Managed Services: Your ticket to a growing and productive business

Running a business is no easy feat. Succeeding involves overseeing many initiatives and facing many challenges on many fronts. In short: you have a lot going on. When it comes to the overall health of your business, managing your IT network should never be the straw that broke the camel’s back. Unfortunately, that’s exactly how it can feel for a lot of business owners and employees. Managing your IT network is a full-time job (sometimes many) and you already have a full-time job. In this eBook, we will illuminate the many reasons for foregoing self-management of your IT network in favor of partnering with a managed services provider to meet your technology goals.

There’s a lot for you to manage. Try managed services.

Surgeons perform surgery, accountants handle our taxes, and pediatricians take care of our children. No matter what kind of business you have, chances are that you’d rather focus on your actual business than the intricacies of running a modern IT network. So, who do you turn to when it comes to properly running your network? That would be a managed services provider (MSP). A managed services provider is any company that performs a contract service associated with your network or your infrastructure. While the specific services offered will vary from provider to provider, there are a few that we believe are most valuable, including:



One of the most essential managed services offerings is a full-scale and, most importantly, ongoing cybersecurity plan. The best cybersecurity solutions will address all the modern threats to your network, including cyberattacks, insider threats, and user error, as well as helping you keep up with the frequent changes and advances in network technology and malware.



In the USA, approximately 140,000 hard drives fail every week. If your personal computer or main server stopped working today, how much of your data would survive? If your machine crashes, or if you are hit by a cyberattack that compromises your data, you want to make sure that everything you’ve worked on can be retrieved from a secure location. To do this, make sure to speak with your MSP about a data backup plan.

Disaster Recovery

Disaster Recovery

If disaster strikes, you need to have a plan in place to not only survive but continue to thrive. A recent example is the onslaught of hurricanes that impacted the Gulf Coast in 2017. Many businesses went under because they were unprepared to continue business in the face of a natural disaster. A disaster recovery plan is something you and your MSP design together to function as a guide for recovering your data and network systems to continue working outside of your normal operations.



No matter how reliably or smoothly your network runs even in normal working conditions, issues will still pop up from time to time. Your employees can be more productive when they are able to quickly solve IT issues. For this reason, we suggest utilizing a 24/7/365 helpdesk. The helpdesk is particularly beneficial when you consider that many industries and key roles are becoming increasingly mobile, working extended office hours from a variety of devices and locations. Working with a dedicated helpdesk means you can benefit from a larger pool of expertise and assistance at any time.

Network Monitoring

Network Monitoring

The pinnacle of managed services for your business involves a hybrid of network monitoring and remote services. While the help desk ensures that your employees can quickly solve problems on their end, network monitoring provides a 24/7/365 overview of your network from the inside out. With network monitoring, technicians on your MSP’s team can not only maintain a real-time view of any possible intrusions, threats, or other network anomalies but also complete steps to mitigate and resolve issues as they arise.

Which managed services do you need?

The secret to choosing the right MSP for your business is in identifying the areas that need improvement and finding an MSP that provides a managed services package that fits those needs.

Guard your business with managed cybersecurity.

A cookie-cutter virus protection program just won’t suffice in a world where cybercrime is projected to cost $6 trillion annually by 2021. The attacks are coming. When they find your network, you want to be ready. $6,000,000,000,000,000 is an astronomical number and it can be hard to picture what that means to the average business. Let’s zoom in.

Cybersecurity is one of the most important services provided by MSPs. Rather than a one-size-fits-all approach, an experienced MSP’s approach to cybersecurity involves analyzing your strengths and weaknesses and maintaining complete and constant oversight of your network security. From creating best practices for your employees to implementing important software and maintaining patches and updates, your network is never safer than under the watchful eye of a managed services provider. The best cybersecurity solutions should address all types of threats. Here are the ones we find most common:

1. Sneak attacks

Your business should maintain a constant defense against cyberattacks. Modern cyberattacks are increasingly clever, relentless and evolving, and cybercriminals exercise an unprecedented lack of prejudice – they target anyone and everyone.

There’s sometimes no escaping the attacks, but there can still be preparation and fortification to minimize the effect. With so many types of sneaky cyberattacks, here are two you can recognize and avoid:


You’ve probably had this happen before… You type in the URL for a website and the site opens but looks slightly different than the homepage you access most other days. The resulting page is asking not just for your username and password but also for other personal information like your credit card number or social security number to “verify your account.” If you’re a real quick-draw, you’ll wonder about the extra requests, check the URL and notice that you entered the wrong address. This cyberattack called phishing involves intruders pretending to be a trusted entity in an attempt to steal your personal information. They rely on their victims to be in a hurry, unobservant and willing to share far too much.


Downloading malware is as simple as opening an unknown attachment from an unfamiliar or questionable email. Something as simple as “You’ve won a free coffee, download certificate here” can turn anticipation and excitement into a compromised network. Malware can release unwanted code into your network, consuming your computer’s processing power and causing programs, or even the entire system, to crash. This is why we stress user education and training. It’s not enough to say never open an attachment from an email address you don’t recognize. Even a seemingly familiar sender can turn out to be a phony. Helping users become more vigilant is the key – including watching for suspiciously named attachments or URLs, plus emails using bad grammar, misspellings, incorrect personal references, or even incorrect information in the company footer or signoff.

2. Ransomware

Think of how this scenario would ruin your morning: You open your browser or desktop program and a message pops up: “Pay us $1,077 or we will delete the information on your computer/server.” $1,077 is the average amount of money lost per ransom attack. And these attacks are very common.

Avoiding ransomware is tricky. This type of malware can be delivered through emails, fake ads and malicious websites. It leaves behind code that blocks user access to the machine and demands payment to restore control and release data. Besides training your team to recognize the risky situations, extra tools can help with filtering and monitoring network and email traffic and unsafe URLs. It’s critical to remain aware of new and more convincing approaches emerging all the time. Ask your MSP to detail a plan for analyzing and safeguarding your network against cyberattack vulnerabilities.

3. Insider threats

You might be asking, “Where do all of these attacks come from?” Well, some are from malicious outsiders seeking to cause financial harm to your business and make an easy buck. Others are from within your own ranks.

Of that number, three-quarters were intentional and only one-quarter were accidental – meaning 45% of all cyberattacks are perpetrated by malicious employees. Your MSP should be able to work with your team to minimize insider threats with network checks and balances that involve access control, device registration, network monitoring, and assigning roles and permissions only to valid individuals.

Why Cybersecurity as a managed service?

With attacks coming in more variety and greater frequency, cybersecurity as a managed service is more important than ever for protecting your mission-critical business network. Partnering with professionals ensures your team gets the consistent, comprehensive and expert attention and protection to unify your cybersecurity efforts across channels, devices, users and systems.

Plan your backup to weather the unexpected storms.

With professional network monitoring and a solid cybersecurity plan that evolves with the times, your MSP will help you drastically reduce the chance of significant setbacks for your network. Even so, disasters do happen – and usually without much warning. The secret to surviving the unexpected or worst-case scenario is a backup and disaster recovery plan. A backup and disaster recovery (BDR) plan is a practical guide to maintaining the integrity of your network and restoring its operation in the face of critical failures. The ideal BDR plan will include a hybrid of preventative measures and practices that will secure and replicate your key systems and data, along with action points to focus on at the time of the disaster. Of course, your first questions might be, “Why bother? What are the chances that I will really need this?”

Data loss dangers

A recent industry report found that only 51% of business users back up their data to on-premises computers or external drives, and only 35% back up their data to the cloud. Almost a third of organizations surveyed don’t perform daily backups of their data. And worse, more than two-thirds don’t back up critical customer data. Ignoring the risk of data loss is dangerously negligent for business. A study by Verizon found that a small data breach where only 100 records are lost would most likely cost an organization between $18,120 and $35,730 – but as much as $555,660. Besides the potentially fatal financial loss for businesses, data loss creates a breach of trust that can also contribute to the loss of client relationships.

You get the point: Data loss is bad news. So, what causes data loss? Usually, data loss happens because of one of the following reasons:

Hardware failure

Computers aren’t built to last forever. They will all eventually break down. And that’s okay. As long as you don’t lose data when your computer shuffles off to the ethernet in the sky. Working to regularly copy your data to redundant physical servers, cloud servers will give you peace of mind that you can meet customer demands and regulatory standards like HIPAA standards.

Human error

If you haven’t had one of those “Did I just completely destroy my computer?” moments, consider yourself very fortunate.

Human error – a mistake as simple as spilling coffee on a server, clicking the wrong setting, or dropping a laptop down a flight of stairs (it happens!) – accounts for a massive amount of data loss. So, it pays to be prepared for the show to go on.

Natural disasters

Hurricanes, tornadoes, earthquakes, and related electrical storms, floods and fires, can all have a catastrophic impact on your business. If you don’t back up your data, you’ll lose more than just your physical property, you’ll lose vital customer information, operational files, and the ability to serve your customers. The truth is, data backup not only saves you from unwanted downtime, it keeps you running. Ultimately, you can think of BDR as a parachute. You wouldn’t jump out of a plane without making sure you have one, would you?

About Disaster Recovery

Once you have a plan to make sure all the right data is backed up for a rainy (or coffee-covered) day, you want to deal with the network operation issues surrounding a disaster. That’s when a disaster recovery plan becomes priceless. The recovery aspect of BDR will cover everything from the steps to relocating your network to accessing your data offsite backups to activating the services you will need from vendors supporting you in the continuation of IT operations. To survive and thrive after any disaster, you need to be able to get back to business as soon as possible. The disaster recovery plan will contain delegation of key IT recovery functions, a mandatory checklist, and security protocols to guarantee your employee and customer data is safe. Just like data backup, your recovery plan will have to adhere to both your professional standards and industry standards. Make sure to trust an MSP that has knowledge of your industry.

Your helpdesk keeps your network healthy.

The ideal goal of managed services is to create a network that minimizes the occurrence of significant IT incidents. Since we’ve established that many IT incidents are due to user error, addressing user IT issues is critical to maintain a functional network for your business. So, the best reason for having a helpdesk is explained by Murphy’s Law: Anything that can go wrong will go wrong. And that’s okay. The important thing is to have procedures and experts in place to handle issues as they arise. Notice that the key words there are as they arise. Your business operates in real time. Which means every minute, hour and day that an issue isn’t resolved is just more time that your employees can’t complete their work. A helpdesk will take care of those issues on the spot. What types of user support can a helpdesk provide?

Weekend Access

Example 1:  Weekend access

Dr. Rivera is a general physician working from a secondary office over the weekend. While attempting to access patient records for an upcoming appointment, he notices that the network has locked out his laptop and he doesn’t have the correct network password. Solution:  Dr. Rivera contacts their 24/7/365 helpdesk and they are able to securely verify his identity and reset his password. His preparation is completed, and the appointment goes on as scheduled.

Bandwidth barriers

Example 2:  Bandwidth barriers

Kit Harlowe is home health provider. She is completing a regular patient visit with updates to their charts and treatment plan, when the internet speed suddenly slows to a crawl. Solution:  Kit contacts her managed helpdesk and they are able to walk her through the settings to run a network diagnostic. Through remote services, the helpdesk technician realizes she has downloaded a computer worm that’s sending an overflow of traffic to the network. They filter out the false traffic, which gets the network running faster and keeps Kit working.

In both examples, we address some of the most common reasons businesses choose to incorporate a helpdesk into their managed services


Incidents and errors don’t clock in at 8 a.m. and leave at 5 p.m. They show up all the time, anytime, killing your team’s productivity. The only way to help your employees handle issues during their working hours is to have a knowledgeable team on hand.


For many businesses, it has become imperative for employers to accommodate a workforce that has become both more mobile and more reliant on a variety of devices.

When your team is working on their own devices, they need someone who not only knows their network but has knowledge of these individual platforms.

Experienced and knowledgeable

When you have an entire helpdesk team working for you, you benefit from the combined knowledge of multiple technicians. Now consider all the other services we have spoken about. Who could possibly understand the intricacies of your network better than the team who builds them every day? Whether your team is facing normal issues in day-to-day operations or the more complicated incidents that crop up in the evolving mobile workplace, you can count on a helpdesk to provide superior and timely solutions.

We really enjoy chatting about ways to improve your network.

With expertise and experience in all of the above-managed services, RWA will work to build a custom solution that fits your specifics business needs. Contact us at your earliest convenience and we’ll share as much info about the above-managed services as you’d like.

The online guide to effective disaster recovery

Data backup and disaster recovery become more and more critical issues for businesses to address every year. Whether it’s Mother Nature’s violent unpredictability or hackers and malware attempting to harvest your business data, there are more threats than ever before to your business continuity.

But what, exactly, is meant by “disaster recovery?” Let’s distill it down to a usable definition, then we can explore the subject based on that definition.

Essentially, disaster recovery is security-based planning and preventative activity that aims to protect your business from negative data loss and downtime events caused by threats such as natural disasters, online threats, insider threats, or any other threat to business continuity.

Data is the lifeblood of the modern business. Which means effective disaster recovery is absolutely crucial to the survival and health of most businesses. And while having a working definition is useful, it doesn’t necessarily explain how recovery is planned and executed when the need arises.

In other words, before you can implement effective disaster recovery, you need to understand the full spectrum of what disaster recovery entails.

Don’t worry, we’re here to help. We’ve created this online guide to disaster recovery to outline the basics of how it works, the steps involved, and how to best begin to implement it in your business.

To get started, let’s build the ground floor of disaster recovery: data backup. After all, the other details involved in recovery are largely pointless if you lose your data with no way to restore it anyway.

Traditional data backup vs. cloud-based data backup

When we talk about traditional data backup, we’re referring to non-cloud-based backup. With traditional backup, one or more copies of all your mission-critical files and programs are created so that they can be loaded onto your hardware and machines in the event of a system failure.

Back in the day, this meant backups stored on CDs, thumb drives, and external hard drives. In more recent years, these kinds of backup have become outdated because they have several drawbacks that can cause difficulties.

Chief among the difficulties with portable storage backup is that your files and programs are not updated in real time but instead must be updated manually. This is not the only drawback to traditional data backup, either.

Problems with traditional data backup methods include:

  • Excessive downtime due to slow restoration on a per-device basis
  • Data loss due to theft or misplacement of physical hardware storage devices
  • Poor or inconsistent security or encryption protection
  • Operational or financial barriers to scalability across multiple machines or networks
  • Permanent data loss when both the original copy and backup copy are destroyed by the same data loss event

Cloud-based data backup

These days, most businesses can get maximum benefit by backing up their data to the cloud. With cloud computing, data backup and recovery is far easier and more reliable to implement while also far more secure.

This is because when you take advantage of cloud computing, all your mission-critical data and programs are stored on remote servers in professional data centers and accessed securely from any internet-accessible device.

These data centers have military-grade encryption as well as multiple levels of redundancy that ensure you have several alternative backup options. They’re also off-site from your business, so even if a disaster destroys your entire building, your data is ready and waiting to be restored.

Plus, with cloud computing your critical files and programs can be updated in real time, meaning your backup reflects all your latest work updates.

Advantages of cloud-based data backup include:

  • Unlimited scalability across multiple devices and networks
  • Real-time and scheduled file backup by priority
  • Mobility and data access from any internet-connected device (we’ll explain the massive advantage for disaster recovery later)
  • Multiple redundancies and off-site backup options to truly keep data safe from loss
  • Military-grade security and encryption to protect your data from online threats

Data backup is clearly a big part of disaster recovery. But don’t take that to mean it’s the only step necessary to recover after a disaster or data loss event. In truth, restoring your data, though a complex process in its own right, is one of many steps to successful disaster recovery.

5 Key strategies to minimize downtime

Disaster recovery is more than backup: you need a plan

So we’ve got the how, why, and where in place for backing up your data. What now? Now you need a plan. And not just any plan, either. A good disaster recovery plan is an extensive, if not exhaustive, list of all your mission-critical systems and data, how they will be restored, the timeframe for restoration, and who will restore them.

This is far more complex than it might sound. In the chaotic aftermath of a natural disaster or other data loss incident, time will be money. The longer your systems are down, the more money you will lose. Not to mention reputation, should the problem be from something other than a natural disaster.

A powerful, well-constructed disaster recovery plan protects your bottom line and your business reputation by minimizing downtime and preventing data loss. And no matter your industry, the plan will always have a few crucial details.

Minimum elements an effective disaster recovery plan will cover:

  • Who will be in charge should a data loss event or natural disaster occur
  • The contact information for all mission-critical employees who will support recovering your business technology
  • A list that prioritizes the mission-critical programs and data you must have to get back to work
  • A communication plan with assigned responsibilities for each employee to resume network operations
  • A map of all systems and technology that will require restoration
  • The steps to restore service from all your vendors, including cloud service providers, data backup storage facilities, and any mission-critical program providers.

Keep in mind that the elements and execution of a disaster recovery plan are more complex than just this list. But these minimum standards should be enough to start building an effective plan that will minimize downtime and protect your business from data loss.

5 foreboding reasons you need a disaster recovery plan

Business continuity planning as part of disaster recovery

It doesn’t always take a full-on disaster to take your business down. Many businesses experience downtime as a result of smaller incidents that don’t involve data loss but do interrupt business operations. Whether it’s an internet outage or unresponsive mission-critical programs, a business continuity plan outlines your responses to issues that bring your workflow to a slow or stop.

Often it makes sense to outline your business continuity plan while you’re developing your disaster recovery plan, because there will be overlap in some of the strategies and responses.

It’s also a good idea to take on professional assistance when it comes to business continuity planning. If you’re already using a Managed Service Provider, there’s a good chance that BC is one of the services they offer. It might already be a part of your current contract, too.

If you’re not currently working with an MSP, you can certainly attempt to put together a BC plan on your own. To do so, your in-house IT department and other management teams will have to collaborate on how your business processes, communications and technology interact to operate your business on a day-in and day-out basis so that they can plan for the loss of various individual resources and what the response to that loss looks like.

5 throwback videos that can teach you about modern IT concerns

Disaster recovery audit

So, you’ve got a data backup service in place, and you’ve developed a disaster recovery plan. What now? Simple. Now you need to determine that your plan and your backup service work as intended.

As the boxer Mike Tyson once said, “Everybody’s got a plan until they get punched in the face.” While this is a hilarious but somewhat irreverent statement, the message has a lot of truth. How can you know whether your plan will work when the time comes?

The answer is disaster recovery auditing and testing. By taking the time to audit your plan for effectiveness and completion before disaster strikes, you give yourself the best chance to avoid downtime if things don’t go as planned.

3 steps to successful disaster recovery auditing

Number 1

Review your plan extensively.

Go over your plan periodically with your team. Things change, both in your business operations and your continuity needs. By walking through your plan in detail you can answer questions and concerns that crop up, while refreshing everyone’s knowledge on their ongoing disaster recovery responsibilities.

Number 2

Perform a tabletop test.

Think of this as the human element test for your plan. It’s a mock-live scenario where you sit your team down and require all team members to demonstrate that they know their responsibilities should disaster or a data loss event occur. By doing this you can identify any documentation errors, as well as any missing or inconsistent information that might be causing the plan to break down.

Number 3

Run a simulation.

Now that you’ve conducted a plan review and tabletop test, you’re still not ready to run a live test. Instead, it’s time to run a systems simulation. Think of this as the mock-live test of the system and technology elements in your plan. Part of this step will be engaging your various continuity resources or recovery sites individually at different points.

The goal here is to come up with a variety of downtime and data loss scenarios to see how your plan changes with each of them. By working through as many scenarios as possible, you can provide your plan with the best test of its successes and vulnerabilities. Which means you can build on the successes while shoring up the shortcomings.

Again, there’s more to testing and auditing your plan than these three steps, but they will constitute a good start. We highly advise taking on the services of a Managed Services Provider (MSP) for both developing and testing your plan.

Also, much like testing your disaster recovery plan, it’s a good idea to periodically test your backup service to ensure it is backing up properly.

A story of failed disaster recovery (and the lessons you can learn)

Sometimes experience is the greatest teacher. Except you’re probably not interested in experiencing data loss in order to learn from the loss. No problem. Let’s take a look a three disastrous stories of data loss and downtime to see what lessons you can put to work in your approach.

Ma.Gnolia, a social bookmarking company, lost all its data and eventually went out of business

This is the kind of data loss horror story that makes a company famous for all the wrong reasons. It’s also the kind of story that bankrupts an otherwise successful firm.

In 2009, the company had all of their mission-critical servers go down. Once they got them back online, they discovered that the crash had corrupted all the data on them. Though the cause of this crash was unclear, initially it didn’t seem like too big a problem. After all, they were prepared with a data backup solution for just such an occasion.

There was just one problem. The data backup server was on-site, rather than off-site. Which means the data in their backup was also corrupted by the same network crash.

Ultimately, the company lost all of the stored bookmarking data their clients depended on them to store. For good. Their clients, left totally without options, lost faith and jumped ship to a competitor.

Though Ma.Gnolia threw up a Hail Mary attempt at rebranding, they ultimately shut down after another year.

The lesson:

Check your backups. And back them up off-site (While you’re at it, follow the 3-2-1 data backup strategy). Automated backup processes fail from time to time. Or other things happen to interrupt the process. Don’t wait until you need it to make sure your data is backing up, or you might discover too late that it hasn’t been backing up.

Believe it or not, this happens. Automated solutions are fantastically convenient, but do not use a set-it-and-forget-it strategy. Be mindful of the possibilities.

Five terrifying data backup and data loss statistics (and lessons)

It’s clear that natural disasters are a serious threat to your business continuity. Don’t wait until disaster is coming down the pike to worry about how you’ll stay in business afterward.

Downtime is a business killer. Not only is it expensive, but it also has the power to destroy your reputation. Make sure you have a strategy in place to get back to work ASAP. The alternatives aren’t worth the risk.

This one is obvious. Having a disaster recovery plan puts you ahead of the competition while protecting your business from the negative effects of downtime and data loss.

Three months is a long, long time for even part of your network to be down. How many workers can afford to go three months without a paycheck? How many companies can afford to pay their employees for three months when no revenue is coming in? No matter how you do the math, it amounts to a death blow for most businesses.

The odds of success if you’re not prepared are not in your favor. Be prepared. Backup your data. Have a plan.


Disaster recovery is serious business. As the stats and scenarios have shown, failure to take it seriously can have long-term consequences for your business. It can even put you out of business altogether.

Let’s recap the main takeaways from this online guide for clarity and helpfulness.

Cloud-based data backup and storage is the way to go.

As mentioned, the cloud has a lot of advantages over more traditional data backup strategies. Don’t forget to practice the 3-2-1 rule of data backup, and don’t forget to check your data backup service regularly to ensure it is working.

Failure to develop, implement and test a disaster recovery plan can have serious consequences.

Backing up your data is not enough. Without a disaster recovery plan, you’re still likely to experience a ton of confusion and lost productivity due to downtime after a data loss or disaster incident. Develop an extensive plan, and do your best to cover all the bases. Keep in mind this needs to be a living plan, and will require periodic updates.

Put your plan to the test through both simulations and live testing, and try to make it fail in order to shore up vulnerabilities and weak points. Make sure to dial in both your human and technology responses before disaster strikes. Also, plan for multiple different scenarios so that you understand the unique challenges of each.

Keep up with ongoing threats and growth-driven issues

As your company grows and changes, you need to evolve your strategy for disaster recovery to keep up. Not to mention that as threats evolve you need to evolve your defenses. This may seem overwhelming, but it doesn’t have to be. We recommend one more thing most of all …

Engage a qualified MSP to maximize your response and minimize downtime.

The best way to protect your business from disaster is to seek out a professional assistance. That means seeking out and partnering with a qualified managed service provider with plenty of experience dealing with disaster recovery planning and data backup strategies. The right MSP will have multiple solutions that you can engage to keep your business safe from disaster while minimizing downtime in the event a disaster takes place.

Disaster recovery planning is a complex business. And while the only way to gain direct experience is to go through a data loss or disaster event, you can instead simply partner with professionals who already have the experience to guide you through the planning and execution stages of disaster recovery. It literally could be a life or death issue for your company. Why not prepare your business for a more secure future?


3 reasons your SMB should migrate to the cloud

With cloud computing, the sky’s the limit. No longer will you need to spend thousands of dollars managing your IT systems. Instead, you can benefit from dedicated and automated IT support and create a virtual office where you access data on your desktop, laptop, or mobile device.

If you’re still debating the cloud, this might help: Experts predict that cloud computing will be worth $162 billion by the year 2020. If you’re not somewhere in those billions, then where will you be?

Here are three reasons your SMB should migrate to the cloud.

1. Reduce costs

Operating in the cloud saves you money. You don’t need to purchase expensive equipment to keep your business running — a cloud service provider will take care of that for you and host your equipment offsite. This means you’ll experience a reduction in power usage, maintenance needs, and support costs. Just think about all the cash you could save!

Long story short, cloud computing proves to be significantly cheaper when compared with a self-managed, on-premise solution. Sounds pretty great, right?

44 percent of medium businesses and 41 percent of small businesses said the ability to cut costs was the top benefit of cloud computing.

2. Prevent data loss

Imagine if a hurricane swept through your company’s neighborhood. Or a fire damaged your onsite equipment. What would happen to your data?

With cloud computing, all of your information is kept in a virtual space, so you can protect it from natural disasters or unforeseen threats. This is incredibly important. For example, consider healthcare. Obtaining important information about patients could mean the difference between life and death.  Having access to your data (even during a natural disaster) is a top priority.

Think of cloud computing as an insurance policy for data loss prevention. You get peace of mind knowing a managed cloud service provider is safeguarding your valuable information. It’s no wonder, then, that so many big companies have invested in this technology. Apple, Netflix, Pinterest — these are just some of the brands that use cloud computing.

3. Better collaboration

Cloud computing lets your entire workforce collaborate on projects without the need for multiple pieces of hardware. Employees can access documents and resources from the cloud and share them with their colleagues in real time — which boosts productivity and mobility.

Coworkers can obtain important information in one place and share files within seconds — capabilities any team can benefit from.

But the collaborative features don’t stop there. In some cases, cloud computing even lets you track your employees’ progress as they work on various projects. But don’t worry. Not everyone can access your valuable information. You can set up access controls that limit certain members of staff from reading and sharing sensitive data.

“Cloud computing is made for collaboration and file-sharing,” says Nick Ismail, writing for Information Age. “Cloud computing lets your team edit files in real time and access them from anywhere in the world. Your team can be anywhere in the world and still work together.”

These are just three benefits the cloud can bring your business. And if you leverage a managed cloud service provider, you can save money during migration, uncover a best-fit cloud solution for your team, and migrate to the cloud in less time. Invest in this technology and you won’t be sorry.

4 IT Consulting Projects That Will Make Your Business Better

For your business to succeed, your business needs to grow. One way to elevate your business is to modernize and streamline your IT solutions.

Most decision makers jump at the chance to increase productivity and collaboration, but more often than not you are too busy with the actual business of your business to research and implement impactful changes to your network and infrastructure. That’s when IT consulting becomes a powerful asset to your team.  

ConsultingWhether your business currently utilizes a managed service provider (MSP) or you are working your way up to a full-scale IT solution, you will often find yourself in need of professional services. IT consulting becomes handy when you are dealing with the type of projects that don’t require monthly maintenance, but still require professional assistance. 

Here are four IT consulting projects that will make a noticeable difference in your business: 

1. Workflow Automation

In order to actually finish out the workday, employees often find a workflow process and stick with it as long as they can. While consistency is better than having every day be a crap-shoot, consistency doesn’t always mean efficiency or productivity. 

What we’ve noticed is that sometimes people in business become so busy; so stuck in a routine, that they can’t see the forest for the trees. 

A workflow automation consultation can help to pinpoint the weaknesses in your day-to-day operations. Something as simple as eliminating a few steps from a daily routine can translate to huge savings in time and money when you look at the bird’s-eye view. Projects are 250% more successful when proven project management practices are used.

A professional IT consultant will then go a step further and help you find the tools necessary to streamline your workflow, and offer metrics to study your progress. Real-time data can reduce an organization’s operational expenses by as much as 23%.

 2. Hardware Refreshes

Technology keeps getting smarter — and it keeps getting smarter faster — every day. In order to keep up with the competition in your market, you need to be able to provide a higher level of productivity and efficiency. 

Take for instance the medical field. In many modern offices, doctors are utilizing video conferencing to perform remote consultations. This requires hardware processing that can keep up with the high bandwidth required for HD video conferencing. 

Mobile and Desktop Devices

An IT consultant can work with you to discern which hardware you need to support certain goals now and into the future. Hardware refresh consulting helps integrate new hardware with your ideal IT network. 

Many IT consultants will also procure the hardware and implement it at your business, providing a seamless transition from the old to the new system. 

3. Cabling 

You know what the worst part of getting a new TV is? Connecting the wires to all of your new devices. New computer? Connecting the cables to new devices. How about a brand new IT network connecting multiple servers to every single one of your employees across multiple rooms/floors/etc? You guessed it…connecting the wires. Or, in this case, mostly cables. 

Cabling consultation will not only suggest ways to optimize your cable placement, but will also optimize your cable type, how much to order, and color coding for the best possible network design and strength.

4. Wireless Infrastructure

As your business grows, you’ll notice that your Wi-Fi speeds are degrading as more and more devices enter the day-to-day mix. Creating a collaborative environment in today’s mobile business place often depends on real-time interactions. The only way to offer this is with a steadfast and strong Wi-Fi network that can securely support both your employees and your guests.  

Collaboration Pull Quote Graphic

An IT consultant will be able to assess your office and use signal heat mapping to identify the best placement for your wireless access points (AP),  and tell you if a different model device would be better. Soon, you’ll have an office that stays connected, and employees that spend more time working and less time searching for a signal. 

How can we help you? 

RWA offers a number of IT consulting services on top of our managed services offerings. Most of the time, the best IT solutions will combine a monthly plan that covers the day-to-day management of your network, with the more sporadic, yet impactful, elements like hardware refreshes and other focused projects. 

Please give us a call or send us a message to find out more about how our managed services may fit your needs. 

5 Throwback Videos That Teach You About Modern IT Concerns

“Those who cannot remember the past are condemned to repeat it.” – George Satayana

One of the great tragedies of humanity is that we often seem incapable of learning from past experiences. The only way to remedy this is take a look back in time. When it comes to creating a solid IT network, these old commercials offer some surprising lessons.

1.  Make Way for a Mobile Workforce

1977 was a good year that brought us Star Wars, Elvis Costello’s “My Name is True”, and the birth of Shakira. Time flies, but even back then, businesses knew that it was time to adapt to a mobile workforce. The answer? Check out this no-frills, 1977 commercial for the first portable laptop, the IBM 5100.

Today, supporting a mobile workforce is an increasingly important aspect of any IT solution in every industry. Employees who believe their workplace effectively uses mobile tech are more creative, satisfied, and productive at work. And customers always appreciate more responsive service.

2. Plan for Disasters

Many of the physical components of your business are connected to your network. This means they are subject to cyberattacks, natural disasters, and human error, just to name a few network disasters. They might even be turned into a cutting board and/or baking sheet like this gentleman’s Lenovo Thinkpad…


Grandma-proofing isn’t the preparation we most often consider, but it certainly represents the risk of “human error.” Part of creating a killer IT solution is including a backup and disaster recovery plan. This ensures that however you happen to lose your hardware, you don’t lose your data.

3. Get Ahead with Video Conferencing

One in three CXOs agree that video conferencing is essential for operations. Businesses increase productivity and reduce costs when they eliminate travel time in favor of video conferencing. Also in situations like this one, you might just save yourself from a nasty concussion.

Make sure your managed services provider is prepared to accommodate network speeds that support superior conferencing and effective communication.

4. Don’t Forget Physical Security

In order to truly keep your business safe from intruders and insider threats, you’ll want to include physical security solutions in your overall operations. Video cameras, for instance, will enable you to capture theft and, apparently, even the occasional spring shower.

Physical security, including cameras and entry control, has been known to assist in identifying and prosecuting employees for illegal acts, not to mention in deterring theft in the first place. Most people don’t like being caught on camera when they rob someone blind. And your business doesn’t like being caught by surprise by damaging deeds that compromise your data.

5. The Security Is in the Network

Not all perpetrators waltz into your office to do sketchy things in person. Some prefer to work the cyberattack angle. So, on top of creating access control and installing security cameras, you need a hardcore security plan for protecting your network from the inside out.

That’s right. Your network is a target for some of the most heinous activity imagined. If the bad guys had it their way, your network would look something like that cantina in Star Wars where all of the worst specimens in the galaxy tend to congregate, looking for trouble.

You probably cannot imagine all the varieties of digital threats cruising around your network. So, you need to incorporate the right mix of regular maintenance, monitoring, updates and testing to ensure your security plan keeps the “wretched hive of scum and villainy” far, far and away.

What would your video say about IT?

If someone shot a film or commercial about your IT environment, what kind of lessons would it offer? Would it be a laughable farce complete with slapstick tomfoolery, or would it be an insightful mini-documentary portraying the most excellent of practices in modern business technology? If you lean toward that first commercial, then it’s time to have a real chat about your IT solutions.

Give us a shout and we’d be glad to share more. No strings attached.

Virus vs. Worm: How to Identify and Slay Your Network Monsters

The glossary of adversaries to your network security will continue to grow so long as cyberattacks continue to happen, and the various cyber-monsters can be difficult to differentiate. That being said, two of the most prevalent security threats are easy enough to remember when you compare them to legendary monsters. Enter the virus and the worm.

What they have in common…

Viruses and worms are both cyberattacks that are detrimental to your business. They are also both financial blackholes. In 2016, viruses and worms contributed to $450 billion in financial losses due to cybercrime. On an individual level, cyberattacks can cost businesses up to $40,000 per hour.

The end result for both a virus and a worm is to damage your network and cost you money and time. The primary difference is in their approach.

A virus is like a vampire…

One easy way to conceptualize a computer virus is to think of it as a vampire.

If a vampire wants to infect you with vampirism and turn you into a member of the nocturnal undead, it will require some human error. Just like you might encounter a vampire if you take a shortcut down a dark alley, you might catch a computer virus by visiting a harmful URL or downloading software that isn’t secure. There’s always an element of human participation.

And we all know that a vampire can’t come into your house unless it is invited. That’s exactly how a virus works.

Many times, it’s easy to spot a computer virus. It’s just a little bit out of place. Just like when a vampire comes over to your house wearing his best 1970s “date night” outfit. There’s just something that’s a bit off. Viruses are often given away by emails or URLs that don’t look quite official – anything from misspellings to unfamiliar names to complex Web addresses to simply uncomfortable requests to share or exchange information. If it strikes you as strange, it probably is.

If you fail to see the signs and unwittingly invite a vampire into your house, he/she/it will probably give you a bite, infect you, and you’ll soon be investing a lot of money in sunglasses, wide-brimmed hats, and umbrellas.

When you open the door to a computer virus by opening attachments or downloading certain files or programs, it will use that program to overload your system and eat up your random access memory, freeze certain resources or take over certain functionality. This in turn leads to slower computing, crashes, and total destruction of the computer system.

One recent example is the “Bad Rabbit” ransomware virus, which spread from Russia to the USA. Ransomware will famously extort money from users in exchange for data, and the average ransomware attack has risen to $1,077.

Computer viruses act just like the vampire virus. They both require a host to infect their victim, and they both greatly alter the health of their prey.

A worm is like a werewolf…

If a virus is like a vampire, then a worm is like a werewolf.

When werewolves want to attack, they have no intention of waiting for you to invite them inside the house. They enter and they either eat you or they bite you and turn you into a werewolf. This is exactly how a worm works on your network.

Worms are cyberattacks that disrupt your network by exploiting weaknesses and self-replicating. One famous example is the recent WannaCry ransomware attack, which infected more than 300,000 computers in a few days, by using worm techniques to infiltrate Windows and spread across LAN and WAN connections.

Unlike the computer virus, they require no human error. Worms can piggyback in on websites or attachments, and then spread exponentially across your network to other files.

While a virus is dangerous, it is typically isolated to a certain program or system resource. A worm, however, will discover any weaknesses and exploit them.

How to slay your network monster…

The best way to win a fight against a vampire or a werewolf is to a.) avoid inviting them in, and b.) fortify your home against them. Hanging garlic on the windows and carrying a silver sword just in case is always a good idea.

For your business to fight a computer virus or worm, you need to invest in solid preparation and protection for your network. This means having a virus protection plan, training your team and downloading all of the relevant patches on an ongoing basis.

When you work with RWA as your managed service provider, we’ll create a comprehensive solution that will help prevent and combat cyberattacks of all kinds.

Reach out to us to learn more about different cyberattacks and how to stop them.

The Prescription for a Perfect Managed Service Provider

Managing the health of a network can be a lot like managing your own health. If you want to be super healthy, you’ll make sure to do the right exercises, take the appropriate vitamins, and avoid possible risks. The same goes for managing a network. Here’s our prescription for what to look for in the Managed Service Provider that’s right for you. Check off everything on this list and you’ll be closer to an ideal IT support solution.

Pick an MSP that has experience in your industry.

Every industry has specific business needs and challenges. Many IT service companies will offer solutions that are the network equivalent of those modular homes that popped up all over the place in the 1950s. Unfortunately, a one-size-fits-all approach to networking just doesn’t work when one business is a hotel and the other is a hospital. Often, the result of a makeshift network is large-scale data compromise.

The Ponemon Institute found that 64 percent  of patient medical files were successfully targeted by cybercriminals in 2016. Since medical data is not the only type of information commonly compromised, a healthcare company would want a Managed Service Provider who understands their special risks and vulnerabilities. An MSP that has worked with companies in your industry is far more equipped to build a customized solution that will meet your every need and protect your data

Pick an MSP that offers full-service support

You all have a friend that has “a guy” for everything. He has one “guy” who will come over and spend time physically connecting a network. He’ll have another “guy” who pops in for repairs, and yet another “guy” for those late-night server issues. When you pick an MSP, you want to just have the one “guy” to call – one who is backed by a team of specialist “guys” who can handle whatever you need and guide you through challenges.

Think of your MSP as your morning multivitamin. Instead of swallowing 19 pills, you’ll just have the one to keep you healthy and strong. The best MSP for your business should offer security and threat management, networking monitoring, and cloud services.

Pick an MSP that is available for you

A managed service provider may have all of the capabilities you are looking for, but it won’t do you much good if certain technicians are only available during limited hours. High on your checklist should be a company’s ability to support you after hours, during an emergency and just whenever you need some planning assistance. The best MSPs are just like the best doctors; they work on a preventative basis to stop problems before they happen. That being said, just like you’ll sometimes need to make an urgent appointment, you want to make sure your MSP is set up to give you the right assistance during on-call situations.

In any industry, downtime is a disaster. A survey by ITIC reports “98% of organizations say a single hour of downtime costs over $100,000; 81% of respondents indicated that 60 minutes of downtime costs their business over $300,000. And a record 33% of enterprises report that one hour of downtime costs their firms $1 million to over $5 million.” These are the numbers you want to think about when you are considering your MSP’s availability.

We’d be happy to give your network a check-up. Please give us a call or send us an email to see how we check out.

The Difference Between Managed Services and Break/Fix

When it comes to IT support, there are two main schools of thought. You wait for things to break, and then subsequently fix them – a service model known as “break/fix”.

With managed services, you employ the services of a managed service provider who watches over your IT infrastructure for you. They actively maintain and monitor your devices and software before they break.

There are several differences between the two styles. Wondering which one is the right one for you? Let’s go over what they can do for you.

The Break/Fix Method

There’s not much to misconstrue when it comes to break/fix because it works exactly as the name implies. When something in your IT infrastructure malfunctions, it’s up to you to contact your service provider. From there, they must then fix the problem while you wait.

Break/fix was the old way of doing things.

Back in the early days of IT, most businesses simply didn’t have a need for constant support because they didn’t have that much that could break. Obviously, that has dramatically changed. However, some companies still insist on the tried-and-true method – mostly because they’re too stubborn to change.

Choose Break/Fix if:

  • You have plenty of money to spare on expensive issues
  • You don’t really have any technology in your office that needs maintenance
  • You are okay with suffering from downtime, whenever it strikes
  • You have a full team of IT experts on-site that can fix issues as they arise
  • You can wait around for technicians to troubleshoot and then resolve whatever issues arise

The Managed Services Model

When your IT infrastructure is actively monitored 24/7, there’s not much that can go wrong. Anything that does go wrong is quickly dealt with. Rather than being reactive, like break/fix service, managed services chooses to go about a proactive service model.

With the rise in usage of various devices, multiple specialized programs, and a generally more advanced IT infrastructure, managed services have become far more popular than break/fix. Forbes highlighted four ways managed services transform small and medium-sized businesses: “improved operational performance, reduced operational risk, cost avoidance and accelerated innovation.”

Managed services are more reliable and cost less as a whole, providing a win-win for both modern businesses and managed service providers.

Choose Managed Services if:

  • You want set, flat, agreed-upon fees that occur on a regular monthly basis
  • You want access to experienced technicians around the clock
  • You want to outsource your IT department to save money (or even keep your IT department, but supplement them with managed service technicians)
  • You have guaranteed system uptime backed by a binding SLA
  • You want a constant sense of stability for your organization’s IT infrastructure

Managed Services for the Future

When stacked against one another, the victor is in plain sight. Break/fix approaches are simply not fit for the modern technological environments of most businesses. With managed services, companies can get the ongoing maintenance and support they need at an overall lesser price.

The IT partner you choose to work with is just as important.

At RWA, we’re ready to show you how much better managed services can be. We’ve got a staff with plenty of industry experience and IT know-how, and we want to use it to help your organization. Learn more about us by visiting our website. Or if you’d like to see how we can start working together now, reach out to us today.

Who Provides IT Support for Your Business When Your IT Guy Is on Vacation?

It’s 9:30 in the morning and your computer is already giving you trouble. Unfortunately, your trusty IT guy left yesterday for his Alaskan cruise – and there’s no WiFi on the ship.

What do you do now?

If you have nobody else to turn to, you are completely on your own. However, there’s a much smarter IT support option for you and your company.

A skilled managed service provider.

A managed service provider can give your organization the IT support that it needs, with several major benefits. Let’s take a look at exactly what these benefits are and how they affect your business.

Cost savings.

It may be surprising to learn that having outsourced IT can save your company a lot of money. Outsourced IT support technicians don’t require individual salaries, benefits, or holidays. They also skip any training costs, which can be very expensive.

How it benefits you:

Hiring a managed service provider for IT support gives you the power to leverage IT experts for a fraction of the price of actually hiring them. You’ll receive higher quality IT support, and you can use the money you save to invest in parts of your business that are more growth-oriented.

Around-the-clock support.

Much like the scenario listed at the beginning of this post, you may run into this problem with in-house IT support. With a managed service provider, you have a guarantee that IT support is available to you at any time that you require it.

Why it matters to you:

Having IT support at any time means that you and your employees gain more control over both your company and your work. Now you’re free to work at any time without fear of being stopped by after-hour errors. With a managed service provider, you can improve your organization’s productivity and gain peace of mind knowing you have IT support whenever you need it.

Always compliant.

Compliance is a big issue in the world of business. Keeping policies current with changing regulations is the number one challenge for 47% of organizations. A skilled managed services provider will follow a strict set of guidelines to keep your IT compliant and in line with recent regulation changes.

What it means for you:

Not following compliance rules can lead to costly fines and lawsuits. With a managed service provider, the burden is lifted off of you. You can focus on growing your business and doing what is important to you.

Finding the perfect IT support for you.

Locating the best-managed service provider to meet your needs can be difficult. You’ll need to find one that is knowledgeable, experienced, and honest.

Your managed service provider should never attempt to oversell solutions you don’t need just for the sake of selling technology. They should also have a track record of under-promising and over-delivering – on time and on budget.

RWA is that kind of managed service provider. Working with us will guarantee the best IT support possible, while giving you all of the benefits that come with a great IT partner. Contact us today to learn how we can help grow your company and better your IT infrastructure as a whole.