Indianapolis Business Journal CFO of the Year

Indianapolis Business Journal CFO of the Year

LEAP Managed IT is a proud sponsor of the Indianapolis Business Journal CFO of the YEAR event! The event will take place at the Indianapolis Marriott (350 West Maryland Street, Indianapolis). The event starts at 8am on Thursday, the 9th of December.

Featured Speaker

Cynthia Lucchese
Chief Strategy Officer
Penske Entertainment

CFO of the Year Awards IBJ’s CFO of the Year honorees are impressive financial professionals who steer the fortunes of their companies and organizations.

We love recognizing talented individuals within our communities who make Indiana a better place to live and work. Interested in attending the December 9th event, Click here!

LEAP Managed IT helps Indianapolis businesses feel confident in their technology by helping them take control of IT support and IT service issues. Proud to be Indiana-based serving Indianapolis, Fishers, Carmel, Greenwood and Muncie.

More about us:

First, born out of a central Indiana based company, founded in 1930, Leap Managed IT has a heritage in using technology to help organizations become more efficient and achieve their goals.

Secondly, we’re here to foster the one-on-one relationship you need to feel confident that your organization is secure and positioned for success.

Thus, we believe when people feel confident, supported and challenged, they feel empowered to do great things inside and outside the office.  Hence, is why we work hard to maintain a team culture that provides great experiences. Both for those who work for us and those who work with us.

Lastly, Service quality shouldn’t change based on the person who helps you. Our entire team strives for excellence, providing you a high level of service with each customer interaction. No matter the situation. Amazing things happen when we come together, which is why we serve as more than an I.T. handyman when your computer breaks down. We think of ourselves as your business partner. Someone you can turn to for assistance to help your organization grow. Additionally, we want to make goals happen.

 

Risk Management Webinar

Indianapolis Risk Management experts form the Thompson Group, join the  LEAP Managed IT Cyber Security team on October 26th!

First click to register! Then, join LEAP Managed IT along with experts from the The Thompson Group. During the event, we will discuss mitigating Cyber Security Risk and steps you can take to keep your organization protected.  The Leap Cyber Security Team will lead a roundtable discussion and discuss industry standards for risk coverage and protection.

Again, LEAP brings together Indianapolis experts and Ridiculously Helpful Tips! With this in mind, learn how to protect your business. Also, what coverage you need and how to mitigate your cyber security risk.

The Leap Cyber Security Team will lead a roundtable discussion and discuss industry standards for risk coverage and protection.

REGISTER HERE

Learn more about The Thompson Group and how they help organizations all over the United States with Risk Management.

Hence, want to learn more about LEAP Managed IT Services by Indianapolis Top IT Experts, visit leapmanagedit.com 

Clearly, we help Indianapolis businesses feel confident in their technology by helping them take control of IT support and IT service issues. Besides being a proud Indiana-based business, we serve Indianapolis, Fishers, Carmel, Greenwood and Muncie, Zionsville and the entire metro area.

Now, for a sample of our Ridiculously Helpful Services from our experts:

  • End Point Detection and Response (EDR)
  • Multi Factor Implementation (MFA)
  • Cyber Threat Training
  • Cyber Insurance Compliance
  • Penetration Testing
  • Security Risk Assessments
  • Indianapolis Cyber Security Experts

Above all, don’t forget to register today. Definitely you don’t want to miss this event. Especially since space is limited.

IBJ & LEAP Technology and Cybersecurity Roundtable Series

Technology and Cybersecurity

Technology and Cybersecurity are the topic of IBJ’s most recent edition of the Thought Leadership Roundtable.  Undoubtedly, the roundtable features the top Indianapolis tech leaders.

Now, let’s share the first question in the series, to learn more and continue reading the entire feature visit the Indianapolis Business Journal.

Let’s start with a discussion of cybersecurity. Every day there seems to be news of a data breach. What are organizations doing wrong and how can they protect themselves?

Jim Goldman:

 I think it’s less about what organizations are doing wrong, and more about not doing enough. The current approach to cyberrisk management is broken, particularly for small- to medium-sized businesses. It’s easy to get caught up in buying what appears to be the next big cybersecurity tool. But a random collection of security tools does not a cybersecurity program make. Today’s cyberrisk management must involve a comprehensive integrated strategy that first includes understanding your risk with regular vulnerability assessments, then mitigating risk by repairing the most severe areas of vulnerability, and finally, transferring residual risk with cyber insurance. Most companies are not considering all three parts of the strategy. Companies can take some very manageable first steps to protect their data, but the most important first step is knowing where your systems are weak.

Sean Hendrix:

The starting point is awareness. This is where the concept of “zero trust” comes into play. As a business community, we tend to default to a condition where we trust the networks we are using. If we, as business leaders, buy in to the idea of zero trust, we will drive awareness in our organizations and provide the leadership required to implement the cybersecurity measures necessary to protect our networks.

Michael Thomas:

Unfortunately, cyberrisk is part of the landscape that business leaders have to navigate, and trends keep going in the wrong direction. Due to continual technology advancements and increased utilization of third-party platforms, achieving a 100% risk-free posture is not possible. What is possible is for organizations to develop a cybersecurity plan and to have the discipline to test, adjust and improve it as an ongoing business improvement process.

One of the most overlooked, yet most critical, aspects of a cybersecurity plan is around training and testing employees. It is hands down the best investment an organization can make and if properly managed can cut in half the overall threat risk to an organization. Beyond training, we are seeing a big increase in enterprises adopting endpoint detection & response and multi-factor authentication services, both of which are extremely effective at reducing overall cyberrisk.

Mike Vance:

Cybercrime is constantly evolving, so it should be no surprise that data breaches are happening with greater frequency and greater impact to organizations. If a system was put in place and hasn’t been monitored or maintained, it should be immediately reviewed.

A solid cybersecurity foundation focuses on securing two major categories: accounts and data. To improve account security, implement multi-factor authentication with centralized account management through use of single sign-on. This approach can reduce the risk of social engineering attacks such as phishing, which has emerged as the most predominant threat to an organization’s accounts. Data is secured through access authorization and authentication as well as data-loss prevention policies incorporating governance and technical controls, mobile device management, and zero-trust methodologies. None of this reduces the need for ongoing monitoring of these controls. Implementing a regular maintenance and security review cycle to audit accounts and data and remediate any oddities or areas of concern is imperative to cybersecurity.

David Whitt:

 Best practices to prevent a cybersecurity attack are not always well-understood throughout an organization. Also, hackers are getting better at what they do. For optimal protection, an organization must first acknowledge that they are potentially vulnerable. Second, it’s important to have qualified personnel on staff or on contract who continually look for innovative ways to negate potential threats.

Finally, visit the IBJ for the entire roundtable discussion. Most importantly, LEAP Managed IT is happy to provide insights and thoughts to the roundtable discussion. Finally, follow us on social media. So you don’t miss out on our Ridiculously Helpful Tips! Click to read the entire article.

Cyber Security and Risk Management

Cyber Security and Risk Management Roundtable

LEAP hosts Cyber Security and Risk Management Roundtable! Undoubtedly the most insightful event of the season.

Join LEAP Managed IT along with experts from the The Thompson Group and James Allen Insurance.

First, we will discuss mitigating Cyber Security risk. Secondly  understanding recourse action.

Thus the  LEAP Cyber Team will lead the roundtable discussion and provide customer hot topics regarding cyber security and protection. Learn about industry standards for risk coverage and protection. Along with understanding necessary coverage and what you truly need to be secure. Our experts will give real life examples of prevention and recovery. They will also share government standards and regulations. We will wrap up with a question and answer session.

Take away advise and a cheat sheet will able be provided.

Click HERE to Register Today!

Leap Managed IT helps businesses feel confident in their technology. Helping Indianapolis, Carmel, Zionsville and Fishers take control of their IT, solve business problems and end IT frustrations. Hence, leaders like you can focus on growing your business. Lastly our goal is to be Ridiculously Helpful.  Therefore answering your cyber security questions. managing your IT and supporting your business and community. We want to watch you grow.

EDR and more!

Understanding EDR, MFA and other fun terms!

Being a great IT partner means staying ahead of the curve. Knowing how to protect against a threat before it becomes an issue. As cyber crime grows, your IT provide stays at the forefront and helps protect you from threats. Understanding the terms is not easy, you don’t have to be an expert but you do need to know how to protect yourself in case something happens. When was the last time you checked in with your provider? If it has been over six months, it’s time to reach out and ask some vital questions.

In our efforts to continue being Ridiculously Helpful, we developed a Quick Safety Check!

Here is what you need to know:

  • Do you have EDR? Do you know what EDR (End Point Detection and Response) is?
  • Is  Multi Factor Implementation or MFA part of your daily security?
  • Have you or your team completed Cyber Threat Training? Are you confident someone in your office won’t click on “that” link?
  • Do you have Cyber Insurance Compliance?
  • Have you done Cyber Penetration Testing?
  • When was your last Risk Assessment? Is it documented?

If you answer YES to all of these then you can sleep more soundly at night. If you didn’t, call your IT provider. Or better yet, call us.  We can help walk you though the process. First, we will help you understand what you need to know and why. Then we can help develop a plan to get you moving in the right direction.

Being the leader in IT and Managed services in Indianapolis takes work and dedication. Our trusted team of advisors can help you. It’s our job to be Cyber Security Experts and make sure your business is protected.  Reach out to us today! 

 

 

Cyber Security 101 Webinar

Cyber Security 101 Webinar: Join us September 14th!

REGISTER HERE 

While Cyber Security crime has not gone away and unfortunately the bad guys keep getting sneakier, the good news, we know how they operate!

Join us for a Cyber Security 101 Webinar and learn:

  • the tricks of the trade
  • common mistakes
  • how to protect your business and your data from falling into the wrong hands

If you have joined us in the past…great…come again for a refresher and new tips.

This interactive webinar will be led by Cyber experts and LEAP veterans Gary Thomas & Michael Thomas.

Visit leapmanagedit.com to learn more or CLICK HERE TO REGISTER 

Indianapolis Cyber Security 101 Webinar

Join us September 14th for an Indianapolis Cyber Security 101 Webinar!

Click to Register Today 

Cyber Security crime has not gone away and unfortunately the bad guys keep getting sneakier, the good news, we know how they operate!

Join us for an Indianapolis Cyber Security 101 Webinar to learn the tricks of the trade, common mistakes and how to protect your business and your data from falling into the wrong hands.

If you have joined us in the past…great…come again for a refresher and new tips.

This interactive webinar will be led by Cyber experts and LEAP veterans Gary Thomas & Michael Thomas.

Here at Leap, our goal is to be Ridiculously Helpful to you, regardless of the problem at hand. We want to be your partner– who you turn to for both I.T. related problems and non-I.T. related problems. We’re here for you, which is why we are now providing Ridiculously Helpful Tips for you.

Visit us at leapmanagedit.com!

 

Help Desk Tips from Indianapolis IT Experts

Help Desk Tips: Protecting Your Devices from Lightning Strikes and Power Surges

As an Indianapolis Ridiculously Helpful IT based company it’s our job to provide Help Desk Tips on every topic. LEAP Managed IT is all too familiar with the crazy Midwest weather. During the summer and fall months, the Midwest tends to get hit with intense storms, some of which result in damage. Here at LEAP, we want to make sure our Indianapolis clients are aware of the effects lightning strikes and power surges can have on their electronics and the steps they can take to prevent future damage. Here’s 3 different Help Desk Tips to protect your business and electronics from intense lightning strikes and power surges.

UNPLUG

First and easiest of the Help Desk Tips is the most efficient way to prevent damage to your electronics from lightning or power surges is to simply unplug your devices. Lightning strikes and power surges result in a spike of the electric current, sending too many volts of electricity to your electronics. Plugged in devices are vulnerable to damage from these spikes in electricity, ultimately putting you at risk for losing everything stored in the device and the device itself. Our Help Desk Tip suggestion, regularly back up your files and unplug non-essential devices during storms.

SURGE PROTECTION

Second is the Surge! Surge protection can come in four different forms. (Type 1) service entrance surge protectors, (Type 2) whole-house surge protectors, (Type 3) receptacle surge protectors, (Type 12) combination types. Installing surge protection is a more expensive solution, but a necessary investment. It’s recommended that you have at least Type 2 protection; not just relying on the bare minimum or cheap surge protection plug-in strips.

HIRE AN ELECTRICIAN & GET INSURANCE

Third, have an electrician to survey and test your grounding system. Invest lightning insurance if you aren’t already. Most fire insurance covers fire by lightning, but not always the damage. We suggest making sure your insurance covers lightning strike and power surge damage.

30-30 LIGHTNING RULE

Last of the Help Desk Tips is the 30-30 lightning rule. The easiest way to determine if lightning is in your area is to count the seconds between seeing the lightning and hearing the thunder. If it is less their 30 seconds, lightning is near. When the storm is over, wait 30 minutes after last hearing thunder to plug your devices back in.

For more Help Desk Tips call our IT Experts at LEAP Managed IT. We help businesses grow in Indianapolis, Carmel, Zionville, Greenwood, Mucnie and the tri-state area. Visit us today!

Indianapolis Help Desk Tip: Make a Desktop Folder

Indianapolis Help Desk Tip Experts: How to Make a Desktop Folder

Indianapolis Help Desk Experts at LEAP Managed IT know that being organized in business is the key to success. From schedules to expense reports, organization is what makes or breaks a business. If your business is not properly organized, you can lose valuable time, paperwork, balance and structure. But, this doesn’t just apply to the physical files on your desk. How often, if at all, do you organize your computer desktop?

According to a 2020 poll conducted by Western Digital, the average American hasn’t cleaned or organized their digital desktops in over two years! On top of that, 62% of recipients [out of 2,000 Americans] say their digital desktops are “very cluttered” across all devices.

Indianapolis Help Desk Experts at LEAP Managed IT are here to help!  Here are tips to help make your desktop organized. Start with crating desktop folders.

With Windows

CTRL + Shift + N

  1. Navigate to the locations in which you want to have a folder. This can be on your desktop or to create a subfolder. After you have navigated to where you want the folder to be created, press the keys CTRL, Shift and N on your keyboard. This will immediately create a folder.
  2. The folder created will default to the name “New Folder.” Immediately after the folder is created, you have the ability to just start typing. Type whatever you want to name your folder. If you mess up or want to rename it, right click the folder and click on “Rename.”
  3. Right Clicking on Blank Spot on Desktop
For MacOS

Again, our Indianapolis Help Desk experts share a few different methods.

  1. File Menu – Go to your desktop. At the top navigation bar, it has an a assortment of words. Next to the bolded “Finder” is “File.” Click “File” and click “New Folder.”
  2.  An “Untitled Folder” appears on your desktop on a default location. The name of the folder is highlighted, you can start typing the name in which you would like to name the folder. If you mess up or would like to rename the folder, you can Right-Click (if you have a mouse) or click with two fingers on the trackpad. A menu will appear and click the option “Rename.”
  3. You can then relocate the folder by simply dragging it around your desktop. If you would like it to be a subfolder, you can open the folder you would like it to be in and drag it into the folder.
  4. Double Click (or Right-Click)
Another Indianapolis Help Desk Mac Tip:
  1. Command + Shift + N  This is the same concept as the Windows keyboard shortcut.
  2. Navigate to the locations in which you want to have a folder. This can be on your desktop or to create a subfolder.
  3. After you have navigated to where you want the folder to be created, press the keys Command, Shift and N on your keyboard. This will immediately create a folder.
  4. The folder created will default to the name “Untitled Folder.” Immediately after the folder is created, you have the ability to just start typing. Type whatever you want to name your folder. If you mess up or want to rename it, right click the folder and click on “Rename.”

Leap Managed IT helps Indianapolis, Carmel, Westfield, Greenwood and Zionsville area businesses with their IT solutions. Our goal is to be your Ridiculously Helpful IT advisor. Like us on Facebook for more tips or call our Indianapolis Help Desk!

Leap Now Offers Paper Shredding Services

Leap offers Paper Shredding Services

One of the most effective ways to protect individuals and organizations from the negative effects of identity theft and fraud is paper shredding. This is the reason why Identity thieves hate paper shredding services. Some frauds tie up to paper information and 1 out of 5 data breaches involve paper records. In line with Leap’s effort to give your organization the best in everything concerning technology, business growth, and continuity, they are now offering paper shredding services.

Why is Paper Shredding Important?

Paper shredding is also known as document destruction. The process is highly critical to keep confidential and sensitive information safe. Marketing plans, bills, and other files with sensitive contents should be discarded accordingly to avoid getting in the hands of those who would want to take advantage and get hold of such information.

It is known that once these paper documents are thrown away in the trash, they will be considered public property. This makes it riskier, most especially for big corporations. Paper shredding is not only important for security and cybersecurity reasons but also federal law. There are currently several states which mandate the safeguarding of all private information for both your employees and clients. Thus, securely shredding all documentation is crucial for the protection of your business. Most especially when this pile of paper is no longer relevant.

One last thing to Consider

Make it a habit and for employees to eliminate  huge pile of paper clutter to prevent fire hazards. Having unnecessary paper clutter around office spaces double the chances of risk for not just fire but cybersecurity issues as well.

Making it Easy

Leap Managed IT is encouraging that paper shredding should become a part of your organization’s best practices. With Leap’s paper shredding services, you will never have to worry about the huge stack of papers in the office that needs to be shredded. Leap helps Indianapolis companies along with Carmel, Zionsville Greenwood, Muncie and Ft. Wayne. For more details on Leaps Paper Shredding services, visit www.leapmanagedit.com today!

 

Indianapolis Cyber Security Best Practices 2021

Year of the Virus

The changes that have taken over our lives for the past year have been challenging. 2020 was the year of the virus, they say. Both biological and digital. Keeping a business or an organization afloat is another. As the Covid- 19 continues to disrupt and threaten businesses, we continue to face these obstacles head-on. We continue to find ways and focus on sales, marketing and services in order to maintain growth and continuity. Along with these changes, comes IT. Due to the pandemic, most employees work from home. Banking, shopping, and almost all activities are done online. This is where Cyber Security Best Practices come in.

Cyber Security is not limited only to those who run businesses. It is not only for organization leaders but for all of us. Those who rely on the internet for work, business, schooling, and everyday activities are all targets for cybercriminals. For businesses, the responsibility of protecting client’s information is vital. In addition, looking out for ourselves, from scams and identity theft is important too.

So, how can a business avoid being a victim of a cyber attack? How can we personally protect our privacy online?

Here are Cyber Security Best Practices that you can use as a guide:

  • Use a firewall as your first line of defense. It provides a barrier between your data and cybercriminals. It also prevents unauthorized access to your network. In addition to the standard external firewall, many companies are starting to install internal firewalls to provide another level of protection.
  • Educating your employees. Train all employees who are accessing the network about cybersecurity best practices and security policies. Since the policies are evolving as cybercriminals become more resourceful, it is essential to have regular updates on new protocols.
  • Enforcing safe password practices. Changing passwords from time to time can be a pain. However, Data Breach Investigations Report found that 63% of data breaches happened due to lost, stolen, or weak passwords. As a responsible business owner, strict password policies should be enforced for protection. Recommend that employees be required to use passwords with upper- and lowercase letters, combined with numbers and symbols. It is also best to require password change at least once every 60 days. Also, explore Two-Factor Authentication options.

Here are more Cyber Security Best Practices

  • Take time to backup all data. While it is important to prevent as many attacks as possible, it is still possible to experience breaches regardless of your precaution. Be one step ahead, regularly backup all important data. Make sure that backups are stored in a separate location in case of flood or fire. It is also important to check your backup regularly to ensure that it is functioning correctly.
  • Be vigilant for social engineering attacks. Because there is a rise in the volume of social media information, hackers can find ways to reach you through malware via phishing. Be careful about the emails and texts you receive and make sure they are not from those who pretend to be. Avoid opening suspicious files and give zero percent trust when it comes to social engineering threats.

Secure Cyber Management

Owning and running a business or organization, of any size can sometimes be frustrating. Aside from thinking of the sales, we have to realize our responsibility, to our employees and customers. Preventing financial loss, disruption of daily activities, and keeping your reputation is achievable through secure cyber management. This is where Managed IT Service becomes necessary. For more on cybersecurity best practices, remote work assistance, backup, and data security, visit Indianapolis IT Leader leapmanagedit.com today. Feel free to contact us, as we can be ridiculously helpful in all your struggles, IT and beyond.

Loving Your Technology Indianapolis

With Valentine’s Day right around the corner, we want our  Indianapolis clients to “LOVE” their technology! Hence, we want to help you be more efficient and do what you do best. Grow your business.

So, how do you fall in love with your technology Indianapolis? First, raise your hand and ask for help! Second, talk to experts at LEAP. That is what we do best.

We believe in tailoring solutions for your technology problems. Understanding technology frustrations and helping your business run smoothly takes effort and specific skill sets. Allow our tech geniuses to asses your environment, understand your pains and develop and IT Master Plan.

Our goal is simple, help business throughout the state of Indiana from Ft. Wayne to Bloomington, Muncie to Greenwood, Zionsville, Carmel and naturally the Indianapolis corridor. With services ranging from Help Desk Support and Hosted Email. Together with VOP and Cyber Security, we are your tech experts.

Find out why business leaders are falling in love with technology Indianapolis! Don’t take our word for it, see what our customers are saying about us, CLICK HERE!

We help Indianapolis businesses feel confident in their technology by helping their take control of IT support and IT service issues. Proud to be Indiana-based serving Indianapolis, Fishers, Carmel, Greenwood and Muncie.