Jon Schram

Santa Rosa Beach, Florida, United States Contact Info
4K followers 500+ connections

Join to view profile

About

I am a CEO Coach at Acumen, a community of leaders who are committed to helping each…

Articles by Jon

See all articles

Activity

Join now to see all activity

Experience & Education

  • Acumen

View Jon’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

Volunteer Experience

  • Lead to Read KC Graphic

    Volunteer

    Lead to Read KC

    - 10 years

    Education

    http://www.leadtoreadkc.org/
    A free program for Kansas City-area urban schools - where kids and volunteers bond over books.

  • Big Brothers Big Sisters of Greater Kansas City Graphic

    Corporate Club Sponsor

    Big Brothers Big Sisters of Greater Kansas City

    - 9 years

    The Purple Guys is a proud sponsor of BBBSKC - helping create life changing friendships every day.

Publications

  • A Breach Is Just The Beginning, Make It The End By Monitoring The Dark Web

    Thinking Bigger Business Media

    Hacking used to have one major barrier to entry: talent. Unfortunately, the dark web has enabled individuals with nothing more than a bad attitude and a small amount of spare cash to buy sophisticated hacking tools. This means that your data is more vulnerable than ever before. Learn more about how to monitor your entire company's credentials to ensure there are not exposed loopholes for hackers to gain entry to your private data.

    See publication
  • Business Leaders Share Keys to Balancing Your Budget At The End Of The Year

    Forbes

    The Purple Guys uses a fixed-fee pricing model for its IT support services, an approach that isn’t very common in the IT world. Schram says, “We tell our customers exactly what their fee is for IT support every month based on the number of people being supported. Because the price is based on the size of the team, when companies add or subtract team members, they know exactly how much their support will cost.” This model allows the company, which is profitable, to approach pricing…

    The Purple Guys uses a fixed-fee pricing model for its IT support services, an approach that isn’t very common in the IT world. Schram says, “We tell our customers exactly what their fee is for IT support every month based on the number of people being supported. Because the price is based on the size of the team, when companies add or subtract team members, they know exactly how much their support will cost.” This model allows the company, which is profitable, to approach pricing transparently.

    When other companies charge hefty rates by the hour, they’re indirectly incentivizing system downtime because that’s when they’ll come in and make the most money. While Schram says The Purple Guys’ pricing model aligns the goals of his company with the goals of his clients, he adds that it’s still challenging to stay competitive. “From a budgeting standpoint, we’re consistently looking for ways to improve, so going into the season of aligning ourselves for next year, everything profitable, we’re working on all levels of improving our offerings including hiring, boosting our marketing efforts, customer appreciation, and making our company a better place for our employees to work.”

    Learn more about key insights from other nationally recognized business owners about balancing your budget at the end of the year.

    Other authors
    • Rhett Power
    See publication
  • Avoid Credential Stuffing Attacks With These 4 Strategies

    Due

    Cybersecurity threats are becoming more prevalent each year, and business owners need to focus on protecting their companies and upgrading their defenses. Companies that use the internet to do business are especially at risk for credential stuffing, a tactic wherein botnets attempt to use fraudulent login data to access information. According to Akamai’s State of the Internet 2018 report, 8.3 billion malicious login attempts were identified in the months of May and June alone.

    On…

    Cybersecurity threats are becoming more prevalent each year, and business owners need to focus on protecting their companies and upgrading their defenses. Companies that use the internet to do business are especially at risk for credential stuffing, a tactic wherein botnets attempt to use fraudulent login data to access information. According to Akamai’s State of the Internet 2018 report, 8.3 billion malicious login attempts were identified in the months of May and June alone.

    On e-commerce websites, more than 90 percent of the global login traffic results from credential stuffing attacks. Other industries such as air transportation and consumer finance are experiencing a similar effect, with criminal activity accounting for about 60 percent of login attempts.
    Learn more:

    See publication
  • Think You Have Cybersecurity Taken Care Of? Think Again.

    Forbes

    If you learned that homes with your same model of alarm system were being broken into 32 percent more often this year than last, you might no longer think your system is secure enough. Yet many companies assume their IT infrastructure is still secure, despite the fact that cyberattacks jumped 32 percent between the first quarters of 2017 and 2018, according to a Positive Technologies report. Learn more about how to protect your business from cybersecurity threats.

    See publication
  • How To Spot Phishing Attempts Before You're On The Hook

    Thinking Bigger Business Media

    In the security world, it seems like every day brings another story of customer data being compromised. One of the latest examples comes from Children’s Mercy Hospital, where patients are still finding their data endangered after an email phishing scam hit more than 60,000 individuals back in January. Learn more about how to protect your business.

    See publication
  • Cryptojacking Malware: What It Is and How To Fix It

    Readwrite

    Cryptojacking is a cyberattack like no other. Attackers don’t steal your data or ransom off access to your network. Instead, they commandeer your hardware when you’re not looking and redline the processors to mine cryptocurrency. Learn more:

    See publication
  • How To Protect Your Web Application - Even If You Don't Own Sensitive Data

    Business.com

    Hackers are watching. Give your employees the knowledge and tools they need to avoid puncturing holes in your system. Prioritize these four critical security measures.

    See publication
  • How To Prepare Your Business for the Workforce of the Future

    Inc. Magazine

    Employees and employers are both eager to adopt a more remote approach to work. Flexible options lead to a better work-life balance for staff while lowering overhead costs for businesses. Jon Schram, founder and CEO of The Purple Guys, a managed IT services and computer support provider, is a big believer in the trend and technology's role in facilitating it -- and doing so in a secure manner. "Whether co-workers are separated by miles, mountains, or oceans, technology can bring them together,"…

    Employees and employers are both eager to adopt a more remote approach to work. Flexible options lead to a better work-life balance for staff while lowering overhead costs for businesses. Jon Schram, founder and CEO of The Purple Guys, a managed IT services and computer support provider, is a big believer in the trend and technology's role in facilitating it -- and doing so in a secure manner. "Whether co-workers are separated by miles, mountains, or oceans, technology can bring them together," he says. "Offices of the future may have no physical office, so having IT support that understands how to securely manage data and communications in the cloud will be critical."

    Other authors
    • Rhett Power
    See publication
  • Not a Tech Expert? Here's How To Turn Your IT Department into an Asset

    Business 2 Community

    Even if you don't know all there is to know about modern business tech and the best management options, you can still turn your IT infrastructure into one of your most important assets. You just have to focus on what your company and employees need and give it to them.

    See publication
  • Simple CyberSecurity

    Thinking Bigger Business Media

    Online security is a major issue for businesses of all sizes. The good news is that there are IT tools that can give you peace of mind if a security threat arises. They can prevent and stop the threat quickly, providing a great return on investment for your managed IT Services. Learn more about the tools you can utilize as a small business without a large security budget to prevent cyber attacks.

    See publication
  • The importance of one-of-a-kind Customer Service

    St. Louis Small Business Monthly

    An Insightful Discussion panel expert feature on The Purple Guys President, Jon Schram, and the importance for small businesses to place critical value on Customer Service. "You have to measure it to know if you are doing well or not. The most important part is getting the data in and knowing what your customers really want. If you are serving your customers well and do it well long enough, people will start to refer you. You just need to get the ball rolling. We are relentlessly focused on…

    An Insightful Discussion panel expert feature on The Purple Guys President, Jon Schram, and the importance for small businesses to place critical value on Customer Service. "You have to measure it to know if you are doing well or not. The most important part is getting the data in and knowing what your customers really want. If you are serving your customers well and do it well long enough, people will start to refer you. You just need to get the ball rolling. We are relentlessly focused on customer service as a company and as a brand. It is the identity of who we are at our core." - Jon Schram.

    See publication
  • Forget about remembering passwords

    Thinking Bigger Business Magazine

    Desktop tools make keeping and securing multiple passwords easier.

    See publication
  • For The Average Hacker, Your Small Business Is An Ideal Target

    Entrepreneur

    Your business is not too small or too big to be hacked. Here's how to avoid becoming a statistic.Headlines are full of cybersecurity breaches, and big businesses like Google and Facebook are some of the latest to fall victim to outside attacks. A vulnerability in Google+ is at least partially responsible for the company’s decision to shut down the platform for good, and a recent breach of Facebook’s network security may have compromised the personal information of almost 50 million users. Learn…

    Your business is not too small or too big to be hacked. Here's how to avoid becoming a statistic.Headlines are full of cybersecurity breaches, and big businesses like Google and Facebook are some of the latest to fall victim to outside attacks. A vulnerability in Google+ is at least partially responsible for the company’s decision to shut down the platform for good, and a recent breach of Facebook’s network security may have compromised the personal information of almost 50 million users. Learn more:

    See publication
  • How To Spot Phishing Attempts Before You're On The Hook

    -

Recommendations received

More activity by Jon

View Jon’s full profile

  • See who you know in common
  • Get introduced
  • Contact Jon directly
Join to view full profile

People also viewed

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Jon Schram in United States

Add new skills with these courses