OpenPhone for Teams
Our partner OpenPhone stands out as a modern business phone solution that transforms how teams handle their communications. The platform enables businesses to maintain a professional presence while keeping personal and work calls separate through dedicated business numbers.
Our partner OpenPhone has some exciting announcements launching today!
OpenPhone is a Phone, SMS, and Contact management system designed for team collaboration. Enhanced with useful AI tools to help you summarize calls automatically, tag your conversations for you and your team, and even make contact suggestions based on the call itself, OpenPhone is a fantastic option for modern teams looking for flexibility and speed as they grow their business.
Fall 2024 Launch
Today, OpenPhone has launched a set of new features that will help make the platform even more productive and flexible.
Call Flow Builder
OpenPhone has completely revamped the Call Flow builder, making it extremely easy to create complex call flows, such as personalized call routing, or custom after-hours call handling.
AI Call Tags
Now you can have AI automatically tag your calls for you, to make it easier to find information later.
API
Finally, OpenPhone has launched a full set of API’s, so if you can’t find an integration that fits your specific needs, you now can integrate it with whatever custom workflow or system you would like.
Click here to learn more about OpenPhone, and sign up for a free trial. Using this link, you can also get a discount off your first 3 months if you sign up. To learn more about what 2Fifteen Tech does, and how we can help you run and scale your business, click on Contact Us to learn more.
The Business Risks of Neglecting Lifecycle Management and Procurement Best Practices
Neglecting lifecycle management and procurement best practices exposes businesses to significant risks, including cyberattacks and operational inefficiencies. By staying ahead of technology trends and maintaining robust security protocols, companies can protect their operations, data, and reputation in an increasingly digital world.
In the fast-paced world of technology, new advancements occur constantly. From the latest iPhones to cutting-edge laptops, the evolution of tech aims to enhance our productivity and efficiency. However, for businesses, the rapid obsolescence of technology presents significant challenges. When companies rely on outdated hardware and software, they expose themselves to numerous risks, jeopardizing their operations and security. This article highlights the importance of adhering to lifecycle management and procurement best practices to avoid these pitfalls.
The Perils of Outdated Hardware and Software
Businesses often hold on to computers and laptops far longer than is advisable, leading to performance bottlenecks and security vulnerabilities. While hardware aging is visible and often prompts an upgrade, the same urgency isn't always applied to operating systems. For instance, Windows 10, with its widespread use, will still receive patches until 2025. However, many businesses continue to use Windows 7, which no longer receives any support or updates, leaving systems open to cyberattacks. Similarly, older versions of macOS like Big Sur, if not updated, can become security liabilities.
The Hidden Costs of Sticking with Legacy Systems
Running outdated operating systems is not merely an inconvenience; it poses a direct threat to business security. Without regular updates and patches, systems are vulnerable to malware and other cyber threats. Businesses must ensure they are running the latest versions of their operating systems to safeguard their data and operations. For Windows PCs, upgrading to Windows 11 is essential. Mac users should also ensure they are using supported versions to maintain security and functionality.
Risks Associated with Outdated Mobile Operating Systems
Mobile devices are integral to modern business operations, yet many organizations fail to keep them updated. While Apple’s iOS devices, such as the iPhone XR, often receive updates for several years, the same is not always true for Android devices. Many Android phones, particularly those from less proactive manufacturers, cease to receive updates after a couple of years. This lack of updates not only limits functionality but also exposes business data to significant risks. Ensuring all devices receive regular software updates is crucial for maintaining security and operational efficiency.
Discontinued Applications and Services
Software applications are critical to business operations, yet reliance on outdated or discontinued software can cripple a company. Adobe Flash and Internet Explorer are prime examples of once-popular tools now obsolete. Continuing to use such outdated software leaves businesses vulnerable to security breaches and operational disruptions. Businesses must regularly audit their software to ensure all applications are up-to-date or have viable, secure alternatives.
Vulnerabilities in Old Networking Equipment
Network security is paramount for any business. Outdated Wi-Fi routers and other networking equipment can be significant weak points. Hackers often exploit vulnerabilities in old firmware, compromising business networks. Upgrading to newer equipment that supports the latest standards, such as Wi-Fi 6 or Wi-Fi 7, not only enhances security but also improves performance and bandwidth. Businesses should replace aging routers and ensure all network devices run the latest firmware to maintain a secure and efficient network.
Proactive Management is Key
Neglecting lifecycle management and best practices in procurement can have severe repercussions for businesses. The use of outdated technology increases the risk of cyberattacks, operational inefficiencies, and data breaches. Businesses must adopt proactive strategies to manage their technology lifecycle, ensuring all hardware and software are regularly updated and replaced as needed. By staying ahead of technology trends and maintaining robust security protocols, businesses can protect their operations, data, and reputation in an increasingly digital world. Contact us for a free consultation. Our advice on proactive management, lifecycle management, and procurement best practices is free.
WWDC 2024 for Apple IT Managers
Learn about some exciting updates for Apple IT managers from WWDC 2024: Managed Apple IDs are now Managed Apple Accounts, with enhanced security and seamless device management changes ahead.
This week was Apple’s World Wide Developer Conference, which is always a fun time of year for Apple developers and Apple fans to get a preview of what is coming over the next year on the software side of things. It’s an event where Apple typically talks about new things coming across their platforms, as well as new features that developers can build in to their own apps. This was a big year! There were lots of customer facing features that are going to be exciting, which we’ll discuss in a separate blog post, but in this one we wanted to point toward some things changing for Apple IT managers.
Our partner Kandji wrote a great summary of all of the exciting changes that are coming for Apple IT in this blog post - WWDC 2024: What Apple Admins Need to Know.
We at 2Fifteen Tech are excited for these changes! There are big changes coming to Managed Apple ID’s, including a new name - Managed Apple Accounts, and then a series of new device management changes which will increase security and help provide a more seamless experience for users on managed endpoints within a company.
If you would like to learn more about how 2Fifteen Tech can help you manage your Apple devices within your organization, reach out to learn more!
Your Guide to Email Security and Deliverability
Ensure your emails reach their recipients and protect your brand from fraud with our simple guide to SPF, DKIM, and DMARC. 2Fifteen Tech can help you implement these essential protocols for secure and effective email communication.
In today's digital age, ensuring your emails reach their intended recipients while protecting your brand from email fraud is more important than ever. With major email providers increasingly requiring certain email authentication protocols, it's time to get familiar with DMARC, SPF, and DKIM. But don't worry – we'll break it down in simple terms.
What is SPF?
SPF, or Sender Policy Framework, is an email validation system designed to prevent spam by verifying the sender's IP address. When you send an email, SPF checks if it comes from an authorized IP address for that domain. Think of it as a security guard at the entrance of your domain, only allowing in those who are supposed to be there.
What is DKIM?
DKIM, or DomainKeys Identified Mail, adds a digital signature to your emails. This signature is like a wax seal on a letter, proving that the email hasn't been tampered with during transit and that it truly comes from the sender's domain. It assures recipients that the email is genuine and trustworthy.
What is DMARC?
DMARC, or Domain-based Message Authentication, Reporting, and Conformance, is a policy that helps protect your email domain from being used for email spoofing, phishing scams, and other cybercrimes. It builds on two existing mechanisms – SPF and DKIM – to ensure that incoming messages are from legitimate sources.
DMARC Reports: Monitoring for Better Security
One key feature of DMARC is the ability to generate reports that provide insight into your domain’s outbound email traffic. These reports show which emails are passing and failing SPF and DKIM checks, helping you understand how your domain is being used.
Why Should You Monitor DMARC Reports?
Identify Unauthorized Use: Detect and stop phishing attempts and unauthorized email use.
Improve Deliverability: Adjust your policies to ensure legitimate emails are not mistakenly marked as spam.
Optimize Security Settings: Fine-tune your SPF and DKIM configurations based on the data from the reports.
By regularly reviewing DMARC reports, you can maintain a strong security posture and ensure that your emails continue to reach their intended recipients.
How Do They Work Together?
SPF verifies the sender's IP address.
DKIM ensures the email content hasn't been altered and is from a legitimate source.
DMARC ties it all together, instructing receiving email providers on what to do if an email fails SPF or DKIM checks.
Why is This Important?
Email Deliverability: Ensuring your emails reach the inbox rather than the spam folder.
Email Security: Protecting your brand from being used in phishing scams and other fraudulent activities.
Reputation Management: Maintaining the trust of your customers and partners by preventing unauthorized use of your domain.
The Growing Importance of DMARC
Starting this year, all major email providers will require DMARC records. This means if you don't have DMARC set up, your emails might not be delivered at all. Implementing DMARC, SPF, and DKIM is no longer optional – it's a necessity for maintaining effective communication and protecting your brand.
Steps to Implement DMARC, SPF, and DKIM
Set Up SPF: Publish an SPF record in your DNS settings that lists the IP addresses authorized to send emails on behalf of your domain.
Configure DKIM: Enable DKIM signing in your email server, which involves generating a public/private key pair and publishing the public key in your DNS.
Implement DMARC: Create a DMARC policy that specifies how you want email providers to handle messages that fail SPF or DKIM checks.
Monitor DMARC Reports: Regularly review DMARC reports to identify and address any issues.
How 2Fifteen Tech Can Help
This can be complicated, but understanding and implementing DMARC, SPF, and DKIM is crucial for ensuring your emails are delivered securely and efficiently. 2Fifteen Tech can help you understand and implement these settings to ensure you and your business are not impacted by the security changes email providers are making to ensure better email security.
Contact us to learn more about how 2Fifteen Tech can help you, and about our optional managed DMARC product that puts all of this on autopilot for your business.
Curious about your domain? Try our email domain scanner to see if there are possible issues with how your domain is currently configured.
New ways to annotate Google Docs
Edit smarter with new Google Docs markups! Handwritten feedback is rolling out now. Perfect for detailed notes, sketches, and streamlining collaboration.
New Google Docs Feature: Take Feedback to the Next Level with Handwritten Markups
We are excited about the latest Google Workspace update: markups in Google Docs! This feature brings a new layer of intuitive, visual feedback to document collaboration, taking Google Workspace collaboration to a whole new level.
What are Markups and Why You Should Care
Markups let you directly annotate Google Docs using your finger or a stylus. This provides a natural way to leave precise comments, suggest edits, or sketch out ideas directly within a document.
Here are some exciting applications:
Streamlining Project Reviews: Quickly add handwritten notes and sketches on proposals, reports, and designs.
Enhanced Education: Teachers can provide richer feedback for students on essays, papers, and creative projects.
Visualizing Changes: Clients and contractors can easily collaborate on plans and blueprints.
For more information about this feature and the scheduled rollout, visit Google’s announcement - here.
2Fifteen Tech is a Google Workspace partner and can help you implement and utilize Google Workspace within your business. To find out how we can help you and your business navigate Google Workspace, contact us!
CrowdStrike 2024 Global Threat Report
The CrowdStrike 2024 Global Threat Report is now available!
Gain access to industry-leading insights and ensure that your organization stays ahead of the world’s most dangerous adversaries.
Over 230 adversaries are attacking organizations daily, and they’re moving with unprecedented stealth.
Adversaries are discovering new methods to hide in plain sight, challenging defenders to differentiate between normal user activity and a breach. Stopping breaches requires understanding the adversaries targeting your organization, as well as their methods and motivations.
Just released: the most anticipated cybersecurity report of the year Read the CrowdStrike 2024 Global Threat Report for the latest adversary themes, trends and events tracked by CrowdStrike’s Counter Adversary Operations team – the industry’s leading threat intelligence and threat hunting experts.
Get actionable intelligence on these key findings:
34 newly named adversaries in 2023
230+ total adversaries tracked by CrowdStrike
2:07 mins: fastest recorded eCrime breakout time
75% increase in cloud intrusions
76% spike in data theft victims named on the dark web
75% of attacks to gain access were malware-free
Download the report here
Contact us to learn more about how we are working with our partners to protect our customers from the ever evolving threat landscape.
Apple Vision Pro
Apple recently launched the Vision Pro, a groundbreaking spatial computing device poised to redefine how we interact with digital content and the world around us. Offering an unparalleled immersive experience, it merges high-resolution displays with sophisticated sensors for seamless integration of apps and information into the physical environment. Ideal for media consumption and innovative applications, the Vision Pro's eye-tracking and gesture controls signify a significant leap towards the future of computing.
Earlier this month, Apple launched the Apple Vision Pro, which Apple is calling “a revolutionary spatial computer that transforms how people work, collaborate, connect, relive memories, and enjoy entertainment.” Since the announcement of the Apple Vision Pro, Apple has been touting what they are calling Spatial Computing, as a revolutionary new way to interface with a computer, your apps, and your information.
I recently set up a demo down at one of the Apple Stores here locally to experience it first hand, after watching and reading several reviews out there. It is a remarkable experience that is nearly impossible to explain in words. If you have the opportunity, I would recommend setting up a demo so you can experience it yourself.
I will link to some of my favorite reviews that I read for more detail. I largely agree with most of what they say, but probably more than any other technology device, these are all about the experience, so reading what other people say really won’t do it justice.
What is the Apple Vision Pro?
The Apple Vision Pro is what Apple is calling a “Spatial Computing Platform”. It’s a set of goggles that you wear that has several sensors and cameras around the outside of it, which project the outside world to ultra high resolution screens with pixels so small they are about the size of red blood cells, making it seem like you are looking through something transparent to the world around you. The sensors can determine where objects are, and also knows exactly where you are in the room and how you are turning your head so that it can move what you see to feel like you are just looking at the world around you.
It also has sensors and cameras inside the goggles pointed at your eyes to help track precisely what you are looking at, and using your eyes to unlock the Vision Pro for you securely (think FaceID or TouchID but for your eyes. They call it Optic ID). The eye tracking is also crucial, as it is how you actually interact with things within the Vision Pro. To select something, you simply look at it, then tap 2 fingers together, and it will select it.
By doing this, you can project environments on top of what you are seeing around you. The interface of apps just floats in front of you, right above the table you are sitting in front of, or projected onto the wall next to you. You can move the interface around you however you would like.
Apple posted a 10 minute Guided Tour video that explains and shows what the Vision Pro is and what it can do pretty well here -
A Guided Tour of Apple Vision Pro
What’s it like in practice?
The Guided Tour from Apple, and several other YouTube reviews of the device do a great job explaining the general idea of the device, but as I mentioned earlier, it really is something different when you actually experience it. Watching these videos, you see apps floating in space as if they were around you, or sitting on the table next to you. You see a futuristic “Minority Report” like sci-fi future where you are waving your hands around to interact with floating application windows, which can take up as much space as you would like, or seeing someone sitting on an airplane watching an IMAX size movie that no one else can see around you.
It all looks very cool, but actually doing it and seeing it on yourself is a whole other level. When you actually have them on, and you are the one reaching out and expanding a photo you are looking at, or looking back and forth at a panorama photo you took that suddenly looks 75 feet wide and curves around you, or you are watching some 3D videos that you shot on your iPhone 15 Pro… it just feels completely different.
I don’t want to go into too much detail about what the demos are like, because I honestly believe it’s an experience you should have first hand, but a few things stood out to me. First, the basic technology even before you are doing anything else is kind of insane. When you first put it on and it gets calibrated, you start seeing the world around you through the goggles. If you look hard and think about it, you can tell that they are screens in front of you, but honestly it’s so good and so convincing that you can easily forget that you are looking through those and just feel like you are looking at the world around you. That alone is an incredibly impressive amount of engineering to make that work so naturally.
Then the App UI starts showing up. The apps are so real looking, it looks like circular pieces of glass floating in front of you that if you weren’t thinking about it too hard, you would feel like you could just reach out and touch directly. If you look at the table in front of you, you’ll even notice that there is a shadow under the apps floating in front of you on the table.
Then Apple takes you through some scripted demo tasks to show you different features of the Vision Pro. They start with photos, which are absolutely incredible to see in that space, and wrap up looking at 3D videos which can be taken with either the Vision Pro or with iPhone 15 Pro. These videos are easy to tell that you aren’t actually there, but it’s also shocking how good they are. It is a far more immersive and personal feeling experience than even blowing up the 2D photos to be the size of the wall in front of you.
You go through several other individual apps, watch some movie clips (which are incredible), but the most incredible experience to me was the 3D immersive environment demos they have. There are a handful of spatial environments you can just wrap yourself in, such as Yosemite, Mount Hood, and even one on the moon. These modes allow you to just wrap one of these environments around you so you could do some work or watch a movie in a completely different environment. The other part of the demo with the 3D environments was a reel of completely 3D immersive videos that Apple shot with extremely high resolution cameras. In both cases, it’s hard to describe the feeling, but it feels like you are actually there. There are animals that walk up to you, and you honestly have to remind yourself that you can’t just reach out and touch them.
So what is this for and who should buy one?
I think the most interesting question about this device is what will this actually be used for. I think it’s easy to imagine a future where you put on a light weight set of glasses and rather than needing a computer screen in front of you, you could just have floating windows that you interact with without anything but your hands, eyes, and voice. This is a real glimpse into a future like that, but the reality is that this is so new that “what it’s for” will likely shift a fair amount over the next few years. When the Apple Watch first came out, it was focused more on the apps and fashion, but Apple quickly figured out that the health features were resonating with people more, and as the next few versions came out, the Apple Watch shifted to be more focused on the health aspects. I think something similar will happen with the Vision Pro, and its use cases will become more clear over the next year or two.
Right now, what is the killer app? Any type of media consumption at the moment. Watching a movie or looking through your photos is honestly an experience that is hard to describe and impossible to replicate elsewhere at the moment.
There are several ideas that I would love to see someone try to do with the Vision Pro. For me personally, I want to see more development with being able to use it as external screens for the Mac. It can do this today, but I’d love to see more. I’d love to just be able to take my laptop somewhere and put on Vision Pro and suddenly be able to have a couple of high resolution displays that are private from everyone around me. Someday it would be cool to not even need the Mac, but I’m so ingrained in the Mac apps that I use it would be hard for me to move off of that any time soon.
CAD programs could be absolutely incredible in Vision Pro. If you were designing a motor, or car, or even working on engineering out a building, being able to see it in front of you in crystal clear 3D could be a game changer. Training someone with another Vision Pro somewhere else in the world could be amazing too. Imagine a mechanic working on something, and someone across the world is able to see what they see in 3D, and maybe circle or highlight something that the person is actually looking at while talking them through what to do. What about if you could use a Vision Pro to walk around a house that is going to be for sale, and generate a fully immersive 3D walk through of the house, so that prospective buyers could feel like they are in the house walking around from anywhere in the world?
There is a huge amount of potential, and I’m excited for the things that none of us are even thinking of right now that developers will come up with.
Should you buy this? Well if you’re looking for the immersive content like movies, photos, etc. and that’s worth the $3,499 price point, this is an incredible product for that. A high end TV will often cost more than this. If you are looking for something to radically change the way you work, you may want to wait until there are more applications available, and Apple has started to iron out the use cases more.
Casey Neistat said it best at the end of his review. He started out the video just trying to be silly around New York City and get people’s reaction to someone wearing technology that no one had really seen yet, but he ends the video saying he was actually surprised how much the product moved him, and how it just feels like Apple is tapping in to the future with this product. I feel the exact same way. There is a lot that can and will improve on this, but it feels like Apple is really tapping into something big here, and it feels like the future.
Other reviews
Here are some of the reviews I liked that do a great job of going into the details.
Apple’s Guided Tour -
A Guided Tour of Apple Vision Pro
Casey Neistat’s Video -
the thing no one will say about Apple Vision Pro
MKBHD -
Using Apple Vision Pro: What It’s Actually Like!
Apple Vision Pro Review: Tomorrow's Ideas... Today's Tech!
The Verge -
Apple Vision Pro review: magic, until it’s not
iFixit Teardown -
Vision Pro Teardown Part 2: What’s the Display Resolution? | iFixit News
Apple Business Manager
Apple Business Manager is a crucial, free tool for businesses utilizing Apple devices. It simplifies device and app management, enabling seamless deployment and administration of iPhones, iPads, Macs, and Apple TVs. In this blog post, we explain what Apple Business Manager is, what it’s used for, and why it is beneficial to set up for your business.
Apple Business Manager is a free business portal provided by Apple, specifically designed for businesses to help manage their company owned Apple devices, including iPhone, iPad, Mac, and Apple TV. Apple Business Manager also helps with deployment of apps, and user management of Managed Apple IDs. If you are a business that uses Apple devices, you should be using Apple Business Manager.
Apple Business Manager is not a full management tool, but it is an invaluable tool to help with device management. When a company purchases an Apple device through Apple’s business channels, or an Apple Premier Partner that is set up for Apple Business, your devices can automatically be enrolled in the device management solution in use at your business, allowing for automatic zero touch deployment. You can also procure and deploy applications that are part of Apple’s App Store through Apple Business Manager, and then deploy them to company-owned devices through your device management platform.
Automated Device Enrollment
One of the key benefits of Apple Business Manager is that you can automatically deploy applications, security policies, network configurations, App Store apps and custom apps, and more for company owned devices as soon as they connect to the internet. For iOS devices running the latest software, you can take it a step further and support Apple’s Return to Service functionality, where you can erase an iOS device and have it entirely set itself back up as a new device with your company’s settings without any end-user interaction, which is a great solution for retail environments where iPads need to be reissued frequently, or a seamless way to reissue an iOS device to a new employee. While a device management solution is needed to facilitate these workflows, Apple Business Manager is directing traffic on the back end, telling the devices which device management solution to enroll in when it comes back online.
Apps and Books
If your company uses any apps or books from the Apple App Store or Apple Book Store, you can procure and manage these apps or books through Apple Business Manager. There are a few advantages to doing it this way.
First, if there is an app from the App Store that your company uses that costs money, such as Final Cut Pro for instance, you likely want to make sure that your company owns that app so that it can be redeployed to someone else if necessary. To accomplish this, Apple Business Manager allows you to purchase these and deploy them with a “per-device” license. This means that if you want to change the device that is able to use this app, you simply reassign it in your device management tool, and it will move the existing license from one device to the other.
Next, even for free apps on the App Store, it can be a pain to try to manually manage these across an organization. Without Apple Business manager, you essentially have to try to tell employees to use their own personal Apple ID’s to “purchase” these free apps. Your business will have no control over these, no way to force everyone to update when necessary, and really no way to know who is using what. With Apple Business Manager, even free apps are significantly easier to procure and deploy through your device management platform. You simply add the number of licenses that you need and you can distribute them to any managed device that you have, and choose whether updates are handled automatically or not. There is no need for anyone to sign into Apple ID’s, confirm the download, or anything like that, it’s all automatic.
Managed Apple IDs
Personal Apple IDs are just that, Personal. Apple carefully designed personal Apple ID’s for personal use, including the privacy and security features that Apple is known for. Because of this, they really should not be used for Business contexts. A business can easily lose control of an Apple ID if it’s personal, and they are not designed to be recoverable by a business, which can lead to some really tough situations if they are lost, or if an employee purposely or accidentally locks access to that account.
Managed Apple IDs are Apple’s answer to Business Apple IDs, and are also managed through Apple Business Manager. While more restrictive than a Personal Apple ID in some cases, if you want your business to use Apple ID’s for things like iCloud, Managed Apple IDs are the way to go, and they are managed through Apple Business Manager.
Note - There is a list of specific features that are supported by Managed Apple IDs here - Service access with Managed Apple IDs
Security
Finally, there are several security advantages to using Apple Business Manager to enroll all your company-owned Apple Devices. From a company inventory standpoint, Apple Business Manager keeps a record of all devices enrolled this way. Adhering to purchasing devices through an approved Apple Business channel provides a great record of company-purchased devices. You can view the list directly in the web portal for Apple Business Manager, and most device management providers can pull that list automatically as well, providing more detailed inventory information such as model, device specifics, and even characteristics like color.
Next, devices that are enrolled to device management through Apple Business Manager are considered “Supervised” by Apple, which grants additional privileges for managed devices that are not available through manual enrollment of devices after the fact. There are a wide range of restrictions and commands that are only available if devices are Supervised. Sometimes businesses assume you can do all of these things regardless, and are surprised when a situation comes up and they aren’t able to do something in specific cases.
A list of these specifics are available here - MDM restrictions for supervised Apple devices
An important note to think about is that Apple provides a lot of security and privacy tools designed for individuals, such as Activation Lock. This allows a customer to lock a device to their specific Apple ID, preventing it from being useful to someone if they steal the device but it was activation locked to a specific Apple ID. This is great from a personal customer standpoint, but can be a big issue if people are doing this with personal Apple ID’s and company devices. If your device is supervised, you can either prevent activation lock, or if you’re concerned about the security of the devices being stolen and reused, you can deploy device-based activation lock, which is controlled by your device management platform, and therefore recoverable by you and your business. This is only available for Supervised devices through Apple Business Manager. If you purchase a device as a business but someone locks it with a personal Apple ID, there is a long process you must go through with AppleCare to provide proof of purchase, and several other items to get the device unlocked. It is much easier to implement Apple Business Manager with your business to prevent this from ever being a problem.
How 2Fifteen Tech Can Help
There is a lot to keep track of, and requirements and capabilities change over time, but we are here to help. We are Apple experts and can help navigate the Apple Business offerings, and connect it to device management to fully automate the deployment of Apple devices within your organization.
If you are looking to outsource your IT, we offer full managed IT services for companies where we handle device management, user on-boarding and off-boarding, technical roadmapping and consulting, network services, and much more, so you can focus on what your business does best, and we can handle the technology for you.
If you already have existing IT, but are looking for support in the Apple space, we have a co-managed offering as well, where we manage your Apple devices in coordination with your IT department, and augment your existing team.
Additionally, we have several strategic partnerships, including Kandji, an Apple device management platform, and Express Tech, an Apple Premier Partner that can help with Apple device purchases.
We would love to chat more about our services and how we can help your business! Contact us to set up a call to go through how we can help you and your business!
From Setup to Success: How Apple Consultants Network Can Optimize Your Business Operations
1. Streamlined Setup and Integration
When adopting Apple technologies, a smooth setup and integration process is crucial. Apple Consultants within the network have the expertise to efficiently handle this process, ensuring that your devices, software, and networks are seamlessly integrated with existing infrastructure. By navigating the complexities of setup, they save you time and minimize disruptions, allowing your business to hit the ground running.
2. Customized Solutions for Enhanced Efficiency
One of the key advantages of working with Apple Consultants is their ability to understand your unique business requirements. These consultants collaborate closely with you to analyze your workflows and identify areas where Apple technologies can optimize your operations. From recommending the most suitable hardware and software to developing customized solutions, they ensure that Apple products align with your business goals, streamlining processes and boosting overall efficiency.
3. Expert Training and Support
Maximizing the potential of Apple technologies requires proper training and ongoing support. Apple Consultants Network provides comprehensive training programs tailored to your business needs. They empower your employees with the knowledge and skills necessary to leverage Apple products effectively. Whether it's mastering productivity apps, utilizing collaboration tools, or ensuring data security, their training sessions equip your team with the expertise needed for success. Moreover, Apple Consultants offer ongoing support, ensuring that any technical issues are addressed promptly, minimizing downtime and allowing your business to operate smoothly.
4. Enhanced Productivity and Collaboration
Apple products are renowned for their user-friendly interfaces and intuitive design. Apple Consultants can harness these features to create streamlined workflows and collaborative environments within your organization. By implementing solutions such as cloud-based file sharing, real-time collaboration tools, and seamless communication platforms, they foster a culture of productivity and teamwork. This facilitates efficient information sharing, reduces bottlenecks, and empowers your employees to work together seamlessly, regardless of their physical location.
5. Scalability and Future-Proofing
As your business grows, scalability becomes essential. Apple Consultants assist in planning and implementing scalable solutions that can accommodate your expanding needs. They ensure that your technology infrastructure remains robust, flexible, and future-proof, saving you from costly upgrades or migrations down the line. By staying up-to-date with the latest Apple technologies and trends, these consultants ensure that your business is always at the forefront of innovation.
Conclusion
Partnering with the Apple Consultants Network offers a multitude of benefits, from streamlined setup and integration to customized solutions, expert training, and ongoing support. By optimizing your business operations through the expertise of these consultants, you can leverage the full potential of Apple technologies, enhance productivity, foster collaboration, and future-proof your organization.
At 2Fifteen Tech, we understand the unique challenges businesses face when it comes to hybrid or Apple-focused systems. As your dependable tech advisor, we provide practical solutions that improve efficiency and promote growth. Contact us today to unlock the full potential of your Apple platform and drive your business forward. Let us be your trusted partner on your journey to success.
Why purchase Google Workspace from a Reseller?
In the January 2024 Insights Post, we explore the significant advantages for small businesses in purchasing Google Workspace through a reseller. While the transition to Google Workspace can be straightforward, a reseller offers specialized support and expertise, particularly valuable for businesses with limited IT resources. This support extends to on-site assistance, comprehensive training, and efficient integration with existing business software. By alleviating the IT workload and ensuring a smooth, error-free migration, a reseller not only enhances operational efficiency but also transforms the purchase into a strategic investment in streamlined productivity and optimized business processes.
For small businesses, transitioning to Google Workspace can be a swift and streamlined process. In just one day, your organization and its users can master the suite of applications offered by Google Workspace. A plethora of resources and tools are at your disposal, empowering companies to manage this transition on their own, both efficiently and effectively.
Yet, this raises an intriguing question: If the switch to Google Workspace is so uncomplicated, why should IT staff consider partnering with a reseller? What unique benefits can a reseller provide? How can their engagement improve your business?
Let's explore these aspects in detail.
The advantage of working with a Google Workspace Reseller
A Reseller Can Provide Google Workspace Support
One of the most significant advantages of acquiring Google Workspace through a reseller is the access to specialized, tailored support during the migration process. Opting for a reseller allows businesses to delegate the entire transition, a particularly valuable option for small businesses with limited IT resources. Migration demands careful planning and allocation of resources – a challenging task for businesses already stretched thin. A Google Workspace reseller brings invaluable experience and expertise, easing the burden on internal IT staff and setting the stage for a successful transition.
Furthermore, local resellers offer a unique support level that even Google cannot match. They provide on-site, direct assistance, crucial for smoothly migrating users, educating employees about the new platform, and offering continuous support and training. This hands-on approach not only facilitates a seamless transition but also helps in averting potential pitfalls, ensuring a more efficient and error-free migration.A Reseller Can Provide Google Workspace Efficiency
While the initial setup of Google Workspace might be manageable without external help, the eventual need for maintenance and support is a critical aspect to consider. Acknowledging this, most resellers provide a range of support plans and training options. These services are tailored to ensure businesses can use Google Workspace efficiently on a daily basis. This support extends beyond mere technical troubleshooting; it encompasses comprehensive guidance to help businesses fully exploit the suite's features and functionalities. Such proactive support and training are invaluable for businesses aiming to optimize productivity and streamline operations, particularly for those without a dedicated IT department.A Reseller Can Alleviate IT Workload in Google Workspace Management
A reseller can play a crucial role in alleviating the burden on IT staff. By offering expert assistance in the setup, maintenance, and troubleshooting of Google Workspace, a reseller can handle complex or time-consuming tasks that might otherwise fall on the internal IT team. This support can be especially beneficial in small businesses where IT resources are limited. With a reseller taking care of the technical aspects, the IT staff can focus on other strategic areas of the business, leading to better allocation of resources and enhanced overall efficiency.A reseller can enhance business software integration
Most businesses need more than email and basic productivity tools. They often need a suite of software solutions that cater to various aspects of their operations, such as accounting, billing, project management, and more. When you purchase Google Workspace through a reseller, you gain access to additional expertise and services that can be highly beneficial.
A knowledgeable reseller can help identify and integrate additional products and programs that work seamlessly with Google Workspace. This ensures that your business's existing software for various functions like accounting, billing, and project management is effectively aligned with the new Google Workspace environment. Such integration is crucial to maintain efficiency and ensure all systems work in harmony.
Opting for Google Workspace through a reseller is a strategic choice that offers the same cost and licensing as direct purchase from Google, but with added benefits. Resellers provide invaluable support, integrating Google Workspace seamlessly with existing systems and offering expert guidance. This approach is especially beneficial for small businesses, as it alleviates the IT workload and enhances operational efficiency without disrupting workflow. Thus, partnering with a reseller is not just a purchase decision; it’s an investment in streamlined productivity and optimized business processes.
Zero Trust Security
Zero Trust is a security philosophy that assumes threats can come from anywhere, both inside and outside an organization. It emphasizes continuous verification and access control, rather than blindly trusting everything within the network. Implementing Zero Trust involves various components such as user authentication, endpoint protection, network segmentation, application security, and data loss prevention. While achieving "100% zero trust" may not be feasible, progressing in this direction is crucial for organizations. Zero Trust represents a vital cybersecurity strategy that enhances security without compromising user-friendliness.
What is Zero Trust Security, and why is it important?
In simple terms, Zero Trust is a security philosophy that believes in "never trust, always verify." Instead of assuming everything inside your organization's network is safe, Zero Trust assumes that threats can come from anywhere, be it inside or outside the organization. Traditional security models work under the belief that everything within the company's network is trusted. However, in our increasingly mobile digital world, where people are able to work from anywhere, this model isn't as effective. This is where Zero Trust steps in, providing a more comprehensive approach to security.
However, it's important to understand that Zero Trust is a journey, and it is unlikely to ever achieve “100% zero trust” within any organization. While it might not be possible for all businesses to implement every component of Zero Trust, progressing in this direction and incorporating as many elements as possible is crucial.
While traditional models often focus on building a strong perimeter, Zero Trust considers that threats can be internal as well. It requires continuous verification, making sure that every user, device, and application is validated before granting access. Thinking of security in this mindset also helps isolate the damage an attacker can inflict if they can compromise a specific system by making it more difficult to pivot from one system to others.
Implementing Zero Trust: Recommended Components
At 2Fifteen Tech, we work off the Zero Trust Roadmap, which is a sample architecture provided by Cloudflare in a vendor-agnostic fashion, available here - https://zerotrustroadmap.org/
Here are some bullet points on how 2Fifteen Tech recommends implementing Zero Trust within an organization, based on the Zero Trust Roadmap:
Users
Establish a Corporate Identity: Secure your domain name, and ensure strong authentication and identity for everyone within your business.
Enforce MFA for All Applications: Multi-factor authentication is crucial. It should be phishing-resistant, leveraging security keys, device checks, and biometric confirmations.
Endpoints and Devices
Implement MDM/UEM: Manage corporate devices to verify their authenticity during access.
Endpoint Protection: Protect against malicious behavior on endpoints, such as laptops and mobile devices.
Inventory Devices and Services: Know every device, API, and service within your corporation.
Internet Traffic
DNS Filtering: Block DNS requests to known threats and suspicious domains.
SSL/TLS Inspection: Inspect encrypted data on the network and enforce security policies.
Networks
Segmentation: Limit network access only to what's necessary for specific users.
Close Inbound Ports: Avoid exposing any ports to the public internet.
Applications
Phishing Protection: Monitor inbound emails and filter out any phishing attempts.
Inventory Corporate Applications: Be aware of all applications used within your organization.
Zero Trust for Applications: Enforce Zero Trust policies for all types of applications.
Protect Against Layer 7 Attacks: Make sure application uptime and protect against cyberattacks.
Enforce HTTPS and dnssec: Secure your web assets and applications.
Data Loss Prevention and Logging
Log and Review: Monitor traffic on sensitive applications.
Define Sensitive Data: Know which data is sensitive and where it resides.
Data Loss Prevention: Prevent sensitive data like PII or credit card numbers from unauthorized access or leaks.
Review and Mitigate: Establish a SOC to review logs, update policies, and handle threats.
Stay Updated: Keep an eye on known threat actors and potential risks.
Ongoing Deployment
DevOps Approach: Ensure continuous policy enforcement.
Implement Auto-scaling: Make sure resources can adapt to the demands of your system.
Wrapping Up
Zero Trust isn't just a passing tech fad; it represents a vital cybersecurity strategy aimed at enhancing security without sacrificing the user-friendliness of technology. 2Fifteen Tech can help guide you on your Zero Trust journey.
If you have any questions or want to know how we can help implement Zero Trust within your organization, please reach out!
Business Email Compromise (BEC)
Business Email Compromise (BEC) is a prevalent and dangerous cyber threat that targets businesses through email accounts, posing significant financial and reputational risks. This blog post explores the basics of BEC, its potential costs, and provides practical tips to protect your business. BEC attacks exploit vulnerable organizations and individuals, often impersonating business partners or customers. The financial and reputational impacts of BEC attacks can be devastating, but implementing cybersecurity solutions, training staff, and monitoring email accounts can help prevent losses. Best practices for continuous protection include implementing anti-phishing measures, conducting regular audits, and using context-aware access rules. By following these tips and best practices, businesses can reduce the risk of falling victim to BEC scams and protect their finances and reputation.
Protecting Your Business from Business Email Compromise (BEC) Scams
Business Email Compromise (BEC) is a prevalent and dangerous cyber threat that targets businesses through email accounts, posing significant financial and reputational risks. In this blog post, we will explore the basics of BEC, its potential costs, and provide practical tips to protect your business.
Understanding Business Email Compromise (BEC)
BEC is a malicious form of cyber attack that exploits vulnerable organizations and individuals for financial gain. Attackers compromise email accounts to send fraudulent emails that appear legitimate, or in some cases just impersonate or spoof someone within an organization and send emails that look like they are from someone legitimate, tricking victims into making payments or sharing sensitive information. These scams often involve impersonating business partners or customers.
The Cost of BEC
BEC attacks can have devastating financial and reputational impacts. The recovery process and restoring customer trust can strain budgets and damage brand reputation. Investing in cybersecurity solutions and implementing processes to monitor incoming emails for suspicious activity can help prevent losses caused by these attacks.
Tips to Protect Your Business
Implement an anti-phishing / anti-spam email security platform.
Train staff to recognize and prevent phishing attacks.
Ideally, use an advanced Identity Management system that helps control access to all critical systems, but at the very least, implement strong multi-factor authentication for added security.
Regularly monitor employee email account login attempts for suspicious activity.
Conduct regular audits of networks and systems to identify vulnerabilities.
Where possible, implement context-aware access rules to block certain things like logins from foreign countries that may indicate compromised accounts.
By following these tips, businesses can reduce the risk of falling victim to BEC scams and protect their finances and reputation.
Best Practices for Continuous Protection
By implementing these best practices, businesses can safeguard their finances and reputation from BEC scams.
Protecting your business from BEC scams requires proactive measures and a strong cybersecurity strategy. By staying vigilant, investing in the right technologies, and educating employees, you can reduce the risk of falling victim to these malicious attacks.
To learn more about how 2Fifteen Tech can help protect you and your business from Business Email Compromise, schedule a call with us today!
NIST Cybersecurity Framework
The NIST Cybersecurity Framework is a set of guidelines and best practices developed by the National Institute of Standards and Technology (NIST) to help organizations manage and reduce their cybersecurity risks. It provides a structured approach for SMBs to identify, protect, detect, respond to, and recover from cyber threats. The framework is important as it offers a common language, enhances security, improves communication, aids in compliance, and aligns cybersecurity efforts with overall risk management strategies. SMBs can start small and scale, conduct risk assessments, provide employee training, partner with experts, and perform regular audits and updates to effectively implement the framework. 2Fifteen Tech offers guidance and support in navigating the framework and enhancing cybersecurity practices for SMBs.
Understanding the NIST Cybersecurity Framework: A Guide for SMBs
Introduction
In today's digital age, cybersecurity has become a critical concern for businesses of all sizes. Small and medium-sized businesses (SMBs) often face unique challenges when it comes to protecting their data and assets. That's where the NIST Cybersecurity Framework comes into play. In this blog post, we will explore what the framework is, why it is important, and how SMBs can leverage it to enhance their cybersecurity practices.
What is the NIST Cybersecurity Framework?
The NIST Cybersecurity Framework, developed by the National Institute of Standards and Technology (NIST), is a set of guidelines and best practices designed to help organizations manage and reduce their cybersecurity risks. It provides a structured approach that enables businesses to identify, protect, detect, respond to, and recover from cyber threats. For managed IT service providers like 2Fifteen Tech, the framework serves as a valuable tool in safeguarding the systems, assets, data, and capabilities of their SMB clients.
The NIST Framework is not a one-size-fits-all solution but rather a flexible guide that can be tailored to the specific needs of each organization. It is structured around five core functions:
Identify: Recognize the critical assets and business environment to understand the risks.
Protect: Develop safeguards to ensure delivery of critical infrastructure services.
Detect: Implement solutions to identify cybersecurity events efficiently.
Respond: Develop an action plan to address detected cybersecurity events.
Recover: Construct strategies to restore capabilities impaired due to cybersecurity events.
Why is the NIST Cybersecurity Framework Important?
The NIST Cybersecurity Framework is important for several reasons. Firstly, it provides a common language and a standardized set of practices that businesses can adopt to improve their cybersecurity posture. This ensures consistency and facilitates collaboration between different organizations, including 2Fifteen Tech and the SMB’s we support. Moreover, the framework helps businesses align their cybersecurity efforts with their overall risk management strategies, enabling them to make informed decisions regarding resource allocation and investment in security measures.
Risk Management: It offers a strategic view of the lifecycle of managing risks, helping businesses understand, manage, and mitigate risks effectively.
Enhanced Security: By implementing the framework, SMBs can strengthen their cybersecurity defenses, thereby protecting data, privacy, and integrity.
Improved Communication: The framework provides a common language for understanding, managing, and expressing cybersecurity risks internally and externally.
Compliance: Adherence to the framework can also aid in compliance with various cybersecurity regulations and laws.
Applying the NIST Cybersecurity Framework for SMBs
1. Start Small and Scale
Start by adopting basic elements of the NIST framework and progressively integrate more components as your business grows and evolves. 2Fifteen Tech can help in effectively implementing and scaling these practices without overwhelming your existing systems and processes.
2. Risk Assessment
Engage in a risk assessment process to identify and prioritize risks. Understanding the risk landscape helps in making informed decisions on where to allocate resources for maximum protection.
3. Employee Training
A significant portion of cybersecurity breaches happen due to human error. Train your staff on the importance of cybersecurity, the policies in place, and the best practices to adhere to.
4. Partner with Experts
Cybersecurity is complex and ever-changing. Collaborate with experts like 2Fifteen Tech who have deep knowledge of the NIST Cybersecurity Framework and can provide managed IT services to keep your business secure.
5. Regular Audits and Updates
Conduct periodic reviews and audits of your cybersecurity policies and procedures to identify areas for improvement and ensure that you are always protected against the latest threats.
Conclusion
The NIST Cybersecurity Framework is an invaluable tool for businesses aiming to improve their cybersecurity posture. For SMBs looking for guidance and support in navigating the complexities of the framework and implementing its principles effectively, 2Fifteen Tech is here to help. With our expertise and commitment to cybersecurity, we ensure your business not only understands the risks but is well-equipped to handle them, allowing you to focus on what you do best - running your business. For more information or to get started with enhancing your cybersecurity, contact 2Fifteen Tech today.
Cybersecurity Awareness Month - Promoting Online Safety and Security
Cybersecurity Awareness Month is a global initiative that aims to educate individuals and organizations about cybersecurity, promote best practices, and build a cybersecurity culture. It emphasizes the importance of education, empowerment, and staying ahead of evolving threats. By raising awareness and fostering a cybersecurity culture, we can collectively create a safer digital world.
October is recognized as Cybersecurity Awareness Month, an ideal time to learn about, engage with, and promote cyber-safety practices. At 2Fifteen Tech, we understand the importance of cybersecurity in our digitally connected world, and we are committed to providing resources and services designed to safeguard your data and online presence.
What is Cybersecurity Awareness Month?
Cybersecurity Awareness Month is a global initiative that aims to educate individuals and organizations about cybersecurity and empower them to protect themselves against online threats. It was launched by the National Cyber Security Alliance (NCSA) and the Cybersecurity and Infrastructure Security Agency (CISA) in the United States.
Origins and Significance
The need for Cybersecurity Awareness Month stems from the increasing sophistication and prevalence of cyber threats. With the rapid advancement of technology, our reliance on digital platforms and devices has grown exponentially. Unfortunately, this has also brought about an increase in cyberattacks, data breaches, and identity theft incidents.
This annual campaign provides an opportunity to educate the public and organizations about the potential risks they face in the digital world. It aims to promote safe online practices, raise awareness about emerging threats, and encourage individuals and businesses to take proactive measures to enhance their cybersecurity defenses.
Why is Cybersecurity Awareness Month Important?
Education and Empowerment: Cybersecurity Awareness Month serves as a platform to educate individuals about common cyber threats, such as phishing, malware, and social engineering. By increasing awareness, individuals can make informed decisions and take necessary precautions to protect themselves online.
Promoting Best Practices: The campaign emphasizes the importance of adopting best practices for cybersecurity, such as using strong and unique passwords, enabling two-factor authentication, keeping software up to date, and regularly backing up data. These practices can significantly reduce the risk of falling victim to cyberattacks.
Building a Cybersecurity Culture: Cybersecurity is not just the responsibility of IT departments or security professionals. It requires a collective effort from individuals, organizations, and communities. Cybersecurity Awareness Month encourages the development of a cybersecurity culture, where everyone understands their role in maintaining a secure online environment.
Staying Ahead of Evolving Threats: Cyber threats are constantly evolving, and new attack vectors emerge regularly. Cybersecurity Awareness Month helps individuals and organizations stay informed about the latest trends and tactics used by cybercriminals. By staying ahead of these threats, we can better protect ourselves and our digital assets.
Conclusion
As we navigate the digital landscape, it is crucial to prioritize cybersecurity. Cybersecurity Awareness Month provides an excellent opportunity to reinforce the importance of online safety and security. By raising awareness, promoting best practices, and fostering a cybersecurity culture, we can collectively build a safer and more secure digital world.
Follow our blog this month for more blog posts explaining cybersecurity concepts, how to best implement them, and explain some of the tools that we use to help protect our clients.
Unlocking the Full Potential of Your Apple Technology with Expert Guidance
You spent good money on the best technology, now how do you ensure you are getting the most from your investment? You’re the best at what you do in your industry and it only makes sense to engage the best in supporting your technology. Apple has developed a network of specially trained consultants they call their Apple Consultant Network, or ACN. Unlike standard Managed Service Providers (MSP) who are technology generalists, ACN members are trained and supported by Apple to maximize the capabilities of your Apple products.
You spent good money on the best technology, now how do you ensure you are getting the most from your investment? You’re the best at what you do in your industry and it only makes sense to engage the best in supporting your technology. Apple has developed a network of specially trained consultants they call their Apple Consultant Network, or ACN. Unlike standard Managed Service Providers (MSP) who are technology generalists, ACN members are trained and supported by Apple to maximize the capabilities of your Apple products.
Unparalleled Expertise
When you engage the services of a certified Apple IT consultant, you're not merely enlisting an expert—you're making an investment in a partner who shares your passion for success. Together with an Apple Consultant Network member, you can unleash the complete capabilities of your Apple technology and attain extraordinary results.
Certified Apple IT consultants possess a deep understanding of Apple products and services, acquired through rigorous training and hands-on experience. By tapping into their expertise, you gain access to a wealth of knowledge and insights that can revolutionize the way you and your team work.
Streamlined Network Management
Managing networks can be complex, especially in environments where Apple devices coexist with other platforms. Certified Apple IT consultants specialize in designing, implementing, and maintaining networks that are tailored to your organization's needs. From securing data to ensuring smooth connectivity, they navigate the intricacies of network management, allowing you to focus on what matters most—your core business.
Efficient Troubleshooting and Support
Technical issues can hamper productivity and frustrate users. A certified Apple IT consultant possess an innate ability to diagnose and resolve problems swiftly and efficiently. They leverage their in-depth knowledge of Apple technologies to provide reliable support, ensuring that any obstacles are swiftly overcome and you can get back to what you do best.
Conclusion
An Apple Consultant focuses on helping businesses reduce costs for their IT infrastructure while streamlining their technology. Leveraging the efficiency and capabilities of Apple products, businesses can enhance productivity, collaboration, and ensure a secure and reliable IT environment. Through a comprehensive assessment and analysis of business needs, tailored solutions are developed to align with objectives and budgets. Integration of Mac computers and iOS devices, along with the deployment of other cloud-based services, enables businesses to maximize efficiency and reduce unnecessary expenses. Ongoing support, training, and troubleshooting in Apple's ecosystem ensure smooth operations, minimizing downtime. Partnering with an Apple Consultant allows businesses to achieve cost savings, increased productivity, and a streamlined IT infrastructure for growth and success.
Google Workspace Introduces Passkeys: A Simpler, Safer Alternative to Passwords
Google Workspace introduces a game-changer in online security: passkeys. This passwordless sign-in method is designed with user convenience and security in mind, offering a faster and less error-prone authentication process. Users can now use their fingerprint, face recognition, or other screen-lock mechanisms to access their Google Workspace apps, offering a more streamlined and secure login experience. Now available in open beta, passkeys promise a new era of digital security and ease of use.
Google Workspace has taken a step towards making our online experiences both more secure and more convenient with the introduction of passkeys. This new feature has been available with consumer Google accounts for a couple of months, but is now being rolled out to Google Workspace accounts.
What are passkeys?
They're a passwordless sign-in method designed to provide a more convenient and secure authentication experience across websites and apps. Users can now sign in to their Google Workspace apps, such as Gmail or Google Drive, with a passkey using their fingerprint, face recognition, or other screen-lock mechanism. Importantly, this feature respects user privacy – no biometric data is ever sent to Google's servers or other websites and apps.
Why should we care about this change?
Well, Google's early data from March and April 2023 shows that passkeys are twice as fast and four times less error-prone than traditional passwords. Plus, they're available across all popular browsers and operating systems, including Android, ChromeOS, iOS, macOS, and Windows.
Not only are passkeys more convenient, but they're also more secure. They're based on the same public key cryptographic protocols that underpin physical security keys, like the Titan Security Key. As a result, they can be resistant to phishing and other online attacks – more so than SMS, app-based one-time passwords, and other forms of traditional two-factor authentication (2FA).
So, how can you get started with passkeys?
If you're a Workspace admin, you can enable users in your organization to skip passwords at sign-in using a passkey. This setting is off by default, but you can easily change it in the Admin console under Security > Passwordless. If you're an end user and your admin has enabled passkeys, visit g.co/passkeys to start using them in place of passwords or as a 2SV method.
The rollout of this feature began gradually on June 5, 2023, and is available to all Google Workspace and Cloud Identity customers. It may take up to 15 days to see the feature in your environment.
With passkeys, Google Workspace is taking us one step closer to a passwordless future, promising a safer and more user-friendly authentication experience.
4 Misconceptions About Co-Managed IT with an MSP
Co-managed IT is a partnership between a business's in-house IT team and a managed service provider (MSP). It can be a great solution for many companies that want to keep some control in-house while still benefiting from the expertise of an MSP. However, there are several misconceptions about co-managed IT that need to be cleared up. In this article, we will debunk 4 of the most common misconceptions about co-managed IT and explain how it can benefit businesses of all sizes.
Many businesses today are turning to managed service providers (MSPs) to handle their technology needs. However, some companies may not want to outsource all of their IT services completely and prefer to keep some control in-house.
This is where co-managed IT comes in. Co-managed IT is a partnership between a business's in-house IT team and an MSP. While co-managed IT can be a great solution for many companies, there are still some misconceptions about it that need to be cleared up. Here are 4 misconceptions about co-managed IT with an MSP:
1. MSPs will take over all of your IT responsibilities
One of the biggest misconceptions about co-managed IT is that the MSP will take over all your IT responsibilities. This is not true. Co-managed IT is a partnership, meaning the MSP will work with your in-house IT team to provide the services you need. The MSP will not take over your IT responsibilities unless you want them to.
2. Co-managed IT is only for large businesses
Another misconception about co-managed IT is that it is only for large businesses. This is also not true. Co-managed IT can be beneficial for businesses of all sizes. No matter the size of your company, co-managed IT can help you improve your technology infrastructure and streamline your IT processes.
3. Co-managed IT is too expensive
Many businesses believe that co-managed IT is too expensive. However, this is not necessarily true. Co-managed IT can save you money in the long run. Outsourcing some of your IT services to an MSP can reduce your in-house IT costs and increase efficiency. Additionally, many MSPs offer flexible pricing options, so you can choose the services that fit your budget.
4. Co-managed IT is only for businesses with IT problems
Finally, some businesses believe co-managed IT is only for businesses with IT problems. This is not true. Co-managed IT can benefit any business looking to improve its technology infrastructure and streamline their IT processes. Even if your in-house IT team performs well, co-managed IT can help you stay up-to-date with the latest technology trends and best practices.
We understand the importance of co-managed IT and can tailor our services to meet the specific needs of your business. We are here to help you navigate this journey and ensure you get the most out of co-managed IT. Contact us today to discuss how co-managed IT can benefit your business and learn more about how we can support your organization's IT needs.
Google Workspace with Generative AI
Google Workspace is introducing a set of AI-powered features to help users create, connect, and collaborate in new ways. These new generative AI experiences will be available to trusted testers throughout the year and will include capabilities such as draft generation and rewriting in Docs and Gmail, auto-generated images, audio, and video in Slides, and auto-completion, formula generation, and contextual categorization in Sheets. The features will be available to consumers, small businesses, and educational institutions in more countries and languages after further refinement and iteration.
Google Workspace has announced a set of new AI-powered writing features in Docs and Gmail. These features will help users get started writing by generating drafts of documents and emails based on a topic entered. This means that users can save time and effort that would otherwise have gone into drafting content from scratch. The AI-powered features will also make suggestions for rewriting existing content in a more polished, professional style, allowing users to refine and edit their content with ease.
While the initial set of AI-powered writing features is being introduced in Docs and Gmail, Google plans to add these generative AI capabilities to other Workspace products like Slides, Sheets, Meet and Chat in the future. This will allow users to harness the power of AI to create, connect and collaborate like never before.
Google plans to launch these new AI-based capabilities this month via a trusted tester program, starting with English in the United States, before being made available more broadly to consumers, small businesses, enterprises, and educational institutions in more countries and languages. The goal is to deliver the full potential of generative AI across Workspace, revolutionizing creation and collaboration all over again, just as Google did with real-time collaboration through co-authoring in Docs 17 years ago.
The Benefits of Co-Managing your IT with an MSP
As technology continues to evolve, businesses are finding it increasingly difficult to keep up with the demands of their IT infrastructure. This is where working with an IT managed service provider (MSP) can be beneficial. However, instead of outsourcing all IT responsibilities to an MSP, some businesses work with them in a co-managed fashion. This blog post will explore the benefits of working with an IT MSP in a co-managed fashion.
Increased Flexibility
One of the main benefits of working with an IT MSP in a co-managed fashion is increased flexibility. This approach allows businesses to customize their IT services to meet their specific needs. An MSP can work with the internal IT team to provide additional support and expertise. This allows businesses to maintain control over their IT infrastructure while benefiting from the expertise and resources of an MSP.
Enhanced Security and Compliance
Another benefit of working with an IT MSP in a co-managed fashion is enhanced security and compliance. MSPs have a deep understanding of the latest security threats and compliance regulations. Businesses can ensure their IT infrastructure is secure and compliant by working with an MSP. Additionally, MSPs can provide ongoing monitoring and maintenance to detect and prevent potential security threats before they become significant issues.
Reduced Downtime and Increased Productivity
Finally, working with an IT MSP in a co-managed fashion can reduce downtime and increase productivity. MSPs can provide proactive maintenance and support to prevent issues before they occur. This means that IT infrastructure is more reliable and downtime is reduced. With increased reliability, businesses can focus on their core competencies instead of dealing with IT issues. This leads to increased productivity and improved business outcomes.
Conclusion
In conclusion, working with an IT MSP in a co-managed fashion can provide businesses with increased flexibility, enhanced security and compliance, reduced downtime, and increased productivity. By working together, businesses can benefit from the expertise and resources of an MSP while maintaining control over their IT infrastructure. If you're considering working with an IT MSP, a co-managed approach may be the best option for your business.
New Smart Canvas Features in Google Sheets and Google Docs
Google Workspace is introducing new features and enhancements to Smart Canvas, a set of intelligent tools that helps users work more efficiently and easily. With the latest updates, Smart Canvas now includes more smart chips and a new way to display dates across Google Sheets, making it easier for users to quickly preview and interact with dates, locations, and financial information. Additionally, Google Docs has added a stopwatch chip that can track the time taken to complete an activity, helping users stay on task and on time.
Google Workspace is introducing new features and enhancements to Smart Canvas, a set of intelligent tools that helps users work more efficiently and easily. With the latest updates, Smart Canvas now includes more smart chips and a new way to display dates across Google Sheets, making it easier for users to quickly preview and interact with dates, locations, and financial information. Additionally, Google Docs has added a stopwatch chip that can track the time taken to complete an activity, helping users stay on task and on time.
Place Chips
Google Maps place chips can now be added to Google Sheets, allowing users to open the location directly in Google Maps and see a preview of the location or find directions. This feature is especially useful for users who need to include location information in their spreadsheets. By simply typing “@” followed by the place or finance entity, users can easily insert a smart chip into their sheet.
Expanded Date Capabilities
Google Sheets now includes expanded date capabilities with the @ entry point, which provides shortcuts like @today, @yesterday, @tomorrow, and @date. Clicking on the date will display a date picker that allows users to update dates as needed. This feature makes it easier for users to work with dates and keep track of important deadlines.
Finance Chips
Users can now add Google Finance entities, such as stocks, mutual funds, and currencies, into a Google Sheet. The finance chips provide users with information depending on the entity type. For example, for stocks, users can see the company name, listing Index, stock price, and market cap. Clicking the chip will take users to the entity’s dedicated Finance page. This feature is especially useful for users who work with financial data and need quick and easy access to financial information.
Stopwatch Chips
Google Docs has added a stopwatch chip that allows users to track the time to complete an activity. The stopwatch chip can be inserted by typing “@” followed by “Stopwatch” or by navigating to Insert > Smart chips. Users can start, stop, and reset the timer as needed, making staying on task and on time easier.
Google Workspace continues to innovate with Smart Canvas by introducing more smart chips and enhancements to Google Sheets and Google Docs. These new features make it easier for users to work with dates, locations, financial data, and track time. The updates are available to all Google Workspace customers, legacy G Suite Basic and Business customers, and users with personal Google Accounts. The rollout will take place gradually, with feature visibility beginning on February 23, 2023, for Rapid Release domains and March 9, 2023, for Scheduled Release domains.