Category: Uncategorized

  • The biggest risk to your business might be a past employee, our guide to offboarding a past employee properly

    The biggest risk to your business might be a past employee, our guide to offboarding a past employee properly

    When most business owners think about security risks, they picture hackers, ransomware, or phishing emails. Those threats are real. But in many small and midsize businesses, the biggest exposure is much closer to home.


    It is the former employee whose access was never fully removed.


    Improper offboarding is one of the most common and most expensive security gaps we see at Valley Techlogic. A user account left active, a shared password that never changed, or a mobile device that still syncs company email can quietly create major risk months after someone leaves. If your offboarding process is informal or inconsistent, now is the time to fix it.


    Why past employees are a real security risk


    Most former staff are not malicious. The risk usually comes from oversight, not intent. However, the impact can be just as damaging.


    Here is what commonly goes wrong:


    • Email accounts remain active and continue receiving sensitive information
    • Microsoft 365 or Google Workspace access is never fully revoked
    • Saved credentials remain on personal or unmanaged devices
    • Shared passwords are not rotated after departure
    • VPN or remote access tools stay enabled
    • File ownership and permissions are never reassigned

    For IT staff and security teams, this is basic hygiene. But in the real world, especially in small business environments, offboarding often happens in a rush. HR processes the paperwork, IT is notified late or not at all, and access cleanup becomes partial at best. You only need one missed system to create a problem.


    Many organizations assume that if the employee was trustworthy, there is little to worry about. That is a dangerous assumption. Former employee risk shows up in these five ways:


    1. Data exposure Old accounts can still access client files, financial records, and internal communications.
    2. Compliance violations For regulated industries, failure to revoke access can create audit findings or legal exposure.
    3. License waste From a Microsoft 365 CSP perspective, which we deal with daily, inactive users often continue consuming paid licenses long after departure.
    4. Operational confusion Emails, approvals, and system alerts may continue routing to someone who no longer works for you. The longer an account stays active, the more expensive the cleanup becomes.
    5. Your offboarding checklist that actually works If you want an offboarding process that holds up under real world pressure, it needs to be standardized and repeatable. This is the baseline we recommend to clients across California.

    Remediating these issues is as simple as a step by step process outlined below:


    Identity and access

    • Disable the user in Entra ID or your directory immediately
    • Revoke all active sessions and tokens
    • Remove MFA methods tied to personal devices
    • Remove group memberships and admin roles
    • Convert mailbox or archive as needed

    Email and collaboration

    • Set mailbox forwarding if business continuity requires it
    • Assign mailbox and OneDrive ownership
    • Remove from Teams, SharePoint, and distribution lists
    • Review inbox rules and external forwarding

    Devices and endpoints

    • Collect company owned hardware
    • Remove device from Intune or MDM
    • Wipe or reset as appropriate
    • Verify no unmanaged personal devices retain access

    Network and remote access

    • Disable VPN accounts
    • Remove remote management tools
    • Rotate any shared credentials
    • Review firewall and WiFi access lists

    Licensing and billing

    • Remove or reassign Microsoft 365 licenses
    • Validate billing alignment in CSP or direct
    • Document the change for audit trail

    If this feels like a lot, that is because it is. Mature environments automate most of this.


    Timing matters more than you think


    One of the biggest mistakes we see is delay. Offboarding should begin the moment HR confirms separation, not days later.


    Best practice is:


    • Immediate access disable as soon as termination discussions are over
    • Same day device and license review
    • 24 hour validation sweep across key systems

    In environments using Entra ID, Conditional Access, and centralized device management, this can be largely automated. In fragmented environments, it becomes manual and error prone. This is where many SMBs get into trouble.


    How to future proof your offboarding process


    If you want this to stop being a fire drill every time someone leaves, focus on three structural improvements.


    1. First, centralize identity. The more systems tied to Entra ID or your primary directory, the easier clean removal becomes.
    2. Second, automate wherever possible. PowerShell, Graph automation, and lifecycle workflows dramatically reduce human error. This is exactly why many MSPs, including Valley Techlogic deployments, invest heavily in standardized offboarding runbooks.
    3. Third, require HR and IT alignment. Offboarding failures are often communication failures. A simple, enforced workflow between departments eliminates most risk.

    The bottom line is cybersecurity is not only about stopping outside attackers. It is about maintaining control of your own environment. A single overlooked account from a past employee can quietly undermine your security, your compliance posture, and your licensing costs. If your offboarding process lives in a checklist on someone’s desktop or depends on memory, it is time to tighten it up.


    At Valley Techlogic, we help organizations across California turn offboarding into a controlled, repeatable process that closes risk instead of creating it. If you are not completely confident in your current process, now is the right time to review it. Learn more today through a consultation.





  • Investors are getting nervous as tech stocks tumble amid shakeups in AI and Bitcoin
  • This week 16,000 Amazon employees learned they were losing their job via an erroneously sent email
  • The Verizon outage that left more than a million without cell service yesterday is fixed, but what caused it?
  • Microsoft 365 Business Premium with Copilot Included? This new SKU makes integrating AI into your business more affordable and accessible
  • This article was powered by Valley Techlogic, leading provider of trouble free IT services for businesses in California including Merced, Fresno, Stockton & More. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on X at https://x.com/valleytechlogic and LinkedIn at https://www.linkedin.com/company/valley-techlogic-inc/.

  • Starting next month, you’ll need photo ID to fully access Discord and users are not happy

    Starting next month, you’ll need photo ID to fully access Discord and users are not happy

    This week, Discord announced that it will be rolling out ID verification globally. They have already required this in the UK and Australia where privacy laws to protect minors have been enacted, but this push to also cover the US has some users up in arms about the policy.


    This is after controversaries involving minors rocked the platform this year, with some allegations of impropriety occurring on the platform as it did in the Roblox space earlier this year. With a spotlight shining on the issue, it’s likely that Discord sees this as their opportunity to get ahead of further issues.


    Starting next month, everyone will be on a “teen by default” account unless they have been ID verified or Discord can extrapolate from previous interactions with the program that the user is likely an adult (this will include factors such as account age). For those required to verify age they will need to submit government ID or utilize an “AI-powered” video selfie to regain access to adult features.


    These include channels with NSFW content (as verified by Discord themselves), media labeled as “sensitive” will be obscured, and messages and friend requests sent from strangers being routed elsewhere or will include a warning message.


    Users have been vocally against the change, with many citing a data breach that occurred last October that included PII data as a reason not to hand over identification to the company. While Discord announced 70,000 accounts were effected some third-party news sites believe that number to be much higher.


    As privacy laws continue to become more strict, including in the US, there is going to be more of an imperative for protecting private data clients choose to share with you. As with Discord, a data breach in conjunction for a request like this is not a good look. Here are some ways you can protect your client’s PII data as well as advice on proper storage and disposal:


    • Limit access to PII to only employees who require it for their job duties
    • Use multi-factor authentication and strong password policies
    • Encrypt sensitive data both in transit and at rest
    • Store physical records in locked cabinets or secured rooms
    • Keep systems patched and protected with up-to-date security software
    • Train staff regularly on privacy and data handling best practices
    • Retain PII only for as long as it is legally or operationally necessary
    • Shred paper documents before disposal
    • Use certified data destruction methods for retired hardware
    • Maintain audit logs to track access to sensitive information

    If you’re in an industry covered by regulatory compliance (HIPAA, NIST, CMMC, WISP etc) then this list may look very familiar to you. There’s a good bit of cross over between regulatory compliance and common-sense data protection. Even if your industry does not have a formal regulatory compliance need (yet) we suggest that all businesses across the board follow these guidelines, particularly if client data is at stake.



    If regulatory compliance or even just beefing up your cyber security measures in the wake of what feels like an onslaught of data breach news is a goal in 2026, Valley Techlogic has you covered. We utilize the Center for Internet Security (CIS) framework in our own business and are experts at making sure our clients are compliant with regulations that affect their business and have best-in-class protections across the board. Learn more today through a consultation.



  • Investors are getting nervous as tech stocks tumble amid shakeups in AI and Bitcoin
  • This week 16,000 Amazon employees learned they were losing their job via an erroneously sent email
  • The Verizon outage that left more than a million without cell service yesterday is fixed, but what caused it?
  • Microsoft 365 Business Premium with Copilot Included? This new SKU makes integrating AI into your business more affordable and accessible
  • This article was powered by Valley Techlogic, leading provider of trouble free IT services for businesses in California including Merced, Fresno, Stockton & More. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on X at https://x.com/valleytechlogic and LinkedIn at https://www.linkedin.com/company/valley-techlogic-inc/.

  • Investors are getting nervous as tech stocks tumble amid shakeups in AI and Bitcoin

    Investors are getting nervous as tech stocks tumble amid shakeups in AI and Bitcoin

    Giants in the tech stock space are battling it out this week with the news from AI developer Anthropic (creator of Claude AI) that it will be investing more heavily in goal oriented tools when it comes to their AI products. This comes off the back of our recent article about Open.AI segmenting their own product into specialized versions for healthcare and more.


    Existing software companies are feeling the pressure as artificial intelligence creeps into their unique sectors of the market, from the creative tools at Adobe to the CRM capabilities of Salesforce, tax software Intuit and Equifax, and even legal software with LegalZoom all saw significant hits to their overall stock value this week.


    Whether AI is a bubble waiting to burst or on the cusp of emerging to even greater heights remain to be seen, but the evaluations being put forward continue to be eye watering. Even Tesla is entering the race there after the merger between Tesla and xAI (Elon Musk’s own AI product) with a private evaluation of their SpaceX sector estimated at $1.25 trillion. Are these figures based in reality or being propped up by the speculative nature of artificial intelligence in general?


    Needless to say, investors are not convinced as the as the Dow dropped 600 points this Thursday, marking a third day of stock sell offs. There is also the ever growing threat of more regulations and class action lawsuits to claw back protections for data that have largely been overlooked as a means to progress AI domination worldwide.


    Tech stocks weren’t the only things that saw a tumble this week, for the first time since 2024 Bitcoin fell below $67,000, again a reflection that digital assets and digital investments are at risk for an extreme reevaluation as actual reality confronts the speculative nature of virtual reality. It’s also worth noting that the current value is nearly half of the high it reached just this October ($126,000).


    For everyday business owners you may be looking at all this and wondering, what technology upgrades are safe to invest in in 2026?


    Luckily, we have a list of four bullet proof IT investments that will strengthen your business’s technological footing for 2026 and beyond:


    1) Zero Trust Security Architecture

    Security threats are more sophisticated than ever, and breaches are now a question of when, not if. Zero Trust isn’t a buzzword anymore, it’s a strategic shift.

    Practical investments include:

    • Identity-centric controls (MFA, conditional access, least-privilege models
    • Network segmentation and micro-segmentation
    • Continuous verification and endpoint attestation

    Why it’s bulletproof: Attacks will continue to outpace perimeter security. Zero Trust aligns defenses with real risk, not outdated trust boundaries.


    2) Cloud-Native Governance & Cost Optimization

    Most organizations are already in the cloud, but unmanaged cloud spend and technical debt are huge drains.

    Key investments:

    • Governance Frameworks
    • Tagging policies, budget alerts, and cost accountability models
    • Autoscaling controls

    Why it’s bulletproof: Efficient cloud operations directly impact the bottom line. Regardless of tech trends, optimized cloud governance reduces waste and improves agility.

    3) Modern Identity & Access Infrastructure

    Strong identity foundations are the backbone of secure digital operations.

    Investments here include:

    • Enterprise Identity Providers (Azure AD, Okta, Ping, etc.)
    • Privileged Access Management (PAM)
    • Single-Sign-On (SSO) and secure API authentication

    Why it’s bulletproof: Secure, user-centric access isn’t optional. Identity is the new perimeter, and strong identity reduces risks from ransomware to insider threats.


    4) Data Protection & Resilient Backup/Recovery

    With ransomware and regulatory compliance rising, recovery readiness is critical.

    Priority investments:

    • Immutable backups and air-gapped storage
    • Disaster Recovery
    • End-to-end encryption at rest & in transit
    • Robust retention, classification, and recovery testing

    Why it’s bulletproof: Every business must reliably recover from failures or attacks. Better backup and recovery isn’t just defensible, it’s essential.

    While we believe investing in AI is important, it’s even more important not to overlook the benefits of longstanding, common sense derived technology upgrades to your business’s technology that will protect your data, improve efficiency and build resiliency no matter what is occurring in the world at large. Valley Techlogic can help you plan and strategize on ways to thoughtfully introduce new technologies in your business while supporting the day to day tech that keeps your business running. Learn more today with a consultation.

  • This week 16,000 Amazon employees learned they were losing their job via an erroneously sent email
    The Verizon outage that left more than a million without cell service yesterday is fixed, but what caused it?
  • Microsoft 365 Business Premium with Copilot Included? This new SKU makes integrating AI into your business more affordable and accessible
  • Cars, coding… and healthcare? AI behemoths such as OpenAI and more look to diversify their products into applicable categories, but to what end?
  • This article was powered by Valley Techlogic, leading provider of trouble free IT services for businesses in California including Merced, Fresno, Stockton & More. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on X at https://x.com/valleytechlogic and LinkedIn at https://www.linkedin.com/company/valley-techlogic-inc/.

  • This week 16,000 Amazon employees learned they were losing their job via an erroneously sent email

    This week 16,000 Amazon employees learned they were losing their job via an erroneously sent email

    Finding out you’re losing your job is never fun but finding out via an email you were never supposed to see alongside 16,000 other employees might be on another level.


    Such was the case for Amazon this week when an internal email leaked about a global redundancy, shortly after the company announced that jobs would be cut. While the message was sent by mistake and quickly cancelled, the damage was done. Amazon has said the jobs reductions were part of a plan to “remove bureaucracy”, this was after other large cuts specifically to their corporate workforce were announced in October of last year. Many are speculating these cuts are related to Amazon and other tech giants’ investing heavily in AI.


    The draft email was penned by an employee named Colleen Aubrey who is the senior vice president of Amazon Web Services (AWS) and was titled “Send project Dawn email”, Project Dawn is allegedly what Amazon refers to layoffs within the company. This alerted employees that layoffs would be happening before they had officially been told and some employees reported they knew weeks beforehand that a reduction in the workforce would be happening soon. Former staff members were aware of Amazon’s goal to lay off at least 30,000 employees in 2026.


    This also follows other changes to structure within the company, such as returning to a five day a week in office schedule (Amazon is one of the few tech companies that insist on a full-time in-office schedule) and tightening of company expenses, such as reducing the amount given for cell-phone cost reimbursement. Many of these changes link back to new CEO Andy Jassy who directly replaced Jeff Bezo’s as head of the company last year (Jeff Bezo’s still being heavily involved in the back end and focused on Amazon’s space ambitions with Blue Origin). It’s also worth noting that Bezo’s net worth jumped 5.7 billion in the wake of this announcement due to rising stock prices.


    It’s clear we’ll continue to see major shifts in workforces and overall business strategy in 2026, but it’s still a reminder that practicing good email hygiene is paramount to not having plans unintentionally leaked. Events like this can cause panic and uncertainty for employees and reduce overall trust even for companies as large and established as Amazon.



    There are a few things you can do to prevent and mitigate unfortunately email blunders such as the one that occurred this week:


    3 ways to help prevent email leaks


    1) Implement approval workflows for sensitive communications
    Messages involving layoffs, financial updates, legal matters, or internal strategy should require at least one additional reviewer before sending. A second set of eyes often catches wrong distribution lists, accidental attachments, or premature messaging.


    2) Restrict and clearly label large distribution lists
    Large mailing groups should be locked down so only approved users can send to them. Adding clear naming conventions such as “All Employees – Executive Only” or “Leadership Confidential” helps prevent someone from selecting the wrong list in Outlook or Gmail autocomplete.


    3) Use email safeguards and delay-send policies
    Many email platforms allow automatic sending delays (e.g., 1–5 minutes), external recipient warnings, or confirmation prompts when emailing large groups. These safeguards give senders a short window to recall or correct a mistake before the message leaves the organization.

    2 ways to mitigate damage if a leak happens


    1) Respond quickly and transparently
    Silence usually makes situations worse. Leadership should quickly acknowledge the mistake, clarify what information is accurate, and communicate next steps. Fast, honest communication helps reduce rumors and employee anxiety.

    2) Lock down further distribution and investigate immediately
    Disable forwarding where possible, remove access to affected emails or attachments, and review audit logs to understand how the incident occurred. Use findings to update procedures and prevent repeat mistakes.

    In short, email mishaps are rarely caused by technology alone, they’re usually process failures. A mix of communication discipline, permission controls, and technical safeguards dramatically lowers the chance of repeating this kind of incident.


    If technology planning (including email handling) is still being evaluated for your business in 2026, Valley Techlogic can be your partner in setting up systems that work and prevent unexpected surprises. Learn more today with a consultation.


  • How Businesses Can Protect Their Data Privacy While Utilizing AI Tools

    How Businesses Can Protect Their Data Privacy While Utilizing AI Tools

    Artificial intelligence is rapidly transforming how small and mid-sized businesses operate. From producing marketing content to summarizing documents to automating workflows, AI tools can provide undeniable productivity boosts. But with this power comes a real concern: how do you ensure your sensitive business data stays private when using AI systems?

    The good news, businesses can safely leverage AI without putting themselves at risk. It just requires intentional guardrails, the right technology stack, and clear processes. In this post, we’ll walk you through the essentials of protecting your data privacy while using AI – and how Valley Techlogic helps you put these protections in place.

    1. Understand Where Your Data Goes When Using AI

    Many public AI tools process data outside your environment and may store prompts for future model training unless you opt out. That means confidential information—client lists, financials, contracts, internal communications—could be exposed or retained longer than expected.

    Before your team uses any AI platform, you should know:

    • Where the data is sent and stored
    • Whether prompts or outputs are used for training
    • How long data is retained
    • Who (internally and externally) has access to that data

    The first step is recognizingConsumer AI tools are built for convenience, not compliance or with your particular data being safeguarded in mind. Businesses should rely on AI systems that specify they  1. Do not train on your corporate data 2. Offer tenant-isolated storage and encryption. 3. Give you access to administrative controls & audit logs 4. Offer transparency on what happens to the data it collects, and offers strict retention and deletion policies.Microsoft 365 Copilot, for example, keeps data inside your M365 tenant and honors your existing security controls (Entra ID, MFA, DLP, retention labels, Purview, etc.). This reduces the risk of data leakage while enabling powerful AI-driven productivity. If you’re using third-party AI tools, we can help you perform vendor risk assessments and configure them safely.

    AI also magnifies whatever access a user already has, including the rules you have in place in your own organization for accessing data. If a staff member shouldn’t have access to payroll data, they should not be able to surface payroll information through an AI query. Before AI rollout, businesses should:

    • Review least-privilege permissions
    • Ensure MFA and conditional access policies are enforced
    • Segment data appropriately using SharePoint, Teams, and role-based access
    • Audit legacy “wide-open” file shares that AI could unintentionally expose

    AI is not the risk, the access model behind it is.

    You should also create clear AI usage guidelines for your staff. Your employees will need explicit guidance on what they can and cannot put into AI systems.

    Your policy should require:

    • No uploading client PII, financial records, or confidential contracts into AI tools
    • Using only approved, business-managed AI platforms
    • Verification of outputs for accuracy and bias
    • Documentation when AI is used in client-facing deliverables
    • Guidance on storing or sharing AI-generated content

    AI governance is now part of basic digital hygiene, just like password policies. Implementing AI without the right guardrails can expose your business to:

    • Data leakage
    • Compliance violations
    • Intellectual property loss
    • Unauthorized data exposure
    • Shadow IT usage by well-intended employees

    That’s why it’s important to lean on a Managed Server Provider that understands the AI tools that are available and how to manage them, they can assist you in choosing secure AI tools and configuring them so they only access data that’s absolutely necessary to perform the tasks you’re looking for (and ensure that they’re not training on your private company data or exposing it to the outside world). They can incorporate AI strategies into their risk assessment process for your business and make sure the integrations you’re adding aren’t conflicting with any compliance doctrines your business must follow. They will also monitor for abnormalities and misuse in the same way that they protect your business from other day to day technological threats.

    By working with a competent provider you get the productivity benefits of AI, without introducing unnecessary risk. Ready to Adopt AI Safely? Valley Techlogic Can Help. AI is no longer optional for competitive businesses, but neither is data privacy. If you want to empower your staff with AI while keeping your sensitive information protected, Valley Techlogic is ready to guide you step-by-step. Learn more today with a consultation.

    This article was powered by Valley Techlogic, leading provider of trouble free IT services for businesses in California including Merced, Fresno, Stockton & More. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on X at https://x.com/valleytechlogic and LinkedIn at https://www.linkedin.com/company/valley-techlogic-inc/.

  • A look back at the 2024’s 8 most expensive breaches

    A look back at the 2024’s 8 most expensive breaches

    2024 is coming to a close and with it we’re reviewing the year in technology as a whole. While we’ve covered advancements in AI, continued benefits to businesses from vendors like Microsoft 365 helping capitalize on more productivity from their technology, more options in hardware and greater adoption for cyber security especially with more regulations in place all point to positive trends in the technology space, there were still a number of notable negatives especially when it comes to cyber security breaches.

    2024 saw a 76% spike in data theft according to to Crowdstrike’s annual global threat report (we’d be remiss not to mention they also unfortunately had a notable breach themselves over the summer).  However, even with the scale of the Crowdstrike breach it still did not make the list on the top 8 most expensive cybersecurity breaches of 2024.

    Below is that list and the eye watering numbers paid out in ransom, fines and overall reduction to business productivity for these companies to resume business as usual.

    • MGM Resorts: This breach occurred in September 2024, with costs exceeding $100 million due to a ransomware attack that paralyzed operations for weeks. Recovery costs, lost revenue, and fines made it one of the year’s most expensive breaches.
    • MoveIt: A vulnerability in the file transfer software resulted in widespread data breaches for numerous organizations, costing tens of millions collectively. The breach was first reported in June 2024.
    • T-Mobile: A recurring target, T-Mobile faced another breach in February 2024, costing an estimated $150 million, including regulatory penalties and class-action settlements.
    • Latitude Financial: In March 2024, this Australian financial services company suffered a breach exposing millions of customer records, with costs exceeding $76 million, mainly from customer remediation and regulatory fines.
    • Clorox: A cyberattack in August 2024 disrupted operations, leading to a $500 million loss in revenue, with breach recovery costs adding to the financial toll.
    • Capita: This UK outsourcing giant faced a major breach early in 2024, costing approximately $150 million, driven by client compensations and operational disruptions.
    • Tesla Supplier Breach: Hackers targeted a Tesla supplier in mid-2024, compromising proprietary designs and incurring losses in the range of $50-100 million.
    • Western Digital: A breach in early 2024 affected critical business data, with costs reportedly surpassing $100 million, including regulatory fines and lost business.

    Even if you’re a small business, you’re still at risk of data breaches and the effects (including ransomware costs that will cripple your bottom line). Cybersecurity protection, including preventing data breaches, is a core face of every Valley Techlogic service plan. Learn more today and take advantage of our 2024 Holiday Offer.

    Looking for more to read? We suggest these other articles from our site.

    This article was powered by Valley Techlogic, leading provider of trouble free IT services for businesses in California including Merced, Fresno, Stockton & More. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on Twitter at https://x.com/valleytechlogic and LinkedIn at https://www.linkedin.com/company/valley-techlogic-inc/.

  • Verizon’s massive outage this week and it’s connection to Hurricane Helene

    Verizon’s massive outage this week and it’s connection to Hurricane Helene

    While much of the eastern side of the country continues to grapple with the effects of Hurricane Helene (in particular western North Carolina which had many towns wiped off the map), restoring cellular communication has been a top priority to locate and aid those currently affected.

    In order to do that, cellular communication providers have enabled something called “disaster roaming” in the effected areas, this type of roaming services allows customers of any mobile phone company to use any available cell tower. Normally, cell towers are maintained and restricted to certain companies. So, for example, you may find as an AT&T customer you have better service in one locations vs another. With disaster roaming turned on this would no longer be the case.

    What does this have to do with the Verizon outage that occurred this week? Well, this unplanned outage that affected as of writing caused over 100,000 reports from customers on DownDetector.com, a site that reports service complaints, also affected the areas currently recovering from Hurricane Helene.

    Users reported their phones being stuck in “SOS” mode, and after several hours issued a statement that their engineers had fixed the issue and that anyone still affected should try restarting their phones. During the outage the company’s response was underwhelming, in many cases just informing customers they were “aware of the issue”.

    The timing of this outage and the announcement that disaster roaming was turned on in certain areas is also possibly worth investigating, though no announcement on the cause of the outage has been revealed at this time.

    This is also not the first time we’ve written about a major cellular outage (AT&T and T-Mobile have had their fair share as well). Disasters like the one currently ongoing in North Carolina highlight our need to have effective ways to communicate in times of an emergency and it is past time that cellular companies be held to a higher standard when it comes to communicating and addressing outages that can have drastic consequences for their customers.

    Effective communication is an important part of running a business, if you’re not making your customers aware of your intentions then you’re leaving it up to them to draw conclusions on your behalf. Below are five ways Valley Techlogic addresses communicating with clients who have a technology service plan with us:

    Don’t settle for underwhelming or non-existent communication on the services you pay for, learn more about how Valley Techlogic can support your business today with a free consultation.

    Looking for more to read? We suggest these other articles from our site.

    This article was powered by Valley Techlogic, leading provider of trouble free IT services for businesses in California including Merced, Fresno, Stockton & More. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on Twitter at https://x.com/valleytechlogic and LinkedIn at https://www.linkedin.com/company/valley-techlogic-inc/.

  • Microsoft Copilot, is it worth investigating for your business? 10 things you can use it for TODAY

    Microsoft Copilot, is it worth investigating for your business? 10 things you can use it for TODAY

    Released earlier this year, Microsoft Copilot is available for you to use today and is Microsoft’s answer to the growing trend of AI assisted technologies. Copilot is a Microsoft 365 offering alongside their other popular business software applications such as Word, Excel, PowerPoint, Outlook and more but you may be asking, what can I do with it?

    Here are 10 real life use cases for Microsoft Copilot:

    1. Automate Reporting from Excel: If you’re still manually generating reports based on the Excel spreadsheets created by your business that can end today. Copilot can generate comprehensive reports based on trends, perform calculations and more. Copilot will even analyze the data and alert you if it senses there are errors.
    2. Create Visuals from Your Data: If you need charts to demonstrate certain aspects of your business to clients and partners, Copilot can generate charts and graphs based on the data you have available with the click of a button.
    3. Document Creation: Like other AI tools, Copilot can help you reword documents you currently have in progress or offer additional creative inspiration alongside your UGC (User-Generated Content). It can also generate images that will complement your documents.
    4. Easy Integration: Since Copilot is a Microsoft tool, that makes integrating it into your business easier than trying to evaluate the many emerging AI technologies on the market and you can train your staff on the features found with AI.
    5. Use Copilot for Reminders: You can train Copilot to create reminders for you based on previous activity, say you have a monthly meeting each month. Copilot can look at that data and create reminders for it going forward without you needing to manually schedule those reminders yourself.
    6. Fraud Detection: Speaking of analyzing behaviors, Copilot can also look for behaviors that are unusual within your business – such as financial transactions that differ greatly from your norm and report these to you.
    7. AI-Powered Customer Chat: Copilot can be an automated chat and response tool for your business when it comes to interacting with your clients, including allowing it to respond to routine questions so you don’t need to take time out of your day to do so.
    8. Marketing Campaigning: Copilot can analyze your customer base and suggest marketing campaign ideas to send to your target audience.
    9. Software Development: As with ChatGPT and the like, Copilot can even offer assistance if your business has in-house programmers or technical people. Even for nontechnical roles, many questions can be answered via AI without needing to go down the rabbit hole of a Google search.
    10. Tailored to You: In case we weren’t clear, Copilot can do as much or as little as you want it to do – from writing emails, to creating slide decks, to analyzing data, to performing routine tasks, Copilot and AI in general is powerful tool that most businesses should be taking advantage of in 2024.

    If all of these advantages weren’t enough, Microsoft just recently announced Copilot for Security. Taking advantage of the vast wealth of data the Microsoft Security Suite has available and powered by AI, Microsoft Copilot for Security will look for user risks and can even resolve security incidents before they become a problem.

    If you would like to learn more about utilizing Copilot for your business, Valley Techlogic has been a Microsoft partner since 2004 and would be able to assist your business as we enter this new age of AI powered technology. Schedule a consultation with us today to learn more.

    Looking for more to read? We suggest these other articles from our site.

    This article was powered by Valley Techlogic, an IT service provider in Atwater, CA. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on Twitter at https://x.com/valleytechlogic.

  • 10 Microsoft 365 tools you need to take advantage of TODAY

    10 Microsoft 365 tools you need to take advantage of TODAY

    Most of our clients are Microsoft 365 customers and enjoy the tools and applications they receive through their Microsoft 365 subscription. Many of these same clients were long time Office customers and were already familiar with the software benefits – such as Word, Office, Outlook, Powerpoint and Excel. These are staple products in the business community and chances are if you’ve been in business long enough you’ve had some exposure to them throughout your career.

    We have had clients who miss the days when Office was a standalone product only. While you still can purchase Office 2021 for a one-time fee, many have to weigh the value of a pretty substantial upfront cost when purchasing for many employees for a product that will at some point expire vs the subscription model that is now favored by many software companies. This is a discussion onto itself, but in a nutshell many clients choose to go with a Microsoft 365 subscription.

    There is an obvious benefit to doing so right off the bat if you choose to go with Microsoft 365 Business Premium, the security benefits of this plan are well known and touted throughout the technology industry as being the crème de la crème of security suites for Windows machines.

    However, there are many benefits to your Microsoft 365 subscription that many users are not even aware of. Microsoft 365 is much more than just an Office subscription – your plan comes with business utility programs that can make organizing and running your business better.

    Here are 10 tools you can take advantage of TODAY if you have a Microsoft 365 subscription:

    1. Microsoft OneNote: OneNote is Microsoft’s digital notetaking app, it’s a step way above NotePad with the ability to organize multiple notes (with colored tabs) and collaborate and share your notes with other.
    2. Microsoft Intune: Intune allows you to control and manage all of the Microsoft endpoints within your business from one place. This one might need an IT pro when it comes to setup and management but once you get it going it really can simplify many IT tasks for your team.
    3. Microsoft Forms: Did you know that you can create surveys, quizzes and polls with a Microsoft product? You can with forms, you can even export the data to Excel and share the forms you create on your website or social media platforms.
    4. Microsoft List: With Microsoft 365 you don’t have to go off platform when it comes to managing even the somewhat more mundane aspects of your business, Microsoft Lists is Microsoft’s solution for keeping track of well, everything. Also just like with Forms you’re able to export these lists to Excel with a click of a button.
    5. Microsoft Bookings: Microsoft Bookings is Microsoft solutions to having a public calendar where clients or colleagues can book a meeting with you, and it’s tied right to your Outlook calendar. Another benefit of Bookings is it can be added to your website for prospective clients to book time with you and eliminating the cost of an outside calendar application.
    6. Microsoft To Do: If you or your employees struggle with staying on task, Microsoft To Do is the solution for you. You can plan out your days in advance and Microsoft To Do will be your one stop place for keeping things on track.
    7. Microsoft Viva: Microsoft Viva is an addition to Microsoft Teams that adds a lot of functionality not usually found in a chat program, Microsoft Viva is a multi-faceted platform but in a nutshell it allows you to set goals for your business, provide training to your employees and see insights into their workday, as well as offering them to provide feedback to you all in the Teams application they already use.
    8. Microsoft Streams: If you already use Teams for your video conference calls then you’re familiar with how reliable Microsoft is when it comes to video streaming. Microsoft Stream takes that a step further and allows you to broadcast video outside your organization with up to 1000 participants.
    9. Microsoft Power BI: Microsoft Power BI provides a snapshot of your business’s data in the form of charts and graphs, so you can see how the data your business creates evolves and changes over time.
    10. Microsoft Planner: Finally, we bring it all home with Microsoft Planner, it’s exactly what you would expect it to be a simple visual tool for planning out meetings, business goals, marketing pitches and more all found at your fingertips with your Microsoft 365 subscription.

    Of course, if you’re considering signing up for Microsoft 365, you do have to take the cost into account. Here are the costs for the most popular plans (these costs factor in a discount for committing to an annual subscription, the costs are approximately 20% higher when you choose a monthly term).

    Interested in learning more about Microsoft 365? Valley Techlogic is a Microsoft partner, and we can walk you through the process of buying and making the most of your new subscription. Learn more today with a consultation.

    Looking for more to read? We suggest these other articles from our site.

    This article was powered by Valley Techlogic, an IT service provider in Atwater, CA. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on Twitter at https://x.com/valleytechlogic.

  • Refurbished versus new, what are your options when it comes to on-premises servers?

    Refurbished versus new, what are your options when it comes to on-premises servers?

    There’s no debate, when it comes to buying an on-premises server for your office it’s a big decision where cost is absolutely a major factor. The word “refurbished” sometimes causes our clients to recoil, we’ve all had bad experiences purchasing refurbished electronics that were DOA (dead on arrival) or perhaps were cosmetically or functionally dubious.

    With servers it’s a little different. Typically, what we see from servers is that one was sent back to the retailer very early on into its life span. Sometimes it’s because the configuration just wasn’t right for the purchaser or because they come from a sector that has very rigorous standards for server replacement (some sectors look to replace servers every 3 years). These servers will still have a lot of life left in them and the big server manufacturers (Dell, IBM, HP etc) will reset them, add some new components, and bring them back up to practically like new conditions.

    If you have a very specific goal in mind for your on-premises server and know you need the latest and greatest hardware components to meet that goal, then we definitely recommend purchasing new. If your goal is to replace an existing aging server or your needs for capacity are more minimal, refurbished is a great option.

    Here are three pluses when buying a new server.

    1. Warranty – New servers will have the longest warranty available; we typically see 5 years being the standard.
    2. Customizable – When you buy a new server you get to customize the hardware and storage, with a refurbished server you’re purchasing what the manufacturer has available.
    3. Modern Features – A new server will have all the latest features, have the highest performance, and be compatible with modern software.

    There also pluses when considering refurbished:

    1. Cost Saving – Of course, the first plus is the cost saving benefits. We often find a refurbished server is substantially less than a new server. You could save as much as 80% compared to buying a new server.
    2. Still Effective – A refurbished server will still be almost as effective as a new server, and for many of our clients there is no noticeable difference between new and refurbished for their use case.
    3. Still Includes a Warranty – While it won’t come with a manufacturer’s warranty, Valley Techlogic offers a 1-year warranty for clients who purchase a refurbished server through us.

    Of course, there are things to consider when doing a server upgrade in general. Here is a chart with the benefits you will receive when replacing an aging on-premises server:

    Another thing to consider is if your current server is compatible with your existing line of office software a refurbished server may be more compatible, sometimes being on the bleeding edge of technology can have its downsides especially when it comes to legacy software.

    You also want to keep in mind that lead times will vary as well, refurbished servers are often more available while a server customized for your business could take longer to get. If your current server is on it’s last leg or has even died, refurbished may not be your best option but your only option.

    There are a lot of things to consider when it comes to buying a server, and Valley Techlogic can help. We not only offer in-house procurement services we also can do an assessment of your specific situation and offer the best buying advice for your business. Reach out today to learn more.

    Looking for more to read? We suggest these other articles from our site.

    This article was powered by Valley Techlogic, an IT service provider in Atwater, CA. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on Twitter at https://x.com/valleytechlogic.