Centralize and Secure Business Applications and Data

laptop drawingThe portable computer is an essential business tool for day’s mobile workforce, having the power and portability to meet the demands of executives and professionals working away from the office.  While executives and mobile professionals get the applications and data they need to keep productivity high, carrying business data on devices outside the network introduces significant business risk.

There are studies which estimate that as much as 80% of the data a small business owns (data like customer files, contracts, product information and financial data) is copied to or stored on portable computers.  When valuable business data is lost or stolen, the business can be exposed to a variety of problems – loss of revenue being just one. Losing track of business data can create legal issues, too. Customer privacy may be compromised, sensitive information could be exposed, or confidential plans might be made public if a business doesn’t take the right steps to secure its data.

It isn’t just the possibility of loss or theft which increases risk when data is copied to portable computers – the increased vulnerability of the information sits with the likelihood that the user will access unsecured networks, launch non-corporate applications, access private email accounts and perform other non-business related tasks with the computer because they have more access than with a fully secured corporate in-office desktop.  User behavior is often what puts corporate data and assets at risk, regardless of the policies that might define correct and acceptable procedures. It is very easy for workers to unknowingly lose and leak data, and when the data is present on the portable computer it gets even easier.

A 2014 study commissioned by Cisco Systems found that employees around the world continue to engage in “risky” behaviors that put business and personal information at risk:

  • The majority (70%) of surveyed IT pros believe that as many as half of their data loss incidents are due to authorized program installations
  • 44% of employees share work devices with others without supervision
  • 39% of IT professionals have dealt with employees trying to access unauthorized parts of the company’s network
  • Almost half of the employees admitted to copying data between work and personal computers when working from home
  • 18% (up to 25% in some regions) of employees shared passwords with their co-workers

Companies must not only protect their data for their financial well-being, but must recognize their legal obligation to protect much of the information, as well.  The risk extends beyond the walls of the enterprise, to vendors and customers and consumers whose information may be stored in the company data. Additionally, portable computers exposed to malware and virus attacks are likely to pass the bad code to other systems they come in contact with, introducing not just risk for the recipient but liability for the infected laptop owner.

Where mobile computing brings huge advantages to today’s business, owners would do well to consider the benefits of enabling mobility through the use of server-based and hosted computing models. Rather than installing software and copying data to PCs and mobile devices, workers should be able to access a central system where the applications actually run. IT management is more efficient and security is easier to enforce when applications and resources are contained exclusively within the corporate boundary, even if they are accessible from without.

Virtual desktop and remote application solutions offer features that address a variety of potential risk factors as well as enabling improved management and security of IT assets.  Centralizing and securing applications and data resources at the server allows businesses to deliver the mobility and functionality users need while enabling the information security and management the business demands. This is a foundation upon which remote desktop and remote application technologies were built, allowing users to have the real-time access to applications and data with full functionality and desktop modality, but without the requirement to install, manage and secure applications and data on the individual devices.

Make Sense?

J

Remote applications, virtual desktops and hosted QuickBooks

Cloud computing and SaaS applications are all the rage, and businesses are finding tremendous benefits with the mobility and managed service these models provide.  On the other hand, there also continues to be huge reliance on the desktop computer and the software running on it. From basic productivity tools to more advanced business solutions, desktop-based software and locally installed applications remain in favor for the vast majority of businesses around the country.  Adoption of web-based solutions is certainly increasing, but the need for tried-and-true business applications that were traditionally installed and managed directly on the PC or local network doesn’t seem to be going away. At least part of the reason for this is the functionality and performance these applications deliver.  Another factor is that hosting and remote access solutions have matured to the point where hosting applications is just as “mainstream” (and often more useful to the business) as using a SaaS solution. Managed application hosting models have made solutions like Microsoft Office and QuickBooks desktop editions available anytime, anywhere and using just about any device. I call hosting the best “tweener” solution available, because users can have the functionality they need and still get fully managed, on-demand service.

Back when a few businesses started operating as Application Service Providers (ASPs), there were a limited number of realistic approaches available for building the platform to deliver desktop applications.  Many application hosting offerings grew somewhat like a fungus from the internal Citrix Metaframe and terminal service set ups performed by IT service companies.   A lot of these companies didn’t start out to provide application hosting services; they simply found it to be more efficient and profitable than trying to manage all that hardware and software at the client site.

Over the years, a variety of solutions have been introduced to ease the burdens of implementation and management of desktop applications on centralized platforms, but most of them were designed more for enterprise deployment rather than as the basis for a generalized service offering.  Microsoft’s Remote App and Remote Desktop services, Microsoft and Citrix and Dell (Quest) app virtualization/management/publishing, even streaming and “containerized” applications… there are quite a few options out there and, in some circumstances, they can work pretty well.   What has kept them from working out REALLY well, however, is the cost and complexity of deploying these solutions.  From printing problems to user device support to simply allowing a user to gracefully reset their connection when it gets stuck…  application and desktop delivery platforms can be very difficult to set up and manage.

My team works with a number of solutions which address these aspects of application and desktop delivery, bringing the functionality to a level where small businesses and their IT service providers can easily set up secure remote access and hosting environments that actually work.  This includes addressing the printing facilities, user management, app and desktop publishing, workspaces administration, and connection management that makes a remote desktop or app deployment useful. For IT folks, the fact that no special firewall configurations are required and that a static IP address is not needed means that our solution for on-prem can work where many VPNs and web portals can’t.

Remote Desktop services (Terminal services) is the most widely recognized approach for creating “virtual” desktop or hosted application services.  It solves many of the problems involved in centralizing the management and administration of computing resources and applications for broad bases of users, and it’s pretty much the only game in town when it comes to putting traditional desktop applications online (or putting the desktop online).  This approach, which is essentially packing all of the computing requirement into a centralized infrastructure, is the most effective method of addressing the total business requirement (e.g., hosting all the business applications with associated data, administering user security and access, and managing the entire system) at any significant scale.  Each of these methods of providing managed applications require that the entire realm of solutions – the main applications, all integrations, drivers for devices to be supported, and all associated data – exist on the service provider servers and under the service provider’s control.

Our services deliver a simple and straightforward set up so you begin using the platform right away; seamless and affordable.

Joanie Mann Bunny FeetMake Sense?

J

Channel Partners: Selling Telephony With a Side of Remote Access and Cloud Hosted Applications

Channel agents and telephony resellers are facing stiff competition these days. Line access or voice service isn’t as easy to sell as it once was, and the convergence of digital voice and data has made things even less simple. Business customers demand comprehensive solutions that can address a variety of business problems, and they tend to seek out those solutions from the advisors they trust. The “advisor” could be a software reseller, an accounting professional, the local IT guy, or the professional that delivered great telco, voice or network access.

Convergence isn’t only for voice and data solutions; convergence is the combining and compressing of channels delivering those solutions. MSPs and “pure” IT resellers are also feeling the squeeze, finding telecom agents and channels among those challenging the VARs and MSPs operating today. Marketing budgets are increasing, but differentiation is not.  Reselling is a crowded space and everyone has become a service provider. Having the right messages to win new customers and retain existing ones is essential not just for success, but for survival.

Once a channel partner or provider has established a solid customer relationship, it is important to capitalize on that goodwill (and develop even more) by delivering the other value-added services the customer needs. Access, connectivity and voice solutions are just a start when it comes to servicing small and growing business customers. Having come from an application hosting background, I am very aware of the demand for mobility and “always-on, always-available” computing services among businesses small and large. When the partner is working with the customer and is solving connectivity and telephony problems, the likelihood of successfully selling additional IT solutions to address mobility is quite high. The challenge has often been with the investment required for training and certification; development of new competencies which are viewed as diversions from the core business. Evolution of technology, markets and demand suggests that offering a broader base of solutions isn’t a diversion any longer, it has become a core requirement.

Secure remote access to on-premises systems, managed hosting on cloud servers delivering always-on service or disaster recovery, and collaboration tools that keep everyone on the same page – these are the solutions that savvy businesses are looking for, and which represent the additional value channel partners and service providers could be delivering to their valued customers. After all, if the customer can’t get what they need from their trusted reseller/advisor, they will find somewhere else to buy, removing their “advisor” from the mix. Most business owners would agree that it takes less to nurture and maintain existing customers than it takes to find new ones, so the investment in offering and delivering value-added solutions is well worth it.

The best way for channel partners to retain their customer relationships is to offer a full range of solutions and value-added services to meet the variety of needs of their business clientele.  MyQuickCloud, for example, is a highly successful partner solution and add-on for resellers of IP telephony services and line access. MyQuickCloud offers very flexible and affordable secure remote access and cloud hosting solutions that do not require investments in training or certification to resell, giving channel partners and telecomm agents the right stuff to beat out the competition and keep small business and growing enterprise customers happy and coming back for more. Partners leverage their expertise and creativity in developing solutions with MyQuickCloud, resulting in cost-effective and powerful network, application and continuity services not previously available.

MyQuickCloud secure remote access creates a secure business cloud from on-premises systems, with hosted or co-located cloud servers, or any combination of on-prem or offsite hosts. The on-premises capability leverages investments in existing infrastructure and adds value and capability to locally installed systems, a benefit which is not available with traditional hosting models. Able to be positioned as simple remote access, managed hosting or complete disaster recovery, MyQuickCloud gives channel partners a simple yet comprehensive approach to meeting customer computing needs regardless of the applications in use or mobile devices to support. MyQuickCloud is also used by installers and support technicians, enabling remote access to client on-prem systems, turning service and support into a more streamlined and efficient effort and improving customer service and retention.

I wrote an article a while back about how it all comes down to 3 applications for small businesses… applications to address fundamental business requirements. Among those requirements is the need to communicate.  Whether it be via voice or electronic mail or other means, every business communicates and every business needs communication tools.  Chief among the communication tools is the voice service (telephone), whether it be on-premises or hosted, digital voice or IP (not much analog out there anymore) or some combination of all of the above. Extending telephone systems to service a remote and mobile workforce or to connect multiple business locations is a high demand business and has proven to be very lucrative for many partners.  Adding value to these solutions by delivering remote access or hosting service simply increases the overall value of the system and allows business customers to take full advantage of mobile, connected and integrated working models.

Make Sense?

J

 

Hosting QuickBooks Desktop Editions – The Good and the Bad – Accountex Report

published on Sleeter.com blog, now Accountex Report, January 22, 2013. This is an oldie but a goodie… perhaps more relevant now than ever.

With the accounting industry moving towards cloud computing and fully online working models, users of Intuit QuickBooks desktop editions may believe that their best option is to migrate to a web-based edition of the software rather than continuing to use the version of QuickBooks they have come to rely on. While QuickBooks Online Edition may seem like the best option for anytime, anywhere access to financial applications and data, it might not provide the functionality or features that QuickBooks desktop edition users need. When the business needs the full capability of the desktop edition product, hosting that solution with an application hosting service provider may be the right answer.

“Hosting” QuickBooks desktop editions means that a hosting service provider installs and manages the QuickBooks software and the company data files on their own cloud-based servers. Users don’t have to install QuickBooks on their PC, because they use the Internet to connect to their QuickBooks software and company data hosted by the service provider. Whether the service is accessed by clicking on an icon on the local PC desktop or by logging in via a web page or portal, the underlying technology is still Windows and QuickBooks.

Continue reading Hosting QuickBooks Desktop Editions – The Good and the Bad – Accountex Report

check out MyQuickCloud for QuickBooks Remote Access and Managed Cloud Hosting

Taking Action to Expand Overtime Protections | whitehouse.gov

The Department of Labor is finalizing a rule to update overtime protections for workers. “In total, the new rule is expected to extend overtime protections to 4.2 million more Americans who are not currently eligible under federal law, and it is expected to boost wages for workers by $12 billion over the next 10 years.”

Source: Taking Action to Expand Overtime Protections | whitehouse.gov

This is a difficult subject for everyone involved – workers and business owners alike. Increases in minimum wage, increases in employee health care costs, and adjustments to wage and hour regulations all serve complicate and cost businesses more.  Fair payment for time worked, a living wage, and protections for workers from employer abuse are things that are expected – deservedly so – by employees.   Definitions vary, as do circumstances, so a one-size rule never really fits all and someone, somewhere, feels the burn.

A USA Today article on the subject describes Labor Secretary Thomas Perez as saying “the salary threshold was originally intended to exempt high-paid executives but instead has denied overtime to low-level retail supervisors and entry-level office workers who often toil 50 to 70 hours a week.”

On the other hand Dan Bosch, head of regulatory policy for the National Federation of Independent Business, was described as saying that “many small businesses can’t absorb the added cost and will instruct employees to work no more than 40 hours a week, bringing on part-time workers to pick up the slack”.  From Trey Kovacs, policy analyst with the Competitive Enterprise Institute: “The Obama rule puts a huge cost and regulatory burden on employers, who will face pressure to cut back on benefits and full-time employees”.

A bill was introduced on Thursday by Republican congressional leadership hoping to block the proposed overtime rule. The proposed legislation, Protecting Workplace Advancement and Opportunity Act, is intended to ensure that the Department of Labor takes a “balanced and responsible approach to updating federal overtime rules.” Sponsors of the legislation include members of the Senate Committee on Health, Education, Labor, and Pensions and the House Committee on Education and the Workforce.

Part of the bill’s consideration may be the burden of record keeping and information management that just keeps growing ever larger.  The current DOL changes, for example, now suggest that businesses must keep time and attendance records in detail for their salaried employees who might qualify for overtime compensation.  Getting employees to keep time cards or complete timesheets  may not be an easy thing to do, yet punching a timeclock and tracking their hours may become their new normal.  Some employers, on the other hand, will elect to simply raise workers’ base pay to the new threshold, avoiding paying the overtime and skirting the need to keep detailed time records.

logo-we-heart-employees

The extension of overtime protection to another 4.2 million Americans, and boosting wages by $12 billion over the next 10 years is the expectation for the new rule’s impact, although opponents suggest that employment (and employers) will suffer, reducing their workforces while absorbing costly HR management processes just in order to comply.

The rule is likely to touch nearly every sector of the U.S. economy, with the most notable adjustments occurring with nonprofits, retailers and hospitality (hotel and restaurants), as these are the industries generally having management-level workers whose salaries are at or below the new threshold.  Whether the outcomes of the rule will be as expected remains to be seen, but it is certain that many businesses must now put in place software, systems and processes which will help not just help them comply with new wage and hour rules, but deliver enough intelligence to support better personnel management, employee scheduling and labor cost containment.

jmbunnyfeetMake Sense?

J

 

Securing Business Data When Mobility is the Target

driving1-ANIMATIONToday’s workforce is a mobile workforce. Technology has enabled businesses to allow their employees to reach beyond the office walls, doing business and operating effectively from just about any location.  SaaS, online access to business data, and smart phone technologies have brought flexibility in working models previously only imagined by the workforce tethered to business locations and office computers. Yet this flexibility comes at a price if the business is to keep up with securing and protecting data assets as readily as it extends access to them.  The bad guys are well aware that mobile computing and remote access working models are growing in adoption with businesses, and are finding ways to take ever-greater advantage of the situation.

Teleworking, which is not quite the same thing as telecommuting, is on the rise and it doesn’t look to be a trend that will slow down any time soon. According to GlobalWorkplaceanalytics.com, “telework is defined as the substitution of technology for travel”.  Those who work sometimes from an office, but sometimes not, are teleworkers. Working at the office during the day and then taking work home at night makes you a teleworker. The primary tool of the teleworkforce is the smart phone – the mobile computer with built-in connectivity and enough processing power to handle many basic office workloads.

  • 50% of the US workforce holds a job that is compatible with at least partial telework and approximately 20-25% of the workforce teleworks at some frequency
  • 80% to 90% of the US workforce says they would like to telework at least part-time. Two to three days a week seems to be the sweet spot that allows for a balance of concentrative work (at home) and collaborative work (at the office).
  • Fortune 1000 companies around the globe are entirely revamping their space around the fact that employees are already mobile. Studies repeatedly show they are not at their desk 50-60% of the time.  http://globalworkplaceanalytics.com/telecommuting-statistics

The number of teleworking employees is on the rise, and so is the variety of devices used to facilitate mobile working.  Smartphones, tablets and phablets and, of course, laptop computers are used by mobile workers – often in addition to the company-supplied desktop in the office. The variety and number of computing devices per user is growing. Knowing this, businesses must take increasingly expansive steps to strengthen and secure remote access systems and business data, yet many organizations are just beginning to fully realize that the mobility they extend to their users is part of the reason for the increasing number of data breaches and attacks against business information systems.

Cybercriminals and their crafty programs are often able to steal important information or access a network by first infecting computers and devices used for telework.  Many of the devices available to the attackers are not company-owned, but are introduced to the system by contractors, vendors and employees (BYOD or bring-your-own-device users).

Even if the device isn’t a vehicle delivering a nasty payload into the network, data breaches may still occur when business information is stored on an improperly secured device. Most people who work with computers have some recognition of the potential for virus attacks and malware, but far fewer recognize the threat potential of attacks against mobile devices such as phones and tablets, and even fewer may implement meaningful protections on those devices.

“To prevent breaches when people are teleworking, organizations need to have stronger control over their sensitive data that can be accessed by, or stored on, telework devices,” said Murugiah Souppaya, a NIST computer scientist. [1]

Providing guidance and information to the public on such topics, NIST (National Institute of Standards and Technology) is revising its publications on telework to cover growing use of BYOD and how contractor and vendor devices are increasingly used to access company information resources.  Two new publications – one for organizations and one for users – are now available for review and comment.  You can find them here.

“As one of the major research components of the National Institute of Standards and Technology, the Information Technology Laboratory (ITL) has the broad mission to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology through research and development in information technology, mathematics, and statistics.”  [NIST Information Technology Laboratory Mission]

The rising number of threats, attacks and breaches caused by compromised devices used for teleworking is nothing to take lightly, and protecting against them shouldn’t be approached as a merely perfunctory obligation. Organizations must create and consistently update policies and requirements relating to protecting information accessible by remote workers if they intend to reduce business risk and provide assurances to stakeholders and customers that the information is adequately guarded.  But it doesn’t stop with the policy; businesses must also make an effort to properly educate their users (employees, contractors, vendors, etc.) on those policies, ensuring that all parties involved understand the responsibilities and requirements and strictly adhere to them.

jmbunnyfeetMake Sense?

J

[1] http://www.nist.gov/itl/csd/attackers-honing-in-on-teleworkers-how-organizations-can-secure-their-datata.cfm