Empowering Executives with Integrations for the Technology You Love

For many CIOs and COOs, the process of technology continues to be a top priority for many come 2019. As a major headache, businesses are increasing their cloud investments to move forward with digital transformation efforts were then faced with the massive undertaking of getting multiple resources connected for a seamless user experience.

Many of the local SMBs have found a lack of competency in many smaller providers, with stitching together applications and services to make up your current IT environments. It’s these environments that will increasingly become more-hybrid. With a large mix of on-premises equipment dispersed across various sites, public and private continue to muddy the waters.

As part of the many businesses moving towards a digital transformation, IoT (Internet of Things) has entered further cluttering device options and platforms that can begin to optimize your operations. As many begin with 2019 initiatives, that will further bring-on greater levels of complexity. As a result, many local business owners have identified this gap and began to address this in their technology plans.

Digital Initiatives
As many CEOs begin cracking down according to the latest “State of the CIO 2018” report, IDGs. This continues to add pressure on the organization. As one of the most experienced MSPs in the SF Bay Area, we continued to rapidly innovate, enhance your speed-to-market and greater your customers experience with your business.

By assessing your existing investments in equipment and resources to better determine what new investments need to be made, when achieving technology goals. The digital transformation many businesses are undergoing isn’t exclusively about new technology, but instead, deciphering what makes sense to retain and what needs to be integrated for legacy applications and services, it’s more of a comprehensive assessment.

With all this in mind, we offer CIO’s and COO’s a range of services to further assist in the development of these transformative plans. In our experience, these three components continue to best assist companies in their digital future.

  1. Assessments & Planning – As you begin launching digital initiatives the need to measure twice, cut once an be a great undertaking for several businesses. Involving a review of current architecture, and bandwidth demands of these assets require greater discovery and review to determine a solution that’s right for your business.
  2. Execution – Once planning and alignment are finished, technology providers assist in multiple ways to execute this vision. It takes an IT Expert to match workloads to platforms with optimization in mind, followed by the task of creating a truly digital ecosystem where your business network can be secured and managed successfully by a business that’s done it for over 30 years.
  3. Follow Through – With experience gained through time, we continue to see clients with a lack of talent and expertise in these fields. To fully integrate technology, it requires businesses to either hire someone full-time or outsource to an MSP. As your business continues to propel further towards a more connected network, how does a business keep all of this secure, and up-to-date?

Section 179 Makes Most of Our IT Products 100% Tax Deductible

2018 section 179 tax deduction write off clare computer solutions IT support leader SF Bay area

Many of our clients, rely on this tax incentive each year, to provide them with the ability to purchase or update the technology that runs their business. Utilized by many for licensing, software packages, servers, routers, and switches, many of our clients have leveraged Section 179 as an invaluable asset for the innovation and management of their network infrastructure

Below is an overview of the section 179 tax-incentive for 2018 include deduction limits, and bonus depreciation. Originally used by innovators and investors to further the(their) businesses technology goals, many of our clients rely on this credit for the larger items in their technology scope.

2018 Deduction Limit = $1,000,000 (one million dollars)
The initial deduction is good for purchasing new technology equipment or off-the-shelf software. To take the deduction successfully in 2018, the equipment must be purchased or financed and put into service between January 1, 2018, and December 31st, 2018.

2018 Spending Cap on equipment purchases = $2,500,000
The maximum amount that can be spent on equipment, before the small business tax incentive is affected, is $2.5 Million to $3.5 Million. Most businesses looking to qualify for the tax-incentive doing $2.5 Million in technology spending, don’t meet the needs of a small business.

Bonus Depreciation: 100% for 2018
An additional bonus to close-out the year-end budgeting for 2018, bonus depreciation is generally taken from the spending cap that a business reaches and is available for both new and used equipment.

What’s the Section 179 Deduction?

Most small to medium-sized businesses in the San Francisco Bay Area think the Section 179 Tax Deduction is some mysterious or complicated tax code that you’ll need an accounting or financial firm to clear. Essentially, Section 179 is the IRS tax-code allowing businesses to deduct the full purchasing price of qualifying equipment and/or software purchased or financed during the tax year. This incentive was created to encourage businesses to invest in themselves and update vulnerable technology.

Currently, Section 179 is one of the few incentives available to small and medium-sized businesses. Large businesses also benefit from Section 179 for Bonus Depreciation. Join the millions of SMBs that have begun taking action and get your team real benefits.

Here’s How Section 179 works:

In the past, businesses would purchase IT equipment, typically writing-off some through depreciation. While this writes off was better, it wouldn’t be until 2018 that the government would include the write-off of all qualified equipment purchases for the same year your IT equipment was purchased. Making a big splash so far, many of the companies looking to move to the cloud or replace an older exchange server would qualify to write-off on the 2018 Tax Return up to $1 million.

Limits of Section 179

  • 2018 Cap to the total amount of write-offs is $1 Million
  • Amount of technology equipment purchased $2.5 Million
  • Dedication phases-out on a dollar-for-dollar basis after $2.5 Million is incurred and goes away at $3.5 Million.

Who Qualifies for Section 179?

Businesses looking to purchase, finance, or lease new or used business equipment during the 2018 tax-year qualify. Most of the tangible goods purchased through Section 179 and must be placed into service no later than December 31, 2018.

If your business is looking for ways to save on technology spending, look no further. With over 30 years of experience serving the San Francisco Bay Area, our seasoned staff knows just how to get you the technology you need. If you wish to price it out, visit the Section 179 Calculator.

Not sure what you might need? Sourcing-out gaining desktops or mail-servers are always at the top of an SMBs list. If you need assistance in discovering and identifying technologies that could benefit your business, contact us today to speak with one of our many experts.

Applying Our Award-Winning MSP Process to Your Security Framework

Every week, I’m sure your inbox becomes bombarded by the daily news alerts regarding the dangers of hacking attack, phishing attempts, and data breaches. The rapidly-evolving landscape poses major challenges for companies today, by establishing or updating your security framework.

Information and technology managers are especially concerned about gaps created in security system controls, and processes. These will begin your ongoing shortages of resources and expertise needed to protect information or stick to compliance. Your industry and business will begin to dictate your approach to advancing your security posture. Given the scope of this problem, your security team is uncertain where to begin and how to proceed.

Begin taking a phased approach to your cybersecurity systems. Plug the most important security gaps first, following the later when timing and process are flushed-out. Typically, security gaps are created when assumptions are made surrounding your IT network, as these new threat vectors emerge as soon as updates are rolled out.

Security Is More of a Journey

Typically, companies push security initiatives through, with no real destination in sight, so it wouldn’t be likely, every gap can’t be solved at once. For this reason, it’s best to begin revisiting your security framework, and any pressing risks or vulnerabilities. This better aligns our comprehensive security platforms better, over time. Begin focusing efforts around securing the most important aspect of your business, for some companies that are patient safety, for others, it’s privacy or monetary funds. By creating what is important, IT companies like ourselves can assist better in the threats haunting your business. It Starts with a reference point, and if you don’t have any security framework, or are unsure, it can usually be found by asking your IT manager, or the resident computer guy.

Getting cybersecurity right requires extensive experience, with a multitude of business models. Hackers are always looking for ways to generate some form of social engineering, to take advantage of our emotions. I get robot-dialers calling my cell phone all the time, with fake stories about a prince, needing my help. By following this framework, business leaders can evaluate the current and future state of business cybersecurity.

There will always be social engineering, hackers and sneaky back-door entries to software. As a result, no matter the stance on cybersecurity, it’s essential to your business to begin training the members in your organization and contribute to stopping the spread of these threats. As people will always be the weakest link when scrutinizing your cybersecurity.

Sharing the knowledge, we’ve gleaned from over 30 years in IT support and consulting services the best way to defend against the constant threat of cyber attacks for our managed service clients, is with a phased approach, built from alignment and cohesion of your strategic plan, and our knowledge.

To further understand what your security framework could be, or to have any questions answered, contact us today to get started.

Retention Best Practices: What to Do with All of That Data

Your data retention and customer information are the lifeblood of your business – there’s no denying data’s importance, especially in day-to-day operations. Today, organizations across all industries are tasked to protect this vital info, retain it, and provides access at all hours. Yet, all we’ve seen was a lack of the appropriate archiving and retention policies upon initial inspection.

Building Data Retention

As your MSP, it’s our job to be your strategic advisor and help them understand exactly what their retention requirements are for various business needs. By looking to clean up your IT environment and implement retention policies for more secure, and accessible data you can gain an edge on the pitfalls of errors and mistakes.

By establishing data retention policies, here are some key points you should consider. Keeping in mind, that not all data is created equal—the first step in establishing appropriate retention policies, which data needs to be archived, and for how long.

 

Step 1: Classifying

Strike a balance between what’s optimal for your business needs vs. cost-effectiveness, by asking some of these questions before classifying or deleting data.

– Is this info critical for the customers’ business operations?
– Would your data be classified as a permanent document of any kind?
– Is your data considered proprietary intellectual property?
– Does your data reflect the current, legitimate and useful information or needs?

Data that fits none of these criteria may be suitable for deletion – although most data is generally retained for at least a twelve-month period, with a very small percentage needing to be retained after that period for legal holds. Assess value and risk before deleting anything and consider cost and storage requirements when choosing to keep anything else. There should be no arbitrary or ambiguous data—everything must be accounted for.

Step 2: Compliance

There is a hierarchy to follow when determining which data must be stored. Ensure data retention policies align with any of the following compliance or regulatory restrictions:

Regulatory Compliance
Whether it’s HIPAA, FINRA, PCI, or other regulatory concerns, know your verticals, and know the law. What data must be kept (and for how long) can vary significantly from one industry to the next.

Legal Concerns
Retain all data that could be subject to legal discovery or would be needed in legal action should it arise.

Pro Tip: If you need a long-term storage solution for less time-critical data, you can leverage our series of cost-effective data retention and BDR solutions.

 

Step 3: Deletion

Once your identified data no longer serves any useful purpose, there’s more to do than simply emptying your desktops recycle bin. Set expiration dates for all data when establishing retention policies unless it’s designated to be retained in perpetuity. It should be noted, that when data has exceeded the retention limits, it should be deleted immediately.

Finally, data that is retained must be data that is accessible. Choose a fast and searchable archival method to access data and determine what frequently-used data (if any) should be kept “live” outside of archival applications.

For anyone unsure of their backup and disaster recovery technology, and its configuration, we can help. With over 30 years of experience, with information technology, our trained IT consultants can get you started down the right path.

 

Uncovering the Gaps: 7 Proactive Cyber Security Best Practices for Bay Area Businesses

For businesses, the traditional approach towards cyber security is focused on defending against threats, and prevention. As criminals become bolder, and tactics grow in sophistication, defense and prevention aren’t enough. Over 80% of businesses are looking for third-party help with cybers ecurity. By following these practices, you can securely position your company from a secure-data standpoint.

Focus on Risk – Instead of achieving a 100% fully-secured business, shift the conversation towards how much risk to a business, and it’s data, each employee’s faces. Come to terms with the idea “100% Secured” is unattainable. Cybercriminals can and will always find new ways to attack. By implementing cybersecurity metrics that track logs and security patching. By uncovering how many applications lack the latest security patching, your team can uncover any security vulnerabilities that have not been addressed.

Prioritize the Data – Each business has that information, that remains at risk. For many of your businesses, it would be employee health records, customer information, bank routing numbers. This sensitive data should get the highest level of security. This ensures a harder time for hackers to access info, and work to educate employees on protecting these valuable assets.

Cyber Clean-up – It’s always good practice to stay vigilant about security maintenance, to prevent commonly overlooked threats, such as ransomware, and phishing attacks. These “housekeeping” tasks are typically strengthening endpoint security, administrative rights for hardware access, and folder structure, schedule and automate patching roll-ups, data backups, and overall response planning in preparation of an event.

Security Stand Out – While it’s obvious for most business to leverage security as a differentiator, it might be less clear for employees, who interact with multiple businesses each day. From financial firms to outsourced HR, or even healthcare, all of them require strong security, to protect employee data or their clients.

Regulatory Churn – New regulations, such as Europe’s recently released, General Data Protection Regulation (GDPR) often cause concerns for businesses based in the United States, but selling in Europe. Businesses are told to comply but lack the tools and know-how to bring systems, and processes to standards. Compliance managers were force-fed regulations, in hopes to determine how best to position the tools and services needed. As a trusted IT service partner, we assist companies in the discovery, and remediation of non-compliant networks to meet business needs, and compliance standard, making for great security.

Boosting Security Expertise – With a threat landscape, similar to that of the wild west, cyber security must change with it. Shrouded in secrecy, the threat landscape has never been more open to knowledge sharing. If your company doesn’t have the time to research the specific threats linked to your business, maybe it’s time to meet with us.

Build a Culture – Due to the constant threat of cyber attacks, security awareness training should employ best-of industry security habits, such as password changes, encrypting mobile devices, and avoiding public Wi-Fi, when accessing sensitive data. It’s ok to work while on-the-go but use a VPN, or a remote desktop receiver with 2-factor authentication.

Something most businesses lack and your competition forgot about. Win more business and increase your bottom line, by keeping network uptime maxed, and efficiency within your processes intact.

Realize the Power of Technology with the help of a trusted IT service provider. Contact us to begin an uncovering the gaps in your cyber security today.

3 Considerations When Planning Your Future Information Technology

I’m sure many of you have heard of the age-old adage, “If you fail to plan, you plan to fail.” No business owner should see this as a surprise. Yet, when we chat with new clients and their peers, it seems like they were winging information technology(IT) until now.

Many local businesses are surviving on a day-to-day basis. Some even feel they barely have time to plan for what is going on this afternoon. Tomorrow will begin to seem overwhelming, and the recipe for disaster is born.

Here Are the Three Important Reasons Why You Should Take the Time to Plan for Tomorrow:

1. Your Business Depends on It:  How many of us have thought about businesses growing in a healthy, reliable fashion when executing your sales efforts consistently. It’s critical that you and your team understands the full capabilities and metrics tied to your business efforts. By planning for your technology future, employees will begin to thrive, finances become more predictable, and the stress levels around technology drop. Your internal staff members aren’t left with trial and error. By preparing your information technology today, you can battle the fires of tomorrow.

2. Putting-Out Fires Isn’t Productive:  Many local business owners become regularly stuck fighting information technology fires. That’s unfortunate because, in the larger scope of things, it feels like work is being accomplished, but no situation has been remedied. Your information technology partner should be working within your business, not on your business. This path of neglect is also one leading to high stress and minimum growth.

3. Life Happens:  Employees can get sick, or decide to leave the business unexpectedly, even with proper planning, there’s absolutely no margin for error at this point. Sometimes, businesses are faced with opportunities, that demand immediate action, again delaying the time to think about what advantages, and needs your business now has for technology.

How Can WE Fix This?

As IT people and not miracle-workers, we can create a fully-encompassing management solution for your technology. Putting out the fire, of one of the largest problem with local companies today, aging technology.  As a trusted IT partner in the Bay Area, we understand that there are many substitutes that come close to the care, and customer satisfaction provided by our staff.

If your business has been having technical issues, you owe it to yourself, and your work, to give an expert a call. To begin a no-cost conversation regarding your information technology, feel free to reach out to any of our friendly staff for further assistance.

 

Security Awareness Training Takes Business Protection to New-Heights

Security awareness training is seen by many as something “nice to have,” while several SF Bay Area business owners have begun implementing our on-site training in a necessity to any business looking to protect their network and backups from encryption.

Your decision to adopt user-based education has been passed over year-after-year due to budget constraints or a lack of in-house experts to demystifying technology. Small to medium-sized businesses have suffered from these types of constraints for years when compared to larger, resource-heavy organizations.

Though it’s clear end-user education doesn’t have to be a need for many business owners, as recently as August 2017, a Better Business Bureau study uncovered almost half of SMBs with 50 employees and under, regard security awareness training among their top 3 most proactive IT expenditures, alongside, firewalls and endpoint protection.

This increase comes as no surprise, as the cybersecurity landscape has become more dynamic than ever. The average small to medium-sized business faces annual losses of over $80,000 when everything is said and done. Your staff is the front line to your business, and even the most advanced security stacks, have limitations. If you’re not educating end-users by now, you’re putting your organization into harm’s way.

Here are a few tips and trips for SMBs looking to get started with end-user training, or security awareness training:

Gather Company Buy-In

As with any new programs, starting at the ground level will ensure success. Start with building a culture of security. Yes, it might require multi-factor authentication, or additional hoops to jump through. Begin generating the “buy-in” from the surrounding management teams, sending out an email explaining the value of security awareness, phishing details, and the latest in security trends, and reports for your information technology(IT) team.

Starts with Phishing

In the current technology landscape, security awareness should begin with the MOST COMMON attack vector, email phishing campaigns. With thousands of interactive tools and designs built to mislead and steal your credentials, there is no shortage of examples, and videos showing the intricate workings. Begin with the basics, and go through the varying amounts of phishing threats. Your staff should be able to identify and mitigate any phishing attempts after your training concludes.

Share results with End Users

Use this feedback to inspire smarter habits among staff, identifying key objectives for security awareness training to engage in at a later point. Who knows, maybe you will uncover security gaps left behind by a past managed IT, provider. Raise the level of cyber awareness throughout your organization, sharing the latest encounters internally with your staff. Chances are these criminals are working more than one of you at work and this can help employees understand the impact of poor online habits and motivate them to practice better behaviors.

Continuous Training: Set up your phishing and training program

Once your users are engaged and understand the value, the next step is setting up a training program for new employees. There is no one-size-fits-all program, but we recommend running at least one training courses per year. Depending on the needs of each organization, presentations can be tailored to highlight industry-specific security.

As the business scales, you will want to scale the frequency and adjust intervals throughout the year. Our Security Awareness Training includes real-world phishing scenarios that have been defanged from the wild.

When you start seeing the impact that proven security awareness training has on your employees, you’ll wonder how your business ever managed without it. Contact us to schedule your no-cost, no-obligation security awareness training for your organization.