Why Small Businesses in Reno, Nevada Should Choose a Local Managed Services Provider

Wednesday, May 1st, 2024

Located in the heart of Reno, a thriving hub for small businesses, the selection of a partner for technological advancement is not simply a choice, but rather a strategic move towards the future. Each keystroke and cloud-based solution plays a vital role in the overall success of local enterprises. Embrace the advantage of being in close proximity to a service provider that not only comprehends bytes and bandwidth, but also understands the dynamic essence of The Biggest Little City in the World.

Cybersecurity threats loom as shadows over the dreams of small business owners, necessitating armor forged in the fires of local understanding and expertise. When the shield against digital dangers comes from a neighbor in Washoe County, trust intertwines with technology. Entrepreneurs in Reno face a unique junction: adapt to the digital landscape or risk being left in the neon dust.

Embracing cloud technology epitomizes the modern entrepreneurial spirit, yet the journey skyward can spiral into a labyrinth of confusion without a guiding hand. A local managed services provider offers the lantern to lead the way—illuminating the path with tailored solutions, community engagement, and the commitment to go beyond the expected. Witness how Reno’s small businesses can be empowered by a synergy of local support in the transformation towards digital brilliance.

Reno, Nevada
Reno, Nevada

Benefits of Choosing a Local Managed Services Provider

Partnering with a local Managed Services Provider (MSP) in Reno can have significant advantages for business owners operating within the community. An MSP offers a wide range of Business Services designed to streamline and secure your operations, with a focus on areas such as cybersecurity and digital transformation. Here’s a closer look at the top benefits of choosing a local Managed Services Provider in Reno:

Better Community Engagement and Support

Choosing a local MSP in Reno allows businesses to tap into a service provider that is attuned to the needs and nuances of the local market. A local MSP is likely to have a deeper understanding of Washoe County and Northern Nevada’s business landscape, offering insight that could prove essential when moving your business to the cloud or implementing new technology solutions. With a community-oriented mindset, local MSPs often go the extra mile to support and engage with other local businesses, fostering a supportive network that benefits all involved. Hiring local talent from places like University Of Nevada Reno, Truckee Meadow Community college, and other Nevada Institutions

Additionally, local MSPs can contribute to regional economic growth by keeping business within the community. Their commitment to the community goes beyond business transactions; it’s about building lasting partnerships and contributing positively to local development.

Enhanced Local Presence and Accessibility

When you partner with a local MSP, you benefit from their enhanced presence and accessibility in the Reno area. Unlike remote service providers, a local MSP can quickly address your needs in person, whether it’s an unexpected technical issue or an in-depth strategy meeting. Their proximity means less time waiting for support and more time focusing on your core business activities.

Furthermore, local MSPs offer the advantage of familiarity with regional regulatory requirements, helping you make informed decisions regarding compliance. By being rooted in the same area, they are personally invested in your success and will often adopt a tailored business model to better serve small to medium businesses within their community.

In summary, partnering with a local MSP in Reno offers unique benefits such as personalized community engagement, impactful support, and the convenience of physical proximity. For businesses that value these aspects, a local MSP can truly align with and enhance their business model and growth trajectory.

Key Table of Benefits

BenefitsDescription
Community Engagement and SupportAttuned to local market needs, contributing to the local economy
Local Presence and AccessibilityIn-person, prompt service and a personal investment in clients’ success
Understanding of Local BusinessInsight into the Washoe County and Northern Nevada business landscape
Tailored Business ServicesCustom solutions designed for small to medium businesses in the area
Economic Growth SupportKeeping business transactions within the local community to foster growth

Ensuring Cybersecurity for Local Businesses in Reno

In the bustling economy of Reno, local businesses face an evolving landscape of cyber threats that can impact operations, reputability, and profitability. Cybersecurity is no longer an optional luxury but a foundational component of any business that seeks to protect its data, its clients, and its future. In this regard, local businesses in Reno—especially small and medium-sized enterprises (SMEs)—must take proactive measures to ensure that their cyber defenses are robust and capable of thwarting potential attacks.

Importance of Cybersecurity for Small Businesses in Reno, Nevada

Small businesses are increasingly becoming the target of cybercriminals due to the perception that they have less stringent security measures compared to larger corporations. In Reno, Nevada, where small businesses constitute a significant portion of the local economy, the importance of cybersecurity cannot be overstressed. A single breach can lead to devastating financial losses, legal liabilities, and erosion of customer trust. Moreover, being a part of Washoe County, businesses in Reno must also adhere to regulations that govern data privacy and security, making cybersecurity imperative for legal compliance and the preservation of brand integrity.

How a Local Managed Services Provider Can Strengthen Cybersecurity

A Local Managed Services Provider (MSP) specializing in cybersecurity offers a turnkey solution to the complex challenges faced by Reno’s business community. By partnering with an MSP, businesses can benefit from:

  • Expertise: MSPs have specialized knowledge and experience in dealing with an array of cyber threats and can provide up-to-date protection strategies.
  • Customization: They can tailor cybersecurity solutions to fit unique business needs, considering the specific risks associated with the company’s industry and operations.
  • Comprehensive Support: MSPs offer ongoing monitoring and rapid response support, reducing downtime in the event of a security breach.
  • Compliance Aid: With their understanding of local and federal regulations, MSPs help businesses maintain compliance with relevant cybersecurity laws.
  • Cost-effectiveness: Outsourcing to an MSP can be more cost-effective than in-house solutions, sparing businesses the expense of maintaining a full-time cybersecurity staff.
Managed Services Provider BenefitsDescription
Local ExpertiseKnowledge of specific regional cyber threats and legal requirements
Customized SolutionsTailored cybersecurity strategies based on individual business risks
24/7 MonitoringContinuous observation to detect and mitigate threats quickly
Compliance AssistanceGuidance in adhering to data security regulations
Cost SavingsReduction in expenditure compared to in-house cybersecurity efforts

Utilizing a local MSP in Reno translates to enhanced cybersecurity that aligns with the business model, customer expectations, and regulatory demands – a strategic move to fortify the digital aspect of businesses in the ever-changing threat landscape of Northern Nevada.

reno cybersecurity
reno cybersecurity

Moving Your Business to the Cloud: The Role of a Local Managed Services Provider

As businesses in Reno embrace digital transformation, cloud migration emerges as a definitive step towards operational excellence and scalability. A local Managed Services Provider (MSP) emerges as an invaluable partner in this journey by demystifying the cloud and offering hands-on support tailored to the needs of small and medium-sized businesses.

Understanding the Importance of Cloud Migration for Small Businesses

For small businesses in Reno’s competitive landscape, cloud migration is not just about staying current with technology trends—it’s about seizing opportunities for growth, agility, and security.

  • Scalability: The cloud provides the elasticity to scale resources up or down as business demands shift.
  • Accessibility: Cloud services ensure that business applications and data are accessible from any location, crucial in an increasingly remote work environment.
  • Disaster Recovery: A move to the cloud can improve disaster recovery capabilities thanks to offsite backups and cloud redundancy.
  • Cost-effective: With a pay-as-you-go model, cloud services can lead to significant overhead cost savings.

Here’s a snapshot of why cloud migration is indispensable:

AspectBenefit
Operational EfficiencyStreamlined processes and resource management
Data SecurityEnhanced protections with advanced cloud security measures
Competitive EdgeImproved customer service and innovation pace
Financial ManageabilityReduced capital expenditure with subscription models

How a Local Managed Services Provider Can Aid in Smooth Cloud Transition

Transitioning to the cloud involves meticulous planning and execution—a challenge that may overwhelm the internal IT staff of small businesses. This is where a local MSP’s guidance becomes pivotal:

  1. Assessment and Planning: MSPs conduct a thorough assessment of your current IT infrastructure, identifying what to migrate and devising a strategic roadmap.
  2. Customization: They provide customized solutions ensuring that the cloud services align with specific business needs and goals.
  3. Hands-on Assistance: MSPs facilitate the seamless transfer of data and applications to the cloud with minimal disruption.
  4. Training and Support: They offer training for your workforce and provide ongoing support to tackle any issues promptly.
  5. Continual Optimization: Post-migration, MSPs work for continuous optimization to ensure the cloud services evolve with your business.

Partnering with a local MSP in Reno, familiar with Washoe County and Northern Nevada’s business environment, means having a partner who understands the unique challenges and opportunities your business faces. Their proximity can also lead to a stronger, more immediate support network, going the extra mile for community partners. This local presence, combined with expertise in digital transformation, makes a local Managed Services Provider an asset for any Reno-based business looking to successfully migrate to the cloud.

Tailored Services for Local Business Needs

For business owners in Reno, partnering with a local Managed Services Provider (MSP) offers an invaluable opportunity to receive services that are tailored specifically to the needs and contexts of businesses operating in Washoe County and Northern Nevada. A local MSP is well-acquainted with the regional market dynamics, customer expectations, and local regulations, allowing them to provide more relevant and responsive services than providers from other areas.

Understanding deeply the community it serves, a local MSP can handpick and customize Business Services that align perfectly with the parameters of local businesses. From selecting the right cybersecurity solutions that meet the unique threats faced by businesses in the area to providing customized cloud support that details an informed decision-making framework for local business owners, the offerings are specifically designed for the community they are a part of.

Here’s how the services are localized:

Service AspectLocal Tailoring Benefit
ComplianceAdherence to state and local regulatory requirements
SupportOn-ground, swift response times and familiarity
ScalabilitySolutions that grow with the community’s businesses
StrategyInsight into local market trends for informed decision-making

Local MSPs go the extra mile to ensure that their service model is not a one-size-fits-all package but a refined set of solutions that consider the sustainability and growth prospects of Reno-based businesses, fostering a strong local business ecosystem.

Recognizing the Value of Local Business Services

In the digital age, it is tempting to opt for the extensive reach of global service providers, yet partnering with local business services comes with invaluable advantages. Local MSPs offer a local presence that cannot be underestimated—it translates to community support, personalized face-to-face interaction, and a level of accountability that is often missing with remote service providers.

By choosing a local MSP, business owners in Reno can contribute to strengthening the local economy. Each dollar spent on local business services tends to circulate within the community, supporting local employment and fostering business interconnectivity within Washoe County. Moreover, local MSPs are motivated to provide exemplary service, as their reputation and success are directly visible within the community they serve.

The value of partnering with local Business Services includes:

  • Community Investment: Local MSPs contribute to regional economic vitality.
  • Personalized Relationships: Building trust with a provider who is part of the same community.
  • Quick Adaptability: Swift responsiveness to changing local business climates.
  • Streamlined Communication: Ease of contact resulting in effective and timely resolution of issues.

Recognizing the value of local services moves beyond mere transactions; it is an investment in the regional business fabric and a testament to solidarity among business owners.

How a Local Managed Services Provider can Offer Customized Solutions

Tailored service delivery is at the core of a local MSP’s offering. They understand that what works for one business may not work for another, especially when considering the particulars of Northern Nevada’s market. By offering a wide range of customizable Business Services, local MSPs ensure that each solution is designed to address the specific requirements of each business they partner with.

A local MSP can deliver customized solutions through several methods:

  1. In-Depth Consultations: Engaging with clients to understand their unique business goals and challenges.
  2. Custom Solution Development: Crafting IT and cloud solutions that address the specific pain points or objectives of a business.
  3. Tailored Cybersecurity Measures: Considering the business size, nature, and regional threats to develop personalized security strategies.
  4. Flexible Scaling Options: Adapting services to the growth pace and budget of small to medium businesses.

A local Managed Service Provider’s commitment to customization ensures that Reno’s diverse business landscape is well-equipped with the technological tools and support they need—not just to survive, but to thrive in an ever-evolving digital world. With local MSPs, the promise isn’t just to serve; it is to serve with a nuanced understanding of your business’s individual journey and destination.

Making Informed Decisions with the Help of a Local Managed Services Provider

Choosing the right technology solutions is pivotal to the success of a business in today’s digital landscape. A local Managed Services Provider in Reno steps in as an indispensable adviser and facilitator for informed decision-making. They provide insights that are not just data-driven but also steeped in regional understanding. Businesses benefit from customized analysis of IT requirements which consider factors unique to Washoe County and Northern Nevada.

Decision TypeLocal MSP Advantage
IT InvestmentsAlign with local economic trends & financial viability
SecurityAddress region-specific cybersecurity challenges
Cloud ServicesOptimize for local business needs & compliance issues

Leveraging the knowledge of a Reno-based MSP can help business owners navigate the complexities of technology implementation with assurance, ensuring decisions are not only savvy but also sustainable for the long term. By translating intricate tech landscapes into understandable choices, Reno’s MSPs demystify the path to digital efficacy for their community’s enterprises.

The Role of a Local Managed Services Provider in Empowering Business Owners

Empowerment is at the heart of what a local Managed Services Provider offers to business owners. Reno’s MSPs are catalysts for growth and efficiency, providing tools and strategic guidance that fortify businesses against operational hiccups and competition. Owners gain from a spectrum of services that are deeply in sync with their aspirations and challenges.

Local MSPs empower their clients by:

  • Democratizing Technology: Through education and support, making high-end technology accessible for small to medium-sized businesses.
  • Improving Operational Efficiency: Streamlining processes with appropriate tech solutions that integrate seamlessly into daily business activities.
  • Proactive Problem-Solving: Anticipating issues through continuous monitoring and swift, localized interventions when necessary.
  • Ownership & Stewardship: Acting as stewards of their clients’ IT ecosystems, they take ownership of the challenges and victories in their digital transformations.

With personal involvement and a thorough understanding of their clients’ business models, local MSPs give entrepreneurs the power to focus on their core activities while the intricacies of IT management are expertly handled.

Leveraging Local Expertise and Knowledge for Digital Transformation

In the journey toward digital transformation, Reno-based businesses are distinctively positioned to leverage the local expertise and knowledge of community-oriented MSPs. This hyper-local approach allows enterprises to capitalize on digital trends while staying true to their roots.

Key aspects of leveraging local MSP expertise include:

  • Market-Specific Trends: Tailored strategies that take into account consumer behavior and preferences unique to Northern Nevada.
  • Local Compliance & Legal Insight: Assistance in navigating the regional legal landscape for data management and cybersecurity.
  • Cultural Alignment: Solutions designed with the local business culture in mind, fostering better customer relationships and workplace efficiency.

A table highlighting the advantages could depict this succinctly:

Digital Transformation ElementBenefit of Local Expertise
Customer ExperienceEnhanced by understanding local customer needs
Data ManagementInformed by local laws and best practices
Collaboration ToolsCustomized for Reno-based team dynamics

The deep-rooted knowledge that a local MSP brings infuses technology initiatives with an insight that mass-market providers cannot match, turning digital transformation into a strategic advantage for the Reno business community.

The Benefits of Choosing a Local Managed Services Provider in Washoe County

When it comes to selecting a Managed Services Provider (MSP), businesses in Washoe County have the unique advantage of tapping into a local partnership that promises profound benefits. These benefits are deeply rooted in the understanding of the local business environment and the personalized approach that a Reno-based MSP offers.

A local MSP can provide:

  • Tailored IT Solutions: Services designed to meet the specifics of your business and regionally relevant regulations.
  • Personalized Service: More attention to detail and a personalized touch that larger, non-local providers often cannot match.
  • Quicker Response Times: Proximity means local MSPs can respond to issues more swiftly, minimizing downtime.
  • Community Commitment: A vested interest in the success of local businesses and the growth of the local economy.

A local MSP aligns their success with that of your business—when you thrive, they thrive. By investing in a community-focused provider, you’re not just another client; you’re a partner in a mutual journey towards success.

The Advantages of Partnering with a Provider in Washoe County

Choosing a Managed Services Provider within Washoe County comes with an array of advantages that can significantly impact the success of your business. The synergy of local knowledge and technical expertise results in a powerful combination that drives competitive advantage and boosts business resilience.

  • Local Presence: Face-to-face interactions and the ability to build long-lasting relationships.
  • Community Insights: Awareness of local market forces and customer behaviors that can shape strategy.
  • Investment in Local Workforce: Commitment to creating jobs and contributing to the community’s prosperity.

Additionally, partnering with a Washoe County MSP means supporting the local economy—a gesture that resonates well with customers and can enhance your business reputation in the region.

Meeting the Unique Needs of Northern Nevada Businesses

Northern Nevada has a dynamic business environment that requires a specialized approach to Managed Services. From the bustling economic activity in the Reno-Sparks metropolitan area to the varied needs of businesses throughout the region, a local MSP is well-equipped to understand and meet these unique requirements.

Unique NeedLocal MSP Response
CustomizationOffering bespoke services that align with specific business needs
ScalabilityProviding solutions that grow with your business
Local NetworkLeveraging regional partnerships for broader support

Having a Managed Services provider who recognizes the nuances of your industry and works within the same economic and cultural ecosystem offers peace of mind, ensuring that your technology strategy is executed on a foundation of local expertise and with a focus on tangible outcomes.

By segmenting these key points into brief, readable segments, the content becomes accessible and compelling, clearly presenting why businesses in Northern Nevada should consider partnering with a local MSP.

Going the Extra Mile: The Commitment of a Local Managed Services Provider

Going the Extra Mile: The Commitment of a Local Managed Services Provider

As a business owner in Washoe County, the decision to partner with a local Managed Services Provider (MSP) in Reno can propel your company towards digital transformation while preserving the community bond. Local MSPs are committed to driving your business’s growth and are uniquely positioned to understand the challenges and opportunities within Northern Nevada.

BenefitsDescription
Community ConnectionA local MSP embeds within the community, fostering strong relationships and personalized support.
Expertise in Local MarketTheir awareness of the region’s businesses paves the way for more informed decisions.
Cybersecurity FocusThey prioritize protecting your data with cutting-edge solutions suitable to your local environment.
Cloud MigrationWith a local presence, they offer tailor-made guidance for moving your business to the cloud.
Accessible Business ServicesA wide range of services are at your disposal, aimed at small to medium businesses.

Local MSPs tend to go the extra mile, offering a level of attention lesser service providers can’t match. They embody a business model that aligns with your values and aspirations, solidifying their status not just as service providers but as true partners in your business journey.

About NVITS

NVITS is premier award winning Managed Services here in Northern Nevada, with physical presence in Reno Nevada. NVITS has been in business for 10+ years and counting. Our portfolio ranges covers many industries including Managed services Local governments, managed services medical offices, Managed services construction companies, managed services financial institutions and accounting firms, managed services for Non-Profits organizations.

The End of the 10-year Support for Windows7: What’s In It for You?

Monday, May 15th, 2023


All good things sometimes have to end. That’s the case with the good old Windows 7 that we’ve all cherished since 2010. This 10-year-old operating system will stop receiving support on January 14, 2020. It is suggested to upgrade to Windows 10 before January to keep your computer secure.

windows 7 end of life

What Does Windows 7 End of Life Mean?

Windows 7 end of life means that Windows 7 users will never receive technical support, software updates and security updates after January 2020. This means that your computer will no longer be secure enough against malware and viruses that may attack your computer. There will also be no bug fixes available for you and your organization.

In Microsoft’s blog post last April, Matt Barlow has mentioned that notifications are all sent to Windows 7 users in advance to prepare them for the end of support. Internet Explorer will also be ending support as well because it is also managed by the same team maintaining Windows 7.

What if Your Business Can’t Move to Windows 10 Before January 2020?

Nothing will really change to your computer. However, after January you will be exposed to malware and viruses because there’ll be no security updates available from Microsoft. As you know, cyber attacks are rampant so they can put your whole organization at risk. Good thing, Microsoft knows that moving to a new operating system will not be easy that’s why they have two options for organizations to choose from. 

  1. You can purchase the Extended Security Update(ESU) until the 3-year period. However, purchasing the ESU  will no longer include bug fixes/patches and help desk support. It was available since April 1, 2019, and will still be available until 2023. When you’ve decided to purchase this service, you need to pay for the next two years because the update is cumulative starting from January.

  2. The second option is best for organizations who use virtual solutions. Microsoft suggests the Windows Virtual desktop which is a cloud-based platform that can support a multi-user Windows 10 service. It is designed to work with Office 365 ProPlus which also works well Windows 7 Extended Security Update.

Reasons for Ending the Support

Of all the Microsoft’s operating systems Windows 7 has been the most loved. It’s so good that people still use it over Windows 8. However, in Microsoft’s effort to improve Windows 10, they needed to divert more resources to improve its performance and defenses against stronger malware and viruses nowadays.

This end of support, however, was already forecasted already long before the operating system was launched in 2010. Supporting an outdated OS have a number of resources that makes it hard to maintain. Though, Microsoft has mentioned that they may be able to have extended updates only if you will send requests to them. 

How Can I Upgrade to Windows 10

It is much better to start upgrading your operating as early as possible so that you can get used to its new user interface and features. You can use either a licensed disk or a thumb drive to install it. Windows 10 Pro is at $95 Windows 10 Home is at $108 in Amazon. Good news is, if you’re   Office 365 for Business, Windows 10 will be free of charge. Below are the minimum requirements of the Windows 10

Processor:1 GHz or faster 

RAM:  1GB for 32-bit / 2GB for 64-bit 

Disk Space:·16GB free space

Graphics:· Microsoft DirectX 9 with WDDM driver 

One of the differences between the older versions of Windows is you have to have a Microsoft account and access to the Internet to get started with Windows 10. In order to get the optimal performance from your computer, it is recommended to use have a core i3with 2+Ghz processor, 4GB RAM and 60GB hard disk space. 

Some people find it more practical to also upgrade their computers that already have Windows 10 installed in it. Since most applications nowadays require higher hardware requirements to run them smoothly. 

Biggest Difference of Windows 10 with Windows 7

To prepare you on your new operating system, here a few of the changes that you will experience with Windows 10. From interface to features, it a much-advanced platform that allows you to keep you everything connected. 

A Cozier Start Menu

The aesthetic of the Start Menu in Windows 10 will give you a cozy experience with its borderless edges. It still works the way we had it with Windows 7 but it organizes your files alphabetically to make it easier to navigate. You can even customize it to your liking. Though the power button and settings will be found on the left side of the menu. 

Source

Cortana: Voice-Controlled Navigation Assistant

The popularity of virtual assistants is also available in your Windows 10. Her name is Cortana. You may find the search bar below your desktop where you can type your instructions to Cortana. It usually shows the results through a new dialog box. Whenever lazy days hit you, there’sCortana to help you out. 

Cortana in Windows 10

Source

Account-based Login 

With Windows 10, you needed to have a Microsoft account that can be synced to a lot of services provided by Microsoft including Skype. Unlike in Windows 7, you no longer need to create a separate account for your operating system. This allows Microsft to detect all the activities happening to your account. You’ll also notice the aesthetic of the lock screen below. 

Source

Windows Defender

The best feature of Windows 10 would be its Windows Defender that proactively secures your computer from viruses and malware, It is more advanced that it can detect suspicious behavior of malware right away. It almost works as a built-in antivirus for your computer. You can control over files that are suspected to contain virus and malware.

Source

 Android Phone Integration

The October 2018 update allows you to text from your PC to your phone app. You may even access your phone activities in your timeline. This feature makes work easier for people who are always on the go and works on multiple tasks. So when you’re traveling you don’t need to carry your laptop all along. You just need your phone and send the important stuff to your PC so that you’ll never miss any important idea as soon as you got it.

windows 7 end of life

Source

There are good things that are hard to let go especially if it has been useful like Windows 7. But we need to keep moving forward to experience better services and security from ever-mutating malware everywhere. We hope this article helped you understand why you need to embrace Windows 10 from now on. If you need more in-depth technical advise you may contact our technical experts here. Windows 7 end of life serious and need to be addressed to protect your business ASAP.

Four Ways to Block Spam From Your Inbox

Saturday, April 15th, 2023

The fact that email is so accessible, free and fast, makes it a very convenient tool for us. It also makes it a very convenient tool to use to spam your inbox. Buy simply purchasing a list of email addresses, professional spammers can bombard their victims with as many messages as they please. We have our ways of preventing these attacks but, of course, they have a host of automated tools to help them expand their volume and slip past filters. They are sneaky but there are things that you can do to proactively keep spam out of your inbox for good.

Here are five strategies for blocking spam:

1. Train your spam filter

Most email platforms include some form of spam detection. Messages that seem fraudulent or unimportant will be red-flagged by your provider and sent to the spam folder. The best thing about these filters is that you can train them to fit your inbox. This means that with the click of a button, you can decide if the spam detector made a mistake or missed a spam email. You can configure its settings and actions to improve its performance.

For example, let’s take a look at Gmail. Every time you open an email, a Report Spam button that looks like an exclamation point appears at the top of the email. If you find a message that is obviously spam that slipped through the spam filters, click this red button and your spam will filter messages like this to its memory bank so that you no longer get them. On the other hand, if you check your Spam folder and find that a useful email was placed there, open it and click the not spam button at the top of the page.

2. Employ alternative email addresses

One way to avoid spam is to create an alternative email address that is separate from your personal or business email address. When we order a product, often times the company that we ordered it from takes the liberty of spamming our inboxes with irrelevant content that has nothing to do with our purchase. This can also include receiving unwanted marketing updates or sharing your contact information with an advertiser. By creating a secondary email address you can keep all spam from entering your important inbox of your main email address. This alternative address can be used for traveling purposes, online shopping and more. Gmail, Yahoo, Outlook, or Mail.com offer free email address setups so you can make one with ease of mind and wallet.

However, it’s important to note some details when creating a new account. Gmail addresses ignore dots in email addresses, so an email sent to “[email protected]” and an email sent to “[email protected]” will both arrive at the same inbox. The same can be said for email addresses that contain plus signs. So messages addressed to “[email protected]” and “[email protected]” will both land in the same inbox. Good news though, this is actually helpful! Why? It means you can enter the variation on your current email address whenever you sign up for or buy something and then create a Gmail filter to put anything sent to that address in its own folder, separate from the main Primary tab.

Instructions: To create a filter in the web interface, click the Options button on the top right, followed by Settings and then Filters and blocked addresses. Click Create a new filter, enter your tweaked address in the To field, and then decide what you want to do with these types of emails.

3. Download third-party extensions

The internet truly offers a fix for everything. If you are finding that a lot of spam slips through your email provider’s spam filter, try adding a third-party app to supplement it. This type of service stops messages as they travel between an email server (the cloud where messages are stored) and your inbox.

Free is always a plus so try Mailwasher. Plug in your email login details and Mailwasher applies a series of filters to identify unwanted messages. With this, if you like, you can review the stopped emails online before they show up in your inbox.

There is also the free SpamCop service. This is like a mini police station. It allows you to report bad actors to internet service providers (ISPs) so they can block these messages at the source. This not only helps your inbox stay clean but helps others as well because you will be shutting down certain spam altogether.

4. Protect your email address

You should aim to keep your primary address as secret as you can. Do not display it on public pages such as social media platforms or a personal website. You should have a whole separate email address for this. This is the first place bots and spammers will look.

If you don’t want to keep track of too many email addresses but you have to have your email address available, try writing it out longhand. For example, try “John Smith at Google’s email service” whenever you need to display it on the web. This will make sense to a human but a bot will not be able to process and collect it.

In addition to this, there are some email marketers that will use a tracking pixel, or something similar, to decipher the difference between email addresses that are actually used and ones that are not. They send messages to a variety of addresses and as soon as a human opens one of them, the spammer will receive a confirmation that the address is in use. In order to avoid this, just don’t open spam. You most likely know what spam looks like at this point so just trash it or filter it out right away.

Spam is inevitable if the right tactics are not implemented to block it. Here at NVIT Solutions, we understand the ins and outs of email solutions and we are here to help. Give us a call to start blocking spam today!

5 Effective Tips for a More Secure Office

Wednesday, February 15th, 2023


When thinking about securing your business from cyber threats, the mind quickly turns to phishing, hacks, and viruses, but there are many security threats in and around the office that can expose your business to a host of threats and cybersecurity issues. In conjunction with a solid cybersecurity solution provided by your MSP, be sure you and your employees follow these office tips to protect your physical workspace from system comprises, unauthorized breaches and data loss.

Unlocked devices

Mobile phones, laptops, desktops, tablets, and even printers/multi-function devices should all be locked and password protected when unattended, as any of these (and any other) network-connected devices can be comprised, allowing for unauthorized access into your system or unauthorized removal of data from it. Even though most devices lock/power down after idling for some period of time, create an office culture where locking devices becomes second nature for all employees.

USB Drives

USB drives pose a host of security issues. Unknown drives should never, ever be used, as they could easily contain hidden malware or spy software that could exfiltrate data or install ransomware on your network. However, those drives that you do use for normal business functions must be kept under lock and key, so they are not compromised with malware, misplaced or stolen. USB drives make it far too easy for curious eyes or unauthorized user to get a peek into sensitive or confidential business information and are unfortunately left behind in public places (airports, coffee shops, etc.). Make sure any and all USB drives used in your business are cataloged and their whereabouts known at all times—or perhaps look to cloud solutions for sharing/transporting data.

Paper Documents

What may be innocuous to your employees could be valuable to others who’d want to infiltrate your systems. At the end of the day, be sure that papers, reports, financial records, and any other proprietary data is off desk surfaces, locked away, or shredded (i.e., not in the trash). After they are no longer needed, shred any documents with financial records, proprietary data or confidential information. And of course, to minimize this issue, go digital wherever possible.

Passwords

It’s a common occurrence, even in the face of many strict cybersecurity policies, but many employees use notes or cheat sheets for the various usernames, logins, and passwords they require for day-to-day work. Nothing could defeat the purpose of a password more easily than this practice, and leaves the door wide open to anyone who accesses your office to gain entry into your network and systems. Discuss a software-based password management system with your MSP and seek out an option that will work best for your business in order to prevent this risky behavior.

Wallets and Keys

Just like easily-accessed passwords are a threat, wallets and keys that are left on desks during meetings, bathroom breaks, lunches, etc., can all leave your business exposed to unauthorized entry. Pay special attention to this if there are areas of your business under lock and key, or if ID/keycards are used, as these are typically kept in wallets. Misplaced keys and access IDs can quickly lead to tampered or duplicated methods of access, so if need be, offer lockers or secure places where employees can store their personal belongings while they work.

These are just a few security best practices to enact in your workplace, alongside an effective cybersecurity solution. If you’re thinking about protecting your business from cyber threats, let’s discuss a few options that could work best for you. Securing your office shouldn’t be that hard. It’s just another layer to protect your assets.

What is Penetration Testing and Why is it Important?

Wednesday, February 1st, 2023

With the arsenal of tactics that hackers have today, we must fight back and protect our data with an arsenal of prevention tactics, including testing. Penetration testing is an important step towards safer applications and organizations. Penetration testing (A.K.A. pentesting, or security testing) is the process of testing your applications for vulnerabilities and put yourself in the hacker’s shoes. To do so, we start by answering a simple question: “What could a hacker do to harm my application, or organization, out in the real world?”

To ensure that a penetration test is effective, it must involve experts in all things IT. This includes a skilled hacker or a team of skilled hackers. Don’t worry though, it is the good kind of hackers, the ones that are on your team.

To start, we purposefully ensure that the hacker(s) don’t have access to any source code, and then try to gain access to your systems and applications. Penetration tests can be implemented IP address ranges, individual applications, or even as little information as a company name. The tests can vary depending on specific needs. The level of access you give an attacker depends on what you are trying to test. Here are some examples of penetration tests:

  • To test if an application is well secured, a penetration tester could be given access to a version of a web application you haven’t actually started using yet. They will then be told to try and gain access or cause damage by any means possible. The penetration tester will then employ a variety of different attacks against various parts of the application in an attempt to break in. If they succeed, then we will try another or implement security measures.
  • Hackers can even gain access by simply having your business address. The team of penetration testers will be given your company’s office address, and tell them to try and gain access to their systems. The team could employ a wide range of various techniques to try and break into the organization, ranging from social engineering to complex application specific attacks.  

The purpose of a penetration test is to identify key weaknesses in your systems and applications, to determine how to best allocate resources to improve the security of your application, or organization as a whole. This is the time to find weaknesses in your systems, rather than a bad hacker finding them. This is your chance to fully secure your organization. Nevada IT Solutions is here to help.

Why Are Penetration Tests Important?

  • It’s a great way to educate your employees and security personnel on real experience in dealing with an intrusion. A penetration test should be carried out without informing staff, like a fire drill, to allow an organization to test whether its security policies are truly effective and studied. This test should be taken just as seriously as a fire drill.
  • Penetration testing reports can be used to help train developers to make fewer mistakes. These tests highlight faults in the security systems, which is a very good thing. If developers can see how an outside attacker broke into an application or part of an application they helped develop, they will be more motivated to improve their security education and avoid making similar errors in the future.
  • They provide feedback on the most at risk routes into your company or application. Penetration testers think as a real world attacker would. They think outside of the box, and will try to get into your system by any means possible, just like the actual situation would play out. This could reveal lots of major vulnerabilities your security or development team never considered.
  • It can uncover aspects of security policy that are lacking. For example, many security policies give a lot of focus to preventing and detecting an attack on an organization’s systems but neglect the process of handling an actual attacker. You may uncover during a penetration test that whilst your organization detected attacks, the security personnel could not effectively remove the attacker from the system in an efficient way before they caused damage.

If your company has not carried out a penetration test, it is absolutely time to do so. Time is of the essence because hackers will carry out their attacks without warning. Are you prepared? Your first few penetration tests will probably deliver some shocking results, and highlight that your organization is much more vulnerable to attack than you ever predicted. Nevada IT Solutions is your partner in preventing future attacks through the use of penetration testing. Don’t be caught off guard. We will help you be prepared for anything.

15 Ways To Protect Your Business From A Cyber Attack

Tuesday, January 31st, 2023

Just because your a small business, doesn’t mean you’re beyond a hacker’s notice or reach. Unfortunately, most small businesses are particularly susceptible to cyber-attacks and breaches, simply because they are small, don’t have all the IT security control needed to protect them.

In the video below we compiled a list of ways that you can protect your business from a cyberattack:

10 Open Reno Restaurants Serving Easter Meals in 2020

Thursday, April 9th, 2020

Easter in 2020 is sure to look a bit different. With business closures, stay-at-home mandates, and uncertainty, the community has gotten exceptionally creative with ways to make things feel as normal as possible! We support that!
We wanted to create an easy-go-to list of 10 local Reno restaurants that have Easter brunch, dinner, or pre-made kits available for take-out or delivery to make your 2020 Easter Sunday as special as can be. 

Some of these local places are offering delectables other than just during Easter time! We will discuss all details down below to make this quarantine time easier on our taste buds and cravings.

Number One:

Squeeze-In (all locations)

The famous breakfast hot-spot, Squeeze-In, is offering a few different options! They have take-out available at all locations, with food readily available. If you choose their delivery option for Easter Sunday, they have limited spots. You can call this number: 775-229-5763 and speak to Katie to snag your delivery and time or use this form to reserve. For take-out, you can call any of the locations or visit their website and order by clicking on the big orange button ‘order online’ to the left of the website header. They have two menu options available and Easter Brunch kits for $49.95 that feeds 4-6 people.

Number Two:

Liberty Food & Wine Exchange

This supreme restaurant and meeting place has turned their attention to an online ‘essential marketplace’ during the crisis. Paving the way for modernized food experiences, they have pre-made kits available, hot meals on certain days, and pre-made dishes to cook later. They also have created online videos to cook along with them! You can also check out their delicious and abundant wine/beer selections to take home to enjoy. Order online by 7pm Friday evening to have your favorite selections ready for Easter Sunday.

Number Three:

Napa Sonoma (all locations)

This fan-favorite restaurant is taking their warm vibes online and offering a delicious selection of prime-time Easter food! You can view their Easter menu here and order with them by Friday 3/10 @ 7pm. Their selections serve up to 6 people and have the most perfect pairings! You can call their main lines to place your order: 775-440-1214 Plumgate ext. 1 | South ext. 2

Number Four:

David’s Grill @ Redhawk

This community restaurant is offering a specialized Easter Celebration Feast curbside or delivery. They have meal options that serve two, four, eight, and ten people. Some highlights of these menus include prime rib, turkey, delicious side options, and cheesecake or apple pie for dessert! You can find their normal menu as well as their Easter Feast menu on their website. To order your Easter Feast, you can call Stephanie at 775-321-5942. Reservations need to be made no later than Saturday (3/11) morning. 

Number Five:

Stone House Cafe

The well-known Reno brunch sanctuary, Stone House Cafe, have digitized their food experiences to assist the community in being able to have their favorite meals on speed dial! They have a special Easter Menu to choose from and you can order anytime between 9-7pm. Breakfast is served from 9-4pm and the dinner menu is from 4-7pm. They have curbside pick-up available. A few tidbits of the tastes they are offering: local lamb loin chops, alaskan halibut, roasted prime rib, spinach apple salad, truffle mac & cheese, and so much more! YUM! You can call their main line at 775-284-3895 to order!

Number Six:

Josef’s Vienna & Bakery Cafe

During these times of quarantine, you can be sure you don’t have to starve yourself of pure tastes and fluffy baked goods! Josef’s has always provided the community with flavorful dishes as well as delightful baked goods. Sure to make your smile! They are still operating their normal business hours 8am-3pm for take-out/curbside. Their menu is great for Easter Sunday brunch and you can grab some treats for later! You can view their bakery menu and cafe menu here, and call their line to order! 775-825-0451

Number Seven:

Greatful Gardens

This favorite social scene really took it up a notch to make ease of ordering 100% available to the community! Once you visit their website, select the location you would like to order from. They currently offer curbside pick-up. Although they are closed for Easter Sunday, you can order the selections early on and have them ready to go Saturday! Once you choose your location, you can either scan the QR codes below, or click on the designated links and it will walk you through the seamless app to order! 

MIDTOWN ONLINE ORDER LINK

SOUTH ONLINE ORDER LINK

LEGENDS ONLINE ORDER LINK

THE KITCHEN ONLINE ORDER LINK

MIDTOWN QR CODE FOR MOBILE:

 

 

 

 

 

 

SOUTH QR CODE FOR MOBILE:

 

 

 

 

 

 

LEGENDS QR CODE FOR MOBILE:

 

 

 

 

 


THE KITCHEN QR CODE FOR MOBILE:

 

 

 

 

 

 

Number Eight:

Sierra St Kitchen & Cocktails

Stressed about the wine/beer shops being closed? No problem! Sierra St Kitchen has you covered. In observance of Easter Sunday, they will not be open. However, you can order from them for take-out on Saturday, and have all you need! If you order $50 or more, you can add in a bottle of wine for $10! They also have a special running for wine: $10, $15, $20 a bottle with an extra 10% case discount. They offer favorite local beers like Revision, Lead Dog, 10 Toor, and more.

Number Nine:

Wild River Grille

This beautiful river oasis made their delicious flavors available to you during this time! Although they are not open for Easter Sunday, they are taking orders for their normal menu items up until Saturday during business hours. The latest you can order is 7pm and the latest you can pick up 8:30pm. They have initiated an amazing program called Band Together. They will have to-go menus paired with a virtual dinner concert series on Fridays and Saturdays! How AMAZING! Proceeds for the events will support employees of the restaurant and local artists and musicians who are affected by Covid-19. You can learn more here!

Number Ten:

Bistro 7

They are open during normal business hours and can take orders for take-out meals during those times. Although they don’t have a specific Easter Sunday menu available, their normal menu is sure to please! You can view their menu here and give them a call @ 775-851-9463 to order!

WHAT IS MULTI-FACTOR AUTH AND WHY EVERY BUSINESS SHOULD UTILIZE IT

Tuesday, April 7th, 2020

There’s a big chance that you’ve heard the term ‘Multi-Factor Authentication’ a couple of times but just in other forms. Does ‘two-step verification’ sound familiar to you? If you’re using Google, more than likely you’ll say yes. Most websites nowadays require this procedure to check if you’re either a hacker or a hack bot. Let’s admit it. Sometimes, these security procedures are annoying and pinch a bit of our time. However, with the constant widespread of cyber crimes around the world, especially after the pandemic chaos, it’s a much needed added protection.

The passwords that we were used to utilizing are under the single-factor authentication method. This means that only one credential is required from a user to access a network or website. This security measure used to be enough, until hackers have revolutionized their cyber-strategies. A lot of password hacking tools and methods surfaces constantly which includes key loggers, phishing attacks, and more. They can also hack an account using a dictionary system where related information about a person is mixed and matched to get a victim’s password. And, if you are using the same password for most of your accounts, you just gave them the keys to the kingdom!

Efforts in setting up encryption services, firewalls, and anti-virus applications will all lose its value if the entry point of access is compromised. A great strategy to implement is to group users by categories and use Multi-Factor Authentication for those who have access to highly sensitive information. The authentication process is an initiative that can improve your business’ data security without much-added cost. The NVIT Solutions team provides guidance to these practices.

In this article, we’ll give you everything that you should know about MFA and how it can give an added impact to your cyber safety. Let’s start having a safer working environment by knowing what exactly is the Multi-Factor Authentication (MFA) method!

What is Multi-Factor Authentication?

Multi-Factor Authentication (MFA) is a security measure that requires a user to provide two pieces of evidence of his or her identity. The common factor that we have is the password and the other one can be a security token or a biometric factor. To explain this further, there are five types of authentication factors:

  • SOMETHING THAT YOU KNOW (Knowledge Factor) – This factor is usually a password, a PIN or an answer to a security question. These are the pieces of information that only you know; nobody else.

  • SOMETHING THAT YOU HAVE (Security Tokens) – This factor pertains to information sent to a physical object such as devices that you carry with you. It can be sent to your mobile phone or in the form of an ID card or security keys. There are three classifications for a security token:

    • HMAC ONE-TIME PASSWORD (HOTP) – These are security tokens that only expire when used. 
    • Time-Based One-Time Password (TOTP)This token expires in a specific time frame usually in 30 seconds. When the time is up, a new token will be generated.

    • Universal 2nd Factor (U2F) – These are devices that allow you to access highly sensitive websites and platforms without using your mobile phones and entering any password. It records all the passwords and uses a highly generated cryptography to keep everything secured. You just need to insert the device and click the small button when logging in.  
  • SOMETHING THAT DEFINES YOU (Biometric Factor) – this factor includes anything that is unique in you physically. Your unique features include your fingerprint, retina, voice, and face. 
  • SOMEWHERE YOU ARE (Geo-location factor)This token uses IP and MAC addresses to locate a login attempt. Notification in login attempts are often seen through the emails you receive when someone tries to login in your account in a different location. 
  • SOMETHING THAT YOU DO (Action factor)This factor is usually based on recording your activity or behavior to identify your identity. However, this factor is rarely used because of its complexity. This is also known as the Picture Password. Windows 8 allowed you to have this feature by recording your mouse strokes in a certain picture.   

Among the five factors, there are only three to four factors that we commonly encounter. Google uses a geolocation factor in tracing login attempts and notifies you through email. After such activity, you’ll be reminded to strengthen your account’s security settings by setting up your multi-factor authentication.

How Does Multi-Factor Authentication Work?

Companies’ common MFA setup involves software that sends out PIN codes and devices that are used to authenticate a login attempt. Authentication usually starts by registering your device in your enterprise authentication software. Once entered, you’ll be required to enter the pin sent to your mobile device. Only then, will you be able to access the company sites, accounts, or applications.

Companies who promote mobility in the workplace are usually equipped with an authentication device. These authentication devices are called Universal 2nd Factor (U2F). These authentication keys are used to speed up the Multi-Factor Authentication by just attaching the device into your computer’s USB hub and pressing the small button. The popular brands in U2F category are Yubikey by Yubico and Titan Security Keys by Google. Attaching this security device to your computer will no longer require you to type any security codes and will authenticate any login that you make as soon as you push the small button on the device.

Advantages of Multi-Factor Authentication (MFA) for Your Business and Cyber Security

The widespread cyber attacks going on around the world should not be taken lightly. Every year, millions of companies suffer from their information becoming compromised; putting all of its users in a greater risk for theft and fraud. MFA is one of the many security measures that you can implement in your company and greatly add value to your cybersecurity efforts. 

The benefits include:

Increased Productivity through Enhanced Employee Mobility

The ability to authenticate devices in the workplace allows the employees to have mobility and flexibility in the workplace. Based on the survey performed by CITO research, out of 322 respondents 67% of the professionals considered an increased improvement in their business processes. Multi-Factor Authentication allows employees to access the company’s network across any devices and anywhere they go without getting worried about data security.

Early Detection of Suspicious Login Attempts and Increased Cybersecurity

Weak passwords will always be the greatest flaw of password-protected software. Most of us find it hard to set up a strong password that protects and can easily be remembered. There are a lot of hacking incidents that fell into the trap of using 1234 as their password like what happened to Vodafone. MFA eases up the vulnerability of weak passwords by adding an added layer of identification. It also allows your business to identify any unauthorized login attempts to your enterprise accounts. The awareness of the attempts will also help NVIT Solutions to observe the behavior and investigate the potential attack, protecting you even further.

Cost Savings

Aside from increased mobility for employees, MFA allows your employees to set up security without heavy intervention or big costs. It also saves you big time from potential ransomware attacks costing your company hundreds of thousands of dollars and crucial client data. 

Lower Risk of Identity Theft and Fraud

MFA makes it hard for the hackers to emulate unique features of a user through the biometric factor. Also regardless if they get a hold of the user password, they will never know the security tokens that were sent to the owner’s devices. Some company websites won’t even allow you to have access  if you log in from an unregistered device in their authentication system… leaving hackers no chance to enter the network.

Breaks the Phishing Cycle

If one of your employees was caught in a phishing attack, the hacker wouldn’t be able to get through the network because of the additional factor required by your company system. An attack will only be possible if the hacker can get access to the SMS sent to the device or they have the authentication keys to access your company accounts.

Successful Hack Prevention Measures through MFA 

Ever wondered how Google still stands tall from cyber-attacks? They’ve revealed this security secret in an interview conducted by Krebs security. They require their employees to use authentication keys or U2F in accessing the company’s network. The Google spokesperson mentioned that there were no account takeovers reported since the implementation of the authentication keys. This only shows further how MFA is an effective method in securing your company’s data.

You’re One Step Away to a More Secure Working Environment

Our NVIT Solutions team is here to provide you with all of the technical expertise that you need to set up your own MFA and have it implemented within your company smoothly. Be safe now with Multi-Factor Authentication; a simple measure to add another layer of protection.

If you have any questions, please do not hesitate to reach out.

Office 365 vs G Suite: And the Winner is?

Thursday, March 8th, 2018

We are all too familiar with the difficult decision that is choosing productivity tools that meet all needs at Nevada IT Solutions, and we are here to help you. Each one offers similar attributes while simultaneously contrasting on major levels of importance, making it next to impossible to decide what is best. We have narrowed it down to two, Office 365 or G Suite, which should you choose? Deciding on the answer to this question is a common dilemma that many businesses face, particularly start ups.

In the following blog post, these two competitors will be put head to head in a comprehensive comparative review. By the end of this, hopefully you will have made a decision between the two for your business.

What do Office 365 and G Suite do?

Office 365 and G Suite are productivity tools that allow users to perform common business tasks in the cloud. Recently, G Suite was called Google Apps for Work, and you may find that some still refer to the product suite simply as as Google Apps. So, don’t feel concerned if you are confused when someone is referring to the old name.

These tools are very useful and helpful for businesses for many reasons. Both Office 365 and G Suite allow users to create documents, spreadsheets and presentations and collaborate with team members during the process. They also provide video conferencing functionality and, most importantly, cloud storage.

Pricing Comparison

G Suite

When deciding on a G Suite plan you will find that it is relatively straightforward, as there are only three plans available for users:

    • Basic: $5 per user per month
    • Business: $10 per user per month
  • Enterprise: $25 per user per month

If you choose the ‘Basic’ $5 plan, you get:

    • 30 GB of online storage for file syncing and sharing
    • Security and admin controls
    • Video and voice calls (via Google Hangouts)
    • 24/7 phone and email support
    • Google sites (a tool for building simple websites or intranets)
    • Shared online calendars
  • Online documents, spreadsheets and presentations.

If you choose the ‘Business’ $10 plan, (in addition to the above) you get

    • eDiscovery covering emails, chats, docs and files
    • Email archives / message-retention policies
    • Audit and reporting insights for Drive content and sharing
    • Unlimited file storage (or 1TB if your organisation has less than 5 users)
  • Advanced search functionality using Google’s new Cloud Search technology (this functionality makes it easier to locate files within G Suite and also provides a Google Now-style experience which makes suggestions regarding what your team need to do next).

If you choose the ‘Enterprise’ $25 plan, you will get everything mentioned above, plus:

    • Advanced admin controls and security
    • Additional reporting on email usage via analytics tool BigQuery
    • S/MIME for Gmail (improved encryption for emails)
    • Data loss prevention for files and email
  • Integration with third-party archiving tools

As far as the free option of G Suite goes, not only do you get way less features, you also are spammed with ads while you work. The paid options do not display ads.

For most, the most vital feature that will determine their decision is the file storage. You have to do what you have to do. With the G Suite ‘Basic’ plan, users are restricted to 30GB of file storage; but – as long as there are 5 or more G Suite users in your organisation – there are no limits on the ‘Business’ plan (if you have a ‘Business’ plan but have less than 5 users on it, file storage is restricted to 1TB per user).

It’s important to consider the fact that Google Docs, Sheets, Slides and Drawings – meaning documents created using Google’s array of apps instead of third-party applications – don’t count toward your G Suite file storage limit. This also includes files shared with you by other Google Drive users.

Power users will most likely find that the e-Discovery features that the ‘’Business’ and ‘Enterprise’ plans come with are very handy – these let you archive all communications in your organization according to rules you define. This is useful in situations that call for a review of stored past conversations for legal reasons.

It may be surprising that data loss tools are only included in the Enterprise plans. If you want a  backup tool and a ‘Basic’ or ‘Business’ G Suite plan, then you will need to invest in a third-party tool.

Microsoft Office 365 pricing

In comparison, the pricing options for Office 365 are more complicated, because the suite offers home, business, enterprise and education versions.

However, for the purposes of this review, we will focus on the ‘Business’ and ‘Enterprise’ plans:

    • Business Essentials – $6 per user per month *
    • Business – $10 per user per month *
    • Business Premium – $15 per user per month *
    • Enterprise E1 – $8 per user per month (requires annual commitment)
    • Enterprise ProPlus – $12 per user per month (requires annual commitment)
    • Enterprise E3 – $20 per user per month (requires annual commitment)
  • Enterprise E5 – $35 per user per month (requires annual commitment).

There are quite a lot of different options to consider with the above 7 plans, but here are a few important things to note:

    • The ‘Business’ plans let you pay on a rolling per-month basis; the ‘Enterprise’ ones do not – you have to pay upfront for a year. This means that if your workforce person count fluctuates throughout the year, the ‘Business’ plans might be more suitable for your organization.
    • The ‘Business’ plans all limit the maximum number of users to 300.
  • All plans provide you with the desktop versions of the Microsoft Office product suite (Word, Excel, Powerpoint etc.) except for the ‘Business Essentials’ and ‘Enterprise E1’ plans, which only provide the online ones. So if a key motivation behind choosing Office 365 is to employ the desktop apps as well as the cloud features – a key advantage of using Office 365 over G Suite – make sure you steer clear from those particular plans.

Office 365 vs G Suite: features

File storage

Office 365 is the winner when it comes to entry-level plans. Users receive 1TB of storage through the ‘Business Essentials’ plan in comparison to Google’s 30GB on its ‘Basic’ plan. Not to mention Google also counts emails as taking up space in this small 30GB limit.

On the other hand, if you choose to go with a higher plan with the G Suite ‘Business’ plan, you’ll find that the Google plans’ features win for sure, however, they are the most expensive Microsoft plans in the file storage realm.

Businesses that require storage of large multimedia files in the cloud should go for the G Suite Business plan because this plan offers unlimited storage. Microsoft Office 365’s 1TB limit (which applies to most of its plans) seems like it would be enough but you’d be surprised how quickly 1TB of storage can fill up when working with video or audio.

If you’re business usually works with standard documents and spreadsheets, a 1TB limit per user should be enough for most small to medium-sized businesses. If having massive amounts of cloud storage is your primary concern, then it’s mostly a win here for G Suite, as long as you are prepared to pay for the expensive $10 per user per month plan.

Make sure to take note of this as well:

    • Not all of the Office 365 plans provide users with an email account. If you want to use Office 365 as your email service provider, you’ll need to avoid the ‘Business’ and the ‘Enterprise Pro Plus’ plans.
    • The ‘Business’ and ‘Enterprise ProPlus’ plans don’t feature calendar functionality.
  • These three ‘Business’ plans come in a little cheaper if you commit to paying upfront for a year.

A seemingly relatively recent development for G Suite is that the ‘Business’ plan only provides you with unlimited file storage if you buy over 5 user accounts. In any other case regarding this plan you will be restricted to 1TB per user.

Both Office 365 and G Suite give you the option to buy more storage on a per-user basis. For Microsoft, every 1 GB extra on Office 365 costs $0.20 per user.

G Suite users will generally only need to worry about storage limits if you’re using the ‘Basic’ plan or are on a ‘Business’ plan and have less than 5 users in your organization. If you’re on a ‘Basic’ plan, there are several tiers of additional data storage purchase options.

Depicted in the table below, it really is all situational. Depending on how much storage you require for individual users, you may find that it will be cheaper to upgrade all of your G Suites users to the ‘Business’ plan rather than buying a few users additional storage. Similarly, if you’re on a G Suite ‘Business’ plan with less than 5 users and you still seem to be reaching your storage limit, you might find it cheaper to buy a couple of new accounts rather than buying additional storage.

Email

An important feature almost any business is email storage. Keeping emails can be important in many situations including legal instance. when it comes to email storage the entry-level $6 per month Office 365 plan is considerably more generous than G Suite’s entry-level offering. Through Office 365, a dedicated 50GB inbox is available alongside the 1TB file storage provided. In comparison, the $5 per user per month ‘G Suite Basic’ plan not only clumps files and emails in the total storage but they cap it at caps total storage at 30GB

On the other hand, if you have 5+ users on your team and bump up your plan to the $10 G Suite ‘Business’ plan, there isn’t a cap on your inbox size. This contrasts positively with every Office 365 plan. The best you can get through these plans is a 100GB mailbox on the $20 and $35 Microsoft plans (which is still a lot of storage space, to be fair).

The email apps that Gmail offers are robust, fast functioning and easily navigable. This comes as no surprise as it Google so we expect functionality to be good. Also, due to Google’s popularity, there is a wide range of third-party apps available for it which add a large variety of useful functionality to proceedings.

However, to our frustration, Gmail doesn’t allow you to sort or group mail, something most users will routinely require from an email client. Due to this, you may find yourself wanting to use Gmail in conjunction with another email program. A great example of this is Thunderbird, or, whisper it, Outlook.

Speaking of Outlook, Office 365 gives it to you. As a matter of fact, you get two versions: an online version and an offline version, which is packed with features and provides a lot of flexibility when it comes to how you sort, group, label and generally manage your email.

Desktop applications:

At this point, it’s a pretty close tie. Here is where things get pretty interesting, and the point where a lot of individuals deciding between Office 365 and G Suite will be tempted to choose Office 365.

With almost all of the Office 365 plans, you get all the desktop versions of their products as well as the cloud-based ones. Essentially, you can install the full versions of Word, Excel, Powerpoint, Outlook etc. on your desktop and work offline on these applications. Despite this being the age of cloud computing, many businesses still send each other files created locally using these applications, so there is a strong argument for having desktop versions of all the above available. It allows for work ease with these file formats.

Functionality is another selling point for Microsoft. This also depends on the needs of your business. It’s fair to say that the Google apps are definitely more basic in terms of what they can do than their Microsoft desktop app equivalents. If you’re looking to do some advanced number crunching, Excel will beat Google Sheets; if you want to add some ‘Smart Art’ in a document, you’ll need to be working in Microsoft Word rather than Google Docs; and if you need slick slide animations in a presentation, Powerpoint will do a much better job than Google Slides.

However, that shouldn’t deter you entirely from using G Suite, because it is possible to open Microsoft Office documents using G Suite, and even save files created there to Microsoft Office format. Of course, there is some give and take. The problem with working this way is that you can’t always preserve the exact formatting of Office files when you edit and save them using a Google app. The importance of this issue will depend on the nature of your business: if clients expect you to routinely provide them with extensively-formatted MS Office files then you’re not always going to be able to do that with G Suite. Also, if that’s the case then it would make sense to work with MS in the first place, for ease of work with others. But if you just need to occasionally open an MS Office file, or send something basic over to a client in MS Office format, you would be able to live with Google’s suite of products.

Another important thing to remember about the Microsoft Office desktop applications is that they have to be installed locally. This means that someone in your organization will need to take care of this aspect of things and, most importantly, this person (or persons) need to know what they are doing. Using the Microsoft desktop apps may include some hidden IT costs. At the very least, your team will need to devote some hours to downloading, installing and periodically updating the applications correctly.

There’s also something else you might want to consider about giving your team access to the desktop apps. Most people like to work with tools they’re familiar with, especially on a time crunch, and, given the long history of Microsoft Office products, your team is likely to plump for the locally installed versions of the Office 365 products over the cloud-based, collaborative tools it also provides. This also depends on if your business is willing to spend the time necessary to teach the team members other options or just let them learn as they go. The later leaves room for error and frustration. This will possibly encourage ‘local’ or offline working at the expense of the more collaborative cloud approach (and working offline can throw up some security headaches too).

Conversely, if you create a working environment where your organization only uses browser-based applications that save documents to the cloud, then your data is arguably more secure (so long as you have backup procedures in place) and your team is more likely to make fuller use of collaboration features. *Enter team training here*. You could argue that G Suite – due to its cloud-only nature – is more likely to cause people to lean in this direction.

To conclude with apps, just remember that there is nothing stopping you from using both G Suite and MS Office apps side by side. If you are tempted by the unlimited cloud storage provided by G Suite but want to save Word documents in it, you could buy the offline versions of the Microsoft applications that you use regularly, and save files created in them to your Google Drive via Google Drive Stream. It’s really up to you and your business needs. Nevada IT Solutions can lay it all out for you and aid you in the decision of what is best for you.

Web applications for Office 365 and G Suite

Office 365 and G Suite both offer a set of web applications that have equivalents in both product suites, namely:

Word > Google Docs

Excel > Google Sheets

Powerpoint > Google Slides

Outlook Online > Gmail

One Note Online > Google Keep

Sharepoint > Google Sites

Skype for Web > Google Hangouts

Microsoft Teams > Google Keep (sort of)

Now, it’s important to understand that these are broad equivalents, due to the fact that their feature set is not exactly going to match the corresponding app.

However, there is one app included in Office 365 for which there isn’t really a G Suite equivalent: Yammer. This allows you to set up a kind of social network for your business.

Collaboration

The cloud is extremely useful for an important aspect of any high functioning business: collaboration. The cloud opens up a ton of collaboration possibilities. People who want to work on the same file can simply open up a document in a browser and see, in real time, the edits that everybody working on the file is making.

Good news, both G Suite and Microsoft Office 365 make this sort of online collaboration straightforward using their online apps. Additionally, you can now use Microsoft’s desktop apps to work on documents in real time with other team members. However, some users have found that to be a bit of a rough experience.

Taking a look at the online, browser-based versions of the Office 365 apps we have found that the collaboration experience is arguably significantly better on the cloud-based versions of the Microsoft apps than the desktop ones.

We would say that collaboration functionality in G Suite is a bit easier to navigate than Office 365’s, possibly due to the fact that the product is less feature packed and was created with collaboration in mind. Office 365, by contrast, has evolved from being a suite of desktop applications into a solution that features collaborative tools.

To wrap up collaboration, both product suites allow you to collaborate with coworkers effectively. However, to allow for the easiest experience with Microsoft apps, a good rule of thumb is to use the cloud versions.

Video calls

Both G Suite and Office 365 provide video conferencing functionality: Hangouts and Skype respectively. Through past experience at Nevada IT Solutions, the team has found that Hangouts works a little better than Skype. Google Hangouts tends to drop calls less frequently and crash less. It also loads faster, so less lagging. However, it seems that more people are on Skype. So this means that we use both generally to accommodate the heavier use of Skype although we prefer Hangouts.

On the other hand, Office 365 offers a much higher limit on participant numbers on video calls. You can have 250 participants in a business call with MS, in comparison to the maximum number of participants in a Google Hangout is 25 (30 if you use ‘Meet by Google Hangouts’ and are on an Enterprise plan). And if you’re looking for serious voice calling functionality in general, Office 365 offers far more options…but only if you are on one of the most expensive plans.

One thing you should note about Hangouts is that there are, in fact, two versions: the ‘classic’ version of Hangouts and a second product, ‘Meet by Google Hangouts.’ The latter product provides a slightly larger participant limit if you are on the Enterprise plan, along with instant messaging within the app.

Google Drive Stream vs OneDrive – a break down of the syncing options in Office 365 and Google Apps.

Both Office 365 and G Suite provide desktop apps for syncing local data with the cloud and vice versa. There are currently three apps available for this purpose:

    • Google Drive Stream
    • Microsoft OneDrive
  • Microsoft OneDrive Files on Demand

These are handy for when you want to work on documents offline or want to back up or upload local files to your cloud storage. However, there is a downside to this: your data is less secure. If your laptop gets stolen, so does your data.

These apps work slightly differently:

  • OneDrive makes all the files that you choose to sync available locally. This is useful for those who know they will be doing a lot of work on files offline.
  • With Google Drive Stream and OneDrive Files on Demand, files are not actually downloaded to your computer until you open them. You will still see all of your files and folders as if they were present on your computer but, in actuality, they live in the cloud until you double-click on a filename to download and open it.

The ‘streaming’ approach provides two key benefits over the ‘save everything locally’ one. first, a minimal amount of local disk space is required due to the fact that all files will be in the cloud, not on your laptop. Second, you don’t have to sit around waiting for all of your files to sync – just the one you’re working on.

There’s a couple of other things worth noting about file syncing in Office 365 and Google Drive:

  • OneDrive Files on Demand is currently only available for Windows 10 users.
  • In One Drive, you can right-click on a file to have the option to share it with others. If you want to share a file on Google Drive Stream you have to go into the browser version of Google Drive to do so.

Mobile apps

The great thing about today is that there is a mobile app for just about everything, including for both G Suite and Office 365. These allow you to access and edit your files on the go, which every business probably loves to hear. Both offer the user the capability of accessing information quickly on both sets of apps easily.

When it comes down to it, most users will most likely end up using the mail applications the most. A downside of Gmail mobile app is that it doesn’t let you turn off the horrendous conversation view. On the other hand, it is great when it comes to searching for old messages. The mobile version of Outlook its downsides too – no sorting or grouping of mail is possible.

The good thing about both sets of mobile apps is that they make editing your work on-the-go in areas where you don’t have Internet access very straightforward – so long as you save the files you want to work onto your mobile device before you go offline.

Advanced features in Office 365 and G Suite

Features common to both products’ higher level plans are:

    • E-discovery tools
    • Intranet building tools
    • Email archiving
    • Advanced reporting
  • Legal holds on inboxes

Plus side of Microsoft, it offers some additional advanced functionality on their most expensive plans, including

    • Advanced virus protection
    • Rights management
  • Cloud-based phone call hosting services

The less expensive route would be G Suite when it comes to e-Discovery tools, advanced reporting, email archiving and legal holds on inboxes all come as standard on the $10 per month G Suite ‘Business plan’. However, if you are hoping to get use from most of the functionality listed above using Office 365, you’ll have to remember that it is only available on the most expensive plans – the $20 per user per month E3 plan or the $35 per user per month E5 plan.

Support

24/7 phone support in English is offered for users of both G Suite and Office 365; hours for support in other languages vary depending on the country. Email support is also offered for both products, and there are various support forums available for both products as well.

G Suite or Microsoft Office 365: which is easier to use?

The real question is, which product will take longer to teach and learn? As with much else in this comparison, the fairest answer is probably ‘it depends’. Which really does make sense because it depends on what your business’ services are and what you are looking for. There is also the difference in user knowledge of the products beforehand.

Because of the ubiquity of Microsoft Office apps, there is a strong case to be made that people using Office 365 are likely to already be familiar with how Microsoft software works, and be in a better position to hit the ground running with them.

You could also argue however that the simpler productivity tools bundled with G Suite generate a less steep learning curve for users who are new to online collaboration.

In terms of user interfaces, the Google apps feel less cluttered than those bundled with Microsoft Office, simply because they are not as feature packed.

Ultimately, both products are fairly straightforward to use – if editing MS Office files is going to be a big part of your job, then Office 365 will feel a lot more familiar and present less of a learning curve; if collaboration is more the concern, then G Suite is arguably a slightly better bet.

Working offline with G Suite and Office 365

Although G Suite is essentially designed to run in a browser, users will still be able to work offline. On a desktop computer, you’ll need to do two things: 1) ensure that you’ve installed Google’s Chrome browser and 2) switch on file syncing. This will allow you to access and edit Google documents, sheets and slides offline; any changes you make to them will be synced to the cloud when you reconnect to the Internet.

For Gmail, there is an offline app available for it, which also requires Chrome to run. You’ll need to ensure you download all your mail before going offline. The Gmail offline app is very similar to the mobile version of Gmail.

With Office 365, the best way to work offline on a desktop computer is by using the standard desktop applications in conjunction with the desktop version of OneDrive. As with G Suite, ensure you’ve synced everything to your desktop before going offline – you can then work on any file in Word, Excel etc. and when you reconnect to the Internet any changes you have made will be synced.

G Suite vs Office 365: the conclusions

After reading the above G Suite vs Office 365 comparison, hopefully you have a clearer idea of which would work best for you and your needs.

These six areas are a good place to focus on when making the final decision:

    • The need your organization may have to edit MS Office documents
    • Your file storage requirements
    • Your email storage requirements
    • The nature of your working environment
    • IT implications
  • Scalability

It’s a tough decision but, hopefully, this review has helped resolve the Office 365 vs G Suite debate in some way for you.

Reasons to pick Office 365 over G Suite

    • The file storage and email storage quotas on the Office 365 entry-level plan are much more generous than those provided by the G Suite entry-level plan.
    • Most Office 365 plans come with desktop versions of the Microsoft Office applications, making the product a much better fit for any organization with clients that expect it to be able to send, receive and edit MS Office files without difficulty. This is in my view by far the strongest argument for choosing Office 365.
    • Outlook provides you with an easy means to sort and group mail – Gmail doesn’t.
    • You can have far more participants on a Skype call than a Hangout – 250 vs 25 respectively.
    • More advanced phone call management options are available with Office 365.
    • It’s easier to share files on desktop computers using the sync app for Microsoft’s OneDrive than the Google Drive equivalent.
    • More advanced functionality regarding virus protection and rights management is available with MS Office 365 (for a price, though).
  • Office 365 may provide a more natural fit for businesses that are exclusively Windows-based (more apps – notably Access and Publisher – are available on the Windows-based version, along with performance monitoring tools too).

Reasons to pick G Suite over Office 365

    • File storage: at $10 per user per month, the Google Unlimited Plan is a better value data-wise than most of the Microsoft plans, giving you an unlimited amount of cloud storage to play with (as long as you are buying 5+ G Suite accounts).
    • It’s very scalable – there are no limits on the number of users regardless of what plan you’re on (the cheaper Office ‘Business’ plans cap the number of your users at 300).
    • G Suite was built as a collaboration-focused solution, and as such its collaboration features are arguably a bit stronger.
    • eDiscovery, site building tools, email archiving and legal holds on inboxes (amongst other advanced features) are available for a lower cost with G Suite.
    • The Google Apps interfaces are clean and, so long as a good internet connection is being used, the apps load fast (certainly faster than Microsoft Office desktop equivalents).
    • It’s a good solution for businesses where multiple devices and operating systems are used.
    • There are a large number of third-party web applications which integrate neatly with the G Suite apps and enhance their functionality.
  • The fact that everything is cloud-based may encourage users to use the cloud more, with all the collaboration-related benefits this brings.

Contact us to get you setup!

if you need any help doing Exchange migration, by moving your organization from hosted exchange to O365 or Gsuite. We are here help. Our team have the expertise needed to complete job and move you to the cloud. 

Don’t Take the Bait: Email and Phishing Scams

Thursday, February 22nd, 2018

Anyone with an email address has, at one time or another, received email attempts to con you into giving up information, buying into a scam, or clicking on malicious links or files. They are often sent to spam (where you know you can’t trust the mail), but what about the ones that aren’t?

These attempts cannot be taken lightly and it is vital to always be aware. Do you know the person you are receiving the email from? Were you expecting this email? Can you trust what the email is saying? Even if you said yes to all of these, the email could still be corrupted.

They come in many forms, however, the most common are: too-good-to-be-true schemes (business/investment opportunities, luxurious trip winnings, or lotteries/prizes), crisis alerts (either someone seeking help or indicating you are at risk), or “phishing” for account/personal details by impersonating a trusted institution.

With the ease of hacking (considering work put in and the low-risk factors), these attempts have become increasingly sophisticated. Scammers can create convincing emails that appear to come from trusted sources, including your bank and even universities. They mimic the trusted sources email presentation so that you would never be able to tell otherwise.

We have created guidelines that, if followed regularly and correctly, will dramatically reduce the risk of falling victim to email and phishing scams.

How to spot a phishing message?

Before clicking on a received email message, please consider these points:

  • Are there red flags?
      • Does the message ask for any personal information (password, credit cards, SSN, etc)?
      • Hover your mouse over the links in the email. Does the hover-text link match what’s in the text?  Do the actual links look like a site with which you would normally do business?
      • Does the message ask you to immediately open an attachment?
      • Does the message ask for sensitive information about others?
      • Bulk commercial solicitation: Are there lots of recipients to whom the email is addressed?
      • Click ‘Reply’ – Does the address in the ‘To’ field match the sender of the message?
    • Does the “From” email address look like either someone you know, a business you work with, or a proper email account?

Is there a lack of positive indicators?

    • Is the email from an entity/person with whom you do not do business?
    • Is it difficult to think of how the sender legitimately obtained your email address?
    • Is the message missing a digital signature/certificate?
  • Were you not expecting an email of this nature (e.g. password reset, account expiration, wire transfer, travel confirmation, etc)?

If you are unsure about the legitimacy of an email sent to you we will gladly help you decipher it.

DOs and DON’Ts to protect against email and phishing scams

DON’T send passwords or any sensitive information over email

There is no reason that a legitimate business or organization will ask you to send your password, account information, social security number, or other sensitive data over email. NEVER respond to an email requesting personal, financial, or other protected information, even if it appears to be from your bank or another trusted institution.

Rather, you should directly contact the institution that the email appears to be coming from. Ask them if they sent out something such as what you received.

DON’T click on “verify your account” or “login” links in any email

ALWAYS open a new window and use the institution’s official homepage to log into any account.

Links in an email may appear to go to the trusted site, but actually, redirect to a page that steals your login information.

DON’T reply to, click on links, or open attachments in spam or suspicious email

Send spam straight to the trash or immediately report it the FTC at [email protected]. Don’t even click on it if you can avoid it. Clicking through or replying to spam can verify your email address and encourage more such attempts in the future. NEVER open attachments from senders you don’t know.

DON’T call the number in an unsolicited email or give sensitive data to a caller

The risks associated with email phishing apply equally to phone calls. By using Voice over Internet Protocol technology, scammers can disguise their true phone number just like they can disguise their email or web address, so don’t assume that a familiar area code or prefix is safe to call.

Phone phishing can be even harder to detect than email phishing. Callers may impersonate institutional personnel, employees (or students) needing your assistance, or even police officers. Never give sensitive information to a caller you don’t know personally. If the need is legitimate, you will be able to call the person back using trusted numbers or email addresses you find on the official institutional website.

DO report impersonated or suspect email

As stated above, if you receive an email asking for personal, login or financial account information and appearing to be from your bank, or another trusted institution, forward the email to the FTC at [email protected]. Also forward the email to the organization being impersonated. (Most organizations have information on their websites about where to report problems. You might start by searching on the website for “fraud protection” or “spam” to find the correct email address.)

You also may report phishing email to [email protected]. The Anti-Phishing Working Group is a consortium of ISPs, security vendors, financial institutions and law enforcement agencies that is building a database of common scams to which people can refer.

DO be cautious about opening attachments, even from trusted senders

Email accounts can be hacked or impersonated by scammers. Files and attachments that have been infected with viruses and malware can be embedded in your account or email. If opened, these can access your data and/or harm your computer. Be wary of opening unsolicited attachments or downloading materials from an email, even if they appear to come from someone you know.

If you cannot find the information in the attachment elsewhere, examine the file extension on the attachment before opening it. If the extension is among the extensions listed below, it is more likely to be malicious. (This list is non-exhaustive.)

    • .exe
    • .msi, .bat, .com, .cmd, .hta, .scr, .pif, .reg, .js, .vbs, .wsf, .cpl, .jar
    • .docm, .xlsm, .pptm (may contain macros).
  • .rar, .zip, .7z

Caution: no file types are  100% safe – especially if your operating system or any of your programs/apps have not been adequately patched. Consider verifying the legitimacy of the email and attachment with the sender before opening it.

DO install antivirus and firewall programs

Anti-virus software and a firewall can protect you from accidentally accepting malicious files on your computer.

We can provide antivirus software that will keep your computer safe. Anti-virus software scans incoming communications and files for malicious content. It is important to find an antivirus software that updates automatically and can perform real-time protection.

A firewall helps make you invisible on the Internet and blocks all communications from unauthorized sources. It’s especially important to run a firewall if you have a broadband connection.

DO check financial statements and credit reports regularly

This should be done for security purposes in general. Read your monthly bank account and credit card statements to be sure all charges are authorized and request free annual credit reports to be sure there are no unauthorized accounts open in your name.

Other Tips:

    • Do read the small print. Get all promises in writing and review them carefully before you make a payment or sign a contract.
    • Do protect your personal information. Share credit card or other personal information only when you’re buying from a company you know and trust.
    • Do take your time. Resist any urge to “act now” despite the offer and the terms. Once you turn over your money, you may never get it back.
    • Do know who you’re dealing with. Don’t do business with any company that won’t provide its name, street address, and telephone number.
  • Don’t pay for a “free” gift. Disregard any offer that asks you to pay for a gift or prize. If it’s free or a gift, you shouldn’t have to pay for it. Free means free.

Through these preventative steps, you will be prepared for any sneak attacks on your email. Don’t make it easy for hackers to access your information. Education and action are key! We can help you get started!