• Skip to main content
  • (617)933-5060
  • Remote Assistance
  • Customer Portal
  • info@oramca.com
  • Remote Assistance
  • Customer Portal
  • info@oramca.com
Facebook-f Twitter Linkedin-in
  • Home
  • About Us
    • Our People
  • How we Help
  • Blog
  • Learning Center
  • Case studies
  • Testimonials
  • Contact Us
    • Remote Assistance
    • Customer Portal
  • Home
  • About Us
    • Our People
  • How we Help
  • Blog
  • Learning Center
  • Case studies
  • Testimonials
  • Contact Us
    • Remote Assistance
    • Customer Portal

cell phones

The Modern Office: Why a Strong IT Foundation Should Be the Basis of Your Business

August 27, 2019 by securewebsite

Business builds itself from the ground up. Your business internet technology (IT) is no different, which is why your foundation is so critical. The modern office revolves around having strong IT in place. From communications to automated business processes and protecting valuable company data, your foundation is imperative to your organization’s ability to not only thrive but survive.

Without a strong foundation, your business risks everything: Being hacked; watching valuable data be stolen, held ransom, or destroyed; and experiencing crippling downtimes when systems fail to function properly, costing your organization money every minute your employees can’t function. A strong foundation will help protect your company from experiencing such destructive problems and allow it to keep functioning smoothly even through inevitable IT bumps in the road.

What is Foundation in IT Terms?

At ORAM Corporate Advisors, we view the foundation as the nuts and bolts of your operation. We consider that to be your firewall, your switches, and your wireless access points. This is the core of your network. These are the things that have to be 100 percent reliable all the time and what literally makes the world go round for your business.

Firewalls as a Gateway

The gateway in and out of your network is your firewall. When it comes to the network security of the modern office, the firewall is your first and best line of defense. It monitors and controls both incoming and outgoing traffic on your network based on the security rules set for it. What rules are employed depends on how your company operates, the security it requires, and industry regulations. The best firewalls are “smart firewalls” which are capable of configuring, monitoring, and managing network traffic on the fly.

An average firewall is a hardware device or even a software program that is a barrier, a wall, between your systems and network and the internet. Its purpose is to limit unnecessary communication between your computer network and the internet.

Smart firewalls offer much to your business in terms of additional protections. Today’s modern office should employ smart firewalls as they include:

  • Antivirus, Antimalware, and Limited Spam Filtering
  • Deep Packet and Stateful Inspection
  • Packet, Adjustable Content, and “Default to Now” Traffic Filtering

The IT experts at ORAM can configure your smart firewall to maximize its protective benefits for the specific needs of your business. This ensures there are no gaps or vulnerabilities in your security settings that could allow a hacker to infiltrate your business system. We also take the time to keep your firewall current and patched.

Switches: Your Business Connection

Network switches are another important piece of your modern office network. This is the link, if you will, that connects devices on your network. It’s the switches that receive, process, and forward data moving in and out of your network so that it arrives at its proper destination.

The most common switch among business networks is one that handles Ethernet traffic. That is to say, the switches that connect your business to the internet. Without such switches, your business would become a proverbial island and your business data from email to invoicing may not function properly.

In addition to traditional managed switches, “smart switches” are an evolving option that can offer some management and security. They can be cost-effectively used in large networks as a supplement to managed switches or can be included as the main infrastructure in smaller networks. Smart switches can allow your business to segment its network into workgroups by creating a virtual local area network (VLAN).

Wireless Access Points

Wireless local area networks, or WLAN, are created by using a wireless access point device. These WLANs are typically found everywhere from homes and restaurants to modern offices and large buildings. They provide wireless access to the network for devices such as laptops, printers, and cell phones in a designated area such as your office. This enables your employees and customers to stay connected on a secure wireless network that is isolated from the core network in your office. You can also open or limit wireless guest access to specific applications or times of the day.

Recommended Foundation Hardware

The foundation of the modern office is also cloud-based. This allows you to know more about what your end users are doing and how traffic is flowing. Traditionally, you’d have to look back through logs and that is a time-consuming process. The modern office can’t afford to sit idle while the IT staff sifts back through logs to determine where things went wrong. Smart firewalls, switches, and access points provide real-time information through cloud-based systems that allow us to make the best decisions with up-to-date information.

At ORAM Corporate Advisors, we recommend using Cisco Meraki for all of those devices because it’s one of the most reliable cloud-based systems to date for business networks. This is important because it is the foundation of your business. User management, connectivity, and the like don’t matter if you and your employees can’t even access the internet.

Without a strong foundation, your business floor will drop out from beneath you. Commerce, trade, and services for your organization will come to a screeching halt without a strong foundation. Though integrating a strong network can be costly, it is the most important investment you will make to keep your business moving forward.

Ensuring a Strong Foundation

There are several key components to developing and maintaining a strong IT foundation in the modern office. Those include the following:

  • Make sure your firewall(s), switches, and wireless access points are current, up-to-date, and are running the latest firmware.
  • The hardware needs to be current as well. Is it still being supported and warrantied by the manufacturer?
  • Can your network handle your current business needs and still allow room for growth?

For everything you do or that your employees do, your foundation is key. By ensuring that you have the major components from your firewalls to switches and wireless access points in order, you can keep your business moving forward smoothly at all times. If you need assistance with building or bettering your business foundation, contact ORAM online or call us today at (617) 933-5060.

Filed Under: Blog Tagged With: access points, access the internet, Adjustable Content Filtering, antimalware, antivirus, automated business processes, business, business data, business needs, business networks, business system, cell phones, Cisco Meraki, Cloud, cloud-based, cloud-based systems, commerce, communications, computer, computer network, configuring, connectivity, controls, crippling downtimes, customers, data, Deep Packet Inspection, Default Now Traffic Filtering, defense, destroyed, destructive problems, device, devices, email, employees, ethernet traffic, firewall, firmware, gateway, growth, hacked, hacker, hardware, industry regulations, infiltrate, information, infrastructure, internet, Internet technology, investment, invoicing, IT experts, laptops, large buildings, limited spam filtering, link, logs, management, managing network traffic, manufacturer, modern office network, modern offices, money, monitoring, monitors, network, network security, network switches, no gaps, Oram, Oram Corporate Advisors, ORAM online, Packet Filtering, patched, printers, protect your company, protecting valuable company data, protective benefits, ransom, risks, secure wireless network, security, security rules, security settings, services, smaller networks, smart firewalls, smart switches, software program, Stateful Inspection, stolen, Strong IT, Strong IT Foundation, switches, systems, systems fail, The Modern Office, trade, traffic, virtual local area network, VLAN, vulnerabilities, wall, warrantied, wireless access points, wireless guest access, wireless local area networks, WLAN

Bring Your Own Device vs. Enterprise Devices

April 20, 2019 by securewebsite

Why Businesses Should Make the Investment for Employees

Mobility has become a major asset for modern businesses. It gives companies an edge when employees can work from anywhere with remote access on any device ranging from a cell phone, tablet, smartwatch, or laptop. Mobile technology has enabled unsurpassed flexibility in the workplace the likes of which the world has never seen before.

But as Spiderman’s Uncle Ben said, “With great power comes great responsibility.” When it comes to mobile devices, many business leaders wonder which is better: Allowing employees to bring their own devices to work or dropping the money to provide enterprise devices to all employees.

The Advancement of Technology

The development of the smartphone has shifted the way people communicate on a daily basis. In a recent survey conducted by Zinwave, “Over 85 percent of respondents, which included more than 1,000 office workers within the United States, utilize their cell phones on a weekly basis, at a minimum, for external communications, and usage was only slightly lower for internal communications.”

Not only do modern workers use their phones for voice capabilities (i.e. phone calls), but they use email through their phones as a prime form of communication. The aforementioned Zinwave study found email was the preferred means of external and internal communication for people while they are at work.

The ability to access the internet, company information, and messaging services (text) has made smartphones and tablets a necessity when it comes to productivity in modern business. “For example, 65 percent of industrial and 62 percent of healthcare workers utilize work-related data daily for a variety of applications,” according to Zinwave.

Technology has removed boundaries, improved flexibility, and enhanced communications with lower overhead costs. It can be tailored to the user experience and specific needs of any business. Mobile technology has even allowed organizations to increase their revenue potential.

“In our information-rich society, there are two critical types of interactions that must be fostered: employee empowerment and customer engagement,” according to the blog “6 Ways Mobility Can Transform the Workplace” by iOffice. “For many, mobility has become the backbone of their interactive strategy.”

The BYOD Market

According to an online article at GlobeNewswire, the U.S. BYOD market size was $30 billion in 2014 and is expected to grow 15 percent by 2022.

“Declining hardware prices, increasing mobile user workforce, and high smartphone penetration are the factors responsible for increasing BYOD market share across the region,” according to the article, which sourced BYOD research by Global Market Insights. “Increasing personal technology along with IT consumerization is also expected to boost the industry.”

While the popularity and benefits of mobile devices speak for themselves, business leaders must consider whether to allow BYOD or provide the devices for employees. Traditionally, BYOD was a highly accepted practice. Recently, there has been a move to corporate owned, personally enabled devices (COPE), the practice of organizations providing employees with mobile devices due to concerns over security, IT compatibility, and legal issues over user privacy versus company control.

At ORAM Corporate Advisors, our recommendation for mobile device management is that every employee should have a corporate-owned device. With an enterprise device, you can manage all of the security, firmware upgrades, software applications, and tracking your employees require to do their job. Additionally, COPE offers many other benefits.

Providing Mobile Devices

When your business owns the line of service for its devices, it has more control. You get to select the devices you prefer your employees to use rather than paying for and having the headache of supporting all device types. Additionally, you get to keep your devices up to date so you aren’t forced to make your network support older devices.

Protecting Your Assets

A study from Wall Street Journal Custom Studios commissioned by Symantec, showed “79 percent of employees admit to engaging in risky behaviors- intentionally or unintentionally- that place corporate data at risk” and “48 percent of employees don’t think about security risks when transferring files or sharing documents over cloud-based services.”

With corporate devices, you’re protecting your business assets. If your business owns the devices employees use, you’re able to wipe them in case they are stolen or lost somehow. This can be done remotely and quickly for theft or loss to prevent personally identifiable information (PII), trade secrets, or other secret data from falling into the wrong hands.

If a device such as a smartphone is owned by the company, you can simply call the phone carrier and wipe the phone’s memory. You request this by stating, “I need access to X, Y, Z employee’s phone. Here are the records that we are authorized to do so.” If the phone is a BYOD that’s accessing the corporate information, your business doesn’t have that same ability. The employee owns access to the account and the functions of that device.

Easy Access & Support

The same is true of the ability to access data easily. This is important when every minute counts in business. Take a smartphone for example. If there are any files, emails, or different communications downloaded to a phone on a corporate account, you’re able to search and query that device on demand. This is an improvement over waiting for an employee to submit paperwork at the end of the month in their call log when you need information immediately.

In addition, employees who use COPE devices have support from your IT department. Employees’ personal devices may not be compatible with your business network which could cause functionality issues. With corporate-owned devices, employees can simply contact IT for assistance.

Regulatory Compliance

COPE devices allow a company to reduce their exposure to security risk as well as legal and human resource issues. With tighter control through COPE devices, your business can implement the security measures it needs to keep its data and network safe. Furthermore, litigation resulting from breaches, loss of data, and regulation non-compliance is reduced.

In a highly-regulated industry such as finance, your business will need to be able to report such instances of loss or theft against that device to regulatory agencies such as the Securities and Exchange Commission. This is especially important should your business be audited or examined by such an entity.

The Money Factor

You may be thinking that providing mobile devices such as phones, tablets, and laptops to your employees is not cost effective, but the fact is that it can be. First, consider that many organizations provide a stipend for employees who bring their own devices. That stipend in and of itself is a cost. If you’re going to have the cost regardless, you should have the control as well.

Group mobile plans are getting less expensive for businesses of all sizes and can be written off as a business expense on taxes at the end of each year. In addition, when it comes to tablets, laptops, and other mobile devices, organizations buy in bulk to get a better price which benefits both the business and the employee. Another option for reducing the cost is to set up a cost-sharing option for both the device and its use with your employees.

Finally, when it comes to keeping your business secure to avoid regulatory penalties for non-compliance, the potential for lost revenue, and easy access to data, the investment up front is worth the return. That sense of security is priceless for most business leaders who wish to avoid potential breaches, lost revenue, and issues that can be caused by disgruntled employees.

The Employee Factor

Consider your best salesperson. If they use their personal devices to access your business information such as sales logs, client contacts, and invoices, they have information that could potentially damage your business financially if they were to leave.

In addition, your salesperson likely gives your clients that personal mobile number so they can contact them if they need anything. If your salesperson were to leave the company, your clients would still call that salesperson who can then easily take your customers to their new company with them. This means a loss of revenue for your business.

Should an employee leave, your business gets to keep the phone number. This means their clients will still be contacting one of your employees at your business through the same phone number. This reduces the odds of lost revenue for your company.

Create Policy & Enforce It

Every business, especially those in highly-regulated industries, should create policies regarding BYOD. This is true regardless of whether you allow BYOD or employ COPE devices in your business. You need a very secure policy and the correct mobile device management in place. In addition, your policy should outline that only legitimate work will be conducted on these devices.

If you need assistance with BYOD or COPE devices, creating policy, or mobile device management, contact ORAM today at (617) 933-5060. Our IT and security experts are always here to help your business grow smart while reducing its risks

Filed Under: Blog Tagged With: access data easily, access to the account, access your business information, accessing corporate information, audit, audited, avoid regulatory penalties, benefits of COPE, benefits of mobile devices, better price, boundaries, breaches, Bring Your Own Device, business, business expense, Business investment, business leaders, business owns line of service, business security, business security concerns, business-owned devices, businesses of all sizes, buy in bulk, BYOD, BYOD policy, call log, cell phone, cell phones, client contacts, clients, clouod-based services, communicate, company information, contact IT, Contact ORAM, COPE, COPE devices, corporate account, corporate data, Corporate owned personally enabled devices, corporate-owned device, cost-sharing option, creating policy, customer engagement, data, data safety, declining hardware prices, device compatability, device functions, device policy, devices, devices for employees, different communications, disgruntled employees, downloaded, Easy Access, easy access to data, email, emails, employee empowerment, employees, employees' personal devices, enhanced communications, enterprise device, Enterprise Devices, examined, external communications, files, finance, firmware, firmware upgrades, functions of that device, Global Market Insights, GlobeNewswire, group mobile plans, healthcare workers, highly-regulated industry, human resource issues, improved flexability, increase revenue potential, increasing persinal technology, industrial workers, information immediately, information-rich society, interactive strategy, internal communications, internet, Investment for Employees, investment up front, invoices, iOffice, IT compatibility, IT consumerization, IT department, IT support, laptop, legal issues, litigation, loss of data, loss or theft, lost devices, lower overhead costs, messaging services, mobile device management, mobile technology, mobility, modern businesses, network, network safety, Network Support, Office workers, Oram, Oram Corporate Advisors, personal devices, personal mobile number, Personally Identifiable Information, phone carrier, phone's memory, PII, popularity of mobile devices, potenially damage your business, potential for lost revenue, privacy versus company control, productivity, protecting assets, protecting business assets, records, reduce exposure to security risks, reducing cost, regulation non-compliance, regulatory compliance, remote access, remotely, report loss or theft, risky behaviors, sales logs, salesperson, search and query, search and query a device, secret data, Securities and Exchange Commission, security, security measures, security risks, sharing documents, smart watch, smartphone, smartphone penetration, software, software applications, Spiderman, stolen devices, submit paperwork, Symantec, tablet, tablets, tailored to the user experience, taxes, technology, texting, tighter control through COPE, tracking, trade secrets, transferring files, Uncle Ben, United States, unsurpassed flexibility, voice capabilities, Wall Street Journal, wipe devices, work communication, work-related data, workforce, workplace, Zinwave

IT Tips for Today’s Tax Professionals

April 2, 2019 by securewebsite

With tax day just two weeks away, many people may have their minds set on getting their taxes filed fast if they haven’t done so already. Tax professionals always find themselves swamped from February to May with businesses and individuals alike trying to finish up their taxes for the previous year. As a result, information technology (IT) may not be on the top of your mind as a tax professional but it should be.

With all of the personally identifiable information (PII) tax professionals work with on a daily basis from birthdates to social security numbers, IT security is a must to prevent breaches and data loss. Here are some top tips to keep your tax business and your clients safe.

Don’t Get Phished

Phishing emails are one of the most common ways hackers target businesses through email according to the Internet Security Threat Report Volume 24 by Symantec. “Employees of smaller organizations were more likely to be hit by email threats- including spam, phishing, and email malware- than those in large organizations,” according to the report.

Learn how to recognize phishing emails and train your employees to do so as well. Emails from unknown sources, especially those coming from someone pretending to be the Internal Revenue Service (IRS), e-Services, a tax software provider, or cloud storage provider should be deleted. Be sure to never open any link or attachments in suspicious emails as this is how the bad guys access your email and network. Note that the IRS never initiates initial contact through email with tax professionals regarding returns, refunds, requests for PII or other sensitive data.

The Symantec report does offer some good news in that “Phishing levels declined, dropping from 1 in 2,995 emails in 2017, to 1 in 3,207 emails in 2018.” This may be the result of better training and anti-phishing software. Be sure to keep your employees trained so your business isn’t phished.

Draft Your Data Plan

Every business, especially those in industries that are highly regulated or those that are often targeted due to the sensitive information they handle, should create a data security plan. When it comes to tax professionals, your security plan should use IRS Publication 4557, which addresses the proper safeguarding of taxpayer data. You will also want to look at Small Business Information Security- The Fundamentals developed by the National Institute of Standards and Technology, a non-regulatory federal agency charged with promoting U.S. innovation and industrial competitiveness.

These standards outlined in these publications will help you develop a data security plan that meets rigorous standards and the individual needs of your tax business. If you need assistance developing a data security plan, third-party vendors such as ORAM Corporate Advisors can handle this for you through an IT assessment.

Security Software

You’ll need to review the internal controls your business has in place to protect its data. Start with installing anti-malware and anti-virus software if you haven’t already done so, or if you have, you may want to update the software you have in place. This will need to be done on all of the devices used for business from laptops and desktops to routers and tablets. Don’t forget about your phones as well. Be sure to keep your security software set to automatically update as software companies push out updates and patches regularly.

Powerhouse Passwords

Be sure to use passwords that are powerful. Use a mix of at least 8 or more upper and lowercase characters, numerals, and signs in your passwords. Ensure your passwords are strong and unique for each different login you have. While this might seem overwhelming, there are a number of password managers available that can help you keep them all straight.

You will also want to password protect every wireless device in case of loss or theft. Use a phrase or words that are easily remembered and periodically change your passwords. Finally, never use old passwords and use multi-factor authentication wherever possible. Be sure to train your employees on these password best practices as well.

A Prescription for Encryption

In addition to strong password protections, one of the best ways to secure data in your tax business is to encrypt sensitive files and/or emails. In a worldwide survey of businesses by Statista, encryption was “employed extensively” by 63 percent of enterprises in 2018. Another 24 percent of businesses survey by Statista said encryption was partially deployed in their company databases. There are many types of encryption software to choose from. At ORAM, we recommend Mimecast for email encryption. For full-drive encryption, ORAM recommends eSet Endpoint Encryption so you can encrypt your sensitive files when they are in storage.

Back It Up

Be sure to back up all of your sensitive data to protect your business in the event of a disaster scenario. Ransomware is rampant, viruses can infect your network, and natural disasters such as fires and hurricanes can wipe out your data. To ensure that you always have access, have a backup plan in place and know exactly what you are backing up and to where. See ORAM’s blog on “The Biggest Backup Mistakes Businesses Make” to learn what to avoid.

Proper Disposal

Make sure that when you dispose of data, it’s being done so properly. Whether you are super shredding hard copies of data or replacing old computers, be cognizant of how you do it. All of your old computer hard drives should be wiped clean or destroyed before you dispose of them. This is also true of printers which can also store sensitive data.

Limit Access

Limit access to taxpayer data to only those employees who require it to fulfill their job duties. This is meant to protect both your client data as well as your own business. While many breaches happen due to outside sources, internal threats are still an issue in organizations around the world.

As a matter of fact, an online article from Security Intelligence reported that insider threats account for nearly 75 percent of security breaches. Disgruntled employees, those recently let go, and others may be ready to turn on your business to make a buck or out of spite. In the IT world, this limited access is known as the practice of least privilege. Be sure to employ it to protect your business from insider threats.

Check Your IRS e-Service Account

Be sure to check in on your businesses IRS e-Service account on a weekly basis. This allows you to ensure that the number of returns your business has filed with its EFIN is correct. If there are any discrepancies with the number of returns filed, contact the IRS immediately. Additionally, you will want to report any data theft or loss immediately. You will need to determine the appropriate IRS Stakeholder Liaison with whom to report the loss.

Keep In Contact

Stay in contact with the IRS and keep abreast of new developments though a subscription to the e-News for Tax Professionals, the latest national and local IRS news. QuickAlerts sends important messages, within seconds, to keep you up to date on the events that affect authorized IRS e-file providers like you. You can also keep in contact with the IRS through various social media as an authorized IRS e-file provider.

The IRS also has a Data Security Resource Guide for Tax Professionals that details the signs of data theft, teaches you how to report data theft to the IRS, and provides a number of data theft links. We recommend all tax professionals download the guide and read through it so you are prepared for a worst case scenario. This way you won’t be struggling for resources when you’re already under stress.

If you need more assistance securing the data of your tax business, please contact ORAM today at (617) 933-5060 or visit us online. We are happy to schedule a free initial consultation to get your tax business on the road to better security fast.

Filed Under: Blog Tagged With: anti-malware, anti-phishing software, anti-virus software, attachments, backup, birthdates, breach, breaches, business, cell phones, computer, cybersecurity, data, data disposal, data loss, data security plan, Data Security Resource Guide for Tax Professionals, data theft, desktops, digital copies, digital data, disaster recovery, e-News for Tax Professionals, e-Services, EFIN, email phishing, emails, Employee training, encryption, eSet Endpoint Encryption, federal agency, hack, hackers, hard copies, hard drive, highly-regulated industries, Information technology, Information technology security, internal controls, Internal Revenue Service, Internet Security Threat Report Volume 24 by Symantec, IRS, IRS e-Service Account, IRS Stakeholder Liaison, IT, IT Assessment, IT security, IT Tips for Tax Professionals, laptops, large organizations, links, loss, malware, Mimecast, Multi-factor authentication, National Institute of Standards and Technology, natural disasters, network, Oram, Oram Corporate Advisors, Password Managers, passwords, patches, Personally Identifiable Information, phishing, phones, PII, printers, QuickAlerts, Ransomware, refunds, returns, rigorous standards, routers, safeguarding taxpayer data, security breaches, Security Intelligence, security plan, security software, sensitive data, sensitive files, Small Business Information Security- The Fundamentals, small organizations, social security numbers, spam, Statistica, storage, Symantec, tablets, tax business, tax businesses, Tax Professionals, tax software, taxes, taxpayer, taxpayer data, The Biggest Backup Mistakes Businesses Make, Third-party IT vendor, U.S. Innovation, updates, viruses, wireless devices

The Modern Office and Business Continuity

March 7, 2019 by securewebsite

What you need to know to protect your company

The modern office requires that all components of your business environment work together harmoniously to ensure the best use of your IT infrastructure and seamless scalability as your business grows. One of the major components of the modern office is business continuity. This is an imperative piece of a solid IT plan for every company regardless of size or industry.

Business Continuity                 

When IT professionals discuss business continuity, they are generally referring to a proactive approach of having the right processes and procedures in place to ensure mission-critical functions continue to work properly in the face of a disaster or while a business is recovering from one. When it comes to business, there are many moving parts that still need to continue operating smoothly whether your company experiences a devastating fire or a nasty data breach.

The IT and business statistics are shocking. In the last five years, one in three organizations were hit by a virus or malware attack, according to DataCore, and more than half of companies (54%) experienced downtime that lasted more than eight hours. That’s a full day of work lost! While DataCore shows only 35 percent of outages are caused by natural disasters, 45 percent of outages are operational and another 19 percent are due to human error. These site outages can cost businesses thousands of dollars in lost revenue and restoration costs for every incident. Gartner, Inc., a global research and advisory firm, estimates that only 35 percent of small and medium businesses (SMBs) have a comprehensive business continuity plan and the financial loss for every hour of downtime can reach into the thousands even for SMBs.

Business continuity requires comprehensive planning before tragedy strikes an organization to allow them to overcome long-term challenges that would otherwise stop them in their tracks. With prior planning, business continuity ensures your entire business returns to full functionality as fast as possible following a crisis. That means everything from vital employee records and payroll to stored data access and email.

Think Cybersecurity

One of the first steps in a complete cybersecurity plan is business continuity. To start, you’ll want to ensure your business employs the best technology to combat the latest threats from ransomware and malware to other types of breaches. This means updating protections such as antivirus and firewalls, using multifactor authentication, and engaging your employees in ongoing, meaningful cybersecurity training.

Cybersecurity plans, which are typically handled internally by the chief information security officer (CISO) in larger businesses, should be designed as a living document that can expand and adjust when necessary to meet the changing needs of your business. Small to medium enterprises often don’t have a dedicated CISO so they can outsource this responsibility to organizations like ORAM Corporate Advisors.

Written Information Security Plan

As part of your business continuity plan, you’ll need a written information security plan (WISP), which also happens to be a requirement of many regulatory bodies, especially for businesses who contract or subcontract with the government and financial institutions. While government regulations vary from state to state and with the federal government, in Massachusetts this written document should contain, “certain minimum administrative, technical, and physical safeguards to protect” personal information such as names, driver’s license numbers, social security numbers, and financial account numbers. You’ll need to check with both your state and federal government to determine which regulations impact you as well as any industry-specific regulations. This is another place a CISO or third-party IT vendor can help.

Your WISP should designate an individual responsible for maintaining your IT program. This may be a business owner, CISO, or even a trusted advisor such as ORAM. It will also need to identify any reasonably foreseeable data security risks as well as protect and restrict access to electronic data that may include personal information for your employees and/or clients. This plan should also outline the oversight of third-party service providers and ensure those providers comply with local, state, federal, and industry regulations as well.

Because your business and its processes, risks, and procedures are unique, your WISP will be very specific to your organization. It cannot effectively protect you from culpability in the event of a breach or loss if it doesn’t address the particular risks of your company or if it includes practices that have not been put into practice in your business. Through coordination with your IT team and/or third-party IT vendor, you will need to identify “reasonably foreseeable risks” to ensure your WISP includes the practices your business adheres to.

In addition to IT functionality, your WISP will also address the non-technical operations that will still need to work in a disaster situation to keep your business moving forward. For example, it might address the accounting measures you have in place to keep employees and bills paid and clients invoiced if the worse should happen.

What Crisis Looks Like

Stolen laptops, lost cell phones, and an employee clicking on a phishing email that infects your entire network. These are all crisis that can and often do occur in the business world. Think of all the critical information that can be lost, stolen, or even held ransom. What do you do and who do you talk to? This is where planning ahead and having a WISP helps. It will outline how to respond to a variety of incidents.

Lost your company cell? Your WISP will inform you of who to call to wipe the lost phone and deactivate it before serious damage can be done. Did your organization experience a data breach? Your WISP will have identified a data backup plan so that nothing is completely lost. Has a virus made accessing email impossible? Your WISP will have determined if your email is stored locally, in the cloud, or both to decide how to get it up and running again fast. This thinking ahead with recommendations by your IT team or third-party vendor will help ensure you have continued access to business email which is the lifeblood of most commerce today.

Recovering from Incidents

One of the best things your WISP will do is outline policies and procedures for how to react and recover in a crisis situations. Regardless of the disaster that strikes, your WISP will point you to who to contact and how to react. Part of your WISP will address incident response and crisis management to minimize the impact when things do go awry, as they inevitably do.

Incident response and crisis management involves having the ability to maintain critical business functions during a disaster scenario. It also encompasses having plans in place for a rapid recovery from catastrophic incidents. If your business were to experience a flood, fire, or data breach today, would it be able to recover quickly and efficiently? Business continuity is all about having a plan in place that expects the unexpected and is prepared to handle it.

When it comes to IT and business continuity, the big question is, “How do you operate tomorrow?” If you don’t know the answer, it’s time to get a plan in place starting with an evaluation of the foreseeable risks your organization may face and a WISP to address them. Think of it as an insurance plan that also helps your business with regulatory compliance. When disaster strikes, your business’s IT team, CISO, or third-party IT vendor should have already given you advice. Hopefully, you have followed it. Then you know who you can call when things go wrong so they can tell you how to react to keep your business moving full-steam ahead.

If your company or organization needs assistance with risk assessment, developing a WISP, and planning for business continuity, call the trusted advisors at ORAM today at (617) 933-5060 or visit us online. Our experienced professionals are here to help and we are dedicated to partnering with small businesses to assist them in achieving success.

Filed Under: Blog Tagged With: business, business continuity, cell phones, Chief Information Security Officer, CISO, Cloud, comprehensive planning, cybersecurity, cybersecurity plan, data, data access, data breach, disaster recovery, driver's license, electronic data, email, Financial institutions, Gartner, government, human error, Incident management and resolution, IT, IT crisis, IT functionality, IT infrastructure, IT plan, IT professionals, IT vendor, laptops, lost revenue, malware, mission-critical functions, modern office, names, natural disasters, network, operational outages, Oram, Oram Corporate Advisors, payroll, personal information, phishing, processes and procedures, Ransomware, regulations, restoration costs, Risk assessment, scalability, security risks, social security number, Third-party IT vendor, Trusted advisors, virus, wipe lost phone, WISP, written information security plan

The Modern Office and End User Support: What it is and how it can help your business

February 21, 2019 by securewebsite

End-user support is an information technology (IT) term that is often used in business yet many people don’t understand what all it entails. Furthermore, business leaders don’t know how end user support can improve the productivity of their company. Here we take a look at what end-user support is and how it can keep your business moving forward.

What is an End User?
First, we must tackle what an end user is. Anyone who uses a particular product or program, typically your employees, is an end user. Think about the desktops, laptops, tablets, software, and even cell phones used by your employees to conduct business and fulfill their duties. They are the end users of your business IT.

Why Might End Users Need Support?
Whenever a new employee is onboarded, they need to be made a user so they can access the hardware, programs, and information within a company so they may perform their work. This means they need to be set up with a company email, account access, file access, and cybersecurity training that is specific to your organization.

In addition, employees will sometimes have trouble using the hardware and programs your business has purchased in order to operate. That can mean a computer with a virus, a laptop attacked by malware, or simply a program missing a necessary patch or update. While your employees may be great at what they do, not everyone is an IT expert. They may need help addressing issues from configuration to spam filtering in their business email.

Whether you have a small company without an IT department of its own or your business is a large one with an IT department is overwhelmed, these issues all must be addressed. When new employees are waiting to be onboarded or existing employees have hit the proverbial IT wall, they cannot work until these issues are resolved. That means downtime and a loss of productivity which negatively impacts your organization’s bottom line. That’s where outsourcing to IT specialists like those at ORAM can really assist your company.

What Does End User Support Look Like?
End-user support is about providing immediate, ongoing assistance whenever your employees need IT help. Think about having all email, account access, and training ready for new employees the minute they walk in the door on their first day. Imagine running into a snag with your email and being able to simply pick up the phone to fix the problem right away. Consider never having to worry about program updates or patches because they are applied automatically before you even get to the office. All of these very real IT issues are covered by end-user support.

The goal of end-user support is to provide businesses with the “modern office.” That means keeping end users productive and moving at all times. The question then becomes how does end-user support keep your business moving? In football terms, end-user support is like a lineman running in front of a running back to keep him protected and clear the path so he can do his job of advancing the ball. End-user support ensures issues with security, network connectivity, and active threats are held at bay. It also ensures your network is as reliable as possible, keeps up with patches, and hardware needs are covered.

With end-user support, your employees will have the tools to be continuously productive with little to no downtime. In addition, you will have the security of knowing those tools are also being used in a responsible, compliant, and efficient manner. Regardless of the size of your business, end-user support can help you manage your ongoing IT needs without sacrificing uptime, connectivity, or cost. Depending on which IT company you work with, your end user support may include:

• Antivirus Management and Support
• Configuration Services
• Hardware and O/S Maintenance
• Performance Monitoring
• Mobile Device Support
• Patch and Update Management
• Onsite Desktop and Laptop Support Services
• Incident Management and Resolution
• Priority Response Level and Problem Management
• Self-Service Knowledge Base
• User Account Administration
• Policy Management
• Email Content and Spam Filtering
• Encryption Services

Who Offers End User Support?
End-user support can be handled internally by your IT employee(s) if you have them and they aren’t completely overwhelmed themselves. The other option is to outsource your IT needs to a company like ORAM Corporate Advisors. Such IT professionals can work in tandem with your existing IT employees or can work in place of hiring your own IT staff.

Without the cost of hiring internal IT staff or additional staff, your network can be secure and running efficiently at all times through end user support. You won’t have to pay for support until you need it and help requests can be managed and resolved quickly and easily. Your business will also have all of the tools it needs to be continuously productive while achieving regulatory compliance.

If you need more information about end-user support, please contact ORAM anytime at (617) 933-5060. We can even schedule a free initial consultation to review your end user support needs. Our IT specialists are always available to answer your questions and help you when your business needs it most.

Filed Under: Blog Tagged With: access information, access programs, affordable IT support, antivirus management and support, best cybersecurity practices, business, business email, business leaders, cell phones, company downtime, compliance, computer, conduct business, configuration services, cybersecurity, desktops, email, email content and spam filtering, employee downtime, Employee training, employees, encryption services, End User Support, government, hardware, hardware and O/S Maintenance, improve business productivity, Incident management and resolution, Information technology, IT, IT department, IT employee, IT expert, IT issues, IT regulatory compliance, laptops, large business, lost productivity, malware, medium business, mobile device support, mobile devices, mobile phones, modern office, Nonprofit organizations, onsite desktop and laptop support services, Oram, Oram Corporate Advisors, outsourced IT, patch, patch and update management, pay only for the support you need, performance monitoring, policy management, priority response level and problem management, products, program users, programs, regulatory compliance, self-service knowledge base, Small business, software, spam filtering, tablets, tools for continuous productivity, training employees, updates, user account administration, virus, What Is End-User Supprt

  • Home
  • About Us
    • Our People
  • How we Help
  • Blog
  • Learning Center
  • Case studies
  • Testimonials
  • Contact Us
    • Remote Assistance
    • Customer Portal

© ORAM Corporate Advisors 2019. All rights reserved | Policy & Privacy