Empowering IT Support to Deliver Efficiency, Reliability, and Satisfaction Across Every Interaction
Mobile Device Management, or MDM, is the term used in reference to managing your fleet of devices corporate-owned devices, from both hardware and software perspectives. An MDM allows your team or IT department to do a multitude of things. As an MDM admin, you have the ability to conduct inventory on all devices, like laptops or mobile devices purchased. You’re also able to push updates remotely, wipe/lock devices in the event they’re stolen, and much more. Whether you’re a school district deploying hundreds of tablets or a workforce with 100+ laptops deployed to employees, an MDM can be the perfect solution for your organization.
The reason that this is important above all is it gives you visibility and management over your companies’ fleet of devices, effortlessly. It ensures all assets are in one place, while also giving you practical control over how you want your IT environment to be set up. MDM helps roll out policies that make companies, and in turn, their employees, more secure and efficient. To better understand why you would want an MDM implemented, we must dive more in-depth as to what they can do. While there are many MDM solutions out there, they all tend to offer these basic arrays of features and capabilities.
This, among many other things, are just a small part of what MDM’s are capable of. Above all, they help streamline processes, and in turn, save time, money, and hassle across the board from your HR to finance and IT teams.
With how robust and powerful an MDM can be, it’s important to also understand how they work to provide peace of mind to both the users and teams’. While every MDM varies at the technical level, a majority are based on the same foundation. The MDM provider installs an agent and/or a device profile on the device. That agent can be manually installed by your admin, enforced during users’ enrollment, or automated from the purchase point. Once that agent is installed. it adopts a profile set by your admin, which then periodically checks into the MDM software to ensure policies are deployed properly and the profile is up to date. So, for example, if your company decides they need to roll out Zoom company-wide, your MDM admin can simply add that app to the company-wide profile on the MDM and push it out to remotely install as soon as a connection to the internet has been made on each device.
On top of that, it can do this via a secure connection to ensure all data is protected along the way. The device and profile information is then stored on your MDM provider’s servers for you to access and whomever else you grant access to. The users don’t see anyone else’s device or have access to the MDM’s dashboard.
Like most software, MDM prices will vary depending on what is needed and features are being requested. Most usually charge you at per device rate either monthly or annually.
At the end of the day, it’s worth asking yourself:
-What features do I need out of an MDM?
-How many devices do we have?
-Will the time saved from an MDM make up for the cost of it in itself?
Definitely! It’s important to know what platforms they support, what their technical support is like, and if will do all the things you need it to do. All in all, an MDM can be a solution to multiple problems that many organizations face. Problems such as inventory management, security updates, compliance, onboarding, offboarding, and more. With that being said, here’s a preview of some of the top MDM providers Network Right recommends.
Apple Based MDM Providers
Cross-Platform MDM Providers
If you or your company is interested in implementing an MDM solution, please reach out to us at hello@networkright.io and we’d be happy to help!
October marks the start of Cyber Security Awareness month so there’s no better time to revisit some common security tips & practices! At a time where many are in remote or work-from-home environments, it’s important to help protect your workforce, assets, and data.
One of those common attack vectors despite being the most common can be the most effective, phishing. Phishing is the act of pretending or falsifying information in order to get the recipient to reveal sensitive data such as banking, company info, credentials, and so on. While this commonly gets bundled as spam email it’s worth noting that phishing attacks nowadays can be complex & surpass certain spam filters. So here are some tips from the Network Right team to help protect yourself & your employees when it comes to Phishing attacks.
A very common rule when it comes to email phishing attempts is to do a twice-over of all the details of the emails. Noticeable things such as :
That said it’s worth being aware that there’s such thing as domain spoofing. This is where the spammer in question can pretend to be a part of your domain user@domain.com. Making it hard to 100% tell if the email is legitimate or not. While IT admins can do things to help prevent these (Such as implementing filters in G-Suite & so on) it’s always a chance for spammers to leverage this. It’s best for the IT department to preemptive about this and ensures most filters or security policies are in place before any phishing attacks. However, for users knowing this is possible in the first place is the most important step so you can be aware of it.
Often a common attack method is to pretend to be a service or app users may use or be the admin of & attempt to contact users & urge them to change certain credentials or add billing info.
Always be aware of any email in which a company asks you to confirm billing info such as credit cards, reset your password when you didn’t manually request it, and so on. While there are legitimate ways to get these emails it’s always a safe bet if your unsure to go to the site directly & change such info versus clicking a link in an email especially when it’s unwarranted or disguised in an email telling you that its urgent to do so.
While spammers get email addresses from a variety of methods it never hurts to be cautious of whom & what services you give your email to. Often times we’ve seen even legitimate companies have info leaked where users’ emails get out to the public & thus added to these lists that end up spamming users. So while it’s at times unavoidable always do your best to be aware of what services you sign up for.
In the event, you or your employee fall victim to a phishing attack these are some ways you can better prepare & react to when it occurs.
Given the climate we’ve been in for the majority of 2020 security is more important than ever when it comes to Infosec/IT. Seeing as employees may be working from home or outside networks is more important than ever to practice implement certain measures to help secure your employees & your company data. Here are some ways we at Network Right recommend & help implement across our clientele in these remote times.
One of the most common ways of protecting your employees at home is to implement some sort of VPN. A VPN helps encrypt your employee’s data across the internet & secure all information that’s transferred. This setup can be as simple as looking to integrate a solution such as OpenVPN or NordVPN for your team to help encrypt their traffic or going as far as implementing a full hardware/onsite equipment at the network level to have your employees connect just as if they were at the office. Enforcing certain rules such as only being able to access certain company resources or files while on said VPN.
A VPN is useful across many spectrums, it encrypts traffic end to end ensuring all work they do is secured whether they’re on public or home wi-fi. Given the amount of data we’re sending nowadays as well as the increased work from home, the internet as a resource is one that’s become very essential. How your employees connect & send data over the said connection is equally as important & why you may want to consider some level of VPN setup.
Commonly referred to as an MDM this tool comes in handy in a multitude of ways when it comes to protecting your employees. Not only does it let you track assets & push out updates/apps but it also lets you remote wipe computers in the event they’re lost or stolen.
This is important because given the remote climate laptops may be more vulnerable to accidental damage or even theft. Ensuring your team has an MDM in place allows IT to remotely wipe the machine or even go as far as to track it. Popular MDM’s like JAMF for Mac or InTune for Windows allows all sorts of controls over your companies fleet of machines & is an investment worthwhile from productivity to security in this remote climate.
A security measure we commonly put in place for our clients is 2FA or some level of multi-factor authentication. This feature ensures that there are at least two methods of verification when logging into an account. So for example outside of entering your companies email password, you would be prompted for a code that’s texted to your phone. This creates a second step to login into the account, so in the event, someone compromised your password to a critical login there’s a backup. 2FA is flexible & can be triggered for example only when you log into an account for the first time on a new device or a different location.
While it may not be as common in a work from home setting you can invest in physical security procedures to help your remote workforce stay safe & protect their hardware. While some of these implementations may be over the top for certain setups we understand that different companies have certain data protection policies in place & protecting that asset is a top priority. So here are some methods to do just that.
Thus why now more than ever as employees are a mix of work or personal machines, accessing accounts on home networks, and from a nontypical location, 2FA is vital to securing account access. Ensuring outside parties can’t get in even with access to a user’s password or account off the bat.
With the remote workforce at an all-time unfortunately so are scams. Nefarious parties trying to get people to log in to fake portals, compromise sensitive data, or just outright gain access to company hardware all amidst these work from home times. This is why it’s important for you to keep your employees up to date & remind them of proper phishing/spam hygiene. Sending out information & resources to ensure they avoid said scams they may get via e-mails and what not while working from home.
Tips such as:
As time goes on in this work from the home state, there will always unfortunately be those trying to exploit said times. So doing your best to keep your team informed & aware is a key step!
On that same token ensuring not just the physical but digital aspect of your employee’s machines is protected is vital. While we may not always be able to control the environment in which an employee connects to a secured network or user behavior we can help prevent attacks through Anti-Virus or Endpoint management deployment. Deploying anti-virus/malware software like Sophos, Malware Bytes, and many others allow us to remotely scan assets & ensure no nefarious programs or software has infected the systems. It also helps prevent users from accidentally getting exposed to scams or malicious downloads. Remote or not it’s a good practice to deploy some form of endpoint protection to your fleet & there’s no better time than now to ensure company data is protected at the digital level.
At the end of the day, everyone has different living situations. That said though the climate we’re in may not be optimal, it doesn’t mean there aren’t things we can do to help protect our employees & the companies data. Whether it be a home network or users on personal devices there are always ways to help secure & make it a safer & seamless experience for your workforce in these already difficult times. These are just some of the many steps you can take to further protect your remote workforce. At Network Right we help ensure our clients & their team are secure & safe amidst this work-from-home period. As in keeping them safe, we help protect the company’s valuable assets & allow them to continue their work efficiently.
Reach out today if you are interested in implementing any or all of the above at your company today to help everyone be more safe & secure in these already difficult work-from-home times.
The popular conferencing app Zoom has pushed an important update that as of May 30th, 2020 will be a mandatory one. Amidst the backlash they’ve got in response to security concerns Zoom’s 5.0 update will introduce full GCM Encryption for all communication through the app & a series of other features such as host controlling the ability to lock the meeting after participants join, enable/revoke access to features such as screen sharing & more all in one place. All to ensure that the app is much more secure & features are conveniently available for users to prevent unwanted parties from joining their calls.
Follow the instructions below to ensure you on the latest 5.0 update on your machine prior to May 30th to avoid any interruptions in your workflow.
3. Run any update that is 5.0 or later
PC or Windows users can simply open the Zoom app & click on your profile icon & look for “Check for Updates”. Chances are you may already be on a 5.0 version but there may be a later update available in any case it’s worth updating to the latest version.
For those administrating your organization’s Zoom, there are some checks you can run on your end depending on the setup. If you’re using Zoom Rooms, Zoom will auto-push an update on May 29th prior to the mandatory 5.0 requirement. However, if you want to push the updates ahead to avoid any issues, you can do it into your Zoom Admin dashboard & under Zoom Room Management push out any updates needed ahead of time.
Additionally, Admins can use the user management section to filter user App versions & ensure all users are on 5.0 or newer. This also helps to find any users who have yet to push the updates so that you can reach out or send reminders to update prior to the May 30th date.
These updates are vital to ensure proper workflow as Zoom calls won’t be permitted unless users are on said version. All of this however is in part to assure users are safe & secure when using the Zoom platform.
We at Network Right understand that the world of technology is ever-evolving. One benefit of that is the tools that allow us & our clients to work remotely and outside of the office. Whether it’s from home, at your local coffee shop, and so on. Given the recent situation with COVID-19 we understand our client’s desire to implement mandatory work from home policies. This transition for some can be tough & a new environment so we wanted to help & share our tips to working from home or remote regardless of the situation.
All while keeping in mind everyone works differently. This isn’t to argue what is a more productive workflow or setup rather shed some potential tips that can help you ease into this transition or integrating it into your own routine.
This varies depending on your environment but for those working from home if at all possible we recommend designating some sort of area for work. Think of this area as your personal workspace/desk at home. It can be a desk or table, living area, and for some let’s be honest maybe your bed (though we’d advise against it but to each their own). The idea here is to create a separation of our typical living space to an area we work in. Having even the slightest separation can help you mentally surpass the hurdle that despite being at home or remote your here to work. For others, this may mean your local coffee shop, a co-working space, and the list goes on. The importance here is to create a mental & physical separation that this is your workspace. Make it your own! This could mean having your optimal set up at your desk that fits your workflow, a great office chair, make the environment fit your needs.
Set a schedule and make sure you relay that schedule with your team, that way there isn’t any miscommunication between your teammates. This may be uncomfortable to communicate your hours to your team at the beginning; however, it will be extremely important for your team’s productivity. It can be very frustrating to miss a deadline because you are waiting on a deliverable from another team member who is working unknown hours. 8 hour days are a good rule of thumb with 3-4 hours of intense focus, and the rest dedicated to meetings, calls, and other collaborative functions. Setting hours for yourself will also help you create a structure for your workday and ensure efficiency throughout your day. Another benefit of having a set schedule is that it will help maintain your work balance, being able to differentiate your working hours and non-working hours.
One part of working remotely is we get to figure out all the meetings that could’ve simply email… jokes aside teleconferencing will likely be a big part of your work routine when offsite. Here are some tips to help navigate those Zoom, Google Meet, (insert service here) conference calls.
VPN or Virtual Private Network is more important than ever when it comes to remote settings. Making sure you use either your company-required VPN or personal VPN service when accessing any servers, websites, or internal resources from your company. Virtual private networks create a secure way to access company data when you are not at the office. This is even more important if you are working off public wifi such as a cafe, library, airport, or public area.
For any help looking into a great VPN provider for personal or company-related use don’t hesitate to reach out.
A tip that can’t be stressed enough. While working from home it can almost become easier to lose yourself in your work/time. While this helps much focus on the task at hand it’s also important to monitor & realize when to take breaks. Simply standing up every 20-30 minutes to take a quick walk, take your eyes off the monitor, and many other practices are ones you should follow even if not working from home/remote. Given the remote circumstance your not physically getting up & moving about as you would in an office. So physically standing up & making the effort to take a quick break is more important than ever.
While working from home or remote has a lot of benefits the biggest drawbacks lie in the lack of socialization & physical collaboration. Thankfully technology & tools used throughout companies make this a bit easier. Ensuring your companies have certain apps & tools available at your disposal.
The benefit of working from home or remote is also its curse. While the freedom of working remotely offers certain freedoms it can also lead you to veer from your work. Helping to minimize & better manage these go a long way. First, up the digital distractions, this includes but isn’t limited to social media, streaming service, and so on. Now while these can certainly be used in a productive & or multi-tasking manner it’s best to decide what is conducive & or obtrusive to your workflow. For some music in the background and the freedom to play it out loud helps them get into their workflow. While for other Twitter, Facebook, and so on can just lead down a rabbit hole of wasted time.
That said we also have to factor in the physical world & its distractions
At the end of the day, you’ll know what works best for you but the better you define & prepare for said distraction the more optimized your work environment will be.
Let’s face it, not being able to stop by a co-worker’s desk or ask a quick question in person can be quite a change for some people. While some people are used to doing that, new habits have to be formed when remote. There is a need to fight assumptions when it comes to who did what and if they did say task. This is where communicating effectively and proactively comes into play. When working from home, it can be difficult to gauge someone’s availability at any given moment. Some questions pop up like:
It is vital in any team or department to communicate as much as possible when remote. Here are a few recommendations in how to communicate proactively, and effectively:
Most companies have a variety of software applications and resources available to their employees. It is important to know what software applies to what specific business function. For example:
Some people such as myself find it useful to physically change as if I was going into an office to mentally switch into a work mode, others prefer to stay in their PJ’s & comfortable attire. Some prefer to work from a full desk setup others find the on-go & ruckus of a public place to be more ideal. At the end of the day, the experience is your own & there is no right answer. You need to figure out what works for you & helps ensure your productivity despite the lack of physical presence in the office. Some thrive in remote settings while others don’t & that’s okay. There are certain benefits that come with it and realizing those while not allowing them to dominate your workday is important. Ensuring you minimize distractions and understand your still “working” despite the lack of co-workers & accountability that may surround you in an office setting. Mix it up & make it your own.
Ultimately everyone has their own remote and work from home tips. As this remote workforce becomes more and more relevant this day in age these are all things you can keep in mind. In one-off scenarios where a large part of the workforce is mandated to such situations, these are good practices to start with. As always you know what works best for you & your work style above all that should always be accounted for. So start out by using some of the above tips & seeing what your company culture has and or lacks in terms of support for remote employees & settings. It’s about ensuring you’re at optimal productivity given your circumstances and that despite not being in the office you feel a sense of drive and inclusiveness with your counterparts. That while it may not be a scenario everyone is fortunate enough to have, at times it comes down to defining what works & what doesn’t and understanding if possible it may just be best to come in to collaborate, meet, and so on with your clients or company in person.
So get to work!
Networking is at the heart of many businesses it’s what allows you & your team to operate & conduct business effectively. Management of said network is critical to not just overall performance & reliability for your team but as well as security of company data & assets. Network management ranges from the setup & design of the network itself to ensure it’s optimally tweaked & optimized for conditions such as growth, external interference, and overall security. So whether your team may be experiencing problems such as slow wi-fi, moving into a new space, requiring cable/ethernet ran, or what have you that’s where a network management team comes into play. Having a team to monitor your network to ensure uptime, expanding it as needed, and support you when issues occur. The world of networking is ever-changing & expanding so should the team managing it.
That all said what are the benefits of having a team manage your network?
Here are some to name a few:
Above all network management alleviates the responsibility of the vital asset that is your network to a team of experts in the area. While a simple setup may be initially managed by one person in your company say your CTO or Office Manager as size & complexity grows in a network the importance of having a proper team in place to manage in case of outages, vulnerabilities & attacks, and so on is ever important.
Network Right helps manages multiple client networks ranging from businesses from 50 to 500+ people. We do this through a certain process depending on your situation & setup.
For clients, with an existing network setup, we apply the same approach as outlined above. We do our best to work with the gear at hand, however, if we feel it’s best to get you on improved equipment to resolve your issues we’ll work with you to get the appropriate enterprise-grade equipment for your needs.
For clients moving into a new office or space & have an entirely new setup at hand we focused on your company requirements. Baseline speed, reliability, coverage for employees, wireless & wired requirements to get your business up & running. Planning from start to finish to design & implement the network. We even handle all communications between your internet service provider to get install dates & service turn up in a timely manner.
At Network Right we have partnerships with some of the best enterprise-level network providers such as Cisco Meraki & Unifi Systems. All to get you the best deals & recommendations on equipment that’ll fit your needs & budget. We work with you to ensure we can make your network work for you.
After everything is set up & good to go we pride ourselves in involving our clients & keeping transparent communication on how your network operates. For clients, we manage fully we even offer monitoring services of the network allowing us easy access to troubleshoot & apply changes as needed. Even going as far as to offer periodic reports on network stability, usage, and much more stats. Helping predict when expansion and or upgrades are needed before you hit those roadblock
We aim to help our clients effectively manage their networks in such a way where everything simply works & your team doesn’t have to worry about bad wi-fi, dropped connections and calls, and any other issue that can go wrong. Providing modern support, setup & security practices to protect your business while allowing you to do the work that matters most.
Feel free to contact us today via our contact form or emailing hello@networkright.io for more information on how we can help manage your network today!