10 Reasons To Upgrade To Microsoft 365 Today


A shift in telephony years in the making is nearly here: Plain Old Telephone Services (POTS) are shutting down in August.
Copper telephone lines, which mostly serve businesses fax machines, fire alarms, security alarms, emergency phone systems, and other legacy systems, will need to be updated or replaced by August 2, 2022, according to FCC Order 10-72A1.


In 2019, the FCC issued Order 19-72A1 that removes protections that allowed services like POTS to continue being used. This order removed those protections after a three-year period, which expires on August 2, 2022.
With less than five months until copper wires must be completely phased out, small businesses, rural businesses, those who use fax machines, copper-based fire and security alarms, and more need to be prepared to plan and act accordingly. If they don’t, they may run into major problems at the end of this summer.
POTS Replacement SolutionsThe team at Sovran, led by President Traci Leffner and vCIO Shonn Twight, is ready to help you avoid problems with the switch from copper. Our excellent engineers are ready to help your business maintain lines of communication and safety.
We know it’s painful to change equipment, but fiber and coaxial lines may be cheaper than copper in some cases.
Talk with our team today at (651) 686-0515 or fill out our contact form to get ahead of the curve and find the best solution for your business.

Cyberattacks and data breaches happen worldwide, and no one is immune. Your business needs to protect its networks and systems, and secure sensitive data.
But how much do you know about the types of cybercriminal out there? This roundup discusses the biggest threats and what they’re after.
Online crime is a lucrative industry. Cybergangs go online to offer “crime as a service.” Their targets vary and can be spread out globally.
In 2019, one international crime gang stole $100 million from more than 40,000 victims. Culprits were found in the US, Bulgaria, Germany, Georgia, Moldova, and Ukraine. Victims included small businesses, law firms, international corporations, and nonprofits.
Many of these bad guys may have started out in the digital environment, but well-established street gangs are turning their attention to cybercrime too.
Typically well-funded and -organized, cybergangs work long-term to mount large-scale attacks. They target banks, law firms, healthcare networks, and other big businesses.
Still, small businesses can be targeted by cybercrime gangs. You could be the first domino to compromise a larger, more lucrative target in your supply chain.
One nation pays an individual or group to target another country. On the digital battlefield this could mean:
Australia recently announced a “sophisticated state-based cyberattack” on political and private-sector organizations.
State actors also used cyber techniques to damage Iran’s nuclear program. They left an infected thumb drive in the parking lot. A well-meaning staffer found the USB and plugged it into the facility computers. The virus caused Iran’s fast-spinning centrifuges to go into overdrive.
These attackers are often motivated by nationalism, but this doesn’t mean businesses are safe. A politically motivated cyber actor might target a hotel hosting an international convention or gain access to a government vendor to send false communications.
Also known as disorganized crime, this is the online equivalent of a petty thief. Many make their income stealing money from low-hanging targets.
Some Lone Wolves are only interested in proof-of-concept: hacking into businesses and governments to see if it’s possible, without doing any damage once they are inside.
Now that you better understand why your business might be targeted, it’s time to take the necessary steps.
A managed service provider can help solidify your cybersecurity stance. Our experts can set up email security, remote access management, anti-malware scanning, and more.
Talk to us about your cybersecurity options today at (651) 686-0515 or fill out our contact form!

It’s tempting to hire an in-house IT technician to take care of your network and set them up with a cozy office just down the hall, but is it the right decision for your business?
If you’re like most businesses, you’re always on the lookout for ways to save money while improving results. Sometimes this means expanding your staff to include a team of tech specialists at your beck and call, but this can often be an unnecessary expense that leaves you with highly paid employees twiddling their thumbs all day.
For SMEs who are looking for the best of both worlds, we recommend Managed IT services.
Put simply, Managed IT is our solution which gives you that team of specialist technicians and network experts, without the ‘quick, look busy’ element – and at a fraction of the cost.
Naturally, you’d rather see your IT budget working to support your growth and kept as low as possible. That’s our focus too, and why we don’t simply maintain and repair your systems, we proactively monitor to avoid downtime and work with you to ensure your IT increases productivity and efficiency.
Whether you already have in-house IT and are auditing the value, or are curious about what having IT support might be like for your business, we’ve put together a few factors to consider before making your choice:
Most employees work 9-5, but what happens if something goes wrong with your systems outside these hours? Your in-house technician won’t appreciate being woken at 1am and called in for emergency repairs. It’s more likely that they simply won’t answer the call (or hear it), or if they do, expect some hefty contract renegotiation come 9am.
Managed IT is very different as we expect problems after hours and have support technicians ready. We know that every minute of downtime is affecting your revenue, plus your business reputation, so we prioritize getting your systems up and running asap. As a bonus, with our Managed IT these types of disasters are rarer as we’re constantly monitoring and
One of the things that may have attracted you to having an in-house technician is the cost. But while you may be able to pay them a lower hourly rate, there are extra costs like hiring, training, ongoing training, healthcare and retirement.
Once you start adding up the cost of an in-house technician, you might find it’s eating up your IT budget and leaving you scrambling to fill gaps you didn’t expect. Upgrades get delayed, opportunities missed, and IT expenses become a sore point. In comparison, Managed IT is one fixed monthly rate delivering enormous value, including access to specialists across all software applications and technology.
Putting aside the fact your technician will often spend entire weeks away upgrading their skills and leaving you scrambling for support while they’re gone, those training costs quickly add up. With a salaried technician, you’ll have to pay all ongoing training and certification costs, plus travel costs for industry conferences.
We know how important it is to remain current, certified and skilled in new technologies, so we spend the money to invest in ourselves so we can serve you better. We’re part of industry related communities and attend multiple conferences each year, all at our own expense.
sFor most employees, a higher wage is the goal and many will job-hop to achieve that. A salaried tech may be looking for the first opportunity to leave and get paid more, often leveraging all the training you’ve just provided.
In these modern times, switching jobs regularly is expected, with an average of only 3 years in each position. Considering how much it costs your business to acquire, train and upskill your technician, 3 years is an unreasonable ROI. Our goals couldn’t be more different – we only aim to keep you a happy customer for as long as we can!
In the end, your business needs to find the right balance between profit and expertise. When you partner with our Managed IT, you’re securing availability, ever-increasing expertise and commitment to your success. We work closely with you to provide the very best support and protect you from costly disasters, taking preemptive action to keep you safe and operational.
There’s no doubt Managed IT is a better decision than hiring an in-house technician, and we’d be delighted to prove it to you.

Perhaps you’ve been relying on free software from Gmail, Outlook, or Dropbox. Who can argue with free email, calendars, collaboration and file storage right? Well, it may be time to upgrade to the business versions of the software your team relies upon.
Move from Gmail to Google Apps, or Outlook to Microsoft 365, or Dropbox to Dropbox Business. For a small monthly fee, you gain business-grade features.
The basic Google Apps offers business email, video and voice conferencing, secure team messaging, shared calendars, 30GB cloud storage and document, spreadsheet and presentation creation. Plus, you gain greater security and administration controls. Right now, a disgruntled employee could refuse to give up control of a business account.
You’d be out of luck. With Google Apps, your business would control all accounts and could simply reset the password.
Or Dropbox Business provides added storage space and user activity and sharing auditing. Unlimited file recovery and version history make recovery easier. A remote wipe feature protects files on a stolen device).
A consumer grade backup setup was enough when you were only dealing with one computer. Now that you have many computers, it’s worth enhancing your backup strategy.
With 3-2-1 backup, your business has a minimum of three backups. Two would be onsite (but separate from one another) and the other offsite. We recommend the cloud. Having your backups in a unified location helps efficient recovery if disaster strikes. With cloud backup, your data is encrypted for storage in the cloud. You can set parameters for how often data is backed up and confirm that it is backing up correctly. Then, if something does go wrong, you can access essential data from anywhere, anytime via the cloud.
Traditional small business accounting software requires a large database on the desktop computer. As more people need access to the database, the problems start. With multiple people accessing the accounting software:
Cloud-based accounting packages address these challenges. With online accounting software, it’s easy for your business to scale. Business owners can connect to the data from any device with an Internet connection. Plus, in the event of a disaster, productivity won’t suffer as the information is safe and secure on the cloud.
Your expanding technology allows you and your staff to do more than ever before. Great. But it also takes extra resources to monitor, manage, and secure it all. By outsourcing IT, your business gains IT expertise. Meanwhile, your in-house IT team can focus its efforts on driving growth.
Outsourcing IT also provides long-term cost savings by reducing downtime, cutting infrastructure costs, and improving security to avoid costly cyber-attacks.
Keep your business growth in check with an eye out for value-adding initiatives.
Talk to us about your cloud services options today at (651) 686-0515 or fill out our contact form!

Every time you save or retrieve files from another computer or network storage device, file transfers have to be made over the network.
Depending on your IT setup files can pour over the network with the ferocity of a fire hose, or trickle between machines as if dripping through a drinking straw. Poor network speeds are often a critical bottleneck that slows down the entire IT system.
If a slow, frustrating, and unreliable network sounds like your office setup then there are many available solutions we can use to help.
Often, offices maintain networking hardware that is as old as the premises they are in or the businesses themselves. Components can be left in place long after their suggested expiration date. If it isn’t broken, don’t fix it commonly rules as long as some working connection, however slow, still remains.
Yet, outdated hardware in key areas can often slow the entire system down. Even when the rest of the network is capable of ultra-high speeds, a single bad component can bring the entire network to a crawl.
Sometimes if it isn’t broke, it still might not be working to its full potential. Even peripheral devices throughout the network can cause traffic to slow. A badly installed device may become lost from the network or send out an overwhelming number of messages that spoils network traffic.
Defense against errors and vulnerabilities is more simple than many think. Often just one or two small upgrades is all that is needed to unlock the full speed potential of the network.
Moving resources outside of the office can work for many businesses too. Where high speed, low-cost internet services are available, moving your work into the cloud can be a highly cost-effective solution. Software packages such as QuickBooks offer finance and accounting packages for operating in the cloud. Similar Suites such as Microsoft Office offers services for creating and sharing documents with cloud resources. Both packages eliminate the need for many of the network operations that we use every day.
For many applications such as QuickBooks huge databases sometimes gigabytes in size are required. It is these types of applications where the advantage of the cloud becomes clear. To use this locally, huge database transfers keep the application up-to-date daily. These transfers across a local network are time-consuming and clog up vital resources for the firm. Yet, the same application in the cloud requires only a simple web page for each user. Instantly, looking up finances and editing documents becomes as simple as checking your email. With services moved to the cloud purchase cost and maintenance of expensive network hardware are reduced too.
A complete network solution that works to make the most out of all the available resources is unique to every business. Only a tailored solution to address your network needs will increase your productivity.

It’s impossible to predict when and where (or how) a social engineer will strike. The above attacks aren’t particularly sophisticated, but they are extremely effective. Your staff have been trained to be helpful, but this can also be a weakness. So what can you do to protect your business? First, recognize that not all of your employees have the same level of interaction with people – the front desk clerk taking calls all day would be at higher risk than the factory worker, for example. We recommend cyber-security training for each level of risk identified, focusing on responding to the types of scenarios they might find themselves in. Social engineering is too dangerous to take lightly, and far too common for comfort.
Talk to us about your cyber security options today at (651) 686-0515 or fill out our contact form!

Image of conference room with screen at head of table and six chairs for meetings.
Business meetings can be a double-edged sword. Often they are as likely to rally staff and build momentum as they are to halt progress and kill productivity.
Productive meetings are key to keeping team members on track and everyone on the same page. A poor meeting is as harmful to the progress of a project as losing multiple members of staff.
Making meetings better is important for good business. There are tools and techniques to make sure that your meetings are not standing in the way of your business.
One of the biggest hurdles to planning a meeting can be simply booking a space. Finding an available room, with the right equipment, in a time and place which everyone can agree on can be a logistical nightmare. Repeated emails back and forth to agree on the venue alone can consume hours out of the day.
There are technical tools available to help. Outlook’s scheduling assistant can be a great place to start. The office package is designed to help you find a time and place convenient for everyone.
The software is a key, but underused, component within Microsoft 365. Simply adopting a scheduling assistant can cut down meeting planning from hours to minutes.
With everyone fully connected and on the same page, every meeting is improved from the first minute. The scheduling assistant can be found under New Items > Meeting in the Outlook home tab.
Of course, not all meetings are internal affairs. Often, a successful meeting involves staff members from third-party organizations, clients, and consultants too.
This is a prime area for technology tools to help. Tools such as FindTime and Doodle.com both serve as scheduling assistants to arrange suitable times and locations to coordinate meetings with multiple parties.
The process is simple, each party selects available or desired times to meet. This process is done independently and based on priorities for each user. When everyone has added their input a mutually convenient slot can be found for everyone.
With modern technology there’s no reason to spend hours, or even many minutes, wrestling over when and where to meet. Using the tools as they are designed cuts out a huge amount of overhead cost from meeting planning.
The most common complaint staff have about business meetings is the lack of available participation. Many show up, yet just feel like audience members.
When staff members feel their contribution or input to projects isn’t valued, it can lead to a dramatic drop in morale and much deeper issues within the firm.
Tools such as GoWall.com are changing meetings for the better and giving staff members a bigger voice. The site provides attendees with the resources they need to contribute to meetings without disrupting the flow.
The idea behind GoWall is very simple and highly effective. While concepts are communicated as part of a presentation or ongoing conversation, participants are free to contribute to an “idea wall” in real time. This shared wall contains ideas, contributions, and notes from all participants that add to the conversation.
Since ideas are shared between all participants, everyone can be inspired to contribute. This deceptively simple idea helps all members to feel they have a chance to have their voices heard and their contributions valued.
Meetings can be a difficult topic in some workplaces. Some firms have had historic failures and huge losses in productivity as a result of too many meetings running far too long. In some environments, formal meetings have all but been banned already.
Using modern technology solutions, we can put productivity back into meetings. Cut out the wasted time and get to the points that matter. With these simple yet highly effective tools, we can build meetings that create productivity instead of hampering it.
Contact us today at (651) 686-0515 or fill out our contact form!

We’re often guilty of spending the entire day stuck just in Outlook. In addition to taking up your time, there are a range of features that can help you make the most of it too. With simple tools and tweaks, you’ll be able to manage your calendar like a pro.
Microsoft 365 Calendar allows you to make quick changes, alter your diary, and update items on the go. The Calendar interface allows events and items to be picked up and moved to a different time or date with ease.
Many think of calendar packages in terms of old desktop applications of years gone by. Events, once input, were almost impossible to change, alter, or remove. In old applications it was easier to go without a calendar at all than attempt to use the one included.
The biggest advantage Office calendar has is the ability to access and update it from anywhere. With 2-way sync appointments, meetings, and events can be updated anywhere and accessed everywhere. The days of no longer being able to look at your calendar because you’re not at your PC are long gone now.
Today you can add events straight from your email with a simple click. Participants in events can be contacted with reminders automatically. You can even schedule your own reminders before the event too. Using your calendar to stay on top of your day has never been easier.
Microsoft 365 additionally offers OneNote too, an indispensable tool that you shouldn’t do without.
OneNote acts as a virtual notebook to keep your ideas, projects, and notes in line. Using OneNote enables you to power-up your text with drawings and diagrams, tailor your projects with color coding, and record your thoughts with media clips all in one location.
OneNote is the ultimate record keeping tool that you simply can’t go into a meeting without. Physical notebooks begin to seem like a relic of the past, limited by old constraints that no longer apply.
Included with Microsoft 365 is Microsoft’s To-Do application. To-Do offers simple, straightforward to-do list that makes it easy to plan your day.
Whether plotting your school work, planning your projects, or keeping on top of your home life, To-Do is designed to boost productivity and make the most of your time. The simple interface makes it easy to use and the instant reward for checking of tasks makes it well worth your while.
To-Do sorts your tasks into lists, which are combined into a single day view. The view of your day provides a clear, clutter-free list of tasks to be done. The application syncs with all your devices to give you access from anywhere. This empowers you to quickly add, change, schedule, and tick off tasks as you go.
Losing track of time is easy to do. It doesn’t take much before your day seems completely off-balance and impossible to retrieve. With these tools from Microsoft 365 and a tiny bit of planning, your days can become more productive than ever.
Back on track, you’ll no longer have to spend your free time making up for lost time. Your spare time will be your own again and everyone will wonder how you manage to remain so productive.
Give some tech tools a try today and you’ll wonder how you ever managed without them. Contact us today at (651) 686-0515 or fill out our contact form!

Getting new computers for your business is exciting, but what happens to the old ones? Depending on the age, some people sell them, others throw them out. That’s the easy part. The problem is the sensitive data on them. There are passwords, account numbers, license keys, customer details, medical information, tax returns, browser history…. the works! Each computer, whether laptop, tablet or desktop, contains a treasure trove of sensitive information that cybercriminals would love to get their hands on.
Unfortunately, hitting delete on your files doesn’t actually make them disappear, nor does waving a strong magnet over the drive. These mistakes have cost businesses millions of dollars over the years.
Most businesses are unaware that specialized data cleanup is necessary, others think calling someone to collect the computers will cover all the bases. A 2016 experiment proved just how dangerous the situation can be when they bought 200 used hard drives and found 67% held unwiped, unencrypted sensitive data, including sales projection spreadsheets, CRM records, and product inventories. Frighteningly, they didn’t need any special hacking skills to get this data, it was all right there and helpfully labelled. It’s also not surprising that with simple data recovery tools, people have also been able to access British NHS medical records and missile data, all waiting patiently on a discarded hard drive.
There are software tools you can get to do it yourself, as well as dedicated security firms, but your best option is to choose an IT business you know and trust. With that in mind, a methodical approach is required to ensure not a single drive is left untreated. You don’t want to leave data behind, or even clues that a motivated person could extrapolate any private information from. The approach might include using checklists to maintain security, or dedicated processes to guide each step in decommissioning. Careful records should also be kept, including who signs off on completion of the retirement, and where the computers are sent afterwards. A proper inventory and auditing process may slow the rollout of the new computers slightly, but it’s always better than having your old data come back to haunt you.
We can migrate any needed data, backup the information to your server or external drive, then wipe or destroy the hard drives for you. We can assess the age of your old computers and either dispose of them for you or point you in the right direction of computer recyclers. Plus, the quicker you dispose of your old computers, the easier the process will be. Recyclers will be able to send less of your equipment to landfill, and you’ll be less likely to forget how valuable the drive contents are.
Upgrading your business computers should be a happy time for you and your employees, so with a little forward planning, you’ll be able to keep everyone smiling and all your data secure.
Contact us today at (651) 686-0515 or fill out our contact form!