Better Platform, Better Data, Better Performance

Information management paradigms are rapidly changing, so businesses seeking to achieve maximum performance and profitability must look at increased efficiency and innovation in their IT platforms. Cloud platforms help business operations to be more effective and agile, supporting the various processes and workflows which make up the operation. From finance to order processing, shipping and customer service, the platform needs to be flexible enough to handle the wide variety of needs of the company.

Today’s technology-enabled flow of business opportunity requires modern infrastructure and IT services. Where many would believe that web-based applications and “cloud” versions of software solve the problem, more often the business finds the solution lacking features and usefulness. Tried and failed plug-ins and extensions may leave the system attached to a spiderweb of connections and services behind the scenes, reducing or eliminating the ability to fully control the flow of data to or from the system.

The real issue to address is the infrastructure and IT foundation, not just the applications. Certainly, the software matters greatly, but too often businesses believe they must migrate to new applications and adopt new processes simply because they wish to have remote access and more flexibility in how and where users and information connect.

Cloud platforms and services enable many things for a business, not the least of which is collaboration and co-working. With centralized access to applications and data, workers can get the information they need regardless of where they are, and the workflows and processes may be improved and expanded because all users can participate as required.

Enabling connectivity for the platform is as essential as for the applications. When applications and processes can connect seamlessly, the data flows through the business better and there’s less chance of it getting damaged or lost. Re-keying data increases the opportunity for errors, and manual import/export processes can fail due to simple mistakes. With the right integration and sync tools and an IT platform that fully supports them, the business can improve the speed and accuracy of data moving throughout the system.

There is a growing need for accounting and business professionals who understand how these data connections can work and assisting businesses with selecting and implementing the right ones. This used to be more in the domain of the CIO, information systems guys and data analysts, but it is falling more to the accounting and finance teams these days.

For many years, accounting and finance were just the final dumping ground for after-the-fact financial data. Operationally, things could be humming along in the business and looking just fine, but the business was losing money, and nobody knew it before it was too late. Now, business owners and managers have come to understand that virtually EVERYTHING in business has a financial impact and leaves an imprint on the business: every action and activity, every relationship and interaction.

When cloud platforms, applications and integrations are in place for the business, business intelligence comes not just from after-the-fact silos of historical data, but from current and real-time information that is the key to unlocking a deeper understanding of business performance.

jm bunny feetMake Sense?

J

Migrating Your Processes and Knowledge to the Cloud

Adopting cloud platforms can bring great business benefit without forcing dramatic change.

Many business owners believe they must dramatically change their software and business processes just to embrace cloud working models. Too often they are left believing that any business use of cloud technologies requires changing software and systems over to subscription web-based solutions which enable the much-desired anytime/anywhere working model.  What too many businesses aren’t being told is that there are ways to move to cloud platforms without losing their investments in people, processes and business knowledge.

The benefits of a cloud computing model are many, with mobility and managed service being the most obvious.  Less evident are the potential cost savings, because the subscription approach to paying for IT services may, on the surface, look like an equivalent or even higher cost over time. 

What isn’t being considered is the potential to improve processes and increase productivity.  These benefits are often achieved simply due to a centralized management and access approach, and are not necessarily attributable to the adoption of new software tools.

The cloud is the right answer for deploying and managing IT for many businesses, and delivers more value than on-premises systems can for the same price.

Eliminating the on-premises server and network with a cloud server implementation should be considered first, before changing out the software and tools in use throughout the organization. Hosting the existing applications means users can access their regular desktop software via the cloud, allowing the organization to fully retain their investments in people, processes and knowledge, and to build on that foundation with centralized service and improved collaboration..

Businesses of all sizes and types are are finding that the cloud, hosted applications and remote access provide the answers to a variety of business IT problems.  Even more, those answers are being provided affordably, with a simplicity of setup and with higher levels of service than is usually provided for with localized IT.

Small businesses and enterprise organizations alike can experience many benefits with a cloud hosted and managed IT approach.  It doesn’t take a comprehensive application or process overhaul to begin improving internal IT operations for the business, and it makes no sense for a business to give up investments in training, process development, and people knowledge in exchange for a centrally managed and remotely accessible system. 

Rather, the smart business takes the steps to solve the real issues of IT management and mobility while allowing users to continue performing their tasks and doing business as usual – only better now because the platform is working for them.

jm bunny feetMake Sense?

J

Microsoft 365: Stay Updated or Lose Connectivity and Support

Microsoft Office is a staple of business software, setting the standard for productivity applications across the globe. Unfortunately, popularity often means “target” and the bad guys out there are gunning for your system, looking for vulnerabilities they can exploit. This is among the reasons to make sure your Office applications are staying up-to-date with the latest fixes and security features. The easiest way to do this is to turn on automatic updating for Windows via Microsoft Update so that your system gets Office updates for earlier versions of Office you might have installed, such as Office 2010 or an Office volume license install.

Security updates aren’t the only reasons to keep your systems up to date. Sometimes an update addresses compatibility with other applications or services. In recent days, Microsoft has reminded businesses of the roadmap for Microsoft 365 services where certain versions of the Office and Microsoft 365 applications will stop communicating with the Office 365 and Microsoft 365 services.

Microsoft Outlook for Windows

Effective as of November 1, 2021, older versions of Outlook for Windows (starting with Outlook 2007), will be unable to connect with Office 365 and Microsoft 365 services, including hosted Exchange mailboxes. Versions that are only a little bit out of date might work, but are likely to experience connectivity issues with the back-end services. Here’s the list of retired versions of Outlook for Windows:

  • Office 2007 All Versions
  • Office 2010 All Versions
  • Office 2013 Versions prior to 15.0.4971.1000 of Office 2013 (Service Pack 1 with the October 2017 Update)
  • Office 2016 MSI Versions prior to 16.0.4600.1000 of Office 2016 (With the November 2017 Update, KB 4051890)
  • Microsoft 365 Apps for enterprise;(formerly Office 365 ProPlus) 1705 and older
  • Microsoft 365 Apps for business(formerly Office 365 Business) 1705 and older

OneDrive sync on Windows

Microsoft is now aligning the OneDrive sync on Windows systems with the Windows operating system support lifecycle policy.  In short, OneDrive sync on Windows will only be supported on supported versions of Windows beginning in January 1, 2022, If your version of Windows is no longer being supported, then the OneDrive sync on those machines will no longer receive updates or fixes of any sort.

  • Windows 7 and Windows 8.1 will be supported until January 10, 2023
  • Windows 8 reached end of support on January 12, 2016

If you are running the OneDrive sync app on Windows 8.1, you will no longer receive feature updates but will receive security fixes until January 10, 2023.

If you are running the OneDrive sync app on Windows 7 (and are participating in the Extended Security Update (ESU) program), you will continue to receive critical and important security updates until January 10, 2023. Extended Security Updates don’t include new features, customer-requested non-security updates, or design change requests.

If you are running the OneDrive sync app on Windows 8, you will no longer receive updates or fixes of any kind, as Windows 8 is no longer supported.

Businesses concerned with keeping their systems up and running should take care to ensure that PCs and servers are updated with current, supported operating systems and application software. Ignoring PC updates and Windows upgrades can create unnecessary disruption and leads to lost productivity and lost profits. For PCs, Windows 10 or 11 is the OS to be running. For Windows servers, Server 2019 is the most current version.

Mendelson Consulting’s NOOBEH Cloud Services team knows how important it is to keep your core operating software and applications current, compatible and supported. That’s why we only deploy modern servers and current operating systems on the Microsoft Cloud platform, ensuring our hosted clients have the foundation they need to keep workers performing and operations running.

jm bunny feetMake Sense?

J

Direct-to-Consumer Causing Manufacturing Logistics Issues

Manufacturers have traditionally been positioned as a link in the long chain of supply. Somewhere between raw materials and finished products is where the manufacturer exists, transforming the materials into products that can be resold via distributors and wholesalers.

The supply chain was linear and relatively predictable, but that is all changing. With the introduction of broad internet connectivity, web-based services, large e-commerce platforms and increasingly innovative and competitive new logistics players, the supply chain is becoming a spiderweb of connectivity and communication, with linear approaches out the window and, to some extent, predictability along with it.

The economy we have today is an environment where customers demand more direct and personal approaches, and producers are being forced to find ways to accommodate. With the huge e-commerce platforms like Amazon and Alibaba, along with more direct-to-consumer channels, manufacturers are being turned into direct-to-consumer suppliers. Acting as drop shippers for the seller, the manufacturer isn’t shipping bulk or volume to distributors or wholesalers but smaller shipments direct to the consumer.

Many retail stores have now become more fulfillment locations than the place where the customer buys. This is causing tremendous change in logistics tools and approaches because the size of shipments is becoming smaller while the number of deliveries – and delivery locations – is only increasing.

Customers can go right to the brand’s website and buy direct, driving increased focus on building brand value and improving the overall customer experience. With the demand from consumers for flexibility in how and where they buy, retailers have shifted their approaches to bring e-commerce into the brick-and-mortar stores. This is where online and offline sales channels come together, creating pressure in ordering and fulfillment systems to offer the flexibility and experience consumers want.

While this converged channel model requires businesses to make new and continued investments in e-commerce and digital solutions to enable the flow of orders and information, it also delivers several potential benefits to the business, including the ability to better manage growing customer expectations, better compete in the digital marketplace, and address disruptions in the supply chain by having alternative options.

Delivering the goods has always been an operational challenge, with success often measured in performance and cost. Today’s marketplace requires more agility and flexibility, which means the role of supply chain managers is more strategic than ever. Simple logistics now has a direct impact on the customer’s decision to buy now, as well as buying again later.

jm bunny feetMake Sense?

J

Cybersecurity Terms Every Business Owner Should Know, and Zombies are Bad

The world of cybersecurity constantly changes, making ongoing education the key to understanding the threats businesses face and how to possibly deal with them.

Cybersecurity is often defined as a set of techniques for protecting an organization’s digital infrastructure – the networks, systems, and applications – from being compromised by attackers and other threat actors. Cybersecurity is comprised of the efforts to design, implement, and maintain security for any organization network which is connected to the Internet.

Cybersecurity is made up of the technology, people, and processes which create strategies to protect sensitive data, ensure business continuity, and safeguard against financial loss.

To understand what cybersecurity entails, it is important to have a basic understanding of the relevant terminology.

Starting with a few that are frequently misused, here are some cybersecurity terms to add to your business vocabulary.

Data are the bits and bytes. When multiple bits and bytes are combined, they make up information. Knowledge is required to turn information into action.

A threat is the possibility that something bad that might happen, while a risk includes the probability of the bad thing happening and the possible result.

Risk Management is the process of responding to the possibility that something bad might happen. Traditionally, there are four options for managing risk in the business: accept it, transfer it to someone else, avoid it altogether, or mitigate it (reduce the severity).  To manage cybersecurity risk, many businesses establish requirements or controls to identify activities, processes, practices, or capabilities an organization may have. Controls may or may not be mandatory, but requirements generally are.

Information Security, or Information Assurance, is the protection of facts, news, knowledge, or data in any form. Information Assurance is an important aspect of preserving business resources and is often combined with cybersecurity, although it isn’t squarely in that area. Where cyber addresses digital, information security must also address non-digital such as paper, human knowledge or memorized, stone tablets, pictures, and signals or whatever.

Authentication is the process of proving an individual is who they say they are (claiming an identity and then proving it), whereas authorization is the use of access controls to determines and enforces what authenticated users are permitted to do within a computer system. Access Controls are the means and mechanisms of managing access to and use of resources by users.

Audits, in cybersecurity, are usually performed after a security incident. In general, an audit is an official inspection of some type. An assessment is often more like a health check for gauging capability or status. Audits may be performed internally or by outside entities. Compliance is meeting a requirement, whether internal or external. Sometimes these are regulatory requirements where a certification or attestation of some type is shown. Both audits and assessments may be required to be compliant with certain standards or designations.

A cyberattack is any attempt to violate the security perimeter of a logical environment. This could be a single computer system, a local or wide-area network, a cloud server, etc. – whatever is within your “perimeter” and is interconnected with your systems, regardless of location in the physical world. Cyberespionage, on the other hand, is the unlawful and unethical act of violating the privacy and security of an organization for the purposes of leaking data or disclosing internal, confidential, or private information.

And then there’s malware (malicious software), which includes any code that is written for the specific purpose of causing harm, disclosing information or in some other way violating the security or stability of a system. The malware category includes lots of different types of terrible and potentially damaging programs including virus, worm, Trojan horse, logic bomb, backdoor, Remote Access Trojan (RAT), rootkit, ransomware, and spyware/adware and more.

To better-secure your systems, multi-factor or two-factor authentication is suggested. Multi-(multiple) factor and two-factor authentication are a means of verifying a “claimed” identity using two or more types of proof (authentication factors). The password is typically the initial proof provided, and the other factor/method might be SMS to your phone or possibly an authenticator app.

For example: You claim that the email address is your identity, and you verify that by entering your password. That is one “factor” that proves your identity. But if your password gets hacked or revealed, it would be good to have another layer of protection on that login. Two is better than one in this case; MFA (multi-factor) and 2FA (two-factor) authentication is considered stronger than any single factor authentication and requires another method (factor) of identification to prove your identity.

Finally, there are zombies. Yes, Zombies. This is a term that relates to the concept of a malicious network of “bots” (a botnet). Botnets are made up of poor, innocent computers that are compromised by malicious code so that they can run remote control or other agents. The agents give the attackers the ability to use the system’s resources to do nefarious things, like perform illicit or criminal actions. The zombie can be the system that hosts the malware agent of the botnet, or it could be the malware agent itself. Either way, zombies are bad.

Security is an essential consideration for every business, and the Internet and the interconnected design of today’s technology has made things so much more complicated. The most important thing is to be aware of the threat and how that landscape is changing, and to educate team members so that everyone in the company participates in keeping the system, and the business, protected.

jm bunny feetMake Sense?

J

Considering Cybersecurity as Cloud Work Expands

When the pandemic forced many business users to move to remote work, it also forced the network security “boundary” to expand greatly and with great speed. Companies quickly adapted their tools and work so that it could be done somewhat effectively even as the employee working environment changed.  But new security models to match with new working models have not as quickly been adopted.

Business cloud workloads grew, by some estimates, as much as 20% just in the first 6 months of 2020. Yet many of those businesses electing to bring cloud working models to their business also made of the mistake of not expanding their security as they expanded the cloud network. This leaves systems and information vulnerable. Phishing, ransomware, credential theft and web app attacks have increased, catching businesses in their vulnerable states.

“In April to June of 2020 alone, security incidents increased by 188%.”

Even more than on-premises systems, it was the external cloud-based data and applications that were under attack because so many companies expanded their use of cloud services without enhanced security as part of the plan. Any expansion to include the cloud as network also significantly increases security risks. One report found that 35% of businesses made their cloud storage openly accessible to the public, allowing anyone to access it via the internet.

Don’t let your critical information be exposed or put at risk. When you begin using a cloud service, make sure to also address security for the new working mode or it could lead to lost or leaked information or a system breach.

Mendelson Consulting and NOOBEH cloud services take security very seriously. We help our clients keep their applications and data working properly and have a focus on methods to keep information safe regardless of what cloud you work on.

jm bunny feetMake Sense?

J

1 ( https://duo.com/blog/growing-security-safely-in-canada )