3 Steps to Create a Healthier University Network

Student Computers Blog Photo.png

One of the most challenging aspects of keeping a safe, productive university network is that students insist on using it. To be precise, it’s that students insist on using the university network after browsing malware-laden web sites and inadvertently stuffing their laptops full of malicious code while home on holiday.

New capabilities mean new reasons for refreshing the PCs in the university-owned fleet, but no one wants to have new systems instantly infected with malware. Is there any hope for the IT professional in education?

There is, of course, hope, and it comes in three steps:

  1. Segmentation

  2. Remediation

  3. Education

These don’t have to be taken in sequence, but they must be taken—the sooner, the better, for everyone who uses the network.


It’s obvious that not every user needs access to every corner of your online facilities. Modern authentication and network directory facilities make it rather straightforward to logically segment the network into pieces that can be kept safe from one another.

The real key, though, is to implement device configuration policies that require any device that connects to the network to:

  1. Be up-to-date with application and OS versions

  2. Have specific anti-malware protection installed

  3. Connect through a VPN

  4. Meet any condition (or set of conditions) that administrators require

Once the conditions are met, then the device can be routed to (and limited to) any logical network segments that the user’s network privilege allows.


As a condition of the device authentication and authorization process, administrators can set up device scans that quickly search for known malware or vulnerabilities and then quarantine the device on a “safe” network segment (with no access to the rest of the network) until the infestation and vulnerability can be remediated.

At some universities, IT departments also find it useful to have “open scan” days set up (often around orientation at the beginning of the term or just after long holiday breaks), where students can bring laptop computers to tables staffed by professionals who will scan for problems, install anti-malware, and make sure the systems meet network standards before returning them to the student. These days are also perfect for beginning the next step—education.


Students frequently bring evil to the campus network through ignorance of basic safe-computing protocols and practices.

Education, through in-person outreach, authentication-screen messaging, or online courses, can help insure that students are less likely to engage in practices that load their computers with the kind of software you don't need on campus. While students (and, let's be honest, faculty members, as well) can be careless, most don't want to be the source of problems. Teach them to be your allies, and you'll cut down on malware infestations and support calls.

If you follow these three steps you will increase the chances that the investment you make in new desktop and laptop PCs will result in increased productivity—and not just fast, new locations for malware to call home.

Current Technologies can help Secure your Network!

Name *

We Value Your Feedback!

Was this information helpful?
Was this an interesting read?
CurrentTech_Horizontal (1).jpg

The Inefficiency in American Hospitals


Lost productivity and unnecessary inpatient treatment cost American hospitals approximately $8.3 billion each year, according to a 2016 study by the Ponemon Institute. The good news is that the adoption of new technologies can lead to swift and significant savings for hospitals and improvements in patient care.

The Ponemon study found that clinicians spend on average 46 minutes each day waiting for patient data, with patient discharges taking about one and a half hours. This protracted discharge process accounts for an annual revenue loss of $3.2 billion.

The study also found that inadequate communications systems are causing doctors to spend only 45% of their time with patients. WiFi was cited as a cause of wasted time by 52% of respondents in the study, and 38% said ineffective email systems are to blame.

Interestingly, 65% of respondents said that the ability to use text messaging would likely reduce discharge times.

A smarter and safer way to manage patient records

All of these findings point towards the need for more efficient communications strategies and systems. Another solution is to use electronic medical records—a technology that received $19 billion of implementation funding as part of the Health Information Technology for Economic and Clinical Health (HITECH) Act in 2009.

Electronic medical records remove the need for much of the time-consuming communication between clinicians—an especially helpful development given that American patients are exposed to an average of 18.7 doctors during their lives.

By creating a secure, centralized source of patient information, it’s possible to speed up discharge processes, improve diagnoses (based on more accurate data) and even avoid some of the 200,000 preventable deaths in American hospitals each year.

According to a 2015 study by the National Centre for Health Statistics, 74% of physicians reported enhanced overall patient care within 30 days of adopting an electronic records management system. And 29% ordered fewer tests due to the increased availability of results from previous tests.

Moreover, a 2014 study from the American Journal of Managed Care found that the combined benefits of electronic health records enable hospitals to spend up to 10% less on each patient.

Short-term gains, long-term improvements

It’s encouraging to know that the adoption of new technologies, such as electronic health records, rapidly improves patient outcomes. Better yet, there’s clear evidence that the benefits are sustained over time, making electronic records management a cost-effective technology that quickly pays for itself. It also creates a safer hospital environment in which doctors can do what’s most important—spend time with their patients.

We can help cut your costs!

Name *

We Value Your Feedback!

Was this information helpful?
Was this an interesting read?
CurrentTech_Horizontal (1).jpg

How to Build a 5 Year IT Budget


How Should You Budget for IT?

Cast your mind forward 5 years. Will we still send so many emails? Will we be satisfied with a keyboard to fill in web forms and use passwords to log on to secure systems? The changes in speed of access and capability will be many. As facial recognition, voice recognition, and biometrics develop, our concept of how we communicate with machines will change. The effect of cloud computing will drive down the cost of infrastructure and create new potential for business solutions.

Already today there are smarter ways to do things and smarter ways to drive down the risks associated with aging IT systems that are likely to add value to your business. The question is how much should you spend?

Many have tried to set a guide based on a percentage of revenue, but that is too vague for many businesses where maintaining margins is hard work. Often a better answer lies in reducing waste or risk. It is important to first of all understand your risk around IT through loss of systems or loss of competitive edge in the marketplace. Then look to business processes with high cost and look for technology to reduce that waste and so reduce the cost per product.

That cost may be in marketing, sales, inventory, materials, or time. The savings will build the business case for spending on IT.

Building a business case

There are some clear costs to IT that you can work into your business case. If you are using PCs, servers, and mobile devices, there is a cost to buying them and maintaining them. This may be a fixed cost if outsourced or a variable cost if you buy the equipment as needed. PCs will vary from a few hundred dollars to a few thousand, depending on the demands you are placing on them, from an email station running a couple of small spreadsheets to a workstation running 3D design tools. You should anticipate three to four years of performance from the right PC, but to stretch it further will have hidden costs in increased downtime, maintenance costs, and poor performance relative to newer machines.

For each new starter in your business you need to factor in the annual cost of a PC, a device, and software, and if you are using cloud, factor in monthly fees. Again, these will vary from application to application, but you should be able to figure out what your costs will be. There is also the cost of supporting each person in your business in terms of their IT tools, which will either be a direct cost or a hidden cost. The costs are hidden when you have no formal support arrangement and your staff waste productive time fixing their own IT problems or working around them. Direct costs are usually lower than hidden costs, because problems are fixed efficiently. Management of an individual’s IT environment will cost from a few hundred dollars a year to a few thousand depending on the complexity of the systems being used.

Dealing with growth

If your business is growing through any of the critical points of 5, 12, 20, 30 or 50 staff you may need to revisit your infrastructure strategy and change how you share, store, and protect your data. As you pass through any of these phases, you will need larger, more expensive systems unless you have adopted a scalable cloud solution that allows you to simply add one more team member to the account. Of course not all applications have a cloud version yet, so you may need to invest in a hybrid solution with some servers and some cloud.

The more you can push to cloud, the less capital expenditure you will need to budget for, but keep an eye on the comparison costs over a four-year period. Many cloud solutions are cost effective for the enterprise but not for the smaller business. For a fast-growing start-up, the cost of cloud is not the issue as it is all about the freedom to grow without the need for expensive upgrades.

Understanding your business and getting the right advice on suitable technologies may give you the advantage you are looking for. It is a great time in the IT technology cycle to be on top of your business and well informed.

We Can Help Meet Your Budget

Name *

We Value Your Feedback!

Was this information helpful?
Was this an interesting read?
CurrentTech_Horizontal (1).jpg

July 3rd is a great day to protect your data

Fireworks cropped.jpg

According to the National Fire Protection Association (NFPA) On July 4th, 2018 fireworks caused over 1400 structural fires and over 43 million in property damages. Among those 1400 structural fires are businesses all over the country of different sizes and professions. If your office were to be one of those 1400 unfortunate buildings, you better hope that you have a backup plan for all of that data you have acquired since your organizations birth.

Fires are not the only thing that can cause a devastating loss to your business. Tornadoes, burglaries, and ransomware attacks can also result in data losses that can set your organization back years. That is unless your data is backed up to a secondary location. That is where we at Current Technologies can help. Backing up your data to either a secondary offsite server or the cloud can help your business pick right up where you left off in the event of a disaster.

What to Consider

Storing data offsite is a leap of faith. Now your data is being protected by someone else. The argument is that outsourced storage providers are doing the job at scale. They have specialists, the latest hardware and will be all over patching, upgrades and monitoring.

A particular case for sensitive information

When considering a move to offsite storage, it is important to ask whether that should include all your data. Your business might have sensitive information you should keep in-house. That is especially true if that information is what makes your business unique. Not all information in your systems is created equal, and your storage strategy should take that into account.

Speed to recovery

Also, there is the important question of how long it will take to get your data back in the case of a disaster. When the missing data is mission critical, your business could freeze in the time it takes to get it back online.

If you have to download terabytes from the cloud, you could be facing a tough wait to get systems back up and running.

The case for hedging your bets

Even if you opt for offsite storage, it might be prudent to hedge your bets. Just scanning the advantages and disadvantages of onsite and offsite storage, it is easy to see how it is possible to have the best of both worlds by retaining some onsite storage at the same time as introducing offsite storage.

We can help protect your data

Name *

We Value Your Feedback!

Was this information helpful?
Was this an interesting read?
CurrentTech_Horizontal (1).jpg

Ransomware is Wreaking Havoc on Small Cities

Lake City Florida.jpg

After last month’s ransomware attack that crippled the city of Baltimore, another series of attacks has costed two Florida towns over one million dollars combined in ransoms to regain control of their municipal computer systems. This is the latest in a worldwide epidemic of hackers extorting cities, villages, and townships for ransom money.

The first town affected was Riviera Beach, a suburb just north of Palm Beach. A small town with a population just over 35,000 is not what many people think would be the target of a highly sophisticated online attack, however, small towns are an increasingly attractive target for hackers.

The hackers got in after an employee at the police department clicked an infected link in a phishing email and were then able to shut down most of the cities systems including email, online utility payment, village payroll, and payments to city vendors. The city was able to recover only after paying the $600,000 ransom (in the form of Bitcoin) and spending almost a million dollars on technology upgrades.

Shortly after the attack on Riviera Beach, Lake City fell victim to a similar attack where the virus was introduced to their computer system via phishing email as well. Along with shutting down the cities email, utility payment and payroll, this group of hackers, believed to be separate from the Riviera Beach attack, shut down the cities police dispatch system, leaving them struggling to allocate police resources.

I would’ve never dreamed this could’ve happened, especially in a small town like this
— Lake City Mayor, Stephen Witt to Action News Jax

Jason Rebholz, a principal for Moxfive, a technology service firm, who tracks ransomware payments and has helped victims of similar attacks said, “The complexity and severity of these ransomware attacks just continues to increase.” The amount of money asked by hackers has increased tremendously in the last few years and is a testament to hackers sophisticated ability to target government agencies.

Cities and towns are not the only victims to the recent tidal wave of hacker using ransomware. In 2018 a virus disrupted the flight information system, baggage displays and email at Cleveland Hopkins International Airport, and the same virus infected the Port of San Diego, costing millions. Hospitals are also a prime target for hackers due to the large amounts of personal data they store.

Three elements prevent organizations from falling victim to ransomware attacks.

  1. Trained Employees

    Training employees to spot hazardous emails and reporting them to their managers can prevent a majority of these types of cyber-attacks. It is important to have regular discussions with employees about good internet practices. Important practices include reporting spam emails, avoiding suspicious links and online ads, and regularly changing and strengthening passwords.

  2. Updated Technology & Protective Measures

    Many ransomware attacks that hit cities or businesses are allowed to occur due to outdated security technologies like firewalls or anti-virus software. In today’s day and age, hackers can scan thousands of organizations looking for specific vulnerabilities that only the latest software and hardware can prevent. This is why it is important to consult with your IT provider regularly to insure that your internet technologies are up to date and your data is kept safe.

  3. Offsite Data Backups

    If either city had been backing up their data to either the cloud, offsite servers, or a combination of both, they would have had a recent backup to fall back on and continue operations with the only data being lost was that since the last back up. Trusted IT partners like Current Technologies can help implement regularly scheduled offsite backups and help you restore your data in the event of a would be catastrophe.

Protecting your Data is what we do at Current Technologies!

Name *

We Value Your Feedback

Was this information helpful?
Was this an interesting read?
CurrentTech_Horizontal (1).jpg

Top Free Software For SMBs

Free Software Image.png

The best things in life are free, right? While not always the case with business products, a growing number of free software tools are proving they can compete with the best without the associated price tag.

What free and high quality software is available?

The internet revolution has brought a range of free, online tools for businesses, ranging from professional documents and spreadsheets to human resources (HR) management, accounting and bookkeeping as well as email marketing.

While many free versions offer only basic features, for startups and smaller businesses they can be extremely useful – in many cases offering similar functions to more expensive software. However, it's important to do due diligence, checking user feedback, reviewing security settings and investigating functionality to determine the best software for your business needs.

Top picks for free business software include:

GnuCash accounting and bookkeeping

  • Financial–accounting software that offers easy to use yet advanced bookkeeping and accounting features, including double-entry, budgeting, HBCI & SQL support, to name a few.

  • GnuCash is available across a multitude of devices, all for free.

  • Suitable for sole traders and small to medium businesses (SMBs).

Google Docs document creation and collaboration

  • A secure web/cloud-based creator and editor of Word documents, spreadsheets and PowerPoints with asynchronous collaboration features.

  • This product gives you access to create and edit your documents globally from numerous devices, with the perks of offline and sharing functionalities.

  • Google Inc. runs Google Docs, so you can expect a high level of quality and customer service.

MailChimp email marketing

  • Allows you to send up to 12,000 emails per month to a list no larger than 2,000 email addresses

  • Free version allows for editing templates, location-based mailing and using customized content, along with A/B split testing.

OrangeHRM HR management

  • Free system, including system administration, personnel information storage, management of leave, attendance and performance.

  • Dashboard integrates information from multiple modules into unified display, with real-time trend graphs, lists of pending HR tasks and reporting.

The IT revolution has brought a plethora of free business tools, offering functions comparable to more costly software. By doing the research, investigating the options and experimenting with what’s available, it can be possible to get top-quality functions at zero or minimal cost to your business.

Find out how Current Technologies can help you today!

Name *

We value your feedback

Was this information helpful?
Was this an interesting read?
CurrentTech_Horizontal (1).jpg

4 Steps to Plan for Data Loss

Data Data.jpeg

The Importance Of A Data Loss Plan

Disaster recovery has its own urban myth. It appears in different forms, but it usually sounds something like this:

”70 percent of companies go out of business after a major data loss.”

The statistic is attributed (when it is attributed) to various sources. Sometimes it’s the Federal Emergency Management Agency (FEMA) in the US or it might be the former Department of Trade and Industry in the UK.

Although the statistic is not correct — or at least there is no source for it — the question it poses warrants some thought. How much would losing data cost you? How many days could your business last if your data was breached? And what would the long-term effects be?

The Best Answer To A Data Loss Question

The key to avoiding a devastating data breach is having a plan in place. The best answer you could give is that it does not matter because no disaster will take you offline. You have a well-thought-out disaster recovery plan, and you are well versed on how to execute it. However, it is important to test your plan every so often, making sure that it will work in the event of a tragedy.

Putting your plan to the test

A quick test should put your mind at ease or give you some action points to make changes.

1. Check your backups

It has happened: a great backup plan, backups taken on schedule, everything seemingly bulletproof until the backups were found to be empty.

Try not to rely on the automated email claiming “success.” Look at how long the backup ran, how much data it captured, and whether anything is different from what you're used to seeing. Actually pull up the data from the backup and make sure that it is exactly what you want.

2. Review annually

At least once a year ask if you’re backing up everything you should be. And could the process be easier? Do you have a business continuity plan in place? Picturing your workforce with nothing to do and your customers unable to order is a motivating reason to spend some time on these questions.

3. Consider your storage options

Onsite backups allow for the swiftest data retrieval. They are also vulnerable to the same threats as your primary systems. Thieves, for instance, are unlikely to take pity and leave backup hardware behind. Fire and flood are equally heartless.

Your backup plan needs to involve another site or the cloud. The best backup plans include both because there are pros and cons to each. A natural disaster in your area might take out your offsite backups in the same town. More simply, people — the weakest link in any IT system — can forget to take the backups offsite.

Cloud backup can be automated, but it can take days (or more) to retrieve significant amounts of data. But do not use that as an excuse to backup selectively to the cloud. You still need everything backed up — operating system, programs, and data.

4. Test those backups

What is the least accessible, hardest to test backup you have? Take that and test it at least once a year.

We Will Backup Your Data For You

Name *

We Value Your Feedback

Was this information helpful?
Was this an interesting read?

Ransomware Attack costs Baltimore $18 Million

Bitcoin 2.jpg

On May 7th 2019, Baltimore city officials announced that a relatively new strain of ransomware labeled “Robbinhood” by The Baltimore Sun had encrypted important data including email, voice messaging, the city wide parking ticket database, and the cities utility and tax payment system. It has been determined that the hackers got in via a phishing email- a phony message tricking network users into giving hackers their credentials.

The Maryland city is still struggling to respond to hackers as over a month later as Baltimore city mayor Bernard Young has refused to pay the ransom of $100,000 in Bitcoin (an online currency that is hard to trace and has a wildly fluctuating value). Since refusing to pay the ransom the hackers have gone on twitter taunting Mayor Young posting faxes and other materials that the twitter account claims is evidence that they have been inside the cities network.

In a direct message to a Baltimore Sun reporter on Twitter, the account claiming to be the hackers said they have “ Financial documents and citizens personal information” and went as far as to release them on the dark web.

It is estimated that the total cost of the ransomware attack is going to cost the city of Baltimore over 18.2 million dollars- and that is assuming the hackers do not leak financial or citizen’s information onto the dark web.

How this could have been avoided

  1. Offsite Data Backup

    If the city of Baltimore had been backing up their data to either the cloud, offsite servers, or a combination of both, they would have had a recent backup to fall back on and continue operations with the only data being lost was that since the last back up. Trusted IT partners like Current Technologies can help implement regularly scheduled offsite backups and help you restore your data in the event of a would be catastrophe.

  2. Cyber-Security Protection

    Many ransomware attacks that hit cities or businesses occur due to outdated security technologies like firewalls or anti-virus software. In today’s day and age, hackers can scan thousands of organizations looking for specific vulnerabilities that only the latest software and hardware can prevent. This is why it is important to consult with your IT provider regularly to insure that your data is kept safe.

  3. Employee Training

    The entire Baltimore city hacking could have prevented had one employee not mistakenly given their credentials to a phishing email. It is important to have regular discussions with employees about good internet practices. Important practices include reporting spam emails, avoiding suspicious links and online ads, and regularly changing and strengthening passwords.

The threat of a cyber attack is never ending, and a majority of events like this occur to small businesses and cities and if it happened to a large city like Baltimore, it can definitely happen to you. No solution will be 100% effective, however the more security layers you have in place the safer you will be. If you are concerned that this could happen to your organization, contact the security experts at Current Technologies. Our IT team will help with data encryption, offsite backups, monitoring and disaster recovery. If you have your own IT team but are still worried, Current Technologies can bring you the latest versions of security software and hardware to make your IT team as effective as possible.

Reminder: There is a Hacking Attempt Every 39 Seconds

Name *

We Value Your Feedback!

Was this information helpful?
Was this an interesting read?
CurrentTech_Horizontal (1).jpg

Big clouds for small businesses

Big cloud small B.png

Choosing the right cloud service has become a major dilemma for the modern small business. At the forefront of cloud technology, Amazon, Google and Microsoft are aggressively competing against each other for a bigger slice of the cloud storage market. This fierce competition has resulted in three very diverse and very competent cloud services.

Small business owners are spoiled for choice as each service offers state-of-the-art technology, a unique array of features, distinct and tailored configurations, alternate interfaces, compatibilities and elite customer service, all with competitive pricing.

In light of this, here’s a quick overview of the three big cloud services to make finding the best-fit solution a little bit easier for small businesses, as well as a look at how suitable cloud technology is for contemporary small businesses.

What do cloud services offer small business?

“In the simplest terms, cloud computing means storing and accessing data and programs over the internet instead of your computer's hard drive,” says PCMag’s Eric Griffith.

Cloud services help small businesses avoid the stress associated with managing technology infrastructure, provisioning servers and configuring networks. They additionally feature tailored applications to augment everyday business activities, communication and data use.

Cloud services are highly scalable and multifaceted. They can host, share and analyze your data, with state-of-the-art analytics that provide business and customer insights. They can also host your website and provide e-commerce platforms while facilitating application creation, network management, system monitoring, data logging and web diagnostics.

What are the options?

Essentially there are three main options when it comes to cloud server use: Amazon Web ServicesGoogle Cloud Platform and Microsoft Azure. Each offers its own unique variation of the cloud, and they aggressively compete with each other across all aspects of cloud technology, covering customer service, quality, speed, availability, usability, reliability and even pricing.

Cost difference

The most significant difference between platforms is pricing, where Microsoft comes in last at an estimated $14,300 per year for a standard eight-server web app package, compared to Amazon at an estimated $6,415 and Google at an estimated $6,092 for the same standard package.

The pricing difference between Amazon/Google and Microsoft is massive, with Microsoft’s cloud platform sitting at just over double the price for essentially the same service. As a small business, you likely would not need or be able to utilize all the features on offer to warrant spending $14,300 on Microsoft’s cloud technology.

Service choices

Google offers almost everything a small business would need in regard to cloud services, with the most competitive price on the market (based on an eight-server web application package). Google Cloud Platform is additionally run off the same supporting infrastructure used by the ever-popular YouTube and Google Search. It even offers support to existing Amazon Web Services users.

Google effectively rivals Amazon and Microsoft in all aspects of cloud technology and most critically through competitive pricing. Amazon and Google offer the best cloud services available in the market today, but choosing between the two – as they offer comparable features, prices and functions – is difficult.

James Watters, vice president and general manager at Pivotal, suggests Amazon has a “first-to-market” advantage since it launched its cloud service earlier than its competitors. Google is seen as having an advantage with “at-scale infrastructure,” giving customers a highly advanced and stable option for running apps.

ROI for cloud

Calculating return on investment (ROI) for cloud services compared to in-house means knowing the cost of the required equipment, its projected life span and the cost of capital – in other words, the cost of the equipment plus interest costs over the projected life span. The next task is adding estimated operating costs like floor space, electricity and staff to run servers.

Other costs in moving to the cloud include the time and money spent on migrating applications, training staff and the cost of third-party cloud services. Use an online cloud cost calculator, such as the one provided by Amazon, to make an initial comparison.

While these three cloud services offer many similarities, they do significantly differ on price. Currently, Amazon and Google offer the best value, but choosing between them may come down to user experience and industry preferences. Current Technologies can help you find which system will be best for you and set up a turnkey cloud storage system that will help you the first day.

Make the Cloud work for you

Name *

We value your feedback!

Was this information helpful?
Was this an interesting read?

Separate the Cloud from the fog


You’ve surely heard about the much-hyped idea of cloud computing—and whether you know it or not, you’re probably already using it. Web mail, Facebook, and Instagram are all popular examples of cloud computing, as are more business-focused services like Salesforce.com and Microsoft Office 365.

The basic idea behind cloud computing is that your data is stored on a computer that you do not own, manage, or maintain. This lets you and your employees focus on doing your job instead of worrying about keeping your systems running smoothly. It’s also cheaper—since you typically rent access to the systems for a monthly or annual fee that’s often quite competitive—and more flexible. Cloud services can be accessed via any Web browser, and most also offer mobile apps.

Public: putting it all out there

Your employees are almost certainly already running "public cloud" services on their phones and computers, whether they be cloud storage services like Dropbox or photo-sharing services like Flickr. These types of services are either called Software as a Service (SaaS) or Platform as a Service (PaaS) offerings, from the likes of Amazon Web Services and Microsoft, and offer higher-end environments that run your company servers on their systems.

The flexibility of cloud services have changed the computing world quickly. Yet cloud’s ubiquity and ease of use have created problems, as the lines between personal and business are blurred and "shadow IT"—unsanctioned and unmonitored business use of public cloud services by employees—becomes common.

Without oversight, companies have no way of stopping or even knowing if sensitive corporate data gets out of their control. Employees are just trying to do their job better, but that will be little consolation if next year’s budget spreadsheets end up on the Web for competitors to see.

Hybrid: the in-between approach

In spite of the benefits of cloud computing, there are some circumstances in which companies may still want to keep data in-house—for example, to comply with industry regulations around the handling of sensitive data, concerns about cloud security, or because of regulatory restrictions that prohibit storing a companies data in overseas cloud systems.

As a result, few organizations have committed to the cloud 100 percent. Instead, most are pursuing so-called "hybrid" strategies that combine specific cloud services—often business systems such as customer relationship management (CRM) or human resources (HR)—with conventional on-premises systems that are owned and run by in-house technical staff.

This approach complicates things somewhat, because it means that businesses must keep track of two different types of computing environments. Yet new tools are bridging on-premises and off-premises cloud services, making it easy to track and secure data as it moves around the new computing environment. Most companies will use the hybrid cloud model for some time to come.

Private cloud: reinventing the business

While many companies are searching for the best approach to upgrading their applications to take advantage of the cloud, others are using cloud computing's ascension as an opportunity to rework the way they deliver applications to their own employees.

In the "private cloud" model, businesses effectively set up their own cloud-computing providers, running cloud services inside their network. These providers run applications on behalf of various business units, with the idea being that it’s cheaper and easier to centralize computing than it is to have each department run its own IT as in the past.

Building private cloud services requires a massive amount of effort, since it often involves upgrading old applications and moving large quantities of data into the new environment. Yet many businesses are also using the private cloud to offer entirely new services to business partners and customers. For example, a bank might run an application for finance brokers on its private cloud, giving them direct access to relevant banking systems.

Private cloud services also let banks connect their applications with those of other software providers using application programming interfaces (APIs) that let third parties easily access cloud services offering specific functions. A simple example might be an API that lets a third party retrieve current currency exchange information for use on their own website.

Less nebulous every day

There’s no doubt about it: cloud computing is here to stay. And while it’s still not perfect—issues such as telecommunications outages, security, and data ownership are still worrying many would-be adopters—its many benefits have made it essential for every business.

Current Technologies can help your business establish a clear cloud strategy now that will help you modernize your systems in order to take on nimbler competitors today and stay relevant for even more cloud-savvy customers in the future.

You don’t want to be the last one on the cloud

Name *

We Value Your Feedback

Was this information helpful?
Was this an interesting read?