Posts

The State of SMB Cyber Security

Data Protection & SecurityGone are the days when cybercrime was exclusively a big business problem. In the modern workplace, all businesses are at risk, regardless of their size or industry. Today, we recognize that implementing a cyber security program, much like hiring people and growing sales, is an essential part of running our companies.

With 43% of cyberattacks targeted at SMBs, it’s not surprising that many have identified cybersecurity as a priority. And while most of us have deployed protections, it is challenging to know if you have the right balance of protection relative to your risk.

Here are 4 key findings from research conducted by Microsoft:

01 Businesses understand that cybercrime is a problem, but understate the severity of the threat and overestimate their preparedness

The vast majority of businesses (85%) cite cybercrime as a concern, and more than half (56%) believe it is a top priority. Businesses are backing up this belief with action. Most have begun to invest both time and dollars into protecting their company from hackers and other malicious actors.

However, when you look a little deeper, it becomes clear that many have underestimated their risk. 74% of businesses don’t believe they are likely to be attacked at all and that corporations are two times as likely to be attacked.

90% of businesses say they have the right protections in place to prevent an attack, and those with more than 50 employees are even more confident. It is encouraging that businesses are investing in security, but the reality is that they are at greater risk than they think. Nearly half (41%) have been attacked

02 Small and medium-sized businesses are just as likely to be attacked as large corporations

For solutions that do cost money, businesses allocate about 15% of IT budgets go to cybersecurity,  and  21% plan to increase how much they spend protecting the company. Businesses recognize that this investment is worth it because three out of four know that it costs more to recover from an attack than it does to prevent one.

03 Employees can be a business’s biggest protection and also their biggest threat

As a small business owner, you face many of the same threats as larger businesses, but also unique challenges.

Given the number of security events tied to employees, businesses run the risk of underestimating the threat of employees leaking data or  sharing sensitive information, whether maliciously or accidentally.

Insider threats take several forms. Employees or partners may find it more convenient to transfer sensitive data using personal email or an unsecure cloud drive, not realizing the risk to your company. In fact, 30% of security events are attributed to careless or uninformed employees. More alarming is the roughly 36% of attacks where a malicious employee steals sensitive data.

04 Businesses have begun taking steps to protect themselves and there is a set of solutions and practices available to them

Most small and midsize businesses don’t have the same scale of resources to combat security threats and implement cyber security solutions as larger entities.

Fortunately, there are right-sized solutions and strategies designed to overcome the unique vulnerabilities of smaller companies. An effective security strategy doesn’t have to be expensive—or time-consuming. With a few simple, no-cost/low-cost steps, you can make a significant  impact on your company’s overall security profile. The key is to match security to your business needs and your budget.

To assess your cyber security status, discuss your risks and needs, and identify solutions that fit your business and your budget, contact us to schedule a complimentary session with one of our Cloud Advisors.

Top 3 Types of IT Security Threats and How to Prevent Them

Data Protection & SecuritySecurity Threats: 3 You Know and 1 You Should

Security threats take many forms. Most owners of small and medium-sized businesses (SMBs) are aware of the need to defend against the top three — viruses, ransomware, and phishing attacks — but their organizations are generally not as prepared to deal with the risks related to employees leaking data or sharing sensitive information, whether maliciously or accidentally.

Top 3 Types of IT Security Threats

1. Viruses

According to research conducted by Microsoft, infection by a computer virus is the most commonly cited among security threats facing businesses. Preventing viruses requires an integrated approach to endpoint and identity management.

How to Prevent Viruses:

  • Deploy next-gen antivirus software, with advanced threat protection, installed and updated, on all devices
  • Use web filtering and monitoring services to prevent infection, even from trusted sites
  • Roll out mobile device management to secure work devices (including laptops and desktops), as well as personal devices used for work
  • Enforce the use of multi-factor authentication as part of an integrated identity and access management solution

2. Ransomware IT Security Threats

Ransomware is a type of malware that restricts access, encrypts files, or even stops you from using your systems. Like viruses, ransomware can enter the company through insecure endpoints or unsuspecting users.

While virus protections also protect against ransomware, no protection is perfect. You need to be ready to respond and recover in the event of a successful cyber attack. This includes implementing solutions and services, and ensuring you have the proper protocols in place.

How to Prevent Ransomware Security Threats

  • Backup your data and system images, in the cloud, to ensure your ability to restore and recover
  • Encrypt all data, at rest and in motion
  • Deploy business continuity services to spin-up copies of servers in parallel with remediation
  • Pre-arrange access to forensic, legal, and communications resources to ensure a proper business response
  • Acquire cyber insurance to cover remediation, recovery, and regulatory costs, along with lost revenue
  • Focus on the four pillars of cloud security, and continue to review them on a yearly basis

3. Phishing Attacks

The majority, 67 percent, of cybersecurity professionals surveyed consider phishing attacks to be the greatest security threat facing your business and employees. Take the proper steps today to protect your people, your data, and your business.

How to Prevent Phishing Attacks:

  • Configure advanced threat protection services to identify and block attacks via email using links and/or attachments
  • Monitor inbound and outbound email traffic
  • Provide your team with awareness training to recognize problem emails, and how to respond/act
  • Instruct your team to report suspicious messages, links, and attachments
  • Deploy domain level services to prevent identity-spoofing

1 Additional IT Security Threat You Should Know

!! Internal Leaks & Threats

Insider security threats are often overlooked, and small and midsize businesses are generally unprepared to deal with these IT security threats, accidental or malicious. Surveys indicate that 53% of organizations have experienced insider attacks against their organization.

These risks take several forms. About 37% of internal leaks can be attributed to careless or uninformed employees. In many cases, these employees are using personal, less secure or unsecured services to conduct business.  Whether consumer versions of email or cloud drives for sync and share, these “shadow IT” services pose a significant risk.

While the majority of internal leaks and threats are unintentional, 36% of internal leaks are identified as attacks by a malicious employee.

To prevent data leaks and breaches, you should:

  • Actively manage access and permissions to networks, systems, applications, and data; periodically review permissions for compliance
  • Leverage features within your systems that help you manage and protect confidential and proprietary information
  • Deploy information protection solutions, such as Data Loss Prevention (DLP) and document/message level encryption, to block sensitive data from leaving your control
  • Implement proper cyber insurance and breach response protocols

>> Take Action Against IT Security Threats

All of the suggestions, above, fall within our CPR best-practice model for data protection and cyber security: Communicate & Educate; Prevent & Protect; Respond & Recover.

To assess your cyber security status, discuss your risks and needs, and identify solutions that fit your business and your budget, contact us to schedule a complimentary session with one of our Cloud Advisors.

Data Breaches are Still a Thing

As we speak with small and midsize business executives, we sometimes hear that cyber attacks and the risk of data breaches are no longer seen as a threat serious enough to warrant attention and spending.  We understand this hesitancy. Even with the level of media visibility, the prevalence of security solutions and a weariness of the constant focus on security can lead to the conclusion that we can let our guard down.

The reality, however, is that the rate of cyber attacks jumped about 600% in 2020.  More businesses are getting attacked and more attacks are successful.

A List of Breaches

For perspective, in the last 4 weeks, the cyber security experts at ID Agent have published data on these major breaches. Many are likely to be familiar to you or represent a major government entity.

  • Metropolitan Police Department of the District of Columbia
  • Pennsylvania Department of Health
  • The Resort Municipality of Whistler
  • CNA Financial
  • OfficeDepot
  • Personal Touch Holding Corp
  • Facebook
  • Hobby Lobby
  • Illinois Office of the Attorney General
  • Wyoming Department of Health
  • Eversource Energy
  • California State Controller
  • LinkedIn
  • The New York Foundling
  • University of Maryland Baltimore
  • CareFirst BlueCross BlueShield Community Health Plan District of Columbia (CHPDC)

The Case for Concern

The list, above, is only a sample and only represents larger breaches.  Cyber attacks hit small and midsize businesses on a daily basis. Even so, we often view protection and recovery services as insurance.  We do not want to pay for coverage; we hope we never need to use it; and we do not see the value until we are a victim.

A Model for Success

Cyber security differs from insurance. We can reduce the risk of successful attacks with foresight, planning, and protections. Our CPR Cyber Security Model balances awareness, prevention, and response.

Communicate and Educate

Involve everybody in the solution. Communicate the risks and your commitment to protecting the business and your employees. Educate your team on the risks, how to spot and report attacks, and how their behavior can prevent or help an attack.

Protect and Prevent

Implement multi-layer, multi-vector protections that focuses on your people (identities), data, applications, and systems. Use “next gen” solutions that analyze behaviors and that can learn as risks evolve.

Respond and Recovery

No defense is perfect. Have services in solutions in place that let you recover and return to operations within a time frame that protects the health of your business. More than getting data and systems back on line, we recommend that you put in place the forensics, legal, public relations, and customer service resources you will need in a cyber attack emergency.

Want to learn more?  Want to assess your cyber security protections and risks? We can help.  Email us or complete our contact form to schedule a complimentary meeting with one of our Cloud Advisors.

 

Work From Home – Office Ergonomic Checklist

Even with the pandemic and the shift to work from home (“WFH”), business owners remain responsible for making sure employees’ home work spaces are safe, comfortable, and effective.  For employees working at a computer most of the day, bad ergonomics can lead to musculoskeletal disorders (MSDs) such as tendonitis, carpal tunnel syndrome, and sciatica.  MSDs can be uncomfortable or painful for employees.  Beyond the impact on productivity and job satisfaction, MSDs often require medical treatment and can result in longer term disabilities.

When employees work from home, the are unlikely to have the same chair and workstation options as they do at the office.  Businesses should do what they can to help employees maintain good posture and relieve strain.

This short checklist can help you evaluate work from home environments. Have employees answer these questions to determine if any changes are needed and appropriate. Often, small adjustments to the work space can improve ergonomics and reduce the risk of injury.

General

  • Are items that you frequently use located close by?
  • Are items positioned equally on both sides, i.e., not all on the dominant side of your body?

Chair

  • Are feet resting flat on the floor, with hips slightly higher than knees?
  • Does the chair fit the contour of your back? If you can, adjust the back rest up or down to fit the
    natural curve of your lower back with the curve of the chair.
  • Is there a two-finger gap between the back of your lower legs and the seat of your chair? If
    possible, adjust the seat pan forward or backward to correctly fit it to the length of your legs.
  • Are both chair arms are at the same height to prevent you from leaning one way throughout the
    day?
  • Can you use your keyboard and mouse without twisting or reaching? Note: If you can’t get the
    keyboard or monitor low enough for your body type then raise your chair and use a footrest to
    obtain the ideal height for the chair, keyboard, and monitor.

Keyboard

  • Is the keyboard close to elbow level to help keep the wrists straight? Note: Don’t use high force to
    type on your keyboard as force can put strain on your muscles and ligaments.
  • Is the mouse located right next to the keyboard so it can be operated without reaching?
  • Can you move your mouse cursor from one end of your screen(s) to the other without picking it
    up? (Adjust mouse/pointer settings as needed in your software)

Computer monitor(s)

  • Can you see the display of both monitors without looking downward or to either side?
  • Does the distance from your monitor(s) to your eyes allow you to read the screen without leaning
    your head, neck, or trunk forward or backward?
  • Is the monitor positioned so the top line of the screen is no higher than eye level? Note: If you
    wear bifocals and you feel like you’re always looking down, you should adjust your monitors lower
    than the normal height to use the bifocal part of your glasses.

Varying positions

  • When possible, do you make small adjustments to your chair or backrest to keep from staying in
    the same posture for long periods of time?
  • Do you stretch your fingers, hands, arms, and torso throughout the day?
  • At least hourly, do you stand up and walk around for a few minutes periodically?
  • If possible, do you perform some of your tasks in a standing position? Note: When adjusting height of your
    desk or monitor, ensure it is on a sturdy surface with proper adjustment of your mouse also.

If you cannot answer “Yes” to most, if not all, of these questions, we can help.  Cumulus Global can provide ergonomic aids — from keyboards and wrist supports to monitor arms and sit/stand desks. Email us or complete our contact form for information and solutions.

 

Remote Workforce Security: Tips, Challenges & Lessons Learned

As part of its Global Year in Breach – 2021 report, security firm ID Agent found that remote workforce security is more difficult than generally thought. With many of the changes in how we work expected to continue, as business leaders we need to embrace hybrid work as the way of the future.

What Exactly is Remote Work Security?

Remote workforce security is a subset of IT cybersecurity that focuses on protecting corporate data and other assets when employees work outside of a physical office. Implementing strong security protocols and technologies for remote access, educating employees on how to identify security risks and stay safe, and strengthening your overall business data protection and security are some of the best ways to secure your remote workforce.

What to Know When Developing Security Procedures for a Remote Workforce

Pandemic Triggers Panic

2020 and the onset of the global COVID-19 pandemic presented new challenges. The biggest challenge was cybercrime. The mix of understaffed IT departments, maintenance failures, unpreparedness, record-breaking cybercrime, and employee stress taxed IT teams and services. Cybercriminals took advantage of this golden opportunity, and businesses were hit hard.

Businesses needed to rapidly shift to remote operations. For those with older technology, this shift was especially difficult. Everybody became a remote worker. IT teams needed to become instant experts in remote workforce security, including knowing the four pillars of cloud security. For too many businesses, it was a mad scramble to to get their teams remotely or face shutting down entirely. Many employees lacked training in remote work; many IT teams had never managed remote security at scale. A barrage of unintentional, insider threats assaulted IT teams daily.

Stress Creates Vulnerabilities

Why was the massive shift to Work from Home such a boon to cybercrime?

IT departments were unprepared and understaffed.  Only 39% of IT executives polled felt they have adequate IT expertise on staff to assist with remote work issues. Only 45% of organizations reported having and adequate budget to support remote work.

At the same time, employees were dealing with unexpected stress at home and more likely to make cybersecurity mistakes. Over 50% of respondents admitted they were more error-prone while stressed. 40% said they made more mistakes when tired or distracted. Altogether, 43% of workers surveyed acknowledged mistakes resulting in cybersecurity repercussions for themselves or their company while working remotely.

Cybercrime Complications

Chaos and confusion created opportunities for cybercriminals. Experts estimate that overall cybercrime was up by 80% in 2020. Much of that increase was from phishing attacks. Cybercriminals took advantage distracted, stressed workers, with limited IT support, and immense numbers of email. In 2020, phishing attacks skyrocketed by more than 650%. Attacks hit 75% of companies and accounted for almost 80% of all cybercrime.

Successful ransomware also jumped more than 145%. In 2020, 51% of all businesses and 40% of small and midsize businesses experienced a ransomware attack. 50% of attacks on SMBs used vicious double extortion ransomware. Ransomware will continue to top the list of cybercrime trends in 2021.

FAQs About Remote Workforce Security

Next Steps for How to Secure Your Remote Workforce

Stopping ransomware and decreasing your company’s risk of a successful cyberattack against remote and hybrid workers starts with stopping phishing and its destructive effects. We have tools that help your IT team support and protect your people and your business, while also protecting your budget.

To learn more about you cyber risks, and solutions to fit your needs and budget, contact us and schedule a complimentary Cloud Advisor Session.

 

Business Email Compromise: 10 Stats; 5 Solutions

Business Email Compromise (BEC) is a type of phishing-related fraud with far-reaching consequences. Not only can BEC attacks hurt your business, companies you work with can be damaged as well. BEC threats are hard to detect and mitigate, given the a byzantine structure of the attack.

Here are 10 statistics that demonstrate the increasing risk of BEC attacks, along with 5 solutions that reduce the chance of your business becoming a victim.

10 BEC Statistics

1Business email compromise rose by 14% overall in 2020 and up to 80% in some sectors
265% of organizations faced BEC attacks in 2020

3In 2020, BEC costs increased rapidly, from $54,000 in Q1 2020 to $80,183 in Q2.
4The energy and infrastructure sector topped the 2020 list with 93% of attacks
560% of the information on the dark web could potentially damage businesses

6In 2020, 80% of firms experienced an increase in cyberattacks

762% of BEC scams involve the cybercriminal asking for gift or money cards.
8The most common type of BEC scam is invoice or payment fraud
9Payment/invoice/billing scams skyrocketed by 155%, in 2020

10The average amount requested in wire transfer-based BEC attacks nearly doubled to $75,000 in the fourth quarter.

Protecting Against BEC Attacks

The most effective way to prevent business email compromise attacks is a strong, multifaceted defense against the primary delivery system: phishing email.  Here are 5 solutions that help you mitigate threats and the risk of successful cyber attacks.

1 Phishing Resistance Training

An absolute must-have for any organization in today’s tumultuous world is a strong cybersecurity culture. Too many employees are still clicking on dangerous messages. Strengthen your security culture and reduce your risk of suffering email-based cyberattacks by up to 70%.

2 Advanced Threat Protection

Go beyond attack profiles and blacklist lookups. Take advantage of next-gen protections that assess content and context, leverage machine learning, and analyze the behavior of links and attachments.

3 DNS / Web Protection

Secure your DNS traffic to help prevent cyber attacks that spoof or use your identity.  Block known, dangerous web sites. Block malicious web content and downloads, even from trusted sites that have been hacked.

4 Identity Access Management

Secure your user identities over time with a comprehensive approach. Include multi-factor authentication, password vaults, and single-sign on for your best protection.

5 Dark Web Monitoring

Your team probably uses their work email address (identity) to log into third party services. Breaches in these services put your business at risk. Monitor you domain for potential breaches so you can take action before you become a victim.

To learn more about these Business Email Compromise, other cyber threats, and solutions to fit your needs and budget, contact us and schedule a complimentary Cloud Advisor Session.

 

Modern Workplace: Benefits and Challenges

The modern workplace brings together teams, information, and processes to empower our teams and enable our businesses. Powered by Microsoft, Google Cloud platforms, getting the most out of our systems requires more than simply moving from one system to another. Managing adoption and ensuring users understand how to use tools effectively increases individual and team productivity and efficiency. Below, we look at the most notable modern workplace benefits, as well as three major challenges to overcome.

5 Modern Workplace Benefits

Most of our businesses realize benefits when we create our modern workplace with Microsoft, Google, and other key solutions.

1 Faster and more reliable communication
The modern workplace improves our ability to communicate. Beyond fast Internet connections, the integration of voice, messaging, audio/video conferencing, file sharing, real-time collaboration, and other tools lets us work together and share information in the ways that work best for us. Secure access from virtually anywhere enables us to work where we are most productive.

2 Enhanced efficiency and productivity
The modern workplace ushers in efficiency and productivity in many ways. Automating tasks and workflows, improved access to files and information, and embedded AI help users complete work more effectively.

3 Lower costs; Higher profits
Technology-driven increases in efficiency and productivity decrease operating costs. Reduced travel, faster time to market, quicker customer response times, and faster and more effective decision-making all result from the reliability, mobility, and productivity of a modern workplace.  These benefits save time and money, and drive revenue and profits.

4 Greater transparency and interconnected operations
You can replace complex, bureaucratic processes when you match access to data and information with updated processes that take advantage of integrated, secure applications, tools, and services. Whether simple file sharing or ensuring you have one record of customer information across your systems, the modern workplace helps connect, streamline, and simplify.

5 Improved security
Modern workplaces are more secure. Integrated, layered security is embedded into the architecture of cloud infrastructure services, designed and built to meet your security and data privacy needs. Beyond the traditional focus of protecting physical computers in specific locations, security for the modern workplace protects the systems, networks, applications, data, and processes. You also protect your people with identity and access management that removes the physical boundaries of security.

3 Challenges of the Modern Workplace

Moving to a modern workplace, like any, change comes with challenges.

1 Resistance to Change
Even when they understand the objectives and benefits, some members of your team will hesitate to embrace change. Helping team members understand how the changes will benefit them individually —  how it will enable them succeed — improves buy-in and acceptance. Offering tools to help them learn and apply new features and capabilities supports their personal growth and overall adoption of new apps, tools, and processes.

2 Inadequate Training
Turning on a new app, tool, or process is not enough. “One and Done” sessions are not effective.  To fully benefit from your modern workplace investments, your team needs to understand your apps and tools as they use them. Individuals retain and apply learning best when they have time to use what they have learned. Adoption plans that provide training and support relevant to a person’s role and responsibility in small, manageable doses, over time are most effective.

3 Mismatched Technology
Technology for the sake of technology leads to disaster. Picking the best technology that is not the best fit creates problems. Start your selection process by defining your business goals and objectives. Identify the types of technologies you need and want to support your objectives. Then select the specific technologies that match your prioritized needs and wants.

Contact Us to Learn More About Modern Workplace Tools & Solutions

Email us or complete our contact form to discuss how a modern workplace, including Microsoft, Google, and other key tools, can help your business thrive and grow.

COVID-19 Survey: Revenue Losses and Diminishing Cash Reserves

In a national survey of more than 2400 businesses conducted and published by American City Business Journals finds that small and midsize businesses are seeing severe impacts from the COVID-19 pandemic.

The Impacts: Profits, Revenue, Cash, and Survivability

About 69% of respondents have seen revenue decline since the major onset of COVID-19 in March 2020.  Of those seeing revenue decline, close to half see revenue falling by 50% or more year over year.

Additionally, 47% indicate that they have not been profitable and nearly one third report being cash flow negative over the first six months of the pandemic. About 70% of those losing money are losing more than $10,000 per month and 64% will run out of funds within the five months.

About 40% of respondents raised cash through loans or equity investments since March 1, with 91% of these businesses receiving loans from a federal stimulus program, such as the Paycheck Protection Program. These funds were predominantly used to cover payroll and operating expenses as opposed to funding investment or growth.

Change in Focus

With the stark financial impacts, most smaller businesses are changing their focus. Rather than looking forward one to three years, most SMBs are focuses on the current and next quarter. The shift from strategic to tactical is a direct response to the many unknowns of the pandemic, the near-term economy, business sector and market impacts, and government recovery and stimulus plans.

The near-term focus makes sense as we look to minimize costs, conserve cash, and ensure profits and our sustainability.

Where IT Services Can Help

Leveraging the right IT services can help you prepare and react to changes as you navigate the on-going unknowns.  Here are 5 ideas to consider.

Audit your IT services for redundant services.
  • Most businesses find they are paying for multiple services with redundant or overlapping capabilities.
  • In many instances, we see businesses paying for third party services that are available for no additional cost in their productivity suites.
  • Eliminating duplication will require some change of habits, but can dramatically reduce on-going IT costs.
Audit your communication tools.
  • Are you paying for, and not using your available communication tools?
  • Chat, video, and collaboration tools are standard in Microsoft 365 and G Suite, and can reduce or eliminate the need for expensive voice, teleconference, video conference, and online meeting solutions.
  • A modest investment in training/education can help minimize communication costs.
Replace file servers with file services.
  • Most businesses using Microsoft 365 or G Suite are storing files in these systems; these same businesses still run on-premise or hosted file servers.
  • OneDrive, SharePoint, My Drive, and Shared Drives make it easy to save, share, and manage files.  The OneDrive and Drive File Stream clients connect your end user applications to your cloud file services.
  • Moving files from servers to cloud services eliminates the need for physical services, monthly MSP monitoring fees, backup/recovery costs, anti-virus costs, and more.
  • If your staff need to access your on-premise services remotely, you may also be able to reduce or eliminate expenses related to VPN and other remote access services.
  • While you will still want and need to protect cloud-resident files, your cost to store, share, and manage files will be lower.
Move applications and systems from on-premise to cloud
  • You can lower you monthly operating costs and give you the ability to scale your resources and costs up and down as needed on a monthly basis.
  • Make it easier to reduce your physical footprint for potential savings on rent and utilities.
  • Scale your services up and down as needed to avoid unnecessary costs and capital expenditures.
Execute a service and data governance strategy
  • Scale services up and down as needed to manage costs
  • Ensure data is secure, managed, and protected
  • Leverage data archiving services to minimize active account costs

To explore your options and best next moves, contact us for a complimentary Cloud Advisor session.


 

SBA Re-Opens Disaster Loan and Grant Program

(Published 6/17/2020)

The Small Business Administration (sba.gov) announced earlier this week that small businesses can again apply for relief via the Economic Injury Disaster Loan (EIDL) program.  This includes applications for fee, up to 10,000 advances, regardless of the loan’s approval.

The interest rate is fixed at 3.75 percent and terms run from 2 to 30 years based on each borrower’s cash flow and ability to make payments. You can defer an EIDL for a year and can use the funds for “debts, payroll, accounts payable, and other bills that cannot be paid due to the impact of the disaster and that are not already covered by a Paycheck Protection Program loan,” the SBA wrote in a news release.

You can request an advance of $1,000 per employee, up to a combined $10,000. This advance will not have to be repaid, and small businesses may receive an advance even if they are not approved for a loan. If you have received a Paycheck Protection Program (PPP) loan, the amount that can be forgiven will be reduced by the amount of your EIDL advance.

Some agricultural businesses are now also eligible as a result of the latest round of funds appropriated by Congress in response to the COVID-19 pandemic.

Unlike PPP loans, you must apply directly through the SBA, and not through a lender. Click here to learn more or here to apply.

Detailed Guidance from CDC on Re-Opening Businesses

(Published 5/8/20)

As reported by the Associated Press, scientists at the Centers for Disease Control and Prevention (CDC) prepared a report providing specific guidance for re-opening for different types of businesses and organizations. The report, Guidance for Implementing the Opening Up America Again Framework, was due to be released on May 1st, but was blocked by the administration.  We are providing a link to a copy of the leaked report.

As business owners and leaders, we are responsible for the safety of our employees, customers, and others with whom we come in contact.  The more factual information and science-based guidance we have, the better. For our businesses to survive and grow, we will need to operate safely and effectively in the months ahead.  We need to prepare and execute plans well.

Click here to see the report.

library

The Ultimate Meeting Guide

eBook | Source: Microsoft —
Many businesses experience a sizable gap between the increasing number of meetings and the value derived from the time spent in these meetings. What can you do? The simple answer for better meetings is to …

Securing Your Digital Transformation

eBook | Source: Cumulus Global

Simplify Security with Microsoft

Infographic | Source: Microsoft

Webcasts

Nothing Found

Sorry, no posts matched your criteria