Call (716) 373-4467

The explosion in recent years of mobility solutions and employee’s bringing their own devices has had a big impact on small businesses. In fact, 52 percent of information workers across 17 countries report using three or more devices for workaccording to research from Forrester and 61 percent of workers mix personal and work on their devices.

On one hand, there are huge benefits for organizations and employees — employees can be far more productive and work on the go with untethered access to the information they need. Business owners can also realize cost savings while reducing the time spent managing IT.  Yet, there are risks: namely, how do businesses protect confidential information from leaking outside of the organization when employees can access and store data in a multitude of ways across devices.

When employees use personal devices for work, they can be mishandled inadvertently, like an accidental forward of a confidential mail, or in more nefarious ways, such as a hacker gaining access to confidential information through stolen credentials.  According to a Verizon data breach investigation report, 75 percent of network intrusions used weak or stolen credentials to gain access.

It’s important to have a strong device policy in place but even when the rules are clear, there is room left for costly errors. CEB found that as many as 93 percent of employees admit to violating information security policies. That means, depending on your business, there is a wide variety of data that could be at risk.  It may be customers’ personally identifiable information, such as in healthcare, retail or financial institutions, or company confidential information, such as trade secrets, company financials, or employee records.  With so much data available, traditional company firewalls and perimeter solutions no longer suffice to protect confidential information wherever it lives.  Today, many small businesses are cobbling together a number of solutions to attempt to solve this problem.  But none tie it all together until now.

Microsoft has developed Microsoft Enterprise Mobility Suite (EMS), which is the only comprehensive solution that protects information assets across four layers: user identity, content, applications & cloud services, and devices.  When combined with Office 365, it offers native protection for applications and services your customers use every day. Best of all, it’s about half the cost of competitive solutions. Not only is EMS flexible and easy to integrate, it offers enterprise-grade security for small businesses. Key security features include:

  • Threat detection: Detect abnormal user behavior, suspicious activities, known malicious attacks and security issues right away.
  • Conditional access: Control access to applications and other corporate resources like email and files with policy-based conditions that evaluate criteria such as device health, user location etc.
  • Single sign-on: Sign in once to cloud and on-premises web apps from any device. Pre-integrated support for Salesforce, Concur, Workday, and thousands more popular SaaS apps.

To learn more about protecting your business, visit Microsoft Enterprise Mobility or watch this video. Ready to integrate EMS? Reach out to Databranch at 373-4467 or info@databranch.com!

Take this quiz to find out!
 

How can you tell if you are receiving poor or substandard service? 

 
How do you know if your computer guy is doing everything possible to secure your network from downtime, cyber-criminals, data loss, or other frustrating and expensive disasters? 
 
Could your current computer guy actually be jeopardizing your network?

 
If your computer support company does not score a “YES” on every point, you could be paying for substandard support. 
 
  • Do they respond to emergencies in 30 minutes or less?
  • Are they easy to reach when you need them for non-emergencies?
  • Do they offer ongoing maintenance to keep your systems running smooth?
  • Do they proactively offer new ways to improve your network’s performance?
  • Do they provide detailed invoices that clearly explain what you are paying for?
  • Do they complete projects on time and on budget?
  • Do they follow up on your support requests quickly?
  • Do they offer a guarantee on their services?
  • Do they arrive on time and dress professionally?
  • Do they have other technicians on staff who are familiar with your network in case your regular technician goes on vacation or gets sick?
  • Do their technicians maintain current vendor certifications and participate in ongoing training?
  • Are you confident they aren’t learning on your time?
  • Do they give you their full attention rather than seeming constantly rushed?
  • Are they adamant about backing up your network and having a disaster recovery plan in place?
  • Do they offer to meet with you regularly to review your business plans, your network status and their own performance in supporting your company?
  • Do they provide frequent updates, status reports and follow-up calls and e-mails so you don’t have to manage their progress on projects?
  • Do they offer flat-rate or fixed-fee project quotes, rather than giving themselves a wide-open playing field with “time and materials”?
2FA AI APC backup business continuity BYOD client of the month cloud computing computer services computer support computer upgrade Computer Upgrades Control Chief covid-19 CryptoLocker CryptoWall Cyber Attacks cyber criminal cyberattack cybercrime cybersecurity Cybersecurity Training Dark Web Monitoring Dark web scan data protection Data-Loss Prevention Databranch Databranch Comprehensive Care databranch cto databranch employees Discounts dura-bilt email migration email security End of Support Exchange Online Facebook Hardware Refresh heat-induced server crash holiday computer tips holiday internet tips How Long Do I have to Upgrade my Windows 7 Computers? ID Agent Information Technology Internet Security IT Outsourcing IT Services J.P. Morgan malware managed service managed services Microsoft Microsoft End of Support Microsoft Patching Microsoft Support Microsoft Telephone Scam mike wilson mobile device security Multi-Factor Authentication Network Infrastructure Office 2013 Office 365 old UPS password management password security Penn-Troy Manufacturing Phishing Attacks Power Failure proper server environment Ransomware remote access SBS2011 security security vulnerabilty Server 2008 Server 2008R2 Server Upgrade server virtualization Small Business Small Business Server 2011 smb SMS intercept Social Media stolen credentials Symantec Symantec Backup Exec temperature Tips Two-Factor Authentication Upgrading to Windows 10 UPS virus Western New York Windows 10 Windows 7 Windows Server 2003 Windows Server 2012 winrar