Tag Archive for: IT Costs

Building Your Plan for BYOD!

Building Your Plan for BYOD!

As the line between working in-office and working from home becomes more and more blurred, a new trend in employee technology has begun to emerge – BYOD, or bring your own device. Many companies are offering their employees the option to bring their own devices into the office environment as it can improve both employee satisfaction and office productivity.  But CIOs still must consider three different basic set ups/options before taking the plunge:

  1. Bring Your Own Device (BYOD) – In this set up an employee has complete control over choosing and supporting the device they use at work since it is fully owned by the employee. This is a very popular method with smaller companies or those who utilize independent contractors.
  2. Choose Your Own Device (CYOD) – In this set up employees are offered a choice of devices that have been approved by the company for their security, reliability, and durability. The approved devices work within the company’s IT environment, however the device itself is owned by the employee; either they have paid for it themselves or it was paid for through a company stipend and the employee can keep it for the length of their employment.
  3. Company-issued, Personally-Enabled (COPE) device – Here an employee is supplied a phone or other device, paid for by the company, that they can use for personal activities. The employer can decide how much access and freedom employees get when using these devices.  This is the closest option to the traditional Corporate Owned Business Only (COBO) model of old.

While CYOD and COPE are often employed in larger organizations, BYOD is by far the most popular option with SMB’s.  There are many benefits to the new BYOD office set up.  When employees are totally familiar and comfortable with their own devices they are likely to be more productive since they do not require any time or training to get up to speed on optimal usage.  Additionally, personal devices, as opposed to business owned, oftentimes are the latest model with all the latest updates and features.  Early adopters love having the latest version of their preferred device and companies can leverage that desire to their advantage.

A further advantage to adopting BYOD is cost savings to the employer.  By having people responsible for part or, in some cases, all of the cost of their mobile devices, businesses can potentially reduce the impact of mobile device costs on their bottom line.

If and when your company adopts a BYOD policy, the best way to ensure that you do not encounter an excessive surge in calls for help to your IT team is to have strong and comprehensive BYOD guidelines in place.  Here at Midwest IT Solutions we have worked hard to research and develop guidelines for our clients to follow. Any policy should encompass seven key areas:

  1. Specify what devices are allowed. You will be getting into the business of saying, yes iPhone, no Android, yes iPad no any other tablet. Once you have decided what devices are allowed it is key to make clear what level of support (if any) you will offer owners of these devices.
  2. Establish strict security protocols for those devices.
  3. Define a clear support policy i.e. what level of IT support will you (the employer) provide?
  4. Decide which Apps will be allowed, which will be banned.
  5. Make clear who owns the apps and data used on the employee’s devices.
  6. Be sure that your BYOD policy is aligned and fully integrated with your current Acceptable Use policy.
  7. Be sure to come up with an employee off-boarding plan.

There are many factors to consider before any manager or executive rolls out a new BYOD policy.  A successful BYOD policy can aid in productivity and employee satisfaction, a less detailed BYOD policy can lead to security breaches and numerous IT headaches.

At Midwest IT Solutions we can help you navigate through the complex new world of BYOD.  With Midwest IT Solutions’ guidance, you will be able to leverage the wonderful benefits of BYOD without facing the many pitfalls.  Do not try to chart your own course through this exciting world, contact us today!

Cloud Computing: The MSP Advantage

It’s no secret that cloud computing is the future of computer and network care for businesses worldwide.  “The cloud” eliminates the need to have physical servers and hardware in your office. Cloud computing focuses on maximizing the effectiveness of the company’s shared resources, as well as being effective in heightening companies’ day to day tasks with multiple users.  It is a highly efficient way to store your company’s data in one place at a flat monthly cost, as opposed to worrying about the large capital investment of new network equipment on a regular basis.

Cloud adoption and cloud-based file sharing are becoming increasingly popular among the general public, but can cause concern among CIOs. Unfortunately, IT organizations are having a hard time keeping up with large, public cloud providers.  According to an article from Business Cloud News, a recent survey conducted by Fruition Partners of 100 CIOs found that 84 percent believe cloud adoption reduces their organization’s control over IT.

About nine in ten believe unsanctioned use of public cloud services has created long-term security risks. This is troubling to CIOs because it can lead to possible information leaks or other data security breaches. In addition, 79 percent of CIOs believe that there are cloud services in use that their IT department is not aware of.  This reiterates the danger of losing grasp of the company’s technology while using a large cloud provider.

Partnering with a Managed Service Provider (MSP) can help prevent these worries from arising.  A proactive relationship with an MSP gives you the ability to aid in, or fully move, to a private cloud option.  It ensures that your company will be working with a partner that has experience with many cloud networks, therefore providing the highest level of support possible.  This is crucial when it comes to the transition of moving your company’s data and file sharing for all users within your company at an affordable cost, while at the same time, preventing downtime on the network.

In conclusion, the value of having an MSP on your side to aid in cloud based technologies for your business is second to none.  Small to midsize companies can focus on the core competencies of their business that make them money, while letting the experts control all business technology in the cloud.

Why Midwest IT? Because it makes sense!

Why Midwest IT?  Because it makes sense!

New Breakthrough in fiber optic creating opportunity for faster, more affordable Internet Speeds

New Breakthrough in fiber optic creating opportunity for faster, more affordable Internet Speeds

This article points to a study done recently that could drastically change the way we use the internet.  This should allow for a more balanced approach between Cloud and on premise solutions.  Right now the 5 year cost of a server replacement & maintenance are about half the cost of moving your server environment to an IaaS solution (Virtual Cloud based Servers).  Usually these solutions require an expensive Internet solution and even with the upgraded Internet, the performance is slower.  With faster, cheaper Internet, more people will start using the option.  When more people start using the Cloud Solution, providers will lower their pricing.  I suspect the pricing with start to noticeably drop, making the solution a more viable option.

 

Check it out <a href=”http://www.theregister.co.uk/2015/06/28/fiber_bandwidth_breakthrough/”>Here</a>

Midwest IT asks: Why is Managed Services is the right answer for your network?

If you’re a traditional small to medium sized company, the idea of managed services provided by a vendor may seem an unlikely solution. But then how do you explain the trend toward outsourcing pieces of IT and in some cases, all of IT?

It has become obvious that some companies in the SMB market have nobody on staff that really knows or understands the technology they are using, even though they are running mission critical business applications.  Businesses end up spending money needlessly on things they do not fully understand.  Many times a break fix IT vendor may have a customer implement technologies that make more sense for them to sell($$$), than it does for your company to buy.  The other issue can be the “IT guy” that wants to use your business network to test cool new technologies. Either way, it is not smart spending. In some cases they have very skilled operations people, but they are ready to retire. Those soon-to-retire staffers understand their network environment well, however replacing these people is difficult. The MSP generally does not have a large financial interest in a solution that you are attempting to implement, which gives you an unbiased staff of professionals the assist your company in making smart IT decisions for your business.

In the world of MSP’s or Managed Service Providers, there is a flexibility that companies can benefit from. In most cases with an MSP, there is a general “Flat Rate” cost for your IT Services.  The best ones are able to package together their “best practices” and provide the client with a number to budget for their IT costs that allows them to stay close to their budget.  This is a major benefit to the customer, as they do not have all of the peaks in spending that comes with non-budgeted break/fix IT. With companies that are using break/fix, you gain an engineer/account manager that makes decisions in YOUR best interest. In the case of having an employee that is soon to retire, an MSP can implement tools to get the clients network onto an MSP platform, while allowing the current IT person to continue their day to day tasks.  Then, when the retirement happens, the customer’s network has a seamless transfer over.  The users have a new help desk to contact for issues, but the environment stays the same.  No large headaches or expenses.

In other cases, some companies are employing a full time IT person when they really do not need it.  I have seen companies with 25 to 50 users pay $60,000 – $100,000 for salaries + benefits. Sample MSP pricing would be  $40,000-$50,000 range for 25 users and 50 users would be $75,000-$85,000.  These numbers usually also include software the client is also paying for.  (Backups, spam filtering, offsite storage, etc)  This means that companies are paying $20,000 to $30,000 more to have someone onsite every year. Owners and managers of companies this size should really look at this.  With many of these companies, the owners or decision makers are made to believe that their network is “special” or more “complex” than most.  In a few rare cases, there is a justified reason for having someone on staff, however, most times, this is not the case.   Given that the MSP can provide a quality level of service, how much better would the company be doing investing that money back into their technology, instead of paying labor costs.

Business owners should at the very least do the research and see. Usually at no cost you can have an MSP come out and evaluate your current IT situation.

Ubiquiti Networks Receives $31.67 Average Target Price from Analysts

Midwest IT has been using Ubiquiti Networks hardware recently for things such as Wireless Access Points, Security Cameras, Point to Point Wireless, and POE Switches.  Their pricing to this point has been great and the equipment has held up to the standards that we expect.  The Security Cameras that they offer have been very nice.  The camera equipment is affordable and the interface is easy to manage and very powerful.  Look for future writings on their products soon!

 

Here is the article…

Ubiquiti Stock Analsys

Should your business have its own “APP”?

I recently began researching the pros and cons of having an app for Midwest IT.  As I ventured out into Googleland to find a decent development platform, I began to think about possible functions that we could implement that would improve our customer service and make things easier for our end users.  What I found out was that some of the development tools were pretty powerful, giving many more options than I had first anticipated.  So I began a trial run to build our first app.  Lets see how this thing will work!

First I started a list of what it should do,

  • Submit support tickets
  • Easily call us
  • Easily refer someone to us

Then as I went into deeper thought, I came up with a few other great ideas

  • Easily email pictures (error screens, flashy lights, etc)
  • Sign up for a newsletter
  • Get info on our referral program
  • Find our website
  • Connect to our Social Media
  • Let people know about upcoming events
  • Send people notifications

I wanted to start with a basic, clean and functional main screen that would not be confusing.

app1

Then I added additional items to the More menu.

app2

The process was not overly difficult and the test app seems to function fast and easy.  Overall, I was very impressed.

When I analyzed having an app as a value add from a business perspective, it really seemed like a no-brainer.

  • The cost is relatively cheap.
  • It is very easy to maintain.
  • You have an additional direct point of contact to your customers.
  • Additional resource for announcing items to all customers.  (New products, deals, service alerts, industry notifications, etc)
  • Presents a additional professional service level to prospects.

If this seems like something you would be interested in, please let us know!

Managing your business technology

Keep your focus!!

Running a business is a 365 day a year job. While you focus on running your business let Midwest IT Solutions focus on keeping you up to date on the latest developments in information technology. In the 4th quarter of 2015 Microsoft launched Exchange Server 2016 and implemented updates to its Office 365 service and software suite. While both feature improved security, there are several key differences, which is crucial to understand when making the appropriate choice for your business.

Office 365 is Microsoft’s cloud based subscription service and therefore is no need to purchase any additional hardware. The low monthly subscription structure makes it a cost effective option for many small to mid-sized businesses in industries who need to comply with all current privacy and regulatory guidelines. Many business owners do not realize that free email services, such as Gmail, yahoo, and AOL are not compliant with certain security and privacy regulations. Any company that is found to be non-compliant in regulated industries may face a government fine, as well as have to pay a service to get them back in industry compliance.

In addition to meeting confidentiality requirements, the email service in Office 365 has an added feature called “Clutter.” Clutter utilizes smart technology to learn patterns in users email. If it sees that emails from a specific sender are consistently never opened or immediately delated it will send those messages to the Clutter folder rather than the inbox.

Unlike Office 365, Exchange Server 2016 is Microsoft’s most up to date and secure email software for on premise options. Some business owners prefer to keep their email server on premises rather than Office 365 due to a higher level of internal control. Depending on your particular business’ needs, it can offer higher performance than Microsoft’s cloud based service. There are some cases where an on premises server is the best, such as businesses that require large capacity file shares (50GB in size or more) or operations that would be bandwidth-prohibitive in a cloud scenario. Offices that have less infrastructure access to the internet would be wise to take this into account during their decision making process.

Exchange 2016 offers all of the same security features as Office 365 and is fully compliant with all privacy guidelines. However, it does not have the Clutter feature that Office 365 users are able to utilize. If you are currently using a now unsupported, or soon to be unsupported version of Exchange, it is past time to upgrade; preparing to move to Exchange 2016 is a must. Any business currently running a version of Exchange Server earlier than 2010 will need to perform an additional step as they upgrade. Files must be moved to Exchange Server 2010 as an interim step as newer versions cannot co-exist with any framework developed prior to 2010. It is important to remember that Microsoft will be terminating all support of any version of Exchange prior to 2010 on April 11, 2017. If your internal IT department has their hands full managing your day to day operations or if you do not have an internal IT department, Midwest can help you ensure a smooth transition as you migrate to the Exchange 2016 environment.

How do you know which option is the right choice for your business? Midwest can help you navigate the confusing world of information technology. You focus on what you do best and let Midwest handle the IT. Contact Us…

 

Hackers Attack Small Businesses Too

Most small business owners believe cyber attacks are the concern of large corporations, however nothing could be further from the truth.  According to Verizon Data Breach Investigations Report 71% of cyber attacks occur at businesses with less than 100 employees.[1]

Unfortunately, many “SMBs suffer from ‘It can’t happen to us’ syndrome,” notes Robert Siciliano, security expert for McAfee. “They also typically don’t have the resources to secure their networks to the degree a large enterprise would. But the information on their networks – and access to their bank accounts – still makes them a big target.”  Even though it turns out SMB’s have a larger target on their backs than they realize, two thirds of SMBs surveyed by Symantec say they’re not concerned about cyber threats; and more than 80 percent have no formal cyber security plan.

“Smaller companies are easier to hack,” said Clay Calvert, director of security at MetroStar Systems, a Virginia-based firm. “They don’t have the resources to set up protective barriers.” Big companies, which have the financial resources to upgrade their security, have become less vulnerable.  But this needs to change!  The average cyberattack costs a business $188,000!  You can no longer wait for hackers to target you.  The rise of organized cyber hackers is definitely a scary trend but it doesn’t have to be the end of the world.  There are some things that a SMB owner can do to help:

  • The first step you need to take is to think like the hackers. Ask yourself: Who are my adversaries?  Are they after my intellectual property and trade secrets?  Do they want my customers’ credit-card information?  Or do they view my business as the weak link in some larger application?  This exercise can help you see where your vulnerabilities lie and also help you understand which measures you can take to protect your software.
  • Make sure your code is clean. Many commercial applications use open-source code as components.  The National Institute of Standards and Technology’s National Vulnerability Database discloses more than 4,000 vulnerabilities in these components.  Security software companies, can help you identify and fix any problems with your applications’ source code.
  • Outsource your security operation. While most small organizations can’t afford to build sophisticated IT security systems, Midwest IT Solutions has the scale and know-how to protect your operations and sensitive data.

At Midwest we have the knowledge base and the commitment to service to ensure that your IT security is up to date.  We offer best in class cybersecurity protection.  Unlike other managed service providers who rely on point of service solutions; we employ Unified Threat Management, an all in one security solution.  UTM is a fully integrated, multifaceted approach to protect against network threats. Your IT infrastructure is too important to settle for a less than optimal cybersecurity plan.  Contact us today to get started on your cyber security audit.  Don’t take a chance and go it alone, get Midwest on your side.

[1] Verizon Data Breach Investigations Report 2012. 2012 Accessed April 20, 2016. URL:www. http://www.wired.com/images_blogs/threatlevel/2012/03/Verizon-Data-Breach-Report-2012.pdf.