What Office 365 can offer to education

Educational institutions are responsible for teaching future generations how to operate in the real world, particularly as employers increasingly look for tech-savvy staff members. Microsoft Office remains the most widely-used productivity suite within education and business environments. Students are taught how to put together a PowerPoint presentation, record and analyze data trends within Excel and complete written assignments through Word. Microsoft is aiming to modernize teaching and prepare students for the next steps by empowering them with effective technology like Office 365.

Remote accessibility

The biggest benefit of Office 365 in education is the fact that it can be used outside of the school. According to Microsoft numbers, over 110 million students and teachers leverage Office 365 at school and at home. The software ensures that everyone can create, collaborate and communicate effectively. If a student stays home sick, he or she can still finish assignments, catch up on the lecture and contribute to the class. This type of accessibility keeps everyone together so that lessons can proceed without anyone feeling left out. Office 365's remote capabilities also give students a taste of the potential for mobile, remote and work from home opportunities given by employers. Pupils learn how to be productive on devices even at home and manage their time wisely.

Office 365 enables students to use resources from anywhere. Office 365 enables students to use resources from anywhere.

Software skills for the future

Interacting with Office 365 and its various modules is critical to developing students into capable members of society. Office staples like Word, PowerPoint and Excel are minimum requirements for a variety of jobs. Understanding the ins and outs of these programs will help students perform more effectively in the real world, according to Ed Tech Magazine. Students might even learn how to use Exchange Online, SharePoint Online and Lync Online, serving as major building blocks for future skills. More employers are looking for candidates to understand how to store and share documents, use conferencing tools and leverage email effectively. With Office 365, modules can be added over time to teach students as they progress through their school journey. 

"Schools can scale their features according to future demand and change their modules."

Power of the cloud

The cloud is a powerful asset for businesses and schools alike. Office 365 for Education offers more sophisticated and engaging features than a traditional suite, all through a cloud platform. Schools can scale their features according to future demand and change their modules at any time to reflect world demands. This ensures that students get immediate support as technology changes, supplying them with the most relevant skills. In addition to adjustable modules, educational institutions can take advantage of the integrated, holistic experience of Office 365 that power better learning outcomes.

Educators must strive to keep up with the times and ensure that their students will become productive members of society. Much of this entails teaching pupils how to use technology effectively to collaborate, communicate and complete tasks. ISG Technology has the expertise to configure and manage your Office 365 setup to enable future generations. For more information on what Office 365 can offer the education space, contact ISG Technology today.

Meet Ryan Jackson: CTO and SVP of Technology Operations

ISG Technology, part of the Twin Valley Family of Companies (TVFC), announces the addition of Ryan Jackson as its Chief Technology Officer and Senior Vice President of Technology Operations. Jackson brings more than 20 years of experience in IT management, most recently with Computer Sciences Corporation.

As CTO, Jackson will serve as head of the company’s client-centric product/service development and related technology operations. He will provide key leadership in ISG’s ongoing commitment to helping clients drive business innovation through best-in-class technology solutions.

“Companies that want to thrive in today’s economy must close the gap between what their current technology allows them to do, and what is possible,” said ISG and Twin Valley CEO Ben Foster. “Ryan is a dynamic leader with a track record of innovation. We’re fortunate to have him on board as we help our clients focus on what matters most – growing their business.”

Foster added that TVFC has a rich tradition and culture of innovation that dates all the way back to 1947.

“Ryan’s vision for how technology can empower business is going to be a big part of our future.”

About Ryan Jackson
Ryan Jackson brings more than 20 years of experience in IT management to ISG Technology.  He most recently served as Computer Sciences Corporation’s Global Director for Account Service Delivery, Big Data Analytics and Business Intelligence. He has worked across several industries including A&D, Healthcare, Manufacturing, Insurance, Telecom, Consumer Products/Retail, Pharmaceutical and Transportation.

What you need to know about KRACK attacks

Recently two Belgian researchers from the University of Leuven Vanhoef’s research group published details about an attack that affects all devices that support Wi-Fi (so pretty much everybody). This attack, referred to as KRACK (short for Key Reinstallation AttaCK) targets the third step in a four-way authentication “handshake” performed when your Wi-Fi client device attempts to connect to a protected Wi-Fi network. The purpose of this blog post is to:

  • Help you understand the issue
  • Point you to trusted resources to explain it in more depth
  • Determine how you can protect yourself against it

What is the issue?

Researcher Mathy Vanhoef released information regarding a new attack vector on implementations of WPA2 Wireless networks. This attack utilizes a bug in the WPA2 key negotiation process, and is effective against nearly all current Wi-Fi implementations. As of this writing, patches have only been released for a small number of devices. Fortunately, the work required to exploit this vulnerability is high, and due to the physical requirements of attacking Wi-Fi networks it is less likely to be targeted as an attack vector. Phishing, Internet server vulnerabilities, and similar issues will remain the breach methods of choice.

Who is vulnerable?

Everyone with a wi-fi enabled device.

How can I defend myself?

Patch. More to the point, measure your current vendors by how long it takes them to patch. Throw away gear by those vendors that took a long time to patch and replace it with vendors that took a short time. If you use Wi-Fi for sensitive access, you may want to use a VPN to ensure a second layer of encryption protection.

What is being done?

Patches have already been released from a number of the major manufacturers. ISG is in close contact with our strategic partners to understand these patches. If you need assistance applying them or have any questions or concerns, please reach out to your ISG representative or call 877.334.4474.

Trends driving UC evolution

Unified communications has changed the face of business connections and raised the bar for capable tools. Vendors are constantly improving their UC solutions to ensure that they live up to the test of time and take emerging hardware and software into account. Let's take a look into a few trends that are driving the evolution of UC technology:

1. Mobility

Employees are no longer tied to their desks. They seek remote and mobile work opportunities to be productive and fulfill other obligations. As a result, businesses and UC solutions cannot rely on users being at a solitary computer all the time. SWNS noted that UC offers workers the ability to work, share and communicate on any device. This type of setup is simply too costly and not viable using legacy means. UC solutions will continue to evolve with mobility and collaboration across a variety of platforms as main drivers.

"People are increasingly using text and email instead of voice."

2. The shift away from voice

While voice calls will always be a necessary option, it's no longer the only connection opportunity that workers and customers want to use. People want to get critical answers quickly while completing other tasks, and voice calls don't always allow this flexibility. TechTarget contributor Tom Nolle noted that people are increasingly using text and email instead of voice, and UC is evolving with focus around these assets. Voice-centric UC models aren't going to be as valuable to youth entering the workforce, making it important for these solutions to take other options into account. Organizations must ensure that employees can hold ad hoc video and audio conferences, send instant messages and leverage a variety of other communications options to suit their preferences.

3. Customer experience

Organizations have always thrived off of their customers, but their strategies have only shifted in the past few years to actually focus on ensuring that their audience is provided with a great experience. Consumers will actively search out competitors if they don't have a positive interaction. Part of this has to do with connecting with the right people and receiving the best information quickly. UC integrates well with other programs, enabling employees to gain context around a caller's problem and quickly resolve problems. This functionality connects customers with the necessary party the first time and bolsters the overall experience.

UC solutions must continue adapting to emerging trends to meet customer expectations, provide mobile opportunities and facilitate more communications options. To keep up with UC shifts and leverage its features to your advantage, contact ISG for a consultation today.

Video: The Anatomy of an Attack – Vol. 1

Watch Cisco’s Ransomware Video: The Anatomy of an Attack to see how an effective ransomware attack comes together. This is why today’s enterprises require effective security. Learn how Cisco Email Security and Umbrella DNS provide dynamic security against ransomware. Umbrella DNS is cloud-based to provide security for all users on or off a network – essential cover for mobile devices and employees working out of office.

Only suspicious websites are redirected by Umbrella DNS for further investigation, offering robust security without compromising network speed or performance. If you manage to connect to a malicious website, Umbrella DNS blocks the site from requesting data, protecting your network until the threat is removed.

When you put ISG Technology to work for you, you don’t just put industry leading security experts on your team, you put security at the top of your priority list. You put the concern that someone might be selling you a short-sighted solution to the wayside. You put trust back where it belongs – on your side.

 

 

What makes Office 365 different

Microsoft products are an established go-to for business tools, with Office, Excel and PowerPoint being the most-used programs for a variety of work tasks. When it comes time to upgrade, however, what option should you choose? You can go with the traditional Office 2016 product or get the programs as part of an Office 365 subscription. Let's take a look at what makes Office 365 different and the advantages it can bring.

1. Includes more functionality

Office 2016 comes with the traditional package of programs. Once you buy it, you own it until you want to buy a new version. Office 365 turns this model on its head by offering the usual software tools alongside a variety of other applications, How-To Geek stated. The subscription model is particularly beneficial for those that want to always use the most updated tools, while paying only for what you use. Businesses could install Office 365 on up to five computers, while Office 2016 requires a license for every machine. Microsoft is adjusting Office 365 to be a better deal for company users and transition out of one-time-purchase versions. With the variety of available apps and cost savings, Office 365 is proving to be the more flexible option.

Office 365 comes with a variety of applications for business users. Office 365 comes with a variety of applications for business users.

2. Enables mobile operations

With traditional Microsoft Office products, employees could only access them from a desktop or laptop. However, workers are no longer chained to their desks and are seeking more mobile and remote work opportunities. Office 365 provides web-enabled access to critical business resources including email, calendar and documents from almost any device, technology consultant Michael Moran wrote in a LinkedIn post. With Office 365, workers are free to work where and when they choose. They're better able to respond to important requests and be productive outside of the office.

The comprehensive mobile capabilities afforded by Office 365 will have a direct impact on efficiency. Colleagues can send instant messages and participate in online meetings, ensuring that projects are completed on time. Mobile capabilities can also significantly aid in bolstering the customer experience by ensuring that employees have the tools on hand to collaborate, communicate and deliver results within one portal.

"Using professional services like Office 365 tells potential customers that you're serious about business," Moran wrote. "With these state-of-the-art but easy-to-use collaboration, mail, and messaging services, you can set yourself apart from organizations that use free or ad-supported services."

"Built-in security capabilities regularly scan messages for malicious software and spam."

3. Ensures security

When looking at online tools, leaders might jump to concerns over safety and security of their most valuable assets. However, with Office 365, you can use the same systems used by Microsoft to protect your network, documents and email. Built-in security capabilities regularly scan messages for malicious software and spam. Users are immediately notified of any unusual activity, enabling them to respond quickly even if they don't have advanced IT knowledge. This could make a big difference in preventing breaches and warning users of similar attack methods.

Because there's control over data in the cloud with Office 365, that also opens up the opportunity to use this platform as a means of disaster recovery. If the office is inaccessible or data is compromised, Office 365 ensures that resources are still available and can be restored. As threats become more prevalent, having these capabilities will give teams piece of mind that their information is safe.
Office 365 is certainly different from the products that most organizations associated with MIcrosoft. The benefits of security, features and mobility are too great to ignore, enabling the solution to become a standard for other productivity tools to follow in the future. For more information on why Office 365 is different and how to leverage it yourself, contact ISG today.

How to choose an effective UC solution

Creating and maintaining meaningful connections is an essential part of business that can impact supplier, partner and customer relationships. Having the right solution on hand can make all the difference in supporting employee needs and facilitating critical opportunities across important assets. Unified communications appears to be the answer to many business interaction needs, but it can be difficult to know where to start when looking at potential options. Let's take a closer look at how your can choose an effective UC solution:

1. Consider organization growth

The number of staff within a business isn't a permanent figure. People join and leave, but all organization leaders plan with the belief that the company will grow. When considering a UC solution, it's not only important to look at the amount of staff you currently have, but to also prepare for scaling in the future. TechTarget contributor Chris Partsenidis noted that most UC platforms support a specific number of users and are designed around these limitations. This could create major problems in the future as the business grows, forcing organizations to seek out new solutions.

Organizations will need to team up with a UC vendor that not only serves current needs, but also acts as a partner for strategic development. A capable provider should be able to scale features and services up or down depending on business requirements. This will guarantee the flexibility that companies need as they develop while still ensuring that employees have quality tools.

UC solutions should be able to scale alongside business growth. UC solutions should be able to scale alongside business growth.

2. Ensure mobile enablement

When businesses start out, they might only choose a few of the most important, basic communications tools that they'll need. As time progresses and technology preferences change, organizations must ensure that their strategies encapsulate user demands. Today's modern organizations are still scrambling to meet remote and mobile work expectations, facilitating bring-your-own-device policies and other similar initiatives. Mobile capabilities are becoming a necessity for employees, making it essential for UC solutions to effectively support this functionality.

With the insurgence of consumer devices in the workplace, that means that IT departments no longer have tight control over everything that goes on within their networks. Network World contributor Zeus Kerravala noted that UC applications will be an essential component to ensuring that users can switch devices on the fly and access UC functions. This type of freedom can boost collaboration opportunities and improve overall productivity.

"Use your business objectives to customize your UC solution."

3. Align with your objectives

Any new initiative must be able to prove its value to stakeholders and users alike. The benefits of UC have been widely reported, but seeing is believing. To get the most out of your UC solution, you must have a clear view of your business objectives and use them to customize your UC system, digital content specialist Rajesh Kulkarni wrote in a LinkedIn post. By aligning the UC solution with your goals, you can deliver maximum value and ensure that the offering makes sense for your organization's needs.

UC initiatives must be planned out carefully to ensure that workers are engaged and motivated to use the tools. Leaders must put a training mechanism in place to facilitate even adoption and improve receptiveness to changes caused by UC. Employees are expected to leave behind familiar solutions, making it essential to align with objectives and deliver in a way that will help cushion the impact for staff.

UC is the next big necessity for businesses to keep up with user demands and offer flexible communication options. By following these tips, you can choose the most effective UC solution for your needs and ensure it benefits your organization. To find out more about what UC solutions can offer, contact ISG Technology today.

Putting the “Innovation” in CIO

Chief Innovation Officer.  That’s the future for IT leaders seeking to place technology at the center of the conversation of how to grow their businesses.  The modern-day IT leader is more than just the technologist who understands how the network works or the executive who can explain why cloud matters.  Today’s IT leaders add value to the business and identify the opportunities where technology-driven business models can propel the enterprise forward.  The fastest growing taxi service in the world is a technology business.  So is one of the highest profile hospitality and lodging businesses.  Uber and Airbnb could not exist if not for the visionary leadership of founders who understood how technology could revolutionize a traditional business transaction. These disruptive businesses underscore the need for organizations to develop a solid and agile foundation to react to new opportunities.

Applying the Lessons of Innovation

The same principles apply to any business competing on a regional or global scale.  Healthcare organizations in America’s heartland can connect local resources to national experts via the cloud and high-speed broadband, bringing in the best and brightest talent for data-driven diagnosis.  Cities can harness the power of IoT and analytics to improve the quality of life, keep traffic flowing, and deploy public safety resources where they are needed.  Local schools can connect with universities across the country or across the world to expand both learning and cultural experiences for their students.  But getting to this reality requires thinking beyond just boxes and buzzwords.  Hybrid cloud might be a compelling technology, but if it doesn’t match your requirements, then it becomes a complicated way to spend more money.  Just because a technology appears in every article you read in the computer trade press, you still need to consider if it’s right for you.

Getting there means asking the right questions and understanding not only the “what and how?” of your technology decisions, but also the “why?”  It’s in asking the question, “why?” where the value of innovation comes to light.

Partnering for Success

At ISG Technology, innovation is at the heart of our mission.  But not innovation for innovation sake.  Innovation starts with the right technology foundation, allowing businesses to focus on opportunities, instead of constantly patching and maintaining an IT Infrastructure designed for the past.  Only with a solid foundation to work from, is innovation possible.

Innovation can take many forms, including developing a “Bring Your Own Device” policy, for example.  For a financial firm, it might mean building a data center foundation on converged infrastructure based, for example, on our partnership with Hewlett Packard Enterprise for the HPE Hyper Converged 380 solution, powered by Intel® Xeon® processors.  A local service business may reimagine its core value proposition based on a technology-driven business model.

IT Making a Difference

Wherever IT leaders start their journey to innovation, the measurement of success will be to close the gap between the current state and the destination.  In this journey, IT leaders must be mindful of balancing time, money, and resources to achieve their goals.

Technology for technology’s sake adds little value. The newest server, the faster storage like the HPE 3PAR StoreServ all-flash storage array, or the most hyped software is not always the right answer.  ISG is a partner who can help ask the right questions and build solutions which are aligned to the organization’s long-term goals and solve real business challenges.  Whatever the final answer is, ISG is prepared to help you innovate; that’s when IT makes a difference.

Visit our resources to learn more about how you can modernize your infrastructure with ISG.

#

 

The information contained herein is subject to change without notice. The only warranties for Hewlett Packard Enterprise products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. 

Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries.

© ISG Technology. All rights reserved.

 

How trust can impact business security

While you might want to place trust in elements of your business, it’s always necessary to keep on your toes. Learn more about how trust can impact your security and what to do about it by looking at the biggest risks in this infographic.