Blog

March 23rd, 2013

BCP_March20_BOperating a business is never easy. There is always something that threatens your business, and many disasters are simply beyond your control. These disasters are a part of business, and owners need to be prepared for almost anything. For many companies, the only way to prepare for adverse times is by developing a Business Continuity Plan.

Some companies are hesitant to adopt a Business Continuity Plan (BCP) because of the perceived costs and complexity involved. We won't deny that plans are usually on the complex side, but there are good reasons as to why your company should adopt one. Here's five.

1. Your business will be seen as more valuable Banks, venture capitalists and other investors tend to air on the side of caution, and as such will usually look to businesses that appear to be stable as more viable investment vehicles. Companies with a BCP are often seen to be more valuable, as they can address diverse situations better than those without. As a result, they will make the investor more money over time.

2. Compliance Big companies in a number of industries have had continuity plans for years and many have started to look for suppliers/vendors with continuity plans. Beyond that, some industries and government bodies have made BCP a requirement. If you are a vendor, supplier or even in specific industries, it is a good idea to have one in order for business to run smoothly.

3. Potentially lower insurance premiums Operating a business is filled with risks, and business managers are often looking for ways to minimize it. One way includes the purchase of insurance - many industries and situations require you to carry it. Generally, insurance providers will give more favorable rates to companies that take steps to minimize risk. A solid BCP will go a long way in showcasing how risk-averse your company is, which could lead to lower rates or at the very least, stable rates.

4. More efficient communication Developing a BCP involves constant, company-wide communication in order for it to be successful. For many businesses, this involves collaboration between team members who don't normally work together on a regular basis.

A BCP also fosters communication plans during disasters, both within the organization - most employees have a role, and will need to work together to pull through - and outside - customers, suppliers and other stakeholders will be contacting you. If your employees know how to communicate what needs to be done, effects of the disaster will be minimized.

5. Survival Recent natural disasters around the globe have highlighted that businesses without a plan will most likely be forced out of business. Having a BCP will minimize the chances of this, while preparing your business for survival.

If you are looking to implement a business continuity plan, or improve on an already existing one, please contact us today. We may have a solution for you.

Published with permission from TechAdvisory.org. Source.

March 20th, 2013

Computers are incredibly useful, however they are also complex beyond belief. This is made even more so because of the large number of confusing acronyms, words and terms. If you read tech blogs, or have friends/colleagues who are in-the-know, you have likely heard them mention overclocking and may have wondered what it is, and if you should be looking into it.

Here's a brief overview of overclocking.

Definition: Overclocking When it comes to most tech based devices, the processor (or CPU) is the integral component that functions as the brain of the device; it runs the show. The job of the CPU is to take instructions and input from all the other devices and components and execute them. For example, double-click on a program on your desktop and the CPU computes what to do with the mouse click (open the program), and runs the related code, which is shown as the program opening.

One thing many computer sales people talk about is processor or CPU speed. This is the number of instructions it can run in one second. These instructions are grouped together into one cycle, and one cycle per second equates to a Hertz. You may see computers that have 2Ghz processors, this means 2 Gigahertz or 2,000,000,000 cycles in one second.

Now, when manufacturers release a new CPU they design it to run at a standard, or optimal speed, and will generally limit it. This is done to preserve the life of the components, however there are often ways to break this speed limiter. When you raise the maximum clock speed, beyond the intended clock speed, you are overclocking it.

Why overclock? The main reason users overclock a processor is to make their computer or device run faster. By overclocking, programs will often run or open faster and the general operation will seem smoother. In other words, you can get more out of existing technology without paying to upgrade.

Are there any drawbacks? While overclocking will give you more power and speed, there are some serious drawbacks that make this option risky. The biggest being heat. As you probably have noticed, when you use some devices (say a laptop on your lap) for an extended period of time, they get warm. That's because the components of computers create heat, lots of heat. When you overclock, the processor works harder, thereby generating more heat.

Computers are designed to operate at certain temperatures and if this level is surpassed, the components can wear out more quickly or in extreme cases melt. This means that overclocking will cause your computer's parts to wear out quicker and will decrease the life of the device.

Should we overclock our devices? Did you know that you can overclock nearly anything with a processor? The most common are computers and new smartphones, especially Android devices. When you hear people talking about overclocking their device, they are almost always talking about personal devices.

While it's true, you will get a speed boost in the short run, overclocking will increase your IT budget in the future, because you will have to replace parts more often than is usual. Because most businesses tend to use their technology longer than personal users, any action that causes tech to wear out more quickly is not a good idea.

That being said, you can also do the opposite of overclocking. Underclocking is telling a computer's processor to run slower than it's designed speed. This will increase component life but decrease processing power, and could be beneficial for companies that have new computers and don't need intensive computing resources.

Before you take any actions however, it is best to talk to us, as we may have a better solution for you and one that will cost less.

Published with permission from TechAdvisory.org. Source.

Topic Windows
March 12th, 2013

Security_March06_BThink of the everyday usual precautions you take. When you get into a car, you put on your seatbelt; when you leave the house, you lock the door, the list goes on and on. Yet, when it comes to online security, most people are content with a virus scanner, and do little about securing their personal data stored online. Why is this? If a grocery store clerk asks for your home address and phone number, you’d likely ask why they need it. Online however, we usually provide it without a second thought. Instead, we should be proactive taking steps to protect our personal information.

Here’s three things you can do to help secure your personal data shared online.

1. Realize your online actions are risky
Read any tech related blog, or even syndicated news articles and it’s not hard to see that identity theft and cybercrime in general is not only serious, but on the rise. Let’s face it, our online actions are risky. As with any plan, the first step is realizing that there is a problem that needs to be fixed. The first step is to educate yourself about online security, what steps you should take, and what exactly it is.

For example, here’s a great article written in the middle of February about how different age groups react to Facebook changes, and if they take steps to minimize who can view their personal data. It’s kind of interesting to see that the younger generations take more steps to secure their profiles than their parents, yet you still see people with reputation damaging pictures that can be viewed by anyone.

2. Take matters into your own hands
Many people already know their personal information online is at risk, but there are further things you should do to minimize any dangers:

  1. Don’t rely on websites to keep you secure - Websites like Facebook are companies. They exist to make money. How do they do it? Often by selling information you have given them access to. That’s not saying site owners don’t look out for their customers’ best interests – many do. What you need to do though is look at all the sites you have accounts with and ensure your information is secure to the level you are happy with.
  2. Provide the least amount of information possible - Think about the last time you joined a social network, or mailing list. You likely were asked to provide your name, address, birthday, etc. Did you know that you don’t have to provide all the information requested? Most sites only require your name and birthday, the rest is optional – usually used to provide better service or targeted ads. Many sites will put an asterisk beside required information to let you know that you have to supply this.
  3. Think twice before signing up – It’s a good idea when signing up for a new account to think twice. Do you really need this account? Or can you get by without it?
  4. Use separate email accounts and passwords - Setting up different email accounts is a good idea. One should be for personal use, so the address is given only to people you know. Another could be for all of your online accounts, with a final one strictly for password recovery. It would be best to make the addresses as different as possible. Beyond that you should have separate passwords for each account and every service. This will limit hackers from being able to gain access to multiple accounts.
  5. Secure your browsing – Almost every website that asks users to sign up for accounts offers a secure version of the site. Enter https://www. before the site address, e.g., https://www.facebook.com. https is a secure communications protocol that ensures one is communicating directly with the website – you’re actually looking at Facebook, not a phishing site designed to steal passwords.

3. Encourage others to think
It’s not enough to just take action yourself. Encouraging colleagues, friends and family to also take steps to protect their online information and identities, is worthwhile. There are many great ways to help spread the word about safety, including the National Cyber Security website, which has information on Internet related security. Check it out, and share it!

If you would like to learn about how we can help you keep your information and data safe online, please contact us today for a comprehensive solution!

Published with permission from TechAdvisory.org. Source.

Topic Security
March 12th, 2013

Productivity_March06_BThe dream of many an office worker is to have the option to work from home, either full time or a couple of days each week at least. For many, this is an opportunity to be closer to family and avoid what might be a long commute to work. Many companies have been happy to oblige, especially those in tech that have seen boosts to employee productivity, and benefits from increased flexibility. One major tech company looks on remote working less favorably though.

In late February, an internal memo from Yahoo was leaked. The memo contained a statement indicating that all remote and telecommuting employees will lose their jobs if they continue to work from home after June 2013.

To many in the tech industry, and indeed others who work successfully with remote employees, this might seem like a giant step backwards. There has been a fair amount of backlash on this decision from news outlets, tech experts and employees alike, especially since working from home has proven to increase productivity among certain employees.

According to the memo, “To become the absolute best place to work, communication and collaboration will be important, so we need to be working side-by-side. That is why it is critical that we are all present in our offices.” The two key points here are ‘collaboration’ and ‘communication’. If these are both executed successfully, you have generally productive employees and increased profits.

On the other hand, technology is at a point where employees can log in to their work systems from anywhere. Combine this with video conferencing and cloud solutions such as Google Drive and Microsoft Office 365, which allow real-time collaboration, face-time in an office could be seen as somewhat of a redundant idea. If remote working is executed efficiently, you might save money, see productivity increase more than it might in a physically present team, and profits potentially rise too.

It’s certainly an interesting debate. Does physical face-time or telecommuting equal greater productivity? What we can say, is that it depends on the company and the industry to a large extent. Obviously, restaurants couldn’t operate using remote employees. But, if your business can support it, this may be a viable way to boost productivity, keep employees happy and cut expensive overhead costs such as rents for office premises.

We’d like to hear that you think. Would you rather work from home, or do you benefit from the structure and face-to-face dealings in an office? Where and when are you most productive?

We’d love to get your feedback. Let us know what your opinion is.

Published with permission from TechAdvisory.org. Source.

Topic Productivity
March 12th, 2013

BusinessValue_March06_BOne of the defining characteristics of a business owner is the often overwhelming feeling that they must do everything themselves. Some entrepreneurs are not great at delegating within their company, let alone to specialists outside. This can cause problems, especially when you realize that you aren’t an expert, and could use a little help. For many business owners this realization comes about when they tackle their IT systems and ensuing problems. One solution could be to outsource IT.

Outsourcing IT is a bit different than the usual outsourcing you get in factories, or support services. Instead of going overseas, you can partner with a Managed Service Provider (MSP) in your local area. MSPs provide comprehensive IT management services which usually cover everything tech related.

Working with an MSP often has a direct impact on your bottom line, and can help make your company even more successful than it already is, or at least increase profits to get you there. However, there are many more reasons companies outsource. Below are our Top Five:

5 reasons why you should outsource IT

  1. Increased control of operational costs - Most MSPs group their services together into monthly plans, meaning you have one cost associated with the IT department. Overhead expenses such as staffing, overtime hours, and operational costs, as well as software licenses, etc., are all included in a flat monthly fee. This makes it easier for you to control IT related costs, while also saving money.
  2. Take focus away from IT, refocus on business functions - Technology is great and a necessity of running most modern businesses but it does break and become either worn out or outdated. Seemingly endless tech issues can take your focus away from key business functions. MSPs take care of all this, allowing you to re-focus your efforts and energies into running your business.
  3. Access to better resources – The best and newest tech is often pricey; well beyond the budget of a vast majority of small and medium sized businesses. This is further compounded by the fact that you likely can’t afford to hire the new employees needed to to run these systems either. MSPs can provide the latest tech along with the experience to support it, allowing you to get more for less.
  4. IT functions are beyond current abilities – If you are like most small to medium companies, you have a few staff who are designated as computer experts, even though that may not be their main role or responsibility. Or it could be the case that you and your colleagues simply lack the knowledge and experience required to run increasingly complex technical systems. The employees at MSPs eat, sleep and breathe tech, and can provide enterprise level IT support and knowledge.
  5. Reduced risk from IT failure - Technical systems are built to be robust. However, they aren’t perfect and will eventually fail. This could mean lengthy downtime, increased costs and lost data. Managed Service Providers reduce this risk by actively monitoring your systems and offering back-up services which will reduce productivity loss and lost business.

3 things you can expect from an MSP
There are a wide variety of MSPs, serving many industries, but there are three things you should expect from any MSP.

  1. Flexibility - IT companies have access to a wide variety of vendors, tech and resources. This means they should be able to develop scalable solutions that meet your companies needs as you grow.
  2. Product experts - The main business objective of an MSP is to provide IT services.To do this they need employees who know their stuff. To get the best, most hire staff with specific qualifications and certifications and experience with the systems offered.
  3. Long-run cost savings - In the short-term it is entirely plausible that internal staff are cheaper than a monthly MSP. Factor in the cost of purchasing technology, maintaining it, plus the cost of recovery, and the cost of retaining an internal IT team will skyrocket. Most companies you outsource to offer a flat rate monthly fee, and will be able to maintain your systems longer. This means lower replacement costs and increased uptime, which in the long run make outsourcing a viable, cost-efficient option.

If you are tired of IT problems and cost overruns, contact us today to see what we can do for you.

Published with permission from TechAdvisory.org. Source.

March 5th, 2013

Facebook_Mar05_BFacebook, beloved by many, is an ever-changing and evolving entity. One of the latest updates is the introduction of Graph Search, which makes it easier for users to find each other based on their likes, photos, comments, etc. Before this new feature is turned on, it would be beneficial to you to perform a profile audit.

There are three main parts to this audit, which will ensure that your personal profile is ready for Graph Search. Bear in mind that this is for your personal account, not your business Facebook Page. This audit is ideal if you would like a more professional looking profile.

Step 1. Check who can search for you
The whole idea of Facebook is to be social, however you may not want to be found by every man and his dog on this platform. You can check who can search for your profile by:

  1. Clicking the Lock icon in the top-right hand side of the screen.
  2. Selecting Who can contact me?
  3. Looking at Who can send me friend requests? By default it is set to Everyone, but you can change this by pressing the downward facing blue arrow.
  4. Looking at Whose messages do I want filtered into my inbox?

Step 2. Check your Activity Log
The Activity Log is essentially a journal for Facebook. It covers everything you have done on Facebook, and provides you with a quick way to edit your profile. You can access it by:

  1. Clicking on the Lock icon in the top-right hand side of the screen.
  2. Selecting Who can see my stuff?
  3. Click on Use Activity Log.

Depending on how active you are on Facebook, it could take a bit of time to look through your activities. If you see something you don’t like, or would like to change, press the pencil at the right-hand side of the activity. This will allow you to edit the post, remove it from your timeline or delete it. Note, that if you remove it from your timeline, the information won’t be deleted.

If you press the Lock icon you can change who can see the post/activity on your timeline too. It would be a good idea to look through your whole timeline and ensure that any unprofessional comments, links, likes, etc. are either deleted or removed from your timeline. It wouldn’t be a good idea to make your profile completely private however, so ensure some posts – maybe ones related to your business, hobbies, interests, etc. – are still visible.

Step 3. Check who can see future posts
Facebook has included an option that allows you to set who can see future posts on your timeline. This will lessen the need for a future account audit. You can set this by:

  1. Clicking on the Lock icon in the top-right hand side of the screen.
  2. Selecting Who can see my stuff?
  3. Pressing the downward facing blue arrow under Who can see my future posts? and setting it to the desired level of security.

In order to ensure your profile is optimized for Graph Search, carrying out this audit would be a great idea. As we stated above, you don’t have to make everything private, after all, this is a social network. Just make sure that anything that is unbecoming of the professional you are is removed or hidden from prying eyes. If you would like a little help ensuring both you and your business are ready for the next big Facebook feature, contact us today.

Published with permission from TechAdvisory.org. Source.

March 5th, 2013
March 5th, 2013
February 26th, 2013

Office_Feb26_BMicrosoft Word has been an important business tool for many years and will likely continue to be so for many more to come. There are numerous features that are used on a regular basis that, while they should make things easier, can actually create more work. One such feature is copy and paste. However, Word has some interesting copy and paste functions that can truly make your job more efficient.

Here’s an overview of Word’s copy and paste feature.

Simple copy and paste
As you likely know already, you can copy by selecting/highlighting text, or pictures and either right-clicking and selecting copy; pressing Ctrl + C (Command + C on Mac) or selecting File followed by Copy.

You can paste by either right-clicking and selecting paste; pressing Ctrl + V (Command + V on Mac) or selecting File followed by Paste. When you copy and paste, the highlighted text or image will be placed where you have placed the cursor.

While simple copying and pasting works fine for most situations, there are times when you are copying from one word document to another and need something else. Many documents have different text and layout formats which can make copying a bit inefficient, as you will likely have to change some of the text or image settings. Word has four built-in features that can make this easier.

These settings can be found by first highlighting what you would like to copy. You should see a clipboard above the highlighted text when you hover your mouse over it. Pressing the down-facing black arrow will open the different copy functions.

  • Keep Source Formatting – Pressing this will keep the formatting of the text/document you copied from. This is the default option.
  • Merge Formatting - This will keep the text’s format, without changing the format of the document you paste into. E.g., if the text you copied is a different font and size, it will be posted into the new document at the same format, but the next word typed will retain the previous format.
  • Use Destination Style - This will change the text you copied to the same format as the document you copy into.
  • Keep Text Only - This will copy only the text. All graphics, tables, charts and formatting will be discarded. When you paste into the new document, the text will be changed to that document’s formatting.

This feature can help make it easier to copy and paste from one document to another. Office has many features that can assist in improving your productivity, or make your job easier. If you are interested in learning more Office tips and tricks, please contact us today.

Published with permission from TechAdvisory.org. Source.

February 22nd, 2013

Security_Feb20_BImagine you are in the airport waiting for a flight when you look down only to discover that your laptop is missing. This isn't a great thought, especially since many of us have important files and programs that we can't afford to lose. The problem is, if your device has gone missing, the chances of you recovering it are slim. The good news is that there is a possible solution that lets you track your device.

Prey is an Open Source - free - program that you can install on your computer or mobile device and track it when it's missing, or been stolen.

How it works First you have to download the software - from here - onto your computer (Windows, Mac or Linux are supported), and sign up for an account. You have a couple of options here: You can either sign up for an account with Prey and access a control panel through the website, or install it as a standalone which is recommended for advanced users as it requires some server configuration.

If you chose to go with the Web option you sign up for an account and install the software then register your main device along with extra ones like an Android, or your iOS device. Once you have downloaded Prey and linked them together, you are ready.

For mobiles, you can send these a text (from the Web Control Panel) which will initiate the established options you have pre-set for when your phone goes missing.

How Prey finds your device's location depends on the device. For laptops, it can turn-on your Wi-Fi connection and try to connect to the nearest access points. It can take the IP address of each Wi-Fi access point and from there get an approximate location - in some areas as close as 200 feet. On your phone, it turns on the GPS (if available) and tries to connect to Wi-Fi networks in range. These two combined can generate a fairly accurate location.

All this tracking information is sent to your inbox in the form of a report, which can be tailored to meet your needs.

What makes this program different from other similar ones is that it can be installed across multiple platforms and managed from one account. It's also free, which makes it even more attractive. There is also a Pro version which allows you to track more devices, for a monthly fee (USD$5 for 3 devices up to USD$399 a month for 500 devices).

Prey is just one of the many device tracking programs, and installing one may be a good idea, to give you a greater chance of retrieval if your phone or computer is lost or stolen. Do you use one already? If so, which one? If you would like to learn more about Prey and the other device tracking programs please let us know, we may have a great solution for you.

Published with permission from TechAdvisory.org. Source.

Topic Security