Bryley Systems introduces Joan Lunman, Internal Systems Advocate

Bryley Systems introduces Joan Lunman, Internal Systems Advocate

Bryley Systems is pleased to announce that Joan Lunman has joined the company as Internal Systems Advocate.  She has over 10-years of experience in the IT Service industry, having most recently worked at TAB Computer Systems Inc. in East Hartford, CT.

Joan has an excellent understanding of day-to-day operations as well as the functions of ConnectWise, the leading, IT-oriented, Professional Services Automation tool used at Bryley Systems and many other firms.

Joan has a BA from Potsdam State University in Potsdam, NY.

Profile Picture of Joan Lunman

 

November Coffee Connections at Bryley Systems

Please join Bryley Systems as we host the Assabet Valley Chamber of Commerce (AVCC) November Coffee Connections, an early-riser networking opportunity.

The November Coffee Connections is on Friday, November 20th, from 7:30am to 9:00am in our office at 12 Main Street, Hudson, MA.  There will be refreshments and door prizes while you network with over 50 professionals.  Plus, you will have an opportunity to introduce yourself and your organization to all that attend.

The event is complimentary, but space is limited, so reservations are required.  Free, two-hour parking is available on Main Street and on nearby side streets.

Please email Info@AssabetValleyChamber.org and ask to register for the November Coffee Connections at Bryley Systems.

Hope to see you then!

WRCC Coffee Connection

The Internet of Things (IoT) – Something old, something new???

Pardon my skepticism, but it seems like IoT is just another catchy phrase to describe something that has been around for a while.

Coined in 1999 by Kevin Ashton, IoT refers to the connection of devices like house- hold appliances (washers, dishwashers), transport vehicles (automated carts and vehicles), sophisticated equipment (heart-monitoring implants), etc. to other devices or users through the Internet.  Basically, these items operate autonomously, but can report on their status and can permit adjustment, intervention, and remote control while performing their programmed duties.

Wikipedia describes IoT as “…the network of physical objects or “things” embedded with electronics, software, sensors and network connectivity, which enables these objects to collect and exchange data… resulting in improved efficiency, accuracy, and economic benefit.  Each thing is uniquely identifiable… but is able to interoperate within the existing Internet infrastructure.”

There are many older IoT-type applications already in use:

  • A Coke machine reported on quantities and temperature. (This was first demonstrated in 1982 at Carnegie Mellon University.)
  • Home-based equipment, from your shades to your alarm system, can be controlled from your smartphone (since the 1990s).

What exactly is new?  Growth!

These early attempts were focused primarily on single applications for a limited audience; they basically feed unprocessed data forward or permitted single-user control.  Current IoT efforts dream of utilizing big-data processing to unite information and disparate devices with a large population of users.

New and useful applications will arise and be connected, linking us to a brand new world.  And, it will not be just embedded electronics in stationary devices, but also wearables (watches, health monitors, wireless cameras, etc.) and drive-ables (from vehicles with embedded computers to Google’s driverless cars) making up the IoT population.

The expectation is somewhere between 26 billion (Gartner says the Internet of Things will be 26 billion by 2020 by Gartner, Inc.) to 30 billion (More than 30 Billion devices will connect wirelessly to the Internet of Everything by ABI Research) IoT devices will be functional by 2020.  Interestingly, the USA, at 24.9 online IoT devices per 100 inhabitants, currently lags behind South Korea (37.9), Denmark (32.7), and Switzerland (29.0) according to the OECD’s Digital Economy Outlook 2015, Chapter 6; Figure 6.6.

IoT Usage By Nation Chart

Issues

With tremendous growth comes great and, sometimes, undesired consequences.  Issues being discussed and addressed include:

  • Data will explode, requiring greater storage, access, and processing
  • Internet bandwidth will be consumed and, at times, found lacking
  • Wireless networks should expand and improve
  • Security may be compromised
  • Legal challenges shall multiply
  • Electricity use will change
  • Privacy will be invaded

Data will explode, requiring greater storage, access, and processing

Where is all of this data going to be stored?  Who will have access and how will it be enabled?  What processing capabilities will be required to make sense of it all?  After its useful life, how will data be removed (or at least archived)?

Internet bandwidth will be consumed and, at times, found lacking

Seems like bandwidth is already constrained in my home; will I need to unplug my refrigerator to watch Netflix?  Will there be enough bandwidth not only inside the home or office, but also connecting the home/office to the Internet?  Will Internet Service Providers be able to handle this coming surge in demand?

Wireless networks should expand and improve

Things don’t connect unless they are wired or have available wireless access:  Will wireless networks be there when they are needed?  Will they be able to provide sufficient bandwidth and coverage areas?  Who will own them?

Security may be compromised

How will you safely authenticate devices against other devices and against multiple users?  Can these devices be patched and/or updated in a secure and consistent manner?  What if you purchase a smartHome and the previous owner does not release the smart technology; will you need to replace these items, or will there be a master override?  (Marilyn Cohodas comments on some of these issues in her article: “4 IoT Cybersecurity Issues You Never Thought About” in the 9/24/2015 issue of InformationWeek DARKReading.)

Also, a July 2014 study by Hewlett-Packard found that six of 10 popular IoT devices surveyed were vulnerable to significant security issues and that seven of these devices used unencrypted network services.  (See the article: “Popular Internet of Things devices are not Secure” by Lucian Constantin in the 7/30/2014 edition of ComputerWorld.)

Legal challenges shall multiply

What if your home-based device sent forth information you agreed to provide, but other family members of visiting friends did not wish to provide?  Who is liable when this information ends up in the wrong hands?

Please review “Top 5 Legal Issues in the Internet of Things, Part 1: Data Security & Privacy” by Brian Wassom at Wassom.com.

Electricity use will change

Unless unplugged, electronics-enabled devices are connected 24×7, consuming electricity the entire time.  Multiply this usage against billions of devices and our power needs and power consumption may change dramatically.

One promising note:  Energy use will be monitored closely, with the likely result that optimization will occur, balancing power generation with energy use (and even decreasing energy use in some situations).

 

Privacy will be invaded

When my blender rats me out and tells the world that I made a chocolate shake after midnight, what will manufacturers conclude about me and my habits and who will they tell?  Also, can I trust these manufacturers to use my household data wisely and keep it secure? Do standards exist to protect me from snooping?

 

See Brian Wassom’s article: “The Internet of Things that Eavesdrop and Invade Privacy” on 7/30/2015 at Wassom.com.

Evolving regulations and standards

Fortunately, the US Federal Government is addressing these areas with new insights and rulings:

Organizations and manufacturers are also upping the ante:  IBM, Cisco, Microsoft, and many others are all weighing in with new technologies, products, and services.

The IoT is here now; it will get better with time, but make sure you know the risks and potential consequences when you enable it in your home or office.

Discover the Top 5 Barriers to Business Growth with mPower Advisors

Are you worried about missing critical milestones or goals?  Do you want to avoid the next unknown pitfall?  Or, do you want to transition out of your business smoothly?

Join Dave Clough of mPower Advisors for a one-hour webinar: Top 5 Barriers to Business Growth (and How to Break Through Them) on Wednesday, October 14, from 2pm to 3pm.

Learn to predict how growth will impact your company, identify growth issues before they appear, and get a Road Map to help guide your way.  Get an overview of a system that provides predictable growth for your company.

Dave Clough has been a Business Advisor for over 11 years, helping over 70 companies grow.  He is certified from TTI Success Insights: DISC, Motivators, TriMetrix HD, Emotional Intelligence, Stress, and Stages of Growth.

Strengthen your privacy settings in iOS 8 by Laurie Lake – Macs at Work

Macs at Work of Shrewsbury, MA is a trusted and valued business partner; Laurie Lake is their Operations Manager.  Her article, “Strengthen your privacy settings in iOS8”, appeared in their October 2014 newsletter.  (Sign up for their e-newsletter.)

The minute you download and install iOS 8, the latest version of Apple’s mobile operating system for iPhone and iPad, you should take note of these privacy steps in order to lock down your device.

iOS 8 has a number of new features tied to your location. It also has new privacy settings, allowing users to limit how long data is stored for, such as message expiry features and new private browsing settings.

Before you do anything like customizing your phone, loading new apps, or syncing your data for the first time, these settings need to be checked, and if necessary, changed.

  1. Limit apps from tracking your location in the background

Some apps will ask to use your location in the background — even when you’re not actively using it. If you see this message, it means an app wants to keep using your location. You may see popups and other notifications from the app, depending on where you’re located.

For privacy, select Don’t Allow when it displays. You may have to do this a number of times with different apps. You can always change this setting in your device’s settings.

  1. Prevent apps from accessing, uploading your data

Your contacts, email, calendar, and your photos are some of your most personal bits of data. You can set apps to access this data when it needs it — such when Twitter’s indicates a contact of yours has joined the microblogging service.

However, in many cases these apps upload your contact list to their servers. This can drastically invade your privacy if that data is stolen. Go to Settings > Privacy and select each app, like Contacts, and swipe on or off which third-party apps you want to grant access to.

This may take a while depending on your apps. If you have already granted an app access to your contacts, or other personal data, switching off the service does not mean that service will delete your data. You will have to contact that company or app maker for this.

  1. Enable Find My iPhone for lost and stolen devices 

If you lose your iPhone or iPad, you can generally find it again with the Find Your iPhone app. It displays on a map where your device is, which can be handy if it’s stolen. You can provide that to law enforcement in such a case. Head to Settings > iCloud > Find My iPhone (or iPad) and make sure that it is switched on. You may need to enter your device passcode to authorize this.

Also, by selecting Send Last Location, with less than 1 percent of battery life left, your device will update Apple’s servers with the last location — just before it powers down.

  1. Allow iMessages, voice and video to expire over time 

New in iOS 8 are voice and video messages, sent through Apple’s data-based iMessage network. These can be stored on your device indefinitely. But if you lose your phone, and do not have the security or protections enabled, anybody can scroll back weeks, months, or even years to see your old conversations.

At any rate, it’s good to keep local or iCloud-based backups for your old data.

To reduce the time in which iMessage data is stored on your device, go toSettings > Messages > Keep Messages, and select the time you wish to retain your messages.

Go back a step and check the Audio Messages and Video Messages as well. These options offer shorter life-spans.

  1. Prevent sharing your location to others 

Although a handy feature, if you are in a busy place, such as a town, city, or crowded indoor venue, it acts as a beacon for your location. If you decide to switch this option off, head to Settings >Privacy > Location Services > Share My Location. From here, you can disable it. You can also decide to share other device locations that are connected to your iCloud account.

  1. Prevent iPhone location-based tracking 

Some iOS 8 system services track your location for advertising, location-based alerts, and for enhancing your cell coverage. Not only can they be a drain on your battery life, they can also open you up to heavy-duty location tracking — even if third-party apps and services are not involved.

Although one for the paranoid, you can change these options in Settings > Privacy > LocationServices > System Services and select which services you wish to disable.

The best one to keep enabled is Find My iPhone. Others like Spotlight Suggestions for better search results are generally better than the location-based advertising services for example.

  1. Limit advertisers tracking your location, data 

Safari had a mini-makeover in iOS 7 and iOS 8, and now offers a number of privacy-related tweaks. One of the key ones relates to advertising, which can track and monitor your location.

A little tricky to find, as it’s not in the Safari settings, you can head to Settings > Privacy >Advertising and enable the Limit Ad Tracking option. From here, make sure you hit the Reset Advertising Identifier option, and then accept any prompts.

  1. Enable fingerprint security with Touch ID 

Fingerprints and thumbprints are a near-perfect way to secure your device.

To begin, you need to go to Settings > Touch ID & Passcode. Once you follow the prompts for the first time, you can enroll your finger or thumbprint. Make sure the Phone Unlock setting is enabled. For maximum security, set just one finger.

  1. Set a stronger 8-digit backup password

As a backup, you can still use your passcode. But the four-digit “simple passcode” is weak. By going to Settings > Touch ID & Passcode, and entering your existing passcode, you can deselect Simple Passcode. From here you can set an alphanumeric code, or a longer 8-digit (or longer) — which isn’t highly publicized.

If you set a stronger passcode that is just numbers, a numeric-only passcode entry will display on the lock screen in future. This is stronger, and protects your device’s security, but is also easy to enter with one hand and a larger numerical keypad.

  1. Limit what is displayed on the lock screen. 

You can also change which personal items display on the lock screen, including preventing unauthorized users of your iPhone or iPad from replying to your messages by going once again to Settings > Touch ID & Passcode, you can limit what is available on your lock screen. For the best privacy, all items should be disabled. But, you can customize this depending on your preferences.

The value of outsourcing IT

Many organizations invest in Information Technology (IT) as a strategic advantage; others see it as an expensive necessity.  We tend to favor the former perspective, but empathize with the latter; although IT can consume significant financial resources, it is a cornerstone of most modern organizations.

Either way, a key decision is whether to keep IT internally within the organization or outsource it to a Managed IT Services Provider (MSP) like Bryley Systems.  With an MSP, the basic tenet is a long-term relationship between the client and the MSP with an agreement that details types and levels of service at a fixed amount.

We reviewed some considerations of outsourcing in Outsourcing IT in the May 2014 issue of Bryley Information and Tips, but what of its value?

Let’s start with the players, their interests, and their capabilities.

The primary player:  The Client

The client has technology needs and issues, from end-user oriented (“Please show me how to rename a file.”) to network-level critical (“The Internet is unavailable.”) to business based (“How do I plan and budget our technology requirements in a world that is constantly changing?”).

The client has a limited technology budget spread across at least these areas:

  • End-user equipment and applications – Potentially an area of frequent change; typically a three to six-year lifespan with ongoing maintenance
  • Network equipment and software – Relatively stable, but some replacement required on a four to eight-year basis with ongoing maintenance
  • Cloud resources – Fairly stable; requires periodic payments, typically on a per-user basis
  • Security – Often under-invested, especially in the need for multi-layered defenses and ongoing security training
  • Support – Fairly stable in an MSP-supported environment
  • Training – Often neglected, but useful to boost productivity

The client seeks a stable, reliable, optimized IT environment; one that is patched appropriately and is secured against external and internal threats.

The second player:  The MSP

The MSP has a competent, stable, well-trained, and certified technical team with different levels of capability:

  • Technicians supporting end-user environments (PCs, MACs, mobile devices)
  • Engineers servicing back-office/Cloud networks (servers, firewalls, routers)
  • Consultants providing high-level planning, design, and troubleshooting

The technical team works closely with an account-management team, which owns the client relationship and maintains communications while advocating on behalf of the client.  The account-management team discloses the client’s interests and requirements within the MSP; they also set client expectations based on close alignment with the technical team’s schedule and availability.

The MSP spreads its resources across a manageable number of clients, typically assigning an account and technical person to each client.  Exceptions within the client’s environment are noted and shared, allowing others to assist when the assigned personnel are unavailable.

The billing is periodic, usually monthly, providing predictable, recurring revenue to the MSP to support its operations and finance its constant improvement.

The MSP is led by capable, experienced management utilizing a holistic service-management system for ticketing, account-management, reporting, etc.

Next:  What did the survey reveal?

CompTIA, a respected, IT-industry trade association, surveyed 350 companies in June 2015 to compile its Fourth Annual Trends in Managed Services Study.  Their results include:

  • 68% had used an outside IT firm in the last 12 months
  • 64% believe they use an MSP for at least one operational function
  • Six in 10 said it was a collaborative effort with the internal IT staff
  • Many seek efficiencies and competitive advantage in addition to cost savings

Most use their MSP in these areas*:

  • Repairing/troubleshooting IT systems
  • Deploying/installing/integrating
  • General IT consulting
  • Cybersecurity

*Please see “CIOs give Managed IT Service High Marks” by Dennis McCafferty ofCIO|Insight.

Finally:  Where’s the value?

Value is not hard to define, but sometimes difficult to quantify.  Value can often be in the eyes of the beholder, having greater weight with one and less with another.

The easily discerned areas of value include*:

  • Highly competent resource to efficiently resolve difficult issues
  • Service Level Agreement (SLA) with detailed response times
  • Predictable support budget
  • Proactive, 24×7 coverage
  • Team approach
  • Reporting

*Please see 7 Advantages of Managed IT Services by Chase Moritz of Heartland Technology Solutions.

Some of the other, less-quantifiable considerations that come with outsourcing:

  • Secure, stable environment from well-honed best practices of the MSP
  • Strategic, flexible partnership with ongoing counsel
  • Supplement to existing IT team (if any)

For the client, our recommendation is to establish and maintain a strategic relationship with an MSP of similar perspectives and sufficient resources, one that can respond when needed, but acts proactively to manage, optimize, and secure your IT environment.  In a mid-sized IT environment, say 25 to 85 technology users, the typical IT challenges can be met by the MSP at a fraction of the cost of having a comparable team on your payroll.

Bryley Basics: Current VPN issue with iOS 9

If you currently use an Apple device (iPad or iPhone) with a Static IP address, please do not yet update to the new iOS 9 software. There is currently a problem on Apple’s end where the new software is not compatible with a Static IP address and you may lose your VPN connection.

If you have any questions or concerns, please contact our technical-services team at TechSupport@Bryley.com or via 978.562.6077, option 1.

Technology roundtable at the Central Mass. Business Expo

Please join our panel of local IT experts for Examining the Cloud, Mobility, and Data Security, an information-technology roundtable at the Central Mass. Business EXPO (CMBE) on November 5th from 2pm to 3pm at the DCU Center.

Information technology is a strategic concern of business owners and managers.  Our panel will address timely issues, such as the future of cloud computing, how to empower a mobile workforce, and how to protect your data.

The panel includes:

The Central Massachusetts Business Expo is presented by the Worcester Regional Chamber of Commerce.  Use hashtag #CMBE2015 or visit CMBE on Facebook.

A (mostly) true tale: The Company We Keep (or From Buses to Beer)

Cathy and Gavin Livingstone, owners of Bryley Systems, a Managed IT Services Provider (MSP) ranked in the top 500 MSPs worldwide, went to dinner with friends.  While entering the restaurant, a WRTA (Worcester Regional Transit Authority) bus drove by; Gavin said to the couple: “Hey, that’s our client!”

The couple was impressed.

During the meal, the couple mentioned that they were planning a retirement party at a golf club. Again, Gavin said: “Hey, that’s our client!”

The couple was extremely impressed.

When the drinks were served, Gavin held up his glass of Spencer Trappist Ale and said: “Hey, that’s our client!”

The couple was speechless.  Finally, the husband lifted his glass and replied: “Bless the Trappists for this great beer and kudos to Bryley for keeping the abbey online!”

Another possible interpretation: After a drink at the club, better take the bus home.

Introducing Microsoft Office 2016

Microsoft Office 2016 for Windows should launch on September 22nd; the Macintosh version released in July.  After this upcoming release, perpetual licenses of Office 2013 and earlier versions will be difficult to acquire legally.

Significant changes include:

  • Create, open, edit, and save Cloud-based documents
  • Real-time co-authoring
  • New Tell Me search tool

Not so significant features include:

  • Contextual-information via Insights
  • Data-loss prevention
  • Colorful themes

Requirements:

  • Microsoft Windows 7 or later
  • Exchange Server 2010, 2013, or the upcoming 2016

The last requirement, updating Exchange Server to support Microsoft Office 2016, will take some planning and effort and should be completed before deploying Microsoft Office 2016.  Note:  The Autodiscover service within Exchange Server 2010 and 2013, which has a default configuration suitable only for simple networks, may also need to be reconfigured and republished.  (For example:  An organization with VPN users will likely need to adjust the Autodiscover service on their Exchange Server.)

See the article Office 2016 for Windows expected to launch on September 22nd by Tom Warren of The Verge.