CoManaged IT Services – An Executive’s Perspective

CoManaged IT services can be defined as a service model that blends internal IT resources with a 3rd party IT provider.  From there, the actual arrangement is customized to the specific needs of the client.  Typically, the 3rd party provider picks up responsibility for specific items or services such as maintaining servers and infrastructure, managing O365 and/or other cloud services, providing escalated support to internal IT or providing security services.  Some arrangements may include all the items above, and some may only include one or two.

For a growing business, CoManaged IT can be an effective approach to handling your internal technology needs.  There are many advantages.  A few of them are:

  • You’re able to keep your current IT employees in place.
  • You drastically “skill up” your IT department by tapping into a more experienced team.
  • It is an overall cheaper solution than hiring additional highly experienced IT employees.
  • The breadth of knowledge that the 3rd party provider brings to the table.
  • Freeing up internal IT to focus on more impactful tasks and services.

When properly setup, the relationship between the internal IT folks and the 3rd party provider becomes extremely effective.  The internal folks rely on the provider AND the provider relies on the internal team.  If a company is large enough for a comanaged arrangement, it is probably too big for a completely outsourced model.  With this in mind, it’s easy to get past any notion that the service provider is there to take the job from the internal team.

Finally, by having a working relationship with a service provider, you are covered should an internal IT resource decide to leave.  The provider can cover IT issues while a replacement is found.  In fact, they can assist in the hiring process where the hiring manager is not familiar with IT job skills.  Remember its just as important to the provider that a high quality replacement is found as it is for the client.

Atlantic Computer Services is a Wilmington, NC based MSP who specializes in CoManaged IT services.  Let us be a resource for you and your internal team to manage your IT needs efficiently and effectively.  For a no obligation discovery call or meeting, please reach out to us.  910-799-6538 or sales@acs-ilm.com.

Fake Copyright Infringement Emails Used To Spread Malware

Hackers found a new way to slip malware past your defenses.  Researchers around the world have spotted a curious new campaign designed to scare victims by sending them emails warning of copyright infringement.

The email begins by warning that the recipient’s website is hosting copyright-protected content and threatens legal action if the offending material isn’t removed immediately.

The red flag here is that rather than simply spelling out what materials are copyright protected in the body of the email, the attackers include a ZIP protected archive file which supposedly provides the details.

Naturally, anyone who gets scared into opening the archive will not find any details. Rather, they will have inadvertently opened the door to allow LockBit 2.0 ransomware to be installed on their machine.

Worse, if that machine happens to be connected to your corporate network, the malware will spread laterally from there while infecting and locking files on as many devices as it can manage.

It’s a clever bit of social engineering.  Nobody wants to run afoul of copyrights, so the hackers are playing on common fears and the current campaign is well organized.  Not only are the emails slickly put together, but the hackers are using one of the most prolific ransomware strains out there.

You’re probably not actually displaying copyrighted materials on your website. Even if you were, the content in question would be mentioned prominently in the body of whatever email you got from the owner of the copyright.

Be sure your staff is aware of the current campaign.  Once someone opens the archive, it’s too late and your company will probably be facing some downtime, not to mention the loss of trust you’ll suffer.  It’s just not worth the risk.  Stay safe out there.

Conflict Resolution In The Workplace

Conflict in the workplace is sadly inevitable.  Put a group of people in a room together for eight hours or longer every day, week after week. No matter how well they get along, sooner or later, it’s going to happen.

Since it can’t be completely avoided, the next best thing is to have a plan for when it occurs. That’s because if left unaddressed, employee conflicts can ruin morale and permanently damage your company’s culture.  Simply put, letting conflicts in the workplace fester is a very bad idea. The question is what can be done about it?

You’re in luck!  Just below, we’ll outline a few simple things you can do to resolve workplace conflicts before they get out of hand and cause lasting damage to your company.

1 – Address It Head On

When you see two of your employees feuding, they will most likely be sniping at each other with barbs or insults and it may be either in person or via email. No matter what, it is important to address it right away.

Meet with all the participants of the conflict and find out what’s behind it.  There are only two possibilities here and it’s either personal or it’s professional.

2 – How You Address It Matters

In the case of personal differences driving the conflict, you can likely just meet with both parties at the same time.  Sit them down and remind them to keep the personal stuff out of the office.

If it’s professional, it may be best to meet with each side separately so you can get each party’s side of the story and assess from there. Then, involve HR at that point if necessary.

3 – Listen and Seek Input

After hearing from the parties involved about what’s driving the conflict, ask each of them how they’d like to see the issue resolved.

Sometimes, nothing comes from this when both parties may have unrealistic expectations. However, more often than you might think, a solution presents itself from that conversation.

There are several other things you can do to help resolve workplace conflicts, but if you do nothing more than adopt the suggestions above, you’ll be miles ahead of most managers!

Android And iOS Network Protection Added With Microsoft Defender

Recently, Microsoft added a new feature for Microsoft Defender for Endpoint (MDE) which has fans of the product cheering.

Once the new “Mobile Network Protection” feature is enabled on the iOS and Android devices you want to monitor, the security platform will provide the same robust protections and notifications that your other network devices currently enjoy.

The company had this to say about the recent addition:

“As the world continues to make sense of the digital transformation, networks are becoming increasingly complex and provide a unique avenue for nefarious activity if left unattended.

To combat this, Microsoft offers a mobile network protection feature in Defender for Endpoint that helps organizations identify, assess, and remediate endpoint weaknesses with the help of robust threat intelligence.”

This new feature is part of a larger, ongoing effort by Microsoft to expand Defender for Endpoint’s capabilities and provide an umbrella of protection that extends across multiple platforms.

Given the complexities of today’s network security environment, we’re thrilled to see tech giants like Microsoft taking bold steps to help simplify, and a cross platform security solution is seen by many as being the Holy Grail of the industry.  While it’s certainly true that Defender for Endpoint isn’t that yet, it’s clear that Microsoft is interested in seeing it become that.

Again, from Microsoft:

“With this new cross-platform coverage, threat and vulnerability management capabilities now support all major device platforms across the organization – spanning workstations, servers, and mobile devices.”

In addition to this new capability, the Redmond giant has also added a feature to MDE that allows admins to “contain” unmanaged Windows devices on their network if they are compromised, or even if there’s a suspicion that they might be.  This is in a bid to keep hackers from abusing those devices and moving laterally through corporate networks.

All of this is great news indeed and if you’re not yet taking advantage of Defender for Endpoint, we recommend giving it serious consideration.

The Windows 11 Apps That Use Your Microphone And Camera

Are you a member of the Windows 11 Insiders group?  If so, then you already know that you get a sneak peek at all the cool new features the engineers at Microsoft are building into the new Operating System.

If you’re not yet a member of that group, then this announcement might entice you to join.

In a June Windows 11 Preview Build, the company added a new privacy feature that keeps track of apps that have access to your microphone, camera, location, and the like.

To view your installed apps and which ones have access to what, activate your Windows 11 Settings app and look under Privacy & Security.  There, you’ll see a section labeled “App Permissions” as a “Recent Activity” dropdown menu.

You’ll see a complete listing of apps stacked against every tracked category of information, putting it all right at your fingertips.

This is the latest of the new security features that the new OS will sport.  In addition to this, the company is also planning to make improvements to Microsoft Defender that will make it better at blocking phishing and malware attacks against users.

On top of that, Microsoft is currently developing a Personal Data Encryption feature that will protect users’ files when they’re not logged in by blocking access to that data until the user authenticates via Windows Hello.

Finally, the company is flirting with the notion of enabling both Credential Guard and Local Security Authority by default. Although, they have not made a firm commitment to either of those at the time this article was written.

These feature additions stand to make Windows 11 the most secure OS that Microsoft has ever offered.  We’re looking forward to seeing how Windows 11 is accepted by the broader public.