When to Use Microsoft SharePoint, OneDrive, and Teams

When to Use Microsoft SharePoint, OneDrive, and Teams

As a Microsoft Office 365 user, you have access to three tools that can help with document workflow, collaboration and storage. The programs that are used for this purpose in Office 365 are OneDrive, SharePoint and Microsoft Teams. Each has a defined role to play, and if used as intended, can help manage work efficiently and effectively.

MICROSOFT ONEDRIVE

  1. This is your personal storage of your work documents.
  2. It is private to you.
  3. Use OneDrive when you are working on a document that you are not ready to share with your team for feedback. Once you are ready, you can share it on SharePoint (see details below).
  4. OneDrive is backed up to your Office 365 account in the event you have to transition to a new computer. Just sign into your Office 365 account to gain access to these files.
  5. While you can share files with others on OneDrive, this is not advisable. OneDrive is tied to an individual. When that person leaves the organization, so do the files stored on OneDrive.

MICROSOFT SHAREPOINT

  1. A great tool to use when collaborating with others on a document. Feedback from multiple parties can be tracked in one document. This cuts down on errors in documents and also ensures information that needs to be shared is not lost.
  2. You can create both sites for particular teams, or have a site visible to everyone in the organization. This is a great place to organize critical documentation teams need to do their work.
  3. Many companies use SharePoint for an internal intranet. Sites can be created as “read only,” with editing access  given to individuals in charge of keeping files up-to-date.
  4. SharePoint is a great way to keep an archive of company information. No matter how teams grow and change, the files on SharePoint stay put.

MICROSOFT TEAMS

  1. Many companies use this tool for company meetings. It is easy to record the meetings you hold and have files available for later viewing for those who may have missed the gathering. You can easily post these files to a SharePoint site via Microsoft Stream, another program in Office 365.
  2. Gone are the days when you have to collaborate with teams just via email. Teams are a great way to share documents being worked on via SharePoint, as well as receive updates on changes and progress. This cuts down on the amount of emails exchanged in team settings as well.

NEXT STEPS

If you ever run into questions, Office 365 has many easy-to-use tutorials to help you navigate your way through these beneficial tools for your business.  Or, get ahold of us!
The Top 5 Hacks of 2021

The Top 5 Hacks of 2021

As technology becomes an integral part of any business, they become more vulnerable to cybercriminals. Therefore, it’s essential to understand that cybersecurity is inevitable as you take your business to the online world. From ransomware attacks to the exploitation of business vulnerabilities, 2021 saw some high-profile hacks that crippled the operations in big companies.

As Wired experts put it, 2021 was the year of ransomware, data breaches, surveillance, and more attacks as criminal gangs became more aggressive. As a matter of fact, anything operating online is a target. Hackers are always looking for ways to make money or have fun by exploiting weaknesses in your systems. Let’s analyze the top 5 hacks in 2021 and what you can learn from them.

1. THE COLONIAL PIPELINE RANSOMWARE ATTACK

In early May 2021, Colonial Pipeline had the most significant cyberattack. Darkside hackers infiltrated their systems, stealing over 100 gigabytes of data and threatened to release it. That forced the largest oil and gas company to temporarily suspend its operations to contain the malware. That not only caused a fuel crisis but also panic in the whole Southeast region. Colonial Pipeline was forced to pay a ransom, but the damage caused was irreversible.

2. TWITCH DATA DUMP

Even though hackers mainly target government and financial institutions, entertainment companies aren’t safe either. In October 2021, an anonymous hacker shared around 126 GB of Twitch data, including its source code and history. The hacker also exposed the company’s confidential documents and the personal information of its users. Most Twitch accounts were compromised, forcing users to change their login information to avoid having their data going public. The hacker attacked Twitch to disrupt its operations and give its competitors an advantage.

3. CNA RANSOMWARE ATTACK

  1. Many companies use this tool for company meetings. It is easy to record the meetings you hold and have files available for later viewing for those who may have missed the gathering. You can easily post these files to a SharePoint site via Microsoft Stream, another program in Office 365.
  2. Gone are the days when you have to collaborate with teams just via email. Teams are a great way to share documents being worked on via SharePoint, as well as receive updates on changes and progress. This cuts down on the amount of emails exchanged in team settings as well.

4. KASEYA VSA RANSOMWARE ATTACK

Hackers exploited a vulnerability in VSA, a software developed by this giant IT service provider company. This attack affected more than 1000 companies, adding to the most significant ransomware attacks so far. These were mainly government agencies and businesses providing IT services. The attackers demanded a $70 million ransom for the decryption of the company’s frozen files. Even though Kaseya managed to restore the IT infrastructure of its clients, the damage caused was devastating. Apart from causing widespread downtime, it led to a Swedish supermarket chain closing and negatively impacted the United States-Russia relationship.

5. JBS FOODS ATTACK

JBS is the largest provider of beef and pork in the US. Its attack shows that hackers do not choose which companies or businesses to attack. In May, JBS suffered a ransomware attack that crippled its operations. They paid an $11 million ransom to regain access to their systems. What caused the attack remains unclear, but the company had to produce an enormous ransom in Bitcoin to the hackers to get the decryption key.

NO ONE IS SAFE: PROTECT YOUR BUSINESS

Hackers are not picky — they strike at the slightest chance. Cybersecurity is vital whether your business is in food, tech, insurance, or any other industry. These 2021 hacks should be a wake-up call for you to comprehensively protect your business from any cyberattack whatsoever. Cybersecurity is a problem affecting both small and large companies, creating the need for organizations to take it seriously and invest their resources in protecting their systems. Imagine paying millions or losing crucial data to hackers? That isn’t good for business.

Let ICS Data help keep your systems secure, protect your company’s data and avoid falling victim to cyberattacks. Talk to our experts for any IT-related information and services. We can help you protect your business from hackers.

Security vs. Compliance: What’s the Difference?

Security vs. Compliance: What’s the Difference?

Business data security and protection has never been this important! Especially in this dispensation of fast digital transformation.

On one hand, advanced technology has got businesses running more smoothly and increasing their conversion rates. However, on the negative side, cybersecurity threats have also grown in sophistication, thanks to the same cutting-edge technology, which cybercriminals are taking advantage of. The result is the need for heightened IT security by businesses and strict IT compliance requirements by regulatory bodies.

But is security just another name for compliance? Is your business secure after you have all those boxes ticked in the compliance document? Let’s explore each and help you remove the blurry line between both.

WHAT IS IT SECURITY?

In a nutshell, it’s the processes and controls involved to ensure your data, systems, and networks are masked against cyber breaches. Generally, security encompasses:

  • Data: Your data storage and transmission media are critical. Every business should have data loss and recovery plans, such as cloud backups. Additionally, proactive network monitoring should ensure that no criminals intercept the data while in transit.
  • Systems: Your systems should be physically protected and, more importantly, digitally protected against malware and attacks. This can be achieved through constant software updates or patching. And regular/automatic system scans to detect an infection/breach early. Besides, as more businesses adopt BYOD (Bring Your Own Device) at the workplace, you should ensure that those personal devices accessing the company network are free from malware or security vulnerabilities.
  • Users: From phishing to reckless errors, users play a crucial role in determining whether your business is secure or not. That is why you should conduct frequent user training about security and ways to prevent attacks.

I.T. COMPLIANCE

Compliance comes into play when third-party regulatory/governmental bodies are involved. Typically, compliance seeks to ensure that your business has implemented the irreducible minimums of various security standards such as HIPAA, GDPR, or PCI. Compliance aims to meet:

  • Industry regulations
  • Security frameworks
  • Government policies
  • Client contractual terms

SECURITY OR COMPLIANCE?

Both. For you to be successful in business, you’ll need to both secure your business and comply with third-party regulatory or contractual guidelines. For instance, to get a DOD contract, you’ll need to comply with CMMC standards that apply to that contract. On the other hand, if you experience a breach due to weak security, you risk the loss of critical business data, revenue, and reputation damage, even if you’re compliant.

In summary, security:

  • Is done for your own sake while compliance seeks to satisfy a third party’s requirements.
  • Seeks to protect your digital assets through risk assessment, monitoring, and mitigation, but business needs drive the need for compliance.
  • Should be frequently maintained, whereas compliance is a one-time event and is complete once the regulatory body is satisfied.

To conclude everything, IT security is the practice of executing adequate technical controls to defend your systems and networks against cybersecurity threats, while compliance is applying these practices to meet third-party regulatory or contractual requirements.

WHAT SHOULD YOU DO?

Whether you’re looking to solidify your security or meet a new compliance threshold, you’ll need a good IT team to implement the required security measures. However, building an effective in-house IT team is not easy, not to mention how costly that may be. Therefore, seeking a managed security solution, such as ICS Data, is wise, practical, and cost-effective, especially for SMEs. Get in touch to get started.

Stay Clear of Hackers This Thanksgiving Weekend

Stay Clear of Hackers This Thanksgiving Weekend

According to pcmag.com, “U.S. Warns Hackers Will Try to Strike During Thanksgiving Weekend“. Moreover, US cyber authorities are urging companies, especially operators of critical infrastructure, to shore up their defenses during the coming holidays.

IT’S ALL ABOUT TIMING…

The root cause of the prediction is entirely based on employees being out for a given period of time, leaving technical infrastructure alone. They also state, “Recent history tells us that this could be a time when these persistent cyber actors halfway across the world are looking for ways—big and small—to disrupt the critical networks and systems belonging to organizations, businesses, and critical infrastructure,” the agencies said.

Ultimately, the authorities are nervous about hackers spreading ransomware to a victim’s network. As you may know, the idea behind ransomware is to cripple your files so that you have little to no access – to which hackers request a “ransom” (money) to open your network back up to you. And of course, there’s always the sweat about having your employees personal data, files, and the businesses most confidential information stolen.

“There haven’t been any specific events made by hackers thus far, but authorities also have noticed these attacks coming during holidays or weekends”, the agencies said.

As a result, the ongoing issue has prompted the Biden administration to make fighting ransomware a national security priority.

With that being said, we recommend your company take action to protect yourself against smaller, minor acts of ransomware and attacks from hackers. It’s only becoming more popular, and the time to protect your company’s assets is now. Get ahold of us today to see how we can help.

Say Hello to Windows 11

Say Hello to Windows 11

PCs are now part of every day, and being in that central position, means you need them to offer various features for maximized productivity. Windows 11 does just that, to bring you closer to what you love.

Windows is always on the front line of the world’s innovation, pushing global business ahead with productivity features. After all, even the web grew out of Windows. It is the place you go to create, connect, learn, and achieve goals.

Windows 11 is ready to take this to another level. Here are some of the highlights that will empower your productivity and inspire creativity.

WINDOWS 11 FEATURED HIGHLIGHTS

  1. Work with ease on fresh, clean, and beautiful new design with modern sounds.
  2. At Start, you have all your content in a single interface. It uses Microsoft 365 powers to show all recent files and all devices you viewed them from.
  3. Multitasking is effortless with the Snap Groups, Desktops, and Snap Layouts.
  4. Connect seamlessly with colleagues, friends, and family using Microsoft Teams integrated into your taskbar.
  5. You also experience the power of AI with the new widget’s features, where you get fast access to the information you need. With the improved performance of Microsoft Edge, you enjoy speed and fast productivity features, allowing you to use the web more efficiently.=
  6. Gamers benefit more from the full potential of the system’s hardware with technologies like Auto HDR, DirectStorage, and DirectX12 Ultimate.
  7. Enjoy a whole new Microsoft Store allowing you to search and discover all your favorite games, apps, and movies in a trusted location.
  8. Windows 11 has new accessibility tools that allow people with disabilities to access it better than ever before.

As the most trusted managed IT service provider, ICS Data strives to keep you up to date with the changes in technology. Although we still don’t offer Windows 11 services, stick around for its rollout soon. Contact us today for any queries.