All posts by clikcloud

Examine Data Security Policies for Remote Work

Nearly a year after the pandemic closed business offices worldwide, remote work is the norm. Keeping your company’s computer network strong and secure is of great importance. Even now, businesses may want to revisit decisions made so quickly last March. Read on to learn about the most critical questions to ask in order to have a robust security plan for remote work.

 

Network Security Considerations for Remote Work

 

The usual security considerations remain important. First, how secure is your network against common viruses and malware? Ideally, definitions are as current as possible to catch the growing security threats. Is your method for access to the network still secure and efficient? Some companies can maintain a virtual private network requiring passwords; others may want to move some computing resources to the cloud. Still, varying levels of access may need to be determined, to keep data secure and bandwidth available for key business operations. For example, workers using video conferencing services need more bandwidth than employees who mostly handle email only. Another decision involves where workers will access your network; a company-owned PC connected to the company’s network is more secure than a worker’s personal computer or mobile device. 

Train Employees to Keep Your Network Secure

 

As always, employee training needs to be part of a remote work security policy. Clear rules should be set in place regarding which equipment is used for work purposes. Employees need to be reminded to be on the lookout for possible security intrusions like phishing schemes to avoid ransomware. Passwords are another key to keeping the company’s data secure; part of training includes helping employees develop strong and secure passwords and to change them regularly. While employees are often considered a weak link in security, when properly trained they can be the greatest asset. According to Gartner, “Remote workers must ensure the same, if not a greater, level of security for all company networks and data access, documents or otherwise confidential information that might be displayed on a home office computer screen.” 

 

Since remote workers expand the company’s security perimeter, you might want to re-evaluate your policies and practices. For help in refining your company’s security plan, contact us today. 

Align Your Cloud Strategy with Your Business Strategy

Cloud computing, with its benefits, considerations and even risks, can be a way to transform your business. When considering your cloud strategy, it must aid and advance your business strategy with its mission, values and goals. Read on to learn more about developing a cloud strategy tailored to your business strategy.

 

Business Strategy Determines Cloud Strategy

 

Now might be a good time to closely review your business strategy, and what you hope to accomplish in the coming year. Do you plan to have workers continue remote work, for example? Then you might need to extend access to more people, which brings up bandwidth and security concerns. According to an article from Gartner, your cloud strategy “needs to align with and actively support [your] organization’s business strategy, regardless of whether your organization provides consumer services, business services, or other products.”  Broad categories of considerations include:

 

  • Risks associated with cloud computing–agility, availability, supply chain, security and compliance. Also, having a clear exit strategy (or even more than one) before committing to any project, can help you reach balanced cloud deployment strategies. Some risks may pertain more to certain industries (security risks may be the most important consideration for healthcare organizations in protecting patient data, for example).
  • Route and approach to the cloud. Will your business opt for moving all applications to the cloud, or rehosting some and completely rebuilding others? And what sort of platform is the best fit, whether Software as a Service (SaaS) for rapid access or adoption of cloud infrastructure for building new functions? What will your business do about migrating current and legacy applications? 
  • Whether your business is aiming for cost savings with the cloud. Cloud, even with its benefits of flexible subscription models, and capacity for speed and innovation may cost more in the short run, especially if taking the rebuilding route to cloud adoption. 
  • Understanding of shared responsibilities between the customer organization and cloud service provider (CSP). 
  • How adopting cloud, at whatever level, will change your IT department. New skills and certifications for staff may be needed. 

 

Cloud adoption–even complete digital transformation–brings with it risks and questions that must be balanced with its benefits. For help in reviewing your business strategy and developing your cloud strategy, contact us today.

Technology Planning and Budgeting for 2021

There’s no doubt, 2020 has been a period of massive change. The pandemic has forced businesses to change the way they do business–for example, more staff are working remotely than ever before. Read on to learn more about what to consider when planning your technology budget for the new year.

 

Consider Business Objectives First

In 2021, according to a CompTIA report, business technology spending is expected to grow by 4.2% in 2021 reaching over 5 trillion for the first time. Cloud is expected to be significant, showing up again as a trend after being out of the spotlight in 2020. Companies are expected to use the cloud as well as emerging technologies in the coming year to drive digital transformation, support work-from-anywhere requirements and improve communications and collaboration between employees, customers and the supply chain. Technologies like the Internet of Things (IoT) and artificial intelligence (AI) are expected to be embedded in business applications–for example, improving inventory control or for data processing operations.

 

When considering your tech spending, consider how technology can help reach business goals. Are you expecting remote work to continue, or even to hire more remote workers? Perhaps consider allocating more of your budget to cybersecurity and skills training. One thing to consider is the strength of your network, and whether you need more bandwidth or to focus on network security. 

 

Cybersecurity Still a Constant

With remote work now common, the security perimeter has changed. Instead of being in the office, it is now wherever anyone is accessing the network. A new paradigm has emerged wherein access to networks needs to be more specific, and where threats are possible within the perimeter. More resources may need to go to keeping data secure, including training employees to do so. What’s more, regulation of the tech industry will be in the spotlight, with enforcement of regulations for handling user data. Whatever your business prioritizes, flexibility and resilience–the ability to build an adaptable architecture and to withstand disruptions from many directions–will be necessary in digital transformation.

 

While 2020 has brought about many changes, it has also brought opportunities to move forward in using technology for business advantage. For help in charting your company’s technology course, contact us today.

Work Anywhere Securely with the Cloud

With remote work a fixture in our economy, technology has risen to meet the challenge. From virtual desktops to unified communications, it is easy to work anywhere.  Read on to learn how technology based in the Cloud can keep your business robust in 2021 and beyond.

 

Stay Connected with Unified Communications

Unified Communications as a Service (UcaaS) provides phone, chat, text, email, web conferencing and more as an integrated solution available in the Cloud. Voice over IP (VoIP) and other Cloud technologies remove the dependency of on-premise hardware and the need for expensive phone and conferencing equipment. This lets you route calls efficiently to communicate in real time all over the world. 

 

Work Securely with DeskTop as a Service

Adopting Desktop as a Service (DaaS) means you can work anywhere, get customer information instantly and securely from home or all over the world. With Windows Virtual Desktop (WVD) or Virtual Desktop Infrastructure (VDI), your access is more secure because all systems and applications are managed virtually with a defined level of security that can be centrally managed from a remote location. Since the data is in the Cloud, it doesn’t reside on individual devices, thereby increasing security. Individual users still need to practice effective password management as well as best practices in security policy. With Desktop as a Service (DaaS), the Cloud provider manages and operates the infrastructure, including security. 

 

Work Anywhere with Software as a Service

Software as a Service (SaaS), also based in the Cloud, supports a wide variety of applications, including business applications like CRM, accounting, human resources and more. With the ability to access your applications anywhere from any device (including desktop, laptop, tablet or mobile) you always have information and applications at your fingertips whether you are at home or abroad.

 

Benefits of the Cloud

What all these technologies have in common is the Cloud; expandable computing power available as service. Cloud computing makes it possible to access applications and data with just an Internet connection. The infrastructure resides with the Cloud service provider instead of on-premises, converting a capital expense to an operating expense and saving money. Cloud’s flexibility and scalability allows a company to provision more or less computing resources, according to demand. Private and public Cloud environments are available for differing business needs.   

 

Technologies used in on-site and remote work will continue to be in high demand. To learn how you can take advantage of the benefits of the Cloud and its applications, contact us today.

Position Your Company for Growth in 2021 and Beyond

What a year it’s been! With the pandemic pushing rapid changes in how businesses operate (e.g., more remote workers), a company’s IT infrastructure and applications need to be nimble, responsive and secure in the face of increasing demand for digital transformation. Read on to learn more about trends associated with this shift.

 

How the Pandemic Impacts Your Technology Investment

 

Companies  have been forced to move quickly this year. The ongoing pandemic  has both required a shift to increasing digitalization, and shown the companies that have shifted that it’s possible to be resilient in a crisis. This event has shown the need for agility and responsiveness, and has helped companies refine approaches to doing business digitally. According to an IDC report, 65% of global GDP is expected to become digitized in the next few years, with $6.8 billion of IT spending allocated to the endeavor. The pandemic has not kept digital growth from happening, but rather has accelerated it. Many companies are expected to put in place a mechanism for shifting their infrastructure to the cloud by late next year. Edge computing, wherein the data is processed close to the people who need to use it, is driven by changes that the pandemic has brought, including a growing remote work force. Moving to the Cloud and digitizing operations will give businesses the security, responsiveness and agility they need to remain competitive. 

 

Resilient and Adaptable Technology is  Key to Success

 

Let’s face it, the pandemic has ushered us into a new world. Though there may be growing pains, not all changes are adverse. Companies that have adapted to changes–more remote work, for instance–are in a position to use this flexibility to adjust to an increasingly digital economy. According to the report, IDC predicts that “In 2022, companies focused on digital resiliency will adapt to disruption and extend services to respond to new conditions 50% faster than ones fixated on restoring existing business/IT resiliency levels.” One trend predicted companies will put a mechanism in place to shift to cloud-centric infrastructure and applications twice as fast as before the pandemic.

 

This year and the coming ones have brought, and will continue to bring, great change. Those companies that have adapted stand ready to be resilient in the new year and beyond. To ensure your company is one of them, contact us today.

Trends in Cybersecurity in 2020

This extraordinary year, with its rapid shift toward remote work force, has brought about changes in the cybersecurity landscape. With the security perimeter widened by use of devices outside the office, businesses are using the cloud more than before. According to a recent CompTIA research report on the state of cybersecurity, 60% of respondents were taking a more formal approach to risk management and threat intelligence; however, there’s always room for growth. Read on to learn how 2020 events have changed approaches toward cybersecurity. 

 

Acceleration of Cloud Computing

 

One trend in the report is the acceleration of the use of cloud computing. With so many employees working remotely, companies have, at the very least, sent their employees home to work and hurrying to secure day-to-day operations. With this increased use of cloud computing, keeping an eye on the threat landscape is still vital. Cyber attacks have increased, including “phishing,” and are now considered inevitable. The question is how companies will respond. 

 

Cybersecurity the Responsibility of the Entire Organization

Cybersecurity is no longer merely the responsibility of the IT department. From the newest employee to the board of directors, everyone has a responsibility to help protect data and systems. The executives and board can map out the plan for cybersecurity, beginning with assessing current risks to data and systems. Every employee can be trained in how to handle cyber attacks, and how to prevent them from occurring. Upper management can set the tone, creating a culture of cybersecurity.

 

Formalization of Cybersecurity Practices

 

Along with the increased momentum of cybersecurity adoption, the approach is becoming formalized. According to the CompTIA survey, the majority of companies have taken a more formal approach toward cybersecurity, adopting metrics to measure how well they’re doing. The process starts with risk assessment and management by directors and executives. What security pitfalls might come with remote work? How secure are a company’s data and systems? Formalization of practices also includes measuring and monitoring security efforts that are tied to business objectives. Such metrics might include how many systems have current operating systems, or what percent of employees have been trained in avoiding phishing schemes. 

 

While some aspects of cybersecurity (like an ever-evolving threat landscape) are the same, many businesses are changing their approach to cybersecurity. For help in evaluating your company’s approach, contact us today.

Become Aware, Get Prepared. October is National Cybersecurity Awareness Month

October brings to mind cool days and crisp leaves. Another hallmark of this month is cybersecurity awareness. Government and industry have collaborated to “raise awareness about the importance of cybersecurity and to ensure all businesses have the resources to be safer and more secure online.” Read on to learn how to make your business more aware of and proactive in protecting its network, data and systems from cyberattack. 

 

Take Stock of Your Network’s Health

 

Cybersecurity awareness is always vital, not just at a particular time of year. One way to move beyond simple awareness is to take stock of your network’s health. A company’s network is only as strong as its weakest point. Do you have a map of your network, with all devices connected to it? Are there holes in your operating system where cyber criminals can get in and steal or compromise data? Do you have the most current operating system patches to prevent this? Also consider whether antivirus and antimalware definitions are current or if they need to be updated. Is your network being monitored? Remote monitoring helps you stay aware of the health of your network, and can solve small problems before they become big issues. 

 

Keeping an Eye on Cyber Threats

 

Another aspect of cybersecurity awareness is knowing the threats to your network. From ransomware to phishing schemes, cyber criminals are keeping pace with the growth of technology, especially during these unusual times. Do your workers know what a phishing email looks like, and do they know what to do and not to do if they get one? Your workers can be a good source of information when trained to recognize attacks. In addition, password management is another way to keep your system safe. Having unique passwords that are changed on a regular basis can help to keep attackers out of your network.

 

Let this month of cybersecurity awareness be a wake-up call to your business, and spur you to be as well protected as possible. For assistance in developing a plan or strengthening your network’s security, contact us today. 

Plan Now to Protect Yourself from Cyber Threats

Imagine an external cyber attack occurring in your business, or an employee getting exploited by a phishing email. Will you know what you’ll do in the event of a data breach, and are you prepared to act immediately? Read on to learn more about how planning your response to a cyber attack can help you respond quickly and calmly.

 

What to Consider When Developing Your Cybersecurity Plan

 

Your business may have a plan in place already to cope with the latest cyber threats–ideally, this is the case. Or else, you have a plan that needs to be revisited and updated, reflecting the changed work environment brought about by remote workers caused by the pandemic. This is a good time to take an inventory of your IT assets and network security. Starting with the basics, look to see if there are any vulnerabilities that need to be patched with the most up-to-date operating systems patches. Are your antivirus and anti-malware definitions current? Also, can you account for all devices connected to your network, such as laptops used by remote workers? Going beyond the basics your  plan should include training your employees to remain safe while remote by knowing how to identify phishing schemes that could result in a ransomware attack. Additionally, evaluate advanced security risks related to compliance requirements, sensitive data or high cost of unplanned downtime. 

 

Planning Now Helps You Respond Quickly Later

 

You’ve probably heard the saying, “Plan your work and work your plan.” This definitely applies to your plan for keeping your network secure. What if your company experiences a cyber attack that leads to a data breach? You’ll need to know the deadlines for notifying customers and other parties of a data breach, as well as any data protection regulations to follow. If a remote worker experiences an attack, they’ll need to know what to do immediately. Ideally, they will know best practices and follow your incident response policy. Having your network security plan ready means you can act immediately to remediate damage to your network and your business.

 

Planning your response before an attack will position you to act quickly and calmly to an attack. For help in developing or refining your network security plan, contact us today. 

Unified Communications Can Help You Stay Connected

In our current situation, the ability to work anywhere is even more important. Whether at the office, on the go–or quite commonly these days, at home–unified communications (UC) supports the ability to communicate by voice or email and send information back and forth. Read on to learn more about how this technology can help your business always be available.

According to a recent Gartner report, Unified Communications is expected to grow by $167.1 billion over the next five years, an average of 16.8% per year. This technology brings together various modes of communication–phone, text, web conferencing and email, providing a streamlined way to keep businesses connected. Employees working at home can collaborate via web conferencing, send data via email, and communicate with customers by phone. Voice Over IP (VoIP) supports this technology by providing phone connections via the Internet. Companies no longer have to rely solely on analog or private branch exchange (PBX) systems. Chat and email with customers and other employees is made easier. Applications like CRM can be integrated to expedite service, too.

The Need for Software-Defined Wide Area Networks (SD-WAN)

Unified Communications technology, enabled by the cloud, needs a fast and reliable network. Software-defined wide area networks (SD-WAN) uses multiple carrier service providers to furnish a wide area network with failover; if one part of the network experiences a bottleneck, another can pick up the traffic. Not only does SD-WAN provide a highly available network, but it can also save costs over legacy MPLS with added flexibility and a variety of carriers. Unified Communications can test the limits of your company’s  network.  With SD-WAN, your company’s wide area networks will always be available, from anywhere.

Considerations for Adopting Unified Communications

As always, unified communications depend on a reliable network. Consider evaluating your network for its bandwidth and security, making sure it can handle additional traffic and no vulnerabilities to cyber attack. Your company’s antivirus and antimalware definitions and firewall should be up to date, too. Also, check to ensure only authorized users are able to access your network.

Unified Communications and its supporting technologies can be instrumental to helping your staff work anywhere. To determine your company’s readiness, contact us today. 

Migrating to the Cloud to Access Line of Business Applications

Our unusual times have pushed businesses into adoption of cloud computing, the main reason being the increased demand for remote work along with the ability to maintain business operations. Gartner’s prediction for increase in cloud revenue in 2020 was 17%, from $227.8 billion to $266.4 billion, even before COVID 19. It’s possible that that revenue may increase even more. The “why” of moving to the cloud is easier to define for some than the “how.” Read on to learn more about the benefits of moving your line-of-business applications to the cloud. 

 

Benefits of Cloud Computing for Business Applications

 

The question on the minds of many business owners is how to migrate critical business applications to the cloud. Some applications are cloud-ready (for fast migration) or cloud-optimized, running on Infrastructure as a Service (IaaS) or Platform as a Service (PaaS) delivery models. As with all options, these have their benefits and considerations. Another option is cloud-native or SaaS applications, wherein computing resources are available via the Internet. The cloud service provider provides the infrastructure, too, so there is no need for costly capital expenses. Instead, SaaS provides an economical, subscription-based delivery model for cloud services, services which provide a wide range of mission-critical applications–CRM, accounting, HR, email and more. These can be accessed both in office and–very important, now–away from the office for remote workers. Another benefit of SaaS is that customer-facing applications (online chat, for example) can be rapidly deployed. 

 

Considerations for Cloud Migration

 

As ever, a business needs to consider its business needs before cloud migration. What are the mission-critical applications that need to be available at all times? Where does the cloud data center reside, and what provisions are there for redundancy or fail-over? Another consideration is the health of a company’s network, whether it has any weak points that need patching, or any antivirus or anti-malware definitions needing to be updated. Yet another is bandwidth; is there enough to support the heavy Internet use? 

 

If you know you want or need to move your primary line-of-business applications to a cloud environment, and need guidance, contact us today for an assessment of your cloud readiness.