Blog - Page 9 of 13 - DNA IT Solutions

GDPR – Your Challenge, Our Solution

GDPR challenge DNA IT Solutions

With the introduction of GDPR comes a whole new set of challenges that all businesses must face.

Data protection has always been high on the list of priorities for our clients but is now more critical than ever.  With such a variety of clients in many sectors, we must offer a range of solutions that work together to provide the ultimate protection.

Our experience has shown us that we can break down the requirements for data protection into three main sectors – People, Processes and Proper Tools.

Data Protection & People

Your employees can be the most important asset but they can also be a threat to the security of your information.   The majority of data breaches are unintentional but can still cause a lot of serious issues for the organisation.   Lost laptops, files left on trains, files shared by mistake – all human error but unfortunately all too common.

To safe guard against these data losses there are solutions that can be employed to secure data.  The first is file sharing in secure ways using information that is encrypted.  This allows the freedom needed to share projects yet strong control.  With remote working it is important to employ methods to protect mobile devices and manage devices effectively.  In addition, CRM systems that can run in the cloud are secure and accessible to authorised users.

 

Data Protection & Processes

Having the correct procedures and processes in place will prevent privilege misuse.  Insider threats can be avoided by setting user access levels and having credential authentication ensuring only the right people can access information.  User training is vital when it comes to issues such as cyber security and email phishing.  Monitoring web use can be a useful method of preventing malware and ransomware issues.  Procedures can be put in place by your IT team that will encompass all these methods of protecting company data.  All the while ensuring your processes are compliant with GDPR requirements and allow your team to work effectively.

Data Protection & Proper Tools

Once you have looked at the people and processes element you must then enable them with the proper tools to do the job.  There is not only one solution, protection involves different layers depending on your business.  Detection and prevention work hand in hand to offer protection at all points.  World class antivirus and security software can be employed with hardware you can trust.   Email systems that are tamper proof, allow secure archiving and less chance of phishing will protect your business against attack.

Having an expert team providing you with a security solution to suit your needs, world leading technology and full support will help prevent data breaches and keep your information secure.

The Full Data Protection Picture

When it comes to protecting your business data you need a full solution.  Disaster Recovery planning should be on your agenda to ensure business continuity should the worst happen.  Planning and testing against data loss and suitable backup strategies are vital.  Cloud options that are trustworthy and the provision of dedicated private space where needed are all considerations.

DNA IT Solutions work hard to keep client’s data secure in order to help them to be compliant in GDPR.   We work with expert GDPR consultants to provide a robust solution for organisations of all sizes.  For more information on options for your business get in contact with us today.

 

Why use a managed IT Service provider?

why use managed IT service provider DNA IT

When you make the decision to use a managed IT Service provider what you are actually doing is taking all your IT operations and putting them in the hands of an expert team to look after.

They are now responsible for ensuring that your IT systems are not only fit for purpose but are there for your business 24 hours a day.  They will monitor, manage and resolve any issue relating to the IT system and ensure you can get on with your business.

Reliance on IT

Many years ago when the reliance on IT was not the way it is now, it was sufficient to have a guy you could call when things went wrong.  He would hop into his van and drive to your office and fix your computer.  You may have had to wait a day or two for this, but hey, back in the day that was just the way it was.

As the years went on, it became a more complex situation as business came to be more reliant on technology.  This is when the IT professional started to be more pro-active by reviewing systems and trying to figure out what issues might occur and try to prevent them.

Benefits of IT Managed Service Provider (MSP)

Your MSP will know what new hardware, improved software, new technologies and better options for your business are available.  They will know what new security threats may be around and how to protect your data.  They will know your system, they will watch out for any issues or risk and address it before it becomes a problem.

As a smaller business you will now be able to access enterprise level technologies and support when working with the right partner.  Technologies that were only reserved for global brands not so long ago will be within your grasp.

Modern Enterprise

Every business needs technology and suitable IT systems to operate in the modern business world.  Reliance on IT is something that increases each day and if a smaller business does not keep up it will be passed by.  It is a complex area, you don’t have the time or the expertise to manage it and your time is too precious to be spent trying to fix an issue.

If your email goes down, if you lose data, all that downtime has a cost both financially and damage to your brand.   Can you afford the expense of not having a trusted IT partner today?

Put in simple terms – one of the biggest benefits of managed IT services is discovering and fixing problems before they can negatively affect your business.  If your systems are well maintained they will perform better, you will see less issues and have the benefit of increased performance in all aspects of your business.

If you are looking for enterprise level IT support at a cost effective price, then DNA IT Solutions may be the partner for you.  We manage all aspects of your IT, being a one stop shop for IT security, hardware, software, printers, cloud storage and much more.

How Autotask can help generate revenue for your business

Generate revenue with Autotask DNA IT

You might be aware of Autotask as a file sharing platform, however, it is so much more than that.

Autotask has grown to become a valuable business tool that is streamlining business processes.  Its vision of unifying people, processes and data is driving growth for many businesses across the globe today.

Autotask PSA

Autotask professional services automation (PSA) is a complete solution offering unlimited opportunity to organisations.   This IT business management platform allows you have everything at your fingertips to manage your critical business functions.

The CRM (Customer Relationship Management) capabilities allow you to capture every interaction with all of your customers.  Every phone call, meeting and email will be recorded so a full record is available when you need it.   A great tool for pricing, it will record all the time spent on a project and convert that to a cost, plus include any additional expense incurred.

Project management becomes easier as timesheets can be integrated within the system.   By adding the expense information from the finance department, it will create an accurate picture of all ongoing and completed projects.  You will have more success getting paid earlier and on time as they will be less disputes on billing.  Any queries will be handled quicker as all information will be there on screen.  It is simple to approve all amounts and post the invoice and we know that greater invoice detail will keep the customer happy too.

 

Customised Platform

The Autotask platform is customisable for your needs and the way you like to work.  You can create a custom company dashboard with your preferences by choosing from built in features.    We know that better systems make better business.   Efficiencies are gained by automating simple tasks and freeing up time for valuable team members.  Another bonus is that customers are happier as their account is managed better.  Happy customers and happy staff equal business success.

Somebody once claimed that information was power.  Autotask customised reports will give you the whole picture that will help you make better business decisions.    Customer service levels will be higher because you know more about your customer and their projects.  Plus, you will be better able to see opportunities and room for improvement, allowing you to create a vision for the future.

All this in one place, easy to use and available to you from Autotask.  For more information on Autotask professional services automation and how it may fit into your business please contact DNA IT Solutions today.

 

Layers of security

Layers of Security DNA IT

Security Alerts

With each passing month there seems to be another story of a company who got hacked, some piece of ransomware that is making the rounds or even news of a colleague whose laptop got infected by a virus.  When you are busy with your business the last thing you should be concerned about is Cyber Security but unfortunately it has become a significant risk.

More places to attack

With IT being the heartbeat of most businesses today, there are more devices and technologies in use than ever.  Even the smallest of offices will have a PC and a laptop.  Add to that the smart phones and tablets that most people seem to use and before long the numbers start to add up.  As we move to the cloud we then concern ourselves with cloud security, network security and sharing information that is not encrypted.

More advanced methods

Cyber-attacks can be lucrative business for hackers and now they are becoming more co-ordinated.  With the ease of communication globally they can be arranged quite easily.  Recent attacks that have been investigated have been found to have been very well thought out and planned well in advance.

Did you know that you can now purchase a kit online that is ready for use and can enable somebody with even basic IT skills to launch an attack?  That means more attackers and an increase in the number of attacks each day.  Sophisticated technology means one keyboard warrior can launch an all-out battle against a victim of choice.

Layers of Security

However, all is not lost so there is no need to give up hope just yet.  As the bad guys get more sophisticated so do the world leaders in IT security.   It is important to know that there is not one single solution that will protect you against everything, rather it will be the layers of security working together that will provide the best protection.

These layers work like a team – they are more effective when all working together and covering all the bases.

  • Proactive – Keeping a watch out for attacks
  • Detection – Knowing and identifying the attack
  • Preventing – Stopping it before it damages
  • Investigating – Checking it out to shield from future attacks
  • Protecting – Protecting your data and your business interests.

In today’s world an organisation needs to look to the protection of the whole business environment.  Having a single centrally managed security approach by amalgamating many vendors will ensure solutions that work together.  Offering consistent protection that helps to provide better security is the key.

At DNA IT Solutions we work with world leading IT Security technologies to provide the best protection for our clients.  Everything from anti-virus software, anti-ransomware methods, secure email systems, mobile protection, perimeter and gate protection.  We also specialise in data loss prevention and end user training for a complete offering.   If you are concerned about the level of protection you have in your organisation maybe it is time to speak with the expert team at DNA IT Solutions.

Cloud Computing for the SME

Cloud computing for SME DNA IT

Many businesses today began at the kitchen table as a start-up then grew to having its first employee.  Before long these small enterprises were looking at office space and within a couple of years had grown to a team with a great future ahead.

No matter what stage your business is at we are pretty sure that you rely on IT each and every day to help you run your business.  As your business grows so does your reliance on IT and what you expect from it.

How can Cloud be a benefit?

Traditionally your IT infrastructure would be housed within your own premises, however, as you develop your IT needs become more complex.  You may decide you want to free yourself from the traditional IT that is holding you back and make the move to Cloud services.

What is cloud computing?

Cloud computing is using the internet to enable on demand network access to computing resources such as storage, applications, networks and more.  Smaller businesses might have a server room that serves a purpose for several years. However, when businesses start to grow they also outgrow this form of on-premises reliance and start to consider a move to the cloud.

Types of Cloud

Every business is unique and their needs will differ and that is why there are several options to consider.

Public Cloud – This is a cloud infrastructure made available to the public.  Microsoft Azure is an example of a cloud provider popular with Irish businesses.  Trust and reliability comes with the Microsoft name and an understanding of the flexibility and scalability that businesses need is assured.  Secure and reliable, this is quite often the perfect choice for the SME.

Private Cloud – While the public cloud may be the perfect fit for most customers, sometimes dedicated storage space is needed and that is when private cloud becomes an option.  IBM Cloud is enterprise level dedicated private cloud for situations where needs are more complex.

Hybrid Cloud – As in many industries, sometimes a one size fits all is not the answer and that is where hybrid cloud comes in.  Depending on customer needs a solution which is a mix of on premise and cloud is the best option.  Every combination will be different but a bespoke solution can always be found.

The move to the cloud can seem daunting for most business owners but it’s only fear of the unknown.  Once you have an IT partner you can trust, they will advise and guide you to pick the right solution for your business.  At DNA IT Solutions we help businesses like yours transition to the cloud every day of the week.  With a promise of less hassle and as little downtime as possible we can help move your business to the cloud.  Leaving you to concentrate on developing your business for the future.

The Top 5 Benefits of Managed IT Services

Top 5 Benefits of managed IT DNA IT

One valuable piece of advice that is given to business owners when they start out on their journey is to stick to what they are good at and outsource all the other tasks.

It’s great advice when it comes to accounts, human resources and various administration tasks.  It’s even better advice when it comes to outsourcing the management of the IT systems.   Most businesses rely on their IT infrastructure to function every day and the cost of having a system that fails can be immense.

So when it comes to outsourcing what are the main benefits?

  1. Access to Enterprise Level Technology

The right managed service provider will have a suite of products and services available to their clients.  They will already know what you will need and the best options for your industry requirements.  As a small business you can gain access to the newest technologies and the best support that normally only the bigger global companies can get.

  1. Less downtime

Downtime costs you money – every time!  When your IT systems are fit for purpose, monitored 24 hours a day and upgraded as required you will have less issues.  Your managed service provider will be proactive and address any risks  before they develop into an issue.  You can’t work when your email or order system is down so don’t leave yourself wide open to that eventuality.

  1. Reduced costs

What’s the real cost of downtime, of your time trying to fix an issue?  Much less than having that issue not happen in the first place.  With managed services you will have a fixed monthly fee so you can plan for the future within whatever budget you set.  When it comes to cloud services you will only be paying for what you need.

  1. Increased opportunities

The right technologies will allow your business to grow.  You will be better able to access new markets, to handle bigger clients and busier workloads.  You need systems that are robust and built to last.   And when it comes to growth you will be already planning for the future with your provider to create a manageable plan and budget.

  1. Peace of mind

The biggest benefit of working with a IT solutions provider you trust is not worrying about your IT letting you down. Knowing that somebody is monitoring your systems 24/7/365.  Meaning that you can focus on your business and not what the technology is doing.

 

Put a plan in place for the future and grow with confidence.  DNA IT Solutions work with clients just like you to be proactive in protecting their data, enabling them to access the best systems and plan for the future.  Talk to our team today about cost effective enterprise level IT support.

Do Your Senior Management Know How to Spot a Phishing Attack?

Fusemail Phishing attack DNA IT Solutions

The rise of spear phishing attacks means we have to learn to be suspicious.

Spear phishing attacks are on the rise and therefore so are the number of victims of successful attacks. In order to protect your organisation from threats like this you need to have a multifaceted approach to email security.

Your Staff are the Key

You may have invested in the best technology to prevent or mitigate a phishing attack but equally important to your defence is your staff and that aspect can be difficult to control. It takes just one person to open a phishing email or click on a malicious link to put your entire network and company at risk.

Senior management, decision makers, and people with access to transfer finances are the most likely to be targeted by phishing attacks.  FuseMail, the email security experts, have developed leading email security technology to identify and prevent phishing and spear phishing attacks in the cloud, before they reach your network.

Spear Phishing

Phishing is described as any website, online service, phone call, text message or email that poses as a company or brand you recognise. Attacks are generally undertaken on a large scale – a big net is cast to try to catch as many victims as possible.

Spear phishing is similar to phishing but is undertaken on a more targeted level. The spear phishers target specific individuals using social media, telephone calls and in some cases the hacking of accounts in order to get more detailed information about their potential victims. They invest time and effort to get as much information as possible about their target and then use that to make their requests appear very authentic.

Both types are designed to convince you or your team to hand over valuable organisational details, money, or trick you into downloading something that infects your computer and corporate IT network. The impostors phish for potential victims by sending emails, social media messages or text messages or making phone calls with urgent messages in the hope of persuading someone to visit the bogus website or pay out sums of money.

Why do they do it?

They do it because it works.  One in four companies reported a cyber breach in the last 12 months.   According to research compiled by the University of Portsmouth for the 2016 Annual Fraud Indicator report, fraud is taking place on an industrial scale and is one of the biggest crimes afflicting UK PLCs today.

It just takes a single click.

You may have invested in the best technology to prevent or mitigate a phishing attack but the mainstay of your defence is your staff and that can be difficult to control. It takes just one person believing a phishing email or clicking on a malicious link to put your entire network and company at risk.

Staff knowledge and awareness is the balance between success and failure

By arming your staff with the knowledge to identify phishing scams you will benefit from money and time savings, a clean reputation and an improved staff mood. In fact, being able to detect a potential malicious email and act promptly makes your staff feel important, empowered and active in the fight against cyber-crime.

Adopting a user awareness programme combined with traditional anti-malware enhances your anti-phishing capabilities, by understanding that employees can serve as a valuable active defence layer inside the organisation.

FuseMail allow you to connect with confidence everywhere and every way.  For more information on FuseMail you can speak with the expert team at DNA IT Solutions.

The Right Security Solution for Mobile Workers

right solution for mobile workers DNA IT

In a previous article we looked at how the modern enterprise meant that workers were now used to working remotely and using mobile technology to enable them to do so.

Using smartphones, laptops and tablets as part of their day to day activities and moving from one to the other with ease.   While this remote working may make life easier for your team, it also leaves them open to high risks.

In that article we looked at the 3 steps needed – 1.Protect users and devices  2.  Protect the Enterprise Network  and 3.  Protect Corporate Data  You can read all about securing mobile part 1 here

What Else is Needed? 

By protecting users and devices, our network and our data, we complete the three key steps outlined already. However, if the solution or solutions we use are typical, they will be complex, piecemeal and not very user friendly.  In order enable the safe path to mobile productivity, organisations need to not only take the 3 steps outlined above, but the solutions they adopt must be comprehensive, simple to deploy and manage and end-user ready. When selecting a solution to protect your users, networks and data, consider the following:

Comprehensive, Simple, End-User Ready!

1) Is the solution comprehensive and integrated? Does it offer all of the critical protections outlined in this paper, or does it leave significant gaps in protection. If it is comprehensive, do all of the parts work as one, or is it a set of individual piece parts that require additional resources?

2) Is the solution simple for you? Is it easy to license, acquire, deploy and manage?  Can you easily measure the effectiveness and compliance delivered by the solution?  Does the solution have a single administrative, reporting and deployment capability?  Are the management processes simple, straight-forward and easy to learn?

3) Is it end-user ready? Can you tailor the solution to meet the needs of your users? Does the solution respect user privacy while still meeting corporate objectives? Does the solution empower users to manage their own issues such as password reset

Mobile use and mobile risk is on the rise.

Employees are no more likely to give up their smartphones and mobile devices and tether themselves back to their desktops than they are to give up streaming music and go back to LPs. Cyber criminals are well aware of these trends. Organisations cannot ignore mobile risk. They must protect their users, devices, networks and data. In order to do this effectively, they need comprehensive solutions that are simple to deploy and manage. And most importantly solutions that are end-user friendly. Only then can organizations reap the productivity benefits of using mobile devices while protecting themselves against the risk.

Sophos Mobile

Sophos Mobile is the EMM solution for businesses that want to spend less time and effort to manage and secure mobile devices. Manage mobile devices with the easy-to-use, web-based, unified Sophos Central admin interface alongside endpoint, network, or server security from Sophos. With its best-in-class data protection, comprehensive security, value-for-money, and flexible management options, Sophos Mobile is the best way to allow the use of mobile devices for work, keeping users productive, business data safe and personal data private.

For more information about incorporating Sophos Mobile into your security solution contact the DNA IT Solutions team.   We work with Sophos tools to help keep our clients protected.

 

 

How to Choose a Cloud Provider

How to choose a cloud provider DNA IT

You have made the decision to swap your old server for a move to the cloud and embrace the modern world of cloud computing. You have an idea of the benefits but where should you start?

You need to understand the features of your cloud provider, and make sure that it is suited to your business needs keeping in mind reliability, storage limits, privacy and security.

Finances

One of the top reasons to move to the cloud is for financial reasons as it is normally more cost effective.  You need to pick a provider that is established and secure in their own finances to make sure they won’t let you down in the long term. Look at their track record, especially how they have operated over a long time.  A provider such as Microsoft Azure would be a perfect example of a company you could have confidence in.

Risk

The cloud provider should have a formal management structure in place with strong risk management policies and procedures. There should be a clear train of responsibility in order to provide you with the great and consistent service that your business needs. Find out about their risk management and how they would manage a drama or a slip-up if one occurs in the future so you know what to expect if something happens.

Reporting

A managed IT service provider can be your way of knowing your data is secure. They will be the ones managing your cloud storage and should be able to give you regular reports on your performance, along with modern monitoring of the resource to make sure your cloud is working well for you.  Additionally, they should be able to provide an SLA, a set amount of time they have to get back to you on any queries or problems that you may encounter.

Technical processes

How easy will the transition be? Can you link it with your existing systems to make the cloud transition simple and easy? These are all things to think about, along with what the interface will look like and how you can use it, how you add events and manage them, along with how you can adapt it to your needs as these change over time.

You need to be aware of hybrid capabilities, as even if you don’t need this right away, you may want to upgrade in the future so you need to know your provider can get that for you.  This will all be part of the planning and exploration stage with your managed IT provider.

Security

There should be policies for tested and tried security measures for your cloud platform. These should be visible to everyone and should in no way be compromised – it is your company’s data and that is why it is most important.

Along with a data backup there should be physical security evident too, from access to hardware and safeguards around the software to protect your equipment and your data from any events that may affect this. Ensure you have a disaster recovery plan along with a business continuity plan, so that even if something does happen, you can rest assured in the knowledge that your company is safe.

When you have made a decision to move to the cloud make sure you are well informed.  A conversation with DNA IT Solutions could save you time, hassle and money in the long run.  Contact our team today to see what we can do for you.

Securing Your Mobile Workforce

Securing mobile work force DNA IT

In the modern enterprise era every business is now mobile.

We are all staying connected to work with mobile phones, tablets and laptops.  Employees are also using personal devices to access corporate data and this can put their organisation at risk when passwords or devices are lost.

Cyber criminals know this is happening and they are trying to benefit from these trends by introducing more sophisticated ways to use mobile malware to cause as much damage as possible.

These threats need to be managed while at the same time allowing users to benefit from this new mobile technology that makes the working day easier.  Sophos looked at how a business can provide flexibility but also protect its networks and corporate data.  Here they share their 3 key steps to successfully secure your mobile workforce:

Three Steps to Managing Today’s Mobile Risk

The task of Enterprise Mobile security really boils down to three basic needs: Protecting the user and device; protecting the access to enterprise’s network; and protecting an enterprise’s data.  And of course, most importantly, we need an easy to use solution that lets us accomplish our goals with available resources.

Step 1 – Protect users and devices

As we have seen, today’s mobile user depends on their smartphone for organising both their work and personal life. The division between work and personal identity is blurry.  Therefore, organisations must step up and fill gaps where users and their constantly on, constantly on the move and ever more powerful devices leave the organisation vulnerable. Protecting users and devices means:

  • Implementing good password policy.
  • Ensuring that users take advantage of native lost device and wipe device features.
  • Providing Self Help tools for users to reset their own passwords and reduce the burden on IT.
  • Assuring that effective and current anti-malware software is installed and active on all devices (especially Android). Protecting users and their devices is the first key step to securing our mobile workforce.

 

Step 2 – Protect the Enterprise Network

Mobility and mobile devices go hand in hand with Wi-Fi access to both corporate and public networks. Managing these connections and the data that flows over them is critical to managing mobile security risk. This requires good network AND device security is in place. Protecting the network requires.

  • Establishing and enforce Wi-Fi network access policy.
  • Restricting access to the network to compliant users and devices.
  • Restricting unwanted or risky applications from accessing the network.
  • Securing access to frequently used and approved mobile applications and websites through the use of a corporate browser solution.
  • Protecting the network provides a second layer of defense in our 3-step strategy.

Step 3 – Protect Corporate Data

Once we have protected our devices and networks, the next step is to protect critical corporate data.  Data moving to and from mobile devices, as well as data on the devices themselves, creates risk that must be managed.  A lot of valuable data passes through our mobile devices when we engage in email and other collaboration services such as file sharing and discussions.  Many users also move confidential files to public file sharing sites like Box and Dropbox.

To protect business data we must:

  • Ensure that email, file sharing and other collaboration and information exchanges take place in secure application “containers” and workspaces.
  • Protect applications that support key business processes like order management, customer support, finance, sales and marketing, and product development.
  • Enable encryption of important files when they are accessed and shared on cloud storage services like Box, Dropbox and Google Drive. Protecting our data is the 3rd key step in our approach.

Sophos Mobile

Sophos Mobile is the EMM solution for businesses that want to spend less time and effort to manage and secure mobile devices. Manage mobile devices with the easy-to-use, web-based, unified Sophos Central admin interface alongside endpoint, network, or server security from Sophos. With its best-in-class data protection, comprehensive security, value-for-money, and flexible management options, Sophos Mobile is the best way to allow the use of mobile devices for work, keeping users productive, business data safe and personal data private.

For more information about incorporating Sophos Mobile into your security solution contact the DNA IT Solutions team.   We work with Sophos tools to help keep our clients protected.