Sophisticated Systems has partnered with KnowBe4, a proven solution that effectively teaches end users, who are the most important line of defense, how to protect your organization from joining the growing statistics of organizations who have fallen victim to these attacks. Continue
Columbus, OH., January 1, 2017 – Sophisticated Systems, Inc. (SSI) has launched its enhanced website, (www.ssicom.com), effective today. The update reflects the improved internal organizational structure and company growth, through a more client-centric set of solution offerings in addition to a strengthened representation of the SSI brand. Continue
Columbus, OH., December 8 – Sophisticated Systems, Inc. (SSI) is proud to be a strategic partner to library systems across the state of Ohio and to announce that Licking County Library (LCL) system recently engaged the SSI team to help them implement a very exciting project– the first Envisionware 24-Hour Library in the state! Continue
Most businesses are familiar with the use of a VPNs (Virtual Private Networks) for typical remote workers or occasional access to company resources from home. These solutions work very well, and allow employees to access file shares and other network resources as if they were sitting in their office. Because of this, businesses may feel that this is the obvious remote work solution when planning for Telework in response to an emergency or pandemic situation, but there are several considerations when making determinations about how best to work remotely on a company-wide scale. Continue.
According to the Federal Emergency Management Agency (FEMA), “Roughly 40 to 60 percent of businesses never reopen their doors following a disaster,” and “90 percent of smaller companies fail within a year unless they can resume operations within five days.”
It’s easy to delay Disaster Recovery planning, and you certainly hope to never have to use it, but a lack of planning could possibly mean that your business becomes another statistic.
So where do you begin? That’s where we come in. We have outlined nine key elements to developing a Disaster Recovery plan.Continue.
The pace at which technology changes and evolves presents businesses with the ongoing challenge of maintaining an effective, efficient and secure environment while continually planning for “what’s next” in the IT world. Continue.
The advent of hosted solutions has resulted in the ability of smaller businesses to access the types of infrastructure previously only available to enterprise-class organizations. These “As-a-Service” solutions run the gamut and deserve serious consideration. Continue.
Exchange is the gold standard for business Email. However, purchasing and maintaining your own Exchange server can be a costly endeavor. Through Office 365, you can get the power of Exchange for a nominal cost and increase your business’ security and functionality exponentially. Continue
Even though it has become a buzz word phrase in the last several years, the term Managed Service Provider or “MSP” is not a new “thing” at all. The history and evolution of the modern day Managed Service Provider or “MSP” started around the 1990’s with the emergence of Application Service Providers or “ASPs”. This subset of value-add IT providers really helped to lay the foundation for remote IT support. Back then is was primarily around IT infrastructure but today the proliferation of remote IT support is pervasive in just about any piece of technology that is connected to the internet via wired, wireless, or cellular methods. Continue
Ransomware. Just the name makes a Systems Admin sweat until they check the status of their backups. According to a study conducted by the Kaspersky Security Network, “the number of Kaspersky users encountering any type of ransomware increased 17.7% over the two years of the study. However, during the same period, the number of users encountering the cryptoware variant increased 5.5 times (from 131,111 instances in 2014-2015 to 718,536 instances in 2014-2016).” Meaning, there is more than one form of cryptoware and it is constantly evolving, creating more susceptibility and vulnerability to attack. The best protection against this new wave of threats is to educate yourself and prepare. Continue