[vc_row gmbt_prlx_parallax="up" font_color="#ffffff" css=".vc_custom_1468540075431{padding-top: 170px !important;padding-right: 0px !important;padding-bottom: 190px !important;padding-left: 0px !important;background-color: rgba(221,153,51,0.66) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;*background-color: rgb(221,153,51) !important;}"][vc_column][vc_column_text css_animation="appear"]

2016 FASTEST GROWING PRIVATE COMPANIES

The San Diego Business Journal’s 150 Fastest Growing list ranks private companies based in San Diego according to revenue growth between 2013 and 2015

[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_column_text][vc_single_image image="10214" img_size="medium" alignment="center"][vc_column_text]Nikki Fairchild, Business Development Manager, Managed Solution accepting the award at the San Diego Business Journal's Fastest Growing Private Companies event on July 13, 2016.

On June 6, 2016 Managed Solution announced that the San Diego Business Journal has named them to its list of 150 Fastest Growing Private Companies. The list recognizes San Diego’s most rapidly growing private companies based on their percent of verified revenue growth between 2013 and 2015.

[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][/vc_column][/vc_row]

[vc_row][vc_column][vc_column_text]

Technical Support Specialist

Overview:
Managed Solution has an all-star team with a kick-butt company culture, and we’re excited about what’s ahead. For over a decade, we’ve worked with companies large and small, supporting any and all of their IT needs. We invest in our clients and our staff to bring out the best in both. We’ve been named to the Business Journal’s 100 fastest growing companies for the past five years and stand in the top 1% of Microsoft Cloud partners worldwide. Managed Solution values high standards, honesty and integrity, proactivity, adaptability, and passion. We're poised for unparalleled growth and expansion, and we're always looking for MVPs to join our team.
Responsibilities:
As a member of the Managed Operations Center, the Technical Support Specialist (Level 1) will provide entry-level technical support to managed services clients in a 24/7/365 environment, working from Managed Solution headquarters and at various client sites. He or she will be responsible for the following...
•Fielding client inquiries and providing basic application support, network administration, desktop troubleshooting.
•Adhering to client service level agreements and team performance goals as you prioritize, resolve and escalate issues in accordance with company policy.
•Communicating technical information clearly and effectively over the phone, in person, and in writing to English-speaking clients.
•Documenting client communication and resolution efforts via internal ticketing system.
•Maintaining a high degree of professionalism, confidentiality, and integrity while accessing client data/systems and supporting mission-critical environments.
•Other responsibilities as assigned.
Qualifications:
Technical Competencies:
•An Associate or Bachelor degree in Computer Science or related field, or equivalent combination of education and/or experience.
•Microsoft or other technical certifications a plus!
•Basic troubleshooting skills in a Windows environment, including desktop and server OS
•Fundamental awareness of LAN/WAN administration and concepts
•Entry-level proficiency in Exchange and Active Directory
•Previous exposure to virtualization technologies and ticketing systems preferred.
Relational and Problem Solving Skills:
•An outgoing, enthusiastic personality with a can-do attitude and passion for solving problems.
•Outstanding customer service skills and a drive to deliver exceptional service to both internal and external team members.
•Strong organizational and problem solving skills. Experience prioritizing multiple responsibilities in a fast paced environment.
•Excellent oral and written English communication skills.
•Integrity and the ability to maintain confidentiality.
Perks & Benefits!
•Never stop learning… stay one step ahead of the game with a company on the bleeding edge of technology.
•Be inspired by your teammates: we’re a friendly bunch who are passionate about IT.
•Get Certified - Managed Solution prepays the cost of your exams!
•Earn $$$... Competitive salary with bonus potential
•Save for the future: 401(k) retirement plan (with employer match beginning at 6 months!)
•Find balance with plenty of PTO and 7 paid holidays
•Feel great with Medical, Vision and Dental Insurance - Managed Solution covers 65% of the cost!
See all of our available positions here

[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_column_text][vc_cta_button2 h2="Think you're a good fit? Apply today!" txt_align="center" title="Apply for Technical Support Specialist" color="pomegranate" size="lg" position="bottom" link="url:https%3A%2F%2Fjobs-managedsolution.icims.com%2Fjobs%2F1077%2Ftechnical-support-specialist%2Flogin||"][/vc_cta_button2][/vc_column_text][/vc_column][/vc_row]

[vc_row][vc_column][vc_column_text]

State of BYOD and Mobile Security Report: Latest Insights, Trends and Stats

By Yishay Yovel as written on securityintelligence.com

byod

The Information Security LinkedIn group released a new survey from its 200,000-member community on the state of bring-your-own-device (BYOD) and mobile security initiatives in their enterprises. We provide our take on some of the findings from this comprehensive survey‘s 1,100 responses.
To BYOD or Not?
According to the survey, over 60 percent of enterprises allow or tolerate employee use of personal devices to access enterprise data. Only a small minority of enterprises, 11 percent, have no plans to allow such usage. Enterprises that allow BYOD expect the primary benefits to be improved employee productivity and satisfaction and better overall security, and 58 percent expect related budgets to increase or stay flat.
Our Take: Device ownership is destined to become a nonissue, and IT organizations must adopt new capabilities to secure enterprise applications and data on a shared personal or corporate data device. Enterprises are embracing BYOD programs as an opportunity to invest in the secure productivity of their employees as opposed to a “cost of doing business.” Securing corporate data without making assumptions on device security makes enterprises less complacent and more rigorous in assessing and addressing security risks.
Enable Flexible Data Access
According to the survey, email access allowance is still king at 86 percent of responses, followed by access to documents, custom mobile applications and cloud services. Overall, structured data in enterprise databases is still deemed most valuable, with unstructured data a close second.
Our Take: Our devices enable access to critical enterprise resources. Sensitive data and transactions are accessed, stored locally and exchanged not only with data center apps, but also third-party services. BYOD enables a “personal” device image, but enterprises must take steps to secure local app execution, encrypt enterprise data where applicable and detect access and transactional risk.
Data Loss Doesn’t Equal Device Loss
The biggest mobile security risk, according to the survey, is losing enterprise data. In essence, the risk categories can be divided into three main areas: data (stolen, lost, unauthorized access), threat (fake apps, malware, exploits) and management (endpoint security, regulatory compliance).
Our Take: Enterprises must address each of these three dimensions through a holistic framework. Many enterprises have made progress on addressing the “lost device” scenario and data-loss risk with enterprise mobility management suites that enable a remote wipe of enterprise data from mobile devices. However, securing devices against compromise has a long way to go; this is partly due to the restrictions enforced by mobile OS vendors on the security community, which limits the ability to secure mobile platforms.
Mobility Impact: Tools and Resources
Enterprises are investing in resources (mostly security personnel) and tools (mobile device management and endpoint security solutions) to address the emerging mobile threats.
Our Take: Enterprises are taking steps to reduce mobile-related security risks. To minimize the burden, such resource allocation should occur in the context of a comprehensive plan that addresses enterprise-specific risk factors. For example, banks that provide online banking services to customers must address transactional risk from both laptops and mobile devices that they have absolutely no control over. Malware and phishing risks that are common to that environment should be assessed when new capabilities are rolled out (e.g., remote deposit capture).
Reducing Attack Surface: Beyond the Basics
Simple steps are the easiest to implement. Most enterprises require password protection to devices accessing enterprise data; this will deter the occasional thief but is probably no match for a focused adversary. Encryption and remote wipe provide additional layers of security.
Our Take: While these measures are a good start, security should be embedded in the enterprise mobility initiatives. For example, secure development practices and mobile penetration testing will reduce vulnerabilities that can be exploited by malware, thus reducing the attack surface. While the malware threat has quickly grown, its capabilities have slowly evolved on mobile devices. Recent developments should drive security teams to reassess the threat and the possible impact of credential loss on their enterprise security.
Summary
The survey shows enterprises’ increasing readiness to embrace BYOD programs. Enterprises are making investments in people and tools to manage the key risks to enterprise resources (applications and data), driven by mixing corporate and personal data and the evolving threat landscape. The business rationale for these investments is boosting employee productivity while improving security as a broader set of risks is taken into consideration; this is a no-brainer since we expect BYOD to become table stakes for virtually all enterprises in the next few years. Given the utility and importance of mobile devices to employees’ personal and work lives, this looks like a sound investment.

[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_column_text][vc_cta_button2 h2="See how Managed Solution can improve your mobile security" txt_align="center" title="Here!" color="orange" size="lg" position="bottom" link="url:http%3A%2F%2Fwww.managedsolution.com%2Fems||"][/vc_cta_button2][/vc_column_text][/vc_column][/vc_row]

[vc_row][vc_column][vc_column_text]

OneNote 2016 Quick Start Guide

New to OneNote 2016 or upgrading from a previous version? Use this guide to learn the basics. Become an expert in:

onenote 2016 quick start guide screenshot

1. Accessing your work across all devices
2. Organizing information tables
3. Creating wiki-style hyperlinks
4. Copying text from pictures
5. Sharing your notebooks with others>/h5>
And much more!
Love Office 365 and other Microsoft products? See what Managed Solution and Microsoft can do for your company!

[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_column_text][vc_cta_button2 h2="Download the OneNote 2016 Quick Start Guide here!" txt_align="center" title="Download" color="orange" size="lg" position="bottom" link="url:http%3A%2F%2Fwww.managedsolution.com%2Fwp-content%2Fuploads%2F2016%2F07%2FONENOTE-2016-QUICK-START-GUIDE.pdf||"][/vc_cta_button2][/vc_column_text][/vc_column][/vc_row]

Contact us Today!

Chat with an expert about your business’s technology needs.