Tag Archive for: Managed Services

As of October 2025, Microsoft will officially end support for Windows 10, signaling the end of an era. For small businesses, this means the clock is ticking to secure your systems and prepare for the transition. Without updates, patches, or support, your systems could be left vulnerable to cyber threats and operational disruptions.

If your business runs on limited resources or lacks an in-house IT team, this can feel overwhelming—but it doesn’t have to be. With the right plan and support, you can transition smoothly and position your team for greater efficiency and security.

Why Small Businesses Need to Act Now

When an operating system reaches its end of life (EOL), it no longer receives critical updates, leaving your business exposed to serious risks:

  • Increased Cybersecurity Threats: Outdated systems are a prime target for hackers.
  • Compliance Risks: Unsupported software could lead to non-compliance with regulations, especially for businesses handling sensitive data.
  • Disruptive Compatibility Issues: Legacy systems might not work with modern software or devices, causing interruptions to your workflow.

The good news? By planning early, you can avoid costly disruptions and ensure your business stays secure and operational.

Option 1: Upgrade to Windows 11

If your current hardware is up to the task, upgrading to Windows 11 can be the simplest and most cost-effective solution. Windows 11 brings improved security features, better performance, and a modern interface designed to support today’s business needs.

Steps for Small Teams to Upgrade:

  1. Check Compatibility: Use Microsoft’s PC Health Check Tool to see if your hardware supports Windows 11.
  2. Back Up Critical Files: Ensure all important business files are securely backed up before starting the upgrade.
  3. Prepare for the Upgrade: Work with Go West IT or a trusted provider to handle the upgrade process. We’ll manage the technical details, so you can stay focused on your business. If you prefer to manage internally, ensure your current system is fully updated before initiating the upgrade. Then follow Microsoft’s upgrade instructions.

Option 2: Replace Outdated Hardware

If your systems don’t meet Windows 11 requirements, replacing them with new devices is the best path forward. While this may feel like a bigger investment, it’s an opportunity to modernize your business technology for faster, more efficient operations.

How to Transition Securely

  • Assess Your Needs: Determine the specifications and features you need for your business or personal use.
  • Migrate Data Safely: Use secure tools or IT professionals to transfer data to your new system. Avoid using unencrypted external drives or unsafe online transfer methods.
  • Decommission Old Devices: Properly wipe data from your old system before recycling or disposing of it. Use certified destruction services for sensitive data.

How Go West IT Makes Replacement Simple:

  • Needs Assessment: We’ll help you determine the best devices for your specific business requirements.
  • Secure Data Migration: Let our team handle moving your data safely from old devices to new ones—no technical know-how required on your end.
  • Proper Disposal of Old Devices: We’ll ensure your sensitive data is securely wiped and your old devices are responsibly recycled.

Staying Secure During the Transition

Data security is a top concern for small businesses, especially during upgrades or replacements. Go West IT ensures your transition is secure with managed services like:

  • Encryption: Protect your data during transfer and storage.
  • Endpoint Protection: Set up modern antivirus and security tools on your new system.
  • Multi-Factor Authentication (MFA): Secure your accounts and systems with added layers of protection.
  • Backup Management: Create reliable backups stored securely in the cloud or offsite.

Why Start Now?

Small teams often wear many hats, so last-minute tech changes can disrupt your operations. Starting early gives you time to prepare and avoids unnecessary downtime or stress. This type of technology transition may also require a great partner.

Partnering with Go West IT means you’ll get:

  • Tailored Planning: Solutions designed specifically for your small business.
  • Hands-Free Implementation: We handle the technical work, so your team can focus on their priorities.
  • Peace of Mind: Your systems will be secure and compliant, with minimal disruption.

Ready to Future-Proof Your Business?

Don’t let the Windows 10 sunset catch you off guard. Whether you’re upgrading to Windows 11 or replacing old systems, Go West IT specializes in helping small businesses make the transition seamlessly and securely.

Contact us today to plan your upgrade and keep your business running smoothly. Your future starts now.

Go West IT turns 13 today, and as we reflect on how far we have come, we want to thank our talented team, supportive vendors, and amazing customers for joining us on this incredible journey.

In these 13 years, Go West has gone from a small 4-person IT company to a robust 40+ person cybersecurity obsessed Managed Service Provider. While every step along the journey is significant to who we are and where we are going, we have laid out some of the stand-out moments.

May 15, 2010 – Go West IT was founded with four employees and a handful of great customers.

2011 – Go West IT makes a concerted shift from supporting and recommending on-premises server infrastructure to exploring a cloud infrastructure alternative.

2012 – Go West experiences significant growth in its customer base, including a concentration of customers in the financial services space.

2015 – Go West IT moves into new office space to accommodate a growing staff and to meet the support and cybersecurity needs of the company’s growing customer base.

2015 – Go West IT completes an extensive infrastructure “lift and shift” from a private data center to a public cloud (Azure) for a new customer.

2015 – After identifying and calling out a supply chain security weakness, Go West IT becomes a Microsoft Direct Cloud Solution Provider (CSP), a status normally available only to much larger organizations.

2016 – Go West IT engages an audit firm to prepare its first SOC 1 Type II audit.

2016 – Go West IT hires the company’s first full-time technical account manager(s), MSP Administrator, and adds multiple technical manager roles.

2017 – Go West IT completes the company’s first SOC 1, Type II, and SOC 2, Type II audits

2017 – Go West IT was recognized as Microsoft SMB West Region Azure Partner of the Year at Microsoft’s annual partner convention.

2017 – Go West IT adds additional office space as staff and customer base continue to grow.

2017 – Go West IT starts shifting from a traditional Value-Added Reseller and “Break-Fix” IT support provider to an IT Managed Service Provider.

2018 – Go West IT doubles down on cybersecurity focus and begins implementing cyber-specific managed service offerings to combat a growing threat.

2019 – Go West IT has another significant growth spurt and builds a leadership team to guide the company through the next phase of growth and development

2020 – Go West IT executes a new lease for expanded office space in January 2020, and the CEO moves into the new space, designed for 50, in May 2020 while most other employees work from home.

2020 –Go West IT’s customer base is particularly well-positioned to deal with the pandemic because they have moved to cloud-centric platforms or previously built solid and secure remote access solutions.

2021 – Go West IT experiences modest growth through the pandemic while maintaining the exceptional staff built in the prior decade with no layoffs and no disruption to operations.

2022 – Go West IT completes the sixth straight successful SOC2, Type II audit and sees another surge in customer and revenue growth.

2022 – Go West IT promotes Tom Hynek to the role of President, the first time this role has been held by someone other than the Founder.

2023 – Go West IT is the MSP of choice in the Denver market with customers across the United States and beyond. Go West IT has a staff of 43 with two open positions at the time of this re-cap.

At Go West IT constant improvement is one of our core values, so we know that this journey is just beginning. We are looking forward to continuing our mission of helping companies benefit from technology by guiding them to opportunities and protecting them from harm.

Join us in celebrating 13 years of Go West IT!

Microsoft Teams is a collaboration platform that provides users with a wide range of tools to communicate and work together effectively. One of the key features of Microsoft Teams is the ability to integrate and manage Microsoft SharePoint storage. Here are some reasons why Microsoft Teams is a great tool to manage Microsoft SharePoint storage:

  1. Permissions Management: SharePoint fails often come down to folder structure and permission management mistakes. Teams makes SharePoint file structure and user permissions a snap for less technical users. Simple add or remove users from a “Team” to grant or remove their ability to access the files for that Team.
  2. Seamless Integration: Microsoft Teams integrates seamlessly with SharePoint, making it easy to access, store, and share files. Users can access and collaborate on SharePoint files directly within Teams, without having to switch between different applications.
  3. Easy Sharing: Microsoft Teams makes it easy to share SharePoint files with other users within an organization. Users can easily share files and folders with others, collaborate on projects, and track changes to documents in real-time. For users who prefer the “old school” approach of accessing files using Explorer, simply “sync” a SharePoint folder to your Explorer using OneDrive (Microsoft’s built-in personal storage and sync tool).
  4. Centralized Storage: SharePoint provides a centralized location for storing files, which can be accessed from anywhere within an organization. Microsoft Teams provides a convenient and user-friendly interface for accessing and managing SharePoint storage, making it easier for users to find the information they need.
  5. Improved Collaboration: Microsoft Teams makes it easier for teams to collaborate on projects and share information. Users can use Teams to have real-time conversations, make comments on files, and share updates on projects. This can help improve collaboration and increase the productivity of teams.
  6. Secure Storage: SharePoint provides secure storage for files, which helps to protect sensitive information. Microsoft Teams adds an additional layer of security to SharePoint by providing a secure platform for communication and collaboration. A Microsoft 365 backup solution added by your Managed Service Provider provides peace of mind that your data is protected in the event of inadvertent or malicious deletion.

The seamless integration between Teams and SharePoint, combined with the ease of permissions management, file structure design, sharing, centralized storage, improved collaboration, and secure storage, make Teams a valuable tool for organizations looking to manage their SharePoint storage effectively. Contact Go West IT to help you leverage your Teams solution.

Choosing a Managed Service Provider (MSP) can be a critical decision for a business. MSPs provide essential IT services to help businesses manage their information systems and data effectively, and to provide protection from harm found in the digital frontier. To ensure that a business selects the right MSP, it is important to consider the MSP’s security posture, SOC 2 Type II audit, service offerings, and end user support capabilities. 

Here are 4 factors to consider when choosing an MSP: 

  1. Security Posture: A business should look for an MSP with a strong security posture. This means that the MSP has robust security protocols, systems, and processes in place to protect their own systems and their customers. A business can assess an MSP’s security posture by asking some simple questions.
    • First, ask if they use all the products and services they recommend to their customers. 
    • Second, ask them to describe how they manage security of their systems and look for indications that they have a process in place for continual review & improvement (i.e., assessments, policy review and updates).
    • Third, ask about how they are prepared to deal with a potential breach of their systems or a breach of a customer’s environment. If they can talk through the answers clearly with substantive examples, chances are, they spend time working on it internally. If the MSP stumbles and cannot provide substantive answers, ask to speak with someone further up the chain of command and if you can’t get good answers, look elsewhere. 
  2. SOC 2 Type II Audit: An MSP’s SOC 2 Type II audit provides assurance that the MSP has the necessary security controls and processes in place to secure the data and systems of their clients. This audit is conducted by an independent auditing firm and provides a thorough assessment of the MSP’s security posture. Not every MSP will have a SOC 2, Type II audit. Those that do have made significant investments in controls and are audited annually on the adequacy of their controls and how well they adhere to the controls throughout the one-year audit period. 
  3. Service Offerings: A business should consider the services offered by an MSP to determine if they meet the business’s needs. For example, the MSP should offer device patching, endpoint monitoring and management, and data backup and recovery services. Talk about what labor is “in-scope” and what labor is “out of scope”. Figure out if the bundle of service an MSP offers fits with the needs of the business. Can the MSP articulate what is included, or does the MSP struggle to justify the value of their services. An MSP with a higher price per device or higher price per person might have a more robust service offering (bundle) that includes things other MSPs might tack on after the sale.   
  4. End User Support Capabilities: A business should look for an MSP with strong end-user support capabilities. This means that the MSP should be able to provide fast, efficient, and effective support to the business’s employees. The MSP should also be able to effectively provide remote support to resolve issues quickly. Ask about how the deal with calls outside of normal business hours.  

By considering the MSP’s security posture, SOC 2 Type II audit, service offerings, and end-user support capabilities, a business can ensure that it selects an MSP that meets its needs and provides essential IT services, including security, to help manage its information systems and data effectively. 

Third party VPN services do not secure your data.  They may provide an additional brick in your security bunker but they are not the invisibility cloak they claim to be and in some cases they may actually do more harm than good.  For starters, who is your third party VPN service provider?  Are they trustworthy?  Are they subject to US or EU privacy laws?  Or, did you just decided to pipe 100% of your data through an unknown third party?

Three very popular third party VPN service providers, NordVPN, VikingVPN, and TorGuard, were recently breached due in part to poor security practices that resulted in leaked expired TLS (encryption) keys.  Now users of these services may be sharing their data with an unknown criminal instead of the third party service provider.

Just like all security measures, they are only as good as the weakest link.  Businesses and individuals need to discover their vulnerabilities, prioritize their vulnerabilities, and then systematically work to layer security to mitigate the risk.  Start by securing corporate networks with a good Unified Threat Management (UTM) appliance, making sure 100% of your devices have good business class endpoint protection software that is automatically updated, patch all of your hardware and software on a routine basis, BACK UP YOUR DATA, implement phishing prevention measures, and TRAIN YOUR PEOPLE.  This is just a start.  If you don’t know how to do this, put something in your budget to work with someone who can help and get started on the path to better security.

– Go West IT

I really hate hearing from customers and prospective customers that we were right and that they wish they had taken our advice to harden their systems and implement tighter security controls before their breach. Feedback from customers suggests the inconvenience of implementing additional controls is often what keeps them from taking action as opposed to the cost, which is negligible for some of the most effective controls like Multi-Factor Authentication (MFA). If you think the controls are inconvenient, you should spend some time visiting with someone who has been through a breach.

The most likely cyber-attack a small business will experience is an email breach which quickly lead to real payment fraud losses, reputational damage, and compliance risk. Once a criminal organization (yes, there are organizations attacking your small business) has success breaching one email account, you can expect the attacks to increase in volume and sophistication. Businesses can dramatically reduce email breach risk with relatively little cost and yes, some minor inconvenience.

Take the Next Steps

If you own a business or have are responsible for managing business risk, you need to take steps to protect your business, your shareholders, your employees, your vendors, and most importantly your customers. You must take action to implement additional controls. Start by asking your IT professionals to implement controls for yourself so you can understand first-hand how the controls protect your business and the level of inconvenience the controls may cause. This puts you in the best position possible to make informed decisions about how to protect your business and champion initiatives to tighten controls.

If you’ve done nothing to date, start with implementing MFA for your business email and then work with an IT professional to constantly review and improve security controls around all your systems and data.

I’m right and I hope I never have to tell you “I told you so”.

Your credentials can be phished, period.  If you think you’re above being phished, you’re wrong.  We all have weak moments and the criminals are really good at praying on our whims and emotions.  Trust me, you can be phished.  Don’t put so much pressure on yourself.  Implement multi-factor authentication (MFA) wherever possible to protect your accounts even if you are phished.  This is so important that we put together a video to show you how.  Watch this video.  Please just give us a call if you want help or want to discuss additional configuration options to ease implementation for your business.  We will be happy to help.

If you don’t know anything about Office 365 Multi-Factor Authentication please check out our blog and video from December 2017 for a complete overview https://www.gowestit.com/office-365-multi-factor-authentication.

 

 

Your business is vulnerable to cybercriminals, period. So, workforce security should be top of mind for you and your business.

Workforce security matters

The truth is that no business is fully “secure”. Rather, businesses assume various amounts of acceptable risk. Your responsibility is to figure out where your organization lies on the workforce security spectrum, how much cyber risk you are willing to comfortably assume, and continually act to reduce your risk to those levels.

We understand that most businesses, especially SMB’s, can’t and won’t do everything their IT provider may recommend. This is true for a myriad of reasons including operational efficiency, timing, focus on your core business, and of course budget considerations. We also believe that most businesses do not realize the amount of risk which they currently assume. If you did, you would likely already be doing more!

To this end, Go West IT has developed our “Top Ten Task to Mitigate Cyber Risk”

Review your workforce security posture with your current IT provider and discuss how to implement the next best thing you can do to reduce your risk (HINT: If you’ve done nothing to date, start with backups, patching, and multi-factor authentication). If you need help please give us a shout, our experts will help you recognize, plan, and take the steps to mitigate your risk.

Understand where you are today… know where you want to be tomorrow… build the roadmap to get you there. You can reduce your risk, get started today! Give us a call, email us, or contact our support. You can get secured today! You can check out more about our Go Managed Security Plans here. If you have any questions, please reach out to us.

David Lewien
President, Go West IT

Download the PDF: Top Ten Tasks to Mitigate Cyber Risk
303-795-2200
info@gowestit.com
www.gowestit.com