Donate Computers to Help the Community

Donate Computers to Help the Community

We Need Your Help Tampa Bay & Wesley Chapel!

Tampa Bay & Wesley Chapel businesses: Donate computers to help the community! We are starting a community service initiative. We’re hoping to collect unwanted used computers to repurpose for local charitites to use. Our IT professionals will dedicate their time to making sure all of your personal data has been removed from the devices, as well as ensure the computers are in optimal condition for the charities receiving them. This means repair, maintenance, and updates to operating systems.

IGTech365 is devoted to keeping our community a thriving place. This means lending a hand to those in need. Charities receiving these computers help thousands of members of our community on a daily basis. Like every business, they require an IT infrastructure and technological support to keep their operations running smoothly.

Help us, help the community. Drop off your unwanted computer monitors, towers, laptops, etc. at our office, or at the Wesley Chapel Chamber of Commerce dropbox located at the main entry. Do your part today!

Email Migration

Email Migration

Your company image as a lot to do with the emails you send. Sending email from a Gmail or even an AOL account speaks to the progressive and tech savvy nature of your organization. Microsoft Office 365 has set the email management standard with Outlook and Exchange for professional email. An email migration from Gmail or other consumer level emails services does not have to be painful or risky. What is important is that is done right and you can move on with your business.

The second important reason to do an email migration is to protect your email and have an email archive solution in the cloud for long-term security. Many states require information related to employee and taxes be retain for 5 to 7 years. A good email archive system can provide a separate location for bulk emails while your daily operations use much smaller email files to keep the speed up.

IGTech365 offers email migration services around Tampa Bay and Central Florida. With a little assistance to start, email migrations can also be done remotely. The challenges of migrating email depends on variables such as the amount of emails to migrate, the internet speed between the current and future email hosting locations and the processing capabilities of equipment on either end. IGTech365 will look at your email service and make recommendations to achieve your email migration goals using best practices. Once the email migration is complete, IGTech365 can setup Exchange in the cloud and manage it for you so you will have business class email and security without the expense of having an IT staff for this one function.

Additional Resources

Office 365 migration performance and best practices
Preparing for the Email Migration
https://developers.google.com/gmail/api/guides/migrate-from-emapi

Your company image as a lot to do with the emails you send. Sending email from a Gmail or even an AOL account speaks to the progressive and tech savvy nature of your organization. Microsoft Office 365 has set the email management standard with Outlook and Exchange for professional email. An email migration from Gmail or other consumer level emails services does not have to be painful or risky. What is important is that is done right and you can move on with your business.

The second important reason to do an email migration is to protect your email and have an email archive solution in the cloud for long-term security. Many states require information related to employee and taxes be retain for 5 to 7 years. A good email archive system can provide a separate location for bulk emails while your daily operations use much smaller email files to keep the speed up.

IGTech365 offers email migration services around Tampa Bay and Central Florida. With a little assistance to start, email migrations can also be done remotely. The challenges of migrating email depends on variables such as the amount of emails to migrate, the internet speed between the current and future email hosting locations and the processing capabilities of equipment on either end. IGTech365 will look at your email service and make recommendations to achieve your email migration goals using best practices. Once the email migration is complete, IGTech365 can setup Exchange in the cloud and manage it for you so you will have business class email and security without the expense of having an IT staff for this one function.

Additional Resources

Office 365 migration performance and best practices
Preparing for the Email Migration
https://developers.google.com/gmail/api/guides/migrate-from-emapi

Small Business Support Resources

Top Solutions for PC Problems

Email Phishing

Email Phishing

“Phishing scams are typically fraudulent email messages appearing to come from legitimate enterprises (e.g., your university, your Internet service provider, your bank). These messages usually direct you to a spoofed website or otherwise get you to divulge private information (e.g., passphrase, credit card, or other account updates). The perpetrators then use this private information to commit identity theft.” Indiana University

 

The article by Indiana University is a good article and provides a lot of good information. This blog is about our story and real world scenario that almost cost us $15,000.00.

We received an email from the person shown in the email above. It was good timing because we had just finished registering to resell the technology listed in the email. The buyers email and desire for our services appeared legitimate. The email conversation was logical and appropriate through most of the engagement. We initially had no reason scrutinize the request or pending transaction.

It Was Just to Easy

 

The prospected wanted to buy about $15,000 in Cisco technology for Florida International University (FIU). The technology matched the network we would expect to see at an organization like FIU so we moved forward without suspicion. After providing the quote via email our contact immediately emailed us a W-9 in order to setup an account with us Net 15. We had yet to speak on the phone and we immediately received a W-9 with instructions to create the order so he could send us a PO. At this time the red flags started to go up.

Red Flags

 

  • Seldom in business do deals move this quickly at these price points or dollar amount.
  • Net 15 is an unusual term for a large organization normally requiring net 30
    • Net 15 gets the vendor excited about rapid payment but leaves enough time for the criminal to make off with your goods.
  • Volunteering a W-9 before one is requested seemed aggressive toward getting the deal done.
  • IGTech365 most often has to provide the W-9 to the customer so we can be entered into their accounting system for payment.

Confirming Suspicions

 

Once we became a little suspicious we decided to call FIU’s purchasing department directly using the phone number on their website, which we Googled. It turned out the name was real but the real person was on vacation. Our next step was going to be to get the PO number and call the purchasing department and verify we had a legitimate PO #.

Once we knew we had a phishing scam in play we noticed the email was not quite right. The email has a “u” in front of the .edu. Since we hadn’t seen this before we checked the website again to see if this was used in other emails and it was not.

If we had shipped the order on a PO we would have certainly lost a large amount of money. These scams are usually time sensitive so the seller or individual has less time to figure out what is going on. If he had played it slowly like a real deal would have, he may very well have slid under the radar and gotten away with it.

The last thing is to always trust your gut. It is exciting to image a large sale or being left $5 million from a prince in Africa but somewhere in the back of your mind you know something is wrong. Slow down, think about, research online and be sure you are covered. You can even call the credit card company to verify the person and charges.

 

 

 

 

What Is The Cloud?

What Is The Cloud?

The who, what, when, where, why, and how of the Cloud!

“What is the cloud?” is the most common question I’ve been asked recently pertaining to the IT industry. Many people have some very common misconceptions about many attributes of the cloud. I started asking my friends and family the same questions and to my surprise, I was given very vague answers that were mostly incorrect. That is what prompted me to write this blog and set the record straight once and for all. I like exposing these well-kept secrets of IT so that my customers and the public can make informed decisions about their IT business needs.

  • What is the Cloud?

    • When someone says your data is in the cloud, it has nothing to do with white fluffy things in the sky. It has a terrestrial home that’s stored somewhere or many somewheres, and the network of servers find what you need and deliver it. The cloud refers to software and services that run on the Internet, instead of locally on your computer. Most cloud services can be accessed through a Web browser like Internet Explorer or Google Chrome.
    • Some examples of cloud services include Google Drive, Apple iCloud, Netflix, Yahoo Mail, Dropbox and Microsoft OneDrive. (There are also many, many business applications for cloud computing, but for the purpose of this post, I’ll deal with consumer solutions.)
  • When is the cloud practical for business?

      • The cloud is a great place to store files which need to be accessed outside of your network, shared or protected. The cloud offers the best disaster recovery protection from events such as hurricanes, fire, and theft.

     

      • You can connect to cloud-based programs at any time, on almost any device with an Internet connection. This leads to greater collaboration, particularly for businesses with remote employees.

     

      • By using cloud based services, teams in different locations can collaborate on documents and projects without needing to email attachments. They can also share calendars and task lists in real time.

     

      • Employees communicate and connect through instant messaging and hold impromptu meetings with robust audio, video and screen sharing capabilities. Some cloud-based services make it possible to include customers and vendors in these meetings. This improved sharing of information has the potential to enable your company to react more quickly to business opportunities in other markets.

     

      • Cloud resources are scalable, or elastic, so you can tap resources or increase capacity to support growth and handle busy periods. One of the most challenging aspects of running a small company is predicting what resources your business will need. Flexibility to scale means you can take advantage of opportunities, not before accessible. With cloud resources, rather than having to predict your needs, you can react to needs as they arise and use just what is required to manage your growth and enhance your efficiency.

     

      • Cloud-based services can help you save money on many fronts, including server maintenance, power and cooling costs, and software licensing and upgrade expenses. Just under half—49 percent—of SMBs use Cloud computing to lower costs, according to the Microsoft survey. Rather than spending money to maintain hardware that often goes unused, subscribing to software and services for a low monthly fee can help small businesses stretch their budgets further.

     

      • If you don’t have the time or resources to implement a backup strategy—or if you keep your backed-up data on-site—the Cloud can help ensure you are able to retrieve the latest versions of your data in case of an on-site system failure or a disaster, such as fire or flood. You can choose a Cloud-based service to back up your data frequently or automatically to a safe online location so that if the unexpected happens, you can be back up and running within minutes. Many providers offer geo-redundant backup, meaning your data is saved in multiple centers across multiple locations, to improve security.

     

      • Cloud-based services often can be more reliable than services delivered on-premise, particularly if servers or other hardware are aging.

     

      • With servers located off-site and their management left to an experienced provider, Cloud computing allows you to focus on what you do best—running your business. Because resources in the Cloud can be accessed as needed, the time it takes to get started with these services shrinks from days to minutes. For small businesses wanting to stretch their resources and be more competitive, working in the Cloud is becoming a must.

 

  • Where is the best location to store information in the cloud?

    • There are many locations to store your data in the cloud. Services such as Microsoft OneDrive, Google Docs, DropBox, etc provide cloud based file storage. In order for you to find the best solution for a network environment, it might require multiple cloud resources, in various locations, for performance and disaster recovery. Please consult an IT professional like IGTech365 for a customized solution.

 

  • Why store your data in the cloud?

    • Since the advent of the internet, the technology industry has been steadily moving away from local storage to remote, server-based storage and processing — what is known as the cloud. Look at music and movies: We used to play them from local media, but now they’re streamed from servers. You can reap the same advantages of anywhere-access and sharing (and the productivity gains that can bring), as well as the reduction of local storage requirements by keeping your own documents and media files in the cloud.

 

  • How to get your data into the cloud?

    • Contact an IT professional. These professionals have the specialized tools required to migrate your data quickly, efficiently, and without corruption occurring… and if it does recovering the uncorrupted copy to migrate. While this seems simple, it can be a time consuming and very technical process best assigned to an IT professional.

 

  • Who created the cloud?

    • 1960’s Cloud computing is believed to have been invented by Joseph Carl Robnett Licklider with his work on ARPANET to connect people and data from anywhere at any time.
    • 1983 – CompuServe offered its consumer users a small amount of disk space that could be used to store any files they chose to upload.
    • 1994 –  AT&T launched PersonaLink Services, an online platform for personal and business communication and entrepreneurship. The storage was one of the first to be all web-based, and referenced in their commercials as, “you can think of our electronic meeting place as the cloud.
    • 2006 – “ Amazon Web Services” introduced their cloud storage service AWS S3, and has gained widespread recognition and adoption as the storage supplier to popular services such as SmugmugDropbox, Synaptop, and Pinterest.
Recover From Disaster

Recover From Disaster

Were You Ready for Harvey or Irma?

How to ” Recover from Disaster” – The Threat is Real. With the accuracy of weather technology advancing, we can usually predict most natural disasters days in advance. In the wake of hurricane’s Harvey and Irma, it is time to start rebuilding from the devastation.  To recover from a major disaster event, we must utilize those disaster recovery plans (DRP) and Business Continuity Plans (BCP) that are collecting cobwebs. Keeping these plans up to date is crucial and testing/drilling the effectiveness should be done yearly at a minimum.

For those of you that have tested plans you know the path you need to travel, but for those that don’t please read the following steps, and follow as applicable to your business.

Recover from Disaster

  1. Assess and document the damage
    • Take pictures of damages and losses.
    • Verify your computers and laptops work (contact an IT professional)
    • Verify internet connectivity
    • Verify business phone system works
  2. Obtain a network assessment
  3. Contact your insurance company to file a claim
    • An appraiser will usually come onsite to verify your claim
  4. Purchase new computers or contact an IT resource (IGTech365) for assistance
    • Set up hardware
    • Set up network
    • Configure systems
  5. Finally, eliminate the Insanity from your business. By definition, Insanity is doing the same thing over and over expecting a different result. We can help you by:

 

Recover from disaster is a state of mind that until you’ve been through it can be hard to grasp. I’ve found the attitude is usually very polarized, ranging from “it will never happen to me” or “I always have to be ready for the worst case scenario”. Although the likelihood of your business being affected by a disaster can be slim, are you willing to take that chance? Let IGTech365 help you find a middle ground of prepared, but not counterproductive to your business.

 

IGTech365 saving $1000’s for Dade City & Zephyrhills Small Businesses!

IGTech365 saving $1000’s for Dade City & Zephyrhills Small Businesses!

Dade City & Zephyrhills Small Businesses

IGTech365 specializes in small to medium businesses consisting of 1-500 employee’s. We chose this market because we are a small business too, and we overcome the same adversities as you do. We were born from a support department based in Wesley Chapel and once joining the chamber of commerce quickly realized that we should be helping our local small businesses in Dade City & Zephyrhills achieve the same success we have. We started adding new productivity software like the Office 365 suite which made collaboration simple and file storage accessible anywhere, on any device. Once we embraced the administration of Office 365 combined with our current skill set including:

  1. Information/Cyber Security
  2. Systems Administration
  3. Network Administration
  4. VoIP Phone Systems
  5. Help Desk Support
  6. Development(Programming)
  7. Professional Services
    1. Implementations
    2. Migrations
    3. Projects

 

It allowed us to be a total technology solution for small businesses especially in the Dade City & Zephyrhills area. These areas have become a focus area, because of the white glove service we have been able to provide to them. After working with these local companies we have adopted that world class customer service approach with all customer nationwide.

 

Let us help your business succeed. Give us a call at 866-365-7798 ext. 1003 or click here to fill out our online form.

 

dade city & zephyrhills

What to Do if You Have Been Hacked

What to Do if You Have Been Hacked

Signs You May Have Been Hacked

 

  1. People responding to emails you didn’t send
  2. New toolbar you didn’t install
  3. Notification your account was accessed when it wasn’t you
  4. Redirected Internet searches, increase in popup activity
  5. Social media activity you didn’t create
  6. Passwords stop working
  7. Unexpected software installs
  8. Anti-virus has been off or is out of date
  9. Things don’t feel right but you are not sure why
What to Do if You Have Been Hacked

You’ve Been Hacked, Now What?

Let’s define what we are talking about when discussing being hacked for this article. In this situation, someone has somehow gained access to your email or online accounts. This may be in the form of someone guessing your login credential or installing a virus on your computer and logging what you type. We are not discussing malware or viruses infecting your computer.

Time is of the essence. Your information may be used to change your bank account information, opening credit card accounts in your name or accessing your social media.

Steps to Take If You Have Been Hacked

 

  1. If you feel your situation is a crisis, power off your computer and take it to a professional right away.
  2. Enable two-factor authentication on key accounts. This generally means you enter your user name and password and then you are sent a text message to your phone with a one-time, short-term, code you have to enter. There are other ways to do this but you get the idea that it is an added step specific to you. Read more here and why it is important.
  3. Install a password manager and locker like Roboform, using AES256 bit encryption with PBKDF2 SHA256 – good stuff.
  4. Use strong passwords and protect them in a locker, not a spreadsheet or email labeled “passwords”.. Programs like Roboform will provide a password generator or you can use an online service such as Secure Password Generator. A password locker such as Roboform will require an app install but a random password generator will not. A password generator online that requires an install might actually be a virus
  5. Change your passwords. This may include some or all of your online accounts and your Windows or login password on your computer. If you believe you’ve been hacked where you store account and password information, you will need to change all the passwords to these accounts. You have to assume the information was stolen and may end up being sold on the deep web to multiple criminals.
  6. Ensure your anti-virus and anti-malware is running and up to date. Windows 10 comes with Windows Defender. It is not necessary to install other programs or run multiple anti-virus programs. McAfee and Norton are two big names but the install a lot of bloatware and sell services that are all free with Defender.
  7. If you feel your financial information was accessed, freeze your credit with the 3 national credit agencies. Learn more from Clark Howard. Call your credit card companies and freeze your account or cancel your credit cards. Put a call into your banks and freeze your accounts. Most hackers are looking for money so this is an area to be very thorough.
Links vs Attachments

Links vs Attachments

Links vs Attachments

Links vs attachments, what’s the best practice when sharing files by email? Should you attach your files or send a link to the file instead? Our answer is always the same. While arguing that it is better to have all files link to external sources, it’s not always practical. Using attachments is acceptable when necessary or convenient. Please remember if verification that the file has been viewed is important, use a link.

Links

There is no spam filter, file size limits, storage issues, or verification that the file has been viewed when using links. These are the reasons send links to files instead, and even better track that link with Office 365/SharePoint. Understanding contact engagement with your content is incredibly useful. Make sure you don’t stop tracking after the open the link. This can be the most valuable and actionable information concerning links.

Attachments

Attachments raise flags by both spam filters, recipients, viewed suspiciously, and have file size limits. For files larger than 10MB  using a link is the rule. Sending out hundreds of emails with a large attachments uses a lot of storage space. Sent emails can bounce if storage is full. As a result it can prevent messages going through. The storage used can be multiplied as it takes up space both on your mail server and CRM. By sending attachments you’re unable to know whether your file was viewed.

Our winner is…

In the links vs attachment battle the clear winner in our opinion is LINKS!

Pin It on Pinterest

Share This