IT Knowledge for UP Business Owners.
Plain-English guides on cybersecurity, managed IT, and technology for Upper Peninsula businesses. No jargon. No sales pitch. Just useful information from 20+ years in the field.
Start Here — Key Topics
The questions UP business owners ask most often.
In-Depth Reading
Most cyberattacks on small businesses go undetected for an average of 197 days. By the time you notice something is wrong, attackers may have been inside your systems for months. Knowing the warning signs can mean the difference between catching an intrusion early and discovering it after serious damage is done.
Warning Signs to Watch For
- Computers running slower than usual for no clear reason — this can indicate malware running in the background
- Unusual account activity — logins from unfamiliar locations or times, password reset emails you didn't request
- Unexpected software or programs you don't recognize installed on computers
- Antivirus or security tools that have been disabled — attackers often disable security software first
- Files that have been modified, renamed, or encrypted without explanation
- Unusual outbound network traffic, especially at odd hours
- Contacts reporting they received suspicious emails from your address
- Browser redirects to unexpected websites
What to Do If You Suspect a Breach
- Disconnect affected computers from the network immediately — do not turn them off
- Do not attempt to clean up the infection yourself — you may destroy evidence needed for recovery
- Call your IT provider or a cybersecurity professional immediately
- Document everything you noticed and when you noticed it
- Notify your cyber insurance provider if you have a policy
- Do not pay any ransom demands without professional guidance
If you're in the UP and suspect something is wrong with your systems, call GlobalTSS immediately at (906) 662-4481. We can assess the situation remotely or on-site same day.
HIPAA applies to a much wider range of businesses than most people realize. If your business handles protected health information (PHI) in any capacity — either as a covered entity or a business associate — you have legal compliance obligations.
Covered Entities (Directly Regulated by HIPAA)
- Healthcare providers — doctors, dentists, chiropractors, mental health practitioners, pharmacies
- Health plans and insurance companies
- Healthcare clearinghouses
Business Associates (Also Subject to HIPAA)
- IT companies and MSPs that have access to systems containing PHI
- Billing and coding services
- Medical transcription services
- Attorneys and accountants who access PHI in their work
- Cloud storage providers used by covered entities
- Shredding companies handling medical records
The Cost of Non-Compliance
HIPAA penalties range from $100 to $50,000 per violation, with annual caps up to $1.9 million per violation category. Willful neglect violations start at $10,000 per violation. More importantly, a breach destroys patient trust that took years to build.
Not sure if your business needs HIPAA compliance? Call GlobalTSS for a free assessment — we'll tell you exactly where you stand and what, if anything, you need to do.
The most common assumption about managed IT is that it's expensive and break-fix is cheap. In practice, the opposite is usually true once you add up all the real costs of unmanaged technology.
The Real Cost of Break-Fix IT
- Emergency IT service calls average $150-$300/hour with no predictability
- Downtime costs small businesses an average of $427 per minute according to industry data
- Ransomware recovery for a small business averages $200,000+ including downtime, recovery, and reputation damage
- Staff productivity lost to slow computers, repeated issues, and waiting for IT help is rarely counted but always real
- Compliance violations from unmanaged security can result in fines that dwarf any IT investment
What Managed IT Actually Costs
GlobalTSS managed IT starts at $115/user/month. For a 10-person business that's $1,150/month — predictable, budgetable, and covering monitoring, helpdesk, security, backups, and Microsoft 365. Compare that to one ransomware incident or a week of downtime and the math becomes obvious.
The Right Question
The question isn't "can I afford managed IT?" — it's "can I afford what happens without it?" For most UP businesses, one serious IT incident costs more than a full year of managed services.
Ransomware is malicious software that encrypts your files and demands payment for the decryption key. Attacks on small and mid-sized businesses have increased dramatically — small businesses are now the primary target because they typically have less security than large enterprises but still have valuable data.
How Ransomware Gets In
- Phishing emails — the #1 delivery method. An employee clicks a link or opens an attachment that looks legitimate
- Compromised remote desktop (RDP) — attackers brute-force RDP credentials, a common attack vector for remote workers
- Software vulnerabilities — unpatched systems have known vulnerabilities attackers actively exploit
- Malicious websites and drive-by downloads
- Compromised credentials from data breaches on other sites
How to Protect Your Business
- Maintain tested, offline backups — this is your single most important protection. If backups work, ransomware becomes an inconvenience instead of a catastrophe
- Deploy endpoint detection and response (EDR) — modern security tools detect ransomware behavior before it can encrypt files
- Train staff on phishing recognition — most attacks start with human error
- Keep all software patched and updated
- Implement multi-factor authentication on all accounts
- Segment your network so an infected device can't spread to everything
GlobalTSS implements all of these protections for managed IT clients as part of the standard service. If you're concerned about ransomware vulnerability, start with a free assessment.
Cyber insurance has become increasingly strict in recent years. Insurers are denying claims — and canceling policies — when businesses can't demonstrate they had the required security controls in place at the time of an incident. Knowing what's required before you need to file a claim is essential.
Common Requirements Insurers Now Mandate
- Multi-factor authentication (MFA) on all email accounts, remote access, and privileged accounts
- Endpoint detection and response (EDR) on all devices
- Tested backups — not just backups, but documented proof they've been tested and work
- Patch management — documented process for applying security updates promptly
- Written information security policy
- Employee security awareness training
- Privileged access management — limiting who has admin rights
- Incident response plan
The Claim Denial Problem
Many businesses discover their policy has exclusions or their claim is denied after an incident because they couldn't document compliance with the requirements they agreed to at policy issuance. This is entirely preventable with proper IT management.
GlobalTSS can audit your current security posture against your policy requirements and provide the documentation your insurer needs. Start with a free assessment to see where you stand.
1. You Don't Know Who Your IT Person Is
If your answer to "who handles your IT?" is a family member, a friend who knows computers, or whoever is cheapest on Craigslist — you don't have IT support, you have ad-hoc problem solving. That works until it doesn't, and when it doesn't, it's usually catastrophic.
2. You're Paying for Emergencies
If most of your IT spending happens after something breaks, you're paying a premium for reactive work instead of investing in prevention. Every emergency call has a hidden cost beyond the invoice — the downtime, the lost productivity, the stress.
3. Your Staff Complains About Technology
If "the computers are slow" or "this software never works" are regular complaints, you're losing productivity every day. Good IT isn't invisible — it's just not complained about.
4. You're Not Sure About Your Backups
If you can't answer "when were your backups last tested?" with a specific date, you probably don't have working backups. Untested backups are not backups — they're false confidence.
5. A Compliance Requirement Is Coming
If you're adding a healthcare client, bidding on a federal contract, going through cyber insurance renewal, or facing any compliance requirement — you need managed IT that can document and maintain your security posture. Doing this last-minute is expensive and stressful.
If any of these sound familiar, a free IT assessment from GlobalTSS is the right next step. No pressure — just an honest look at where you stand.
Have Questions? Let's Talk.
Free IT assessment for UP businesses. I'll answer your questions and tell you exactly where you stand.