Blog

Microsoft Dynamics 365 Is Changing Again: Here’s What You Should Know

Microsoft Dynamics 365 is rapidly moving into new industries and sectors of business: Is Microsoft’s management software right for you?  

It’s time for even more Inspire conference news: Microsoft unleashed a bunch of new programs and plans for its partners, which means that customers can also expect some big changes down the road. One of the most interesting updates for end users was the announcement of new Microsoft Dynamics 365 features.

Dynamics 365, for those who haven’t heard the term, is Microsoft’s branding of its latest CRM tools. These tools are designed to share data across multiple aspects of business operations like sales, customer services, financial designs and more. It also adds in a healthy dose of automation to make sure forms are populated and analysis is enabled as quickly as possible. It’s a very smooth solution for growing businesses, and so partners have been interested in seeing just what’s up with Dynamics features and where the service is heading. The Inspire-connected July update answered these concerns with a host of new updates. To help out, we’re going to offer a quick guide on what’s new with Dynamics 365 and why it’s worth paying attention.

Partnership with LinkedIn

One of Microsoft’s biggest Dynamics announcements concerns a new partnership with LinkedIn to further the development of the Microsoft Relationship Sales app (part of the Dynamics suite). The Relationship Sales solution now taps into the LinkedIn Sales Navigator to help connect with a variety of buyers more easily, and analyze buyer data for better lead management. Basically, if you like using Sales Navigator or what it offers, you can access that data via Dynamics to gain the same benefits plus the other Dynamics features that you may want.

Why is this exciting? Well, Microsoft has indicated that LinkedIn is just the start. It would love to partner with other companies to provide additional social network data to help fuel Dynamics tools and make them easier to use, rather than having end users skip around from tool to tool to get all the information they want. Microsoft also makes the claim that this LinkedIn partnership offers a service that is about half the cost of similar competitive solutions on the market – a bold but very impressive claim if it holds up.

Dynamics 365 for Retail

Dynamics 365 already has a “For Sales” and “For Customer Service” section, among others, but Microsoft is adding a couple new sections to address farther-reaching needs among companies, especially B2C companies who may be looking for tools more in sync with their industries. The first is Dynamics 365 for Retail: Retail is made for managing store, employee, customer, inventory and financial document data. It focuses on POS activities that bring customer data to improve each transaction and helps managers analyze what sales trends really mean for customer engagement.

Once again Microsoft’s AI features are taken out and used to help automate as much data as possible so you don’t spend too long looking for everything you need. This also extends to shift schedules, shift assignments, and absence requests.

This is a very competitive field with a lot of excellent solutions aimed at small to mid-sized companies, so it will be interesting to see how Microsoft does here. Would you be interested in switching your Retail system if that promised compatibility with the Windows platform?

Dynamics 365 for Talent

Following up the Retail option, Microsoft is also offering a Dynamics solution for talent acquisition. Here the benefits of partnering with LinkedIn become especially obvious: Microsoft is able to use the LinkedIn Recruiter data to fuel “dynamic candidate profiles” which basically means you won’t need to keep visiting LinkedIn to find the necessary information about the latest batch of recruits – it will all be ported right to Talent.

Talent will also help with onboarding by providing important resources and training steps as needed for those just joining the company – a sort of introductory tool to ease them through the process. Microsoft also promises a consolidated HR profile for each employee that will take data from multiple sources to provide a full view of each worker, their current tasks, and their productivity.

Both Retail and Talent will be available summer 2017 for those interested in adopting Dynamics 365 solutions.

Application Update Summary

Along with new Dynamics solutions, Microsoft announced several updates to existing applications that the company thought were particularly worth noting.

First, Microsoft is expanding Dynamics into new geographical areas, updating its offerings for the UK and Canada, which is good news for clients and partners who may be waiting for a full rollout. This also includes new data centers in places like the UK and Germany, which sets Microsoft up to expand its services further in time.

Second, Microsoft has introduced a local business solution that allows companies to run Dynamics 365 for Finance and Operations in their own data centers, without the need to contact a provider. This is great for companies that have already invested in their own server setups but still want to use D365 for as much as possible.

Third, Microsoft is adding new prospect-to-cash integration, which is their way of saying that Dynamics can now share information between financial and sales departments. If those two parts of your company have had trouble communicating in the past, they may find it easier with D365.

Lots of Quality of Life Changes

One of the nice things about Dynamics is that Microsoft posts a list of current changes that are in development and changes that are likely to come to Dynamics in the future. Here, you can see that Microsoft has updated the software with significant amounts of integration and new forms to help out different kinds of companies. That includes expense management reports, Cortana compatibility, new forms for employee benefits, more YouTube compatibility…you get the idea. It’s tough to list all these updates, but it’s a good idea to check up on the list on occasion and see if any important features are included.

Do you have any further questions about Dynamics 365, or if could be of benefit to your organization? Why not ask someone with experience? InfiNet Solutions can help your Omaha business find the right services for your unique situation. Contact us at [email protected] or call us at (402) 895--5777.

Microsoft Dynamics 365 Is Changing Again: Here’s What You Should Know Read More »

Lack of Broadband Access in Rural America

Living in rural American often means lack of Internet access. Is it possible to get broadband in the country? What’s happening to fix the rural-urban digital divide?  

Internet Access Rural America

Currently, 34 million Americans don’t have access to broadband. If you’re used to lightning-fast speeds and quick downloads, it may be impossible to even imagine living without broadband or fiber optics, but for more than 10 percent of Americans, it’s their daily reality.

The majority of people without broadband live in rural areas. There, the lack of access directly hampers their ability to take advantage of the educational and entrepreneurial opportunities available online. Fortunately, there is hope for change, and many entities are working together to increase access in these areas.

In the meantime, however, there are effective ways to live, work and prosper in these areas, even without broadband access.

The Rural-Urban Digital Divide

In rural areas, 39 percent of residents can’t get broadband, but in urban areas, that issue only affects 4 percent of people. The digital divide doesn’t just mean that you can’t watch funny goat videos in the country, and if that was the only issue, who would care? It’s easy to get your own goat and watch his antics in person if you live out in the country.

The problem goes far beyond that. It’s not just entertainment that suffers. Education and business suffer as well. Even businesses not located in rural areas suffer—the lack of access means fewer online shoppers. Remember, these shoppers don’t have a lot of stores nearby, and as a result, they may need e-commerce even more than people in urban areas.

Problems With Lack of Access

Rural schools tend to have low-speed Internet connections and very high Internet costs. This means these students can’t tap into all the learning that happens online. From free online college classes to online college prep testing, these students are being left in the cold, and their schools (often already struggling with reduced funding due to comparatively low property taxes) are cutting into their budgets to afford the cost of a weak connection.

The problem affects businesses as well. New businesses are less likely to set up shop in these areas, even if all the other logistical factors are in place. Also, when entrepreneurs try to run a business in an area without Internet, they have to deal with a range of issues. Even something like increased downtime makes it challenging to have meetings online, download documents, use collaborative project-management software or do something as simple as run credit cards for payments.

The Internet in Rural America

Without access to broadband, rural users rely on slower, less reliable Internet options. Many areas have DSL, but when running over phone lines that are generations old, top speeds tend to be slower than 10 Mbps, and actual speeds tend to be a lot lower. Satellite Internet is an option in many rural areas, but access varies widely from place to place, and storms and clouds can reduce service.

Barriers to Entry

With millions of people, businesses, schools, nonprofits and others eager for rural Internet, it seems like Internet service providers would be rushing in to fill the gap. Why is that not happening? To put it simply, the cost is the main reason ISPs aren’t jumping into these areas.

To get started in rural areas, ISPs have to lay down cables. That creates huge upfront costs. In a densely populated area, those costs are defrayed by huge numbers of people signing up for service. Rural areas simply don’t have the numbers. Even if every single person and business in these areas signed up for service, there would not be enough subscribers to offset the cost of laying cable and entering the market.

Solutions to Lack of Broadband Access in Rural Areas

To improve access, private and public sectors are joining together to expand broadband into rural areas. Microsoft has pledged its support for the project, and in particular, the company’s Rural Airband Initiative seeks to work with telecom companies to bring access to 2 million rural residents by 2022. Microsoft also plans to stimulate investment through licensing, and spearhead digital training so rural residents know how to make the most of the Internet.

The Federal Communications Commission (FCC) also has plans to help expand access. The FCC has long been a critical driver for communication reform in rural areas, with the Universal Service Fund (USF) at the heart of those activities. Now, the FCC wants to expand the objectives of the USF to include broadband as part of the focus. The FCC wants to offset the costs of setting up cable and infrastructure for ISPs with the new Connect America Fund.

Thriving in Areas Without Broadband

If you run a nonprofit, work as a school administrator, oversee a library or engage with rural Internet as a consumer, the options can feel bleak, but there are things you can do. This advice also applies to freelancers and small businesses in these areas. First, for the sake of your organization, it’s critical to find out what’s available.

Provided you can hook up a landline, you can almost certainly get Internet over a digital subscriber line (DSL). Satellite may be faster, but that can vary from property to property based on trees and other obstructions. Expect to spend time investigating and trying out available options before you hone in on what works.

Once you’ve found an ISP, even if it’s not broadband, you need to take all possible steps to boost your speed. That can mean hard-wiring devices to your modem rather than using wifi, positioning the modem in an advantageous spot, or placing your satellite in the most optimal spot.

On top of that, consider getting involved. Find out about programs and grants that can help bring broadband access to your area. Advocate for those programs to take place in your area.

If you’re thinking about relocating to a rural area or if you’re currently dealing with the challenges of rural Internet, InfiNet Solutions can help. We serve residents throughout the Omaha area and beyond. Call (402) 895--5777 or contact us at [email protected] for more information today.

Lack of Broadband Access in Rural America Read More »

Screen Shot 2017 07 16 at 9.35.10 AM

Microsoft Office 365: Push Your Business Ahead of the Competition!  

Office 365 Services in OmahaThe most competitive businesses have shifted from working in an office to working in real time, anytime, and with anywhere collaboration and co-creation. They do this with clients, co-workers and others on a variety of devices.

To stay competitive, your business requires much more than you did even 5 years ago. You must employ current and effective technology solutions to stay on the cutting edge, and to capture, access and share data securely with others, from anywhere, at any time and with any computer device.  The best way to do this is with Microsoft Office 365. 

Office 365 is an amazing productivity tool.  It’s securely powered by the cloud and allows optimal communication.  It’s also installed on your local devices so you still have control—Your private information isn’t out in the public for everyone to access. You control who can view and edit your documents.

Download our free infographic on Office 365.

Microsoft Office 365 is the Future of Collaboration.

How can we say this?  Because:

There are 85 Million Monthly Active Users.

In 2016, this suite of productivity tools had a global monthly user base of 85 million.

There’s Been a 35% Increase in Office 365 Adoption.

Microsoft had a 35% increase in Office 365 adoption last year.

Office 365 Works for All industries and Sizes

Businesses with less than 50 employees, plus those with thousands of employees, are using Office 365.

What Does Office 365 Actually Do?

Office 365 is a complete platform that’s comprised of email, social networking, instant messaging, online meetings, personal file sharing and more.  You’ll have everything you need for effective intra-organization collaboration

With Office 365 you’ll have:

  • Anytime, anywhere access from any device. This is a huge benefit to those working onsite, at home or from remote or satellite office locations.
  • A sense of freedom from maintenance: Office 365 frees you from the need to update and maintain your own Exchange server, SharePoint Server or Lync Infrastructure.  You’ll never have to worry about patches again.
  • A cost-efficient option. Office 365 plans start at $4 per user, per month.  This is a fantastic deal for small businesses that depend on communication and collaboration but don’t want to spend a fortune.

There are a number of different versions of Office 365 you can take advantage of, from Native Apps that are installed on your server, to a Hosted Server Infrastructure that allows your authorized employees to securely access applications via the web from anywhere.

Some of the Core Applications in Office 365 that you may already be using include:

  • Word, with easy reading and writing on every device.
  • Excel to create order, organize data and share insights.
  • PowerPoint to make your points with clarity using your own style.
  • Outlook to stay productive and connected.
  • Publisher so you can create something that helps you stand out.
  • One Note so you can take notes and pull them up from anywhere, even if you’re offline on any device or platform.

But there’s so much more you can use to push ahead of the competition.

The following hosted applications in Office 365 have the power to increase productivity, efficiency and growth, such as:

  • Exchange Online that protects your information with advanced capabilities such as anti-malware and anti-spam filtering to protect mailboxes, and data-loss prevention capabilities that prevent users from mistakenly sending sensitive information to unauthorized people.
  • OneDrive for Business so you can sync files across all your devices. You’ll have access to all your files in one secure, reliable place, with 1TB of cloud storage per user so you can work on from any location via the web.
  • Skype for Business allows you to use instant messaging (IM), audio and video calls, online meetings, availability (presence) information, and sharing capabilities all from one, easy-to-use program.
  • SharePoint Online where you can easily create portals and team sites where you and your colleagues can share and collaborate on projects.
  • Yammer, a communication tool you and your employees can use to quickly share information on a topic, have active discussions around, and agree on next steps.
  • Groups that helps small teams work better together. It allows you to form ad-hoc groups of different members of a team such as sales or purchasing, etc. Or you can form a larger cross-organization team to oversee an entire project.
  • Videos where you can capture, share and discover videos in a scalable enterprise solution. Your teams can easily use videos for training, executive communications, help-desk how-tos, and more.
  • Delve to search across your organization for information and insights derived from individual user behavior, relationships to content, topics, and one another. It helps you keep a finger on the pulse of what’s happening within your business.
  • Power BI (Business Intelligence) to construct dashboards with graphs from your company’s data in a way that helps you glean information more easily, spot trends and focus on what matters. It can connect to data from your other Office 365 applications, as well as from sources outside your business.
  • Power Apps for the rapid development of mobile applications, and deploy them to multiple types of devices, such as iPads, Androids, etc. All this without writing any code.
  • Planner for the coordination of people on a project and to designate responsibilities. You create “plans” with people, tasks, steps, timelines, etc. It makes project management much easier.
  • Flow to coordinate processes, spreadsheets, databases, and much more to develop automated workflows.
  • Dynamics 365, a new, cloud-based ERP (Enterprise Resource Planning), financial management system that will surely be a must for many businesses.

Because Office 365 is a Cloud-Based Solution you might be asking:

“Will I always be able to access my files?”

Yes.  Microsoft guarantees 99.9% uptime for Office 365 users to ensure access at all times.

“But, what about security? Will my data be safe?”

Yes. Microsoft:

  • Encrypts data at rest and in transmission with BitLocker Encryption and SSL over HTTP.
  • Employs multiple layers of redundancy and backups of information at the datacenter level for easy restoration.
  • Enables users to manage privacy settings at an administrator and regular-user level for better protection.
  • Doesn’t disclose their facilities’ locations to the public for higher security of physical servers.

Microsoft Office 365 applications can be integrated and used together for an even more powerful experience. InfiNet Solutions can help you determine what features work best for your business. We can customize and bundle the applications you need, keep them up to date, and provide all this for an easy-to-pay-for monthly subscription.

Push your business ahead of the competition!  Contact InfiNet Solutions and we’ll provide a free demonstration of Microsoft Office 365 for you and your staff.  (402) 895--5777 [email protected]

Microsoft Office 365: Push Your Business Ahead of the Competition!   Read More »

Protecting Your Assets: Cyber Security for Midmarket Companies

Midmarket organizations simply cannot avoid the potential of a cyber attack. These basic steps can help protect your organization in the face of growing cyber security threats.  

Cyber Security

It isn’t just enterprise-level organizations that are being hit by cyber security breaches, and it’s high time for midmarket companies to sit up and take notice. Cyber security is far from simply being a technology problem; instead, it’s a problem that needs to be analyzed by risk management throughout the organization. The reason for the spread of responsibility is because hackers and others attempting to infiltrate your secure network cannot be stopped simply by purchasing newer, better or more software and hardware. The response to creating a more secure organization isn’t a simple one, so many smaller and midmarket organizations simply give up on the level of complexity required and do nothing — which can prove to be an exceptionally expensive decision. The healthcare industry is the most likely to be breached, with companies experiencing over $6.2 billion in losses in 2016 alone. Fortunately, there are some relatively simple steps that non-enterprise organizations can take to provide additional layers of security against cyber attacks.

Plan Ahead

The unfortunate reality is that many organizations are not aware that they’ve experienced a breach until more than six months down the road — far too long to protect individuals from negative impact. Part of the reason for this lack of awareness is due to the lack of a protection plan that looks for markers within a system’s infrastructure that indicate that a breach has occurred. The first step is a deep understanding of where data is stored within your organization, and detailed steps for backup and security of that data. Cybersecurity partners may be able to help you define a structured plan to mitigate the risk within your company, by restricting access to specific types of data, properly training associates and putting adequate processes and technology in place. The first step in building any cybersecurity plan is to fully comprehend the various entry and exit points for your data, and define parameters around how the data is accessed.

Training and Security

The reality is that many cyber attacks are carried out by either malicious insider actions or through employee carelessness that leads to an open incursion point. Perhaps the number one threat to organizations is email and social media — and employees who react to phishing and spear phishing attacks by clicking on a link. Hackers are becoming more savvy, using social engineering to find a plausible target for attack. These emails are sneaky and can often take the form of personalized information that seems very legitimate. With URL masking and other tactics at their disposal, cyber criminals are becoming even more brazen in their attacks against well-meaning employees. Constant training and reiterating the dangers of clicking on links that look “too good to be true”, or that contain unexpected instructions are some of the only ways to guard against this type of incursion. Additionally, it’s important that your technology team regularly review administrative rights that are granted at a global level. While they may seem like a convenience for the worker, having someone with administrative rights on a machine connected to your network can be a tempting option for hackers to take advantage of.

BYOD

A huge challenge in today’s mobile business world is the trend of employees to BYOD — or bring their own device. A non-secure mobile phone with random apps installed by the employee, that has access to your network, is a hack waiting to happen. Technology teams are often focused on serving their employees more effectively and providing them with the conveniences that employees need to work effectively, but there is a fine line there that should be observed. When organizations embrace a zero-trust philosophy, they are much less likely to fall victim to a cyber attack.

Cybersecurity Insurance

Depending on the type of business, it may be important to purchase cybersecurity insurance. Healthcare organizations, legal entities and other midmarket companies who make their living through a wealth of customer knowledge are prime targets for cyber criminals. Unfortunately, the wake of an attack can also involve lawsuits from those affected by the hack and if your organization is not prepared to weather the storm it could be very difficult to stay afloat. Companies who manage hundreds of thousands to millions of records, in particular, should take care to mitigate the risk of civil liability. While the federal government offers some insurance against attacks, regulatory and legislative environments could change at any time.

Stay Current

Breaches are happening on an almost daily basis, but it is next to impossible to keep up with the broad spectrum of threats that are facing midmarketing organizations all the time. While headline-grabbing cyber attacks do not happen exceptionally often, there are always organizations out there looking to make a quick buck on “protections” for your company. It’s increasingly important to find a vendor in Omaha who truly understands your business and how to protect you from rising cyber security threats. Breach detection systems are among some of the more recent entrants to fight cyber attacks, and they include logs of login activity, user authentication, database access and also track system modifications that may be malicious. As the threat grows, so do the tools utilized to fight these threats — and they’re becoming increasingly affordable to midmarket companies.

Do not let the evolving digital challenges threaten your organization. At InfiNet Solutions, our cyber security professionals work closely with your leadership team to define data structures and entry points, create successful training, and document risk management plans to ensure the safety of your organization. In the event of an incursion, our teams leap into action to resolve the situation and get your business back on track — quickly. Contact us today via email to [email protected] or call us at (402) 895--5777.

Protecting Your Assets: Cyber Security for Midmarket Companies Read More »

Learn Firsthand how an Ethical Hacker Takes Down Avaya Servers

Incorrectly hardening servers are one of the biggest challenges in cyber security. Watch from the driver’s seat to see what (ethical!) hackers are looking for so you can protect against vulnerabilities.

hacking avaya servers

Security experts on both sides of the house recognize that bringing up a new server improperly can create a wide open door for cybercriminals, but how can you know for sure that you’re closing every nook and cranny and completely hardening your server? Small- to medium-sized organizations are particularly vulnerable, as they may not have the full complement of IT staff required to specialize in cyber security and are likely following a set of directions instead of fully understanding the challenges they’re facing. With the rapid pace of change and the complexity of technology today, it can be difficult to keep up with the myriad options available for your network. InfiNet Solutions agrees, so we’ve put together a first-hand view of how an ethical hacker quickly takes down a business Avaya server in a very short period of time. This cautionary tale may offer you some ideas for keeping your organization’s data such as your customer and employee personal information safe from cybercriminals.

Types of Attacks

There are some standard types of attacks that we see on a regular basis, many of which are perpetrated when an unethical individual gains access to a key internal server:

  • DoS: Denial of Service attacks can cause a web server to come to a halt, making your website(s) completely unavailable to users.
  • Phishing: Perhaps the most well-known type of attack, phishing occurs when individuals within your organization click on a link or navigate to a website that is fake. Individuals are then tempted to enter personal information or passwords so the hacker can gain entrance to your company.
  • Defacement: A scare tactic that is often used towards politicians or large corporations, defacement occurs when a hacker gains access to a web server and replaces the company’s website with a different page that includes a message, music or even the hacker’s name.
  • DNS Hijacking: Hijacking your domain name server (DNS) redirects all web traffic from your site to another location on the web.
  • Sniffing: Hackers attempt to “sniff out” sensitive information that is being passed internally and externally to your organization through an intercept, in an effort to gain unauthorized server access.

Cybersecurity Risks

Let’s say your organization’s servers have been hacked. What does this really mean in terms of data loss and security? Not only can your organization’s reputation be ruined by a DNS hijacking that sends your customers to a nefarious website, but cybercriminals can also install malicious viruses that can utilize your systems as a replication tool, sending viruses out to all your clients and contacts. Additionally, a true data breach could be incredibly expensive in terms of lost business and even lawsuits against your organization if the personal financial information is breached and then utilized by hackers. However, perhaps the most troubling and damaging effect of an attack is the loss of trust from your customers, which can have a long-term negative impact on your organization.

Let the Hacking Begin

The penetration testing was done against three different Avaya servers, exploiting different vulnerabilities each time. In all three instances, the white-hat security tester was able to gain access to all three servers.

LDAP Scenario

The first activity was to run a Nessus vulnerability scan, which showed that anonymous LDAP queries were a possibility: a hacker’s goldmine of data. Once this was determined, the hacker determined it was an easy step to scan for an Avaya phone tree by using JXplorer and looking for an LDAP tree with root “vsp” with a branch labeled “People”. After that, it was simple enough to scan for the two important entries: “cust” and “admin”. After determining that the passwords within the entries were hashed, it took only a moment to break the encryptions using a software tool called John the Ripper, even with the default settings. Turns out, the passwords were still the default passwords for the system “admin01” and “cust01”. After trying a few different tactics to get a full shell, the hacker eventually was able to utilize a combo of a Meterpreter reverse tcp payload via a Linux binary executable file delivered by msfvenom to essentially backdoor into the system. Next, the hacker was able to gain access to a second box that was tied into the first one, simply by following root SSH keys — which can indicate a way for users to log into the system remotely without a password. An additional find was user passwords on the second server, none of which were difficult for the hacker to guess using easy counter-encryption methods.

Two Down . . .

On the final server on the same subnet, the security expert quickly got a bonus find: easy logins with a full shell using the default “cust” and “admin” passwords. While they did receive a full shell from the system, the passwords and usernames uncovered in the first two servers also worked on the third. However, the shell would not allow access to the root directory and this third server was proving a difficult nut to crack. After utilizing linuxprivchecker.py script to identify any potential locations to run a binary, the hacker uncovered that the majority of locations on the box were covered with noexec commands — effectively halting binaries from executing to protect the server. Eventually, however, the white hat hacker noticed that there was a diag program setuid binary that was only available to a few users within the group, and not the users whose accounts were already compromised.

Getting to the Root

After several circuitous attempts, the security expert managed to gain access to a shall as a secondary user, by running through voice-only setup binaries and leveraging the diag command, which runs as root regardless of where the command is executed. The meterpreter reverse payload was used again in this instance, to gain access to the /msg/database/vm/tmp directory, which eventually led to full root access by the hacker.

There are several vulnerabilities in this scenario that could have been prevented with successfully-hardened servers. If all security patches were in place, no default user passwords and configurations were successfully updated, penetration would have been much more difficult if not impossible. Our cybersecurity experts are standing by in Omaha to help support and protect you from attacks such as this one. Contact InfiNet Solutions today at (402) 895--5777 or via email to [email protected], and we’ll work with you to ensure that hackers will not have such an easy time gaining access to your protected information.

Learn Firsthand how an Ethical Hacker Takes Down Avaya Servers Read More »

Call Now Button