A vCIO’s Perspective on MFA: Importance and Implementation

A vCIO’s Perspective on MFA: Importance and Implementation

By Joseph King, vCIO

IN THIS ARTICLE: 

I work with clients across every imaginable industry on a daily basis as a CIO Solutions vCIO. One thing that is true for every business, no matter the industry, is the need to safeguard sensitive information. Today, it’s foundational that every business uses multifactor authentication (MFA) on their critical platforms. But despite its undeniable importance, implementing MFA often faces resistance.  

Resistance to MFA Implementation: Acknowledging the Concerns 

Implementing MFA is not always met with open arms, and I understand that. Here are a few reasons some businesses hesitate to adopt this crucial security measure: 

  • Perceived Complexity: One of the main reasons businesses might resist implementing MFA is the fear that adding an additional layer of security might disrupt their operations or require extensive training for employees.
  • Employee Pushback: The prospect of incorporating extra steps into the authentication process may be met with apprehension, as individuals might find it inconvenient or time-consuming. If businesses have had challenges with employees adopting new technologies, this tends to be a concern.
  • Initial Setup Challenges: The fear of potential disruptions during the transition to MFA can create a reluctance to embrace it. 

The Pitfalls of Resistance: A vCIO’s Perspective 

While the concerns mentioned above are valid, they are only temporary discomforts. The risk of choosing not to adopt MFA on key business applications is much more significant than the potential nuisances during the transition. Let’s take a look. 

  • Incomplete Security Posture: Relying solely on passwords in an age of sophisticated cyber threats is like leaving a gate open to your business. MFA isn’t the end-all and be-all, but it’s one additional layer of prevention to a catastrophe.
  • Vulnerability to Phishing Attacks: Hackers love phishing attacks. MFA acts as a powerful shield against these attacks. Even if a user unknowingly falls victim to a phishing attempt and gives up their password to a threat actor, you still have that additional MFA defense in place that the bad guys don’t have.
  • Regulatory Compliance Concerns: Whether you’re trying to qualify for Cyber-liability insurance for your business (which you should be trying to do) or work in an industry that is subject to stringent regulatory standards, neglecting MFA puts you behind and at risk for a.) not qualifying for insurance or b.) being at risk for compliance consequences.  

How to Move Forward with MFA Implementation 

Multi-factor authentication is an investment in fortifying your digital defenses and ensuring the longevity of your business. Which applications are the most important for your business? Where do you store customer data? Financial information? Those should be priority number one. 

Advising a business on Multi-Factor Authentication (MFA) implementation requires a strategic approach to ensure a smooth transition while maximizing security benefits. Here are some key steps:

  1. Conduct a Security Assessment:
    • Conducting a comprehensive security assessment will identify existing vulnerabilities, potential risks, and areas where MFA can strengthen authentication processes. This assessment will provide valuable insights into the business’s current security posture and help prioritize MFA implementation efforts.
  2. Educate Stakeholders:
    • Key business stakeholders must be educated on the importance of MFA in enhancing security. The risks of relying solely on passwords and the benefits of adopting MFA, such as reducing the risk of unauthorized access and protecting sensitive data, need to be communicated and understood.
  3. Align with Business Objectives:
    • Aligning the MFA implementation strategy with the business’s broader business objectives and priorities is important. MFA supports and furthers many key initiatives, such as regulatory compliance, data protection, and maintaining customer trust, and highlighting this is useful for many stakeholders.
  4. Select the Right MFA Solution:
    • Selecting the MFA solution that best meets a business’s unique needs and requirements will ensure that the solution is a fit for successful adoption. It’s key to consider factors such as user experience, scalability, integration capabilities, and cost-effectiveness.
  5. Develop a Phased Implementation Plan:
    • Developing a phased implementation plan that outlines the steps involved in rolling out MFA across the organization makes the task of implementation much smoother. Start with a pilot program involving a small group of users or departments to test the MFA solution and gather feedback. Then, gradually expand the rollout to additional users and systems based on the lessons learned.
  6. Provide Training and Support:
    • Offering comprehensive training and support ensures a smooth transition to MFA. It’s key to provide clear instructions, step-by-step guides, and training sessions to educate users on how to set up and use MFA effectively.
  7. Monitor and Measure Effectiveness:
    • Implementing mechanisms to monitor the effectiveness of MFA implementation and measure its impact on security metrics will continuously boost the business’s security posture. Regularly reviewing and analyzing security logs and reports will allow for the identification of any anomalies or security threats.
  8. Stay Updated and Evolve:
    • The security world is constantly changing to adapt to threats. Staying informed about the latest developments in MFA technologies and best practices is crucial. A business’s MFA strategy should continuously be evaluated and updated to adapt to evolving security threats and changing business requirements.

In Conclusion

When a business decides to hold off on implementing MFA, that decision to avoid the temporary discomfort of adopting a new technology keeps them at an unnecessarily high degree of risk. Unfortunately, these days it’s not a question of “if” a business will experience a breach, it’s a question of “when”. Without this foundational tool in place, securing the business is significantly harder, and breaches are much more detrimental. 

All this to say, there are clear and tested paths forward to ensure that implementing MFA for your business is seamless and effective. I have seen this collection of steps work effectively for businesses of all sizes time and time again, and the risks of delaying by far outweigh the effort upfront of biting the MFA bullet.


 

Not sure where to start with MFA implementation? Don’t hesitate to reach out to your vCIO or Customer Success Manager!

Not a CIO Solutions client? Contact us to explore your options for securing and managing your IT!

Migrating from a File Server to OneDrive & SharePoint? Consider This

Migrating from a File Server to OneDrive & SharePoint? Consider This

By Josh Farlow, Director of Cloud Services

IN THIS ARTICLE: 

“Modern Office”: This may be a term you have heard, but it does not describe the updated finishes on your office building. Let’s talk about what Modern Office means and some of the important logistical considerations to keep in mind when it comes when making the leap to Modern Office solutions for File Management.

Modern Office refers to a business computing model defined by:

  1. Serverless Architecture – No more servers in your server closet or in a data center
  2. SaaS (Software as a Service) based applications – All apps are “in the Cloud”, and typically include Microsoft 365 in some form. In other words, they are software services paid on a subscription basis and hosted in a data center somewhere in the world.
  3. Modern File Management – File storage and management within OneDrive and SharePoint instead of a dedicated file server.

The appeal of embracing aspects of the Modern Office model, particularly the M365 (Microsoft 365) ecosystem and vision, is undeniable. It promises so many benefits: Intune for device management, Autopilot for ease of onboarding new users/computers, browser-based applications, and a combination of the performance of local resources with cloud flexibility.

Ditching the servers entirely and moving operations 100% toward a serverless Modern Office model is only feasible for certain businesses. But across the board, businesses are starting to incorporate one key piece of this Modern Office model into their operations: File Storage and Management via OneDrive and SharePoint in M365. However, there are many considerations and challenges to consider when making this transition.

The Power of OneDrive and SharePoint 

The OneDrive and SharePoint platforms are the foundations of cloud-based collaboration and storage within the M365 ecosystem. They empower users to seamlessly access, share, and collaborate on documents – the dream for a modern, interconnected workspace.

However, because they’re so foundational, before you jump in, it’s important to bear in mind that a thoughtful, strategic approach will help you not only maximize their effectiveness but also avoid potential pitfalls.

Strategic Considerations

It would be great if the transition was as simple as uploading your files and calling it a day. A few challenges keep things interesting.

Syncing Issues and File Corruption– File corruption is a common issue since the underlying technology of these cloud platforms is different from your traditional file servers.

  • Because they speak a different language, a direct transfer of the existing file server structure may lead to problems that interrupt user productivity. If many of your files are suddenly corrupted when users try to access them, they may find themselves spending the rest of the day on the phone with the support.
  • OneDrive software can simply stop working or syncing. This can be caused by a myriad of issues such as token expirations, local resource contention, file path limitations, number of files syncing limits, etc.
  • File folder sizes can cause issues if there are too many folders within folders.

Third-Party Application Integration– The nature of your data and how users synchronize it can play a pivotal role.

  • SharePoint in particular poses a unique challenge. A write-heavy application may demand synchronization with multiple users, increasing the odds of metadata synchronization issues or corruption.
  • Applications that need to write back to a file server would first need to be pointed to a SharePoint document library. However, the way the application talks to SharePoint can cause major performance issues that would need to be accounted for.

Strategies & Tools for a Smooth Transition 

If you’re thinking that moving to OneDrive and SharePoint sounded great at first, but now it seems like a nightmare. Fortunately, there are strategies and innovative tools to make it easier!

  • Reducing Complexity

Let’s talk strategy first. One of the simplest and most effective approaches is to create multiple SharePoint sites rather than one all-encompassing one for all the company’s data. Often this looks like department or team-specific SharePoint sites.

Approaching your data in these smaller segments of department or team data serves a dual purpose – it reduces the number of users connecting to their respective document libraries at any time, and it trims down the size of data and the number of files. By doing so, the likelihood of metadata synchronization issues is significantly decreased.

  • Tools for a Seamless Migration

Effective tools have emerged to simplify this migration process, like Cloud Drive Mapper by IAM Cloud, for instance. Rather than relying on a syncing tool (OneDrive client), Cloud Drive Mapper operates in the same way as a mapped network drive, such as your S: drive, in a traditional file system. Cloud Drive Mapper facilitates seamless mapping of drives to M365 to provide a real-time connection to the SharePoint document library, no syncing required, no metadata issues. 

Unlocking the Potential 

In the grand scheme of things, embracing the power of OneDrive and SharePoint for file management can be revolutionary for your business. However, as we’ve explored in this article, the journey requires a strategic mindset and a proactive approach to navigate and avoid potential challenges.

As our team has seen in the real world, thoughtful consideration, coupled with tools like Cloud Drive Mapper, can pave the way for a seamless transition and ensure businesses can unlock the full potential of these Modern Office solutions without the headache and loss of productivity that might occur by jumping in blindly.

 


Are you a current client of CIO Solutions? Talk to your vCIO to continue the conversation!

Not a client yet, but curious about maturing your productivity tools? Let’s talk!

CIO Solutions Recognized on CRN 2024 MSP 500 List

CIO Solutions Recognized on CRN® 2024 MSP 500 List

Santa Barbara, CA, February 13, 2024 — CIO Solutions, Productivity Enhanced, announced today that CRN®, a brand of The Channel Company, has named CIO Solutions to its Managed Service Provider (MSP) 500 list in the MSP Pioneer 250 category for 2024.

The MSP 500 list is compiled by CRN annually and serves as a comprehensive guide to identifying and recognizing the top Managed Service Providers (MSPs) in North America. The MSP 500 list aims to showcase and celebrate MSPs that are driving growth and innovation in the industry. These service providers not only enable businesses to harness complex technologies but also contribute to maintaining a strong focus on core business goals without stretching financial resources.

The MSP Pioneer 250 section of the annual MSP 500 list recognizes companies with business models weighted toward managed services and largely focused on the SMB market. By providing comprehensive managed strategy, infrastructure, and support services, MSPs like CIO Solutions offer small to medium businesses access to the resources and benefits of a robust IT department without the hassle and cost of building and managing it themselves. Access to these expert services is more important than ever in today’s technology-dependent business landscape. For those businesses, MSPs enhance efficiency, simplify technology management, mature IT solutions, and optimize return on IT investments.

CIO Solutions serves over 300 California businesses ranging in size from 10-500+ employees. Their services include a robust support system designed with a “first contact resolution” support model, strategic technology planning services, a dedicated network operations center, and extensive infrastructure project and management services. Over the past 10 years, they have expanded their geographical reach to better serve clients throughout Central California and beyond, with three locally serving offices and 100 employees overall.

They embrace a forward-thinking approach and offer solutions that are not only proven and tested, but innovative. Among CIO Solutions’ offerings are advanced cloud computing, next-generation managed security, and modern office solutions. They maintain global partnerships including Citrix, Microsoft, Datto, and CrowdStrike.

Jennifer Follett, VP of US Content and executive Editor CRN, The Channel Company, emphasized the significance of managed services for businesses at various scales, stating, “Managed services provide a route for businesses of all sizes to maintain efficiency and adaptability throughout their growth journey. The solution providers featured in our 2024 MSP 500 list are introducing cutting-edge managed services portfolios to the market, enabling their clients to achieve success by optimizing their IT budgets. This allows businesses to allocate resources strategically, concentrating on mission-critical tasks that drive future success.”

Eric Egolf, CEO of CIO Solutions, says “We are thrilled to be recognized as an MSP 500 recipient. It is a reflection of our focus on matching our service offerings with the constantly evolving landscape in the MSP space. It’s fun to remember how different that MSP space was just 6 years ago and how quickly it continues to evolve.”

The MSP 500 list will be featured in the February 2024 issue of CRN and online at www.crn.com/msp500.

About CIO Solutions

CIO Solutions, a leading IT solutions provider based in California, has been delivering expert IT services and exceptional customer service since its establishment in 1986. With offices in Santa Barbara, Fresno, and San Luis Obispo, CIO Solutions offers innovative solutions across a wide range of sectors to ensure clients can maximize their time and resources through effective technology. CIO Solutions continues to grow year after year, driven by their mission to enrich lives through technology. www.ciosolutions.com

About The Channel Company

The Channel Company enables breakthrough IT channel performance with our dominant media, engaging events, expert consulting and education, and innovative marketing services and platforms. As the channel catalyst, we connect and empower technology suppliers, solution providers and end users. Backed by more than 40 years of unequalled channel experience, we draw from our deep knowledge to envision innovative new solutions for ever-evolving challenges in the technology marketplace. www.thechannelco.com

Follow The Channel Company: Twitter, LinkedIn, and Facebook.

© 2024 The Channel Company LLC. CRN is a registered trademark of The Channel Company, LLC. All rights reserved.

The Channel Company Contact:

Employee Spotlight: Kevin Tran

Employee Spotlight: Kevin Tran

Meet Kevin, a seasoned Project Engineer out of our San Luis Obispo office with six years of dedicated service at CIO Solutions (time flies!).

Born on the island of Honolulu, Hawaii, at the age of 4 Kevin moved to Perris, California. He spent much of his life in the Inland Empire, then after college, he bounced around places as far as Niagara Falls, NY. Eventually, he settled in on the Central Coast to be back with his family. When he’s not working during the week or at one of the paintball fields in Central California on the weekends, he hangs out with his 2 little white fluffy dogs, adopted in 2022.

In his role as a Project Engineer, Kevin is responsible for building new servers and networks, along with managing that infrastructure through various projects. He and the rest of the project team do a little of everything, from patching urgent security vulnerabilities to migrating applications and email platforms. “There’s actually very little technical stuff I can think of that we don’t take on in this department.”

Armed with a trifecta of CompTIA certifications—A+, Network+, and Security+—Kevin’s expertise extends beyond the norm, boasting a deep understanding of Linux systems that he cultivated after spending a long time as a community contributor to various Linux distributions before embarking on his IT career.

He loves playing with embedded systems like off-the-shelf routers, NAS, or set-top-boxes and is proficient in C++, Ruby, and various shell-scripting languages. With a knack for diving into the intricacies of technology, Kevin is a true example of the blend of technical mastery and relentless curiosity that drives innovation!

Read on to learn more about Kevin!

 


What has been your proudest moment at CIO?

Probably winning tech-of-the-year and rookie-of-the-year in 2018. Talk about a surprise. Who knew interns could even be nominated for such things?

 

What’s the best advice you’ve ever heard?

“You have to dress for the job you want, not the job you have, and you have to start doing the work you want to be doing.” along with “Fake it ’til you make it” memes. I’ve found a lot of truth in similar advice over the years from my parents and mentors that you just have to: believe in yourself, persevere every day, and keep your eye on the goal.

 

What was the most unusual or interesting job you’ve had?

I managed a cell phone accessories kiosk in the mall to support myself through college. You learn a lot about persuasion, pitching, and haggling in that kind of job. I laugh at it now, because that’s not at all what I thought I’d be any good at.

 

Would you rather be the funniest or smartest person in the room? Why?

Funniest. I think people who can entertain and resonate with others’ sense of humor have an incredible gift. To gain favor through interaction is a lot of what leads to successful outcomes in whatever the case may be. Funny people have that going for them.

 

If you could have an unlimited supply of one thing, what would it be?

Paintballs. If you know me, you probably saw that one coming a mile away.

 

What’s something you’re planning on doing in the next year that you’ve never done?

Travel to Europe. Need to knock that off my bucket list. Everyone says it’s amazing.

 

What do you pretend to hate but actually love?

Cooking. Truth reveal: I pretend I don’t like it because I don’t want to cook for you, in case you don’t like it. But I actually do cook a lot and hardly go out to eat.

 

What’s the weirdest food you’ve ever eaten? How was it?

“Balut” it’s a Filipino delicacy. Google it. It’s like chicken broth in a shell if you eat it with your eyes closed.

 

If your life were a movie, who would play you?

For the lulz, Werner Herzog. I think it would be hilarious to see him play anyone in a biopic. Just look and listen to the man in any interaction.

 

—————————————————————————————————————————————————————-

Bonus: What 3 words would you use to describe CIO Solutions?

Excellence, Organized, Fun

 


We are proud of our team of skilled and friendly individuals. It’s a unique group of collaborators and innovators who share a common “can-do” mentality paired with a fondness for gifs and puns. 

Looking for opportunities to join our team? Visit our Careers page to see all open positions in our Santa Barbara, San Luis Obispo, and Fresno offices!


[vc_row][vc_column][vc_btn title=”Contact Us” style=”custom” custom_background=”#fa8c19″ custom_text=”#ffffff” shape=”square” size=”lg” align=”center” link=”url:https%3A%2F%2Fwww.ciosolutions.com%2Fcontact%2F|title:Contact”][/vc_column][/vc_row]

Employee Spotlight: Blake Abbott

Employee Spotlight: Blake Abbott
Introducing Blake, one of our tech wizards from our Fresno office. Blake is a local, born and raised right here in California’s Central Valley. Having joined our ranks two years ago (come June), Blake brings an impressive arsenal of skills, including an A.S. in Information Technology and a collection of CompTIA certifications, which he put to use previously during his time as an Apple Pro Repair Agent at Geek Squad.

Now he uses that knowledge as a Rapid Response Technician on our RRT Artemis team. When users call or email, he jumps into action, tackling problems head-on and ensuring a quick, painless resolution for our clients

When Blake isn’t helping clients through technical snags, he enjoys spending time with friends, whether that’s sharing a meal, catching a movie, or diving into tech projects. Everything is more enjoyable with friends around!

Just to give you an idea of how committed and passionate he is about the ever-evolving tech landscape, his hobbies also include tinkering with his home server lab and game development, as well as collecting anything with an Apple logo on it.

Read on to learn more about Blake!

 


What would the title of your autobiography be?

“Hey, What Does This Do?”

 

What has been your proudest moment at CIO?

When I received a box of cookies from a client after helping them with an issue. Really taught me the impact of what we do on a daily basis and how we make a difference for our clients.

 

What’s something most people don’t know about you?

As a kid, my brother and I used to be BMX bike racers.

 

What’s the best advice you’ve ever heard?

When you fight with yourself you are fighting someone who knows all your weaknesses, it’s not a fair fight so don’t treat it like it is.

 

What was the most unusual or interesting job you’ve had?

During Black Friday one year, my only job that day was to direct people to the bathroom.

 

Would you rather be the funniest or smartest person in the room? Why?

The funniest, Being book smart is something anyone can learn to do but to really be a genuine funny person is something you are born with.

 

What’s your favorite famous or inspirational quote?

“Do or do not, There is no try.” – Jedi Master Yoda / George Lucas

 

What’s your favorite TV show? Why?

Person Of Interest. It started out as a normal crime drama, which I’m a sucker for already, but throw in the advanced artificial intelligence and cool visual effects into the mix glued together by an amazing story in the later seasons, and it’s an instant 11/10 for me.

 

If you could have any superpower, what would it be?

I would want Magneto’s powers from the X-Men movies. He can control or create magnetic fields. It basically boils down to anything made of metal he can manipulate, from metal particles in the ground to entire buildings or structures.

 

What could you give a 30-minute presentation on without any advance preparation?

Basically anything to do with Apple as a company or any of its products.

 

—————————————————————————————————————————————————————-

Bonus: What 3 words would you use to describe CIO Solutions?

Team, Exciting, Brilliant

 


We are proud of our team of skilled and friendly individuals. It’s a unique group of collaborators and innovators who share a common “can-do” mentality paired with a fondness for gifs and puns. 

Looking for opportunities to join our team? Visit our Careers page to see all open positions in our Santa Barbara, San Luis Obispo, and Fresno offices!


[vc_row][vc_column][vc_btn title=”Contact Us” style=”custom” custom_background=”#fa8c19″ custom_text=”#ffffff” shape=”square” size=”lg” align=”center” link=”url:https%3A%2F%2Fwww.ciosolutions.com%2Fcontact%2F|title:Contact”][/vc_column][/vc_row]

Forming Your IT Dream Team: Building an Effective IT Steering Committee

Forming Your IT Dream Team: Building an Effective IT Steering Committee

By Sean Gill, Director of Client Strategy

IN THIS ARTICLE: 

Technology plays a pivotal role in driving companies forward in today’s business landscape. However, for many business owners and decision-makers, navigating the intricacies of IT and getting the right input from the right stakeholders can be challenging.  

To streamline this process, we recommend establishing an IT Steering Committee within your organization. This ensures seamless alignment of your IT services with your business goals. 

The Role of an IT Steering Committee 

An IT Steering Committee serves as a cornerstone for aligning technology initiatives with your broader business goals. Bringing together diverse expertise from within your organization within this committee ensures that IT decisions are not made in isolation. This provides the opportunity for representatives from various departments and management levels to collaborate and ensure that IT initiatives are in harmony with the organization’s vision. 

Examples of roles that may be part of an IT Steering Committee: 

  • Chief Executive Officer (CEO) or Chief Operations Officer (COO): High-level strategic guidance and organizational objectives  
  • Chief Financial Officer (CFO): Budgetary and financial insights and alignment 
  • CIO or IT Director: Providing strategic direction and oversight for all IT initiatives.  
  • HR Representative: Human resource factors such as training needs related to IT, organizational changes, hiring projections, etc. 
  • Key departmental leaders: Offering pertinent operational information and insight or bringing technology needs to the team for deliberation and decision. 
  • IT Manager or IT Team Lead (for companies with in-house IT teams): Technical expertise and practical insights. 

Including an appropriate combination of these key stakeholders in planning conversations with your IT service provider’s Client Strategy Team can be a winning combination. 

The Value of Integrating your IT Provider into your Committee 

Next comes the “IT” part of the Steering Committee: your IT provider’s Client Strategy resources. For clients of CIO Solutions, this would be your vCIO and/or Client Success Manager. 

Our advisors use their experience and in-depth knowledge of client needs, industry trends, and emerging technologies to contribute valuable guidance in your IT Steering Committee conversations. These insights can help bridge the gap between technical capabilities and practical business requirements.  

The combination of all these perspectives ensures that the committee is tailoring your business’s IT strategies to meet technical standards and directly address your specific needs. This leads to more personalized and effective solutions. 

Steps to Establish an Effective IT Steering Committee 

Creating an effective IT Steering Committee involves several key steps.  

  1. Identify the right individuals within the organization who offer diverse perspectives and expertise for this committee. This is essential. 
  2. Establish a structured meeting format and frequency to ensure consistent progress and accountability. 
  3. Define clear rules for decision-making so the discussions lead to practical, actionable results. 

Maximizing the Impact of Your IT Steering Committee: Collaboration Between Your Stakeholders and Your Client Strategy Team 

Imagine the collaboration in action: your business’s real-world needs and roadblocks meeting the practical and technical guidance of your IT provider’s Client Strategy team. This synergy between your needs and technical options is transformative. 

Take inspiration from one of our actual client examples, we’ll call them ACME Corporation. After hitting internal resistance to moving key IT initiatives forward, the COO decided it was time to create an IT Steering Committee that included themself (COO), their VP of Engineering, their CFO, and the CIO Solutions vCIO. This team’s goal was to review open issues affecting the business that required a change to technology implementation, as well as future projects that would require technology inputs to be completed successfully. Specifically, they were able to plan and implement security initiatives that achieved the company’s compliance needs.  

By meeting regularly, they tailored their solutions to match their business requirements, including those of individual departments and avoided potential backtracking and unanticipated issues that might have occurred if those key stakeholders’ perspectives hadn’t been included in the original plan. This resulted in a significant increase in project success and overall satisfaction for ACME Corp, exemplifying the tangible benefits of such collaboration. 

Conclusion 

To wrap it up, forming an IT Steering Committee and integrating that with the expert resources your IT provider offers is key. It ensures that tech planning doesn’t occur in a vacuum but instead aligns with broader business goals so that your investments directly enhance your business productivity and satisfaction.


ABOUT THE AUTHOR

Sean has been shaping the IT strategies of businesses across a wide range of industries and sizes for over 10 years. He leads the Client Strategy team at CIO Solutions, while working with business leaders every day to create a clear IT vision, mature technology solutions, and ultimately, enhance business productivity and security through technology.

He and the rest of the Strategic Client Services team at CIO Solutions are constantly evaluating important trends in the industry and advising clients on best practices and long-term IT strategies for success.


Not sure where to start with establishing an IT Steering Committee? Don’t hesitate to reach out to your vCIO or Client Success Manager!

Not a CIO Solutions client? Contact us to explore your options!

Supporting Users While Safeguarding Against Social Engineering

Supporting Users While Safeguarding Against Social Engineering

By Eric Egolf, CEO

Cyberattacks have evolved in many ways, and one major concern on the rise is the surge in social engineering threats targeting support teams. The MGM hacks made headlines recently for this when a straightforward call to the help desk resulted in a major security breach. It was a wake-up call to the IT industry at large. 

In that case, a hacker manipulated the help desk into changing a user’s phone number. The attacker then had control over not only the user’s credentials but also the power to approve MFA requests, granting them access to the company’s systems. This unfortunate event underscored the urgent need to verify users’ identities before implementing security and access-related changes. 

Focusing on User Authentication Solutions 

IT providers and support teams are increasingly focused on the importance of verifying user identities before making critical security changes. Think password changes, MFA settings, or access permissions. The goal is to ensure that these requests are coming from legitimate sources within the organization. 

CIO Solutions has utilized various techniques, like passphrases, for high-compliance businesses. While effective, these methods aren’t suitable for widespread use due to their potential clunkiness and incompatibility with our “First Call Resolution” support approach. 

So, what are the more effective strategies to bridge this security gap? 

  • User MFA Verification: Registering cell phones for currently approved users and requesting MFA during support interactions. 

When users contact support for significant security-related changes (such as password modifications, security access grants, or MFA number updates), the support agent would send an MFA verification code to that user’s registered number. The user would then need to confirm their identity by sharing the code with the support agent before the change could be made. 

  • Designated Approval Contacts: Establishing pre-designated company contacts to serve as Security Approvers. 

In situations where registering all users’ cell phone numbers isn’t possible, businesses would designate Security Approvers beforehand. When employees contact support for security-related changes, the support team would contact the pre-designated Security Approver for verification and approval, adding an extra layer of validation.  

These methods are some examples of how the issue may be addressed, and they are continually evolving. The goal is simple: ensure every security-impacting change is authorized as legitimate. Note: Regular support requests wouldn’t require this verification, only security-impacting ones. 

But here’s the thing—these methods require a team effort between your company and your IT team. Keeping databases updated with accurate employee information and increasing communication between your company and your IT provider is crucial. 

At CIO Solutions, we are actively evaluating and implementing the best solutions to balance increased security measures without disrupting the support experience —we understand the importance of both.

As business leaders, we need to acknowledge the value of these security measures, as well as the risk of not implementing them. Together, by remaining proactive and collaborative, we can continue to strengthen our defenses and stay ahead of evolving cyber threats.  


Not a client yet, but wondering how to improve your IT experience? Let’s talk!

Advanced Remote Desktop (RDP) Solutions for Central and Southern California Businesses

Modern business operations rely significantly on seamless remote team operations. It is more important than ever for businesses to have access to secure, seamless, and flexible solutions that support hybrid and remote workforces. For Central and Southern California businesses seeking optimal efficiency, enhanced security, and streamlined operations, a game-changing solution exists Advanced remote desktop (RDP) hosting by CIO Solutions, AKA: The CIO Private Cloud.

Powered by Citrix technology, this advanced RDP solution transcends traditional remote desktop functionalities, revolutionizing how businesses manage their operations.

Learn why businesses across Fresno, San Luis Obispo, Santa Barbara, and Ventura Counties opt for CIO Solutions’ Citrix Desktops for their RDP solution.

Video Conferencing App Compatibility

Choosing an RDP solution built on Citrix technology offers significant benefits including its compatibility with prevalent business apps. Today, businesses rely heavily on Zoom and Microsoft Teams for video conferences and communications within their hosted desktop environment. Citrix technology optimizes these platforms and provides the essential features to effectively replicate a typical desktop experience.

Unparalleled Security and Efficiency

Many small and midsized businesses operate in technical environments comprised of disparate systems with varying OS levels, posing security risks with multiple points of vulnerability.

Contrast this with the Citrix desktop RDP solution which offers a fortified security setup by centralizing data and management, ensuring a significantly higher level of security and control for your business.

Streamlined Updates and Enhanced Productivity

In addition to being more secure, RDP solutions are easy to update, unlike the labor-intensive and often error-prone process of updating individual machines.

The ability to update a gold image with new software across the entire organization is a key capability that sets Citrix Desktops apart. This reliably streamlines the process which is invaluable for reducing downtime and supporting productivity.

Optimal Performance for Traditional Applications

For applications lacking equivalent browser versions, the Citrix Desktop guarantees optimal performance. This ensures that traditional client-server applications run seamlessly in your RDP solution so your business can still run these solutions in the Cloud Desktop solution despite the absence of web-based alternatives.

Robust Infrastructure and Support Options

CIO Solutions’ RDP solution, The CIO Private Cloud, provides unparalleled reliability and performance. It is implemented in highly redundant, secure data centers safeguarded from natural disasters. The cutting-edge hardware combined with layers of redundancy and security offers businesses access to an enterprise-level quality solution at a fraction of the cost of attempting remote desktops themselves.

Additionally, with The CIO Private Cloud, your business has the flexibility of choosing between full end-user support services with CIO Solutions, or the option to leverage existing internal IT teams. This offers businesses the freedom to optimize their IT functions based on their specific needs.

Adaptive Work Environments

A good RDP solution should empower employees to maintain consistent productivity, regardless of location. Today’s requirement for seamless, flexible solutions for remote and hybrid work setups is met by The CIO Private Cloud, the most robust RDP solution empowering employees to transition easily and maintain a seamless, secure experience.

Conclusion

CIO Solutions’ advanced Remote Desktop (RDP) hosting services built on Citrix technology support the paradigm shift of modern business operations. From bolstered security to enhanced productivity and versatility, this proven solution is a catalyst for seamless, efficient, and secure business operations in Central and Southern California.

Catering to businesses across Fresno, San Luis Obispo, Santa Barbara, and Ventura counties, CIO Solutions offers a cutting-edge approach to remote desktop hosting. Experience the power of advanced remote desktop solutions and transform the way your business works in today’s dynamic landscape.

Let’s talk! Contact us today to explore your options.

How To: Properly Power your Electronics

By Mike Shinn, Support Manager

IN THIS ARTICLE: 

For years California has hoped for more rain – we certainly could use the water. Unfortunately, with each storm comes additional problems in the form of power glitches. California is plagued by power outages, blips, surges, and everything in between. The cost to our businesses and homes is significant. 

The good news is, there are a number of things you can do to proactively prevent a power-related IT catastrophe which will save you money and sanity in the long run. 

Power Distribution Considerations

In addition to your computer, you can easily count half a dozen additional plugs required to get work done: a monitor, printer, speakers, maybe a phone charger or headset. These all require power to charge up or stay on.  

Wall outlets typically have two sockets and can therefore provide power for two items. But, with a simple power strip, you can easily turn one socket into 6 or 8. However, power strips aren’t one size fits all. Here are some dos and don’ts to keep in mind when choosing a power strip for your electronics:  

Don’t use cheap power strips for valuable electronics

Inexpensive power strips are common and can even be purchased in the local grocery store. But it’s important to remember that you get what you pay for.

These may power your items but using a bargain-rate power source poses risks to valuable technology (like in the case of a power surge). These types of cheap power strips should be avoided.

Don’t “daisy chain” multiple power strips

If you need more power outlets, it may seem like an easy solution to just plug one power strip into another. Power strips are not built to handle infinite power distribution, only distribution to the number of outlets they are designed for.  

This can cause problems to your equipment and be downright dangerous. I commonly see people doing this. In one case, I had to put out a fire caused by multiple strips plugged into one another. 

DO: Use power strips with “power conditioning” and the right number of sockets

You are always better off purchasing a proper power-conditioned strip that has enough outlets built in for your needs.  

Make sure your power strip says “power conditioning” on the box as well as on the strip itself. This means that it will take the “dirty power” coming out of the wall and turn it into the clean power needed to power electronics safely.  

What’s more – many power conditioners have surge-protection built in. This means they can absorb a power surge after an outage. By design, a surge may kill your power strip with surge protection. But it’s always better (and less costly) to have to replace that strip and not all of the equipment plugged into it!  

Power conditioners only cost slightly more than a run of the mill power strip and can easily be found at local electronics retailers or online (even twelve to sixteen-port strips!). 

What about Backup Batteries?

Sometimes equipment requires even more power protection than a power conditioner. This is where a backup battery (also known as a “UPS” or “uninterruptible power supply”) with built-in power conditioning and surge protection comes in. These are designed to keep your computer or other equipment running even during a brief outage.  

These power supplies will often have two sides to them – one will say “surge protection-only” and the other will say “surge and battery.” In this case, it is wise to plug your computer and other essential equipment into the battery section. Leave your monitors, phone charger, printer, or other items in the surge-only section. If you have multiple monitors and absolutely need a monitor to be backed up by a battery, consider only plugging one into the battery section. The more items you have plugged into the battery backup, the less time it will live when there is an outage. 

Battery backups like this typically cost between $50 and $100 depending on the number of outlets or length of battery. Most power outages are under 5 minutes in length, but if you have ever lost a document that you were working on due to an outage, chances are you’d gladly go back to pay the $50 if you could. 

Be Choosy With Your Power

When it comes to powering your critical electronics, it’s important to be deliberate about the power supply equipment you’re using. And it’s good to be choosy about what else gets to share space with them! 

Having a backup battery (UPS) can be highly beneficial, but not all equipment should be plugged into it. Anything with a motor (refrigerators or pumps), hair dryers, air conditioners, air compressors or major electronics will trip and often break a battery backup unit. 

It’s important for the safety of your electronics (and yourself) that you consider how you’re powering them!  


NOTE: CIO Solutions offers additional paid tools to help flag emails based on a threshold of legitimacy. Please reach out to explore your options if this is of interest! 

Not a client yet? Let’s talk!