Author: rory-admin

  • Microsoft 365, Google Workspace and.. Apple Business ? What is Apple’s new entry into enterprise software and what does it mean for your business

    Microsoft 365, Google Workspace and.. Apple Business ? What is Apple’s new entry into enterprise software and what does it mean for your business

    For years, the enterprise productivity conversation has been a two-horse race. You either ran your business on Microsoft 365 or you went with Google Workspace. Sure, there were niche players and industry-specific platforms, but when it came to the core suite of tools that kept your team communicating, collaborating, and managed, it was Microsoft or Google, full stop. That just changed.

    On March 24, 2026, Apple announced Apple Business, a unified platform that rolls device management, business email with custom domains, calendar services, a company directory, and customer-facing brand tools into a single portal. It launches April 14, 2026, in over 200 countries. And here is the part that should really get your attention: the core platform is free.


    Let’s break down what this means, what it includes, what it costs, and why your MSP partner should already be thinking about how it fits into your environment.


    So, what exactly is Apple Business? Apple Business is the consolidation of three previously separate platforms: Apple Business Manager (device enrollment and app distribution), Apple Business Essentials (device management for small businesses), and Apple Business Connect (brand presence across Apple Maps and other services). Instead of juggling three portals with overlapping features and confusing boundaries, businesses now get one unified dashboard.
    The platform is organized around two core pillars: Run and Grow.


    Run is the IT and operations side. This is where you manage devices, deploy apps, configure security settings, and handle employee onboarding. The headline feature here is called Blueprints, which allows administrators to preconfigure device settings, apps, and security policies so that a new iPhone, iPad, or Mac is ready to go the moment an employee powers it on. Apple calls this “zero-touch deployment,” and if you have ever spent an afternoon manually setting up a batch of company phones, you already understand the appeal.


    Built-in mobile device management (MDM) gives IT teams a single view of every Apple device in the organization, along with the ability to create user groups, assign roles, and distribute apps. For companies that previously needed a third-party MDM solution just to manage a handful of iPads, this is a significant shift. Apple has also included Managed Apple Accounts with cryptographic separation between personal and work data, so employees can use one device for both without the two worlds bleeding into each other. Account provisioning integrates with identity providers like Microsoft Entra ID and Google Workspace, which means Apple is not asking you to abandon your existing identity infrastructure.


    The platform also introduces integrated email, calendar, and directory services. Businesses can bring their own custom domain or purchase one directly through Apple Business. Calendar delegation, a built-in company directory with personalized contact cards, and user groups round out the collaboration toolset. This is the piece that moves Apple Business from “device management tool” into territory that starts to overlap with what Microsoft 365 and Google Workspace offer.


    Grow is the customer-facing side. This is where Apple gets creative. Businesses can manage how their brand appears across Apple Maps, Mail, Wallet, and Siri. Think customizable place cards in Maps with photos, hours, and action buttons for ordering or reservations. Branded communications in the Mail app. Custom Tap to Pay branding when customers pay with their iPhone. Location insights that show how customers discover and interact with your business. And coming this summer, businesses will be able to purchase advertising directly within Apple Maps to appear in search results.


    So, you may be wondering, how does pricing work? This is where Apple Business gets genuinely interesting from a cost perspective.


    The core platform is free. Device management, Blueprints, zero-touch deployment, email and calendar services, brand management tools, and the full Run and Grow feature set all come at no additional charge. Every user gets 5GB of iCloud storage included.


    The paid add-ons are straightforward. Additional iCloud storage is available up to 2TB per user, starting at $0.99 per user per month in the US. If you want dedicated device support, AppleCare+ for Business starts at $6.99 per month per device or $13.99 per month per user (covering up to three devices).


    To put this in context, here is how the base costs compare to the competition:
    • Apple Business: Free for core features. Storage upgrades from $0.99/user/month. AppleCare+ from $6.99/device/month.
    • Microsoft 365 Business Basic: $6.00/user/month. Includes Teams, SharePoint, OneDrive (1TB), and web versions of Office apps.
    • Google Workspace Business Starter: $7.20/user/month. Includes Gmail, Drive (30GB), Meet, and the full Google Docs suite.


    The comparison is not perfectly apples-to-apples (no pun intended). Microsoft 365 and Google Workspace include full productivity suites with word processing, spreadsheets, and presentation tools. Apple Business does not include equivalents to Word, Excel, Sheets, or Slides. If your team relies on those tools daily, you are still going to need a Microsoft or Google subscription alongside Apple Business.


    However, for businesses that primarily need device management, business email, and basic collaboration, Apple Business at zero cost is a compelling proposition, especially for small and mid-sized organizations that were previously paying $2.99 to $24.99 per user per month for Apple Business Essentials.


    If your organization runs on Microsoft 365 or Google Workspace today, Apple Business is not going to replace either of those platforms overnight. The productivity suite gap is too significant. You are not going to write proposals in Apple Business or build financial models there.


    What Apple Business does change is the device management and identity layer. If your company issues iPhones, iPads, or Macs to employees, you may have been paying for a third-party MDM solution like Jamf, Mosyle, or Microsoft Intune to manage those devices. Apple is now offering that capability for free, built directly into the platform, with tighter integration than any third party can achieve.


    For organizations with a mixed environment, the most likely scenario is a layered approach: Microsoft 365 or Google Workspace for productivity and collaboration, and Apple Business for device management, deployment, and the customer-facing brand tools that neither Microsoft nor Google offer.


    The identity provider integration is key here. Because Apple Business works with Microsoft Entra ID and Google Workspace for account provisioning, it is designed to complement your existing stack rather than compete with it head-on.


    What does this mean for your business? Small businesses stand to benefit the most from this announcement. If you are a company with 5 to 50 employees, all using iPhones and Macs, Apple Business gives you enterprise-grade device management, business email with your own domain, and a professional brand presence across Apple’s ecosystem for free. That is a package that would have cost hundreds of dollars per month just a year ago.


    The zero-touch deployment feature alone could save hours of IT setup time per device. For a 20-person company that refreshes devices every three years, that adds up to meaningful labor savings on every cycle.


    If you are a business owner or IT decision-maker, here are the questions worth discussing with your MSP:
    • Is your current MDM redundant? If you are paying for a third-party MDM primarily to manage Apple devices, Apple Business may eliminate that cost entirely. However, if your MDM also manages Windows or Android devices, you will still need it for those platforms.
    • Does your team need a full productivity suite? Apple Business does not replace Word, Excel, or Google Docs. If those tools are central to your workflow, Apple Business is an addition to your stack, not a replacement.
    • Are you taking advantage of the brand tools? The Grow side of Apple Business is genuinely unique. Neither Microsoft nor Google offers anything comparable for managing your business presence across a consumer ecosystem. If your customers find you through Maps, pay with Apple Pay, or interact with your brand through Mail or Wallet, these tools are worth exploring.
    • What does your device lifecycle look like? Zero-touch deployment through Apple Business requires devices purchased through Apple or Apple Authorized Resellers. If your company buys devices through other channels, you may not get the full benefit of Blueprints.


    Apple Business is not a Microsoft 365 killer or a Google Workspace replacement. It is something different: a free, unified platform that makes managing Apple devices dramatically simpler while giving businesses tools to control their brand presence across Apple’s ecosystem. The fact that it includes business email and calendar services at no cost is a nice bonus, even if those tools are not as mature as what Microsoft and Google offer.


    For an MSP like us, this is an opportunity to help our clients optimize their tech stack. Some will save money by dropping third-party MDM tools. Some will layer Apple Business underneath their existing Microsoft or Google environment for a more streamlined device management experience. And some small businesses that were cobbling together free tools and manual processes will finally have a professional, unified platform without the monthly subscription cost. In the world of business software, more options is a good thing.


    Have questions about how Apple Business fits into your current IT environment? Reach out to our team for a complimentary assessment. We will help you understand where Apple Business adds value, where your existing tools still matter, and how to build a technology stack that works for your business without paying for overlap.

     


    This article was powered by Valley Techlogic, leading provider of trouble free IT services for businesses in California including Merced, Fresno, Stockton & More. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on X at https://x.com/valleytechlogic and LinkedIn at https://www.linkedin.com/company/valley-techlogic-inc/.

  • So long Sora, ChatGPT pulls the plug on AI video generation platform amidst a $1 billion dollar pull out by Disney

    So long Sora, ChatGPT pulls the plug on AI video generation platform amidst a $1 billion dollar pull out by Disney

    Yesterday, OpenAI officially pulled the plug on Sora, its AI video generation platform that launched to enormous fanfare just six months ago. The standalone app, the API, and all video generation features within ChatGPT are being shut down. At the same time, the billion-dollar licensing partnership with Disney has been dissolved. It is a dramatic reversal for a product that once topped the App Store charts and seemed poised to reshape digital content creation.


    Meanwhile, on the other side of the world, ByteDance’s Seedance 2.0 continues to push the boundaries of what AI video can do. The contrast between these two trajectories tells us a great deal about the current state of AI, the pressures shaping the industry, and what businesses should be thinking about as they plan their technology strategies.


    OpenAI’s Sora debuted its second-generation model in September 2025 with a dedicated consumer app that combined AI video creation with a social media feed for sharing content. The results were impressive. Downloads surpassed one million within ten days, outpacing even ChatGPT’s early adoption curve. The app quickly became the top free download in the App Store’s Photo and Video category.


    But that momentum did not last. By January 2026, downloads had dropped by roughly 45%. Users experimented with the novelty, generated a wave of viral clips featuring copyrighted characters and public figures, and then largely moved on. The app generated only about $2.1 million in in-app purchases over its lifetime, a negligible figure for a company valued at $730 billion. More critically, Sora was consuming enormous amounts of computing power at a time when OpenAI is under pressure to consolidate resources ahead of an expected IPO and intensifying competition from rivals like Anthropic and Google.


    An OpenAI spokesperson explained the decision by saying the company is narrowing its focus and redirecting compute toward robotics research and its core text and reasoning products. CEO Sam Altman reportedly told employees that ending Sora would free up resources for the company’s next-generation AI models. The message here is clear: when the runway is long but the burn rate is high, experiments that are not gaining traction get cut.


    While Sora exits the stage, ByteDance’s Seedance 2.0 remains very much alive. Released in February 2026, the model quickly drew global attention for producing cinematic-quality video with synchronized audio from simple text and image prompts. Clips featuring hyperrealistic depictions of celebrities and well-known characters went viral almost immediately, prompting cease-and-desist letters from Disney, Paramount, Netflix, and Warner Bros., along with sharp criticism from SAG-AFTRA.


    ByteDance responded by pledging to strengthen its intellectual property safeguards and suspending a controversial feature that could clone a person’s voice from a single photograph. The company also paused the planned global launch of Seedance 2.0 through its CapCut platform while it works through copyright compliance issues. Despite these setbacks, the underlying model continues to operate within China’s domestic ecosystem.


    For users outside of China, accessing Seedance 2.0 is not straightforward. The full-featured version of the model is currently available only through ByteDance’s Chinese apps, including Jimeng and Doubao, which require a mainland Chinese phone number for registration. International users looking to try the model have been turning to VPN workarounds, typically setting their location to Hong Kong or mainland China and navigating Chinese-language interfaces. Some third-party platforms and API aggregators have also offered access, though availability has been inconsistent as ByteDance tightens controls. The international version of ByteDance’s creative platform, Dreamina, offers a limited version but has not yet rolled out full Seedance 2.0 capabilities to the general public.


    One factor that may help explain why Seedance continues to thrive while Sora folds is the dramatically different public sentiment toward AI in China compared to the West. Multiple large-scale surveys conducted in 2024 and 2025 paint a consistent picture: Chinese citizens are far more accepting of and optimistic about artificial intelligence than their counterparts in North America and Europe.


    Stanford’s 2025 AI Index Report found that 83% of people in China believe AI products and services offer more benefits than drawbacks. Compare that to just 39% in the United States and 40% in Canada. An Edelman survey from late 2025 reported that 87% of Chinese respondents said they trust AI, versus 32% in the U.S. and 36% in the U.K. A joint study by the University of Melbourne and KPMG, which surveyed over 48,000 people across 47 countries, found that 93% of employees in China are using AI for their work, far outpacing the global average of 58%. The same study noted that 54% of Chinese respondents actively embrace greater use of AI, compared to just 17% of Americans.


    This cultural receptivity creates a very different operating environment for AI companies. In the United States, Sora was met with sustained backlash over deepfakes, copyright infringement, and the potential displacement of creative workers. Hollywood unions, family estates of public figures, and advocacy groups all pushed back forcefully. In China, while there are certainly regulatory constraints and some public concerns around privacy and consent, the broader population views AI development as a national priority and a source of opportunity rather than a threat. That kind of public goodwill gives companies like ByteDance more room to iterate, experiment, and build a user base for products like Seedance without facing the same intensity of cultural resistance.


    At Valley Techlogic, we want to make sure these developments are on your radar. Here is what we think matters most:

    • AI video tools are not going away. Sora’s shutdown does not signal the end of AI-generated video. It signals that the market is maturing and consolidating. The technology is real, and competitors from China and elsewhere are advancing rapidly.
    • Copyright and compliance risks remain front and center. Both Sora and Seedance ran into serious intellectual property disputes. Any business exploring AI-generated content needs clear policies, legal review, and an understanding of where generated material comes from.
    • VPN-dependent tools carry their own risks. If members of your team are experimenting with Seedance or similar tools through VPN workarounds, be aware of the security, compliance, and data privacy implications. Routing traffic through unfamiliar networks and registering on foreign platforms introduces risk that should be managed deliberately.
    • Compute costs drive real business decisions. OpenAI shut down a product used by millions because the computing costs could not be justified. This is a reminder that AI infrastructure is expensive, and the tools you rely on today may not be available tomorrow if the economics do not work out (or they may become dramatically more expensive).
    • Stay informed, stay cautious. The AI landscape is shifting fast. We recommend evaluating any AI tools your organization adopts with an eye toward longevity, data handling practices, and vendor stability.

    The divergent paths of Sora and Seedance illustrate how quickly the AI industry is evolving. A product can go from record-breaking downloads to discontinuation in under a year. Meanwhile, cultural attitudes toward AI vary so dramatically across borders that a tool deemed too controversial in one market can find a welcoming audience in another.


    For businesses, the lesson is not to chase every new AI tool that generates headlines. It is to build a thoughtful technology strategy with trusted partners who can help you navigate the noise, manage risk, and adopt the tools that will genuinely move your operations forward.


    If you have questions about how any of these developments affect your organization, or if you want to talk through your AI adoption roadmap, we are here to help. Schedule a consultation today.




  • Cloud Waste and Other Technology Spending Snafu’s That Could Be Keeping Your Tech Spending Skyhigh
  • Anthropic’s AI product Claude experienced a surge in new subscribers after they told the government “no” to removing safeguards, a new look at AI ethics
  • Government backed cybersecurity agency CISA down to just 38% of its optimal staffing levels after funding cuts, what it means for your business
  • This article was powered by Valley Techlogic, leading provider of trouble free IT services for businesses in California including Merced, Fresno, Stockton & More. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on X at https://x.com/valleytechlogic and LinkedIn at https://www.linkedin.com/company/valley-techlogic-inc/.

  • Cloud Waste and Other Technology Spending Snafu’s That Could Be Keeping Your Tech Spending Skyhigh

    Cloud Waste and Other Technology Spending Snafu’s That Could Be Keeping Your Tech Spending Skyhigh

    For many small businesses, technology spending starts with good intentions. A new tool solves a real problem. A subscription adds convenience. A cloud service promises scalability.


    Fast forward a year or two, and that same environment often turns into a tangled web of overlapping tools, forgotten subscriptions, and quietly rising monthly costs. This is cloud waste. And for small to mid-sized businesses, it is one of the most common and preventable drains on profitability. Cloud waste is not just about overspending on infrastructure. It is usually a combination of small inefficiencies that compound over time.


    You might see it in:

    • Licenses assigned to former employees that were never reclaimed
    • Multiple tools doing the same job across departments
    • “Free trials” that quietly converted into paid subscriptions
    • SaaS platforms with premium tiers that no one is actually using
    • Cloud resources that were spun up for a project and never shut down

    Individually, these seem minor. Together, they can represent thousands or even tens of thousands of dollars per year in unnecessary spend.


    Stack creep happens when your technology environment grows organically without coordination. Different teams adopt different tools. Leadership approves purchases reactively. No one owns the full picture.


    Subscription creep is the financial side of that problem. Recurring charges stack up across:

    • SaaS applications
    • Cloud hosting platforms
    • Security add-ons
    • Collaboration tools
    • Backup and storage services

    The real issue is not just the cost. It is the lack of visibility. Most small businesses cannot easily answer a simple question:
    “What are we actually paying for each month, and do we still need all of it?” If you cannot answer that quickly, you are almost certainly overspending.


    This problem tends to get worse over time.Technology spending rarely gets audited with the same rigor as payroll or rent, subscriptions may be decentralized across departments and the charges are just small enough to fly by when reviewed individually. However, when reviewed as a whole that’s when the real picture emerges. We also want to note, fixing this does not require ripping everything out. A thorough accounting and review with a trust IT profession (like Valley Techlogic) can help get these wayward costs under control and evaluate the tools your business actually needs.


    We would start with the basics:

    • Establish a single source of truth for all subscriptions and vendors
    • Assign ownership of each tool to a specific person or role
    • Conduct quarterly reviews of usage, licenses, and value delivered
    • Eliminate duplicate tools and consolidate where possible
    • Right-size licensing tiers based on actual usage, not assumptions
    • Implement offboarding processes that immediately reclaim licenses

    The goal is not just cost reduction, it is reducing the scale to what you’re actually using. When you control your stack, you can make intentional decisions about where to invest in your tech and where to cut.


    We also wanted to provided a quick note for California Business Owners specifically, if your business is based in California, you have a few advantages when it comes to cancelling unwanted subscriptions. Under California’s Automatic Renewal Law, companies are required to make cancellation reasonably accessible.


    That means:

    • If you signed up online, you must be able to cancel online
    • Companies must provide clear cancellation instructions
    • You cannot be forced into unnecessary steps like calling during limited hours if the service was purchased digitally

    Reducing cloud waste is not just about saving money. It is about reallocating that money to things that actually move the business forward. If your tech stack has grown without a clear plan, you are not alone but continuing to ignore it is expensive. A focused review of your environment can often cut a significant percentage of your technology spend without sacrificing capability, and Valley Techlogic can assist you with that evaluation. Learn more today with a consultation.




  • Anthropic’s AI product Claude experienced a surge in new subscribers after they told the government “no” to removing safeguards, a new look at AI ethics
  • Government backed cybersecurity agency CISA down to just 38% of its optimal staffing levels after funding cuts, what it means for your business
  • The biggest risk to your business might be a past employee, our guide to offboarding a past employee properly

    This article was powered by Valley Techlogic, leading provider of trouble free IT services for businesses in California including Merced, Fresno, Stockton & More. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on X at https://x.com/valleytechlogic and LinkedIn at https://www.linkedin.com/company/valley-techlogic-inc/.

  • Anthropic’s AI product Claude experienced a surge in new subscribers after they told the government “no” to removing safeguards, a new look at AI ethics

    Anthropic’s AI product Claude experienced a surge in new subscribers after they told the government “no” to removing safeguards, a new look at AI ethics

    Artificial intelligence companies are quickly discovering that ethics is not just a philosophical debate. It is becoming a market decision.


    Recently, Anthropic, the company behind the AI assistant Claude, reportedly saw a surge in new subscribers after refusing to weaken certain safety safeguards in response to government pressure. The situation has sparked a broader conversation about how AI companies balance regulatory demands, safety systems, and public trust.


    For businesses and everyday users who rely on AI tools, the moment highlights a bigger question. Who decides how powerful technology should behave?


    Anthropic publicly indicated that it would not remove or weaken several built-in safeguards designed to prevent harmful or unsafe outputs from its Claude AI system. These safeguards are part of the company’s long standing focus on what it calls “constitutional AI,” a framework designed to make the model behave according to defined ethical guidelines.


    After the company made its position clear, reports surfaced that Claude experienced a noticeable spike in new users and paid subscribers. Many users interpreted the decision as a sign that Anthropic was willing to prioritize safety and transparency rather than bending to outside pressure.


    The government’s request reportedly included opening the product up to mass surveillance and autonomous weapons. A growing number of users want AI tools that demonstrate clear ethical boundaries and Anthropic released this statement as a direct response to the Department of War’s request.


    At the same time, OpenAI took a different path. The company agreed to certain government conditions and partnerships intended to shape how its AI systems are deployed and governed.


    Supporters argue this collaboration helps ensure national security oversight and responsible AI development. Critics worry that deeper cooperation between AI companies and governments could lead to more influence over how these systems behave.


    This contrast between Anthropic and OpenAI has fueled debate within the technology community. One company chose to publicly resist modifying safety controls, while the other agreed to work within government defined frameworks. Neither approach is necessarily simple. Each reflects a different philosophy about how powerful AI technology should be managed.


    Artificial intelligence systems are quickly becoming embedded in business operations, software development, cybersecurity analysis, and everyday productivity tools. Decisions about safeguards are not theoretical. They directly influence how these systems behave in real world environments.


    When companies decide whether to weaken or strengthen safety systems, several factors come into play.

    • Public trust in the platform
    • Legal and regulatory pressure
    • National security concerns
    • Competition between AI providers
    • Ethical responsibility for how the technology is used

    The recent surge in Claude subscribers suggests that a portion of the market is paying close attention to how AI companies handle these decisions. Users are no longer just comparing features, they are comparing values and whether the products they’re supporting with their hard earned money align with those values.


    The AI industry has moved far beyond experimental research. It is now a competitive marketplace where reputation matters.


    Companies that demonstrate transparency about safety practices may gain credibility with customers who are concerned about misuse, misinformation, or privacy. At the same time, companies that cooperate closely with governments may gain regulatory stability and access to major contracts. Both strategies will likely continue to shape the next phase of the AI market.


    Anthropic’s experience shows that ethical positioning can directly affect adoption. When users believe a platform is protecting safety standards, they may be more willing to trust it with their data, workflows, and decisions.


    For organizations using AI tools, the takeaway is not about picking sides between companies. The real lesson is that governance around AI is evolving rapidly.


    Business leaders should be asking a few key questions when adopting AI platforms.

    • What safeguards are built into the system
    • Who influences how the system behaves
    • How transparent the vendor is about safety policies
    • Whether the company has a clear ethical framework

    AI is quickly becoming part of everyday business infrastructure. Just like cybersecurity or data privacy, the policies behind the technology matter.


    The recent attention surrounding Anthropic and OpenAI is a reminder that the future of AI will not only be defined by capability. It will also be defined by the choices companies make when pressure arrives.


    And as Claude’s subscriber spike suggests, users are paying attention. If evaluating AI tools for your business is a priority for 2026, you’re not alone. We have had collaborative conversations with our clients at an increasing rate as they look for AI solutions that fit their needs and align with their company mission statements, and we help them address those evaluations from a technical standpoint. Learn more today with a consultation.




  • Government backed cybersecurity agency CISA down to just 38% of its optimal staffing levels after funding cuts, what it means for your business
  • The biggest risk to your business might be a past employee, our guide to offboarding a past employee properly
  • Starting next month, you’ll need photo ID to fully access Discord and users are not happy
  • The Verizon outage that left more than a million without cell service yesterday is fixed, but what caused it?

    This article was powered by Valley Techlogic, leading provider of trouble free IT services for businesses in California including Merced, Fresno, Stockton & More. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on X at https://x.com/valleytechlogic and LinkedIn at https://www.linkedin.com/company/valley-techlogic-inc/.

  • Government backed cybersecurity agency CISA down to just 38% of its optimal staffing levels after funding cuts, what it means for your business

    Government backed cybersecurity agency CISA down to just 38% of its optimal staffing levels after funding cuts, what it means for your business

    CISA which stands for Cybersecurity & Infrastructure Security Agency is a federally recognized and funded cybersecurity agency that works to protect the United States from cyber threats, their mission statement reads:


    We lead the national effort to understand, manage, and reduce risk to our cyber and physical infrastructure.”


    CISA collects, analyzes, and shares threat intelligence so organizations can act before damage occurs. This includes vulnerability alerts, Known Exploited Vulnerabilities (KEV) catalog updates, and joint advisories with partners like the FBI and NSA. The goal is simple: shorten the time between “threat discovered” and “defenses updated.”


    Now due to federal cuts initiated by the Trump administration they’re operating at just 38% of their necessary staffing levels, these cuts included staff that worked under programs such as the counter-ransomware initiative and one that oversaw efforts to promote secure software development. Many of their employees were also reassigned to other agencies such as the Department of Homeland Security as funding and efforts are shifted to the administration’s immigration crackdowns.


    CISA has also been without a permanent director since Trump took office, leaving the agency both without the necessary manpower and crucial leadership guidance. While the agency continues to exist, it’s hard to ignore that these cuts may have a real time effect on our country’s national security. Business owners in particular should be wary of an increase in potential threat as bad actors may take advantage of this gap.


    Cuts to government programs such as these can trickle down to business owners, the effects will not be immediate but sustained cuts to CISA can quietly increase cyber risk, slow federal support, and shift more responsibility (and cost) onto businesses and their MSPs. These are four trickle down affects you should be aware of:

    1. Slower and shallower threat intelligence

    CISA is one of the primary pipes pushing timely threat intelligence to the private sector. If funding drops, you often see:


    • Fewer or slower vulnerability advisories
    • Less frequent updates to the Known Exploited Vulnerabilities catalog
    • Reduced joint analysis with FBI and NSA
    • Less sector-specific guidance

    Business impact:
    Owners and MSPs get less early warning. That increases dwell time for attackers and raises breach probability over time.


    2. Reduced free security services

    Many organizations (including SMBs, schools, local governments, and some private entities) rely on CISA’s no-cost services such as:

    • Cyber Hygiene scanning
    • Vulnerability disclosure coordination
    • Remote penetration testing (for eligible businesses)
    • Phishing campaign assessments

    If budgets tighten, these programs are often first on the chopping block or become capacity-constrained, leaving you optionless when you need their support.


    Business impact:

    • Fewer free scans available
    • Longer wait times
    • More reliance on paid security assessments
    • MSPs must fill the gap

    3. Weaker critical infrastructure resilience

    CISA plays a coordination role across sectors like healthcare, energy, water, and transportation. Funding cuts can mean:

    • Fewer field advisors
    • Less regional engagement
    • Reduced ICS/OT security work
    • Slower cross-sector coordination

    Business impact:

    Even if you think of yours as “just a small business,” you depend on these sectors. Increased fragility upstream can mean:

    • More outages
    • More supply chain disruptions
    • Higher cyber insurance pressure
    • More third-party risk exposure

    This is the second-order effect many owners miss.

    4. Slower incident response support at scale


    For large or multi-organization incidents, CISA helps coordinate national response. With fewer resources:

    • Surge capacity drops
    • Federal assistance may triage more aggressively
    • Recovery guidance may lag during major events

    Business impact:

    Most business owners do not call CISA directly. But during widespread campaigns (think mass exploitation events), weaker federal coordination can mean:

    • Longer active threat windows
    • More widespread compromise
    • Slower ecosystem-wide containment

    The bottom line, cuts such as these carry consequences, some that you can anticipate and some that you can’t.  Either way, it’s of the utmost importance that in 2026 you have protections in place that specifically cover your business from threat actors, regardless of what protections may be in place nationwide. All Valley Techlogic plans include cybersecurity protections (including 24/7 threat detection and monitoring) by default. Learn more today through a consultation.



  • The biggest risk to your business might be a past employee, our guide to offboarding a past employee properly
  • Starting next month, you’ll need photo ID to fully access Discord and users are not happy
  • The Verizon outage that left more than a million without cell service yesterday is fixed, but what caused it?
  • Microsoft 365 Business Premium with Copilot Included? This new SKU makes integrating AI into your business more affordable and accessible
  • This article was powered by Valley Techlogic, leading provider of trouble free IT services for businesses in California including Merced, Fresno, Stockton & More. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on X at https://x.com/valleytechlogic and LinkedIn at https://www.linkedin.com/company/valley-techlogic-inc/.

  • The biggest risk to your business might be a past employee, our guide to offboarding a past employee properly

    The biggest risk to your business might be a past employee, our guide to offboarding a past employee properly

    When most business owners think about security risks, they picture hackers, ransomware, or phishing emails. Those threats are real. But in many small and midsize businesses, the biggest exposure is much closer to home.


    It is the former employee whose access was never fully removed.


    Improper offboarding is one of the most common and most expensive security gaps we see at Valley Techlogic. A user account left active, a shared password that never changed, or a mobile device that still syncs company email can quietly create major risk months after someone leaves. If your offboarding process is informal or inconsistent, now is the time to fix it.


    Why past employees are a real security risk


    Most former staff are not malicious. The risk usually comes from oversight, not intent. However, the impact can be just as damaging.


    Here is what commonly goes wrong:


    • Email accounts remain active and continue receiving sensitive information
    • Microsoft 365 or Google Workspace access is never fully revoked
    • Saved credentials remain on personal or unmanaged devices
    • Shared passwords are not rotated after departure
    • VPN or remote access tools stay enabled
    • File ownership and permissions are never reassigned

    For IT staff and security teams, this is basic hygiene. But in the real world, especially in small business environments, offboarding often happens in a rush. HR processes the paperwork, IT is notified late or not at all, and access cleanup becomes partial at best. You only need one missed system to create a problem.


    Many organizations assume that if the employee was trustworthy, there is little to worry about. That is a dangerous assumption. Former employee risk shows up in these five ways:


    1. Data exposure Old accounts can still access client files, financial records, and internal communications.
    2. Compliance violations For regulated industries, failure to revoke access can create audit findings or legal exposure.
    3. License waste From a Microsoft 365 CSP perspective, which we deal with daily, inactive users often continue consuming paid licenses long after departure.
    4. Operational confusion Emails, approvals, and system alerts may continue routing to someone who no longer works for you. The longer an account stays active, the more expensive the cleanup becomes.
    5. Your offboarding checklist that actually works If you want an offboarding process that holds up under real world pressure, it needs to be standardized and repeatable. This is the baseline we recommend to clients across California.

    Remediating these issues is as simple as a step by step process outlined below:


    Identity and access

    • Disable the user in Entra ID or your directory immediately
    • Revoke all active sessions and tokens
    • Remove MFA methods tied to personal devices
    • Remove group memberships and admin roles
    • Convert mailbox or archive as needed

    Email and collaboration

    • Set mailbox forwarding if business continuity requires it
    • Assign mailbox and OneDrive ownership
    • Remove from Teams, SharePoint, and distribution lists
    • Review inbox rules and external forwarding

    Devices and endpoints

    • Collect company owned hardware
    • Remove device from Intune or MDM
    • Wipe or reset as appropriate
    • Verify no unmanaged personal devices retain access

    Network and remote access

    • Disable VPN accounts
    • Remove remote management tools
    • Rotate any shared credentials
    • Review firewall and WiFi access lists

    Licensing and billing

    • Remove or reassign Microsoft 365 licenses
    • Validate billing alignment in CSP or direct
    • Document the change for audit trail

    If this feels like a lot, that is because it is. Mature environments automate most of this.


    Timing matters more than you think


    One of the biggest mistakes we see is delay. Offboarding should begin the moment HR confirms separation, not days later.


    Best practice is:


    • Immediate access disable as soon as termination discussions are over
    • Same day device and license review
    • 24 hour validation sweep across key systems

    In environments using Entra ID, Conditional Access, and centralized device management, this can be largely automated. In fragmented environments, it becomes manual and error prone. This is where many SMBs get into trouble.


    How to future proof your offboarding process


    If you want this to stop being a fire drill every time someone leaves, focus on three structural improvements.


    1. First, centralize identity. The more systems tied to Entra ID or your primary directory, the easier clean removal becomes.
    2. Second, automate wherever possible. PowerShell, Graph automation, and lifecycle workflows dramatically reduce human error. This is exactly why many MSPs, including Valley Techlogic deployments, invest heavily in standardized offboarding runbooks.
    3. Third, require HR and IT alignment. Offboarding failures are often communication failures. A simple, enforced workflow between departments eliminates most risk.

    The bottom line is cybersecurity is not only about stopping outside attackers. It is about maintaining control of your own environment. A single overlooked account from a past employee can quietly undermine your security, your compliance posture, and your licensing costs. If your offboarding process lives in a checklist on someone’s desktop or depends on memory, it is time to tighten it up.


    At Valley Techlogic, we help organizations across California turn offboarding into a controlled, repeatable process that closes risk instead of creating it. If you are not completely confident in your current process, now is the right time to review it. Learn more today through a consultation.





  • Investors are getting nervous as tech stocks tumble amid shakeups in AI and Bitcoin
  • This week 16,000 Amazon employees learned they were losing their job via an erroneously sent email
  • The Verizon outage that left more than a million without cell service yesterday is fixed, but what caused it?
  • Microsoft 365 Business Premium with Copilot Included? This new SKU makes integrating AI into your business more affordable and accessible
  • This article was powered by Valley Techlogic, leading provider of trouble free IT services for businesses in California including Merced, Fresno, Stockton & More. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on X at https://x.com/valleytechlogic and LinkedIn at https://www.linkedin.com/company/valley-techlogic-inc/.

  • Starting next month, you’ll need photo ID to fully access Discord and users are not happy

    Starting next month, you’ll need photo ID to fully access Discord and users are not happy

    This week, Discord announced that it will be rolling out ID verification globally. They have already required this in the UK and Australia where privacy laws to protect minors have been enacted, but this push to also cover the US has some users up in arms about the policy.


    This is after controversaries involving minors rocked the platform this year, with some allegations of impropriety occurring on the platform as it did in the Roblox space earlier this year. With a spotlight shining on the issue, it’s likely that Discord sees this as their opportunity to get ahead of further issues.


    Starting next month, everyone will be on a “teen by default” account unless they have been ID verified or Discord can extrapolate from previous interactions with the program that the user is likely an adult (this will include factors such as account age). For those required to verify age they will need to submit government ID or utilize an “AI-powered” video selfie to regain access to adult features.


    These include channels with NSFW content (as verified by Discord themselves), media labeled as “sensitive” will be obscured, and messages and friend requests sent from strangers being routed elsewhere or will include a warning message.


    Users have been vocally against the change, with many citing a data breach that occurred last October that included PII data as a reason not to hand over identification to the company. While Discord announced 70,000 accounts were effected some third-party news sites believe that number to be much higher.


    As privacy laws continue to become more strict, including in the US, there is going to be more of an imperative for protecting private data clients choose to share with you. As with Discord, a data breach in conjunction for a request like this is not a good look. Here are some ways you can protect your client’s PII data as well as advice on proper storage and disposal:


    • Limit access to PII to only employees who require it for their job duties
    • Use multi-factor authentication and strong password policies
    • Encrypt sensitive data both in transit and at rest
    • Store physical records in locked cabinets or secured rooms
    • Keep systems patched and protected with up-to-date security software
    • Train staff regularly on privacy and data handling best practices
    • Retain PII only for as long as it is legally or operationally necessary
    • Shred paper documents before disposal
    • Use certified data destruction methods for retired hardware
    • Maintain audit logs to track access to sensitive information

    If you’re in an industry covered by regulatory compliance (HIPAA, NIST, CMMC, WISP etc) then this list may look very familiar to you. There’s a good bit of cross over between regulatory compliance and common-sense data protection. Even if your industry does not have a formal regulatory compliance need (yet) we suggest that all businesses across the board follow these guidelines, particularly if client data is at stake.



    If regulatory compliance or even just beefing up your cyber security measures in the wake of what feels like an onslaught of data breach news is a goal in 2026, Valley Techlogic has you covered. We utilize the Center for Internet Security (CIS) framework in our own business and are experts at making sure our clients are compliant with regulations that affect their business and have best-in-class protections across the board. Learn more today through a consultation.



  • Investors are getting nervous as tech stocks tumble amid shakeups in AI and Bitcoin
  • This week 16,000 Amazon employees learned they were losing their job via an erroneously sent email
  • The Verizon outage that left more than a million without cell service yesterday is fixed, but what caused it?
  • Microsoft 365 Business Premium with Copilot Included? This new SKU makes integrating AI into your business more affordable and accessible
  • This article was powered by Valley Techlogic, leading provider of trouble free IT services for businesses in California including Merced, Fresno, Stockton & More. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on X at https://x.com/valleytechlogic and LinkedIn at https://www.linkedin.com/company/valley-techlogic-inc/.

  • Investors are getting nervous as tech stocks tumble amid shakeups in AI and Bitcoin

    Investors are getting nervous as tech stocks tumble amid shakeups in AI and Bitcoin

    Giants in the tech stock space are battling it out this week with the news from AI developer Anthropic (creator of Claude AI) that it will be investing more heavily in goal oriented tools when it comes to their AI products. This comes off the back of our recent article about Open.AI segmenting their own product into specialized versions for healthcare and more.


    Existing software companies are feeling the pressure as artificial intelligence creeps into their unique sectors of the market, from the creative tools at Adobe to the CRM capabilities of Salesforce, tax software Intuit and Equifax, and even legal software with LegalZoom all saw significant hits to their overall stock value this week.


    Whether AI is a bubble waiting to burst or on the cusp of emerging to even greater heights remain to be seen, but the evaluations being put forward continue to be eye watering. Even Tesla is entering the race there after the merger between Tesla and xAI (Elon Musk’s own AI product) with a private evaluation of their SpaceX sector estimated at $1.25 trillion. Are these figures based in reality or being propped up by the speculative nature of artificial intelligence in general?


    Needless to say, investors are not convinced as the as the Dow dropped 600 points this Thursday, marking a third day of stock sell offs. There is also the ever growing threat of more regulations and class action lawsuits to claw back protections for data that have largely been overlooked as a means to progress AI domination worldwide.


    Tech stocks weren’t the only things that saw a tumble this week, for the first time since 2024 Bitcoin fell below $67,000, again a reflection that digital assets and digital investments are at risk for an extreme reevaluation as actual reality confronts the speculative nature of virtual reality. It’s also worth noting that the current value is nearly half of the high it reached just this October ($126,000).


    For everyday business owners you may be looking at all this and wondering, what technology upgrades are safe to invest in in 2026?


    Luckily, we have a list of four bullet proof IT investments that will strengthen your business’s technological footing for 2026 and beyond:


    1) Zero Trust Security Architecture

    Security threats are more sophisticated than ever, and breaches are now a question of when, not if. Zero Trust isn’t a buzzword anymore, it’s a strategic shift.

    Practical investments include:

    • Identity-centric controls (MFA, conditional access, least-privilege models
    • Network segmentation and micro-segmentation
    • Continuous verification and endpoint attestation

    Why it’s bulletproof: Attacks will continue to outpace perimeter security. Zero Trust aligns defenses with real risk, not outdated trust boundaries.


    2) Cloud-Native Governance & Cost Optimization

    Most organizations are already in the cloud, but unmanaged cloud spend and technical debt are huge drains.

    Key investments:

    • Governance Frameworks
    • Tagging policies, budget alerts, and cost accountability models
    • Autoscaling controls

    Why it’s bulletproof: Efficient cloud operations directly impact the bottom line. Regardless of tech trends, optimized cloud governance reduces waste and improves agility.

    3) Modern Identity & Access Infrastructure

    Strong identity foundations are the backbone of secure digital operations.

    Investments here include:

    • Enterprise Identity Providers (Azure AD, Okta, Ping, etc.)
    • Privileged Access Management (PAM)
    • Single-Sign-On (SSO) and secure API authentication

    Why it’s bulletproof: Secure, user-centric access isn’t optional. Identity is the new perimeter, and strong identity reduces risks from ransomware to insider threats.


    4) Data Protection & Resilient Backup/Recovery

    With ransomware and regulatory compliance rising, recovery readiness is critical.

    Priority investments:

    • Immutable backups and air-gapped storage
    • Disaster Recovery
    • End-to-end encryption at rest & in transit
    • Robust retention, classification, and recovery testing

    Why it’s bulletproof: Every business must reliably recover from failures or attacks. Better backup and recovery isn’t just defensible, it’s essential.

    While we believe investing in AI is important, it’s even more important not to overlook the benefits of longstanding, common sense derived technology upgrades to your business’s technology that will protect your data, improve efficiency and build resiliency no matter what is occurring in the world at large. Valley Techlogic can help you plan and strategize on ways to thoughtfully introduce new technologies in your business while supporting the day to day tech that keeps your business running. Learn more today with a consultation.

  • This week 16,000 Amazon employees learned they were losing their job via an erroneously sent email
    The Verizon outage that left more than a million without cell service yesterday is fixed, but what caused it?
  • Microsoft 365 Business Premium with Copilot Included? This new SKU makes integrating AI into your business more affordable and accessible
  • Cars, coding… and healthcare? AI behemoths such as OpenAI and more look to diversify their products into applicable categories, but to what end?
  • This article was powered by Valley Techlogic, leading provider of trouble free IT services for businesses in California including Merced, Fresno, Stockton & More. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on X at https://x.com/valleytechlogic and LinkedIn at https://www.linkedin.com/company/valley-techlogic-inc/.

  • This week 16,000 Amazon employees learned they were losing their job via an erroneously sent email

    This week 16,000 Amazon employees learned they were losing their job via an erroneously sent email

    Finding out you’re losing your job is never fun but finding out via an email you were never supposed to see alongside 16,000 other employees might be on another level.


    Such was the case for Amazon this week when an internal email leaked about a global redundancy, shortly after the company announced that jobs would be cut. While the message was sent by mistake and quickly cancelled, the damage was done. Amazon has said the jobs reductions were part of a plan to “remove bureaucracy”, this was after other large cuts specifically to their corporate workforce were announced in October of last year. Many are speculating these cuts are related to Amazon and other tech giants’ investing heavily in AI.


    The draft email was penned by an employee named Colleen Aubrey who is the senior vice president of Amazon Web Services (AWS) and was titled “Send project Dawn email”, Project Dawn is allegedly what Amazon refers to layoffs within the company. This alerted employees that layoffs would be happening before they had officially been told and some employees reported they knew weeks beforehand that a reduction in the workforce would be happening soon. Former staff members were aware of Amazon’s goal to lay off at least 30,000 employees in 2026.


    This also follows other changes to structure within the company, such as returning to a five day a week in office schedule (Amazon is one of the few tech companies that insist on a full-time in-office schedule) and tightening of company expenses, such as reducing the amount given for cell-phone cost reimbursement. Many of these changes link back to new CEO Andy Jassy who directly replaced Jeff Bezo’s as head of the company last year (Jeff Bezo’s still being heavily involved in the back end and focused on Amazon’s space ambitions with Blue Origin). It’s also worth noting that Bezo’s net worth jumped 5.7 billion in the wake of this announcement due to rising stock prices.


    It’s clear we’ll continue to see major shifts in workforces and overall business strategy in 2026, but it’s still a reminder that practicing good email hygiene is paramount to not having plans unintentionally leaked. Events like this can cause panic and uncertainty for employees and reduce overall trust even for companies as large and established as Amazon.



    There are a few things you can do to prevent and mitigate unfortunately email blunders such as the one that occurred this week:


    3 ways to help prevent email leaks


    1) Implement approval workflows for sensitive communications
    Messages involving layoffs, financial updates, legal matters, or internal strategy should require at least one additional reviewer before sending. A second set of eyes often catches wrong distribution lists, accidental attachments, or premature messaging.


    2) Restrict and clearly label large distribution lists
    Large mailing groups should be locked down so only approved users can send to them. Adding clear naming conventions such as “All Employees – Executive Only” or “Leadership Confidential” helps prevent someone from selecting the wrong list in Outlook or Gmail autocomplete.


    3) Use email safeguards and delay-send policies
    Many email platforms allow automatic sending delays (e.g., 1–5 minutes), external recipient warnings, or confirmation prompts when emailing large groups. These safeguards give senders a short window to recall or correct a mistake before the message leaves the organization.

    2 ways to mitigate damage if a leak happens


    1) Respond quickly and transparently
    Silence usually makes situations worse. Leadership should quickly acknowledge the mistake, clarify what information is accurate, and communicate next steps. Fast, honest communication helps reduce rumors and employee anxiety.

    2) Lock down further distribution and investigate immediately
    Disable forwarding where possible, remove access to affected emails or attachments, and review audit logs to understand how the incident occurred. Use findings to update procedures and prevent repeat mistakes.

    In short, email mishaps are rarely caused by technology alone, they’re usually process failures. A mix of communication discipline, permission controls, and technical safeguards dramatically lowers the chance of repeating this kind of incident.


    If technology planning (including email handling) is still being evaluated for your business in 2026, Valley Techlogic can be your partner in setting up systems that work and prevent unexpected surprises. Learn more today with a consultation.


  • Microsoft 365 Business Premium with Copilot Included? This new SKU makes integrating AI into your business more affordable and accessible

    Microsoft 365 Business Premium with Copilot Included? This new SKU makes integrating AI into your business more affordable and accessible

    In 2026, AI has cemented its place in businesses in helping employees achieve more with their time. However, which tool employees choose to use is still a matter of debate for most businesses (and sometimes, even if an approved tool is in place employees will still choose to use something else).

     

    There are some risks involved with allowing employees to choose their own AI tools, AI models in general are trained not only on the data that engineers put in from the start, but also on the data they’re fed from users. This means if your employee shares private or proprietary data with AI, that data is for all intents and purposes now exposed to the internet at large.

     

    That’s where Microsoft’s Copilot 365 product originally came to be, to solve this problem by allowing businesses to set rules within their Microsoft tenant on how and when data is shared (including not sharing any data at all with learning models). However, there was a significant upfront cost for this service initially that may have been off putting to businesses only dipping their toes into the AI arena for the first time.

     

    At launch, Microsoft’s Copilot 365 was $360 a year per user, ensuring any business that chooses to use it would be fully locked into the product for a full year. Now, not only is there a month-to-month option ($31.50 per year) they have also released a SKU that combines Microsoft’s Copilot 365 with Microsoft Business Premium (which many businesses already have for the superior protection included that are not found under the Basic and Standard SKUs). This product is available for the discounted price of $45.15 (compared to $54.60 to purchase them separately). You still must sign up for an annual commitment but the month-to-month flexibility should help with businesses trying to get a handle of their technological costs.

     

    Microsoft’s Copilot is a superior product to other AI tools on the market (including those aimed specifically for business users) in the following ways:

     

      • Direct Integration: Embedded directly in Outlook, Word, Excel, PowerPoint, Teams, and OneDrive, no separate tools, logins, or workflows.
      • Understands Your Organization’s Data: Uses your existing Microsoft 365 tenant data (emails, files, chats, calendars, meetings) with permissions fully respected.
      • Context-Aware Email & Communication Assistance: Drafts, summarizes, and replies to emails using real conversation history, attachments, and meeting context.
      • Document Creation & Refinement: Generates, rewrites, summarizes, and formats Word documents based on your internal files and past work, not generic templates.
      • Excel Analysis (Without Formulas): Analyzes data, explains trends, builds summaries, and generates formulas using plain English instructions
      • PowerPoint from Existing Content: Creates presentations from Word documents, notes, or OneDrive files, automatically structuring slides and speaker notes.
      • Smarter Meetings in Microsoft Teams: Summarizes meetings, highlights action items, tracks decisions, and answers questions about what was discussed—even if you joined late.
      • Real-Time Business Q&A: Ask questions like “What did we decide about Project X?” or “Summarize last quarter’s client issues” and get answers sourced from your tenant.
      • Security & Compliance Built In: Honors Microsoft 365 security controls, data boundaries, retention policies, and user permissions, no data used to train public models.
      • No Disruption to Existing IT Controls: Managed through Microsoft 365 admin tools, licensing, and policies you already use.

     

    In a nutshell, it’s not a good idea to allow your employees to select their own AI tools, by selecting Copilot you’re safeguarding your companies’ data while giving them a tool that integrates directly with their day-to-day activities.

     

    If rolling out AI in your business is still a priority in 2026, Valley Techlogic has strived to stay at the forefront of new and exciting changes in AI. We are able to craft an implementation plan that works with your business while addressing concerns like data safety and employee adoption. Learn more today through a consultation.