Blog

July 10th, 2014

Security_July07_BAs technology continues to expand and improve, many people have come to prefer to use their own systems over their office's tech offerings. This is largely because many of us have newer personal devices that allow us to do so much more than the computers we use at our office. As a result, the issue of BYOD (Bring Your Own Device) has become far more important, especially due to the fact that if left unchecked, BYOD could pose a security risk to your organization.

What should I do about BYOD?

The first reaction of many office managers and business owners, worried about security threats that could stem from BYOD, is to impose an outright ban of devices. While telling your staff they are not to use their devices for work may seem like a quick and easy solution, you can be 100% sure that there will be employees who ignore this policy and use their personal devices for work regardless.

This could put your business at a higher security risk if the rule is ignored, especially if you don't implement any security measures to protect your networks and data. In order to minimize the potential threats BYOD can expose your business to, we suggest you do the following:

1. Consider embracing BYOD

Instead of simply banning personal devices in the workplace take a step back and look to see if there are any benefits BYOD can offer. For example, if you operate on razor thin margins and have not replaced hardware in years, there is a good chance your employees will have better systems at hand. This could help you reduce your overall tech costs.

The same goes for phones for your employees. Why not offer to pay for the plan and allow employees to use their own devices? Of course, you are going to want to implement security measures and usage rules, but if this is easily achieved then it may help reduce your overall operating costs. Before you do implement a system like this however, we strongly recommend you read the rest of this article and follow the steps below.

2. Set up separate networks for employee devices

Oftentimes, the main reason employees bring their devices to the office and use them for work purposes, especially when it comes to mobile phones, is because they can happily connect to Wi-Fi for free without using their data plans throughout the day.

Chances are high that because they use the work Wi-Fi on their device for non-work tasks, they simply keep using the device when they are doing work related activities. This could pose a security risk, especially if you run business-critical operations on the same network. You could nip this potential problem in the bud and simply install another Wi-Fi network for mobile devices and non-critical business processes.

It is usually quite affordable to simply purchase another line and the networking equipment to support this, not to mention the fact that it will keep business-critical processes secure from errant malware. As an added bonus, you will likely see increased productivity because the bandwidth demand will be limited, so important data will move quicker.

3. Educate your staff about security

In our experience, the vast majority of BYOD related security risks are exposed by mistake. An employee may have a virus on a personal phone and be unaware of it. When they connect to the network it can then be unintentionally spread to other computers resulting in a potentially massive security breach.

One of the simplest ways to prevent this is to educate your employees about proper mobile safety. This includes how to spot apps that could contain malware, sharing security threat updates, and teaching your employees how to secure their devices. You really need to stress just how important security is to them.

On top of this, contact an IT expert like us for a recommended anti-virus and spyware scanner for mobile devices that users can easily install. Encourage employees to not just install this but to keep it up to date too. Many of these mobile specific scanners are free and just as powerful as desktop versions.

4. Work with an IT partner to establish a solution that works for you

Beyond education and simple network establishment, it is a great idea to work with an IT partner like us. As experts, we keep tabs on the trends and solutions related to BYOD and will work with you to establish a program that works for your company.

It may be that you don't actually need to integrate BYOD but to update hardware or software to newer versions instead. It could be that there is a simple solution to employees feeling frustrated with slow performance of existing systems at work.

If you do implement BYOD, we can help establish security measures and policies that will ensure your networks and employee devices are secure. The best advice we can give however, is to do this before you start allowing BYOD, as it can be far more challenging to implement and enforce changes when employees are already using their devices at work.

Looking to learn more? Contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
July 10th, 2014

BI_July07_BAs businesses continue to become increasingly networked, there is an exponentially increasing amount of data being made available to them. While this data can be really useful, a lot of it can also be less so, or even useless. However, you are going to continue to collect data, and in order not to be overwhelmed with the sheer volume you should have a well defined data collection system in place.

What is well defined data collection?

Everyone collects data, even people who don't use computers. The key to being able to successfully leverage the data you have available to your business lies in a strong foundation - in this case, how you collect your data. With an appropriate system in pace you will know what data to collect and measure, and just how important it is. From here, you can more effectively analyze and interpret it, allowing you to make more informed decisions.

If you are looking to implement a new data collection system, or improve on how you currently collect it, here are six tips that can help:

1. Think about what customer interactions are important

Often the most important data you need is in relation to your customers. Your first step should be to define important customer interactions. For example, if you own an online store, you will likely want to know where your customers come from, the items they click on, items they add to their cart, and items they ultimately buy.

By first identifying important interactions to track, you can then look for metrics and data collection methods related to these interactions. This makes it easier for you to track the most important data.

2. Think about what behavior-related data is important

Don't just focus on those customers who have completed a purchase or followed through the whole business chain. Think about what behavior could produce data that is important to your organization.

To continue the online store example from above, this information could include how far down the page people scroll, how many pages deep they go when looking at product categories, how long they spend on a site, and where those who don't convert leave from.

Collecting and analyzing data like this can be a great determinant of what is working well and what needs to be improved upon.

3. Look at important metrics you use

Sometimes the way you collect your data will depend on how you plan to measure it. This includes the different metrics you use to define the success or failure of marketing plans, sales initiatives, and even how you track visitors.

Be sure to identify which ones your business currently uses, as these will often point you towards the relevant data you will need to collect.

4. Identify the data sources you are going to use

In many businesses there are redundancies with data collected. For example, a CMS (content management system) will often have some of the same data points as Web analytics, or a POS (Point of Sale) will have some of the same data points as an inventory system. Due to this, you are going to have to identify what systems will provide what data.

On the other hand, many businesses use data from multiple systems for one key metric. In order to ensure that you are collecting the right data, you will need to identify these sources and ensure that they are compatible with your data collecting system. If they aren't, you could face potential problems and even make wrong decisions based off of incomplete data, which could cost your business.

5. Keep in mind who will be viewing the reports

When implementing data collection systems and subsequent data analysis systems, you will likely start generating reports related to this data. It is therefore a good idea to identify who will be reading these reports and what the most important information they will need is.

This information will be different for each audience, so be sure to identify what data they judge to be important. For optimal results, you should think about who will be reading the data reports and what relevant data needs to be collected in order to generate them.

6. Set a reasonable frequency for collection and analysis

This can be a tough one to get right, especially if you work in an industry with high fluctuation or your business is in a constant state of change. Your best bet is to look at when you think you will be needing data. For example, if you are responsible to submit a monthly sales report it might be a good idea to collect data on at least a bi-weekly basis in order to have enough to develop a report at the end of the month.

You should also look at who will be getting the reports and how long different campaigns or business deals will be in place. The frequency will vary for each business, so pick one that works best for your systems and business.

If you are looking to implement a data collection system, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

July 9th, 2014

OSX_July07_BThe cloud is one of the most popular tech systems businesses integrate, with many relying on cloud storage solutions for backup or day-to-day storage needs. One issue some users have with cloud storage however, is over how secure it is. In an effort to ensure maximum security, many providers implement two-step authentication. The latest company to adopt this heightened security is Apple, who have just enabled it for iCloud users.

What exactly is two-step authentication?

Two-factor or two-step authentication as Apple calls it, is a security method whereby you need to supply two different pieces of information in order to access your account. For the majority of systems this means your password and another piece of identification or a code that has been sent to say a mobile phone or generated by a key fob.

The reason two-step authentication has become so popular, and is being implemented in numerous systems, is that it is more secure than just using your password to access your account. Because the majority of platforms choose to use your mobile phone to generate the second code - usually through an SMS - there is a good chance that other people will not be able to access your account.

In the specific case of iCloud, you will need to enter this code when accessing iCloud or iCloud Web apps like Calendar, Contacts, Mail or Notes. When you try to access an app on a new system you will need to enter your password and a four digit code sent to your mobile phone over SMS.

How to set up two-step authentication for iCloud

If you use iCloud or iCloud's Web apps you can enable two-step authentication by following these steps:
  1. Going to the iCloud website and logging in using the username and password you would like to enable the extra authentication for.
  2. Clicking on your account name, which is located at the top-right of the page, and selecting Account Settings.
  3. Clicking on your Apple ID followed by Manage your Apple ID in the new page that opens.
  4. Signing in with your Apple ID again and clicking on Password and Security.
  5. Entering the answer to two of your security questions and then selecting Continue.
  6. Reading the information about two-step authentication on the three following screens and clicking Get started.
  7. Setting a phone number in the following screen. Be sure to use a number tied to a phone that can accept SMS or text messages.
  8. Entering the code that was sent to the phone number you set in the previous step.
  9. Selecting your phone from the list of devices and clicking Verify.
  10. Entering the code that is sent to the device you just selected and clicking Continue.
  11. Printing or copying the verification key in the window that pops up. You will need to keep this in order to access your account if you switch phone numbers.
  12. Re-entering the verification key and clicking Enable two-step verification.
  13. Checking the box to show that you acknowledge the two-step verification and understand what it means.
  14. Clicking Done.
The next time you try to log into iCloud, you should be asked to enter the two-step verification code that will be sent to the mobile device you established in the steps above. It's true that this is a bit of a hassle to set up, but it really does enhance the security of your account and should be enabled, especially if you have connected a credit card or uploaded sensitive information to your account.

If you are looking to learn more about enhancing the security of your Mac laptop or desktop, contact us today to see how our systems can help.

Published with permission from TechAdvisory.org. Source.

Topic Apple Mac OS
July 8th, 2014

Web_July07_BThe cloud has really taken off in the past five years. So much so, in fact, that almost every major business system has a cloud offering. From email to CRM and accounting, chances are good you will find a cloud solution you can integrate with your business. Because of the abundance of systems it is common for business owners and managers to feel confused as to which systems they can, or should, move to the cloud.

Here is an overview of some of the more popular cloud solutions small to medium businesses might want to implement:

Email

All businesses, regardless of their size, rely on email these days. In the past, many businesses wanting individualized email addresses needed to host the email client on their own servers. This demanded an IT staff and investment into an email specific server, which many simply couldn't afford or manage themselves.

The cloud has changed all this for the better, by allowing you to move your email hosting to a cloud-based solution whereby you don't have to manage or invest in the hardware needed to run your email as the host is usually responsible for that.

What many business users enjoy about cloud-based email is that it is usually more affordable than an on-premise solution, especially if that existing set-up is an aging one. Switching to email in the cloud will reduce costs. On top of this, because these services are usually managed by a skilled IT company, you can guarantee that they are not only up-to-date but also secure.

File storage

Mention the cloud and many people automatically think of cloud storage services. These are a dime a dozen and are often the most popular type of cloud solution employed in businesses.

There are many business oriented cloud storage services that offer ample storage as well as the security needed to ensure that critical data is secure both on the service and when it is in transit between your systems and the cloud.

Much like email, many of these services are managed by IT professionals who ensure the system is up-to-date and secure. Also, some offer a storage rate that is on a par with, or less expensive than, physical hard drives, which can help you save money in the long run.

Hosting servers

Some businesses require numerous servers in order to support operations. A problem with physical servers is that they require in-house IT staff in order to manage them. They also can be quite bulky and resource demanding, which can lead to high IT bills.

One option many small businesses are embracing is the cloud-based server. The idea is that the same capability is delivered over the Internet, without the need for a server to be located at your physical business. This frees up space, while allowing for easier management.

When many business owners do due diligence on different server solutions, they quickly find out that cloud-based servers are often more economical in the long run, especially if the business is running older hardware or operating on a lower budget.

Ecommerce

Ask any business owner who runs an ecommerce business how resource intensive it is, and they will be quick to tell you that managing an in-house solution is not only costly, but can be inefficient, especially when you try to scale your store.

Over the past few years, a number of powerful cloud-based ecommerce platforms have been introduced that not only allow you to easily manage an online store, but also scale without the costly hardware investment. Beyond this, because the servers that host the cloud solutions pool resources, you can be sure that your store will always be available online, even if you are experiencing heavy traffic. This could crash on-premise solutions found in many small businesses.

Like many of the other cloud solutions, ecommerce cloud solutions can be managed by an IT team, leaving you to focus on running your business.

Document creation and collaboration

A common trend in many businesses is the increasing reliance on remote workers. If your company employs remote workers there is a good chance that you have run into at least some productivity issues. If you are using a traditional document creation system, time will have been lost passing different versions of documents back and forth and ensuring everyone is using the same version.

There are a number of great cloud-based document creation services available to businesses. These services offer features that ensure that documents are always up-to-date on all systems, while promoting collaboration.

Because these services are accessed over the Web, you don't need to purchase expensive licenses for each user, but pay a minimal monthly fee instead. In general, companies that have moved to a cloud-based document suite have seen a ROI in excess of 300% and an overall increase in productivity.

Backup and recovery

Believe it or not, your business is constantly facing disaster. Not every disaster will be enough to wipe your business out, but even a small one, like a hard drive crash, could be enough to put a damper on your overall business success and profits. It therefore pays to be prepared with a Disaster Recovery or Business Continuity Plan in place.

One of the most essential elements of these plans is a backup of your data. Because cloud solutions are off-site, you can backup your data and systems so these backups are available, should disaster strike and you can't access your data.

Many of these backup solutions can be automated to ensure systems are backed up regularly, and also offer speedy recovery time. Some businesses have seen their critical systems back online in as short as half an hour after re-establishing network connection.

If you are looking to move your business into the cloud, contact us today to learn more about our products and cloud services.

Published with permission from TechAdvisory.org. Source.

Topic Web
July 4th, 2014

BusinessValue_June30_BIn the first part of this article, last month, we began to take a look at the content companies create for social media and how they can go about not only getting it shared but also increasing the overall shareability of the content they create. From creating longer blog articles, to using images, and playing on certain emotions, we shared five useful content sharing tips. In this month's article, we look at five more tips that can help ensure your blog articles and content are more likely to be shared via social media.

6. Lists of 10 items are great

One of the most popular forms of blog article written these days is the list article. These articles usually cover three to more than 20 items or tips related to one central topic. Articles of this type are popular because they are not only quick to write, but are also quick to digest as they can be broken up into easy-to-read sections - perfect for those who scan articles on their mobile devices.

With so many lists out there, it can be tricky to nail just how long your list of tips, ideas, etc. should be. From social data pulled by social media experts over at BuzzSumo, it appears that articles with 10 list items get the most shares. It is therefore a good idea to strive to reach 10 points when creating this style of list article.

Some articles however can get quite lengthy, even with 10 items. One strategy might be to separate the list, like we have with this article. Of course, shorter lists can work well too, especially if these include powerful tips. We suggest trying to aim for 5-10 items when you are writing your list articles.

7. People share what they trust

This has been an age-old truth: people go with companies they trust. It has been proven time and again that users will often follow what their friends and people they trust recommend. What this translates to when it comes to the shareability of your articles is that the source of the content needs to be trustworthy.

This can be difficult to establish, especially if you are a new business or new to social media, One of the best ways to achieve this is to include bylines and author bios on your articles. Putting the name of the author (byline) at the top of an article and a brief bio at the bottom will help increase the legitimacy of the article in the eyes of the reader, increasing their trust levels over time,

Another quick way to increase legitimacy is to share an article on specific social networks. Your first thought is likely to be to share away on Facebook, but think about how Facebook is used - people generally share everything, even if it's not trustworthy. Instead, look to the more professional networks like LinkedIn and Google+. Generally, people on these platforms build more professionally oriented networks, often built on trust.

By sharing an article with a byline and bio with your groups in LinkedIn you can quickly build trust, especially if you are active within your network. Once people start to trust your content, there is a higher chance they will read it and consequently share it too.

8. What's old can be new

Have you ever followed a post on Facebook, or any other social media? If you have, you likely know how short of a lifespan content has - when it comes to shares at least. Almost all content posted on social media sites has a lifespan of about three days to a week at most. What do we mean by this? Well, normally after three days you will see the number of interactions - shares, likes, etc - drop by as much as 98%. Go beyond three days and you will usually see another huge drop in the number of shares from the three day mark.

Essentially after three days to a week, your content will likely not be shared or even seen. Most of us know this, and are often quick enough to produce more content and posts in order to keep followers engaged. However, some content can actually be re-shared to keep up or to further interest.

Not all content - articles included - can, or should, be reposted, such as time relevant content like an announcement. Reposting these three weeks after the fact likely does not provide any value to the reader. Content that is written to be always viable however e.g., tip articles, how-tos, etc. are great potential content for resharing.

Some information never really gets old and can be useful to a new audience. Resharing previously posted content like this ensures more people will see and interact with it. For best results, try promoting an article you think was useful about one week after you first posted. Also, be sure to look at season or holiday relevant content - there is a good chance this can be reposted at the relevant time.

9. Know when to share your content

Often, the most important key to increasing the shareability of your content is actually posting it when your desired audience is online. By posting at, or just before, these key times, you increase the chance of the content being seen and interacted with. While there is no set timeframe, you can figure out when best to post through trial and error.

Before you start however, look at your previous content and see when it was interacted with most. Take a look at the days and times, and track this for a few weeks. You should start to see a trend emerge, with the most interactions happening at a certain time and date. Also, apply a little common knowledge. For example, if your target audience is other business owners or managers, posting midday will likely mean content will be missed. However, posting after normal business hours could improve your chances.

From here, try posting content at different times to see what works, and adjust your schedule accordingly.

10. Realize this will all take time

When looking to improve the reach of your content, you need to realize this will take time. Even if you follow these tips, you won't see immediate results. Chances are high this will take months to pay dividends. The key here is to stick with it and to experiment. Try a few different strategies at a time to see what works and doesn't, then go back to the drawing board and improve your plans.

If you are looking to learn more about leveraging social media in your business, we may be able to help. Contact us today for a chat.

Published with permission from TechAdvisory.org. Source.

July 3rd, 2014

AndroidPhone_June30_BAs Android devices continue their steady penetration into the business world, we are starting to see a wider number of business oriented apps arrive on the Google Play store. One of the latest apps released could be incredibly useful for business owners who use Google Apps. In late June, Google announced that they had released the Slides app.

What exactly is the Google Slides app? I thought it was part of Google Drive...

As many who use Google Apps know, productivity apps like Slides, Docs, and Sheets are part of Google's cloud storage app - Drive. If you have used the Drive app on your phone or tablet, you likely also know that you can create, edit, and share documents via this app.

This development is an effort to extend the capabilities of Drive, while simultaneously making it easier for users to access their individual files. For example, if you are a heavy user of Slides it can be a little annoying and time consuming to open the Drive app, search for the file you want, open it, and start editing. Now, if you have the app installed you can open it for immediate access to your related files, in this case Slides.

The key here is to think of the Slides app as a branch of the Google Drive App, as all of your files are still linked to Drive. Create a presentation using the Slides app and it will show up automatically on Google Drive as well as in the app. This app has all the same features as the Drive version, it is just that the app has been specifically written for mobile devices and designed for ease of use.

What can I do with this app?

As we stated above, the main focus of the Slides app is to allow you to create and edit presentations from your Android device. As such, there are a number of useful features:
  • The ability to create and edit presentations offline. As long as you have accessed a Slides presentation while online, it will be made available for you to open and edit offline as well. You can also save individual presentations to your device's hard drive and have the file updated when the presentation is.
  • Advanced sharing features. You are able to share your presentation from a mobile device and have users on their devices or computers collaborate on the same file.
  • Automatic saving of presentations created and edited on the Web. As long as you have an Internet connection, changes made to files via the app will be synced with Google Drive and reflect on all versions of the presentation. If you are offline, the changes will sync when you are next online.
  • The ability to open, edit, and save Microsoft PowerPoint presentations directly from the app. This is a big feature, largely due to the fact that many businesses use PowerPoint instead of Slides. What this means for you is that you can view these files without PowerPoint installed on your device.
  • Full editing capabilities. You are able to create slides, add text, edit slide order and the overall format of your text and slides.
  • Present directly from your device. You can run presentations on your device or connect to a projector using adapters that can usually be purchased for your device.

Where can I find the Slides app?

This app is available now on Google Play. To install it you can:
  1. Open the Google Play app on your device.
  2. Press the magnifying glass and type in Google Slides.
  3. Tap on the app and select Install.
  4. Open the app when it has been installed.
When you open the app, you should see all of your slides related to your Google account pop up in the app.

If you are looking to learn more about Google's apps on your Android device contact us today to see how we can help ensure that you get the apps your business needs most.

Published with permission from TechAdvisory.org. Source.

July 2nd, 2014

Windows_June30_BHow did we ever manage without hibernation in the past? The feature was first introduced with Windows XP and is one of the operating system's (OS) most useful power functions. However, with Windows 8 this feature is not readily visible, so you need to find out not just what this feature is about but also how you can enable it on Windows 8.

What is Hibernation mode?

Hibernation allows you to power down your computer while retaining its current operating state e.g., leaving programs open. In other words, with hibernation, your computer saves the contents of its Random Access Memory (RAM) to your hard disk or other non-volatile storage, so that when you want to resume your work you can start where you last left off. Available on every Windows OS, hibernation can usually be set in your power settings manually or even automatically so that it activates when your laptop's battery is low.

How to enable hibernation on your laptop or computer running Windows 8:

  1. In your system tray, click the battery icon and select More power options from the panel that pops up.
  2. In the Power Options window, select either Choose what closing lid does or Choose what the power button does from the left panel.
  3. In the power options window, click on the blue text that says Change settings that are currently unavailable.
  4. At the bottom of the window, a new set of options will become available. Check the box next to Hibernate and click Save changes. Voila, the hibernate feature will now show up in the power options window that is displayed when you press the power button on your computer or laptop.
This feature allows you to resume work from where you left off within seconds, since you don’t have to boot up your computer nor re-open programs you were using. Not only that, but hibernation saves more battery power than sleep mode and uses no power while hibernated, a feature most laptops can really benefit from.

Hibernation is also useful if hardware maintenance has to be performed which requires powering down the hardware. For servers which need to be started up as quickly as possible after maintenance, hibernating and getting going again can be much quicker than shutting down and restarting the server applications.

Despite the benefits of hibernation, it is important to note that your computer does need to be shut down every once in a while to avoid performance degradation. Moreover, you should avoid hibernating your computer when you know you won’t be using it for a long period of time.

Hibernation mode can help boost productivity, decrease boot-up time, as well as help save your computer’s battery time. Interested in learning more about Windows 8/8.1 and its features? Contact us today for a chat.

Published with permission from TechAdvisory.org. Source.

July 2nd, 2014

SocialMedia_June30_BThere are numerous social networks a company can join, but if they are looking to connect to other businesses, colleagues or potential hires the network of choice should be LinkedIn. This powerful network is designed for professionals and offers many benefits that other networks, like Facebook and Twitter, don't or are not able to. As a result, many business owners attempt to build a profile that will work well for them on LinkedIn. The question many ask however is how to go about achieving this.

In this article we will go over eight important steps you need to take in order to build the perfect LinkedIn profile. In fact, we came across a great infographic on Link Humans that could be a big help when following these steps. We strongly suggest you take a look at this when building your profile.

Step 1: Establish your profile

While you don't have to join LinkedIn, it is a good idea if you are looking to connect with other business owners and colleagues through a more professional, business style networking oriented social network. If you do want to connect at this level, the absolute first thing you need to do is to create a profile. This can be done by:
  1. Going to LinkedIn's website (linkedin.com).
  2. Clicking on Join Today.
  3. Entering the relevant information on the following page. We recommend using the name the majority of your customers and clients know you by and your work email address. Personal email addresses are fine if you don't want to fully represent your company.
  4. Selecting Join LinkedIn.
If you use your Facebook account for business, you can also sign up using your Facebook account. Just follow steps 1. and 2. above and click Sign Up with Facebook. You will be asked to log into your account (if don't already have Facebook open in another tab on your browser) then approve the account access rights. Once you've done this you should see your basic profile pop up.

Step 2: Select an appropriate picture

LinkedIn is a work-related network, and to that end you will need to present the right corporate image; this means uploading a professional profile photo. This image should clearly show your face and be cropped to show mainly your head and upper body. The background should be clear or unobtrusive, allowing you to be the main focus.

If you don't have any professional head shots, it might be a good idea to get some taken. Most photographers can snap a few for you, and will be able to provide you with information about how to pose and dress for the shots.

You can add an image to your profile by:

  1. Logging into your profile.
  2. Hovering over Profile which is located in the menu bar at the top of the screen.
  3. Clicking on Edit Profile followed by the camera icon at the top of your profile.
  4. Pressing Change photo and then selecting the image you would like to use as your profile picture from a file on your hard drive.
  5. Ticking Save to set your picture.
The reason a good picture is more important than on other networks is because it has been proven that profiles with professional looking pictures are easier to find and also enhance the potential that other members will want to connect or even recognize you.

Step 3: Fill in your basic information

Once you have a great picture set on your profile go back to the editing screen and add your basic information. This includes your name, role, location, and company. Also, click on the Edit Contact Info tab to the right-hand side of your basic information section. Add as much contact info as you feel comfortable with; we recommend your email address and company website at the very least.

Step 4: Determine who your main audience will be

Before you begin to fill in your profile, you should take time to determine what the purpose of this profile will be. Will it be used to find new colleagues? Or will it be used to connect and communicate with your colleagues? Or, will it used to find prospective clients? Each reason will determine what information you should include in your profile along with the relevant keywords.

For example, if you would like to find new employees you can tailor your profile to show what you do in your job and what makes it so great. You can then also come up with more relevant keywords to use in your content. For example, using the words 'career' and 'job' and including in your summary information about who you are looking for will definitely attract prospective hires. However, this profile likely won't attract colleagues or clients.

Don't feel that you have to limit yourself to one set function however. For example, there are many crossover terms that both clients and prospective employees will search for. So, if you want to use your LinkedIn profile for more than one reason, take some extra time and try to figure out which keywords and ideas you think will work well. The great thing about LinkedIn is that you can always edit everything at any time. So, if you want to switch your audience, you can easily do so by simply editing parts of your profile and changing keywords.

Step 5: Write a solid summary

The summary of your LinkedIn profile is a place where you highlight who you are. Take time to craft this so that you can showcase what you do and your main strengths. Be sure to use relevant industry and position specific keywords and terminology that you believe your audience will be searching for, as this language will make your profile easier to find in searches.

The key here is to write a summary that not only explains what you do and your experience, but showcases who you are. Use active language like 'I', 'my', and 'me', and be sure to include a way for people who don't have a LinkedIn profile to contact you - usually an email, link to your website or a phone number.

Step 6: Add your past and present positions

Once your summary is finished, you should move onto your current and past positions. This section should reflect your resume and highlight the experience you are talking about in your summary. It would be helpful to try and work in some of the keywords you used in the summary or identified earlier in order to really make your experience really stand out.

Chances are you aren't looking for work, so you can deviate a little from your resume here, and highlight what you do best, or how you can help your audience best. Feel free to leave out points that may not be 100% relevant or interesting e.g., how many people you manage, sales goals, etc.

Step 7: Start connecting

Once your profile is mostly complete with experience and a summary, you can start looking for people to connect with. Start by searching for people that you know or work with on a regular basis and inviting them to connect.

Next, join a few groups that are related to your position and industry. These can be found by hovering your mouse over Interests which is located in the menu bar near the top of the window. Select Groups from the menu that drops down and then select Find a group from the right-hand side of the page that opens. Some groups are private and will require you to ask to join them, but don't be afraid of sending in your request.

Once you have joined some groups and started to make connections be sure to be active on the network. It will help to join in on conversations held in your groups and post content on a regular basis. And, if you meet new clients or people don't be afraid of looking them up on LinkedIn and asking to connect with them!

Step 8: Work on your awards and recommendations

Finally, start recommending people that you know. You can do this by going to a colleague's profile and scrolling down to their Skills and Endorsements section. Find skills that you know they possess and press the + Endorse button beside the skill. Most people will also do this for you as well.

If you have won awards in the past, be sure to include these as well, especially if they are relevant to your intended audience. Just be sure to pick the awards that really highlight your skills, as an Employee of the Month award may not be the most relevant.

From here it's really just a matter of tinkering with your profile on a regular basis. Be sure to be active and ensure that your profile really reflects who you are. Doing this will create a stand-up profile you can be proud of.

Looking to learn more about LinkedIn and how to use it for your business? Contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
June 26th, 2014

Security_June23_BVirtual machines are just gateways to a server, and cyber criminals want access to data on those servers. While you might think you’re keeping your virtual environment safe, there are several virtualization security myths which if believed can have a serious impact on your platforms, leaving them susceptible to attack. It’s vital that you are aware of these untruths to make better decisions about your business’s virtual environment.

Myth No.1: Existing endpoint security will protect our virtual environment

Most traditional endpoint security solutions are virtual-aware and provide low levels of protection. This simply isn’t enough. Depending on the virtualization platform used (VMware, Microsoft, etc.), your traditional endpoint security suite can probably recognize virtual endpoints. However, this physical software often can’t bring its full tool set of anti-malware to the virtual world, meaning it can only perform basic tasks such as on-access scanning.

Therefore what you need is a solution that has been designed to keep both virtual and physical computing environments secure. There are a wide-number of solutions out there, and the best one for your business will depend largely on the virtual environments you employ. We strongly recommend talking to IT experts like us, as we can help determine, or even offer, the strongest security based.

Myth No.2: My existing anti-malware doesn’t interfere with my virtual operations

Performance issues can create security gaps that don't exist in your physical environment. Traditional endpoint security uses an agent-based model where each physical and virtual machine has a copy of the security program’s agent on it. This agent communicates with the server while performing security tasks. This is fine for physical machines, but if you have 100 virtual machines running off of one main environment that has been infected with malware, you’ll also have 100 instances of malware running on the machines.

This high level of duplication can cause massive performance degradation and waste tons of storage capacity. Therefore, you should make an effort to ensure that all of your systems including the main ones are without malware. This not only makes every system secure, but can also speed up overall operations.

Myth No.3: Virtual environments are inherently more secure than physical environments

Sadly, this just isn’t always true. Virtualization is designed to allow software, including malware, to behave as it normally would, and malware writers will target any and all weak points in a business’s network to accomplish their goals. An attacker who compromises one virtual machine and finds a way to jump to the hypervisor - the system that enables the virtualization - then has access to every virtual machine on that host.

Therefore, malware scanners on both the user and main systems would be a good idea. If it does happen to get on a system, the chances of it spreading are drastically reduced.

Myth No.4: Using non-persistent virtual machines effectively secures a network

In theory, any machine that encounters malware is wiped away and recreated cleanly. However, we are now seeing malware that is designed to survive teardown of individual machines by spreading across the virtual network. This allows it to return when new virtual machines are created.

Additionally, being too eager to create new machines on demand can result in virtual machine sprawl, which happens when virtual machines are created but then forgotten. This leads to an unmaintained virtual endpoint operating without your knowledge. Even if the rest of your virtual machines are secure, it’s possible for one machine to eavesdrop on the traffic of another virtual machine, leading to privacy and security risks.

The best solution to this is to employ an IT manager who can track and maintain systems. Many IT partners offer a solution like this, so experts like us may be able to help ensure your systems are secure.

Myth No.5: Specialized virtual security programs are more or less the same

There are various approaches to virtualization security and your network will probably need a blend of available options. This all depends on what you’re trying to protect.

A non-Web-connected server is going to have entirely different security needs than a virtual desktop of a server that manages customer information. Implementing one without the other simply just won’t do in today’s world, where attackers are set on getting their hands on your data.

Proper security is vital in making virtualization a critical component of your business IT infrastructure. Looking to learn more about virtualization and its components? Contact us today and see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
June 25th, 2014

Productivity_June23_BNo matter what business you operate in, today’s fast-paced world calls for a speedy Internet connection to help boost productivity and efficiency. Still, many businesses seem to be saddled with a slow Internet connection which not only frustrates everyone but can hold back performance too. Let’s take a look at five ways that’ll help speed up your Internet connection and hopefully increase your business’s productivity.

5 ways to combat a slow Internet connection:

1. Control devices that interfere with the connection:

Wireless devices can be one of the reasons for a slow Internet connection. It’s wise to talk to us about a wireless network analyzer so that you know the sources of interference. Believe it or not, most of these sources might be coming from the company kitchen!

Good examples include the microwave, cordless phone, security alarm, and other wireless devices which use the 2.4GHz band. These can interfere with 802.11g or single-band 802.11n routers. The best solution is to reposition these household electronics to either help solve the problem completely or at least minimize the chances of interference.

2. Control applications that hog bandwidth:

Without your knowledge it’s most likely that employees are using applications that are hogging the bandwidth. It’s vital that you are aware of these applications, especially ones that have video conferencing and streaming abilities which tend to be responsible for weak bandwidth in corporate environments. Other applications such as torrent and gaming apps can also be responsible. It is best to make sure that these apps are not installed on your company computers, of if they are, make sure their use is regulated.

Believe it or not, one of the biggest bandwidth hogs is YouTube. Some companies, when they audit their network usage, have noticed that streaming services like YouTube can take up more than half of their total bandwidth. While in some positions, video streaming may be necessary, it's likely not for the majority of roles. Therefore, it would be a good idea to implement a rule about the use of YouTube during business hours e.g., it should only be used for necessary tasks.

Some would recommend blocking services like this, but if your business uses Google's other services, blocking YouTube could actually end up blocking access to other Google services. It would be a good idea to consult with us as to the best way to limit use.

3. Reposition your router:

As simple as this might sound, your router might also have to be repositioned to help increase your Internet speed. You might want to try raising your router so that broadcast range can be more effective. If this doesn’t work, which sometimes it doesn’t, try placing your router in the center of your office for a more equal signal distribution. The best solution however, is to place your router as near to computers and other receivers as possible.

4. Consider an upgrade:

If your wireless networking equipment is old then it probably needs an upgrade. Keep in mind that technology moves at an extremely fast pace and your wireless network might be outdated in just a few years.

We strongly recommend talking to us, as we can help recommend the best upgrade solution. For example, the two most common upgrades include installation of a new repeater or wireless amplifier and replacement of your current antenna. Because antenna's are so varied, we can help make sure that the antenna being installed is compatible with your router.

5. Use the latest network technologies:

As mentioned earlier, technology moves fast which is why it is essential that you become familiar with its recent advancements, particularly in the area of wireless networking. There are countless apps, software, and hardware out there that can help boost the speed and performance of your router, some of which can even be downloaded for free. Our networking experts can help ensure your business has the latest and greatest, so be sure to consult with us first.

Dealing with a slow Internet connection can be a huge pain. If not taken care of right away, it can have immense impact on your overall work output. Looking to learn more about ways to improve your Internet connection for maximized productivity? Connect with us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Productivity