eResources’ ITonDemand places in the Pioneer 250 of Managed Service Providers

eResources’ ITonDemand places in the Pioneer 250 of Managed Service Providers

CRN, a leader in news, analysis, and perspective on IT solutions, has again assembled the MSP 500, an annual list that recognizes North American MSPs with cutting-edge approaches to managed services.

We are excited to announce that eResources’ ITonDemand has been featured on the Pioneer 250 of CRN’s 2019 Managed Service Provider 500 list.

Managed service providers are integral to the success of businesses everywhere. They empower companies to implement and operate complex technologies while staying within their budgets and keeping their focus on their core business. CRN’s MSP 500 list identifies the most groundbreaking managed service organizations, with advanced solutions that have endless potential for growth.

“Capable MSPs enable companies to take their cloud computing to the next level, streamline spending, effectively allocate limited resources and navigate the vast field of available technologies,” said Bob Skelley, CEO of The Channel Company. “The companies on CRN’s 2019 MSP 500 list stand out for their innovative services, excellence in adapting to customers’ changing needs and demonstrated ability to help businesses get the most out of their IT investments.”

What does this mean?

This Pioneer 250 annual list compiles the best, managed service providers to the SMB (small to medium-sized business) market. ITonDemand has been recognized in this field as a leader among North American managed service providers.

In its 20-year history, ITonDemand has prided itself with providing innovative IT solutions to a wide range of customers. We will continue striving and working to provide the best services for our partners throughout 2019 and the years to come. 

Other Articles You Might Be Interested In:

Two IT Shifts That Will Impact You in 2019

Two IT Shifts That Will Impact You in 2019

Knowledge is power. Every year brings changes and developments in technology. We, at ITonDemand, are continuously focused on providing the highest quality service and a comprehensive security solution. This means looking ahead proactively for how these developments...

read more
Are You Operating a Data Silo?

Are You Operating a Data Silo?

Clear communication within your company is important. Clear communication with your clients is vital. If you are operating in a "data silo" you are muddying the communication both internally and externally. But are you operating a data silo? You may not even...

read more

Have a Question?

How would you generally categorize your question?

Two IT Shifts That Will Impact You in 2019

Two IT Shifts That Will Impact You in 2019

Knowledge is power.

Every year brings changes and developments in technology. We, at ITonDemand, are continuously focused on providing the highest quality service and a comprehensive security solution. This means looking ahead proactively for how these developments impact our clients and their digital landscape.

There are two shifts occurring in information technology that we predict will broaden their impact in 2019.

  • Hybrid Cloud Approaches and;
  • Heightened Information Security

Hybrid Cloud Approaches

“Cloud is not for everything or everyone,” our Director of Partner Development, Steve Condit, writes. “The cloud has been the buzzword for almost a decade now. The idea was introduced to allow companies the ability to save on internal server infrastructure as they could host them in the cloud.”

Hackers have been encrypting data stored in cloud services.

MIT identified this as one of the 6 largest threats to worry about. 39% of businesses have faced a ransomware attack, the average payout = $2,500

The reality is a cloud-only strategy has proven to have drastic effects on user experience, as the cloud hosted services are still very dependent on the internet and can be susceptible to ransomware attacks.

Best practices use a hybrid cloud approach for service delivery. This utilizes the cloud for what it does best and retains local infrastructure for what it does best. This hybrid of local and cloud services provides improved security and accessibility.

Heightened Information Security

“Security is always a hot topic, but 2019 shows to increase in security remediation and prevention tactics,” Condit said. “More government and industry-specific compliances are expected to hit the market, which calls for a deeper look into every businesses approach to Information Security.”

2018 showed us the damage that data loss and breaches can bring to a business. Stemming from Facebook’s continuous data loss throughout 2018, public opinion has grown increasingly wary of data security. The largest US data breach of 2018 came from Marriott who lost 500 million records.

staff workingHow is ITonDemand changing in 2019?

With ITonDemand’s team focused approach to service delivery, we look to make great strides to deliver the best experience for our partners.

Advanced customer documentation and process driven strategy will prove to deliver a more consistent level of service across our entire team. This will improve both the productivity, security, and experience of our partners.

We look forward to the changes, challenges, and growth that come in 2019.

Curious about how we can make a more productive and secure 2019? Let’s get you in touch with one of our IT experts.

Have a Question?

How would you generally categorize your question?

Other Articles You Might Be Interested In:

Two IT Shifts That Will Impact You in 2019

Two IT Shifts That Will Impact You in 2019

Knowledge is power. Every year brings changes and developments in technology. We, at ITonDemand, are continuously focused on providing the highest quality service and a comprehensive security solution. This means looking ahead proactively for how these developments...

read more
Are You Operating a Data Silo?

Are You Operating a Data Silo?

Clear communication within your company is important. Clear communication with your clients is vital. If you are operating in a "data silo" you are muddying the communication both internally and externally. But are you operating a data silo? You may not even...

read more
Are You Operating a Data Silo?

Are You Operating a Data Silo?

Clear communication within your company is important. Clear communication with your clients is vital. If you are operating in a “data silo” you are muddying the communication both internally and externally.

But are you operating a data silo? You may not even understand the question. It’s not exactly a common term, after all.

Data silos cripple your business’ ability to understand your clients. So what is a data silo and how can you beat it?

What is a Data Silo?

A data silo is a lot like an actual silo from a farm.

Farm silos are built to hold barley, wheat, and any other grain to keep them dry. More importantly, though, they were used to keep them separated to prevent the spreading of any potential infection.

Picture your digital systems and even your different departments as these silos. Each has incredible amounts of useful information in databases that other departments aren’t able to access. We see “silo mentality” in almost every organization and 97% of executives agree, it’s bad for business.

For example, the average small business uses 14.3 different systems, each with its own information.

How do they get there in the first place?

A lot of reasons, frankly, and not all are bad.

Some are put in place for needed security. Extending access unnecessarily can bring with it the additional risk of a data breach. This was the case with Nashville Metro Public Health when an information security error led to patient information being exposed by one or more of their 500 employees. Data Silos might be necessary to protect sensitive information.

Others that are more common and detrimental to business are built due to technical restrictions in one-sided software. In this case, a lack of access hinders the productivity of your team and can make it difficult to meet client expectation.

In the case of marketing departments, silos can segment information gathered from email campaigns and restrict it from impacting social campaigns to maximize ROI.

So how can I beat “silo mentality”?

The first thing necessary to eliminate data silos is a top-down initiative. Everyone from executives down to IT staff needs to be onboard with an organizational effort to integrate data.

Data silos prevail without a useful and intuitive enterprise integration system in place. File sharing allows open access to information. Adding this type of system to your information structure allows the system to be more flexible, having a wider variety of features when integrating programs.

Remove your limitations

Data silos limit your companies ability to know your customer but they also limit your companies ability to know itself. They don’t empower those with the information but bottleneck progress on your most necessary tasks.

Odds are you are operating a data silo. The question is: what are you going to do about it?

Other Articles You Might Be Interested In:

Two IT Shifts That Will Impact You in 2019

Two IT Shifts That Will Impact You in 2019

Knowledge is power. Every year brings changes and developments in technology. We, at ITonDemand, are continuously focused on providing the highest quality service and a comprehensive security solution. This means looking ahead proactively for how these developments...

read more
Are You Operating a Data Silo?

Are You Operating a Data Silo?

Clear communication within your company is important. Clear communication with your clients is vital. If you are operating in a "data silo" you are muddying the communication both internally and externally. But are you operating a data silo? You may not even...

read more

Have a Question?

How would you generally categorize your question?

Office365 “Non-Delivery” Phishing Scam

Office365 “Non-Delivery” Phishing Scam

Below are two emails alleging to be Office365 informing the recipient of undelivered messages.  Can you spot which one is the phishing scam?

 

Email 1

Email 2

If you guessed that Email 1 is the phishing scam, you are correct! 

In a new phishing scam targeting Office365 users, hackers are attempting to steal login credentials to infiltrate business’ systems. When the user clicks “Send Again”, it takes users to a fraudulent Office365 login screen. After the information is entered, the site redirects to outlook, leaving the user believing they are in no danger.

This is an example of a high-level phishing scam. 

Quick Ways to Identify Phishing Scams

1. Always look at the URL

If the URL looks in any way incorrect, don’t enter your account information.

If redirected in this case, the URL on the fraudulent landing page is incorrect.

2. Specificity

Phishing scams will generally omit specific names, addresses, or titles and use phrases like “Dear User”

In this case, the email says “Your messages couldn’t be delivered” rather than “Your message to email@address.com couldn’t be delivered.”

3. Display Name

Make sure that the display name matches the URL from the email.

In the fraudulent email, the address is sent from the URL us.ibm.com, rather than as from Microsoft Outlook. 

What can you do?

“Education and vigilance are the best line of defense against these types of attacks,” said Steve Condit, Director of Partner Development for ITonDemand. Keeping you and your staff informed on what to look for is the most effective way to stay secure. 

If you have fallen victim to this scam, the best course of action is to make sure you change the affected passwords as well as any accounts or applications that may have been connected to the affected email address. 

If you still have concerns on how to keep your business secure, contact us here.

Other Articles You Might Be Interested In:

Two IT Shifts That Will Impact You in 2019

Two IT Shifts That Will Impact You in 2019

Knowledge is power. Every year brings changes and developments in technology. We, at ITonDemand, are continuously focused on providing the highest quality service and a comprehensive security solution. This means looking ahead proactively for how these developments...

read more
Are You Operating a Data Silo?

Are You Operating a Data Silo?

Clear communication within your company is important. Clear communication with your clients is vital. If you are operating in a "data silo" you are muddying the communication both internally and externally. But are you operating a data silo? You may not even...

read more

Have a Question?

How would you generally categorize your question?

Is My Home Network Secure?

Is My Home Network Secure?

When you’re at work, you access your email, documents, financials, and so on with a certain level of assurance of security. You probably didn’t set up that business network though.

In a Gallup survey of 15,000 people, 43% cited some remote work. Of those working remote, how many don’t consider the security of their home network?

Most homeowners stick to the basics with their home network; functionality. After all, if it isn’t broke, don’t fix it.

But between online shopping, bill payment, and your client’s sensitive data, do you actually know if your home network secure?

Here are four steps you can take to make sure it is.

Change your router login

When you move into a new home, it’s exciting. You’re redecorating and getting your new accounts turned on and getting your cable and internet hooked up. The last thing on your mind is changing the login credentials of your router.

If you are using a router setup by your ISP, it’s likely that both your username and password are admin.

This is a serious security issue if left unaddressed. Unique login credentials are a basic line of defense.

To change your login:

  • Access the login screen to your router by entering the IP address of your router into the search bar.
  • Login using username and password found on the back or bottom of the router.

(Probably admin and admin)

  • Under Security Settings, select User.
  • This should bring you to a prompt to change the password.

While most routers are similar if you have issues contact your ISP for specific instructions.

Enable WPA2

Enabling WPA2 means that the data you share over your wireless network is encrypted. This protects sensitive information that may be transmitted.

You can use either WPA2 – Personal or WPA2 – Enterprise. Each has their strengths and weaknesses. If you are less tech-savvy, personal will work just fine for you.

To turn on WPA2:

  • While logged into your router, select the network you wish to change.
    • Either 2.4 GHz or 5 GHz
  • Under Basic or Security, select the encryption type you want to use.

Disable Your 2.4 GHz Network

Lower frequencies travel longer distances. This is why you can see your neighbors wifi and their clever network names. The only problem with this is that if they can see it so can potential hackers.

The 5GHz network is a more recent development. Because it operates at a higher frequency, it is limited by solid walls and won’t function outside of a home. Not all devices are compatible with a 5GHz network, such as iPhone 4s and earlier and even some tablets. Although, if you do a lot of streaming, you’ll enjoy faster speeds with 5GHz.  

To disable your 2.4GHz network:

  • While logged into your router, select 2.4GHz network.
  • Under Basic, select Disable 2.4GHz Wireless

Firewall

Firewalls are a front line of defense in network security. They limit traffic based on security rules. Most wireless routers come with some form of firewall. However, it may not be enabled by default.

To turn on your router’s firewall:

  • While logged into your router, select Access Control.
  • Select Firewall.
  • From the menu, you can select the level of security from the firewall.

    Better Safe than Sorry

    At ITonDemand, we are fully committed to secure systems, wherever they may be.

    Don’t neglect your home network. It may be out of sight, running peacefully in the background. But, it is a vital part of your data security.

    Other Articles You Might Be Interested In:

    Two IT Shifts That Will Impact You in 2019

    Two IT Shifts That Will Impact You in 2019

    Knowledge is power. Every year brings changes and developments in technology. We, at ITonDemand, are continuously focused on providing the highest quality service and a comprehensive security solution. This means looking ahead proactively for how these developments...

    read more
    Are You Operating a Data Silo?

    Are You Operating a Data Silo?

    Clear communication within your company is important. Clear communication with your clients is vital. If you are operating in a "data silo" you are muddying the communication both internally and externally. But are you operating a data silo? You may not even...

    read more

    Have a Question?

    How would you generally categorize your question?