(888) 208-0020 prs@auaus.net

SD-WAN is critical to insure back up and increase bandwidth and back up VoIP

Any organization with VoIP and Cloud servers or  SAAS needs SD-WAN. This is the only method to provide uninterrupted VoIP, and internet service. DSL, Fios, cable, etc  will not provide adequate backup for your IT infrastructure without a SD-WAN device. We have over 15 provides of  SD-WAN to choose from. Let us help you decide how  to use  this important system.

888.208.0020 for free help on SD-WAN

One of our vendors offers a device, Cloud Connect,  that in conjunction with one of our fiber vendors enabled us to recently reduce and improve an 8-location client’s network by bonding the new fiber and bandwidth. The monthly spend went from 30k to 10k and offered complete redundancy. This device combines the bandwidth of multiple public connections into a single, faster, more reliable virtual connection. Cloud Connect offers a cost-effective alternative to MPLS networks that will dramatically increase network speed, increase reliability, and provide guaranteed quality of service (QoS) over public IP

It will

Dramatically increases your network speed
Increases reliability with automatic failover
Provides bi-directional QoS over public networks
Provides a cost-effective alternative to MPLS networks

Most importantly, Cloud Connect is delivered, managed, and supported by our vendor, regardless of who delivers the connections to your office, ensuring your business can access its critical cloud- based resources whenever they’re needed.

 

 

 

One of our premier vendors Ring Central has provided valid reasons to move to Cloud Services

81.2% of organizations are currently using or
plan to migrate to cloud services in the next 2 years.
82% of IT decision-makers somewhat agree, agree, or strongly agree that a cloud strategy is essential
to remaining competitive.
Cloud-based PBX systems offer dramatic advantages over on-premises solutions:

1. Unify business communications
2. Simplify multi-location management
A unified solution offers enterprise-grade features such as phone, faxing, SMS, IVR, call queues,
team collaboration, video meetings, and voicemail, all on one platform.
A single solution with global availability is easier to manage and can be administered from a
single interface using a desktop or mobile phone.
3. Create flexibility for your business
4. Ensure security and compliance needs are met
S. Reduce infrastructure headache and management costs

Cloud Services are flexible and scalable, allowing you to easily add services or remove users at
any time.
Providers offering 99.999% uptime SLA ensure your business never halts.
6. Support mobile and remote workers
7. Security, service delivery, and architecture as well as industry compliance (CCPA, GDPR, HIPAA,
FINRA) are
fully managed by the cloud provider.

7. Access the latest features instantly
Best-in-class cloud solutions are hosted in
top-tier and redundant data centers.

All aspects of the infrastructure are managed and monitored 24/7/365 by the provider.

Users can securely access their business phone number and other features like team messaging and
video meetings at any time and on their device of choice-a tablet, laptop, or mobile.
Updates are free, automatic, and come with the latest and greatest features with no impact to users
or disruption to business.

Move to the cloud
Legacy, on-premises systems can significantly hinder collaboration. With cloud communications, your
teams are fully prepared to overcome the challenges of the modern workplace.
81.2%
of organizations are currently using or
plan to migrate to cloud telephony solutions in the next 2 years.
82%
of IT decision-makers somewhat agree, agree, or strongly agree that a cloud strategy is essential
to remaining competitive.
Cloud-based PBX systems offer dramatic advantages over on-premises solutions:

single solution with global availability is easier to manage and can be administered from a
single interface using a desktop or mobile phone.

3. Create flexibility for your business

4. Ensure security and compliance needs are met

S.Reduce infrastructure headache and management costs

Cloud solutions are flexible and scalable, allowing you to easily add services or remove users at
any time.
Providers offering 99.999% uptime SLA ensure your business never halts.

6. Support mobile and remote workers

Security, service delivery, and architecture as well as industry compliance (CCPA, GDPR, HIPAA,
FINRA) are
fully managed by the cloud provider.

7. Access the latest features instantly

Best-in-class cloud solutions are hosted in
top-tier and redundant data centers.

All aspects of the infrastructure are managed and monitored 24/7/365 by the provider.

Users can securely access their business phone number and other features like team messaging and
video meetings at any time and on their device of choice-a tablet, laptop, or mobile.

Updates are free, automatic, and come with the latest and greatest features with no impact to users
or disruption to business.

Move to the cloud
Legacy, on-premises systems can significantly hinder collaboration. With cloud communications, your
teams are fully prepared to overcome the challenges of the modern workplace.

Move to the cloud
Legacy, on-premises systems can significantly hinder collaboration. With cloud communications, your
teams are fully prepared to overcome the challenges of the modern workplace.

Tired of passwords………….. we can give you one for all your apps

Applied Consulting Group
Tires of passwords?
We have a high-security one-password system for ALL your logins.

Developers, Stop Re-inventing the Wheel.
Every time your organization adopts a new application your developers must
create a database of users, write authentication methods, & manage a new security environment.
With Clearlogin Anywhere your developers can simply drop a code into your site and leave the heavy lifting to us.
You wouldn’t waste time developing authorization processes to perform credit card transactions when you can utilize secure APIs from services like PayPal or Stripe, Why process identity yourself? Clearlogin Anywhere lets you offload the burden of authentication to the experts.

ONE PASSWORD DOES IT ALL Call 877-208-0021 Direct 941-900-6220 www.acginfo.biz

Paul Reed Steberger prs@auaus.net

Victoria Kleinman Victoria-k@auaus.net

84 Upsala Path
West Milford, New Jersey 07480
*
600 Manatee Avenue, #104
Holmes Beach, Florida 34217
877-208-0021 FAX 973-547-9127
prs@auaus.net
https://appliedconsultinggroup.net/blog/

One password for all your apps anywhere in the world

Cyber Security with One Password Login
Think of That… One Secure Password
• One of our premier vendors, Evolve IP, has acquired Clearlogin, an identity authentication provider. If you are not familiar with identity authentication, the technology essentially integrates and unifies application usernames and passwords. This provides IT with a more secure environment and makes them much more efficient. Clearlogin meets compliance regulations for over 4,000+ enterprise applications including healthcare and finance!
• Here are some important notes
• Makes Employees more efficient
o Provides a simple login portal with a unified password for all your critical cloud applications
• Makes IT more efficient
o Reduces support calls for username & password resets
o Supports more than 4,000+ applications out of the box and provides standards-based options to add your own
o Integrate multiple cloud applications with existing internal or external directories including Active Directory, Azure, Amazon, or Google
• Increases security and supports compliance
o Allows IT to create a single, secure authentication policy across multiple cloud applications
o Customize user access to applications and domains
o Leverage advanced authentication features to block unauthorized access
o View reports on questionable activity like unsuccessful login attempts and password changes
WHO WE ARE?
Here are two videos that succinctly explain what we do for our clients. I hope you find them helpful.
First video on auditing
– https://drive.google.com/file/d/0B7S2PmT_Wo7fU3g2b25ybjdTMWc/view?usp=sharing
Second video on cloud services/IT
– https://drive.google.com/file/d/0B7S2PmT_Wo7fcTJHeEVHUTBVekk/view?usp=sharing
Just hit control and then click…. Then hit enter to view

Law firm moves to the Cloud with a VoIP system from one of our premier channel partners

International Law Firm Drives Communications Reliability Across 60+ Worldwide Locations; Saves Over $300,000 a Year.
Leverages Evolve IP’s Integrated Communications Solution for IP Phone System, Unified Communications and Collaboration, and Contact Center

Ogletree Deakins, an international law firm with thousands of employees,
was using a “hodge-podge” of communications solutions to serve 60+ locations around the globe, according to Ken Schultz, Chief Information Officer. Each location had a different system and frequent outages left Ogletree Deakins struggling to recover. Ken said, “it was once or twice a day we had an outage somewhere in the world.”
Reliability, Reliability, Reliability
This was a major impediment to client relations and the handling of time- sensitive issues. When Ken started as CIO at Ogletree Deakins, he recognized that, “the #1 problem was the reliability of the communications and contact center. For a law firm to be losing calls, that is a really big problem.”
While Ogletree Deakins had exceptional resources and expertise to serve their clients, communication difficulties directly impacted their ability to do so successfully. Not only did their external communications suffer, internal collaboration became impaired as well. As Ken noted, “people tended to be a lot more siloed.”
Recognizing the impact of these issues, Ogletree Deakins underwent a vigorous process to replace their disparate systems with an integrated IP phone and contact center solution.

They ultimately chose to deploy the Evolve IP OneCloud™ which runs on the world’s largest, most stable, and scalable communications platform from Cisco, and provided the firm with multiple cloud computing options as well.
Worldwide Improvements
Ogletree Deakins deployed Evolve IP’s unified phone and contact center across 60 locations including London, Berlin, Toronto, Paris, Mexico City, and St. Thomas and saw immediate improvements.
“We went with Evolve IP because of their stability and reliability. We knew we wanted a hosted solution and Evolve IP was the perfect fit,” said Ken.
Today, in addition to the security provided by having their phones and contact center running in the cloud, each location is implementing redundancies to provide a backup network.
All employees also have a unified communications application on their mobile phone. In this way, even in a blackout, Ogletree Deakins’ lawyers are able to take calls wherever they’re located.
“We thought about hosting a solution ourselves, but we didn’t have the stomach to do it right. We would need a lot of infrastructure and the right hires. Even then we wouldn’t be able to match the reliability of Evolve IP,” said Schultz.

Immediate Results
Financial Savings – Ogletree Deakins not only received one of the world’s leading IP phone systems and contact centers, they saved over $300,000 annually. “It makes it easy to sell to the board,” noted Schultz.
Stability – Since switching to Evolve IP, Ogletree Deakins has gone from experiencing daily system outages to none at all. “We haven’t had any system outages and can forward calls from the main number to another location if there’s a disaster or business continuity issue.”
Mobile Access – Thanks to the Evolve IP collaboration and unified communications mobile application Ogletree Deakins attorneys can receive office calls out of pocket, anytime. “Single number follow has been great. The attorneys all have the app on their phone, so they can see any call coming in no matter where they are.”
More Collaboration – Internal connectivity between locations has become easier and more reliable. Schultz noted, “we are able to do a better job collaborating and we feel more connected; more a part of the same organization.”

Ken Schultz
CIO of Ogletree Deakins

“That’s the type of proposition I like to bring to a Board of Directors. When I can say, ’we can get everything new, be completely redundant, it can meet all of our needs, and oh, by the way we are going to save over $300,000 a year.’ It makes it easy for me to sell!”

Applied Consulting Group 888 208 0020 prs@auaus.net acginfo.biz 1

LOCATION:
Headquartered in San Diego, California with multiple locations around the world

INDUSTRY:
Ogletree Deakins specializes in labor and employment counsel. No matter the company size, their pledge is to understand their client’s business and objectives.

CUSTOMER PROFILE:
POSITIVE FEEDBACK
Client feedback has earned the firm multiple accolades in publications such as U.S. News – Best Lawyers, Chambers and Partners, Legal 500, and many others.
GLOBAL COVERAGE
Access lawyers who are admitted to practice in all 50 states, the U.S. Virgin Islands, Puerto Rico, England, France, Germany, Mexico, and Canada.
CLIENT-FOCUSED PLEDGE
Our attorneys pledge to provide our clients with value, innovation, quality, collaboration, and effective communication.

PRODUCTS
• IP Phone System
• Unified Communications and Collaboration
• Evolve Contact Suite – Contact Center as a Service

BUSINESS SITUATION
• Ogletree Deakins had an unreliable phone system and contact center and experienced regular outages. With thousands of employees and 60+ locations, they needed a reliable, unified system that promoted stability and connectivity.

SOLUTION
• Ogletree Deakins deployed Evolve IP’s integrated IP phone system, collaboration service, and contact center across their worldwide locations.

BENEFITS
• Financial Savings – In addition to gaining a world-class IP phone system, unified communications and collaboration tool and Gartner- noted contact Center, Ogletree Deakins is saving $300,000/ year.
• Stability – Since switching to Evolve IP, Ogletree Deakins has gone from experiencing frequent outages to none at all.
• Mobile Access – Thanks to the Evolve IP mobile unified communications app, Ogletree Deakins attorneys can receive office calls out of pocket, virtually anywhere, anytime.
• More Collaboration – Internal connectivity between locations has become easy and reliable.

ABOUT EVOLVE IP

The Cloud is no longer about buying individual services. It’s now about building a strategy around multiple cloud services and integrating them together to make IT more efficient. Evolve IP delivers customized strategies and integrated services for both cloud computing and communications. Solutions that are designed to work together, with your current infrastructure, and with the applications you already use in your business. Disaster Recovery, Contact Center, Unified Communications, Desktops and Infrastructure
… Experience Cloud as a Strategy™

2

Cyber security for CPAs, law firms, manufacturing and virtually all other business types.

OVERVIEW OF THE ISSUES SURROUNDING CYBER-SECURITY
In 2012, a New Jersey man hacked into several accounting firms stealing the tax forms and personal information of over a thousand clients. He used this information to file more than $6 million in fake tax returns. He also sold the pilfered data to other hackers on the dark web. He was eventually caught by the FBI, but the damage to these clients was done. The accounting firms involved had to notify their customers that they had been breached, and that they were the root cause of their tax fraud nightmares. These victims were also left to wonder what other attacks were waiting for them now that their data was in the hands of other malicious sources who had purchased their confidential information.
This incident is not unique. Incidents of hacking and cyber-breaches are on the rise across all industries and for companies of all sizes. Accounting firms face the standard cyber-risks that all industries with internet-facing systems are exposed to, but they also face unique risks based on the nature of their work and the data that they possess, as outlined herein.
Our cyber-security providers have seen these issues first-hand. They have performed proactive security assessments and penetration tests1 for many forward-thinking accounting firms and have been involved in cyber-breach incident responses for companies who have already fallen victim to malicious cyber-attacks. This case study seeks to outline the issues we have found and bring further attention to both the gravity of this situation and the need for action by those organizations who are not fully cognizant of this risk or who falsely assume they are safe.
In performing security assessments and tests, our partners AT&T, Verizon, grid32, have all found that almost uniformly, our clients in the Accounting Industry have had vulnerabilities in their systems that would allow malicious attackers to gain access to a dangerous set of data and access, including:
• Access to company records, including financials, partner compensation, payroll records, and employee social security numbers and confidential information.
• Access to client data, including financials, tax records, data files, and access credentials.
• Ability to access banking and financial accounts, transfer money out, and re-route inbound funds.
• Access to IT administrator accounts, allowing full control of networks and all resources.
• Access to user accounts, including emails, network access, and all assigned capabilities.
• Full control over networks, devices, phone systems, and security systems.
Having access to all these items at once is obviously troubling and it could be severely damaging in the wrong hands. Damages could include financial losses, lawsuits, government-imposed fines, embarrassment, and job loss. All this access and information was gained remotely, without our attack team ever setting foot in the facilities. Thankfully, our trusted professionals were able to provide remediation steps to our clients to close the security gaps and limit the likelihood that these attacks would occur in the real world. Unfortunately, far too many organizations are not taking the proper steps to prevent similar attacks. The issue looks to only be getting worse as attackers recognize the pervasiveness of vulnerabilities and caches of valuable data in this industry.
UNIQUE FACTORS AFFECTING ACCOUNTING FIRMS
Besides the standard risks inherent to all industries with internet-facing systems, accounting firms faces additional threats due to the volume and types of data that they typically house. As seen in the previous example, hackers are heavily targeting tax information so that they can file fraudulent tax returns. In 2013, the IRS paid $5.8 billion out in fraudulent tax returns. In addition, they prevented a further $24.2 billion, making a total of $30 billion in fraudulent federal tax returns filed. There are a significant number of fraudulent returns being filed at the state level as well, to such a degree that Turbo Tax had to temporarily stop processing state returns in 2015. The IRS and individual states are getting better at detecting and preventing tax fraud, but this is only increasing the volume of attempts. Whereas hackers used to try to file, for example, three returns for $10,000 each, for a payoff of $30,000, now they need to file thirty returns, for $5,000 each, to get a similar return. This need to file a larger number of returns means that the attackers need to gain access to large caches of tax-payer data. Accounting firms are a perfect source for this, putting them squarely in the crosshairs of a malicious underworld that is becoming increasingly more organized and sophisticated.
In addition to the threat brought on by tax fraud, hackers have learned that breaching an accounting firm can have a similar payoff to breaching scores of companies and individuals, since you not only get the firm’s data, but usually troves of data on their clients. Besides tax fraud, there is also typically data attackers can access to perpetuate other cyber-crimes. This includes banking credentials, which can be used to perpetuate another trending attack, wire transfer fraud. Other sensitive data that hackers may be after includes personally identifiable information, employee records, business plans, intellectual property, or access credentials for client networks and resources.
These factors make accounting firms a certain target for malicious attackers, and there is an absolute need for all accounting firms to take proactive steps to protect their data, and the data of their clients, from prying eyes. Breaches can expose accounting firms to the direct costs of damage, claims for damages from clients or third-parties, costs of compliance or fines from statues or regulations, and damage to their image and reputation.
Besides the obvious need for accounting firms to protect their own information and that of their clients, being savvy with cybersecurity is simply good business. Clients depend on accounting firms for advisement on many topics, including cybersecurity. Letting clients know that a firm takes cybersecurity seriously, proactively addressing threats, can be part of the marketing pitch to help attract and retain clients. It can even create billable services, as many accounting firms offer cybersecurity services, including many that upsell security services to their client-base.
WHAT CAN BE DONE?
There are a few basic steps accounting firms should be taking to help mitigate this risk:
1. Have an Information Security Committee that meets regularly and includes key personnel and staff from relevant departments.
2. Have a written Information Security Program, with documented policies and procedures, as well as risk analyses and contingency plans.
3. Have a Penetration Test performed annually by an independent security firm, and ensure the remediation steps that come from the test are activated?
4. Train all staff on Cyber-Security Awareness.
5. Use strong and unique passwords and enable two-factor authentication whenever possible.
6. Encrypt data when transmitted and when stored, especially data that resides on mobile devices such as laptops.
7. Allocate the proper funds for cyber-security.

1WHAT IS A PENETRATION TEST?
A Penetration Test is a security exercise where a team of highly trained security experts attempt to hack into the client’s network to find security weaknesses. The intent is to discover ways that a real-world attacker might be able to compromise the systems. The highly trained security team is careful not to cause any actual harm and a report is provided detailing all the vulnerabilities and weaknesses found and recommending what needs to be done to fix them.
In-house I.T. staff are usually pressured to make things functional and easy-to-use, which diametrically oppose security. Also, it is difficult for an organization’s own IT staff to objectively look at their own systems from an outsider’s perspective. Just like a CFO needs a CPA firm to review their financials, senior IT leadership benefits from having a team of certified security experts independently test their system to give them valuable insight.

Font Resize