31 10, 2019

IFMA World Workplace 2019 Recap

2019-11-12T22:40:04+00:00October 31st, 2019|Tags: , , |

Our team is back from IFMA’s World Workplace 2019 and we’ve got some highlights to share with you! IFMA’s World Workplace was held October 16-18 at the Phoenix Convention Center in Phoenix, AZ. Held annually in cities across the U.S., World Workplace is the most longstanding and well-respected learning and networking event for facility management and related professions. The facilities conference was attended by over 300 exhibitors and we estimate approximately 1000 FM professionals. Here’s our recap: Notes from the Conference Floor This was our first time exhibiting at World Workplace and we were very well received. Imagit was the only technology company exhibiting and attendees were excited to talk to us about how we could help them with structured cabling and more. Many facilities managers are directly affected by inefficient IT solutions or a lack of resources, so they were very happy to learn more about our offerings and make introductions to the IT decision makers within their organizations. The show had an efficient layout and the expo hours yielded a comfortable flow of traffic, ensuring we could comfortably speak with all attendees. The whole operation was a well-oiled machine. We were happy with the connections made overall and found the show to be a good value. Networking Opportunities We stopped by a couple of events during the show which were solid but not especially notable. We would love to see more attention in this area, encouraging attendees to mingle outside of the conference. That said, we were able to tee up meetings [...]

3 10, 2019

Application Changes Drive Need for Network Upgrades

2019-10-03T20:22:23+00:00October 3rd, 2019|Tags: , , |

Application Changes Drive Need for Network Upgrades An influx of new applications slows down enterprise networks The signs sometimes are subtle but increasing. The time needed to complete a transaction takes a bit longer, the number of user complaints rises, and web site performance diminishes. The corporate network, which has hummed along without incident for years, suddenly needs a tune up. What is driving the change? The nature of business applications today is evolving. New solutions are being deployed on a continuous basis. In addition, they are built on different foundations than in the past. They are more network and less server centric, so the end result is corporate networks require more bandwidth. Here are several increasingly popular applications that are pushing organizations toward network upgrades. Public Cloud This design approach has become very popular. Revenue spent on these systems has been increasing at a rapid clip with no signs of a slowdown. In fact, worldwide spending on public cloud services and infrastructure is forecast to reach $210 billion in 2019, an increase of 23.8% over 2018, according to International Data Corporation (IDC). Here are a few reasons for public cloud’s popularity. These systems are simple to deploy. They are based on a modern architecture, so making a change requires a few clicks rather than several steps. These solutions include high levels of automation, so they are easy to manage. Because of these benefits, vendors need less staff resources to manage them and pass the savings along to customers. While beneficial, these applications generate [...]

12 02, 2019

Imagit Solutions Receives 2018 Best of Chicago Award

2019-05-16T17:55:44+00:00February 12th, 2019|Tags: , , , |

Imagit Solutions is recognized for it's achievements and accomplishments with the 2018 Best of Chicago Award. Chicago, IL -- Imagit Solutions has been selected for the 2018 Best of Chicago Award in the IT Services and Support category by the Chicago Award Program. Each year, the Chicago Award Program identifies companies that we believe have achieved exceptional marketing success in their local community and business category. These are local companies that enhance the positive image of small business through service to their customers and our community. These exceptional companies help make the Chicago area a great place to live, work and play. Various sources of information were gathered and analyzed to choose the winners in each category. The 2018 Chicago Award Program focuses on quality, not quantity. Winners are determined based on the information gathered both internally by the Chicago Award Program and data provided by third parties. About Chicago Award Program The Chicago Award Program is an annual awards program honoring the achievements and accomplishments of local businesses throughout the Chicago area. Recognition is given to those companies that have shown the ability to use their best practices and implemented programs to generate competitive advantages and long-term value. The Chicago Award Program was established to recognize the best of local businesses in our community. Our organization works exclusively with local business owners, trade groups, professional associations and other business advertising and marketing groups. Our mission is to recognize the small business community's contributions to the U.S. economy. Imagit Solutions is a network engineering [...]

25 01, 2019

Strengthening Your Cybersecurity Plan

2019-08-29T21:27:20+00:00January 25th, 2019|Tags: , , , |

Is your business safe from cybersecurity threats? Do you have a plan to proactively improve and protect against new types of attacks? We want to help you improve your cybersecurity plan. By implementing even one or two of the suggestions below, you’ll be taking a step toward reducing the likelihood of data loss, downtime, reputation damage, and lost revenue. Laying the groundwork Before writing any cybersecurity plan, it’s important to have a risk assessment under your belt. Risk assessments highlight exactly where and how your workforce, technology, and physical environment are exposed and therefore where you need to allocate your risk-reducing budget dollars. An upfront risk assessment is also THE key input into your cybersecurity plan. After all, the whole point of a cybersecurity plan is to reduce the vulnerabilities uncovered by a risk assessment. Chances are you probably already have a cybersecurity plan for your organization. It may be a plan that was written to meet regulatory requirements. Alternatively, it may have been written because you value the continuous operation of your organization and want to protect the private data it stores and processes. Whatever your goals, it is important to make sure your cybersecurity plan includes several key points. Your cybersecurity plan should state: The organization’s general attitude toward risk – averse, neutral, or accepting The importance of cybersecurity from leadership to individual contributors Commitment to adhere to any applicable regulations such as HIPAA, PCI, 23 NYCRR 500, etc. Specific incident response procedures outlining what each internal and external stakeholder will do [...]

10 01, 2019

Cybersecurity Trends – BEC Phishing

2019-05-16T17:55:45+00:00January 10th, 2019|Tags: , , , , , |

Ransomware may be the number one cyber threat but there is another, newer cyber attack that is not being talked about enough. This threat can result in the loss of millions of dollars for companies who are affected by it and lead to the complete shutdown of their email systems – Business Email Compromise. We are happy to share some information from our partners at Pronto Recovery about BEC attacks and how you can protect your business. Business Email Compromise or BEC is an exploit in which the attacker gains access to a corporate email account and spoofs the owner’s identity to defraud the company or its employees, customers or partners of money. Unlike the typical phishing attacks that target everyone, BEC specifically targets high level business executives such as the CFO or corporate attorney to initiate a wire transfer. BEC scams have three main versions: The Bogus Invoice Scheme: this scheme involves a business that has an established relationship with a supplier. The attacker then requests a wire transfer for invoice payment to an fraudulent account via spoofed email, telephone, or fax. CEO Fraud: in this scheme, the attacker pretends to be a high-level executive or attorney who requests a wire transfer to be initiated with instructions to urgently send funds to their bank. Account Compromise: in this version, an employee’s email account is hacked and then used to make requests for invoice payments. And though not as common as the typical phishing email, an FBI announcement in 2017 confirmed that between October [...]

20 11, 2018

Investing in IT: How to Choose the Best Option

2019-06-06T22:29:58+00:00November 20th, 2018|Tags: , , , , , , , |

One thing we see a lot at ImagIT is that many people don’t think about the true cost of a job well done. When we submit a proposal for IT services, it’s always based on our real experience of the work and resources required for a quality solution that meets your needs. But for people who aren’t working in IT day in and day out, it’s hard to know the true cost of dependable, skilled IT services. When someone tells you about cheap IT services, it can be tempting to assume the best about the integrity and experience you’ll get for your dollar. Unfortunately, this often results in higher overall costs when all factors come to light. Is it Apples to Apples? It’s important to understand what is and isn’t included in the proposals you receive. Begin by making a comparison chart of primary aspects such as price, delivery time frame, and services so you can truly compare apples to apples. Look for proposals that spell out exactly what you will receive, rather than ones that make broad or vague statements. Companies that are not detailed about what is included in the contract, such as hours of training, change orders, on-going costs, etc., will not deliver what you think they promised. Don’t Assume All IT Companies Are Equal Price quotes can vary for a multitude of reasons, and so can a company’s experience. When it comes to IT services, and especially large-scale projects, you want the most qualified company for the job. A lesser-experienced [...]

12 10, 2017

Opening a new office? You need this network infrastructure guide.

2019-07-23T18:10:15+00:00October 12th, 2017|Tags: , |

There are a variety of challenging decisions you have to make whenever you open a new office. Where should your new office be located? Who should staff it? And perhaps most importantly, will you have a network infrastructure in place that allows your new location to flourish? A properly functioning network infrastructure connects various devices throughout your office, allowing your hardware components and software applications to interact seamlessly with each other. To put it simply, your new office won’t be able to provide your customers with the services or care they need if your IT infrastructure is lacking. Imagine a client being unable to reach you due to a flawed voice network, or losing valuable data because you don’t have the right disaster recovery backup solutions in place. These are scenarios you should do everything in your power to avoid. So where should you begin? To help you make informed decisions as you’re building out your new office, we’ve created a Network Infrastructure 101 Guide that walks through the steps you need to take to ensure your IT infrastructure fulfills your organization's needs. This guide touches on essentials to any infrastructure plan, including: Laying the foundation for your network by making sure your voice and data cabling needs are met both now and in the future Creating a cohesive environment with network engineering and systems engineering Finding the best storage and backup solutions for your information Making decisions on voice, internet, access control and more Take a detailed look at your network infrastructure planning and [...]

26 07, 2017

The Fine Print: How Inexperienced IT Technicians Can Cost You

2019-07-16T22:15:43+00:00July 26th, 2017|Tags: , , |

Lower costs don’t always equate to a good deal. When it comes to your IT needs, there are plenty of businesses out there who offer lower upfront prices to complete a variety of projects. “Spend less for the same great service,” is a phrase you’ve probably seen tossed around before. The question is, where are these savings coming from? Most often, these savings come in the form of less-knowledgeable IT technicians, who are less expensive to hire than their more skilled counterparts. This means the people working on your IT infrastructure may be learning by trial-and-error while on the job. As you might imagine, working with inexperienced IT technicians can often lead to bigger costs down the road – some of which could potentially dwarf the budgetary restraints which kept you from working with a more experienced person. Let’s take a look at where some of these unplanned costs can come from and how you can avoid falling victim to them. Obvious Errors The simplest way under-trained IT technicians can cost you is by making on-the-job errors. Now, if you are working with an official-looking IT provider, you’ll likely assume this isn’t something you have to worry about. Unfortunately, this simply isn’t the case. Technician vetting across the industry can vary wildly. Some companies, for example, will allow basically anyone to register as a technician through their online portals. There may be some vetting down the road, but obviously this the process your business deserves. If you do happen to get stuck with an unknowledgeable technician, you [...]