Blog

April 2nd, 2015

SocialMedia_Mar30_CUnderstanding the success of Facebook marketing efforts can quickly become complicated but, if there is one figure that’s critical to monitor on a regular basis, it’s the count of users who have liked your company’s page. This number helps you understand how far your messages are spreading, and what return you’re likely getting on your investment. Beware, though - Facebook has announced a site-wide drop in page likes - here’s what you need to know.

Facebook’s announcement means that since March 12 you may have seen a drop in the number of likes, or fans, attributed to your page. If you’ve been wondering what you did wrong to cause the drop, you can rest assured that it’s unlikely to be a result of ineffective marketing or unengaging content on your part. Rather, Facebook has been hard at work removing inactive accounts from the social network.

The kind of Facebook accounts affected by the move are those of deceased users whose friends or family have opted to have the profile memorialized. The page remains visible, but is clearly marked as in remembrance of the user and becomes a place for relatives to share memories. Accounts also affected are those whereby the user has opted to deactivate their profile and take a break from the site. In the case of deactivated profiles, if the user later returns to Facebook and begins using their profile again, the like will be re-added to your page’s count at that point.

In making this move, Facebook aims to ensure that the like count for a page more accurately reflects the number of active users who actually see and engage with the page’s content. There’s no denying that it is easy to become distracted by high like counts, when often the reality is that only a fraction of those users are the people you are aiming to target, or indeed real humans at all. The social network already filters out likes and comments for specific posts from those with deactivated or memorialized accounts, so this change simply represents an extension of this policy to the more visible metric of a page’s overall like count. From Facebook’s perspective, the move also helps it to deliver a better overall experience, since taking the bloatedness out of artificially inflated numbers helps users get a better idea of which pages are popular and which are most relevant to their needs and interests.

Businesses should consider Facebook’s shift a positive one, since it leaves you with a clearer perspective on the real audience your page is getting and removes the potential to be seeking false comfort from a high page count that doesn’t actually reflect the level of active engagement. The move has echoes of recent efforts by Instagram to flush out spam accounts from its system - some high-profile celebrities saw their follower counts drop by the thousands after these accounts were banished. Though the dip in Facebook page likes may continue for a further few weeks as more accounts are flushed out from the count, most page owners will notice only a small difference. If you suffer a more drastic drop, treat it as a wake-up call to try new tactics to deliver engaging content and organically drive a more genuine Facebook audience.

Need advice on how to build a social media audience and use it to generate leads? Get in touch today and see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
April 1st, 2015

Security_Apr1_CIf you think your email is fully protected from hackers, think again. A lack of sufficient email security measures can result in data theft, unauthorized access to sensitive information and the invasion of your computer by viruses and malware. Here are some tips to secure your email account from unwanted intruders and the many troubles that come with them.

Use separate email accounts

Most people use a single email account for all their personal needs. As a result, information from websites, newsletters, shopping deals, and messages from work get sent to this one inbox. But what happens when someone breaks into it? There’s a good chance they would be able to gain access to everything else.

Having multiple email accounts will not only boost your security, but also increases your productivity. You can have a personal account to communicate with your friends and family, another solely for receiving emails from work, and one recreational account for various website registrations and getting newsletters. Wise email users never put all their eggs in one basket!

Set strong passwords

Too many email accounts have predictable passwords. You might be surprised to learn that email passwords like ‘123456’, ‘qwerty’, and ‘password’ itself are still the most common around. For the sake of security, be a little more selective with your passwords. Spending a few moments on coming up with a good password will be beneficial in the long run. Mix upper and lower case letters, numbers, and special characters to form a unique password that makes sense and is memorable to you, but no-one else. Also, never use the same password for all your email accounts. This way, if someone hacks one of your accounts, all of the others are still safe.

Beware of links and attachments

When you see a link in an email, don’t click on it unless you’re expecting the link from a known source, such as from your friend or a confirmation link for your game account registration. The truth is that you never know where those links might lead you. Sometimes they can be safe, but other times they can infest your computer with viruses and malware.

Similarly, if you’re expecting a file from your friend or family, then go ahead and open the attachment. It’s always good to know the person sending the file. But be wary of attachments in emails from strangers. Even if the file name looks like a JPEG image, you should never open it. File names can be spoofed, and innocent files may be a clever virus in disguise, ready to latch itself onto your computer the moment you click on it.

Beware of email phishing

Phishing is a type of online scam when malicious users send you an email, saying that they’re representatives from high-profile websites like eBay, Facebook or Amazon. They claim that there’s a problem with your account, and that you should send them your username and password for verification. The fact is that, even if there was a genuine issue with your account, these companies would never ask for your password. You should ignore these phishing emails and sweep them into your spam box.

It all comes down to common sense when you’re dealing with email security issues. If you’re looking to secure your business emails, give us a call today and see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
March 25th, 2015

Productivity_Mar25_CToo many of us associate corporate meetings with long, dull sessions that lack focus, go round and round in circles and end up not reaching the concrete conclusions we need from them. In fact, many of these meetings probably don’t even need to be held in the first place, and certainly plenty of us would rather be at our desks getting on with our jobs than sat in energy-devoid boardrooms. But there’s another way - enter Do.com, a meeting productivity platform that has recently made announcements that show it’s on the up. Here’s why it might be time your organization upped the ante in meetings and jumped on the Do.com bandwagon.

Do.com aims to end what it terms ‘meeting hell’, and the platform is currently used by more than 5,000 organizations from top businesses like Dominos to sectors of the US government. When you add Do.com to your company’s productivity strategy, you benefit from a host of meeting-oriented features including management of agendas, notes and actions. The tool can also be used to share files for the purpose of discussion during meetings, and to display a timer to keep deliberations on track and avoid that ultimate hell of never-ending meetings.

The cloud-focused application has signaled it is on an upward trajectory, recently adding $2 million in funding. The additional capital will be used to further expand Do.com and its features, as well as the team behind it. Consequently, it appears that now is a great time to be getting onboard, with lots more to come from it. The most recent technical development to be announced is its new integration with Office 365. This will give Do.com further relevance and usability value to business owners around the world who are already taking advantage of the numerous benefits of the Microsoft cloud-based suite of productivity applications.

Do.com can already be used in conjunction with Evernote and Google Apps like Drive and Docs, but the move to integrate with Office 365 puts it in reach of an ever larger audience. Those not yet accustomed to high-tech meeting solutions may still be using pen and paper to manage their company get-togethers. But Do.com identifies its technology-based competitors as core cloud applications such as Dropbox, Trello, Evernote, Google Apps - everything from Docs to Calendar to Drive - and even good old email. Yet Do.com does something these individual apps don’t - while they all tackle one particular element of the organization and follow-up to a meeting, Do.com handles the whole lot with a single holistic, meeting-centered approach. With its latest moves, that’s what the platform hopes will be attractive to productivity-deprived business owners.

Want to find out more about Do.com and other productivity and cloud-based technologies? Get in touch today.

Published with permission from TechAdvisory.org. Source.

Topic Productivity
March 24th, 2015

164 BizV_CHave your IT problems become chronic? Is your break/fix contractor hanging around your office so often that he’s on first-name terms with the maid? If you’re starting to think about an alternative IT solution that can clear up your chronic IT issues for good, Managed Services may be just what you’ve been dreaming of. Even better, they could just prevent your ultimate IT nightmare from coming true.

The ultimate break/fix nightmare

Your business is running smoothly. Profits and staff productivity have been up, and you haven’t had a single IT expense in months. Times are good. You kick back in your leather chair and break out that Cuban cigar you’ve been saving for just such an occasion.

But then the BIG ONE hits. Your servers crash. No, not just one - all of them! Your business comes to a grinding halt. None of your staff can work. You call your go-to break/fix IT provider, but he’s overloaded with work and can’t make it out to your offices till next week. Next week?! In a panic, you call the first IT contractor you find on Google. Thankfully he’s available. But since you need this work done immediately, he charges an unbelievable fee for a last minute fix. You have no other choice, you hire the contractor. You’re left hoping he fixes everything properly and none of your crucial data is lost in the process.

This is the precarious nature of break/fix IT services. And while this is a worst case scenario, situations like this can and have happened. So let’s look at the reasons why it pays to to hire a Managed Services Provider (MSP) instead.

MSPs prevent problems. Break/fix profit from them.

Think about the relationship dynamics of Managed Services compared to break/fix. If you’re a business owner who currently use a break/fix contractor, when your IT goes down your contractor gains profit. Your problem equals his reward.

How motivated do you think he is to do an effective job of fixing your issue? If that problem pops up again later, it equals more reward for him. Now that’s not to say all break/fix contractors aren’t fixing your IT to the best of their abilities. But think about the basic mindframe of a break/fix contractor: problem=profit.

The MSP system works differently. You pay a set fee every month to your IT provider. So the reward for the MSP comes every month. If something goes wrong during that month, you don’t pay anymore. Yet it costs the MSP more money, and therefore affects their profit margin. Because of this, the MSP is rewarded for taking preventative measures to ensure your IT is working as effectively as possible, always.

That’s not to say problems won’t happen with an MSP. But when they do, they’ll end up costing the MSP provider, and they certainly don’t want that. So for an MSP, the basic mindframe is: healthy IT=profit.

MSPs extinguish budget surprises

Everyone likes surprises, except when it comes to losing money. And when you have a break/fix IT service provider, big surprises can and do happen - and not the good ones, either.

An MSP is working to prevent problems from happening in the first place. You pay a monthly flat fee, so you always know what you’re paying. You can plan and predict your budget accordingly.

With break/fix, it’s true that some months you won’t have any IT expenses from your contractor, which is great. But other months, you could have bills that are astronomical. So you never know just what you’ll be paying for your IT budget in any given month. And if you don’t have that money set aside, then what?

MSPs might just make you happier

Yes, as silly and simple as it sounds, with an MSP you’ll probably be happier. The main reason is you won’t have to deal with the frustration of unexpected IT problems eating away at your budget and the downtime that comes with it. Your IT will run more smoothly (which will create a foundation for your business to do the same) and your budget will be predictable.

Even better, you’re more likely to have a fruitful relationship with your MSP provider since you both have the same goal: effective smooth running IT for your business. What business owner doesn’t like the sound of that?

Want to learn more about Managed Services? Contact us today to learn more about this effective alternative.

Published with permission from TechAdvisory.org. Source.

March 23rd, 2015

BusinessContinuity_Mar23_C_2As a business owner you’ve probably heard of the benefits of a business continuity plan (BCP). It ensures your company’s protection in the event of an unexpected disaster, whether that’s natural or man-made. But you likely don’t have time to sit and learn all about business continuity procedures and terms. Hearing technical terms in meetings, and being expected to follow protocol, may also sound overwhelming. To help clear up the confusion, here are eight common business continuity terms that you should be aware of.

Battle box - a tool box where necessary equipment and vital information are stored. These objects and pieces of information should be useful in a disaster. Typical items include a first aid kit, laptop, protective equipment, and communication devices.

Business impact analysis (BIA) - a process to evaluate the impact that a disaster may have on a business. The BIA shows what a business stands to lose if some parts of its functions are missing. It allows you to see the general picture of your business processes and determine which ones are the most important.

Call tree - a comprehensive list of employee contacts and their telephone numbers. Call trees are used to notify out-of-office employees about a disaster. Companies can use a software program to contact people on the call tree by sending automated emails and text messages. In order for a call tree to work, employees should provide alternative contact options and their information must be up to date.

Data mirroring - a duplication of data from its source to another physical storage solution or the cloud. Data mirroring ensures that crucial information is safe, and companies can use the copied data as backup during a disaster.

Exercise - a series of activities designed to test a company’s business continuity plan. When an exercise is carried out, there will be an evaluation to decide whether a BCP is meeting standards or not. An exercise can identify gaps in, and the drawbacks of, a BCP and is therefore used as a tool to revise and improve a business continuity plan.

Hot site - an alternate location equipped with computers, communication tools and infrastructures to help a business recover information systems affected by the disaster.

Plan maintenance - a process of maintaining a company’s business continuity plan so that it is in working order and up to date. Plan maintenance includes scheduled reviews and updates.

Recovery time objective (RTO) - a period of time in which companies must recover their systems and functions after a disaster. This is the target time for a business to ideally resume its delivery of products and services at an acceptable level. RTO may be specified in business time (e.g. one business day) or elapsed time (e.g. elapsed 24 hours).

Business continuity plans can be a hassle to design and implement without proper understanding of their requirements. If you want to learn how you can protect your business from disasters, give us a call today.

Published with permission from TechAdvisory.org. Source.

March 18th, 2015

Security_Mar18_CIt’s easy to get complacent about internet security, but the reality is that none of us can afford to let our guard down. Precautions to protect yourself, your identity and your finances online can be simple, but they are only effective when practiced rigorously and consistently. And while the most obvious things like making passwords hard to guess and locking your workstation are as effective as they ever were, nowhere are conscientious security efforts more crucial than when using online banking systems and mobile payment portals. Users of peer-to-peer payment provider Venmo can breathe a sigh of relief, then, because the service just added extra security controls for its customers.

The Venmo platform is known for its convenience and ease of use, and is commonly used to split the cost of drinks, dinner, taxis and the like. The app is now adding a raft of new security-focused features, in response to criticism of its record for ensuring the security of its customers and their financial transactions.

Back in February, a Venmo user discovered his account had been hacked and used to withdraw almost $3,000 from his credit card. The intruder had also thought to change the email address associated with the Venmo account and to disable notifications of payments, but Venmo did not tell the genuine user about the changes that had been made. Venmo was decried for letting basic lapses in security exist in its trendsetting platform.

Now the service is doing what it can to pick up the pieces and up the ante on the security front. The most obvious change is to incorporate automatic email notifications when changes are made to the basic personal details associated with a Venmo account - a feature which many believe should have been built in from the word go. But the app will also add multi-factor authentication, another name for the two-step verification that can be enabled within Google Apps and other services. This feature makes it more difficult for would-be intruders to gain access to your account, even if they manage to get hold of your password.

Multi-factor authentication works by requiring not only your password for login, but also a second piece of information such as a one-time code - often generated on-the-spot and sent by SMS to the user’s cell phone - or the answer to a pre-set security question. Insisting on two phases to the sign-in process allows another opportunity to stop potential fraudsters in their tracks. The changes being implemented by Venmo also reflect the growing awareness on the part of technology companies for the need to get serious about security and protect the integrity of their systems and their users’ data.

You can put multi-factor authentication to use in your IT systems to keep your business protected. Get in touch with us and we’ll show you how.

Published with permission from TechAdvisory.org. Source.

Topic Security
March 16th, 2015

SocialMedia_Mar16_CThere was a time when social media platforms were hashtag-free. But the reality in today’s online world is that hashtags are one of the most prominent tools used in social media. And with more businesses than ever engaging in social media to stay competitive, let’s take a look at how different social media sites make use of hashtags, and how you can use them to the advantage of your business.

Twitter

Twitter hashtags don’t support special characters like +, !, $, %, -, ^, &, * but do support letters, numbers and underscores. There are no hashtag limits as long as you keep your message within the usual 140 characters.

The best way to use hashtags in Twitter is through hosting and participating in Twitter chats. You don’t need to be in an event to network with people through the official hashtag; event organizers usually market the official hashtag very well. In other words, you’ll get additional exposure if you use it.

Useful Twitter hashtag tools include:

Hashtagify which tracks trending hashtags and shows related hashtags for any base terms you provide. TwChat lets you discover, participate in and host Twitter chats. This is best used for monitoring and archiving any hashtag streams.

Instagram

Just like Twitter, Instagram hashtags don’t support special characters like +, !, $, %, -, ^, &, *, but do support letters, numbers and underscores. You can add up to 30 hashtags to a single photo or tag your photo after publishing it by listing the hashtags in the comments.

After you tag your post with a hashtag, you’ll be able to tap on the hashtag to see a page that shows all photos and videos people have uploaded with the same hashtag. Instagram hashtags can dramatically increase your following, especially if you use hot and trending hashtags which are easily found here.

The best use of hashtags on Instagram is to participate in hashtag games like #tbt (Throwback Thursday) and #MondayBlues. Both can increase your following and interactions since people click on these specific hashtags to see photos of other participants. Additionally, location-based hashtags also work very well on Instagram, whether abbreviated or in full, for example #LA and #LosAngeles.

Facebook

Facebook hashtags are similar to other social platforms; they support the standard set of characters including numbers, letters and underscore but don’t support special characters.

However, searching by hashtag on Facebook is a little unlike the rest, in that when you search for a hashtag you often end up on a Facebook page instead of a hashtag search result page. But there’s an easier way to generate hashtag search results - simply add the hashtag text after facebook.com/hashtag/, for example facebook.com/hashtag/cats.

You can also bring up hashtag search results by clicking on any hashtag in your Facebook stream. Do keep in mind that Facebook’s ranking algorithm is complex and seems to classify hashtags according to how closely you are related to the person posting the update, as well as how often the two of you interact.

The growing use of hashtags has changed how we use different social media platforms for the better. Still, it’s important to understand how these different platforms make use of hashtags in order to optimize them to your business’s advantage. Looking to learn more about how social media can help your business? Contact us today!

Published with permission from TechAdvisory.org. Source.

Topic Social Media
March 12th, 2015

Office_Mar12_CWith the release of Office for Mac 2016, Microsoft brings a long overdue refresh to its flagship suite of productivity applications for Mac users. As well as design changes that deliver similarities to the Windows versions of the applications, the latest upgrade - currently free of charge while it remains in preview stage, prior to full release later this year - harnesses the power of cloud computing to deliver Office 365 collaboration features. Thinking of upgrading? Here’s what to look out for in the new release.

Cloud power

Office for Mac 2016 takes the power of the cloud and puts it to full use, bringing the advantages of its cloud-oriented Office 365 applications to its flagship package. As a result, you can now access your Office documents whenever and wherever, and no matter which device you are using. Aside from Office 365, the new software is also integrated with OneDrive, OneDrive for Business, and SharePoint.

It’s now possible to jointly author Word and PowerPoint documents with colleagues, and to make challenges simultaneously. Much like Google Docs, you can run a chat conversation alongside the document, in order to discuss the changes you are each making. Word and PowerPoint automatically flag up updates to the document that you might not have spotted already. These features are already available to Windows-based users of Office.

Sharing documents also becomes simpler, with a dedicated sharing button in the applications’ top right corner that allows you to invite colleagues to collaborate on the document you’re working on. It’s possible to share a document either as an attachment or as a link, and of course to control access rights for each person to whom you give access. You can open others’ Office documents right from your email account and get straight to editing.

Ribbon refresh

Until now, there have been differences in the options available on the ‘ribbon’ of icons that appear beneath the File, Edit and other menus at the top of the screen. You might see one thing on your Mac but another on your PC, and another still on your tablet. With Office for Mac 2016, Microsoft has taken the opportunity to fix those inconsistencies, so you’ll now find the options you need in the same places across all the platforms you use. A new task pane is also intended to help simplify graphics editing.

Email grouping

The updates to Outlook, and OneNote too, were actually released in 2014 and so are technically not new with this release. But one such useful update that is carried through to Office for Mac 2016 is the organization of Outlook emails by conversation, as is the case with Gmail. Emails can be sorted using a variety of other criteria, too.

Presentation aids

Office for Mac 2016 makes life a little easier for those presenting using PowerPoint slides. While your audience is shown the final product on your big screen, you can benefit from having ‘presenter view’ open on your monitor. This dedicated view gives you access to all of your presentation’s slides, any associated notes and also a timer to help you keep pace.

The entire suite of Office for Mac 2016 applications - including Word, Excel, PowerPoint, OneNote and Outlook - is available for free upgrade during Microsoft’s preview period, which runs until later this year. Once that comes to an end, you’ll need an Office 365 subscription or perpetual licence in order to keep making the most of the package’s features.

To find out more about boosting your company’s productivity with Microsoft Office applications, give us a call today.

Published with permission from TechAdvisory.org. Source.

March 11th, 2015

BusinessValue_11Mar_CIncorporating technology into business operations can be a challenge, because technology is always on the move, and many businesses simply can’t keep up. Small businesses often put their faith in a single IT guy to look after their tech needs but, chances are, he won't have the time or expertise to be able to deal with wide ranging issues. As a result, many businesses look to Managed Services Providers (MSPs) to provide IT services and handle all IT issues.

MSPs defined

Managed Services Providers boast a range of capabilities. They create IT options and provide solutions to facilitate businesses in their everyday activities. Simply put, a Managed Services Provider is your IT department, and they are experts at what they do. MSPs perform IT-related tasks to your exacting requirements, whether it’s installing software, virtualizing data, or other complex duties. Best of all, because they are taking care of your IT systems, you have more free time to focus on your business.

Selecting the best MSP

You can only achieve optimum IT results by selecting the right Managed Services Provider - preferably one that can demonstrate competency and consistency. Here are some criteria to keep in mind when choosing an MSP.
  • Depth of skills and experience - Any Managed Services Provider should, at the very least, have skills that go beyond basic software installation, maintenance and upgrades. Your business will likely need some advanced IT functions, such as database management, virtualization, cloud technology, security, and cross-platform integration. An MSP should have strong expertise in these models in order to meet the expectations and needs of your company.
  • Consistent global service - In addition to the services provided, MSPs should have global service capabilities. These include the ability to manage IT systems in multiple countries, local language support for foreign subsidiaries, and IT implementation in new locations. Businesses can expand globally with an MSP’s global service offering.
  • Broad range of services - The IT needs of businesses are continually changing, and MSPs tend to provide a suite of managed services to respond to these changes. This could mean anything from updates to software, security patches, antivirus and firewall protection, or even new compliance measures. Make sure that such services can be delivered without additional costs.
  • Financial stability and reputation - A Managed Services Provider’s length of time in the market doesn’t guarantee their longevity. Do your research into a potential MSP’s annual reports and financial statements. Also ask the MSP to provide evidence of their reputation by way of customer references and testimonials.
Choosing the right Managed Services Provider is a very important step that will impact on your business’s performance and success. If you want to learn how MSPs can support your business, contact us today.
Published with permission from TechAdvisory.org. Source.

March 9th, 2015

BusinessContinuity_Mar09_AYou’ve been putting that business continuity plan off for months now, but you’ve finally decided to go through with it. You start by talking to members of your staff, partners and service providers. And it doesn’t take long to see that everyone has a different opinion about what to recover first when disaster strikes. The head of your IT department demands your servers are top priority, while your Vice President argues that without network security being reestablished pronto, your business is left vulnerable to even further damage. Who’s right? It may be difficult to decide. That’s why we’ve compiled these fundamental ideas to consider when drafting your business continuity plan.

Speak to many members of your organization

And not just your IT department - which may sound like a bit of an oxymoron coming from an IT provider’s blog. However, the reason behind this is simple. Suppose you have an IT staff member called Jane, who is responsible for a series of applications that automate your e-commerce system. If you call a business continuity meeting concerning to identify assets to prioritize during a disaster, what do you think Jane will say? She’ll likely point to her group of applications, since to her this is what she prioritizes and spends her days on. And it’s not just Jane; each staff member will probably voice that their particular job (whether that’s security, server maintenance or something entirely different) needs to be prioritized. It’s human nature to think of your responsibility and role first. We all do it.

The key is to get more than one opinion. It’s not a bad idea to start with the leaders of your company, and then work your way down. Leaders generally think in a broader sense about your organization as a whole, rather than one particular facet of it.

Consider where your business is going

When developing your business continuity plan, it’s easy to fall into the trap of thinking about your business as it is today. While you’ll draft your plan in the present, it needs to be created with the future in mind. For example, if you’re considering joining the Cloud or virtualizing your servers in the next year or so, how is this going to impact your plan? It’s smart to think of this sooner rather than later, as it could cause a major shift in your priorities. If you start deploying your business continuity plan but then have to switch gears further down the line, it’ll likely cost your company a lot of money.

Examine the interdependency of your business

Remember to connect the dots between your IT department and business processes. For instance, if your email system can’t run without the use of a particular IT application, it will do no good for you to have your email system as a priority 1 issue and that IT application as a priority 3. In this scenario, the IT application would need the same priority as the email system - if not higher, or else your email system will simply not work.

The point is to map out the interdepencies of your business processes and IT, so that you know what depends on what. That way you’re not left in a pickle when disaster strikes.

Need help getting started with your business continuity plan? Contact us today to learn how we can help.

Published with permission from TechAdvisory.org. Source.