911 CHANGES in Michigan and How They Affect You

by Dan Aylward

We are all familiar with calling 911 and the simplicity, yet significant value, it has for our health and well-being. Behind the scenes is a vast and complex infrastructure in our communities. However, with changes in technology come necessary changes with this telecommunications infrastructure. By the end of this year, Public Act 244, which mandates 911 location phone systems in large buildings, will go into effect. By the end of 2020, every organization in Michigan with a phone system will need to be in compliance with changes in regulations governing 911 (with the exceptions below). What are the changes? Below are eight questions and answers to help you understand the changes, as well as information that all communities must understand for compliance.

What Is It? Not long ago we all used POTS lines (Plain Old Telephone Service) and PRI circuits (23 phone lines bundled into one digital circuit). Since these phone lines terminated at one physical address, almost all calls originated from a reasonable physical distance from the phone system. Today, with VoIP (Voice over IP) and UC (Unified Communication), someone could literally be anywhere when calling 911. This is a problem when you need to get emergency responders on-site as soon as possible AND to the right area within the building. The best solution is to send specific geographic identifier information to the PSAP (Public Safety Answering Point) when calling from a MLTS (Multi-Line Telephone System or phone system). This could be address, floor, wing or room information. Also, this does not relate to mobile service.

What Is the Law? Consider this: An employee has a heart attack after normal working hours with nobody around. He or she dials 911 and the ambulance goes to the wrong address. Or, the emergency responders don’t know where the caller is located in the building! This is a reality today with VoIP and multiple buildings tied to one phone system. It is for this reason that 911 is being enhanced to E911. Every organization in Michigan with a phone system in a location with building(s) of more than 7,000 square feet or multiple physical addresses must install equipment and software that reveals where in the building a 911 call originates. Single floor locations, farms, and houses of worship with less than 20,000 square feet and fewer than 20 communication devices (i.e. phones) will need to comply when a new phone system is installed.

Is This the Same as Next Gen 911? No. Next Gen 911 is a technology standard that allows PSAPs to receive texts, pictures, video chat, social media, and VoIP. This will also allow the 911 Call Centers to transfer calls to other call centers to handle call overload. However, many are not ready for this technology. It is also very difficult to know if your local PSAP is capable of handling anything besides calls and SMS (Short Message Service). For more information, you can consult the master PSAP registry at fcc.gov/files/ masterpsapregistryv2238xlsx.

Does 911 Need to Do Anything Different? Yes. The PSAPs need to update their systems as well. Most will because the Middle-Class Tax Relief and Job Creation Act of 2012 authorized $112 million to do this and prepare for NG911. But this does not mean all are compliant.
When Will This Happen? This was supposed to happen in 2006, but the legislation has been delayed a couple times. The new date is December 31, 2019. Since House Bill 4249 passed, there have been some changes. However, all entities should be prepared to be in compliance by the end of 2020!

What Do We Have to Do? Almost all phone equipment eight years old (or newer) is compliant. However, you will need to make sure the phone system database is populated to send the appropriate information to the PSAP. Then, you’ll need to make sure your telecommunications company (e.g. AT&T) is pushing this information to the PSAP. Every extension on the phone system needs to have the capability to do this. For example: “734 Evergreen Terrace, Springbrook, MI, second floor, northwest corner” will be sent to the PSAP. Alternatively, you will have to identify the building(s) into 7,000-square-foot sections as identifiers.

Is There Any Ongoing Maintenance Involved with This? Yes. When you have moves, adds, changes, or deletions you will need to update the database with your telecom carrier. For example, if Michelle from the second-floor clerk’s office moves to the first-floor treasurer’s office, this information will need to be updated. In addition, if you have connected buildings with one phone system, the street address will need to be updated when an employee moves between buildings.

What if We Don’t? Penalties can be $500-$5,000 per offense; however, the greater concern is a lawsuit for noncompliance where compliance could mean saving someone’s life! Exceptions are if the building maintains, on a 24-hour basis, an alternative method of notification and adequate means of signaling and responding to emergencies or the phone system is not serviced by E911. The telecommunications industry and services have changed radically over the past ten years. However difficult it is to make this transition, it is important to incorporate standards for the safety of all staff.

Dan Aylward is a senior consultant for Abilita. You may contact him at 517.853.8130 or daylward@abilita.com.

Click here for more information and if you need help navigating these new regulations.

admin@abilita.com911 CHANGES in Michigan and How They Affect You
read more

VoIP and Cloud – Right Fit Planning Guidelines

In 2018/19, according to Gartner, roughly 1/3 of companies reported issues and dissatisfaction with their cloud VoIP solutions.

The key to a successful cloud transition is in proper planning, to get a system that fits your needs, from the right provider, at the right price.

With a successful cloud implementation:

  • Employees appreciate the seamless integration of their office and mobile phones allowing them to work anywhere and keep in touch with their customers and fellow workers. Collaboration is easier.
  • IT Departments appreciate the outsourced application, allowing them to spend time on priority projects rather than maintaining/updating a legacy phone system and managing the vendors.
  • Management appreciates the increased employee productivity, improved customer relations, and flexibility offered by cloud systems.

With an unsuccessful or problematic cloud implementation:

  • Employees will bypass the office phone systems, telling customers or suppliers to “use my cell number”.
  • IT Departments will need to devote priority time and effort to sort the issues out with the vendor and the company data network. They’ll also likely be blamed for the problems.
  • Management is unhappy with the employee dissatisfaction and customer relations issues and if necessary the cost to transition again to a new system or provider.

Needs Assessment

What system features do you need and would like to have in a Unified Communications system?

  • i.e. Mobile integration, multi-location, call center requirements and reporting, employee collaboration tools, and conference calling.
  • What are your growth requirements over the next few years?
  • How important is redundancy and back up?

Pricing can vary considerably depending on the features selected.

Resource – Managed vs. Outsourced

How much responsibility do you want to retain in house or off load? 

It is important that your Unified Communications system integrates effectively with your data network and security protocols.

Some vendors will offer a completely separate network for your communications, so that there is no interference between your voice and your data applications.    

Data Network assessment – The Network Is the #1 Failure Point for UCaaS

In planning you need to start with a proper network assessment, not only what you have now but what your data/voice requirements will be a few years out.

Potential Network Issues:  Enough Bandwidth, Latency and Jitter, Misconfigured Router/Firewall, Internal Network Problems, Internet Fail Over

The solutions may be more bandwidth or a separate voice network to ensure that you have the right provider for the quality you need. The selected VoIP-UC provider needs to have the expert network techs to work with your IT department to plan and resolve any issues.

Finance Considerations

Today many Unified Communications are cost competitive, even with traditional telephony when you consider the phone line costs plus the licensing and maintenance costs for a traditional phone system. 

Capex or Opex ?  You often have the choice to purchase or rent your phone hardware.

Contract terms? How long are you prepared to contract your system for?  

Vendor Selection

Do your research carefully on any vendors to be considered.

  • Do they have sufficient rollover facilities to avoid any network failures?
  • Customer satisfaction?
  • Do they have adequate project management and follow up support?
  • Do they monitor call quality?
  • How do they handle system and feature upgrades?

To schedule a 10 minute phone call to explore cloud communications for your organization, click here.

admin@abilita.comVoIP and Cloud – Right Fit Planning Guidelines
read more

Phone Companies Are Literally Letting Their Networks Fall Apart

Once as important as the railroad and electrical grid, phone companies aren’t quite what they used to be. The article below addresses some trends our offices are seeing across the country:

  • Rural areas are still struggling for reliable high-speed connectivity with decaying facilities.
  • The breakdown and transition of traditional carrier networks from copper to fiber.
  • The migration of customers from carriers to cable.

Many aging networks, built on taxpayer subsidies, still remain in use and slower expensive DSL can sometimes be the only broadband service available in rural areas.

Many phone companies have attempted to shift their business models toward new, more profitable sectors as the use of copper-based landlines has plummeted over the past few years. As VoIP services became more common in the early 2000’s, the nation’s phone companies used this surge in voice competition to convince lawmakers that meaningful oversight was no longer necessary.

Cable operators certainly appreciate phone companies’ apathy. Consumers with an actual choice in broadband providers are fleeing to cable at an unprecedented rate. This shift to cable operators has allowed them to raise their rates, impose arbitrary usage caps, and struggle with customer service.

And while next-gen wireless networks may provide an additional competitive option to some of these neglected customers, wireless won’t be a magic bullet for many due to geographical limitations, bandwidth usage restrictions, and potential higher prices.

To help you determine your best option for your voice and data networks, contact your Abilita consultant today.

admin@abilita.comPhone Companies Are Literally Letting Their Networks Fall Apart
read more

‘Tis the Season for Cyberattacks

Cyberattacks skyrocket during the holiday season, especially those that use spear phishing to target victims. According to the recent Carbon Black Holiday Threat Report, cyberattacks are on track to increase by nearly 60% this season alone. Don’t be a victim. This report identifies the simple steps everyone can take to help protect themselves and their company.

Most holiday-centered cyberattacks on businesses come from malware, typically delivered via spear phishing campaigns, according to the report. Companies are also the most vulnerable during the holidays, struggling to keep security teams available for holiday hours. However, the best way companies can stay protected is actually nontechnical, and more interpersonal, the report found.

Businesses can best protect themselves by creating a company culture that prioritizes cybersecurity and internet safety. To help companies stay safe from phishing attacks, the report identified the following three ways to spot a spear phishing email:

1.      Evaluate the email’s basic hygiene – Often with these emails, you’ll see poor grammar, misspelled words and unorthodox URLs. Also, regardless of who is sending an email, be sure to do a brief check to ensure the sender’s domain and email address are accurate and known to you: check the sender address before opening the e-mail or look at it in a preview panel first.

2.      Determine the email’s content and motivation – Any requests for personal or financial information should be viewed with extreme caution, especially in business settings where attackers are keen to use spoofed emails from executives to target lower-level employees.  Ensure your employees are familiar with company internal policies with regard to how and what personal information they will ask an employee to provide.

3.      Attachments and link landmines – Downloading an attachment from anyone other than a verified, trusted source is perhaps the quickest way to get yourself in trouble when it comes to a phishing email. Attackers are aware of this and, as a result, will often use links inside of attachments to target victims.

Companies can protect against spear phishing emails by check the message’s basic hygiene, determining the email’s motivation, and taking caution with opening attachments.

admin@abilita.com‘Tis the Season for Cyberattacks
read more

Don’t Take the Bait – Avoid Phishing Scams

Fishing can be an exceptionally relaxing way to spend a sunny afternoon. That is, unless you’re the fish. The more contemporary concept of phishing scams everyone, from ordinary web surfers to marketers to high-level executives.

3 ways to protect your business from phishing scams

To help you steer clear of future headaches, here are three key ways to protect your business from the vast number of phishing scams lurking on the web:

  • Use proven professional antivirus software.
  • Migrate from HTTP to HTTPS.
  • Preach the importance of safe email use.

What are phishing scams?

Put simply: Phishing scams are attempts by a hacker to pilfer your personal information for their own financial gain. And they cast a wide, effective net — costing companies roughly half a billion dollars per year in the U.S. alone.

Being able to avoid the bait set every day by hackers and scam artists is an important skill to cultivate for all internet users. And if you’re running any aspect of your business online, getting caught will cost you not only money but also loss of customer confidence and possible fines for not providing adequate safeguards.

Let’s look at each strategy in more detail.

1. Use (and update) your antivirus software

There are a variety of tools and antivirus software services available for businesses. Free downloads do not provide the full range of protection a business needs. Your antivirus package should include email, web and malware protection.

Once your antivirus software is live, don’t just set it and forget it. Leaving all of your company data in the hands of out-of-date software is asking for trouble. Studies have found that out-of-date antivirus software is similar to having no antivirus protection at all.

2. Migrate your website from HTTP to HTTPS 

One type of phishing that is less publicized but equally dangerous is referred to as pharming, and it can affect your website even when clicking a link or downloading an attachment. The “S” at the end of HTTPS stands for Secure which means communications between your browser and website are encrypted.

​While HTTPS protects your own website to a great extent, seeing it on another website doesn’t mean that URL is necessarily safe. Phishers have learned to exploit some SSL certificates, which give a website its “HTTPS” encryption designation.

3. Preach the importance of safe email use (don’t click that link!)

Even with all of the antivirus technology in the world at your disposal, user error can still lead to company data getting compromised. All it takes is one wrong click inside an inbox.

Phony emails that trick users into divulging their personal information are prevalent and they are on the rise as automation makes sending out bulk messages easier than ever. If even one employee fell for a single one of these email phishing scams, it could mean big trouble for your business.

Phishers have had time to refine their skills over the years. Some now even specifically take aim at company executives (a process known as whaling) to nab high-level access to all kinds of company/employee data.

Make sure your employees are aware of what’s at stake when it comes to safe email use. Implement policies for safe and secure email. Building a culture of skepticism where suspicious emails are treated with caution is a big step toward protecting your business from the negative effects of email phishing.

You can never be too cautious

Online phishing scams are born out of vulnerabilities. If one hacker or fraudster finds a situation that can be exploited, they are going to do so. These con artists have been known to use psychology, technology and craftiness to exploit anyone or any situation they can. Scams can also be perpetrated via the phone: phishing for account numbers and passwords or requesting bank account details to process a “refund”.

If you invest in the digital security of your business, train employees to be critical of suspicious emails, and maintain a proactive rather than reactive attitude about data protection, you’ll be able to ideally avert every potential phishing crisis that rears its ugly head.

Abilita and our business partners are available to assist with any of your company’s technology needs. Contact your Abilita consultant today.

 

This article, written by Brenda Barron, first appeared on GoDaddy.com on Oct 11, 2018. Brenda Barron is a writer from southern California specializing in technology and business. 

admin@abilita.comDon’t Take the Bait – Avoid Phishing Scams
read more

Creating Solid Work Relationships

Building and maintaining strong relationships, whether in our personal or professional lives, is vital to our overall happiness and success. Co-worker camaraderie is a key ingredient to job satisfaction.

When you’re in an environment where you feel supported, you’ll view your job and the people you work with in a more positive light. Here are four tips to help your office environment become more ‘connected’:

1. Show an interest in their personal lives

Showing genuine interest in a colleague’s personal life is a great way to create a stronger bond between the both of you. According to a Gallup poll, one in two workers who had a best friend at work indicated they also felt a strong connection to the company they worked for.

Everyone has (or at least should have) hobbies outside of work, so if you take the time to connect with your colleagues on a personal level, you will not only build their trust, but will also experience less job stress and burnout because you have someone to confide in.

2. Be their schedule’s best friend

While some people are more obsessive about their schedules than others, even the most relaxed co-workers will get bent out of shape if another colleague keeps disrupting their schedule.

As a colleague – or manager – you never want your teammates feeling resentful because their schedules have been disrupted. Try to schedule meetings when your colleagues prefer them rather than forcing them to adapt to when it will be convenient for you.

3. Give credit when credit is due

A major part of career satisfaction is feeling appreciated and acknowledged for your hard work. If you help create a culture in which compliments are given, then others will see it as a green light to give compliments as well.

It’s a virtuous cycle that will benefit everyone. Over time you’ll be part of the reason why you operate in a healthy, happy work environment. A simple thank you or acknowledgement of a co-worker on a job well done will go a long way.

4. Bond outside of the office

The connection that we share with those around us – especially colleagues we see on a daily basis – not only impacts our health and well-being, but also makes us more productive in the workplace.

It can be something low key like grabbing coffee together in the morning or a drink at happy hour. If you’re the boss and you’re considering doing this with a subordinate, just make sure that it’s a casual offer that your employee doesn’t feel commanded to oblige. The important thing is to show your colleagues that you are investing in your personal relationship with them as well as your professional one.

Many businesses suffer due to a lack of rapport among employees, which can translate to lower long-term success for the company and stunted career advancement for the employees. Following these tips will go a long way towards creating solid work relationships.

admin@abilita.comCreating Solid Work Relationships
read more

Case Study – Premier Texas Litigation Firm

Everyday Abilita helps companies make long term decisions for maximum ROI. Independent and objective, we know how to help you in an ever changing industry. Below is a brief case study that led to optimized technology and true bottom line cost savings of 45%! Contact Abilita to show how we can do the same thing for your business.

Case Study – Premier Texas Litigation Firm

Profile and Key Challenge

A Houston-based litigation firm comprised of 40 lawyers had been managing their own telecom services with in-house staff. In order to realize savings, they looked outside their business for expertise and potential cost saving opportunities. The firm contacted Abilita to assess their current services compared to business requirements with an overall goal to improve services and lower costs.

Solution

Communication was a key initiative for the company and a core operating strategy. Abilita’s consultants suggested the following cost-saving strategies:

  • Identified expense waste and unused telecom services.
  • Recommended strategies which enabled the organization to optimize and integrate the entire telecom and technology framework.
  • Negotiated lower rates with service providers.
  • Recommended the adoption of the latest communications technology, which best fit the firm’s business requirements while managing expenses.
  • Built and preserved a competitive advantage without forfeiting innovative business practices and organizational excellence.
  • Providing ongoing optimization and savings through regular analysis and reporting.

Abilita’s telecom expertise provided the firm with professional and independent telecom advice.

Benefits

Once the project had been implemented, the client realized true bottom line cost savings of 45% of the annual telecom spending budget. The solution that Abilita provided included:

  • Effective management of procurement and billing.
  • Accurate voice, data and network inventory.
  • Optimized network pricing and performance through proactive reporting.
  • Competitive rates with carriers and service providers.
  • Increased staff time available for core business activities.
  • Validation of enterprise processes and invoices with periodic audits.
  • An effective plan for future technology investments that are supported with cost/benefit analyses to ease senior leadership decisions.

Read what the Director of Operations had to say about this project:

“Our firm was able to realize a true bottom line cost savings of 45% of our annual telecom spending budget. Whenever we have telecom questions or concerns, we know we can count on Abilita to provide expert advice and direction to make sure we are utilizing our telecom services in the most efficient and cost effective way as possible. We are very pleased with the services provided by Abilita and recommend their services without hesitation.” 

Abilita has a proven track record in assisting small, medium and enterprise clients track, analyze, and optimize the entire spectrum of telecommunication services and technology infrastructure. Contact us today to see how we can deliver bottom line results and free up staff time.

admin@abilita.comCase Study – Premier Texas Litigation Firm
read more

Two Factor Authentication – Not the Panacea to Protect your Business from Cyber Crime

  • Two Factor Authentication, although an extra layer of security, still has potential for cyber crime.
  • View the video of KnowBe4’s Kevin Mitnick demonstrating how Two Factor Authentication can be hacked.
  • User education and training along with other cyber security efforts can help protect your company’s data.

In today’s world of digital crime and Internet fraud, most people are familiar with the importance of online login security using usernames and passwords. Two Factor Authentication adds an extra layer of security that requires not only a username and password but also a piece of information only they should know or have immediately on hand – such as a physical token.

This does make it harder for potential intruders to gain access and steal that person’s personal data or identity, however Two Factor Authentication may not be the panacea that many believe it is. Kevin Mitnick, cybersecurity expert and KnowBe4’s Chief Hacking Officer, shows in the video below how easily this defensive measure can be spoofed:

This example demonstrates how Two Factor Authentication is not enough to stop phishing attacks. You and your employees must remain diligent through user education and training, along with technology to help protect your company’s data.

Abilita and our cybersecurity business partners can help protect your company against cyber attacks. Contact your Abilita consultant today for assistance.

admin@abilita.comTwo Factor Authentication – Not the Panacea to Protect your Business from Cyber Crime
read more

Which of Your Employees Are Most Likely to Expose Your Company to a Cyberattack?

• Your employees are often the weakest link when it comes to enterprise cybersecurity.
• Your IT Department, Finance and C-Suite are particularly risky when it comes to cyberattacks.
• Harvard Business Review identifies 4 areas to mitigate the risk of cyberthreats through human error.

Cybersecurity has now expanded far beyond external threats of hackers attacking network vulnerabilities. Your employees are often the weakest link when it comes to enterprise cybersecurity. Insider threats are much more complex and difficult to manage. The nature of insider threats can be categorized into malicious, accidental, or negligent.

Some departments are more likely to fall victim to cyberattacks:

  • IT and development: These employees have system access and passwords to sensitive company files.
  • Finance: Attacks target these employees to transfer large sums of money, bypassing normal accounts payable procedures and controls.
  • The C-Suite: Executives often work long hours, are rarely confined to the office, and have unrestricted access to the most sensitive company data, making them highly valuable and highly available targets.

Harvard Business Review wrote an excellent article about the problem of employees exposing your organization to cyberthreats through human error. They identified four areas where you can significantly mitigate this risk:

  • Rethink employee training: In order to make a meaningful and lasting impact on employee behavior, organizations should organize frequent and interactive training sessions.
  • Identify high-risk users and intervene: Another technique is to send out mock-phishing emails to see who clicks. Predictive analytics and artificial intelligence can also monitor and influence risky behavior.
  • Shape the solution to the human user and not vice versa: Secure systems such as encrypted email can be complex and cumbersome to use. Companies should engage with employees to find a viable and workable solution to support cybersecurity efforts
  • Constantly adapt to changing threats: Rapid advancements in technology makes it easier to secure data and to apply advanced analytics.

The Harvard Business Review article ends with: “It’s true that to err is human, and humans will keep erring. But increasingly, technology and improved practices can help you identify those employees who are most at risk of exposing your company to a cyberattack — before it becomes a major problem.”

Abilita and our cybersecurity business partners can help protect your company against cyber attacks. If you are ready to explore some of the strategies outlined in this report, contact your Abilita consultant today!

admin@abilita.comWhich of Your Employees Are Most Likely to Expose Your Company to a Cyberattack?
read more

How to Run a Highly Effective Meeting

We’ve all been in meetings without a clear purpose that drags on and on. Inefficient meetings result in huge costs since employees are kept from doing other important work. Inefficient meetings also lower employee satisfaction possibly leading to higher employee turnover. Here are some meeting tips to set you up for success:

Make the purpose clear

Most of the time you spend on a meeting should be spent before you even enter the meeting room. Send an extremely focused and actionable agenda including any background materials ahead of time so people know what you’ll cover.

The purpose of meetings is to make decisions and get work done. For the most part, meetings are not the best way to simply share information.

Control the size and have appropriate attendees

Meetings can get out of control if there are too many people in the room. By limiting the number of attendees and only inviting key people, you ensure that your meeting stays structured and you achieve the outcome you want.

The people in the meeting room make or break your effectiveness. You will want to have the key person present – a manager or executive – so significant decisions can be made.

Set the appropriate tone and structure

As a manager, it is up to you to ensure meeting attendees feel comfortable enough to contribute. Instead of lecturing or trying to convince people of your viewpoint, be open to hearing other’s perspectives. Before you transition from one agenda item to the next, ask if everyone is finished with the current topic. Giving enough people time to discuss their viewpoints will help keep the conversation focused.

Keep meetings as short and concise as possible

Ideally, you should only schedule 15-minute meetings up to a maximum of 30-minutes. This allows you to ensure your agenda is kept focused and clear of clutter. If you limit the number of attendees and your colleagues have done their homework, you won’t need more time.

Stick to your agenda

At the beginning of the meeting, explain you expect everyone to focus their discussions on the agenda. All meeting attendees should prepare their input before the actual meeting.

For constant interrupters: Instead of letting employees dominate the conversation, you can ask them to continue during the break or after the meeting.

For dissenters: For those unhappy with the direction or territorial about decisions made, you may need to address the underlying issue head on before refocusing on the stated agenda. Tackling this directly will help to appease the dissenter and get your meeting back on topic.

For ramblers: The meeting can degenerate if extraneous points are being raised. If your co-workers start to discuss items that are outside of the scope of your meeting, you can suggest a separate one-on-one conversation to go through their concerns. In this situation, you can also use the Parking Lot technique: advise the topic raised is outside the scope of this meeting but you will write it down in the parking lot and include in meeting notes to explore further if necessary.

End your meeting with action items

The main purpose of a meeting is to achieve completion of tasks through decisions and/or actions. When further action is needed, ask the following 3 questions:

  • What are the next steps?
  • Who is responsible for them?
  • What is the timeframe?

Spend a couple minutes to recap so everyone is aware of their responsibilities and is held accountable. After the meeting, send out meeting minutes on a timely basis with the specific action items discussed at the end of the meeting.

Whether you’re getting ready for a weekly departmental meeting or convening an executive group to discuss corporate strategy, these tips can help make your next meeting the most focused and productive one yet.

admin@abilita.comHow to Run a Highly Effective Meeting
read more