Blog

December 18th, 2014

SocialMedia_Dec15_CMeasuring the overall success of a marketing campaign is often dependent on a number of metrics. When it comes to measuring the success of your social media campaigns, the most common metric employed is the number of shares. Companies who post content online often find it difficult to get their content shared through. If this resonates with you then here are four common reasons as to why your content might not be be shared and what you can do about that.

1. The vast majority of people are hesitant to share content

According to a study conducted by Carnegie Mellon University and Facebook over a 17 day period, approximately 15.3 billion comments and posts were written but were then deleted and not posted on Facebook alone.

While the reasons will have been varied, the numbers highlight that the vast majority of users are sensitive to what they post on Facebook, and most most likely other networks as well. What does this mean for businesses? Well, you need to ensure that the content you are posting offers value to not only your audience, but their audience as well.

Think about when you have shared content on any network. You probably didn't do so 100% for yourself, but instead shared the content or created a post so your audience would interact with it, or possibly get something out of it. Think of this as the "hmm, that's interesting, other people will like it too, so I'll post it" mentality. By sharing content others enjoy or respond to you get the benefit of increased recognition.

If you can create content that gets people to think this way, there is an increased chance that they will share it.

2. Facebook users want to be seen in a positive light

According to a study carried out by INC. 80% of respondents share content because it shows that they are being a good friend to those they care about. People use social media to foster good relationships and connect with those they care about. And if somebody regards your posts as potentially able to tarnish their image on social media, they won't share it.

Businesses looking to capitalize on this need to try to create content and campaigns that help users better relate to one another. Combine this with the above example of creating interesting-to-share content and you will be more likely to see an increase in shares.

3. Content doesn't fit our salient identities

Because social media has become an extension of society, many experts apply common social science principles to it. The most commonly applied theory is of the five identities (relational, personal, social, superficial, and collective) that determine how people behave in a certain situation.

If you are posting content that doesn't fit with an an individual's current identity then it's not going to be shared. So, how can businesses capitalize on these changing identifies? One effective way is to get to know your main target audience; how they act and react to certain social cues, and then create content to fit with this behavior.

For example, if your target group for posts is parents, then using language and content that triggers parental instincts could increase shares as parents associate better with it.

You might want to widen your focus too and try developing content that capitalizes on different identities, tracking what works best.

4. Content doesn't mesh with a user's values and goals

The same INC. study found that after being a good friend, 63% of users surveyed noted that they were more likely to share content that reflected their goals, values, and dreams.

How can a business capitalize on this? The best way is to get to know your audience. Look at their posting and sharing habits and the type of content they share on a regular basis. This may change over time, but you will see patterns evolve for different groups. If you can develop and post content that reflects these main goals and values then you are more likely to see your content being shared. Try different approaches and keep in mind who you are developing content for.

If you are looking to learn more about social media, contact us today to see how our systems can help you integrate it with your business success.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
December 17th, 2014

Office365_Dec15_CMicrosoft is one of, if not the, world's largest software developer. One of the more increasingly popular solutions being adopted by businesses is the cloud-based Office 365. While popular, one problem many business owners face is selecting which of the many different versions to implement. To help, here is an overview of the most popular Office 365 options for businesses.

A brief look at Office 365

The easiest way to classify Office 365 is as a cloud-based version of Microsoft Office aimed at businesses. This subscription-based service offers businesses all the productivity software they need plus a solid platform for their communications. Think of Outlook combined with Lync (or Skype) and Office apps, all of which are accessible via your browser, or can be installed on your own servers.

Beyond this, there is a supporting layer called SharePoint that links all of these apps together, thereby giving you a central place to store all of your documents which can then be collaborated on using various Microsoft apps.

As noted above, Office 365 is subscription based. The business-oriented subscriptions are broken down into two main categories: Business and Enterprise subscriptions. Of course, there are other subscriptions for other categories like Education and Government, but we will focus this overview on the two main small to medium business categories.

Business subscriptions

There are three plans under the Business subscription category:
  • Office 365 Business Essentials - Comes with online versions of Office apps (Office Web Apps), Lync for business, online storage through OneDrive and a corporate email address. This plan is ideal for businesses who don't need full versions of Office apps. Plans cost USD 5 per user, per month on an annual commitment.
  • Office 365 Business - For businesses who need installable versions of Office along with cloud-storage through OneDrive. It does not come with hosted email or business communication tools like Lync. If you already have hosted email, and are just looking for Office apps, then this could be a good plan for you. Plans cost USD 8.25 per user, per month on an annual commitment.
  • Office 365 Business Premium - This subscription is for businesses who want the whole package. It combines all the elements of the above plans into a solution which is ideal for smaller businesses or even enterprises. If you are looking for a full solution, then this plan could be the best fit for your business. Plans cost USD 12.50 per user, per month on an annual commitment.
It is worth noting here that all three of these plans have a limit of 300 users per plan, giving you a maximum of 300 subscriptions.

Enterprise subscriptions

These subscriptions are aimed more at larger organizations, or businesses who need more control over Office 365 and access to features like Business Intelligence, Enterprise Management apps, and even business portals. As with the Business subscription category, there are three main plans in the Enterprise subscription category:
  • Office 365 Enterprise E1 - Comes with online versions of Office apps (Office Web Apps), Lync for business, online storage through OneDrive, a corporate email address, and a corporate video portal. This plan is ideal for businesses who don't need full versions of Office apps. Plans cost USD 8 per user, per month on an annual commitment.
  • Office 365 Pro Plus - This plan is for businesses who need installable versions of Office along with more advanced apps like Access, and cloud-storage through OneDrive. It does not come with hosted email or business communication tools like Lync. If you already have hosted email, and are just looking for Office apps, then this could be a good plan for you. Plans cost USD 12 per user, per month on an annual commitment.
  • Office 365 Enterprise E3 - This subscription is ideal for companies who want absolutely all Office 365 has to offer. This includes all of the above, plus advanced business intelligence tools, compliance protection, enterprise management, and more. If you are looking for a full solution, then this plan could be a good match for your business. Plans cost USD 20 per user, per month on an annual commitment.
Businesses who subscribe to Enterprise plans can sign up for an unlimited number of subscriptions.

Which plan is best for my business?

This is a tough question to answer outright. What we recommend is contacting us. As experts in all things Microsoft, we can work with you to not only help you pick the plan that is best for your business, but ensure it is installed correctly. This can help further reduce costs and increase productivity.

Contact us today to learn more about how Office 365 can enhance your business.

Published with permission from TechAdvisory.org. Source.

December 9th, 2014

Facebook_Dec08_CFor many business owners, Facebook is both a blessing and a curse. While it is a great way to connect with customers, it can also be a major distraction for employees. Let's face it, Facebook is here to stay, so there's no getting round that, but there could be a way of stopping the social media site from being a negative in the workplace. The company has just announced that they are working on a new social network, potentially called Facebook at Work, which will be aimed specifically at businesses.

What is Facebook at Work?

In late November, Facebook announced that they are developing a new social network which may be called Facebook at Work. As you can guess by the clue in the title, this is going to be a business-oriented venture that will bring the popular social network, or elements of it, to the workplace.

For many businesses, this popular social network is not really a part of every business operation. Sure, marketing and sales may use this platform, and others, as a way to reach out and connect with customers, but few organizations are known to use Facebook internally as a communication and social network for employees.

Those who do use the network in the office often use their personal accounts and have noted that they would like an easy way to separate work from personal life, while still remaining on the network. Many businesses would also prefer that employees didn't bring their personal lives and Facebook accounts to the office because this can lead to breaches in privacy and even important data being compromised, especially if a personal account is hacked.

The best way to think of this new platform is that it is Facebook strictly for work. While it is still in the development stages, some interesting details have emerged. There is no official name for the network, thus far, but sources at Facebook have noted that the codename for the product is Facebook@Work.

What Facebook@Work will look like

From what we can tell, the network will look and work much the same as the existing version of Facebook. Users will be able to create profiles, join groups, post on each other's News Feeds, and even send messages using the popular Facebook Messenger. Where it will differ is that it will have collaborative tools that allow users to share and work on the same documents.

This network will be completely separate from the personal Facebook site, with users having a different password and username. Information between a personal and work account will not be shared either. This should make the network more secure, or at least minimize the use of personal accounts for work-related tasks.

What we don't know

We do know that Facebook@Work, or Facebook at Work, is currently being developed by a London-based branch of Facebook who seem to be also acting as the main testers. However, we are unsure at this time if the network is being developed strictly as an internal network, which will be used only within a company, or if it will be more like LinkedIn, where it will allow you to connect with similar professionals.

Interestingly enough, Facebook has been using its own network and various groups as a major part of their own internal communication tools amongst departments. For example, when an employee joins a new department they are added to a secure group and group chat where updates are posted, questions are asked, and work is supposedly assigned and agreed upon. It could be that the company is developing something along these lines for external release too.

We don't know exactly when this network will be introduced, but you can be sure that it will be debuted sometime in 2015, possibly with a rollout in the next year. If your business uses social platforms, or is looking to integrate social media in the near future, this business-oriented social media platform could be worth keeping your eyes on.

Stay tuned as we will be covering this further in the future. Meanwhile, if you have any questions about how best to utilize Facebook in the office please contact us today.

Published with permission from TechAdvisory.org. Source.

December 3rd, 2014

Security_Dec01_CMalware is a constant threat to a business's security. However, with many malware infections we tend to be able to learn a lot about them in a very short amount of time, which weakens the power of each attack. There is a new threat called Regin however, that is leaving many security experts baffled. Here is an overview of Regin and what it means exactly for businesses.

What exactly is Regin?

What is most interesting about Regin is that a number of security experts seem to not really fully understand it. They know that it exists, they know it is complex, and they know it is one of the most advanced pieces of malware ever created. But, they don't know what exactly it does, or where it comes from.

What we do know is that Internet security firm Symantec is credited with first bringing Regin to public attention, and that it has been around since at least 2008. So far, the company has said it is similar to the Stuxnet virus that was supposedly developed in (or by) the US and used to attack and subvert the Iranian nuclear program.

Regin is known to infect Windows-based computers and at its core is a backdoor trojan style of infection. From detected infections it is looks like the purpose of the malware is not to steal information but to gather intelligence and facilitate other types of attacks.

What makes this malware so powerful and disturbing is that it is much more advanced than other infections. Using various encryption methods it can hide itself extremely well, making it difficult to detect. It can also communicate with the hacker who deployed it in a number of different ways, thus making it a challenge to block or stop. As a result, it is far from easy to actually figure out what exactly this malware is doing and why.

Who has been infected?

According to various security experts we have been able to compile a list of companies and organizations that have been targeted to date. These include:
  • Telecommunications companies
  • Government institutions
  • Financial companies
  • Research companies
  • Individuals and companies involved in crypto-graphical and mathematical research
At the time of this article, no known attacks have been carried out against companies in the US, Canada, or the UK. The main countries targeted so far have been Russia and Saudi Arabia, along with a smaller number of infections in Malaysia, Indonesia, Ireland, and Iran. A total of 10-15 countries have been targeted since the malware was first discovered in 2008.

Is this a big deal for my company?

Just because your company is operating in a country that hasn't been affected thus far, doesn't mean that you aren't at risk of being attacked by this malware in the future. If you operate in any of the industries or sectors listed above, you could still be at risk, especially if you do business with clients in infected regions.

For now, however, it appears that Regin is only infecting larger government bodies and large companies outside of North America and much of Europe, so the chances of you being infected are relatively low. Although as with any threat, this can change at any moment.

What we recommend is that you ensure your antivirus and antimalware solutions are kept up to date and always switched on. You can rest assured that eventually experts will learn more and block this malware from infecting systems. Beyond this, working with an IT partner, like us, who can ensure that your valuable data and systems are secure, is also be a good idea. The same goes with watching what you download and any emails you open. If you don't know or trust the source, don't download any program, open an attachment, or read an email connected to it.

Looking to learn more about the security of your systems? Contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Security
December 3rd, 2014

AndroidTab_Dec01_COne of the most popular gifts of the holiday season is the tablet, and more specifically the Android tablet. Because there are so many different options to choose from, it can be difficult to actually pick the best, or the right, tablet to give as a gift. To help, we have come up with some important factors to consider before you purchase your festive present.

Consider your budget

The great thing about Android is that there are tablets available for a wide budget range; from the ridiculously affordable, yet highly praised, Amazon Fire HD 6 (USD 99 on Amazon.com), to the top-of-the-line Samsung Galaxy Tab S (USD 350-400 in stores). You firstly need to set your budget.

Look at reviews online

There are a ton of websites dedicated to reviewing tablets and other mobile devices. Take for example the well known Engadget, or Trusted Reviews. Sites like these generally give a good overview of the new and most popular devices out there. Pay close attention to the criteria used though, as some review sites tend to only look at basics such as battery life and design, without going too deep into the actual usability.

It is also important to look at actual user reviews. The best place for this is Amazon.com, as almost all reviews of devices on the site are submitted by users. While some reviews may be overly positive or negative without actually revealing reasons, generally speaking they provide an accurate real-life picture.

What will the tablet will be used for?

Many tablets offer special features and functions aimed at different types of users. For example, some offer increased security and encryption that is ideal for the business user, while others may offer features such as pen support which turns the tablet into a drawing pad. If the recipient is likely to be using the tablet for work, then your search should focus on specific, business-oriented devices.

Who will be using the tablet?

Tablets running Android 4.4 (KitKat) and Android 5.0 have the ability to establish different profiles for different users. So, if you know that the tablet will be used by a variety of people then it would be best to purchase a tablet incorporating either of these versions.

If you know that children will be using the tablet, there are a number of apps with features that set the tablet up for children. For example, some will block the Google Play store, and any apps that are deemed unsuitable for children. It might be a big help if you install this beforehand.

What is the technical ability of the user?

It's true that almost every tablet is designed to make it simple to pick up and figure out. But some tablets are aimed more at specific users than others. Take for example Google's Nexus line, which is aimed at users who want a simple tablet experience and the most up-to-date software. Users with more tech experience generally find the Nexus line more preferable.

Other tablets come with super simple setups and many popular apps pre-installed, which could make them more suited to users who may not know much about Android, or simply just want to pick up their tablet and go.

Look at durability and features

As with most tech-related purchases, you generally get what you pay for. So, if you want a tablet with top-of-the-line features like a great display, fast processing speeds, and LTE/Data connections, you are likely going to have to pay more.

A good starting point is to look at the questions you answered above about who will be using the device and what they will be using it for, then look for a tablet with features that support or enable this and that has positive reviews. While it may be tempting to stick with brand new tablets only, be sure to look at those released in the past year to year and a half as well. For example, the terrific Nexus 7 tablet (2013 version) is still a great option for many users, not to mention the fact that it is available at an affordable price. Manufacturers like Samsung also have a number of great tablets available with a wide variety of features.

Almost above all else, the overall durability of the device is important. If you purchase a tablet with flimsy construction, there is a good chance it will soon break or fall apart easily. Again, online reviews often focus on the build quality, so these could be a good starting point. Also going to the store and physically trying the devices out could go a long way in helping you pick the best one.

If you are struggling to find the perfect tech gift or Android tablet this holiday season, contact us today to see how our experts can help you find what you need.

Published with permission from TechAdvisory.org. Source.

December 3rd, 2014

GeneralHealthIT_Dec03_AYou may not want to rely on the Food & Drug Administration’s (FDA’s) app approval system: Roughly 90 percent of Android health-care apps have been hacked, and 22 percent of them were FDA-approved. That information comes from latest State of Mobile App Security report from Arxan Technologies, which attributed the high rate to a lack of information-security training and resources in the health-care field.

Of health-care apps, none that were Apple iOS-based have been hacked. But, looking at all apps, the risk is close between Android and iOS. Looking at the top 100 paid apps, 97 percent of those that are Android-based have been hacked, and 87 percent of those that are iOS-based have been hacked.

Because health-care apps tend to hold confidential patient information, these breaches present serious risk. “Make application self-protection a new investment priority, ahead of perimeter and infrastructure protection,” says Joseph Feiman in a Gartner Maverick Research report, “Stop Protecting Your Apps; It’s Time for Apps to Protect Themselves.”

Click here for an infographic that shows the state of app security, and contact us if you are looking to make sure that your apps are secure.

Published with permission from TechAdvisory.org. Source.

December 2nd, 2014

Office365_Dec01_CLike it or not, you have probably been using cloud systems for longer than you may think. When it comes to Microsoft, there is one newer cloud app that almost all users have access to: OneDrive. However, what you might not be aware of is that there are two versions of this platform, which can cause confusion as to when they should be used and what exactly they are for.

What is OneDrive?

If you use Microsoft apps and programs there is a good chance you have already heard of OneDrive, and if you haven't, you will certainly be hearing more about it in the coming months. Regardless of what version of OneDrive you have, the idea behind the platform is that it is cloud-based. When looking into this app you will find that there are two versions: OneDrive for personal users and OneDrive for Business.

OneDrive for personal users

OneDrive for personal users, or just OneDrive for short, is Microsoft's cloud-based document storage system. If you have a non-business account with Microsoft e.g., an older Hotmail account or a newer Outlook.com account, you have access to this storage solution.

The tagline for this service is, "One place for everything in your life", which makes it pretty clear that this is for personal use. When you upload, or "store" files on your OneDrive account you are storing them using Microsoft's cloud technology which is hosted and managed by servers Microsoft owns. This makes the files available on any device, as long as you log into your account on that device. In other words, this is cloud storage.

OneDrive for personal use is free for all users. All you need is a Microsoft account or email address which can be obtained for free at outlook.com.

OneDrive for Business

This service is actually quite different, and even though the general concept behind both of the platforms is the same: cloud storage, the similarities pretty much end there. OneDrive for Business is a place where you can store, sync, and share your work files. As such, you need to subscribe to one of the various Office 365 for Business subscription plans.

Unlike the personal version of OneDrive, OneDrive for Business utilizes a platform called SharePoint to host and deliver storage services to business users. Businesses can opt for a Microsoft hosted version of SharePoint, or an on-premises version which they install and maintain on servers in the office. This makes the app manageable by business owners and IT partners, and can be done so through the Office 365 admin panel. Beyond that, if businesses decide to host SharePoint on their own servers, they can assign as much or as little storage to individual accounts as they so choose.

With this solution you can upload and share documents with other colleagues and even work on these files at the same time, with changes being made in real time. Business owners and managers can also better manage this solution thanks to powerful administrator tools.

A real plus point about OneDrive for Business is that Microsoft has recently announced that Office 365 users will receive unlimited storage space starting in the near future, (the end of 2014 for Pro Plus subscribers, early 2015 for other plans).

In summary:

  • OneDrive is for personal use, and has been designed to allow users to store and access any files.
  • OneDrive for Business is for business use and requires an Office 365 subscription plan. It allows users to store, access, share, and collaborate on files with other colleagues, and can be hosted either off site, or on site using SharePoint.
If you would like to learn more about these two platforms, contact us today and we can make sure that you are making the most of the technology that's available to enhance your business success.
Published with permission from TechAdvisory.org. Source.

November 25th, 2014

BCP_Nov24_CRegardless of what your business is, or where you are located, you may at some point face a disaster that affects your business operations. In order to make it through troubled waters without serious harm to your business you need to have a Disaster Recovery Plan in place. To help ensure that your strategy is ready, here are five tips that other businesses have learnt from facing disasters that you can work into your plans.

1. Have a full copy of your data backed up outside of your operating region

Almost every company, regardless of size, has backup measures in place. These backups can be either physical or digital, and are supposed to be carried out on a regular basis. If a disaster strikes, having access to your data can help ensure that you can recover your systems and resume operations in the minimal amount of time.

While backups are great, if you keep your backups in the same area as your main systems, or even if your offsite backups are in the same region, there is a chance that a large disaster, like a flood, or power outage, could also affect these backups too. One of the best solutions is to keep a current backup offsite, and outside of your operating region, with most experts recommending at least 150 miles (250 km) away from your main business area.

How do you achieve this? The best option is to use cloud-backup. Many providers host their backup service at a number of different data centers in various locations, so that should a disaster strike both your business and a nearby data center, your data is still safe at other centers.

2. Realistically test your plan

It can be tempting to simply develop a plan and then test it in a closed environment once or twice a year, make some changes where necessary and then sit back and hope it works. In truth, for any plan to really be effective it needs to be tested in a realistic environment. If this is not carried out then there is a possibility that the plan could fail when activated.

Because disasters come in almost any form and size, you are going to want to first identify as many potential problems as possible. From here, test your recovery plans based on these scenarios and see how effective they are. Be sure to also involve your colleagues and employees, as they too will need to know what to do when disaster strikes and what their role in the recovery of data is.

A good way to look at these tests is to think of them more as practice runs. As with anything, the more your practice the easier and more effective it becomes. In this case, good practice could literally save your business.

3. Update your plan as you update your systems

When you develop a recovery plan, you need to base it on the systems and technology you currently have in your business. However, these systems and devices may not be in use six months, to a year from now, or you may introduce new systems and improvements.

As soon as you make any changes, your existing recovery plan could become obsolete. Therefore, you need to ensure that when you introduce new systems or technology you are also updating the recovery plan to cover and fit with these changes.

4. Create an accessible plan

Many experts agree that having a physical plan that employees can see and access during a disaster is one of the best ways of ensuring that it is actually implemented properly. Therefore, when you develop a Disaster Recovery Plan make sure that all of your employees can access it at any time. This includes during and immediately following a disaster.

Beyond this, you need to make sure that the plan is consistent. If you update the master plan, but fail to update the copies you store in say a public cloud, or at different worksites, this will lead to confusion and even an increased recovery time or complete recovery failure. When you do update your plan, let all parties involved know that it has been updated and remind them where they can find copies of the plan.

5. Don't be the only fully-trained disaster recovery expert in your company

As a business owner or manager it can be easy to try and run everything yourself. Afterall, it is your business and you know exactly how to look after everything, right?. The problem is that if you are the only fully-trained disaster recovery person you are making yourself the weakest link in the plan.
Published with permission from TechAdvisory.org. Source.

November 21st, 2014

Security_Nov17_CNet Neutrality is one of the biggest tech-related issues currently making its way through the American Government. In mid-November President Obama made his stance on the issue known, while also introducing a plan for it and thereby bringing the subject to worldwide attention. Here is an overview of what Net Neutrality is and how it can affect you.

What is Net Neutrality?

In order to define Net Neutrality, we should first look at the main idea behind what the Internet is: a free and open medium where individuals can express and house thoughts, ideas, and more. It was founded on one principal, and one principal alone: All information and Internet traffic MUST be treated equally.

This free, open, and fair principle is what we call Net Neutrality. In practice, this idea prevents Internet providers, and even governments, from blocking legal sites with messages they disagree with, and restricting access to services and sites that don't meet their business needs.

What exactly is the issue?

At this time, major telecommunications companies providing Internet access are trying to push legislation through the US court systems that will essentially make it legal for them to throttle Internet speeds; asking other providers to pay fees in order to speed up access to sites and to even block some sites.

There are laws currently in place, set by the FCC (Federal Communications Commission), that prohibit providers from collecting, analyzing, and manipulating user traffic. In other words, according to the FCC, the role of the Internet providers should be to simply ensure traffic and data gets from one end of the network to the other.

Last year, it was uncovered that US telecommunications giant, and Internet Service Provider, Comcast demanded that Netflix pay them millions of dollars or they would limit the Internet speed of Comcast users trying to access the streaming service. Netflix tried to negotiate but the result was that Comcast did indeed cut user speeds. Netflix paid to avoid this from happening again. This act is an obvious breach of the main tenet of Net Neutrality: Equal access for everyone.

Combine this with the January 2014 ruling that the FCC had overstepped its bounds in regards to this topic and the increased lobbying by telecommunications giants against Net Neutrality, and you can quickly come to realize that the Internet as we know it is under threat.

How will this affect my business?

If nothing is done, there is a very high chance that you will be paying higher rates for Internet-based services (because the providers will be asking other companies to pay to guarantee speedy access which will then be passed along to you via higher rates). You may even be forced to use services you don't want to use because they offer better access speeds on your network.

Beyond this, because so many businesses rely on websites and the hosting companies that enable us to access them, there is a very real risk that these hosts may have access speeds cut. This in turn could mean that it will take more time for some users to access your website and services. Think of how you react when you can't access a website, you probably just search for another similar site which loads easily - now imagine this happening to your site. In other words, you could see a decrease in overall traffic and therefore profits.

What can I do about this?

First off, we highly recommend you visit The White House's site on Net Neutrality, and read the message that President Obama has recently posted there. To sum it up, he believes that Net Neutrality should be protected and the Internet should remain open and free. He has even laid out a plan with four rules that the FCC should enact and enforce:
  • No blocking - Internet providers are not to block access to any legal content.
  • No throttling - Internet providers cannot slow or speed up access speeds based on their preferences.
  • Increased transparency - The FCC is to be more transparent and push providers to follow the Net Neutrality rules.
  • No paid prioritization - There is to be a ban on providers insisting other companies pay to have equal access speeds.
You can bet that this plan will be met by stiff resistance both in government and by the telecommunications companies themselves. The FCC is an independent organization and it is up to them to select whether or not they want to enact President Obama's plan. One thing you can do is to publicly submit your comments to the FCC via this website. Any comments made will be seen by the FCC and are are publicly viewable. In the past, enough public pressure has been able to sway FCC decisions, so share this article and the links in it with everyone you know, asking them to take action as well.

What about other countries?

For now, the Net Neutrality battle is largely US based. The vast majority of Internet traffic starts or at least passes through the US. This means that if the telecommunications providers (many of whom own international subsidiary providers) can limit access to sites in the US it could very quickly become a world issue. Beyond this, other countries often follow laws that the US enacts, so it could only be a matter of time before we see similar bills passed in other countries.

In short, this is a major issue that could see the end of the Internet as we know it. If you would like to learn more about Net Neutrality and how you can help ensure the Internet remains free and open, contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Security
November 19th, 2014

SocialMedia_Nov17_CYou've heard it before, and will hear it again: In order to have an effective social media presence you need to be active on more than one network. Many businesses realize this fact and are active on networks such as Twitter. The problem with Twitter, however, is that it can be difficult to master. To help, here are 10 Twitter tips.

  1. Keep posts on the shorter side - This may seem ridiculous, after all there are only 140 characters allowed per tweet, but keeping tweets short allows users to add their own comments and ideas when they retweet. Try keeping your tweets below 100 characters.
  2. Twitter is not about promotion - Studies have proven that tweets that promote a company or product don't usually do as well as messages that are more conversational in nature. If you want to ensure maximum interaction, aim for a mixture of tweets that consists of about 80% conversational and 20% promotional.
  3. Know what time to tweet - Each market is different, so take the time to research tweeting habits. If you see that the majority of your target audience is active during after-work hours, then it would make sense to tweet when they are more likely to be online. Remember, many Twitter users are connecting via their mobile devices, so you are probably better off tweeting during lunch hours, as well as pre- and post-work.
  4. Know what days to tweet - Much like knowing what time to tweet, it is a good idea to also know which days are best to tweet in order to maximize engagement. For example, if you are trying to interact more with other businesses (B2B) then it is best to tweet on days when the companies are open and an owner or manager is more likely to be looking at business systems and social accounts. Customers, however, are usually more receptive to messages on days when they aren't working e.g., Saturday and Sunday.
  5. Use hashtags - Hashtags in Twitter allow for categorization and make tweets searchable. For example, if you use the hashtag #fresh in a tweet and then search for 'fresh' on Twitter, you should see similar posts using the same hashtag.
  6. Use hashtags sparingly - There is a common trend in social media to use hashtags for nearly every word. This makes posts difficult to read and usually leads to people not sharing or retweeting your content. Instead, try to work one to three hashtag, at most, into your tweets naturally.
  7. Realize Twitter moves fast - The average trend on Twitter lasts about one hour, to one day. So, if you see a trend developing or beginning, act quick to join the conversation. Posting after the trend has faded will usually lead to tweets being ignored.
  8. Don't act on every trend - Trends come and go so quickly on Twitter that it can be tempting to try to jump on each one, or as many as possible, in order to get your message out to as many people as possible. However, not every style and subject will be relevant to your business. By shoehorning content to fit trends you could come across as insincere and lose interest from followers.
  9. Watch who you follow - Following people is one of the quickest ways to grow your own follower base - usually because users will follow those who follow them. But, when it come to business, you want to be sure to follow users who are relevant. For example, follow your customers, strategic partners, and even competitors. Following Twitter users who aren't relevant to your business is not going to get your messages read by the right people.
  10. Keep an eye on Twitter - In order to effectively spot trends and see what your target market is saying, it is worthwhile to use a program like Tweetdeck, which allows you to see all tweets, track hashtags, topics, and more.
If you would like to learn more about using Twitter in your business, contact us today to see how our services and solutions can boost your social media presence.
Published with permission from TechAdvisory.org. Source.

Topic Social Media