12 11, 2019

TAG Austin 2019 Recap

2019-11-12T22:25:29+00:00November 12th, 2019|Tags: , , , , , , |

Our team enjoyed TAG in Austin and we’ve got some highlights to share with you! Technology Assurance Group (TAG) hosted their big event on November 7 - 8 in Austin, TX focused on Planning Your Success in 2020. TAG is an organization of over 100 leading MSPs and other technology companies. Members benefit from best business and management practices, advanced sales training programs and processes, in-depth financial analysis and industry benchmarking, professionally led peer group interaction, marketing and lead generation programs, and strategic partnerships with technology manufacturers. Here’s our recap of the event: Notes from the Conference Floor We have exhibited at TAG events before and once again we found the event to be worth our time and effort. This was the first time TAG did all the regions in one location, normally they host three smaller meetings. We liked this approach better and hope to see them do more events in this format. There were around 70 people in attendance, which is about what we expected for the meeting. While this number is lower than an average-sized conference that we attend, the ‘quality’ of attendee was through the roof! Just about every attendee was a decision maker which made for great conversations. The size of the show and venue made it easy to move around the floor, while still being compact enough to be perfect for networking. The conference had a lot of good speakers and information about security and the importance of making sure you have the appropriate insurance coverage. MSPs are [...]

31 10, 2019

IFMA World Workplace 2019 Recap

2019-11-12T22:40:04+00:00October 31st, 2019|Tags: , , |

Our team is back from IFMA’s World Workplace 2019 and we’ve got some highlights to share with you! IFMA’s World Workplace was held October 16-18 at the Phoenix Convention Center in Phoenix, AZ. Held annually in cities across the U.S., World Workplace is the most longstanding and well-respected learning and networking event for facility management and related professions. The facilities conference was attended by over 300 exhibitors and we estimate approximately 1000 FM professionals. Here’s our recap: Notes from the Conference Floor This was our first time exhibiting at World Workplace and we were very well received. Imagit was the only technology company exhibiting and attendees were excited to talk to us about how we could help them with structured cabling and more. Many facilities managers are directly affected by inefficient IT solutions or a lack of resources, so they were very happy to learn more about our offerings and make introductions to the IT decision makers within their organizations. The show had an efficient layout and the expo hours yielded a comfortable flow of traffic, ensuring we could comfortably speak with all attendees. The whole operation was a well-oiled machine. We were happy with the connections made overall and found the show to be a good value. Networking Opportunities We stopped by a couple of events during the show which were solid but not especially notable. We would love to see more attention in this area, encouraging attendees to mingle outside of the conference. That said, we were able to tee up meetings [...]

3 10, 2019

Application Changes Drive Need for Network Upgrades

2019-10-03T20:22:23+00:00October 3rd, 2019|Tags: , , |

Application Changes Drive Need for Network Upgrades An influx of new applications slows down enterprise networks The signs sometimes are subtle but increasing. The time needed to complete a transaction takes a bit longer, the number of user complaints rises, and web site performance diminishes. The corporate network, which has hummed along without incident for years, suddenly needs a tune up. What is driving the change? The nature of business applications today is evolving. New solutions are being deployed on a continuous basis. In addition, they are built on different foundations than in the past. They are more network and less server centric, so the end result is corporate networks require more bandwidth. Here are several increasingly popular applications that are pushing organizations toward network upgrades. Public Cloud This design approach has become very popular. Revenue spent on these systems has been increasing at a rapid clip with no signs of a slowdown. In fact, worldwide spending on public cloud services and infrastructure is forecast to reach $210 billion in 2019, an increase of 23.8% over 2018, according to International Data Corporation (IDC). Here are a few reasons for public cloud’s popularity. These systems are simple to deploy. They are based on a modern architecture, so making a change requires a few clicks rather than several steps. These solutions include high levels of automation, so they are easy to manage. Because of these benefits, vendors need less staff resources to manage them and pass the savings along to customers. While beneficial, these applications generate [...]

25 09, 2019

Channel Partners Evolution 2019 Recap

2019-10-09T18:52:52+00:00September 25th, 2019|Tags: , , |

Our team is back from Channel Partners Evolution 2019 and we’ve got some highlights to share with you! Channel Partners Evolution (CPEvolution) was held September 9 to September 12 at the Walter E. Washington Convention Center in Washington, DC. The channel tech conference was attended by 3000 of the industry’s leading solution providers, vendors, distributors, IT professionals and media, with over 150 exhibitors. Here’s our recap: Notes from the Conference Floor Though it didn’t always feel like it with the trade show floor being open for 11 hour days, the Imagit booth was busy. We met a lot of new people in the new channel and found several prospective new partnerships. We walked away with over 100 new contacts from scans at the booth, and business cards acquired throughout the show. One common theme was channel convergence. It’s affecting different companies in different ways, but the one thing that resonates across the board is a need to add more capabilities to take on new types of projects and add more value to customers.  Imagit is well positioned to help with this need thanks to our team of 400 network and systems engineers + smarthands who can almost any project need for partners across the US and Canada. The demand for more ‘as a service’ offerings also remains prevalent, and we are feeling very excited to launch our new LAN as a Service (LANaaS) offering after some great conversations with channel partners. If you didn’t get a chance to learn about that, we are offering [...]

13 05, 2019

Communicating after a Cyber Attack

2019-08-14T16:31:04+00:00May 13th, 2019|Tags: , , , , |

Organizations of all sizes are at risk for cyber attacks that can cripple operations and cause lasting damage. Businesses must have a plan in place for communicating with customers in the event of an attack so as to minimize losses. We are happy to share some information from our partners at Pronto Recovery about planning your communication and response after a cyber attack. The costs of a cyber crime The price tag of a security breach is staggering, with an average cost of $1.2 million. Cyber crime will cost the world in excess of $6 trillion annually by 2021 and financial costs are not the only consequences. Ransomware attacks are the #1 cyber threat to businesses and are growing at a yearly rate of 350%. These often start with a simple phishing email and can lead to the complete shutdown of business operations. One-third of companies surveyed claimed their company lost intellectual property due to a cyber-attack and 36% of them believe the attack reduced their competitive advantage. In today’s globalized business environment, organizations of all sizes face the prospect of falling victim to a cyber-attack or IT outage that could cause serious damage to its infrastructure and ability to operate. Despite the improvement of cyber-security techniques, criminals continue to develop sophisticated ways to disrupt systems and steal data. The need to prepare for cyber-attacks is more important than ever. According to Cisco’s 2017 Annual Cybersecurity Report more than one third of the organizations that experienced a cyber breach in 2016 reported a loss of customers, business opportunities and [...]

1 05, 2019

Say hello to the new Imagit!

2019-10-24T21:53:44+00:00May 1st, 2019|Tags: , , , |

Big news! We are celebrating twenty years in business with a brand-new logo and brand identity! Over the next few months you’ll see the new logo and colors roll out on our website, social media, collateral, and anywhere we are in public. If you have used the Imagit logo in any of your marketing materials, please contact us and assist us in updating them. This rebrand comes after careful consideration of our name, presence, industry, and vision for the future. Years ago, we launched the Imagit name under this logo and slogan. Our goal was to provide businesses with comprehensive IT services, delivering cutting-edge solutions for complex problems. Imagit was built on providing exceptional customer service with the most trusted technicians in the field. Originally serving only smaller businesses, today we fully support organizations who have thousands of locations globally. Today we are still in the field every day delivering innovative solutions and completing large multi-site projects for clients and partners everywhere. As we look to the future, we want to embrace our greatest strengths as a company. Our vision and mission reflect our strengths and the goals that we strive for. Imagit is recognized in the tech industry as the go to network engineering partner, guaranteeing impressive and integrity-based results. We are proven, brave, curious, passionate, determined and lots of fun… people like us! In a world where many technology companies are rather faceless, completing work remotely and outsourcing customer service, Imagit takes a different approach. Our focus on relationships brought us to [...]

15 03, 2019

Growing Your MSP Business in the 2020’s

2019-05-16T17:55:43+00:00March 15th, 2019|Tags: , , , , , |

In a highly competitive market and with growing customer demands MSPs must focus on core strengths. MSPs benefit by handing network system configuration and maintenance over to a specialist. Introduction: The Shoemaker’s Children MSPs convince their customers of the benefits of offloading maintenance tasks to third party specialists. Ironically, many ignore the potential benefits that they themselves can gain by making such a change. Terms, like digital disruption and gig economy, illustrate that nowadays, technology evolves at a brisk pace. Consequently, the burden of taking care of all of their customers’ technical needs strains many MSPs’ resources and decreases their margins. What can be done? MSPs must heed their own advice. They need to determine where they add value and focus their energies there. For many, network maintenance has become an onerous burden. Hiring a specialist to oversee customer network deployments and maintenance enables MSPs to expand their reach, improve their service, and reduce their costs. The Network Maintenance Challenge Monitoring customers’ IT systems is a complex undertaking, one that becomes more complicated every day. New solutions, such as the Internet of Things; artificial intelligence and machine learn; and Augmented Reality/Virtual reality, emerge. The traditional office is expanding. The Internet frees employees from desktop systems in central office cubicles. Today, they use a variety of devices, desktops, smartphones, and tablets to access information and work from home, branch locations, customers’ offices, and the local coffee shop. Configuring and managing all of these devices, applications, and connections has become time consuming. MSPs need to maximize [...]

29 01, 2019

How Smart Hands Help Your Business

2019-05-16T17:55:44+00:00January 29th, 2019|Tags: , , , , , , |

While many tasks can be handled remotely, there are times where you need on-site support. Maintaining enough technical resources with the rights skill sets at each location can be difficult or even impossible for many companies. That's where Smart Hands step in, helping your business thrive and grow without the stress of maintaining a large IT staff. Smart Hands are an integral part of any IT team, providing your helpdesk or IT department with boots on the ground that can function as an extension of your in-house team, filling critical gaps. Smart Hands allow your team to complete more complex tasks and to quickly handle issues on-site. Businesses that utilize Smart Hands can ensure less downtime, lower costs, and higher quality services! Don’t Let Your Business Suffer from Downtime In today’s modern world, businesses rely on technology and require a healthy and fully functioning network. When something goes wrong time is of the essence. That’s why our full-service field management department is always ready to answer your call. Our team works with you to quickly determine what your needs are, and then jumps into action to create a ticket and deploy a resource. Furthermore, our ticketing system can be fully customized for clients with a large number of requests. Our team creates custom client portals and trains your staff on how to use them so that you can quickly and easily put in a service request. Be Everywhere at Once Without Increasing Your Costs Now you don’t need to worry about hiring a large [...]

25 01, 2019

Strengthening Your Cybersecurity Plan

2019-08-29T21:27:20+00:00January 25th, 2019|Tags: , , , |

Is your business safe from cybersecurity threats? Do you have a plan to proactively improve and protect against new types of attacks? We want to help you improve your cybersecurity plan. By implementing even one or two of the suggestions below, you’ll be taking a step toward reducing the likelihood of data loss, downtime, reputation damage, and lost revenue. Laying the groundwork Before writing any cybersecurity plan, it’s important to have a risk assessment under your belt. Risk assessments highlight exactly where and how your workforce, technology, and physical environment are exposed and therefore where you need to allocate your risk-reducing budget dollars. An upfront risk assessment is also THE key input into your cybersecurity plan. After all, the whole point of a cybersecurity plan is to reduce the vulnerabilities uncovered by a risk assessment. Chances are you probably already have a cybersecurity plan for your organization. It may be a plan that was written to meet regulatory requirements. Alternatively, it may have been written because you value the continuous operation of your organization and want to protect the private data it stores and processes. Whatever your goals, it is important to make sure your cybersecurity plan includes several key points. Your cybersecurity plan should state: The organization’s general attitude toward risk – averse, neutral, or accepting The importance of cybersecurity from leadership to individual contributors Commitment to adhere to any applicable regulations such as HIPAA, PCI, 23 NYCRR 500, etc. Specific incident response procedures outlining what each internal and external stakeholder will do [...]

10 01, 2019

Cybersecurity Trends – BEC Phishing

2019-05-16T17:55:45+00:00January 10th, 2019|Tags: , , , , , |

Ransomware may be the number one cyber threat but there is another, newer cyber attack that is not being talked about enough. This threat can result in the loss of millions of dollars for companies who are affected by it and lead to the complete shutdown of their email systems – Business Email Compromise. We are happy to share some information from our partners at Pronto Recovery about BEC attacks and how you can protect your business. Business Email Compromise or BEC is an exploit in which the attacker gains access to a corporate email account and spoofs the owner’s identity to defraud the company or its employees, customers or partners of money. Unlike the typical phishing attacks that target everyone, BEC specifically targets high level business executives such as the CFO or corporate attorney to initiate a wire transfer. BEC scams have three main versions: The Bogus Invoice Scheme: this scheme involves a business that has an established relationship with a supplier. The attacker then requests a wire transfer for invoice payment to an fraudulent account via spoofed email, telephone, or fax. CEO Fraud: in this scheme, the attacker pretends to be a high-level executive or attorney who requests a wire transfer to be initiated with instructions to urgently send funds to their bank. Account Compromise: in this version, an employee’s email account is hacked and then used to make requests for invoice payments. And though not as common as the typical phishing email, an FBI announcement in 2017 confirmed that between October [...]