both clients and non-clients the opportunity to develop their skills in a variety of software platforms, from familiar apps like PowerPoint to less familiar ones like Bookings and Keeper. We also offer private training sessions, where our clients pay us for comprehensive software training in their own environment. Either way, we can provide your team with the software training they need to perform their jobs competently and confidently every day.

                Navitend can help you. Call 973.448.0070 or setup an appointment today.

Sources:

¹Zippia. “35 Key Employee Training and Development Statistics [2023]: Data + Trends” by Jack Flynn. Retrieved from https://www.zippia.com/employer/employee-training-development-statistics/.  

²Appsembler. “Reasons Why Your Business Needs a Software Training Platform” by Bianca Hattingh. Retrieved from https://appsembler.com/blog/5-reasons-why-software-training-platform/#h-boost-engagement-and-knowledge-retention.

³eLearning Industry. “7 Tips to Facilitate Self-Confidence In Online Training” by Christopher Pappas. Retrieved from https://elearningindustry.com/tips-facilitate-self-confidence-in-online-training.

18
Sep
2023
The gap between intention and action

The gap between intention and action

When employees get in the way of continuous improvement

Continuous improvement is key to a healthy business. However, often such improvement involves changing employee behavior. Unfortunately, "change" and humans often don't mix well. Motivating a change in employee behavior is difficult--and sometimes feels impossible. It's hard enough to motivate change in ourselves, let alone others!

In our pursuit of continuous improvement at navitend, we are always looking for ways to improve our customer experience and internal operations. Needless to say, we deal with this issue a lot (just like everyone else).

Some common suggested behavior changes are related to

 - To-do completion (a hard one for us currently)
 - Adherence to process or the company standard operating procedures (SOP)
 - Adoption of new technology
 - Training for skills development

I hope this article will give you a few quality suggestions on how to improve employee behavior using a few lessons from the field of behavioral economics.

What behavioral economics can teach us about the gap between intention and action

Behavioral economics teaches,

As long as a suggested behavior is rational, we should assume that individuals want to do the behavior. The thing stopping them is not a lack of desire or intention for that behavior. Rather, there are other factors impeding individual behavior.

This is all at once rather obvious. If there is good reason to change how one acts, individuals will want to make that behavior change. But often the individuals' desire for the change is not enough on its own. This is called the "intention-action divide."

However, compare this thinking to the typical business "incentives" programs. These programs assume that if your employee's actions are not changing, then that means the employee does not have enough motivation to do that action. The answer, then, according to these programs is incentivizing with

 - Monetary rewards for changed behavior, or even
- Punishment for lack of changed behavior.

These programs assume that with enough incentive, individuals will follow the suggested behavior. This thinking is flawed. While desire is necessary, it is insufficient. Behavioral economics suggests that the biggest reason for the "intention-action divide" is limited attention. This is because humans have to split their attention among many important things, both personal and professional. Just like everything else, attention has scarcity.

If incentives are not enough...

Then what is? Those consistently late to-dos can't just be the new reality. Do you need to accept that everyone will not adopt your new technology investment? And will no one ever pursue the new professional skills that they need to?

At risk of sounding like a broken record, behavioral economics can help us here again. It suggests a useful (and low-cost) tool for helping individuals do the suggested behavior.

Reminders are a proven effective tool

Reminders sound amateur. After all, if employees really wanted to "be good employees," they wouldn't need reminders to use your updated company SOP. But again--that's not the issue--the issue is limited attention. Reminders bring employees' attention back to what is important.

These reminders can look very different depending on what they are for. There is no right answer for the frequency of reminders, but make sure that they are not so frequent they become irrelevant or so infrequent that they are ineffective.

While not all reminders should be automated, many can be automated within your technology environment. This can look like a weekly email with upcoming to-dos, a pop-up reminder in your CRM environment to refer to an updated process, or--a familiar one here--a security warning on emails from unknown senders. The Microsoft 365 productivity suite is particularly powerful in enabling this type of automation.

Be on the lookout for upcoming content from us to apply this reminder concept in the Microsoft environment.

A warning against incentives without reminders

All of this is not to say that incentive programs cannot be successful. While incentive program models are notorious for over-promising ("get 200%+ from your employees"), there are ways to make effective incentive programs.

However, putting the incentives in place and explaining it once to employees is not enough. The key is this: employees must know exactly what behavior is expected of them and how that is tied to the incentive. A regular reminder of exactly what the expected behavior is and why that behavior is incentivized fixes employees' attention on the intended outcome. Employees' attention is limited, so focus on what is important.


I hope you learned something useful and enjoyed this application of behavioral economics as much as I did. Feel free to reach out with any thoughts or questions.

Aidan Ableson
aableson@navitend.com
https://www.navitend.com
(973) 448-0070

25
Aug
2023
Unlocking Business Potential: Why Microsoft Business Premium Prevails Over Business Standard and Business Basic

Unlocking Business Potential: Why Microsoft Business Premium Prevails Over Business Standard and Business Basic

In the realm of business software solutions, making the right choice can significantly impact your company's success. When considering Microsoft's offerings – Business Premium, Business Standard, and Business Basic – opting for Microsoft Business Premium brings forth a plethora of distinct advantages that can propel your business to new heights. Let's delve into these benefits to understand why Business Premium shines as the superior choice.

1. Comprehensive Toolset for Enhanced Efficiency:
Microsoft Business Premium goes beyond mere functionality. It includes all the best features from Business Standard and Business Basic while introducing additional capabilities such as Microsoft Intune for streamlined device management and Power BI for data-driven insights. This comprehensive toolset empowers your business with a versatile toolkit that covers essential tasks and fosters advanced productivity.

2. Elevated Security Measures:
Security is a paramount concern in today's digital landscape. While all three plans prioritize security, Business Premium takes it to the next level. With features like multifactor authentication, robust data encryption, and advanced security tools, your business is better equipped to safeguard sensitive data, protect against cyber threats, and ensure compliance with industry regulations.

3. Unparalleled Collaboration and Communication:
Microsoft Business Premium sets a new benchmark for collaboration and communication. While all plans include Microsoft Teams for team interaction, Business Premium's seamless integration across applications results in real-time co-authoring, advanced file sharing, and efficient communication, fostering an environment of cohesive teamwork, even in remote work scenarios.

4. Cloud-Driven Agility and Accessibility:
Business agility is a key driver of success. Business Premium capitalizes on the power of the cloud with expanded storage capacity through OneDrive and SharePoint. Business Premium users recieve a 50GB primary mailbox and unlimed cloud archive mailbox and 1TB of cloud storage on OneDrive per user .

5. Informed Decision-Making with Data Insights:
Data is the heartbeat of modern businesses. Business Premium introduces Power BI, a robust business intelligence tool. Absent in the other plans, Power BI transforms raw data into actionable insights, enabling your business to make informed decisions based on real-time trends, patterns, and analytics.

6. Scalability for Future Growth:
Business Premium offers scalability in several aspects to accommodate your business's evolving needs. User scalability allows you to easily add or remove users as your business grows or changes. You can scale up by adding new users to the subscription or scale down by removing users if necessary. Additonally, as your business generates more data or requires additional space for documents, images, and other files, you have room to expand without worrying about running out of storage.

7. Maximized Value and ROI:
Although Business Premium may involve a slightly higher cost, the value it delivers far exceeds the investment. From heightened productivity and advanced security to data-driven decision-making, the comprehensive benefits of Business Premium translate into long-term cost savings and increased profitability.

In summary, Microsoft Business Premium's unique advantages make it the best choice for businesses seeking a comprehensive, secure, and future-ready solution. With an extensive toolset, enhanced security, seamless collaboration, cloud-driven flexibility, data intelligence, scalability, and compelling ROI, Business Premium ensures that your business remains competitive and adaptable in today's rapidly evolving business landscape.

If you are looking to install Microsoft 365 for the first time, or upgrade your existing MS 365 subscription, navitend can help. We offer a comprehensive suite of managed IT services and support for clients throughout New Jersey, New York, and eastern Pennsylvania. We can install and manage MS 365 for your business so you can focus on providing predictably awesome experiences for your employees and customers. Our top priority is keeping your business’s computer systems running like clockwork, 24 hours a day and seven days a week. 

Navitend can help you. Call 973.448.0070 (opt 2) or set up an appointment today

01
Aug
2023
Why Predictably Awesome IT Experiences?

Why Predictably Awesome IT Experiences?

Information Technology is not often Predictable and not many people have an Awesome Experience.

We think that is a shame and we're working to deliver a Predictably Awesome Experience for our clients.

Information Technology has become increasingly complex with numerous cloud providers and no shortage of cyber threats. Insurance premiums are increasing and down-time is costly to your business. We recognize that you're not probably not too interested in bits and bytes, you just want things to work and to go on with your day -- kind of like flipping the switch and the lights turn on. We get it.

We focus on our team's training and all of our processes from help desk, to project planning and execution, to billing and even the cool navitend Sheep Gear we share with our friends. We drill internally to make those processes repeatable and PREDICTABLE. Then we dial in YOUR EXPERIENCE and won't stop until you are a raving fan. And then we keep it up to keep that smile on your face.

If you would like a Predictably Awesome IT Experience, give us a call, we'd love to speak and see if we're a good fit to help you. If we can give you a Predictably Awesome IT Experience, we want to work together. If we're not a good fit, we'll shoot straight with you and make recommendations for alternative solutions which may be a better fit.

The call is free and the service is Predictably Awesome. Go ahead and pick up the phone or drop us a note at info@navitend.com.

24
Jul
2023
Password Complexity Best Practices for HIPAA Compliance Made Simple

Password Complexity Best Practices for HIPAA Compliance Made Simple

It is a routine we follow every day. We enter usernames and passwords to access a variety of websites and applications, such as online banking and shopping sites, and even our devices themselves. However, especially if you work in healthcare, poorly crafted passwords can spell disaster. If you use a weak password like “MyPassword2022,” you will open the door for harmful phishing, ransomware, and spyware attacks. These attacks can have devastating consequences. According to IBM’s Cost of a Data Breach Report 2022, the average cost of a healthcare data breach is $10.10 million, more than double the $4.35 million global average across all sectors¹. Now, you may ask, “How can I keep my patients’ health records and other valuable information safe from hackers?” 

Enter password complexity. HIPAA (the Health Insurance Portability and Accountability Act) includes the Security Rule, which outlines specifications for “creating, changing, and safeguarding passwords” used in healthcare organizations². In this article, we will outline password complexity best practices to keep your organization HIPAA-compliant and your data secure. 

(Image courtesy of https://www.logonbox.com/content/password-manager-in-healthcare/)  

One best practice for HIPAA-compliant password management is to apply minimum overall length requirements for overall length, as well as the number of uppercase, numeric, and special characters³. The National Institute for Standards and Technology (NIST) outlines that passwords for HIPAA-covered entities must include at least eight characters, featuring complex and random combinations of letters, numbers, and symbols⁴. Additionally, do not use any words from the dictionary in your password⁴. While longer passwords are more effective, you may opt to use three- or four-word passphrases instead⁴. Try using unrelated words like “chicken-airplane-soldier” or “raccoon-doorknob-spacecraft” in your passphrase for greater security⁴. Any way you slice it, following these standards will make your healthcare organization’s login processes more secure. 

Another best practice is to avoid changing your passwords regularly³. While NIST formerly recommended that users change their passwords every 90 days, or about three months, that is no longer the case³. NIST found that instead of completely overhauling their passwords, users often transformed them only slightly, sometimes by a single digit³. For example, users might have transformed their password from “passwordfor2020” to “passwordfor2021” ³. However, this approach is problematic. If hackers have cracked the old password, chances are they will crack the new one sooner rather than later³. Therefore, NIST now recommends that you only change your password when weak or transformed passwords are exposed, when there is evidence of compromised passwords, or when employees leave your organization³. 

Still another best practice for HIPAA-compliant password management is to utilize two-factor authentication (2FA), which we outlined in a previous article. As its name suggests, 2FA requires users to enter single-use passcodes along with their username and password when logging into protected accounts³. However, keep in mind that these passcodes are often delivered via SMS text or authenticator app, potentially opening doors for hackers if you receive them on the same devices you use to access protected data³. Nevertheless, selecting the right 2FA solution will help your healthcare organization meet HIPAA standards and keep your passwords secure. 

(Image courtesy of https://www.globalsign.com/en/blog/how-make-multi-factor-authentication-simple-and-secure-health-services-industry)  

While applying minimum requirements, avoiding frequent password changes, and using 2FA are excellent practices for HIPAA compliance, also remember to check password blacklists³. These lists not only include commonly hacked passwords, but more importantly, those exposed in data breaches³. For example, NordPass notes that the most frequently cracked passwords in the U.S. last year were “123456,” “password,” and “12345” ⁵. Since these simple, predictable passwords are the first ones that hackers will attempt to crack, you must avoid them at all costs³. This demonstrates the importance of effective password management for complying with HIPAA requirements. 

If you are a healthcare provider seeking HIPAA-compliant password management solutions, navitend can help. We offer managed IT (Information Technology) services for clients throughout New Jersey, New York, and Pennsylvania, including HIPAA-related security risk assessments and password management software. Once you have decided to install our password management software, we will work with you to ensure that everyone in your organization can securely access passwords by only remembering a single, secure password that only you know. We have the solutions you need to protect your healthcare organization’s login processes 24/7/365.  

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹IBM Security. “Cost of a Data Breach Report 2022.” Retrieved from https://www.ibm.com/downloads/cas/XZNDGZKA. 

²HIPAA Journal. “The HIPAA Password Requirements and the Best Way to Comply with Them” by Steve Alder. Retrieved from https://www.hipaajournal.com/hipaa-password-requirements/. 

³HIPAA Journal. “5 Password Best Practices for HIPAA Covered Entities.” Retrieved from https://www.hipaajournal.com/password-best-practices/#:~:text=%205%20Password%20Best%20Practices%20for%20HIPAA%20Covered,blacklists%20are%20lists%20of%20the%20most...%20More%20. 

⁴Bitwarden. “HIPAA Password Requirements Explained” by Andrea Lebron. Retrieved from https://bitwarden.com/blog/hipaa-password-requirements/. 

⁵NordPass. “Top 200 most common passwords.” Retrieved from https://nordpass.com/most-common-passwords-list/.  

10
Jul
2023
Printer Management Best Practices for Your Business

Printer Management Best Practices for Your Business

If you run a business, chances are you have at least one printer on your premises. While we live in an increasingly digital world, the average office worker still prints approximately 10,000 pages a year, the equivalent of $725 in printing costs¹. For larger organizations with hundreds if not thousands of employees, this can add up to tens or even hundreds of thousands of dollars annually¹. Keep in mind, too, that printers themselves are more advanced, specialized, and network-connected than ever before². While you may not consider your printer on par with your desktops or laptops, hackers do. According to the 2018 Global Print Security Report, 60 percent of businesses in the US, UK, France, and Germany suffered print-related data breaches that year, losing an average of $400K each³. You therefore need a solution that helps you manage your company’s printers securely and efficiently. 

Fortunately, printer management is here to help. In its simplest form, printer management – also called print management – involves managing your company’s office printers, multifunctional devices, and other print devices like label printers so that everyone in your business can access them⁴. In this article, we will highlight the best practices for printer management within your organization. 

One crucial printer management best practice is to design a print infrastructure with maximum efficiency and security in mind⁵. If you work in healthcare, for example, the last thing you need is for employees to leave paperwork unattended in printer trays, especially papers containing sensitive patient information⁵. Thankfully, managed service providers can redesign your computer’s printer-fleet layout around organizational workflows, not only streamlining your business’s printing for increased efficiency but simultaneously improving your security posture and regulatory compliance as well⁵. 

While designing the proper print infrastructure is paramount, you must also specify exactly who can print from your company’s or department’s printers⁶. For instance, in a healthcare organization handling thousands of patients’ records daily, you do not want your accounting or marketing team printing sensitive patient information on the printers in their respective departments. Therefore, restricting access to your printers is crucial⁶. Windows makes enabling this option simple: start by going to “Settings > Printers & Scanners” ⁶. Next, click your printer on the list and select “Manage” ⁶. Then, click “Printer properties” for more options⁶. Once you have done so, switch to the “Properties” window and select the “Security” tab⁶. You will now find a list of users and groups on your computer⁶. To see each user’s current printer permissions, just click on their name in the list⁶. Now, suppose you want to prevent your company’s marketing department from taking certain actions, like printing sensitive documents⁶. Select them from the list and check the “Deny” box for any field you wish to prevent⁶. This ensures that only the correct users print the correct documents from your business’s printers. 

Another best practice for effective printer management is to provide seamless experiences for remote users. Chances are you have been forced to work from home at some point during the past two-plus years due to current events, or when inclement weather makes commuting impossible. Either way, network-connected printers like the HP OfficeJet let you manage printers remotely through a convenient web interface⁶. Keep in mind, however, that although remote print management has its benefits, not everyone in your business should access it⁶. Rather, you should enable a password so that only you can access it⁶. If you are using an HP printer, for example, you can find this option on the Embedded Web Server at “Settings > Security > Password settings” ⁶. Once you have created a password, others on your network cannot make changes even if they determine your printer’s IP address⁶. This helps you ensure that you and your employees can securely print from anywhere, whether you are working from home, visiting a client’s office, or on the road. 

Still another best practice for effective printer management is to implement secure pull-printing technology². While you may still send print jobs directly to a specific printer for immediate output, this approach is flawed². For example, if you leave documents containing sensitive information like trade secrets in the printer tray, unauthorized parties can easily steal this information. With secure pull-printing, however, you print to a secure queue and then use your login credentials or company ID card to access your documents at any network printer². You can even opt for secure release printing, which requires authorization to release the documents, thus adding an extra security layer⁷. Any way you slice it, implementing secure pull-printing is key for more effective printer management. 

G

(Image courtesy of https://www.uniprint.net/en/pull-printing-high-availability/)  

Finally, you must not overlook the importance of additional security features like firewalls. Chances are your printer is connected to the company network, and if so, you must install firewalls on your computer or router to prevent unauthorized users from accessing it². You should also update your firmware often, so that you do not fall victim to any security flaws your manufacturer has reported². In short, enhanced printer security reaps greater benefits for your organization. 

If you need to manage your company’s printers more securely and effectively, navitend can help. We offer a variety of printer management solutions for clients throughout New Jersey, New York, and eastern Pennsylvania. Using our traditional network management tools, you can grant printer access to specific users within your company based on their roles. For example, you can ensure that only your marketing employees can utilize the printers in your marketing department. Meanwhile, if you do not have a centralized print server, we also offer cloud-based printer management solutions. Our top priority is keeping your printers and networks secure for reliable and predictably awesome business printing experiences every time. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹imageOne. “Three Printing Stats That Are Terrifying to Your IT Budget” by Brad Foster. Retrieved from https://www.imageoneway.com/blog/three-printing-stats-that-are-terrifying-to-your-it-budget. 

²Entrepreneur. “Why Your Innocent Office Printer May Be a Target for Hackers” by Kevin Pickhardt. Retrieved from https://www.entrepreneur.com/science-technology/why-your-innocent-office-printer-may-be-a-target-for-hackers/308273. 

³Small Business Trends. “Beware! 60% of Businesses Lose Their Data Through Printer Security Breaches” by Michael Guta. Retrieved from https://smallbiztrends.com/2019/02/printer-security-breach.html#:~:text=According%20to%20the%20Global%20Print%20Security%20Report%2C%2060%25,costs%20companies%20an%20average%20of%20more%20than%20%24400K. 

⁴Ricoh USA, Inc. “What is print management?” Retrieved from https://www.ricoh-usa.com/en/insights/articles/print-management.  

⁵Samsung. “5 Best Practices for Managed Print Services in Healthcare” by Samsung for Business. Retrieved from https://insights.samsung.com/2016/01/25/5-best-practices-for-managed-print-services-in-healthcare/.  

⁶MakeUseOf. “7 Essential Ways to Secure Your Printer” by Ben Stegner. Retrieved from https://www.makeuseof.com/essential-ways-secure-printer/.  

⁷Plus Technologies LLC. “Pull Printing Solution Benefits.” Retrieved from https://www.plustechnologies.com/post/pull-printing-solution-benefits/.  

19
Jun
2023
How to Sync Your Calendars with MS Teams

How to Sync Your Calendars with MS Teams

If you run a business, calendars play a pivotal role in your daily operations. We use calendars every day to schedule meetings with colleagues, clients, and vendors alike. Additionally, whether you run an airline, a hair salon, or a tax accounting firm, chances are you are familiar with Microsoft Teams. With 270 million active users every month, Teams is the preferred collaboration and communication platform for your business¹. In addition to text chat, video conferencing, and Voice over Internet Protocol (VoIP) calling capabilities, Teams offers a shared calendar functionality so you and your teammates can schedule meetings and other business events within the Teams app². 

(Image courtesy of https://office365itpros.com/2019/08/26/teams-new-calendar-app/)  

While the built-in Teams calendar lets you specify event details and add other members so they too can add events to their synced calendars, it does not show every Outlook calendar you have³. Also, keep in mind that by default, your Google and other non-Microsoft calendars will not appear, either³. Since the built-in MS Teams calendar only shows your default Outlook calendar, your non-default calendars - including those you create manually and the ones you import via URL - will not sync to your Teams calendar³. Further compounding the matter, you may notice that although your default calendar may show you are free at a given time, a different one may show you are busy at the same time³. You therefore need a solution that lets you sync your calendars with Teams for streamlined and predictably awesome scheduling. 

Fortunately, we are here to help. In this article, we will explain how to sync your Google, Outlook, and other calendars with MS Teams so you can schedule meetings, conferences, and other business events without conflict and keep your entire team on the same page. 

CalendarBridge offers a handy synchronization tool so you can ensure that your non-default Outlook, Google, and other calendars appear in MS Teams alongside the built-in one³. After setting up the sync connection, you will be able to see all your calendars in Teams within a few minutes, eliminating the hassles of scheduling conflicts and checking several different calendars to confirm your availability - or lack thereof - for a particular meeting³. Even if you do not utilize the CalendarBridge sync tool, syncing your calendars with MS Teams is quick and easy. Follow these simple instructions and you will be on your way to hassle-free business scheduling. 

Start by opening your preferred calendar, such as Google or Outlook, in the web browser of your choice. Next, hover your mouse cursor over a calendar name until three dots appear². Once you see these three dots to the right of your chosen calendar’s name, click them to open the menu². Then, in this menu, click “Settings”. After selecting “Settings,” click on the web address under “Public URL to this calendar” and then press Ctrl + V to copy it to your clipboard². Once you have done so, open MS Teams and navigate to a chat or group in which you wish to post this calendar (such as “Marketing Team” or “Finance Team”)². Next, move your cursor to the top of the screen and click the “+” symbol. Then, click “Website” ². After clicking “Website,” paste your calendar into the URL field². Finally, click “Save,” and your calendar is now synced with the default Teams calendar². Everyone on your team can view this synced calendar, making it easy for you to schedule predictably awesome business meetings³. 

Once you have synchronized your Outlook and Google calendars to your default Teams calendar, it and the Teams Scheduling Assistant will always reflect your true, up-to-the-minute availability³. No longer must you endure the frustration of toggling between Teams and your external calendars several times daily, or find yourself double-booked on the MS Teams Scheduling Assistant³. In summary, syncing all your calendars with Teams helps you streamline the scheduling process so you can make booking appointments and organizing meetings a breeze for everyone in your organization. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹Business of Apps. “Microsoft Teams Revenue and Usage Statistics (2022)” by David Curry. Retrieved from https://www.businessofapps.com/data/microsoft-teams-statistics/. 

²Lifewire. “How to Use a Microsoft Teams Calendar by Brad Stephenson.” Retrieved from https://www.lifewire.com/use-a-microsoft-teams-calendar-4842577#toc-how-to-share-another-calendar-in-microsoft-teams. 

³CalendarBridge. “How to Sync All Your Calendars to Microsoft Teams.” Retrieved from https://help.calendarbridge.com/calendar-management-blog/how-to-sync-all-your-calendars-to-microsoft-teams/. 

05
Jun
2023
The Benefits of Dynamics 365 for Managing Your Business’s Supply Chain

The Benefits of Dynamics 365 for Managing Your Business’s Supply Chain

Whether you run an airline, a neighborhood café, or an iconic mountain resort like Snowshoe Mountain in West Virginia as pictured below, supply chain management is integral to your business. If you do not possess the raw materials to manufacture your products, or your retail store’s shelves are frequently empty, the consequences can be dire. For example, suppose you run a corner grocery store and your customers frequently cannot find the items they need. In this case, customers will abandon your business en masse in favor of your competitors who do have the items they need in stock. Now, you may ask yourself, “How can I better manage my business’s supply chain?” 

(Image courtesy of https://wvtourism.com/company/snowshoe-mountain/)  

Meet Dynamics 365. Microsoft’s all-in-one, cloud-based platform offers a Supply Chain Management platform that can help you predict and overcome any disruptions to your company’s supply chain, so you can constantly meet customer demand and increase your profits¹. In this article, we will highlight the benefits of Dynamics 365 Supply Chain Management for your business. 

One major benefit of Dynamics 365 Supply Chain Management is that it gives you the tools you need to manage your supply chain more confidently than ever before². By harnessing Microsoft’s unparalleled AI (Artificial Intelligence) capabilities, you can easily predict demand for your company’s products over time². Additionally, with priority-based supply planning capabilities built right in, you need not worry about overstocking or stockouts². Dynamics 365 also offers Azure Machine Learning-powered AI predictions so you can enrich your company’s historical demand data and improve forecasting so you can better meet customer demand². In short, Dynamics 365 Supply Chain Management helps you manage supply and demand while saving time and reducing headaches. 

Another advantage of Dynamics 365 Supply Chain Management is that it lets you procure production materials strategically and cost-effectively². For example, Dynamics 365 gives you a single view of inventory across all your channels, with the ability to allocate inventory to specific customers or for specific needs². You can also use Teams directly in the Dynamics 365 interface to collaboratively streamline your sales and operations planning processes². One company harnessing these capabilities is Alterra Mountain Resorts. Alterra owns 15 year-round mountain resorts across the U.S. and Canada, from Stratton in Vermont to Big Bear Mountain Resort in southern California³. The company uses Dynamics 365 for its procure-to-pay process, which starts with a purchase requisition³. If requests exceed a specific maximum dollar amount, Alterra then routes them to the requester’s manager³. Alterra currently utilizes Dynamics 365 to process 4,000 to 5,000 requisitions every month³. Additionally, by connecting Dynamics 365 requisitioning and purchasing to vendor punchout catalogs, Alterra’s employees can seamlessly purchase items from any approved vendor catalog³. This in turn lets Alterra centralize its purchasing process, allowing the company to consolidate purchase orders from its most heavily used vendors³. In short, if Dynamics 365 can help Alterra streamline its purchasing processes, it can do likewise for your business. 

With an increased emphasis on innovation and sustainability in manufacturing, Dynamics 365 can help you achieve these goals if you are a manufacturer². For instance, you can integrate Dynamics 365 Supply Chain Management with IoT (Internet of Things) devices and mixed reality capabilities to build agile and predictably awesome manufacturing processes². Additionally, Dynamics 365 lets you view your factory’s stock and production in real time so you can better manage the shop floor and in turn improve quality, increase throughput, and most importantly, reduce downtime to keep your production running like clockwork². Furthermore, you can utilize the holographic experiences in Dynamics 365 Guides to provide your employees with interactive training materials directly on the production line, reducing errors and improving safety so they can focus on the task at hand, thus increasing efficiency². In summary, Dynamics 365 Supply Chain Management is essential for any manufacturing business. 

Still another benefit of Dynamics 365 Supply Chain Management is that it helps you better manage your assets over their entire respective lifecycles¹. With Dynamics 365, you can harness AI-powered scheduling, mixed reality, and sensor data intelligence to perform predictably awesome predictive maintenance for everything from delivery trucks to assembly line machinery¹. Returning to the Alterra Mountain Resorts example, the company’s Mont-Tremblant Resort in Mont-Tremblant, Quebec, Canada recently implemented Dynamics 365’s Supply Chain Management Asset Management add-in³. This deployment encompasses 125 mobile workers and 24,000 assets – including ski lifts, snowmaking machines, golf carts, and hotel buildings – across the entire Tremblant resort³. To better support maintenance work, Alterra’s Tremblant team also implemented production information and inventory management in Dynamics 365 for an inventory of 16,000 spare parts, so that they always have the parts they need whenever they need them most³. This demonstrates the importance of Dynamics 365 for managing your company’s most valuable assets. 

Finally, Dynamics 365 Supply Chain Management helps you deliver your products to customers consistently, quickly, and reliably². For example, the Dynamics 365 platform lets you automate warehouse operations, increase throughput, and optimize inventory². You can also use real-time inventory and available-to-promise (ATP) data to provide your customers with accurate inventory information 24/7². Additionally, by offering flexible rebate calculations as shown below, plus trade allowance management capabilities, Dynamics 365 helps you build and maintain valuable customer relationships². Not to be overlooked, Dynamics 365’s robotic automation capabilities help keep your warehouse operations running smoothly even if you are short-staffed². This shows that any way you slice it, Dynamics 365 Supply Chain Management helps you manage every aspect of your supply chain, from procurement to distribution and asset management, with confidence. 

(Image courtesy of https://dynamics.microsoft.com/en-us/supply-chain-management/capabilities/)  

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹Microsoft. “Supply Chain Products | Microsoft Dynamics 365.” Retrieved from https://dynamics.microsoft.com/en-us/digital-supply-chain/. 

²Microsoft. “Supply Chain Management Capabilities | Microsoft Dynamics 365.” Retrieved from https://dynamics.microsoft.com/en-us/supply-chain-management/capabilities/. 

³Microsoft. “Microsoft Customer Story – Alterra Mountain Company: Dynamics 365 fuels growth for the newly formed, fast-growing company.” Retrieved from https://customers.microsoft.com/en-us/story/1462545754977009469-alterramountaincompany-entertainment.  

26
May
2023
Safeguarding Your Financial Service Business with Sophos MDR and navitend

Safeguarding Your Financial Service Business with Sophos MDR and navitend

If you are a bank, credit union, or other financial service provider, your data is not just the lifeblood of your business. Your data is your business. Chances are you have vast repositories of sensitive business and personal information stored in your on-premises servers, in the cloud, or both¹. Such information includes your customers’ names, addresses, credit card numbers, and Social Security numbers¹. If this data is breached, it can spell disaster. Consider that the average financial data breach costs $5.97 million, according to IBM². You therefore need a solution to safeguard your valuable financial information. 

(Image courtesy of https://www.analyticsinsight.net/banking-security-a-crucial-aspect-for-the-finance-industry/)  

Enter Sophos’ managed detection and response system, or MDR for short. This fully managed service gives you support from security professionals well-versed in detecting and responding to phishing, ransomware, spyware, and other types of cyberattacks³. In this article, we will highlight the benefits Sophos MDR has for your financial service business. 

One major benefit of Sophos MDR for your financial service company is that it streamlines your threat detection and remediation processes³. If you have an in-house SOC team, chances are it takes them several hours – anywhere from 3.7 to 30, depending on the organization – to address your business’s most pressing threats³. However, Sophos reduces that time to 38 minutes on average³. It takes Sophos only one minute to identify threats, 25 to investigate them, and an additional 12 to remediate them³. This frees your employees up to focus on providing predictably awesome financial services for your diverse clientele. In short, Sophos MDR saves you time, headaches, and sleepless nights. 

Another advantage of Sophos MDR is that it helps you comply with relevant financial service regulations. For example, if you conduct business operations in New York State, you must adhere to NYDFS cybersecurity regulations, namely 23 NYCRR Part 500⁴. All financial entities covered under this law must maintain their own cybersecurity programs designed to protect their information systems’ availability, confidentiality, and integrity⁴. Fortunately, with its expert security staff continuously monitoring and correlating signals from across your network, plus identifying and investigating suspicious activities within your system, Sophos MDR meets these requirements⁴. Furthermore, Sophos MDR thoroughly and regularly detects, investigates, and correlates anomalous behaviors and malicious code to quickly neutralize cyberattacks before they can wreak havoc on your business⁴. This helps satisfy the NYDFS requirement for using defensive infrastructure to protect your information systems and the data stored therein from any unauthorized access or use⁴. In summary, Sophos MDR gives you the tools you need to maintain compliance and avoid costly penalties. 

While Sophos MDR helps you comply with regulations like those outlined by NYDFS, it also helps you create reports confirming such compliance¹. Thankfully, MDR’s integrated Sophos Central dashboard features a variety of compliance reports built right in, along with easy tools so you can create custom reports quickly and easily¹. Sophos Central also lets you correlate data from multiple sources to conduct cross-product investigations¹. Additionally, with Sophos Central, you can harness Sophos Synchronized Security capabilities to share real-time threat, health, and security information across your Sophos devices, while also working together to respond to threats automatically¹. This demonstrates the power of Sophos MDR for your financial service business. 

You can also tailor Sophos MDR to meet your financial service company’s specific needs⁵. For example, if you expand your business operations or your public profile grows rapidly and exponentially, you must confront more cyberattacks than ever⁵. This places an additional burden on your firewalls, such as the Sophos next-generation firewalls we outlined in a previous article, and other security tools⁵. Thankfully, Sophos MDR can easily handle this increased traffic load and respond to threats quickly, giving you much-needed peace of mind when you need it most⁵. 

Still another benefit of Sophos MDR for your financial service company is that it significantly reduces your IT costs⁵. While you may have multiple individuals within your organization well-versed in implementing an array of cybersecurity tools, chances are you do not have the financial resources to manage your business’s security fully in-house⁵. Therefore, you should invest in Sophos’ MDR suite and the company’s exceptional threat detection and response team behind it⁵. Additionally, by purchasing and deploying Sophos MDR across your financial institution’s tech infrastructure, you need not purchase costly product licenses and subscriptions, helping cut costs there as well⁵. In summary, Sophos MDR saves you money so you can focus on managing others’ money. 

If you seek to harness Sophos MDR’s security benefits for your financial service company, navitend can help. We offer a variety of managed IT service and support – including Sophos MDR deployments – for financial service clients in New Jersey, New York, and eastern Pennsylvania. Our top priority is keeping your data, networks, and applications secure, 24 hours a day and seven days a week. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹Sophos. “Complete Data Security for Banks and Financial Networks | Sophos.” Retrieved from https://www.sophos.com/en-us/solutions/industries/finance-and-banking.  

²IBM Security. “Cost of a Data Breach Report 2022.” Retrieved from https://www.ibm.com/downloads/cas/3R8N1DZJ. 

³Sophos. “Managed Detection and Response | Sophos MDR.” Retrieved from https://www.sophos.com/en-us/products/managed-detection-and-response. 

⁴Sophos. “NYDFS Cybersecurity Regulation (23 NYCRR Part 500).” Retrieved from https://assets.sophos.com/X24WTUEQ/at/76bpg2hb3h6cph9kwpxnr8m/sophos-nydfs-compliance-card.pdf.  

⁵Expert Insights. “What Are The Benefits of MDR?” by Alex Zawalnyski. Retrieved from https://expertinsights.com/insights/what-are-the-benefits-of-mdr/.

28
Apr
2023
The Benefits of MS Advertising for Your Small Business

The Benefits of MS Advertising for Your Small Business

Whether you run an antiques shop, a hair salon, or a neighborhood café, chances are your small business has a presence on the World Wide Web. According to Zippia, 71 percent of all small businesses have their own websites¹. However, only 45 percent of small businesses utilize pay-per-click (PPC) advertising platforms like Google Ads and the Microsoft Advertising Platform². This is a missed opportunity to connect with current and prospective customers alike, as they search for products and services online. Now, you may ask yourself, “How can I harness the power of search advertising for my business?” 

Meet the Microsoft Advertising Platform. By advertising your small business on Microsoft’s Search and Display Networks, you can reach over half a billion people worldwide every month³. In this article, we will outline the benefits of Microsoft advertising for you and your company. 

One of the MS Advertising Platform’s key benefits is its higher conversion rate compared to Google Ads⁴. Since Microsoft searchers are an older and more mature demographic than Google’s core users, a staggering 80 percent of them spend more on average than their Google-search counterparts⁴. Additionally, with Microsoft users’ greater purchasing power, promoting your small business on the MS Advertising Platform can generate more conversions and thus greater ROI (return on investment), making it a true win-win⁴. This demonstrates that the MS Advertising Platform is an invaluable marketing tool for your business. 

Another advantage of the MS Advertising Platform is that you will not face as intense competition as you would on Google Ads⁴. Sure, fewer businesses use MS Advertising than Google Ads, but that only means fewer businesses competing for the same prime keywords you desire to use. In turn, you will benefit from greater impression share for your campaigns⁴. In this way, you can use MS Advertising to saturate the market with ads for your small business, without the cutthroat competition commonplace on Google’s Search and Display Networks⁴. This once again demonstrates the power of MS Advertising for your small business. 

While MS Advertising offers you a higher conversion rate and significantly less competition than Google Ads, it also provides you with less expensive cost per click (CPC) for most keywords⁴. Although you will not see this advantage for highly competitive keywords such as “lawyers,” your average cost per click will be cheaper on the MS Advertising Platform than Google Ads, primarily because the former platform does not have the same level of cutthroat competition⁴. Keep in mind, too, that the average CPC on Microsoft’s Advertising Platform is approximately 33.5% less than CPCs for the same keywords in Google Ads⁴. In short, advertising your small business on the MS Advertising Platform is an investment well worth making. 

Still another benefit of promoting your small business on the MS Advertising Platform is its diverse array of ad extensions⁴. While Microsoft ads offer the same call, callout, and location extensions as Google Ads, they also provide a variety of extensions that Google does not⁴. For example, with image extensions, you can upload images of your products and services to feature prominently alongside your ad copy⁴. If you run a neighborhood café, for instance, include photos of your bakery items such as cookies, croissants, muffins, and pies next to your ad. Meanwhile, with multi-image extensions, you can add up to five distinct images alongside your text advertisement⁵. If you run an auto dealership, for example, you can highlight the cars, trucks, and vans in your inventory as shown below⁵. By showing how relevant your ads are to prospective customers, they will be likely to click your ad and therefore make a purchase from your business⁴. Additionally, with Action Link extensions, you can direct users to your website’s call-to-action pages instead of the URL featured in your ad⁴. For example, if you run a resort in the Poconos, you can send visitors directly to your reservation page even if your ad points to your home page⁴. In summary, whether your conversion goal is for customers to reserve rooms, sign up for an email newsletter, or contact you to schedule an appointment⁴, MS Advertising has the ad extensions you need to generate predictably awesome impressions, clicks, and conversions for your business. 

 

(Image courtesy of https://about.ads.microsoft.com/en-us/blog/post/september-2020/drive-higher-ad-engagement-with-multi-image-extensions)  

If you already utilize another search advertising platform, like Google Ads or Facebook Ads, the MS Advertising Platform lets you expand your business’s reach by exporting your existing search ads⁶. By importing Google or Facebook ads you have already crafted, you need not recreate them from scratch in the MS Advertising Platform⁶. Additionally, you can customize your strategy by importing only the assets, campaigns, and targets you wish to import into the MS Advertising Platform. You can also edit your bids, budgets, and campaign names (such as “Winter Sale 2023”) as you see fit⁶. This shows that importing your existing ads into the MS Advertising Platform saves you time and headaches, so you can focus on creating predictably awesome experiences for everyone in your organization⁶. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹Zippia. “20+ Essential Small Business Website Statistics [2023]: How Many Businesses Have A Website” by Jack Flynn. Retrieved from https://www.zippia.com/advice/small-business-website-statistics/.  

²Small Business Trends. “45% of Small Businesses Use Pay Per Click Advertising, Survey Says” by Michael Guta. Retrieved from https://smallbiztrends.com/2018/03/2018-small-business-seo-statistics.html.  

³Microsoft. “Small business advertising solutions – Microsoft Advertising.” Retrieved from https://about.ads.microsoft.com/en-us/get-started/small-business.  

⁴Hallam Internet. “Campaigns, conversion tracking, and benefits of Microsoft Advertising: a complete guide” by Pete Keyworth. Retrieved from https://www.hallaminternet.com/campaigns-tracking-benefits-of-microsoft-advertising/.  

⁵Microsoft. “Drive engagement with Multi-Image Extensions – Microsoft Advertising.” Retrieved from https://about.ads.microsoft.com/en-us/blog/post/september-2020/drive-higher-ad-engagement-with-multi-image-extensions.  

⁶Microsoft. “Reach more potential customers with Import tools – Microsoft Advertising.” Retrieved from https://about.ads.microsoft.com/en-us/solutions/tools/ad-import-tools.  

View these helpful related articles:

https://www.navitend.com/blog/article/the-benefits-of-microsoft-authenticator-for-your-business

https://www.navitend.com/blog/article/the-benefits-of-ms-cloud-for-your-nonprofit-organization

https://www.navitend.com/blog/article/the-benefits-of-dynamics-365-commerce-for-your-ecommerce-site

https://www.navitend.com/blog/article/the-benefits-of-endpoint-detection-and-response-edr-for-your-business

21
Apr
2023
Creating a Standout Signature for Your Business Emails

Creating a Standout Signature for Your Business Emails

If you run a business, chances are email is essential to your company’s communications. We send approximately 333.2 billion emails every day, ranging from promotional coupons to transaction summaries and job interview invitations¹. However, most of these emails go unopened. Consider that while email open rates vary based on your industry and target audience, the average for all industries is only 21.33 percent². Keep in mind, too, that nonprofits have the highest email open rate at 30.85%, followed by restaurants and realtors at 30.09% and 28.37%, respectively¹. No matter whether your business is a hair salon, a coffee shop, or an airline, you need a solution for greater email engagement. 

Enter email signatures. A memorable signature ends your business emails on a high note, so you can make an outstanding first impression on your recipients³. Your signature is also an opportunity not just to tell recipients who you are, but to connect with them and support your marketing goals as well⁴. In this article, we will share some helpful tips for creating standout signatures for your business emails. 

One best practice for creating a standout business email signature is to build it from the top down³. You should begin by placing your name and title at the top of your signature, as seen below³. You must also be clear to all recipients about exactly what you want them to see first, and which information matters most to them, such as your business’s physical address or social media channels³. In short, your signature should reflect who you are and the image you want to project to your email recipients, be they coworkers, customers, or vendors. 

(Image courtesy of https://fitsmallbusiness.com/email-signature-examples/)  

Another helpful tip for creating your business email signature is to keep it aligned with the rest of your company’s communications. Since branding works best when you use it consistently across all platforms, you should ideally source colors from your brand’s palette, for example. Additionally, if you wish to incorporate your company’s logo into your signature, keep it to one side and align it with your text. For instance, placing your logo on the left lets you align any text or social media links alongside, so it looks more organized. In short, brand consistency is key for predictably awesome email signatures. 

While building your signature from the top down and maintaining brand consistency are crucial, what if mobile users cannot read your email? Since 70 percent of people use their smartphones to read email, you must optimize your email signature for mobile devices⁴. Consider how your text and images will appear if they are minimized to fit on smaller phone or tablet screens³. For example, if your logo is excessively wordy or does not minimize well, replace it with a simpler icon, such as a pizza slice if you run a pizzeria³. You must also test your social media and call-to-action links to guarantee their effectiveness and compatibility with mobile devices³. For instance, if you have social media icons like Facebook and Instagram in your signature, make sure they work when you tap them on your device³. 

Still another helpful tip for creating a standout email signature is to include social media icons³. While 7 percent of email signatures attach Twitter details, 3 percent include Facebook links, and only 2 percent feature LinkedIn attached, links to your personal or business social media accounts are a predictably awesome way to drive extra traffic¹. If your LinkedIn profile stands out from the crowd, or you have a portfolio of work such as blog articles you wish to highlight, linking to your social media profiles encourages email recipients to learn more about you and your business³. 

Sure, links to your business’s social media accounts are helpful, but you should also include a call-to-action in your email signature for extra credibility³. This is especially helpful if you are working toward a sales or marketing goal⁴. For example, if you are trying to sign clients up for content strategy work with your marketing agency, this can help boost your company’s credibility³. In summary, what better way to engage your email recipients than by encouraging them to purchase your products or sign up for your services? 

 

 

(Image courtesy of https://www.wisestamp.com/signature-examples/cta-email-signature/)  

If you run a restaurant, a hotel, or a retail store, your physical presence is a key part of your business. Therefore, you should also include a link to your location on Google Maps in your signature⁴. With a Google Maps link, your recipients can click directly from your email to Maps when they read it on your smartphone⁴. This makes it easier for them to locate you on the go, whether they are in Byram, Bismarck, or Baton Rouge⁴. 

Finally, no matter which information you include in your business email signature, simplicity is key. While it is tempting to include as many details as possible for your recipients, too much information can overwhelm and even alienate them⁴. For instance, your recipients will be confused if you include too many links and calls-to-action in your signature⁴. Rather, you should include only one link and a few social media icons to make your signature easier to read and recipients more likely to convert⁴. Any way you slice it, a simple yet effective signature is essential for creating predictably awesome business emails. 

Navitend can help you. Call 973.448.0070 or setup an appointment today.  

Sources:  

¹Zippia. “75 Incredible Email Statistics [2022]: How Many Emails Are Sent Per Day?” by Chris Kolmar. Retrieved from https://www.zippia.com/advice/how-many-emails-are-sent-per-day/#:~:text=After%20extensive%20research%2C%20our%20data%20analysis%20team%20concluded%3A,for%20nurturing%20leads%20and%20generating%20revenue.%20More%20items. 

²Mailmunch. “Email Open Rate: Statistics & 17 Best Practices (2022 Guide)” by Ammar Mazhar. Retrieved from https://www.mailmunch.com/blog/email-open-rate#average-email-open-rates-by-industry. 

³Copper. “How to Write the Perfect Email Signature” by Kimberlee Meier. Retrieved from https://www.copper.com/resources/email-signature.  

⁴Right Inbox. “15 Best Email Signatures Examples for 2023” by David Campbell. Retrieved from https://www.rightinbox.com/blog/email-signatures-examples#Importance_of_an_Email_Signature.  

View these helpful related artilces:

https://www.navitend.com/blog/article/Creating-a-Safe-Work-Environment-for-Your-Business-Computers

https://www.navitend.com/blog/article/creating-powerful-business-communications-with-ms-power-virtual-agents

https://www.navitend.com/blog/article/selecting-the-best-backgrounds-for-predictably-awesome-zoom-meetings

19
Apr
2023
Selecting the Best Backgrounds for Predictably Awesome Zoom Meetings

Selecting the Best Backgrounds for Predictably Awesome Zoom Meetings

Whether you like it or not, remote work is here to stay. Approximately 26 percent of U.S. employees work remotely full-time, while 16 percent of American businesses are fully remote¹. Chances are you have been forced to work from home at some point during the past two-plus years due to current events. If you live in northwestern New Jersey like me, you may also be required to do so when inclement weather makes commuting impossible. Not surprisingly, the recent proliferation of remote work has benefited Zoom, the once-unknown communication and collaboration platform made ubiquitous during the COVID pandemic’s early days. 

Zoom has approximately 300 million daily meeting participants and 467,100 paying business customers worldwide, making it a crucial tool for your business’s communications². However, there are some best practices you must follow while using it. Chances are you have been in a meeting only for others – such as children or pets, if you have them – to distract you and your fellow participants. You therefore need a solution that reduces distractions so you can better focus on the discussion at hand. 

Fortunately, Zoom’s background blur and custom background options are here to help. In this article, we will outline how to apply blurred backgrounds in Zoom, along with best practices for tuning out distractions so you and your colleagues can enjoy predictably awesome video meetings every time. 

As its name suggests, Zoom’s background blur feature simply blurs the background in your video, obscuring the people or objects behind you³. For example, you can utilize this feature to hide household clutter such as your wallet, keys, or unwashed laundry³. You can also use background blur during meetings on the go, whether you are at your favorite neighborhood café, on a train or bus, or in an airport lounge like the one pictured below³. Whether you choose to blur your background before or during a meeting, this process requires only a few simple steps³. To enable background blur before a meeting, start by signing into Zoom on your computer³. Next, select your profile picture and then click “Settings” ³. Then, select “Backgrounds & Filters” ³. Finally, click “Blur my background” and once again, your surroundings are hidden³. Now that you know how background blur works, we will highlight best practices for Zoom background selection. 

A room with tables and chairs

(Image courtesy of https://upgradedpoints.com/travel/airports/newark-liberty-ewr-airport-lounges/)  

The most important practice for selecting Zoom backgrounds is to keep them professional⁴. Choosing a professional background for your calls shows that you take each one seriously⁴. Not only does your background set the tone for your video meetings, but it also creates a favorable impression for you and your business⁴. You can use premade images, select from Zoom’s vast library of virtual backgrounds, or create a custom one⁴. However, keep in mind that you must match the appropriate background with the correct situation⁴. For instance, if you are meeting to discuss your company’s budget or your upcoming marketing plan, chances are you would not use a picture of your favorite vacation destination in the background⁴. Additionally, if you opt to create your own custom backgrounds, consider adding a branded touch using your company’s logo, fonts, and color palette⁵. In short, a professional background shows your clients and colleagues that you take your business’s Zoom meetings seriously. 

You should also avoid selecting backgrounds with busy features and patterns. These backgrounds can be distracting for both you and the other participants in your meetings. It can also detract from the text on your screen by making it more difficult to read⁴. This demonstrates that you must keep your Zoom backgrounds as simple and to the point as possible. 

While you should clearly avoid cluttered backgrounds, you should not use plain, flat, single-colored backgrounds either, as they will make your meeting room appear smaller than it is⁴. Instead, select a background with added depth that better hides clutter and makes you appear more polished and professional⁴. Consider an art museum gallery, cityscape, or nature scene like the one pictured below⁴. This shows that choosing the proper background is pivotal for creating predictably awesome Zoom experiences for everyone in your organization. 

(Image courtesy of https://www.techrepublic.com/pictures/photos-the-27-best-zoom-backgrounds-for-explorers-and-nature-lovers/)  

Of course, when conducting a Zoom meeting with colleagues, clients, or both, you must not overlook the lighting in your chosen meeting room⁴. If you have a desk lamp or other light source behind you, it creates a halo effect which is not only distracting, but unflattering and unprofessional as well⁴. Therefore, you should make sure the light source is in front of you or to the side⁴. If you are utilizing a window as your primary light source, position yourself so that the light radiates from the side or behind you⁴. If you are using artificial lights like the desk lamp we mentioned, position them so they shine on you from either the front or the side⁴. In summary, proper lighting is essential for predictably awesome Zoom meetings. 

While selecting professional, uncluttered backgrounds is crucial, along with ensuring the proper lighting, you must also make sure not to sit too close to the camera⁴. If you do, your real-life background will appear at the edges of your Zoom window, distracting your fellow meeting participants and making it difficult for them to see your face during screen sharing⁴. Fortunately, you can rectify this by always sitting at least six feet away from the camera, ensuring that your background is visible and that everyone can clearly see your face while you share your screen⁴. Any way you slice it, following these best practices is key for conducting predictably awesome Zoom meetings every time. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹Zippia. “25 Trending Remote Work Statistics [2022]: Facts, Trends, and Projections” by Jack Flynn. Retrieved from https://www.zippia.com/advice/remote-work-statistics/. 

²Zippia. “31 Trending Zoom Meeting Statistics [2022]: How Many People Use Zoom?” by Sky Ariella. Retrieved from https://www.zippia.com/advice/zoom-meeting-statistics/#:~:text=How%20Many%20People%20Use%20Zoom%3F%201%20300%20million,Asia-Pacific%20%28APAC%29%20during%20Q3%20of%202021%20More%20items. 

³Zoom Video Communications, Inc. “Using blurred background.” Retrieved from https://support.zoom.us/hc/en-us/articles/360061468611-Using-blurred-background-#:~:text=%20Windows%20%7C%20macOS%20%201%20Sign%20in,blurred%20behind%20you%2C%20obscuring%20your%20surroundings.%20See%20More. 

⁴CLIMB. “10 Zoom Background Best Practices” by Isobel Fallin. Retrieved from https://climbtheladder.com/10-zoom-background-best-practices/. 

⁵Canva. “How to use Zoom virtual backgrounds” by Melanie Dimmitt. Retrieved from https://www.canva.com/learn/zoom-virtual-background/.  

18
Apr
2023
Creating A Safe Work Environment for Your Business Computers

Creating A Safe Work Environment for Your Business Computers

The change of seasons is closer than you think. As summer turns to fall, the autumn season brings three months of falling temperatures and falling leaves. However, even the slightest change of temperature can be detrimental to your company’s computers. Heat, cold, and varying levels of humidity can damage parts and sometimes fail entire systems. The consequences can be devastating, as even the shortest downtime can cost you thousands of dollars in lost productivity or force you to close forever¹. You therefore need a solid work environment for your business computers. 

Fortunately, there are guidelines and best practices you can follow to ensure your computers are always running like clockwork, no matter the season. In this article, we will explore how to create a predictably awesome work environment for all your business devices. 

First, you must make sure your workspaces are not too hot. Even though industrial computers are built to withstand temperatures up to 150°F (70°C), running your devices in such extreme heat will eventually damage them². If your office or data center’s temperature is too high, it will increase the current running through your computer’s most sensitive parts². This increased electrical load will overburden your device, frying components until they no longer function correctly². Excessive heat is especially problematic if you use a laptop or tablet, as it can damage batteries, lower the effectiveness, and extend the required charging time². In short, your business computers are not designed to tolerate triple-digit temperatures. 

While preventing your computers from overheating is crucial, you must also protect them from extreme cold². Though lower temperatures alleviate overheating concerns, biting cold brings its own unique set of dangers². For example, if your computer uses liquid crystal displays (LCDs), the liquid inside can freeze and shatter your monitor(s)². Hard drives utilizing fluid dynamic bearings are also at risk, as cold temperatures thicken the fluid, causing hard disk platters to spin more slowly². This slows your computer’s data processing speeds, and thus your productivity, dramatically². Although cold-related problems are less common than overheating, they can be equally detrimental to your devices and your business². 

To prevent extreme heat or cold from wreaking havoc on your business computers, you must maintain steady office, IT (Information Technology) room, and data center temperatures. According to the American Society of Heating, Refrigerating, and Air Conditioning Engineers (ASHRAE), you should keep your workspaces’ operating temperature between 64° and 81°F (18° and 27°C) ¹. However, if your office, IT room, or data center, like the one pictured below, has low levels of both silver and copper corrosion, ASHRAE recommends that you keep these spaces between 64° and 69.8°F (18° and 21°C) ¹. By following these simple guidelines, you can ensure that your computers run like clockwork year-round. 

A picture containing building, computer, platform

(Image courtesy of https://avtech.com/articles/4957/updated-look-recommended-data-center-temperature-humidity/)  

Maintaining consistent operating temperatures is essential, but the same applies to your workspace’s humidity level as well. If your computers operate in too humid an environment, they will become susceptible to condensation and corrosion³. As water condenses inside your computer, it causes metallic components to corrode, just as metal rusts when left outdoors on a rainy day³. Condensation on your computer’s surfaces can short-circuit and therefore ruin the device, while corrosion reduces conductivity and can also lead to short-circuiting or in some cases, complete failure³. 

Although humidity can be detrimental to your business computers, a lack thereof can also be problematic. When the humidity level in your office, IT room, or data center declines, static electricity begins increasing. If the humidity in your workspaces is below 35 percent, this static can shock your computers and ruin them entirely, even if they are not turned on³. Therefore, you must regularly test your devices and adjust the room’s humidity as you see fit³. 

Fortunately, ASHRAE has guidelines for maintaining ideal humidity levels. While relative humidity levels between 20 and 80 percent are acceptable, the exact percentage varies from one business to the next¹. If both silver and copper corrosion are common in your workplace, ASHRAE recommends that you limit the upper moisture level to 60 percent, and preferably 50 percent or lower¹. Meanwhile, Atlanta-based Anytime HVAC suggests that you keep the humidity in your computer rooms between 45 and 50 percent³. Once you have taken these helpful hints to heart, you can create a predictably awesome work environment and keep your business’s computers humming. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹AVTECH. “ASHRAE Recommended Data Center Temperature & Humidity.” Retrieved from https://avtech.com/articles/23418/ashrae-recommended-data-center-temperature-humidity/. 

²Cybernet Manufacturing. “How Do Industrial Computers Survive Extreme Heat, Cold, and Humidity?” Retrieved from https://www.cybernetman.com/blog/how-do-industrial-computers-survive-extreme-heat-cold-and-humidity/. 

³Anytime HVAC. “4 Unexpected Effects of Heat and Humidity on Your Computer.” Retrieved from https://anytimehvac.com/4-unexpected-effects-heat-humidity-computer/.  

14
Apr
2023
What’s in a Name: The Importance of Domain Name Registrars

What’s in a Name: The Importance of Domain Name Registrars

Whether you run an antiques shop, a bakery, or a clothing boutique, chances are the internet is an integral part of your business operations. According to Washington, DC’s Top Design Firms, 71 percent of all small businesses have their own website¹. If your business does not have a website, you will easily miss opportunities to make impressions on prospective customers and connect with your current ones¹. While you can easily use online tools like Wix or Squarespace to build your website, you cannot do so without a domain name¹. 

Fortunately, that is where domain name registrars, or DNS (Domain Name Service) providers, come into play. While there are several DNS providers in the marketplace, including GoDaddy, Google Domains, and Namecheap, they all share the same purpose². These companies not only manage domain name registration and administration, but they also provide customer support, along with services such as registering new domain names and facilitating transfers of existing ones³. In this article, we will learn more about how domain name registrars work and how they can help you register the right domain name for your company’s website. 

(Image courtesy of https://www.cloudflare.com/learning/dns/glossary/what-is-a-domain-name-registrar/)  

Once you have decided to create a website for your business, you must select a domain name for your site. Suppose you run a pizzeria along Route 206 in Byram, New Jersey. When you want to buy a domain name, such as jerseyjoespizza.com, the domain registrar will provide you with information about the domain name, such as the name server that will be hosting your domain, plus the name server’s name and address³. The DNS provider will also give you a login and password so you can access the name server as you see fit³. This shows that domain name registrars play a pivotal role in establishing your company’s online presence. 

What’s in a name, you might ask? The answer is everything, as you must select a domain name that is not only catchy and easy to remember, but more importantly, aligned with your brand and business name². Thankfully, DNS providers can help you identify domain names available for your company’s website². Chances are you will find a domain name exactly matching your company’s name, only to realize that it costs hundreds or even thousands of dollars². In this case, registrars can help you find similar, more affordable domains, as well as identical ones ending in “.biz” or “.net” instead of “.com” ². Returning to the pizzeria example, if you cannot find jerseyjoespizza.com, the DNS provider might substitute jerseyjoespizza.biz or jerseyjoespizza.net². Any way you slice it, domain name registrars help you select the right domain name so you can build a predictably awesome business website. 

(Image courtesy of https://www.upmenu.com/blog/the-best-pizza-website-templates-increase-number-of-deliveries/)  

While domain name registrars play a pivotal role in helping you select a domain name for your business’s website, choosing the right DNS provider is equally crucial. You may be tempted to select the cheapest option, but keep in mind that some low-cost domain registrars may not have the privacy protections you and your business need². In this instance, you may want to consider using the same company for both your domain name registration and website hosting². 

You may also be able to sign up for web hosting services like HostGator which also offer domain registration². However, you must read the fine print in these situations as the domain name registration may only be included for a year or two before you need to pay additional fees². If your web hosting company does not give you the option of registering a domain name, you must purchase and register your domain name with one company (such as GoDaddy or Google Domains) and host your website with another².  

After you have selected a domain name and DNS provider, you must then purchase and register your chosen domain name. Even though you can register your domain name for free, you may be uncomfortable sharing your personal information with public ICANN registry². In this case, your DNS provider will give you the option to provide ICANN with the necessary information while also protecting your privacy². For this reason, you may prefer using a private registrar to purchase and register your domain name². While this privacy protection may cost a bit more, it is well worth the additional fee². Also, once you have selected your domain name, you can purchase it for a nominal fee, usually $10-15 annually². Chances are you will pay this fee every year, but some DNS providers offer multi-year terms if you prefer that approach². However, if you find yourself dissatisfied with your DNS provider’s services, you can opt for a shorter-duration contract with automatic renewal². Nevertheless, you must pay attention to the details around your registration’s duration before registering your domain name². 

Now that you have chosen your domain name and registrar and are officially registered for the domain of your choice, you can start building your company’s website². While creating the perfect website involves many factors, from aesthetics to social media integrations and online purchasing capabilities, DNS providers play a pivotal role in ensuring you can enjoy predictably awesome web experiences and build longstanding relationships with both new and existing customers. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹Top Design Firm. “Online Presence Management Tips for Small Businesses” by Shelby Jordan. Retrieved from https://topdesignfirms.com/web-design/blog/online-presence-management. 

²Forbes. “How To Register a Domain Name (2022 Guide)” by Christine Organ. Retrieved from https://www.forbes.com/advisor/business/how-register-domain-name/.  

³WebsiteBuilderPoint. “How Do Domain Name Registrars Work?” Retrieved from https://www.websitebuilderpoint.net/how-do-domain-name-registrars-work/.  

View these helpful related articles as well!
Sitemaps: What They Are, How They Work, and Best Practices for Creating Them (navitend.com)


Creating a Powerful Business Website with MS Power Pages (navitend.com)

11
Apr
2023
Sitemaps: What They Are, How They Work, and Best Practices for Creating Them

Sitemaps: What They Are, How They Work, and Best Practices for Creating Them

Whether you run an antiques shop, a hair salon, or a neighborhood café, chances are your business has a presence on the World Wide Web. According to Zippia, 71 percent of all small businesses in the U.S. had a website in 2021¹. However, if your company’s website is a disorganized mess, you will suffer from lower search engine rankings than your competitors. You may ask yourself, “How can I better organize my website for higher search results?” 

Enter sitemaps. Like blueprints for a construction project, sitemaps outline how search engines find, crawl, and index all the content included on your website². In this article, we will learn more about what sitemaps are, how they work, and best practices you can follow to create a predictably awesome one for your business website. 

While sitemaps may vary from one website to another, they fall into the following categories². Normal XML sitemaps like the one pictured below are the most common kind, and their purpose is simply to link each distinct webpage across your business’s site². Meanwhile, video sitemaps help Google understand the video content featured on your page². News sitemaps, as their name suggests, help Google find content on sites that it has approved for Google News². Furthermore, image sitemaps help search engines locate images on your website, such as pictures of your company’s products or services². Finally, although search engines like Google, Bing, and Yahoo rely primarily on your XML sitemap, HTML sitemaps are helpful for end users². By including an HTML sitemap, you can help your site’s visitors quickly and easily navigate to their desired destinations². Now that you know the five types of sitemaps and how they work, we will now explore how to set one up for your website. 

(Image courtesy of https://yoast.com/what-is-an-xml-sitemap-and-why-should-you-have-one/)  

Creating a sitemap is simple and straightforward. If you use WordPress, you can utilize the Yoast SEO plugin to craft a sitemap for you². Additionally, since Yoast SEO sitemaps are dynamic and update automatically, you need not update them manually, saving time and headaches². You can also use a variety of other WordPress plugins to create sitemaps, such as Google’s XML sitemap generator². However, if you do not use WordPress, there are plenty of third-party sitemap generator tools for you to utilize, including XML-Sitemap.com². When you visit these websites, they will generate an XML file you can use as a sitemap for your company’s website². 

After you have created a sitemap, you must manually review it to ensure it includes every page on your business website, or at least those you want search engines to crawl². Although your sitemap’s location may vary based on your company’s CMS (content management system) and the program you used to create it, chances are you will find it by adding /sitemap.xml to the end of your company’s web address². Once you have thoroughly reviewed your sitemap, then submit it to Google². 

When you are ready to submit your sitemap to Google, start by logging into your Google Search Console account. Then, navigate to “Index” and click on “Sitemaps” in the sidebar². If you have already submitted your sitemap, you will see a list of “Submitted Sitemaps” on this page². Either way, to submit your sitemap, enter its URL into the appropriate field and then click “Submit” ². Once you have everything completely set up, you will see the information about your sitemap under the “Submitted Sitemaps” section². We will now highlight best practices so you can create a predictably awesome sitemap for your business website. 

One crucial best practice for sitemap creation is to prioritize your most valuable pages and thus drive more traffic to them³. Google’s sitemaps protocol lets you rank every page on your website with a score between 0.1 and 1³. Keep in mind that crawlers will traverse your highest-quality pages more frequently than those of lower quality, allowing search engines like Google, Yahoo, and Bing to learn how often you update these pages and how they add value to your site³. 

Additionally, you should always opt for rating dynamic pages – those you update most frequently – higher³. For instance, if you update your company’s blog with a new post every other day, rate it higher so that search engines can crawl through it more regularly³. Meanwhile, you should rate static pages – like your company’s privacy policy and terms of use – lower³. Since you will not update these pages as frequently, search engines will crawl them less often³. This demonstrates that prioritizing pages in your sitemap can help attract more visitors and thus more business to your site. 

Another best practice worth following is to categorize the content on your business’s website³. For example, suppose you run an ecommerce site comprised of a homepage, an “About Us” page, and pages for every product you sell. You must segment each category and subcategory within your site based on the commonality of their content³. If you sell kitchen appliances on your site, for instance, group together all pages for a specific product category, such as “toaster ovens” like the one shown below. By doing so, you will ensure that similar content is within a single category rather than scattered across random pages³. This will also benefit your users by streamlining your site’s navigation for them³. In short, content categorization is crucial for creating predictably awesome sitemaps. 

(Image courtesy of https://www.cnn.com/cnn-underscored/reviews/best-toaster-oven)  

Finally, you should make sure to exclude “noindex” URLs from your sitemap³. Although “noindex” pages, including logins and checkout pages, are an integral part of your website, that does not mean you want search engines to crawl them³. Consider that if you add “noindex” URLs to your business’s sitemap, it can generate errors in your Google Search Console reports and reduce the number of pages Google indexes within a given timeframe³. Therefore, you should be mindful of every URL you add to your business’s sitemap³. If you are using a dynamic sitemap like Yoast SEO, keep an eye out for any URLs that should not be there³. In summary, by excluding “noindex” URLs from your sitemap, you can focus on including your company website’s highest-quality content to boost SEO and increase traffic for greater profits. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹Zippia. “20+ Essential Small Business Website Statistics [2022]: How Many Businesses Have a Website” by Jack Flynn. Retrieved from https://www.zippia.com/advice/small-business-website-statistics/.  

²Backlinko. “What is a Sitemap? How to Create an SEO Optimized Sitemap.” Retrieved from https://backlinko.com/hub/seo/sitemaps.  

³Nightwatch.io. “8 Simple Sitemap Best Practices to Follow.” Retrieved from https://nightwatch.io/blog/sitemap-best-practices.  

10
Apr
2023
Creating a Powerful Business Website with MS Power Pages

Creating a Powerful Business Website with MS Power Pages

Whether you run an antiques shop, a hair salon, or a neighborhood café, chances are you have a presence on the World Wide Web. Seventy-one percent of all small businesses have their own websites¹. However, starting a website for your business can be a costly endeavor, averaging between $2,000 and $10,000¹. If you must insert line after line of code to do so, it can also be time-consuming. You therefore need a solution that streamlines your website creation process. 

Enter MS Power Pages. Microsoft's secure, enterprise-grade SaaS (software as a service) platform lets you create, host, and administer modern and predictably awesome business websites - like the one pictured below - using little or any code². Whether you are a small business owner or a professional web developer, Power Pages can help you design, configure, and publish websites that work seamlessly across browsers and devices worldwide². In this article, we will explore the benefits of creating a powerful business website with MS Power Pages. 

(Image courtesy of https://powerpages.microsoft.com/en-us/)  

One major benefit of MS Power Pages is its simplicity³. You can select a website template tailored to your industry, such as financial services, or use the default template to create your site³. Start by visiting the Power Pages homepage⁴. Once you arrive there, select the Dataverse environment wherein you wish to create your site⁴. Keep in mind, though, that you should create a site in the default environment⁴. If you choose to do so, you run a greater risk of sharing data with unintended users⁴. Next, select “+ Create a site” on the homepage. Then, review the available templates⁴. If you wish to see more details about each template, hover your cursor over the template and select ”Preview template”⁴. You can then select different views to preview your desired template experience⁴. Make sure your chosen template aligns with your site's intended purpose⁴. If you cannot find an industry-specific template meeting your needs, choose a design template with cross-industry solutions or click “Blank page” to start creating one from scratch⁴.  

After selecting the template you wish to use, click “Choose this template” ⁴. Next, validate the name and web address Microsoft has provided you (such as www.jerseyjoesdiner.biz) and select “Done” ⁴. Finally, after you finish creating your site, you can begin editing or previewing it⁴. This demonstrates that with Power Pages, designing the perfect business website is a breeze. 

Another advantage of MS Power Pages is that it offers an enhanced design studio where you can craft your business website without even a line of code³. Microsoft provides four distinct workspaces for Power Pages users³. With the Pages workspace, you can create, design, and arrange your website to meet specific needs³. Meanwhile, in the Styling workspace, you can apply a variety of eye-catching styles and themes to your website³. In the Data workspace, you can create and modify MS Dataverse tables for your data-driven web applications³. Finally, the Setup workspace lets you administer and manage your site more easily than ever before³. In short, MS Power Pages gives you all the tools you need to create predictably awesome business websites, no coding or programming experience necessary. 

Still another benefit of MS Power Pages is its enhanced security³. For instance, since it is built on the Azure App Service platform, Power Pages meets stringent security standards outlined by the International Organization for Standardization (IOS), Payment Card Industry Data Security Standards (PCI DSS), and System and Organizational Controls (SOC), among other regulatory authorities³. Power Pages also features built-in protection against harmful DDoS (distributed denial-of-service) attacks³. You can also benefit from dynamic IP (Internet Protocol) restriction, which keeps malicious actors at bay so you can address security vulnerabilities and focus on creating predictably awesome web experiences for customers, prospects, and employees alike³. In summary, Power Pages not only helps you create business websites, but also protect them from hackers and other malicious actors lurking throughout the dark web. 

MS Power Pages is also affordable. You can select one of two subscription plans⁵. For only $75 per 500 site visitors every month, you can allow users to browse your business’s low-code website anonymously⁵. If you wish to provide them with authenticated access, however, simply pay $200 per 100 site visitors per month for the authenticated access plan⁵. Both plans come with Dataverse storage and built-in content delivery network support, so your users can access all your website has to offer⁵. You can also choose from pay-as-you-go plans, starting at just $0.30 per user per site per month for anonymous site visitors, or $4 per authenticated site visitor each month⁵. Either way, you can pay for Power Pages and all its features - including Dataverse storage and built-in content delivery network support - with your existing Azure subscription⁵. This demonstrates that Power Pages is the low-cost, low-code web design platform for your business. 

Finally, you can easily integrate Power Pages with Microsoft's other Power Platform components³. For example, in the MS Dataverse, you can securely store and manage the data you utilize in business applications and Power Pages sites³. Additionally, with Power Apps, you can easily create low-to-no-code custom mobile and web apps to collect data and streamline your core business processes³. Meanwhile, you can harness Power Automate to incorporate automated workflows, cloud flows, and plugins into your Power Pages websites³. Furthermore, integrating Power BI (Business Intelligence) within Power Pages gives you the power to access key business insights through interactive dashboards, reports, and tiles³. Finally, Power Virtual Agents lets you create and publish AI-driven chatbot experiences so you can add them to your website and communicate with customers³. Any way you slice it, Power Pages offers the integrations you need to create an engaging and predictably awesome business website. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹Zippia. “20+ Essential Small Business Website Statistics [2023]: How Many Businesses Have a Website” by Jack Flynn. Retrieved from https://www.zippia.com/advice/small-business-website-statistics/.  

²Microsoft. “What is Power Pages? | Microsoft Learn.” Retrieved from https://learn.microsoft.com/en-us/power-pages/introduction. 

³Microsoft. “Power Pages capabilities | Microsoft Learn.” Retrieved from https://learn.microsoft.com/en-us/power-pages/capabilities. 

⁴Microsoft. “Create a site with Power Pages | Microsoft Learn.” Retrieved from https://learn.microsoft.com/en-us/power-pages/getting-started/create-manage.  

⁵Microsoft. “Power Pages Pricing | Microsoft Power Pages.” Retrieved from https://powerpages.microsoft.com/en-us/pricing/.  

07
Apr
2023
Best Practices for Creating Out-of-Office Emails

Best Practices for Creating Out-of-Office Emails

If you are like me, chances are you check your email at least once daily. We send 333.2 billion emails every day, whether to correspond with coworkers, connect with our favorite brands, or send promotional offers and transaction summaries to customers¹. However, what if you are out of the office and therefore unable to respond to emails? For example, you may not be able to regularly check your email during a vacation to Key West or a trade show in Las Vegas, making it difficult for you to stay abreast of all the emails you receive. You need a quick and easy solution notifying senders of your absence and that you will return shortly. 

Enter out-of-office messages, or OOOs for short. OOOs give you and your senders much-needed peace of mind by letting them know not only that their email was received, but also that you will be unable to respond to their inquiries immediately². Additionally, OOOs let senders know exactly when you will return to your desk². In this article, we will highlight best practices for creating predictably awesome out-of-office emails. 

Before creating and sending an OOO message, you must decide how emails will be handled in your absence². For instance, you must consider whether you are checking emails periodically or not at all while you are away from the office². Also consider who can handle urgent requests in your place, as well as whether senders should forward copies of your OOO to a colleague². If you have designated a specific colleague to cover urgent email inquiries on your behalf, include their contact information in your message as outlined in the sample below². Forwarding emails to a coworker can be especially helpful during an extended absence, such as medical or parental leave². In this instance, you must certainly let users know whom they can contact until you return³. We will now discuss what to include – and what not to include – in your OOO message. 

(Image courtesy of https://www.yesware.com/blog/out-of-office-examples/)  

One best practice for crafting predictably awesome OOO emails is to include the specific date you plan to return². If you simply state that you will be away from your desk “until tomorrow morning,” this vague approach leaves senders guessing exactly when “tomorrow” is³. Rather, you must mention the exact date for your planned return to the office. For example, if you are attending a conference in Phoenix starting on Monday, December 5 and will not return to your desk until Monday, December 12, then include it in your message: “I will be out of the office until Monday, December 12.” This eliminates guesswork so you and your senders alike can enjoy much-needed peace of mind. 

Another best practice for creating OOO emails is to inform senders whether you will be accessing your email while absent². For instance, if you are going to the Poconos for a weeklong camping trip, you should notify senders that you will not have an internet connection and therefore be unable to check your email until returning to work. You must also include an estimated date by which senders can expect a response, which may or may not be the same as your planned return-to-office date, as outlined in the image below². 

(Image courtesy of https://www.harborcomputerservices.net/how-to-set-an-automatic-out-of-office-reply-in-outlook/)  

Keep in mind that while there is some information you should always include in your OOO emails, there is some you must exclude². Chances are you may be tempted to share details about your upcoming Western Caribbean cruise or family reunion in Myrtle Beach, for example². However, you should always take the most professional route and simply “describe your absence as a vacation,” without unnecessarily explaining where and why you are traveling². Additionally, consider that autoreplies are sent in response to any emails arriving in your inbox, regardless of sender². Therefore, you must also make sure to omit personal information such as your company name, phone number, title, or contact details from OOO messages². Why take the chance of leaving your email open to hackers during a vacation or business trip? 

Once you have finished drafting your OOO message, email it to yourself so you can catch any mistakes before using it in reply to other senders². Like any workplace communication, your OOO emails should be free of all typos and grammatical errors, so proofreading them is crucial². You do not want your senders to see a message with several key words misspelled, for example. Now that you understand these best practices, follow them so you can craft predictably awesome out-of-office email messages for any vacation, business trip, personal leave, or general office absence. Your colleagues and customers will thank you for it. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹Zippia. “75 Incredible Email Statistics [2022]: How Many Emails are Sent Per Day?” by Chris Kolmar. Retrieved from https://www.zippia.com/advice/how-many-emails-are-sent-per-day/. 

²Indeed. “7 Examples of Out of Office Messages (With Sample).” Retrieved from https://www.indeed.com/hire/c/info/7-examples-of-out-of-office-messages#:~:text=An%20effective%20out-of-office%20message%20typically%3A%201%20Includes%20a,the%20sender%20who%20to%20contact%20for%20urgent%20requests. 

³Resourceful Finance Pro. “Out-of-office messages: 10 outrageous ones and some helpful advice” by Jennifer Azara. Retrieved from https://www.resourcefulfinancepro.com/articles/out-of-office-email-messages/.  

View these articles on other best business practices

https://www.navitend.com/blog/article/best-practices-for-making-predictably-awesome-it-sales-calls

https://www.navitend.com/blog/article/best-practices-for-creating-contact-forms-on-your-website

06
Apr
2023
Best Practices for Creating Contact Forms on Your Website

Best Practices for Creating Contact Forms on Your Website

If you are like me, chances are you have often filled out forms on a website, be it to apply for a job or speak with a company representative. Contact forms provide a crucial link between your business and prospective customers, but unfortunately, only 3 to 5 percent of all users fully complete them¹. Keep in mind, too, that not all contact forms are created equal. Many are designed with only a title and/or username field, and some without any text at all, making it difficult for users to understand and complete them². Now, you may ask, “How can I create engaging and predictably awesome contact forms for my business website?” 
Fortunately, there are some best practices you can follow to craft the best contact form for your company’s website. In this article, we will outline how to turn ordinary forms on your “Contact Us” webpage into predictably awesome experiences for both you and your prospects, every time. 

When creating a contact form for your business website, you must provide information about why site visitors should contact you². For example, explain whether the contact form’s purpose is to complete a job application, request assistance for technical issues, or chat with a company representative². Always include a heading and sub-heading on your forms indicating each one’s basic premise². In short, your contact forms are meaningless if you do not outline a reason for website visitors to contact you. 

Another best practice is to use smart forms, which make ordinary user experiences extraordinary and more importantly, boost your completion rates¹. Unlike their conventional counterparts, smart forms guide users to a specific answer based on their replies¹. Since smart forms let you tailor content directly to each user, you will benefit from higher conversion rates and higher-quality responses¹. For example, the Tripetto form builder plugin available for WordPress lets you utilize piping or branch logic so users can easily progress through your forms in a relevant manner¹. 

While conditional logic functionalities help users progress through your contact forms quickly and relevantly, they also help you show and hide form fields based on the status of a user’s response to a question, plus other similar criteria¹. This allows you to create forms that only show respondents the questions and sections most relevant to them¹. You can also use conditional logic to personalize forms. For example, you can include the respondent’s name throughout the form, along with distinct questions based on their given title, gender, and more¹. This demonstrates that conditional logic is crucial for making your forms as user-friendly as possible. 

Still another best practice for creating predictably awesome contact forms is to add options for alternate contact methods within your form³. For instance, in addition to providing a direct messaging functionality for users, you can include your company’s primary email and phone number in the form as well³. This helps visitors completing your form decide which contact method works best for them³. Additionally, if your users prefer to connect with you via social media platforms like Facebook, Twitter, and Instagram, then include social media buttons on your contact form to link them to your business’s social profiles³. In summary, the more contact options you give, the more likely visitors will contact you. 

Of course, the language you use in a form is just as important as integrating alternate contact options and conditional logic functionalities¹. While most web content, including this blog article, benefits from using second-person language – with “you” as the primary pronoun therein – first-person language is advantageous for contact forms on your website¹. According to a recent A/B testing case study, the client’s form completion rate increased 90 percent after switching from second- to first-person language¹. First-person language is especially helpful if your goal is to generate conversions or other positive actions for your business¹. For example, if you wish to sign users up for email updates, for example, “Sign me up for email updates” could resonate more with them than simply “Sign up for email updates” ¹. This demonstrates that wording is everything when it comes to generating conversions and profits for your business. 

Yet another best practice for creating engaging contact forms is to include your business’s address and location on a map within your form, as shown below³. Even if you do not have a physical presence such as an office or retail store, users still benefit from much-needed peace of mind when they know exactly where you are located³. If you have multiple locations, such as Byram, NJ; Binghamton, NY; Bethlehem, PA; and Bridgeport, CT, for example, including them all makes your form more practical than it would be without such information³. 

(Image courtesy of https://wpforms.com/how-to-display-a-map-with-your-wordpress-contact-form/)  

Finally, you must test your contact form and make sure that it works properly. While this may seem a bit too obvious, if you do not test your form, you will be prone to bugs and errors¹. Thankfully, testing your form is simple. Start by previewing your form². Next, place yourself in the visitor’s shoes and fill it out to find any flaws². Finally, once you have found these flaws and corrected them, make your form available for users to fill out on your website¹. Any way you slice it, following the best practices we outlined can help you create predictably awesome contact forms for every website visitor. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹Tripetto. “Best Practices for Contact Forms – 15 Tips to Apply for Success in 2022” by Jurgen van den Brink. Retrieved from https://tripetto.com/blog/contact-form-best-practices/#:~:text=15%20Contact%20Form%20Best%20Practices%20You%E2%80%99ll%20Want%20to,CTA%20Clicks%20as%20Custom%20Events%20...%20More%20items. 

²JotForm. “10 Best Practices for Contact Forms.” Retrieved from https://www.jotform.com/blog/best-practices-for-contact-forms/. 

³WPBeginner.com. “12 Best Practices for Contact Form Page Design (with Examples)”. Retrieved from https://www.wpbeginner.com/showcase/best-practices-of-contact-form-page-designs-in-wordpress/.  

04
Apr
2023
Best Practices for Making Predictably Awesome IT Sales Calls

Best Practices for Making Predictably Awesome IT Sales Calls

If you work in IT (information technology), chances are you perform a variety of tasks daily. Not only must you correspond with clients over the phone and via platforms like MS Teams, but also occasionally travel up to 100 miles to their offices so you can help them in person. However, before you can land clients for your company’s products and services, such as the Cisco Umbrella security system we described in a previous article, you must first make sales calls. Consider that it takes an average of six calls to gain a lead¹. If you seek 25 leads every week, your sales team needs to make 150 calls a week, or 30 per day¹. Now, you may ask yourself, “How can I make predictably awesome sales calls to land clients more easily and effectively?” 

Fortunately, there are some best practices you can follow for making compelling sales calls to every prospect, every time. In this interview-style article, we will outline these practices so you can start down the road to predictably awesome IT sales success. 

(Image courtesy of https://www.trados.com/blog/how-to-approach-a-sales-call.html)  

John Q. Public: Hello, my name is John Q. Public, and I am a reporter for Tech Sales Magazine. Today, I will speak with Jane Doe, the sales manager for ABC Company, about helpful best practices for IT sales calling. Jane, what advice do you have for IT sales representatives about phone calls? 

Jane Doe: Thank you, John. For all the IT sales representatives seeking to land new clients, timing is everything². 

John Q. Public: Could you please describe that in more detail, Jane? 

Jane Doe: Well, John, many sales representatives assume that they will be more successful by calling the most prospects first thing in the morning². However, their assumptions are flawed. Research from Gong.io shows that afternoon calls are more effective because prospects are more likely to respond, and they remain on calls longer than they would in the morning². Notably, prospects are 30 percent more likely to answer a sales call at 4 PM than one scheduled for 8 AM². This sounds counterintuitive, right²? That is why scheduling calls in the morning is such a common mistake among sales reps². Just last Thursday, I received a phone call from XYZ Tech Solutions at 10 AM and I could not respond because I was onboarding a new employee, although we did speak that afternoon. However, on Friday, I received another call from them at 3 PM and we spoke for over an hour about installing DLP (Data Loss Prevention) software in my office. As I mentioned, timing truly is everything when making IT sales calls. 

John Q. Public: Thank you, Jane. While we both agree that timing matters when making sales calls, do you have any other helpful calling advice for IT salespeople? 

Jane Doe: Thank you, John. With my experience in sales both as a representative and a manager, I have learned that simply lecturing about your company’s products and services can be quite off-putting for prospects. Although I missed the initial call with XYZ on Thursday, I spoke with two of their representatives from 12:15 to 12:45 that afternoon, and they each lectured me for a full ten minutes about every product and service XYZ offers, instead of letting me speak after they described XYZ’s DLP software. On Friday, however, I spoke with another two representatives, but neither of them lectured me at all. Rather, we enjoyed a fascinating dialogue about how XYZ’s DLP solution helped prevent a data breach for their regional airline client. You see, John, like any conversation, a sales call is a two-way street². You need that steady dialogue to build trust and understanding, whether you are the seller or the prospect². 

John Q. Public: Thank you for your insights, Jane. Do you have any advice about how and when to ask prospective clients questions during sales calls? 

Jane Doe: Yes. I believe that on every sales call where ABC Company is a prospect, we have an “emotional bank account” ². Every question that sales reps ask us is a withdrawal from that account². When I spoke with XYZ Tech Solutions last Thursday, I was asked so many questions at the end that it felt like an interrogation². The last thing sales reps want is to interrogate prospects². Instead, they need to phrase questions so that we can respond in more detail². For example, rather than asking us, “What are your biggest challenges when it comes to network security?,” XYZ’s representatives should ask, “Can you help me understand your biggest challenges when it comes to network security?” ². By starting off with “Can you help me understand,” that is a sign that they want to have an in-depth conversation with us². In short, it is not the quantity of questions asked that matters, but the quality of each one. 

(Image courtesy of https://blog.hubspot.com/sales/how-to-start-a-sales-call)  

John Q. Public: Thank you, Jane. Since cold calling is a crucial part of IT sales, do you have any advice for IT cold callers? 

Jane Doe: John, cold calls need not be so cold¹. My advice for sales representatives is to email each prospect beforehand, or message them on social media platforms like LinkedIn¹. If you introduce yourself to your prospects before calling them, you can use that introduction to your advantage and build a more valuable connection during the call¹. 

John Q. Public: Well said, Jane. Do you have any more advice for IT sales reps about making predictably awesome sales calls? 

Jane Doe: Thank you, John. I believe that sales reps should follow up with every prospect after their calls¹. After my conversation with XYZ Tech Solutions last Friday, I received a thank-you email in my inbox, which I did not receive from them on Thursday. I felt quite ashamed of how rude they were not following up after our Thursday discussion. It does not matter whether they send an email, a LinkedIn message, or even a handwritten note – following up with prospects is essential for building valuable vendor-client relationships¹. 

John Q. Public: Jane, thank you for your time. I thoroughly enjoyed speaking with you about best practices for IT sales calls.  

Jane Doe: I enjoyed our conversation as well. Thank you, John. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹Acquirent LLC. “How Many Sales Calls Should An Inside Sales Rep Make?” by Joe Flanagan. Retrieved from https://acquirent.com/blog-article/how-many-sales-calls-should-an-inside-sales-rep-make/.  

²Gong.io. “These 21 Sales Call Tips Are the Best You’ll Ever Read” by Kyle Brown. Retrieved from https://www.gong.io/blog/sales-call-tips/. 

31
Mar
2023
Your Digital Key: The Benefits of Electronic Access Control Systems

Your Digital Key: The Benefits of Electronic Access Control Systems

If you run a business, you likely have employees, vendors, customers, and other stakeholders entering and exiting the premises at any given time, though some areas of your building may be off-limits to certain parties. For example, if you are a supermarket owner, you may reserve your backroom storage space solely for employees. If you do not have measures for barring unauthorized visitors from your facilities, you will be more susceptible to theft and computer hacking. Now, you may ask, “How can I control who can and cannot access restricted areas within my business?” 

Meet electronic access control, or EAC, systems. While traditional access control revolves around your business’s physical doors, locks, and keys, EAC is a multi-dimensional digital ecosystem designed to address all your organizational needs¹. In this article, we will learn more about EAC and the benefits it has for your business. 

One advantage of EAC is that it facilitates employee access to specific areas within your business. With an access control system, you can quickly “set and forget” who has access to designated locations, such as IT (information technology) rooms². Once you have given this authorization, your employees can access all the necessary areas to perform their jobs by scanning a key or entering a PIN (Personal Identification Number)². EAC systems protect your business by preventing unauthorized individuals from entering the facilities, giving you confidence that everyone in your building is supposed to be there.

EAC systems eliminate the need for traditional metal keys². While managing multiple keys for different areas of your business can be cumbersome, especially for janitors and others using bulky key rings, access control systems do not require physical keys². Not only do you save time not fumbling with different keys for different locks, but you also save yourself visits from the locksmith to replace lost or stolen keys². 

Another benefit is control over energy utilization, saving money while also maintaining security. For example, emerging technologies let you integrate access control with energy utilization, thus reducing your heating, cooling, and electricity costs¹. These functions turn on the lights when users swipe their credentials or turn off HVAC systems to minimize energy consumption when no one is using your facilities¹. EAC systems also eliminate the need to hire security personnel and purchase locks, since they can easily verify identities without a guard’s assistance². This demonstrates that EAC is well worth the investment. 

While EAC systems prevent physical intrusions into your building(s), they also keep hackers from infiltrating your business’s computer systems². Chances are you have proprietary on-premises servers for storing sensitive data such as financial information or electronic medical records (EMRs)². EAC systems thwart hackers by restricting their access, while also granting exclusive access to credentialed individuals². These workers can then continue into the company’s IT rooms or wherever they need to perform their jobs². Considering that the average data breach worldwide costs $4.35 million, and the average one in the U.S. a staggering $9.44 million according to IBM, EAC systems prevent malicious actors from entering your systems³. This not only prevents breaches, but also averts catastrophe for your business. 

Yet another advantage of EAC systems is that they improve users’ experiences. EACs equipped with innovative features like mobile and biometric credentials can help your business meet changing expectations of how employees, customers, and other personnel interact with your facilities¹. For example, intelligent access control systems can sense users’ credentials from up to 20 feet away, automatically opening doors or access points for easier user ingress¹. Since users do not need to swipe a card or remove their phone from their pocket, they can proceed more quickly toward their respective destinations¹. 

While all organizations can benefit from EACs for enhancing the overall user experience, this is especially true in higher education. College and university athletics departments, for instance, can implement biometric credentials such as fingerprints or facial recognition, providing student athletes with a seamless experience as they move between training facilities and locker rooms without having their phone or access card on hand¹. 

If you are seeking an EAC solution for your business, navitend can help. We offer a variety of managed IT support – including Sophos electronic access control systems – for clients in New Jersey, New York, and eastern Pennsylvania. We have the solutions you need to keep your data secure and unauthorized visitors at bay, 24 hours a day and seven days a week. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹SecurityInfoWatch.com. “3 Surprising Benefits of Access Control” by Angelo Faenza. Retrieved from https://www.securityinfowatch.com/access-identity/article/21086072/3-surprising-benefits-of-access-control

²Morefield Communications. “Benefits of an Access Control System.” Retrieved from https://www.morefield.com/blog/benefits-of-an-access-control-system/

³IBM Security. “Cost of a Data Breach Report 2022.” Retrieved from https://www.ibm.com/downloads/cas/3R8N1DZJ.  

You can also view this helpful related articles on other beneifts

https://www.navitend.com/blog/article/benefits-of-moving-your-business-printing-to-the-cloud-with-printix

30
Mar
2023
Benefits of Moving Your Business Printing to the Cloud with Printix

Benefits of Moving Your Business Printing to the Cloud with Printix

If you use a computer for work, chances are you print tens or hundreds of documents every day. The average employee prints an average of 10,000 pages each year, equivalent to $725 in printing costs¹. Additionally, while your printing needs may vary based on your business’s size and the number of print jobs your employees complete, you should have at least one printer for every 4.4 employees². For example, if your company has 44 employees, you need ten printers. However, does it matter how many printers your business has if your employees cannot access them? Of course not. Chances are you have been forced to work from home at some point during the past two-plus years due to current events, or when inclement weather makes accessing your in-office printers impossible. You therefore need a solution to manage all your print jobs both on-premises and remotely. 

Fortunately, cloud-based printing is here to help. Printix is a company offering modern cloud-managed printing so you can easily print from any device, such as a desktop, laptop, smartphone, or tablet, to any printer³. No matter whether you are working from home, visiting a client’s office, or on the road, Printix lets you print anytime and anywhere you need to. In this article, we will explore the benefits of moving your business printing to the cloud with Printix. 

(Image courtesy of https://processflows.co.uk/cloud-print-solutions-the-benefits-of-cloud-based-print-management/)  

One advantage of moving your printing to the cloud with Printix is that it saves you money. Switching to Printix’s cloud-based subscription lowers operating costs and saves you capital expenditures otherwise spent on purchasing costly print servers⁴. With Printix for Business, you can select either an annual or monthly billing plan, with monthly billing at only $1.99 per user each month⁵. If you choose annual billing, however, you will save even more based on how many employees you have⁵. For example, if your business has one to 50 employees, you will pay $1.49/user per month⁵. Meanwhile, if you have 51 to 100 employees, you will pay $1.38/user per month⁵. Finally, if you have 101 to 250 employees, you will pay only $1.28 per user each month, giving your organization an incomparable value for every print job⁵. Printix also helps you cut your costly energy bills, as this cloud-based printing platform saves you electricity otherwise wasted running your office’s expensive and often-underutilized print servers⁴. In short, Printix saves you money so you can focus on providing predictably awesome experiences for employees and customers alike. 

Another benefit of Printix cloud printing is that it reduces the burden on your IT personnel⁴. Since Printix manages your entire print infrastructure for you, everyone on your IT team can spend more time focusing on strategic activities⁴. Additionally, if you are an administrator, you can use Printix’s centralized platform to edit printer profiles, implement organizational print policies, update printer drivers, and assign printers to specific users within your business⁴. This shows that using Printix cloud-based printing helps you streamline your business’s printing processes so you can focus on adding more value to your organization. 

While Printix cloud printing saves you money and reduces the burden on your IT staff, it also provides ample flexibility and security⁴. Suppose that while traveling for business with only your smartphone in hand, you realize you must print a 50-page proposal to give your client. Thankfully, Printix’s mobile printing capabilities easily let you print from any Android or iOS-enabled mobile device to any Printix-managed printer⁶. You can also benefit from seamlessly integrating Printix with your existing MS Azure Active Directory⁴. Once you do so, you can log in securely with Microsoft’s single sign-on (SSO) and easily deploy Printix across your network printers with MS Endpoint Manager⁴. In short, Printix gives you the flexibility you need to print from anywhere on any device, plus added features like secure SSO for greater convenience and peace of mind. 

(Image courtesy of https://printix.net/mobile-print)  

Still another benefit of cloud-based printing with Printix is that it offers you advanced analytical insights about your company’s print use⁴. By integrating Printix with your business’s Microsoft Azure AD as we mentioned earlier, you can utilize Microsoft Power BI to access a variety of print-related insights⁴. For example, using the Printix Power BI template, you can analyze your printers’ performance, as well as how much paper and ink or toner each one uses per print job⁷. Printix’s Power BI template also gives you valuable insights into your company’s printer use by location, the number of print jobs and pages your employees have performed, and much more⁷. In short, Printix provides you with the in-depth analysis you need to make informed business printing decisions every day. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹imageOne. “Three Printing Stats That Are Terrifying to Your IT Budget” by Brad Foster. Retrieved from https://www.imageoneway.com/blog/three-printing-stats-that-are-terrifying-to-your-it-budget. 

²Business Systems, Inc. “The Right Number of Printers for Your Business.” Retrieved from https://busys.ca/blog/how-many-printers-does-my-business-require/#:~:text=It%20is%20widely%20considered%20that%20on%20average%2C%20a,you%20may%20require%20more%20or%20fewer%20office%20printers. 

³Printix. “Secure Cloud Print Management Software – Serverless and Easy – Printix.” Retrieved from https://printix.net/. 

⁴Quocirca. “6 advantages of cloud print services” by Louella Fernandes. Retrieved from https://quocirca.com/content/6-advantages-of-cloud-print-services/.  

⁵Printix. “Pricing – Secure Cloud Print Management – Printix.” Retrieved from https://printix.net/pricing. 

⁶Printix. “Mobile Printing – Secure Cloud Print Management – Printix.” Retrieved from https://printix.net/mobile-print.  

⁷Printix. “Printix Insights on Microsoft Power BI.” Retrieved from https://printix.net/power-bi-report. 

24
Mar
2023
Best Practices for Identifying and Preventing Identity Theft with the FTC’s Red Flags Rule

Best Practices for Identifying and Preventing Identity Theft with the FTC’s Red Flags Rule

By Joseph Conciatori

If you are like me, chances are you have personally identifiable information (PII) stored online, including your name, address, and Social Security number. We use it for everything from online banking to ordering from our favorite local restaurants and purchasing airline tickets. PII can also be found in our electronic medical records. While you may think this information is always secure, it is not. Hackers lurk throughout the dark web, lying in wait to steal your PII and utilize it for their own malicious purposes. The Federal Trade Commission (FTC) reports that 5.7 million Americans fell victim to identity theft in 2021, costing them a staggering $5.8 billion¹. You therefore need a solution that keeps identity thieves at bay. 

Fortunately, the FTC’s Red Flags Rule is here to help. This federal regulation outlines that businesses must adopt and implement identity fraud programs to prevent and detect any instances thereof². In addition to requiring organizations to implement written identity theft prevention programs, the Red Flags Rule also offers them steps they can follow to prevent such crimes and mitigate any damage done². In this article, we will outline how the Red Flags Rule works along with best practices for addressing red flags within your business. 

The Red Flags Rule encompasses five categories of red flags². The first includes alarms, alerts, warnings, and notifications from consumer reporting agencies². Meanwhile, the second includes all suspicious documents². Category number three consists of suspicious and/or unusual activities linked to covered accounts, while the fourth includes suspicious PII like discrepancies in last names or addresses². Finally, the fifth category includes notifications from customers, law enforcement authorities, and other parties regarding identity theft involving specific accounts². Now that you know the five categories of red flags for identity theft, we will highlight best practices for addressing them. 

If you are a financial institution, like the bank pictured below, you must conduct periodic risk assessments to determine whether your business’s accounts are covered under the Red Flags Rule². Keep in mind, too, that if you do not comply with the Red Flags Rule, you will be required to pay $3,500 in civil fines, plus $2,500 directly to the FTC, for each violation². In short, regularly addressing your organization’s risks helps stop identity thieves in their tracks before they can become a detriment to your business. 

(Image courtesy of https://live.staticflickr.com/2434/3688223706_910af383ca_b.jpg)

Another best practice for preventing identity fraud is to frequently check your employees’ and customers’ PII for any inconsistencies, as they may indicate identity theft³. For example, fraudulent information such as false addresses and invalid phone numbers is a major red flag³. You should also keep an eye out for any address or telephone number in your records that multiple people use to open accounts³. This demonstrates that addressing discrepancies is key for keeping identity thieves from stealing your employees’ and especially your customers’ sensitive information. 

While conducting periodic risk assessments and addressing inconsistencies are crucial, you must also monitor your company’s bank accounts for suspicious activity³. For example, if your customer opens a new account but does not make any payments, or only makes the first payment, this is a sign that not all is right³. You should also watch for information that the customer is not receiving account statements either in the mail or via email, and about any unauthorized charges on their account(s)³. In summary, identifying the FTC’s Red Flags can easily help you prevent identity fraud from occurring. 

To detect red flags within your organization, you should implement multifactor authentication (MFA) techniques across your business’s computer systems, including biometrics such as fingerprints or facial recognition, passwords, PINs (Personal Identification Numbers), tokens, and smart cards like the one pictured below³. However, keep in mind that certain types of personal information, such as your Social Security number, are easily accessible and thus unfit for you to use as reliable authenticators³. In short, MFA can protect your business’s sensitive information and keep identity thieves at bay. 

(Image courtesy of https://www.securew2.com/blog/pki-smart-card-authentication-enterprise)  

Still another best practice for preventing identity theft is to take heed when posting on your business’s social media accounts¹. For example, you should not share any photographs taken in front of your company’s address, lest identity thieves steal your sensitive corporate information and use it maliciously¹. This demonstrates that identity theft takes many forms, and you must be prepared to address them all. 

Finally, if you spot any red flags, you must respond to them appropriately³. While your response may vary based on the degree of risk posed to your organization, several common responses include monitoring covered accounts for evidence of identity theft, contacting the customer, changing access methods such as passwords and security codes, and closing accounts where suspicious activity has occurred³. You can also reopen accounts with new account numbers, while in serious cases, you must notify law enforcement of the theft³. Any way you slice it, responding to red flags appropriately not only stops identity thieves from stealing your information, but it also saves you time, money, and headaches from not suffering the disastrous consequences thereof. 

If you need security solutions to comply with the FTC’s Red Flags Rule and prevent identity theft, navitend can help. We offer multi-factor authentication, plus a variety of other managed IT services and support, for clients in New Jersey, New York, and eastern Pennsylvania. Our top priority is keeping your business’s data, devices, and networks secure 24 hours a day and seven days a week. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹National Council on Identity Theft Protection. “2022 Identity Theft Facts and Statistics.” Retrieved from https://identitytheft.org/statistics/.  

²IS Systems, LLC. “What is the FTC Red Flags Rule and Who Must Comply?” by Mike Mariano. Retrieved from https://www.ispartnersllc.com/blog/what-is-the-ftc-red-flags-rule-and-who-must-comply/.  

³Federal Trade Commission (FTC). “Fighting Identity Theft with the Red Flags Rule: A How-To Guide for Business.” Retrieved from https://www.ftc.gov/business-guidance/resources/fighting-identity-theft-red-flags-rule-how-guide-business#ednref11.  

You can also view these helpful related articles on Cyber security

https://www.navitend.com/blog/article/best-practices-for-identifying-and-preventing-ddos-attacks

https://www.navitend.com/blog/article/brute-force-attacks-what-they-are-and-how-to-prevent-them

23
Mar
2023
Brute Force Attacks: What They Are and How to Prevent Them

Brute Force Attacks: What They Are and How to Prevent Them

It is a routine we follow several times a day. We enter a username and password to log into accounts on our computers, phones, and tablets for everything from email to online banking and ordering from our favorite local restaurants, as well as the devices themselves. However, not all passwords are created equal. If you use a weak password like “123456” or “mypassword2022,” you open doors for hackers to steal your credentials and use them maliciously¹. When attackers submit multiple passwords to access your system without permission, it is called a brute force attack, and its consequences can be dire¹. Consider that the average data breach resulting from stolen or compromised credentials costs $4.50 million, according to IBM². You therefore need a solution to keep hackers at bay. 

Fortunately, brute force attacks are preventable. In this article, we will learn more about the types of brute force attacks and how you can prevent them from becoming a detriment to your business. 

In their most basic form, brute force attacks entail hackers using automation tools to test endless combinations of letters and numbers in trial-and-error form to steal your password¹. Attackers may also try to logically guess your password, either by using common passwords like “password2022” or discovering personal information like your street address or pet’s name¹. While many brute force attacks involve testing multiple passwords against a known username, reverse brute force attacks let hackers test a single common password against a list of usernames¹. Keep an eye out for dictionary attacks, too, in which malicious actors test combinations of words and phrases – such as colors, seasons, and even your favorite sports teams – to access your account¹. Since users often utilize simple passwords for added convenience, dictionary attacks can be especially effective for hackers¹. Now that you know about these distinct types of brute force attacks, we will outline best practices for preventing them. 

(Image courtesy of https://www.imperva.com/learn/application-security/brute-force-attack/)  

The most important practice for thwarting brute force attacks is to use strong passwords³. You must never include personal information like your name, birthday, or email address in your passwords³. Additionally, do not use the same password for multiple accounts³. Instead, you should create unique passwords for every online account, including email and MS 365³. Furthermore, to prevent dictionary attacks, craft passwords using random character strings as opposed to words or phrases in any language³. In short, the stronger the password, the more difficult it is for hackers to crack. 

Another strategy for preventing brute force attacks is to limit the number of login attempts to your website³. While most websites allow unlimited login attempts by default, there are plugins available to limit your users’ logins and stop brute force attacks in their tracks³. With these plugins, you can set a maximum number of logins for your visitors³. If they exceed the number of attempts you set, you must then temporarily block their IP addresses from accessing your site³. Keep in mind, however, that this approach is inadequate against botnet attacks using several distinct IP addresses simultaneously⁴. Nevertheless, limiting login attempts helps you keep hackers at bay. 

While using strong passwords and limiting login attempts are both helpful, you must not overlook the importance of utilizing two-factor or multifactor authentication (2FA/MFA) ³. As we discussed in a previous article, 2FA combines multiple authentication factors so you can keep your business’s computer systems secure even if one factor is compromised. When using 2FA, you must validate your identity when logging into an account before you can proceed³. For example, if you are attempting to log into your email, your 2FA provider will ask you to confirm that you were the one trying to access the account³. In this case, you will need to verify your identity using a unique code sent to your smartphone before proceeding³. In summary, 2FA is a pivotal tool for preventing brute force attacks. 

Still another best practice to prevent brute force attacks is to install web application firewalls (WAFs), like the one pictured below³. By enforcing a maximum number of requests to a URL, such as your company’s intranet login address, from a specific source over a predetermined interval, WAFs offer you ample protection against brute force attacks³. Thus, WAFs are helpful for keeping unauthorized parties from accessing your system and giving you much-needed peace of mind, so you can focus on creating predictably awesome experiences for everyone in your organization. 

Image courtesy of https://www.addictivetips.com/net-admin/web-application-firewalls/)  

Although try as you may to prevent brute force attacks, they can still occur. Thankfully, if you are attacked or suspect that you have been, brute force site scanners can help⁴. These scanners peruse site logs, searching for signs of any brute force attempted on your business’s computer systems⁴. While this may seem like too little, too late for your organization, brute force site scanners give you proof that an attack occurred so you can take vital steps to prevent future attacks⁴. 

If you need tools to prevent brute force attacks, navitend can help. We provide a variety of managed IT services and support for clients throughout New Jersey, New York, and eastern Pennsylvania. For example, we offer 2FA technology for secure and predictably awesome login experiences, plus advanced password management and Immunify web application firewalls. Our top priority is keeping your data, networks, and applications secure 24 hours a day and seven days a week. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹Norton. “Brute force attack: A definition + 6 types to know.” Retrieved from https://us.norton.com/blog/emerging-threats/brute-force-attack. 

²IBM Security. “Cost of a Data Breach Report 2022.” Retrieved from https://www.ibm.com/downloads/cas/3R8N1DZJ. 

³Intelligent Technical Solutions. “How to Prevent Brute Force Attacks in 8 Easy Steps [Updated]” by Alessandra Descalso. Retrieved from https://www.itsasap.com/blog/how-to-prevent-brute-force-attacks#:~:text=How%20to%20Prevent%20Brute%20Force%20Attacks%201%201.,...%208%208.%20Use%20Web%20Application%20Firewalls%20%28WAFs%29. 

⁴AT&T Cybersecurity. “How to investigate and mitigate brute force attacks” by Garrett Gross. Retrieved from https://cybersecurity.att.com/blogs/security-essentials/brute-force-attack-mitigation-methods-best-practices.  

20
Mar
2023
Best Practices for Identifying and Preventing DDoS Attacks 

Best Practices for Identifying and Preventing DDoS Attacks 

By Joseph Conciatori

If you run a business, chances are the internet is integral to your everyday operations. We use the internet for everything from videoconferencing with coworkers to emailing promotional coupons and transaction summaries to customers. However, malicious actors lurk across the dark web, lying in wait to overwhelm your networks, servers, and services with a deluge of internet traffic¹. Such deluges are called distributed denial-of-service (DDoS) attacks, and they can be detrimental to your business. If you suffer a DDoS attack, you will lose an average of $22,000 for every minute your company’s networks are down². Keep in mind, too, that restoring service after a DDoS attack costs small and medium-sized businesses like yours a hefty $120,000 on average². 

However, the damage from DDoS is more than monetary. DDoS attacks can also devastate your company’s reputation². When attackers destroy your intellectual property, customer data, or both, customers will consider your business incapable of safeguarding their most sensitive data². Additionally, if customers find that your website is slow or crashes frequently, they will distrust your business and subsequently abandon you in favor of your competitors². Now, you may ask, “How can I keep DDoS attacks from damaging my business?” 

Fortunately, DDoS attacks are preventable. In this article, we will learn more about DDoS attacks, how they work, and best practices you can follow to stop them in their tracks. 

Much like traffic jams on the highway, DDoS attacks prevent your company’s legitimate internet traffic from reaching its intended destination on time¹. These attacks utilize multiple compromised systems as traffic sources, including networked computers and Internet of Things (IoT) devices¹. DDoS attacks work by infecting these systems with malware, giving attackers complete control over them¹. Individual infected devices are called bots, and a group of them is a botnet¹. Once attackers have established a botnet, they can easily direct attacks by sending each bot a set of remote instructions¹. When the botnet targets your network or server, each bot sends requests to the target’s IP address, burdening your network or server and denying service to your business’s regular web traffic¹. Now that you know how DDoS attacks work, we will highlight best practices for preventing them. 

(Image courtesy of https://securetriad.io/stop-a-ddos-attack/)  

One crucial best practice for preventing DDoS attacks is to know your network’s traffic³. Understanding the traffic on your business networks, such as employees, customers, or some combination of both, gives you a baseline so you can more easily comprehend DDoS attack symptoms³. We will now describe some of these symptoms so you can keep a watchful eye out for them. 

If your network slows unexpectedly, your email becomes inundated with spam messages, or your company’s website shuts down entirely as demonstrated by the sample error message below, chances are you are experiencing a DDoS attack³. Therefore, if you notice any or all these symptoms, you must investigate the root cause³. 

(Image courtesy of https://sucuri.net/guides/what-is-a-ddos-attack/)  

Thankfully, you can easily create a plan to respond to any DDoS attacks that occur on your business’s computer systems³. By defining and implementing a comprehensive denial-of-service plan, you can respond more quickly and efficiently when your business’s networks or servers are targeted³. While your DDoS response plan may vary depending on your company’s size and network infrastructure, it must include a detailed set of notification and escalation procedures, along with a skilled response team and systems checklist³. You should also create a list of internal and external contacts to notify about the attacks, as well as a communication plan for customers, vendors, and other stakeholders within your organization³. In short, creating a DDoS response plan helps you prevent attacks or at least mitigate any damage done if they do occur³. 

You should not overlook the benefits of practicing good cyber hygiene, either³. You and your users must not only familiarize yourselves with best security practices such as changing passwords regularly, utilizing secure authentication methods like 2FA/MFA, and knowing how to avoid phishing attacks, but follow these practices every day³. By reducing user errors within your organization, you can better protect your networks and servers even if you are attacked³. 

Still another best practice for preventing DDoS attacks is to increase your company’s network bandwidth³. Just as widening highways alleviates traffic congestion, adding additional bandwidth absorbs larger volumes of business traffic to keep it flowing smoothly and thus reduce the risk of DDoS attacks³. However, this approach does not prevent such attacks from occurring altogether³. Keep in mind that DDoS attacks are continually growing larger, with one reported attack in 2018 including a staggering 1.7 TBPS (terabytes per second) of data³. Nevertheless, expanding your business’s bandwidth to accommodate increased traffic helps keep your networks and servers running like clockwork³. 

If you need solutions to prevent or mitigate DDoS attacks, navitend can help. We offer a variety of managed IT services and support for clients in New Jersey, New York, and eastern Pennsylvania. For example, we provide comprehensive cybersecurity training so you and your employees can easily distinguish phishing emails from legitimate ones, in addition to secure multifactor authentication (MFA) and password management solutions. Our top priority is keeping your networks secure and your business’s internet traffic running smoothly, 24 hours a day and seven days a week. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

Cloudflare. “What is a DDoS attack?” Retrieved from https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/.  

Cloudbric. “How Much Will a DDoS Attack Cost Your Business?” by Jay Jackson. Retrieved from https://en.cloudbric.com/blog/2021/01/business-ddos-attacks-damages-and-cost/.  

SecurityScorecard. “10 Best Practices to Prevent DDoS Attacks.” Retrieved from https://securityscorecard.com/blog/best-practices-to-prevent-ddos-attacks. 

24
Feb
2023
5 Things You Must Know to Become a PowerPoint Pro 

5 Things You Must Know to Become a PowerPoint Pro 

If you have ever given a slideshow presentation, no matter the topic, chances are you have used Microsoft PowerPoint. We use PowerPoint for everything from presenting business proposals to instructing students both in the classroom and remotely. Microsoft owns an astonishing 95 percent share of the presentation software market, encompassing over 500 million PowerPoint users worldwide¹. These users create more than 300 million new presentations every day¹. In this article, we will outline five things you must know to make your presentations stand out and become a PowerPoint pro.  

One way to create a stellar PowerPoint presentation is by using templates². When you open PowerPoint on your computer, you will find a variety of stock templates already prepared to display your text in an appealing manner². To access these templates, click on “File,” and then click on “New” to create a new presentation using your chosen template². Additionally, you can select templates in various categories by going to Suggested Searches and then clicking on specific words therein². No matter which template you choose, PowerPoint provides you with a solid foundation for predictably awesome presentations every time. 

Another helpful PowerPoint tip is to use the Slide Sorter View³. This handy tool provides you with a complete overview of your presentation³. Here, you can ensure that your slides are consistent, cohesive, and in the correct order³. You can access Slide Sorter View by going to View Tab > Sorter³. In short, PowerPoint’s Slide Sorter View will help you take your presentations from unpredictable to predictably awesome. 

Meanwhile, if you are presenting before an audience, the last thing you want is for them to read off your slides before you have a chance to speak these points². You can rectify this by using animations, so that the text only appears with the click of a mouse². First, select the text that you wish to animate². Next, click on “Animations” in the top ribbon and select how you want your text to appear on screen (like “Appear,” “Fly In,” or “Swivel,” for example) ². If you would like your text to appear on the slide in a certain way, use the Effect Options menu². Even if you are not a professional animator, PowerPoint’s animations help you create compelling presentations. 

While animations make your presentations visually appealing, you can add even more value by including charts and graphs². You can insert charts – such as line graphs and pie charts – directly from Excel and paste them onto the appropriate slides². Keep in mind that each chart is a linked object, so if you edit the host Excel chart, the PowerPoint copy will reflect those changes². However, this approach can become problematic if you delete the Excel chart or move it to a new location². 

You can also create charts directly in PowerPoint by selecting “Insert” on the ribbon, and then clicking on the chart icon in the Illustrations group². This will display a pop-up window, allowing you to select the chart type². Once you have selected the chart you wish to include in your presentation, it will be displayed along with an Excel-type grid². While you can enter the data manually if you so desire, you can also fill the grid using Excel or Google Sheets spreadsheets². You will also see a highlighted area in the data grid, representing the area from which your chart’s data is derived². This is automatically filled with sample data, but you can easily replace the samples with your own data². 

Finally, if you are looking to design an appealing presentation but do not have an artist’s eye, PowerPoint has your back⁴. If you are a Microsoft 365 subscriber, you can use the PowerPoint Designer feature to select from a variety of design ideas⁴. To utilize Designer, select the “Design” tab, then select “Design Ideas” ⁴. You will find a wide array of ideas on the right-hand pane. However, if you are not satisfied with any of those designs, click “See more design ideas” at the bottom of the screen⁴. By building recommendations from your slides’ existing content, PowerPoint Designer offers you high-quality photos and vibrant complementary color palettes, while also transforming data into readable graphics, creating organized charts and tables, and adding illustrations to complement every part of your presentation⁴. In summary, Designer takes the guesswork out of crafting eye-catching presentations so you can focus on capturing your audience’s attention. 

Graphical user interface, application, PowerPoint

Description automatically generated 

(Image courtesy of https://www.microsoft.com/en-us/microsoft-365/blog/2016/03/24/powerpoint-designer-whats-new-and-whats-next/)  

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹24Slides. “Executives, PowerPoint & Time: Set Your Priorities.” Retrieved from  https://24slides.com/presentbetter/time-wasted-powerpoints#:~:text=PowerPoint%20is%20used%20by%20over%20500%20million%20people.,300%20million%20PowerPoint%20presentations%20are%20made%20every%20day.  

²Power Tech Tips. “Top 25 Microsoft PowerPoint Tips and Tricks You Need to Know.” Retrieved from https://www.powertechtips.com/powerpoint-tips/#:~:text=1%20Create%20two%20new%20blank%20slides.%202%20On,the%20same%20name%20as%20for%20...%20More%20items.  

³The Presentation Designer. “5 PowerPoint Tips You Should Know” by Illiya Vjestica. Retrieved from https://thepresentationdesigner.co.uk/5-powerpoint-tips/.   

⁴Make Use Of. “5 Ways to Build an Engaging Presentation in Microsoft PowerPoint” by Joe Keeley. Retrieved from https://www.makeuseof.com/tips-for-engaging-powerpoint-presentations/.  

View these related articles on improving Microsoft application skills

https://www.navitend.com/blog/article/5-things-you-must-know-to-become-a-word-wizard

https://www.navitend.com/blog/article/5-things-you-must-know-to-become-an-excel-pro

22
Feb
2023
5 Things You Must Know to Become an Excel Pro 

5 Things You Must Know to Become an Excel Pro 

5 Things You Must Know to Become an Excel Pro 

If you have ever used a spreadsheet program on your computer, chances are you have utilized Microsoft Excel. With over 750 million users worldwide, Excel handily leads the way over competitors like Apple’s Numbers¹. While corporate offices and research firms rely on Excel on an essential tool, Microsoft’s spreadsheet platform is also helpful for everyday users like you and me². For example, if you run a small business, you can use Excel to streamline your inventory management². In this article, we will outline five helpful tips on how to become an Excel pro. 

One important Excel function you must conquer is the art of creating pivot tables³. Since they summarize your data for you, pivot tables make working with copious quantities of data much easier³. Creating a pivot table takes only a few simple steps³. First, select the table or spreadsheet for which you wish to create the pivot table³. Next, click the Insert tab³. Then, select Recommended Pivot Tables to choose different options for how you would like to summarize your data³. Once you select one of the recommended pivot tables, it will create a new spreadsheet with the pivot table inside³. However, if none of Excel’s recommended tables fit your needs, you can also create and customize a blank table³. 

(Image courtesy of https://earnandexcel.com/blog/pivot-table/)  

While pivot tables are helpful, Excel also lets you visualize your data using a variety of charts and graphs². To create a chart or graph, begin by highlighting a range of data in your sheet². Then, select the Insert tab, followed by the See all charts button². Next, click the All Charts tab, where you will find a selection of charts such as bar graphs, line graphs, and pie charts, for example². If you would like to preview how your chart will appear, simply hover over a sample chart². Once you are satisfied with your choice, click OK to insert the chart into your spreadsheet². If you prefer to keep your chart separate from the main spreadsheet, select the chart, then click Move Chart, followed by “New Sheet,” and finally click “OK” ². In short, Excel has the charts you need to become a data visualization expert. 

Another Excel capability you must know is the ability to work across multiple files simultaneously³. To work with two or more files at once, select the desired files in your File Explorer and press Enter³. When switching between files, simply press CTRL+TAB on your keyboard to quickly toggle from one file to another³. Not only will you impress your colleagues with this marvelous multitasking display, but more importantly, you will become more productive and thus able to reach your business goals faster³. 

You must also know how to resize columns and rows in every spreadsheet you create². Chances are Excel’s default cell height and width are either too small or too large to accommodate your data². Therefore, to resize cells, click the column or row you wish to resize². Next, select the Home tab, and then click the Format button within the Cells group². You can then select whether you wish to adjust the height or width of your cells². Then, enter the desired amount and click OK. Excel will then automatically adjust the selected cells to the exact measurements you have specified². 

(Image courtesy of https://www.howtogeek.com/270296/how-to-set-row-height-and-column-width-in-excel/)  

While Excel offers no shortage of mathematical functions you can use in your spreadsheets, there are five basic ones you should know by heart: Sum, Average, Max, Min, and Count². True to its name, the “Sum” function calculates the total for a given range of cells². “Average” calculates the average of a selected range. Meanwhile, the “Max” and “Min” functions calculate maximum and minimum values within a range, respectively². Finally, “Count” calculates the number of values in a range of cells that you select². However, keep in mind that the “Count” function does not include empty cells or those containing non-numerical data².  

Using these functions is quite simple. Start by entering labels for the numbers for which you would like to perform the calculation². Next, select the Function tab, then choose “Sum,” “Average,” or whichever category of function you would like to apply². Press Shift+F3 on your keyboard or click the Insert Function button to insert the function². Then, select the function you need or use the Search for Function button, then click OK². Once you have found the function you would like to use, select it, and then click OK². Finally, if you wish to make any modifications to the range you are calculating, do so and then click OK to apply the function². 

If you are looking to enhance your Excel proficiency, navitend can help. Our Microsoft Excel how-to video series on YouTube features 37 installments, each one giving you the necessary skills and knowledge so you can transform from Excel novice to spreadsheet wizard in no time. We have all the tools you need to create predictably awesome spreadsheets every day. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹Excel with Business. “Microsoft Excel Versus Apple’s Numbers: Who Prevails?” by James Wann. Retrieved from https://www.excelwithbusiness.com/blogs/news/microsoft-excel-versus-apple-s-numbers-who-prevails. 

²groovyPost LLC. “10 Microsoft Excel Tips Every User Should Know” by Andre Da Costa. Retrieved from https://www.groovypost.com/howto/essential-microsoft-excel-2016-tips. 

³Tech News Today. “20 Things You Should Know How to Do in Excel That Will Make You an Expert” by Mduduzi Sibisi. Retrieved from https://www.technewstoday.com/things-to-do-in-excel/. 

21
Feb
2023
5 Things You Must Know to Become a Word Wizard 

5 Things You Must Know to Become a Word Wizard 

5 Things You Must Know to Become a Word Wizard 

If you are like me, chances are you use Microsoft Word every day. According to the Financial Post, Word and its companion MS Office platforms have 1.2 billion active users worldwide¹. In addition to writing blog articles, you can utilize Word to create books, letters, newsletters, and a variety of other documents². In this article, we will outline five things you must know to become a Microsoft Word wizard. 

Whether you are using Word for the first time or the thousandth, you must begin by opening the Word program on your computer². To create a new document, either click the “Blank document” icon to create a blank document or select from a diverse array of templates, including those for resumes and book reports². If you cannot find the correct template on the home screen, click “More templates” to view additional templates². 

Once you have opened your Word document, do not forget to save it regularly². This will prevent accidental deletion, as well as file loss in the event your computer’s hardware malfunctions². If you use Microsoft’s OneDrive cloud service, Word automatically saves your documents as you write them². However, if you do not have OneDrive or prefer not to utilize autosave, you must remember to save your document frequently during the writing process². When you are ready to save your file, click the blue disk icon in the upper left corner². If you are saving this document for the first time, you will see a popup window prompting you to provide a name and location for your file². Now that you know how to create and save Word documents, let us explore more helpful Word functions. 

(Image courtesy of https://support.microsoft.com/en-us/office/save-a-document-b7f55d8c-d714-4892-8fde-853a82419027)  

While arranging text into neatly formatted paragraphs is essential for writing business letters or other professional documents, Word also gives you opportunities to write text anywhere on the page³. Just click any location on the page twice and Word will allow you to start typing there³. By automatically inserting hard returns and tabs, Word lets you turn your document into a digital whiteboard³. If you are a marketing director brainstorming ideas for next year’s advertising campaigns with your colleagues, for example, Word’s type-anywhere function is designed for you³. 

As its name suggests, Word’s key emphasis is on helping you create and format text documents for business and personal use alike. However, you can liven up your body copy by inserting graphics such as photos, charts, and Excel spreadsheets. To add an object directly into the page, click Insert > Object³. This opens a dialog box showing the types of objects you can add³. While you can add charts such as bar graphs and pie charts, you can also insert spreadsheets or PDFs into your document³. Then, use the tab along the top to filter several distinct types of images, including stickers and illustrations⁴. Word also lets you insert stock photos directly from the web⁴. To do so, simply click the “Insert” tab, followed by “choose Pictures” ⁴. You will then be able to search for specific photos to feature in your document⁴. Once you have inserted your chosen image into Word, you can bring up the “Picture Format” tab to edit your image directly⁴. With options including Add Alt Text, Color, Corrections, Cropping, and more, the possibilities are endless⁴. 

(Image courtesy of https://helpdeskgeek.com/office-tips/embed-an-excel-worksheet-into-word/) 

Finally, if you work for an international company or with clients around the globe, chances are you have received documents in other languages such as Spanish, French, or Mandarin Chinese. While you may be tempted to visit Google Translate and copy-paste the entire document to translate it into English before re-copying and pasting it into Word, MS Word has the translation process covered⁴. To translate foreign-language documents into English, or English-language documents into other languages, simply click on the Review tab⁴. Word will then offer to translate your document, which you can accept. However, if this does not work, click the Review tab, and then translate⁴. Word will automatically create a new, machine-translated copy of your document⁴. Keep in mind, though, that this functionality only works if you use Word for Microsoft 365⁴. In short, MS Word helps make global business communication a breeze. 

If you are looking to enhance your MS Word proficiency, navitend can help. Our Microsoft Word how-to video series on YouTube features 33 installments, each one providing the necessary skills and knowledge so you can become a Word wizard in no time. We have all the tools you need to create predictably awesome Word documents every day. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹Financial Post. “Over 1 billion people worldwide use a MS Office product or service” by StackCommerce. Retrieved from https://financialpost.com/personal-finance/business-essentials/over-1-billion-people-worldwide-use-a-ms-office-product-or-service. 

²Canto. “How to use Microsoft Word – a complete guide” by Casey Schmidt. Retrieved from https://www.canto.com/blog/how-to-use-microsoft-word/. 

³PC Mag. “16 Microsoft Word Tips You Need to Learn Now” by Evan Dashevsky and Jason Cohen. Retrieved from https://www.pcmag.com/how-to/16-microsoft-word-tips-you-need-to-learn-now. 

⁴Digital Trends Media Group. “6 Things You Didn’t Know You Could Do in Microsoft Word” by Arif Bacchus. Retrieved from https://www.digitaltrends.com/computing/6-things-you-didnt-know-you-could-do-in-microsoft-word/.  

17
Feb
2023
What Are Phishing Scams

What Are Phishing Scams

You’ve probably seen one.  An email asking you for information.  Maybe from your bank or another trusted company or vendor that you use.  The email is quite simple, it asks you for basic information, and looks real but is designed to fool you into handing over personal info that leaves you vulnerable.  This scam is called phishing and you need to avoid it at all costs. Here's how.

What Are Phishing Scams 

Most of us have gotten used to doing business online.  We buy and sell things and we have accounts with sensitive information.  The risk of doing business online is low as long as you do business with organizations you trust. Problems occur when criminals impersonate the trusting organizations.  The goal of a phishing scam is to fool you into handing over sensitive information such as account numbers, passwords, pin numbers, birthdates, SSN’s, email addresses, etc., and other information that will enable them to access your personal information. Some will be very creative and use the exact same logos, phone numbers, even account numbers that appear on your statements or bills. The key to avoiding them is awareness. 

How to Spot Phishing Scams

First, be suspicious of all emails that ask for your information.  Here’s a perfect example of a phishing email that you may get from your office 365 email account.  It looks so legitimate and it is telling you that your trial account will be automatically deleted.  Just verify your email address by clicking the sign-in button.   

There are often a few "tells" in phishing scams

-Scare Tactics: They often try to scare you. In the example above, “deleted in 3 days unless you verify." They also insist you click a link or  “Sign In”. Clearly, you shouldn't click any links or fill out any forms in suspicious emails.

-Mistakes: There might be spelling mistakes or other grammar mistakes and they won’t use your name but may say something like “valued customer”.

If you receive a phishing email at work, stay calm and contact your company’s IT Department.  They will give you instructions on what to do. If you receive a phishing email in your personal email account, stay calm and just delete it.  If you accidentally clicked any links or fill out information online, contact the organizations where you have accounts to disable those them and set up new ones. 

navitend, is a Managed Information Technology Company provides preventative maintenance and proactive approach to help companies keep their electronic devices running at optimal performance.  They work closely with companies who are experiencing slow running computers, viruses and malware issues, bad internet connectivity, data loss, and cybersecurity breaches.  navitend helps to navigate their client’s technology issues before they become bigger problems.

View these related articles on detecting cyber attacks and how to plan for them

https://www.navitend.com/blog/article/13-simple-steps

https://www.navitend.com/blog/article/security-tip-1-phony-debt-collection

15
Feb
2023
Phony Debt Collection

Phony Debt Collection

Debt collection scams are one of the most frightening and persistent types of scams we see today. Scammers harass you for weeks, or even months, both at home and at work, trying to get you to pay a debt you don’t even owe. Scammers often know personal information about you and your family members and have been known to threaten relatives into paying up.

How the scam works:

The scammer calls and tells you that they work for a loan company, law firm or government agency, and claims to be collecting an overdue payment. When you respond that you don’t owe any money, the “debt collector” starts making threats to sue you, have your wages garnished, have you arrested, or force you to appear in court thousands of miles from home.

Despite their threats, these “debt collectors” don’t have any legal power. In most cases, the alleged overdue loan doesn't exist. Don’t give in and pay money you don’t owe. If you do, the scammer will likely be back for more…

Tips to spot this scam:

Ask the debt collector to provide an official “validation notice” of the debt- In the U.S. and most of Canada, debt collectors are required by law to provide this information in writing. The notice must include the amount of debt, the name of the creditor, and a statement of your rights. If the self- proclaimed collector won’t provide the notice, hang up!

Ask for more information- If you do owe money and aren’t sure if the caller is real, ask for their name, company, street address, and telephone number. Do not provide any bank account, credit card, or other personally identifiable information over the phone. If it is a legitimate collector, they should have details on the account in question.

Protect yourself:

If you don’t have any outstanding loans, hang up! Don’t press any numbers or speak to an “agent”.

Check your credit report- In the U.S., check with one of the three national credit reporting companies: Equifax, TransUnion, and Experian. In Canada, check the Equifax Canadian website. This will help you determine if you have any outstanding debts or if there has been suspicious activity in your name.

Place a fraud alert on your credit report. If the scammer has personal information, place a fraud alert with the three national credit reporting agencies.


If you want more security tips or if you have any questions visit the navitend website or call us at (973) 448-0070 ext 312.

Content provided by Secure Now

13
Feb
2023
13 Simple Steps to Help Businesses Create a Cyber Security Plan

13 Simple Steps to Help Businesses Create a Cyber Security Plan

Information Security is as simple as Confidentiality, Integrity, and Availability (CIA)

 

As businesses select hardware and software that is vital to operate, remember that these essential devices and applications increasingly become a target for attacks. Businesses want to be able to function with confidence.  

Will data be kept confidential? Is Integrity ensured? Is essential data available?

After you look through the initial responses to these questions, ask another question -- How? 

How is my data kept confidential? How is the Integrity ensured? Are audit logs maintained to demonstrate the claims of integrity? If my data is available, how do I make use of it? If there is a backup of the data, how long until I can access the information?

Data storage and backups need to be performed in a secure way. It is important that data is accessible and the ability to restore is paramount, in parallel it is also important that such data is kept in a confidential state and that unauthorized users are not able to read or manipulate data. This is where we need to look a bit beyond the simplistic view of CIA.

Every Security Solution Requires a Process, Plan and Practice (P3)

CIA + P3 

The process should provide protection for the organization’s most sensitive data. Businesses who have requirements to keep customer or client data secure, should limit the number of people who have access to the data.  There are steps for authorization, documentation, and secure management of the data being accessed.  These steps should be administered by the relevant IT professional or business manager and should include a way of providing high level security including the appropriate permissions.

The plan is a vital part and the best first step of protecting your business.  A cyber security defense plan is essential and something many small businesses tend to skip.  Can your business afford to skip this necessary step?  Identify and map your digital assets, the risks they face and the people responsible for managing those risks. 

Check out these simple steps to do when creating your Cyber Security Plan

1.   Switch to a secure email that is swept for viruses, archived and kept secure such as Microsoft Office 365

2.   Move data to a central file server

3.   Discourage staff from storing information on their local PCs

4.   Backup vital data every day with local copies and in the cloud

5.   Store critical customer and business information in a centralized location online such as SharePoint

6.   Limit employees data access to their own project files

7.   Restrict access to business information like human resource data, accounting and payroll to a limited number of people on a need-to-know basis

8.   Encrypt all company laptops in case they are lost or stolen

9.   Audit and document all physical security, locks, and alarms once a year

10. Updating your internet use policy with lawyers and train all staff

11. Ensure everyone in the company is familiar with all IT security policies and procedures

12. Hold annual employee training to keep security knowledge fresh

13. Spot-check regularly to make sure IT security is being taken seriously, and all protocols are being followed

All it Takes is One Employee to Cause a Data Breach

The practice is just as important as the process and the plan.  Be sure to practice your plan just like those fire-drills in school on the sunny days in elementary school. Cybercriminals are diligent in finding new sophisticated methods to trick unsuspecting individuals into putting themselves at risk.  Continuous education and monitoring to keep security top-of-mind and help strengthen the weakest links before it is too late.  It is extremely important that you include your entire organization in this practice step for two reasons.  One, most security breaches are the result of a team member making a simple mistake that leads to the crisis and two, everyone in the organization must respond in a rational manner to navigate the crisis.

As computing and networking resources have become more and more an integral part of business, they have also become a target of criminals. Organizations must be vigilant with the way they protect their resources. The same holds true for us personally as digital devices become more and more intertwined with our lives making it crucial for us to understand how to protect ourselves.

We are offering a Complimentary Human Security Assessment which will give you insight to your employees security strength.  Turn your weakest links into your strongest defenses!  

If you need assistance in charting a course for your organization's information security, contact navitend today at 973.448.0070 or info@navitend.com.

01
Feb
2023
Mobile Device Management Best Practices

Mobile Device Management Best Practices

Mobile devices have become an integral part of our everyday lives. We use our smartphones for everything from online banking to making hotel reservations and ordering takeout from our favorite local restaurants. Many of us also use our devices for work and although smartphones make remote work a breeze, this approach is far from perfect¹. A study from 2016 by mobile security firm Lookout and the Ponemon Institute reported that mobile data breaches can cost enterprises up to $26.4 million and 67 percent of organizations that reported such breaches determined that the incidents were due to employees using personal devices to access company information². This raises the question: how can mobile devices be managed to prevent these data breaches?

Fortunately, mobile device management (MDM) is here to help. While MDM strategies may vary based on how your employees use their devices, they share a common goal: to keep business data secure whenever and wherever employees access their devices¹. In this article, we will discuss effective MBM best practices for your business. 

One best practice for effective MDM is to require secure passcodes for better protection against malware, ransomware, phishing, and other threats³. Make sure your employees create and use secure passwords only they would know and confirm that each device has an access code for unlocking the device and the necessary applications therein³. You should also implement two-factor or multifactor authentication (2FA/MFA) for enhanced security, plus location-based authentication restrictions that only let your employees use their devices in specific locations such as your office⁴. 

Another MDM best practice is to require regular updates for your employees’ devices³. Since outdated applications are an open door for hackers, you and your teammates should communicate every time a device has released a new update, so they can quickly install it on their own devices³. Also, encourage employees to check their devices regularly to see if any applications or programs need updating³. 

While secure passwords and frequent updates are key for effective MDM, you should not overlook the importance of monitoring apps and phone settings³. In addition to monitoring each application your employees use, you must limit the number of applications they can utilize while working³. For example, employees should only download work-related apps with security features like 2FA to keep hackers at bay, if and only if they are from reputable companies³. 

Still another best practice for effective MDM is to discourage your employees from using public Wi-Fi networks, which may be inconvenient but can pose a security threat⁴. Public Wi-Fi provides a means for hackers to infiltrate company networks, so employees should avoid connecting to public networks unless necessary.

Lost devices should be reported immediately. Data breaches resulting from lost or stolen devices cost $3.94 million on average, according to IBM⁵. Time is always of the essence for effective MDM. 

If you are seeking mobile device management solutions for your business, navitend can help. We offer managed IT services and support, including mobile device management with Microsoft InTune and Sophos, for clients in New Jersey, New York, and eastern Pennsylvania. Our solutions will help you more effectively manage your employees’ mobile devices 24 hours a day and seven days a week. 

Navitend can help you. Call 973.448.0070 or set up an appointment today. 

Sources: 

¹CSCi. “Small Business Guide to Mobile Device Management.” Retrieved from https://www.csci.com/small-business-guide-to-mobile-device-management/

²Lookout. “A Mobile Data Breach Could Cost an Enterprise $26.4 Million.” Retrieved from https://www.lookout.com/news-release/a-mobile-data-breach-could-cost-an-enterprise-264-million

³Integris. “Mobile Device Management Best Practices: Tips for Managing Mobile Devices.” Retrieved from https://integrisit.com/mobile-device-management-best-practices/

⁴Solutions Review. “7 Essential Mobile Security Best Practices for Businesses” by Daniel Hein. Retrieved from https://solutionsreview.com/mobile-device-management/7-essential-mobile-security-best-practices-for-businesses/

⁵IBM Security. “Cost of a Data Breach Report 2022.” Retrieved from https://www.ibm.com/downloads/cas/3R8N1DZJ

25
Jan
2023
XSS Attacks: What They Are, How They Work, and How to Prevent Them

XSS Attacks: What They Are, How They Work, and How to Prevent Them

The internet plays a pivotal role in daily life, such as to correspond with coworkers, check our bank balances, and reserve flights and hotel rooms for upcoming business trips. However, hackers and other malicious actors lurk across the dark web, lying in wait to steal your most sensitive information. If this information is lost or stolen, the consequences can be dire. Consider that the average data breach worldwide costs $4.35 million and takes 277 days – more than nine months – to contain, according to IBM¹. Therefore, you must keep a watchful eye on any suspicious activity on your business’s website and web applications. 

One such activity is cross-site scripting (XSS). XSS attacks inject malicious code into vulnerable web applications so that attackers can steal the valuable information therein². XSS does not target your applications directly, but rather those who use them, because if these attacks are successful, your business’s reputation will collapse². If your reputation is tarnished, customers will then distrust and even abandon you in favor of competitors². Now, you may ask yourself, “How can I keep my business’s networks safe from XSS attacks?” 

Fortunately, there are some best practices you can follow to stop XSS attacks in their tracks or prevent them entirely. In this article, we will learn more about how XSS attacks work and how you can keep them from wreaking havoc on your business. 

XSS occurs when attackers manipulate vulnerable websites to return malicious scripts to users². While this process involves JavaScript, XSS attackers can use programming environments like ActiveX, Flash, and VBScript². Since XSS attacks can occur on multiple client-facing platforms, they are a major threat to your business². Consider British Airways, for example. In 2018, the UK’s flagship airline was attacked by high-profile hacking group Magecard, who exploited an XSS vulnerability in Feedify, a JavaScript library used on British Airways’ website². The attackers modified the script, sending customer data to a malicious website with a similar domain name to the real British Airways². They also included an SSL certificate to trick users into falsely believing they were purchasing tickets from a secure site². While the hackers’ efforts were eventually thwarted, they still skimmed credit card information from 380,000 online booking transactions². This shows the harm that XSS attacks can cause to your company. 

You must also keep in mind that XSS attackers use a variety of methods to infiltrate your company’s websites and web applications². For instance, they may target functions on your website that accept user inputs, including comment boxes, login forms, and search bars². Attackers load their malicious code on top of your legitimate website, thus deceiving your browser into running their malware whenever you load the site². They may also run JavaScript on victims’ browser pages, providing an avenue for them to steal valuable business and personal information during each session². Consider, too, that XSS attackers often impersonate users to compromise their private accounts². Now that you know how XSS attacks work, we will explain best practices for preventing them. 

One best practice for preventing XSS attacks is to ensure all your business’s software applications are up to date³. Updating your software regularly not only lets you install new features and enhance overall performance, but it also keeps attackers at bay by fixing bugs and patching any security vulnerabilities you may have³. Therefore, by preventing your software from becoming painfully outdated, you can easily thwart XSS attackers from infiltrating your company’s websites and web applications, saving you plenty of headaches and sleepless nights³. 

While updating your business’s software is crucial, you must not overlook the importance of application auditing, either³. You should perform regular audits of all your business applications to determine which ones you use most and least often³. If there are any apps you use infrequently, you must delete them to reduce your vulnerability to harmful XSS attacks³. Any way you slice it, updating and auditing your software gives you peace of mind so you can focus on delivering predictably awesome web experiences for everyone in your organization. 

Another best practice for preventing XSS attacks is to sanitize and validate input fields on your company’s website and web applications³. Since input fields are the most common entry point for XSS attack scripts, you must always screen and validate any information that you, your employees, and/or your customers input into data fields³. This is especially crucial if you plan to include the data as HTML output to protect against reflected XSS attacks³. Additionally, you should validate inputs on both the client and server sides as an added precaution³. If you validate the data before it is sent to your servers, you will also benefit from extra protection against malicious XSS scripts³. In short, screening and validating all inputs into your company’s website helps keep attackers at bay. 

Still another way to stop XSS attacks is to install a web application firewall, or WAF, which are especially helpful for filtering bots and other malicious activity, easily thwarting XSS attackers before they can execute any scripts³. In summary, WAFs play a pivotal role in keeping your business’s website and web applications safe. 

Finally, you must have a comprehensive content security policy (CSP) in place to protect against XSS attacks³. CSPs help define the functions your company’s website can perform while preventing it from accepting any in-line scripts. Since your CSP can completely block XSS attacks or at least dramatically reduce their probability, it is an invaluable tool for securing your websites and web applications against these costly, reputation-tarnishing threats to your company³. 

If you are looking to protect your business against harmful XSS attacks, navitend can help. We offer a variety of managed IT support and services for clients throughout New Jersey, New York, and eastern Pennsylvania. With solutions like Immunify web application firewalls (WAFs), plus endpoint encryption and comprehensive security risk assessments, we can help defend your websites and web applications from XSS attacks and their consequences for your business. Our top priority is keeping your data, networks, and applications secure 24 hours a day and seven days a week. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹IBM Security. “Cost of a Data Breach Report 2022.” Retrieved from https://www.ibm.com/downloads/cas/3R8N1DZJ

²Bright Security Inc. “XSS Attack: 3 Real Life Attacks and Code Examples” by Oliver Moradov. Retrieved from https://brightsec.com/blog/xss-attack/#impact-of-xss

³eSecurity Planet. “How to Prevent Cross-Site Scripting (XSS) Attacks” by Kyle Guercio. Retrieved from https://www.esecurityplanet.com/endpoint/prevent-xss-attacks/.  

18
Jan
2023
The Benefits of Data Loss Prevention for Your Business

The Benefits of Data Loss Prevention for Your Business

Whether you run a restaurant, an antique store, or a nonprofit organization, your business has important data that, if lost in a security breach, can have detrimental consequences.  According to IBM’s Cost of a Data Breach Report 2022, the average data breach worldwide costs $4.35 million, and each individual record breached approximately $164¹. Consider, too, that 60 percent of small businesses close their doors forever within six months after a data breach.  

Data loss prevention, or DLP, provides a means for protecting business data in the case of breaches. DLP is a collection of tools used to protect data and prevent unauthorized access to information³. In this article, we will discuss the benefits of DLP software for you and your business. 

DLP software alerts you to potential cyberattacks before they occur, sending automatic notifications if compromising behavior is detected³. Having an immediate reporting system cuts down the time spent on defending against cyberattacks by stopping them before they start.

Another advantage of DLP is that it helps you better comprehend the many diverse types of data you store on your business’s computer systems⁴. DLP plans can organize large amounts of data through classification or tagging by priority, resulting in consolidated, documented backups that can be used during potential breaches⁴.

DLP also bolsters your company’s reputation as a trusted brand. Implementing DLP solutions to keep your data secure shows that you take this responsibility seriously, and all stakeholders within your organization notice this commitment to enhanced security⁴.

Yet another benefit of DLP is that it helps you comply with relevant rules and regulations, such as GLBA, HIPAA (the Health Insurance Portability and Accountability Act), Sarbanes-Oxley, and the PCI Data Security Standard⁵. For example, if you are a healthcare provider, you must install DLP software to prevent unauthorized users from sending emails and scanning documents that could contain patients’ personal health information (PHI), as well as copying PHI onto portable storage devices⁶. By installing DLP technology in your organization, you can thus avoid costly fines such as the $50,000 to $1.5 million penalties for violating HIPAA⁶. 

While DLP’s importance is growing across all business sectors, this is especially true in hospitality. Consider fast-food juggernaut Taco Bell, for example. In 2019, the chain’s franchisee BurgerBusters Inc. adopted a DLP solution from Envysion to “standardize and bolster its loss prevention,” including DLP, practices across its 147 Taco Bell restaurants⁷. This cloud-based platform allows BurgerBusters leaders to integrate data from POS (point-of-sale) and other systems into a multi-angle video feed and view a “side-by-side comparison on a single screen,” helping to verify and quickly resolve incidents such as fraud, theft, and sales data leakage⁷. 

By incorporating point-of-sale data with capabilities like a state-of-the-art health monitoring system, video scrubbing, and secure file sharing, Envysion’s DLP solution reduces investigation times by several hours and enables BurgerBusters leaders to track all activities in their restaurants, 24/7/365⁷. 

If you are seeking an effective DLP solution for your business, navitend can help. We offer a variety of managed IT (Information Technology) services, including DLP software installation, for clients in New Jersey, New York, and eastern Pennsylvania. We also provide DLP software training for your business, whether you have fifteen, fifty, or 500 employees. Our top priority is keeping your company’s data secure 24 hours a day, seven days a week. 

Navitend can help you. Call 973.448.0070 or set up an appointment today. 

Sources: 

¹IBM Security. “Cost of a Data Breach Report 2022.” Retrieved from https://www.ibm.com/downloads/cas/3R8N1DZJ

²Cybersecurity Ventures. “60 Percent of Small Companies Close Within 6 Months of Being Hacked” by Robert Johnson III. Retrieved from https://cybersecurityventures.com/60-percent-of-small-companies-close-within-6-months-of-being-hacked/

³Acronis. “DLP Software – What is it?” Retrieved from https://www.acronis.com/en-us/blog/posts/dlp-software/

⁴EasyDMARC Inc. “Benefits of Data Loss Prevention.” Retrieved from https://easydmarc.com/blog/benefits-of-data-loss-prevention/

⁵Security Intelligence. “A Business Case for Data Loss Prevention” by Brian Evans. Retrieved from https://securityintelligence.com/a-business-case-for-data-loss-prevention/

⁶Endpoint Security. “HIPAA Basics and the Role of DLP in Meeting Compliance” by Larisa Cocis. Retrieved from https://www.endpointprotector.com/blog/hipaa-basics-and-the-role-of-dlp-in-meeting-compliance/#:~:text=Businesses%20that%20are%20involved%20in%20any%20way%20with,in%20order%20to%20avoid%20penalties.%20What%20is%20HIPAA.  

⁷Hospitality Technology – “Taco Bell Franchisee Uses Tech to Combat Loss Prevention.” Retrieved from https://hospitalitytech.com/taco-bell-franchisee-uses-tech-combat-loss-prevention

10
Jan
2023
Best Practices for Small Business Lifecycle Management

Best Practices for Small Business Lifecycle Management

The daily operations of a small business require a variety of IT hardware, including computers, point-of-sale (POS) systems, servers, and telephone systems, among others.  While it may be tempting to replace this technology only when problems arise, a proactive approach is more beneficial in the longterm, since replacing broken equipment may result in buying cheaper options that could compromise your entire technological infrastructure’s integrity¹. 

This is where server lifecycle management comes in. Lifecycle management is proactive and spreads new equipment purchases over time¹, which reduces the financial burden or stress of replacing multiple types of technology all at once. In this article, we will explore best practices for managing the lifecycle of your business’s servers and other essential hardware. 

One best practice for server lifecycle management is to replace your business’s servers or other on-premises hardware (like computers, switches, and firewalls) every five years, limiting servers' shelf life to the common length of manufacturers' warranties¹. By following this simple strategy, you can ensure that your servers are up to date and less vulnerable to harmful phishing, spyware, and ransomware attacks. 

Another best practice for effective server lifecycle management is to keep a detailed inventory of all your IT assets, including information on all hardware and software, as well as device locations². 

Still another best practice for managing the lifecycle of your business’s servers is to move your business’s most critical operations to newer equipment³. Consider Anthony Marano, a Chicago-based fruit and vegetable distributor, for example. The company’s IT team reserves the newest, “state-of-the-art servers for the company’s production systems,” or alternatively, preparing them to take over production duties from existing servers³. Additionally, Anthony Marano uses its previous-generation hardware for emergency backups and testing, while decommissioning its oldest servers³. In other words, the produce supplier’s most crucial production loads are always on the newest equipment, which in turn have a lower risk of failure than older devices³. By following this example, you can ensure that your critical business processes run on the most up-to-date servers and increase capacity to meet demand, as necessary³. 

Of course, when it comes to server lifecycle management, do not overlook the importance of contingency planning for the end of your servers’ useful lives². This includes ensuring “compliance with upgrades, adapting to your enterprise’s demands, and the planned phasing-out of insecure or unsupported technologies,” including outdated servers². If you have difficulty acquiring new hardware in a timely manner, data center maintenance companies can provide you with multi-vendor support to extend the life of your servers². 

While tracking your physical servers is important, you must also know how to manage the lifecycles of your virtual servers. If you have virtualized your company’s servers, you should regularly upgrade virtual guest servers based on the guidelines that your application vendor, such as Microsoft or Egnyte, provides⁴. Also, make sure to configure the “N+1” virtual host servers to keep your business up and running even if you have one or more servers down⁴. Make sure to stagger purchase dates for your servers, be it every three months, six months, or one year, for example⁴. You should also monitor your servers’ performance regularly and replace them when your host fails unless performance dictates otherwise⁴. Any way you slice it, effective lifecycle management helps you ensure that both physical and virtual servers are running reliably.

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources:  

¹Roark Tech Services. “Technology Lifecycle Management for Small Businesses.” Retrieved from https://www.roarkinc.com/post/technology-lifecycle-management-planning-for-small-businesses.  

²Park Place Technologies. “IT Infrastructure Lifecycle Management Best Practices” by Michael Jennings. Retrieved from https://www.parkplacetechnologies.com/blog/it-infrastructure-lifecycle-management-best-practices-process/.  

³BizTech Magazine. “When It Comes to Server Lifecycle Management, Start with a Good Strategy” by Alan Joch. Retrieved from https://biztechmagazine.com/article/2012/06/when-it-comes-server-lifecycle-management-start-good-strategy.  

⁴ANP. “IT Technology Lifecycle Management for Small Business” by Michael Silverman. Retrieved from https://www.anp.net/blog/bid/365226/IT-Technology-Lifecycle-Management-for-Small-Business#:~:text=Although%20every%20businesses%20situation%20is%20different%2C%20the%20following,desktops%20Upgrade%20key%20physical%20servers%20every%204%20years

26
Oct
2022
Keeping Your Business Safe and Dry with Cisco Umbrella and navitend

Keeping Your Business Safe and Dry with Cisco Umbrella and navitend

Data breaches can be disastrous for any small business.  According to a recent study featured in Security Intelligence, the average cost of a data breach rose to an all-time high of $4.24 million in 2021, up ten percent from 2020¹.  Most tellingly, breaches involving remote workers cost a staggering $4.96 million on average¹.  Unfortunately, unless you have proper security measures in place, breaches can spell disaster for your business.  Indeed, Inc. outlines that 60 percent of small and midsized businesses close within six months if they are attacked².  Perhaps you might ask yourself, “How can I keep my business networks secure?’ 

Enter the Cisco Umbrella security system.  Just as an umbrella keeps you dry during a rainstorm, Cisco Umbrella keeps your users, apps, devices, and data safe twenty-four hours a day and seven days a week.  Here’s why Cisco Umbrella should be your top-of-mind enterprise security solution. 

One advantage of Cisco Umbrella is that it offers state-of-the-art DNS-layer security³.  When you deploy Umbrella across your business networks, the system will not only enhance your security visibility, but also detect compromised systems and protect on- and off-network users by stopping threats in their tracks before they reach your network³.  You will save yourself and your team plenty of headaches, as well as sleepless nights. 

Keep in mind, however, that Cisco Umbrella’s DNS-layer security provides two distinct tiers of protection.  In addition to filtering out harmful sites across the Internet, Umbrella lets you block content that may be inappropriate for your employees.  For instance, you can use Umbrella’s DNS filtering capabilities to block websites highlighting illicit substances.  You can also filter out inappropriate content depending on specific users within your organization.  For example, you can block access to social media sites for your customer support staff, while allowing marketing team members to access company accounts on platforms like Facebook and Instagram. 

Another key benefit is that Cisco Umbrella users can closely monitor current and future threats using Umbrella Investigate³.  Available via console and API (application program interface), this handy tool provides context in real time on a variety of threats, including phishing, malware, botnets, and trojans³.  By investigating and responding to incidents more quickly, Umbrella will give you and everyone across your networks much-needed peace of mind³. 

Still another benefit of Cisco Umbrella is that it is designed for seamless scalability⁴.  Using the security-as-a-service (SECaaS) model, your security team can access resources in the cloud as needed, scaling up every time the team grows⁴.  Whether you are looking to expand from fifty to a hundred employees by year’s end or from 100 to 200 in six months, Umbrella will grow with your business every step of the way. 

While Umbrella is useful in and of itself, SD-WAN integration makes it an even more essential tool for you and your business⁵.  This combination of SD-WAN and Umbrella technology lets you weave “effective cloud security throughout your SD-WAN fabric,” better protecting your branch offices and remote users, no matter where they are⁵.  With enhanced protection across devices, remote users, and distributed locations worldwide, Umbrella helps you maintain a secure network anywhere. 

If you are looking to install Cisco Umbrella across your devices, Navitend can help.  In addition to our standard malicious site filtering, we also offer web filtering based on specific sites or genres of websites.  Although advanced filtering with Navitend requires a one-time setup fee and a monthly user fee, this small investment can yield substantial financial returns while also keeping your business networks secure 24/7. 

We can talk all day about the benefits of Cisco Umbrella, particularly when integrated with SD-WAN.  We have the comprehensive, all-in-one security solutions you need to keep your business users, apps, devices, and data safe in any scenario. 

Navitend can help you.  Call 973.448.0070 or setup an appointment today. 

 

Sources:  

¹Security Intelligence – “What’s New in the 2021 Cost of a Data Breach Report” by John Zorabedian.  Retrieved from https://securityintelligence.com/posts/whats-new-2021-cost-of-a-data-breach-report/ 

²Inc. – “60 Percent of Small Businesses Fold Within 6 Months of a Cyber Attack.  Here’s How to Protect Yourself” by Joe Galvin.  Retrieved from https://www.inc.com/joe-galvin/60-percent-of-small-businesses-fold-within-6-months-of-a-cyber-attack-heres-how-to-protect-yourself.html

³Cisco Umbrella – “Comprehensive Cloud Security Systems for any business – Cisco Umbrella.”  Retrieved from https://umbrella.cisco.com/products/cloud-security-service

⁴Cisco Umbrella – “3 Benefits of Cloud Security for Companies with Remote Workers” by Chloe Whitaker.  Retrieved from https://umbrella.cisco.com/blog/cloud-security-benefits-for-remote-workers.  

⁵Cisco Umbrella – “Simple Effective SD-WAN Security.”  Retrieved from https://umbrella.cisco.com/solutions/sd-wan-security

24
Oct
2022
Securing Your Business Data with ISO 27001 Certification

Securing Your Business Data with ISO 27001 Certification

Data is the lifeblood not just of your business, but the entire business world. Chances are you collect data from a variety of sources, ranging from email addresses and phone numbers to valuable financial records. However, none of your data is fully protected from hazards lurking across the dark web. Hackers wreak havoc wherever they go. The consequences can be disastrous. IBM Security points out that data breaches worldwide cost an average $4.24 million last year². How can you keep your company’s data safe from phishing, ransomware, and other harmful activity? 

Enter ISO 27001. This international standard was developed to help businesses of every size in every industry protect their data in an organized manner while also reducing costs³. By encouraging organizations to adopt well-designed information security management systems (ISMSs), ISO 27001 certification helps companies prove to their clients and stakeholders that they make information security a top priority³. In this article, we will learn more about ISO 27001 and the benefits it has for your business. 

It is worth noting that unlike standards such as HIPAA (the Health Insurance Portability and Accountability Act) and GDPR, which focus on specific types of data, ISO 27001 encompasses all kinds of business data that are stored electronically⁴. If you have data stored in hard copies or even with third-party suppliers, ISO 27001 covers those as well⁴. Additionally, ISO 27001 certification ensures that organizations like yours identify and manage risks in an effective, consistent, and measurable manner⁴. Now, we will discuss how to achieve ISO 27001 certification. 

Earning the ISO 27001 certification is a straightforward, three-step process³. First, you must hire an auditing body to review your company’s security system in detail to check if it meets the standard’s documentation requirements³. Second, the certifying body performs comprehensive audits to determine how each component of the ISO 27001 certification aligns with your organization’s system³. Finally, once you achieve ISO 27001 certification, you will need to schedule periodic follow-up audits ensuring that you are still compliant³. Now that we know how ISO 27001 certification works, we will highlight some of its key benefits. 

One major advantage of ISO 27001 certification for your business is that it bolsters your brand’s reputation⁵. With fines and reputational damage increasing year after year, chances are you expect stricter information security requirements from your supply chain⁵. By installing an ISO 27001-certified ISMS, you can benefit from a more robust and efficient security system⁵. Both you and your customers will benefit, because with reduced risk of delayed orders and system crashes, customers will be more satisfied with their purchasing experience⁵. Indeed, a recent BSI Group survey points out that 51 percent of organizations saw increased customer satisfaction after implementing ISMSs meeting ISO 27001 standards⁵. 

Not surprisingly, this enhanced brand reputation benefits your bottom line. Forty-three percent of organizations reported increased sales after implementing ISO 27001⁵. This demonstrates that whether you sell blenders, garden tools, or financial services, ISO 27001 certification helps you build customer trust and significantly bolster your revenue. 

Another benefit of installing an ISO 27001-certified ISMS is that it helps make your IT systems more robust, so they can keep running without interruptions⁵. As outlined by the BSI Group survey, 47.3 percent of respondents reported reduced downtime for their IT systems after earning ISO 27001 certification⁵. Since a single hour of downtime cost over $300,000 for 91 percent of businesses in 2021, upgrading to an ISO 27001-certified ISMS can keep your business processes running like clockwork⁶. 

Yet another benefit of ISO 27001 is that it helps you comply with a variety of other frameworks, standards, and legislation, including GDPR, HIPAA, the NIS Directive, and the NIST SP 800 series³. By installing an ISO 27001-certified ISMS, you will avoid incurring the costly fines and penalties that accompany each violation³. This demonstrates that ISO 27001 is a certification your business must not go without. 

The greatest advantage of installing an ISO 27001-certified ISMS, however, is that it saves you money. ISO 27001 was created to prevent expensive cybersecurity incidents within your company³. With the average data breach for U.S. companies costing a record $9.05 million last year, the ISO 27001 will spare you from dire financial consequences². In short, adopting an ISO 27001-certified ISMS can help you focus on investing your money into providing predictably awesome experiences for customers and employees alike. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹IMSM Inc. “How does ISO/IEC 27001 help keep your company compliant with US legislation and requirements?” by Kaytie Duffield. Retrieved from https://www.imsm.com/us/news/how-does-iso-iec-27001-help-keep-you-compliant-with-us-legislation-and-requirements/.  

²IBM Security. “Cost of a Data Breach Report 2021.” Retrieved from https://www.ibm.com/downloads/cas/OJDVQGRY.  

³BusinessTechWeekly.com. “ISO 27001 explained: What is ISO 27001?” by Malcolm Adams. Retrieved from https://www.businesstechweekly.com/legal-and-compliance/iso27001-certification/iso-27001-explained-what-is-iso27001/#:~:text=Certification%20to%20ISO27001%20allows%20businesses%20to%20prove%20to,of%20standard%20requirements%20for%20the%20security%20management%20system.  

⁴Forbes. “ISO 27001 Certification: What It Is and Why You Need It” by Michelle Drolet. Retrieved from https://www.forbes.com/sites/forbestechcouncil/2022/03/23/iso-27001-certification-what-it-is-and-why-you-need-it/?sh=2ccf1b0e41a6.  

⁵HIComply. “The Top 10 Benefits of Implementing an ISMS or ISO 27001”. Retrieved from https://hicomply.com/knowledge-insights/the-top-10-benefits-of-implementing-an-isms-or-iso-27001.  

⁶ITIC Corp. “ITIC 2021 Global Server Hardware, Server OS Reliability Survey Results by Laura DiDio. Retrieved from https://itic-corp.com/itic-2021-global-server-hardware-server-os-reliability-survey-results/.  

19
Oct
2022
Azure Active Directory Management Best Practices

Azure Active Directory Management Best Practices

Managing your business’s IT systems is no easy task. You must make sure all your company’s devices are running smoothly and update them on a regular basis. You also need to protect your hardware, software, and networks from hazards such as ransomware. Furthermore, you need to ensure that everyone in your company can access the resources they need to perform their jobs. 

Enter Azure Active Directory, or Azure AD. This cloud-based service is Microsoft’s identity and access management solution, available to all MS 365 subscribers¹. Your employees can use this platform to access a variety of external resources, including MS 365, the Azure portal, and numerous other SaaS applications as well¹. Azure AD also enables them to access your internal resources, including cloud-based apps and those on your company intranet¹. In this article, we will discuss some best practices for effective Azure AD management.  

One noteworthy best practice for Azure AD management is to implement the principle of least privilege. When you manage Azure AD to least privilege, you only grant your network administrators the permission they need to do their jobs². When you limit the roles and scopes available to your administrators, you also limit which resources are most at risk in the event your network’s security is compromised². 

Continuing with the principle of least privilege, you should only grant your administrators access for a specific period². Azure AD offers Privileged Identity Management (PIM), which lets you provide just-in-time access for your network administrators². When this timeframe expires, be it a day, a week, or a month, PIM automatically removes privileged access for these users². Also, PIM sends you notifications any time that "new users are added to highly privileged roles," letting you know exactly who can access these resources². 

While applying the principle of least privilege is crucial for Azure AD management, you should also implement multi-factor authentication (MFA), which we discussed in a previous article. Recent Microsoft research shows that when you use MFA, your account is 99.9 percent less likely to be compromised than it would be without MFA². There are two ways you can enable MFA in Azure AD: you can either implement it with Role Settings under PIM, or you can utilize conditional access². Either way, by adding an extra layer of security, MFA in Azure AD protects you from hackers and gives you much-needed peace of mind. 

Another best practice for managing your Azure Active Directory is to delete any accounts no longer in use³. Since you can overlook inactive accounts for a long time, you must promptly address and remove them to keep hackers from accessing your network without permission³. With hackers in pursuit of sensitive files, in addition to accounts with elevated permissions, inactive user accounts and empty groups in your Azure AD are prime targets³. Therefore, you should remove these accounts from the system as quickly as possible to eliminate the risk of attack by malicious insiders or disgruntled former employees³. In short, deleting unused accounts in Azure AD helps keep hackers at bay. 

Yet another best practice for Azure AD management is to customize your company’s Azure portal⁴. While Microsoft’s default version of Azure AD is entirely plain, with no branding or other distinguishing characteristics, you can apply your company’s logo and colors if you so desire⁴. This helps users determine that they have found the proper page to access intranet and other company resources⁴. Also, this customization acts as a safeguard against phishing, as it can help users recognize incorrect landing pages and prevent them from logging into MS 365 phishing sites⁴. Customizing your Azure portal plays a pivotal role in managing your Azure AD effectively. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹Microsoft. “What is Azure Active Directory?” Retrieved from https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-whatis.  

²Microsoft. “Best practices for Azure AD roles.” Retrieved from https://docs.microsoft.com/en-us/azure/active-directory/roles/best-practices.  

³ManageEngine.com. “Best practices to secure your Active Directory.” Retrieved from https://www.manageengine.com/products/ad-manager/active-directory-best-practices.html.  

⁴Cloudforce. “Azure Active Directory Best Practices.” Retrieved from https://www.gocloudforce.com/insights/azure-ad-best-practices/.  

17
Oct
2022
Cloud 365: The Benefits of Replacing Your File Servers with MS 365

Cloud 365: The Benefits of Replacing Your File Servers with MS 365

Cloud computing is an integral part of our everyday lives. We frequently use the cloud to store photos and videos, stream our favorite TV programs, and bank online across our various devices¹. However, beyond these personal uses, the cloud also plays a pivotal role in business computing¹. It is common for businesses to move their email exchange servers to the cloud, along with communication-focused applications like CRMs and video conferencing¹. 

While it is easy to make the switch to cloud-based applications for email and business communication platforms, that is not the case for moving work files¹. Indeed, many organizations are still reluctant to abandon their file servers in favor of shifting exclusively to cloud-based apps¹. They express concerns about security, compliance, and access¹. However, replacing your on-premises file servers with Microsoft 365 cloud storage is easy, secure, and user-friendly¹. In this article, we will highlight the benefits of replacing your file servers with MS 365 for you and your business. 

One key benefit of moving your file storage to MS 365 is that you no longer need to monitor any physical servers¹. If you still use an on-premises server, you must make sure it is regularly monitored, backed up, and serviced¹. You can elect to have your IT team service the unit or delegate the responsibility to a managed service provider¹. Either way, you waste valuable time and resources better spent serving customers. Keep in mind that the overall costs of using Microsoft’s cloud storage solutions are less than the amount you would spend for on-premises storage, plus related costs like floor space, cooling, and electricity². In short, using MS 365 for file storage helps you save time, money, and frustration. 

Another advantage of replacing your file server with MS 365 is that the cloud-based platform helps you find documents more easily³. Unlike old-fashioned servers with limited filtering options and general difficulty finding specific files, MS 365 provides you with ways to quickly locate the documents you need³. For instance, there are specific places to look if you know a document is stored in your business OneDrive or a time site library³. Other times, you may prefer to search for a document by name or a term used therein³. In this case, you can use OneDrive’s Query Box to search for documents in your business OneDrive, along with shared documents and those stored on sites you follow³. All these features considered, MS 365 leaves traditional file servers in its dust. 

While MS 365’s cloud solutions help you cut costs and find documents more easily, they also provide you with enhanced security⁴. According to a recent Gartner study, public cloud workloads suffered at least 60 percent fewer security incidents in 2020 than those in traditional data centers⁵. MS 365’s cloud storage also provides you with advanced, multi-layer security features². These include but are not limited to access control systems, data encryption, continuous threat monitoring, application security, suspicious activity monitoring, and protection from mass file deletions both accidental and intentional². This shows that MS 365’s cloud storage solutions are the safe choice for storing your company’s files. 

However, the greatest advantage of replacing your files with MS 365 cloud storage is that it allows greater access for remote users⁴. Chances are you have had to work from home the past two years due to current events. If you live in northwestern New Jersey like me, you may also be forced to do likewise if inclement weather makes travel – and thus access to your on-premises file servers – impossible. With MS 365, your files are no longer limited to a single storage site. Rather, you can access files stored on OneDrive, Teams, or SharePoint from anywhere, whether you are in Byram, Brasilia, Budapest, or Bangkok⁴. MS 365 cloud storage solutions also make file sharing and real-time collaboration easier, without having to continually email documents to yourself and others². In short, no matter whether you are working from home, in the office, or on the road – MS 365’s cloud storage is right for you. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹SymQuest. “Why It’s Time to Replace Your On-Prem File Server with Cloud-Based Collaboration” by Mark Jennings. Retrieved from https://blog.symquest.com/why-its-time-to-replace-your-on-prem-file-server-with-cloud-based-collaboration#:~:text=Replacing%20On-Prem%20File%20Servers%20with%20Office%20365%20Microsoft,you%2C%20and%20others%20on%20your%20team%2C%20from%20anywhere.  

²Microsoft. “Cloud storage vs. on-premises servers: 9 things to keep in mind” by Paul Diamond. Retrieved from  https://www.microsoft.com/en-us/microsoft-365/business-insights-ideas/resources/cloud-storage-vs-on-premises-servers

³Microsoft. “Organize documents and sites in Microsoft 365”. Retrieved from https://support.microsoft.com/en-us/office/organize-documents-and-sites-in-microsoft-365-1a36030f-3e54-4c43-8401-b7bcd0d1c16b#bkmk_storeodb.  

⁴Visionary IT. “Benefits of Moving Shared Company Files to Microsoft 365” by Travis Lugo. Retrieved from https://www.visionaryaz.com/2022/05/benefits-of-moving-shared-company-files-to-microsoft-365/.  

⁵Gartner. “Cloud Strategy Leadership” by David Mitchell Smith. Retrieved from https://www.gartner.com/imagesrv/books/cloud/cloud_strategy_leadership.pdf

29
Sep
2022
Taking Password Management into Your Own Hands with SSPR

Taking Password Management into Your Own Hands with SSPR

Most of us have multiple passwords for the desktop and mobile applications you use every day. However, with so many passwords, we cannot remember every single one. According to a study conducted by MasterCard and the University of Oxford, 21 percent of users forget their passwords after two weeks, and 25 percent forget one password at least once daily¹. Forgotten passwords cause frustration: research from Widmeyer and Centrify Corporation shows that forgetting passwords is more of a nuisance to users than misplacing their keys, running out of cell phone battery, and receiving spam emails². Now, you may ask yourself, “How can I better manage my passwords?” 

Meet self-service password reset, or SSPR. With this helpful tool, you can manage your passwords and accounts without waiting for IT help desk agents to unlock or reset them². In this article, we will explore how self-service password reset works on Microsoft 365 and outline the key benefits for you and your business. 

If you are looking to deploy SSPR on MS 365, the setup process is simple. First, in the left navigation pane of the MS 365 admin center, select “Settings,” then “Org Settings,” and then “Security & Privacy.” ³ Next, under “Let your people reset their own passwords,” select the Azure AD admin center³. Once you reach the Azure AD admin center, select “Users” in the left navigation pane, and then on the “Users-all users” page, select “password reset.” ³ Finally, to enable SSPR, select “All” and then click “Save.” ³ Your users will now be able to reset their MS 365 passwords on their own terms. 

Keep in mind, however, that you must have a paid MS 365 subscription for your business, nonprofit, or educational institution to implement SSPR³. You will not have access to SSPR with the free trial version of MS 365³.  

Now that you know how SSPR works, let us explore the benefits it has for you and your business. One advantage of SSPR with MS 365 is that it saves you money⁴. A single password reset costs $70 in IT help desk labor alone⁴. Considering that password resets account for 20 to 50 percent of all help desk calls, this quickly becomes expensive⁴. Therefore, MS 365’s SSPR tool is the straightforward way to manage your users’ passwords. 

Another benefit of SSPR with MS 365 is that it enhances your business’s productivity⁴. When you use an SSPR like Microsoft’s, you do not need a helpdesk ticket or time-consuming phone call to the service desk⁴. Rather, you can simply reset your password with a few short clicks⁴. This frees up time so you can focus on better serving customers and employees alike. Furthermore, SSPR with MS 365 is available every hour of the day. While traditional IT help desks have limited hours, you can access MS 365’s password reset 24/7, on any MS 365-equipped desktop or mobile device⁴. 

While SSPR technology saves money and enhances productivity, it benefits your business’s security as well⁵. SSPR with MS 365 provides you with all the security and flexibility that Microsoft’s cloud platform has to offer⁵. Also, if you are an admin, you can update the settings to accommodate any new security requirements and implement them without disrupting your users’ sign-ins⁵. However, this is not the only security benefit of MS 365’s SSPR. With robust audit logs featured detailed information about every step of the password reset process, you can import the relevant data into a Security Incident and Event Monitoring (SIEM) system of your choice if necessary⁵. This can help you secure your business systems while users reset their passwords⁵. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹The Associated Press. “When customers forget their passwords, business suffers” by Tim Johnson. Retrieved from https://apnews.com/article/aa74575664144498bd4a76bd9c6d66e7.  

²Centrify Corporation. “U.S. Businesses Lose More than $200,000 Annually from Employees Struggling with Passwords.” Retrieved from https://www.centrify.com/about-us/news/press-releases/2014/us-businesses-lose-more-than-200-000-annually-from-employees-struggling-with-passwords/.  

³Microsoft. “Let users reset their own passwords.” Retrieved from https://docs.microsoft.com/en-us/microsoft-365/admin/add-users/let-users-reset-passwords?view=o365-worldwide.  

⁴Enzoic. “The High Cost of Password Expiration Policies.” Retrieved from https://www.enzoic.com/cost-password-expiration-policies.  

⁵Microsoft. “Plan an Azure Active Directory self-service password reset deployment.” Retrieved from https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-sspr-deployment.  

26
Sep
2022
The More You Know: Benefits of Cybersecurity Training for your Employees

The More You Know: Benefits of Cybersecurity Training for your Employees

At the start of a new job, there is usually training course as part of the onboarding process. Whether we author articles for our company’s blog or install ethernet cables, we must learn about the tasks at hand before performing them every day. However, if there is one area that requires the most training, it is cybersecurity. If employees are not trained in fundamental security principles and practices, they are bound to make costly mistakes. According to SHRM, 85 percent of all data breaches in 2020 involved human error, and an alarming 61 percent entailed misused or stolen credentials¹. 

While cybersecurity training is important for all businesses, there is no one-size-fits-all training program. For example, one program may focus on tests challenging employees to distinguish phishing and non-phishing emails, while another may emphasize live hackings as an instructional tool². In this article, we will discuss the benefits of cybersecurity training for your employees. 

The greatest advantage of cybersecurity training for your employees is that it reduces human error and, in turn, enhances your business’s security. When you implement an ongoing security awareness training program, your employees will better comprehend how to use technology in an appropriate manner³. For example, focus on educating employees about current security threats, as well as best practices for handling potential phishing emails³. You should also train your employees to avoid dangerous behaviors such as utilizing company devices for personal reasons³. Additionally, while cybersecurity training may educate your employees about the best firewalls and malware detection software to install, its greatest benefit is the knowledge it gives them so they can avoid falling victim to hackers². 

Another advantage of cybersecurity training is that it saves time in a variety of departments throughout your company². If employees are trained to be knowledgeable about cybersecurity threats, they can easily handle said threats themselves, without assistance from your HR team or IT (Information Technology) helpdesk². Your employees will be able to properly address cyber threats using their own knowledge, with no managerial intervention². This saves time and effort otherwise spent evaluating cyber risks, but it also gives your business a strong core of cybersecurity experts who can handily assume responsibility for mitigating risks and averting disaster². 

Yet another benefit of cybersecurity training for your employees is that it saves money. As outlined by Denver-based CP Cyber, data breaches cost companies worldwide more than $400 billion (about $1,200 per person in the US) annually³. While large multinational corporations can recover from breaches quickly, that is not true for smaller firms³. If a small or medium-sized business like yours suffers a breach, chances are you may need to close your doors forever after being attacked³. While implementing a cybersecurity training program may increase short-term spending, this investment will pay long-term dividends³. 

Cybersecurity training saves time, money, and human error, but it also helps you comply with rules and regulations surrounding your business³. Violating standards such as HIPAA, the Health Insurance Portability and Accountability Act, could cost your company anywhere from $100 to a hefty $50,000³. By implementing cybersecurity training with an emphasis on regulatory compliance policies and handling your company’s most sensitive data, your employees will be less likely to violate these standards, thus saving you the fines accompanying these violations³. 

Although cybersecurity training is essential for all sectors, it especially matters in hospitality. Consider that 514 million hotel records worldwide were stolen in 2018⁴. Notably, the hospitality industry is the third-most lucrative target for cybercriminals, trailing only finance and retail⁴. Unfortunately, most hotel staff have little if any knowledge of basic cybersecurity concepts⁴. According to the 2019 State of IT Security Survey, a staggering 30 percent of hotel employees do not understand cybercrime such as malware or phishing⁴. Therefore, email fraud is a major issue in the hospitality industry⁴. Whether you own one hotel or a chain of hundreds, you must thoroughly educate your employees about phishing. One mistake on your employee’s part can open doors for a flurry of harmful phishing activity⁴. 

We offer end user security training for a diverse clientele of small- and medium-sized businesses, giving you a strong line of defense against phishing, ransomware, and other harmful cyberactivity. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹ SHRM. “Data Breach Report Emphasizes Cybersecurity’s Human Element” by Drew Robb. Retrieved from https://www.shrm.org/resourcesandtools/hr-topics/technology/pages/data-breach-report-emphasizes-cybersecurity-human-element.aspx.  

² LDI Connect. “4 Benefits of Cybersecurity Awareness Training for Employees” by Angela Cook. Retrieved from https://myldi.com/blog/cybersecurity-awareness-training-benefits/#:~:text=Let%E2%80%99s%20break%20down%20the%20four%20significant%20benefits%20of,improves%20security%20by%20strengthening%20your%20company%E2%80%99s%20human%20element.  

³ CP Cyber. “Benefits of Cyber Security Awareness Training.” Retrieved from https://cpcyber.com/benefits-of-security-awareness-training/.  

⁴ InnQuest. “How important is cybersecurity in the hospitality industry?” by Stefano Mocella. Retrieved from https://www.innquest.com/blog/cybersecurity-hospitality-industry/

22
Sep
2022
What You Need to Know about Cyber Insurance Requirements

What You Need to Know about Cyber Insurance Requirements

Running a business is no easy task. You must keep track of finances, ensure employee productivity, provide customer service, and make sure your IT infrastructure is up to date. If your business accepts electronic payments from customers, you run an increased risk of a data breach, whose consequences can be dire¹. According to IBM’s Cost of a Data Breach Report 2021, the average data breach worldwide cost a record $4.24 million last year, and an average of $9.05 million for U.S. companies². How can you protect your business from such a disaster? 

Enter cyber insurance. Also known as cybersecurity insurance or cyber-liability insurance, it protects organizations like yours from the consequences of cyber threats and attacks¹. Purchasing cyber insurance coverage can help you keep your business running smoothly during cyberattacks and their aftermath, while also covering costs incurred while responding to and recovering from them¹. However, keep in mind that your business must meet certain IT requirements to qualify for cyber insurance coverage. In this article, we will discuss these requirements and how to comply with each one. 

One key requirement for cyber insurance is that you must have endpoint detection and response, or EDR, implemented across every “endpoint,” including laptops, desktops, servers, mobile phones, tablets, and virtual environments, all of which sit on the ends of your network and thus in a prime position for hackers to capitalize on any vulnerabilities you have³. These devices must be protected. While antivirus software may have worked fine in the past, that is no longer the case. Malware continues evolving into more sophisticated forms, requiring an advanced solution³. EDR is a solution that provides visibility across many endpoint devices and responds to any perceived threats accordingly, which is why many insurers now require this security measure³.  

Another requirement for cyber insurance is multi-factor authentication, or MFA. As we discussed in a previous article, this helpful tool combines two or more distinct authentication methods, such as a password followed by an SMS code sent to your phone. Many organizations now require MFA to establish out-of-office network connections, often combining biometrics such as fingerprints or iris scans with passwords and single-use access tokens³. By preventing malicious users from accessing your networks and the valuable information stored therein, MFA can help you secure the cyber insurance policy of your dreams³. 

While EDR and MFA are both essential for cyber insurance coverage, you must not overlook the importance of ample cybersecurity training. For example, to purchase ransomware insurance coverage, you must mandate regular IT security and privacy training for all your employees and contractors, at least once annually but preferably more often⁴. Meanwhile, if you wish to buy technology fraud insurance, you need to implement social engineering-related security training with emphasis on baiting, phishing, spear phishing, and other social engineering methods⁴. By requiring cybersecurity training and then buying cyber insurance, you will have added protection against tech fraud as well as harmful malware and ransomware attacks. 

Lastly, you should have identity and access management (IAM) in place before purchasing a cyber insurance policy³. This practice “applies sets of rules and practices” so you can track and control your users’ activity³. For instance, IAM can help you “monitor successful and failed login attempts,” while also determining access rights and granting administrative privileges to select users as you see fit³. Not only do these techniques reduce the potential attack surface, but they also minimize the impact of a data breach and prevent such risks as accidental operator error and malicious insider attacks³. Any way you slice it, IAM is essential for any cyber-insured business. 

If you are looking to meet IT insurers’ requirements, navitend can help. We offer solutions such as endpoint protection, multi-factor authentication, firewalls, and comprehensive end-user security training so you can secure the best cyber insurance policy for your business. 

Call 973.448.0070 or setup an appointment today. 

Sources: 

¹BusinessTechWeekly.com. “Cyber Security Insurance: Who needs Cyber Liability Insurance & What does Cyber Insurance cover?” by Malcolm Adams. Retrieved from https://www.businesstechweekly.com/legal-and-compliance/gdpr-legislation/cybersecurity-insurance/

²IBM Security. “Cost of a Data Breach Report 2021”. Retrieved from https://www.ibm.com/downloads/cas/OJDVQGRY.  

³Cyber Insurance Academy. “Minimum Requirements in Cyber Insurance” by Syvanne Aloni. Retrieved from https://www.cyberinsuranceacademy.com/blog/2022/04/18/cyber-insurance-minimum-requirements/.  

⁴Imagineering LLC. “A Complete Cybersecurity Checklist for Obtaining Cyber Liability Insurance.” Retrieved from https://imagineeringit.com/a-complete-cybersecurity-checklist-for-obtaining-cyber-liability-insurance/#:~:text=In%20order%20to%20obtain%20Technology%20Fraud%20Coverage%2C%20most,%28e.g.%20social%20engineering%2C%20phishing%2C%20spear%20phishing%2C%20baiting%2C%20etc.%29

20
Sep
2022
Avoiding the Vulnerable App Trap with Third-Party Application Auditing

Avoiding the Vulnerable App Trap with Third-Party Application Auditing

Apps are an integral part of our everyday lives. We use apps to check weather forecast, order takeout or delivery from local restaurants, and follow our favorite sports teams. While many apps we use are first-party applications, others come from third parties like DocuSign, LumApps, and Mailmeteor, among others¹. They serve a variety of functions, from quick eSignature integration to sending thousands of personalized emails simultaneously¹. However, installing and using third-party apps brings its fair share of risks. 

Consider General Electric’s 2020 data breach, for example. ISACA outlines that with security measures lacking for both GE and Canon Business Process Services, its third-party partner, the breach exposed 200,000 current and former employees’ personal and health benefits records². This is not a favorable outcome for any business, let alone a global powerhouse. 

Of course, the dangers of using third-party apps are not just limited to multinational corporations like GE. They can be hazardous to your business as well, particularly regarding the level of access your employees have to corporate data³. For example, suppose you work for a company with a bring-your-own-device (BYOD) policy³. You extensively use your iPhone to access your Gmail account and Google Drive documents, but then you decide to install a third-party app requesting permission to access your Google account during the installation process³. Now, place yourself in the employer’s shoes and ask, “How do I protect my business from falling into the trap of vulnerable third-party apps?” 

Enter third-party application auditing. This process allows network administrators to act on multiple third-party applications that users or other admins have installed within their domains, either by revoking or approving access⁴. In this article, we will learn more about third-party app auditing and its benefits for your business.  

A third-party apps audit allows administrators to approve or revoke access to certain apps by organizing them into three distinct categories: (1) Block List, (2) Allow List, or (3) Unresolved⁴. The Block List revokes access to applications for all users who install a particular app, even if they uninstall and subsequently reinstall it⁴. However, the Allow List serves the opposite purpose⁴. It enables users on the domain to use and install the application⁴. Meanwhile, if you list apps as Unresolved, you have not yet reviewed them for placement either on the Allow or Block list⁴. 

Remember that before auditing, there are several vital steps you must take. First, take note of any installed third-party applications on your domain, then narrow the search to the ones that have requested and/or been granted access to your Gmail or Google Drive account⁵. Those accounts store your sensitive information and important data, so it’s crucial to be sure you can trust any applications that have been granted access. One way to determine if an application has malicious intentions is to consider if the permission request is fitting for the app’s purpose; as an example, games that ask for access to Google Drive may not be trustworthy⁵. You should also evaluate new applications daily and decide whether to whitelist or blacklist each app⁵. 

Now that you know how third-party app auditing works, we will now explain some of its advantages for your business. One benefit of third-party app auditing is that it gives you a better idea of the apps your employees install and utilize every day³. By running a daily automated scan of all apps your users install, third-party auditing produces reports you can use as a valuable tool³. Each report lists all the apps with an at-a-glance, color-coded view of their risk level: low, medium, or high³. In short, third-party auditing helps you keep track of your applications and ensure that employees are not installing potentially malicious apps on your computer’s computer systems³. 

While third-party app auditing helps you block risky apps quickly and easily, it also has specific benefits for Google G Suite administrators. If you are a G Suite admin, third-party app audits enable you to monitor all applications with access to your corporate data³. Thus, you can discover immediately if any of your employees have violated company policies, such as the data access policy³. For instance, you can find whether any of your employees have downloaded sensitive data to their private accounts³. This shows that regular third-party app auditing is essential for effective application management. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹Chrome Unboxed. “Google lists their recommended third-party apps for Google Workspace” by Johanna Romero. Retrieved from https://chromeunboxed.com/2022-recommended-workspace-third-party-apps.  

²ISACA. “How to Identify Vulnerable Third-Party Software” by Victor Gamra. Retrieved from https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2021/how-to-identify-vulnerable-third-party-software

³Spin Technology, Inc. “Third-Party Applications Audit: Complete Guide.” Retrieved from https://spinbackup.com/blog/third-party-applications-audit/

⁴BetterCloud. “Third Party Apps Audit” by Chris Fadell. Retrieved from https://support.bettercloud.com/s/article/Third-Party-Apps-Audit-bc60076.  

⁵BetterCloud. “Third-Party Apps Auditing & Compliance Out of Beta, Suggested Policies.” Retrieved from https://www.bettercloud.com/monitor/third-party-apps-auditing-compliance-beta-suggested-policies

19
Aug
2022
Disaster-Proofing Your Data with Datto and Navitend

Disaster-Proofing Your Data with Datto and Navitend

In today's world, data does not just mean everything to your business: your data is your business.  If your data is unavailable for even one second, your business will slow down to a crawl or perhaps face an existential crisis.  Losing your data can bring dire consequences.  For example, you will not only lose revenue and anger customers, but also run the risk of bankruptcy¹. 

According to a TechAdvisory.org article, sixty-eight percent of all businesses do not have any plans in place for a potential worst-case scenario².  This can prove fatal, whether they lose all or only some of their data.  Sadly, the vast majority of companies without data backup and recovery strategies are forced to close their doors forever within a year after disaster strikes². 

The best practice in disaster-proofing your business data requires considering every aspect of your business’s tech systems, from applications and hardware to the data itself².  Although this may sound rather daunting, there is one helpful tool that lets you protect your data from all disasters, 24/7/365.  Meet the backup data and recovery system, or BDR. 

As outlined in this PeerSpot.com article, backup data and recovery systems have several key advantages, including ease of management and drastically reduced downtime¹.  These handy appliances also protect users by providing local file protection, along with protection against ransomware, server hardware failures, and much more. 

A major benefit of BDR systems is that they generally run in the background, restoring your critical business data with few - if any - disruptions¹.  Consider the Datto SIRIS line of BDRs.  The SIRIS provides a variety of data restore options, from granular restores targeting specific files “to full system restores which include instant virtualization” to keep your customers online³.  With features such as verified backups and restore options for any scenario, the SIRIS lets users retrieve their data quickly, cutting downtime and enhancing productivity³.  This reduced downtime also means more time to focus on serving your customers.  

BDR systems also defend users against harmful ransomware and malware attacks.  Datto SIRIS automatically scans for ransomware with every single backup³.  This automatic detection helps you recover data quickly and easily so you can keep your business running smoothly and safely³. 

While protection from ransomware is important, what happens if you accidentally delete your company's data, or if a disgruntled employee deletes it maliciously?  Look no further.  Datto offers its customers access to exclusive Cloud Deletion Defense, helping them to protect their backups no matter what happens to them⁴.  By rapidly restoring your backups in any given scenario, Datto’s state-of-the-art BDR technologies give you much-needed peace of mind³. 

Another advantage of BDR systems is that they help users save money.  Although these systems can cost anywhere from $1,000 to several thousand dollars to install, plus at least $125 per month for securely and remotely storing your data, they are well worth the investment.  Returning to the Datto SIRIS example, each of its components is designed “to seamlessly work together, from the backup agent, to the SIRIS software platform” and the private Datto Cloud, where users can access their data indefinitely with proprietary Infinite Cloud Retention technology³.  This not only saves you money, but also time and headaches³. 

BDR systems are reliable and dependable.  Since Datto automatically verifies that backups will boot with all data intact and without ransomware, users can restore their business data with confidence³.  With BDR solutions like the Datto SIRIS in place, you will not have to worry about whether or not your data will boot or be recovered.  

Datto’s SIRIS BDR system is one reliable way to ensure that your data is secure. We have the data backup and recovery solutions you need to keep your business data safe and sound whenever disaster strikes. 

Navitend can help you.  Call 973.448.0070 or set up an appointment today. 

Sources: 

¹PeerSpot.com - “6 Advantages of Data Backup and Recovery” by Davina Becker.  Retrieved from https://www.peerspot.com/articles/6-advantages-of-data-backup-and-recovery.  

²TechAdvisory.org - “Protecting Your Business From Data Disasters”.  Retrieved from https://www.techadvisory.org/2021/08/protecting-your-business-from-data-disasters/.  

³Datto, Inc.  “SIRIS.” Retrieved from https://www.datto.com/portal-assets/datasheets/SIRIS_Datasheet.pdf.  

⁴Datto, Inc.  “The Datto Cloud”.  Retrieved from https://www.datto.com/resource-downloads/SIRIS-Cloud-Datasheet.pdf.  

10
Aug
2022
Creating a Safe Harbor for Your Business Data

Creating a Safe Harbor for Your Business Data

We live in a data-driven world. However, with our data circulating across the internet, there are obstacles we all must face. Hazards like malware, spyware, trojans, and ransomware lurk throughout the dark web, lying in wait to steal your sensitive business information. According to Statista, the U.S. alone saw 1,001 data breaches in 2020, wherein 155.8 million records were exposed¹. The consequences of these breaches can be dire. As outlined in IBM Security’s Cost of a Data Breach Report 2021, the average data breach cost a record $4.24 million last year². Now, you may ask yourself, “How do I keep my company data safe in case of a breach?” 

Enter data loss prevention, or DLP. This technique helps organizations protect their most sensitive data, such as health records and credit card numbers³. It also reduces the risk of data breaches by preventing users from sharing this information in an inappropriate manner³. In this article, we will learn more about DLP and why it should be a safe harbor for all your business data in case of cyberattacks. 

One key advantage of DLP is that it provides you with real-time monitoring all day, every day. Consider the capable Sophos Synchronized Security system, for example. Combining Sophos’ proprietary firewall and Intercept X technologies, Synchronized Security continuously shares your network health information via the Security Heartbeat feature⁴. This keeps you updated on network health, as you will be notified every time an active threat arises⁴. Moreover, with state-of-the-art lateral movement protection that isolates compromised hosts, you will know right away if attacks have used or attempted to use your business data maliciously⁴. In short, Synchronized Security gives you peace of mind so you can focus on meeting your business’s goals. 

DLP is also helpful because it helps organizations protect their crucial business data and intellectual property⁵. Loyola University Chicago, for example, recently began implementing DLP across the university’s Microsoft 365 and Outlook email systems⁶. The University’s goal is “to monitor, identify, and reduce the accidental release of sensitive information” in Outlook emails and MS 365 files⁶. Loyola-Chicago’s DLP protects university data by applying sensitivity labels to classify and protect users’ MS 365 documents⁶. Once users save these files, the labels remain with the documents whether they are shared internally, externally, or not at all⁶. The DLP also protects Loyola-Chicago’s intellectual property by preventing users from forwarding protected documents to emails outside the university system⁶. 

While DLP is valuable for protecting and monitoring your organizational data, it also gives you valuable insights about which specific users may be the greatest threats to your business⁴. Returning to the Sophos example, consider the next-generation firewalls we discussed in a previous article. Sophos firewalls “provide you with actionable insights into top-risk users,” allowing you to control their actions before they can seriously harm your network⁴. By correlating users’ surfing habits and web activity with search histories and advanced threat triggers, Sophos Firewall identifies your users with risky online behaviors and immediately notifies you of any suspicious activity⁴. This demonstrates why DLP is quickly becoming essential for businesses of all sizes. 

Still another benefit of DLP is that it helps your company save money. More specifically, it reduces your risk of exposure to both internal and external threats⁷. When you consider that each customer PII (personally identifiable information) record stolen in a data breach cost $180 on average last year, it becomes clear that your business is better off with DLP than without it². Additionally, as Security Intelligence points out, implementing DLP within your organization better positions you “to avoid financial loss from misuse of data, loss of data, or noncompliance” with relevant policies and regulations⁷. 

At Navitend, we offer a comprehensive suite of data loss prevention software solutions, including Microsoft and Sophos products, along with the training you need to create a safe harbor for all your business data. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

 

Sources:  

¹Statista – “Annual number of data breaches and exposed records in the United States from 2005 to 2020” by Joseph Johnson. Retrieved from https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/

²IBM Security – “Cost of a Data Breach Report 2021.” Retrieved from https://www.ibm.com/downloads/cas/OJDVQGRY

³Microsoft – “Learn about data loss prevention.” Retrieved from https://docs.microsoft.com/en-us/microsoft-365/compliance/dlp-learn-about-dlp?view=o365-worldwide.  

⁴Sophos – “Data Protection with Sophos Complete Security Solutions.” Retrieved from https://www.sophos.com/en-us/solutions/use-cases/data-protection#:~:text=%20Data%20Loss%20Prevention%20%201%20Secure%20the,and%20immediately%20take%20control%20of%20their...%20More%20

Loyola University Chicago – “Data Loss Prevention: Information Technology Services.” Retrieved from https://www.luc.edu/its/services/datalossprevention/

Identity Management Institute – “Data Loss Prevention (DLP) Best Practices.” Retrieved from https://identitymanagementinstitute.org/data-loss-prevention-dlp-best-practices/

⁷Security Intelligence – “A Business Case for Data Loss Prevention” by Brian Evans. Retrieved from https://securityintelligence.com/a-business-case-for-data-loss-prevention/.  

05
Aug
2022
Finding Your Business Voice with Navitend

Finding Your Business Voice with Navitend

It’s not an understatement to say that work has changed dramatically since the COVID pandemic, which brought a massive shift from in-office to remote working. Platforms like Zoom and Microsoft Teams are now integrated into our work environments, remote or not.  According to Digital Information World, Zoom held a staggering 48.7 percent share of the video conferencing market in 2021, with MS Teams at 14.5 percent¹.  Despite this disparity in market share, both platforms combine video conferencing and chat with voice calls.  While MS Teams Phone and Zoom Phone are similar in some respects, they are quite different in others.  Let’s learn more about the similarities, differences, and how navitend can help you find your business voice. 

One major similarity is that both platforms enable users to make and receive business phone calls on compatible devices, no matter where in the world they are.  With its entry-level MS Teams Phone with Calling Plan package, Microsoft gives users the ability to make calls through the MS Teams app on any Teams-equipped device².  Zoom Phone also lets users receive phone calls from multiple devices and/or apps, if they are equipped with Zoom Phone capabilities³.  

Also, both MS Teams Phone and Zoom Phone let users integrate existing phone systems with the software.  For example, with Direct Routing, MS Teams users can utilize Microsoft’s Phone System with a phone carrier of their choice⁴.  They can also connect an SBC, or session border controller, directly to the MS Phone System⁴.  Meanwhile, Zoom’s “Bring Your Own Carrier” initiative similarly lets Zoom Phone users leverage their existing PSTN service providers⁵.  Either way, you won’t have the hassle of switching to an all-new system. 

However, despite their similarities, MS Teams Phone and Zoom Phone have plenty of differences.  For example, according to Alan Shen at No Jitter, Zoom Phone offers greater support for legacy devices⁶.  In other words, it’ll support more of the devices you already have, without the need for costly new equipment.  On the other hand, MS Teams Phone has limited legacy support, instead encouraging customers to buy new devices based on Microsoft’s proprietary Teams code base⁶.  If you’re a new business owner without any existing devices, this isn’t necessarily a disadvantage to you because you’ll have to purchase new devices anyway⁶.  If you have an existing telecommunications network, though, you must replace it with new Microsoft-certified devices⁶.  This is a rather costly investment.  

Perhaps the most important difference between MS Teams Phone and Zoom Phone involves safety.  Like Teams video conferencing, Teams Phone is built on the secure Microsoft Trustworthy Computing Development Lifecycle foundation⁷.  Although Teams-related cyber incidents occur, they are rare, and built-in integration with Microsoft Azure gives you security and much-needed peace of mind⁷.  Also, Microsoft never sells data to advertisers, instead using it to improve the Teams experience⁷.  Zoom, however, has repeatedly been subject to controversy for sharing user data with companies like Facebook⁷.  It’s also worth noting that Zoom Phone lacks a dedicated IT command center, making it more prone to data leaks and breaches⁷.  If your data is leaked, then the consequences could be disastrous. 

While both MS Teams Phone and Zoom Phone have their respective pros and cons, we recommend MS Teams Phone as your go-to business voice solution.  With its key emphasis on safety, enhanced direct routing capabilities, and built-in Office 365 integration, MS Teams Phone gives you seamless enterprise communications in one convenient package. 

Whether you’re installing MS Teams for the first time or looking to integrate voice calling with your existing MS Teams interface, navitend offers phone consulting services tailored to you and your business.  We can help you integrate voice calls with MS Teams and other software applications so you can have a strong foundation for communications at an affordable price.   

Navitend can help you.  Call 973.448.0070 or setup an appointment today. 

Sources: 

¹Digital Information World – “Zoom vs. Google Meet vs. Microsoft Teams: New data reveals the world’s most popular video calling platform.”  Retrieved from https://www.digitalinformationworld.com/2021/04/top-video-call-platform-by-market-share.html

²Microsoft – “Teams Phone: Voice and Video Calling – Microsoft Teams”.  Retrieved from https://www.microsoft.com/en-us/microsoft-teams/microsoft-teams-phone

³Zoom Video Communications, Inc. – “Zoom Phone Plans & Pricing”.  Retrieved from https://zoom.us/pricing/zoom-phone.  

⁴Microsoft – “Direct Routing – Microsoft Teams – Microsoft Docs”.  Retrieved from https://docs.microsoft.com/en-us/MicrosoftTeams/direct-routing-landing-page?msclkid=16bac402c7e511eca96e14aa5a5af4fe  

⁵Unify Square – “Microsoft Teams vs. Zoom: How to Determine the Right Fit”.  Retrieved from https://www.unifysquare.com/blog/microsoft-teams-vs-zoom/?msclkid=fc0c3740c7cc11ecbd8912bf494c5264

⁶NoJitter.com – “The Looming Zoom vs. Teams UcaaS Phone Battle” by Alan Shen.  Retrieved from https://www.nojitter.com/unified-communications-collaboration/looming-zoom-vs-teams-ucaas-phone-battle

⁷G12 Communications LLC – “Microsoft Teams Voice vs. Zoom: Which is the best choice for your business?”  Retrieved from https://www.g12com.com/microsoft-teams-voice-vs-zoom/?msclkid=c4ac7ed9c7e211ec8d098a3fc9352b00.  

03
Aug
2022
Keeping Your Healthcare Data Safe with Cloud-Based EMR Systems

Keeping Your Healthcare Data Safe with Cloud-Based EMR Systems

If you work in healthcare, or even just visit your doctor’s office for yearly checkups, data plays a pivotal role in your experience. Indeed, data is paramount in healthcare, so much so that timely access to patients’ data – or lack thereof – can spell the difference between life and death. Although many healthcare providers store their records electronically on in-house servers, this approach can be problematic¹. For example, server-based systems are more prone to data loss from corruption, hard drive failure, or natural disasters¹. The consequences of such data losses can be dire. Last year, the average healthcare data breach cost a staggering $9.42 million². Now, you may ask, “How can I keep patients’ medical data secure 24/7?” 

Here we introduce cloud-based electronic medical records (EMR) systems. In addition to storing each patient’s medical history and health information such as diagnoses, allergies, medications, and vaccinations, cloud-based EMR software lets you track demographics and store your patients’ records online³. In this article, we will learn more about cloud-based EMR systems and the benefits they offer for your healthcare organization. 

One major benefit of cloud-based EMR systems is that they let you access patient data from anywhere with an Internet connection³, whether you are in Byram, Burlington, or Baton Rouge. Unlike traditional paper records or server-based electronic systems, cloud-based EMRs let you see and retrieve files without physically entering the office⁴. This is especially helpful if you are an on-call physician and cannot make frequent office visits, or your role involves traveling between facilities in your healthcare network³. Either way, cloud-based EMR software makes accessing your patients’ records a breeze. 

Another advantage of implementing a cloud-based EMR system is that it saves you money. If you install a traditional on-premises EMR, you must consider not only the cost of the system itself, but also the accompanying maintenance costs and licensing fees³. That is not the case with cloud-based EMR software. By partnering with a software company that will store and maintain your data on off-premises servers, you will be able to cut your IT (Information Technology) costs⁴. You will only need to pay a small subscription fee, leaving more money for what truly matters: providing your patients the quality care they need³. 

While remote access and reduced costs are both significant benefits, cloud-based EMRs also offer you enhanced security. Old-fashioned paper records can easily be lost or misplaced³, while files stored in on-premises servers are prone to data breaches and natural disasters⁵. However, when you migrate your patients’ health records to cloud-based EMRs, you will benefit from having your patients’ records regularly backed up and stored in a secure location⁵. Even if a catastrophe strikes, your data will be completely safe and ready for you to access from Internet-enabled devices⁵. Cloud-based EMRs are the secure way to store your patients’ files. 

Another benefit of cloud-based EMR systems is that they help your organization comply with relevant rules and regulations. Cloud-based EMR software is designed to comply with HIPAA (Health Insurance Portability and Accountability) standards, and “HITRUST certified for protected data portability” as well⁵. This shows the growing importance of moving your patients’ existing electronic records to the cloud. 

It is no secret that cloud-based software solutions are surging in popularity. According to a recent study cited by EMRSystems.net, the global market for cloud-based healthcare solutions is projected to grow by an astonishing $25.54 billion (about $79 per person in the US) from 2020 to 2024⁵. If you are still skeptical about migrating your server-based EMR files to the cloud, let us remind you that the benefits far outweigh the costs. Consider Seattle Children’s Hospital, for example. In October 2020, the Washington State-based healthcare provider implemented a comprehensive, integrated cloud-based EMR system encompassing 46 sites in four states⁶. 

By switching from server-based to cloud-based EMR technology, Seattle Children’s saw its uptime increase to well over 99.995%, ensuring smoother and more seamless operations⁶. Additionally, the hospital saw improvements in login times and performance, as well as overall user experience, with the new system⁶. Furthermore, Seattle Children’s benefits from advanced disaster recovery capabilities, allowing for easier data access when calamity strikes⁶. This demonstrates that whether you run a single, specialized practice or a multi-state healthcare network, implementing cloud-based EMR software is the way to go. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹EMRSystems.net. “Cloud-Based vs. Server-Based: Which EMR Software is Safer?” by Kimberly Mullen. Retrieved from https://www.emrsystems.net/blog/cloud-based-vs-server-based-which-emr-software-is-safer.  

²HIPAA Journal. “The Average Cost of a Healthcare Data Breach is Now $9.42 Million” by Steve Alder. Retrieved from https://www.hipaajournal.com/average-cost-of-a-healthcare-data-breach-9-42-million-2021/.  

³Ambula.io. “The many benefits of cloud-based EMR software.” Retrieved from https://www.ambula.io/cloud-based-emr-software.  

⁴Forbes. “What Is An EMR?” by Mimi Polner and Kelly Main. Retrieved from https://www.forbes.com/advisor/business/software/what-is-an-emr/.  

⁵EMRSystems.net. “Benefits of Cloud-based Technology in Healthcare” by Mike Garcia. Retrieved from https://www.emrsystems.net/blog/benefits-of-cloud-based-technology-in-healthcare/#:~:text=%20Top%205%20Advantages%20of%20using%20cloud%20technology,need%20to%20deal%20with%20a%20lot...%20More%20.  

⁶HealthTech Magazines. “Why Moving the EMR to the Cloud is the Next Natural Evolution” by Zafar Chaudry. Retrieved from https://www.healthtechmagazines.com/why-moving-the-emr-to-the-cloud-is-the-next-natural-evolution/

28
Jul
2022
Replacing Your File Server with Egnyte

Replacing Your File Server with Egnyte

Many of us use the cloud every day, whether we are backing up photos, video chatting with family and friends, or working on spreadsheets with Google Sheets. Not surprisingly, Cloudwards predicts that the global cloud computing market will grow from $371.4 billion (about $1,100 per person in the US) in 2020 to an astonishing $832.1 billion (about $2,600 per person in the US) in 2025¹. Of course, the cloud is not just for personal use. Ninety-four percent of all businesses use cloud services, with 48 percent opting to store their classified data in the cloud¹. This shows the growing importance of cloud computing for successful business operations. 

However, many organizations are reluctant to shift from traditional file servers to exclusively cloud-based storage. They are concerned about security, especially if all or most of their employees are working remotely². Whether because of local weather emergencies or personal matters, remote work intensifies risk levels with computer sharing, insecure mobile devices, and laughable or lacking network security². Now, you may ask, “How can I store my files in the cloud safely and effectively?” 

Meet Egnyte. The company offers a trusted, versatile cloud computing platform designed to secure and govern all your files from anywhere, whether you are in Byram, Brasilia, Berlin, or Bangkok. In this article, we will learn about Egnyte’s all-in-one platform and why it should replace your outdated on-premises file servers. 

One advantage of using Egnyte cloud storage is that facilitates file sharing and collaboration, far more than storing files solely on premises³. You can access and co-edit files from both Microsoft Office and Google Workspace directly in the Egnyte interface, without switching from one platform to another³. You can also review and approve files before sharing, while also restricting external sharing for your most sensitive files³. 

While file sharing and collaboration matter for your business, privacy and compliance do as well. Thankfully, Egnyte’s state-of-the-art platform places key emphasis on data privacy⁴. For example, the data classification tool lets you select from over 500 built-in patterns to classify your most sensitive and regulated files or create your own custom policy⁴. You can also secure litigation-related files based on who created them or the folders in which they reside⁴. Egnyte also enables you to run system-wide audit reports on user activity and file usage to help your business comply with relevant regulations⁴. This demonstrates that Egnyte is your go-to storage solution for ensuring file privacy and compliance. 

When replacing your on-premises file servers with a cloud-based solution, remember that visibility and control are paramount for secure cloud storage². Fortunately, Egnyte offers a variety of comprehensive data control measures. For instance, with preview-only links, you can prevent recipients from downloading, printing, or copying and pasting content from your most sensitive files⁵. Additionally, email-validated sharing lets you restrict file sharing to specific email addresses and revoke permissions as you see fit⁵. Egnyte enables you to store files in the cloud more securely, giving you much-needed peace of mind. 

Another benefit of replacing your file server with Egnyte’s cloud storage is that it helps you better comprehend the threats you and your business face every day⁶. For example, with a convenient all-in-one dashboard, you can “understand your data risk profile,” while also identifying and remediating your organization’s most pressing threats⁶. Egnyte allows you to identify unusual or suspicious behaviors, such as disgruntled employees maliciously deleting your files, and it can also pinpoint harmful malware and ransomware attacks⁶. Once you have identified these threats, you can take immediate action to remediate each issue by security level⁶. This demonstrates why Egnyte should be your top-of-mind cloud storage solution.  

Yet another benefit of replacing your file servers with Egnyte’s all-in-one cloud platform is reduced cost. The entry-level Business package offers you secure collaboration, privilege management, and state-of-the-art ransomware protection for only $20 per user per month, or $240 per user annually⁷. Meanwhile, the Enterprise Lite plan also includes content lifecycle management and threat detection⁷. The top-of-the-line Enterprise plan is an even better value, including content safeguards, privacy and compliance features, and advanced protection against ransomware⁷. When you consider that on-premises file storage requires paying for floor space, cooling, electricity, and occasionally new cooling equipment, switching your storage to the cloud with Egnyte is an investment well worth making⁸. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹Cloudwards. “26 Cloud Computing Statistics, Facts & Trends for 2022” by Vladimir Sumina. Retrieved from https://www.cloudwards.net/cloud-computing-statistics/

²Insights for Professionals. “5 Considerations When Replacing Your File Server”. Retrieved from https://www.insightsforprofessionals.com/it/storage/5-considerations-when-replacing-your-file-server

³Egnyte. “File Sharing & Collaboration – Data Lifecycle Management | Egnyte.” Retrieved from https://www.egnyte.com/solutions/sharing-collaboration

⁴Egnyte. “Automate and Simplify Data Privacy & Compliance Regulations | Egnyte.” Retrieved from https://www.egnyte.com/solutions/privacy-compliance

⁵Egnyte. “Data Controls | Egnyte.” Retrieved from https://www.egnyte.com/solutions/data-security.  

⁶Egnyte. “Unified Threat Management | Egnyte.” Retrieved from https://www.egnyte.com/solutions/unified-threat-management.  

⁷Egnyte. “Business Pricing Plans for File Sharing and Governance Platform | Egnyte.” Retrieved from https://www.egnyte.com/pricing

⁸NetApp. “On-Premises vs. The Cloud: The Cost Comparison.” Retrieved from https://cloud.netapp.com/blog/on-premises-vs-cloud-the-cost-comparison

26
Jul
2022
Staying Aware and Prepared with Security Awareness Training

Staying Aware and Prepared with Security Awareness Training

Whenever we start a new job, training is often an integral part of the onboarding process. We attend orientations to familiarize ourselves with company policies, procedures, and practices, as well as the task at hand. However, one area requires training more than any other: cybersecurity. Without proper training, employees are more prone to mistakes that can be dire for themselves, their employers, and their customers. Even small errors can be disastrous. According to IBM’s Cost of a Data Breach Report 2021, the average data breach cost $4.24 million last year¹. In this article, we will discuss the benefits of security awareness training for your business. 

One major benefit of security awareness training is that it empowers employees². By teaching and encouraging active awareness of security measures and potential threats, employees will become familiar and comfortable with the best practices to use when handling sensitive information. This awareness and familiarity will help employees avoid mistakes. As outlined in a 2020 Tessian study co-authored by Stanford University professor Jeff Hancock; 88 percent of data breaches result from human error³. Therefore, security awareness training helps you reduce human errors and empower your staff to perform their best. 

Another advantage of security awareness training is that it protects your company’s most valuable assets². Consider that while the average data breach in 2021 cost $4.24 million, ransomware attacks cost an average of $4.62 million, and the most malicious and destructive wiper-style attacks cost a hefty $4.69 million last year¹. That is more than four and a half million dollars wasted they could be spent growing your business. You should therefore invest in training from day one so you can better protect your assets². 

Security awareness training in your organization also prevents downtime². Since data breaches take considerable time to investigate and repair, you could spend several hours to a few days getting your network running again². Important tasks may be sidelined for an indefinite amount of time while the network is down, which could result in losses for your company. 

Yet another benefit of security awareness training is that it ensures more cohesive security across all a company’s departments or locations². Consider the University of North Carolina at Chapel Hill, for example. In December 2019, UNC-Chapel Hill mandated annual security awareness training for all its students and employees⁴. The University’s ITS security office created a straightforward training module taking 15-20 minutes to complete, ensuring that staff in all departments will possess the same basic understanding of how to protect themselves and their data from cyberattacks⁴. 

While security awareness training has its benefits across every sector, this is especially true in healthcare. For example, doctors and nurses must handle hundreds if not thousands of patient records securely and privately every day⁵. Similarly, office personnel and administrative staff need to input and maintain data confidentially⁵. Security training is essential for these environments to ensure that all staff are able to recognize and handle possible threats. 

Although security training modules may vary from one business to another, they all need to encompass a variety of subjects. First, employees must learn about the core tenets of IT security, including definitions for viruses, malware, and ransomware⁵. This training should also include educating employees about the dangers of phishing and social engineering⁵. Although social engineering typically takes place on a company’s computer networks, it can also involve other communication methods such as phone calls and text messages⁵. Therefore, you should train your employees to understand social engineering across a variety of business communication platforms⁵. 

Of course, there are other factors you must consider when developing security awareness training programs. For instance, you need a cyber threat index prioritizing which attacks can not only harm your business financially but also damage your brand’s reputation⁶. Your security training program should also create and implement a cyber threat vector board alerting your employees to imminent cybersecurity threats and risks⁶. This helpful tool should also keep track of data from previous attacks to help employees visualize potential attacks in the future⁶. In short, cybersecurity training is essential for any business. 

Whether you need cybersecurity training for five or 500 employees, navitend can help. We offer end user security training for a diverse clientele of small and medium-sized businesses, giving you a much-needed line of defense against phishing, malware, and other forms of cybercrime. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹IBM Security. “Cost of a Data Breach Report 2021.” Retrieved from https://www.ibm.com/downloads/cas/OJDVQGRY

²InfoSec Institute. “Ten benefits of security awareness training” by Beth Osborne. Retrieved from https://resources.infosecinstitute.com/topic/10-benefits-of-security-awareness-training/.  

³Tessian. “Psychology of Human Error” by Tessian and Jeff Hancock. Retrieved from https://f.hubspotusercontent20.net/hubfs/1670277/%5BTessian%20Research%5D%20The%20Psychology%20of%20Human%20Error.pdf?__hstc=170273983.078cb3048ba3c68e8465566faa2df651.1654272777466.1654272777466.1654272777466.1&__hssc=170273983.1.1654272777466&__hsfp=2056064509

⁴The University of North Carolina at Chapel Hill. “Mandatory Security Awareness Training.” Retrieved from https://fo.unc.edu/news/2019/12/09/mandatory-security-awareness-training.  

⁵RSI Security. “What Should Security Awareness Training Include for Healthcare Companies?” Retrieved from https://blog.rsisecurity.com/what-should-security-awareness-training-include-for-healthcare-companies/#:~:text=%20Healthcare%20entities%20should%20implement%20or%20conduct%20the,3%20Web%20applications%204%20Mobile%20devices%20More%20

⁶InfoSec Institute. “Why Does the Finance Industry Need Security Awareness Training?” by Ravi Das. Retrieved from https://resources.infosecinstitute.com/topic/finance-industry-need-security-awareness-training

19
Jul
2022
One is All You Need: The Benefits of Single Sign-On

One is All You Need: The Benefits of Single Sign-On

If you are like me, chances are you have an alphabet soup of usernames and passwords that you use every day to login to various websites and apps. This jumbled approach is far from perfect. You may have experienced the vicious cycle of creating, forgetting, and resetting passwords, only to forget them again. However, there is hope. 

Meet the single sign-on, or SSO. SSO authenticates users to multiple accounts or applications within an account using only one username or password². Consider Google, for example. When you sign into your Google account, you can access Gmail, Docs, Slides, Sheets, YouTube and more without separate logins for every app². Here, we will learn more about why and how SSO is valuable for you and your business. 

One major benefit of SSO is that it saves time. A single task may take twice as long if a necessary login is forgotten and must be reset. Some reset processes may require multi-factor authentication or email login links that are slow to arrive. By deploying SSO across your organization, your users will be able to access company resources from one convenient portal with only a single pair of credentials¹, avoiding the long lists of forgotten logins. 

In addition to saving time, SSO also helps users save money. Specifically, it cuts down on costly IT help desk calls, as supported users may have too many logins to remember and must call a company’s help desk to replace them². Since these help desk calls cost companies an average of $70 each, the expenses add up². By implementing SSO for users’ account logins, you could potentially save your organization thousands of dollars in IT costs. 

One organization saving thousands annually with SSO technology is St. Peter’s Healthcare System in New Brunswick, New Jersey. According to HealthTech Magazine, St. Peter’s adopted SSO to cut software licensing costs, and this move has paid off, with St. Peter’s CIO Frank DiSanzo noting that this switch has saved the organization more than $150,000 annually³. Baystate Health in Massachusetts deployed Imprivata’s OneSign solution over a six-month period in 2016³. By using a proximity card reader, OneSign streamlines the login process for hospital personnel including doctors and nurses³. This shows that SSO is quickly becoming valuable for healthcare providers. 

While SSO use is growing in healthcare, it is also popular in education, both at the K-12 and college/university levels. Educators can use SSO to access various resources, including data reports, payment processing, security management, and the state’s District Informational Dashboard⁵. For example, New York’s Iona College uses an SSO called MyIona⁴. With MyIona, students use their assigned computer ID and password to access several different applications simultaneously⁴. The Tennessee Department of Education also uses SSO at the state, district, and school levels⁵. By saving time otherwise spent logging into disparate systems, SSO lets teachers better focus on creating lesson plans and enhancing classroom experiences. This shows that no matter your field, SSO saves time, money, and headaches. 

Although there are plenty of SSO solutions on the market, Microsoft 365 users have access to two basic types of SSO with their accounts. Microsoft’s Azure Active Directory gives you several options for configuring SSO with your account, including password- and link-based along with federated SSO options such as OpenID Connect, OAuth, and SAML⁶. You can also enable SSO as an Office add-in⁷. Here, your users sign into Word, PowerPoint, Excel, and other Office apps with either their personal or professional Microsoft 365 account⁷. By utilizing the Office SSO add-in, you can authenticate and authorize your users without requiring them to sign in again⁷. This helps streamline the login process for your Microsoft 365 applications. 

If you are looking to reap the benefits of SSO for your business, Navitend offers password management systems tailored to your needs. Following a one-time onboarding in which team members and users work together to ensure everyone’s passwords are loaded into the platform, you can securely access business applications with a single password that only you know. We typically offer password management as a subscription service with either per-user or site-license offerings. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹Progress (formerly Ipswitch) – “6 Advantages of Single Sign-On and Why Your Business Needs It” by Doug Barney. Retrieved from https://www.ipswitch.com/blog/6-advantages-of-single-sign-on

²HumanID – “Pros and Cons of Single Sign-Ons” by Quan Nguyen. Retrieved from https://human-id.org/blog/pros-and-cons-of-single-sign-ons/

³HealthTech Magazine – “Single Sign-On Benefits Workflow, Security for Healthcare Organizations” by Karen J. Bannan. Retrieved from https://healthtechmagazine.net/article/2017/05/single-sign-benefits-workflow-security-healthcare-organizations.  

⁴Iona College – “Single Sign-On – Iona College.”  Retrieved from https://www.iona.edu/offices/information-technology/it-resources/single-sign

⁵Tennessee Department of Education – “Single Sign On (SSO).” Retrieved from https://www.tn.gov/education/district-technology/single-sign-on--sso.html

⁶Microsoft - “What is single sign-on in Azure Active Directory?” Retrieved from https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/what-is-single-sign-on.  

⁷Microsoft - “Enable single sign-on (SSO) in an Office Add-in.” Retrieved from https://docs.microsoft.com/en-us/office/dev/add-ins/develop/sso-in-office-add-ins.  

12
Jul
2022
Keeping Your Email Safe with Encryption

Keeping Your Email Safe with Encryption

Email plays a pivotal role in our everyday lives. According to FinancesOnline, a staggering 306.4 billion emails were sent and received worldwide each day in 2020¹. However, with all these emails passing through our inboxes, there is a serious threat. Although only 1.2 percent of all emails sent in 2019 were potentially malicious, down from 5 percent in 2017, hackers still use email to commit their cybercrimes¹. Now, you may ask yourself, “How do I protect my emails from being hacked?” 

Meet email encryption. This technology prevents unwanted or unauthorized users from accessing sensitive data. Business Wire notes that the demand for encryption is rapidly growing and projected to reach $12.9 billion (about $40 per person in the US) by 2027². In this article, we will learn more about email encryption and how to make it your number-one line of defense against hackers. 

The encryption process is simple: when you send a message, it is transformed into cyphertext and is only turned back to plain text–via decryption key or a central server–when the message has been delivered³. In this way, the message cannot be read by anyone until it has arrived in the inbox of the intended recipient.  

Although it may be tempting to encrypt only those emails with sensitive or confidential information, you should encrypt all emails before sending them. This applies the same level of security to all emails and makes confidential messages indistinguishable from casual correspondence, which is useful for hiding sensitive content from email hackers. For example, if you only encrypt one email containing your credit card information, hackers will notice it⁴. If you leave all your other emails unencrypted, that is an open invitation for them to infiltrate your account and use your data maliciously⁴. Encryption is an effective tool for ensuring the safety and security of your information. 

Microsoft 365 users can take advantage of three email encryption tools: Microsoft Purview Message Encryption, information rights management (IRM), and secure/multipurpose internet mail extensions³. Purview Message Encryption lets you send encrypted emails to anyone inside or outside your organization, regardless of their destination email address, provided that any usage restrictions established by your company are respected³.  

IRM applies usage restrictions along with encryption to prevent unauthorized users from printing, forwarding, or copying your company’s sensitive information³. However, there is one drawback of IRM: some applications may not support it on all devices³. 

While it is a good practice to encrypt all your emails, certain situations may absolutely require it. Depending on your job, you may be required to send confidential or sensitive information every day to a variety of recipients. In this case, consider using a personal email certificate to digitally sign your emails before sending them⁴. Once you do so, your messages are also encrypted, and you and your recipients can verify that the emails are yours⁴. 

However, that is not the only benefit of encrypting your emails with a personal certificate. Like a seawall preventing floods during a coastal storm, these certificates keep the rushing waves of spam and malware from reaching your inbox⁴. Once your family and friends are accustomed to finding your digital signature on emails, they will recognize that it is you and subsequently delete all unsigned messages. This saves you both time and headaches. 

If you need to email your most confidential information, Microsoft 365 offers S/MIME³. This certificate-based encryption solution lets you both encrypt and digitally sign your email messages before sending them³. By using unique digital certificates with “the keys for verifying signatures and encrypting or decrypting messages,” S/MIME gives you much-needed protection³. No matter which route you take, encrypting your emails keeps sensitive business information safe from hackers. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

 

Sources: 

1. FinancesOnline – “56 Email Statistics You Must Learn: User Behaviour & Best Practices” by Jenny Chang. Retrieved from https://financesonline.com/email-statistics/

2. Business Wire – “Global Email Encryption Market (2021 to 2027) – by Component, Organization Size, Deployment Mode, End-user and Region.” Retrieved from https://www.businesswire.com/news/home/20210825005563/en/Global-Email-Encryption-Market-2021-to-2027---by-Component-Organization-Size-Deployment-Mode-End-user-and-Region---ResearchAndMarkets.com

3. Microsoft - “Email encryption.” Retrieved from https://docs.microsoft.com/en-us/microsoft-365/compliance/email-encryption?view=o365-worldwide

4. Lifewire – “Why You Should Encrypt Your Email” by Tony Bradley. Retrieved from https://www.lifewire.com/you-should-encrypt-your-email-2486679.  

06
Jul
2022
Document Sharing with Microsoft 365

Document Sharing with Microsoft 365

If your computer runs on Windows, then you are familiar with the Office family of applications, including Word, Publisher, PowerPoint, and Excel. According to a survey featured in TechRepublic, 83 percent of businesses used MS Office in 2017¹. The same survey also notes that Microsoft’s subscription-based Office 365 (now MS 365) platform was gaining traction and continues to do so today¹. In fact, Statista notes that Microsoft 365 has an approximately 46 percent share in the global office suite technology market, and a 40 percent share of the United States market². MS 365 is quickly becoming a valuable tool for businesses of all sizes worldwide, from Byram to Budapest and Bangkok. 

One key benefit of Microsoft 365 is its ability to let users share documents with a variety of internal and external users. In this article, we will explain more about document sharing with Microsoft 365, as well as best practices.  

As outlined by IT security provider Varonis, Microsoft 365 includes two distinct but interconnected file-sharing systems, SharePoint Online and OneDrive³. They work together to provide users with all the file-sharing functionality they need³. More specifically, SharePoint is a frontend user interface for OneDrive, which handles storage on the backend³. Now, let us take a closer look at the different file sharing types available with Microsoft 365. 

Internal file sharing entails sharing files within your network, exclusively to users in the same domain with regular, non-guest permissions³. Configuring internal sharing with MS 365 is easy: you can share files from your personal OneDrive or save them directly to your SharePoint team sites³. SharePoint automatically creates these team sites whenever you create a new group in the Microsoft 365 admin center³. If you wish to share documents with your team members, simply upload them to the Team Site so that everyone on the team can access them³. This demonstrates that MS 365 elevates file sharing to a new level. 

MS 365 is not just for internal purposes. It is also designed for external file sharing³. You can share documents with partners, vendors, customers, and others outside of your organization³. However, this entails “opening a window to your SharePoint server” or sending sensitive data to potentially malicious users on other networks, making it far riskier than internal file sharing³. 

If you plan to share your files with clients or other external partners, there are some basic steps to follow. According to Microsoft itself, you must first configure the sharing controls in Azure Active Directory, along with SharePoint, Teams, and MS 365 Groups, to allow the desired level of sharing for your organization⁴. Next, if you utilize shared channels to send and receive documents, you can allow direct access for each collaborating organization by altering the settings to your specifications in Azure Active Directory⁴.  

Of course, security should always be top of mind when you share documents with Microsoft 365. Microsoft 365 provides all users with a variety of security and compliance features, so they can keep their data safe while sharing documents externally⁴. For instance, to keep unauthorized users from viewing sensitive content, create a data loss prevention (DLP) policy with the Microsoft Purview Data Loss Prevention platform on MS 365⁵. Microsoft 365 also offers the Safe Attachments feature so you can scan uploaded files automatically and quarantine potentially malicious ones⁵. You can also require multi-factor authentication, block users from downloading to unmanaged devices, and limit sharing outside your organization³. In these ways, Microsoft 365 helps you collaborate smoothly, safely, and efficiently on every team project. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources: 

¹TechRepublic – “83% of enterprises use Microsoft Office, but danger lurks in that large number” by Mark W. Kaelin.  Retrieved from https://www.techrepublic.com/article/83-of-enterprises-use-microsoft-office-but-there-is-danger-in-that-large-number/

²Statista – “Number of Office 365 company users worldwide as of June 2022, by leading country” by Lionel Sujay Vailshery.  Retrieved from https://www.statista.com/statistics/983321/worldwide-office-365-user-numbers-by-country/

³Varonis – “Microsoft Office 365 File Sharing Guide: OneDrive and SharePoint Tips” by Jeff Petters.  Retrieved from https://www.varonis.com/blog/microsoft-office-365-file-sharing

⁴Microsoft – “Collaborating with people outside your organization”.  Retrieved from https://docs.microsoft.com/en-us/microsoft-365/solutions/collaborate-with-people-outside-your-organization

⁵Microsoft – “Best practices for unauthenticated sharing.” Retrieved from https://docs.microsoft.com/en-us/microsoft-365/solutions/best-practices-anonymous-sharing.  

29
Jun
2022
Streamlining your Business Communications with MS Teams Phone and navitend

Streamlining your Business Communications with MS Teams Phone and navitend

Whether you like it or not, remote work is here to stay.  According to a survey in this CIO Dive article, sixty-seven percent of organizations expect remote working to remain in place for the long haul, if not permanently¹.  Enter Microsoft Teams.  With the COVID pandemic forcing office-dwellers to work from home, MS Teams use skyrocketed by more than 70 percent in just two months during the spring of 2020, growing to 75 million users worldwide¹.  While MS Teams is a trusted tool for video meetings and collaboration, you can also use it with voice calling for all-in-one business communications².  Here are a few reasons why MS Teams Phone is a must-have for you and your business. 

As outlined in this ComputerTech.com article, one major advantage of MS Teams Phone is that it helps you consolidate your business communications and productivity channels, which simplifies infrastructure and avoids the struggle of reconciling incompatible versions³. With MS Teams Phone, you can keep all your business communications under Microsoft's umbrella, from phones to instant messaging, email, and cloud services³.  This eliminates the hassle of incompatibility, saving you both time and headaches. 

Another benefit of MS Teams Phone is that it lets you make and receive business phone calls using any Teams-enabled device, anywhere around the world¹.  Whether you’re in Byram, Brasilia, or Brussels, utilizing MS Teams Phone for voice calling gives you the flexibility you need to stay connected while working from home or out on the road¹.  You also have the freedom to move calls between your desk and mobile device, along with optional Apple Carplay capability that allows you to participate in calls with hands-free/Siri technology or built-in vehicle controls².  However, we advise that you drive carefully if utilizing MS Teams Phone on Carplay, or use this system while parked².  Any way you slice it, MS Teams Phone should be a valuable player in your team's communications lineup.  

While the ability to connect with your team members anywhere in the world is helpful, it is far from the only benefit of integrating voice calling with your existing MS Teams interface.  MS Teams Phone also lets you make external phone calls from the same interface you already utilize for “chat, internal meeting, file-sharing, and other cloud services” like OneDrive¹.  With that being said, MS Teams Phone provides you and your team members with a more consistent user experience for internal and external communications alike¹. 

Yet another advantage of using MS Teams Phone is that it saves you money.  Consider the College of William and Mary in Virginia, for example.  The university recently announced that it would be moving its entire campus-wide telephone system to MS Teams by the spring 2023 semester⁴.  Major benefits of this shift include reduced telecommunications costs for the university, in addition to streamlined billing processes and cutting back on unnecessary physical phone equipment and support⁴.  The same is true for your business.  When you integrate your voice calling with MS Teams, you no longer need to purchase expensive PBX (private branch exchange) equipment for in-office use¹.  Moving your phone system into the cloud not only lets you simplify your voice calling, but also cut costs and better focus on enhancing communications and serving your customers¹. 

If you’re looking to integrate voice calling with your existing MS Teams interface, or perhaps interested in using MS Teams for the first time, navitend offers phone consulting services designed with you and your business in mind.  We can help you integrate voice calls with a variety of software applications, including MS Teams, giving you a strong foundation for communication success at an affordable price. 

We could talk all day about the benefits of MS Teams Phone and how it can help you streamline your business communications into a single, easy-to-use platform. 

Navitend can help you.  Call 973.448.0070 or setup an appointment today. 

Sources: 

¹CIO Dive - “The benefits of adding cloud telephony to Microsoft Teams”.  Retrieved from https://www.ciodive.com/spons/the-benefits-of-adding-cloud-telephony-to-microsoft-teams/588165/

²Microsoft - “Teams Phone: Voice and Video Calling - Microsoft Teams”.  Retrieved from https://www.microsoft.com/en-us/microsoft-teams/microsoft-teams-phone.  

³ComputerTech.com - “Why Your Business Should Use Microsoft Teams Phone System”.  Retrieved from https://computertech.com/blog/business-microsoft-teams-phone

⁴The College of William & Mary - “A New Phone System for W&M - Teams Calls”.  Retrieved from https://www.wm.edu/offices/it/announcements/teamscalls.php.  

22
Jun
2022
Best Practices for Using BCC in Business Emails 

Best Practices for Using BCC in Business Emails 

Clear communication is critical for the success of a business, and email is one of the most important tools available. Many of us exchange emails every day with supervisors, colleagues, business partners, clients, and more. Not surprisingly, a Radicati study cited by AIIM International reports that 3.9 billion people worldwide actively sent and received emails in 2019¹. While you may think of email as one-on-one business or personal communication, that is not always the case. You can easily send messages to hundreds or thousands of recipients simultaneously. However, you may not want your whole mailing list to see every single address². 

Enter BCC, or blind courtesy copy³. Though originally known as blind carbon copy when typewriters were standard office equipment, the basic premise has not changed³. With BCC, you can send copies of your emails to interested third parties without the original recipients’ knowledge³. While BCC and CC perform the same basic functions, there are differences between the two². First, when you enter users’ addresses as BCC, they are invisible to all other recipients and do not receive any future replies to your conversation². Second, BCC is ideal when emailing large numbers of recipients, because it reduces the clutter you would have with a CC list². In this article, we will cover best practices for when and when not to use BCC in your company’s email communications. 

(Image courtesy of https://www.geeksforgeeks.org/difference-between-cc-and-bcc)  

One appropriate circumstance for using BCC is customer correspondance². For example, if you send a monthly email newsletter or wish to promote an update to your mobile app, use BCC to keep from broadcasting every recipient’s email address to the entire mailing list². In this instance, BCC helps you maintain your customers’ respect and loyalty². After all, you would not want your customers abandoning you en masse in favor of a competitor. 

While BCC is helpful when emailing thousands of customers at once, it is also practical to use when automating your business processes³. For instance, if you use Salesforce, you can BCC a specially coded email address when interfacing with a client³. When used, this feature sends a copy of the email to your Salesforce account and logs that correspondence to the client’s profile³. Now, everyone in your organization can clearly see what you said to your client³.  This helps streamline your processes, saving time and avoiding miscommunication. 

While BCC is helpful for customer communications and business automation, it also works as a security safeguard. According to the University of Pittsburgh’s human resources department, many viruses and spam programs can easily peruse address books and mail files in search of prospective targets⁴. Therefore, BCC can offer you valuable protection against spam⁴. When you use BCC, it lessens the likelihood that recipients will receive spam messages or viruses from other recipients’ infected computers⁴. This demonstrates the benefits of using BCC in professional email communications. 

Keep in mind that although BCC is helpful in some contexts, you should not use it on every single email. For example, do not use BCC if you think any of the recipients will reply². If you send an email and one BCC recipient accidentally clicks “reply all,” there will probably be some confusion and concern among your To and CC recipients². Since these original recipients “might want to know why you concealed the BCC recipient,” always make sure you have a clear purpose for utilizing BCC². 

BCC is also unacceptable for internal work emails². Even though it may sound harmless to BCC your supervisor or a colleague on a particular email message, this can quickly backfire if the original recipient discovers any negative intent³. For example, whistleblowers might send emails to one party but BCC them to third-party supervisors, in turn creating more problems than they solve³. In short, do not use BCC for internal business communications. 

You must not use BCC for personal emails, either². Since personal email conversations should be respectful and transparent, using BCC in this context suggests that you are deliberately hiding the third party from your recipients². Therefore, you should rely on CC instead of BCC in order to preserve relationships with your professional networks². 

BCC is a useful tool for business communications when used appropriately but can spark misunderstandings and conflict if used carelessly. Remember that a little email etiquette goes a long way. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 


Sources: 
¹AIIM International. “What Are the Best Practices for Email Management?” by Kevin Craine. Retrieved from https://info.aiim.org/aiim-blog/what-are-the-best-practices-for-email-management
²Indeed. “FAQs About When to Use CC and BCC.” Retrieved from https://www.indeed.com/career-advice/career-development/email-cc-vs-bcc.  
³Right Inbox. “How to Use Bcc Appropriately in Email (Ultimate Guide – 2022 Update)” by David Campbell. Retrieved from https://www.rightinbox.com/blog/how-to-use-bcc-in-email
⁴University of Pittsburgh. “Using the Blind Carbon Copy (BCC) Feature in Email.” Retrieved from https://technology.pitt.edu/help-desk/how-to-documents/using-blind-carbon-copy-bcc-feature-protect-privacy-email-addresses
 

16
Jun
2022
Accelerating your Enterprise Wi-Fi with Ubiquiti and navitend

Accelerating your Enterprise Wi-Fi with Ubiquiti and navitend

Wi-Fi plays an integral role in most of our lives, personally and professionally. We use Wi-Fi in our homes, workplaces, neighborhood coffee shops, and even the stadiums where our favorite sports teams play. Not surprisingly, Network World estimates that the global Wi-Fi network will grow by 65 percent to approximately $25.2 billion in 2026¹. With all this growth and no sign of a slowdown, you need a Wi-Fi solution that works for you and your business. 

Enter Ubiquiti. A major player in the enterprise Wi-Fi market, Ubiquiti offers a diverse range of access points and switches for both indoor and outdoor network deployments¹. Their signature UniFi line is geared toward businesses seeking wired and/or wireless network solutions, as well as home users in the consumer market¹. In this article, we will highlight why Ubiquiti’s UniFi line should be the number-one choice for accelerating your enterprise Wi-Fi networks. 

One major benefit of Ubiquiti’s UniFi product range is its affordability. Consider the UniFi AC Mesh, for example. This 802.11ac indoor/outdoor wireless access point with plug and play mesh technology has an MSRP of only $99, making it a budget-friendly choice for companies of all sizes². Meanwhile, the AC Mesh Pro outdoor access point with plug and play mesh technology costs $199, but it is well worth the extra investment². Other UniFi products are similarly affordable, including the wall-mounted WiFi 6 access point at $179 and the WiFi 6 Lite at $99³. This demonstrates Ubiquiti’s commitment to providing businesses with affordable wireless connectivity solutions. 

Another advantage of installing UniFi is its capability to provide you with the high-speed internet you need to grow your company’s operations. The standard AC Mesh offers speeds of 1.176GB per second, while the AC Mesh Pro is even faster, at 1.75GB per second². Meanwhile, the WiFi BaseStation XG has a top speed of 5.2GB per second, making it a natural fit for high-density networks and large venues like sports arenas and convention centers, including the Oklahoma State University football stadium⁴.  

While affordability and speed are key attributes of Ubiquiti’s products, the UniFi line is also designed with customers in mind⁵. For example, companies installing UniFi technologies can set them up quickly and easily without assistance from IT professionals⁵. Also, unlike rival companies which charge licensing and software fees with every upgrade, Ubiquiti provides software and upgrades to UniFi users free of charge⁵. This saves you money so you can focus on what matters most: serving your customers and growing your business. 

UniFi access points are not just fast, affordable, and customer-friendly. They are also stylish and compact. For example, the UniFi AC Flex HD access point measures only 159.44 mm tall and 48.5 mm around, slightly larger than a small soft drink can⁶. Meanwhile, the AC Mesh measures 354x46x34 mm. These sleek units are “aesthetically pleasing to the eye” in any location, be it your home, your office, or a trendy hotel in the center of town⁵.  

Yet another key benefit of Ubiquiti’s UniFi for enterprise Wi-Fi is that it is highly scalable⁵. Even if you start with only one unit and expand it to a network of thousands over time, you can still control every one from a single location⁵. Additionally, with the UniFi Network mobile application, you can enjoy real-time insights for all your devices, upgrade your device firmware remotely, and manage Wi-Fi access points anywhere from Byram to Baton Rouge⁶. UniFi access points are high-density and low latency, with exceptional performance that helps keep your business Wi-Fi running like clockwork⁵. 

Ubiquiti’s UniFi wireless systems have numerous benefits that can help you grow your business. Here at Navitend, we have the wireless network solutions you need to provide an exceptional Wi-Fi experience for employees and customers alike. 

Navitend can help you. Call 973.448.0070 or setup an appointment today. 

Sources:
¹Network World – “10 most powerful Wi-Fi vendors” by Jeff Rochlin. Retrieved from https://www.networkworld.com/article/3657577/10-most-powerful-wi-fi-vendors.html.
²Ubiquiti Inc. – “Ubiquiti – UniFi – Enterprise WiFi Systems”. Retrieved from https://unifi-mesh.ui.com.
³Ubiquiti Inc. – “UniFi/Network/Wi-Fi”. Retrieved from https://store.ui.com/collections/unifi-network-wireless
⁴Ubiquiti Inc. – “WiFi Base Station XG – Ubiquiti Inc.” Retrieved from https://store.ui.com/collections/unifi-network-wireless/products/unifi-wireless-basestation-xg
⁵DoubleRadius, Inc. – “Top 10 Reasons to Buy Ubiquiti UniFi”. Retrieved from https://blog.doubleradius.com/top-10-reasons-to-use-ubiquiti-unifi-system-for-wifi.
⁶Ubiquiti Inc. – “Ubiquiti – UniFi – UniFi Access Point Flex HD”. Retrieved from https://unifi-flexhd.ui.com.

09
Jun
2022
The Power of More: Benefits of Two-Factor Authentication

The Power of More: Benefits of Two-Factor Authentication

It is a routine we follow day in and day out, several times a day. Whether logging into our desktops or signing into apps on our phones, we enter a username and password to gain access. However, that simple combination is not as secure as you think. Also, hacking can bring disastrous consequences. As outlined in IBM’s Cost of a Data Breach Report 2021, the average data breach cost an all-time high of $4.24 million last year¹. Therefore, you need a way to protect your data from cybercrime. 

Enter two-factor authentication, or 2FA. Also known as multifactor authentication (MFA), this process combines multiple authentication factors in a manner that keeps your overall system secure even if one factor is compromised². Here, we will learn more about 2FA and why it matters for you and your business. 

The reasoning behind 2FA is straightforward. While your login information remains the same, there is an extra wall of protection between the login page and the stored data that can prevent hackers from easily gaining access to sensitive information. For instance, you may enter a password followed by an SMS code on your phone to authorize login². This is a common mode of 2FA that introduces enough of an obstacle to deter most hackers.   

Notably, 2FA technologies have gained momentum in healthcare, where patient data is a prime target for cybercriminals³. Indeed, data breaches in healthcare cost an average of $9.23 million in 2021, more than double the average for all sectors¹. However, according to HealthTech Magazine, 2FA has also helped to improve clinicians’ workflow³. Consider NorthShore University Health System, for example. The Evanston, Illinois-based healthcare network implemented an MFA called Confirm ID in 2014³. NorthShore utilizes this system, which integrates a fingerprint reader with patients’ electronic records, to “electronically prescribe controlled substances” for patients as needed³. Not surprisingly, NorthShore staff enthusiastically welcomed this technology³. This shows the growing importance of 2FA and MFA for healthcare providers. 

2FA technologies are also becoming popular in finance. As outlined in Global Banking & Finance Review, Japan’s Sumitomo Mitsui Banking Corporation (SMBC) has implemented a 2FA system called DIGIPASS 275⁴. Integrating security and fraud defense into a compact, user-friendly package, DIGIPASS works in tandem with the VACMAN Controller authentication platform to keep users’ financial information secure⁴. Users enter a one-time password to access their accounts; since these passwords change with each use, hackers cannot steal important financial information⁴. Additionally, since SMBC has approximately 1,550 branches across Japan, DIGIPASS provides thousands of customers with much-needed online protection⁴. 

Although banks and healthcare workers have benefited from 2FA and MFA technologies, these systems are helpful for remote workers in any sector. Chances are that you have been forced to work from home for the past two years due to current events. If you live in northwestern New Jersey, like me, you may also need to work remotely due to inclement weather. Whenever you must work offsite, or you have the choice to do so, 2FA protects your business networks from exposure to malware, phishing, and other harmful activity⁵. In short, 2FA systems make working from anywhere safer. 

Finally, 2FA can pay dividends for brand building. For instance, as outlined in this LinkedIn Pulse article, adding a strong 2FA platform for users logging into their accounts on your company’s website enhances the brand experience⁵. When implemented in conjunction with building ROC – return on conversation – 2FA technologies are an ideal tactic to improve customer relations with your brand and build lasting connections between you and your customers for years to come⁵. 

Navitend can help you. Call 973.448.0070 or setup an appointment today.  

Sources: 

¹ IBM Security – Cost of a Data Breach Report 2021. Retrieved from https://www.ibm.com/downloads/cas/OJDVQGRY

² Security Intelligence – “Multifactor Authentication Delivers the Convenience and Security Online Shoppers Demand” by Pier Luigi Rotondo. Retrieved from https://www.securityintelligence.com/multifactor-authentication-delivers-the-convenience-and-security-online-shoppers-demand

³ HealthTech Magazine – “The Benefits of Multifactor Authentication in Healthcare” by Juliet Van Wagenen. Retrieved from https://healthtechmagazine.net/article/2018/12/benefits-multifactor-authentication-healthcare-perfcon

⁴ Global Banking & Finance Review – “The Security Benefits of Two Factor Authentication.”  Retrieved from https://www.globalbankingandfinance.com/the-security-benefits-of-two-factor-authentication

⁵ LinkedIn Pulse – “The Benefits of Two-Factor Authentication, Part II” by Tyler Dannat. Retrieved from https://www.linkedin.com/pulse/benefits-two-factor-authentication-part-ii-tyler-dannat?trk=portfolio_article-card_title

05
May
2022
Wired for Success: Business Ethernet Best Practices

Wired for Success: Business Ethernet Best Practices

We live in a wireless world.  After all, Wi-Fi is integral to our everyday lives, from our homes to our workplaces and even the hotels where we stay on vacation.  However, it has its limits.  For example, poor Wi-Fi connections in a hospital are a major obstacle for medical staff who must deliver care promptly and efficiently¹.  Notably, any delays in retrieving a seriously ill patient’s medical records from a mobile terminal can literally spell the difference between life and death¹.  Now, you may be asking, “Do I still need wired internet and/or ethernet connections for my business?” 

The answer here is yes.  Even with Wi-Fi, you still need a wired infrastructure in place to support your wireless access points, plus your company’s other internet activity¹.  In this article, we will cover a few best practices for installing business ethernet. 

First, you must select the type of cable you want installed.  You have plenty of options at your fingertips, from category 5e cable with top speeds of 1GB to state-of-the-art category 8 cable, which offers 2,000 MHz of bandwidth and lightning-fast transmission speeds of 40GB at up to 30 meters in length².  It is best to install the highest-speed cables available, in order to accommodate future bandwidth increases.  With new technologies coming to the forefront in recent years, including the Internet of Things (IoT), along with virtual collaboration tools like MS Teams, you must have the bandwidth necessary to handle this increased workload³. 

Even with speed and bandwidth demands growing larger every day, you may still use obsolete cables dating back to the 1990s.  As outlined by Techwalla, Category 3 cables are still popular with some users because of their lower costs compared to newer ethernet connections⁴.  However, they do have their limits⁴.  Category 3 only has a top speed of 10 MB per second, while the slightly newer Category 5 cable can support speeds of 100 MB or greater⁴.  Nevertheless, both Cat-3 and Cat-5 are far below today’s standards⁴. 

Of course, if you still use either of these outdated systems, you will need to replace your business ethernet entirely.  This is also true if you currently run 1GB network equipment but plan on switching to 10GB⁵.  In this case, you must upgrade to at least Cat-6, which can handle the higher speeds⁵.  However, standard Cat-6 cable is not ideal for every business⁵.  If your ethernet runs all exceed 55 meters in length, you should use Cat-6A ethernet cables instead⁵.  This demonstrates the importance of staying ahead of the curve regarding future speed and bandwidth increases. 

Another factor you must consider is where to run your cables.  You must never run cables alongside electrical wires⁶.  The reasoning here is simple: data cables are comprised of twisted pairs of wires, which generate a magnetic field⁶.  If this field is disturbed in any way, the cable will not perform exactly to your desired specifications⁶.  Also, you if run your ethernet cable outdoors, make sure that it is CMX-rated, or suitable for outdoor installation⁵.  If it is not, you must replace it with cable that is CMX-rated, to prevent “serious risk of damage due to exposure” to sunlight and seasonal changes⁵.  

While the type and location of your ethernet cables matter, you should not overlook cable length.  Although you may be tempted to install unlimited amounts of cable in your office, this is impractical⁶.  If you use a standard network cable, it will only provide you with the best performance up to 90 meters or 295 feet in length⁶.  Running these cables for a longer distance can lead to declines in network performance over time⁶.  This degradation slows down your business processes and can ultimately be detrimental⁶.  Therefore, if you need to run ethernet across longer distances, you must invest in cables capable of managing that length⁶. 

Finally, whether you are installing ethernet for the first time or upgrading an existing network, safety is key.  Even if you try to make your network impenetrable, it is not 100 percent safe from hackers⁷.  Therefore, you must take all the necessary steps to keep hackers at bay⁷.  Make sure that all your business’s ethernet ports are in areas that only your employees can access, like a locked cabinet or closet⁷.  Doing so will save you the time, money, and stress associated with malicious network attacks. 

Sources:  

¹Network World – “What are the best practices when cabling for Wi-Fi?” by Dan Peyerle Barrera.  

²Digital Trends – “How to choose an Ethernet cable” by Jon Martindale.  

³N-able Solutions ULC – “How to Design a Network: Design Best Practices”. 

Techwalla – “Cat 3 vs. Cat 5 Cable” by Gary MacFadden. 

trueCable Inc. – “When Should I Replace Ethernet Cable?” by Don Schultz.  

OutsourceMyIT – “5 Tips for Successful Network Cabling Installation for Small Businesses”.  

CyberDot Inc. – “Small Business Best Practices for Wireless Security”.  

10
Mar
2022
New Jersey banning single use bags

New Jersey banning single use bags

The State of New Jersey is banning single use bags. Obstacle or Opportunity?

First, some background.

The United States is increasingly moving to put environmentally-minded ambitions into action with the most notable impact being the availability of drinking straws at your favorite restaurant and banning those ubiquitous plastic bags from the supermarket. The bags not only help bring your groceries home, they double as garbage bags for your car, trash bags for the hall bathroom, and of course, essential equipment for picking up after Fido on the morning walk..

As with most topics, there are really good people on all sides of these hotly debated issues. Regardless of your personal views, these changes are coming. Some of the changes are by practice with eco-minded eateries acting on their own to limit the availability of drinking straws and other changes are taking place by top-down edict, such as in New Jersey.

Locally, navitend is partnering with local sports clubs to procure a number of branded shopping bags to not only meet the need of preparing for this bag ban change on May first, but also using the opportunity to help the clubs raise some much-needed funds to support their respective programs. The bags will have the logos of the participating clubs printed on the side, along with navitend's logo. We're hoping for a friendly take-over of the local ShopRite with orange shopping bags!

At present we have the following clubs participating in our collaborative fundraiser:

Hobb Engler Baseball and Lenape Blazers Softball

Lenape Football and Cheer

Lenape Soccer

Lenape Hoops Basketball

Lenape Lacrosse

If you want to participate contact your club organizer for a link to the online order form.

09
Feb
2022
Measuring to Manage

Measuring to Manage

You've probably heard this line before: "You cannot manage what you do not measure". Simple, but not always easy.

Measuring things in order to manage them makes a lot of sense.

We have speedometers in our cars.

We have battery indicators on our phones (and cars as the world goes electric).

We have scoreboards at the ballpark.

And of course there are many other examples in our day to day lives where keeping score matters.

So, in business, how do we begin measuring things?

Some software packages include a "dashboard" which provides an at-a-glance view of the important aspects of what is important to the software vendor. Some of those items are presumably of importance to us -- particularly if the software vendor does a solid job of understanding their target market.

In our IT help desk business, navitend tracks a number of metrics to better serve our clients, including but not limited to:

Response Time -- how quickly are we responding to our client's requests for service?

Resolution Time -- how long does it take us to solve an issue?

SLA -- Percentage of Tickets serviced in accordance to our target Service Leval Agreement (SLA).

End Points/Tech -- Number of computers and users serviced per technical team member.

Utilization - how much of our team's time is being used?

Realization - how effective is our team's time being used?

Cash Received -- did any new funds come in today, because this can never be neglected!

There are others, but these are the primary metrics we pay attention to as they are substantively client-experience focused and serve to help us keep our business healthy.

Many of these data elements come from our primary customer engagement software and others from our accounting software.

Due to the disparate data sources, we leverage the encouragework.com platform to help manage, organize, display and share these Key Performance Indicators (KPIs). We are able to automate the collection of this data, which reduces the effort in this process.

Here are some tips for getting started with KPIs.

Start with just a few.

Imagine you are on vacation and would like to know "how the business is doing" as quickly as possible and would value not getting stuck on a long phone call with the office. You also do not want to have to connect to the office and lookup the information yourself -- some vacation that would be! Imagine you could have someone on your team text to you a handful of numbers and they would tell you all that you need to know.  What woud be in that text message? Whatever first comes to mind should be your starting point for your KPI list. 

From time to time, you will have intuition that a particular piece of information would be helpful for improving your leadership and management experience. Getting the data may be costly in terms of time but investing too quickly in automation may not be the right move early on. Not to worry. Here is what we recommend:

Define the KPI, giving it a name and a description. Think about this value. Is it a Leading Indicator or a Lagging Indicator?

A leading indicator means that this data portends future outcomes. An example of a leading indicator might be the number of marketing touchpoints established in a time period. This activity preceeds subsequent steps in a sales funnel including sales calls and proposals. The more touchpoints established, the more proposals, generally speaking.

Financial KPIs are often lagging indicators as they tell a story about a prior time period.

Once you have your KPI defined, start tracking it -- even "by hand" if you need to do so. Record new values as frequently as you can, ideally daily or weekly, though sometimes a longer time period is appropriate.

Spend some time with the data and see if having that information at your fingertips really makes an impact on how you manage the business or how your team executes. If the newly created KPI does not have an impact on your thinking, your management decisions, or the production of your team, then do not hesitate to discontinue working with the KPI. Howver, if the data provides solid insights to the operation of the business, then you can invest in subsequent automation, as necessary.

Sharing data is a very important aspect of success with KPIs. We like to speak in terms of "stakeholders". Every organization has stakeholders and different KPIs will be appropriate for different stakeholders. For example, many operational KPIs are appropriate for your team members. Financial performance KPIs are relevant for investors. Client experience KPIs are relevant for your clientele.

In addition to the encouragework.com platform which we utilize, there are many good KPI platforms available. Some are available with many data integrations to ease your automation steps. 

Lastly, give KPIs some time. It can take a number of months before some KPIs really help provide insights into your organization. Don't hesitate to give us a call to talk about KPIs for your business, or more generally how technology investments can help your business advance.

24
Jan
2022
Security risks are deeper than you think

Security risks are deeper than you think

Malware was recently discovered in the firmware memory of motherboards.

According to researchers at  Kaspersky, firmware on motherboards is susceptible to compromise. What makes this kind of vulnerability so challenging is that this layer is "below" the hard drive. This means that even formatting your hard drive would not eradicate the infection! This kind of attack is known as a "boot kit". It is so named because your computer relies upon hardware and firmware layers to get your computer started, or commonly referred to as "booted".

Here are the basic steps your computer goes through when it boots.

Hardware powers up.

Very low level code is initiated to extract firmware from on-motherboard non-volatile memory chips known as EEPROMs. Non-volatile means that the data persists even without power.

This code is used to interact with your hard drive, which subsequently begins the process of getting your computer operating system running.

When we think of security, we often speak in terms of Confidentiality, Integrity, and Availability.

In this case, the integrity of the code running on this lowest level has been compromised to become a vector for a subsequent step in a more sophisticated attack.

The best defense against this sort of attack is diligence around the integrity of the images of firmware (UEFI) on your motherboard. This is a daunting task.

If you have highly confidential data or if you rely on your computer to run your business, consider getting professional assistance.

13
Jan
2022
Next Generation Firewalls from Sophos and navitend

Next Generation Firewalls from Sophos and navitend

Cyberattacks can spell disaster for small businesses. According to a 2019 CNBC article, forty-three percent of all cyberattacks are aimed at smaller companies. 

Sadly, only a minority of small businesses have the defenses they need to protect themselves against attacks. Further, on average, cyber attacks can cost hundreds of thousands of dollars and a majority of these businesses are forced to close their doors forever within six months.

The best practice in defending against these kinds of attacks requires employing a "defense in depth" strategy which involves "layers" of security. In addition to tactics such as end-user training, end-point protection, vulnerability management, the Next Generation Firewall has become a mainstay in progressive network security architectures.

While the "firewall" has been a mainstay in the security world since the 1980's, traditional firewalls often fall far short of identifying and preventing serious network threats. The gaps in the traditional firewall have led to the industry demand for more functionality in a single device -- meet the Next Generation Firewall (NGFW).

As outlined in this Network Computing article, Next Generation Firewalls (NGFW) offer many advantages including features such as: intrusion protection systems (IPSs) and integrated intrusion detection systems (IDSs). These functionalities help protect users by detecting cyberattacks based on “behavioral analysis, threat signatures, or anomalous activity” within a network's traffic flow. 

A major benefit of next-gen firewalls is that they deliver comprehensive network protection in a single convenient package. Traditionally, assembling the capabilities offered by a NGFW would require a stack of special-purpose appliances for each type of threat. Today, it is not uncommon for a NGFW to provide spam filtering, antivirus protection, deep packet inspection, and application controls in a single device. This not only saves you money, but more importantly, it gives you much-needed peace of mind. On a practical note, installing a single device in your networking rack or closet is much easier than a stack of devices, each with their own power supply. In fact, many years ago Cisco devices required service contracts due to the propensity of their power supplies to fail. Many a late night was spent replacing expensive Cisco equipment!

Another benefit of Next Generation Firewalls is that they give you access to cloud management services, so you can easily manage multiple firewalls simultaneously. Consider the Sophos XGS line of firewalls. Sophos XGS users can utilize the capable Sophos Central management platform, which helps network engineers keep track of every firewall they have under management. 

The cloud-based Sophos Central maintains log data from each NGFW while also providing flexible, easy-to-use reporting tools that engineers analyze and visualize their network over various time-frames. Analyzing traffic from a single day up to several months enables useful insights to network traffic flow. 

Sophos XGS firewalls are equipped with application control and Quality of Service (QoS) features, giving engineers enhanced visibility and control over thousands of applications, based on key factors such as risk and application category. Sophos also gives XGS users access to Synchronized Application Control, which “automatically identifies all the unknown, evasive, and custom applications” on their networks. XGS firewalls use built-in deep learning technologies and advanced intrusion prevention to protect the network.

A common strategy of attackers is to gain access to a single node and then move "laterally" to other nodes on the network. The XGS’s automatic threat response technology can detect compromised systems and move to isolate the node from the network, thereby protecting the rest of the network. This dynamic and proactive functionality helps prevent data breaches and impedes the lateral flow of malicious information.

We could talk all day about the benefits of the Sophos XGS NGFW, particularly when deployed in conjunction with XDR endpoint protection. We have the solutions to help keep your business secure.

01
Jun
2021
Leveraging your Mobile Hotspot

Leveraging your Mobile Hotspot

You're out and about and have some time between meetings. Or, if you're like me, you've just brought your son or daughter to soccer practice and decide that it is not worth driving back and forth, only to net 20 minutes back at the house and you want to get some work done in the car. Yes, I know, I am sure you've never done this, I am the only one, right?

How do you access the internet?

Well, you have basically a few options.

First, you might consider "borrowing" someone's WIFI. Well, that is so 2010. While you may have gotten away with that a number of years ago, it is bad form today and outright silly, not to mention unsafe. While most wireless networks are "secure" meaning you need the password to get on to the network. If you do find a network which is "open", you should beware as it may be open for a reason -- to sniff the data you send in an effort to steal information. Side note -- it is just amazing how many WIFI connections are available when you're on vacation visiting the grandparents in Florida! There is sometimes that temptation to just get in and get out quickly, what harm could it do, right? Wrong. Don't do it.

There are many Hotspots available from internet service providers (ISPs). These are a "benefit" of being a subscriber -- you can get high-speed access from your cable company while on the go. While this is not an outright "bad" idea, you are vulnerable to "fake" networks and "man in the middle" attacks. This is where the network you *think* you are connecting to is not really the ISP's network but someone who is proxying the traffic and all the while helping themselves to your data. This is kind of like those "skimmers" that read your debit card at the ATM at the truck station just off the highway. Everything works fine, but someone snagged your information and by the time you realize something is wrong, you've been victimized. However, the stakes are actually much higher when someone gets between you and the Internet because you just never know when, or if, your information has been accessed.

 

In all cases you are better off using your own mobile device -- either a dedicated personal hotspot device or just your handy dandy cell phone with "tethering" enabled. 

While we never know 100% of the hops our data makes on the Internet, using your own mobile phone has a couple of advantages. First, it is in all likelihood, ALWAYS with you. We spend more time with our phones than anything else, so we have the advantage of being able to access our personal device's internet connection just about any time. You can have your laptop "remember" the network, so connecting is a breeze. If you want to share the network with a family member or a friend, it is as easy as sharing a password. (note to self, you may consider changing your password from time to time...story for another day).

Regardless of where you get your internet access from, you will want to do a couple more things.

First, enable the firewall on your computer -- there is no good reason to not have this security feature enabled.

Second, make sure that any place you visit on the web is secured using a digital certificate. A digital certificate provides protection in two ways. A digital certificate gives you more confidence that the site you are visiting is indeed the site they are claiming to be. Your browser will usually let you know if there is something wrong with the digital certificate. Plus, the communication exchanged between your laptop and the site is encrypted. Safe computing involves many steps. To learn more, see our posts on VPN, firewalls, and the three A's of Information Security -- Authenication, Authorization and Auditing.


 

01
Mar
2021
Four Reasons You Are a Target for Hackers

Four Reasons You Are a Target for Hackers

Two thirds (66%) of companies with fewer than 1,000 employees have experienced a cyberattack, and 63% have experienced a breach. These statistics make it clear all businesses need a solid cybersecurity strategy. Be it ransomware, DDoS (distributed denial of service), phishing or some other threat, there is no shortage of cyber threats targeted at small businesses.

Small and medium-sized businesses don’t have the deep pockets that enterprise organizations do.

So why are they such a target for hackers?  

  1. Your valuable data

Hackers know that even a smaller company has data that’s easy to offload for a profit on the Dark Web such as medical records, credit card information, Social Security numbers, bank account credentials or proprietary business information. Cybercriminals are always trying to come up with new ways to steal this data. They either use it themselves to get into bank accounts and make fraudulent purchases or sell it to other criminals who will use it.

  1. Your computing power

Sometimes cyber hackers are interested only in using your company’s computers, and enlisting them into an army of bots to perpetrate massive DDoS attacks. DDoS works by artificially generating enormous amounts of web traffic to disrupt service to a company or group of companies. The hijacked bots help generate the disruptive traffic.

  1. Your links to the big fish

Today’s businesses are digitally connected to each other to complete transactions, manage supply chains and share information. Since larger companies presumably (although not necessarily) are tougher to penetrate, hackers target smaller businesses as a way to get into the systems of large companies. This is what happened in the Target breach.  https://krebsonsecurity.com/2014/02/target-hackers-broke-in-via-hvac-company/

  1. Your cash, pure and simple

Hackers target small businesses or any other company primarily for profit. Sure, some attacks are about disruption, as is the case with DDoS, but usually, the motive is to make money. This explains why ransomware is such a popular method of attack. It often succeeds, generating revenue for attackers. And as long as an attack method proves lucrative, hackers will keep using it.

7 of the Most Current Threats

Enterprise organizations have entire teams devoted to handling cybersecurity.  For small and medium sized businesses someone who likely wears many other hats in the day-to-day operations of the business are handling cybersecurity. That makes these businesses particularly vulnerable to hackers.

A cybercriminal only needs to be right once

To achieve peace of mind in the modern threat landscape, small and medium sized business owners need to have a solid security strategy in place. That kind of preparedness starts with a solid understanding of the current threats:

Phishing

Often providing a gateway for ransomware or other infections, phishing typically works by tricking users into clicking an email attachment or URL containing a virus. Phishing has become more and more sophisticated, and it can be incredibly difficult to spot a fake message as hackers target specific individuals with messages they can’t resist.

Ransomware

Hackers use a wide range of methods to target businesses, ransomware being one of the most common. Ransomware locks up computers and encrypts data, holding it hostage. For owners to regain access to their data, they have to pay ransom to a hacker who then releases a decryption key.

Malvertising

Short for “malware advertising,” this consists of delivering malware to a network after a user clicks on an apparently legitimate ad. Identifying malvertising isn’t easy because of the way it’s disguised, but some advanced malware detection systems are getting better at it.

Clickjacking

Similar to malvertising, this practice involves hiding hyperlinks to compromised webpages in legitimate website links. Users are then asked to reveal personal data that hackers steal for nefarious purposes.

Drive-by-downloads

This dirty trick downloads malware into networks, often without users realizing what is happening. Sometimes users have to respond to a pop-up window for the download to occur but other times all you have to do is unwittingly visit a compromised website.

Software vulnerabilities

Hackers exploit vulnerabilities in different web platforms and tools will deliver the  malware. Falling behind on updates can leave systems particularly vulnerable.

Any organization that neglects cybersecurity is taking a huge risk 

And as businesses grow more and more interconnected, those risks extend to customers, partners, and suppliers.

To ensure peace of mind and protect against costly malware, ransomware, and bots, all businesses need to implement cybersecurity measures that include anti-virus programs, firewalls, and network security solutions that proactively protect all devices connected to your network.

01
Mar
2021
Reasons IT Help Desk Support is Beneficial For Growing Businesses

Reasons IT Help Desk Support is Beneficial For Growing Businesses

Our customers, partners or users who are in need of IT support at any-time, anywhere and any place can easily reach out to the dedicated IT technician via telephone, email, and our website.

Nobody likes to wait…

Our 24/7 IT support team offers assistance allowing every client to have their issues resolved with proper assistance and clarity.

Our goal is customer satisfaction everytime.  We provide IT support to our clients when they are in absolute need 24/7.

Our 24/7 Help Desk offers:

Cost-effective Strategy -There is no doubt that your IT costs/budgets will be less. Hiring navitend as your IT support provider there will are no hidden costs. Additionally, clients receive stable proactive support and maintenance from the service provider end.

Unlimited IT Support – Each problem/call is assigned a unique ticket allowing the help desk portal available for each customer. Using the ticket system, our clients can reach out to get their issues resolved. A dedicated IT support team will always be monitoring the incoming tickets to help resolve the issues then and there.

Vendor Management - Through strong vendor partnerships, navitend delivers the hardware, software and cloud services you need, all backed by exceptional support. We’ll ensure regular maintenance is done in accord with licenses or warranties, and streamline tech support requests to ensure you’re not left in the dark and get fast resolutions.

Reduced Downtime –A proper IT infrastructure is essential for any business. Infrastructure is like a domino. If your infrastructure gets a hit, then the impact would be really worse. navitend’s 24/7 IT service provider helps design your IT infrastructure so it will increase employee productivity focusing mainly on minimizing the IT downtime.

Multiple Communication Mediums –The main aim of providing 24/7 IT support is to offer customers, partners an easy way to communicate the IT support team on reporting the on-going issues and to troubleshoot them

Flexibility – Considering your business could have customers around the globe, and you may provide your services to them for various time zones, navitend’s 24/7 IT support service plays a major role. We know that your customers expect 100% service delivery from you and their requirements must be met at any cost.

Having a 24/7 IT support service is invaluable

There are perks of having navitend’s 24/7 IT service provider as we are available even on public holidays and do not leave you without assistance.

Stability and minimize recurring issues

Sufficient resources to provide timely service

A dedicated team providing rapid response times

We constantly monitor your networks and detect vulnerabilities underlying before they cause any potential damage and our continuous monitoring services safeguard your network and infrastructure from cyber risks and threats.

20
Feb
2021
4 Ways to Work Remotely and Not Sacrifice SAFETY Along the Way

4 Ways to Work Remotely and Not Sacrifice SAFETY Along the Way

Cyber Security used to be considered CIA (Confidentiality, Integrity, Availability).  We need to be thinking of this as CIA+S, where S is for safety. 

How is my data kept confidential? How is the Integrity ensured? Are audit logs maintained to demonstrate the claims of integrity? If my data is available, how do I make use of it? If there is a backup of the data, how long until I can access the information? Read more about CIA here.

These concepts are as valid as ever, but there is an even more important idea we need to bring into the dialog -- Safety.

Ever click on a link in an email accidentally?

We often think of security as a perimeter, and then once you're on the inside, all is good. But that is a flawed assumption. An unauthorized user, or even perhaps an ignorant one, can cause damage. We have all been ignorant users at some point in our journey ( at least I have been ).  Ever click on something accidentally!?

Sometimes I sound like a broken record.  I've said this time after time.  Business leaders need to continue to educate employees about data security and how everyone is responsible for protecting it.  Keeping it safe!

Business owners also need to initiate certain practices and procedures that will strengthen data security within their businesses.

Remote workers must prioritize data security education and safe practices, then commit to those measures.  The responsibility is the business owner and the employee.  

5 ways to work remotely and not sacrifice security/safety along the way

1. Ensure all internet connections are secure and employees are using VPN (Virtual Private Network) before signing on to public Wi-Fi networks.  

2. Keep Passwords strong and unique and use a password manager.  Password safety is no joke, using the same password from device to device and program to program opens up a huge risk to your data and sensitive information. 

3. Rely on Two-Factor Authentication (2FA) which confirms a user's identity by first requiring a username and password as well as another piece of information such as an answer to a "secret question" or a code sent to their cell phone.

4. Use encryption software to protect employees devices.  If a device is lost or stolen the sensitive data or information can not be accessed by unauthorized users.

5. Update all firewalls, anti-virus and anti-malware software especially if you are allowing employees to use their personal devices (BYOD) for work.  Personal devices do not have the same level of protection installed. 

Remote work does not have to jeopardize data security. Once remote workers are educated and these top cybersecurity procedures are implemented, they can quickly become standard practices that everyone in a company can commit to with ease — and everyone within the organization can feel confident that they are doing all they can do to protect the security of their employer’s data.

Remember, all employees don't have the same level of technical expertise, so any organization concerned about their data security should be prepared to offer technical support help. Feel free to reach out to navitend if you are looking for additional technical support.

19
Feb
2021
Your SaaS Data is Under Attack - New Webinar

Your SaaS Data is Under Attack - New Webinar

Microsoft 365 and G-Suite have been crucial collaboration tools allowing businesses to stay productive even as their workforce is working from remote locations.

The issue is that many of these businesses have fallen into a false sense of security believing the data that lives in these tools does not have to be protected.

The truth is, the criminals will follow the data wherever it lives, meaning all of your business data must be backed up.

In this webinar you will learn:

1. What is the Shared Responsibility Model?

2. In what ways is SaaS data lost?

3. Current cyber security threats.

4. Ways in which this data can be protected.

19
Feb
2021
Pin a chat in Microsoft Teams

Pin a chat in Microsoft Teams

Keep important converstions top-of-mind and easy to get to! 

Learn how to pin a chat in Microsoft Teams.

Please subscribe to our mailing list to receive more great "How To" tips.

 

 

<--

-->

Contact us if you have questions or need help with your IT Support.

Subscribe to receive more Info Tech Tips

Subscribe to our YouTube Channel.

Find us:

Facebook 

Instagram 

LinkedIn

Twitter 

Book an appointment

RESOURCES & LINKS: 

More Great Videos

Sound by https://www.zapsplat.com

Contact us at 973.448.0070

Testimonials

  • I wanted to personally thank Corey for always helping me with any concerns I have about my software inquiry issues. He is quick with his responses and I am always up to date with all my connectivity. Always a great experience! Thank you!

    Blerina
  • Corey was outstanding today in the services he provided - efficient, professional, knowlegable, kind, and understanding with someone who has no clue about computers. Thank you! 😊

    Mertie
  • I appreciate that they didn’t just build the application. They made it better by bringing ideas to the table that not only made for a better user experience, but also kept the development costs down.

    Andy
  • This company is the best! I feel for the guys that have to help us who are not so tech savvy! Never have I been disappointed at the great service navitend provides! Corey was especially helpful and I highly recommend Navitend for all your IT needs! You will be extremely satisfied!

    Kathleen
  • Rick dedicated 2+ days of helping my facility with the install of new printers. This team is fantastic!

    Lori
  • Our company uses navitend for all of our IT needs. Rick and team worked for many hours today repairing an issue they had never seen before. With a project deadline of 5pm today, they were able to figure out the issue and get me back to work. The persistence, urgency and professionalism are 2nd to none. Thank you!!

    Matthew
  • Corey was an amazing support while getting me set up on my computer. He was very sweet and patient with me, considering all the time it took to get me set up. Thank you Corey!

  • JP and Corey are always so helpful!

  • Anthony was very helpful and solved all my issues promptly. I appreciate all his hard work. Thank you navitend and Anthony.

    Kyle
  • Navitend is a professional, responsive, and knowledgeable organization. They go above and beyond for their clients. The other day Corey Feinsod, one of their Network Technicians, helped resolve a challenging technical issue I experienced working remotely. I appreciate that their team finds value in customer service.

    Cheryl
  • We've dedicated our lives to growing our retail and ecommerce business and it's a relief to have found a company like navitend who treats our business likes it's their own. navitend's personal approach to project management and problem solving are top-notch.

    Stamatis, Co-owner Twisted Lily, Fragrance Boutique and Apothecary
  • navitend has been a great IT partner for our company.  Their helpdesk response time is the best I have experienced in my 30 year career.  navitend has helped me to have great IT services without the need to have a full time, in house, technician at significant savings to our company.

    Bob
  • navitend’s expertise helped our firm over the past year to effectively elevate our I.T. game, powering our website into a highly interactive tool. Well done to Frank and his team!

    Chuck Steege, CFP®, CEP, President, SFG Wealth Planning Services, Inc.
  • De'Ana gave great insight on billing issues. I recommend navitend for all IT services.

    Christian
  • Best costumer service!! They are the nicest and most patient people. I highly highly recommend!!!!

    Stephanie
  • I have been working with navitend for 10+ years. Great group of talented professionals!

    Anne
  • navitend has been a life-saver many times for me! They are diligent in troubleshooting problems - until they resolve it. I've worked many times with Corey and he is fantastic - I can count on him to fix all my Outlook and computer problems. Overall, I highly recommend navitend.

    Bob
  • I am truly impressed by the focus the team places on the requests from our company. Truly an excellent team!!

    Josefina
  • Very nice guy and very good service from Corey navitend at Bon Chef.

  • The team over at Navitend always takes care of my IT needs. They are quick to respond and patient, no matter how simple my question or need.

    Jeremy
  • Thanks so much!  You are a class act!  
    You and your team have really done an excellent job on this!

    Steve The C12 Group in Houston, Texas
  • 100% of all expectations met. Don't just consider navitend, choose them and get back to YOUR mission!

    C Baker
  • I look forward to working with you again in the future. Once again, thanks to your organization for your prompt response.

    Luke
  • AMAZING!!!! Every time I have an issue or question, navitend responds promptly and professionally. Each time I deal with one of their support technicians, I am always grateful for how quickly an issue is resolved and how courteous the staff is. I cannot recommend navitend enough!!! Wonderful support in a day and age when customer service can be challenging.

    Jacqueline
  • I recently had to work from home for the first time, and Corey at navitend provided EXCELLENT service. He was patient, kind, and followed through on all the details!

    Penny
  • Corey came to my rescue by getting Quick Books working for me. He is excellent at what he does. Very knowledgeable in the Tech field. I don't know what we at Equity Environmental would ever do without him. Thank you Corey!!!!

    Lucille
  • navitend was great and my experience was beyond excellent. Very professional, courteous, and responded in a timely manner. They go above and beyond for their clients. They are a pleasure to work with. Kudos to the navitend Team - keep up the great job!

    Ann
  • navitend has gone above and beyond my highest expectations. Anthony was great! He was able to coordinate with an Adobe Rep and resolve issues that I had just put too much time into. Thank you again - It was a real pleasure working with you!

    Forrest
  • THE BEST!! I've never felt compelled to write a review for any service until having the pleasure to work with navitend. The professional and supportive staff make an often frustrating technical situation, dare I say, enjoyable. They always go above and beyond to find answers to unique problems. Their response time is unbelievably fast. I could not more highly recommend!!

    Stephanie
  • I highly recommend navitend for their professionalism, integrity, down-to-earth advice and thoughtful recommendations. Every solution that they offer is unique and the most appropriate to their customers' needs.

    Paula
  • We have used Navitend for many years. They are always very responsive and helpful. If you are frustrated with your current provided, you should definitely contact Navitend.

    Robert
  • Thanks so much again for taking care of everything in such an expedient manner. It's a pleasure to work with navitend and its staff as always!

    Lawrence
  • I just had an excellent experience with Navitend! I got a new computer and I needed Microsoft Office installed and access to an additional e-mail account. The navitend team was so professional, polite, and patient with me. I am not technologically savvy at all, so they were doing all that they could with the little bit of information that I gave them. They spent over an hour trying to help me. They went above and beyond in assisting me and I was able to get everything installed that I needed. The navitend team is doing a great job!

    Denise
  • navitend has consistently offered timely, professional, and courteous solutions to our business needs ranging from troubleshooting, purchase and setup of new computers and other advice. They are my 'go-to team' and continue to be a trusted support in our time of need.

    Laurie
  • My firm has used navitend for our IT needs for over 10 years and we are highly satisfied. We’ve found the navitend team to be professional, friendly, and, knowledgeable. They are sensitive to our changing IT needs and the shifting compliance landscape within the financial services industry. We recently completed a server migration and had the pleasure of working with Tony & Andrea who handled the project extremely well, ensuring a smooth transition. We are pleased to call navitend our trusted IT partner!

    Kristin
  • Corey is always a huge help when I need assistance. Gets it completed quickly and successfully. Thank you Corey.

    Fran
  • navitend is a professional IT organization that I would recommend to my clients. Navitend builds strong relationships with their clients to better understand their needs. Navitend is community focused and does work to support local charities. Overall a great company.

    Michael
  • Corey is ... an IT genius!!!! This man deserves a major raise and weekly bonuses!!! navitend is my go to for everything IT related, morning noon night and weekends!!! Love this crew!!

    Heather
  • Great experience with this IT company! The team was professional, efficient, and easy to work with. A special shoutout to Corey—he was especially helpful and went above and beyond to make sure everything ran smoothly. Highly recommend!

    Jordan
  • Corey has been very helpful! Response to my concerns are always prompt and he makes it easy for me to understand exactly what he is doing. I am very grateful for his help!

    Sue
  • I have done business with navitend for 10+ years and have found their products and professionalism to be 1st rate. And, from a “service after the sale” perspective … even though my company is California based, my customer experience couldn’t be better. Frank Ableson and his team are top tier professionals. Proud to be one of their customers!

    Bryan
  • I cannot say enough about navitend's expertise, customer service, knowledge and professionalism! They have been a great partner with our company for all of our IT needs.

    Margaret
  • navitend’s approach to customer service is greatly appreciated here.  Ensuring that we are well protected from a technology standpoint provides us with peace of mind to continue our day to day operations and that they are looking out for our company's best interest. 

    Debbie
  • Everyone at navitend I have worked with has offered some of the best customer service I have had. They are patient, knowledgeable and somehow remember my and my colleagues' names. After working with other IT support, I am thrilled my organization is using their services.

    Robyn
  • navitend has been great with me and my colleagues as we go through a difficult transition to new technology! They are incredibly patient and helpful. I highly recommend them.

    Molly
  • Our company uses Navitend for all its IT needs and every time I've had to ask them for help, they've fixed the issue within hours. Thank you so much!

    Chase
  • Corey helped me with what I thought would be a minor problem that snowballed in to some complex computer world wizardly stuff and he was so smooth and calming and had it fixed in 15 minutes!! YES!!!! Tuesday crisis averted!!

    Kari
  • navitend is always providing prompt response, strong technical skills and excellent customer service. Corey, Jeffrey and the other technical support team members are very helpful and user-friendly. Thank you all very much for your fabulous work!

    Chenghan
  • Corey is the best there is at his job! He fixes everything with no problem. It's amazing to have someone to trust. GO COREY 😊

    Grace
  • This IT firm has been extremely patient, helpful and professional and they are immediately available to troubleshoot and solve problems whenever they arise. Highly recommend them!

    Kathy
  • Navitend has been our IT provider for many years and we are so grateful for their hard work. Nate and Vin especially deliver exceptional service and great communication. We highly recommend Navitend for your IT needs.

    Behavioral Health Client
  • The staff at Navitend is very professional and strives to meet the needs of their clients. As a Small Business owner trust and professionalism are keys to conducting business. navitend sets a high standard of ensuring their clients trust their decisions are for the interest of their business.

    Christopher
  • Thank you to Anthony at navitend for the time and effort he put into trying to resolve the issues my laptop was experiencing. I so appreciated his tenacity, professionalism and good humor as we tried (and tried) to figure out a solution. Anthony made sure I understood what was happening at all times, explained things thoroughly and followed up when promised.

    Maria
  • These folks are spectacular! They're contracted by my work to provide IT support, and they are SO responsive that my mind is blown every time! Just a quick email to request help, and I immediately get a response for a patient and friendly person to call me and walk me through the solutions.

    Hannah
  • We wholeheartedly recommend navitend for their exceptional IT solutions and services; they have undoubtedly earned our trust and loyalty for future endeavors.

    Benjamin
  • This company provides IT service for my firm. They respond quickly and have always helped me navigate and fix whatever issue I am having. Corey, Jay and others - and others - all are excellent. Highly recommend.

    Nancy
  • My customer service experience with navitend was absolutely amazing. My computer crashed and we needed to order a new one. navitend was there to help and get us a new computer and set it up from start to finish. The tech Corey that came out was very pleasant to work with. From start to finish he made sure that all of my programs were working properly again from my old machine. I even had follow-up phone calls from him making sure I was happy with how everything was set up. I have never experienced such exceptional customer service.

    Brian
  • Their support staff is beyond good. They sorted out our company email server migration problem yesterday in record time. It's great to work with a team that has expertise in depth. There are so many one-man-bands out there. It was a good decision to go with the pros.

    Steve
  • Over the years that Navitend has been supporting my network and hosting our web site they have always been responsive, professional, and highly skilled. On a few occasions, I have turned away other vendors that have tried to get their foot in the door. Very satisfied.

    M B
  • Their technicians? Unsurpassed, each and every one of them. They make me and my co-workers feel as though they are just sitting in their office waiting for us to call them with a problem so they can solve it right away. They treat us as if we are their only client. Talk about great customer service. Call them, you'll be glad you did.

    Kathy
  • The tech's at navitend are very knowledgeable and thorough. Corey was patient and kept looking into every avenue until he found the issue and fixed it. Thank you so much you guys are great.

    Lisa
  • IT technician Jay provided exceptional service on our call today! I have worked with him a few times. He has been really wonderful to work with in getting all my systems set up the last few weeks. He has been so helpful, patient and really just so great all around. In regards to Navitend--- This has been the best IT team I have worked with in my career. I have worked in corporate for years prior to transitioning into non-profit, and IT support has always been one of the challenging things to deal with in both major companies I worked with. Navitend, your service is exceptional and your team is wonderful to work with. Quick response on all my ticket service requests! Thank you!

  • Andrea always goes above and beyond with meeting expectations and customer satisfaction! navitend provides great IT services.

    George
  • navitend is a professional company providing Quality service, great customer service and prompt response to service needs.

    Tammie
  • The nonprofit that I work for contracts with navitend for tech support. I am so grateful for this service! The support team is highly trained, friendly, professional, and is able to figure out any and every situation that requires help. I recently had a rather lengthy software installation and worked with Andrea who was amazing. I can't recommend Navitend highly enough. I'd give more stars if I could!

    Claire
  • Our company is more efficient and has grown as a result of navitend’s work. navitend helped us get to the next level.

    Greg
  • I needed to have the battery on my computer replaced. Andrea met me in person to complete that task. While with her, Andrea was able to assist me with a variety of software and computer setup issues. Andrea was pleasant, professional and patient with me and I greatly appreciated her assistance. She came to address one need but was able to fix several for which I am grateful. I think she is an asset to the Navitend team! Thanks again Andrea.

    George
  • Corey & Rick do a great job and go above what is needed to solve our tech issues & problems. Highly recommend them!

  • Very helpful, courteous & professional. They do a great job and are pleasant to work with as well.

    Robert
  • Corey and the group at navitend are always so helpful and do everything they can to help. Thanks for your professionalism and continued help.

    Robin
  • navitend is an amazing resource for all your IT need! Navitend has been supporting Capitol Care Inc.'s IT needs for many years now and our relationship is wonderful! They are in the know on the latest tech trends and they are always working to enhance our security. Their support team is amazing and you are lucky to have the chance to work with Anthony DeRosa. He is professional, knowledgeable, and always willing to go the extra mile to assist us! HIGHLY RECOMMEND THIS COMPANY!!!

    Nicole