Uncategorized

When Temporary Becomes Permanent: Corporate Vision Extends to the Home office

Posted on Jun 10, 2020

When Temporary Becomes Permanent: Corporate Vision Extends to the Home office

In March, nearly two-thirds of Americans worked remotely due to the novel coronavirus. June has arrived with the country largely opening back up for business but seeing a different business landscape. Many questions emerge, with one of the most important should employees return to the physical office- at all? Is it worth the risk of infection to meet in the office when Zoom has worked so well? How will the open office plan, so popular for communication, fare in light of social distancing? Will handshakes go the way of the rotary phone? Employees are conscious of the prospect of carrying the virus back to their families; business owners are examining the expense of outfitting offices to appropriately accommodate the protection of employees while staying productive and avoiding liability. What about the fact that employees are enthusiastic about the perks of working from home, and may resist returning to the office?  With all these things accounted for, many businesses are extending the work from home option as a longer-term or even permanent strategy for their workforce. Whatever the reason, there are considerations businesses should take if they are considering a long or longer-term work from home arrangement for their employees. Security First Companies can’t do business without focused attention on security. Communications and data privacy are significant considerations. In the hurry to accommodate employees working from home, connectivity was the focus- for instance, the use of VPNs to access the office and Zoom for meetings using employee’s personal computers. For longer-term work from home situations, consider investing in company-issued computers and monitors that are webcam enabled. This will ensure that there are singular configurations managed by IT staff who secure those endpoints and the ability to effectively use video to communicate. Home wifi connections must have a password;  “free” wifi from coffee shops are an invitation to hackers and should not be used. Employees working from home tend to add additional stress on in-house IT groups. Managers should plan to have frequent, regularly check-ins with their IT team to monitor concerns and workload so that they are not overburdened. One major concern when employees use their personal machines is that they may not be staying up to date with the latest patches, running antivirus protection, or may have even inadvertently installed malware. Without regular management of these systems, organizations are open to a breach. Phishing is at an all-time high: employees should be trained in how to recognize phishing emails, vishing- (voice calls) and even text messages that prey on employees to divulge data that could lead to a breach. Employees should be briefed on physical security; for instance, machines issued from the company should have strict employee-only use, complete with password-protected login with multifactor identification enabled, and doors should be locked. Invest in password managers to avoid vulnerabilities that could occur from a lost phone or notebook where passwords could be listed. Being...

Read More »

When Business Planning is Built-in: A Living Contract

Posted on Apr 27, 2020

When Business Planning is Built-in: A Living Contract

The Corona Virus COVID-19 pandemic has had a drastic effect on how businesses operate, the clients they serve, and the bottom line. Organizations have had to adapt strategy and investments very quickly to keep up with the ever-evolving challenges. Extra pain is being felt as businesses work hard to honor commitments made due to restrictive contracts signed prior to the global pandemic.

What if scaling and the ability to shift resources were built into the agreements you make with your partners?

Read More »

20 Seconds to Review- to AVOID Getting PHISHED!

Posted on Apr 24, 2020

20 Seconds to Review- to AVOID Getting PHISHED!

Threats come in ALL forms. of communication – from phone calls to ads and apps- but the most effective for these bad actors are SPEAR phishing emails. These emails are hyper-targeted, they may APPEAR to come for your bank, your boss or your babe, they may call you by name, they may make a reference to your work location or even your neighborhood. We have seen some DOOZIES… including “outsourced lawyers” asking for users to click on links to upload information related to downsized employees, bad actors who claim to have damning data on the victim, and threatening to use social media to reveal them.

Make 2020 the year that you begin to take 20 seconds to review emails before taking any action to determine if they are authentic. Check out how to review emails in some detail below:

Read More »

MNS Group Gives Back!

Posted on Apr 14, 2020

MNS Group Gives Back!

The COVID-19 pandemic is unlike anything that we have faced. Our way of living, working, and socializing has completely changed overnight. MNS Group is in awe of the brave men and women in our healthcare system and first responders who are putting their lives on the line each day to protect us.

So that got us thinking what WE can do to help? What can we offer that could make someone’s life easier or provide peace of mind?

The answer? Our BRAINS. Yes, our brains. Over 20 years MNS Group has earned the trust of hundreds of businesses for our technology and business consulting. So, we’ve decided to pay it forward by creating the MNS Group “Gives Back” initiative which provides free technology advice and consulting for businesses and individuals in need.

Read More »

COVID-19: BE VIGILANT FOR CYBER SCAMS

Posted on Apr 10, 2020

COVID-19: BE VIGILANT FOR CYBER SCAMS

The global pandemic is open-season for bad actors utilizing technology to prey on individuals. Several mechanisms are being employed where attackers profit from the crisis: phone calls (including robocalls), emails, text messages, fake and phishing websites, malicious ads on reputable sites, and fake apps. These scams/attacks vary greatly in content and sophistication and some may even be specific to a region or town. As always, be wary of any solicitation for personal and/or financial information related to COVID-19.

Read More »