Has Your IT Service Provider Changed as Your Needs Have Changed?

There is no arguing with the fact that the COVID-19 pandemic has forced businesses to adjust and change the way they do business. Some of these changes may be not continue post-pandemic but many will in some form or another. Certainly, the way businesses will make decisions about how they go to market, serve their clients, and operate their businesses will continue to be impacted by the pandemic experience. 

From an IT perspective, the move to working remotely, the increased use of cloud applications and infrastructures, and mitigating cybersecurity risks, has impacted businesses and led IT Service Providers, such as MicroAge, to adjust the way we provide services to our clients.  Their needs changed and we had to ensure we changed to meet these needs.  

Let’s talk about the main changes and the impact it has had on the services you receive from your provider. 

Working Remotely 

When the pandemic first hit, over 20 months ago, there was a rush for most businesses to set up work areas at home for their employees so they could remain operational. Some had company PCs and accessories they could take home. For others their personal devices became their work tools. Kitchens, living rooms and bedrooms became “offices”. These offices were shared, not with co-workers, but with children who were attending virtual classes, spouses and life partners who were also asked to work from home and with cuddly pets. While this brought people together as they got to know each other in a much more intimate way, it created challenges. 

It’s one thing to have everyone in one environment that is controlled and secure from the infrastructure to the devices and applications used by employees and the accesses provided to them. Even if some employees work remotely or sometimes have to access the network and applications from somewhere other than the office, there was time to set them up properly and securely in pre-pandemic days. Supporting the users had a clear process with a known environment and known devices and applications.  

Overnight, that changed.  

Suddenly, the devices being used may or may not be company owned. The user may or may not have access to the tools and applications they needed. The accesses to the network may or may not be secure. Lots of unknowns. 

For IT Service Providers like us, it was all about ensuring that our clients were operational as quickly as possible. This included sourcing equipment, helping the employees set up their home offices, ensuring accesses to the tools and applications required, supporting the users with implementing new ways of working and of course, doing all of this securely. Pivoting from the known to the unknown and properly preparing, monitoring, managing, and supporting the people and the environment of the clients was an essential element that good IT Service Providers brought to the success of the transition to a distributed workforce.  


Imagining how businesses could continue to operate as the pandemic took hold is difficult without the internet and access to cloud applications and infrastructures. Although businesses had to re-imagine how they did things, access to cloud infrastructures, tools and applications kept many businesses operational. Again, as suddenly as working remotely became a priority so did digital transformation to ensure businesses survived. 

Applications and solutions like Teams and Zoom, Microsoft 365, Azure, VoIP, and a plethora of others made it possible for businesses to continue to deliver their products and services to their clients albeit differently.  

IT Service Providers needed to help their clients get to where they needed to be by understanding their needs and providing and implementing the right cloud solutions. 


After an initial short quiet period (we’re guessing cybercriminals were also adjusting to the new realities of the pandemic), cyber criminals came back in full force. They took full advantage of the fear, uncertainty and doubt created by the global crisis. They took advantage of unsecured internet accesses or the personal devices that may not have the next-generation antivirus. They took advantage of the distraction that the pandemic was causing to send malicious messages. Cybercriminals doubled down on their attacks and they continue to get better at their “craft”. 

To minimize risks and make clients as cyber-resilient as possible, IT Service Providers had to look at all of the layers of an IT environment from protection and detection to incident response: 

  • People 
    • Cyber Awareness Training 
    • Phishing simulations 
    • Multifactor Authentication (2FA, MFA) 
    • Asset management 
  • Perimeter 
    • Properly configured next-generation firewalls 
    • Spam filter 
    • Dark web monitoring 
    • Penetration testing 
  • Network 
    • Security information and event management (SIEM) or Security Operations Centre (SOC) services 
    • Segmentation 
    • Wireless Authentication 
  • Endpoint 
    • Endpoint Detection and Response (EDR) services 
    • Patch management 
    • Drive encryption 
    • Monitoring and alerting services 
    • Vulnerability scan 
  • Data 
    • Backup w/offsite replication 
    • Offline copy of data 
  • Organization 
    • Incident response services 
    • Business Continuity Planning 

IT Service Providers need to understand what your current and future work environments look like to ensure it is as secure and resilient as it could be.  

The pandemic caused all businesses to re-imagine the way they service their clients. IT Service Providers were no different. They needed to evolve to ensure their clients are able to operate productively and securely. 

Contact us today to see how we at MicroAge can help you. 

Get the most from your IT

As service providers to more than 300 companies, the dedicated professionals at MicroAge are second to none when it comes to managed services. By improving efficiency, cutting costs and reducing downtime, we can help you achieve your business goals!

Most commented posts

Infrastructure informatique, IT infrastructure

5 Benefits of an Optimized IT Infrastructure

Is your current IT infrastructure helping your business thrive in its industry or creating obstacles for growth? If you’re still not using cloud technologies to…

Read More
cloud data back up

5 Reasons Your Company Should Use the Cloud for Data Backups

From emails with malicious files to zero-day vulnerabilities, the risks to business data are everywhere. An excellent strategy to prevent information loss and protect your…

Read More
In 2018, studies found that close to 60% of all cyberattacks are aimed at small and medium sized businesses. As criminals get smarter and more sophisticated, it’s never been so essential to protect businesses from cyber threats. If you own a business or are a CIO, here are five cybersecurity best practices for your company

5 Cybersecurity Best Practices for Your Company

In 2018, studies found that close to 60% of all cyberattacks are aimed at small and medium sized businesses. As criminals get smarter and more…

Read More
Hacker data breach

Why Should My Company Worry About Data Breaches?

Data breaches are a major cybersecurity concern because they can ruin a company’s reputation, cost millions of dollars, and paralyze businesses for several days. Here’s…

Read More
different kind of backups

The Pros and Cons of Different Kinds of Backups

If you’ve read our last blog on the importance of data backups, you are likely considering which kind of backup you should perform to keep…

Read More