When Santa Has IT Troubles, They Call Co-Managed IT

Profile side photo of santa claus sit table desk work computer before x-mas christmas night

We work with many businesses, but one, in particular, may surprise you. Let’s talk about how our co-managed IT services made one specific organization’s critical processes a lot easier to manage during their busiest time of year:

Jangle leaned back from his monitor and sighed, rubbing his eyes—half out of tiredness, half out of stress. As much as he loved this time of year (as an elf, it was only natural that he would), there were parts that he could admit he hated. The newly-transferred co-manager turned to the other North Pole’s IT department manager, Ginger.

“So, are you seeing this too, Ging?”

Ginger glanced over at his screen. He was amazed that she could see at all, with all the stream from her perpetually full cup of cocoa fogging up her glasses. Her brow furrowed, telling him she knew exactly what he was talking about.

“Yeah, that doesn’t make sense.” She frowned and glanced back at her monitor, stirring her mug with a candy cane as she examined the displayed data.

“I didn’t think so, either.”

Sighing again, Jangle leaned forward to examine the information once more for himself. Before him was a rundown of all the other departments at the North Pole—List Management, Toy Assembly, Coal Acquisition, Elven Resources, Packaging and Processing, and of course, the Garage—and all of the technologies that each department currently had in place, accompanied by the name of the elf signed in to use each workstation. Looking again, he confirmed that he had seen what he thought he saw.

During their time as co-managers of the North Pole’s newly-formed IT Department, Jangle and Ginger had not only trained a hand-picked team of elves to staff their department; they had made it a point to implement technology systems that would help to make their job much more manageable. One of these systems was a remote monitoring and management system, which allowed their team to keep track of all the Pole’s various tools and technology solutions and preemptively catch issues. This system was causing him so much confusion at the moment. According to his plan, there was an elf in two places at once.

It seemed that one of the elves assigned to the Coal Acquisition team was also working in Packaging and Processing… literally; his display was telling him that Jolly Cookiescarf was currently using his laptop in the mining office while also logged in on a tablet in ribbons and bows.

Sighing again, Jangle called over one of the elves in his department. Trinket Cracklecane locked her workstation and wheeled her chair over.

“Yeah, boss?”

Jangle looked at his enthusiastic team member. “Have you seen any sign of a virus in our systems? I have an elf that appears to be logged in on multiple devices simultaneously.”

Trinket’s face scrunched up in confusion. “No, I don’t think so. Let me check again, and I’ll call up 4Corner IT to ask if they can see anything.”

Since the year before, the Pole had been working with 4Corner IT, bringing on the managed service provider as an extra IT resource to work with their newly-formed internal IT team. The remote monitoring and management services that the MSP provided had prevented many issues from materializing caught early enough to be fixed preventatively.

Trinket clacked away at her keyboard for a moment, and after a quick scan of her display, turned back to her managers.

“No sign of a virus, but I’ll call up 4Corner IT and see if they have any insight into what’s going on.”

As Trinket picked up her phone—connected via the North Pole’s new VoIP (Voice over Icicle Protocol) setup—Jangle and Ginger looked at each other. Ginger spoke up first.

“So, assuming it isn’t a glitch, what do you think is going on?”

Jangle rubbed his temples. While this wasn’t a huge issue, per se, he had learned from experience that these kinds of things could (and usually did) escalate into much larger problems if they weren’t addressed quickly.

“Honestly, it could be a couple of things. I mean, there’s the obvious answer, that someone is sharing their login credentials with someone else… but that doesn’t make sense because we’ve made sure that each elf has access to the tools they need. I mean, something could be misconfigured on our end, too.”

Click. Trinket placed her handset back in its cradle.

“Well, I talked to 4 Corner IT. Based on what they can see, we have an active user logged in at two places at once. They’re going to kick both users out and push a password reset.”

“Okay,” Jangle replied. “So with that taken care of, it sounds like we need to track down Jolly and find out who he shared his credentials with, and then make sure he doesn’t do it again..”

Ginger nodded, and the two started. Descending into the mines, Jangle and Ginger expertly navigated the candy cane catwalks that led to the control center that ensured that the Pole had the coal needed for distribution each year. Walking in, they saw Jolly sitting at his workstation, updating the calculations of how much coal the Pole would need for the big day.

“Hi, Jolly, can we talk for a second?” Ginger asked politely.

Jolly started, clearly not expecting company, and pulled off his headphones. Loud carols could be heard emanating from the speakers. “Yeah, is something wrong? I just got a prompt to reset my password.”

“Well, Jolly, we noticed that you were logged in at more than one place, and we just wanted to check and see if you had shared your passwords with anybody.”

Jolly nodded. “Yeah, Biscotti had forgotten his, so I figured it would be easier if he and I just shared. My account also has access to everything he needs. Therefore, it just made sense to share it instead of bothering you guys.”

“Well, we appreciate that, Jolly,” Jangle said. “However, it’s important that you don’t share your access credentials. I mean, I know that Biscotti probably wouldn’t do anything bad with them. However, you can never be too careful, you know? I mean, what if somebody called him up, pretending to be with the Tooth Fairy, but they were trying to ruin Christmas? They could easily phish your credentials out of him, and you’d be on the hook too.”

“Oh! I never thought about it that way. It makes sense, I suppose. Sorry about that!”

Ginger nodded. “That’s okay, just as long as you don’t do it again. Maybe we should remind the team here about the importance of password security once things calm down a little bit.” She looked to Jangle to see if he agreed. He did.

“I’ll reach out to 4Corner IT to see if they have any suggestions. In the meantime, I don’t see the harm in sending out a quick email to everyone reinforcing proper password practices.”

Ginger nodded again in response, and the two co-managers returned to their team to strategize their internal security awareness improvements.

We can provide your business with the same services to our friends up north. Reach out at (954) 474-2204 to find out what co-managed IT can do for you.

Check Out Our Cabling Services!

Let’s Look at Some of the Best Business Software Solutions

Happy guy looking at camera while sitting by workplace and working with software. business software solutions

All businesses utilize software to a certain extent, but not all companies have the same needs. That being said, there are certain types of software that all businesses can benefit from, regardless of industry or service offerings. We’ve put together a list of business software solutions that companies can utilize to improve operations.

Productivity Suites

Most businesses use a productivity suite, which is basically just a fancy way of talking about a suite of software that includes a word processor, spreadsheet program, presentation software, email and calendar management program, and other productivity applications. In fact, we would say that it is almost a prerequisite for a business to have a productivity suite just for the ability to open and edit files or documents. Some of the most common productivity suites out there include Microsoft 365 Apps for Business and Google Workspace, but there are other more focused productivity suites for specific purposes, like the Adobe Creative Cloud.

Voice over Internet Protocol (VoIP)

Similar to productivity suites, most businesses use traditional landlines to make and receive phone calls. While this was an accepted practice for some time, the more modern solution is to utilize a Voice over IP application on either a desktop or a mobile device to make and receive calls. Not only does this save you quite a bit in terms of up-front costs and operational costs, but it also makes adding new users to the infrastructure infinitely easier, as it does not involve installing new hardware (unless, of course, you want to use physical handsets).

Password Management

Passwords are a major pain point for businesses, so you need to treat them as such. While passwords can be made complex, this also makes them difficult to remember. This is where password management comes into play; these solutions offer a secure, protected vault for your passwords and can pull from this vault when the credentials are needed, removing the need to remember them entirely. It is a great way to augment your accounts’ security without compromising on password quality.

Antivirus and Other Security Solutions

It goes without saying that you need to be securing your business’ network and endpoints at all times. It doesn’t matter how small of a business you run. Hackers can and will find data on your network that presents some kind of value, whether it is to them personally or to someone on the black market. They might even be out to cause a little bit of chaos and infect your computers just for the sake of doing so. Who can say for sure? All we can say for sure is that you need to secure your network and its endpoints.

Virtual Private Network (VPN)

Encryption is a powerful tool that helps you keep your data secure, especially while out of the office. A virtual private network can encrypt data sent to and from your device, improving privacy and security while on unsecured networks. It is especially helpful when working on a public Wi-Fi connection or while traveling.

Adding new software solutions to your business’ infrastructure might sound difficult, but it doesn’t have to be. 4Corner IT can help your business implement software solutions designed to improve operations and provide sustainability for your business. To learn more, reach out to us at (954) 474-2204.

Phishing Attacks in 2021 Trending Due To Pandemic

credit card phishing - piles of credit cards with a fish hook on computer keyboard

Hackers have made some nefarious choices over the past several months. Many of which involve using the COVID-19 pandemic to spread their influence and steal data through phishing attacks. Let’s explore how these cybercriminals have leveraged a global disaster to their benefit and some ways that you can keep your business secure.

According to SecureList, spam and phishing trends in Q1 of 2021 were heavily influenced by the COVID-19 pandemic, and not in a good way. Here are a few examples of the major threats that surfaced during this time.

Stimulus Payment Scandals

Early 2021 saw many initiatives by government agencies to suppress the financial burden placed on individuals and businesses. This was done through the use of economic impact payments and business bailouts. Hackers, of course, wanted to capitalize on this and began using phishing messages to trick people. Targets received messaging that was often specific to their bank and utilized similar branding to official websites. These efforts were all elaborate tricks to convince users to hand over their credentials. Users would unsuspectingly enter their credentials into forms on these fake websites and put their sensitive information at risk.

The Vaccine Race

Back when the COVID-19 vaccine was in short supply or the supply itself was limited to specific groups of people, there was a bit of a race to get to it. This rush created an opportunity for hackers to capitalize on peoples’ desires for security and safety. Thus, they leveraged phishing schemes that used the vaccine to their advantage. They would use language and branding of official health organizations to convince users to click on links in emails. Then, they would redirect users to fake websites for harvesting credentials or banking information. Even those who got the vaccine received surveys offering free goods in exchange for information.

What You Can Do

It’s no surprise that cybercriminals are using these tricks to subvert security measures. These types of attacks are just more of a string of phishing attacks that must be kept up with in order to maintain network security. Here are a couple of ways that you can make this happen.

  • Utilize Spam Protection: While they aren’t 100 percent effective all the time, spam filters are great for keeping threats out of your inbox. The most advanced phishing attacks could still make their way into your inbox. Therefore, we recommend taking multiple measures of network security.
  • Train Your Employees: If messages do make it past your spam filter, you will want those who are reading the messages—your employees—to be able to identify the threat and avoid it at all costs. This is where training comes in.
  • Implement Unified Threat Management: Unfortunately, even the best employees will make mistakes, so you will want to have a contingency plan in place for when accidents happen. A UTM gives you just that with a single all-in-one security solution for your network security.

4Corner IT can help your business approach network security in a responsible manner, implementing the best solutions and constantly testing your employees’ awareness of important security practices. To learn more about how we can help you protect your business, reach out to us at (954) 474-2204.

Protect Your Business by Updating Your Software

render of hardware with band aids on it. Computer Processor Bug Patch Concept

Software is a critical part of your business. Without it, you would have to do everything manually. In fact, most businesses couldn’t do what they do without their software. That’s why it is so surprising that many businesses don’t actively patch their software. Let’s take a look at our patch management service and why it’s such a huge benefit.

A decade or so ago, keeping your software updated wasn’t as important as it is today. You might get some new features every so often, but that was usually it. Today, things are so much different. It is now one of the most important services that we provide to our clients. This is because threats have become much more prevalent and dangerous to a business.

How Patch Management Works

Basically, your software gets a fair amount of updates. Developers are constantly adding features and patching would-be vulnerabilities. If you don’t have a process in place to patch your version of the software, you can be operating with holes in your network. These holes are exploited by opportunistic hackers and then you have much bigger problems. Companies like ours and in-house IT departments need to consistently patch software to ensure those holes are filled.

Using our remote monitoring and management software we can not only keep tabs on all of your hardware and all of your network resources, we can also use it to quickly update your software. This software needs to be patched as well. In fact, there have been stories of companies that manage other companies’ networks and patch management getting hacked because they didn’t actively patch their RMM tool. Not only is this just embarrassing, it illustrates just how critical the entire process is.

2021 Challenges

When dealing with technology, if you want it to work for your business, you need to realize it’s not simple. Consider for a second all the changes that had to be incorporated over the past year:

  • The need to support remote work
  • New and expanded cloud capabilities to facilitate this remote work
  • Software management needs
  • Frequent updates to these software solutions

Every line item there has a litany of tasks associated with it. It also comes with some downtime. Software patches often require system reboots, which can lead to interrupted productivity.

Easy Patch Management Tips

At 4Corner IT, our technicians can help keep the downtime associated with patches and updates from impacting your staff’s productivity by scheduling these patches to be applied when there’s little-to-no traffic. It’s an easy solution to what could be a major problem.

If you insist on handling this issue yourself, however, here are a couple tips:

  • Know What You’re Using – You need to keep track of the software solutions that you use, just so you can be sure that all of them are maintained appropriately.
  • Respect The Need For Updates – While an individual can maybe get away with missing a software update for a little while, a business doesn’t have that luxury.
  • Maintenance Needs To Be Prompt – Once official software updates are released, they should be tested on a sample group and implemented across your network.

If you would like to get some professional perspective about your business’ software and how to manage and maintain systems that run it, give our experts a call at (954) 474-2204 today.

VoIP Phone Services: What You Need to Know

voip phone services

VoIP Phone Services What is it?

What used to be called telephony or VoBB (Voice Over Broadband), Voice Over Internet Protocol (VoIP) is a method of data delivery wherein your voice, or other multimedia, is sent through IP (Internet Protocol) networks or through a packet-switched network. Or more simply and succinct, it allows you to make phone calls over the internet.

VoIP is becoming an increasingly popular alternative for small businesses. Because not only does it provide a cheaper and more reliable alternative to a landline, with fewer overall usage fees and no long-distance charges, it also offers features that typically cost extra for no charge at all. VoIP also is fully integrated so that as long as a proper adapter is placed between the existing phone line and your high-speed internet connection, anyone connected to the network through not only their PC but also smart phones or tablets, can make calls using the VoIP.

What To Look For

Before choosing a VoIP, it is best to consider what the service plan consists of and what features you may need. Here are some key factors in helping you decide.

Service Plans

More than likely the most important decision you’ll make is when deciding on a service plan that works best for you. When researching what you’ll need, look for plans that offer things like unlimited minutes, the ability to make long-distance and international calls, and allow you to keep your existing phone numbers. Decide on additional features like the ability to add second lines, assign toll-free-numbers, and be able to send and receive fax services.

Features

Any plan you choose should include the basics like voice mail, conference calling, and caller ID. But some additional features you may consider are directory 411 assistance, and e911, which will automatically transmit your geographic location and your name to emergency services in the event that you can not voice call.

Ease of Setup

When you make the switch, it should be a simple process. There shouldn’t be a need for previous tech knowledge or complicated directions. Basically, it should be as easy as flipping a switch. Avoid any plan that requires more than this.

Support

If you encounter a problem, the help should literally be a phone call away. Look for a service that offers free support for their products through, not only telephone, but also live chat, email, and stand-alone documentation like FAQ’s through their website.

Bottom Line

VoIP is a rich and viable alternative to traditional phone services. They offer many premiums that are not only cheaper than landlines but are more user-friendly and overall customizable to fit your needs. Put simply, it’s easy to make the switch. For all of your VoIP needs feel free to contact us any time. 4 Corner IT deploys and supports Cloud VoIP systems that increase your technology reach, lower your telecom costs and give you peace of mind.

Also, check out our cabling services!