The Sagiss blog https://www.sagiss.com/blog Managed security, managed cloud and managed IT en-us Thu, 01 Dec 2022 22:51:17 GMT 2022-12-01T22:51:17Z en-us Public Vs Private Cloud https://www.sagiss.com/blog/public-vs-private-cloud <p><span style="font-size: 20px; color: #1a1a1a;">Most of us have taken lessons of some sort — pottery, coding, cello, or public speaking. Let’s say you’re interested in learning more about rock climbing and weighing the pros and cons of taking lessons in a group vs. taking one-on-one lessons. <br><br>A one-on-one lesson is more expensive, and you’ll have to spread the lessons over time to be budget-savvy, but the experience is highly tailored to you. You’ve come with your own high-quality gear to push yourself as far as you can as a climber. You have the means to extract information from your instructor that wouldn’t be as accessible in a group setting where many students are vying for attention. <br><br>Your expectations are likely a bit lower in a group setting, but the experience is still valuable, even if it is less tailored to your specific needs. The cost of the lesson might be included in the monthly rate you pay to be a member of the rock gym, which also provides the rental gear you’ll use. Not only do you gain experience and knowledge, but you also gain a broader network of friends and resources with each group lesson you take.<br><br>The difference between the choice to pursue private versus public lessons lies within the intention of the climber's needs and the instructor's capacity to zero in on those needs — not too unlike some of the differences between private and public cloud computing.</span></p> <p><span style="font-size: 20px; color: #1a1a1a;">Most of us have taken lessons of some sort — pottery, coding, cello, or public speaking. Let’s say you’re interested in learning more about rock climbing and weighing the pros and cons of taking lessons in a group vs. taking one-on-one lessons. <br><br>A one-on-one lesson is more expensive, and you’ll have to spread the lessons over time to be budget-savvy, but the experience is highly tailored to you. You’ve come with your own high-quality gear to push yourself as far as you can as a climber. You have the means to extract information from your instructor that wouldn’t be as accessible in a group setting where many students are vying for attention. <br><br>Your expectations are likely a bit lower in a group setting, but the experience is still valuable, even if it is less tailored to your specific needs. The cost of the lesson might be included in the monthly rate you pay to be a member of the rock gym, which also provides the rental gear you’ll use. Not only do you gain experience and knowledge, but you also gain a broader network of friends and resources with each group lesson you take.<br><br>The difference between the choice to pursue private versus public lessons lies within the intention of the climber's needs and the instructor's capacity to zero in on those needs — not too unlike some of the differences between private and public cloud computing.</span></p> <p>&nbsp;</p> <p><strong><span style="color: #3c78d8;">Understanding the Cloud</span></strong><span style="color: black;"><br><br></span><span style="font-size: 20px;"><span style="color: #1a1a1a;">Everyone is familiar with the Cloud in some form or another these days: a study from 2020 found that </span><span style="color: black;"><a href="https://www.globenewswire.com/news-release/2020/06/18/2050275/0/en/The-Shift-to-Cloud-Computing-Persists-as-Organizations-Use-Multiple-Public-Clouds.html"><span style="color: #1155cc;">92% of organizations use the clo</span></a></span><u><span style="color: #1155cc;">u</span></u><u><span style="color: #1155cc;">d in some capacity</span></u><span style="color: #1a1a1a;">. But not everyone uses it in the same way. Let’s look at the difference between private and public clouds and who’s more likely to use which model. </span><span style="color: black;"><br><br></span><span style="color: #1a1a1a;">A <em>private cloud</em> is a virtualized IT structure that grants a single customer (whether an individual or a corporate entity) on-demand access to computing resources and data. This structure would make sense for organizations requiring high regulatory compliance or those dealing with sensitive data — PII, medical records, and intellectual property. Private clouds, typically called on-premises systems, are sometimes hosted in a customer’s physical data center on company property. Occasionally users will opt to have their private cloud hosted on rented infrastructure that’s hosted off-premises. </span><span style="color: black;"><br><br></span><span style="color: #1a1a1a;">A<em> public cloud</em> is a multi-occupant virtualized IT structure that shares resources amongst the occupants (which can be thousands of users simultaneously). In a public cloud, the infrastructure is owned and maintained by an independent provider, and users maintain membership on a subscription basis. As in a group rock climbing lesson, users split the cost to access the desired resources. Google, Amazon, and Microsoft are three examples of public clouds you’ve heard of and have already used. A public cloud is ideal for many companies, from startups and small businesses needing fast and affordable services to large companies with developers needing access to various tools primed for coding. </span></span></p> <p><span style="color: #1a1a1a;">&nbsp;</span></p> <p><strong><span style="color: #3c78d8;">The Differences</span></strong></p> <p><span style="color: black;"><br></span><span style="color: #1a1a1a; font-size: 20px;">When making an informed decision about how and where to direct your time and money — whether for sport or technology purposes — it’s good to take an honest look at both advantages and disadvantages of your options.</span></p> <p><span><br></span><span style="color: #3c78d8;">Security and communication</span></p> <p style="font-size: 20px;"><span style="color: #1a1a1a;">The most concerning limitation of <em>public clouds</em> is security. When your company opts to outsource its technology to a public cloud, you’re essentially handing the reins over to that provider. All aspects of cybersecurity, configuration and IT management now belong to people who aren’t involved in the daily operations of your business. Additionally, troubleshooting during an outage becomes much more difficult when data is outsourced to a public cloud.</span></p> <p><span style="color: #1a1a1a;">&nbsp;</span></p> <p style="font-size: 20px;"><span style="color: #1a1a1a;">Lapses in communication between a company’s IT professionals and the independent servicer can also be a source of frustration. It’s like taking a group climbing lesson from an amateur climber hired by the gym to handle the less intensive workshops; they’ll be able to provide a cursory overview of the foundational movements in climbing but might not have the skill (or the time) to explain the more finessed techniques that would make all the difference when you’re out in the wilderness. </span></p> <p><span style="color: #1a1a1a;">&nbsp;</span></p> <p><span style="color: #3c78d8;">Customization</span></p> <p style="font-size: 20px;"><span style="color: #1a1a1a;">Most <em>public cloud</em> providers tend to have generic offerings that won’t necessarily meet the needs of companies with complex network structures. Additionally, the limited visibility of front-end interfaces can perplex IT managers who would prefer to know the ins and outs of the underlying technology automating their company’s sensitive processes. </span></p> <p><span style="color: black;"><br></span><span style="color: #1a1a1a;"><span style="font-size: 20px;">Customization and control are where the <em>private cloud</em> shines. With a <em>private cloud</em>, infrastructures can be built with specific storage and networking characteristics in mind. Users are given total control over all components of the digital environment: access to critical data, permissions, and hardware configuration is immediate, as is the deployment of new applications or the reallocation of resources in response to real-time internal requests.</span> </span></p> <p><span style="color: #1a1a1a;">&nbsp;</span></p> <p><span style="font-size: 20px;"><em><span style="color: #1a1a1a;">Private clouds</span></em><span style="color: #1a1a1a;"> also offer better regulatory compliance than public clouds. Think of it as going on a bouldering expedition with just your climbing mentor instead of a group of people with varying degrees of skill. Fewer people mean fewer distractions, fewer potential hold-ups, and the freedom to take as much or as little time as needed when mastering a certain wall or implementing a new route. </span></span><span><br><br></span></p> <p><span style="color: #3c78d8;">Scalability and Cost </span></p> <p style="font-size: 20px;"><span style="color: #1a1a1a;">A <em>public cloud</em> is unrivaled in terms of scalability and speed. Because the cost is spread across many customers, public cloud services can offer impressive agility and potential for growth. It’s also flexible in terms of pricing structure, with most public cloud providers allowing businesses to pay by the hour. This allows small or medium-sized businesses to pay only for what they need. </span></p> <p><span style="color: #1a1a1a;">&nbsp;</span></p> <p style="font-size: 20px;"><span style="color: #1a1a1a;">There are no maintenance or update costs for <em>public clouds</em> — like renting gear at the rock gym — and all software updates are included in the hosting package given by the provider. Not having to manage a data center gives IT professionals the time to put their expertise toward building innovative features and fixes that can give their companies an advantage over competitors. </span><span style="color: black;"><br><br></span><span style="color: #1a1a1a;">The other significant advantage of a <em>public cloud</em> is server redundancy, which alleviates the burden of buying additional storage or software as a disaster recovery measure. In a <em>public cloud</em>, data is instantaneously copied over to other servers in the cloud, ensuring that applications and data remain available in multiple locations. </span></p> <p style="font-size: 20px;"><span style="color: #1a1a1a;">&nbsp;</span></p> <p style="font-size: 20px;"><em><span style="color: #1a1a1a;">Private clouds</span></em><span style="color: #1a1a1a;"> tend to require a significant upfront investment in hardware and personnel and can be expensive to maintain long-term. Payment plans are usually built around capacity-based pricing, which can quickly become very expensive for businesses in fast-evolving markets. </span></p> <p style="font-size: 20px;"><span style="color: #1a1a1a;">&nbsp;</span></p> <p style="font-size: 20px;"><em><span style="color: #1a1a1a;">Private clouds</span></em><span style="color: #1a1a1a;"> are less nimble in scaling, requiring more effort, planning, and redundancy measures than public clouds. And while having full control over one’s data brings some peace of mind, it’s also an enormous responsibility to take on, requiring constant maintenance and monitoring. Finally, the private cloud restricts businesses to the local power grid and ISP, leaving them at the mercy of potential outages.</span></p> <p><span style="color: #1a1a1a;"><br></span><strong><span style="color: #3c78d8;">Hybrid and Multi Clouds</span></strong></p> <p><span style="color: #1a1a1a;"><br><span style="font-size: 20px;">Some users opt for variations on the cloud models described above, such as on-prem, hybrid, or multi cloud configuration. To put it in simple terms, on-prem </span></span><span style="font-size: 20px;"><span style="color: #1d1c1d;">refers to a physical server and infrastructure housed within a company’s own datacenter or other in-house space, whether said infrastructure is used in a traditional manner or to deploy a private cloud internally. </span><span style="color: #1a1a1a;">Hybrid </span><span style="color: #1d1c1d;">cloud consists of a combination of private, public, and on-prem infrastructure features and solutions working together. </span><span style="color: #1a1a1a;">A multi-cloud model combines two or more public clouds but excludes private cloud service and/or any on-prem configurations. These variations are helpful to keep in mind when considering cloud options for your organization or business. </span><span style="color: black;"><br></span></span><span style="color: #1a1a1a;"><br></span><strong><span style="color: #3c78d8;">Choose the Cloud Solution That Makes Sense for You</span></strong></p> <p><strong><span style="color: #1a1a1a;"><br></span></strong><span style="color: #1a1a1a; font-size: 20px;">The three main options — public, private, and hybrid — have much to offer as digital services. As you consider which option best meets your needs, consider your organization’s needs from security, regulatory compliance, scalability, reliability, remote access, and cost. Align yourself with a provider whose principles you resonate with and whom you trust watching your business reach new heights thanks to the dynamic structure of cloud computing.</span></p> <p><span style="font-size: 11px; color: #1a1a1a;">&nbsp;</span></p> <img src="https://track.hubspot.com/__ptq.gif?a=219672&amp;k=14&amp;r=https%3A%2F%2Fwww.sagiss.com%2Fblog%2Fpublic-vs-private-cloud&amp;bu=https%253A%252F%252Fwww.sagiss.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Managed cloud services Thu, 01 Dec 2022 22:51:17 GMT https://www.sagiss.com/blog/public-vs-private-cloud 2022-12-01T22:51:17Z Sagiss, LLC Think before you click https://www.sagiss.com/blog/think-before-you-click <div class="hs-featured-image-wrapper"> <a href="https://www.sagiss.com/blog/think-before-you-click" title="" class="hs-featured-image-link"> <img src="https://www.sagiss.com/hubfs/Media/Blog/think-before-you-click.jpg" alt="Think before you click" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>People often look to sophisticated tools for security solutions.</p> <p>People often look to sophisticated tools for security solutions.</p> <p>While having the latest and greatest tools is great, technology is only part of the equation. Businesses cannot neglect the role that humans play in security. That's why we at Sagiss tirelessly promote <a href="https://www.sagiss.com/blog/why-your-company-needs-end-user-security-training">end user security training</a>.</p> <p>And that's also why many security professionals repeat the advice to <span style="font-weight: bold;">think before you click</span>.</p> <h2>What is the meaning of "think before you click"?</h2> <p>The advice to "think before you click" means literally what it says: Take the time to think before you take action.</p> <p>The advice is asking you to have healthy skepticism.</p> <p>Before you take action, take the time to ask a few simple questions:</p> <ul> <li> <p>Is this email legitimate and safe?</p> </li> <li> <p>Do I trust the sender?</p> </li> <li> <p>Do I <em>need</em> to click on this link? Is it necessary?</p> </li> <li> <p>Do I <em>need</em> to download this attachment? Was I expecting an attachment?</p> </li> </ul> <h2>Why is there a need to think before you click?</h2> <p>Businesspeople may receive hundreds of email messages a day. Each of those messages represents the opportunity to click on a link or download an attachment containing some type of <a href="https://www.sagiss.com/blog/what-is-threatware">threatware</a>.</p> <p>Threat actors are aware of the demands this frequency of message puts on businesspeople. So the threat actors will often impersonate a CEO or some other company execute. And they often try to create a sense of urgency so that people will click without taking the time to think about the possible consequences.</p> <img src="https://track.hubspot.com/__ptq.gif?a=219672&amp;k=14&amp;r=https%3A%2F%2Fwww.sagiss.com%2Fblog%2Fthink-before-you-click&amp;bu=https%253A%252F%252Fwww.sagiss.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Managed security services Mon, 24 Oct 2022 16:10:00 GMT https://www.sagiss.com/blog/think-before-you-click 2022-10-24T16:10:00Z Sagiss, LLC Remote managed IT services - How do they work? https://www.sagiss.com/blog/remote-managed-it-services-how-do-they-work <div class="hs-featured-image-wrapper"> <a href="https://www.sagiss.com/blog/remote-managed-it-services-how-do-they-work" title="" class="hs-featured-image-link"> <img src="https://www.sagiss.com/hubfs/Media/Blog/remote-managed-it-services.jpg" alt="Remote managed IT services" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>One question we often get concerns the benefits of remote managed IT vs. on-site support.</p> <p>One question we often get concerns the benefits of remote managed IT vs. on-site support.</p> <p>What are the differences? When does one make more sense than the other?</p> <p>This post is a brief overview of the concept of remote managed IT services.</p> <br> <h2>What are remote managed IT services?</h2> <p>The wide availability of high-speed internet and general improvements in technology mean most IT issues can be fixed remotely.</p> <p>In decades past, businesses needed an on-site technician to drop by and diagnose and fix issues. Now, most of those same issues can be fixed off-site.</p> <p>Common remote managed IT services include:</p> <ul> <li> <p>Installing <a href="https://www.sagiss.com/blog/3-reasons-to-install-software-patches">software patches</a>.</p> </li> <li> <p>Password resets.</p> </li> <li> <p>Any kind of email issue.</p> </li> <li> <p>Other general support requests.</p> </li> </ul> <br> <h2>What are the benefits of remote managed IT services?</h2> <p>Speed and efficiency tend to be the great benefits of remote managed IT services.</p> <p>In most situations, a technician can log in to your computer and diagnose and fix issues behind the scenes. Technicians are guaranteed to have access to the tools and resources they're familiar with, letting them resolve issues faster. This setup also allows you to get back to work faster.</p> <p>Also, when technicians are in their own office, they have easier access to other technicians who may be able to help with more difficult issues.</p> <br> <h2>When are remote managed IT services not a good option?</h2> <p>95% of our managed IT services can be performed remotely. No matter how much we rely on the cloud and virtualization, there will always be a 5% requires on-site, face-to-face interaction.</p> <p>Services requiring on-site visits include:</p> <ul> <li> <p>Installing <a href="https://www.sagiss.com/blog/why-businesses-still-need-network-firewall-security">network firewalls</a> and other networking equipment.</p> </li> <li> <p>Troubleshooting wireless issues.</p> </li> <li> <p>General hardware maintenance.</p> </li> </ul> <br> <h2>The Sagiss Way of remote managed IT services</h2> <p>While we prefer to fix issues remotely, 100% of issues can't be solved remotely. So we send technicians on-site on a regular basis and as needed.</p> <p>Read "<a href="https://www.sagiss.com/blog/support-services-the-sagiss-way">managed IT support services, The Sagiss Way</a>" for more information about our general managed IT services.</p> <img src="https://track.hubspot.com/__ptq.gif?a=219672&amp;k=14&amp;r=https%3A%2F%2Fwww.sagiss.com%2Fblog%2Fremote-managed-it-services-how-do-they-work&amp;bu=https%253A%252F%252Fwww.sagiss.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Mon, 17 Oct 2022 14:42:00 GMT https://www.sagiss.com/blog/remote-managed-it-services-how-do-they-work 2022-10-17T14:42:00Z Sagiss, LLC Is a fractional CIO a good fit for your business? https://www.sagiss.com/blog/is-a-fractional-cio-a-good-fit-for-your-business <div class="hs-featured-image-wrapper"> <a href="https://www.sagiss.com/blog/is-a-fractional-cio-a-good-fit-for-your-business" title="" class="hs-featured-image-link"> <img src="https://www.sagiss.com/hubfs/Media/Blog/fractional-cio.jpg" alt="Fractional CIO" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>Businesses have an endless list of needs but may not have the resources to satisfy all their needs in-house. That's why many businesses outsource crucial functions by partnering with fractional executives.</p> <p>In this post, we will take a closer look fractional CIOs and the value they provide.</p> <p>&nbsp;</p> <h2>What is a CIO?</h2> <p><a href="https://www.investopedia.com/terms/c/chief-investment-officer.asp">Investopedia</a> defines CIO (Chief Information Officer) as:</p> <p>Businesses have an endless list of needs but may not have the resources to satisfy all their needs in-house. That's why many businesses outsource crucial functions by partnering with fractional executives.</p> <p>In this post, we will take a closer look fractional CIOs and the value they provide.</p> <p>&nbsp;</p> <h2>What is a CIO?</h2> <p><a href="https://www.investopedia.com/terms/c/chief-investment-officer.asp">Investopedia</a> defines CIO (Chief Information Officer) as:</p> <blockquote> <p>[T]he company executive responsible for the management, implementation, and usability of information and computer technologies.</p> </blockquote> <p><span style="font-size: 0.9rem; background-color: transparent;">There are also CISOs (Chief Information Security Officers), who focus primarily on security. For the purposes of this article, we will refer to them collectively as CIO.</span></p> <br> <h2>Does my business need a CIO?</h2> <p>Every business would benefit from a CIO. As businesses rely more on technology, effectively managing and securing that same technology becomes more critical.</p> <p>While the need for a CIO is obvious, some businesses may not need or be able to afford a full-time CIO. These businesses' needs can be met with a fractional CIO.</p> <br> <h2>What is a fractional CIO?</h2> <p>A fractional CIO is an individual who has the credentials and expertise to act as a CIO but does so on a part-time basis for multiple clients at one time.</p> <p>Basically, a fractional CIO is an outsourced CIO. A fractional CIO may also be referred to as a virtual CIO (<a href="https://www.sagiss.com/blog/5-benefits-of-hiring-a-vcio">vCIO</a>).</p> <p>Outsourcing a CIO's responsibilities should not a foreign concept. Many business owners are familiar with fractional CFOs—the same logic applies to this field.</p> <br> <h2>Fractional CIO services</h2> <p>Fractional CIO services include:</p> <ul> <li> <p><a href="https://www.sagiss.com/blog/how-technology-fits-into-business-continuity-planning">Business continuity</a> and <a href="https://www.sagiss.com/blog/data-backup-and-disaster-recovery">disaster recovery</a>.</p> </li> <li> <p>Business strategy and long-term planning.</p> </li> <li> <p>Reviewing and improving business processes.</p> </li> </ul> <br> <h2>5 benefits of hiring a fractional CIO</h2> <p>&nbsp;</p> <h3>1. Flexible IT solutions</h3> <p>Unlike hiring a full-time, in-house CIO, contracting your IT needs to a fractional CIO gives you flexible service options so you receive as much or as little assistance as your company needs. As a third party, a fractional CIO will provide greater objectivity, allowing the consultant to present you with the<span>&nbsp;</span><a href="https://www.sagiss.com/blog/managed-it-basics">managed IT essentials</a><span>&nbsp;</span>without the pressure of internal politics.</p> <p>&nbsp;</p> <h3>2. The resources of a full-time CIO (without the cost)</h3> <p>Even though fractional CIOs are not a full-time employees, they have the means, connections, and know-how that make it possible to solve IT problems as they arise. Also, because fractional CIOs understand how your company operates, they can connect you with reliable experts who can help even if they don't possess the exact resources possible to solve a specific problem.</p> <p>&nbsp;</p> <h3>3. Cost reduction</h3> <p>A fractional CIO helps maximize the return on your IT investment by optimizing your technology to streamline business processes, ensuring your team has the right tools for the job, and making sure that you don’t overspend.&nbsp;</p> <p>&nbsp;</p> <h3>4. Clear communication</h3> <p>Managing IT risk is vital to protecting your company's mission-critical data. You must ensure mission-critical data is safe from a cyber attack or natural disaster. Unlike a day-to-day technician who may bog you down with complicated “tech speak”, a fractional CIO is able to convey the legitimate value of IT projects and their associated risks in plain language without sugarcoating benefits or glossing over the technical details.</p> <p>&nbsp;</p> <h3>5. Comprehensive consulting</h3> <p>Modern IT systems are complex, multi-faceted beasts that require a wide variety of expertise in order to properly manage. One of the great things about a fractional CIO is that you can often turn to these individuals for guidance through a variety of problems. A well-qualified fractional CIO will be able to provide guidance on<span>&nbsp;</span><a href="https://www.sagiss.com/blog/data-backup-and-disaster-recovery">data backup and disaster recovery</a><span>&nbsp;</span>plans,<span>&nbsp;</span><a href="https://www.sagiss.com/blog/managed-cloud-services">managed cloud services</a><span>&nbsp;</span>and<span>&nbsp;</span><a href="https://www.sagiss.com/blog/managed-security-services">managed security services</a>, and even hardware/software procurement.</p> <img src="https://track.hubspot.com/__ptq.gif?a=219672&amp;k=14&amp;r=https%3A%2F%2Fwww.sagiss.com%2Fblog%2Fis-a-fractional-cio-a-good-fit-for-your-business&amp;bu=https%253A%252F%252Fwww.sagiss.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Managed security services Managed IT services Mon, 10 Oct 2022 14:18:00 GMT https://www.sagiss.com/blog/is-a-fractional-cio-a-good-fit-for-your-business 2022-10-10T14:18:00Z Sagiss, LLC MSP vs MSSP - What are the differences? https://www.sagiss.com/blog/msp-vs-mssp-what-are-the-differences <div class="hs-featured-image-wrapper"> <a href="https://www.sagiss.com/blog/msp-vs-mssp-what-are-the-differences" title="" class="hs-featured-image-link"> <img src="https://www.sagiss.com/hubfs/Media/Blog/msp-vs-mssp.jpg" alt="MSP vs MSSP - What are the differences?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>The masses are often confused by the terms "MSP" and "MSSP". They may think there's no difference because the two are differentiated only by an extra letter.</p> <p>The masses are often confused by the terms "MSP" and "MSSP". They may think there's no difference because the two are differentiated only by an extra letter.</p> <p>Adding to the confusion, many services do overlap between the two classifications.</p> <p>Let's start by defining each term and then digging into the similarities and differences between them.</p> <br> <h2>What is the role of an MSP?</h2> <p>Traditionally, an MSP (managed service provider) has been the replacement for your internal IT department.</p> <p><span style="font-size: 0.9rem; background-color: transparent;">The MSP is focused on the day-to-day IT operations, including <a href="https://www.sagiss.com/blog/support-services-the-sagiss-way">service desk</a>, installing <a href="https://www.sagiss.com/blog/3-reasons-to-install-software-patches">software patches</a>, and <a href="https://www.sagiss.com/blog/data-backup-and-disaster-recovery">data backup and disaster recovery</a>.</span></p> <br> <h2>What is the role of an MSSP?</h2> <p>A traditional MSSP (managed security service provider) focuses on security and security only. Common services include security operations center (SOC), managed detection and response (MDR), and security information and event management (SIEM).</p> <br> <h2>What is the difference between an MSP and MSSP?</h2> <p>The traditional MSP is not interested in the risk associated with security services, which may be outsourced to an MSSP. Security seeps into every aspect of technology, so it's not as if an MSP can draw a line in the sand and refuse to touch anything security-related. But an MSP's focus remains on IT, not on security.</p> <p>The traditional MSSP relies on an MSP or internal IT to handle the day-to-day operations so that the MSSP can focus on security.</p> <p>Many MSPs have partnership agreements with MSSPs (and vice versa) so that they can work together to serve all their clients' needs.</p> <br> <h2>What are the similarities between MSP and MSSP?</h2> <p>As MSPs grow, they are able to take on more MSSP responsibilities, giving their clients more value with fewer vendors.</p> <p>Many modern MSPs perform the duties of an MSSP but still call themselves only an MSP, creating more confusion about these terms.</p> <br> <h2>Is Sagiss an MSP or an MSSP?&nbsp;</h2> <p>Sagiss started as an MSP over 25 years ago.</p> <p>But in 2018, we began adding more security services to our portfolio. We focused on the services that added the most value for our clients, being:</p> <ul> <li> <p><a href="https://www.sagiss.com/blog/why-your-company-needs-end-user-security-training">End user security training</a>.</p> </li> <li> <p><span style="font-size: 0.9rem; background-color: transparent;"></span><a href="https://www.sagiss.com/blog/what-is-next-generation-antivirus" style="font-size: 0.9rem;">Next-generation antivirus</a><span style="font-size: 0.9rem; background-color: transparent;">.</span></p> </li> <li> <p><span style="font-size: 0.9rem; background-color: transparent;"></span><span style="font-size: 0.9rem; background-color: transparent;"></span><a href="https://www.sagiss.com/blog/what-is-vulnerability-management" style="font-size: 0.9rem;">Vulnerability management</a><span style="font-size: 0.9rem; background-color: transparent;">.</span></p> </li> <li> <p><span style="font-size: 0.9rem; background-color: transparent;"></span><span style="font-size: 0.9rem; background-color: transparent;"></span><a href="https://www.sagiss.com/blog/what-is-multi-factor-authentication" style="font-size: 0.9rem;">Multi-factor authentication</a><span style="font-size: 0.9rem; background-color: transparent;">.</span></p> </li> <li> <p><span style="font-size: 0.9rem; background-color: transparent;"></span><span style="font-size: 0.9rem; background-color: transparent;"></span><a href="https://www.sagiss.com/blog/how-do-password-managers-work" style="font-size: 0.9rem;">Password managers</a><span style="font-size: 0.9rem; background-color: transparent;">.</span></p> </li> </ul> <img src="https://track.hubspot.com/__ptq.gif?a=219672&amp;k=14&amp;r=https%3A%2F%2Fwww.sagiss.com%2Fblog%2Fmsp-vs-mssp-what-are-the-differences&amp;bu=https%253A%252F%252Fwww.sagiss.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Managed security services Managed IT services Mon, 03 Oct 2022 19:37:28 GMT https://www.sagiss.com/blog/msp-vs-mssp-what-are-the-differences 2022-10-03T19:37:28Z Sagiss, LLC Security is a team effort https://www.sagiss.com/blog/security-is-a-team-effort <div class="hs-featured-image-wrapper"> <a href="https://www.sagiss.com/blog/security-is-a-team-effort" title="" class="hs-featured-image-link"> <img src="https://www.sagiss.com/hubfs/Media/Blog/security-is-a-team-effort.png" alt="Security is a team effort" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>In decades past, job responsibilities were reserved for specific departments. One department had one type of people who performed one type of task.</p> <p>In decades past, job responsibilities were reserved for specific departments. One department had one type of people who performed one type of task.</p> <p>But in recent years, the lines between specific job functions and responsibilities have blurred. Fewer people can look to their departments to define what is and what is not part of their jobs.</p> <p>An example of this shift lies in the role of marketing. Marketing no longer lives and dies within the cubicle walls of a select few in the creative department. Marketing is now included <a href="https://seths.blog/2009/02/which-comes-first-the-product-or-the-marketing/">in the product itself</a>.</p> <p>Marketing is included in every customer interaction. (Think of the Chick-fil-A employee who responds to every "thank you" with "My pleasure.")</p> <p>It's even in the design of your website. (If your website makes it hard for people to find the information they want, they're more likely to turn to one of your competitors.)</p> <p>Similar logic applies to your company's security.</p> <br> <h2>Security is not solely the responsibility of the IT department</h2> <p>IT may be the first department you think of when identifying technology within a business. But the IT department is far from the only department using technology to complete its daily job functions.</p> <p>Technology touches every aspect of a business, from sales and marketing to operations to HR to legal—the list can go on and on.</p> <p>While the IT department can put certain safeguards in place—<a href="https://www.sagiss.com/blog/why-businesses-need-web-content-filtering">web content filtering</a>, <a href="https://www.sagiss.com/blog/what-is-next-generation-antivirus">next-generation antivirus</a>, and regular updates of <a href="https://www.sagiss.com/blog/3-reasons-to-install-software-patches">software patches</a>, to name a few—IT can't guarantee that company data and systems won't be compromised.</p> <p>IT can't stop someone in accounting from clicking a bad link. Or someone in dispatch from downloading a bad attachment. Or an executive from giving up login credentials from a phishing attack.</p> <p>The truth is, the IT department can't guarantee absolute security. This is not a failing of IT. Rather, this point is an acknowledgement of the reality of a company's security, and the shared responsibility of everyone within that company.</p> <p><img src="https://www.sagiss.com/hs-fs/hubfs/Media/Blog/security-is-a-team-effort.png?width=596&amp;name=security-is-a-team-effort.png" alt="Security is a team effort" width="596" style="width: 596px; margin-left: auto; margin-right: auto; display: block;"></p> <br> <h2>How can departments collaborate to strengthen security?</h2> <p><a href="https://www.sagiss.com/blog/why-your-company-needs-end-user-security-training">End user security training</a> for all employees is a great place to start, as it empowers employees by teaching them how to identify <a href="https://www.sagiss.com/blog/what-is-threatware">threatware</a> and other <a href="https://www.sagiss.com/blog/8-security-concerns-for-the-modern-web">security concerns</a>.</p> <p>Because security is everyone's responsibility, it is also part of everyone's job. Employees should be encouraged to stay on top of the latest security trends.</p> <p>Employers also need to know their threat profiles and also how to lessen their risks. Conducting a <a href="https://www.sagiss.com/blog/how-does-a-network-security-assessment-work">network security assessment</a> or consulting with a <a href="https://www.sagiss.com/blog/5-benefits-of-hiring-a-vcio">vCIO</a> are great options to get started.</p> <br> <h2>If we go down, then we go down together</h2> <p>A security incident does not affect only the IT department. No one gets work down when systems are down to security compromises.</p> <p>With <a href="https://www.sagiss.com/blog/what-is-the-cost-of-a-data-breach">the cost of a data breach</a> averaging <span style="font-weight: bold;">$4.24 million</span>, the IT department won't be the only ones looking for jobs when companies are unable to recover.</p> <img src="https://track.hubspot.com/__ptq.gif?a=219672&amp;k=14&amp;r=https%3A%2F%2Fwww.sagiss.com%2Fblog%2Fsecurity-is-a-team-effort&amp;bu=https%253A%252F%252Fwww.sagiss.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Managed security services Managed IT services End User Security Training Mon, 26 Sep 2022 19:41:42 GMT jlacaze@sagiss.com (Jake LaCaze) https://www.sagiss.com/blog/security-is-a-team-effort 2022-09-26T19:41:42Z Security dos and don'ts https://www.sagiss.com/blog/security-dos-and-donts <div class="hs-featured-image-wrapper"> <a href="https://www.sagiss.com/blog/security-dos-and-donts" title="" class="hs-featured-image-link"> <img src="https://www.sagiss.com/hubfs/Media/Blog/security-dos-and-donts.jpg" alt="Security dos and don'ts" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><span style="font-weight: normal;">Solid security is, in many ways, complicated.</span></p> <p>Fortunately, there are a few basics you can follow to tighten up your security right away and get high ROI from your efforts.</p> <p>Check out our list of security dos and don't below.</p> <p><span style="font-weight: normal;">Solid security is, in many ways, complicated.</span></p> <p>Fortunately, there are a few basics you can follow to tighten up your security right away and get high ROI from your efforts.</p> <p>Check out our list of security dos and don't below.</p> <p></p> <p style="font-weight: bold;">Topics below include:</p> <ul> <li style="font-weight: bold;"> <p><a href="#cyber-liability-insurance">Cyber liability insurance</a></p> </li> <li style="font-weight: bold;"> <p><a href="#data-backup-and-disaster-recovery">Data backup and disaster recovery</a></p> </li> <li style="font-weight: bold;"> <p><a href="#hard-drive-disposal">Hard drive disposal</a></p> </li> <li style="font-weight: bold;"> <p><a href="#links">Links</a></p> </li> <li style="font-weight: bold;"> <p><a href="#passwords-and-logins">Passwords and logins</a></p> </li> <li style="font-weight: bold;"> <p><a href="#physical-device-security">Physical device security</a></p> </li> <li style="font-weight: bold;"> <p><a href="#software-patches">Software patches</a></p> </li> <li style="font-weight: bold;"> <p><a href="#user-access-and-permissions">User access and permissions</a></p> </li> </ul> <p>&nbsp;</p> <h2>Cyber liability insurance</h2> <p>Make sure you're financially covered when disaster hits.</p> <br> <h3>Do</h3> <ul> <li> <p>Make sure you understand the coverage of your <a href="https://www.sagiss.com/blog/cyber-liability-insurance-what-is-it-and-why-is-it-so-important">cyber liability insurance </a>policy.</p> </li> </ul> <br> <br> <h3>Don't</h3> <ul> <li> <p><span style="font-weight: bold;">DON'T</span> wait until you need your policy to make sure you're sufficiently covered.</p> </li> </ul> <p><a href="#menu">^ Back to top</a></p> <br> <h2>Data backup and disaster recovery</h2> <p>Data backup is the backbone of a disaster recovery plan.</p> <br> <h3>Do</h3> <ul> <li> <p>Test your <a href="https://www.sagiss.com/blog/data-backup-and-disaster-recovery">data backups</a> regularly.</p> </li> </ul> <br> <br> <h3>Don't</h3> <ul> <li> <p><strong>DON'T</strong> assume your backups are working without testing.</p> </li> </ul> <p><a href="#menu">^ Back to top</a></p> <br> <h2>Hard drive disposal</h2> <p>Properly dispose your data storage devices.</p> <br> <h3>Do</h3> <ul> <li> <p>Destroy hard drives before disposing.</p> </li> <li> <p>If destroying the drive is not an option (such as when selling a device with unremovable storage), reformat the drive and overwrite the free space.</p> </li> </ul> <br> <br> <h3>Don't</h3> <ul> <li> <p><strong>DON'T</strong> just throw away your hard drive when you've retired it.</p> </li> </ul> <p><a href="#menu">^ Back to top</a></p> <br> <h2>Links</h2> <p>Links are of the common ways that <a href="https://www.sagiss.com/blog/what-is-threatware">threatware</a> spreads.</p> <br> <h3>Do</h3> <ul> <li> <p>Think before you click.</p> </li> <li> <p>Go directly to the appropriate website rather than click the link.</p> </li> </ul> <br> <br> <h3>Don't</h3> <ul> <li> <p><strong>DON'T</strong> click a link just because it was sent to you as "<strong>URGENT!</strong>"</p> </li> </ul> <p><a href="#menu">^ Back to top</a></p> <br> <h2>Passwords and logins</h2> <p>Make sure you're covering the basics of account logins.</p> <br> <h3>Do</h3> <ul> <li> <p>Use <a href="https://www.sagiss.com/blog/how-do-password-managers-work">password managers</a>.</p> </li> <li> <p>Use long, complicated passwords.</p> </li> <li> <p>Use <a href="https://www.sagiss.com/blog/what-is-multi-factor-authentication">multi-factor authentication</a> when possible.</p> </li> </ul> <br> <br> <h3>Don't</h3> <ul> <li> <p><strong>DON'T</strong>&nbsp;use weak passwords.</p> </li> <li> <p><strong>DON'T</strong> reuse passwords.</p> </li> </ul> <p><a href="#menu">^ Back to top</a></p> <br> <h2>Physical device security</h2> <p>Local access is a great option for breaches.</p> <br> <h3>Do</h3> <ul> <li> <p>Lock devices when leaving them unattended.</p> </li> </ul> <br> <br> <h3>Don't</h3> <ul> <li> <p><strong>DON'T</strong> leave devices unlocked when attended.</p> </li> </ul> <p><a href="#menu">^ Back to top</a></p> <br> <h2>Software patches</h2> <p>They're more than pesky pop-up reminders.</p> <br> <h3>Do</h3> <ul> <li> <p>Install <a href="https://www.sagiss.com/blog/3-reasons-to-install-software-patches">software patches </a>as they become available<a href="https://www.sagiss.com/blog/3-reasons-to-install-software-patches">.</a></p> </li> </ul> <br> <br> <h3>Don't</h3> <ul> <li> <p><strong>DON'T</strong> ignore software patches.</p> </li> </ul> <p><a href="#menu">^ Back to top</a></p> <br> <h2>User access and permissions</h2> <p>Know who's clicking around where.</p> <br> <h3>Do</h3> <ul> <li> <p>Disable obsolete user accounts.</p> </li> <li> <p>Give users access only to the files and directories necessary to fulfill their duties.</p> </li> </ul> <br> <br> <h3>Don't</h3> <ul> <li> <p><strong>DON'T&nbsp;</strong>leave <a href="https://www.sagiss.com/blog/8-security-concerns-for-the-modern-web">ghost users</a> on your networks and systems.</p> </li> <li> <p><strong>DON'T</strong> give users access to all of your data. Use frameworks like the <a href="https://www.sagiss.com/blog/why-internal-policies-are-crucial-for-managed-security-success">principle of least privilege</a> and <a href="https://www.sagiss.com/blog/why-internal-policies-are-crucial-for-managed-security-success">zero trust security</a> to limit access.</p> </li> </ul> <p><a href="#menu">^ Back to top</a></p> <img src="https://track.hubspot.com/__ptq.gif?a=219672&amp;k=14&amp;r=https%3A%2F%2Fwww.sagiss.com%2Fblog%2Fsecurity-dos-and-donts&amp;bu=https%253A%252F%252Fwww.sagiss.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Managed security services Tips, Tricks, and Tools Mon, 26 Sep 2022 14:07:20 GMT jlacaze@sagiss.com (Jake LaCaze) https://www.sagiss.com/blog/security-dos-and-donts 2022-09-26T14:07:20Z What is threatware? https://www.sagiss.com/blog/what-is-threatware <div class="hs-featured-image-wrapper"> <a href="https://www.sagiss.com/blog/what-is-threatware" title="" class="hs-featured-image-link"> <img src="https://www.sagiss.com/hubfs/Media/Blog/what-is-threatware.jpg" alt="What is threatware?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>Threatware is not a common term, so you may think it's a new class of cyber threat. But threatware is an umbrella term including many common security risks.</p> <p>Threatware is not a common term, so you may think it's a new class of cyber threat. But threatware is an umbrella term including many common security risks.</p> <p>Threatware can be summarized as anything meant to cause harm via a computer or similar device.</p> <br> <h2>Types of threatware</h2> <p>Threatware can be divided into three main buckets, including:</p> <ul> <li> <p>Malware such as <a href="https://www.sagiss.com/blog/what-is-emotet">emotet</a>.</p> </li> <li> <p>Spyware.</p> </li> <li> <p>Ransomware.</p> </li> </ul> <p>&nbsp;</p> <div class="hs-video-widget"> <img src="https://api-na1.hubapi.com/video/v1/public/7020655148/poster?portalId=219672" style="max-width: 1920px" alt="HubSpot Video"> </div> <p style="text-align: center;"><small><em>Ransomware is a leading example of threatware.</em></small></p> <p style="text-align: center;">&nbsp;</p> <p>So threatware includes anything that can fit into the buckets above, such as:</p> <ul> <li> <p>Keyloggers.</p> </li> <li> <p>Worms.</p> </li> <li> <p>Trojan horses.</p> </li> <li> <p>Rootkits.</p> </li> <li> <p>Cryptojacking.</p> </li> <li> <p>And much more.</p> </li> </ul> <br> <p>These threats are already on the radar of most businesses and MSPs. So there's no need to change things up as long as you've got the <a href="https://www.sagiss.com/blog/cybersecurity-essentials">cybersecurity essentials</a> covered.</p> <br> <h2>How does threatware spread?</h2> <p>Because threatware is such a broad term, it can spread in uncountable ways, including:</p> <ul> <li> <p>Malicious email attachments.</p> </li> <li> <p>Phishing emails.</p> </li> <li> <p>Websites that install malicious code on web browsers.</p> </li> </ul> <p>&nbsp;</p> <p><img src="https://www.sagiss.com/hs-fs/hubfs/Media/Blog/threatware-spreading.jpg?width=596&amp;name=threatware-spreading.jpg" alt="Threatware spreading" width="596" style="width: 596px; margin-left: auto; margin-right: auto; display: block;"></p> <br> <h2>How to avoid threatware</h2> <p>You don't need to anything special to protect yourself from threatware specifically.</p> <p>But this is a great opportunity to remind you of some basic security practices you should be following.</p> <p>You can better your odds against threatware by:</p> <ul> <li> <p><span>Keeping your system up to date by installing </span><a href="https://www.sagiss.com/blog/3-reasons-to-install-software-patches">software patches</a><span> when available.</span></p> </li> <li> <p><span>Using </span><a href="https://www.sagiss.com/blog/how-do-password-managers-work">password managers</a><span> and </span><a href="https://www.sagiss.com/blog/what-is-multi-factor-authentication"><span>multi-factor authentication</span></a><span>.</span></p> </li> <li> <p><span>Educating yourself through </span><a href="https://www.sagiss.com/blog/why-your-company-needs-end-user-security-training"><span>end user security training</span></a><span> so that you know what to avoid.</span></p> </li> <li> <p><span>Installing </span><a href="https://www.sagiss.com/blog/what-is-next-generation-antivirus"><span>next-generation antivirus</span></a><span>.</span></p> </li> <li> <p><span>Using </span><a href="https://www.sagiss.com/blog/why-businesses-need-web-content-filtering"><span>web content filtering</span></a><span> to block sites known to install threatware on visitors' devices.</span></p> </li> </ul> <img src="https://track.hubspot.com/__ptq.gif?a=219672&amp;k=14&amp;r=https%3A%2F%2Fwww.sagiss.com%2Fblog%2Fwhat-is-threatware&amp;bu=https%253A%252F%252Fwww.sagiss.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Ransomware Managed security services Mon, 19 Sep 2022 17:53:23 GMT jlacaze@sagiss.com (Jake LaCaze) https://www.sagiss.com/blog/what-is-threatware 2022-09-19T17:53:23Z The 4 most common types of data storage https://www.sagiss.com/blog/the-4-most-common-types-of-data-storage <div class="hs-featured-image-wrapper"> <a href="https://www.sagiss.com/blog/the-4-most-common-types-of-data-storage" title="" class="hs-featured-image-link"> <img src="https://www.sagiss.com/hubfs/Media/Blog/types-of-data-storage.jpg" alt="Types of data storage" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>The world runs on data. And businesses now have access to more data than ever before.</p> <p>But where and how do businesses store that data?</p> <p>In this post, we'll cover the 4 most common types of data storage and their use cases.</p> <p>The world runs on data. And businesses now have access to more data than ever before.</p> <p>But where and how do businesses store that data?</p> <p>In this post, we'll cover the 4 most common types of data storage and their use cases.</p> <p></p> <br> <h2>Direct attached storage (DAS)</h2> <p>Though most people may not be familiar with the term "direct attached storage," they are familiar with the concept.</p> <p>Direct attached storage is any type of data storage that is directly attached to a computer. These storage devices are not typically accessible to other computers.</p> <p>Examples of direct attached storage include USB flash drives, microSD cards, and plug-and-play external hard drives.</p> <p>The top brands in direct attached storage include:</p> <ul> <li> <p>Western Digital (WD).</p> </li> <li> <p>Seagate.</p> </li> <li> <p>SanDisk.</p> </li> </ul> <br> <img src="https://www.sagiss.com/hs-fs/hubfs/Media/Blog/direct-attached-storage-examples.jpg?width=767&amp;name=direct-attached-storage-examples.jpg" alt="direct-attached-storage-examples" width="767" style="width: 767px; margin-left: auto; margin-right: auto; display: block;"> <p style="text-align: center;"><small><em>Examples of direct attached storage: USB flash drive and plug-and-play external hard drive</em></small></p> <br> <h2>Network attached storage (NAS)</h2> <p>Network attached storage is dedicated file storage that enables multiple users and related client devices to access data from a centralized storage unit. These devices are connected to the Local Area Network (LAN) via routers, network switches, or hubs, and usually require users to be on the local network to access them.</p> <p>NAS devices are typically found in homes and small businesses. Small businesses often use network attached storage to host data for their Samba/SMB share drives.</p> <p>A NAS may be equipped with a single drive, or multiple drives (hopefully set up in a RAID format to provide redundancy and resiliency in case one of the drives fails.)</p> <p>The top brands in network attached storage devices include:</p> <ul> <li> <p>Synology.</p> </li> <li> <p>QNAP.</p> </li> <li> <p>Western Digital My Cloud.</p> </li> </ul> <br> <p style="text-align: center;"><img src="https://www.sagiss.com/hs-fs/hubfs/Media/Blog/network-attached-storage-example.jpg?width=767&amp;name=network-attached-storage-example.jpg" alt="Network attached storage example" width="767" style="width: 767px; margin-left: auto; margin-right: auto; display: block;"><small><em>Example of network attached storage: A 5-bay Synology NAS</em></small></p> <br> <h2>Storage Area Network (SAN)</h2> <p>A storage area network is a set of interconnected drives and servers that acts as a centralized pool of disk storage.</p> <p>A SAN tends to be a standalone network dedicated to data storage.</p> <br> <h3>SAN vs. NAS</h3> <p>SAN and NAS may sound the same, but they do have their differences.</p> <p>A SAN has multiple switches and disk arrays, making it more complicated and giving it multiple layers of redundancy and making it more resilient and tolerant of failure. Losing one component of your SAN (such as losing power to one of your SAN devices) shouldn't make your SAN unusable.</p> <p>But a NAS has a single point of failure, so losing one component can make your NAS useless.</p> <p>Also, a SAN is more scalable than a NAS, meaning a SAN is easier to upgrade with fewer disruptions.</p> <p>And because a SAN is on its own network, it's not affected by bottlenecks in your local network.</p> <p><img src="https://www.sagiss.com/hs-fs/hubfs/Media/Blog/storage-area-network-example.jpg?width=767&amp;name=storage-area-network-example.jpg" alt="Storage area network example" width="767" style="width: 767px; margin-left: auto; margin-right: auto; display: block;"></p> <p><small><em>Example of a storage area network: Nimble Storage</em></small></p> <br> <h2>Cloud storage (remote storage)</h2> <p>Cloud storage (also known as remote storage) refers to the type of storage that transfers and accesses data off-site, beyond your local network, by using the internet. Cloud storage differs from the abovementioned types of data storage because it's the only type that is not accessed locally (either by direct connection or the local network).</p> <p>Consumers and business owners alike are generally familiar with cloud options such as:</p> <ul> <li> <p>Microsoft OneDrive.</p> </li> <li> <p>Google Drive.</p> </li> <li> <p>Dropbox.</p> </li> <li> <p>Box.</p> </li> <li> <p>iCloud.</p> </li> </ul> <br> <p>Most people's needs can likely be fulfilled by either of the options above. The most important consideration tends to be how these cloud options fit into their larger business ecosystems. For example, Microsoft OneDrive is the obvious option for businesses already that already have Microsoft 365 subscriptions.</p> <p style="text-align: center;"><img src="https://www.sagiss.com/hs-fs/hubfs/Media/Blog/microsoft-one-drive-microsoft-365.jpg?width=767&amp;name=microsoft-one-drive-microsoft-365.jpg" alt="Microsoft OneDrive is part of Microsoft 365" width="767" style="width: 767px; margin-left: auto; margin-right: auto; display: block;"><em style="font-size: 17.28px; background-color: transparent;">Microsoft OneDrive is part of Microsoft 365.</em></p> <br> <h2 style="text-align: left;">Which type of data storage is right for your business?</h2> <p>Now that you know more about the 4 most common types, you have to determine which option is right for your business and its unique needs. As is often the case with technology services, you have to find the right balance between cost and convenience.</p> <img src="https://track.hubspot.com/__ptq.gif?a=219672&amp;k=14&amp;r=https%3A%2F%2Fwww.sagiss.com%2Fblog%2Fthe-4-most-common-types-of-data-storage&amp;bu=https%253A%252F%252Fwww.sagiss.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Managed IT services Fri, 16 Sep 2022 15:32:22 GMT jlacaze@sagiss.com (Jake LaCaze) https://www.sagiss.com/blog/the-4-most-common-types-of-data-storage 2022-09-16T15:32:22Z The benefits of co-managed IT https://www.sagiss.com/blog/the-benefits-of-co-managed-it <div class="hs-featured-image-wrapper"> <a href="https://www.sagiss.com/blog/the-benefits-of-co-managed-it" title="" class="hs-featured-image-link"> <img src="https://www.sagiss.com/hubfs/co-managed-it.webp" alt="Co-managed IT" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><span>When most people think of outsourced or managed IT, they likely think of fully-managed IT. With fully-managed IT, you rely on a managed service provider (MSP) to handle all your IT needs. </span></p> <p><span>When most people think of outsourced or managed IT, they likely think of fully-managed IT. With fully-managed IT, you rely on a managed service provider (MSP) to handle all your IT needs. </span></p> <p><span>But there's another option known as co-managed IT.</span></p> <br> <h2><span>What is co-managed IT?</span></h2> <p><span>Think of co-managed IT as a hybrid model of IT support.</span></p> <p><span>When choosing the co-managed IT model, a business will keep internal IT to handle day-to-day matters such as the service desk, while the MSP handles the heavier aspects of IT support like IT infrastructure, servers, and <a href="https://www.sagiss.com/blog/5-benefits-of-hiring-a-vcio">vCIO</a> responsibilities. Also, having an MSP on your side means you don't have to worry when special projects (or <span style="font-size: 21.6px;">technological</span> disasters) pop up, because you can lean on the MSP for help.</span></p> <br> <h2><span>What are the benefits of co-managed IT?</span></h2> <p><span>While fully-managed IT is a better fit for small companies, larger companies have plenty reason to adopt the co-managed IT approach.</span></p> <br> <h3><span>Your internal IT staff can escalate issues.</span></h3> <p><span>With co-managed IT, your internal IT staff are not left alone to fend for themselves. </span></p> <p><span>When issues are too big for them to handle, internal IT can call on the managed service provider for help. This feature comes in handy in situations like ransomware attacks, which are much for one IT person to handle.</span></p> <br> <h3><span>Co-managed IT makes scaling up IT easier.</span></h3> <p><span>Higher-level IT positions such as Level III tech/specialists and CIO/IT director are expensive to hire, train, and retain. These positions can be outsourced to an MSP while your Level I and Level II techs help with the more common IT occurrences.</span></p> <p><span>In short, the co-managed IT approach is a more efficient way to scale and maintain balance as your business grows.</span></p> <br> <h3><span>Co-managed IT knows what your business needs.</span></h3> <p><span>Partnering with a competent and <a href="https://www.sagiss.com/blog/why-your-business-needs-a-certified-managed-service-provider">certified managed service provider</a> means you don't have to research the technology solutions your company needs. </span></p> <p><span>Whatever problems you're experiencing, the MSP has already seen. And that MSP can get your business outfitted and moving along well before you can figure out what services would most benefit your workflows and needs.</span></p> <br> <h3><span>Your co-managed IT partner can train you on the tech.</span></h3> <p><span>Not only will your co-managed MSP supply you with the right tools, but they can </span><em>train</em><span>&nbsp;your personnel to use the right tools in the right ways.</span></p> <p><span>MSPs have plenty experience with training, as they have to train their own new hires on using that same technology.</span></p> <img src="https://track.hubspot.com/__ptq.gif?a=219672&amp;k=14&amp;r=https%3A%2F%2Fwww.sagiss.com%2Fblog%2Fthe-benefits-of-co-managed-it&amp;bu=https%253A%252F%252Fwww.sagiss.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Managed IT services Tue, 13 Sep 2022 16:15:52 GMT jlacaze@sagiss.com (Jake LaCaze) https://www.sagiss.com/blog/the-benefits-of-co-managed-it 2022-09-13T16:15:52Z