Microsoft 365 (formerly Office 365) is Microsoft’s suite of cloud services. Depending on the license tier you choose, it can include the Microsoft Office suite of products, hosted email, cloud based active directory, mobile device management, and many other great cloud services to keep your business secure. As a managed service provider and Microsoft Partner, we are huge fans of Microsoft 365 at Innovative, and we love sharing our favorite features with our customers. Recently, I’ve been getting a lot of questions about how users can recover deleted data from Microsoft 365, or how they can undo changes that another user may have made to their documents. Want Exclusive Content Like This? Sign up for our monthly email. In this video, I answer those questions by showing you how to use the two Recycle Bins in Microsoft 365, and how to access previous versions of your Microsoft Office documents. I also touch on some of the limitations of Microsoft 365 data retention and recovery features, and why we recommend third-party SaaS backup solutions to protect your cloud data from a thing called ransomcloud, or rasomware in the cloud.
As a business owner, you have a lot on your mind as we all progress through the COVID-19 situation. Your workforce is probably broken up in ways you have never experienced before, and the way everyone is connecting to your resources may be less than ideal from a security perspective. This situation makes a comprehensive security awareness program more important than ever. A security awareness program promotes ownership of all employees over the safety of an organization's data and information systems. It also gives them skills to prevent and minimize data breaches and security incidents at the individual level. A comprehensive security awareness program includes three elements: Testing – Find out where your most significant security gaps lie. Training – Teach end-users how to identify and respond to suspicious emails. Reporting – Track improvements over time and identify areas for focus for the next round of testing and training. We are all doing what we have to do to survive this global pandemic, and security is taking a back seat for now. The problem is that now, more than ever, security needs to be a primary focus. Cyber-attacks are rising because criminals know that some of the typical defenses that businesses have in place are down or moved at the moment. In fact, FBI has reported a 400% increase in cyber-attacks during the pandemic.
It’s overwhelming when you need to replace one of the computers in your business. With the average computer needing replaced every three to five years, you’re likely looking at different specs and maybe even a new operating system than the one you’re replacing. This can be confusing on your end, and frustrating for the employee who’s been using the same computer for years. In this article, we’ll walk through how to choose the best computer for your business. Since the choices in computer models are infinite, we’ll focus on the to most popular business computer brands on the market, Dell and HP.
Alternatives to a business server: Workgroup Sharing Network Attached Storage (NAS) Device Microsoft 365 (formerly Office 365) Cloud Hosted Server (think Microsoft Azure or AWS) File Sync and Share Applications (think Drop Box, Google Docs) A server allows businesses to point all users toward a centralized location to access files and applications. There are some considerations when deciding if your business needs a server. In general, servers offer many benefits, and are a common approach for businesses that want consistency, centralization, or compliance with PCI, HIPAA or other industry-specific requirements. If you're not sure that a server environment is right for your business, there are other alternatives to consider, each with their own pros and cons.
This is a very common question among small businesses, so let’s start with a quick definition of what a server is. A server is typically an on-premise, high-performance piece of hardware that is combined with a high-end, server-based operating system that is used to store data and centralize resources (what a mouth full). When done properly, all computers point to this server to access files and application data while hardware/software redundancy keeps a high level of up-time for your staff. There are numerous benefits to this type of centralization, but it doesn’t come without a cost.