Our IT Resources Library
Cloud File Storage Solutions Breakdown
There are many cloud file storage solutions out there. How do you choose the right one? Check out our breakdown!...
SharePoint Online Resources To Get Started
SharePoint Online does not have to be difficult! Checkout our resources to get started and maintain easy SharePoint Online sites.
Our Favorite Outlook Tips
Many of us spend lots of our day in Outlook, so any tips to make us more efficient are treasured....
Top Tech Gifts Guide for 2020
Here at BEI, we polled our staff and as you can imagine, a group of techies have a large and...
Getting the Most from Your CRM – Video
In this Webinar, Kristen McGarr of Adroit Insights shares with you the 3 most important things to know about selecting...
December 2020 Newsletter
BEI’s October newsletter focuses on Cybersecurity Month with a real-life example, the announcement of BEI’s BPtW award, choosing between Break-Fix...
The Next Chapter at BEI
We have exciting news to share with you! John and Katherine Deming have acquired a majority ownership of BEI.
Season for Scammers
Online scams are everywhere these days. BEI offers tips to stay safe during the pandemic, holiday season, and the elections.
Adopting a Cybersecurity Culture – Video
Jonathan Krasner, Director of Business Development, Breach Secure Now! gives an exciting presentation about human security and adopting a cybersecurity...
November 2020 Newsletter
BEI’s October newsletter focuses on Cybersecurity Month with a real-life example, the announcement of BEI’s BPtW award, choosing between Break-Fix...
Clear Processes Yield Efficient Projects
According to Microsoft, Multi-factor Authentication (MFA) can block over 99.9% of cyber attacks that aim to compromise an account. These...
Multi-factor Authentication – A Must Do!
According to Microsoft, Multi-factor Authentication (MFA) can block over 99.9% of cyber attacks that aim to compromise an account. These...
Lunchtime Webinars
BEI runs monthly lunchtime webinars that typically last 20-30 minutes. They cover topics of general interest and are not overly...
October 2020 Newsletter
BEI’s October newsletter focuses on Cybersecurity Month with a real-life example, the announcement of BEI’s BPtW award, choosing between Break-Fix...
IT Boundaries & CMMC Compliance
As organizations work on preparing for eventual CMMC certification, one of the critical factors that must be addressed at the...
Fundamentals of Cyber Insurance – Video
Andrew Beardall, Senior Partner/General Counsel, The Capital Group gives an overview of the risks and considerations involved with selecting a Cybersecurity...
IT Support – Break-Fix or Managed Services?
BEI knows that deciding which type of IT Support firm to hire is a big decision. We review the pros...
Is it Time for a Telecom Transformation?
There’s a lot going on with telecom right now. Between working from home and the dramatic shift to online meetings,...
Managing Expenses for Businesses
Many of us have been working at home since March and are starting to evaluate next steps. For some that...
September 2020 Newsletter
BEI’s September newsletter focuses on managing expenses, a Back-to-Work COVID checklist, an overview of remote working options, Teams Together Mode,...
Remote Connections
Many of us have been working at home since March and are starting to evaluate next steps. For some that...
Back-to-Work COVID Checklist
This Back-to-Work COVID Checklist is super helpful. It covers People, Workplace, Technology and Customers and may be a useful roadmap...
August 2020 Newsletter
Learn about free digital summer camps, how to select the laptop of your dreams, the latest on CMMC and our...
What Does It Cost? Input for Your IT Budget
What does it cost…?? Always a complicated question, but one we all get in any line of work. Many businesses...
How Our Engineers Deal with Home Network Security
How do you protect your professional work life from your family, ensure you have the bandwidth to do your job,...
Fundamentals of Cyber Insurance – Tuesday 9/22
Andrew Beardall, Senior Partner/General Counsel, The Capital Group will give an overview of the risks and considerations involved with selecting a...
July 2020 Newsletter
BEI’s monthly newsletter includes help for parents trying to manage kids online during the summer, information about Risk Assessments, our...
Tips & Tricks for Using Microsoft Excel – Video
Join BEI President and self-professed Excel junkie, Mike Jennings, as he discusses and demonstrates intermediate skills in Microsoft Excel.
Disaster Recovery Doesn’t Have to be Scary
Nearly 20% of small and mid-sized businesses will suffer a disaster in the next five years. Disaster recovery planning is...
IT Security Issues & Your Staff – Tuesday 10/27
All BEI Managed Services Clients have a security portal that can be used for online IT security training, IT policies...
Secure Your Workplace – Tuesday 8/25
Join BEI Partner Ken Kocher, President of Force Security, for this informative webinar on physically securing your workplace.
What is a risk assessment and why do you need one?
How can your organization mitigate cybersecurity risk? The answer lies in risk assessments. Learn more about what they are and...
June 2020 Newsletter
BEI’s monthly newsletter includes Father’s Day Gifts, an offer for a free Microsoft 365 Licensing Audit, WFH Technology policies, Excel...
Microsoft 365 Suites – So many choices!
Microsoft offers many options for their subscription licensing – Microsoft Office 365. This table summarizes the options, features and pricing.
Understanding & Optimizing Microsoft 365 Licensing
Most businesses have made the transition to Microsoft/Office 365 licensing for things like email and the Office suite of products....
Tips & Tricks for Using Microsoft Teams – Video
Collaboration with Microsoft Teams is simple. Find out how to work in Teams accross your organization. Master meetings, phone calls,...
Mother’s Day Tech Gifts
BEI’s monthly newsletter includes Mother’s Day gift tips, our lunchtime webinar series (Microsoft Teams Tips and Tricks is next), BEI...
May 2020 Newsletter
BEI’s monthly newsletter includes Mother’s Day gift tips, our lunchtime webinar series (Microsoft Teams Tips and Tricks is next), BEI...
Tips & Tricks for Using Datto Workplace – Video
Join BEI Engineer, Ryan Diaz, as he discusses and demonstrates Datto Workplace, Worplace Online, Workplace Desktop, File Sharing and Selective...
CMMC Level 2 – Building a Bridge to Level 3
CMMC Level 2 introduces processes (maturity) to CMMC. It is bridge to Level 3 but requires a rigor and discipline...
Windows Virtual Desktop – a Game Changer!
Windows Virtual Desktop (WVD) is a game changer. As a replacement for Citrix or Remote Desktop, WVD saves money and...
Clean Your Phone!
It’s one thing to stop touching your face. It’s another to stop touching the things that touch your face! Read...
Online Meeting Tips and Tricks
We’re attending LOTS of online meetings these days and have put together our favorite tips for Microsoft Teams and Zoom.
CMMC Level 1 – Not a High Hurdle!
96% of Federal DOD contracts would require only CMMC Level 1 certification – so let’s get going!
No Pants Required! Strategies for Telework – Video
Businesses are transitioning from office work lifestyle to remote working solutions and for good reason. Find out here with this...
Remote Work – enabling your staff
Do you want your staff to be able to work remotely? This is top of mind right now for many,...
How to Pick a Password Manager?
A password manager is like a notebook with your passwords, but with a master key that only you have. This...
Password Management Webinar – Video
View our latest webinar on password management and a demo of LastPass.
Cybersecurity Maturity Model Certification Panel for Small Business GovCons
CMMC (Cybersecurity Maturity Model Certification) is coming and will quickly impact government contractors’ ability to respond to government opportunities. This...
The Latest Phishing Trends – Video
Did you know that phishing via text is growing rapidly? The short webinar provides tips and examples of phishing threats...
Technology Refresh – Buy or Lease?
Here at BEI, We are happy to get you a quote from Dell or another leasing company. They are often...
Windows 7 End-of-Life – what’s next?
Microsoft will stop issuing security updates/patches for Windows 7 and Server 2008. These security patches address vulnerabilities that Microsoft has...
Preparing for CMMC (Cybersecurity Maturity Model Certification)
CMMC is a certification that the government will require for every firm that does business with the Department of Defense (DoD)....
Cyber Threats to Your Business
The Reston Business Advisory Council presents Cyber Threats to Your Business – a presentation and Q&A discussion for business owners....
GovCon Series: CMMC – A Small Business Forum for Compliance
CMMC (Cybersecurity Maturity Model Certification) is coming and will quickly impact government contractors’ ability to respond to government opportunities. Register...
8th Annual NoVA B2G Matchmaking Conference & Expo
The premier business-to-government event taking place outside of the beltway is returning on Thursday, May 7, 2020 at the INOVA...
Greater Reston Chamber of Commerce Open House
Join the business community in celebrating the new office space at the Chamber – the same building just down one...
Checklist – 2019 Technology Resolutions
Before you make your resolutions for 2020 we thought we would help you take a minute to tie up essential...
Top Tech Gift Guide for 2019
Here at BEI, we polled our staff and as you can imagine, a group of techies have a large and...
Spotting Phishing in 2020 –Presented by The Reston Chamber
We want you to join us for this special presentation about phising and the dangers to look out for in...
Holiday Shopping Primer & Online Scams
Whatever your holiday traditions, the experts advise us all to be a little wary online this time of year. Here...
Hacking Prevention – don’t be a Hacker Helper
Cybercriminals are always on the hunt for easy access to your organization. Many times the easiest way in isn’t traditional...
The Dark Web – A Scary Story
The Dark Web sounds frightening and it is. It is a place most of us will never visit – it...
2019 Reston Cup – Presented by The Reston Chamber
It’s the 2nd annual Greater Reston Chamber golf tournament at Hidden Creek Country Club on Monday, October 21 from 11am...
So You Signed a BAA: Are You Ready for HIPAA Fines?
We’re hosting this breakfast seminar on “HIPAA Compliance for the Business Associate” at our office on Wednesday, October 23 and...
Laptop Encryption for HIPAA Compliance
Arthritis and Rheumatism Associates (ARA) is a large healthcare practice based in Maryland. With approximately 20 physicians and more than...
PCI Validated P2PE – The Simple and Safe Path to PCI Compliance
Many of our clients take payments from their customers using credit cards. Banks and the Payment Card Industry (PCI) require...
Mr. Jennings Goes to Washington…
We’re all targets for phishing, and you can imagine how attractive the Senate staffers would be! Mike briefly covered the...
9 ways to streamline your next IT project
Approximately 1 out of every 5 IT projects is considered an utter failure. Even success has a lot of nuance,...
Avoid Network Downtime – 5 Steps to Creating a “Neverdown” Network
Let’s look at the 5 critical steps to creating a network that will remain reliable for both your staff and...
5 tips for managing your business IT infrastructure
How do you backup your data and share information? if you’re overlooking other areas of your business IT infrastructure, you...
Essential IT checklist for new office setup
IT relocation may seem stressful and overwhelming at first, but with a little planning and forethought, the process can be...
How to protect your network while allowing BYOD
Bring Your Own Device (BYOD) policies are changing the business world for the better. With fewer overheads and greater working...
5 steps to a solid BYOD policy
It’s increasingly common for employees to have their own devices – laptops, tablets, phones – at work; devices that they’re...
6 things a good network risk assessment should include
A network risk assessment is one of the best ways to keep your network secure. It can identify vulnerabilities and...
6 ways to protect your business from phishing attacks
Phishing attacks are a huge threat to your business — they are on the rise and becoming more sophisticated at...
Your guide to phishing attacks and the different ways they work
Phishing is a cybercrime that costs US businesses and individuals a combined half a billion dollars annually, and it’s hard...
Game Changers to Mature Your Business – Breakfast Seminar Thursday 5/9
Get ideas and advice from advisors who have successfully navigated every phase of a company’s life cycle, including successful exits....
How to protect your business from insider threats
Mitigating insider threats involves ongoing effort and some expense, but it pales in comparison to the possible damage an insider...
Assessing your vulnerability to insider threats
Many data breaches are, unfortunately, the result of your team — whether because of negligence or malice. We’ve put together...
BEI recognized as 2019 Best of Reston honoree
BEI is happy to announce that we have been named a 2019 Best of Reston Honoree. This award is given...
4 Cybersecurity Tips Every Business Owner Needs to Know
Almost half of all cyberattacks target small to medium-sized businesses. Instead of laboring under the delusion that this will not...
4 ways the cloud can boost productivity
Did you know the average worker only spends 39% of their time on role-specific tasks? The cloud offers better ways...
Our CEO was recently featured in a TechGen blog
Our CEO, Ellen Jennings, was recently featured in a TechGen blog, Why Your Small Business Needs an IT Network Diagram...
4 reasons you should be using the cloud
What’s stopping you from switching over to the cloud? Hopefully, it’s not a reason founded in myths. Although cloud computing...
5 Professional Development Books to Read Right Now
How do some of the brightest minds in today’s business world stay at the cutting edge in both their personal...
You Gotta Spend Money to Make Money: The Impact of Investing in Business Technology
Just like accounting and legal services, technology has become an essential component of all businesses today. But just like those...
4 top tech trends to watch in 2019
It’s amazing to consider how far business technologies have come in the past few decades. At one time, you or...
VR in business: Who’s using it and what’s the potential?
VR has practical commercial applications, and more and more companies are taking advantage of them. Indeed, businesses of all sizes...
Time is Money: Measuring your Return on Technology
It might be a bit cliché, but, when it comes to your business, time really is money. You need to...
What is cryptocurrency?
Cryptocurrency. It’s buzzworthy and always trending. Your college roommate’s cousin’s friend’s barista invested in cryptocurrency and now he’s a millionaire....
Improve your security by following NIST password guidelines
Most people are guilty of using the same password for many accounts. This widespread password reuse makes your an easy...
What to look for in a business partner
Entering into a business partnership with someone is a lot like marriage. You are looking for the person who shares...
7 common HIPAA compliance pitfalls and how to avoid them
When it comes to healthcare, patients expect that their private information will be protected. HIPAA was created to help standardize...
7 ways to stay current on US Regulations
Federal government agencies issue thousands of rules every year. If your business is required to follow these regulations it can...
5 tips for better compliance training
Compliance is necessary for a lot of industries. Your employees are a key part of meeting compliance requirements so it’s...
3 ways technology can make regulatory compliance easier
Some industries face heavy government regulations. Staying compliant can be a job within itself. Violating these regulations can result in...
5 tips to stay compliant during disaster recovery
Every business needs a backup and disaster recovery plan. But having a recovery plan isn’t enough, you also need to...
3 times when a solid backup saved the day
You won’t know that your system has failed if you don’t test it regularly. Maintaining business continuity after a cyber...
How to create a complete BDR plan that keeps your business data safe
Business disruptions can cost your company a lot of money and ruin the trust that clients have in your services....
3 of the Top Causes of Downtime and How to Stop Them
Advances in technology have transformed the modern workplace. People are working faster and more efficiently than ever before. But all...
HIPAA Peace of Mind Lesson 3: Why Should an Organization Be HIPAA Compliant
Too many healthcare organizations think of HIPAA as just another government regulation which limits their revenue and drives up their...
A quick guide to ransomware (and how to stop it)
While the majority of those hit by ransomware attacks are healthcare and government organizations, many others have fallen victim to...
HIPAA Peace of Mind Lesson 2: Are You Required to be HIPAA Compliant
There is often confusion about whether an organization falls under HIPAA regulations or not. HIPAA regulates two types of organizations—Covered...
Your cybersecurity strategy: Protecting desktops, laptops, email and more
Many SMBs assume that hackers won’t attack them because they don’t have as much client data and money as multi-national...
HIPAA Peace of Mind Lesson 1: What Is HIPAA and Why It Is Important?
HIPAA is a series of federal laws and implementation regulations enacted beginning in 1996 to protect the privacy and security...
Multi-layered security for complete protection against cyberattacks
Complete protection from cyberattacks requires multiple layers of security. That’s because network security requirements are always changing. Are you looking...
Phishing attacks, spear phishing and keeping your company safe
Phishing attacks and spear phishing are two methods of cyberattack that have proven to be alarmingly effective in recent years....
Cloud servers vs onsite servers: Which is right for your business?
Today’s expanding global economy drives the demand to keep both hard- and software updated and current. While in-house servers offer...
Thought leadership: Reflections from reading Extreme Ownership
War is an intense laboratory for leadership lessons and the authors of Extreme Ownership (former Navy Seals Jocko Willink and...
5 Ways to Boost Productivity with Office 365
Microsoft’s Office 365 is the go-to productivity suite for businesses of all sizes. But did you know there are plugins...
How to work remotely using only your smartphone
Smartphone apps allow employees to work remotely with the same functionality on their smaller devices as they would have access...
How to document your IT Infrastructure
As a small business owner, you know that if if something goes wrong with your technology, you need a fix—quick....
Hiring & retaining great staff
Hiring and retaining great staff is probably one of the biggest challenges for any employer, but more so in an...
4 pro tips for predictable IT performance
From business process automation to big data, there are a variety of strategies at your fingertips to achieve predictable IT...
4 strategic shifts your company needs to make for reliable IT
In order to better serve your customers and beat your rivals, you need to make sure your business technologies are...
Greater Reston Chamber of Commerce
Mike Jennings and the Greater Reston Chamber of Commerce May 23, 2018 presentation on “Small Business IT on a Budget”....
E-Book: Making the most of your business technology
Business technology allows SMBs to increase productivity, manage expenses and carve out a competitive edge. Creating an effective small business...
Thought leadership: Reflections from reading Creativity, Inc.
A new business partner gave me a copy of Creativity Inc., and I couldn’t resist a book with Buzz Lightyear...
How to connect your business IT solutions to ROI
Connecting your business IT solutions to return on investments is crucial for optimal growth and longevity. But how can you...
How to design your IT infrastructure around your goals
Your IT infrastructure has to seamlessly integrate with your company’s processes if you’re serious about fostering optimal growth, productivity and...
Boost your business productivity with workflow automation
Workflow automation offers the potential to transform your organization like no other technology before it. By defining your business processes...
Predictable IT makes running your business infinitely easier
Here at BEI, we believe our services all hinge on a single idea: predictable IT makes your life easier. We...
How BEI does IT support. (It’s not just about the tech!)
We’re into IT. That’s what we do for a living. But at BEI, we know IT and network configuration probably...
3 Technology Resolutions for 2018
As you know, a lot can change in a year, and it’s no different with technology. But is your tech...
Scream for Section 179 Tax Deduction
While Halloween has passed, the scariest season for companies has started to send shivers down their spinal columns– tax season....
Three Ways You Can Minimize IT Downtime
Downtime isn’t just frustrating, it’s expensive. According to a recent ITIC study, 98% of organizations say a single hour of...
3 Things to Keep in Mind When Choosing an MSP Partner
The only way to ensure growth and longevity is to protect one of your business’ most valuable assets: information. You...
Three Reasons You Need to Invest in PC Upgrades—Today
If you’re skating by with older PCs, you’re making yourself vulnerable to a myriad of potential problems. It’s time for...
Clearing Up Your Questions About the Cloud
Cloud continues to be a common buzzword. But, for many cloud is still a mystery. So, we’d like to help...
The Advantages of Managed Services vs. Break-Fix
Technology is the leading force that helps companies streamline their process, improve productivity and keep a competitive edge. But, what...
The Why Behind Managed Services
Organizations of all sizes rely on technology to operate efficiently and effectively, and as the reliance on IT grows, so...
3 Cloud-Based Security Services Every MSP Needs To Offer
Today’s businesses face an IT environment where proprietary information and confidential client data must be secured against ever-escalating attacks and...
BEI in Around Reston Community Winter/Spring
Check out the article by our CEO, Ellen Jennings, about the Reston Chamber of Commerce committee, Resourceful Women of Reston....
Top 3 Benefits of a Mobile Workforce
The global mobile workforce is expected to grow to 1.87 billion in 2020. Maybe you’ve already mobilized some of your...
3 Reasons the Co-Managed IT Model Might Be the Perfect Fit
Money—saving it and making it—drives almost every business decision regardless of your organization size. Cutting back on IT makes room...
2017 New Year’s IT Resolutions
The turn of a new year gives us an opportunity to reflect on the past and find opportunities for improvement....
Cloud Computing Myths Debunked!
While the benefits of cloud seem pretty obvious, many organizations still have their doubts about transitioning to cloud. We’re debunking...
Top 4 Ways to Keep Your IT Costs Down
Cutting costs is the primary goal for most business owners. They’ll scour their books looking for areas that offer a...
How much downtime is too much?
According to an IHS study, outages cost enterprises $700 billion a year. Though this statistic is alarming, it doesn’t quite...
Focus on Running Your Business, We’ll Focus on Running Your IT
As technology continues to evolve, so do your technology needs. But many businesses lack the internal resources they need to...
Are you safe and secure in the cloud?
Six Ways Cloud Can Increase Your Risk Every day, more businesses are looking to the cloud because it delivers cost-effective...
Feel Like You’re Constantly Dodging Downtime?
How much of your day is consumed with worrying about the next IT outage? When your technology isn’t working, your...
Microsoft Office 365 – A No Brainer for Your Business
Cloud computing is officially a common term. More and more small and medium-sized businesses are looking to cloud because it...
World Backup Day: Disaster Recovery or Business Continuity
World Backup Day comes around every year on March 31. This day prompts us to be aware that our data...
Is It Time to Move on? Get More Responsiveness & Improved Results from Your MSP
Sometimes, there comes a point when it’s simply time to move on. Things are just not like they once were....
7 New Year’s Resolutions for Worry-Free IT
2015 has come to a close. You’re now tying up loose ends to launch into a successful 2016. Likely, you’re...
Managed IT Services: The Gift That Keeps on Giving
What do you give someone running their own business during the holiday season? The answer to that conundrum is as...