Friday, June 05, 2015


What is Skype for Business?

In the 4th Quarter of 2014, Microsoft announced plans to rename its business communication tool Lync to Skype for Business. Lync is a tool that Microsoft has invested in for the past decade, offering a single application that combines all of the communication tools for business. It became a core part of the Office enterprise. When the latest version of Lync is released in 2015, it will be named Skype for Business and include a new server release, client interface, and updates for the UC service in Office 365.
Essentially, customers will enjoy new tools and features like:

·       Access to any Skype user on any device

·       Skype’s familiar functionality icons

·       Skype’s call monitor feature so active calls stay visible when using other applications

·       Lync’s content sharing, IM, and telephony

·       Improved access and interface functionality

·       Ease of use taken from consumer Skype versions

·       Security and scalability for every business user

Wednesday, May 27, 2015


New Verizon DBIR Report

Quantify the impact of a data breach with
NEW DATA FROM THE 2015 DBIR.

The 2015 Data Breach Investigative Report (DBIR) from Verizon is now available for download.  The report is created every year with data from 70 different IT security companies.   The report found that breaches map to error and misuse and most breaches are a result of known compromises that have remedies known for a year or more.  This suggests that businesses need to rethink their patching strategies.  The primary successful attacks were through phishing, misuse of credentials and malware.  Mobile risk and the internet of things, although a concern, have yet to be a significant attack vector. 

 

http://www.verizonenterprise.com/DBIR/2015/ 

 


Yes. Microsoft® Office 365 provides all the capabilities you need to satisfy the technology requirements for HIPAA and HITECH compliance.  These regulations require that organizations establish and document procedures that govern:

·        Restrict access to patient data.

·        How patient data is handled.

·        How stored patient data is kept secure.

·        How to secure patient data when it’s transmitted.

Meeting these general guidelines requires lots of time and attention to detail. Office 365 helps you meet these requirements with less time and cost than you might think

 

Friday, May 22, 2015


For those organizations who’ve been planning on upgrading some of your legacy Windows Servers, especially the 2003 variety, but just haven’t found a compelling enough reason to do so, you’ll want to go ahead and put those upgrade plans in high gear!
In July of this year there will no longer be any more security updates for this server. Unlike the retirement of XP, where Microsoft continued with anti-malware definitions, in this case when the server goes out of support and becomes an unsupported product Microsoft will NOT be issuing any anti-malware protections.
The ‘so-called’ security updates will end on July 14, 2015. Microsoft is recommending that organizations not rely on what they deem as ‘up to date’ security patches as Microsoft has found them not to be ‘secure enough’ or effective enough for out of date/support operating systems. If you’d like to know what your migration options are and what makes sense for your organization we are always ready, willing and able to help you figure out your next move.

Wednesday, May 13, 2015



OneDrive for Business is an Outlook email storage application that is utilized by many Office 365 clients. While the application has been available to Mac users, the ability to sync files and take them offline was limited until now. With the new OneDrive for Business sync client, users can now access their files across all devices by downloading the iOS application and the Mac Sync Client from Microsoft Download Center.




Accessibility is Key

Users have been able to utilize Android and Windows apps to sync their OneDrive files since late 2014, but the iOS application took a little longer to develop. In late January 2015, Microsoft finally released the OneDrive app, giving iPhone users the same accessibility. The application features new capabilities for viewing, managing, and sharing photos as well as the option to connect multiple OneDrive accounts. Previous versions separated the business and personal use files but the new OneDrive for Business allows users to access all files through the same app interface.

Business users can access all saved files and shared files, as well as the most recently viewed files. Additionally, there is a recovery option for files that were accidentally sent to the Recycle Bin. The new OneDrive features an upload option as well as “search” and “share” features making it easy to interact with business and personal files on the go. With this application comes enterprise-grade security with compliance and control by Office 365.

Monday, May 11, 2015

IT Priorities for 2015

Top 5 IT Priorities aggregated from surveys by NetworkWorld and ComputerWorld:

1. Security
2. Cloud
3. Analytics and Data Management
4. Mobility and Wireless
5. Clients - Desktop, Laptop

Friday, April 17, 2015

Biggest Security Issues Facing Businesses


I attended a Security Session at the Channel Partners Conference and here are some of the Biggest Security Issues Facing Businesses:
 

 
1. Security is not important - client perception Security is adequate
 
22% of SMB 1-99
15% of Medium 100 - 499
17% of Larger 500+


Drivers of Changing Security Approach

47% Change in IT operations
43% Reports of security breaches
34% Knowledge gained from training
29% Vulnerability Audit
29% Security Breach
 

2. So Many Moving Parts

Complicating Factors
54% Growing organization of hackers
52% Greater tech inter connectivity
52% Sophistication of security threats
48% Greater availability of hacking tools 45% a Volume of Social Media 44% more reliance on internet apps
38% Legacy apps

Experiences with Data Loss
29% Definitely
23% Probably
48% No or Don't know
 
Mobile Security Incidents
32% Lost Device
31% Employee disabling security features
30% Mobile Malware
 

3. Up-front Planning

Balancing Risk and Security
34% Too much risk
58% Appropriate risk
6% Security too stringent

Dealing with Regulations
50% Fully aware
36% Mostly aware
14% Somewhat aware /unsure

Effort involved with compliance
54% High
39% Moderate
8% Low

 

4. Keeping  people out of trouble
Human Element a Major Part of Security Risk
52% Human error
48% Technology error

Top issue is end user but IT complacency as well
The State of Security policy

50% Comprehensive
30% Policy in Place but needs work
21% working on policies
9% No plan