Blog

May 20th, 2016

2016May20_BusinessContinuity_CYour service provider, who you have tasked with looking after your company’s IT, has kept your business up and running for the past 10 years. Usually, that kind of longevity in developing continuity plans has resulted to some providers overlooking or underestimating certain issues. Here are some of them.

Over-optimistic testing

The initial testing attempt is usually the most important as it’s when IT service providers can pinpoint possible weak points in the recovery plan. However, what usually happens is a full transfer of system and accompanying operations to the backup site. This makes it difficult to look at specific points of backup with too many factors flowing in all at the same time.

Insufficient remote user licenses

A remote user license is given by service providers to businesses so that when a disaster strikes, employees can log in to a remote desktop software. However, the number of licenses a provider has may be limited. In some cases, more employees will need to have access to the remote desktop software than a provider’s license can allow.

Lost digital IDs

When a disaster strikes, employees will usually need their digital IDs so they can log in to the provider’s remote system while their own system at the office is being restored. However, digital IDs are tied to an employee’s desktop and when a desktop is being backed up, they are not automatically saved. So when an employee goes back to using their ‘ready and restored’ desktop, they are unable to access the system with their previous digital ID.

Absence of communications strategy

IT service providers will use email to notify and communicate with business owners and their employees when a disaster happens. However, this form of communication may not always be reliable in certain cases such as the Internet being cut off or with spam intrusions. There are third-party notification systems available, but they are quite expensive and some providers sell them as a pricey add-on service.

Backups that require labored validation

After a system has been restored, IT technicians and business owners need to check whether the restoration is thorough and complete. This validation becomes a waste of time and effort when the log reports come in a manner that is not easy to compare. This usually happens when IT service providers utilize backup applications that do not come with their own log modules, and have to be acquired separately.

These are just some of the many reasons why business continuity plans fail. It is important for business owners to be involved with any process that pertains to their IT infrastructure. Just because you believe something works doesn’t necessarily mean that it works correctly or effectively. If you have questions regarding your business continuity plan, get in touch with our experts today.

Published with permission from TechAdvisory.org. Source.

Topic business
May 17th, 2016

2016May17_Security_CAs more and more content management services are released to aid SMBs in online marketing, security risks also increase. One such helper is the image processing service ImageMagick. And while it has proven useful to countless businesses, it is now something you should be concerned about from a security standpoint. Let’s take a minute to discuss this vulnerability and what you can do to protect yourself.

What is ImageMagick?

ImageMagick is a tool that allows sites to easily crop, resize, and store images uploaded by third parties. Vendors continue to improve user interfaces and experiences by consolidating functions into all-in-one packages, which means administrators are becoming increasingly unaware of what specific services they are actually utilizing. ImageMagick is deeply integrated into countless web services and many webmasters may not even be aware they are using this unsafe software.

How can an image make my site vulnerable?

Recently, it was discovered that images can be uploaded that force ImageMagick into executing commands and permitting attackers to remotely insert harmful code into vulnerable sites. Images are actually made up of complex code that is translated into photos, icons, etc. Different file extensions use what are called “Magic Numbers” to define their file types. Manipulating these numbers allows attackers to exploit a flaw in ImageMagick. The service scans the uploaded file, and attempts to decode the source information whenever it detects the file is not what it claims to be. Scanning that code and attempting to rectify the file misappropriation can then trigger whatever was hidden inside the image and result in remote command of your site.

How should I protect my site?

ImageMagick has admitted knowledge of the security flaw and promised to release a patch very soon. Until then, experts advise implementing multiple workarounds to keep your systems safe. However, if you're not well acquainted with your web server and its code, then it's wise to consult an expert instead of attempting these changes on your own.

For those who are familiar, follow these steps. The first is to temporarily incorporate lines of code that preemptively block attackers from exploiting these holes. Those lines of code, and where to insert them, can be found here.

The next step is double checking that any image files utilizing the ImageMagick service aren’t hiding any harmful information. This can be accomplished by opening an image file with a text editor, and checking for a specific set of letters and numbers at the beginning of the text that define what type it is. The list of these “Magic Numbers” can be found here, and will reveal if an image is hiding its true purpose.

Ideally, administrators will halt all image processing via ImageMagick until a patch is released from the developers.

Data security is one of the most crucial aspects of any SMB, however, keeping up with the constant flow of security exploits and patches can be overwhelming for administrators of any ability level. Why not contact us to learn more about keeping your network secure and protected from exploits like this one?

Published with permission from TechAdvisory.org. Source.

Topic Security
May 13th, 2016

2016May13_SocialMedia_CManaging your company’s Twitter account can be tricky. You have a lot of brilliant things to say in under 140 characters but the problem is getting more eyes on your tweets. What’s worse is that there are other companies competing with you to grab that attention. So what can you do to get more people retweeting your posts? Here are a few tricks you can use to get more retweets.

Schedule your tweets

There is absolutely no point in tweeting out any content if your audience isn’t even awake for it. That’s why it’s important for you to tweet at the right time to get the most retweets. Usually people won’t be retweeting in the morning and are more likely to retweet around 2pm to 6pm EST. However, if your followers live in different time zones and countries, the time you should be tweeting may vary. Twitter tools like Tweriod track down the geographical distribution of your audience and pinpoints the optimal time you should be tweeting to get the most retweets.

Use links

The next time you tweet out something, try embedding a link in your post. Whether it’s news, sports or celebrity updates, people will put some effort in keeping up-to-date with their interests. Studies have also shown that links to instructional posts get the most amount of retweets as well. The problem is, 140 characters is not enough content for your followers. So by satisfying your audience’s curiosity, you motivate them to pay you back by sharing your tweet out to their friends.

Ask for retweets

This is perhaps the most obvious tactic to get some retweets. Using call to action phrases such as “please retweet” significantly increases your chances of a retweet. Of course, you probably aren’t the only one asking for retweets. Adding something to sweeten deal, like a prize for one lucky person who retweets you, gives people incentive to do so.

Use visuals

Intriguing images can inspire retweets. Images are a great way to convey a lot of information in a short amount of time, and social media users love that. Some have found that, using colorful images and infographics in their tweets significantly increased their engagement rates and found that more followers were retweeting their content. It’s probably because there’s just more content to engage with other than a witty 140 character thought.

Use retweetable words

Research has shown that some words are more retweetable than others. Words like you, twitter, please, retweet, post, blog, social, free, media, help are the top 10 most retweetable words. However common-use words in any conversation such as “lol, haha, work, sleep or watching” are less likely to get retweeted. Unless you’re someone incredibly famous, it’s best to avoid using conversation filler words and stick to the buzz words that encourage people to share your tweets out to everyone they know.

Use quotes

Quotes express a lot in one simple line, making it perfect for any Twitter posts. Depending on your audience, a thoughtful quote can really move their fingers to click that retweet button. The next time you’re running out of ideas for tweets, dig up some good quotes relevant to your topic to get those retweets going. However, don’t continuously plug in quotes into your tweets. The trick is to do it occasionally, so you don’t risk people tuning out of your tweets.

#Hashtag

You’ll notice that the more popular tweets tend to have at least one hashtag. Using hashtags on keywords helps categorize your tweets with similar ones, giving your posts a bit more reach and, hopefully, more retweets. Just make sure you don’t overdo it as #thiscanbequiteannoying.

We get that small business may find it tough getting their name discovered among so many social media accounts. But if you consider some or all of these Twitter tactics, you have a better chance of getting more eyes on your tweets. If you want to learn more about useful Twitter tactics to increase your exposure and engagement, give us a call today.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
May 10th, 2016

2016May10_Hardware_CEvery business sits on top of a foundation of different building blocks that enable it to operate smoothly and efficiently. One building block that is becoming increasingly essential is IT hardware. Server hardware can be expensive, which is why proper management is vital. Overburdening your systems can lead to an increase in operating temperature, which can lead to reduced reliability and even total data loss.

How does temperature affect my servers?

Extreme temperature in server hardware can result in different forms of damage. Most SMBs see total failure as the most concerning outcome. A server that completely crashes for any reason results in costly data loss and service interruptions, but the unbiased advisory organization Uptime Institute warns about overheating that doesn’t result in total failure. Every 18 degrees higher than 70 degrees Fahrenheit, hardware reliability decreases by 50%. This decrease in reliability can be just as, if not more, expensive for your hardware budget in the long run.

Cooling methods can’t just be implemented and forgotten, they must be closely monitored to ensure the health of your server hardware--short and long term. Options for temperature management range from simple low-budget solutions to expensive outsourced alternatives; determining your server management budget will greatly depend on what types of methods you intend to implement at your SMB.

Cooling methods

Which system you use to cool your server largely depends on how much power your hardware is using. The higher the watt, the harder it’s working. It will be easier to determine the scope of your temperature management needs when you have a thorough understanding of your power consumption.

PCWorld advises that simple conduction management is adequate for any equipment operating at less than 400 watts. This means simple solutions like positioning your server away from walls, low ceilings, cable clusters and anything else that can block hot air from dissipating naturally.

For watts between 400 and 2,000, strategic ventilation becomes a necessity. Adding passive ventilation is viable up to 700 watts, but fan assisted ventilation will be required above that up to 2,000 watts. With the increased power consumption, temperatures will rise and air movement needs to be more closely managed. At this stage simple vent and oscillating fans will suffice.

Anything higher than 2,000 watts needs to utilize dedicated cooling solutions. This means air-cooled units to actively reduce server room temperature. Depending on the size and arrangement of the space, a simple self-contained unit may be enough to reduce rising temperatures back into acceptable ranges. However, if you’re not sure, you should schedule a consultation with a vendor to consider more drastic cooling and monitoring methods.

Keeping your servers running at ideal temperatures means smoother data operations, lower hardware budgets and one less thing to worry about at your SMB. As your business continues to grow and develop, keep close tabs on increasing server loads--it could save you from devastating data loss. If you’d like more detailed advice about server management, or have any other questions about your hardware setup, contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Hardware
May 3rd, 2016

2016May3_BusinessIntelligence_CThere are many marketing techniques SMBs use to gain clients. Free information products, brochures, and press releases are just a few among many. But how do you know what’s most effective? It all comes down to looking at data and seeing for yourself what’s worked before. We’ve gone through the trouble of doing just that, so you can see how one age-old marketing technique can give a big boost to your business.

What is one thing every consumer has in common? They all love to save money. This is why the marketing technique of offering coupons is still as effective today as it was decades ago. Shocked? Don’t believe this is true? Well, let’s explore some statistics.

A recent report by Valassis, a large marketing firm that serves clients across the globe, provided some enlightening information on the effectiveness of coupons. Here’s what they discovered in terms of how coupons influence consumers.

  • 82% of all consumers are more likely to buy from a brand they wouldn’t normally because of a coupon
  • 85% are influenced to try a new product because of a coupon
  • 84% are more likely to switch brands because of the weekly specials on offer
  • 24% choose to shop at another brand’s store over their preferred because of better advertised bargains
This same report also uncovers some interesting data about brand loyalists, revealing that 78% are more likely to buy from a brand they wouldn’t normally patronize, due to a coupon. While this number is surprising close to the amount of total consumers influenced by coupons (as mentioned in the first bullet point above) this next bit of data may come as more of a surprise: 43% of brand loyalists have a more positive view of a company that offers coupons over those who don’t.

While this recent report goes a long way to revealing the benefits of coupons, how do they compare to another common marketing offer used today: free information products?

The appeal of coupons over information products

According to one marketing firm based in Waterford, Connecticut, a coupon was chosen 9 out of 10 times over an ebook when offered simultaneously. This raises an interesting question: why would a coupon be more effective than a free ebook or other information product? Let’s look at some common psychology triggers at play here.

Broad appeal - simply put, coupons have mass appeal. While information products are likely to be seen as more valuable to those with a higher education, a coupon can appeal to all income brackets - from the very wealthy to the very poor.

Instant value - to gain results from an information product requires a time investment and action. For example, if a customer receives a free 30 page ebook that explains how to get the best discounts on electronic equipment, he or she needs to read the book and then take action (and possibly create a plan) to gain the rewards of that time investment. Many consumers would rather spend their time doing something else, but a coupon on the other hand offers immediate value. Simply hand it over to the service provider, and you save money instantly. What’s not to love about that?

Uniqueness - the online marketplace is flooded with free information products. While they’re still an effective tool to gain a prospect’s email address, far fewer businesses offer coupons on their website, especially in the small business sector. By offering a coupon, you provide a free offer that immediately separates you from the pack.

The point here is that just because a marketing tool is popular doesn't mean it’s the most effective. This is why we encourage you to review data and statistics before implementing any marketing technique in your business. It can save you a whole lot of time and also make your business stand out.

Want more valuable business information that can help you connect better with your customers? Curious to learn how IT can help collect data more easily? Call us today to find out more.

Published with permission from TechAdvisory.org. Source.

Topic business
April 28th, 2016

2016Apr28_Security_CWhy do hackers attack? Is it for money, notoriety, or political reasons? Many business owners never ask these questions, and instead only think about the means of how a cyber attack takes place. But knowing the motive behind a hacker’s attack can help you understand whether or not you’re a target and what data you need to protect. So let’s take a closer look at 4 different types of hackers and their motives.

Script Kiddies

When it comes to skill level, Script Kiddies are at the bottom of the totem pole and often use scripts or other automated tools they did not write themselves - hence the name. With only an elementary level of technical knowhow, Script Kiddies usually don’t cause much damage...usually. The Script Kiddy virus known as the Love Bug which sent out an email with the subject-line “I LOVE YOU” fooled millions of people, including some in the Pentagon, in the early 2000’s. The virus reportedly caused around 10 billion in lost productivity and digital damage.

So who is a Script Kiddie? Most of the time they’re simply bored youth looking for a thrill or notoriety. Many never evolve into a full-time hacker, and instead just use their skills as a hobby. Oddly enough, many Script Kiddies find a career later on working in the security industry.

Hacktivist

If you’ve heard of Anonymous, LulzSec or AntiSec, then you’re familiar with Hacktivists. These groups are made up of members of varying skill levels, all the way from Script Kiddies to some of the most talented hackers in the world. Their mission is largely politically motivated as they aim to embarrass their targets or disrupt their operations, whether that be a business or government body. Two of the most common ways they attack their target are by stealing sensitive information and exposing it or denial of service (DDoS) where a server is overloaded till it finally crashes.

As a small or medium-sized business owner you are not necessarily immune to Hacktivist disruption. If your business or a company you’re associated/partnered with participates or provides services that can be seen as unethical, such as Ashley Madison (who fell victim of a major Hacktivist attack last year), then you too may be targeted by Hacktivists.

Cyber Criminals

Often talked about in the media and well-known by most SMBs, cyber criminals are after one thing: money. Their targets run the gamut, including everyone from individuals to small businesses to large enterprises and banks. But what do these targets usually have in common? They either have a very valuable resource to steal or their security is easy to exploit...or a combination of both of these. Cyber criminals can attack in a number of ways including using social engineering to trick users into providing sensitive information, infecting an organization/individual with ransomware or another form or malware, or exploiting weaknesses in a network.

Insiders

Perhaps the scariest type of hackers are the ones that lurk within your own organization. Insiders are made up of disgruntled employees, whistleblowers or contractors. Oftentimes their mission is payback; they want to right a wrong they believe a company has perpetrated toward them, so they’ll steal sensitive documents or try to disrupt the organization somehow. Edward Snowden is a prime example of an insider who hacked his own organization - the US government.

Now that you know what motivates your enemy, you’ll hopefully have a bit of an idea as to whether or not you’re a target. To learn more about how to secure your business from these types of hackers, get in touch with our experts today.

Published with permission from TechAdvisory.org. Source.

Topic Security
April 26th, 2016

2016Apr26_Hardware_CThe good ol’ two button mouse just won’t cut it anymore. They’re unresponsive, uncomfortable and the cord somehow ties itself up every time you put it in your bag. However, buying a new mouse can be a pain, especially when you don’t know what to look for. Do you need a mouse that’s more forgiving on your wrists? Are you looking for a tangle-free mouse? If you’re having difficulty deciding on your ideal mouse, here are some things you should keep in mind.

Cable or wireless?

Choosing between a wired or a wireless mouse is a factor you have to consider if you’re planning on purchasing a new mouse. Wireless mice are generally more comfortable since your range of movement isn’t limited by a cable and they’re usually very travel friendly. However they tend to be less responsive than their wired counterpart, which can be a problem for users requiring more precise mouse control. In some cases, wireless mice can also interfere with other wireless devices nearby. Furthermore, wireless mice require batteries, which can be a drag if you forget to buy some at the store. If you’re planning on using the same mouse for both work and home, you run the risk of losing the tiny USB receiver for your wireless mouse.

On the other hand, wired mice are cheaper and easier to use since you simply plug it in and you’re good to go. The only problem you’ll have to worry about is dealing with tangled wires. So when you’re deciding on a new mouse, think about whether you’re looking for comfort or convenience.

Ergonomics matters

You’re going to be using the new mouse for a while, so it’s important to choose a mouse that feels comfortable in your hands. When deciding on the right mouse, focus on the size and the grip of the device. The size of the mouse usually comes down to the individual’s hand size. For example, someone with smaller hands might find larger mice quite unwieldy. Certain mice can also accommodate for different types of grips:
  • Fingertip grip: With a smaller and flatter body, this mouse allows you to control the entire device with just your fingertips. This type of mouse usually provides you with more precise control of your cursor. However, it doesn’t give any room for your palms to rest on, increasing the risk of carpal tunnel syndrome. Avoid using this grip unless your work requires a lot of photo, video or sound editing.
  • Palm grip: Palm grips are the complete opposite of fingertip grip mice. With a bump at the back end for your palms, this type of mouse reduces the stress on your forearm and wrist. This grip sacrifices precision for comfort so people prone to repeated stress injuries (RSI) should definitely opt for this type of grip instead.
  • Claw grip: This type of mouse is usually the one people are most accustomed to. Named after the shape your hand makes when you hold this type of mouse, claw grip mice give you the best of both the palm grip and the fingertip grip. Like the palm grip, your palms can rest on the mouse but this type of grip also gives you a bit more control. While the palm grip is still the most ergonomical mouse, the claw grip gives a good balance of both comfort and precision.

Do more than right and left clicks

Don’t just assume that extra buttons on a mouse would mean that it’s only meant for gamers. Extra buttons add more functionality to your mouse. For instance, you can assign your spare mouse buttons to Copy and Paste so you’ll no longer have to input keyboard shortcuts. Want to switch between open windows quickly? You can assign the Alt + Tab (for Windows) and Command + Tab (for Mac) to those mouse buttons. While this isn’t a requirement when picking a new mouse, it’s definitely a neat feature that will save you some time.

DPI (dots per inch)

For precise movements, higher sensitivity is a must. Whether you’re editing images, videos or audio files, you’re going to require more precise mouse movements to execute them well. If you ever had to move your mouse around because your cursor was stuck, then a high sensitivity mouse can solve your problems. Try looking for mice with 1200 DPI or greater for finer control.

Mouse specifications could be the last thing on your mind when it comes to buying new hardware. But comfort is important. A good mouse with the right fit, can make you more efficient and reduce the risk of injury. If you need some help setting up the best hardware for your company, give us a call. We’re happy to help.

Published with permission from TechAdvisory.org. Source.

Topic Hardware
April 25th, 2016

2016Apr25_InternetSocialNetworkingAndReputationManagement_CMost people are still impressed when they see a LinkedIn profile with 500+ connections. It gives that person authority in their industry and shows they’re a valuable member of the business world. In other words, 500+ connections can help sell you and your business. So how can you reach this coveted number? Here are some tips to get started.

Network every day

If you’re struggling to grow your LinkedIn network, you may not be spending enough time on the platform. If you want to become a power player, you need to use the social network often. So dedicate 15-30 minutes a day to network on LinkedIn, and make it a goal to reach 500+ connections.

Join and participate in groups

Utilizing LinkedIn groups presents an opportunity to meet other professionals (and eventually add them as connections) as well as learn and share valuable advice. The point is not to just join a group, but actively participate in them. This requires a degree of focus and smart selection.

How many groups should you join? Shoot for around ten. This will ensure you have time to participate in each group and connect with its members. As for the groups you join, you’ll obviously want to join those in your industry, but you should also diversify. So choose five within your industry and five that relate to your other interests or provide you an opportunity to learn from its group members. Some suggestions to consider are an alumni group for your university, groups that represent causes/charities you care about, and groups that relate to a new skill you’re hoping to learn. Obviously, all the groups you join need to be active. If members only post in a group once a week, this is a red flag to avoid joining.

Once you’ve joined, you should spend some time each day contributing in at least five of your ten groups. You can ask questions, provide advice, or share valuable articles or original content you’ve created. Once you’ve developed a rapport with group members, you’ll have an easy, non-awkward way to connect with them.

Personalize your “Connect” request

The less you know a person, the less likely they are to connect with you if you send a generic connection request. You know the one: “I'd like to add you to my professional network on LinkedIn.”

Many people will simply ignore requests like this. This is why it’s important to include a quick note that either refreshes that person’s memory of you, mentions a common interest or connection you might share, or simply introduces yourself and your reason for connecting. The more personal your note the better.

Use keywords in your profile

Just like Google, Bing and the other search engines, keywords help you get found on LinkedIn. Plant these keywords in your professional headline, profile summary, and skill endorsement section. How do you know what keywords to use? Think about what you want yourself or your business to be endorsed for. What skills do you have to offer your clients? For example, if your business specializes in web solutions, some keywords you may think about using would include SEO or “web content”. As for your skills, be careful not to choose keywords that are too narrow. For example if your business is in the financial services and tax preparation industry, don’t use the names of niche tax solutions you specialize in like “estate taxes” or “small business taxes” as your endorsed skills. Instead, choose more general words like “tax preparation”. By doing this, your connections will be more likely to endorse you as it’s a broader category.

By following these tips and spending at least 15 minutes a day on LinkedIn, you’re sure to see the number of connections you have grow. And the more connections you make, the less work you’ll have to do to grow your network as more and more people will send you connection requests instead. This will provide more business opportunities and chances for you to meet new clients. If you’d like more ideas how to improve your social media efforts, feel free to email or give us a call.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
April 18th, 2016

2016Apr18_Productivity_CMost business owners are quick to think that utilizing mobile devices automatically leads to more productivity. Unfortunately, this is not always true. A poor mobile device policy can actually lead to burnout and see your employees become overwhelmed by technology. Here’s how to avoid these pitfalls and get the most out of mobile devices in the workplace.

Use the right tool

Some work tasks just aren’t cut out for mobile use. While using a mobile phone or tablet to send emails is an effective way to work on the go, trying to write long form reports on these same devices is a bad idea. As a general guideline, small tasks such as email, viewing documents, using search engines and project management apps are good for mobile work. Anything that is too detailed is probably better suited for a computer or laptop. Lastly, only train your employees to use and learn the mobile devices and programs that make sense for their role. If you want them to be most efficient, you don’t want to overwhelm them with every mobile tool your business uses.

Communicate face-to-face

Email is undoubtedly a valuable communication tool. But it’s also become the bane of existence for many of today’s employees and business owners. Too many emails kills your employees productivity, overwhelming them. And unfortunately, many times email is simply unnecessary. Instead of sending that email about a question concerning an upcoming meeting, simply go and ask in-person. You’ll likely get a response much quicker and you avoid adding yet another message to the email overflow.

Consider adding a face-first policy in your office. This means that every time your employees consider writing an email, they should question if it’s easier to just go talk with that person directly. If that person is located a quick walk away, then the conversation should take place in-person. This especially makes sense if your employee needs an answer within a few hours, as sometimes emails go unanswered for much longer than this. By enforcing an email policy, your employees’ inboxes are less likely to be overflowing and your communication will take place in a more timely manner.

Set boundaries

There’s no question that mobile tech can help productivity, but it can also hinder it. The problem is that many employees who utilize it have difficulty “switching off”. The lines between work and personal life begin to blur as completing work tasks is always right at their fingertips. While on the surface more work output from your employees may sound like a good thing, in reality it’s far from it. Being “always on” can quickly lead to burnout. And even if it doesn’t, if your employees don’t take time to break and recharge, their productivity will suffer. To demonstrate just how many employees fall into this trap of overworking, the 2015 Staples Business Advantage Workplace Index surveyed 2,602 employees and found that a quarter of them regularly worked after standard business hours, and four out of ten worked on at least one weekend a month.

So how can you resolve this issue as an employer? Simply set boundaries. Create time frames for when work platforms and applications can be utilized and for when emails can be sent and responded to. Also, don’t encourage employees to work on off-hours by sending emails during the weekend. If your concern isn’t urgent, then by all means wait till Monday to send it out.

Be flexible

While it may sound a bit contradictory to the last point, being flexible in your work policy can be a smart decision to boost productivity. By being flexible, we mean the ability for your employees to work at hours and locations of their choosing. Most people work better and quicker at certain hours as they are more focused at specific times of the day. And some people will work better remotely than they do at an office space as there can be less distractions. The Staples survey supported this fact as 59% of the employees surveyed said that flexible schedules had a positive effect on productivity.

Cloud tools like Office 365 and Google Apps can help encourage a flexible workplace. But regardless of how flexible your office becomes, be conscious that parameters on work, mentioned in the last section, should still be in place to prevent employee burnout.

Mobile devices in the workplace can go a long way towards making your business more efficient and employees happy. If you’d like to learn more about utilizing mobile devices in the workplace or how you can leverage technology to make your business more productive, call us today.

Published with permission from TechAdvisory.org. Source.

Topic business
April 13th, 2016

2016Apr13_Security_CIn the 21st century, personal computing is with us wherever we go. This is all thanks to the proliferation of mobile devices such as smartphones and tablets. These devices allow us to take work home with us. And, with bring your own device (BYOD) strategy, businesses have never been so productive. However, BYOD poses a number of security risks if you’re not careful. What are these problems? How are they caused? Here are some BYOD security risks you should know before implementing it in your business.

Data leakage

The biggest reason why businesses are weary of implementing a BYOD strategy is because it can potentially leave the company’s system vulnerable to data breaches. Personal devices are not part of your business’s IT infrastructure, which means that these devices are not protected by company firewalls and systems. There is also a chance that an employee will take work with them, where they are not using the same encrypted servers that your company is using, leaving your system vulnerable to inherent security risks.

Lost devices

Another risk your company has to deal with, is the possibility of your employees losing their personal devices. When devices with sensitive business information are lost, there is a chance that this could end up falling into the wrong hands. Additionally, if an employee forgets to use a four digit PIN code to lock their smartphone or tablet, anyone can gain unauthorized access to valuable company data stored on that particular device. Therefore, your company should consider countermeasures for lost devices like completely wiping the device of information as soon as an employee reports a missing or stolen phone.

Hackers can infiltrate your system

Personal devices tend to lack adequate data encryption to keep people from snooping. This along with the fact that your employees might not have updated their devices can allow hackers to infiltrate your IT infrastructure.

Connecting to open Wifi spots makes your company more susceptible to hackers. Open wireless points in public places can put device owners at risk because there is a chance that hackers may have created that hotspot to trick people into connecting. Once the device owner has connected, attackers can simply surveil web activity and gain access to your company’s accounts.

Vulnerable to malware

Viruses are also a big problem when implementing BYOD strategies into your business. Using personal devices means your employees can access whatever sites or download any mobile apps that your business would normally restrict to protect your system.

Jailbreaking or rooting a device also puts your systems at risk because it removes limitations imposed by the manufacturer to keep the mobile software updated and protected against external threats. It’s best to understand that as your employees have the freedom to choose whatever device they want to work with, the process of keeping track of vulnerabilities and updates is considerably harder. So if you’re thinking about implementing BYOD strategies to your business, prepare your IT department for an array of potential malware attacks on different devices.

So you might be thinking that it would probably be best to just avoid implementing a BYOD strategy in the first place. However, BYOD will help your business grow and adapt to the modern workplace, and should not be dismissed as a legitimate IT solution. It’s just important to educate your company about these risks so that problems won’t occur for your business down the line.

If you need some help implementing IT security solutions for your company, or if you have any concerns regarding IT, give us a call.

Published with permission from TechAdvisory.org. Source.

Topic Security