Considering Deploying Microsoft365 for Your Entire Organization? Success is in the details.

Technology is ever advancing, and even the smallest of businesses must keep in step to remain competitive. Efficiency is the key to modern, effective operations, yet keeping teams aligned and working towards the common goal can be tougher than ever when members are remote working. Microsoft solutions can help the business increase productivity and modernize their operations, and at the same time provide stronger security and enhanced protection.

For just about every business, it makes sense to consider using Microsoft 365 services. But there are a lot to choose from, and not all services work as you might expect, so here is a little information that might help with making service selection a little easier.

Does it make sense to implement Microsoft Teams for intra-company calls, meetings, and collaboration?

Teams is great for calling your co-workers, sharing screens, presenting content, and collaborating in workgroups or with the whole company. But be warned that Teams meetings don’t work for everyone, particularly those outside your organization or for users that don’t have useful Internet connectivity.

  • To use Teams with people outside the company, or even for users that don’t have Internet connectivity, you’ll need to also have a calling plan for each user.
  • A calling plan allows Teams to connect a phone number to the Teams meeting, creating a means for non-Teams users and those without internet to connect to the meeting audio.

Should you migrate employee email inboxes to MS365 (Outlook Desktop and/or Outlook Online)?

Using Microsoft for email services make a ton of sense, especially with the advanced phishing and threat protection that comes standard with the service. It is pretty much foolproof for most businesses and is a great value. If your business is migrating to Microsoft from a legacy email platform or from a different mail provider, there are a few things to consider.

  • Many companies use their desktop Outlook email folders as a sort of file cabinet, storing and categorizing emails for future use. In older MS Exchange environments, Public Folders were also used, enabling company-wide access to certain email folders and the file attachments within.
  • MS365/Office365 email services don’t support public folders, and every email box comes with a storage quota. If the business is used to saving lots of emails, then it might create difficulties with mailbox management.
  • Outlook Desktop still has limitations on the file size it can reasonably handle. This means that Outlook, when connected to hosted Exchange mail (Microsoft365), should run in cached mode, keeping only recent data in the Outlook file on the computer and leaving the rest of the mail on the server. Mail on the server is still available for search by Outlook; the program will simply search in the local data file first.

Can you, or should you, migrate your company’s files to the Microsoft cloud?

Keeping your files on the “cloud” is a concept that sounds convenient, but it isn’t quite as straightforward as it sounds. In this case, the idea is to migrate files from PCs and servers to Microsoft OneDrive or SharePoint, where the files can be available to all users regardless of where the user is working from.

  • Putting a big hard drive on your PC or server can be relatively inexpensive. “Storage is cheap” we hear quite often. Yet all storage facilities are not alike. It might be a cheap option to add a big hard drive or USB drive to your local system but paying for storage space on the web becomes a different deal. You may find that safe, protected storage for your files is not quite as inexpensive as you thought, especially over time. When you must pay every month for the storage you use, you rapidly realize why file housekeeping is essential.
  • File and folder permissions do not translate from your Windows file system to a SharePoint or OneDrive. You must create your own groups and set file and folder permissions as you want them AFTER the data is uploaded to the cloud platform.
  • Once the files are in the cloud platform, each user must determine what and how the files will sync with their local computers. There may be an option to “sync on demand” (depends on device platform) that can allow users to selectively sync files to/from their computers, but the fact remains that the data is being downloaded to the local computer so that it can be worked on. This still means that the local computer must have the necessary software installed, and the PC should be protected with backup, anti-virus and anti-malware and MFA.
  • Database files cannot work in a web file location. This means that programs that have associated database/data files must still have their files located on a network server for users to access them. QuickBooks, tax software, trial balance software, workpapers and fixed assets, inventory management or manufacturing, and more may require the server to serve the application and/or data to the users. This means that servers and networks and the need to manage the network and the individual computers remains in full.
  • If all other data is stored on the cloud platform, then you now have data and resources to manage both places.

What does the new Microsoft365 Cloud PC mean for small businesses?

  • The new Cloud PC from Microsoft365 can solve a tremendous problem for the very small business in that it can become the IT infrastructure and it is fully cloud platform.
  • Cloud PC is meant to replace your local PC as your operating environment. Rather than installing software and storing data on your local device, the idea is that your software gets installed on your Cloud PC and your data is stored, ideally, in your OneDrive, or maybe on the drive of your Cloud PC.
  • This makes the Cloud PC a perfect solution for that single user that needs to run their QuickBooks or other applications from anywhere.
  • The thing with the small business Cloud PC is that it cannot be networked. It may be able to “see” and work with your local device hard drive or even mapped drives that your local device is connected to, but it isn’t able to work with a network server or share like a local PC would.
  • This means that you may be able to store and retrieve files from servers or other drives on your local PC or network, but you won’t be able to access databases or other server or network-based applications that need the network to function.
  • This also means that you can’t share data on one cloud PC to another cloud PC… they aren’t networked together.

Why NOOBEH’s Cloud Service model is better

There’s a reason why businesses adopt NOOBEH QuickBooks on Azure services, and the benefits are as great as ever. Businesses work with NOOBEH and our QuickBooks on Azure services because we have the flexibility to do what the business needs, and to offer a comprehensive approach that doesn’t leave applications, services and data hanging around on local networks or unprotected computers.

Where the Microsoft365 Cloud PC is a great answer for the single-user, NOOBEH’s cloud servers are designed for multiple users needing access to common applications and/or data. Multi-user QuickBooks desktop applications, Sage or AccountEdge, MISys Manufacturing or Acctivate Inventory, ShipGear or Starship, Fedex or UPS and much more… we host the applications that businesses use every day.

NOOBEH keeps the applications and data securely running on private Microsoft Azure cloud servers. Centralized, server-based management of applications and data means that software does not have to be installed and maintained on individual computers, so the need for local PC backups and anti-virus and malware protection is also minimized. All users work on the same version of the same software, and everyone accesses the same data in real time. Version control issues and sync problems are entirely avoided when everyone is working in the live system with live data, and Microsoft’s Azure platform ensures that issues due to transient hardware failures are a thing of the past.

When the company has workers that must operate from their local computers, NOOBEH can enable a solution to keep SharePoint in sync with the cloud server, ensuring that workers on and off the server are able to reach the most current version of the files. Users working in QuickBooks can interact directly with SharePoint files and folders by using the native Windows File Explorer where users operating on their local PCs access SharePoint via OneDrive or via the web. This approach delivers the best of both worlds to businesses who need more flexible modes of operating.

Contact us today to find out more about how we can help your business do more in less time, improve efficiency and work more effectively with a system that works where and when you need it.

jm bunny feetMake Sense?

J

The Question You Never Want to Have to Ask

Why MFA Shouldn’t Be Optional

“Do you offer any help for decrypting files due to ransomware?”

This is a question we are asked with more frequency than ever before. And, sadly, it is often followed up with the information that their files were on “an internal server that was missed in the backup protocol by IT”.

Email phishing and brute force attacks are the most common methods cyber criminals use to get into your business network where they can set up to initiate ransomware attacks. The ransomware (malware) encrypts your data, which becomes unrecoverable without the decryption key. Usually, the only way to recover from a malware/ransomware attack is to rebuild systems and restore data from backups. If you have backups.

A “brute force” attack is typically used to get personal information such as passwords or passphrases, usernames, and Personal Identification Numbers (PINS). Scripts or specialized apps are used to carry out a string of continuous attempts to get the information desired. Cybersecurity researchers at Coveware analyzed ransomware attacks during the second quarter of 2021 and found that phishing and brute force attacks on unsecured desktops (remote and local) are among the most popular entry points for starting ransomware attacks. This is at least partly because it is relatively cheap and can be highly effective.

Phishing attacks are when cyber criminals send emails containing a malicious file attachment or hyperlink directing to a compromised website that delivers ransomware. Attacks against desktop logins include methods where cyber criminals use brute force to leverage weak or default usernames and passwords – or even get access because they got legitimate login credentials via a phishing email.

Software vulnerabilities and web-based application services are also among the popular vectors for delivering ransomware or exposing corporate networks to cyber criminals. While this type of attack is somewhat less frequent than the others, they are often leveraged by some of the most sophisticated and disruptive ransomware groups and nation/state bad actors.

  • Sodinokibi – also known as REvil – is responsible for some of the most high-profile ransomware attacks this year, including the massive ransomware attack on customers of Kaseya.
  • Contij – one of the most high-profile attacks by the group was the attack against the Irish healthcare system. Healthcare services across Ireland remained disrupted for months.
  • Avaddon – ransomware distributed via phishing emails.
  • Mespinoza and Hello Kitty are new forms of ransomware recently identified.

All of these have a common purpose in that they take advantage of weaknesses in security and exploit phishing tactics to lay the foundation for an attack on your network and possibly others.

Keeping systems updated, applying security patches and application software updates is an important aspect to keeping things secure. Known vulnerabilities can be exploited to gain access to the network, so keeping up with updates as the vendor supplies them has become more important than ever.

To help protect networks from being compromised, businesses should also apply multi-factor authentication (MFA) to desktop and applications.

MFA is an important tool to help stop intruders from breaching accounts and gaining access to the corporate network, and it can be the difference between keeping your data safe and working or discovering your files are digitally encrypted and completely unusable. Data encryption changes the data into code, and only the decryption key can read the code and return the data to a useable form. If you don’t have the key, the data typically cannot be decrypted.

Cyberattacks continue to evolve in their sophistication and frequency, and consequences of such attacks are growing. Private companies and public agencies alike must adapt their security techniques and embrace new security technologies while providing more end-user education and training.

Mendelson Consulting and NOOBEH Cloud Services take security very seriously and we have the experience and expertise to assist businesses with transforming their operations to be more efficient and effective. Our cloud team works exclusively with private tenant accounts on Microsoft Azure, and offers MFA security and other solutions to protect local and remote resources, helping keep your valuable information safe and available when you need it.

“How can we get started?” is the question you should be asking.

jm bunny feetMake Sense?
J

It’s Not Easy Being Small – Thoughts on the Disruption and Rethinking Business Priorities

The global pandemic has been the source of disruption to business and personal lives for over a year now and businesses have found that, regardless of the challenges they face, business must continue.

With operations and supply chains strained and positive cash flow at a premium, companies everywhere are focusing on the fundamentals while enabling work-from-home and distancing mandates. COVID-19 has, in many ways, become the event that is forcing many businesses (and entire industries!) to rethink how they operate, and to look to transform their global supply chain models.

A fact that can’t be argued with is that the pandemic has exposed where many businesses are vulnerable, being heavily dependent on supplies of raw materials or finished products that are no longer readily available.

What’s also been exposed is the lack of agility in business I.T. infrastructure, as operations struggle to find ways of continuing operations with reduced personnel or users working from various locations and finding that their systems aren’t really helping in those efforts.

“Supporting small manufacturers has probably never been more important that it is now”, said a panelist at the “National Conversation with Manufacturers” session hosted by the National Institute of Standards and Technology’s Hollings Manufacturing Extension Partnership (NIST MEP). While larger companies are certainly impacted by what’s happened this year, small manufacturers face the challenge of running a company with a smaller available base of resources, technology and supporting tools.

“The conversation’s participants represented very small manufacturing companies with fewer than 20 workers. They all recounted a mad scramble over the past six months. First, they had to figure out whether their operations were essential enough to stay open under their state-mandated shutdown orders.

Then began the efforts to keep their workers safe, implement cleaning regimens, source protective materials, respond to public health protocols that evolved during the pandemic, determine what emergency support they qualified for, and go through the steps to access funds. All of this was being done with a small staff that needed also to continue getting product out and deal with obstacles to normal operations. Hurdles included delays and disarray in the supply chain, disruption in cash flow, with both account receivable extensions and overnight changes in credit terms, shipping impediments and customers still expecting on-time deliveries.”

https://www.nist.gov/blogs/manufacturing-innovation-blog/sometimes-its-not-easy-being-small-manufacturer?utm_medium=email&utm_source=marketingcloud&utm_campaign=

To add to the troubles, disruptions in global trade with China have created significant impact in supply chains worldwide. Companies who rely on direct and secondary suppliers in China are currently experiencing significant disruption, and this is likely to continue. But it isn’t just China… countries around the globe are experiencing challenges with having enough personnel, materials and technology to deliver their goods.

For so many years, businesses have focused on optimizing their supply chains to minimize costs, reduce inventories, and increase asset utilization. This streamlining has also removed the buffers and the flexibility to absorb disruption. COVID-19 has shown that many companies aren’t aware of their vulnerability when supply chains suffer from a global shock of some type.

So, how can organizations respond to the immediate challenge?

There are steps that businesses can take to help address the changing conditions facing businesses today, and a major item that should be addressed is the alignment of IT systems and support to evolving work requirements. Further, enhancements in operational systems should be made to illuminate the extended supply network and enhance inbound materials visibility, and a new focus on production scheduling agility as well as evaluating alternative outbound logistics options should be approached.

NOOBEH’s cloud solutions have been the foundation for business continuity and operational support throughout these difficult times.

We’ve helped companies around the country implement Microsoft Azure cloud servers where they are able to run their entire operations. From order entry, manufacturing, inventory management, pack and ship, and through to accounting and finance – businesses run their applications, integrations and services that allow them to keep the business operating even with reduced personnel or as their users are forced to work from home. OneDrive and SharePoint file storage, and TEAMS for closer collaboration and simplified access to information, helps hybrid working models and distributed workgroups stay in step with projects and business goals.

As a Microsoft Cloud Solution Provider, Mendelson Consulting and NOOBEH provide and administer Microsoft 365 and Azure services, enabling us to more closely manage the licensing and computing platform to make sure it works in the best possible way for your business. With NOOBEH managing your services, you get predictable performance at predictable costs, allowing your business to operate without interruption or subscription overages.

As the past year has proven, life is unpredictable. Let Mendelson Consulting and NOOBEH help your business implement the cloud services and technologies that will give your organization the ability to adjust to changing conditions because you’ll have the most agile IT platform available.

jm bunny feet

Make Sense?

J

Where in The World is Your Data?

Where in the World is Your Data? Even better.. where would you like it to be? In a datacenter near you? In a datacenter far away from you? Maybe you’d like your production system nearby, but backups stored on the other side of the country. Or perhaps you want redundant systems on each coast as well as something somewhere in the middle.
With Microsoft Azure as your platform, you have all the choices in the world, literally.

Microsoft Azure is the platform of choice for businesses of all sizes, offering virtualized infrastructure and services that can be tailored and tuned to meet the unique needs of any organization. No longer tied to on-premises infrastructure, companies find that they can implement better and more comprehensive solutions because they have the agility to adapt systems to immediate needs while retaining the ability to adjust as conditions change.

With Microsoft Azure and Microsoft 365 Services, NOOBEH enables businesses to focus on transformation and improving efficiency, not the IT that supports it.

NOOBEH cloud services, part of the Mendelson Consulting team, sets up Azure infrastructure and manages it for their clients. Business users focus on getting their work done, not on the IT supporting it. NOOBEH QuickBooks on Azure services give small and medium size businesses the most flexible and resilient infrastructure available to run all their desktop and network applications.

Because QuickBooks is rarely a standalone solution, NOOBEH QuickBooks on Azure services have no limitations on what add-ons, extensions, integrations or other applications the business may need to use. All the software a business needs can be deployed on the platform, allowing the company to keep its information systems and assets secure, fully-managed and available when and where they are needed.

While NOOBEH uses Azure platform and Microsoft 365 services to continue to deliver new capability for private sector users, Microsoft is advancing innovation in the delivery of connected services and computing power for private and government sector users wherever it is needed. Azure Modular Datacenters represent a partnership that delivers computing and communications capacity anywhere in the world… and beyond.

Microsoft Azure Modular Datacenters and SpaceX

The Azure modular datacenter is basically a “data center in a box”. It comes with everything needed to deliver computing capacity anywhere in the world.

“We designed the Azure Modular Datacenter (MDC) for customers who need cloud computing capabilities in hybrid or challenging environments, including remote areas. This announcement is complemented by our Azure Space offerings and partnerships that can extend satellite connectivity anywhere in the world. Scenarios range from mobile command centers, humanitarian assistance, military mission needs, mineral exploration, and other use cases requiring high intensity, secure computing on Azure.”

https://azure.microsoft.com/en-us/blog/introducing-the-microsoft-azure-modular-datacenter/

It has power and everything else it needs, and now it also has the connectivity needed, even when there is no (zip, zero) infrastructure. Microsoft has partnered with SpaceX, using SES satellites to bring Internet connectivity to remote areas.

“We can connect via satellite links any element on the Earth to another point on the Earth..”

https://arstechnica.com/information-technology/2020/10/microsofts-new-data-center-in-a-box-will-use-spacex-starlink-broadband/

They’re calling it part of “a multi-orbit, multi-band, multi-vendor” approach to connectivity. That’s pretty cool, if you ask me.

It takes the whole bookkeeping in bunny slippers philosophy of “work when and where it works for you” to an entirely new level.

Make Sense?

jm bunny feet

J

Building A Solid Foundation for Business Cybersecurity

The cybersecurity threat landscape has changed dramatically in the last few years. No longer primarily a big-business concern, cybersecurity has become a key focus of businesses small and large. Attacks on SMBs are on the rise, perhaps because they represent a plentiful and often easy target. And the cost of damage and disruption to business just keeps going up.

Cybersecurity is not a problem you can simply throw a bunch of money and tools at to fix.

No matter how much great software or fancy systems you implement, the people will always be a big part of the equation. The root cause of over half the data breaches reported is a result of negligent employees or contractors.

That means that nearly half of all attacks are being executed through phishing or social engineering. The only tool you can apply to this problem is education. Efforts should be focused on security awareness and training workers to be more cautious to the point of almost being paranoid. Better to be safe than sorry in this case.

Training workers to be more careful as they work with emails, documents and websites is part of it, but there is much more to making sure the business is addressing the entire cybersecurity issue. NIST (National Institute of Standards and Technology) offers a wide variety of information and guides that businesses can use to learn more about and implement cybersecurity practices. Among these resources is the Cybersecurity Framework.

According to NIST, “the Framework focuses on using business drivers to guide cybersecurity activities and considering cybersecurity risks as part of the organization’s risk management processes.” It is a highly useful tool in helping the business align and prioritize activities with business requirements, risk tolerances and resources. The standard framework includes elements that are consistent and common across sectors and critical infrastructure, so it can be oriented to any business.

Even if the business is not prepared to delve into the details of a comprehensive cybersecurity policy and guideline, a basic outline and approach cannot be avoided without asking for disaster.

Putting this squarely into the Risk Management category, there is an ongoing process of identifying, assessing, and responding to risk situations or conditions. To manage the risk, businesses need to consider the likelihood that an event will occur and what the potential impact is as a result.

Knowing the acceptable level of risk for reaching the business objective is the risk tolerance. If a business understands its risk tolerance, the company can prioritize cybersecurity activities and make informed decisions about cybersecurity expenditures.

There are five key functions to consider as it relates to cybersecurity risk: Identification, Protection, Detection, Response and Recovery. How the business addresses each of these in the context of the systems and activities is essentially the business’s cybersecurity posture, a high-level and somewhat strategic view of the organization’s management of cybersecurity risk.

The key to building a solid foundation for  business cybersecurity practice is to establish a platform where all the business applications and data can be identified and access secured.

User desktops, productivity applications, operational software and business data can be hosted on private cloud servers, allowing the business to fully-manage data and application access. The server-based model reduces or eliminates the need to sync data to devices, and remote desktops keep user environments secure, patched and up-to-date.

Our consultants can’t write your cybersecurity policies or determine your risk tolerance, but we can help implement a solution that improves fault tolerance, resilience, and recovery.

Make Sense?

J

Cloud for Small Business: Gain Hardware Independence

Small businesses tend to approach their business IT in terms of the tangibles.. the hardware and software they can see and touch.

The desktop PCs where the programs are installed, the server in the back room where the files are stored, and the backup that goes offsite (tapes? discs? usb drives?) is the stuff most small business owners think of when asked about the computing technology they use. This view isn’t very comprehensive when it comes to considering the costs of purchasing and maintaining IT in the business, yet it identifies a major problem with the typical small business IT approach.

The problem is the dependency on the hardware and the reliance of the small business on the operation of individual computers.

The solution to this reliance on on-premises hardware? The cloud.

The solution to the problem isn’t centered on using web-based applications. The real solution to this small business IT problem is cloud platform, like Microsoft Azure. When businesses deploy a private cloud server they get solution that allows them to run all their desktop and network applications and store their data on a virtual platform that isn’t tied to any particular piece of hardware in the office.

Microsoft Azure offers virtual computing resources, managed and secured on Microsoft’s hardware in Microsoft datacenters. Rather than purchasing and maintaining hardware on-premises, business can deploy virtual networks and servers on the Azure platform. This makes the systems far more versatile and resilient than would be affordable to do otherwise. Surprise server hardware failures become a thing of the past, and buying ahead for possible future needs is no longer required because the systems can be upgraded on demand.

Businesses still need desktops where users access their programs and data, but the “desktop” can be a cloud desktop rather than the local PC desktop.

Remote desktops on the cloud server keeps software licensing and business information securely stored on the cloud server rather than being resident on user computers where it is more easily compromised. Users may still browse the internet and do other things with the local PC desktop, but using the cloud desktop for business applications and data means that just about any PC could safely be used for work.

When applications and data are managed on-premises, it makes changing servers or workstations a big deal. 

Changing desktops or servers means that software must be uninstalled and reinstalled, data must be migrated and user profiles and permissions may need to be recreated. When the cloud server is where users get their desktops, computer workstations become interchangeable because nothing is really installed on them other than the connection to the cloud desktop. This is also why traveling laptops and home computers become more secure for business use, because the applications and data are really running on the cloud server and not on the local device.

The cloud platform provides what the business needs without the lock-in to on-premises hardware or SaaS/Web-based software.

Rebuilding servers due to hardware failures, upgrading systems to handle future growth or replacing aging hardware all contribute to the unpredictable cost of managing and maintaining on-premises computer systems. SaaS and web-based software solutions lock-in data and lock-out many future options, yet they don’t address user desktops and the rest of the applications and data the business needs.

Rather than risking outages and lost productivity, businesses are finding that running their systems on a managed cloud platform provides more stability and consistent performance for a reasonable and more predictable cost. Desktop and server software licensing is able to service multiple locations when installed on a cloud server, and workers at home can access the tools to be just as productive as they are in the office (maybe more).

Make Sense?

J