Driving Productivity With ShareSync

Let’s face it: file servers have often been thought of as a necessary evil, not necessarily a gratifying experience that has allowed for collaboration and seamless access to data.

And they sometimes make it challenging to share information with users outside of your company, and even more difficult to access files behind a VPN (Virtual Private Network) or Firewall. File servers are low-agility; you get no uptime guarantees, and file servers aren’t made for a mobile workforce.

Sharing files outside your business is complicated, and collaboration on files can get messy… fast. Can you collaborate with two or more people? Can you view file version history? Or perhaps prevent file overwrites?

Introducing ShareSync

ShareSync is an integrated file sync and share service that offers simplicity and mobility without risking control or protection.

How would you like to sync all of your files across every device instantly? What about sharing files inside and outside the company?

  • Audit log and remote wipe capabilities.
  • Encryption for data-in-transit and at-rest.
  • Keep files secure and protected.
  • Centralized administration.
  • One bill, one control panel, one source of support.

With ShareSync, all of this and more is possible.

Sync across virtually every device

Every file change automatically syncs to all ShareSync devices. Syncing happens automatically, behind the scenes, the moment a file modification occurs. It also offers desktop and mobile access to content on any device. ShareSync apps are available for Mac, Windows, iPhone, iPad, Android, BlackBerry. Content also accessible through any web browser.

  • Syncing happens automatically the moment a file modification occurs.
  • Offline work on PC’s is synced when a user comes back online.
  • ShareSync apps available for IPhone, IPad, Android, Blackberry, and Windows Phone.
  • Content also accessible through any modern web browser.

Share with recipients both inside and outside the company

ShareSync leverages your customers’ corporate address books for easy sharing. Recipients can access content, even if they don’t have ShareSync installed. Users can set sharing permissions to control access privileges, and change them at any time. Sub-folders can also be shared with different permissions than parent folders. Windows plugins integrate ShareSync functionality directly into Outlook and Office.

  • Intuitive sharing interface is integrated with your corporate address book.
  • Users can set sharing permissions.
  • Sub-folders can be shared with different permissions than parent folders.
  • Quick group sharing with exchange distribution lists.
  • Files can be shared via weblink to any recipient, even if they don’t have ShareSync installed.
  • Co-edit and share directly from Outlook and Office with easy-to-enable Windows plugins.

Keep content secure and protected

Data is encrypted at rest and in-transit, with an additional account-specific unique security key. Content protection features a guard against accidental deletion or version conflict. Permissions and access are also strictly controlled and easily amended at any time. ShareSync data on lost or stolen devices can be wiped remotely. An audit log lets you track all account-wide ShareSync events, and reliability is assured with a 99.999% financially backed SLA.

  • An account-specific unique security key provides additional data protection.
  • Sharing permissions and access are strictly controlled and easily amended at any time.
  • Remotely wipe ShareSync data on lost or stolen devices.
  • An Audit log keeps track of the ShareSync activity on your account.

Additional Security Features:

The security features make ShareSync a highly-secure, highly-reliable, business-grade file sync and share service. From locking features that help prevent overwrites and deletions to co-editing, ShareSync keeps your data safe and secure.

  • Locking features help prevent overwrites, conflicts or deletions.
  • Users can track file inconsistencies to particular users and file versions.
  • File versions are recoverable, including deleted files.
  • Disabled and deleted user data is retained for administrator access.
  • co-editing and locking features help prevent overwrites, conflicts or deletions.

Recovery made easy

Gartner, Inc. says that a laptop is stolen every 53 seconds in the United States. Sandisk states that at least one USB thumb drive with data is lost at work every month. Google Labs reports that every week, 140,000 hard drive crashes will happen in the United States.

Files backed up to ShareSync can be easily restored across your devices. Admins can view content structure to add, delete and restore files. Administrators can also remotely wipe ShareSync data from any device for those worst case scenarios, especially for those companies with the most sensitive data.

Keep your IT simple

With Sharesync, you can keep your IT simple and safe. You don’t need to maintain hardware. There is no VPN required. It is simple to deploy, manage, and use. ShareSync provides data security you can count on and makes online file sharing a breeze. Whether you are sharing one file, or an entire folder with hundreds of files, a few clicks are all it takes.



The Typo That Can Get You Hacked

You need to go to Marriott’s site to book a room for your vacation. You are trying to relax and watch your favorite show on Netflix. You are starving and want to order a pizza online from Papa Johns. How many times a day do you try to type in a website’s address and mess it up? If you are on a computer as much as we are, it’s at least a few times a day. A new type of malware is preying on those typo mistakes.

Typosquatters are exploiting the top-level domain for Middle Eastern country Oman (.om). These criminals have registered more than 300 domain names with .om suffix impacting U.S. companies and services such as Netflix, Marriott, Papa Johns, Macy’s, and Gmail.

What is Typosquatting?

Typosquatting is a well-known security problem. The culprits target one or more well-known websites and brands. They register domains similar to the legitimate domain.  Techniques often include doubling characters like “googgle.com”. Some other examples have used adjacent keys, and letter swapping like “googel.com”. This new version using the .om suffix is a bit trickier and more malicious.

How does it work?

The criminals are hoping a significant number of users mistype the intended domain, and then they redirect you to a different site with multiple pop-up ads. One of these pop-up ads usually asks you to update your Flash player. If you make the mistake of downloading this “update”, a malware virus will be installed on your computer. With this installed, any number of problems can arise. From the malware harvesting your login information, to installing ransomware that locks your entire computer up.

Who is targeted?

While this is a problem that everyone is facing, Mac OS X users are being singled out. This new type of typosquatting campaign is targeting Mac users with a fake Adobe Flash update. This fake update will pop-up and attempt to trick users into installing the advertising component Genieo.

Genieo changes the behavior of your browsers. It allows custom searches and targeted advertising to be presented on a home page, managed through a browser extension. It also tracks what you do and guides your searches and activity to relevant commercial sites and deals.

How do I prevent it?

Malware schemes like typosquatting are becoming more and more common. These attempts to obtain your personal information or do worse acts is troubling. Beginning with the basics like double checking your spelling is always the first step. If you do make a mistake, don’t click on links in unsolicited pop-ups or emails. And as we always recommend, keep your software updated.

Security issues like typosquatting have broad implications for many businesses. Not only could your personal computer be at risk, but also your company name. The vast majority of .om registered domains are malicious. These sites are receiving large amounts of visitors and should be taken seriously. Many popular sites remain unregistered and are still vulnerable.

To learn more about stopping security issues like typosquatters, please contact one of our approachable IT geniuses today for more information.

Prevent Ransomware Before it’s too Late

Your definition of ransom may need some updating. No longer does ransom just refer to criminals and kidnapping. It’s not just people requesting money for their safe return. Ransom in 2016 is all about your computer.

Ransomware is the combination of the word ransom and software. It is a type of malware or bad software. Once ransomware gets on your computer, usually through an infected email attachment, it will lock your computer or data in some way and demand payment to get your data back to you.

What started as a basic scam has recently escalated. Extorting small amounts of ransom from unsuspecting victims isn’t the only goal now. Last year there was a “reported loss of more than $24 million as a result of ransomware attacks.” The FBI has stated that this is an underrepresented figure, due to people’s reluctance to report such crimes.

With this new age of ransom comes much more precise and a sometimes “customer friendly” extortion. The culprits will give you easy to follow step-by-step instructions on how to pay them. Some even offer discounts for early payment. The sophistication level of these criminals is high. That is part of the problem when trying to stop them.

This issue took on new urgency when a hospital in Los Angeles had its entire computer network seized by ransomware. The hospital couldn’t reach any of its digital medical records. The hackers demanded a ransom before they’d release the computers. This hospital ended up paying $17,000 in Bitcoin to get their systems and data back. Attacks like these are becoming more and more common.

Popular Forms of Ransomware

SMS Ransomware locks your computer and displays a ransom message with a code. To unlock your computer, they give you instructions to send the code via text message to an SMS number. They then give you the corresponding code to unlock it.

Winlocker is a variant of ransomware that also locks your computer. It displays a more intimidating ransom message, though. It appears to be from your local law enforcement agency. Unlike SMS ransomware, Winlocker instructs you to pay through an online payment system.

File Encryptors can lock your personal files and folders. This type of ransomware uses sophisticated encryption algorithms to make your computers data unusable. It then demands that you pay for the decryption key using an online payment method like Bitcoin. The ransomware often leaves a file on the victim’s machines with payment instructions. Sometimes even the customer’s service instructions mentioned above.

MRB Ransomware goes one step farther than the other three types mentioned. MBR can change your computer’s Master Boot Record. It interrupts the normal boot process. The MBR is a partition on your computer’s hard drive that allows the operating system to load and boot. When infected with MBR, you receive a ransom message as soon as the computer is turned on.

How does it spread?

Ransomware can infect your computer in the same ways as most other malware. Two of the most common ways are downloads and exploiting program vulnerability. All it takes are for you to visit a malicious or compromised website. Click on the wrong advertisement or link, or open a malicious attachment for the ransomware to gain access.

Tips for prevention and recovery

Having a cybersecurity plan is a must to protect not only your data but your wallet. You need a 360-degree approach to your security. This entails a managing security and firewalls with a solid backup plan that focuses on end-user training.

Backup and test.

To protect yourself from various risks, including ransomware, you will need a good backup strategy. This strategy must include monitoring backup status and testing of the restore process. This ensures that restored files are usable. A backup process without testing may not be worth much.

Perform software updates.

Ransomware loves vulnerable, outdated systems. It makes use of vulnerabilities in Windows, OS X, and other software to infect your systems. Making sure your software is up to date could be the difference in stopping ransomware.

Who uses your PC’s?

Restrict the use of each PC to only authorized people. In an office environment, keep them locked down to essential personnel. At home, avoid letting your kids use any PC with work-related data.

When the worst happens.

If you do find yourself infected with ransomware, without a backup, you may be forced to pay the ransom. We don’t like saying that, but if the value of your data is sufficient, you may want to pay. Even the FBI has stated that this may be the best course of action in some cases.

Ransomware attacks are a hostage situation, so organizations need to handle the threats accordingly. Responding without a plan if your data is compromised isn’t an optimal solution. These threats are one of the grave outcomes, even if you manage to get your data unlocked. Trying to negotiate with the criminals doesn’t always pay off either. You are dealing with criminals in the end, and they could always take your money and still not give your data back.

Having the proper tools installed, a secure backup, and the education provided you could help prevent ransomware. The best cure is always prevention. With infected computers, you have limited options. It can cost you or your company thousands of dollars to get your systems back to normal. Knowing how to stop ransomware before infection is key.

To get more information on putting a backup system in place or to obtain information about your current IT infrastructure, talk to one of our IT geniuses today.


schedule IT consultation

IT security mistakes you don’t want to make

Keeping your data safe and secure has become a huge priority for companies in 2016. Despite the rising costs of cyber attacks, businesses are still not understanding the risks. They are still not getting the basics right. Any business, regardless of size, should be implementing IT security. The mistakes below could cost you money and hurt your reputation with your customers if you aren’t careful.

The fact is most companies lack the knowledge and manpower to combat the rising needs of cyber security. To help with this, more and more companies are turning to managed security services. You want managed security that makes your network secure from the inside out.

To keep you up to date here, are the top IT mistakes we see companies making on a regular basis.

Relying on Security Monitoring Software

Companies want to rely on established security practices. Installing anti-virus software and operating system updates are certainly understandable. Who wants to invest time, effort, or money in new security efforts? The problem is these efforts rarely increase efficiency or add measurable value to you or your clients. As the internet has evolved and so many aspects of our daily lives take place online, anti-virus software hasn’t been able to keep pace with the threats of 2016. Relying on a single source for your security is a mistake we see too often.

Handling IT Security Without a Pro

Implementing a growing number of technology solutions in your organization can be taxing and not cost effective. Technology continues to progress and evolve. It seems that security measures are lagging behind and struggling to match technology’s pace. Solutions like outsourcing your IT are becoming more and more popular to try and stay up to date with your company’s security. These IT professionals are focused on staying up to date with the latest threats to your system, and knowing the best ways to prevent them.

Lack of Encryption

Lack of encryption brings more trouble than you want. You don’t want the bad publicity and lost business from customers who decide you can’t be trusted with their data after a breach. When you are running a business and have a strict budget, an IT security disaster is the last thing you want. This all could be avoided by spending a fraction of those costs on basic program encryption for all your company computers.

User-Owned Mobile Devices

In 2016, employees want to use their own phones and mobile devices to access their work. With working remotely becoming more popular, this has become a major issue in IT security. The solution is only let your employees have a “sandbox” of data that they can access through usernames and passwords. A strong two-factor authentication process is available as well. If the mobile device is lost or stolen, your data would remain on your network, and not the device, reducing the risk of lost or breached data.

Thinking You Are Above Security

We often see members of management who feel exempt from the security system. That may come from thinking they are too busy and thinking they are safe from any problems. These employees are the same ones who have high access and permissions, which makes them high-value targets for hackers. IT security comes from the top down. These managers and administrators should follow the same security process that the rest of the employee’s follow.

For more information about your IT network, contact one of our approachable geniuses to schedule a consultation today.

schedule IT consultation

Business Applications That Realize Your Potential

Brit Morin, CEO, and co-founder of Brit+Co, formerly worked at Google and has recently written a book. Saying she is busy is an understatement. When you run a business like Brit Morin you know a thing or two about being crazy busy. If you want something done, ask a busy person to do it. The more things you do, the more you can do.
One of the ways Brit Morin does this is by using business apps like Trello. Brit says this about her experience using the app. “ Organization is also crucial. That’s why Trello is an essential tool. I can throw out the post-it notes and put my plan all in one clutter-free place. Trello helps me to also be transparent with my goals since my boards are easily shareable which holds me accountable”.

When you run a business, small or large, you’re pulled in several directions daily. Being overwhelmed everyday is bad for every area of your life. There is an app out there to help with your specific problem guaranteed. Whether you need a to-do list or project management you are covered.

Which small business apps are best? That will depend on your business and your own preferences. We know you don’t want to to go out and find the apps you need, so we pulled together some of our favorites.

Trello has everything you need to organize projects of any size. Trello’s main strength is that it’s highly visual: On any given board, you can create several lists, and move cards between them. You can attach files, create checklists, and assign members to each card so they’re updated as the status of the article changes. Team members can chat directly on each card, too.

With Evernote, you can clip pieces of information from the web, tag them for easy searching, and alter any of them by adding to it, condensing it, or embedding pictures, tables, audio, video, and the like. You can also use Evernote for organic notes and journaling, to-do lists, recipes, contacts, and even storage for tweets or emails that you want to keep handy.

You go to a conference, you get about 40 business cards, and, well, maybe you remember to go through each and add their details to your contacts. Or you fire up CamCard, snap a picture, and have its text quickly transcribed and entered into your contacts.

When you’re billing clients by time, accurate tracking is a must. Harvest is a Web app that aims to make it easy to track time for many clients, multiple projects, and several rates. It also includes invoicing features and lets you produce professional-looking estimates for prospective clients and objects.

A project management and to-do list app for productivity. Todoist separates your lists into projects and then tasks, which can be added on the website and accessed by their app. You can even add subtasks for an extra layer of detail.

The internet and technology are the great equalizers. You can be more productive without hiring the staff you needed previously. Not only will you better manage your time by using these time-saving resources, you will also save your money. When your business is organized and efficient it lets you be creative, productive, and realize your true potential.


schedule IT consultation

Why you should take the LEAP and outsource your IT

Some 17,000 planes were grounded at Los Angeles International Airport due to a software problem. The problem that hit systems of the United States Customs and Border Protection (USCBP) agency was a simple one, caused by a piece of lowly and inexpensive equipment.

The device in question was a network card that, instead of shutting down as perhaps it should have, persisted in sending the incorrect data across the network. The data then spread out until it hit the entire network at the USCBP and brought it to a standstill. Nobody could be authorized to leave or enter the US through the airport for eight hours. Passengers were not impressed.

Stories like these are far too common, whether your business is running an airport, bakery or plumbing company. In today’s business world there is no denying that technology plays an important role in your success. Unfortunately, as we grow more dependent on technology, IT failures can have a catastrophic impact on your business. Outsourcing the care of your IT is less like putting out fires, and more like preventing them before they spark.

What did you do the last time your server crashed or network failed? You probably called tech support and sat on the phone for an hour. When that didn’t work, you called a technician to come out to your site to fix the problem hours later. All these steps took away valuable time, and we all know that time is money. Outsourcing your IT keeps your systems running smoothly and let’s you focus on what matters most, growing your business.

Controlling IT costs.
When you outsource your IT you pay a low fixed monthly cost that you can easily budget for, instead of dealing with the headache of expensive and unpredictable billing. On top of that, hiring and training an IT staff is very expensive. Your wallet will thank you later for outsourcing your IT.

Focusing on what matters.
Whether your business is in law, construction or medicine, IT problem-solving is not your company’s strong suit. And not the most efficient way to use your time. Businesses have limited resources and every manager has limited time and attention. From management to HR, outsourcing can help your business stay efficient and on task.

Keeping current with technology.
You want a company focused on one field of expertise that will keep your wi-fi fast and your servers running smoothly. Professional IT companies spend large amounts of time and money to ensure they are up-to-date on all the latest technical knowledge so you don’t have to. They do so by using tried-and-true ways and processes, documentation and more structured methods to solve all your IT problems before you even know you had one.

Minimizing Risk.
By taking responsibility for problems like hardware failures, database corruptions, software crashes, and virus intrusions, you are helping lower the risk for your business. Outsourcing also gives you the ability to quickly act and prevent downtime for your business. This is not always possible with a limited in-house solution.

Because of all the above benefits, your business can lower costs and focus on growth. Outsourcing your IT can prevent, and quickly respond to, serious issues that lead to failures and extended downtime. So never hit that refresh button with your fingers crossed again. Feel smart, empowered, and confident with your IT solution.


schedule IT consultation

The Pros and Cons of BYOD in the Workplace

Mobility is becoming an increased necessity in today’s workforce, with employers now allowing employees to use their own device at work instead of providing one for them. The BYOD (bring your own device) is a growing trend in business IT and while the BYOD movement provides a lot of benefits to both the employer and employee, there are some concerns that should be noted before taking the leap in either direction.

Pro: Shifting cost to the employee
A huge benefit to companies is that by allowing employees to use their own devices, they can shift the costs to the employee, many of which, are happy to do so. In some cases, the employer provides a small monthly reimbursement to cover part of the monthly service fee and the employee provides the phone and covers the remainder of the service charge. This could save the company roughly $50-80 per user, giving the company a healthier bottom line.

Pro: User satisfaction and enhanced productivity
There is nothing more frustrating to your workers than sticking them with a phone or laptop that isn’t their “brand”. If they are an avid Apple user and you give them a PC, chances are, frustration will set in when trying to learn a whole new device and shortcuts. And vice-versa. By allowing an employee to use their device of choice, both productivity and satisfaction soar.

Con: Acceptable usage terms
When an employee is using their personal device at work, it’s much harder for an employer to have control on how the device is used. Make sure that you have a clearly defined BYOD policy that states conditions on allowing employees to use their own device, especially when it comes to protecting confidential information, trade secrets and access to systems.

Con: Compliance and security issues
Many businesses today with a mobile workforce are also under strict compliance issues when it comes to data. HIPAA, PCI DSS and GLBA all have requirements that are related to information security and how data is protected. These rules still must be adhered to; regardless if the device is owned by an employee. This could be a potential mess for your IT department if policies are not in place on how to handle compliance and protecting valuable data. A good common practice is to have a security program installed on the phone or computer that can lock certain features or monitor access.

While BYOD policies are a sign of the times in technology, it doesn’t have to be difficult to implement if you can get ahead of the shift. Create clear policies if this will be offered by your business. By working closely with your IT department, a few simple methods can be put in place that can protect both personal and work data. Some of these methods include password and pin protections, downloading only from trusted websites, keeping anti-malware and software up-to-date, backing up data on a regular basis and having the ability to remotely wipe data from any device if it is lost or stolen. If you still have questions on your own BYOD, we’d love to help.


schedule IT consultation

The Case for a Strong Password (and why you should care!)

Let’s face it. Passwords can be annoying. They take time to create and with today’s standards of what makes a good password a strong password, they are also hard to remember. Who has time to come up with a good combination of uppercase and lowercase letters, numbers, and symbols to create that perfect password? But unfortunately for those that hate creating passwords, they are also the first line of defense when it comes to protection from cyber criminals.

Who wants to hack my accounts anyway?

If a hacker cracks your password, havoc will most likely ensue. This is especially important to understand for those of you who think you don’t store any sort of personal information or credit cards in your email or hard drive. All a hacker needs to create a huge mess for you are a few good pieces of information such as your birthday, a pet name, place of birth, and other little bits of information that you leave out in cyberspace. This information can be used to access your banking accounts, setup new credit cards or apply for a loan. All of which become even more vulnerable as we share more of that information on the social networks.

The Most Common Types of Passwords

Unfortunately, things that come second nature to most of us that are easy to remember are often the ones that make the worst passwords. Sequences of numbers and letters, sports and team names, anniversaries and dates, kids’ names, pet names, etc., are some of the most obvious passwords that are easily cracked. But the good news is that a strong password is easy to come up with a little bit of help.


  1. Do Not Share

A lot of people make the same mistakes when it comes passwords, and although this should be obvious, it needs repeating. Don’t share your password. Don’t write down your password or store it on your computer. It is temping to create a password file on your computer and store it, but this is the first place hackers will look. 

  1. Start with a Phrase

Phrases are a great way to start with a strong password. For example, you can take the phrase “I can’t believe the Denver Broncos won the Super Bowl in 2016!” and turn it into a strong password by using the first letter in every word, along with the numbers and symbol. With that example, the password would be: IcbtDBwtSBi2016!

  1. Use a Book Title or Favorite Song

If you have a favorite song or book, that’s another great start to a password. Let’s use a book title as our example in this instance. “The Old Man and the Sea” by Ernest Hemingway. Just simply replace the letters that can be substituted with numbers and symbols: Th30ldM@nandtheSe@. It’s important to understand that if you do go this route, avoid any easy pattern recognitions that hackers can easily figure out. Don’t replace all of the ‘a’ with ‘@’ symbols or all of the ‘e’ with ‘3’. Use variations to keep them guessing.

  1. Complexity Wins

The key to creating a password that will keeps hackers guessing is complexity. This is one time that it is completely appropriate to misspell words and space them out in a random order. Yes, it has to make sense to you and be something that you can remember, but just know that after typing it in a dozen times per day you’ll quickly store it in your memory bank.

  1. Use a Password Generator

Another option would be to use a password generator to automatically create a strong password for you. LastPass has a great password generator that you can use at no cost. Password generators are typically the most secure way to generate strong passwords. Microsoft offers its own online strength checker, and Mac users can use the built-in Password Assistant to check their passwords’ security.

The consequences of being hacked can be devastating, especially if you are a business and your customer’s data can be compromised. If you need numbers, here are some statistics by Statistic Brain.


Identity Theft / Fraud Statistics Data
Average number of U.S. identity fraud victims annually 12,157,400
Percent of U.S. households that reported some type of identity fraud 7.5 %
Average financial loss per identity theft incident $5,130
Total financial loss attributed to identity theft in 2014 $26,350,000,000


If you’d like more information, or would like to schedule a consultation on how LEAP Managed IT can help protect your business data, give us a call or click below to send us a message.


schedule IT consultation



Cut costs and increase ability when replacing File Servers with ShareSync

File Servers aren’t only costly, they also are hard to use, with limited mobility and collaboration support.

There’s a better option than File Servers for your business: ShareSync, cloud-based backup and file sharing. Compared to File Servers, ShareSync offloads hardware and electricity costs, slashes IT complexity and, most importantly, enables modern backup, collaboration and mobility. Learn more about how easy ShareSync is with our videos below.

Link to video:Team Sharing with ShareSync


Can ShareSync from LEAP Managed IT help?

There’s a better option than File Servers for your business: ShareSync, cloud-based file sync and share. Compared to File Servers, ShareSync offloads hardware and electricity costs, slashes IT complexity and, most importantly, enables modern collaboration and mobility.

Remember, not all file sync and share services are designed for business. Many of them have their roots in the consumer world. So when you consider file server alternatives, consider ShareSync by LEAP Managed IT: it’s designed specifically to give users the simplicity and mobility of the consumer-style tools combined with the control and protection that businesses need for secure collaboration and sharing.

With ShareSync, you get full mobile access to all your files for increased productivity. Your IT administrators get control over access to files and folders alone with at-rest and in-transit encryption for total security. And everyone in your business will stay productive.


5 reasons why costly File Servers are a relic of the past

Costs aren’t the only downside to File Servers. If you’re running a File Server, then you may be at risk. Here are five reasons why File Servers are costly and slow down your business:

  1. File Servers are high-cost and low-agility.
    File Servers are machines, and machines need maintenance and upgrades. This adds up to significant expense. And what happens when your company expands? That’s more money and more resources lost in building out more server space.
  1. You get no uptime guarantees.
    How much would it cost your business to be down for a day? How about for even 1 hour? According to VentureBeat, about 73% of businesses like yours have had some type of interruption in the past 5 years. Downtime means lost data and missed opportunities.
  1. File Servers aren’t made for a mobile workforce.
    Today’s mobile workforce needs immediate access to their data from anywhere, on any device. With a File Server, “mobile” means logging in to a VPN on a laptop or dealing with the hassle of configuring a mobile device connection. And even then, it might not work with all devices.
  1. Sharing files outside your business is complicated—if possible at all.
    In today’s business world, your business often needs to view or collaborate on files. But a File Server may not provide this capability. Even if it does, it’s hard to set up on the server side, to say nothing of the requirements on your user’s computer. Once again, there’s additional investment in time, money and energy.
  1. Collaborating on files gets messy. Fast.
    What happens when two people both need to work on a file? How do you prevent one person from overwriting the work of the other? With File Servers, you don’t have control over versioning and overwriting. It’s a chaotic mess and a drain on productivity.

Can ShareSync from LEAP Managed IT help?

There’s a better option than File Servers for your business: ShareSync, cloud-based file sync and share. Compared to File Servers, ShareSync offloads hardware and electricity costs, slashes IT complexity and, most importantly, enables modern collaboration and mobility.

Remember, not all file sync and share services are designed for business. Many of them have their roots in the consumer world. So when you consider file server alternatives, consider ShareSync by LEAP Managed IT:  it’s designed specifically to give users the simplicity and mobility of the consumer-style tools combined with the control and protection that businesses need for secure collaboration and sharing.

With ShareSync, you get full mobile access to all your files for increased productivity. Your IT administrators get control over access to files and folders alone with at-rest and in-transit encryption for total security. And everyone in your business will stay productive.

“New Standard” & Cost

For businesses deploying on-premises Exchange, adding additional services such as email archiving and email security can be expensive and costly. But meeting the “New Standard” doesn’t have to be expensive.

When deploying Exchange in the cloud, businesses can easily offload hardware and electricity costs, reduce IT complexity and increase overall security.  In fact, an average business with 10 employees can save over when deploying these services in the cloud.  And costs savings are just the beginning.

Hosted providers can also deliver:

  • Higher reliability. Moving your email to the cloud offers much greater reliability than a server in a closet. Some providers offer a 99.999% uptime service level agreement—meaning they’re promising less than 30 seconds of unplanned downtime a month.
  • Better security. A hosted email provider spends its resources on security measures to protect your data so that you don’t have to focus on security.  This includes cyber security measures that deter phishing attacks and other online threats, as well as physical security to protect hardware from theft or damage.
  • Lower legal costs and better intellectual property protection. In this day and age, it’s imperative that every email and every attachment is preserved and protected. This can significantly reduce the cost of eDiscovery in the event of litigation. In addition, it will safeguard the intellectual property contained in your email against loss, even if an employee decides to clean out all of their old emails.