Blog

July 13th, 2012

At E3 (an annual technology conference) this year, a new video game was showcased. Watch Dogs, set in the near future, is a game about an elite hacker who can hack into any device as long as it has a Wi-Fi connection. In the short demo, you see the character listen in on private conversations, hack streetlights to create havoc and steal a person’s information. While this is only a video game, it’s based on what one can currently do with and to Wi-Fi devices, many of which you probably utilize when you’re out of the office.

It’s a good idea to connect to public networks that require passwords when possible, as they tend to be more secure. Many public networks have a legal disclaimer stating network use and security. It pays to read these before connecting.

Turn Wi-Fi off We don’t mean you should turn your Wi-Fi off permanently, rather, when you’re not using your device, or are connected to another network, e.g., mobile data, turn your Wi-Fi connection off. If you have Wi-Fi on while connected to another network, your device can and will actively search for networks to connect to and often connect to an unsecure network, unintentionally exposing your information.

Use HTTPS when possible HTTPS stands for Hypertext Transfer Protocol with Secure Sockets Layer (SSL). In layman's terms this is a website that has been built with security of user’s data in mind. Many popular websites have a HTTPS version that can be accessed by typing in https://www.sitename.com. Using HTTPS makes websites a lot harder to hack, and it’s a good idea to get into the habit of using them when on a public network or connected to Wi-Fi outside of the office.

Use data not public hotspots Hotspots are public Wi-Fi connections usually provided by a company e.g., many coffee shops have Wi-Fi, this is a hotspot. These can be unsafe, so it’s much better to invest in a data connection for your device, or a mobile Internet stick, which are considerably safer as the data is encrypted before it’s transferred from the cell tower to your device.

Use a VPN A Virtual Private Network - VPN - connects multiple computers in different locations to the same network via the Internet. Many companies use this to connect and share data with satellite offices, as the data is encrypted and secure. The main benefit to VPNs is that you can connect to a public Wi-Fi network, and transfer data securely using the network’s bandwidth. Many businesses use some form of VPN, which makes it easy for you to keep your business data secure while out of the office.

There are also VPNs that allow you to securely access the Internet via a public Wi-Fi connection, while encrypting all data sent and making your computer anonymous. It’s recommended that if you’re out of the office a lot, to look into a VPN and follow these other tips. If you’re interested, we may have a solution for you, so please contact us.

Published with permission from TechAdvisory.org. Source.

Topic Security
July 12th, 2012

OSX_March20_BThere are many different components that make up the modern computer. One of the more useful is the mouse: imagine having to navigate an operating system (OS) with the keyboard? No thanks. While the mouse is useful, there can be times where the pointer on your screen is either too big or small. If you use Apple's OS X, you can change its size.

Here's how you can adjust the size of your mouse cursor on both OS X 10.7 - Lion - and earlier, and 10.8 - Mountain Lion. If you are unsure of what version of OS X you have, press the Apple icon in the top right-hand corner of the screen and select About This Mac. The version number will be above the Software update button.

OS X 10.7 and earlier Hanging your cursor's size on older versions of OS X is done through the Universal Access panel. You can access this by:
  1. Open System Preferences by clicking on the Apple icon in the top right of the screen and selecting System Preferences.
  2. Click on Universal Access followed by Mouse or Mouse & Trackpad.
  3. Look for the slider bar labeled Cursor Size.

You can slide the blue tab left or right to either increase or decrease the size of the cursor. In OS X 10.6.8 and older, larger cursors will look blocky and pixelated, while 10.7 will show a clean lined pointer.

OS X 10.8 and later Changing the pointer on 10.8, and presumably in new versions to come, has been changed slightly, but the results will be the same as previous versions.
  1. Open System Preferences by clicking on the Apple icon in the top right of the screen and selecting System Preferences.
  2. Click on Accessibility. You can also hit Command + Option + F5 to bring up the Accessibility menu.
  3. Select Display and look for the slider bar labeled Cursor Size.

You can slide the blue tab left of right to increase or decrease the size of the pointer.

The main reason this function exists is to help users who have trouble seeing the pointer. But, this is also convenient for businesses. For example, if you are giving a presentation that will require the audience to keep track of the pointer, you can make it bigger so your audience can see it easier. If you do choose to increase the size of your pointer, beware that if you take a screenshot, the cursor will show as it's normal size.

This is just one of the many features that make OS X a capable system for any business. If you would like to learn more about how it can fit into your business, let us know today.
Published with permission from TechAdvisory.org. Source.

Topic Productivity
July 12th, 2012

BusinessValue_April02_BWhen it comes to operating a business, you are always walking a fine line, trying to balance costs and profits. This means you are probably eager to cut costs whenever possible. One area that has likely demanded a large investment is technology. The problem with technology is that it can be hard to keep costs at bay, especially when it breaks down.

Here are five ways you can reduce IT spending.

Backup everything If your business is like most other small to medium companies, the majority of your important files are located on one server or maybe a couple of computers. Technology doesn't last forever and the machine where you have your data stored on will eventually stop working.

When it does, you will have to replace it, and your files that were on it could be lost. The cost to recover them will be high. To minimize this risk, you should invest in a solid backup platform that runs on a regular basis.

Yes, this will cost money now, but would you rather have a copy of your systems and data from Yesterday which can be easily implemented when you have a problem, or would you like to pay to maybe recover year's worth of data? Backups will save you costs in the long-run, not to mention the stress they will help you avoid.

Have a strict anti virus policy The idea that your employees won't download programs or browser extensions simply because you tell them not to is like telling a child not to eat candy; they are still going to do it. By simply having computers and devices accessing the Internet through your network, you are at risk. If your systems are hacked or infected, you can face lost data, high recovery costs or worse.

How do you minimize the chance of malware infections and the risk of being hacked? Antivirus software and security solutions installed on every computer that can be run from one machine are your answer. This makes it easier for you or your IT partner to ensure all of your systems' antivirus software is up to date and scanning when it should be. This will minimize the chance of infection and keep costs down.

Document everything As your company grows, you will start to use more technology. Over time, it will need to be replaced, and you likely won't be able to afford replacing all your systems at once. This means that you will have to track down the systems, software, etc. that need to be replaced; which will take time and cost you money.

If you take steps to document all of your systems, computers, software, etc.; where it's located; when it was implemented; who is in charge of it, etc., you will be able to track things down quickly when needed, thus managing your systems better. This time saving measure will cut your costs.

Look into a CRM/ERP/HRM solution There are so many software solutions out there that can help you plan and run your operations. If you've been tracking employee data or planning using a simple spreadsheet, you could be getting more out of a tailored solution.

Solutions like Enterprise Resource Planning (ERP), Customer Relationship Management (CRM) or even Human Resources Management (HRM) can help you spot hidden costs or even plan more efficiently, which will reduce costs well into the future.

Look for fixed-price solutions A major problem with all technology related systems is that predicting costs is nearly impossible. You simply don't know when/if an important piece of hardware will fail. This becomes even harder if you don't have expertise in tech.

One of the best ways to save money on IT costs is to outsource. Almost every IT provider offers flat-rate services that cover your systems and can ensure you maximize your IT investment. This makes budgeting for IT easier, as you know what your monthly costs will be. You can then focus on your business, and over time will see a decrease in IT costs.

If you are looking to cut your IT expenses, why not contact us. We may have a solution that will ease the budget burden.

Published with permission from TechAdvisory.org. Source.

July 11th, 2012

A smart organization is one that can act in a proactive manner to take advantage of rising trends and stay ahead of their competition. One way an organization can remain proactive is through the use of Business Intelligence (BI). Interestingly, many small businesses don’t implement BI and have found themselves lagging behind their competitors. Is your business using BI?

BI can be defined as the ability to turn a company’s processes into data that can be analyzed and converted into knowledge that is delivered to the right stakeholders at the right time and through the right medium. There are many upsides to BI solutions, and companies should be adopting them, here are five reasons why.

  1. Boost productivity. Through traditional data gathering methods, users need to compile and analyze data and write related reports. This can be incredibly time consuming, especially for small businesses who may not have the employees to do it. With a BI program, you can pull data and create the reports at the click of a button thus freeing up time and resources allowing employees to be more productive on their own tasks.
  2. Access to better info. With the increasing amount of data available to companies, manually tabulating and assessing data is no longer feasible if you want to remain ahead of your competitors. BI software can be set up to accumulate and monitor relevant data that’s available when you want it.
  3. Competent decision making. The reason many business projects fail is because critical decisions are made without the best and most objective information available. BI processes help you monitor past and present performances of nearly all operations, while giving you a solid base with which to make future predictions. Essentially BI helps SMEs make better informed decisions.
  4. Results closer to established goals. How many times have you established a set of seemingly reasonable goals for a project or other venture, only to end up with an outcome that’s drastically different? With BI you can keep track of information, and have it accessible by parties that need it, when they need it. BI goes a long way in helping achieving what you aim for.
  5. ROI. Through better strategic awareness, faster reporting, decreased operating costs/lower overheads and access to better quality data and information, BI can positively influence a company’s ROI.
These are just five of the benefits your company can realize through implementing a Business Intelligence system. If you would like more control of your data or to make better, more informed decisions, please contact us.
Published with permission from TechAdvisory.org. Source.

July 4th, 2012

In business, a properly formatted document can go a long ways in showcasing how professional your company is, and often times, is the the main way to set your company apart from other competing entities. If you have a longer document, say a proposal, you’re going to need a Table of Contents (TOC). Instead of struggling to make your own, you can use stylized headings and have Word create one with two clicks of a mouse.

Here’s how you can add and modify headings to your document and have Word create a Table of Contents for you.

Assign headings Many users will just bold titles and change the size of each heading to denote different levels of heading i.e., main headings are bold with a 16 point font, subheadings are bold with 14 point font and text is 12 point font. It’s recommended that you do this while writing the report so you can keep track of what’s what in your report.

When you’ve finished the report and have your headings and subheadings in place, it’s time to apply a heading style to them. First highlight your top level headings (not the main title of the report, but the headings for the main sections). On the Home tab, locate Styles and select Heading 1.

For second level headings, or subheadings, highlight and apply Heading 2. Subheadings thereafter follow the same structure. The reason for doing this is that it will help Word create a TOC that’s properly structured and has links that will take a user to the section when clicked.

If the headline styles Word applies don’t appeal to you, you can change it by going to the Styles group, pressing the grey arrow so the drop down menu opens. Right-click on the heading style you’d like to change and select Modify. You can also hit Ctrl-Shift-S. A window will open which allows you to customize the heading. Press Ok and Word will automatically change all headings that have that style. Note: changes made to a heading style will be saved.

Build a Table of Contents Once you’ve assigned styles to headlines and modified them to meet your needs, you can get Word to insert/build a TOC. First select where you’d like it to go, and make a little space - one blank line above and below should be enough. Click References from the menu at the top of the window, and select Table of Contents. Pick the format you’d like and Word will create the TOC for you.

It’s generally a good idea to apply the heading styles and Table of Contents after you’ve finished the document. If you do need to make changes to the document, you’ll need to update the TOC by right-clicking anywhere on it and selecting Update.

A consistently formatted document goes a long way in impressing external investors or parties, in fact, many now expect a readable document. If your company produces sloppily formatted documents that are hard to read, you could risk losing business. If you would like to learn more about Microsoft Word or other Microsoft Office products, please contact us.

Published with permission from TechAdvisory.org. Source.

Topic Office
June 28th, 2012

The recent LinkedIn password breach and the various Mac and Windows Trojan horses have many small business managers wondering if their data is actually safe. Even if you take steps to ensure safety, they may not be enough and your data may still be at risk. One method companies could implement is two factor authentication.

Two factor authentication is a method of accessing something through the use of two different “factors.” There are actually three different factors a user can use for authentication, but you only need to use two. The three factors are:

  1. Something the user knows. This is the most commonly used factor in all authentication, and can be something like a password or a PIN. This also includes the security question asked when you forget your password.
  2. Something the user has. This is the most common second factor of authentication and is typically a device or physical object the user has. Objects can include key fobs where you press a button to get a randomly generated code to enter, a credit/ATM card or an ID card.
  3. Something the user is. This is a less common form of authentication, especially for small businesses, as it relies on a physical attribute of the user like a fingerprint.
When a company uses two of these factors to authenticate users, they are using two factor authentication. Chances are high, you already use this with your bank or another organization.

Should small businesses implement two factor authentication? In a recent report published by Verizon Business, businesses with 11-100 employees were by far the most targeted groups with 57% of data breaches. Businesses with 101-1,000 employees were the next most targeted with slightly under 10% of data breaches. The report goes on to suggest that the main reason small businesses are being targeted is because of generally lax security.

Before you rush out and implement a two factor authentication system, you need to be aware that it will not prevent all attacks, two factor authentication can still be hacked. It just takes more time and effort than most hackers are willing to invest to hack into systems that use this form of security. Before you implement any new security measures be sure to talk with your IT support provider or an expert like us, we may have a solution that fits your business.

Published with permission from TechAdvisory.org. Source.

Topic Security
June 28th, 2012

A few months ago Intel released the Ivy Bridge processor. Subsequently, computer manufacturers have been releasing computers with the processor and have been extolling the benefits of upgrading, along with some new features like Turbo Boost. These terms can be confusing and could trick you into unnecessary upgrades.

Here’s an overview of what exactly Ivy Bridge processors are, what Turbo Boost is, and what this means for your business.

What is Ivy Bridge? Ivy Bridge is a code name used by Intel to describe the 2012 version of its Core processors - Core i3, Core i5 and Core i7. With the release of Ivy Bridge, the actual Core processors have not changed names, just internal components that make them more efficient and faster. If you’re unsure whether a computer has an Ivy Bridge processor in it, the first number after the core type will start with a three i.e., Core i3-3XXX. What is this Turbo Boost that’s advertised? One of the new features introduced is something called Turbo Boost. If you’ve looked at the new laptops released by Apple a few weeks ago, you have undoubtedly heard of it. Turbo Boost is kind of similar to a turbo boost in a car; the processor runs at a certain speed, and when more power is needed, the processor goes into overdrive and delivers it. In tech speak, this is called, “overclocking”.

Overclocking isn’t a new concept, users have been able to do it for years, although, in older processors it was a complex task only experts would dare attempt. Intel’s new processors now do this automatically. There is an advantage to this: traditional overclocking causes processors to use more power and generate a lot more heat, Turbo Boost gives the benefits of overclocking when you need it, while saving energy when you don’t.

Should my business upgrade to Ivy Bridge? While the new processors do offer some, on paper at least, tempting benefits, it really depends on what you and your employees use your computers for. If you do work that requires a lot of processor power, like 3D rendering or running multiple virtual environments, then yes, you should consider upgrading. If your systems meet your needs now and for the foreseeable future, you won’t really gain anything from upgrading.

Upgrading your systems can be a time consuming and a large investment, it’s important to get the systems that match your needs. If you’re thinking about upgrading, or would like to learn more about Ivy Bridge, please contact us.

Published with permission from TechAdvisory.org. Source.

Topic Hardware
June 27th, 2012

Disasters happen on a daily basis. Sometimes they’re big, wiping out communities, other times they’re small, affecting one online machine or computer. No matter the size of disaster, it pays for businesses, especially small businesses, to prepare for the worst. The only problem is, many small businesses don’t prepare and pay the price.

When a disaster strikes, 25% or more of small businesses affected will fail. Why do they fail? It’s not because of defects in the physical location, it’s mainly because they didn’t take the necessary steps to ensure that their business’s technology and related data is protected.

Because the modern business relies so heavily on technology, it’s essential that businesses have a business continuity plan (BCP) to minimize the loss of vital data, or in many cases, not lose any data at all. This is an important asset that will, one day, minimize losses felt due to any type of disaster. Small business owners know this, but many don’t know where to start. If you’re one of these owners, here are six tips on how you can prepare.

  1. Establish a backup regime. Data backup is one of the most important things you can do, be sure to regularly backup your corporate files, servers and user data files. A truly prepared company will have backups in a number of locations that can be easily accessed.
  2. Ensure solid communication platforms. One of the first things people do in a disaster is try to communicate with each other to ensure everything is ok. You can guarantee that some customers and employees will be calling to check in, so you need to have communication lines that work.
  3. Train employees. A BCP plan is useless if your employees don’t know their role in the implementation of the plan. It’s important that you train your employees on their roles, and that you communicate with them your expectations.
  4. Contingency plans. Like storing your data backups, you should set up contingency plans with the involved parties in your business. You should know where to go to do your banking, what your vendors’ or suppliers’ plans are and how they affect you, and most importantly: you should have a few locations where you can set up your business if the physical property is damaged.
  5. Review and practice all plans. Everything changes at one time or another, maybe an employee leaves or you adopt a new computer system. This makes it important to periodically practice your plans, review what worked and what didn’t, and update accordingly.
  6. Work with an expert. Planning for disaster is a tough thing to do well, considering all the elements to focus on and work with. To ensure a viable plan for your business, working with a recovery expert can help ensure that you get a plan that works for you while taking the stress off.
If you’re worried about your business’s disaster preparedness, please contact us. We can work with you to develop a solution, or provide you with the information and contacts to set you on the right path.
Published with permission from TechAdvisory.org. Source.

June 26th, 2012

One of the most asked for features in today’s electronic medical record (EMR) technology is a secure built-in messaging system. This is an important feature and many providers are integrating this feature. One project aims to make that easier, Direct Project.

When today’s health-care providers exchange information, they're likely sending paper through the mail or fax. But, a growing number of patients are asking for electronic communication, mainly email. Many clinics are happy to oblige, however, secure communications is important, because Meaningful Use Stage 2 requires a HIPAA-compliant secure messaging - HIPAA is the standard for protecting secure information in the health industry.

Yet, currently, many physicians who want to use secure messaging to communicate with patients may have to purchase a third-party vendor’s software to do so. This involves an additional service agreement as well as monthly fees. There is an option that your existing vendor may be able to use.

That option is the Direct Project. While not the only one out there, this is an interesting program. Its concept is simple: In the projects' own words, “Direct Project specifies a simple, secure, stable, standards-based way for participants to send authenticated, encrypted information directly to known, trusted recipients over the Internet.”

Essentially, each provider has a direct address that he or she can use to send and receive messages. Because these messages are secure, they can be used to send patient information to colleagues who need it for care.

A number of existing products already support the Direct Project specifications and allow for the secure delivery of messages. Visit Who’s Fueling Direct? to see if your vendor is one of them.

More information is available here.

Published with permission from TechAdvisory.org. Source.

Topic Web Trends
June 22nd, 2012

One of the most common ways to connect peripherals to your computer is by using a USB connection. You can connect a multitude of things, including your phone, external hard drives, mice and keyboards. Often many employees will plug one of these in, and when they’re done using it just unplug it. Doing this could damage your device.

When you plug in a device using a USB connection, your computer and device essentially shake hands and create a connection. When you plug in a device like your phone or external hard drive, it takes a moment for it to show up on your desktop and you’ll get a message telling you a device has been found and connected.

The whole idea of USB is that it’s what's called hot swappable. This means you can unplug a device and plug in a new one without having to shut down the computer. This is true, you can easily switch devices, however, both Mac and Windows suggest that you eject, or safely remove the device, before you unplug it.

Why eject or safely remove? Think of the USB cord as a bridge over a river and the data being transferred are people on it. When you disconnect a device without safely removing it, it’s akin to removing the bridge while there are people still on it. The chances of the people surviving are pretty slim. In other words, unplugging a device while it’s being used could result in lost data.

If you have the device plugged in, but are not transferring data you may think it’s okay to just unplug the device. Not so, in fact, chances are high that your computer will be using the device in the background and if you unplug it, you’ll most likely get an error message.

Some devices like mice and keyboards are normally okay to disconnect without ejecting, as the data normally goes only one way. A good rule to go by is: if there’s information on the device, safely remove it.

How to remove USB devices on Windows If you’re a windows user, go to the bottom right of your screen, where the icons are, and look for the one that says: Eject USB Mass Storage Device. Click it, Windows will eject it and let you know when you can unplug it.

If you can’t find the icon, open My Computer and find the USB device you’d like to disconnect. if it’s your iPhone or an Android phone, it will be what you named the device. Right-click on it and select Eject.

How to remove USB devices on Mac If you’re a Mac user, you can remove USB devices by clicking on what you want to remove, holding the left mouse button down, and dragging it to the trash (bottom right of the screen). If done right, the trash icon should change to an eject icon (triangle with a horizontal line below it). as soon as the icon disappears, you can remove it.

Alternatively, you can open the Finder - easiest way to do this is double click on your hard drive - find the device in the left side of the window that opens and hit the eject button. When it disappears from the list, you can remove the device.

Safely removing a USB device is a good business practice that all employees should adhere to, ensuring that data isn’t lost. If you have any questions about USB devices or other technological best practices, please contact us.

Published with permission from TechAdvisory.org. Source.

Topic Hardware