More than just IT. We work to secure your business from the latest threats
Complete Microsoft 365 and Azure Compute cloud migration services for businesses and organizations of all sizes
Take Your Business to New Heights in the Cloud
Does your team need a robust communication and collaboration suite designed to enable enhanced business productivity? Discover how easy moving to the cloud can be.
Work Without Boundaries
Increase agility, reduce downtime, and facilitate greater productivity with seamless anywhere access to comprehensive unified workplace communication tools and resources for your organization. Let us show you how you can harness the power of the cloud to make your business more efficient.
Work Anytime, Anywhere, with Anyone
Effortlessly access your applications, data and communication tools from any location. Collaborate with coworkers, outside partners and vendors on any device, at any time.
Reduce Hardware Lifecycle Expenses
Eliminate the need to purchase or maintain expensive servers and redundant storage equipment and allow your infrastructure to intuitively scale with you as your business grows.
Enjoy Secure, Reliable, Always On Access
With protection and security features like advanced encrypted connectivity and multifactor authentication, you can be confident your information is kept private and secure.
No-Cost Migration with Managed Care
We offer your business complementary included cloud migration when you agree to any managed care plan. All you pay for are the license subscription fees, and we handle the rest.
Are IT support issues holding your business back?
- Are you wasting time with daily distractions and frustrations with technology?
- Is your current IT support company unresponsive or slow to respond when you need help?
- Are you missing targets due to downtime or other technical work stoppages?
- Worried or unsure your business may be vulnerable to data loss or cyberattack?
If you answered yes, our managed IT and cybersecurity services may be right for you.
Unmanaged cloud solutions lead to risk and limit your potential.
Not all cloud solutions are made the same. You need an experienced partner to ensure the platform your business is built upon is properly configured for success, with security in mind from the start.
At Jump Point Technologies, we bring a consultative approach to the cloud by taking the time to understand opportunities and goals, engaging stakeholders and end-users from the onset, and working in collaboration with your team to lead the digital transformation of your business.
More than just the adoption of a new way of working, with everyone onboard the possibilities of the cloud are endless.
Cloud Migration Services
Take the First Step in Your Digital Transformation
Create a path for your organization’s digital transformation by migrating your business resources to the cloud.
Insightful Planning
When it comes to business, we understand well the significance of having the right tools and technologies in place plays in your success, which is why we're committed to creating the experience needed to fashion maximum, genuine impact in your work.
Tailored to Your Needs
We know you get the most value from technology when it's properly fitted to your specific needs and goals. We always start by focusing on understanding how your business operates, and work to design a solution aimed at helping you achieve more.
Personal and Proactive
Clear and effective communication is key to any functional business partnership. We'll keep you updated throughout every step of the transformation process, ensuring we're well aligned to meet your every expectation, with an on-time and in-budget delivery.
Leverage the power of the cloud for your business.
- Does your team need a robust communication and collaboration suite designed to enable enhanced business productivity?
- Does your business need help setting up and migrating to Microsoft Azure in the cloud?
- Do you need assistance with ongoing support and administration of your on-premises Windows servers and clients?
Migrating to the cloud can be overwhelming without support from a trusted partner. From identifying the best way forward, all the way through planning, budgeting, execution, and deployment, we have the experience and expertise to assist in all your Microsoft business technology needs.
Microsoft 365
Deployment
Microsoft 365, formerly Office 365, is a suite of productivity software, collaboration, and cloud-based services designed to enable your business to do more. With Microsoft 365, your business can enjoy the use of today’s familiar Office apps—including Word, Excel, PowerPoint, Outlook, Teams, and OneDrive—plus access to powerful data sharing and collaboration tools like Exchange Online and SharePoint, once previously only available to larger enterprises with the budget and resources to support such an infrastructure.
Ready to transition your business or office to Microsoft 365 and start experiencing the benefits of the working in the cloud but you’re not sure what you really need or where to start? We can make this process effortless and efficient by identifying the best subscription for your use case, ensuring a smooth, secure, and impactful deployment.
Microsoft Azure
Cloud Migration
Managing and maintaining on-premises servers and custom applications is often difficult and costly for small businesses which may lack the budget and resources to support such an undertaking.
Microsoft Azure enables your business to take advantage of the benefits of operating a secure compute management infrastructure without the overhead burden of maintaining the required underlying physical devices such as redundant network controllers, servers, fail-safe storage arrays, and more.
Microsoft’s Shared Responsibility Model dictates which roles and security tasks are offloaded to them, and which responsibilities are retained by the end-user organization. As your partner in technology, we’ll facilitate your transition to the cloud by fulfilling those duties left to you, delivering your new home in the cloud, fully configured, and ready to go.
Microsoft Windows
Server Support
Legacy Windows Server technology is complex and demands a high level of familiarity and understanding in order to be successfully deployed, properly configured, and securely maintained.
We have the expertise—along with decades of practical experience—in setting up and administrating Windows Server necessary to ensure your business’ critical data and application services remain operational, accessible, and resilient to outage.
Whether your business has relied on Windows Server since its inception and you’re looking to expand, upgrade or overhaul your existing infrastructure, you need help rolling out a new installation or you simply require ongoing support managing systems already in place, we can help move you along, keeping you up-to-date and fully functional. And when you’re ready, we can handle your move to the cloud!
What does your business do to protect data in the cloud?
The Shared Responsibility Model and the Importance of Cloud Backups
Many businesses and organizations mistakenly believe that cloud data is automatically protected by Software-as-a-Service (SaaS) vendors such as Microsoft and Google. In reality, 1 in 3 companies report losing data stored in cloud-based applications due to malware or ransomware attacks, malicious end-user activity, and accidental data overwrites. SaaS providers ensure they won’t lose your cloud data with built-in redundancy and other high availability measures; however, they do not take responsibility for restoring data if you lose it.
Ransomware isn’t only an on-premises problem. It can and does spread into SaaS applications, especially Microsoft 365. Unfortunately, many businesses and organizations still believe that these tools make backup obsolete… this simply isn’t true. Backup is just as important for data in SaaS apps as it is for data hosted on-premises.
Common SaaS Myths and Misconceptions
SaaS Applications Do Not Require Backup
While SaaS applications have built-in redundancy that protects against data loss in their cloud servers, this doesn’t protect against user error, accidental and malicious deletion, or ransomware attacks. While accidental deletion of files is by far the most common form of data loss in SaaS apps, ransomware can be the most damaging. That’s because ransomware is designed to spread across networks and into SaaS applications, impacting many users.
Microsoft and Google are Responsible for Backups
SaaS providers ensure they won’t lose your cloud data with built-in redundancy and other high availability measures; however, they do not take responsibility for restoring data if you lose it. Microsoft calls this the Shared Responsibility Model for data protection. That’s why Microsoft recommends third-party SaaS backup in its user agreement.
The Shared Responsibility Model places the onus of data protection squarely on businesses that rely on SaaS applications. SaaS providers are responsible for keeping their infrastructure up and running, but businesses are responsible for the preservation and security of their data.
Google Vault is a Viable Backup Solution for Google Drive
Google Vault retention and eDiscovery cannot replace a data backup solution. It’s true that the retention and hold features that Google Vault provides can secure your business data from being lost and deleted. But that is only part of the solution. Google Vault is a retention service and should not be confused with a backup solution. Even though both retention and backup involve securing data for longer periods or indefinitely there are a few differences.
One major difference is that a retention solution is only concerned with retaining data while a backup solution offers an easy method to restore this data back into your account. Google Vault is a retention solution that was intended to preserve critical business data for legal and litigation purposes. Google Vault should never be a replacement for a backup solution for your Google Drive data.
File Sync is a Replacement for Backup
While file sync tools like Microsoft OneDrive or Google Drive do create a second copy of files and folders, they are not a replacement for backup. File sync automatically copies changes to synchronized files. So, if a file or folder is infected with ransomware, the malware will automatically be copied to all synced versions of that file.
File sync services do offer some restore capabilities via versioning, but they fall short of a true SaaS backup solution. Here’s why:
- Versions are not immutable recovery points. So, if a file is deleted, older versions of the file are deleted as well.
- Versioning doesn’t enable centralized management of user data. In other words, you don’t have control over backup and recovery—it’s left in the hands of end users.
- Versioning doesn’t maintain recovery points across files, folder, settings and users. If you only need to restore a couple of files, no big deal, but large restores are a time-consuming, manual process.
Beyond simply lacking the restore capabilities of a backup solution, file sync can actually introduce ransomware to SaaS applications. File sync and backup are not competitive solutions, rather they can and should be used side-by-side. Remember: file sync and share is for productivity and backup is for data protection and fast restore.
SaaS Applications are Always Available
While SaaS apps are highly reliable, outages do occur. In October 2020 alone, Microsoft 365 had three significant outages that impacted businesses worldwide. Last year, a massive Google outage affected nearly one billion Gmail, Workplace, and YouTube users.
Outages and slow restore times aren’t just an inconvenience. When businesses can’t access important business data, productivity falls, and revenue is impacted. Creating backups that are independent of a SaaS provider’s cloud servers is the only way to ensure access to essential files in the event of an outage.
Why Microsoft Alone is Not Enough to Protect Your Data
With Exchange Online, deleted items (emails, tasks, contacts, and calendar items) can always be restored from the Deleted Items folder; however, once removed, they can only be recovered for a period of 14 days by default. This can be increased up to a maximum of 30 days, after which they are no longer recoverable by any means. In addition, the Recoverable Items folder is subject to a quota, meaning older items may be purged sooner than anticipated.
When an employee account is deleted, the contents of their OneDrive are generally available for 30 days before being moved to Second-Stage, where it is kept for 93 days. Likewise, when individual OneDrive or SharePoint files/folders are deleted, they are moved to the recycle bin; however, if they are hard deleted or the recycle bin is purged, they are moved to Second-Stage and subject to the same 93-day retention policy. Following expiry of the retention period, these deleted files are no longer recoverable by any means.
Malware and other malicious actors will typically hard delete files, so they are not visible in the recycle bin for identification and restoration. Unless the deleted data is noted missing within the retention period, and without a viable backup available, this data may be permanently lost.
1 Week
1 Month
3 Months
1 Year
2 Years
5 Years
1
1
1
1
1
1
Inbox or Folder Data
Deleted Items
Auto-Archived Items
Deleted SharePoint Objects
OneDrive Files/Folders
Employee Turnover
In Microsoft 365
Moved to Archive
In Microsoft 365
Permanently Deleted
In Microsoft 365
Moved to Archive
In Microsoft 365
Second-Stage
Permanently Deleted
In Microsoft 365
Second-Stage
Permanently Deleted
In Microsoft 365
Second-Stage
Permanently Deleted
Average Data Compromise Discovery Period: 140 Days
Why Google Alone is Not Enough to Protect Your Data
When a user soft deletes an email, file/folder, or other item, it remains in the Trash folder for 30 days, unless it is first manually purged. After a 30-day period, items in Trash are automatically purged. Items removed (purged) from Trash are retained for a further 25 days. Following expiry of the 25-day retention period, these items are permanently deleted from Google Workspace and are no longer recoverable by any means.
Malware and other malicious actors will typically empty Trash following delete, known as ‘Delete forever’. Unless the deleted data is noted missing within the restore period, and without a viable backup available, this data may be permanently lost.
1 Week
1 Month
3 Months
1 Year
2 Years
5 Years
1
1
1
1
1
1
Deleted Emails
Deleted GDrive Files/Folders
Restore Items (from Trash)
In Google
Permanently Deleted
In Google
Permanently Deleted
In Google
Permanently Deleted
Average Data Compromise Discovery Period: 140 Days
Flying Blind is Risky Business
Your biggest cybersecurity risk may be not realizing the risk you face.
Long considered the exclusive domain of large enterprise only, information security is now something for which businesses of all size must account and is becoming increasingly important to deploy comprehensive protections against interruptions in operation or production, data loss or compromise, and ransom due to cyberattack.
Non-clients contacting us for help dealing with compromise due to breach reported effects including data manipulation, extortion of data, theft of data, destruction of data, and ransom of data as being some of the top consequences.
Don’t let perceived budget constraints leave your business unprepared to respond in the event of ransomware or other cyberattack. Our complete cybersecurity and backup services make protection and preparedness easy and affordable, with transparent pricing information provided up-front.
Request a Free Cybersecurity Assessment
Ready to Talk? We're Here to Help
Remove the risks and barriers in your way and take the first step in protecting your business from real threats, like ransomware, by booking a free consultation or complementary site visit. We’re here to help you enjoy the benefits of secure, reliable, and productive IT.