Building a Winning Team in Business

Last week, PCR Business Systems celebrated the work anniversary of the first employee we hired back in 2006. 13 years ago…it feels like only yesterday, while at the same time it’s crazy to think about how much has changed in the tech industry since then.

A quick search of “technology trends in 2006,” shows results that look like they’ve been pried from inside a time capsule. Hot new technologies at the time included: video on cell phones, video on demand, integrated digital media home entertainment systems, PlayStation 3, and wait for it… Twitter and Facebook (2006 was the year Facebook opened its platform to the public)!

Just imagine what things will be like 13 years from now?

As the owner of a technology solutions company I am surrounded by change. It is my job to stay up-to-date with the latest tech advancements, and to be one step ahead of cyber criminals that grow more sophisticated and more daring each day.

Yet despite working in an ever-evolving industry, one thing that has stayed relatively constant around PCR since we first opened our doors in Akron, Ohio is our team. I’m proud to say that my first hire from 2006 is still with the company today, and as a whole, PCR has had very little staff turnover since day one.

The PCR Team

Over the years I’ve learned a lot when it comes to hiring new employees and building a successful team, and I wanted to share some of these experiences with fellow small business owners looking to bring in new staff for their growing companies.

If you take one thing away from this article, I hope it’s this—the strength of your business lies in your team and their willingness to help one another, buy into your company culture and values, and excel not just for individual accomplishments but for overall team achievement.

The first thing I ask myself when hiring a new team member is “are they good with people?” There’s a misconception that tech workers spend all of their time behind screens and don’t need to be skilled in interpersonal communication.

In the managed IT industry, this just isn’t true. Our employees work directly with our partners, both on the phone and in person. It is imperative that they are easy to talk with and can form trusting relationships with our clients.

Employees must also be able to get along with their fellow co-workers. You simply cannot have any “loners” on staff looking to better themselves before bettering the team. I look for people with a past history of working well in a team environment and only hire people that I believe will fit our company culture.

I also seek out employees who are self-starters with a strong desire to grow both in life and in their careers. Is she able to perform jobs without constant direction or tasks being assigned? Is he determined to improve a process or take on responsibility without being asked to do so first?

First and foremost, NEVER overlook red flags. Past employee problems can and will become your problems eventually. This doesn’t mean you shouldn’t give someone a second chance, but do your homework and be certain they have resolved any issues that might negatively impact your team or your company.

Another lesson I’ve learned is that when an employee has clearly “checked out” or is becoming a problem, move quickly to get rid of them. Firing someone is not fun— there’s no sugarcoating it. But the longer you wait, the more damage will be done. I have let employees drag things down for too long before finally letting them go. I won’t make this mistake again.

Company volunteer activities- like packing lunches for the Akron Snow Angels Mission- are great team building activities.

Hire people not just because they have the skills and abilities you are looking for, but also because they will fit into your culture. If you’re looking to expand your operation it likely means you’ve had some success already and that you have a small team in place who works well together. You don’t want to bring in new staff who will disrupt the positive “vibe” you have already established.

Specific technical skills can usually be taught, so long as the employee is a self-starter who is willing to take on new challenges and dedicate the time and effort to learn the skills. So as I mentioned previously, make sure a new hire has a strong desire to grow their career.

Another tip, or warning, is to be extremely careful when promoting from within. A great lawyer can’t always run the firm, a great surgeon can’t always run a hospital, and a great technician does not always mean a great manager.

That being said, I always try and promote someone from my team first before bringing in an outside employee. It can be difficult for new hires to come in and adapt to your company culture and immediately grasp how things are done. Your current staff are going to respond much better to someone who already “gets it” rather than someone who tries to do it “their way”.

In addition, be aware of specific technical skills that may be lacking in your hire and put a training plan in place right away to get them to where they need to be.

Finally, remember that people who are not self-starters likely will never be. They may do great in a position that requires them to do a specific task (like answering phones), but they are unlikely to excel at an expanded role that requires them to go above and beyond.

Each member of the PCR team has a clear vision of how we should interact with our customers, our staff, our vendors, and our community. Every employee shares and understands our core value which is “to make someone’s day better.” This is how we approach interaction with everyone we encounter.

Our staff values organization and team performance over the individual. We support one another, and everyone on our team is willing to help out a co-worker even if it isn’t “their job” to do so. We also provide staff training, and pay for any outside training program that an employee is willing to undertake on their own time to improve their skills.

Celebrating birthdays and work anniversaries with office parties and lunches are a great way to boost team morale.

As a business owner, it’s important to communicate what you are trying to accomplish with everyone on the team and then reward them for their outstanding efforts. At PCR, we offer a bonus program tied to our quarterly goals, and we keep team morale high by celebrating birthdays and work anniversaries with lunches and office parties.

We also have a rule that don’t work with any business, regardless of the size of the contract, that doesn’t respect our company values or our team members. Don’t let customers have a negative impact on your team.

The key to any successful business is its staff. If you are looking to bring on new employees do your homework and make sure they will fit into your company culture.

Consider all options when hiring. Staff is a huge expense. Be certain your need for staff isn’t temporary, and that you can’t pay current team members overtime or offer additional incentives instead of bringing in someone new. That being said, if you are expanding and know that you will need to bring in new employees it’s best to hire before you need them. It generally takes six to 12 months for new staff to be able to provide independent value.

Finally, pay the people that matter! If a staff member leaving will negatively impact the performances of your business do everything in your power not to let them leave. Pay them an amount they won’t find anywhere else!

Contact Us

Get in Touch with Us

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

PCR Welcomes Lucas Wright

We are happy to welcome Lucas Wright to the PCR Business Systems Team. Lucas brings with him IT experience as well as enthusiasm and we’re extremely excited to have him as part of our team.

Here are a few things about Lucas to help you get to know him better:

  • Lucas recently got married!
  • He and his wife adopted a pup a few years ago. It was around Halloween and they named him “Zero” after the ghost dog from Nightmare Before Christmas which was playing at the time
  • He grew up in Tallmadge where he went to high school and was a member of the robotics club and student senate
  • He obtained a Bachelor of Arts in Anthropology from the University of Akron before shifting gears and going into IT
  • He enjoys playing PC and tabletop games
  • He recently completed Google’s IT Support Professional Program and has plans in the works to obtain several more IT certifications

Questions for Lucas:

Q: What do you usually have for breakfast?
A: Big bowl of oats

Q: What is your middle name?
A: Walter

Q: Favorite sport to watch?
A: Overwatch League (esport) and the Browns

Q: Goal you have for yourself?
A: My recent goal has been achieved in getting hired here at PCR. Next I want to accomplish getting my A + certifications, and then start working on obtaining other CompTIA certifcations (Network + & Security+) to really expand my knowledge and skillset.

Q: Pets?
A: My pup named Zero. Two cats Lily and Calvin

Q: What is your hobby?
A: PC and tabletop gaming

Q: What is your favorite restaurant?
A: Saffron Patch. It’s an Indian restaurant in the Valley.

Q: What is your favorite drink?
A: French press coffee or really any IPA

Q: What’s your favorite travel destination? (been there or want to go)
A: Cruises anywhere.

Q: What characteristics do you admire (in self or others)?
A: Definitely a good sense of humor! And a genuine sincerity in the way they talk or listen to you.

In businesses since 2004, PCR is the trusted IT provider for Akron area businesses. Learn more at pcrbusiness.com.

3 Reasons Why You Should Outsource Your Cybersecurity

It’s no secret that cybercrime has been steadily getting worse as the years go by. Every day hackers become bolder and release cyberattacks that are increasingly more difficult to defend against. However, this growing threat has not gone unnoticed.

Laws and regulations have been introduced to force businesses to improve their cybersecurity measures for the purpose of protecting the personal information of average consumers. Given that regulations change from time to time to adapt to new challenges, maintaining constant compliance can be a difficult task. To make compliance easier, many organizations are turning to outsourced cybersecurity managed service providers.

The Benefits of an Outsourced Cybersecurity Solution 

Compliance sounds like an easy task on the surface—just follow the rules and you’re compliant, right? Unfortunately, that’s easier said than done. There are specific cybersecurity regulation requirements every organization must follow and they differ by industry. 

In some cases, certain businesses have to adhere to additional standards that normally apply to other industries. For example, when a law firm handles medical records, not only will it need to follow the general data protection protocols for its field, but also for the medical industry. However, the challenge isn’t just achieving compliance, it’s also maintaining it.  

This is why many businesses choose to invest in a managed security service provider (MSSP). An MSSP can provide a number of services to protect critical infrastructure and prevent data breaches. 

Here are some of the benefits you’ll see when you partner with a security provider:

Compliance

To achieve and maintain compliance, you need someone who understands the ins and outs of compliance. An MSSP can provide highly trained technicians who are well versed in network and security compliance. They’ll ensure your company always has the proper level of security for your particular industry. 

Superior Protection

Although there’s no such thing as perfect network security, an MSSP can help you get close. When you partner with a cybersecurity provider, they can test the security of your network, find vulnerabilities, and help you fix those issues. In addition, you’ll be able to take advantage of other services they may provide like secure email management and threat remediation.      

Cost-Effective

One of the biggest benefits of using an outsourced cybersecurity provider is that it can potentially save you money. For most small- to medium-sized businesses, hiring an entire IT department can be expensive and unrealistic. An MSSP can help lower those costs while giving you access to a full team of experts. 

PCR Business Systems Is Your All-In-One Cybersecurity Provider

At PCR Business Systems, we are dedicated to protecting your organization from cyberattacks and keeping you compliant under cybersecurity law. Our security solutions are specially designed to boost your network’s defenses so you can have peace of mind. Request a free quote with us today.

It’s Time to Have a Talk with your IT Company

The relationship between a business and IT team or IT person used to be so simple. Do you remember those old Saturday Night Live skits with Jimmy Fallon playing “Nick Burns: Your Company’s Computer Guy?” It was kind of like that, only with less sarcasm.

You would call up your IT Company when you had an issue with your server or a company computer, and someone would come over and fix it.

Today, things are much more complicated. Akron, OH IT Service providers are not only tasked with keeping your networks up and running, but they are also your first line of defense against cyberattacks. If they fail to adequately protect your network, or if their own system gets hacked into, your IT provider could destroy your business and everything you worked so hard for.

We meet with one or two companies every month whose business is on the brink of disaster because their IT company failed to properly secure their network or because they didn’t have a proper backup plan in place. Please, don’t let this happen to your business.

It’s OKAY to ask questions

It’s important to have an open dialogue with your in-house IT team or outsourced IT company to learn everything about what they are doing, and what they plan to do in regards to your company’s Information Technology.

Whether or not you outsource your IT or have an in-house team on staff, your IT provider is an extension of your business. You need to stay on top of what they are up to just as you would one of your employees. Often, business leaders will simply write a check and let the IT provider do “their job.”

10 questions to ask your IT Company

 

Please, have a conversation with your IT Company and ask specific questions about things like cybersecurity, backup plans, and network monitoring.

As we wrote in the article The Wild West of IT Services, there are no regulations governing IT Service Providers. It’s up to you to do your homework before hiring an IT person or team, and to continuing monitoring the work you are doing for you.

What Questions should you ask?

We have created a Cyber Security Risk Assessment that we encourage you to take. This questionnaire takes less than five minutes to complete and will give you an idea of how well your IT Service Provider is managing your network security and protecting your business against cyberattacks.

IN ADDITION, feel free to ask your IT Company any of the questions from this assessment. If there is a question you are unsure of, ASK your IT Provider for the answer. This is a great tool to help you get the conversation started.

 

Feel free to email me directly with any questions.

Pat Carroll

4 Reasons Penetration and Vulnerability Testing Is Important

In today’s world, cybersecurity threats have become more prevalent than ever. The growing number of cyber incidents like ransomware, DDoS attacks, and phishing scams have caused many organizations to rethink their threat management efforts. One way many companies are addressing threat risks and vulnerabilities is through penetration testing solutions.

 

Claim your free Pen Test here >>

Penetration and Network Vulnerability Testing and Its Role in Exposing Security Risks

Penetration and vulnerability tests are threat remediation tactics used to improve your network’s resistance to hackers. These procedures are meant to reveal any weaknesses in your system. Once these weaknesses are revealed they can be fixed, effectively boosting the strength of your network’s security. 

To understand why companies perform these tests, think of your network like a bank. Your network’s firewall acts as hired security guards and cameras. However, because you know there could be areas where you didn’t think to put a camera or have a guard patrol, you hire someone to try and find those blind spots. If that person discovers a way around your security, you can then adjust your security accordingly.

Penetration Tests vs Vulnerability Tests 

Although they’re often confused for one another, there is a difference between penetration testing and vulnerability scanning. Vulnerability testing is used to find vulnerabilities, like employees who can be tricked by social engineering tactics. Penetration tests, on the other hand, are used to find weaknesses in your system.

Who Should Perform Penetration Tests?

Penetration tests, also known as pen tests, work best when performed by someone with little to no knowledge of how your network is secured. Most companies will hire a contractor—often called an ethical hacker—or a penetration testing company to hack into their system. These hackers can range anywhere from experienced developers with advanced degrees to hackers who were self-taught. Some organizations will even have reformed criminal hackers lend their expertise.

Stages of a Pen Test

When performing a pen test, the process will typically go through five stages:

  • Planning and reconnaissance
  • Scanning
  • Gaining access
  • Maintaining access
  • Analysis

The first step involves identifying the target, deciding on the scale of the attack, and setting up testing methods to use. Once that’s done, the ethical hacker will gather information to use during the attack. The next step is to figure out how the target’s security reporting system reacts to different intrusion attempts. Step three and four are to gain access and maintain access. Finally, when the test is complete, security personnel can analyze the security assessment and fix any flaws.

Types of Pen Tests

There are five different types of pen tests:

  • White Box: In a white box test, the ethical hacker will be given some information on the company’s security beforehand.
  • Black Box: During a black box test, the hacker will attack the network without any data. This is also called a “blind” test.
  • Covert: This is a test where only a small number of people will be aware that a pen test is being performed. This is also known as a “double blind” test.
  • External: An external test will target the external assets of the company, like the company’s public website.
  • Internal: This pen test starts from inside the firewall and is an internal test.

What Happens After a Pen Test?

After a penetration test is complete, the ethical hacker will then share their findings with the security team. The security team can then use this information to implement updates to erase the flaws that were exposed and improve their security reporting software.

Protect Your Network with PCR Business Systems

Protecting your network from hackers, computer viruses, and other threats require a proactive approach. Don’t wait until it’s too late. PCR Business Systems offers comprehensive cybersecurity services to keep your computer system safe and secure. If you want the best in IT solutions, request a free quote for penetration and vulnerability testing with PCR Business Systems today.

Cyberattack Monitoring: What Is Your Internal IT Team Missing?

Cybersecurity is a never-ending game of cat and mouse. Cyberattacks evolve and threaten your network; in turn, cybersecurity measures adapt to detect and address those threats. At the rate cyberthreats evolve, it can be hard for your business to keep up. However, while it may be hard, it’s not impossible. The key to keeping your network protected is through 24/7 cyberattack monitoring.  

Why Does Your Business Need 24/7 Monitoring?

Companies like DoorDash and Canva have made headlines in recent cyberattack news. Both organizations suffered data breaches that weren’t detected until it was too late. As a result, millions of users were affected, putting their sensitive data at risk. If the DoorDash and Canva intrusions were detected sooner, there’s a good chance the number of affected users would have been much smaller.

These aren’t the only businesses that have fallen victim to threats like data breaches or ransomware attacks, and they won’t be the last. 24/7 monitoring can help in situations like these by alerting the network administrators of unusual activity. Constant network monitoring is a crucial aspect of a proper cybersecurity strategy. However, to understand its importance, you’ll need to know what the service is and what it can offer.

What Is 24/7 Monitoring?

The terms 24/7 monitoring, network monitoring, and continuous security monitoring all refer to a type of security solution that’s automated and used to monitor your network all day and night. The service works around the clock to preserve your infrastructure by constantly looking out for cyberthreats and vulnerabilities within your network. Businesses have increasingly relied on this solution as dependence on digital processes and operations has increased.

This automated solution can be implemented by your internal IT team or you could partner with an outsourced IT provider. However, many small- to medium-sized businesses may not have the time or manpower to devote to staffing a dedicated IT team that could administer such a system. With a managed services provider, they can become your dedicated IT team and take over this process for you. This convenience is highly beneficial for business owners.

How 24/7 Monitoring Works

Continuous monitoring works by providing real-time data on devices and users who attempt to access or work on the company network. What this means is all devices—whether it’s a computer, phone, or tablet—on the network can be monitored. This gives your organization the ability to know what’s happening inside your network at all times. So if malicious software manages to find its way into your system, the administrator will be alerted and they can take the appropriate approach to address the issue and implement the necessary security protocol.

What Does This Service Offer?

Network monitoring is something that can provide a broad range of services such as network debugging and vulnerability scanning. However, what’s included ultimately depends on the provider you work with. When you partner with PCR Business Systems, you can expect to receive services like these:

  • Software updates and network patch management
  • Backup monitoring and restore verification
  • System asset management
  • Software licensing management
  • Hardware monitoring
  • Bandwidth monitoring
  • Onsite and remote support services
  • Immediate alert system

The Benefits of Monitoring

Having a bird’s-eye view of the activity within your network isn’t the only benefit associated with 24/7 monitoring. It also allows your company to stay ahead of threats and minimize damage if your network does succumb to an attack. In addition, 24/7 monitoring can help keep you in compliance with your industry’s compliance standards.

Choose PCR Business Systems for Your Monitoring 

Cybersecurity is something you can’t take for granted, no matter what the size of your business is. Get the security solution you need with PCR Business Systems. We offer a range of managed IT services you can take advantage of, including 24/7 monitoring and support. Our experts will work with you to discuss your needs so we can tailor our services to fit perfectly with your business. We’ll monitor your network at all times so if anything happens, we’ll know about it. To learn more about how we can help you, contact us today!