508-909-5961 [email protected]

If your small- or medium-sized business has yet to get a Windows 10 upgrade, fret not! Microsoft has just announced the good news. The tech giant is bringing back free Windows 10 upgrades exclusively for SMBs that passed on the previous offer. If you’re still doubting about getting that upgrade, these additional facts might help […]

Windows-170px-02If your small- or medium-sized business has yet to get a Windows 10 upgrade, fret not! Microsoft has just announced the good news. The tech giant is bringing back free Windows 10 upgrades exclusively for SMBs that passed on the previous offer. If you’re still doubting about getting that upgrade, these additional facts might help you change your mind.

They’re extending the free upgrade to this segment of customers to help them get to Windows 10,” said Wes Miller, an analyst at Direction on Microsoft, specializing in complex licensing rules and practices. Much like the 12-month upgrade deal that ended last August, this offer applies to personal computers running on Windows 7 or Windows 8.1. The only difference is, the offer is exclusive for businesses that have subscribed to one of the Windows Enterprise plans.

According to Nic Fillingham, a small business product manager: "Customers subscribed to Windows 10 Enterprise E3 and E5 as well as Secure Productive Enterprise E3 and E5, can now upgrade their Windows 7 and Windows 8.1 PCs and devices to Windows 10 without the need to purchase separate upgrade licenses."

The Windows 10 Enterprise E3 and E5 subscriptions are priced at $7 per user per month and $14 per user per month, or $84 and $168 per user annually. Unlike Microsoft's historical licensing -- which permanently licensed the operating system on a per-device basis -- the E3 and E5 subscriptions are per-user licenses, and payments must be maintained to run the OS. This was introduced to target customers that didn’t want to sign a long-term volume licensing agreement.

In order to qualify for a Windows 10 Enterprise E3 or E5 subscription -- which are delivered through a CSP (cloud service provider) -- devices must already be running on Windows 10 Pro. SMBs could upgrade their devices for free last year if those devices ran older Windows 10 versions, and SMBs can upgrade the devices they newly acquire this year if those devices are already equipped with Windows 10 Pro.

"When the CSP originated, the only qualifying OS was [Windows] 10 Pro Anniversary Update," said Miller. "You had to be on 10 Pro. So, if you missed the consumer upgrade window, you would have to buy the underlying 10 Pro license." It’s this license that Microsoft is giving away to customers subscribing to Windows 10 Enterprise E3 or E5. The acquired license is “perpetual” and will be tied to the specific device. “This means the license will not expire or be revoked if the customer chooses to end their Windows cloud subscription in the CSP program," added Fillingham.

Since the upgrade is considered a subscriber benefit, a PC upgrade might be needed -- from Windows 10 Pro to Windows 10 Enterprise -- and if the user isn’t already covered by an E3 or E5 subscription, an additional $7 or $14 monthly is needed to run the system. Miller stated that the likeliest reason Microsoft brought back the free upgrade was to get more people onto the User Subscription License (SL). Providing upgrades from older editions makes more of a customer's PCs eligible for use under the SL model of E3 and E5 (which is licensed per user, not per device). Another motivation could be to promote a partner-centric CSP.

Microsoft has officially confirmed the Windows 7/8.1-to-Windows 10 Pro upgrade offer is a permanent addition to the benefits for subscribers to Windows 10 Enterprise E3 and E5, and not a time-limited pitch. If you’re still hesitating or would like to ask some more questions, feel free to give us a call anytime!

Published with permission from TechAdvisory.org. Source.

Read More

How can you go from reactive to preventive IT?

Shopping around for a managed IT services provider is tough. You’re looking for a business to manage extremely complex and delicate technology, so they can’t be expected to get into the nitty gritty details of DNS-layer security, intrusion prevention systems, and encryption in their marketing content.

The post How can you go from reactive to preventive IT? appeared first on Complete Technology Resources, Inc..

How can you go from reactive to preventive IT?

Shopping around for a managed IT services provider is tough. You’re looking for a business to manage extremely complex and delicate technology, so they can’t be expected to get into the nitty gritty details of DNS-layer security, intrusion prevention systems, and encryption in their marketing content. But one thing does need clarification: What exactly are “proactive cyber-security” measures?

Understand the threats you’re facing

Before any small- or medium-sized business can work toward preventing cyber-attacks, everyone involved needs to know exactly what they’re fighting against. Whether you’re working with in-house IT staff or an outsourced provider, you should review what types of attack vectors are most common in your industry. Ideally, your team would do this a few times a year.

Reevaluate what it is you’re protecting

Now that you have a list of the biggest threats to your organization, you need to take stock of how each one threatens the various cogs of your network. Map out every device that connects to the internet, what services are currently protecting those devices, and what type of data they have access to (regulated, mission-critical, low-importance, etc.).

Create a baseline of protection

By reviewing current trends in the cyber-security field, alongside an audit of your current technology framework, you can begin to get a clearer picture of how you want to prioritize your preventative measure versus your reactive measures.

Before you can start improving your cyber-security approach, you need to know where the baseline is. Create a handful of real-life scenarios and simulate them on your network. Network penetration testing from trustworthy IT professionals will help pinpoint strengths and weaknesses in your current framework.

Finalize a plan

All these pieces will complete the puzzle of what your new strategies need to be. With an experienced technology consultant onboard for the entire process, you can easily parse the results of your simulation into a multi-pronged approach to becoming more proactive:

  • Security awareness seminars that coach everyone -- from receptionists to CEOs -- about password management and mobile device usage.
  • “Front-line” defenses like intrusion prevention systems and hardware firewalls that scrutinize everything trying to sneak its way in through the front door or your network.
  • Routine checkups for software updates, licenses, and patches to minimize the chance of leaving a backdoor to your network open.
  • Web-filtering services that blacklist dangerous and inappropriate sites for anyone on your network.
  • Antivirus software that specializes in the threats most common to your industry.

As soon as you focus on preventing downtime events instead of reacting to them, your technology will begin to increase your productivity and efficiency to levels you’ve never dreamed of. Start enhancing your cyber-security by giving us a call for a demonstration.

Published with permission from TechAdvisory.org. Source.

The post How can you go from reactive to preventive IT? appeared first on Complete Technology Resources, Inc..

Read More

Shopping around for a managed IT services provider is tough. You’re looking for a business to manage extremely complex and delicate technology, so they can’t be expected to get into the nitty gritty details of DNS-layer security, intrusion prevention systems, and encryption in their marketing content. But one thing does need clarification: What exactly are […]

2017February15_Security_BShopping around for a managed IT services provider is tough. You’re looking for a business to manage extremely complex and delicate technology, so they can’t be expected to get into the nitty gritty details of DNS-layer security, intrusion prevention systems, and encryption in their marketing content. But one thing does need clarification: What exactly are “proactive cyber-security” measures?

Understand the threats you’re facing

Before any small- or medium-sized business can work toward preventing cyber-attacks, everyone involved needs to know exactly what they’re fighting against. Whether you’re working with in-house IT staff or an outsourced provider, you should review what types of attack vectors are most common in your industry. Ideally, your team would do this a few times a year.

Reevaluate what it is you’re protecting

Now that you have a list of the biggest threats to your organization, you need to take stock of how each one threatens the various cogs of your network. Map out every device that connects to the internet, what services are currently protecting those devices, and what type of data they have access to (regulated, mission-critical, low-importance, etc.).

Create a baseline of protection

By reviewing current trends in the cyber-security field, alongside an audit of your current technology framework, you can begin to get a clearer picture of how you want to prioritize your preventative measure versus your reactive measures.

Before you can start improving your cyber-security approach, you need to know where the baseline is. Create a handful of real-life scenarios and simulate them on your network. Network penetration testing from trustworthy IT professionals will help pinpoint strengths and weaknesses in your current framework.

Finalize a plan

All these pieces will complete the puzzle of what your new strategies need to be. With an experienced technology consultant onboard for the entire process, you can easily parse the results of your simulation into a multi-pronged approach to becoming more proactive:
  • Security awareness seminars that coach everyone -- from receptionists to CEOs -- about password management and mobile device usage.
  • “Front-line” defenses like intrusion prevention systems and hardware firewalls that scrutinize everything trying to sneak its way in through the front door or your network.
  • Routine checkups for software updates, licenses, and patches to minimize the chance of leaving a backdoor to your network open.
  • Web-filtering services that blacklist dangerous and inappropriate sites for anyone on your network.
  • Antivirus software that specializes in the threats most common to your industry.
As soon as you focus on preventing downtime events instead of reacting to them, your technology will begin to increase your productivity and efficiency to levels you’ve never dreamed of. Start enhancing your cyber-security by giving us a call for a demonstration.
Published with permission from TechAdvisory.org. Source.

Read More

Add-in support for Mac’s Microsoft Office

Support is defined as providing assistance, encouragement, or comfort to help someone achieve a certain goal. For Mac’s version of Microsoft Office, support comes in the form of add-ins that aim to enhance user experience. Although usability testing is currently underway, you can still read about the latest developments here:

Office add-ins are applications running within the suite’s constituent programs that provide features not available by default.

The post Add-in support for Mac’s Microsoft Office appeared first on Complete Technology Resources, Inc..

Add-in support for Mac’s Microsoft Office

Support is defined as providing assistance, encouragement, or comfort to help someone achieve a certain goal. For Mac’s version of Microsoft Office, support comes in the form of add-ins that aim to enhance user experience. Although usability testing is currently underway, you can still read about the latest developments here:

Office add-ins are applications running within the suite’s constituent programs that provide features not available by default. In terms of usage, they’re similar to browser extensions, but add-ins are tailored to the tasks users carry out in Office programs such as Word, PowerPoint, and Outlook. For example, one popular add-in allows users to look up words and phrases on Wikipedia without leaving Word. Another introduces additional chart types that can be used in Excel.

Add-ins are usually free, but some require either a one-off payment or a monthly subscription. If Microsoft wants its Office Store to flourish, it makes a lot of sense to provide support for add-ins to the Mac version of the Office Suite. According to a report from MS Power User, to access add-ins, Mac users need to be members of the Insider program and opt into its Fast Ring. From there, you should check that the installation of your Office for Mac is build 170124 or later.

You can find the “Add-ins” option from the Insert menu in Word, Excel, or PowerPoint, and then select the store. Once at the storefront, find an add-in you’re looking for and install it. Currently, there’s no word on when add-ins will be available to all Office users on the Mac platform. But if the functionality is ready for public testing, it’s safe to assume the official release is already on its way.

If you have further questions or would like to be notified of the latest advancements, feel free to get in touch with us!

Published with permission from TechAdvisory.org. Source.

The post Add-in support for Mac’s Microsoft Office appeared first on Complete Technology Resources, Inc..

Read More