Have any questions? Call us at 503.517.2008          Click here to log into the Upward Client portal

October 31, 2017

No Comments

The 3 critical technologies every business needs to be evaluating

Every business needs to be evaluating its progress and also its setbacks. But more specifically if you aren’t evaluating these 3 critical technologies, you’re missing a huge competitive advantage…

In his seminal work, Crossing the Chasm, Geoffrey Moore defined the adoption cycle of a new product or innovation:

This model plays out in stark reality in the technology business as the innovative solutions released today and adopted by leading enterprises will become the commonplace solutions for small and midsize businesses within 3-7 years. We are also witness to businesses that routinely fall behind and become adoption laggards, this usually creates problems for them as the costs in human capital begin to rise significantly as you try to make large jumps at once. Becoming a laggard is also a significant detractor in finding strong, young talent. How many carpenters want to give up their band saw and go back to a hand saw? The three solutions highlighted in this blog represent solutions that could be considered “Crested”, moving from early majority to late majority adoption. For SMB’s, this is a great time to buy, as the pricing is generally stable, support resources are plentiful and the bugs are ironed out.

As a small business owner, I understand all too well the relentless parade of competing interests for resources. SMB’s need reliable advice that allows them to stay in between “early” and “late” majority adopters, and these three solutions are critical and applicable to all businesses.

Hosted VOIP/ UCaaS: With the proliferation of super-fast internet options, Hosted VOIP, also often referred to as Unified Communications as a Service (UCaaS) has become a no-brainer for any company ready to replace their phone system. These solutions are provided right “over the top” of your existing internet pipe, have the features of an enterprise-class phone system and generally save 15-50% over the older technologies (like PBX solutions). One of the best things about these solutions is they make your cell phone an extension of your desk phone (or get rid of the desk phone altogether) via a slick app that allows you to manage all the features of your phone without any special training or knowledge. The leaders in this field are: RingCentral, 8×8 and Vonage. However we believe Microsoft will overtake all three of these solutions in a few years time with Office 365 E5 (also called Skype for Business), which bundles right in with your existing Office 365 solution to make it the ultimate Unified Communications as a Service solution.

Business Intelligence: Businesses are creating more data than ever before, and within this data lies the answers to questions and challenges that can be game-changing. Business Intelligence solutions provide an interface that allows data (from multiple databases) to be correlated and presented in an easily digestible format, with beautiful graphic representations from pie charts to 3D modeling. The challenge for most businesses is knowing what to look for and where to find it. Enterprises have created entire departments dedicated to mining their data to identify leading trends and correlations that can inform strategic decision-making. For a small or midsize business owner, this level of insight will eventually become more available through artificial intelligence, but this is prime time to begin leaning into a deeper understanding of your data.

Business Intelligence solutions like Power BI from Microsoft can create dashboards displaying beautiful representations of simple metrics and KPI’s. Like, average landed cost per customer, pulled from a CRM and accounting database. Or gross profit per average user (perhaps pulled from QuickBooks and an operational software) or average cost per callback, pulled from a dispatching software and time tracking software.

With a tool like Power BI, the only limitation to the data you can begin correlating between databases is your imagination. Use deeper insight to drive employee or customer satisfaction, profit per widget or decrease support costs and jump your competition.

Single Sign-On & Multifactor Authentication: Raise your hand if you’re tired of passwords.

Through Microsofts mobility solution bundled with Office 365: Enterprise Mobility + Security E3, organizations can significantly reduce password complexity for their users while increasing security, a rare win-win with security.

Single Sign-On (SSO) basically uses a single log-on for a user to access a dashboard in a web browser. From the dashboard the user would have access to all of the applications they were supposed to see to do their jobs. The user therefore has no need to remember the individual passwords to all the applications they use. From Salesforce to Quickbooks Online to Twitter to over 2,000 other applications, each user has the access that their permissions allow. Depending on permissions, the user can access these anywhere from any device, with an enormous amount of control and flexibility allowed to the organization.

The obvious concern around this is security. If a user has one password that accesses many applications, what if that password is compromised? A multi-factor authentication product allows for the same sort of security everyone is familiar from online banking, forcing the user to provide a one-time code or verify the request through a smartphone app.

The net of all of this? Users no longer need to remember multiple passwords, so they forget them. Users can access all (and only) the applications they need to fulfill their jobs through one “pane of glass”, from anywhere. And to top it off, your environment is more secure than it is today. The rare and coveted win-win.

If you are ready to cross your own business chasm, reach out to Upward to begin discussions on how to stay relevant and avoid becoming a business laggard.

October 23, 2017

No Comments

The Most Silent and Deadly Enemy to Small Business

In the many talks that we’ve had with business leaders we have come to be aware of the most silent and deadly enemy to small business… And it’s called Technology Apathy.

I sit down at a conference table getting ready to deliver my pitch.  A pitch that I have worked for months  to perfect. It’s just me and the CEO. I am dialed and ready to show him that what my company does is more valuable than he could ever possibly know. We get through the rapport building part of the conversation and we get along great. My hopes begin to rise. After about fifteen minutes of GOOD interaction I begin to note something isn’t right. All the strategy, all the research that has been invested into my sales deck isn’t having the impact that it should. I ask him question after question and he answers EXACTLY how I want him to. I am beginning to get more and more confused because it feels like everything is going really well but his disposition hasn’t changed. He’s not getting worked up about all of his business problems. He’s not getting excited about the ideas of how my company can uniquely solve those problems. It is starting to get uncomfortable. I look at him again and see it. His eyes have glazed over. He had decided to check out before we even sat down. Then it hits me like an ice cold water balloon straight to the face, he doesn’t care. When it comes to his business, technology and IT are the LAST things on his mind. I could show him a 6 month ROI on a solution that could propel him to 300% of his annual revenue goals and it’s like I’m speaking Japanese to him. I am utterly perplexed. HOW CAN HE NOT CARE?!

I left the meeting and realized that even though he agreed to move forward to the next step, even though he gave me commitment that he is willing to make a change, I have zero chance of bringing this company on as a client. I get back to the office, discouraged and confused, and sit down at my desk and blankly stare at my computer. What on earth can I do to start making business owners care about something that is absolutely integral to the success of their business? I try to think of a good analogy that will help explain the importance of IT. If the product is the heart of the business, management is the brain, the employees are all of the organs that help the body function, IT is the BONES of the business.  Without an infrastructure to center everything around none of it works. I shake it off and drift back into discontentment, then, miraculously, I have an epiphany…

It’s not his fault he doesn’t care. He isn’t intentionally trying to not care. He has been trained not to care. The dramatic increase in the professional services and software development sectors have bombarded him with “SMB Solutions” that have forced him to filter the content. Anything that has to do with IT, technology, software or solutions is going in one ear and out the other and I don’t blame him for this.  On top of the overexposure to “solutions” is the complexity of technology. It is constantly changing, just like his business, and spending the energy to keep up with the latest and greatest is exhausting. Technology becomes overwhelming. Spending money on technology becomes painful. Spending time considering technology becomes the LAST way he wants to spend his day. While all of these perspectives are probably true for him and most small business owners, they still have a problem that needs to be solved.  After all, when was the last time you heard a success story about a small business succeeding by ignoring the importance of technology?

Here is the point of the story: the general apathy of small business owners in regards to their IT and technology infrastructure is rampant and dangerous. They have a responsibility to their company to ensure that their employees can do their jobs effectively on a daily basis through the use of modern technology. They have a responsibility to build a technology infrastructure that will attract talent. They have a responsibility to invest in technology that will help increase profitable revenue. They have a responsibility to keep the bones of their company strong. 

All that being said, their biggest responsibility in regards to technology is to recognize that they have a problem and bring on a resource that will pull them out of the cloud of technology apathy. The first step is to prioritize the process of bringing on a resource that will accomplish these four business functions:

  • Inform them about modern technology
  • Strategize about how specific technology will help them achieve their business goals
  • Prioritize and implement the technology investments to maximize ROI
  • Perform ongoing management on their technology infrastructure

Upward Technology has developed a tangible, transparent process to help you achieve these essential enterprise level business functions at a fraction of the perceived cost.  Reach out to us today for a complimentary consultation to help begin the process of being informed about technology rather than ignoring it.

September 15, 2017

No Comments

Our key takeaways from the massive Equifax breach

Most of you have probably seen the recent headlines that the credit reporting agency Equifax had a massive breach earlier this year, that was made public in the past few weeks and reportedly affects at least 143 million people. We believe that Equifax has done an atrocious job of handling this enormous catastrophe, providing little and wish-washy messaging, contradicting itself and offering unimpressive resources for those affected.

And while this event may have negative consequences for many of us, there are lessons to be learned.

Here is a rundown of the missteps made so far by Equifax, as reported on CNN Money:

  • Equifax waited six weeks before it announced its massive breach that compromised the data of 143 million Americans.
  • Three Equifax executives sold shares days after the company found out about the hack.
  • Equifax chose not to notify people who were affected; instead it set up a website.
  • The website wasn’t ready for days. People who entered their information were told to come back later.
  • Equifax offered free credit monitoring, but it initially required enrollees to waive their right to sue the company.
  • It later backtracked, allowing people to sue — if they send Equifax written notice within 30 days. Equifax has not removed the opt-out language from its general terms of service, but later assured customers that it won’t be applied to use of the credit-monitoring service.
  • A customer service representative tweeted “Happy Friday!” from the ‘Ask Equifax’ Twitter account last week.
  • Freezing credit is the best way for victims to protect themselves, but Equifax charges for freezes and has not made it easier to accomplish. On Monday, Equifax said in a tweet that “in response to consumer feedback, Equifax will waive all Security Freeze fees for the next 30 days.”
  • Equifax assigned easy-to-guess PINs to people who froze their credit.
  • CEO Rick Smith stayed mum until a USA Today op-ed on Tuesday.
  • Equifax has still failed to say how many people in the United Kingdom and Canada were affected.

You might read this list and shake your head, asking how a huge company with armies of resources might have struggled so much with steps that seem like common sense? The answer is simple, they didn’t have a clearly defined plan before it happened.

In situations like this, the variables are overwhelming:

  • How do we know when we know enough to make this public?
  • What customers do we tell?
  • How do we handle PR, Legal, IT?
  • Who will handle PR, Legal, IT?

These are tough questions, but there are some questions you can have answers for prior to the event:

  1. Decide who in your business will be first chair, second chair in an event.
  2. Decide what money you would be willing to spend? This doesn’t mean you have to spend it, nor does it mean that is all you might spend in the heat of battle, but it ensures that you have decided what you are prepared to part with.
  3. Buy an insurance policy. Consult a professional who has expertise in the data breaches and make sure you have a policy that appropriately covers your risk profile.

While we don’t believe the risks to any of our customers who were affected will spill over to their professional lives, there is the possibility that the information that was hacked could be used to infiltrate users personal accounts, which could in turn compromise work systems if passwords are shared. Please use the following link to verify if you may have been compromised. We encourage you to check the following link: https://www.equifaxsecurity2017.com/potential-impact/

If you find your name, please attempt to verify if the password you use for Equifax may be similar or identical to the password used for any other systems and change them immediately. Changing key passwords is a good precautionary measure any time you have concerns.

Looking for a technology solution to this problem? Upward has several different options that can make your work environment significantly safer from security threats. Contact us today!


September 1, 2017

No Comments

We are now a Certified B Corporation!

After two years of working hard to meet the rigorous requirements of this great movement, we are proud to announce Upward Technology is the 1st B Corp in our industry in the great Northwest!

What does it mean to be B Certified? Certified B Corporations meet higher standards of social and environmental performance, transparency, and accountability. B Corporations are leaders of the global movement of people using business as a force for good.TM 

Unlike traditional corporations, Certified B Corporations are legally required to consider the impact of their decisions not only on their shareholders, but also on their stakeholders (e.g., workers, suppliers, community, consumers, and the environment).   

We really believe it’s the way business should be run these days and we’re happy to be leaders in our field. We hope more businesses will join us in this movement. Please let us know if you’d like hear more about our experience and how we did it!

Big Ups to SOLVE

We highlighted our work with SOLVE of Oregon in our application. A big contributor to our success! Pictured is our group volunteering for their annual litter cleanup!

Learn more about their great organization »

Thanks to Sparky!

Another win for us was the amount we were able to decrease our emissions thanks to our excellent electric vehicle (nicknamed Sparky). We use it for almost 95% of our clients visits at this point


August 29, 2017

No Comments

Never Miss a Post! Follow us on Social Media!

At Upward we’re constantly trying to make sure our customers and affiliates have the best information at their fingertips. This means that when it comes to an important alert about a major ransomware scam, or news of a hot new technology that we’re excited about, we try to reach as many of our clients as possible.

Which means we’re consistently posting important tips, alerts, and thought provoking content to Twitter, Facebook, and LinkedIn!

Make sure you don’t miss a thing and follow us today. Social Media is one of the best ways for Upward to get you all national, international, and hyper-local technology news!

We’re on Facebook



And LinkedIn


And feel free to share info, ask questions, and comment. We’d love to interact with you more about all things tech!

August 9, 2017

No Comments

3 Reasons why you should fire your IT Support guy

For most small to mid-size businesses the question of whether your should stick to your in-house tech support employee or outsource your IT Management come up frequently. While the convenience and perceived safety of your in-house tech person is pretty obvious, what is not are the reasons why you should fire your IT Support guy…

This blog is not going to make me popular with IT Managers. However, it will define a more and more common reality for small to midsize companies with less than 150 employees. In companies of that size, there are numerous factors that make the full-time IT employee or 2-3 person department, less effective or even counter-productive to the strategic plans of the organization. But having an IT guy in-house is comforting, convenient and predictable, so why fire your IT guy? 3 big reasons:

  1. Expertise

Information Technology is dense, complex and very dynamic. Much like medical professionals, very smart individuals spend their entire careers on a single discipline (like security or networking) and still only cover a fraction of the whole topic. Companies who think “an IT guy is an IT guy” are dead wrong. The reality is, if you want an expert generalist, you may get most of the way there, but will be flat footed on anything requiring specific depth. For instance, your company is affected with a malware outbreak. Your IT person may be equipped to do the very basics like run scans or check firewall settings, but after that he or she will likely be Googling protocols for the next step, and deciding the correct path forward in a vacuum. There are simply not enough hours in the day to be excellent (or perhaps even decent) across the entire IT spectrum.

  1. Accountability

The fact of the matter is, IT is murky to most people. As a business owner or manager, you really don’t know if your IT guy or small support department is doing a good job in all facets of the position (system architecture, stability, risk management & security, strategy, training etc). IT is as important a function as accounting, payroll or sales, but can be more difficult to manage. Even with a team of three very smart IT people, how do you evaluate if the department is managed well? How do you fairly compensate for performance? What are the benchmarks you measure the department against? Do you call in an expensive independent auditor and destroy valuable tryst? You will likely not be able to come up with good, sustainable answers and will have to put too much blind-faith into the systems that make or break your business.

  1. Strategy

The most common place we see the single or small team of IT professionals fall the shortest is in long-term planning. Most engineers are very good at executing on complex tasks, but few are able to translate business goals of a company into a long-term strategic plan. Part of this challenge derives from the inherent and almost unavoidable bias internal IT guy has against pushing boundaries and taking risks. Why? Because there is never time for a tiny tech support department to do adequate R&D for new projects (if they have a life). And the downside of experimenting with a new solution and risking making an expensive, embarrassing or disruptive mistake is too great. As it becomes evident that this department is not strategically consistent with the overall direction of the company, the value of the department will slowly diminish and wither and your investment into technology will flat-line.


Statistically, the era of the solo IT practitioner, in-house or outsourced, is dwindling. IT is too complex for the “expert generalist”, and clients are beginning to understand that just because somebody knows computers, doesn’t make them the right fit to strategically guide a growing company.

As a managed service provider in Portland, we behave and utilize systems similar to an Enterprise IT department. We have depth in our bench, numerous certifications and areas of expertise, metrics, a robust R&D department, best-of-class management systems, decades of combined experience, strong strategy mapping processes, and we never take a sick day.

Call Upward today to evaluate a better way to manage your technology.

Subscribe to our blog/newsletter    Contact Us


August 4, 2017

No Comments

8 Tips to help you prevent a phishing scam

Are you worried about the influx of phishing scams and ransomware attempts that are being made these days? Here are 8 things you can do to prevent yourself from getting spoofed!

We are seeing it more and more everyday. In fact, there was a two week period this summer where we heard daily from our clients about potential phishing scams going around. Some were even over the phone! Spear-phishing is seemingly on an uptick with more and more regular attempts being made by cyber-criminals attempting to get your information and extort you. But there’s hope! You don’t have to become a victim! There are some pretty simple ways to spot these kinds of attempts and to take action to make sure your data and your identity is safe online. Here are 8 great tips to prevent a phishing scam from getting your information and your money:

  1. Pay attention to the email address, not the display name.

When you get the first initial contact from a scammer they will usually try and impersonate someone in your organization. Basically, they do this so you’ll see the display name as either someone you know and trust or from a vendor you work with. But don’t be fooled by that! Make sure you are looking at email addresses too. John.Barker5674@bogusdomain.com looks a lot more fishy than John.Barker@youractualdomain.com  doesn’t it? This is a first big sign that someone is attempting to phish you.

2. Peek at links in the email, but don’t click on them.

If you are getting an email with links and you’re not sure if they are legit, hover your mouse over them and you should see a preview of the URL. If it looks messy and is essentially gibberish that is a pretty sure-fire sign that it’s bogus and pointing you to a ransomware site. Don’t click on it. And a general rule of thumb: if the email looks unsolicited then do not click on anything within it.

3. Don’t give up your info.

Any vendor, partner, bank, or supplier you work with already has all the info they need from you. If they need to “confirm your credit card information” they are not going to try and get that done via email. They are going to call you or your accountant directly.

4. Check for spelling and grammar.

Spelling and grammar can say a lot about the legitimacy of an email. If it seems as though the sender doesn’t have a good grip on your common language or has misspelled words or phrases then you can bet they are not a legitimate source.

5. Take a hard look at the signature.

Not much info there? No phone numbers, logos, or sign-offs? Lack of details about who the signer of the email is points to phishing.

6. Don’t click or download attachments.

Attachments from senders you don’t recognize could contain viruses and malware that are meant to steal your passwords, your valuable information, and also leave your computer unusable.

7. Beware “urgent” language in the subject line.

How often do you actually get an email from a colleague, customer, or vendor that involves an urgent call to action in the subject line? This is a way for the phisher to illicit an emotional reaction from you so that you’ll act without fully diagnosing the phishing attempt. Beware of this tactic!

8. Don’t be fooled by common logos and branding.

In this digital age anyone can download an image of Microsoft’s logo and pretend to be a support rep that needs your financial info so that your Office 365 subscription isn’t cancelled. Make sure you are taking a good look at this kind of phishing attempt. If you’re a client of ours, you shouldn’t be seeing anything regarding your technology contracts that doesn’t come through us first! And again, if someone needs to update your billing info, they’ll do that with a phone call.

So there you have it: 8 easy tips to help prevent yourself from getting scammed via email phishing attempts. Want to know more about this topic or talk to an IT provider who makes it their everyday job to protect each and everyone of our clients? Then contact Upward today!

Subscribe to our blog/newsletter    Contact Us


July 28, 2017

No Comments

The 2 Indispensable Steps to Better Cyber-Security

There are 2 indispensable cyber-security steps that are available to you and you can take them today!

I had a recent discussion with my friend who is the Chief Technology Officer for a 500 person prescription management company about the new age of cyber security. One inevitable conclusion he pointed out is that clever Cyber-criminals will forever be formulating new strategies to surprise their intended victims, making it fallible (at the present) to rely on technology alone to protect your business from malicious threats. There are common-sense technologies that should be in place such as Enterprise-class anti-virus & anti-malware,  or a firewall that filters traffic and spam. If you work with Upward, you can rest assured that these are actively managed by default. But even with these measures in place, you cannot expect to be safe without an educated and savvy workforce. The bad news about cyber-security: it’s not a matter of if your business will face an event, but when your business will face the event. The good news: You can take some of the most effective steps towards protecting your business right now and with a small investment of time. The following are 2 indispensable cyber-security steps you can take today, with little to no investment:

Training for Users

Take time in an upcoming staff meeting to have an open-forum discussion with every staff member about the types of cyber-security risks that exist out there: spear phishing, ransomware and malware, etc. and the ways those threat vectors are introduced and appear in your environment.

If you don’t know how to facilitate this discussion, invite your IT provider to lead the meeting. This is perhaps the most meaningful information you can give your people to help protect your company. It is their common-sense vigilance that is your best line of defense against cyber-crime.

Policy for Disaster Response

You can prevent disaster to your heart’s content, but it will still be “when” not “if”. So the question becomes, what will you do if something bad happens? This is the simple question that should be thoughtfully considered, reviewed, documented and trained to. After malware is discovered and reported by your staff, and you determine that client data was compromised, will you call your clients to let them know something bad happened, or not tell them at all? Will you call in an outside forensics company, a PR company, a cyber-response firm? When will you make an insurance claim? This “who, what where, when, why” are critical questions. The ramifications if you get them wrong can be a PR nightmare, a devastating lost trust or even a lawsuit.

Just as with training, there is a huge amount of free information available online and your IT resources should be able to facilitate the creation of a clear plan that you can document and train your people to adhere to. If you need to talk more about how you can help you and your staff be better prepared when it comes to risks in cyber-security contact Upward Technology today!

Subscribe to our blog/newsletter    Contact Us

July 20, 2017

No Comments

The Three Philosophies of Information Technology Investment

There are a few schools of thought when it comes to how you spend your money on IT as a business owner. While it is becoming more and more apparent that spending on technology is a necessity for any business to survive, it’s how you spend it that ultimately matters. Here are the three philosophies of information technology investment, and what they mean for the future of your business.

The way a business manages technology has broad reaching implications for how their business will thrive. Technological investment is one of the few avenues where a business can inexpensively and measurably enable their employees to get more done in a day. Yet we see so many companies, most companies even, falling victim to the wrong mentality about how technology is managed and nurtured. We have outlined three philosophical categories that most business owners fall into, and what they mean for the future of your business.

Depreciating Asset-  You have a reactive approach to your investment in technology.  You strive to spend as little as needed in your infrastructure with a hope that these costly and completely discrete investments will get you by for as long as possible.  Your company’s infrastructure and productivity gradually erode as you continue to invest the same amount of money each year into your technology with no idea how to make things better.  Technology projects are continuously put on hold because management does not have the bandwidth to manage them AND the day to day operations to drive revenue.  You sit back and watch as stacks of clutter build up around you with no plan on how to dig yourself out of the technological hole you’ve created. 

These companies inevitably get pushed out of business because all they have focused on is surviving and they cannot compete with even the simplest of competitors that have figured out how to maintain their technology so it does not damage their overall productivity.  This behavior is the equivalent of going to your financial advisor and expecting a LOSS.  Not only expecting a loss but making it a goal NOT to make money on your investment. 

Cost Center-  You view your IT department as a cost center.  You are willing to make investments in technology as long as the direct result is that employees can do their work (without consideration to productivity) and that you are not at any major security risk.  While this seems to make sense, you have no real idea how these discrete investments are negatively affecting your overall infrastructure.  The reality of the situation is that you are continuing to dump money into your IT infrastructure, but only to PREVENT a loss in production or a major catastrophe with no real thought going to how you can improve your systems in order to drive company goals.  While you are not going to lose to the depreciating asset company, you are still fighting for scraps at the table with no real potential of ever truly competing outside of your current customer base.  This is the equivalent of going to your financial advisor and giving them your money and telling them that your goal is to cover the cost of inflation and fees and that is it. 

Appreciating Investment-  You have made the decision that you want your technology to help drive business.  You have a team in place that has provided you with a competitive advantage in the marketplace. The competitive advantage is that this team is efficient enough at performing the functions of your IT department (day to day support, security, stabilization) that it can help you focus on the revenue generating aspects of your business. They provide vital data about your technology to help drive better decision making and help prioritize the projects that will have the most impact across the company.  They have instituted a Project Management System that sets clear, tangible deliverables for each project and can be monitored by all stakeholders as projects move through each stage of the process.  If you can partner with the correct team and this relationship functions appropriately, you will knowingly be investing in your IT infrastructure in the exact way you intended, ultimately optimizing the productivity and profitability of your system.

These are the companies that grow.  These are the people that find the financial advisors that best suit their needs and risk tolerances, and ultimately appreciate their wealth.  These are the business owners that can effectively run a company with the focus of creating value in what they have and scaling that value to grow and succeed.

Which one of these business owners are you?  If you are a depreciating or cost-center owner, how do you begin the process of moving in the other direction?  These are challenges that every business owner faces every single day.  The first step towards moving in the right direction is seeking out a partner that understands the issues and can help create a path forward in an intelligent, informed and processed manner. And that’s Upward Technology. Contact us today!

Subscribe to our blog/newsletter    Contact Us

June 30, 2017

No Comments

Why you should be on Windows 10 if you’re not already…

The very top reason to be on the latest Windows Operating System is security. But there is a lot more to be gained as well. Here’s why you should be on Windows 10 if you’re not already…

We’ve been posting a lot about ransomware and cyber-crime lately. Specifically the two recent cases with #WannaCry and #NotPetya. And one of the biggest takeaways we’ve gained is that out dated operating systems are what are being targeted and should be upgraded asap.

We have a bias for being non-alarmist, but these events have concerned us a great deal as your trusted IT partner, and we want to alert you to new and critical risks you are facing. WannaCry and NotPetya targeted specific technologies in Windows XP, 7, and 8. This technology is no longer used in Windows 10. Windows 7 is now the oldest and least secure Windows Operating System. It was released on July 22, 2009. Mainstream support for it is already over as of January of 2015 and it’s currently in extended support. As a point of comparison, XP was released in 2001, and ended in 2014. Windows 7 is very nearly the same age as XP, and there was a security crisis when Microsoft eventually cutoff support for XP.

So given all of this, it is highly recommended you get all of your outdated workstations up to date and/or replaced asap. But it’s not just about cyber threats, there are other aspects to Windows 10 that make it a vital current operating system:

  • Not only is it much more secure, it also gets all the new engineering updates much more quickly than 7. So your system works better, and updates are easier to manage.
  • Fast, fast, fast – it is 50% faster than Windows 7 for common tasks like restarting, opening applications, and browsing the web.
  • It comes with the Microsoft Edge web browser standard.
    • According to Forbes (and researchers NSS labs) Edge is the top browser for security – “[The] best browser available when it comes to protecting Windows 10 users from phishing attempts and social engineering attacks”.
    • Edge is lightweight and much faster than anything else on the market, due to being totally integrated with the operating system.
    • It has an available touch interface and Cortana support. Essentially Microsoft’s way of competing with Apple and Google’s touch and voice command technologies, and they are surprisingly competitive.
  • It comes with an improved Secure Boot (UEFI)
    • Microsoft’s Secure Boot was introduced with Windows 8, and has been improved with the release of Windows 10. It has replaced traditional BIOS, and helps secure against Malware attacks and infection. And it improves computer wake up and log in time.
  • Windows 10 will save you space. Not only is the OS a smaller installation size, but it also incorporates a more efficient compression algorithm, meaning your files will be smaller so you’ll be able to store more and your hard drive won’t slow down as fast.

Also, looking ahead: Microsoft has let it be known that in order for your network environment to be compatible with Azure (their new cloud based server platform) all of your workstations have to be on Windows 10. Food for thought.

Our plan at Upward is to let you know how many Windows 7 machines you have in your company and work out a plan to upgrade or replace them. But please don’t hesitate to let us know if you want to get the upgrade process going RIGHT NOW! We believe that time is of the essence, as the exploitable risk factors are globally understood.

Subscribe to our blog/newsletter    Contact Us