What Every SMB Should Know When Selecting an IT Service Provider

  • Published byadmin
  • December 29, 2017

What Every SMB Should Know When Selecting an IT Service Provider

Identifying a qualified managed service provider can be challenging–especially if you don’t know what to look for. You should be able to gauge the worth of an IT provider based on a couple of key qualifications, just like you would if you were selecting an employee. What are some of the primary features that you want to look for in a managed service provider?

Industry Experience
For any employee or organization that you deal with, you’ll want to hire only those who have some sort of industry experience that they can call upon. In this case, you’ll want your MSP to have some sort of information technology background so that they know how best to handle your business’s technology solutions. There will always be experience and knowledge that only comes from hands-on experience, so be sure that your prospective IT talent has some to spare.

Quicker Response Times
Have you ever dealt with an IT provider or a technician who doesn’t know the definition of acceptable response time? You always want your technicians to acknowledge when work needs to be done and to complete it within a reasonable timeframe. Time-wasting IT resources don’t provide much value for your organization, and the same can be said for your employees. It might sound cliche, but time is money, and you want the resources at your fingertips who can best manage it.

Scope of Service
You should consider how well-rounded your managed service provider is. What kind of services do they offer for your organization? You’ll find that a managed service provider that’s good for multiple solutions is much more efficient and useful than one who specializes in only one topic. You need to find your business an MSP that can handle a wide range of subjects ranging from network security to disaster recovery, and everything in between.

On-Site Services
Most issues can be resolved without an on-site visit, but you should still insist on a hands-on approach from time to time for more intensive tasks. Your MSP should be willing to make the trip to the office to ensure that they can do their job properly. After all, it’s difficult to get any hands-on work done while not in the office–especially if it’s diagnosing a particular hardware issue that needs an on-site visit to address.

Does your business need help with technology management and maintenance? Reach out to Catalyst Technology Group at (317) 705-0333, your local and reliable managed service provider.

Latest blog entries

Tip of the Week: 11 Security Best Practices Every User Should Know

  • Published byadmin
  • June 23, 2017

Tip of the Week: 11 Security Best Practices Every User Should Know

You might spend a significant amount of time thinking about your business’s security practices, but the same can’t be said for your organization’s employees. Unless you give them a reason to care about security, they likely won’t. The resulting apathy could eventually become serious problems that could hinder operations in the long run, or worse, expose your business to threats that could put your employees and your clients in danger.

In order to keep these instances to a minimum, consult the following cheat sheet. This will give your employees a great way to follow critical best practices.

Essential Cybersecurity Considerations

  • Use the company’s network to store files: Always store your organization’s data on an in-house network. This is because any files stored locally on your desktop might not get backed up. Do not use personal cloud accounts, like Google Drive or Dropbox, to save or share company-owned documents.
  • Never leave your workstation unlocked and unattended: Always lock your computer using the Windows Key + L shortcut before stepping away from it, even if only for a moment.
  • Don’t connect unknown devices to your work PC: This is especially important for small devices like USB drives. You never know what could be on them.
  • Don’t download or install applications without approval: If you download an app without permission from IT or a network administrator, you could cause problems for other employees. Always ask for permission before downloading or installing software.
  • Don’t respond to unsolicited or suspicious emails: If you receive a message that has an unknown or unfamiliar sender, it could contain malicious ransomware or other nasty threats. Be sure to notify IT immediately so that they can investigate the issue. Be especially cautious around unsolicited proposals or resumes.
  • Don’t accept support from unexpected callers: If you receive a phone call from someone claiming to be from Microsoft support (or other well-known companies), just hang up. These callers are often fraudsters hoping to remote into your PC and access company information.
  • Adhere to password best practices: Keep your passwords strong and complex at all times, and never use the same password more than once.
  • Get approval for mobile devices from your manager: Don’t use your smartphone, tablet, or laptop for work purposes until you’ve been granted approval. This is to keep company data as secure as possible.
  • If you see someone, tell someone: If you think that something is out of the ordinary, like an intruder in the workplace, be sure to alert management. Visitors should not be allowed to roam around the office unattended.
  • Think twice before clicking: If you’ve received a link in any correspondence, you should avoid clicking on it until you’re sure it’s from a trusted source. Links can often be considered cyber threats, especially those that are in spam messages.
  • Report issues as soon as they appear: If you experience something that seems troublesome, report the issue to management immediately. Proactive vigilance is the best way to prevent downtime, and it only serves to make your job easier.

Print this list out and hand it off to any employees who could use training on security best practices.

Keeping the business secure isn’t just your responsibility–everyone should be involved in the process. By following this list of best practices, you stand to protect your business against threats that could harm operations. To learn more about how to secure your business, including external technology solutions that prevent issues from transforming into major problems, reach out to us at (317) 705-0333.

Latest blog entries