Solution Highlight

Featured IT solutions from the PremierePC team

Who doesn’t like free?

For service plan clients, PremierePC can help Nonprofit organizations get FREE and discounted Microsoft 365 Licenses. [Organizations must be a nonprofit or non-governmental organization with recognized legal status in their respective country (equal to 501(c)(3) status under the United States Internal Revenue Code).]

Microsoft 365 includes Office 365 and ensures an always up-to-date Windows operating system.

Share and collaborate with Microsoft 365: share, compose, edit, Word documents, PowerPoint presentations, Excel spreadsheets. Increase workplace efficiency with 365 collaboration tools.

share_collaborate_teams

Increase email and organization security when PremierePC Manages your 365.
We will review and layer on conditional access policies, preventing unauthorized access to your critical cloud systems.
Layering on 365 tenant branding gives your team a visual queue to identify a trusted 365 login portal.
Password rotation policies ensure complex, unique passwords are used and rotated every 90 days according to best security practices.
SPF / DKIM / DMARC will be validated to ensure your domain is using all possible methods to secure your online reputation.

Free and discounted licenses?

Due to your organization’s non-profit status, you have 10 Business Premium licenses at no cost, and up to 300 Business Basic licenses at no cost.
Additional Premium licenses, over the 10 provided, will cost $5 each, as opposed to the market price of $20 each (will increase to $5.50 each in September 2022).
– Premium licenses include all cloud and desktop software, in addition to email. This also includes password writeback.
– Basic licenses include email only, with access to web and mobile apps.

What’s the process?

PremierePC will hold your hand every step of the way, managing the process, migration, and transition, end to end.

First, register with TechSoup to verify eligibility.

Next, plan the migration with PPC to ensure a seamless transition, mitigate risk of loss of data, and ensure top security practices are in play.

Then, collaborate!

PremierePC will help answer questions, provide basic training, and ensure your team is maximizing their potential through technology. We provide regular 365 systems audits for our clients, making changes to bring your settings into alignment with industry best practices.

As the threat landscape changes, certain practices and polices need to evolve to keep pace.

With PremierePC on your side, we will take care of the heavy lifting, keeping your organization up-to-date and secure. Let’s maximize your potential, through technology.

Give us a call today to learn more!

Sometimes layering on solutions and process to keep your data secure can add an extra few steps and annoy the end user.

We get it, we have the same MFA policy, password rotation policy, VPN requirements, etc. at PremierePC as you.

However, we know they are completely necessary to keep data safe and mitigate the ever present risk of the bad guys infiltrating your network.

So what now?

PremierePC continues to research and evolve our cybersecurity approach, with the NIST Framework guiding us, while keeping the end user in mind.

Let’s talk VPNs.

To remind you about what a VPN is, you can read our blog post here: VPN? What’s that?
In short, a VPN, or virtual private network, gives online privacy and anonymity by creating a private network from a public internet connection.

Why invest in data privacy?

new study reveals that 57% of SMBs believe they won’t be targeted by online criminals, but almost 20% experienced an attack in the past year. These data breaches are costing more than ever before, with an average cost of a data breach for small businesses at $108,000.

We know it’s pretty necessary to maintain security while you compute.

However, connecting to a VPN tends to add several steps, and often needs support after your password is changed, a bios update, etc.

Here’s the good news
If you are in our RaaS (Router as a Service) program, you have an Enterprise Class Cisco/Meraki device. We already know these are wonderful for enhancing network security for the SMB.

Cisco AnyConnect

Now included in this RaaS solution is the Cisco AnyConnect Secure Mobility Client.
Essentially, a new way to connect to VPN at no additional cost.

Here’s the best part: This solution is incredibly easy to use – just 3 mouse clicks and you’re connected. No typing in your username and password. No hunting for VPN settings.

Features and benefits

Access from anywhere

Give any user highly secure access to the enterprise network, from any device, at any time, in any location. AnyConnect can be used on a Windows or Mac machine as well as an iPhone or Android.


Greater visibility

Gain more insight into user and endpoint behavior with full visibility across the extended enterprise.
With AnyConnect you can defend more effectively and improve network operations.


Comprehensive protection

Defend against threats, no matter where they are.


Simplified management and usability

Provide a consistent user experience across devices, both on and off premises, without creating a headache for your employees.
Simplify management with a single agent.

Give PremierePC a call if you would like to learn more.

New phishing attacks have been popping up on collaboration tools like MICROSOFT TEAMS.

So why are they targeting tools like Microsoft Teams? Aside from this particular service having 270 million + monthly active users, we tend to trust these applications.

If the attack comes in email, I can check the sender and verify their address. In Teams, the bad guys already have credentials and are using them.

It looks like my boss is sending me a Teams message. I’ve talked to my boss on here 100+ times in the past week. Surely this is still my boss messaging me.

How are these attacks being executed?

There are many possibilities for attack.

Threat actors are dropping malicious files and malware into Teams conversations. Once this is clicked, the file installs a Trojan on a user’s Windows PC; the Trojan then installs the malware.

Bad guys are also requesting gift cards to be purchased, or persuading employees to perform a wire transfer of funds to their account.

Some of these attackers are getting very sophisticated.

While the CEO of a customer company was traveling to China, the bad guys posed as the CEO and sent a message to several employee’s asking them to join a Teams meeting. The employees joined the Teams meeting and saw video of the CEO. Little did they know, this was video feed from a past TV interview; the attackers had added a fake background as well to look like the CEO was in China. There was no audio, the “CEO” sent a message saying there must be a bad connection and dropped a SharePoint link into the chat requesting the employees send some requested information.

You may be thinking, “This is extreme.” While it is extreme, it is important to note these are legitimate jobs on the Dark Web. See the job posting below:

While you are at work, 8 hours a day, performing your daily tasks, so are the bad guys. This is their job, their career, their living. They will put the same effort into their work as you do into yours.

dark_web_job_posting

For the entrepreneur, you can be your own boss on the Dark Web! Just purchase a Phishing Kit, which gives you step by step instructions and all necessary code to execute the attack.

Let’s get prepared.

Do you know your organization’s cyber security posture?

Do you have a powerful cyber security solution stack?

Do you run regular phishing campaigns?

Do you provide consistent Security Awareness Training for your staff?

Your employees are your number one defense against these attacks.

Is your team ready?

Call today to learn your organizations security posture, get a free Dark Web scan for your domain, and discover options available for Security Awareness Training for your staff.

Microsoft is restructuring their licensing model and making some drastic changes.

While we do not believe this is in the best interest of our clients, Microsoft is moving forward with these changes globally; whether you work with a Partner, like PremierePC, or purchase direct from Microsoft, these changes will be in effect in the coming months.

microsoft_price_change_subscription

What Does This Mean for You?

While the product offerings will not change, this transition will affect your subscription terms. See below:

  • Subscription term options: You may choose between monthly, annual (paid monthly or upfront), and 36-month subscriptions* (paid monthly, annual, or upfront).
  • Monthly term offers will now include a 20% increase in price.
  • Subscription Management: You may purchase a combination of both short- and long-term subscription terms.
  • Cancellations: There will be a full refund issued if cancelled on day 1, and a pro-rated refund if cancelled on days 2 and 3. No cancellations, or change of channel, will be accepted after 72 hours.

*36-Month Terms available for Dynamics 365 (January 2022) and select Microsoft 365 subscriptions (March 2022). 36-Month upfront term subscriptions will be available starting March 2022.

Windows 365: Windows 365 subscriptions will only be available via the monthly term offer. Windows 365 subscriptions will not be subject to the 20% premium for monthly terms at this time.  

Nonprofit, Education and Government: Non- Profit and Education products will not be affected by the price increases.

Breakdown on Price Increase (for month-to-month subscription terms):

Microsoft 365 Business Basic: $6 (from $5) 

Microsoft 365 Business Standard: Remains unchanged

Microsoft 365 Business Premium: $22 (from $20)

Microsoft 365 E3: $36 (from $32)

Timeline:

March 1, 2022 – all net new subscriptions will be on the new pricing model.

July 1, 2022 – all renewing subscriptions must be moved to new pricing model.

July 2023 – any remaining legacy subscriptions must be moved to new pricing model.

Let us know if you have further questions.

For the vast majority, monthly billing provides the most flexibility for our SMB Clients. You may work with us if you wish to move to annual, else we will continue with month to month.

PremierePC is available to discuss how this affects your business and support you through the transition.

If your organization is anything like ours, and nearly every SMB we have worked with, you share documents. Often.

This typically creates a major issue: having MULTIPLE file versions, each with different data, in the hands of multiple employees – a.k.a. disaster.

Does this sound familiar? Susan has a spreadsheet and shares it with Jen, who makes a few edits and sends it to Matthew. He then works with Susan on the sheet again, but Susan has different data than Matthew. Whose data do you go with? Matthew calls Mike for some insight, who got another version of the sheet from Chelsea. The cycle continues. This creates serious efficiency issues – wasted time, energy, and money on a simple spreadsheet.

And that’s just ONE spreadsheet.

multiple_file_versions

Egnyte has the solution.

Not only does Egnyte automatically create a new version of a file each time a change is saved for an existing document, Egnyte offers Co-Edit.

Egnyte Co-Edit offers seamless co-editing of any document in Microsoft Office or Google Workspace. This eliminates the need for multiple versions, increasing your team’s workflow efficiency. Multiple users can live edit a single document simultaneously and in real-time. This feature ensures the most accurate and up-to-date content while maintaining security and visibility of your data.

Co-Edit can be accessed via the Web UI or Desktop App for ease of use.

Egnyte Co-Edit saves time and allows for your data to remain secure and maintain accountability through Egnyte.

Visit our enterprise file sharing page to learn more about Egnyte.

It’s no secret that cyber attacks are on the rise – hackers are attacking at a rate of once per 39 seconds.

Did you know 95% of cybersecurity breaches are caused by human error?

How about that only 5% of companies’ files are properly protected?

Let’s look at five common mistakes made frequently by businesses like yours.

  1. Many SMBs believe they are too small to be a target.

    FALSE. Hackers are not only interested in large organizations. The bad guys know that large companies have more resources, and a more robust cybersecurity stack. Makes sense to target a smaller firm that still handles sensitive payment and bank data for their clients.

  2. Sharing passwords doesn’t seem like big of a deal, right?

    They’re easier to remember, and surely you can trust your coworkers. Think again. There are many issues with this one. Sharing passwords creates giant holes in your security, makes accountability near impossible, you lose control over where your password is stored or used, etc.

  3. Ever click “later” on suggested software updates?

    Ever click “later” 12 times on that same update? You’re not alone. Again, seems like a small decision. However, think about this. Any time there is a security hole found in software, the developer seeks to correct it. They may come out with an update. With that update, they report the security hole they found. Enter hackers; anyone using a previous version of the software now has a known security hole in their system.

  4. Free Antivirus: you may be thinking, “What a gift! This is surely just as good as any other antivirus.”

    Let’s look at the facts. Free antivirus software offers low detection rates, collects data about your usage, may issue false positives to appear useful, carries bloatware and intrusive ads that slow computers, and suffers from data breaches making them counterproductive.

  5. How often do you train your employees on cyber security?

    Do you have a training protocol or standard operating procedures around this? Employee negligence is the number one cause of data breaches. Some of these actions seem harmless, like connecting to Wi-Fi at Starbucks and checking your email. Reusing your work password, or a variant of that password, across multiple accounts. Some actions could be as simple as clicking a link in an email from a seemingly safe sender. Hackers will even go so far as to drop a USB drive containing malware into the parking lot or hallway of your business; do you feel confident that none of your employees would pick that up and plug it in?

These are just five, in a list of many, common mistakes made by SMBs that leave them open to cyber security attacks.

Don’t wait until it’s too late to formulate a solid defense against these types of attacks.

The average cost of one of these attacks is $200,000.

Can your business afford that?

Click here to learn more.

PremierePC Achieves HIPAA Compliance with Compliancy Group

PremierePC has demonstrated its good faith effort toward HIPAA compliance by completing Compliancy Group’s proprietary HIPAA compliance process.

We are pleased to announce that we have taken all necessary steps to prove our good faith effort to achieve compliance with the Health Insurance Portability and Accountability Act (HIPAA). Through the use of Compliancy Group’s proprietary HIPAA solution, The Guard™. we can track our compliance program and have earned our Seal of Compliance™. The Seal of Compliance is issued to organizations that have implemented an effective HIPAA compliance program through the use of The Guard.

HIPAA is made up of a set of regulatory standards governing the security, privacy, and integrity of sensitive healthcare data called protected health information (PHI). PHI is any individually identifiable healthcare-related information. If vendors who service healthcare clients come into contact with PHI in any way, those vendors must be HIPAA compliant.

We have completed Compliancy Group’s Implementation Program, adhering to the necessary regulatory standards outlined in the HIPAA Privacy Rule, Security Rule, Breach Notification Rule, Omnibus Rule, and HITECH.  Compliancy Group has verified our good faith effort to achieve HIPAA compliance through The Guard.

PremierePC is excited to have taken these measures toward compliancy and to offer this program to our clients.

Want to learn more? Give us a call or click here.

Is additional file sharing security really that important? I lock my computer and only use my work email to send data. Isn’t that enough?

Good question. It may not be enough. In short, email data can be stolen as it travels un-encrypted over the network. Data could be stored un-encrypted on mail servers, internet mail relays, as well as end devices. Stolen data is then sold on the dark web and there’s no turning back.

Yikes! So how can I store and share my data in a secure way that’s also easy to use?

Let’s look at Egnyte…

 

First, what is Egnyte?

Our enterprise file sharing platform addresses the critical infrastructure needs of businesses – file storage, revisioning, sharing and collaboration – in one secure, centrally managed and easy-to-use solution.

egnyte_file_sharing

Sounds neat.

What does File Sharing look like?

Basic file sharing is easy: simply choose the file, select ‘share’ from the menu. You’ll be given the option to copy a link which you can then easily drop into an email or chat session.

There’s a few further helpful customizations you can layer on to this link:

  1. Link Expiration – choose what date you’d like the link to expire.
  2. Sender notification – select to be notified once the link is used by the recipient.
  3. File name – include the (human readable) file name in the link.
  4. Version – choose to always display the most recent version of the file.

Layer on more security

Want to restrict downloads? Easy, Egnyte allows you to restrict or allow downloads. If you choose to restrict downloads, the user will only be allowed to view the file through a browser.

Need another layer of security? Add simple, effective password protection. Organizations can set policies that require password protection for sensitive files passed outside the organization. The system will automatically generate a password for the sender to relay to the recipient.

File access can further be limited to specific email addresses. Egnyte allows the sender to select ‘specific recipients’ and input their email addresses. This prevents the recipient from forwarding the link to others.

Egnyte can encrypt a document in transit and on the user’s device by the sender layering on ‘encrypted downloads’ to the selected file. The file will then remain encrypted on the receiver’s device and is only decrypted while being viewed. If necessary, the sender can also revoke permissions to view the file after sharing.

The importance of collaboration is evident in any business – anything that improves workflow and efficiency is easily received by employers. However, security is just as, if not more, important. Security breaches can take out an entire organization in a matter of moments. Securing your data and sharing that data in an intelligent, secure way is instrumental to mitigating your cybersecurity risks.

Learn more here.

Your employees are your greatest asset. 

Did you know, they can also be your greatest risk?

Your organization’s data is at the hand of each person within your company.

Anyone with a company email can risk your security.

So… what to do about it.

Introducing branded email logins.

Many attackers use phishing emails to prompt users to enter their credentials on compromised pages. Often, users will enter these credentials because the pages look very similar to a legitimate login page.

One frequently used phishing scheme is the Microsoft 365 sign in page. If attackers can gain the email credentials of an employee, they now have an entry point into your entire organization.

We can help mitigate this risk.

By applying your company logo to the login screen, you are offering a visual cue to your employees that this is legitimate. This visual cue will help employees differentiate real login pages from malicious prompts for credentials.

Give us a call today to learn more about your security stack, and how we can help you increase your overall security posture.

[Bracket]

 

Included with Bracket is our encrypted file transfer service, Bracket Share.

 

share files

request files

customize

 

Bracket Share links are customizable, so users can make them easy to remember and share.

You can have Bracket email people an invitation to share. These can display your personalized profile, so your contacts feel more confident about sharing their sensitive data.

Anyone with your Share link can share encrypted files and messages when it’s convenient for them. No account required.

Senders who share through the Share link are securely validated via inbox authentication to prevent abuse.

Bracket can handle files up to 1GB in size with up to 25 files allowed per message. Large files are good to go when sending from Bracket’s webmail interface or Bracket Share.

Click Here to Learn More