Moving to the Cloud

There is an incredible buzz about the cloud. What is it? How can the cloud help your business? Why move to the cloud? Continue reading to learn about the cloud and how it can help your business.

What is the Cloud?

The cloud provides security and data protection. The cloud refers to software and services that run on the internet, instead of locally on your computer. The cloud can utilize workspace as a service. The power of the cloud on to anyone, anywhere, and on any device. Whether you need high performance storage, standard or cold storage, we’ve got the cloud closet of your dreams.

What is a Cloud Hosted Virtual Desktop?

A cloud-hosted virtual desktop replaces your existing environment (which resides on or underneath your desk) with a virtual computer that is securely stored in the cloud. Virtual desktops hosted in the cloud are an excellent method for company owners to save money, time, and effort on a daily basis.

More options for Mobile Workforce:

Having the cloud allows businesses to capitalize on the mobile workforce. The cloud enables workers to access the company information on any device as long as the device has an internet connection. This allows for staff to be able to work primarily outside of the office.

Allows Companies to Work in a More Efficient Fashion:

The cloud is able to help companies become more efficient through reducing the amount of paper documents that have to be transferred. It can also reduce cost and set the business apart from their competition through cutting the time necessary to deliver a product or service to their customers.

Should I Move to the Cloud?:

JENLOR will do a cloud feasibility test and perform a True Network Evaluation

  • Moving to the cloud doesn’t have to be all in: You can update your server environment, email, and backups. We have so many different cloud plans that you can choose which plan fits your companies need best.
  • Reduce Costs: When you shift to cloud computing, you will only pay for the services procured. If you don’t have to pay for features you don’t use, you can easily and quickly cost unnecessary costs.
  • Flexibility: The cloud service give you and your employees the flexibility to work from any location. Employees can complete their tasks at home or from the field
  • No Need for a Backup: Traditional computing systems require back up plans. Permanent data loss can happen if no backup storage is in place. With the cloud, data will always be available with internet. Therefore, some businesses use the cloud a backup program.
  • Data Security: Sometimes storing data on the cloud is safer than storing it on physical servers in your office. Breaching the security measures on clouding platforms is very difficult and less likely than a breach on physical servers.

Business and IT leaders all over the world are replacing legacy, on-premises technology with flexible, scalable, and cost-effective computing power in the cloud. From reducing IT costs to accelerating innovation, there are many compelling reasons to embark on a migration journey. However, making the transition is not easy without a well-developed plan and cloud expertise.  We offer cloud in every shape and size, plus storage service to meet the most demanding performance and compliance requirements out there. If you have any more questions about why to move to the cloud or to sign up contact JENLOR today!

Microsoft Teams what you need to know.

During the COVID-19 pandemic, the worldwide workforce faced a stunning and fast shift to remote labor. That change, though, was never going to be entirely transitory. The epidemic intensified a trend toward flex work that had already begun in 2019.

As the epidemic fades, more companies will reopen, but their operations will be drastically changed. Many companies prefer to keep a percentage of their staff remote, according to studies. Others will move employees to hybrid schedules, in which they alternate between on-site and remote work.

What Does Microsoft Teams Do?

Users may utilize a single window to access a range of essential Office 365 programs and features to help them work more efficiently, such as:

  • Calendars and meetings (Outlook)
  • Create, share, edit and find content (SharePoint, OneDrive and OneNote)
  • Call and meet team members (Skype)
  • Chat and instant messaging (Skype)

Microsoft Teams Perks

  • Centralized hub
  • Office 365 integration
  • Customize Teams through APIs and bot frameworks
  • Enterprise security & compliance
  • Azure Active Directory integration
  • No extra cost to Office 365 users

Once your organization has access to Teams, you can: download the desktop application, access Teams through your browser or download the mobile app.

How Does Microsoft Teams and Channels Work?

When you start a new Team and invite members, they are all assigned to the “General” channel by default. You may then establish other channels for smaller teams or groups, which are basically alternative group chats or discussions.

To start your teamwork collaboration, you need a team. Setting up Teams is easy and done in a few clicks, requiring a Team name and a description; this then allows team members to be added. As mentioned above, a new Team will create a matching Office 365 Group, OneNote, SharePoint site and Plan—so this does need to be done with some caution.

Each Team has subsections, which are called Channels, and a General Channel will automatically be created. You can have multiple Channels within a Team; for example, you could have a ‘Marketing’ Team and then Channels such as ‘Social Media’, ‘Product Launch’, ‘Blogs’ etc. Or a Company could be a Team and Channels can relate to departments – you can choose whatever suits your organization’s way of working. Whenever there is a new notification or activity, the Channel will become bold.

Each Channel all have their own tabs along the top. Conversation (group chat), Files (shared documents) and Notes (shared OneNote) are automatically created and you can then add your own tabs.


One of the most important elements of Teams is Conversations, which allow each Team to have a centralized conversation that is saved and readily searchable.

From file sharing to video calls, conversations are the core component where all cooperation is documented.

The use of @mentions allows you to tag participants or even whole teams to notify others. Users that look at Conversations will easily see where they have been mentioned through the red @ symbol to highlight areas of importance to them. On top of this, your desktop app will notify you through an alert. As well as tagging, users can ‘like’ content and share emoticons or GIFs.

File Management

In your Teams window, you can perform a variety of tasks directly within that window or browser, so that you avoid flicking between different applications. These tasks include the ability to delete, download, move files, open, copy, edit or get a link to share with others – giving you all the key features you would get in the native apps.

You can also start a Group chat alongside the file, to allow team discussions while all working on the files – and this conversation will appear in your Conversation thread.

Digital Notes

Notes takes you to the Team shared OneNote. Within Teams you can view and edit your OneNotes (directly within the Teams window) or you can click to edit in the OneNote app.


Microsoft Teams is already a robust offering and is benefiting from lots of new features and integrations.

Media coverage and reception has also been very positive with many Slack comparisons. Within these comparisons, Microsoft Teams is often faring very well in terms of features, usability and offering—but what makes it even more appealing is the fact that is it included with Office 365.

Moving Forward

If you are using Office 365, then we recommend trying Teams. If you are not using Office 365, then you can sign up for an Office 365 trial (which includes Teams) to test it.

Contact JENLOR today to learn how we can assist in your company in maximizing the use of Microsoft Teams!

Phishing Attack

What is a phishing attack? 

Phishing is a type of social engineering attack that is frequently used to steal sensitive information from users, such as login credentials and credit card numbers.

It happens when a hacker poses as a trustworthy entity and convinces a victim to open an email, instant message, or text message. So, how do you protect yourself from phishing scams?

  • Be wary of emails that ask you to take action. – Do not click on anything in an email or text message that asks you to take a specific action or download software. Instead, go to the organization’s official website. You will no longer be able to download malicious content from phishing links.
  • Watch out for shortened links – Shortened links, especially on social media, should be given special attention. These – from Bitly and other shortening services – are frequently used by cybercriminals to trick you into thinking you’re clicking a legitimate link when you’re actually being directed to a fake site.
  • Browse securely with HTTPs – When browsing, you should always use a secure website (indicated by https:// and a security “lock” icon in the browser’s address bar), especially when submitting sensitive information online, such as credit card information.

As always, if you think you have been subject to this type of scam, please call JENLOR for assistance at (412) 220-9330.

Don’t Save Corporate Data On Your Workstations

The ability to store ALL of your data in one location is one of the main benefits of having a corporate server environment. Servers are typically redundant, monitored 24 hours a day, patched on a regular basis, and backed up both locally and offsite. As a result, data stored on a server is far safer than data stored on a single workstation. In a corporate environment, backing up corporate data to your personal workstation is never a good idea. The dangers of losing this information are far too great.

Bottom line: If employees save data to their workstations rather than a server drive or share, that data is not being backed up unless that specific workstation is also being backed up separately.

Worse yet, what happens if that employee’s laptop is stolen and all of their work data is saved on that hard drive?

That’s a risk for your company.

Employees should be directed to save critical data to a network share, according to JENLOR.

All of that data will be backed up with a proper backup strategy, reducing headaches later due to a crashed workstation hard drive, a stolen laptop, or other misfortunes that cause end user downtime and frustration.

We encourage you to revisit the process of where and how your employees are saving data. If you have any questions OR would like to discuss options further, please reach out to JENLOR today at (412) 220-9330 and we would be happy to consult on the best practices for your organization.

Most Common Data Backup Mistakes in 2021

Isn’t data backup supposed to be simple?

You simply connect to a system and initiate a backup, and the system will take care of the rest until you require it. Regrettably, data backup and recovery are rarely that straightforward.

Backups have issues, are set up incorrectly, and are turned off by users, among other things.

Data loss can be disastrous as a result. You should avoid these common data backup mistakes to avoid costly data loss due to ransomware, phishing scams, a hard drive crash, natural disaster, or other unforeseen events.

  • Backups and originals on the same hardware – The backup’s main goal is to have a copy that can be retrieved and is secure. It makes no sense to save a copy of the original on the same hardware that will also compromise the backup if the original is compromised.
  • Not performing a test – Having a backup isn’t enough; it needs to be tested to ensure that it was successfully saved and that the data is accurate and accessible.This is just as important as creating the backup.
  • Relying Only on Physical Storage Because physical storage, such as discs and tapes, is the only type that is tangible and visible, it may appear to be the most reliable backup system. Physical storage, on the other hand, is vulnerable to natural disasters like fires and floods, as well as non-corporate disasters like a disc breaking, overheating, or being misplaced. Other storage, like the cloud storage, is intangible, therefore giving an advantage to its users by defying physical disasters.
  • Confusing ‘Sync’ With ‘Backup’ – Many people confuse the terms “sync” and “backup” when it comes to their data. You’re mistaken if you believe that syncing your files and documents eliminates the need to back them up. When you ‘sync’ a file, it simply means that any changes you make to the file on one device will be reflected in the file synced on other devices.

Avoid data backup mistakes by calling the expert consultants at JENLOR today for all your IT solutions.

5 Reasons Why Mobile Device Management is a Must for Your Company

Mobility is a must to stay ahead in today’s business environment. Just take a quick glance around the office or even outside the workplace and you’re guaranteed to spot at least some people working on smartphones, tablets, and laptops to keep connected even when they’re on the go. While this newfound mobility has drastically boosted business across the board, it doesn’t come without its own set of obstacles. Here are 5 Reasons Why Mobile Device Management is a Must for Your Company.

  1. Mobile Apps

    1. Mobile apps are being used to access data these days. Today’s tech-savvy workforce isn’t waiting for IT to give them mobile apps either. Employees are increasingly using whatever apps they want for file sync and share, note-taking, communication, and more to maximize their job performance.
  2. BYOD

    1. Support for Bring-Your-Own-Device (BYOD) is the new normal. However, companies are struggling with how best to secure corporate data on personally owned devices. Mobility solutions can separate personal and corporate data allowing IT to retain control of corporate data while leaving personal apps and data alone.
  3. Mobile Device Management

    1. Mobile device management protects employees from the enterprise. It sounds odd because so often the focus is on IT preventing corporate data from mixing with unauthorized personal apps. Yet, the reverse is also true. With Mobile Device Management, you maintain user privacy throughout your company.
  4. Support

    1. Mobile device management solutions simplify the multi-platform maze by providing consistent security and management across the mix of devices, operating systems, and ownership models within the company.
  5. Benefits

    1. When apps and data can be protected and managed independent of device-level controls then organizations can broaden support to the entire enterprise and truly experience the benefits of mobility.

Don’t let the obstacles of IT come in between your organization and success, simplify your approach by getting in touch with the experts at JENLOR today.


Top IT Issues of 2021

The COVID-19 pandemic has challenged all industries and sectors, and higher education was no exception. The diversity of campus cultures, financial health, business models, and students led to a similar diversity in the impact of and response to the pandemic. Due to the tumultuous events of the past year, in 2021 IT professionals will face challenges in the workplace they’ve never seen before.

  • Enhanced Automation of Everyday Tasks

For years, people have been looking for a way to streamline the mundane aspects of day-to-day business operations. 2021 is the year that true automation of these simpler tasks takes hold. Infobots, Blockchain Technology, and software applications will rise to run automated errands over the internet and change how employees carry out their duties.

  • 24-Hour Help Desk IT

The days of on-site IT personnel are becoming less common, outsourced 24-hour help desk IT support has taken its place. With Covid-19, more small businesses are expected to outsource their IT support, digitally updating and renovating their way of doing business.

With outsourced IT support at your disposal controlling enterprise tech-activities, servicing customer queries, and addressing common technical issues becomes easier than ever. On top of that, you’ll be able to reduce your cost and stress on your in-house employees allowing them to be more productive with day-to-day tasks.

  • A Boom in Security Management Services

Over the past year, you could barely go a day without reading about the latest security hack of a major corporation or small business. In 2021, it’s no wonder that security management services will continue to attract a huge amount of interest from businesses big and small. Cyber threats and attacks are only becoming more sophisticated, so expect a new class of security solutions to emerge in order to keep up with the chaos.

Keeping up with the ever-evolving IT environment can be quite the task. Stop worrying about how you’re going to keep pace with all the latest IT innovations by outsourcing your IT to the experts at JENLOR. With over 20 years of experience, dealing with the everyday trials and complexities of IT, our team knows what works and what doesn’t. Using our expertise, we create a customized IT service package to reduce downtime, increase productivity and keep expenses in line. Don’t sit back and wait for IT to get easier, take a proactive approach to your IT system management and contact JENLOR today.

How To Keep Most Valuable Data Safe & Secure

Large data threats pose serious problems to the security of your information, and your customer’s information. It is vital to keep your business’s data safe and secure. Investing in a high-quality data backup and recovery system is the best way to avoid serious threats and major fallouts. Learn a lesson from Sony and Target, take the time to prepare, and avoid a major data threat.

  • Internal Support

Hire a managed security service provider to care for your company’s internal and external threats. A large percentage of malicious hacks start from within your company’s premises. Internal threats need to be neutralized before you end up with a major hack that costs your company everything. Employees that access company files on mobile devices need to be monitored and secured to prevent problems. Create a file list to identify all the different sensitive data your company has, and which employees have access to it. It is easier to narrow down your list of suspects by compiling access codes and information.

  • Identify Weak Points

When you work with security management services, you will be able to identify the weak points your company is dealing with. You need to learn the weak points to reduce the risk of threats. Most companies have employees that use the same password across the server and others use programs like Dropbox, which are easy for hackers to access. Implement a system of strong password management to ensure your company will not end up having employees reuse passwords. Password management applications are easy to use and make it easy for employees to log into programs without needing to remember difficult passwords.

  • Stay Current

There is never a ticking clock that will tell you when your company is going to be hacked. You must stay current with all your antivirus programs, and server management company requirements. Major threats are released daily, if your company is not protected, you can end up with a serious problem.

  • Externally Operated IT Security Management Services

An important aspect of protecting your data is to work with the right company. Using an externally operated IT security management company is the best way to prevent major threats to your company. Storing expensive and sensitive company information needs to be monitored constantly. Moving the information off-site is a great way to keep the company information safe and secure, and it helps to reduce threats from within the organization. Hire IT Security Management Services to ensure your data is safe and secure and will not put your companies valuable information at-risk.

Ensure that your company’s data is safe and sound and build a safety net for your business with help from the IT security management services from JENLOR. Our IT consulting professionals will create a custom security strategy to keep your company protected, while building a data backup and recovery plan to prevent any information being lost along the way. Call the experts at JENLOR today, and discover how we can help you make IT easy.

A Long-Term IT Support Solution

Every business, no matter how big or small, is faced with the prospect of establishing IT support, and whether it will be provided by in-house expertise or by outsourced IT support. The same can be said about the hardware and software necessary to drive and maintain the business. Together these two issues comprise one of the biggest problems every business needs to solve in order to become and remain viable and competitive. While there is something to be said for both in-house and outsourced solutions, many companies have decided that an outsourced IT service strategy makes the most sense for them.

  • Advantages of Outsourcing IT Support

There are many advantages to outsourcing your information technology support services, chief among them being the fact that it relieves you of the need to hire in-house talent and having most of the necessary hardware at your business location. The hiring process that Human Resources departments must observe these days gets more and more arduous by the year, and even then, misfires can occur. Having qualified expertise through an outsourcing agency removes all those issues, and when much of the hardware is also supplied by the agency, your company is likewise relieved of the huge burden of maintenance.

Flexibility and scalability are two more reasons why outsourcing makes sense, especially for small business IT support. While it might be a major project for a small company to make significant changes to its IT infrastructure, or to make sweeping new additions, all those issues are handled by the agency in an outsourcing scenario.

One of the greatest headaches in the world of computing is security. Hackers are constantly adopting increasingly sophisticated ways of compromising businesses. For every new layer of security developed, there seems to be a new counter-measure, or vulnerability, discovered and exploited by malicious software programmers. While an outsourcing company may not catch absolutely everything either, a reputable company will at least be making every effort to apply the latest patches available for keeping things secure.

  • The Bottom Line

With all the personnel required for support of your company’s infrastructure supplied by an outsourcing agency, your own personnel is freed up to carry out the other important aspects of your business. Even the very expensive Helpdesk function is removed from consideration and managed off-site with perhaps even greater effectiveness.

Getting started with an outsourced solution can be as simple as reaching out to an experienced and reputable IT consulting firm, which would then perform a thorough IT network evaluation at your site. This will establish a baseline for the level of support that your company would need, and can be the basis for ongoing discussion.

IT strategy is key and must be managed by an expert able to guide the business over the short and long term. Call the expert consultants at JENLOR today for all your IT solutions.

Network Backup – Is it Needed?

Network backup is essential to ensure the security of your business and all of its assets. While there are many ways in which one can back up their business information, the important part is that you store your information and data in a way where it cannot be lost and you can maintain business as usual. Depending on the type of industry you are in, disaster recovery management is an essential part of your IT strategy.

If you do not utilize a data backup service, or have in place a plan for regularly managing both onsite and offsite backups of your critical data, you may be at great risk for data loss. You need to understand the importance of backing up your data networks on a consistent and regular basis. There are many examples of how not backing up data has harmed a business. More importantly, there are many examples showing how routine backups have improved the operations of a company.

The importance of Network Backups

There are multiple reasons to adopt network backup for your business. Managing backups for multiple computers and network-attached devices can be a chore when you’re using physical storage devices, tape drives, or are manually backing up each device separately. Here are a few reasons why you should invest in Network Backups:

  • Automates your backups – By introducing network backup, you’re simplifying your backup processes. If you choose a public backup provider to manage your backups, your backup software will automatically backup all of the devices included in your network.
  • Reduces human error – If your company’s data resides in multiple computers, network backup is essential. Remembering to schedule backups for multiple computers makes your business prone to error.
  • Makes storage more scalableBecause the data is sent to one, secure location, network backup is more manageable and scalable than attaching tape drives to each computer system.

The Process Involved in Performing Network Backups

Backing up your data provides you with an insurance plan. What this means is that you have the ability to create a working duplicate of your network available to you in the event that disaster strikes. Conditions that may be beyond your control, such as natural disasters or unauthorized intrusions (such as the introduction of an enterprise virus that is designed to take down your system) can not only wreak havoc on your operations but also result in the loss of money and time as you work to restore your network.

Steps to Take to Ensure Your Network’s Security

In order to reduce the risks associated with the loss of your network data, you need to have in place a plan. Your plan should include a process that requires the backup of your network data at regular intervals. A point person, whether it is the head of your IT or other professional responsible for the management of your data, should be appointed and empowered with the abilities to make decisions and be held accountable for the management of your backups and disaster recovery management plans. Additionally, you should understand that any plan for the management of your data should involve offsite backups. Maintaining your data at a remote location allows you to gain access when needed in the event of a disaster event.

Don’t leave your business vulnerable to cyberattacks, hacks, and other threats. Create a safety net that protects all of your business’s data by getting in touch with JENLOR. Our backup and disaster recovery services help you better safeguard your data, both locally and offsite, in the event a disaster was to occur.  With your data backed up and a plan in place to recover it, your business is free to operate with confidence, knowing that you are prepared for anything the web can throw at you. Start building up your backup plan today with help from JENLOR.