Steve Thomas - IT Consultant

Microsoft is known for their easy-to-use products. But did you know that behind Office’s simple-looking user interface lie many in-depth features? From Word and Excel to PowerPoint and Outlook, here are some free training videos that will help you master them all.

Office Basics is a series of free Office training videos from Microsoft which cover different features and functionality.

Intro to Office Basics

This training video will help you use templates to create professional documents, learn the ins and outs of SmartArt and Charts to express complex data and ideas, and collaborate in shared documents whether you’re working online, offline, or simultaneously with others.

What is Office 365?

Discover the features and upgrades within Office 365 that aren’t available anywhere else, and learn how cloud versions of applications like Word, Excel, and Outlook differ from their desktop counterparts.

Word Training

These training videos will show you how to create and edit documents as well as create and format tables in just a few clicks. They also cover document makeovers, how to organize documents, creating mailing lists, and how to translate text instantly.

Excel Training

Creating, organizing, and analyzing data from charts and tables can be quite complicated, which is why these training videos are perfect for anyone looking to design workbooks, add text and data, format and analyze charts, and create pivot tables and formulas. Other tips include how to slice data and locate them using VLOOKUP.

PowerPoint Training

There’s more to PowerPoint than adding text to slides. These training videos will show you how to create presentations, add and format text, design presentations, add audio, video, and animations, and format images. You’ll also learn about nifty features such as how to match slide colors using the Eyedropper and how to export slides to videos.

Outlook Training

Organize your Outlook inbox with ease and learn how to add and format text and images, manage contacts, calendars, meetings, and to-do lists, as well as other tips such as how to spice up your email signature, keep your inbox clean, and hold meetings using Skype and OneNote.

Microsoft’s new training videos might not be jaw-dropping, but they will surely help users do more with Office. If you’d like to learn more about the benefits of Microsoft Office for small businesses, just give us a call and we’ll be happy to help.

Have you been putting off learning about all the features in Microsoft Word, Excel, or PowerPoint? We don’t blame you. But mastering them can be extremely beneficial. That said, here are some free training videos that will help you get more out of Microsoft Office.

Office Basics is a series of free Office training videos from Microsoft which cover different features and functionality.

Intro to Office Basics

This training video will help you use templates to create professional documents, learn the ins and outs of SmartArt and Charts to express complex data and ideas, and collaborate in shared documents whether you’re working online, offline, or simultaneously with others.

What is Office 365?

Discover the features and upgrades within Office 365 that aren’t available anywhere else, and learn how cloud versions of applications like Word, Excel, and Outlook differ from their desktop counterparts.

Word Training

These training videos will show you how to create and edit documents as well as create and format tables in just a few clicks. They also cover document makeovers, how to organize documents, creating mailing lists, and how to translate text instantly.

Excel Training

Creating, organizing, and analyzing data from charts and tables can be quite complicated, which is why these training videos are perfect for anyone looking to design workbooks, add text and data, format and analyze charts, and create pivot tables and formulas. Other tips include how to slice data and locate them using VLOOKUP.

PowerPoint Training

There’s more to PowerPoint than adding text to slides. These training videos will show you how to create presentations, add and format text, design presentations, add audio, video, and animations, and format images. You’ll also learn about nifty features such as how to match slide colors using the Eyedropper and how to export slides to videos.

Outlook Training

Organize your Outlook inbox with ease and learn how to add and format text and images, manage contacts, calendars, meetings, and to-do lists, as well as other tips such as how to spice up your email signature, keep your inbox clean, and hold meetings using Skype and OneNote.

Microsoft’s new training videos might not be jaw-dropping, but they will surely help users do more with Office. If you’d like to learn more about the benefits of Microsoft Office for small businesses, just give us a call and we’ll be happy to help.

Despite Microsoft Office’s easy-to-use interface, mastering all the features in this suite of productivity tools requires time. But fret not, the following training videos will help you become a Microsoft Office expert fast.

Office Basics is a series of free Office training videos from Microsoft which cover different features and functionality.

Intro to Office Basics

This training video will help you use templates to create professional documents, learn the ins and outs of SmartArt and Charts to express complex data and ideas, and collaborate in shared documents whether you’re working online, offline, or simultaneously with others.

What is Office 365?

Discover the features and upgrades within Office 365 that aren’t available anywhere else, and learn how cloud versions of applications like Word, Excel, and Outlook differ from their desktop counterparts.

Word Training

These training videos will show you how to create and edit documents as well as create and format tables in just a few clicks. They also cover document makeovers, how to organize documents, creating mailing lists, and how to translate text instantly.

Excel Training

Creating, organizing, and analyzing data from charts and tables can be quite complicated, which is why these training videos are perfect for anyone looking to design workbooks, add text and data, format and analyze charts, and create pivot tables and formulas. Other tips include how to slice data and locate them using VLOOKUP.

PowerPoint Training

There’s more to PowerPoint than adding text to slides. These training videos will show you how to create presentations, add and format text, design presentations, add audio, video, and animations, and format images. You’ll also learn about nifty features such as how to match slide colors using the Eyedropper and how to export slides to videos.

Outlook Training

Organize your Outlook inbox with ease and learn how to add and format text and images, manage contacts, calendars, meetings, and to-do lists, as well as other tips such as how to spice up your email signature, keep your inbox clean, and hold meetings using Skype and OneNote.

Microsoft’s new training videos might not be jaw-dropping, but they will surely help users do more with Office. If you’d like to learn more about the benefits of Microsoft Office for small businesses, just give us a call and we’ll be happy to help.

2016december16_office_cOffice 365 comes with a variety of storage and sharing options that promise to make life easier and more productive for business owners. OneDrive and SharePoint share many of the same features, but differ in some of their basic management options. Unless you know what to look for, it might be hard for you as a business owner to choose the best option for your company.

Similarities between OneDrive and SharePoint
Both OneDrive and SharePoint applications utilize Office 365 to help businesses organize information and share it with employees and company heads. Documents are stored in a cloud drive for security, so employees can track changes between edited versions, as well as make comments and add information when necessary. This real-time collaboration is one of the favorite benefits of online file management. Since data can be synchronized to various forms of technology, it is portable and usable everywhere.

OneDrive provides personal attention
OneDrive uses a SharePoint backdrop in order to run, making the two programs inherently connected. However, there are distinct features that business owners will notice with their OneDrive account. The OneDrive program is utilized by individuals, and control is still maintained by the individual even if it is shared across a department. Changes are synced to a chosen device, allowing departments to work on projects together. As an administrator, you can share the document by way of a secure link, and you can allow some people to edit and leave others in a position to view only.

SharePoint is a wider group share program
If OneDrive is the perfect individualized sharing option, then SharePoint takes a wider stance. An administrator or company head can save a document online, allowing employees throughout the company to view and edit the document. Every change is tracked to give higher-ups an idea of who is contributing to the company projects. SharePoint is a good application to use for human resource surveys or updates that need to be completed by team members in other departments.

Office 365 encourages businesses to increase their employees’ usage of online storage and data options. SharePoint and OneDrive are just two of the many programs provided to improve how your business is run. For more information on how online document sharing programs can help you increase your company’s visibility and productivity, contact us today.

2016december16_office_bSharePoint and OneDrive are similar programs used to help business owners manage and share company data across the board. Choosing which program will best utilize the space and resources you have can be confusing. For a quick overview of these unique programs and how to rationalize the choice for your business, continue reading.

Similarities between OneDrive and SharePoint
Both OneDrive and SharePoint applications utilize Office 365 to help businesses organize information and share it with employees and company heads. Documents are stored in a cloud drive for security, so employees can track changes between edited versions, as well as make comments and add information when necessary. This real-time collaboration is one of the favorite benefits of online file management. Since data can be synchronized to various forms of technology, it is portable and usable everywhere.

OneDrive provides personal attention
OneDrive uses a SharePoint backdrop in order to run, making the two programs inherently connected. However, there are distinct features that business owners will notice with their OneDrive account. The OneDrive program is utilized by individuals, and control is still maintained by the individual even if it is shared across a department. Changes are synced to a chosen device, allowing departments to work on projects together. As an administrator, you can share the document by way of a secure link, and you can allow some people to edit and leave others in a position to view only.

SharePoint is a wider group share program
If OneDrive is the perfect individualized sharing option, then SharePoint takes a wider stance. An administrator or company head can save a document online, allowing employees throughout the company to view and edit the document. Every change is tracked to give higher-ups an idea of who is contributing to the company projects. SharePoint is a good application to use for human resource surveys or updates that need to be completed by team members in other departments.

Office 365 encourages businesses to increase their employees’ usage of online storage and data options. SharePoint and OneDrive are just two of the many programs provided to improve how your business is run. For more information on how online document sharing programs can help you increase your company’s visibility and productivity, contact us today.

2016december16_office_aDigital Storage options with Office 365 provide business owners with convenient and efficient data management. But with new software added daily, it is easy to get overwhelmed by the variety of options. Keep reading to find out which Office 365 program will be your best option for organizing and sharing information: SharePoint or OneDrive.

Similarities between OneDrive and SharePoint
Both OneDrive and SharePoint applications utilize Office 365 to help businesses organize information and share it with employees and company heads. Documents are stored in a cloud drive for security, so employees can track changes between edited versions, as well as make comments and add information when necessary. This real-time collaboration is one of the favorite benefits of online file management. Since data can be synchronized to various forms of technology, it is portable and usable everywhere.

OneDrive provides personal attention
OneDrive uses a SharePoint backdrop in order to run, making the two programs inherently connected. However, there are distinct features that business owners will notice with their OneDrive account. The OneDrive program is utilized by individuals, and control is still maintained by the individual even if it is shared across a department. Changes are synced to a chosen device, allowing departments to work on projects together. As an administrator, you can share the document by way of a secure link, and you can allow some people to edit and leave others in a position to view only.

SharePoint is a wider group share program
If OneDrive is the perfect individualized sharing option, then SharePoint takes a wider stance. An administrator or company head can save a document online, allowing employees throughout the company to view and edit the document. Every change is tracked to give higher-ups an idea of who is contributing to the company projects. SharePoint is a good application to use for human resource surveys or updates that need to be completed by team members in other departments.

Office 365 encourages businesses to increase their employees’ usage of online storage and data options. SharePoint and OneDrive are just two of the many programs provided to improve how your business is run. For more information on how online document sharing programs can help you increase your company’s visibility and productivity, contact us today.

2016Mar11_Office365_AIt’s easy to see why Office 365 is an attractive solution for small and medium-sized businesses already familiar with the Office interface. More and more companies are making the move to the cloud, but many have yet to complete their transition and still rely at least in part on on-site SharePoint systems. When you’re ready to migrate, the move from SharePoint to Office 365 presents numerous security challenges to prepare for – not least because breaches are far more likely to be caused by localized issues than insufficient protection on Microsoft’s part. Here’s what you need to do to ensure you’ve got security covered when you make the leap to migrating from SharePoint to Office 365.

Identify your company’s sensitive data…

It’s so easy to create sites within SharePoint that businesses often have far more than they realize, covering just about every aspect of their operations. And it’s natural, of course, for at least some of the files housed within those sites to contain sensitive commercial or personal data. The key is ensuring that sensitive information is adequately identified and protected. Do this by conducting a security audit before you undertake your migration.

Your audit should identify the types of data stored in the various parts of your SharePoint network, including which specific information needs extra safeguarding. Be sure to consider everything from trade secrets and contract details to the personal information of your clients.

…and then restrict access to it

Once you’ve worked out where your most precious data lies, you can check who currently has access to it and whether their access is appropriate. After all, it’s not necessary for everyone to be able to get at all the data your company owns; it’s far better to operate on a need-to-know basis, with a reasonable level of flexibility.

Ensure that each of your employees has access only to the data that’s necessary for them to perform their duties. When you make the switch to Office 365, you’ll find that it allows you to conveniently set these different levels of permissions, including for external partners with whom you collaborate.

Trust nobody and suspect everybody

We say that lightheartedly, of course – it would be counterproductive to become so security-paranoid as to suspect everyone is attempting foul play with your company’s data. Nonetheless, it’s wise to consider everyone in your organization when it comes to auditing data access permissions – and that includes system administrators who might be assumed to have master access to every element of your network infrastructure.

A rogue administrator is the stuff of nightmares, since their elevated position gives them much greater leeway to siphon off valuable data without being noticed – or even to allow others to conduct questionable business and bypass the usual built-in security precautions. Overcoming the danger of an all-too-powerful administrator admittedly becomes easier if you have more than one on staff, but even in smaller businesses you can mediate some of the risk by regularly checking on your administrator’s usage and ensuring that their top-level system permissions remain justifiable.

Use machine learning to foresee security breaches

Every action performed by your staff within Office 365 is automatically logged, and with relative ease you can pull reports that allow you to analyze these. But the sheer number of events taking place within Office 365 in the course of your business’s normal operations means that even attempting to identify questionable behavior will be akin to the proverbial needle and haystack. That’s not to say it’s unwise to be on the lookout for anomalies in normal usage – the export of unexplainably large volumes of data, for instance, could suggest that a member of your team is leaking intelligence to a competitor, or that they’re about to jump ship and take your trade secrets with them.

Thankfully, it’s possible to leverage the developing power of machine learning to identify potential breaches before they happen – without the need to wade through unmanageable swathes of perfectly normal data. Graph API is incorporated into Office 365, and allows for the integration of machine learning tools into your security environment to achieve just that. The same tools can also help you avoid being caught out by hackers, by identifying system login attempts from locations that are out of the ordinary; you should bolster this protection by religiously removing inactive accounts and those of departing employees.

By covering these essential security considerations when it comes to your migration, you’ll be one step closer to ensuring you strike the right balance between the powerful collaborative features of Office 365 and the robust safeguards your business’s integrity demands. To find out more about how we can help your Office 365 migration run smoothly, or what other business benefits you can derive from cloud-powered technologies, just give us a call.

2016Mar11_Office365_BMore and more small and medium-sized businesses are making the switch from on-premises SharePoint systems to cloud-hosted Office 365. If you’re one of them, it’s vital to ensure that you put in place adequate protection to counter the security challenges that come with the migration. While many businesses contemplating switching find themselves concerned about the potential for undesirable elements to breach the cloud-based security of Office 365 itself, the robust safeguards Microsoft has in place mean localized issues are far more likely to prove to be your network’s weak point. These essential steps will help ensure your transition from SharePoint to Office 365 is a smooth and secure one.

Identify your company’s sensitive data…

It’s so easy to create sites within SharePoint that businesses often have far more than they realize, covering just about every aspect of their operations. And it’s natural, of course, for at least some of the files housed within those sites to contain sensitive commercial or personal data. The key is ensuring that sensitive information is adequately identified and protected. Do this by conducting a security audit before you undertake your migration.

Your audit should identify the types of data stored in the various parts of your SharePoint network, including which specific information needs extra safeguarding. Be sure to consider everything from trade secrets and contract details to the personal information of your clients.

…and then restrict access to it

Once you’ve worked out where your most precious data lies, you can check who currently has access to it and whether their access is appropriate. After all, it’s not necessary for everyone to be able to get at all the data your company owns; it’s far better to operate on a need-to-know basis, with a reasonable level of flexibility.

Ensure that each of your employees has access only to the data that’s necessary for them to perform their duties. When you make the switch to Office 365, you’ll find that it allows you to conveniently set these different levels of permissions, including for external partners with whom you collaborate.

Trust nobody and suspect everybody

We say that lightheartedly, of course – it would be counterproductive to become so security-paranoid as to suspect everyone is attempting foul play with your company’s data. Nonetheless, it’s wise to consider everyone in your organization when it comes to auditing data access permissions – and that includes system administrators who might be assumed to have master access to every element of your network infrastructure.

A rogue administrator is the stuff of nightmares, since their elevated position gives them much greater leeway to siphon off valuable data without being noticed – or even to allow others to conduct questionable business and bypass the usual built-in security precautions. Overcoming the danger of an all-too-powerful administrator admittedly becomes easier if you have more than one on staff, but even in smaller businesses you can mediate some of the risk by regularly checking on your administrator’s usage and ensuring that their top-level system permissions remain justifiable.

Use machine learning to foresee security breaches

Every action performed by your staff within Office 365 is automatically logged, and with relative ease you can pull reports that allow you to analyze these. But the sheer number of events taking place within Office 365 in the course of your business’s normal operations means that even attempting to identify questionable behavior will be akin to the proverbial needle and haystack. That’s not to say it’s unwise to be on the lookout for anomalies in normal usage – the export of unexplainably large volumes of data, for instance, could suggest that a member of your team is leaking intelligence to a competitor, or that they’re about to jump ship and take your trade secrets with them.

Thankfully, it’s possible to leverage the developing power of machine learning to identify potential breaches before they happen – without the need to wade through unmanageable swathes of perfectly normal data. Graph API is incorporated into Office 365, and allows for the integration of machine learning tools into your security environment to achieve just that. The same tools can also help you avoid being caught out by hackers, by identifying system login attempts from locations that are out of the ordinary; you should bolster this protection by religiously removing inactive accounts and those of departing employees.

By covering these essential security considerations when it comes to your migration, you’ll be one step closer to ensuring you strike the right balance between the powerful collaborative features of Office 365 and the robust safeguards your business’s integrity demands. To find out more about how we can help your Office 365 migration run smoothly, or what other business benefits you can derive from cloud-powered technologies, just give us a call.

2016Mar11_Office365_CThe decision to migrate from an on-site SharePoint system to a cloud-based Office 365 solution isn’t one that most small or medium-sized businesses take lightly. In fact, though the popularity of Office 365 and other cloud-hosted platforms continues to soar, plenty of companies still have legacy SharePoint systems in place for at least part of their operations. But even once you’ve made your mind up that a move is worthwhile, there are plenty of practicalities to consider – not least how you’ll ensure the transition doesn’t expose your network to security vulnerabilities. By covering these essentials, you’ll minimize the chance of security breaches and ensure you can get down to enjoying the benefits of Office 365.

Identify your company’s sensitive data…

It’s so easy to create sites within SharePoint that businesses often have far more than they realize, covering just about every aspect of their operations. And it’s natural, of course, for at least some of the files housed within those sites to contain sensitive commercial or personal data. The key is ensuring that sensitive information is adequately identified and protected. Do this by conducting a security audit before you undertake your migration.

Your audit should identify the types of data stored in the various parts of your SharePoint network, including which specific information needs extra safeguarding. Be sure to consider everything from trade secrets and contract details to the personal information of your clients.

…and then restrict access to it

Once you’ve worked out where your most precious data lies, you can check who currently has access to it and whether their access is appropriate. After all, it’s not necessary for everyone to be able to get at all the data your company owns; it’s far better to operate on a need-to-know basis, with a reasonable level of flexibility.

Ensure that each of your employees has access only to the data that’s necessary for them to perform their duties. When you make the switch to Office 365, you’ll find that it allows you to conveniently set these different levels of permissions, including for external partners with whom you collaborate.

Trust nobody and suspect everybody

We say that lightheartedly, of course – it would be counterproductive to become so security-paranoid as to suspect everyone is attempting foul play with your company’s data. Nonetheless, it’s wise to consider everyone in your organization when it comes to auditing data access permissions – and that includes system administrators who might be assumed to have master access to every element of your network infrastructure.

A rogue administrator is the stuff of nightmares, since their elevated position gives them much greater leeway to siphon off valuable data without being noticed – or even to allow others to conduct questionable business and bypass the usual built-in security precautions. Overcoming the danger of an all-too-powerful administrator admittedly becomes easier if you have more than one on staff, but even in smaller businesses you can mediate some of the risk by regularly checking on your administrator’s usage and ensuring that their top-level system permissions remain justifiable.

Use machine learning to foresee security breaches

Every action performed by your staff within Office 365 is automatically logged, and with relative ease you can pull reports that allow you to analyze these. But the sheer number of events taking place within Office 365 in the course of your business’s normal operations means that even attempting to identify questionable behavior will be akin to the proverbial needle and haystack. That’s not to say it’s unwise to be on the lookout for anomalies in normal usage – the export of unexplainably large volumes of data, for instance, could suggest that a member of your team is leaking intelligence to a competitor, or that they’re about to jump ship and take your trade secrets with them.

Thankfully, it’s possible to leverage the developing power of machine learning to identify potential breaches before they happen – without the need to wade through unmanageable swathes of perfectly normal data. Graph API is incorporated into Office 365, and allows for the integration of machine learning tools into your security environment to achieve just that. The same tools can also help you avoid being caught out by hackers, by identifying system login attempts from locations that are out of the ordinary; you should bolster this protection by religiously removing inactive accounts and those of departing employees.

By covering these essential security considerations when it comes to your migration, you’ll be one step closer to ensuring you strike the right balance between the powerful collaborative features of Office 365 and the robust safeguards your business’s integrity demands. To find out more about how we can help your Office 365 migration run smoothly, or what other business benefits you can derive from cloud-powered technologies, just give us a call.

2016Mar8_Web&Cloud_CCloud computing has proven to be a cost-effective necessity for small businesses. Owners can now breathe a sigh of relief as website hosting, email services implementation and online file storage have become easier thanks to the cloud. However, there are still many owners who remain misinformed about installing a cloud infrastructure at their company. Here are some common misconceptions you should understand about the cloud.

Cloud infrastructures are unsecure

Security is a necessity for online users. And the most prevalent misconception about the cloud is the idea that cloud services lack appropriate security measures to keep data safe from intruders. Most users also think that the data stored in the cloud can be easily accessed by anyone, anywhere and at anytime.

But the truth is it’s actually a good idea for small businesses to use cloud services. Small companies usually can’t afford to hire an IT department let alone train them to deal with online security threats. Cloud providers, on the other hand, offer services such as layered security and antivirus protection that not only specialize in keeping infrastructures safe from hackers but are available at a price that is much lower than you would pay for in-house IT staff.

Additionally, large cloud-based services such as Google Apps for Work and Office 365 are supported by an infrastructure that constantly installs, updates and patches, which helps manage security breaches. This significantly frees you from the burden of having to install the updates yourself and managing the overall security of your system.

Users should understand that no company is completely safe from security threats regardless of their IT infrastructure. But data is likely to be more secure in the hands of cloud providers as they are the most prepared and qualified to protect your digital property.

Encryption

There is a misunderstanding about the role of encryption or rather how it is implemented to keep your data safe. Encryption is usually used for data in transition, where data is protected from anyone seeing it as it travels from one location to another on the Internet. But encryption can also be applied to data at rest, where data is encrypted on a storage drive.

While cloud service providers already keep their physical storage drive well protected, some keep the decryption key held in software, potentially leaving the key vulnerable to intruders. If hackers were to successfully obtain the decryption key, they can simply access your encrypted data. That’s why some cloud storage services are much better than others in terms of keeping your data protected.

With this in mind, you should understand that while every cloud service highlights their data security by demonstrating their encryption abilities, it does not necessarily mean that a cloud-based service that markets itself as such is right for you. When it comes to choosing the right cloud service, it is best to inform yourself about the security measures that a cloud infrastructure implements and look at how it can protect your company’s digital property.

With the cloud you are no longer responsible for data security

While cloud security is important, the responsibility for protecting data ultimately rests on the user. Misplacing mobile devices can leave your data vulnerable and make the cloud infrastructure insecure. It is also recommended to have verification mechanisms in place for devices that are used to access the cloud.

Losing USBs or external hard drives obviously leads to direct data loss and can be easily remedied by backing up your files. This applies to files stored in the cloud as well. So be smart, and backup your files because it’s better to be safe than sorry.

The cloud is never faulty

Like many online services, cloud-based services are not immune to technical difficulties. For example, some cloud businesses have suffered outages and server failures which corrupted files and may have lost data in the process.

Hacking is another reason why some cloud services fail. Using a less than optimal cloud service that is vulnerable to attacks can lead to stolen or deleted data, which would be near impossible to recover if you did not have any offline backups.

Regardless of these flaws, however, it is vital to note that using the cloud as your only source of data storage and processing can lead to problems in the future. Keeping backups of your files is always a good idea.

Security is truly one of the biggest barriers to the adoption of cloud computing in a small business. But as cloud services expand and encryption technologies advance, cloud adoption is increasingly becoming the most cost-effective solution to meet the small business owner’s IT demands. Contact us today to learn how your business can take advantage of all the cloud has to offer.

2016Mar8_Web&Cloud_BSetting up an IT infrastructure for a small business can be an intimidating and costly venture. Fortunately, cloud computing has given companies affordable and flexible solutions to deal with rapidly advancing technological demands. However, for the small business owner, there are still many common misunderstandings about using cloud services. Here are a few ways some businesses may misconceive the nature of the cloud.

Cloud infrastructures are unsecure

Security is a necessity for online users. And the most prevalent misconception about the cloud is the idea that cloud services lack appropriate security measures to keep data safe from intruders. Most users also think that the data stored in the cloud can be easily accessed by anyone, anywhere and at anytime.

But the truth is it’s actually a good idea for small businesses to use cloud services. Small companies usually can’t afford to hire an IT department let alone train them to deal with online security threats. Cloud providers, on the other hand, offer services such as layered security and antivirus protection that not only specialize in keeping infrastructures safe from hackers but are available at a price that is much lower than you would pay for in-house IT staff.

Additionally, large cloud-based services such as Google Apps for Work and Office 365 are supported by an infrastructure that constantly installs, updates and patches, which helps manage security breaches. This significantly frees you from the burden of having to install the updates yourself and managing the overall security of your system.

Users should understand that no company is completely safe from security threats regardless of their IT infrastructure. But data is likely to be more secure in the hands of cloud providers as they are the most prepared and qualified to protect your digital property.

Encryption

There is a misunderstanding about the role of encryption or rather how it is implemented to keep your data safe. Encryption is usually used for data in transition, where data is protected from anyone seeing it as it travels from one location to another on the Internet. But encryption can also be applied to data at rest, where data is encrypted on a storage drive.

While cloud service providers already keep their physical storage drive well protected, some keep the decryption key held in software, potentially leaving the key vulnerable to intruders. If hackers were to successfully obtain the decryption key, they can simply access your encrypted data. That’s why some cloud storage services are much better than others in terms of keeping your data protected.

With this in mind, you should understand that while every cloud service highlights their data security by demonstrating their encryption abilities, it does not necessarily mean that a cloud-based service that markets itself as such is right for you. When it comes to choosing the right cloud service, it is best to inform yourself about the security measures that a cloud infrastructure implements and look at how it can protect your company’s digital property.

With the cloud you are no longer responsible for data security

While cloud security is important, the responsibility for protecting data ultimately rests on the user. Misplacing mobile devices can leave your data vulnerable and make the cloud infrastructure insecure. It is also recommended to have verification mechanisms in place for devices that are used to access the cloud.

Losing USBs or external hard drives obviously leads to direct data loss and can be easily remedied by backing up your files. This applies to files stored in the cloud as well. So be smart, and backup your files because it’s better to be safe than sorry.

The cloud is never faulty

Like many online services, cloud-based services are not immune to technical difficulties. For example, some cloud businesses have suffered outages and server failures which corrupted files and may have lost data in the process.

Hacking is another reason why some cloud services fail. Using a less than optimal cloud service that is vulnerable to attacks can lead to stolen or deleted data, which would be near impossible to recover if you did not have any offline backups.

Regardless of these flaws, however, it is vital to note that using the cloud as your only source of data storage and processing can lead to problems in the future. Keeping backups of your files is always a good idea.

Security is truly one of the biggest barriers to the adoption of cloud computing in a small business. But as cloud services expand and encryption technologies advance, cloud adoption is increasingly becoming the most cost-effective solution to meet the small business owner’s IT demands. Contact us today to learn how your business can take advantage of all the cloud has to offer.

2016Mar8_Web&Cloud_AFrom hosting websites, email, applications and online file storage, the cloud has become a popular alternative to traditional IT services among businesses. In fact, it is almost impossible to find a company’s data center that does not employ cloud-based services of some kind. However, reported incidents of cloud hacks and server failures can lead some small business owners to be wary of a service that still has much confusion surrounding it. So what are these common misconceptions about implementing cloud computing into a business? Here are a few myths people believe about the cloud.

Cloud infrastructures are unsecure

Security is a necessity for online users. And the most prevalent misconception about the cloud is the idea that cloud services lack appropriate security measures to keep data safe from intruders. Most users also think that the data stored in the cloud can be easily accessed by anyone, anywhere and at anytime.

But the truth is it’s actually a good idea for small businesses to use cloud services. Small companies usually can’t afford to hire an IT department let alone train them to deal with online security threats. Cloud providers, on the other hand, offer services such as layered security and antivirus protection that not only specialize in keeping infrastructures safe from hackers but are available at a price that is much lower than you would pay for in-house IT staff.

Additionally, large cloud-based services such as Google Apps for Work and Office 365 are supported by an infrastructure that constantly installs, updates and patches, which helps manage security breaches. This significantly frees you from the burden of having to install the updates yourself and managing the overall security of your system.

Users should understand that no company is completely safe from security threats regardless of their IT infrastructure. But data is likely to be more secure in the hands of cloud providers as they are the most prepared and qualified to protect your digital property.

Encryption

There is a misunderstanding about the role of encryption or rather how it is implemented to keep your data safe. Encryption is usually used for data in transition, where data is protected from anyone seeing it as it travels from one location to another on the Internet. But encryption can also be applied to data at rest, where data is encrypted on a storage drive.

While cloud service providers already keep their physical storage drive well protected, some keep the decryption key held in software, potentially leaving the key vulnerable to intruders. If hackers were to successfully obtain the decryption key, they can simply access your encrypted data. That’s why some cloud storage services are much better than others in terms of keeping your data protected.

With this in mind, you should understand that while every cloud service highlights their data security by demonstrating their encryption abilities, it does not necessarily mean that a cloud-based service that markets itself as such is right for you. When it comes to choosing the right cloud service, it is best to inform yourself about the security measures that a cloud infrastructure implements and look at how it can protect your company’s digital property.

With the cloud you are no longer responsible for data security

While cloud security is important, the responsibility for protecting data ultimately rests on the user. Misplacing mobile devices can leave your data vulnerable and make the cloud infrastructure insecure. It is also recommended to have verification mechanisms in place for devices that are used to access the cloud.

Losing USBs or external hard drives obviously leads to direct data loss and can be easily remedied by backing up your files. This applies to files stored in the cloud as well. So be smart, and backup your files because it’s better to be safe than sorry.

The cloud is never faulty

Like many online services, cloud-based services are not immune to technical difficulties. For example, some cloud businesses have suffered outages and server failures which corrupted files and may have lost data in the process.

Hacking is another reason why some cloud services fail. Using a less than optimal cloud service that is vulnerable to attacks can lead to stolen or deleted data, which would be near impossible to recover if you did not have any offline backups.

Regardless of these flaws, however, it is vital to note that using the cloud as your only source of data storage and processing can lead to problems in the future. Keeping backups of your files is always a good idea.

Security is truly one of the biggest barriers to the adoption of cloud computing in a small business. But as cloud services expand and encryption technologies advance, cloud adoption is increasingly becoming the most cost-effective solution to meet the small business owner’s IT demands. Contact us today to learn how your business can take advantage of all the cloud has to offer.