Blog

March 26th, 2015

O365_164_CIt’s Monday morning at the office, and you just came back from a lovely trip to Hawaii. It was a long overdue break from the technology, phone calls, and commutes of everyday life. As you settle into your office chair and open your inbox, your eyes widen as you realize it’s time to pay the piper. You scroll, scroll, scroll for what seems like forever, unable to find where the avalanche of emails began. There are hundreds - how will you ever get through them all? Ever felt the dread of a situation like this? Office 365 has a new feature that will prevent these email nightmares from ruining that first day back from vacation.

The problem with today’s email spam filtering

In everyday life, we’re faced with some issues that are of major importance, others minor, and many completely insignificant. Our email inboxes are no different. Some mails need to be attended to immediately, others can wait awhile, and some we never want to see at all.

But in our current email landscape, there is no gray area. A message either goes to your spam folder or to your inbox. Wouldn’t it be great if there was some sort of middle way? This is where Office 365’s new Clutter feature comes into play.

How Clutter works

Clutter works by creating a folder for your emails that are of ‘minor’ importance. This folder is aptly named Clutter, and it works in essentially the same way as your junk folder.

How does it know which emails to put in the Clutter folder? The feature monitors your inbox behavior and then accordingly determines which folder to put an email. For example, if there are specific senders you always reply to immediately, perhaps several times a day, then those messages are clearly important to you. However, if you’re receiving emails from a company and deleting them without opening, then that also says something about the importance of messages from that sender. Clutter works by tracking the patterns of this behavior, observing them and then filtering each message into the appropriate folder. This leaves the messages you need to respond to now in your inbox and hides the ones that can wait, delightfully out of sight.

Want to learn more about Clutter and other Office 365 features? Get in touch with us today.

Published with permission from TechAdvisory.org. Source.

Topic Office 365
March 23rd, 2015

BusinessContinuity_Mar23_C_2As a business owner you’ve probably heard of the benefits of a business continuity plan (BCP). It ensures your company’s protection in the event of an unexpected disaster, whether that’s natural or man-made. But you likely don’t have time to sit and learn all about business continuity procedures and terms. Hearing technical terms in meetings, and being expected to follow protocol, may also sound overwhelming. To help clear up the confusion, here are eight common business continuity terms that you should be aware of.

Battle box - a tool box where necessary equipment and vital information are stored. These objects and pieces of information should be useful in a disaster. Typical items include a first aid kit, laptop, protective equipment, and communication devices.

Business impact analysis (BIA) - a process to evaluate the impact that a disaster may have on a business. The BIA shows what a business stands to lose if some parts of its functions are missing. It allows you to see the general picture of your business processes and determine which ones are the most important.

Call tree - a comprehensive list of employee contacts and their telephone numbers. Call trees are used to notify out-of-office employees about a disaster. Companies can use a software program to contact people on the call tree by sending automated emails and text messages. In order for a call tree to work, employees should provide alternative contact options and their information must be up to date.

Data mirroring - a duplication of data from its source to another physical storage solution or the cloud. Data mirroring ensures that crucial information is safe, and companies can use the copied data as backup during a disaster.

Exercise - a series of activities designed to test a company’s business continuity plan. When an exercise is carried out, there will be an evaluation to decide whether a BCP is meeting standards or not. An exercise can identify gaps in, and the drawbacks of, a BCP and is therefore used as a tool to revise and improve a business continuity plan.

Hot site - an alternate location equipped with computers, communication tools and infrastructures to help a business recover information systems affected by the disaster.

Plan maintenance - a process of maintaining a company’s business continuity plan so that it is in working order and up to date. Plan maintenance includes scheduled reviews and updates.

Recovery time objective (RTO) - a period of time in which companies must recover their systems and functions after a disaster. This is the target time for a business to ideally resume its delivery of products and services at an acceptable level. RTO may be specified in business time (e.g. one business day) or elapsed time (e.g. elapsed 24 hours).

Business continuity plans can be a hassle to design and implement without proper understanding of their requirements. If you want to learn how you can protect your business from disasters, give us a call today.

Published with permission from TechAdvisory.org. Source.

March 19th, 2015

Virt 164_CYou’ve heard about Cloud Computing and Virtualization. You’ve followed the news about them, and even know a few fellow business owners who’ve successfully implemented the technologies. You’re excited and ready to take the plunge. But wait, which technology should you use? If you’re unsure, read on. Here are the differences between the two and the things you need to know to help you determine which one will benefit your business more.

The difference between Cloud Computing and Virtualization

To understand which technology you need, you first need to understand the role of that technology in your business.

Virtualization is basically using virtual hardware or software stored off-site, instead of the actual physical asset being in your office. A common asset many organizations choose to virtualize is a server. So if you’re thinking about buying a new server, you may want to consider investing in a virtual one instead. The advantage of this is that you’ll free up office space and save money on the upfront expense of an in-house server as well as its maintenance costs.

Cloud Computing, on the other hand, is not about individual assets, but instead is an operational model. Your business will run through the Cloud, where employees can create documents, interact with each other and customers, and even store files and data. The main advantage of the Cloud is that it increases operational efficiency and boosts organizational productivity.

Arguments for virtualizing

If you’re considering either the Cloud or Virtualization and have done neither, it makes sense to think about Virtualization first. With both Virtualization and the Cloud, you’re essentially changing the architecture of your business - from physical to virtual. Virtualization, however, is a small change, while Cloud Computing is a more dramatic one. If you opt for going all in with the Cloud right away, it may be a bit mind jarring for some of your staff as they get used to the new technology. And this could slow down their productivity. Virtualizing a few technology assets, instead of your entire workflow system, is an easier way to get a grasp of working with virtual technology for the first time.

A more fundamental reason to choose Virtualization is that you’re just looking to create more office space. In this case Virtualization is a no-brainer.

Arguments for the Cloud

If your organization gets to the point of needing to add virtualized machines or servers quickly, the Cloud can automate this process. However, your IT department must be ready and willing to hand this process over to your end users.

Also, if your organization has been using virtualized machines for some time or is simply ready to overhaul its workflow and operational process altogether, then the Cloud is likely a better fit for your business.

Which is the best choice for your business?

What it comes down to is operational efficiency (Cloud Computing) or saving money and space on individual assets (Virtualization). What’s more important to you?

And do you have a progressive organization and staff that are ready to adapt to using virtual technologies? If not, then Virtualization may be the initial step you need to start changing your organization’s infrastructure to compete in the modern business world.

Want to learn more about Virtualization and Cloud Computing? Contact us today.

Published with permission from TechAdvisory.org. Source.

March 18th, 2015

Security_Mar18_CIt’s easy to get complacent about internet security, but the reality is that none of us can afford to let our guard down. Precautions to protect yourself, your identity and your finances online can be simple, but they are only effective when practiced rigorously and consistently. And while the most obvious things like making passwords hard to guess and locking your workstation are as effective as they ever were, nowhere are conscientious security efforts more crucial than when using online banking systems and mobile payment portals. Users of peer-to-peer payment provider Venmo can breathe a sigh of relief, then, because the service just added extra security controls for its customers.

The Venmo platform is known for its convenience and ease of use, and is commonly used to split the cost of drinks, dinner, taxis and the like. The app is now adding a raft of new security-focused features, in response to criticism of its record for ensuring the security of its customers and their financial transactions.

Back in February, a Venmo user discovered his account had been hacked and used to withdraw almost $3,000 from his credit card. The intruder had also thought to change the email address associated with the Venmo account and to disable notifications of payments, but Venmo did not tell the genuine user about the changes that had been made. Venmo was decried for letting basic lapses in security exist in its trendsetting platform.

Now the service is doing what it can to pick up the pieces and up the ante on the security front. The most obvious change is to incorporate automatic email notifications when changes are made to the basic personal details associated with a Venmo account - a feature which many believe should have been built in from the word go. But the app will also add multi-factor authentication, another name for the two-step verification that can be enabled within Google Apps and other services. This feature makes it more difficult for would-be intruders to gain access to your account, even if they manage to get hold of your password.

Multi-factor authentication works by requiring not only your password for login, but also a second piece of information such as a one-time code - often generated on-the-spot and sent by SMS to the user’s cell phone - or the answer to a pre-set security question. Insisting on two phases to the sign-in process allows another opportunity to stop potential fraudsters in their tracks. The changes being implemented by Venmo also reflect the growing awareness on the part of technology companies for the need to get serious about security and protect the integrity of their systems and their users’ data.

You can put multi-factor authentication to use in your IT systems to keep your business protected. Get in touch with us and we’ll show you how.

Published with permission from TechAdvisory.org. Source.

Topic Security
March 16th, 2015

HealthcareIT_Mar16_AMedical institutions rely on their healthcare systems to facilitate the needs of their patients, whether through electronic medical records, prescription management or data entry software. Unfortunately, most healthcare service providers don’t realize how vulnerable their IT systems are to cyber attacks. One of the contributing factors to data breach is digitization. While there are several benefits of converting medical data from paper records into electronic files, there is no denying that it increases the risk of data theft. And since stolen healthcare information can be used to commit identity theft and financial crimes, securing healthcare data has become more important than ever.

According to healthcare security experts, healthcare data breaches are on the rise due to the high prices the data can command on the black market.

From financial information to medical information

In the past few years, cybercriminals’ focus has been on stealing financial data, including credit card numbers and personal information. But things are taking a turn, the result of financial institutions fortifying their database and raising client awareness of the problem. This is making it more difficult for hackers to steal financial data, let alone use them. Banks do their bit to protect their customers, too, by quickly identifying and canceling compromised credit cards.

Stronger data protection measures have forced criminals to turn their attention to medical data, which is typically much less secure. Patient data includes an individual’s date of birth, medical and physical records and social security number - information that can’t be easily reset, and that is significantly more valuable than credit card data.

Securing healthcare data

Healthcare data has become more attractive to criminals, and it’s crucial that medical institutions take necessary precautions to secure their patients’ information from data thieves. Here are some best practice measures to secure healthcare data.
  • Protect the network and Wi-Fi - As hackers use a variety of tools to break into IT systems and obtain medical records, healthcare organizations need to invest in secure firewalls and antivirus software to deploy on their healthcare devices. Network segregation is also a wise move so that, in the event that a breach does occur, the attacker can’t instantly access all of your organization’s information at once.
  • Educate employees - Staff members need to receive lessons about information security, including setting passwords, spam filters, protection against phishing, and other kinds of data breach methods.
  • Data encryption - Encrypting data is one of the safest ways to secure it. Healthcare institutions can encode patients information in such a way that only authorized users can access it. Multi encryption is also an effective way to keep out intruders.
  • Physical security - Most healthcare institutions still retain their patients’ records on paper, stored in cabinets. Ensure that all loopholes are covered by installing surveillance cameras and other physical security controls, such as electronic door locks.
It is of crucial importance for healthcare providers to secure sensitive information, in order to gain and retain the trust of your patients. If you want to know how your organization can better protect your patients information, give us a call.
Published with permission from TechAdvisory.org. Source.

March 16th, 2015

SocialMedia_Mar16_CThere was a time when social media platforms were hashtag-free. But the reality in today’s online world is that hashtags are one of the most prominent tools used in social media. And with more businesses than ever engaging in social media to stay competitive, let’s take a look at how different social media sites make use of hashtags, and how you can use them to the advantage of your business.

Twitter

Twitter hashtags don’t support special characters like +, !, $, %, -, ^, &, * but do support letters, numbers and underscores. There are no hashtag limits as long as you keep your message within the usual 140 characters.

The best way to use hashtags in Twitter is through hosting and participating in Twitter chats. You don’t need to be in an event to network with people through the official hashtag; event organizers usually market the official hashtag very well. In other words, you’ll get additional exposure if you use it.

Useful Twitter hashtag tools include:

Hashtagify which tracks trending hashtags and shows related hashtags for any base terms you provide. TwChat lets you discover, participate in and host Twitter chats. This is best used for monitoring and archiving any hashtag streams.

Instagram

Just like Twitter, Instagram hashtags don’t support special characters like +, !, $, %, -, ^, &, *, but do support letters, numbers and underscores. You can add up to 30 hashtags to a single photo or tag your photo after publishing it by listing the hashtags in the comments.

After you tag your post with a hashtag, you’ll be able to tap on the hashtag to see a page that shows all photos and videos people have uploaded with the same hashtag. Instagram hashtags can dramatically increase your following, especially if you use hot and trending hashtags which are easily found here.

The best use of hashtags on Instagram is to participate in hashtag games like #tbt (Throwback Thursday) and #MondayBlues. Both can increase your following and interactions since people click on these specific hashtags to see photos of other participants. Additionally, location-based hashtags also work very well on Instagram, whether abbreviated or in full, for example #LA and #LosAngeles.

Facebook

Facebook hashtags are similar to other social platforms; they support the standard set of characters including numbers, letters and underscore but don’t support special characters.

However, searching by hashtag on Facebook is a little unlike the rest, in that when you search for a hashtag you often end up on a Facebook page instead of a hashtag search result page. But there’s an easier way to generate hashtag search results - simply add the hashtag text after facebook.com/hashtag/, for example facebook.com/hashtag/cats.

You can also bring up hashtag search results by clicking on any hashtag in your Facebook stream. Do keep in mind that Facebook’s ranking algorithm is complex and seems to classify hashtags according to how closely you are related to the person posting the update, as well as how often the two of you interact.

The growing use of hashtags has changed how we use different social media platforms for the better. Still, it’s important to understand how these different platforms make use of hashtags in order to optimize them to your business’s advantage. Looking to learn more about how social media can help your business? Contact us today!

Published with permission from TechAdvisory.org. Source.

Topic Social Media
March 13th, 2015

InternetSocialNetworkingandReputationManagement_Mar13_CDoes figuring out how to grow a social media audience for your business leave you scratching your head? Do you wonder if it even matters if you have a social media presence in the first place? If you’re asking yourself these questions, then look no further. Here’s why social media is important, along with some key tips that will grow your audience and get your business the attention it deserves.

Why social media is a must for marketing your small and medium business Social media is at the forefront of the “soft sell” revolution. In fact, social media advertising can sometimes be such a soft sell that, when you’re on the receiving end, you may not even know you’re being sold anything in the first place. For example, you may have a friend who posts fun articles from their blog or pictures of their artwork (that they actually make a profit from) on Facebook. You may enjoy their content so much that you decide to share it and pass it along to friends and family. Know what you just did? You just became a marketer for their business. That simple share may just have garnered them a new customer and more profits.

This is why it’s an absolute must to carve out your piece of the pie in social media. You’ll grow your fanbase, and potentially create a following of loyal supporters who are happy to market your business - some of whom won’t even be aware they’re doing it. Here are a couple of tips on how to grow your social media audience.

Publish content

Every piece of content you publish is an advertisement for your business, regardless of whether you’re directly selling a product or sharing fun information. Not only that, but if you publish valuable content often, your readers will know you’re a reliable go-to source for information on your topic. That leads to a good reputation, people spreading the word about you and, consequently, referrals. You’ll grow your fanbase and online presence simultaneously.

Be human, be genuine

Trust is key. To become a player in social media, your audience needs to trust you. And if you want long term success in social media, that trust needs to be genuine. People can smell a faker, even over the Internet.

So be human and genuine with your customer interaction and published content on social media. If you do, you’ll develop a fan base that truly loves you and will be spread the word about your business without being prompted.

Think about it, how many times have you recommended a business that you love to one of your friends or family? When you did this, you didn’t believe you were marketing someone’s brand, but helping your friend or family member out. You wouldn’t have done this if you didn’t trust this business or believe their product or solution to be genuine.

Give back

To take the point above a step further, why not do a community service project in your local city or town? This gives you an opportunity to document the experience on social media. As mentioned above, this content is free advertising. And if you do something that is unique and genuinely helps your community, people are likely going to share it - growing your fan base in the process. In the end not only do you win, but also your fans and community.

Want more social media tips to help you garner an outstanding online reputation? Get in touch and see how we can assist.

Published with permission from TechAdvisory.org. Source.

March 9th, 2015

BusinessContinuity_Mar09_AYou’ve been putting that business continuity plan off for months now, but you’ve finally decided to go through with it. You start by talking to members of your staff, partners and service providers. And it doesn’t take long to see that everyone has a different opinion about what to recover first when disaster strikes. The head of your IT department demands your servers are top priority, while your Vice President argues that without network security being reestablished pronto, your business is left vulnerable to even further damage. Who’s right? It may be difficult to decide. That’s why we’ve compiled these fundamental ideas to consider when drafting your business continuity plan.

Speak to many members of your organization

And not just your IT department - which may sound like a bit of an oxymoron coming from an IT provider’s blog. However, the reason behind this is simple. Suppose you have an IT staff member called Jane, who is responsible for a series of applications that automate your e-commerce system. If you call a business continuity meeting concerning to identify assets to prioritize during a disaster, what do you think Jane will say? She’ll likely point to her group of applications, since to her this is what she prioritizes and spends her days on. And it’s not just Jane; each staff member will probably voice that their particular job (whether that’s security, server maintenance or something entirely different) needs to be prioritized. It’s human nature to think of your responsibility and role first. We all do it.

The key is to get more than one opinion. It’s not a bad idea to start with the leaders of your company, and then work your way down. Leaders generally think in a broader sense about your organization as a whole, rather than one particular facet of it.

Consider where your business is going

When developing your business continuity plan, it’s easy to fall into the trap of thinking about your business as it is today. While you’ll draft your plan in the present, it needs to be created with the future in mind. For example, if you’re considering joining the Cloud or virtualizing your servers in the next year or so, how is this going to impact your plan? It’s smart to think of this sooner rather than later, as it could cause a major shift in your priorities. If you start deploying your business continuity plan but then have to switch gears further down the line, it’ll likely cost your company a lot of money.

Examine the interdependency of your business

Remember to connect the dots between your IT department and business processes. For instance, if your email system can’t run without the use of a particular IT application, it will do no good for you to have your email system as a priority 1 issue and that IT application as a priority 3. In this scenario, the IT application would need the same priority as the email system - if not higher, or else your email system will simply not work.

The point is to map out the interdepencies of your business processes and IT, so that you know what depends on what. That way you’re not left in a pickle when disaster strikes.

Need help getting started with your business continuity plan? Contact us today to learn how we can help.

Published with permission from TechAdvisory.org. Source.

March 6th, 2015

Android 164 CIt’s a beautiful sunny Thursday afternoon as you lounge on your beach chair in the Bahamas. You feel the warm ocean breeze on your skin while you attend a work meeting at your office in upstate New York. You tease your coworkers about the snowstorm they’re experiencing as they...wait a minute. How can you be in the Bahamas and at an office meeting in New York at the same time? Sounds too futuristic? Maybe not. The new telepresence robot that pairs with Android tablet may make this scenario a reality sooner than you think.

What is a telepresence robot?

A telepresence robot is a remote controlled mechanism that acts as a robot when you can’t physically be somewhere in person. It uses a video enabled device that allows you to see and be seen, giving you a physical presence while you’re somewhere else in the world.

The telepresence robot that pairs with Android is not the first of its kind on the market. Both iRobot and Double Robotics have wheeled versions that were released in the past few years. The latter pairs with the iPad and navigates its environment using a segway.

What’s the deal with the Android version?

The Android tablet version that couples with the telepresence robot is called Origibot and is currently being crowdfunded on Indiegogo. Yes, that means there is a chance it may not see the light of day but, after raising 30% of its $18,000 goal in just three days (and with another 38 to go), people are clearly excited about the tech behind it.

The Origibot is roughly 29.5 inches high, made from both aluminum and stainless steel. It has wheels so that it can move around. And it comes with an optional arm and gripper. According to its creators, the Origibot can fill your pet’s bowl with water, carry drinks, water your plants and even bring Grandma her meds!

From a business perspective, an Origibot can take your place at the office if you’re a telecommuter. Then you’ll literally have a physical presence for meetings while you’re at home on your sofa or taking care of another matter.

How does it work?

Simply attach your Android tablet to the Origibot. Your tablet then connects with another Internet-enabled device that you control, through the company’s secure Cloud service.

Your connected device acts as a remote control for the Origibot, while the tablet allows you to see and hear what is happening in the space your Origibot occupies.

The advantages of Origibot

There are other telepresence robot options available. But what makes Origibot different is its price. If you pledge in advance on Indiegogo, you can get an Origibot from anywhere between $329 and $599. Once it hits retail, that price is projected to rise to $499-$899.

Compared to its competitors, this is extremely affordable - iRobot and Double Robotics both cost over $2,000.

The other difference is its size. The metal bar of the Origibot’s body is just a few inches in diameter and the wheeled base is 12.5 by 14 inches. This will make it easy to get through narrow places or maneuver around people. Perfect for serving drinks at that cocktail party you’re out of town for.

Want to learn more about the possibilities of the Android tablet? Contact us today.

Published with permission from TechAdvisory.org. Source.

March 4th, 2015

Sec C 164Are you concerned about internet security? Did you know there are a few simple ways to get increased protection that require only minimal investment of time? We’re not just talking about changing your passwords regularly or installing antivirus software. There are a few other methods that are less often talked about - here are three tips to boost your internet security that you might not have thought of yet.

Embrace two-factor authentication

Also known as two-step verification, most of us have likely dealt with this at one time or another. When you’re logging onto your bank’s website or your email account from a different computer than you normally use, you’re sometimes prompted for a one-time password - sent to you via text message, email or via some other method.

Nowadays, many sites such as Facebook, Dropbox and Twitter also give you the option to use two-factor authentication each time you log in. So if you’re looking for an easy way to up your security, it can give you that extra protection without slowing you down too much.

Update browsers and devices

Did you know that dated versions of browsers, operating systems and even other software packages can create an easy entry point for hackers? Often, new updates are created specifically to fix security holes. And hackers are ever aware that people can be lazy - saving that update for another day that never seems to come. They’ll often try to take advantage of this, searching for outdated devices to infiltrate while their victims watch YouTube on last year’s version of Firefox.

Yes, installing an update might take 15 minutes of your time. But it can pay dividends in preventing a security breach that could cost you or your business thousands.

Use HTTPs

When was the last time you typed those letters into a browser? Probably not this decade. It’s no wonder most people are unaware of this tip. So for those who are oblivious, https is the secure version of http - hypertext transfer protocol. Believe it or not, that last “s” actually adds an extra layer of protection. It encrypts information sent, both ways, between a website’s server and you.

You’re probably thinking, adding that last “s” to http (or even typing in http in general) is a complete pain in the rear. So to make this easier you can actually install a program like “HTTPS Everywhere” that’ll automatically switch an http into an https for you. Currently “HTTPS Everywhere” is available for Firefox, Chrome and Opera.

Looking for more tips to boost your internet security? Get in touch to find out how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Security