The Importance of Data Backup and Recovery

Affordable Housing

RealAmerica LLC started as an apartment developer. Through the years they have expanded into several areas in the real estate business across Indianapolis. With more than 20 years of developing and managing properties, they have become an authority in creating neighborhoods. Affordable housing was the root base of this organization. Presently, they offer market rate apartments, self-storage, business offices spaces, retail and mixed-use properties. These are part of RealAmerica’s high quality achievements.

Through time and extensive experience in real estate, the key staff of RealAmerica offers full service property management and compliance monitoring. Through utilizing the tremendous strengths of their highly trained staff, all properties operate to their highest possible potential. A one stop shop for real estate requirements. They offer estate lending, development, design and construction. Most noteworthy is their track record in seeing project through completion. Giving high quality finish product and on point budget.

The Bad and Good Side

In late 2018, one of RealAmerica property  suffered a severe property damage when a fire broke out on Easter Sunday.  A massive amount of contracts, records and important documents were compromised. LEAP Managed IT, being their IT Solutions partner, was able to recover and keep all data safe. Because of the unfortunate accident, RealAmerica had to move out and set up in a new location. LEAP Managed IT was there to make sure that IT system is back on track. Having a well set up and strong IT foundation is an advantage for any firm. Most especially when accidents, such as fire or natural calamity. Loss of data is prevented hence there was no downtime recorded which usually disrupts the flow of business.

Data Back Up and Recovery

In running a firm or organization, each and everyone have his or her own role towards success. The atmosphere is usually busy and grinding. Imagine when all of a sudden, something comes up. Server crashing and workstations are failing unexpectedly. LEAP Managed IT specializes in IT Support above all keeping data safe and recovering them when needed. Data Back up and Recovery can be fragile, therefore let Leap handle this to maximize uptime and your firms potential. For more about Data Back up and Recovery, visit today!


Carmel Pediatric Dentistry

Carmel Pediatric Dentistry: The First Visit

As a kid, do you remember, not wanting to visit the dentist? This usually happens when the “first visit” turns out disastrous! It takes years to overcome. Carmel Pediatric Dentistry makes going to the dentist easy and fun. This month, LEAP Managed IT is proud to highlight their partner, Carmel Pediatric Dentistry.

Dr. Katie and the team provide a fun, supportive, non-threatening and caring environment.  Most importantly, it allows kids to develop a positive and healthy outlook on dentistry and oral health.

Carmel Pediatric Dentistry is a pediatric-focused dental team. They see patients from toddlers to college age kids. Their state of the art facility is warm and welcoming.  While providing knowledgeable and experienced care.

How they do it?

From the moment you visit their website, your mind is at easy.  You virtually meet the team, visit the office and can schedule the appointment.

When it’s time for the appointment, you are wowed by the office and friendly environment.  Greeted by smiles and a team that wants the kids to feel at ease.  If your child is a toddler or college aged, they help them understand the importance of good oral care.

With a well-trained team, they can take care of complex oral issues, cavities and preventative care.  You feel confident sitting in the waiting area as your child completes their visit.

At the end, everyone is all smiles!

The Tech Stuff!

LEAP Managed IT handles the behind the scenes Tech Stuff.  We partner to provide the necessary support to keep the practice running efficiently. We understand the importance of HIPPA compliance, digital imaging & charting. Along with data back-up, virus and anti-malware protection.   We  share our expertise of dental software, including Dentirx and EagleSoft just to name a few.

Find out more details and the advantages of Dental IT Solutions and Support from LEAP, visit

Check IT  Out

Learn more about our partnership. Click HERE to view our video.

How to have a Productive Brainstorming

From Different Perspective

Need an idea? Can’t come up with one on your own? Successful brainstorming sessions can be a great way to bring many different perspectives and ideas together to come up with one great idea. However, not all brainstorming sessions are productive, right? We have all been there. Many brainstorming sessions end with off-topic conversations, wasted time and no solution to the problem. However, they don’t all have to be that way.

How do you have a successful brainstorming session?

Step 1. Establish the Goal

What is the goal of the brainstorming session? Write down the goal and make sure everyone understands the goal, and any background information about the problem, before attending the meeting. Often, people assume the goal is understood by everyone but that is not always the case. An unclear goal can lead to ineffective, off-topic discussions. It is important to keep everyone focused on the purpose of the meeting. This also gives everyone the opportunity to come to the meeting with ideas already in mind.

Step 2. Pick a comfortable space for the meeting

It is hard for people to be creative in a normal boring environment. Have your meeting in a place that is different than your normal workplace. Make sure it is in a place where your attendees can be comfortable and collaborate with each other.

Step 3. Gather a team

When deciding who you want to attend your brainstorming session, keep in mind you are looking for differing opinions. Invite people with different perspectives. If possible, you should have representations from different genders and races. You should also have people who know a lot about your problem and people who can give you an outside perspective. However, you should not have more than seven people in your meeting. The more ideas, the better; however, it is easy to get off topic with a large group.

Step 4. Establish a leader

You need to have someone to keep everyone on track. They should write down ideas on a white board and draw people back to focus if the topic of the conversation strays away from the problem.

Step 5. Simplify or break down the problem

Sometimes staring at the whole problem can be overwhelming. Where do you start? Try simplifying or breaking down the problem into smaller categories. For example, if you are brainstorming ideas for a new company tagline that portrays your company’s values, use those values as categories: service, trust and honesty. This will give you specific topics in which you can target your imagination.

Step 6. Allow people to write down ideas

How many times have you forgotten an idea because others were talking at the time? Before brainstorming together, allow time for everyone to write down their initial ideas, then bring your ideas together. This will also allow people to write down any new ideas that they think of during the brainstorm.

Step 7. Share your ideas and brainstorm – leave criticism at the door

No idea is a bad idea. Leave your emotions and criticism at the door. It is important that people within your brainstorming session feel comfortable to express their ideas and opinions. When peoples’ ideas are criticized, it limits their confidence and their creativity. Many “bad ideas” can lead to something extraordinary, they may just need nurtured.

Step 8. When you find an idea that you like, expand on it

You found an idea that everyone loves. That is great. But, how can it be improved? Can ideas be combined? What problems do you see with the idea? Be analytical. Sometimes ideas have holes that you don’t recognize at first glance. Nurture the idea into its best form.

Step 9. Move to the other categories

If you split up your problem into multiple categories, be sure to return to those categories when you run out of ideas for one category. This will give you a direction for new ideas and inspiration.

Step 10. Repeat the process and pick out your favorite ideas

When you finish your brainstorm, pick out your favorite ideas. Make sure you understand the pros and cons of each idea. Even if you are not completely satisfied with your ideas, set them aside and take a break. End the meeting and step away from the process.

Step 11. Come back to your ideas

After a day or two, come back to your ideas with a fresh perspective. Are they still as great as you thought they were? Are they better than you thought they were? Nurture the ideas while your brain is fresh. If needed, schedule another brainstorming session.


What is IT or Information Technology?

Your Beginners Guide to Understanding IT

More than likely, you probably know more about IT than you realize. Our everyday life is integrated with it as it makes everything easier. The phone in your hand, the computer you use at work, the internet connection is all part of IT  In other words, it allows you to read this blog through a connection. However, what does the term “IT” or Information Technology actually mean?

Information technology refers to the application of digital technology, like the internet and computers, to solve problems, by storing and processing data. In other words, IT is a combination of all pieces of technology, including the hardware, software, operating systems, databases, data storage, internet and servers, which allow technological devices to function together to solve problems.

IT normally refers to the technology at a broader scale, such as in businesses and organizations. Use to solve business problems, make communication easier and ensure efficiently within the workplace.

Why is managing your IT important?

You did your research, bought everything you needed and set up your technology. That is good enough, right? It works and functions. It is doing great until it isn’t anymore. Technology can be complicated. If not managed properly, it can slow down, cause problems or crash completely. It is important to manage your IT, keep everything up-to-date and ensure that everything is secure.

If not managed correctly, your business could risk:

Data Overload: Not having enough processing power or software to process the huge amounts of data you need can lead to technology problems.

Data Breaches: It is important to keep your information secure and safe from outsiders who may want to use the information against you or your business.

– Lost Data: Managing your data and making sure everything is backed up is very important. Have a back up plan in case of unfortunate events occur.

– Down Time: When your server crashes or your technology runs slow, it takes time away from work. Not managing your IT can lead to problems which can decrease efficiency and productivity.

There are many more issues that can arise by improper management of IT By managing your IT, you can ensure your technology works for you and not against you. You can keep your business moving effectively.

What career options involve Information Technology?

I am sure you have heard the phrase, “I am going to ask my IT guy.” Actually IT involves a broad variety of careers in technology innovation. In addition, there are three main categories in which careers can be broken down into:

– Network Engineers – These professionals ensure computers and other technological devices work with each other

– Hardware Technicians – These professionals create, replace and repair components

– Desktop Support Personal

More specifically, some examples of Information Technology careers are: Database administrators, Web Developers, Mobile Application Developers, IT Help Desk Technicians, IT Security Specialists, IT Managers, Computer Programmers, Data Scientists, User Interface Developer and Computer Hardware Engineers.

Want to learn more about Information Technology schedule a time to visit us at

RealAmerica Up Close

Leap Highlights RealAmerica

LEAP Managed IT is proud to highlight one of its partners in progress, RealAmerica. An authority when it comes to Housing and Community Development.

Having more than 20 years experience in developing and managing properties, RealAmerica has become a WBE-certified company. They have grown to encompass so much more. In 1995, RealAmerica was created for the purpose of developing and constructing apartment housing with Low-Income Housing Tax Credits. Through experience, they expanded to other real estate development. It includes market rate apartments, business office and mixed-use developments as high quality opportunities have arisen. With properties located throughout Indianapolis and all over the state of Indiana, providing superb quality living at its finest.

About RealAmerica

The developments are located in markets and communities where residents want to live and work. They select the sites carefully. Incorporating the best features of the neighborhood to community services, transportation availability and employment opportunities. Committed to offering the highest quality rental housing for individuals, families and seniors. Those who actively seek to live in areas with good retail and schools too. Serving the needs of these target markets and larger communities. While offering the most competitive rental rates.

RealAmerica also provides consulting, development, design, construction and managed services. It is for both profit and non-profit entities who wish to offer quality housing and buildings for their clients. Their staff has extensive experience ranging from zoning to site selection, to design and construction.

Hand in Hand to Progress

Together with LEAP Managed IT, RealAmerica strives and is committed to operate at their highest possible potential. Therefore, giving its clientele the best through their projects, customer service and top of the line housing choices. As RealAmerica’s partner, LEAP Managed IT continue to give IT Support and backup to ensure operations from from all locations run smoothly. For more on IT Support Indianapolis, visit


Tech Support Indianapolis Update: Net Neutrality Explained

Tech Support Indianapolis Update: What is Net Neutrality?

In this Tech Support Indianapolis Update we delve into Net Neutrality and how it will impact Indiana business.  Before, during, and after the repeal of Net Neutrality in December of 2017, angry citizens wrote to their public officials demanding that Net Neutrality stay in place. Immediately following the vote which decided that the FCC would repeal Net Neutrality, Washington and New York Attorney Generals announced their intent to sue the FCC. So, what is Net Neutrality? And as a CEO whose time is invaluable, why should you care about it?  Will it really limit productivity of greater Indianapolis businesses and strain the IT support services that your company relies on?

Net Neutrality is the enforced idea that the internet is a “public utility.” Treating the internet as a public utility (like water or electricity) means that its access is not limited or restricted in any way; regardless of source, content, or bias, any user can access any data the same as any other user. The loss of Net Neutrality removes limits imposed on Internet Service Providers, allowing them the right to provide any type of service they see fit.

Tech Support Indianapolis Update:  First Amendment issue of our time

Senator Richard Blumenthal refers to the Net Neutrality debate as the “First Amendment issue of our time.” As a free and open public forum, any individual has the ability to publish any information they like on the Internet, and any other individual is free to access it. This unrestricted free-flow of information is what we are accustomed to on the Internet. Many fear that without Net Neutrality, the internet will resemble Cable TV with several large companies controlling the online space.

Detractors of Net Neutrality claim that it’s an imposition of rules and regulations where they’re not necessary. Instead, they argue that regulations like Net Neutrality slow and even halt innovation. The logic behind this line of thinking is that Internet Service Providers must be incentivized to invest in and improve the Internet. By allowing ISPs to charge more for “premium service,” for example, ISPs are encouraged to invest more in their infrastructure, leading to better and faster service.

Tech Support Indianapolis:  CEO Perspective

As a CEO, the Internet is one of your most powerful tech tools for growing and conducting your business. Net Neutrality guarantees that the information you publish online is free of censorship and reachable by any individual; in short, Net Neutrality allows you unfiltered communication with your target audience.

The repeal of Net Neutrality muddies the online waters. It puts an authority between you and your customer. For example, if an Internet Service Provider decides that your message is inconsistent with the service it wishes to provide, that ISP can act as a gatekeeper, making your website or communications inaccessible for the people that use its service.

Now, in early 2018, we find ourselves in the middle of a heated debate and an unsettled online environment. Net Neutrality was repealed, but those in favor of it are not giving up easily. Lawsuits are being filed against the FCC for wrongfully repealing Net Neutrality. Bills are being proposed to preserve the Internet as it is. And citizens continue to speak out against those that wish to change the landscape of the Internet.

As a CEO, you are more affected by the Net Neutrality issue than most. Will you join the fight?

Questions or comments?  Reach out to us at your Indianapolis Tech Support Center.

Make sure to check out some of our other CEO Tech Briefs.  See what you can learn from the US Navy when it comes to cyber security.

CEO Tech Update
CEO Tech Brief by Michael Thomas

Indianapolis Tech Support: Netflix Themed Phishing Attack

In this Indianapolis Tech Support Update we’ll delve into the latest phishing attack and the risk it poses to Indiana businesses.  Since nearly 50 million households in the U.S. subscribe to Netflix, the Indianapolis Tech Support Update calculates that the attack has the potential to impact over one million Hoosiers.  The Grand Rapids, Michigan Police Department recently uncovered this Netflix phishing attack which tricks recipients into thinking their accounts have been deactivated or suspended.  Individuals who click on the email are at risk of having their personal information stolen along with compromising their computer and network.

Indianapolis Tech Support
Indianapolis Tech Support Update

How your employee’s penchant for ‘Friends’ can impact your business

The confluence of work and personal communications is hard for a company to avoid.  Face it, employees are busy and need constant access to important updates of happenings outside of their work life.  Receiving continual updates bombard their inbox:

  • soccer practice update from Team Snap
  • birthday reminder for that almost forgotten high school buddy compliments of Facebook
  • a heads up from Netflix that season 4 of ‘Friends’ is about to be removed from the line-up

Besides a productivity drain this can’t cause a big issue for a company, right?  Remember the people behind the phishing attacks like the Netflix example are not selective.  They will gladly steal your employee’s identify and if performed on a computer attached to your network, they will be more than happy to try to compromise your technology.  A hacker just needs a way in and this phishing attack might open the front door they need.

Must Do’s from the Indianapolis Tech Support Center

We can’t stress enough that nothing will make your network 100% safe from attack.  You can with some simple steps, significantly reduce your risk.  Here’s what the cyber-security experts at our Indianapolis Tech Support center recommend:

  1. Develop a clear policy for how company owned devices can be used – Can employees use company computers &  email for personal use?  If so, what are the guide posts?
  2. Deploy Multi Layered Protection – Firewall and antivirus are not enough.  If your company is not deploying true multi layered protection you are at risk and trying to fend off sophisticated attackers with 10 year old technology.
  3. Train and Test – Don’t assume your employees know what to click on.  Train them and then test them on a monthly basis.  We conduct regular testing for our clients and see nearly 50% of all employees fail on initial testing.  It takes practice to get good!

How to stay ahead

This Netflix phishing attack is just the latest in what will be many more attempts to get your company’s data.  The technology the bad guys are using is changing fast and companies have to keep up to stay protected.  Leading Indiana companies know that outsourcing IT support is one of the best investments for keeping an organization safe.

Reach out the Leap Managed IT Indianapolis Tech Support team to get more information.


PIVOT 2017 Speaker Spotlight: Lindsey Erdody

Pivot 2017, the upcoming conference that will bring entrepreneurs, business professionals, and community leaders together to network and share ideas, will address the topic of “changing lanes” by driving personal and organizational progress. Lindsey Erdody, who worked at two daily newspapers before becoming a business reporter for the Indianapolis Business Journal, is no stranger to changing lanes.

Attendees of Pivot 2017 will be treated to an experienced and articulate panel of individuals that will discuss various topics. Lindsey Erdody is tasked with moderation of one of the Pivot panel discussions. Erdody was first a business minor at Indiana University, then began her career in journalism, and now specializes in reporting on business. When asked about her decision to minor in business at IU, Erdody explained, “I wasn’t really thinking I would become a business reporter. I chose a business minor mostly so I could have a bit of a back-up plan should the journalism industry become too difficult to get a job in.”

Reflecting on the evolution of her career path, specifically the change from writing for daily newspapers, Erdody said, “I decided to make the switch because the job made sense for me, and the IBJ is a well-respected publication. Business reporting touches on so many issues that it still has a lot of variety in terms of the stories I write, and I love that.”

Clearly, Lindsey Erdody’s background makes her well-qualified to speak on the topic of dealing with and embracing change. Lindsey explained that “changing lanes” in terms of personal and organizational change “means taking a different approach or looking at a situation or problem in a new way. Change is never easy, but you need to have an open mind and be willing to change lanes every now and then.”

How will Linsey bring her wisdom to the table at Pivot 2017. What exactly is her role? Lindsey said, “I’m excited to lead a discussion and hear about how other people change direction and what they’re experiences are like.” She added, “My job as the moderator is just to keep the conversation going. I’ll have some questions ready to go, but I hope the panelists kind of take over and have a lively discussion. I’m just there in the background, but will step in when needed.”

Although Lindsey sees herself as being in the background at Pivot 2017, she has historically been at home on the front lines as a reporter. Erdody estimates that she has reported on thousands of stories. Out of all those stories, Lindsey spoke about three when asked about her favorites. She said, “I wrote about the city of Westfield quietly purchasing the indoor soccer complex at Grand Park and the city of Carmel paying for a New York public relations consultant, who spends most of his time pitching the mayor to major news outlets. But it was also a lot of fun to follow Fishers Mayor Scott Fadness around for a day and track the number of diet cokes he drank.”

As a seasoned reporter, Lindsey has conducted countless interviews. But if she could interview any person in the world, who would it be? “I think I would probably choose another journalist just to hear about their experiences, but I’m not sure there’s one in particular that I could single out. Obviously, there are a lot of famous people who would be fun to talk to, but it’s also really interesting to talk to people who aren’t well known. You never know who might have a fascinating story to tell.”
Pivot 2017 is quickly approaching, and there’s a great deal of excitement surrounding the event. Lindsey anticipates that Pivot 2017 has the potential to be life-changing, and says, “I hope people will leave inspired and with new ideas for how they can make changes in their lives, whether that be personally or professionally. It’s always interesting to hear stories from other community leaders, and you never know what might spark an idea in someone else.”

Visit the Pivot 2017 website for more information.

4 Easy Steps To Setting Up Your BYOD Policy

Let’s start with the basics. BYOD stands for “bring your device”, meaning that you are going to bring your phone, laptop or tablet that you privately own to work.

Your employees have the laptops and phones they own for a reason. They have deliberately selected these items over the many options available today and invested their hard earned money for these particular phones and laptops. Of course, this makes them even more efficient in doing their work on these devices. Overall for you and your company, this added comfort for them can mean more productivity and happier employees.

A huge benefit to companies that allow employees to use their own devices is that they can shift the costs to the employee (and many of which are happy to do so). In some cases, the employer provides a small monthly reimbursement to cover part of the monthly service fee, and the employee provides the phone and covers the remainder of the service charge. This could save the company roughly $50-80 per user, giving the company a healthier bottom line.

But BYOD has a downside. There are serious issues to consider with implementing BYOD. Your business could lose most of the control over the IT hardware and how it is used. Company’s need to create and follow an acceptable use policy, which is approved by your company’s IT department.

Here are four easy steps to setting up your BYOD policy.

Specify What Devices Are Permitted

With the many choices of devices your employees can choose from, it’s important to decide exactly what you mean by BYOD. From iOS-based phones and IPads, to all the Microsoft and Android handhelds, you may need to determine what is acceptable and what is not. Make it clear to employees who are interested in BYOD which devices you will support in addition to whatever corporate-issued devices you continue to hand out.

Establish One Security Policy for all Devices

If your employees need or want to use their devices with your systems and apps, then they will also need a complex password. One password for their lock screens is good, but passwords to enter vital systems and programs from their phone is necessary as well. You need a strong, lengthy, complex password, (internal link to password blog) not just simple four-digit pin codes. Other more complex security systems can be used as an overlay security program that is much more capable of providing robust security protection. However, with this comes significant cost considerations and an IT provider that provide it.

Decide What Apps Will Be Allowed or Banned

This applies to any device that will connect to your environment, whether corporate or their personal devices. Primary considerations typically include applications for social media browsing, replacement email applications, and VPNs or other remote-access software. The question here is whether users can download, install and use application that presents security or legal risk on devices that have free access to your company’s documents. These are serious questions to address in your BYOD policy.

Set Up an Employee Exit Strategy

One thing that companies always forget about is what happens to with these devices after an employee leaves the company or BYOD program. How will you enforce the removal of e-mail access, data and other proprietary applications and documents? Having an exit checklist that involves items like performing a clean wipe of the BYOD-enabled device, with a clear strategy for backing up the user’s personal information and documents is a good first step.

Developing a BYOD policy can seem complicated and daunting, but BYOD’s inherent savings and employee productivity quickly pays for itself. Setting up a system so users know what the rules are making life easier on everybody. The convenience of BYOD is undeniable, and with a little work up front, it can make your company a more effective and happier workplace all while adding a little extra to your bottom-line.



















LEAP Managed IT Welcomes Lisa Shanks

We are excited to welcome Lisa Shanks, LEAP’s newest Technology Advisor to the team. Lisa is responsible for consulting clients on copying & amp; printing equipment and software, and serving as a liaison. She also will be coordinate between our customers and our technical teams, keeping our partners up to date with the latest technology advancements and innovations.

“I am so excited for the opportunity to work for such a highly respected technology company with a reputation for honesty and integrity,” says Lisa.

Lisa has a B.A. in public relations and industrial psychology from Purdue University. Before joining the team at LEAP Managed IT, Lisa worked in the copier industry for 29 years at HPS Office Systems. When asked what her most three indispensable skills are, Lisa says, “Listening to what others say, and more importantly, what they don’t say, appreciation of diversity in life, and a good sense of humor!”

When Lisa is not at work, you can find her laughing as much as she can, making sure her parents are comfortable, snuggling with her dog Sammie, and watching reruns of Judge Judy.

Welcome to the team, Lisa! We are excited to have you!

What it takes to be a great leader in the tech world

“Great things in business are never done by one person. They’re done by a team of people.”

Steve Jobs

Being an exceptional leader is about more than getting the job done. You’ve got to balance your team’s needs with your goals and objectives. When money is tight, and stress levels are high, it’s easy to let those emotions get to you, and therefore your team.

What it means to be a tech leader today is different from what it meant even 2 or 3 years ago. Leaders in today’s tech world need to understand that no one person can do it all. Leaders need to surround themselves with the best team possible. How they manage those people are the keys to success in any business, but especially the tech world.  

Today’s Challenges

In today’s tech world the rate and pace of change are astounding. Keeping up with it can seem like a full-time job in of itself. The complexity of systems, processes and applications one must know can seem daunting. As with most businesses, there are ongoing pressures to stay within budget yet continue to achieve more results.

Other challenges include cyber security, privacy-related problems, and continued regulation changes. All of these issues and more make being a leader in the tech field inevitably stressful.

Mastering the art of leadership takes time, dedication, and a willingness to try and fail. While there are different leadership styles, the best leaders share some common traits.

They Deliver

To be a solid leader, you need to deliver on what you say you are going to do. Consistency is a huge factor in gaining the trust of your employee’s. This is particularly the case in the ever-changing tech world. Setting expectations and sticking to those will go a long way to being a respected leader in your field.

Being Self-Aware

Having the maturity and emotional intelligence to know your strengths and weaknesses allows for a better relationship with your team. You will be able to recognize and interpret what is going on with them. You will be able to manage how you react to them, and work better together.

Create a culture of education

With such a stressful and busy schedule it can be hard to devote time to learning. However, your professional development and growth are vital to your continued success. It’s one of the only ways you can be sure to be the leader your team needs. Whether it’s technical skills or business skills, you want to set an example and create a culture of education.

Collaboration and Delegation

There is no possible way you can do everything yourself. For that matter, there is no way you can even know how to do all the tasks that need to be completed. All tech leaders need to surround themselves with people who complement their strengths and weaknesses. Being able to collaborate with the people on your team and delegate tasks, not only gives you more time to concentrate on what matters, but it also makes your team stronger.

They know it’s ok to fail

A workplace environment where employees are encouraged to take chances and are safe to fail gives workers the confidence to try new things and grow. Furthermore, knowing that there are positives in every one of those so-called failures helps you take that leap of growth. The tech industry is based on principles of innovation and learning, a team that can learn and work together will respect the leader who has created that culture.


For more information about the latest technology trends and information, subscribe to our blog by filling out the form at the bottom of the page.


Staying Safe In The Cloud

The Cloud uses the internet to provide immediate access to various computing resources, which include applications, e-mail, communication, content sharing, and electronic transactions. The cloud can provide these services that you can access remotely, or via the internet through your web browser. Offsite, secure third-party data centers manage all of your cloud data. This storage means you can access all of your data at your convenience.

To put this another way, have you ever laid around and looked at the clouds? You may see one cloud become an elephant while your friend looks at the same cloud, and see’s a giraffe. The cloud is all about perspective. To one person it may be where they store all their pictures or tax documents. To someone else, it’s how they operate their entire business, with the cloud the possibilities are endless.

“I don’t need a hard disk in my computer if I can get to the server faster…

carrying around these non-connected computers is Byzantine by

comparison.” – Steve Jobs (1997)


Cloud Legal Issues


  • Trans-border Data Flow

Data is crossing state and international borders constantly. This action becomes important because it becomes foggy to whom owns this data. Does the person who sent the data own it or the person receiving the data? We usually assume the sender, but that assumption a lot of times can be wrong.  If legal issues come up, where do those court proceedings take place and who is found at fault?

  • Legal Rights

Who and under what circumstances can someone gain access to the data in the cloud? Users believe it’s theirs, and they are protected, but that’s not always true. Under most circumstances, you will need to go back and read your user agreement to find out. But, in the event of authorities having a subpoena you still have to hand over your data.


5 Tips to Stay Secure


  • Avoid Storing Sensitive Data

If all possible, avoid storing your sensitive information on the cloud. If you have a choice, you should opt for keeping your crucial information away from the virtual world or use appropriate solutions. Things like personal health information, tax records, and personal billing information are items to think of storing elsewhere.

  • Read the User Agreements

If you are not sure what cloud storage to choose or have questions about your current cloud storage, reading the user agreement will benefit you greatly. It will be long and tedious, but the document will have the essential information you need to know.

  • Be serious about your Passwords

One of the best ways to secure yourself is to have a strong password. Following password best practices like creating unique passwords that use a combination of words, numbers, symbols, and both upper and lower-case letters is a great first step. Secondly, please don’t use easily guessed passwords such as “password” or “user.”

  • Encrypt

Encryption is one of the best ways you can protect your data. When you create that spreadsheet, before moving it to the cloud, make sure you protect it. One way of doing that is by putting it into a password protected zip file. That way, no one is ever able to see the content of the file without knowing the password. Here at Leap, we like to use B1 Free Archiver to encrypt our zip files.

  • Use Encrypted Cloud Services

Using an encrypted cloud service like Sharesync lets you rest easy knowing your files are safe. Your data is encrypted at rest and in-transit, with an additional account-specific unique security key. Content protection features a guard against accidental deletion or version conflict, and permissions and access are also strictly controlled. To learn more about ShareSync read our blog on it HERE.

It’s not often that we choose to send a bunch of photos by email, and you probably don’t remember the last USB drive you used. The cloud has become an integral part of doing business and personal life. More often than not, it’s a place where you are storing data permanently. Following best practices to make sure you are staying safe in the cloud is more than common sense, it’s a necessity.