Blog

March 23rd, 2015

BusinessContinuity_Mar23_BBusinesses can face disasters at the most unexpected times, whether that’s a flash flood that takes down your servers or a sudden power outage during a thunderstorm. And when these events do happen, you as a business owner must have a business continuity plan (BCP) in place, to ensure that your company doesn’t go out of business for good. But for most people who are new to business continuity, words and terms used by BCP experts may sound like a different language. Here are some popular business continuity terms that are often tossed around.

Battle box - a tool box where necessary equipment and vital information are stored. These objects and pieces of information should be useful in a disaster. Typical items include a first aid kit, laptop, protective equipment, and communication devices.

Business impact analysis (BIA) - a process to evaluate the impact that a disaster may have on a business. The BIA shows what a business stands to lose if some parts of its functions are missing. It allows you to see the general picture of your business processes and determine which ones are the most important.

Call tree - a comprehensive list of employee contacts and their telephone numbers. Call trees are used to notify out-of-office employees about a disaster. Companies can use a software program to contact people on the call tree by sending automated emails and text messages. In order for a call tree to work, employees should provide alternative contact options and their information must be up to date.

Data mirroring - a duplication of data from its source to another physical storage solution or the cloud. Data mirroring ensures that crucial information is safe, and companies can use the copied data as backup during a disaster.

Exercise - a series of activities designed to test a company’s business continuity plan. When an exercise is carried out, there will be an evaluation to decide whether a BCP is meeting standards or not. An exercise can identify gaps in, and the drawbacks of, a BCP and is therefore used as a tool to revise and improve a business continuity plan.

Hot site - an alternate location equipped with computers, communication tools and infrastructures to help a business recover information systems affected by the disaster.

Plan maintenance - a process of maintaining a company’s business continuity plan so that it is in working order and up to date. Plan maintenance includes scheduled reviews and updates.

Recovery time objective (RTO) - a period of time in which companies must recover their systems and functions after a disaster. This is the target time for a business to ideally resume its delivery of products and services at an acceptable level. RTO may be specified in business time (e.g. one business day) or elapsed time (e.g. elapsed 24 hours).

Business continuity plans can be a hassle to design and implement without proper understanding of their requirements. If you want to learn how you can protect your business from disasters, give us a call today.

Published with permission from TechAdvisory.org. Source.

March 18th, 2015

Security_Mar18_BWith the threat of sophisticated intrusion on the rise, there has never been a more important time to be vigilant about IT security. Whether it’s selecting a difficult-to-guess password and then changing it frequently, or remembering to properly log out of social networking sites when using a shared computer, there are plenty of simple steps we can all take to better protect ourselves online. Nowhere is this more vital than when using online banking systems or mobile payment portals. If you’re a user of peer-to-peer payment provider Venmo, you’ll be pleased to hear the service just gave you the benefit of extra security protection.

The Venmo platform is known for its convenience and ease of use, and is commonly used to split the cost of drinks, dinner, taxis and the like. The app is now adding a raft of new security-focused features, in response to criticism of its record for ensuring the security of its customers and their financial transactions.

Back in February, a Venmo user discovered his account had been hacked and used to withdraw almost $3,000 from his credit card. The intruder had also thought to change the email address associated with the Venmo account and to disable notifications of payments, but Venmo did not tell the genuine user about the changes that had been made. Venmo was decried for letting basic lapses in security exist in its trendsetting platform.

Now the service is doing what it can to pick up the pieces and up the ante on the security front. The most obvious change is to incorporate automatic email notifications when changes are made to the basic personal details associated with a Venmo account - a feature which many believe should have been built in from the word go. But the app will also add multi-factor authentication, another name for the two-step verification that can be enabled within Google Apps and other services. This feature makes it more difficult for would-be intruders to gain access to your account, even if they manage to get hold of your password.

Multi-factor authentication works by requiring not only your password for login, but also a second piece of information such as a one-time code - often generated on-the-spot and sent by SMS to the user’s cell phone - or the answer to a pre-set security question. Insisting on two phases to the sign-in process allows another opportunity to stop potential fraudsters in their tracks. The changes being implemented by Venmo also reflect the growing awareness on the part of technology companies for the need to get serious about security and protect the integrity of their systems and their users’ data.

You can put multi-factor authentication to use in your IT systems to keep your business protected. Get in touch with us and we’ll show you how.

Published with permission from TechAdvisory.org. Source.

Topic Security
March 17th, 2015

BusinessIntelligence_Mar17_BIf your business is not already using business intelligence systems, you are at a distinct disadvantage against the competition, and are failing to maximize a truly valuable opportunity to understand your position in the market. Business intelligence takes raw business data and converts it into insights that you can not only understand, but which offer a valuable view of your company’s current standing, where it’s headed and what you need to do to get there. Nevertheless, the business intelligence landscape can be a confusing one - here are some terms you need to get to grips with as you take your analysis to the next level.

Reporting

Whether simple or more sophisticated, reporting forms the foundation of business intelligence and is key to knowing how your company is doing - and how to make it do better still. No matter the size of your company, financial reporting helps you to understand your position in terms of revenue and expenditure. Typical reports you might produce on a regular basis include balance sheets, cash flow statements and profit and loss accounts. Business intelligence tools like Enterprise Resource Planning applications can help you get a hold of these reports and customize them to suit your needs, to a level of detail and usability that most of us just aren’t going to manage with a spreadsheet alone.

Data Visualization

Having access to reams of business data is all very well, but in reality it’s not of much use if it doesn’t mean anything to everyday humans. You and your colleagues are business focused and, while you might know your way around a bit of data analysis and your IT systems, you don’t want to spend your lives with your head buried in sheet after sheet of formulae. Frankly, you’ve got better things to be doing than that - like getting on with the day-to-day management of your business.

That’s where visualization comes in. Just what it sounds like, visualization is about taking your raw data and presenting it in a way that’s instantly understandable and meaningful to its audience - whether that’s you as business owner, your boss or your company’s investors. Visualization can help you to convey a high-level overview of business performance, before you drill down to consider more specific areas of your products and services. Some business intelligence tools also offer interactivity to allow you to get exactly what you need from complex data.

Corporate Performance Management

The performance of your business depends on a huge number of factors, and if you are properly preparing for the future then you are considering a multitude of scenarios depending on how those factors play out. That can leave you with multiple versions of your budgets and cash flow statements but, without effective business intelligence software, you’re likely to have that information stored in a messy tangle of spreadsheets.

A better solution is a business intelligence application that allows you to import data from various locations, and adjust your reporting output according to variables in the numerous factors you are forecasting. With speed that those clumsy spreadsheets just couldn’t replicate if they tried, you’ll have at your fingertips a set of responsive, adaptable reports that enable you and your team to spend more time on analysis and making plans for the future.

Want to learn more about using business intelligence to propel your company to greater heights? Get in touch with us today.

Published with permission from TechAdvisory.org. Source.

March 16th, 2015

SocialMedia_Mar16_BRemember years ago when you first saw a number sign followed by an unspaced phrase popping up online? Who would have thought that hashtags would turn out to be one of the most useful tools on social media platforms today. In fact, different social media sites utilize hashtags in different ways. Take a look at how you can make the most of hashtags for your business on different social media platforms.

Twitter

Twitter hashtags don’t support special characters like +, !, $, %, -, ^, &, * but do support letters, numbers and underscores. There are no hashtag limits as long as you keep your message within the usual 140 characters.

The best way to use hashtags in Twitter is through hosting and participating in Twitter chats. You don’t need to be in an event to network with people through the official hashtag; event organizers usually market the official hashtag very well. In other words, you’ll get additional exposure if you use it.

Useful Twitter hashtag tools include:

Hashtagify which tracks trending hashtags and shows related hashtags for any base terms you provide. TwChat lets you discover, participate in and host Twitter chats. This is best used for monitoring and archiving any hashtag streams.

Instagram

Just like Twitter, Instagram hashtags don’t support special characters like +, !, $, %, -, ^, &, *, but do support letters, numbers and underscores. You can add up to 30 hashtags to a single photo or tag your photo after publishing it by listing the hashtags in the comments.

After you tag your post with a hashtag, you’ll be able to tap on the hashtag to see a page that shows all photos and videos people have uploaded with the same hashtag. Instagram hashtags can dramatically increase your following, especially if you use hot and trending hashtags which are easily found here.

The best use of hashtags on Instagram is to participate in hashtag games like #tbt (Throwback Thursday) and #MondayBlues. Both can increase your following and interactions since people click on these specific hashtags to see photos of other participants. Additionally, location-based hashtags also work very well on Instagram, whether abbreviated or in full, for example #LA and #LosAngeles.

Facebook

Facebook hashtags are similar to other social platforms; they support the standard set of characters including numbers, letters and underscore but don’t support special characters.

However, searching by hashtag on Facebook is a little unlike the rest, in that when you search for a hashtag you often end up on a Facebook page instead of a hashtag search result page. But there’s an easier way to generate hashtag search results - simply add the hashtag text after facebook.com/hashtag/, for example facebook.com/hashtag/cats.

You can also bring up hashtag search results by clicking on any hashtag in your Facebook stream. Do keep in mind that Facebook’s ranking algorithm is complex and seems to classify hashtags according to how closely you are related to the person posting the update, as well as how often the two of you interact.

The growing use of hashtags has changed how we use different social media platforms for the better. Still, it’s important to understand how these different platforms make use of hashtags in order to optimize them to your business’s advantage. Looking to learn more about how social media can help your business? Contact us today!

Published with permission from TechAdvisory.org. Source.

Topic Social Media
March 12th, 2015

BusinessIntelligence_Mar10_BBusiness intelligence, or BI, is a common term in the business world today. It combines and analyzes data to help business owners make important decisions and strategies. Business intelligence was only used by large enterprises until very recently but technology has evolved rapidly, and BI’s costs have dropped dramatically, making it affordable for small businesses.

What is business intelligence?

As a business owner, you may have come across business intelligence at some point in your research for efficient business tools. Business intelligence is a term that sounds intimidating, but it’s actually really easy to understand.

BI is a set of tools and techniques that transform raw data into information that companies can actually use for business purposes. You can use BI tools to collect data from internal systems and external sources. That data can then be analyzed and compiled into text or visual reports for corporate leaders, assisting them in making important business decisions.

Benefits of BI for small businesses

When it comes to analyzing data, business intelligence is a cut above other methods like simply pulling data from Excel spreadsheets. Businesses can use BI for many purposes. Here are some benefits.
  • Boost sales - Business intelligence tools can create and analyze data to improve sales. You can send an email to your clients, inserting a link to your website, then monitor their behavior with an analytical tool to subsequently target your emails more successfully. You can also use BI for sales forecasting and to decide on the best method to reach your sales target.
  • Identifying opportunities - BI tools allow you to assess your company’s capabilities and compare your strengths and weaknesses to your competitors. You can also identify market trends in order to respond quickly to change.
  • Better customer service - Customers are the lifeblood of any small business, and you should take customer service seriously. There are BI software programs that collect post-service customer feedback. Your customer service team is informed when they receive low feedback scores, so they can follow up and resolve any issues.

Implementation

After you’ve researched the benefits of BI to your business, the next step is to implement it in your company. The first thing to clarify is your need for business intelligence. Do you want to improve your sales? Are you looking for new customers? It’s important to be clear on this, so that you can choose a BI tool that will provide the best solutions to your problems. Once your objective is clear, it’s time to determine what resources you already have to get the job done. In some cases, your existing tools may be sufficient.

There are lots of BI options to choose from, and you should pick the one that best suits your needs. Want to know how to adapt business intelligence to your company? Give us a call and see how we can help.

Published with permission from TechAdvisory.org. Source.

March 12th, 2015

Office_Mar12_BMac users have a reason to celebrate - after a long wait since its last update in 2011, the Microsoft Office for Mac suite of productivity applications has been given a makeover. The latest look brings on board the power of the cloud to take Office to new levels for Apple fans, including a move to deliver an experience that’s closer to that of the Windows version of the package. Better still, you can upgrade for free while it’s still in preview stage - here are some of the killer features of Office for Mac 2016.

Cloud power

Office for Mac 2016 takes the power of the cloud and puts it to full use, bringing the advantages of its cloud-oriented Office 365 applications to its flagship package. As a result, you can now access your Office documents whenever and wherever, and no matter which device you are using. Aside from Office 365, the new software is also integrated with OneDrive, OneDrive for Business, and SharePoint.

It’s now possible to jointly author Word and PowerPoint documents with colleagues, and to make challenges simultaneously. Much like Google Docs, you can run a chat conversation alongside the document, in order to discuss the changes you are each making. Word and PowerPoint automatically flag up updates to the document that you might not have spotted already. These features are already available to Windows-based users of Office.

Sharing documents also becomes simpler, with a dedicated sharing button in the applications’ top right corner that allows you to invite colleagues to collaborate on the document you’re working on. It’s possible to share a document either as an attachment or as a link, and of course to control access rights for each person to whom you give access. You can open others’ Office documents right from your email account and get straight to editing.

Ribbon refresh

Until now, there have been differences in the options available on the ‘ribbon’ of icons that appear beneath the File, Edit and other menus at the top of the screen. You might see one thing on your Mac but another on your PC, and another still on your tablet. With Office for Mac 2016, Microsoft has taken the opportunity to fix those inconsistencies, so you’ll now find the options you need in the same places across all the platforms you use. A new task pane is also intended to help simplify graphics editing.

Email grouping

The updates to Outlook, and OneNote too, were actually released in 2014 and so are technically not new with this release. But one such useful update that is carried through to Office for Mac 2016 is the organization of Outlook emails by conversation, as is the case with Gmail. Emails can be sorted using a variety of other criteria, too.

Presentation aids

Office for Mac 2016 makes life a little easier for those presenting using PowerPoint slides. While your audience is shown the final product on your big screen, you can benefit from having ‘presenter view’ open on your monitor. This dedicated view gives you access to all of your presentation’s slides, any associated notes and also a timer to help you keep pace.

The entire suite of Office for Mac 2016 applications - including Word, Excel, PowerPoint, OneNote and Outlook - is available for free upgrade during Microsoft’s preview period, which runs until later this year. Once that comes to an end, you’ll need an Office 365 subscription or perpetual licence in order to keep making the most of the package’s features.

To find out more about boosting your company’s productivity with Microsoft Office applications, give us a call today.

Published with permission from TechAdvisory.org. Source.

March 11th, 2015

BusinessValue_11Mar_BTechnology underpins nearly every aspect of the modern business process. The problem is that business owners can find it hard to manage technology, and this is where Managed Services Providers (MSPs) come in. Whether it’s software to record customers’ data, network infrastructure management or cloud technology, MSPs can provide these services and much more to suit an organization’s business model. So instead of spending a large portion of their budget on establishing IT systems and relying on break/fix solutions, businesses are turning to MSPs in ever greater numbers to reduce costs and increase efficiency.

MSPs defined

Managed Services Providers boast a range of capabilities. They create IT options and provide solutions to facilitate businesses in their everyday activities. Simply put, a Managed Services Provider is your IT department, and they are experts at what they do. MSPs perform IT-related tasks to your exacting requirements, whether it’s installing software, virtualizing data, or other complex duties. Best of all, because they are taking care of your IT systems, you have more free time to focus on your business.

Selecting the best MSP

You can only achieve optimum IT results by selecting the right Managed Services Provider - preferably one that can demonstrate competency and consistency. Here are some criteria to keep in mind when choosing an MSP.
  • Depth of skills and experience - Any Managed Services Provider should, at the very least, have skills that go beyond basic software installation, maintenance and upgrades. Your business will likely need some advanced IT functions, such as database management, virtualization, cloud technology, security, and cross-platform integration. An MSP should have strong expertise in these models in order to meet the expectations and needs of your company.
  • Consistent global service - In addition to the services provided, MSPs should have global service capabilities. These include the ability to manage IT systems in multiple countries, local language support for foreign subsidiaries, and IT implementation in new locations. Businesses can expand globally with an MSP’s global service offering.
  • Broad range of services - The IT needs of businesses are continually changing, and MSPs tend to provide a suite of managed services to respond to these changes. This could mean anything from updates to software, security patches, antivirus and firewall protection, or even new compliance measures. Make sure that such services can be delivered without additional costs.
  • Financial stability and reputation - A Managed Services Provider’s length of time in the market doesn’t guarantee their longevity. Do your research into a potential MSP’s annual reports and financial statements. Also ask the MSP to provide evidence of their reputation by way of customer references and testimonials.
Choosing the right Managed Services Provider is a very important step that will impact on your business’s performance and success. If you want to learn how MSPs can support your business, contact us today.
Published with permission from TechAdvisory.org. Source.

March 9th, 2015

BusinessContinuity_Mar09_AYou’ve been putting that business continuity plan off for months now, but you’ve finally decided to go through with it. You start by talking to members of your staff, partners and service providers. And it doesn’t take long to see that everyone has a different opinion about what to recover first when disaster strikes. The head of your IT department demands your servers are top priority, while your Vice President argues that without network security being reestablished pronto, your business is left vulnerable to even further damage. Who’s right? It may be difficult to decide. That’s why we’ve compiled these fundamental ideas to consider when drafting your business continuity plan.

Speak to many members of your organization

And not just your IT department - which may sound like a bit of an oxymoron coming from an IT provider’s blog. However, the reason behind this is simple. Suppose you have an IT staff member called Jane, who is responsible for a series of applications that automate your e-commerce system. If you call a business continuity meeting concerning to identify assets to prioritize during a disaster, what do you think Jane will say? She’ll likely point to her group of applications, since to her this is what she prioritizes and spends her days on. And it’s not just Jane; each staff member will probably voice that their particular job (whether that’s security, server maintenance or something entirely different) needs to be prioritized. It’s human nature to think of your responsibility and role first. We all do it.

The key is to get more than one opinion. It’s not a bad idea to start with the leaders of your company, and then work your way down. Leaders generally think in a broader sense about your organization as a whole, rather than one particular facet of it.

Consider where your business is going

When developing your business continuity plan, it’s easy to fall into the trap of thinking about your business as it is today. While you’ll draft your plan in the present, it needs to be created with the future in mind. For example, if you’re considering joining the Cloud or virtualizing your servers in the next year or so, how is this going to impact your plan? It’s smart to think of this sooner rather than later, as it could cause a major shift in your priorities. If you start deploying your business continuity plan but then have to switch gears further down the line, it’ll likely cost your company a lot of money.

Examine the interdependency of your business

Remember to connect the dots between your IT department and business processes. For instance, if your email system can’t run without the use of a particular IT application, it will do no good for you to have your email system as a priority 1 issue and that IT application as a priority 3. In this scenario, the IT application would need the same priority as the email system - if not higher, or else your email system will simply not work.

The point is to map out the interdepencies of your business processes and IT, so that you know what depends on what. That way you’re not left in a pickle when disaster strikes.

Need help getting started with your business continuity plan? Contact us today to learn how we can help.

Published with permission from TechAdvisory.org. Source.

March 4th, 2015

Sec B 164With over 3 billion internet users around the globe totaling roughly 40 percent of the population, the internet is rife with opportunities for hackers to steal your information. And with technology constantly evolving and the internet growing, it’s not likely to get safer anytime soon. It therefore pays to take extra precautions when surfing the web. That’s why we’ve compiled these three easy tips that can amp up your online security.

Embrace two-factor authentication

Also known as two-step verification, most of us have likely dealt with this at one time or another. When you’re logging onto your bank’s website or your email account from a different computer than you normally use, you’re sometimes prompted for a one-time password - sent to you via text message, email or via some other method.

Nowadays, many sites such as Facebook, Dropbox and Twitter also give you the option to use two-factor authentication each time you log in. So if you’re looking for an easy way to up your security, it can give you that extra protection without slowing you down too much.

Update browsers and devices

Did you know that dated versions of browsers, operating systems and even other software packages can create an easy entry point for hackers? Often, new updates are created specifically to fix security holes. And hackers are ever aware that people can be lazy - saving that update for another day that never seems to come. They’ll often try to take advantage of this, searching for outdated devices to infiltrate while their victims watch Youtube on last year’s version of Firefox.

Yes, installing an update might take 15 minutes of your time. But it can pay dividends in preventing a security breach that could cost you or your business thousands.

Use HTTPs

When was the last time you typed those letters into a browser? Probably not this decade. It’s no wonder most people are unaware of this tip. So for those who are oblivious, https is the secure version of http - hypertext transfer protocol. Believe it or not, that last “s” actually adds an extra layer of protection. It encrypts information sent, both ways, between a website’s server and you.

You’re probably thinking, adding that last “s” to http (or even typing in http in general) is a complete pain in the rear. So to make this easier you can actually install a program like “HTTPS Everywhere” that’ll automatically switch an http into an https for you. Currently “HTTPS Everywhere” is available for Firefox, Chrome and Opera.

Looking for more tips to boost your internet security? Get in touch to find out how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
March 3rd, 2015

Productivity_Mar3_BFor many of us, email is the bane of our lives. We spend too long slaving over our inboxes, desperate to empty it but seemingly forever staring at a bottomless pit. This long list of requests, information and updates is the ultimate distraction from our real work - and not all of it is even applicable to us. But by sharpening the focus of those subject lines at the top of your messages, you can make it easier for you and your recipient to identify which emails are relevant to you, which ones need action and when you need to reply by. All of which equates to less time spent battling with your inbox and more time getting on with the task in hand. Here are three tips to set your organization on the road to greater email efficiency and enhanced overall productivity.

Specific subjects spell success

If someone sends you an email that’s headed simply with the word “report”, how are you meant to know what they want from you? Do they need you to write a new report, proofread one they’ve already written, or print a report for them? You inevitably start reading the email without the first idea of what it is you’re being asked to do.

In an ideal situation, when you receive a new email you want to know in an instant - just from the subject line - what the message is about. And that is something you should make possible for recipients of your own emails too. So structure your subject line using keywords - for instance, change that “Report” to “Sales Report for February 2015”. Better still, give your colleague all they need to know at a glance - “Draft Sales Report for February 2015 by Monday, 1pm” - so that the body of the message is preserved for you to get down to details as succinctly as possible.

Use prefixes and suffixes

Another simple way to help your recipient understand at a glance what you need from them - and to make it easier for them to categorize their incoming emails, too - is to specify right in the subject line what type of message it is that you are sending them. Emails come in all shapes and sizes, and by placing a prefix before or a suffix after your main subject line, you’ll get quicker results.

For instance, if your email needs a definitive response from the recipient, start it with “ACTION:” followed by the subject. An example would be “ACTION: Draft Sales Report for February 2015 by Monday, 1pm”. If, on the other hand, you are simply dropping your colleagues a quick notification that the printer is out of order, you can use one or both of “FYI” (for your information) and “NRN” (no reply needed). For example: “FYI: Printer out of order until further notice” or “NRN: Printer out of order until further notice.”

You can take this one stop further. If you can get your entire message across in the subject line alone, then that’s exactly what you should aim to do. That way, your colleague can read the subject line, add the task to their to-do list and delete it straight out of their inbox. To quickly signal that there’s nothing in the email body, you can suffix your subject line with “EOM” (end of message) - for example, “FYI: Printer out of order until further notice. EOM”.

Keep it consistent

These tricks will only help you beat a never-ending inbox if they’re adopted and applied consistently across your organization. Make them a part of your company’s basic IT training, and encourage your staff to use them in their own work and to pull up others who fall back into bad habits. They may be skeptical at first, but they’ll soon jump on the bandwagon once they start to realize how much less time they spend managing their email account!

Think too about introducing standardized formats for subjects of emails you and your teams send on a recurring basis. For example, if you regularly send reports around for review, prefix your subject line with “Report for Review:”, followed by the topic of the report. Or if your employees send you a weekly update on their workstreams, have them title it “Weekly Update:” followed by the date. That way, you can set up filters in your inbox and have those emails smartly stored in one place, ready for you to look through when the time is right, rather than clogging up your inbox and making it look like you have more urgent tasks to complete than you actually do.

Want to learn how to use email systems efficiently to boost your firm’s productivity? Chat to us today about the innovative email solutions we can provide.

Published with permission from TechAdvisory.org. Source.

Topic Productivity