<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.concentricsolvesit.com/blogs/author/evan-burt/feed" rel="self" type="application/rss+xml"/><title>Concentric IT Solutions - Tech Talk by Evan Burt</title><description>Concentric IT Solutions - Tech Talk by Evan Burt</description><link>https://www.concentricsolvesit.com/blogs/author/evan-burt</link><lastBuildDate>Fri, 27 Mar 2026 08:49:53 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Don't Risk It!  Why You Shouldn't Skip Vulnerability Assessments]]></title><link>https://www.concentricsolvesit.com/blogs/post/tech-talk-volume-0032-001</link><description><![CDATA[<img align="left" hspace="5" src="https://www.concentricsolvesit.com/TTT_Blog-Post-Social-Image-Why-You-Shouldnt-Skip-Vulnerability-Assessments-V1.png"/>Cyber threats are a perpetual reality for business owners. Hackers are constantly innovating new ways to exploit vulnerabilities. One of the most crucial elements of cybersecurity is regular vulnerability assessments.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_wWRraNigScilbpu_2Y5r-Q" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_QX2pkErBRzijgoIt5gGDow" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_jcr9iGvURQy5hGZy2wYhEQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_7lJnTD5URquIxLN9nqYnTA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:left;">Cyber threats are a perpetual reality for business owners. Hackers are constantly innovating. They devise new ways to exploit vulnerabilities in computer systems and networks. </p><p style="text-align:left;"><br/></p><p style="text-align:left;">For businesses of all sizes, a proactive approach to cybersecurity is essential. One of the most crucial elements of this approach is regular vulnerability assessments. A vulnerability assessment is a systematic process. It identifies and prioritizes weaknesses in your IT infrastructure that attackers can exploit. </p><p style="text-align:left;"><br/></p><p style="text-align:left;">Some businesses may be tempted to forego vulnerability assessments. They might think it’s too costly or inconvenient. Small business leaders may also feel it’s just for the “big companies.” But vulnerability assessments are for everyone. No matter the company size. The risks associated with skipping them can be costly.</p><p style="text-align:left;"><br/></p><p style="text-align:left;"><a href="https://www.statista.com/statistics/500755/worldwide-common-vulnerabilities-and-exposures/"><b><i>In 2023, there were over 29,000 new IT vulnerabilities discovered</i></b></a><b><i>. That’s the highest count reported to date.</i></b></p><p style="text-align:left;"><b><i><br/></i></b></p><p style="text-align:left;">In this article, we explore the critical role of vulnerability assessments. As well as their benefits and how they help to maintain a robust cybersecurity posture. We’ll also look at the potential consequences of neglecting them.</p><p style="text-align:left;"><br/></p><h2 style="text-align:left;">Why Vulnerability Assessments Matter</h2><p style="text-align:left;"><br/></p><p style="text-align:left;">The internet has become a minefield for businesses. Cybercriminals are constantly on the lookout for vulnerabilities to exploit. Once they do, they typically aim for one or more of the following:</p><p style="text-align:left;"><br/></p><ul><li style="text-align:left;"><span style="color:inherit;">Gain unauthorized access to sensitive data</span></li><li style="text-align:left;"><span style="color:inherit;">Deploy ransomware attacks</span></li><li style="text-align:left;"><span style="color:inherit;">Disrupt critical operations</span></li></ul><p style="text-align:left;"><br/></p><p style="text-align:left;">Here's why vulnerability assessments are crucial in this ever-evolving threat landscape:</p><p style="text-align:left;"><br/></p><ul><li style="text-align:left;"><b>Unseen Weaknesses:</b> Many vulnerabilities remain hidden within complex IT environments. Regular assessments uncover these weaknesses before attackers can exploit them.</li><li style="text-align:left;"><b>Evolving Threats:</b> Experts discover new vulnerabilities all the time. Regular assessments ensure your systems are up to date. And that they're protected from potential security gaps.</li><li style="text-align:left;"><b>Compliance Requirements:</b> Many industries have regulations mandating regular vulnerability assessments. This helps to ensure data security and privacy compliance.</li><li style="text-align:left;"><b>Proactive Approach vs. Reactive Response: </b>Identifying vulnerabilities proactively allows for timely remediation. This significantly reduces the risk of a costly security breach. A reactive approach is where you only address security issues after an attack. This can lead to significant financial losses and disruptions to your business.</li></ul><p style="text-align:left;"><br/></p><h2 style="text-align:left;">The High Cost of Skipping Vulnerability Assessments</h2><p style="text-align:left;"><br/></p><p style="text-align:left;">Some business owners might think vulnerability assessments seem like an unnecessary expense. But the cost of neglecting them can be far greater. Here are some potential consequences of skipping vulnerability assessments:</p><p style="text-align:left;"><br/></p><h3 style="text-align:left;">Data Breaches</h3><p style="text-align:left;">Unidentified vulnerabilities leave your systems exposed. This makes them prime targets for cyberattacks. Just one breach can result in the theft of sensitive data and customer information.</p><p style="text-align:left;"><br/></p><h3 style="text-align:left;">Financial Losses</h3><p style="text-align:left;">Data breaches can lead to hefty fines and legal repercussions. As well as the cost of data recovery and remediation. Business disruptions caused by cyberattacks can also result in lost revenue and productivity.</p><p style="text-align:left;"><br/></p><p style="text-align:left;"><a href="https://www.ibm.com/reports/data-breach">The current average cost of a data breach is $4.45 million</a>. This represents an increase of 15% over the last three years. These costs continue to increase, making cybersecurity a necessity for ongoing business survival.</p><p style="text-align:left;"><br/></p><h3 style="text-align:left;">Reputational Damage</h3><p style="text-align:left;">A security breach can severely damage your company's reputation. It can erode customer trust and potentially impact future business prospects. Both B2B and B2C customers hesitate to do business with a company that has experienced a breach.</p><p style="text-align:left;"><br/></p><h3 style="text-align:left;">Loss of Competitive Advantage</h3><p style="text-align:left;">Cyberattacks can cripple your ability to innovate and compete effectively. This can hinder your long-term growth aspirations. Rather than forward motion on innovation, your company is playing security catch-up.</p><p style="text-align:left;"><br/></p><h2 style="text-align:left;">The Benefits of Regular Vulnerability Assessments</h2><p style="text-align:left;"><br/></p><p style="text-align:left;">Regular vulnerability assessments offer a multitude of benefits for your business:</p><p style="text-align:left;"><br/></p><ul><li style="text-align:left;"><b>Improved Security Posture:</b> Vulnerability assessments identify and address vulnerabilities. This means you significantly reduce the attack surface for potential cyber threats.</li><li style="text-align:left;"><b>Enhanced Compliance:</b> Regular assessments help you stay compliant with relevant industry regulations. As well as data privacy laws your business is subject to.</li><li style="text-align:left;"><b>Peace of Mind:</b> Knowing your network is secure from vulnerabilities gives you peace of mind. It allows you to focus on core business operations.</li><li style="text-align:left;"><b>Reduced Risk of Costly Breaches:</b> Proactive vulnerability management helps prevent costly data breaches. As well as the associated financial repercussions.</li><li style="text-align:left;"><b>Improved Decision-Making:</b> Vulnerability assessments provide valuable insights into your security posture. This enables data-driven decisions about security investments and resource allocation.</li></ul><p style="text-align:left;"><br/></p><h2 style="text-align:left;">The Vulnerability Assessment Process: What to Expect</h2><p style="text-align:left;"><br/></p><p style="text-align:left;">A vulnerability assessment typically involves several key steps:</p><p style="text-align:left;"><br/></p><p style="text-align:left;"><b>1.<span style="font-weight:normal;font-size:7pt;">&nbsp; </span></b><b>Planning and Scoping:</b> Define the scope of the assessment. This includes outlining what systems and applications are part of the evaluation.</p><p style="text-align:left;"><b>2.<span style="font-weight:normal;font-size:7pt;">&nbsp; </span></b><b>Discovery and Identification:</b> Use specialized tools and techniques to scan your IT infrastructure. They will look for known vulnerabilities.</p><p style="text-align:left;"><b>3.<span style="font-weight:normal;font-size:7pt;">&nbsp; </span></b><b>Prioritization and Risk Assessment:</b> Classify vulnerabilities based on severity and potential impact. Focus on critical vulnerabilities that need immediate remediation.</p><p style="text-align:left;"><b>4.<span style="font-weight:normal;font-size:7pt;">&nbsp; </span></b><b>Remediation and Reporting:</b> Develop a plan to address identified vulnerabilities. This should include patching, configuration changes, and security updates. Generate a detailed report that outlines the vulnerabilities found. As well as their risk level, and remediation steps taken.</p><p style="text-align:left;">&nbsp;</p><h2 style="text-align:left;"><span style="font-size:34px;">Investing in Security is Investing in Your Future</span></h2><p style="text-align:left;"><br/></p><p style="text-align:left;">Vulnerability assessments are not a one-time fix. Your business should conduct them regularly to maintain a robust cybersecurity posture. By proactively identifying and addressing vulnerabilities, you can:</p><p style="text-align:left;"><br/></p><ul><li style="text-align:left;">Significantly reduce your risk of cyberattacks</li><li style="text-align:left;">Protect sensitive data</li><li style="text-align:left;">Ensure business continuity</li></ul><p style="text-align:left;"><br/></p><p style="text-align:left;">Remember, cybersecurity is an ongoing process. Vulnerability assessments are a vital tool in your security arsenal. Don't gamble with your organization's future. Invest in vulnerability assessments and safeguard your valuable assets</p><p style="text-align:left;"><br/></p><h2 style="text-align:left;">Contact Us Today to Schedule a Vulnerability Assessment</h2><p style="text-align:left;"><br/></p><p style="text-align:left;">When was the last time your business had any vulnerability testing? No matter your size, we can help. Our vulnerability assessment will look for any weaknesses in your infrastructure. Then, we take the next steps and provide you with actionable recommendations.</p><p style="text-align:left;"><br/></p><p style="text-align:left;">Contact us today to schedule a vulnerability assessment for better security.</p><p style="text-align:left;"><br/></p><b><div style="text-align:left;"><b style="color:inherit;"><span style="font-size:11pt;">Article used with permission from </span></b><span style="color:inherit;font-weight:normal;font-size:11pt;"><a href="https://thetechnologypress.com/dont-risk-it-why-you-shouldnt-skip-vulnerability-assessments/" target="_blank"><b>The Technology Press.</b></a></span></div></b></div></div>
</div><div data-element-id="elm_XRdl0pL2R1KLFuae3v3YuQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 03 Jun 2024 07:46:00 -0700</pubDate></item><item><title><![CDATA[Ransomware and You]]></title><link>https://www.concentricsolvesit.com/blogs/post/Ransomware-and-You</link><description><![CDATA[<img align="left" hspace="5" src="https://www.concentricsolvesit.com/files/Pictures/Fortress_Hackers_LargeRes.jpg"/>Ransomware's effects are expensive and far-reaching. Protect your business.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_sg0A-Tx6Szy-1zgWAMlqug" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_byMrpOHZSp6xBy0gzOpEQw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_pj6IYuqMS2-HLPMJZu0U6A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_O0ughjg9THyoWxcPvV8W4Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_O0ughjg9THyoWxcPvV8W4Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Ransomware gangs want to get to know your business</h2></div>
<div data-element-id="elm_HH-F1hGpScaDSnrDExB19w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_HH-F1hGpScaDSnrDExB19w"].zpelem-text { color:#FFFFFF ; border-radius:1px; } [data-element-id="elm_HH-F1hGpScaDSnrDExB19w"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#FFFFFF ; } </style><div class="zptext zptext-align-center " data-editor="true"><div><p><span style="background-color:rgb(0, 0, 0);">Ransomware has become a major threat to organizations and businesses worldwide.&nbsp; Ransomware is a type of malicious software that encrypts files on a computer system and demands payment in exchange for the decryption key.&nbsp; The cost of ransomware attacks is staggering, with businesses paying millions of dollars per event to retrieve their data.</span></p><p><span style="background-color:rgb(0, 0, 0);"><br></span></p><p><span style="background-color:rgb(0, 0, 0);">The impact of a ransomware attack can be catastrophic, as it can lead to the loss of critical data, damage to reputation, and financial losses.&nbsp; In some cases, the cost of the ransom is less than the cost of the data that was lost.&nbsp; Moreover, there is no guarantee that paying the ransom will result in a full decryption of the data.&nbsp; Imagine first negotiating with the same criminals who attacked your business, then jumping through the hoops to pay them their ill-gotten gains only to find the decryption key doesn't even work properly.&nbsp; That's a bad day.</span></p><p><span style="background-color:rgb(0, 0, 0);"><br></span></p><p><span style="background-color:rgb(0, 0, 0);">Ransomware attacks used to be a single form of extortion - encrypted data requires the key to decrypt.&nbsp; Thus, the exchange was in exchange for the key to get back into your systems and access your data.&nbsp; Today's ransomware attacks are double and triple extortion events that including data exfiltration and even DDOS attacks to bring down your web facing services.</span></p><p><span style="background-color:rgb(0, 0, 0);"><br></span></p><p><span style="background-color:rgb(0, 0, 0);">The best recovery against ransomware's data encryption is to have a comprehensive backup system in place.&nbsp; Backing up your data regularly ensures that you can restore your system to a previous state in case of an attack.&nbsp; It is important to also keep backups offsite and disconnected from the network to prevent them from being encrypted by the ransomware.&nbsp; This is sometimes referred to as an air-gapped backup.</span></p><p><span style="background-color:rgb(0, 0, 0);"><br></span></p><p><span style="background-color:rgb(0, 0, 0);">Another important defense against ransomware is to patch information systems against disclosed vulnerabilities.&nbsp; Software vendors frequently release security patches to address vulnerabilities in their products.&nbsp; Failing to apply these patches can leave your system vulnerable to attack.</span></p><p><span style="background-color:rgb(0, 0, 0);"><br></span></p><p><span style="background-color:rgb(0, 0, 0);">Furthermore, organizations should have a comprehensive security program that includes training employees on how to identify and avoid phishing emails and other social engineering attacks that are commonly used to spread ransomware.&nbsp; It is important to educate employees on how to recognize suspicious emails and links, and to report them to the appropriate person in the organization.</span></p><p><span style="background-color:rgb(0, 0, 0);"><br></span></p><p><span style="background-color:rgb(0, 0, 0);">Ransomware is a significant threat that can have severe consequences for organizations and businesses these days.&nbsp; Backing up your data regularly, patching information systems against disclosed vulnerabilities, and educating employees on how to avoid social engineering attacks are essential measures to mitigate the risk of ransomware.&nbsp; By implementing these measures, organizations can reduce the impact of ransomware attacks and ensure that they are better prepared to recover from them.</span></p><p><span style="background-color:rgb(0, 0, 0);"><br></span></p><p>If you're interested in learning more, please contact us and schedule an appointment.&nbsp; We offer services and solutions that help to prevent ransomware attacks and can dramatically reduce time to containment and recovery if there is an event.</p></div></div>
</div><div data-element-id="elm_MbvxiU3dRQKqgXNlkhGMQw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 27 Apr 2023 13:23:59 -0700</pubDate></item><item><title><![CDATA[Work from Home - Tech Brief]]></title><link>https://www.concentricsolvesit.com/blogs/post/Work-from-Home-Tech-Brief</link><description><![CDATA[<img align="left" hspace="5" src="https://www.concentricsolvesit.comhttps://images.unsplash.com/photo-1547586696-ea22b4d4235d?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ"/>Are you looking at long-term or permanent options for work from home? Consider this.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_8xmH_6gWQXGAw6QUQo0plA" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_8xmH_6gWQXGAw6QUQo0plA"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Xoau0YalSwSoHLN0Vr995w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_YfCiJuaLTJ2GcG22Vwg3Kg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_OM42OtgjRrGJ49t03cXtcA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_OM42OtgjRrGJ49t03cXtcA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Work from Home - Tech Brief</h2></div>
<div data-element-id="elm_w6zpBlydTWexHgZBjxp4Gw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_w6zpBlydTWexHgZBjxp4Gw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">It’s probably safe to say that <i><u>most</u></i> organizations that made a sudden shift to work from home recently, did so due to necessity, and not due to a planned organizational change.</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);"><br></span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">The results have varied by industry and by individual business, but I believe there is thing we can all agree on:</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">&nbsp;</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">From a technology perspective, working from home has never been easier.</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">&nbsp;</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">The rise of mobile devices, cloud computing and collaboration software have made most office-based roles achievable from home.&nbsp; With the potential benefits of reducing office space, the leases, furniture, safety and utility costs that go along with it, maybe it makes sense to look at a long-term or permanent work from home option.</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">&nbsp;</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">So, how can you ensure your staff &amp; colleagues are safe, secure and productive when they work from home?</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">&nbsp;</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">In this guide, we'll be covering some of the basic, and often-missed items that you should be aware of when you send employees home to work.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span style="font-size:30px;"><span style="color:rgb(36, 172, 228);">Data Security</span></span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">While company data may be secure and accessible only on company hardware, what policies are in place if an employee is working from home?</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">&nbsp;</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">The basics should include wording in your IT policy that includes &quot;when away from the computer it must be screen locked&quot; or something similar.&nbsp; This is a very basic measure to prevent unauthorized access at the office, and should not be overlooked when working from home.</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">&nbsp;</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">A more advanced approach would include a BYOD, or Bring Your Own Device, policy that includes remote management software, and requires device enrolment to access company data.&nbsp; After the devices have been enrolled, certain policies can be enforced on those devices to protect your company data.</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">&nbsp;</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">Those with advanced security systems in place may need to expand geo-based access restrictions, and also deploy or expand virtual networks to retain public IP restricted protections and access.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><h2 style="text-align:left;"><span style="color:rgb(36, 172, 228);">Staff Training</span></h2><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">Your workforce may not be ready to work from home for a number of reasons.&nbsp; At the very least, ample training should be given on relevant collaboration systems.&nbsp; A good example of this is Microsoft Teams or Slack.&nbsp; While many office workers have embraced these collaboration tools there is still a percentage of them that shy away from new software.</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">&nbsp;</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">As such, relevant training that encompasses all skill levels on the right software tools should be organized sooner rather than later.</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">&nbsp;</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">Another item often overlooked is an update to your employee policies handbook.&nbsp; A well thought out plan, including expectations for communication and availability for remote employees, is a critical component of a successful remote work program. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><h2 style="text-align:left;outline:none 0px;"><span style="color:rgb(36, 172, 228);">Getting the Basics Right</span></h2><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">The basics, from an IT perspective, are the things that you might assume a staff member has but might be lacking.&nbsp; A good example of this is the Internet.&nbsp; While many would assume that everyone has home internet service, the reality is that there will be a percentage that for one reason or another do not have home internet, or do not have a connection sufficient for work from home.</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">&nbsp;</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">As such offering, a 4G/5G hotspot with a company data allowance might be required.</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">&nbsp;</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">Next up are the little things like monitors, keyboards, mice, and other peripherals such as a scanner.&nbsp; Most work from home scenarios will help a company move closer to paperless processes out of necessity.&nbsp; Scanning, however, is still is a part several job functions and may need to be considered.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p><span style="color:inherit;"><span style="font-size:30px;"></span></span></p><h2 style="text-align:left;"><span style="color:rgb(36, 172, 228);">Tech Support</span></h2><div style="text-align:left;"><span><br></span></div><div><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">Your IT support provider should be notified that employees will be working from home.&nbsp; There are a few considerations here for both the employee and the IT support provider.</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">&nbsp;</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">Look closely at your existing contract with your IT support provider, and see if support might be available to only locations outlined in the contract.&nbsp; If IT support is required for homeworkers a contract amendment may be required.</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">&nbsp;</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">In addition to this, confirm with your IT support provider if they have taken the necessary steps to be able to assist users working from their home.&nbsp; They should be able to help identify IT risks or ‘gotchas’ for your specific situation and put together a plan that addresses them, and enables your business to move forward with your work from home program.</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">&nbsp;</span></p><p style="text-align:left;"><span style="font-size:18px;color:rgb(255, 255, 255);">At Concentric, we have a 100% remote team and understand the challenges and rewards of this business model.&nbsp; If you would like assistance with your plans for a more mobile and work from home ready workforce, get in touch with us today using the “Get Started Now” button below.</span></p><p style="color:inherit;"><br></p></div></div>
</div><div data-element-id="elm_V0rEAk4yRgioY4aS1HawAg" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 17 Jun 2020 17:43:21 -0700</pubDate></item><item><title><![CDATA[Why you should audit your IT systems annually]]></title><link>https://www.concentricsolvesit.com/blogs/post/Why-you-should-audit-IT-annually</link><description><![CDATA[<img align="left" hspace="5" src="https://www.concentricsolvesit.comhttps://images.unsplash.com/photo-1556761175-b413da4baf72?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ"/>Is your IT provider auditing your technology annually? They should be.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_EOoF6ZE-QcehAwQif2EZxQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_p0ULqvRWSZ2yk2fkPf2W5Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ICgKyXM0ScyWlC8kfWpwiw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_kPodg8qlSOOWA-rzoW2Z1g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_kPodg8qlSOOWA-rzoW2Z1g"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:rgb(36, 172, 228);">Auditing - for more than accounting reasons</span></h2></div>
<div data-element-id="elm_Zx9kM50HTq6K_xA4tWMZ7A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Zx9kM50HTq6K_xA4tWMZ7A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">In most cases, the unfortunate truth about business systems and technology is that they can go out of date very quickly.</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">&nbsp;</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">How do you keep up with new technologies and make sure you have a competitive advantage?</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">&nbsp;</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">In this article, we will outline some simple example steps your IT provider should be doing on an annual basis, to keep you informed and your business up to date with the latest IT technologies. </span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">&nbsp;</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">An IT systems audit should be scheduled, conducted and reviewed at least annually.&nbsp; When this takes place very much depends on your business operation.&nbsp; A good rule of thumb is to carry out an audit before quieter times of the year.</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">&nbsp;</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">This helps the business to plan any upgrades and projects to coincide with those quieter times which will cause less disruption to the business.</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">&nbsp;</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">The following items are examples of some components an audit should include.&nbsp; This is&nbsp;<span style="font-style:italic;text-decoration-line:underline;">not</span>&nbsp;a complete list.&nbsp; Let's get started:</span></p><p><span>&nbsp;</span></p><p><span style="font-size:30px;"><span style="color:rgb(36, 172, 228);">Age of equipment</span></span></p><p><span>&nbsp;</span></p><ul><li style="text-align:left;"><span style="color:rgb(255, 255, 255);">An inventory of all IT equipment should be kept, this should include model numbers, serial numbers, manufacturer and more importantly warranty status.</span></li><li style="text-align:left;"><span style="color:rgb(255, 255, 255);">IT equipment which includes desktops, laptop, servers tend to have an optimal performance life cycle of between 3 - 5 years.&nbsp; </span></li><li style="text-align:left;"><span style="color:rgb(255, 255, 255);">Maintaining an inventory with this information allows the business and IT provider to plan for upgrades.&nbsp; You can easily prioritize which machines should be renewed or upgraded using the inventory list.</span></li></ul><p><span>&nbsp;</span></p><h2><span style="color:rgb(36, 172, 228);">Automation</span></h2><p><span>&nbsp;</span></p><ul><li style="text-align:left;"><span style="color:rgb(255, 255, 255);">The audit should also look to include an overview of manual tasks or problems in the business.</span></li><li style="text-align:left;"><span style="color:rgb(255, 255, 255);">Is there a manual, repetitive task that could be automated?&nbsp; This could be something as easy as duplicate data input by a member of staff.&nbsp; </span></li><li style="text-align:left;"><span style="color:rgb(255, 255, 255);">You might have 2 systems in place that require the same data to be input, why not automate this so data it is entered manually only once?&nbsp; </span></li><li style="text-align:left;"><span style="color:rgb(255, 255, 255);">Automation is becoming more common in the workplace and services such as Microsoft Power Automate and Zapier allow business to work smarter, not harder.</span></li></ul><p><span>&nbsp;</span></p><p><span>&nbsp;</span></p><h2 style="line-height:1.5;"></h2><h2 style="line-height:1.5;"><span style="color:rgb(36, 172, 228);">Disaster Recovery Test</span><span style="font-size:16px;"><p><br></p><ul><li style="text-align:left;">Backups should be tested monthly to ensure files can be successfully restored, but disaster recovery is meant for larger events</li><li style="text-align:left;">More insurance providers are now offering &quot;Cyber Insurance&quot; critical insurance that any business that has been hacked will make a top priority when renewing.</li><li style="text-align:left;">A little known fact about cyber insurance is the need for a disaster recovery plan with answers to questions such as &quot;how long will it take your business to recover&quot;&nbsp; and &quot;when was the last time your disaster recover was tested?&quot; </li><li style="text-align:left;">This highlights the need for at least an annual test of your recovery process and should be included as part of an IT audit.</li></ul><p><br></p><p>&nbsp;</p><p><span style="font-size:18px;">For more information about how we can help your business and provide an independent 3rd party IT audit of your systems and technology, follow the &quot;Get Started Now&quot; link below.</span></p><p><span style="font-size:18px;"><br></span></p></span></h2></div>
</div><div data-element-id="elm_TxBo4naeTyCz8YY-bo8xOQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 12 Jun 2020 23:46:46 -0700</pubDate></item></channel></rss>