5 Reasons You Should Consider Outsourcing Your IT

There is already so much unpredictability when running a business, but IT issues don’t have to be a part of that. Managed service providers can remotely monitor your network 24/7, 365 days a year to ensure you experience as little downtime as possible.

Here are 5 reasons you should consider outsourcing your IT:

1. Cost

Many small to medium-sized businesses expect that outsourcing their IT is unnecessary and not worth the cost. However, most companies are surprised to learn that they usually save money by outsourcing their IT.

When switching to an MSP, your cost is a flat monthly rate. A good MSP will offer an a-la-carte solution rather than a one-size-fits-all model because each business is different and should be treated as such. This way, you can decide how much or how little support you will need.

When your IT is managed in-house, and something breaks, you likely will be faced with the “sticker shock” attached to the solution. If something breaks, that is worked into the monthly cost with an MSP, meaning no surprises.

2. 24/7/365 support

One of the most significant issues small to medium-sized businesses face is the lack of support when they need it most. If something goes wrong, it can take a lot of time and research to figure out how to troubleshoot the issue and get back up and running.

With a managed service provider, businesses have IT support at all hours of the day, including non-business hours.

3. Productivity & Time Saving

Many small to medium-sized businesses do not have a dedicated IT employee, and when they do, they are often faced with more challenges than they can handle on their own. Sometimes, an employee takes on IT work as a second job function, which takes away productivity.

If you have a single IT employee, and something goes wrong, maybe they can fix it, but what if more than one thing goes wrong at the same time? Or what if it takes hours or days to resolve the issue, and your company can’t perform its main objectives?

Working with an MSP is a sure-fire way to ensure your employees are focused on what is most important, their jobs. They can even prevent issues from occurring. Even when a problem does come up, your IT provider can get you back up and running in record time.

4. The Highest Level of Cybersecurity

There are many ways to improve your cybersecurity in-house. Some of the things you can do are educate your staff, require password changes, implement two-factor authentication, install a firewall, and ensure your anti-virus software is always on the latest update.

However, as cybersecurity practices get better, the threats get more robust by learning to work around these practices. An MSP can constantly monitor your network and systems for threats and vulnerability, sometimes preventing an attack before it even happens. Therefore, it is imperative to work with an MSP to ensure you have the highest level of security possible.

5. Disaster Recovery & Business Continuity 

One of the biggest headaches for business owners is system and hardware failures that lead to data loss and put their data at risk. It can take hours to days to get back up and running, and even worse, data is at risk of being lost forever!

Working with an MSP gives you the best chance at recovering data and reducing downtime.

Closing thoughts: 

Running a business comes with a lot of responsibility and risks. Utilizing an MSP can benefit your organization in many ways by relieving you from the many headaches associated with IT. This way, you can focus on what is most important, operating your business.

If you’re looking for a managed services provider you can trust, look no further than Now Micro. Our goal is to provide services and solutions for every aspect of your technology needs. From end-users to enterprise data centers and up to the cloud, we’ve got you covered. Visit our website to learn more.

How to prevent laptop battery swelling and explosion

Now Micro’s Technical Services team has seen an uptick in hardware repairs involving rechargeable laptop batteries swelling. Swollen batteries are caused by an overflow of current inside the battery’s cell, generating heat and gas to build up and potentially burst into flames. You may have heard of cases like that involving cellphones on airplanes where the DOT banned specific models. Battery swelling is becoming a common issue because laptops and cellphones are getting slimmer, and therefore, batteries are getting smaller and have less room for current flow.

Here are ways you can prevent your laptop battery from swelling and exploding.

Don’t leave your device connected to a charger all day.

Leaving devices plugged in for extended periods cause the battery to overcharge. Most rechargeable batteries are supposed to discharge and recharge in a cycle, so constantly connected batteries can’t reach their capacity. If you’re working remotely, remember to unplug your laptop at the end of the day.

Replace your device battery if it’s broken or not performing efficiently.

If a battery becomes damaged, for example, by dropping your device or spilling liquid, the battery may have difficulty working correctly. If the battery is old, it may also start underperforming. You may try to find a solution by just charging the battery more, but as we said before, the battery can overheat when it’s overcharged. All batteries get old over time, so it’s a great idea to replace them.

Use the correct charger.

Finding a cheaper version of your laptop’s charger may seem like a savvy money saver but having the wrong charger can cost you in the long run. Make sure you find the right charger with the same power output for your device to run smoothly.

Upgrade your laptop when it’s out of warranty

Laptop manufacturers are constantly upgrading the battery functions of their devices. In 2021, we’re seeing a trend of “smart charging” features in new devices. These devices will maintain battery or stop charging once the battery is at or around 95% when plugged in. Now Micro can help you find the right laptop for your organization that fits all your charging needs.

Store the device in a cool, dry environment

Keeping your laptop safe and secure will help it last longer and prevent accidental damage. While working remotely, it can be tempting to laying on the couch or in bed with your laptop, but this can cause the laptop to overheat. Try using a lap desk with a built-in fan instead to prevent your computer from overheating.

Be sure to treat your device with care. Now Micro is always here to help with hardware repairs for your organization’s devices. Learn more about Now Micro’s Technical Services here.

How to Prevent Cyber Attacks in 2021

It makes sense that Cybersecurity Awareness Month falls in October. One of the scariest things a business owner faces is the fear of falling victim to a cybercrime.  So, what are the business implications of a cyber-attack? Loss of data/intellectual property, damage to reputation, loss of productivity, increased expenses, lawsuits, and more. 

Here are some facts:

In just the last year, cybercrime has increased by 40%.

60 % of cyber-attacks are targeted at small – to medium-sized businesses.

But… only 30% of small- medium-sized business owners consider themselves “very concerned” about ransomware.


Hackers who once went after the Targets and Amazons of the world are now going after smaller businesses who likely don’t have the necessary tools or support needed to prevent & recover from cyber-attacks.

Unfortunately, it is no longer a question of if your company will fall victim to a cyber-attack, but when, so it is imperative that your business invests in quality cyber support.

Some of the things you can do internally:

  • Require regular password changes
  • Implement two-factor authentication
  • Make sure anti-virus software is up to date
  • Install firewalls
  • Educate your employees on best practices

These are all great ways to add an extra barrier of protection to your network, but the best way to prevent a cyber-attack from occurring is to outsource your cybersecurity support to a managed services provider. Today, we have security threats coming at us from every direction. A good MSP can monitor your network 24/7, 365 days a year to prevent attacks before they happen. If a cyber-attack does still occur, they will have a team of experts in place to make sure you recover as quickly and painlessly as possible.

As Cybersecurity Awareness Month comes to an end, it is important to make sure cybersecurity remains a priority all year round. If you are curious about where your network stands in terms of security threats and/or other IT-related issues, reach out to me at sydneye@nowmicro.com to schedule a free network assessment. Visit https://www.nowmicro.com/managedservices to learn how Now Micro can become your managed service provider.

#BeCyberSmart

Does your small to medium-sized business have what it takes to manage IT efficiently and effectively?

Even before the COVID-19 pandemic, the work from home business model had been gaining popularity. Today, most businesses have adopted this mindset or at least a hybrid model of working from home a few days a week. As workers continue to work remotely, IT organizations face additional challenges including security threats, help desk overload, and increased costs.  

A few things to think about to assess your IT support needs:  

What does your current IT support look like?  

There are typically three answers: You have a dedicated IT employee, an employee(s) takes on IT work as a second responsibility, or you outsource your IT support. Whatever the plan looks like, you want it to be reliable and efficient so there are no implications to productivity.  

A managed service provider (MSP) would be able to take on IT management so your company can focus on its main objectives. An MSP is a company that offers IT support and tech support services on your behalf. The services they provide are customized to your organization’s IT support needs and can include 24/7 helpdesk services, network monitoring & management, cyber security protection, backup & recovery, and cloud management & migration. Managed service providers will work with different vendors to give their customers the best assistance. 

What are your current response times?  

Response times depend on how big your company is, the number of in-house IT employees, and how complex each IT issue is.  

When outsourcing your IT management to a managed service provider, the company can proactively monitor your networks and systems to prevent IT issues from happening in the first place. Whereas without preventative remote monitoring, your IT person only knows there is a problem after it occurs.  

In addition, your IT person goes home at the end of the day and takes sick days, vacations, and time off for holidays. A managed service provider can remotely monitor your networks 24/7, 365 days a year. With a larger team available, MSPs can track assets, hardware health, networks & servers, bandwidth & connectivity, and IT inventory management. 

Can your IT support remotely monitor and perform maintenance?  

With employees working from home, it is important to be able to monitor and perform maintenance virtually. No matter where your employees work, you can rely on a managed service provider helpdesk to resolve issues as quickly as possible so your team can focus on their jobs, not their IT issues.  

How are you ensuring your systems are secure?  

Unfortunately, your company’s network is always at risk of falling victim to cyber-attacks (read more from our blog post on cybersecurity), but this risk increases as employees work from home and connect to their internet.  

It is more important than ever to partner with a managed service provider to ensure you have the highest level of security. MSPs can help your company prepare for cyber-attacks with backup & recovery planning, proactive monitoring of threats, 24/7 helpdesk, security awareness training, network security updates, and much more. 

How are you backing up your systems?  

All companies experience system failures and data loss. It is crucial to have a disaster recovery protocol. managed service providers can help ensure your data is safe and secure when failures occur by offering services such as end-to-end encryption, device & file-level backup, productivity cloud apps (like Microsoft 365), and local or virtual backup solutions. 

Closing thoughts:  

Running a business comes with many risks and headaches. Working with a managed service provider can keep productivity up, prevent issues from occurring and get you back up and running ASAP.  

As a trusted Minnesota managed service provider, Now Micro is here to help with your business’s IT support. For additional information visit our Managed Services page. 

Users: Your largest and weakest attack surface

October is Cyber Security month! When you exclaim that this month’s focus is security to most admin and IT stakeholders, you’re likely to receive a chuckle or an eye roll. They know the truth of the matter. Our mindfulness of security can’t be limited to a singular month. 

It’s an ongoing process that literally never ends.

Who then is Cyber Security month for? I’ll give you a hint. They interface with your organization’s data, devices and services daily and often don’t regard security as their first or even third priority. You got it; Cyber Security month is all about making your users more aware of the threats your organization faces.  

We often spend a lot more time discussing our plans to harden servers, implement new identity security policies or protect our users’ credentials with MFA. Don’t get me wrong, those things are essential in today’s world, but it’s hard not to notice a gap in those strategies. That gap is the users.  

Most experts estimate that 70% – 90% of malicious breaches start with or include some form of social engineering. Our users are every organization’s largest attack surface and softest target. Bad actors know this and are increasingly aggressive and cunning in their attempts. Every user holds something a bad actor would like to get their hands on. 

Take a user who doesn’t need access to any data or systems but needs email to communicate. If that user leaks credentials, it can still be a treasure trove for a bad actor in the form of a global address list harvest or intel derived from exfiltrated emails that allows them to refine and target spear-phishing attempts. When we read about a large breach in the news, we often picture a group coordinating an attack to launch all at once when it’s far more likely that attack started very small and happened over time.

So how do we go about hardening our users? It would be nice if we could just apply a patch or update their firmware, but a more tactful approach is needed. We believe that process is three-pronged.

Communication

Your organization culture around communicating anything IT-related is very important and often overlooked. 

Simply making your users aware of the current threats and where to report them can go a long way to thwarting social engineering. Be consistent with your communications. Set up a shared mailbox so multiple crafting IT-related messages can appear as one unified voice. Apply templates to your emails, so the appearance is consistent. Be concise; not enough or too much information can be harmful. Stick to the who, what, why, and how of the threat. Don’t forget to include where a user should go to report social engineering attempts.

Training

This can mean different things depending on the size of your organization. In smaller organizations, it may mean taking 10 minutes during a company meeting to show examples of social engineering attempts. In larger organizations, it may mean contracting a professional trainer to speak to individual business units or even training leaders in those units to talk about threats to their teams.

Attack Simulation

The benefits of a simulated penetration test against our networks are obvious, but we can also apply this approach to our users. An attack simulation targeting your users with social engineering or a fake malware payload will not only give your organization an idea of its vulnerabilities but is also one of the best ways to raise your users’ awareness. The approach of an attack simulation with training and communication as a fast follow can grab your users’ attention far better than any of these components on their own.

How do I simulate attacks? 

Just like network penetration testing, there are plenty of tools to help you launch attack simulations and parse the data you receive.  

  • Microsoft 365 Defender P2 – If you happen to have Defender P2 or an M365/O365 A5/M5/E5 plan, you have a very robust set of tools for simulating attacks.
  • Choose from a wide variety of templated attacks that help target specific business units, just like a seasoned spear-phisherman.
  • Simulate malware payloads and malicious links with a variety of different delivery methods.
  • Automatically assign pre-built training modules to users that click malicious links or input their credentials.
  • Robust after-action reporting to help you know where to invest in training.   
  • Now Micro Security Awareness Training – If you don’t have Microsoft Licensing, you’re not out of luck, Now Micro has the tools to simulate attacks against your Microsoft or Google environments.
    • Phishing Security Tests
    • Automated Security Awareness Program
    • Security Hints & Tips
    • Automated Training Campaigns
    • Phish Alert Button (Ability to report & delete phishing emails)
    • Phishing Reply Tracking (Track if a user replies to a simulated phishing email & what information)
    • Industry Benchmarks
    • Monthly Email Exposure Check: Monthly reports show which email addresses are exposed on the Internet and are a target for phishing attacks

Recognizing the growing need to protect all your endpoints, including your users, is our focus at Now Micro.  If you have any questions or would like our help, visit our Managed Services page on our website.

Are you prepared for IT threats?

Many things cause a business owner to have nightmares — at the top of the list is a computer failure that stops operations in its tracks. Unfortunately, no company is immune to the threat of data failure. Recently, for retail giant Target, the fear became a reality as nearly every register in all stores throughout the United States went down.

Fortunately, the system outage only lasted two hours. But, that two hours of downtime cost Target roughly $50 million in lost sales and caused their stock shares to drop by two percent. In reality, Target’s ability to go from a catastrophic outage to getting back online in such a short time is a huge accomplishment. With significant IT infrastructure in place to respond, the company could investigate the problem, determine that there had been no data breach, and reboot all systems to full operation quickly. For the company, assuring that no data had been compromised was vital. In 2013, a data breach affected 41 million customers and resulted in a legal settlement costing them millions.

How you protect your data is critical to the success of your business — no matter your size. For a health organization, your data includes detailed medical and insurance information. There are endless client files and records for law offices, financial planners have high-level access to sensitive financial portfolios, the list goes on. No matter the industry, data is critical. In many cases, data security methods are heightened by legally mandated regulations like HIPAA and PCI.

Be Prepared

So, how do you protect your company from cybersecurity threats and data failure? Target spends hundreds of millions of dollars each year. The key is to find an affordable technology partner who you can trust. As seen in the Target event, data issues and cyber attacks don’t only happen during business hours. You have to be prepared to respond 24/7. At Now Micro, we make it a priority to be available when the need for help arises. Our service desk technicians answer the phone live 24 hours a day. But that is only a tiny piece of your Cyber Security response plan. Most of our work occurs before disaster strikes. We help ensure that you have up-to-date systems needed to prevent an attack or data failure and back-ups in place when an attack occurs.

Your Industry Needs

Although all industries need comprehensive data and cybersecurity infrastructure, the needs vary depending on the types of data stored and industry-specific regulatory requirements. Here is a shortlist of how Now Micro customizes our services to serve the cybersecurity needs of different industries:

 Manufacturing

We protect your intellectual property — the core of your ability to be profitable for the long term — and put in place processes to ensure the reliability of manufacturing operations.

 Healthcare

HIPAA and other compliance requirements are critical in the healthcare industry. We address these needs and ensure brand protection, secure connectivity, and offer a unified security platform.

Small and Midsize Businesses

Each small and midsize business has its own unique needs, with expense management a key factor. Therefore, we provide affordable options, giving you access to the same level of expertise that large companies have at their disposal.

Retail

In a retail operation, the ability to continually process transactions without hiccups is critical. We help you ensure the reliability of your POS system while also assisting with compliance needs.

Law & Finance

Legal and financial institutions/advisors need to secure sensitive data and are subject to intense compliance regulations. We help ensure all needs are met and a backup system in place to allow recovery in the event of a data attack or failure.

Ready to Serve

Information technology and cybersecurity are overwhelming topics, but they don’t have to be. Click here to learn more about our comprehensive IT and Cyber Security services. Give Now Micro a call today, and we can work together to define a plan that meets your needs so that you can relax knowing that your business is well cared for.

New Vlog Series: What’s in the Lab?

Now Micro has recently launched a new vlog series called What’s in the Lab. This series features Bernard Carter, Chief Technology Officer, going over various players we have in our lab. Our innovative digital signage & IoT solutions and services help customers from a range of industries better procure, deploy, manage and secure their visual communication devices.

Our first video covers the Lenovo ThinkEdge SE30, a rugged media player built to face the most hostile environments. The SE30 also uses the latest 11th Generation Intel® processors that run Artificial Intelligence and Machine learning to deliver the insights you need. The unit is also fanless and can function in a thermal range of -20 – 60C.

Stay tuned to our YouTube channel every Thursday for the next 4 weeks to see how our solutions and services can take your IoT beyond the edge!

To learn more about Now Micro and our purpose-built digital signage and IoT solutions, visit https://www.nowmicro.com/.

Now Micro Launches Device Management Software, DICE

Now Micro, known for its expertise in computer hardware and services, introduces DICE, a software solution that helps organizations manage computing devices from the time of purchase and throughout the lifecycle of the product.

Last year and continuing today, the rapid shift to remote learning and work from home environments created challenges for IT departments, specifically in the areas of asset management, system security, and tech support. Almost overnight, organizations had to purchase, configure and deploy computing devices to support an increased number of remote employees, students, and educators.  With this, came all the associated technical support challenges ranging from hardware malfunctions to internet connectivity and general usage challenges such as logging into Zoom calls.  

“You’d be surprised how many organizations are tracking device information in spreadsheets.  DICE not only puts real-time device data at their fingertips but allows for remote troubleshooting and restoration, saving time and eliminating costs associated with shipping a device back for repair,” says Bernard Carter, CTO at Now Micro.

Previously, organizations might have used numerous spreadsheets and invoices in different places to keep track of purchases and separate software to enable remote technical assistance. Now Micro recognized the need for a software solution that enables quick access to device information through a centralized, real-time online portal.  Streamlining device lifecycle management activities is crucial for organizations that have hundreds or thousands of devices under their supervision.

DICE is available in two versions with the base package included at no charge with every device purchased from Now Micro.  Customers may upgrade to the paid version that includes additional features outlined in the table below. Pricing is based on device count and administrator access.

DICE DICE Complete
Dashboard Device Monitoring
Order information IoT Device Management
Device information Import & Manage Assets
Warranty lookup DICE Live – Real Time Status
Open API User Editable Fields

To learn more about Now Micro and DICE, visit nowmicro.com/dice.

Q&A with Now Micro’s new CTO, Bernard Carter

Now Micro is excited to announce Bernard Carter’s promotion to Chief Technology Officer. After working for the last year and a half as the Vice President of Technology, he will continue leading our commitment to innovating device lifecycle management for our partners.

Bernard Carter has a track record of success in infrastructure, security management, and software development at Fortune 500 companies and in the public sector. In 2013, Carter started working for Now Micro. Under his leadership, his teams have successfully developed hardware and software solutions for IoT, digital signage and device lifecycle management.

How is this new role different from your previous?

BC: My previous role was Vice President of Technology.  This new position reflects our changing role with our customers from procuring devices to really being an integral piece of the device lifecycle management journey.  The concept is a message we have been communicating to our customers for years, but I do think this new role really doubles down on Now Micro’s commitment to be part of the journey/solution and moving beyond a transactional relationship to true partnership.

Anything you would like to plug about DICE?

BC: Our official launch of DICE 4 is next month. I am beyond excited about this release as it reflects feedback from our customers, consultants and technicians.  Having a team to bring all of it together is a distinct privilege for me as it reflects the trust the organization has placed in us building our future with customers.

What are you looking forward to in this role and for Now Micro in general?

BC: Leading a focused technology organization has always been a dream of mine.  My team at Now Micro really gets that technology is more than buying a box- the effectiveness of our technology really has a huge human component, and that value is reflected in this organization and our mission. I am also looking forward to eventually meeting with customers face to face again and having some time to build technology demos/talks to share.

To learn more about Now Micro, Bernard Carter, and DICE, visit https://www.nowmicro.com/.

Notable Microsoft Teams Announcements!

The Most Notable Microsoft Teams Announcements of 2020 (through Oct) 

The later part of 2020 has seen a flurry of updates, previews and announced roadmap items for Microsoft Teams.  Let us look at the announcements that are likely to have the most impact. 

HealthCare: Virtual Rounding and Care Coordination 

2020 has been a stressful time for health care professional across the globe.  From exposure risks to PPE shortages, healthcare providers are turning to technology to provide solutions.   Microsoft has answered this call by announcing Virtual Rounding and Care Coordination.   

Virtual rounding, a Teams app that aims to reduce exposure while health care professionals do their daily checkups on their patients.  The goal is to limit contact to infected or vulnerable patients by leveraging portable carts equipped with video screen, mics, camera’s, and speakers.  This allows healthcare professionals to maintain distancing when physical presence is not needed for diagnostics or treatment. 

Care Coordination, which began its private preview October 1st, allows healthcare to aggregate patient data, provide care plans and test results and communicate with each other regardless of physical location all in a HIPAA compliant platform.  The introduction of Teams for care coordination aims to improve efficiency while minimizing exposure. 

SharePoint home sites for Teams   

The SharePoint home site experience announced in 2019 allows organization to create a new or migrate their existing intranet sites to SharePoint.  With the increasing ability to embed your organizations apps and resources into Microsoft Teams many organizations are hoping Teams will be come the single pane of glass for all needs.   

So why create a home site to serve as your organizations intranet if it will detract from all the work you have done in teams?  

Enter the SharePoint home site app for Teams.  This home site app allows you to deploy your intranet home site through the Teams client. 

The announcement came to us in September 2020 and we are eagerly awaiting release details. 

https://techcommunity.microsoft.com/t5/microsoft-sharepoint-blog/innovations-for-workplace-communications-and-employee-engagement/ba-p/1696149

Teams Breakout Rooms 

Many in person conferences and events will include a keynote or introduction meeting that all attendees are present for before breaking into smaller groups for more granular content.  Recreating this experience virtually has proven difficult.  Microsoft Teams breakout rooms hopes to simplify this experience.  

Teams Breakout Rooms will allow meeting organizer to split attendees into smaller groups and bring everyone back together without the need to drop and rejoin multiple meetings.   

The announcement for Teams breakout rooms came to us in July and we hope to see previews or general availability before the end of 2020. 

Advanced Communication Add-on 

2020 has seen an interesting race to provide more attendees, more features, and more video feeds between collaboration platforms.  The majority of normally in person conferences, large presentations and even college orientations have been converted to virtual events.  2020 more than ever has created a need for very large virtual events.   

Microsoft’s answer to this need is the advanced communications add-on.  At release, the advance communication add-on increased the maximum attendees for Teams live events to 20,000.   

Features coming later this year include: 

  • Teams meeting maximum members increase to 1,000 
  • The ability for a Teams meeting to have up 20,000 overflow participants in a view only meeting experience 
  • Custom Lobby Branding 

To take advantage of these features, the organizer of the meeting/live event will need the advanced communication add-on currently priced at $12 per user/month.  Attendees DO NOT need the add-on. There is also a 60-day trial available through the admin center. 

Considering this new and not quite yet saturated market, I would expect to see more feature announcements coming soon. 

https://docs.microsoft.com/en-us/microsoftteams/teams-add-on-licensing/advanced-communications#:~:text=%20Advanced%20Communications%20provides%20enhanced%20calling%20and%20meeting,across%20meetings%20for%20your%20internal%20and…%20More%20

Custom Meeting Layouts 

If you are looking to make a good impression on clients or impress you coworkers with your big presentation, Microsoft may have given you a secret weapon.  Teams custom meeting layouts allow you, the presenter to customize what attendees are seeing.  Microsoft Ignite gave us a preview of new tech allowing you to overlay the presenter on a PowerPoint slide.  Who knows, maybe someday virtual meetings may look more professional than traditional in-person meetings with half the effort!