Microsoft Office 365 and Email Security

Microsoft Office 365 and Email Security

INSIGHTS

Microsoft Office 365 and Email Security

GARY NEWTON, LUTZ TECH SHAREHOLDER

 

Microsoft Office 365 is a subscription-based service that features email and collaboration tools for business. Some plans include popular Office applications, all hosted on Microsoft’s Cloud so they are easily accessible anywhere with any device. Along with an explanation of the many benefits of using Microsoft Office 365 for your business, this blog will cover strategies to help you improve your email security.

 

The Benefits of Using Microsoft Office 365

Plans are offered with multiple subscription levels to businesses, nonprofits, and educational institutions. Premium plans include local installation capabilities of Microsoft Office desktop applications; including Outlook, Word, Excel, and PowerPoint. Subscribers also receive free upgrades to the current version of the applications, as well as access to web versions of the Office Suite. 

Microsoft OneDrive

OneDrive is Microsoft’s personal cloud storage for users. It includes 1TB of storage per user accessible from anywhere an internet connection is available. OneDrive makes collaboration among employees more seamless, even outside of office hours or while traveling.

Microsoft Hosted Exchange Mail Services

A major benefit of Exchange Online email services is that it runs on Microsoft’s Azure redundant Cloud Data Centers. Even if your office network is down, you still have the ability to send and receive emails with your staff and clients. In addition, each user is allotted a 50GB mailbox, so space is not a concern.

 

Email Security for Office 365

Securing your organization’s email is more important than ever. Microsoft 365’s addon, Advanced Threat Protection, includes anti-phishing capabilities that can detect email spoofing by hackers.  Email rules can be set up to notify an administrator when attacks have occurred.

Email Encryption

Email without encryption can be easily intercepted. Office Message Encryption (OME) protects sensitive emails by encrypting the message so it cannot be intercepted and read by unintended parties. OME lets you send encrypted emails to any email address and encrypt all messages within a conversation. When sending sensitive information via email, especially to recipients outside of your institution, Office 365 Message Encryption is a common-sense step toward protecting email communication.

 

Security Starts with the End User

Email security starts with you and every member of your team employing best practices.

  1. Never give anyone your username and password unless you requested a change from an administrator.
  2. Make sure no one can see the login information you enter on the screen, whether in a public area or the workplace.
  3. Do not open emails from senders you don’t know, and never click on unknown links.
  4. Before clicking on any link, check that the address matches the address of the actual website by hovering over the link with your mouse.

 

Use Free 2-Factor Authentication With Microsoft 365

Microsoft 365 subscriptions come with 2-factor authentication, which provides an extra layer of security when logging in to applications. It should be used regularly, especially with business email accounts.

Authentication works like this.

  1. Login to a website with a username and password.
  2. Before the login completes, you will receive, depending on your settings, a text message sent to your phone with a randomly generated code that must then be entered to successfully log in.

 

Microsoft Office 365 is Software as a Service subscription that provides communication and collaboration tools for businesses.  It has the redundancy and security to be a valued member of your IT infrastructure. 

ABOUT THE AUTHOR

402.496.8800

gnewton@lutz.us

GARY NEWTON + TECHNOLOGY SHAREHOLDER

Gary Newton is a Lutz Tech Shareholder with over 30 years of experience. He focuses on providing outsourced technology services by managing and designing network solutions for new and existing clients.

AREAS OF FOCUS
  • Outsourced IT Services
  • Small to Medium Business Technology
  • Virtualization Design (Vmware & Hyper-V)
  • Disaster Recovery
  • Business Continuity Planning
  • Multi-Site Connectivity (Cisco, HP, MPLS)
  • Thin Client Technology (Terminal Services, Citrix)
  • Hosted and Published Application Design
  • Technology Consulting
  • Planning / Licensing Compliance
AFFILIATIONS AND CREDENTIALS
  • Certified Virtualization Expert v5.0
  • Vmware VSP 6.0 Certified
  • Veeam VMSP Certified
  • Microsoft Licensing Education
  • Microsoft Sales and Marketing Education
EDUCATIONAL BACKGROUND
  • BS in Electronics Engineering Technology, University of Nebraska, Omaha, NE
COMMUNITY SERVICE
  • Local Youth Select Baseball Team, Coach and Instructor for 10+ years
  • ITT Advisory Board, Past Member

SIGN UP FOR OUR NEWSLETTERS!

We tap into the vast knowledge and experience within our organization to provide you with monthly content on topics and ideas that drive and challenge your company every day.

Toll-Free: 866.577.0780  |  Privacy Policy

All content © 2018 Lutz & Company, PC

OMAHA

13616 California Street, Suite 300

Omaha, NE 68154

P: 402.496.8800

HASTINGS

747 N Burlington Avenue, Suite 401

Hastings, NE 68901

P: 402.462.4154

GRAND ISLAND + NORTH 

403 Lexington Circle

Grand Island, NE 68803

P: 308.384.9910

LINCOLN 

601 P Street, Suite 103

Lincoln, NE 68508

P: 531.500.2000

GRAND ISLAND + SOUTH

2722 S Locust Street

Grand Island, NE 68801

P: 308.382.7850

3 Reasons Why Technology Is An Investment

3 Reasons Why Technology Is An Investment

INSIGHTS

3 Reasons Why Technology Is An Investment

GARY NEWTON, LUTZ TECH SHAREHOLDER

Technology is necessary to succeed in today’s workplace. You invest in the right people and equipment for your business, so why wouldn’t you invest in technology? You might think it’s an unnecessary cost, but the truth is: technology is an investment. Here are three reasons why.

1. Staff Productivity

If you remember what it was like to work without today’s technology, you know how time-consuming even the simplest of tasks were. Hard copies of everything, finding the space to store and organize paper documents, sending invoices and letters through snail mail: these all took time and manpower just for everyday tasks. Tech innovations and up-to-date equipment have sliced through the time and effort needed to accomplish operational tasks, freeing up valuable time for your staff to be even more productive at what they do best. And, with quality equipment, there’s less downtime, so staff don’t have to waste time waiting for repairs.

When employees are happy, they are much more likely to stay with your company. Investing in technology drives retention rates higher than many other strategies. Here are just a few of the ways technology can boost productivity and employee retention rates:

  • Workforces become mobile: Employees can get the job done no matter where they are. Tech allows them to communicate, save documents, place orders and deal with challenges while on the go, from home offices and while they travel.
  • Organization and time-tracking is a breeze: Staff can stay on track with mobile and online productivity tools and keep track of progress both for themselves and for their teams.
  • Networking is always available: With social networking sites like LinkedIn, employees are always building and nurturing business relationships for your company’s success.
  • Distractions fall by the wayside: With focusing tools like timers and website blockers, staff can stay focused on the task at hand and get more accomplished.

2. Your Client Experience Flourishes

It doesn’t matter what type of business you run, customer service is always critical to your success. Customer service technology is skyrocketing right now and will only keep improving. Having a highly functioning website with quality services serves you and your customers right. Innovations like portals, chatbots and social media integrations mean your customers don’t have to wait to find what they want. The quicker clients can get information, the more likely you are to retain them for product sales or services. Here are a few ways technology wins customers and retains them:

  • FAQs are answered with grace and ease
  • Products and services are easier to find and order
  • Tech support is just a click or tap away
  • Messaging means real-time customer service

3. Gain a Competitive Edge

Finally, technology can help your business get an edge in the marketplace. Automation through technology assists with internal and external business affairs. From accounting and human resources tools all the way through product distribution and service fulfillment, tools like Artificial Intelligence, real-time reporting and custom applications can give you an advantage over your competition. Some of the advantages include:

  • Gaining deeper insights through news monitoring, media lists, and research into trends and movements
  • Replacing low-level cognitive tasks such as scheduling, reviewing emails, manual spreadsheets and setting reminders with high-level tasks like identifying connections and analyzing correlation production data
  • Providing real-time reporting to staff and clients
  • Making marketing more intelligent and focused
  • Integrating workflows between applications for higher efficiency and productivity
  • Increasing engagement with potential and current clients and increasing retention rates

Providing your business with technological innovations isn’t just the cost of doing business; it’s an investment you can’t afford not to make. Invest in technology and you’ll see the changes not only today, but in the successful future you’ve always dreamed of.

ABOUT THE AUTHOR

402.496.8800

gnewton@lutz.us

GARY NEWTON + TECHNOLOGY SHAREHOLDER

Gary Newton is a Lutz Tech Shareholder with over 30 years of experience. He focuses on providing outsourced technology services by managing and designing network solutions for new and existing clients.

AREAS OF FOCUS
  • Outsourced IT Services
  • Small to Medium Business Technology
  • Virtualization Design (Vmware & Hyper-V)
  • Disaster Recovery
  • Business Continuity Planning
  • Multi-Site Connectivity (Cisco, HP, MPLS)
  • Thin Client Technology (Terminal Services, Citrix)
  • Hosted and Published Application Design
  • Technology Consulting
  • Planning / Licensing Compliance
AFFILIATIONS AND CREDENTIALS
  • Certified Virtualization Expert v5.0
  • Vmware VSP 6.0 Certified
  • Veeam VMSP Certified
  • Microsoft Licensing Education
  • Microsoft Sales and Marketing Education
EDUCATIONAL BACKGROUND
  • BS in Electronics Engineering Technology, University of Nebraska, Omaha, NE
COMMUNITY SERVICE
  • Local Youth Select Baseball Team, Coach and Instructor for 10+ years
  • ITT Advisory Board, Past Member

SIGN UP FOR OUR NEWSLETTERS!

We tap into the vast knowledge and experience within our organization to provide you with monthly content on topics and ideas that drive and challenge your company every day.

Toll-Free: 866.577.0780  |  Privacy Policy

All content © 2018 Lutz & Company, PC

OMAHA

13616 California Street, Suite 300

Omaha, NE 68154

P: 402.496.8800

HASTINGS

747 N Burlington Avenue, Suite 401

Hastings, NE 68901

P: 402.462.4154

GRAND ISLAND + NORTH 

403 Lexington Circle

Grand Island, NE 68803

P: 308.384.9910

LINCOLN 

601 P Street, Suite 103

Lincoln, NE 68508

P: 531.500.2000

GRAND ISLAND + SOUTH

2722 S Locust Street

Grand Island, NE 68801

P: 308.382.7850

The Internet of Things (IoT): A Beginner’s Crash Course

The Internet of Things (IoT): A Beginner’s Crash Course

INSIGHTS

The Internet of Things (IoT): A Beginner’s Crash Course

ALEX LUTZ, LUTZ TECH SERVICE MANAGER

You know more about the Internet of Things, or IoT, than you may think. While the term sounds futuristic, almost everyone is already using IoT on a daily basis. IoT simply refers to items that contain software, sensors, electronics, etc. that allow them to connect with computers or each other and “talk.”

In the past, this type of connectivity was limited to your computer, smartphone, and tablet. Now, many previously “dumb” items, like your thermostat, can adjust themselves or accomplish tasks that you used to do. A number of IoT devices exist that help individual consumers and various industries. Understanding what they are and how to use them can only enhance your life.

 

Consumer or CIoT

The Consumer Internet of Things refers to computerized devices that make your own life easier. You may already have a smart TV with advanced streaming ability, a car with numerous computerized elements, and home control devices. Members of your family may wear health-tracking devices that transfer information to your computer for storage and assessment. Perhaps you wake up to music provided by Siri or Alexa.

Home automation devices are a popular part of CIoT. Your smart home may include several devices that are connected through a central hub. You can control your HVAC system by setting different temperatures for nighttime and daytime. Lighting and home security can also be pre-set or controlled remotely. Other devices include leak detection, child and pet monitoring, and air quality control. Consumers are really just beginning to see how CIoT can affect their lives. By 2020, you will see more and better uses of this technology in your home. Experts predict artificial intelligence will become more pervasive, routers will become “smarter,” and approximately 21 billion connected devices will exist.

 

Enterprise IoT

The most significant applications of IoT may be in the business sector. Some of the applications are those that individual consumers use, such as control of HVAC systems in offices and manufacturing plants to cut facility expenses. The truly exciting Enterprise IoT may come in manufacturing automation. For instance, IoT can be used to “manage parts and perishables and also prevent counterfeit products.”

The future of EIoT may include smart refrigeration units that will notify staff what needs restocking and when. This technology may also help track food consumption trends and health issues among segments of the population. EIot can also be used to determine the best routes for trucks moving products, saving manufacturers time and money. The healthcare industry is already using EIot to monitor hand hygiene practices as well as a number of patient vital signs.

 

IoT Big Data

For some in the field, data is the main goal of IoT devices. They provide a constant stream of information about consumers or manufacturing practices that begs for advanced analysis in order to make improvements in almost any process. IoT can provide mobile geolocation data, product usage data, social media data and records of operations in software applications.

 

IoT Security

Unfortunately, IoT devices are vulnerable to hacking, as are all computerized items. That’s why many experts are focused on improving both individual and enterprise security in this area. They recommend that every IoT device allowed on your network meet security standards and that you use network segmentation as much as possible. Of course, IoT devices have to be able to talk to each other, so isolating them from your main network can be problematic.

The Internet of Things has already come into homes and businesses, but it promises to explode in the coming few years. IoT can simplify everyday life as well as enhance business practices and production. The data it provides can offer valuable insight into consumer behavior and manufacturing plants. While security is an issue, IoT is on the rise and will inevitably play a huge role in the coming years.

ABOUT THE AUTHOR

Alex Lutz + Lutz Tech + Omaha, Lincoln, Hastings, Grand Island

402.778.7941

alutz@lutz.us

ALEX LUTZ + SERVICE MANAGER

Alex Lutz is a Service Manager for Lutz Tech’s managed services team. He is responsible for service and technical escalations, as well as building processes and procedures to improve the quality of service on the MSP helpdesk.

AREAS OF FOCUS
  • Lutz Tech Helpdesk
  • Service and Technical Escalations
  • Technology
AFFILIATIONS AND CREDENTIALS
  • Cisco Certified Network Associate (CCNA)
  • Microsoft Certified Professional (MCP)
  • Microsoft Certified Technology Specialist (MCITP)

SIGN UP FOR OUR NEWSLETTERS!

We tap into the vast knowledge and experience within our organization to provide you with monthly content on topics and ideas that drive and challenge your company every day.

Toll-Free: 866.577.0780  |  Privacy Policy

All content © 2018 Lutz & Company, PC

OMAHA

13616 California Street, Suite 300

Omaha, NE 68154

P: 402.496.8800

HASTINGS

747 N Burlington Avenue, Suite 401

Hastings, NE 68901

P: 402.462.4154

GRAND ISLAND + NORTH 

403 Lexington Circle

Grand Island, NE 68803

P: 308.384.9910

LINCOLN 

601 P Street, Suite 103

Lincoln, NE 68508

P: 531.500.2000

GRAND ISLAND + SOUTH

2722 S Locust Street

Grand Island, NE 68801

P: 308.382.7850

The Dark Web

The Dark Web

INSIGHTS

The Dark Web

LUTZ TECH

Have you heard of the Dark Web? If not, you aren’t alone. It’s a collection of thousands of different websites that use various anonymity tools, such as I2P (Invisible Internet Project) and Tor (The Onion Router) to hide their IP address. The Dark Web is most well known as a black market for drug sales and trafficking stolen information.  This information can cover everything from people’s personal info (credit card numbers, SSNs, addresses, etc.) to corporate trade secrets and data leaks (email credentials belonging to a particular company). Conversely, the dark web also provides the ability for anonymous whistleblowing and helps to protect users from censorship and surveillance.

Due to the rise and the fall of the Silk Road, there’s been new light cast on the Dark Web in the past few years. After all, when a well-respected and reputable organization, such as “60 minutes” describes the Dark Web as being a vast, cyber underworld that makes up about 90 percent of the Internet, it’s definitely time for a refresher course.

Before diving in any deeper, it’s important to understand what the Dark Web is not. It’s not exactly vast, and it doesn’t make up 90 percent of the Internet. In fact, it’s not even really that secret.

The Dark Web is a collection of websites that can be publicly viewed using specialized web browsers like TOR.  This means that anyone has the ability to visit one of these sites, but it’s extremely challenging to determine where they are hosted – or who they are hosted by.  Since all traffic coming from the browser is sent to many remote destinations before the website, the evidence to prove your access becomes virtually untraceable.

 

Dark Web vs. Deep Web

Many news sites that mistakenly describe the Dark Web as making up 90 percent of the Internet and this isn’t the case. When this happens, the Dark Web is being confused with the so-called Deep Web.

The Deep Web is the collection of all websites available online that can’t be reached by a traditional search engine. While those unindexed sites actually do include the Dark Web, they also include more mundane content, such as poorly-secured dynamic pages (i.e., registered account profiles and registration-required web forums). These aren’t really the “scandalous” pages described by the news anchors on “60 Minutes.”

By contrast, the Dark Web-only accounts for about .01 percent of the total web. In fact, fewer than 10,000 Tor hidden services were recently counted, compared to the hundreds of millions of regular websites out there.

 

The Light Among the Dark

The Dark Web is most commonly thought of for more nefarious things, such as the sale of counterfeit documents, child pornography, weapons, and drugs. While all of those industries do use Tor for hidden services, not everything found on the Dark Web is actually that “dark.”

One of the initial higher profile sites on the Dark Web was WikiLeaks, which was a Tor hidden service. It was created with the goal to accept leaks from sources who wished to remain anonymous. The idea has now been adapted into an actual tool that is referred to as SecureDrop.

Being informed is one of the best ways to understand why the Dark Web is something you are best to avoid.

SIGN UP FOR OUR NEWSLETTERS!

We tap into the vast knowledge and experience within our organization to provide you with monthly content on topics and ideas that drive and challenge your company every day.

Toll-Free: 866.577.0780  |  Privacy Policy

All content © 2018 Lutz & Company, PC

OMAHA

13616 California Street, Suite 300

Omaha, NE 68154

P: 402.496.8800

HASTINGS

747 N Burlington Avenue, Suite 401

Hastings, NE 68901

P: 402.462.4154

GRAND ISLAND + NORTH 

403 Lexington Circle

Grand Island, NE 68803

P: 308.384.9910

LINCOLN 

601 P Street, Suite 103

Lincoln, NE 68508

P: 531.500.2000

GRAND ISLAND + SOUTH

2722 S Locust Street

Grand Island, NE 68801

P: 308.382.7850

Is Your Business Wi-Fi Secure?

Is Your Business Wi-Fi Secure?

INSIGHTS

Is Your Business Wi-Fi Secure?

DAN MENDOZA, LUTZ TECH PROJECT ENGINEER

The convenience, flexibility and agility that a business Wi-Fi network delivers make it an essential networking solution for most organizations today. However, these features can come at a price if the network is not secure. Unsecured Wi-Fi networks leave an organization open to attacks that could lead to the theft of valuable customer information and company data. Just last year, a flaw in the WPA2 protocol resulted in a cyber attack dubbed KRACK which compromised Wi-Fi security for thousands of organizations. Stolen passwords, hijacked traffic and malware were only a few of the issues experienced.

What’s required to avoid these vulnerabilities? Your organization needs a robust Wi-Fi security policy that will protect its network from unauthorized access; without compromising the network availability or productivity for authorized users. In this article, we’ll look at four best practices that will help you ensure your business’s Wi-Fi network offers the highest level of protection to your organization.

 

Which Encryption Protocol is Best?

One of the most important considerations when setting up a business Wi-Fi network is the encryption protocol your network will use. The Wired Equivalent Privacy (WEP) encryption protocol is no longer sufficient for a business network as WEP encryption keys can be cracked easily, often within minutes. WPA2, on the other hand, offers advanced protection that scrambles the encryption key and verifies that it stays the same throughout the data transfer process.

 

The Importance of Assigning an SSID

The SSID (Service Set IDentifier) allows you to set a name for your network so that it can be found easily by users and applications. Out of the box, all routers have a default SSID. This should be changed before your router starts receiving or transmitting any data. Hackers use what is known as a Rainbow Table to look up default SSID names for thousands of different router models. If a hacker can gain access to a wireless network through its default SSID it makes it easier to attempt to crack your WPA2 encryption. By giving your network an SSID that is difficult for unauthorized users to guess, you automatically add another layer of protection to your network.

 

Choosing a Robust Password for Your Network

Once you have created a strong SSID for your network, you will need to change the default admin password on your router to a strong password for your pre-shared key. Again, hackers can refer to a Rainbow Table to look up default passwords in the same way they can look up SSID names. The maximum length of a WPA2-PSK password is 64 characters, and you should look to create a long password that contains a combination of capital letters, numbers and symbols. Since most Wi-Fi devices create a cache of the password, users will usually only need to enter this password once. A good rule of thumb is to set your password to a length of no less than 16 characters.

 

Is Your Firmware Up to Date?

To ensure that your network is protected against the latest vulnerabilities, such as the KRACK attack, you should ensure that your Wi-Fi router’s firmware is up to date. Setting firmware to update automatically will ensure you are protected whenever your router vendor releases a critical patch or routine system update.

With these basic tips, you can begin the first step in securing your business’s network from future cyber threats. For additional information or questions, contact our Lutz Tech team see how we can help.

ABOUT THE AUTHOR

402.778.7975

dmendoza@lutz.us

Download VCF Card

DAN MENDOZA + PROJECT ENGINEER

Dan Mendoza is a Project Engineer at Lutz Tech with over four years of IT experience. He provides client network assessments, project coordination, and high-level technical support. Dan specializes in networking and anti-virus protection.

AREAS OF FOCUS
  • Technology
  • Networks
  • Cloud Platforms
  • Virtualization
  • Anti-Virus
AFFILIATIONS AND CREDENTIALS
  • Advance Network Technologies, CompTIA A+ Cerfification
THOUGHT LEADERSHIP

SIGN UP FOR OUR NEWSLETTERS!

We tap into the vast knowledge and experience within our organization to provide you with monthly content on topics and ideas that drive and challenge your company every day.

Toll-Free: 866.577.0780  |  Privacy Policy

All content © 2018 Lutz & Company, PC

OMAHA

13616 California Street, Suite 300

Omaha, NE 68154

P: 402.496.8800

HASTINGS

747 N Burlington Avenue, Suite 401

Hastings, NE 68901

P: 402.462.4154

GRAND ISLAND + NORTH 

403 Lexington Circle

Grand Island, NE 68803

P: 308.384.9910

LINCOLN 

601 P Street, Suite 103

Lincoln, NE 68508

P: 531.500.2000

GRAND ISLAND + SOUTH

2722 S Locust Street

Grand Island, NE 68801

P: 308.382.7850

5 Reasons Why Outsourcing Your IT is the Affordable Choice

5 Reasons Why Outsourcing Your IT is the Affordable Choice

INSIGHTS

5 Reasons Why Outsourcing Your IT is the Affordable Choice

JESSICA MURRAY, LUTZ TECH ACCOUNT MANAGER

When it comes to budgeting, your IT department can be one of the highest expenses on your balance sheet. To reduce costs, outsourcing can be one of the most affordable choices you make. Discover the five reasons why outsourcing your IT can effectively help your company save and grow over time.

 

1. Limit Expenses for Employees to Perform IT Functions

Hiring and training an IT staff can quickly add up. According to the Bureau of Labor Statistics, the 2017 median annual salary for computer support specialists was $52,810. Not to mention that figure rises with salary increases each year.

But your IT department isn’t limited to just tech support specialists. You must also consider the cost for system analysts and network administrators. These roles cost even more with an estimated annual salary of $81,100 and $88,270, respectively.

It’s unrealistic for one IT member to handle an infrastructure project that takes 300 hours to complete while also taking service calls. However, when you outsource your IT, you can limit these costs and foster operational efficiency. You will be able to allow your team to focus on conducting infrastructure projects without sacrificing being able to address typical service calls.

In addition, if you lack the training required to vet your IT staff, it’ll be challenging to ensure you’re selecting qualified tech candidates. When outsourcing, the training and vetting are already done for you. This helps give your enterprise the leverage needed to increase productivity within the IT department.

 

2. Better Cost Management Controls

It’s important to make sound decisions when it comes to your business’s technology budget. You want to ensure your operations are running smoothly without breaking the bank. Without the right experts, it’s easy to make poor IT decisions that could become detrimental to your budget over time. But, when you outsource, you get access to expert IT advisors with the proper training and experience required to help you make better-informed technology decisions.

 

3. Free Up Resources

Leveraging expert outsourced IT services helps you free up resources that may already be stretched. Instead of having your IT team focusing on administrative tasks, they can focus on your core competencies or vital projects.

 

4. Cut Operating Costs

Outsourcing your IT requires less overhead costs, which will help you stay within your departmental budget. You’ll be able to leverage bulk pricing options for your software and hardware purchases and won’t have to hire as many employees to keep operations running.

 

5. Reduce Risk

Every IT system is at risk of a data breach or ransomware threat, but without cybersecurity experts or knowledgeable IT members continuously monitoring and updating your system, your risk of a breach increases. Outsourced IT services can help you mitigate these risks.

A reputable outsourced IT staff will be equipped with the security and compliance knowledge required to combat data breaches and prevent these incidents. They will provide the appropriate preventive measures needed to safeguard your data and equipment. Additionally, you will be able to leverage their expertise in conducting updates, patches, backups, and virus scans yourself.

 

IT budgets increasingly face constraints as expenses rise. But with the help of outsourced IT services, you can keep these costs at bay.

ABOUT THE AUTHOR

402.514.0000

jmurray@lutz.us

LINKEDIN

Download VCF Card

JESSICA MURRAY + ACCOUNT MANAGER

Jessica Murray is an Account Manager at Lutz Tech. She has over 5 years of experience in the technology field. Jessica is a trusted advisor that sees clients through the full sales cycle. Her responsibilities include developing proposals and providing recommendations to clients to assist them in reaching their business goals.

AREAS OF FOCUS
  • Client Relations
  • Technology
EDUCATIONAL BACKGROUND
  • BS in Management Information Systems, Briar Cliff University, Sioux City, IA

SIGN UP FOR OUR NEWSLETTERS!

We tap into the vast knowledge and experience within our organization to provide you with monthly content on topics and ideas that drive and challenge your company every day.

Toll-Free: 866.577.0780  |  Privacy Policy

All content © 2018 Lutz & Company, PC

OMAHA

13616 California Street, Suite 300

Omaha, NE 68154

P: 402.496.8800

HASTINGS

747 N Burlington Avenue, Suite 401

Hastings, NE 68901

P: 402.462.4154

GRAND ISLAND + NORTH 

403 Lexington Circle

Grand Island, NE 68803

P: 308.384.9910

LINCOLN 

601 P Street, Suite 103

Lincoln, NE 68508

P: 531.500.2000

GRAND ISLAND + SOUTH

2722 S Locust Street

Grand Island, NE 68801

P: 308.382.7850