Blog

March 23rd, 2015

BusinessContinuity_Mar23_BBusinesses can face disasters at the most unexpected times, whether that’s a flash flood that takes down your servers or a sudden power outage during a thunderstorm. And when these events do happen, you as a business owner must have a business continuity plan (BCP) in place, to ensure that your company doesn’t go out of business for good. But for most people who are new to business continuity, words and terms used by BCP experts may sound like a different language. Here are some popular business continuity terms that are often tossed around.

Battle box - a tool box where necessary equipment and vital information are stored. These objects and pieces of information should be useful in a disaster. Typical items include a first aid kit, laptop, protective equipment, and communication devices.

Business impact analysis (BIA) - a process to evaluate the impact that a disaster may have on a business. The BIA shows what a business stands to lose if some parts of its functions are missing. It allows you to see the general picture of your business processes and determine which ones are the most important.

Call tree - a comprehensive list of employee contacts and their telephone numbers. Call trees are used to notify out-of-office employees about a disaster. Companies can use a software program to contact people on the call tree by sending automated emails and text messages. In order for a call tree to work, employees should provide alternative contact options and their information must be up to date.

Data mirroring - a duplication of data from its source to another physical storage solution or the cloud. Data mirroring ensures that crucial information is safe, and companies can use the copied data as backup during a disaster.

Exercise - a series of activities designed to test a company’s business continuity plan. When an exercise is carried out, there will be an evaluation to decide whether a BCP is meeting standards or not. An exercise can identify gaps in, and the drawbacks of, a BCP and is therefore used as a tool to revise and improve a business continuity plan.

Hot site - an alternate location equipped with computers, communication tools and infrastructures to help a business recover information systems affected by the disaster.

Plan maintenance - a process of maintaining a company’s business continuity plan so that it is in working order and up to date. Plan maintenance includes scheduled reviews and updates.

Recovery time objective (RTO) - a period of time in which companies must recover their systems and functions after a disaster. This is the target time for a business to ideally resume its delivery of products and services at an acceptable level. RTO may be specified in business time (e.g. one business day) or elapsed time (e.g. elapsed 24 hours).

Business continuity plans can be a hassle to design and implement without proper understanding of their requirements. If you want to learn how you can protect your business from disasters, give us a call today.

Published with permission from TechAdvisory.org. Source.

March 20th, 2015

iPad_Mar20_BFor a long time in the mobile world, it seemed like the only way was smaller. Phones became more miniscule with each and every version released - yet the truth is that reduced size comes at the cost of functionality. Then along came the smartphone, which increased size back to sensible levels but brought with it swathes of apps and other new uses - suddenly a phone was more than just a phone. Now we’re in the age of the tablet and, while things may seem to have been once again erring towards the miniature of late, here’s why you might want to stick with your full-sized iPad for the time being. Better still, opt for a new iPad Air 2.

It’s big enough to share

Whether in meetings or on the go, the full sized iPad screen is better suited to showing documents, images and web sites to others. The iPad Mini may be more easily portable, but its screen size is comparable to that of the iPhone 6, and a phone just isn’t the best platform for displaying information to a group. The screen size on models like the iPad Air makes this much easier and more effective.

It takes great photos

For some time, the iPad camera seemed inferior to that of the iPhone. But the iPad Air 2 changes all that - the 9 Megapixel camera makes it perfect for photo needs in the office. We’re thinking instant capturing of whiteboard scribbles at the end of a brainstorming session, quickly and efficiently scanning documents, and maybe just the odd workplace selfie. It’s suddenly comparable to the camera power of the iPhone and superior to that of the iPad Mini. Combine that with the bigger screen, and the business productivity advantages of the full-sized iPad Air 2 are plain to see.

It’s a productivity machine

Again it comes partly down to the full-sized screen, but a more generously proportioned iPad - whether that’s the new iPad Air 2 or an older model - is simply better for getting the job done. While the iPad Mini boasts the same resolution as the iPad Air 2, the latter’s extra screen area gives you more space to work with. The Mini offers the same amount of limited room for maneuver as the latest iPhone model, which is fine when you’re on the move and want to complete a quick task on the fly, but less so when you need to get serious work done. The larger screen allows you to drag and drop information, move things around and switch between multiple applications at ease.

Getting the highest levels of productivity out of your technology is all about selecting the gear that works best for you. Want to learn how to best deploy iPads and other Apple devices in your business? Give us a call.

Published with permission from TechAdvisory.org. Source.

Topic iPad
March 18th, 2015

Security_Mar18_BWith the threat of sophisticated intrusion on the rise, there has never been a more important time to be vigilant about IT security. Whether it’s selecting a difficult-to-guess password and then changing it frequently, or remembering to properly log out of social networking sites when using a shared computer, there are plenty of simple steps we can all take to better protect ourselves online. Nowhere is this more vital than when using online banking systems or mobile payment portals. If you’re a user of peer-to-peer payment provider Venmo, you’ll be pleased to hear the service just gave you the benefit of extra security protection.

The Venmo platform is known for its convenience and ease of use, and is commonly used to split the cost of drinks, dinner, taxis and the like. The app is now adding a raft of new security-focused features, in response to criticism of its record for ensuring the security of its customers and their financial transactions.

Back in February, a Venmo user discovered his account had been hacked and used to withdraw almost $3,000 from his credit card. The intruder had also thought to change the email address associated with the Venmo account and to disable notifications of payments, but Venmo did not tell the genuine user about the changes that had been made. Venmo was decried for letting basic lapses in security exist in its trendsetting platform.

Now the service is doing what it can to pick up the pieces and up the ante on the security front. The most obvious change is to incorporate automatic email notifications when changes are made to the basic personal details associated with a Venmo account - a feature which many believe should have been built in from the word go. But the app will also add multi-factor authentication, another name for the two-step verification that can be enabled within Google Apps and other services. This feature makes it more difficult for would-be intruders to gain access to your account, even if they manage to get hold of your password.

Multi-factor authentication works by requiring not only your password for login, but also a second piece of information such as a one-time code - often generated on-the-spot and sent by SMS to the user’s cell phone - or the answer to a pre-set security question. Insisting on two phases to the sign-in process allows another opportunity to stop potential fraudsters in their tracks. The changes being implemented by Venmo also reflect the growing awareness on the part of technology companies for the need to get serious about security and protect the integrity of their systems and their users’ data.

You can put multi-factor authentication to use in your IT systems to keep your business protected. Get in touch with us and we’ll show you how.

Published with permission from TechAdvisory.org. Source.

Topic Security
March 16th, 2015

SocialMedia_Mar16_BRemember years ago when you first saw a number sign followed by an unspaced phrase popping up online? Who would have thought that hashtags would turn out to be one of the most useful tools on social media platforms today. In fact, different social media sites utilize hashtags in different ways. Take a look at how you can make the most of hashtags for your business on different social media platforms.

Twitter

Twitter hashtags don’t support special characters like +, !, $, %, -, ^, &, * but do support letters, numbers and underscores. There are no hashtag limits as long as you keep your message within the usual 140 characters.

The best way to use hashtags in Twitter is through hosting and participating in Twitter chats. You don’t need to be in an event to network with people through the official hashtag; event organizers usually market the official hashtag very well. In other words, you’ll get additional exposure if you use it.

Useful Twitter hashtag tools include:

Hashtagify which tracks trending hashtags and shows related hashtags for any base terms you provide. TwChat lets you discover, participate in and host Twitter chats. This is best used for monitoring and archiving any hashtag streams.

Instagram

Just like Twitter, Instagram hashtags don’t support special characters like +, !, $, %, -, ^, &, *, but do support letters, numbers and underscores. You can add up to 30 hashtags to a single photo or tag your photo after publishing it by listing the hashtags in the comments.

After you tag your post with a hashtag, you’ll be able to tap on the hashtag to see a page that shows all photos and videos people have uploaded with the same hashtag. Instagram hashtags can dramatically increase your following, especially if you use hot and trending hashtags which are easily found here.

The best use of hashtags on Instagram is to participate in hashtag games like #tbt (Throwback Thursday) and #MondayBlues. Both can increase your following and interactions since people click on these specific hashtags to see photos of other participants. Additionally, location-based hashtags also work very well on Instagram, whether abbreviated or in full, for example #LA and #LosAngeles.

Facebook

Facebook hashtags are similar to other social platforms; they support the standard set of characters including numbers, letters and underscore but don’t support special characters.

However, searching by hashtag on Facebook is a little unlike the rest, in that when you search for a hashtag you often end up on a Facebook page instead of a hashtag search result page. But there’s an easier way to generate hashtag search results - simply add the hashtag text after facebook.com/hashtag/, for example facebook.com/hashtag/cats.

You can also bring up hashtag search results by clicking on any hashtag in your Facebook stream. Do keep in mind that Facebook’s ranking algorithm is complex and seems to classify hashtags according to how closely you are related to the person posting the update, as well as how often the two of you interact.

The growing use of hashtags has changed how we use different social media platforms for the better. Still, it’s important to understand how these different platforms make use of hashtags in order to optimize them to your business’s advantage. Looking to learn more about how social media can help your business? Contact us today!

Published with permission from TechAdvisory.org. Source.

Topic Social Media
March 12th, 2015

Office_Mar12_BMac users have a reason to celebrate - after a long wait since its last update in 2011, the Microsoft Office for Mac suite of productivity applications has been given a makeover. The latest look brings on board the power of the cloud to take Office to new levels for Apple fans, including a move to deliver an experience that’s closer to that of the Windows version of the package. Better still, you can upgrade for free while it’s still in preview stage - here are some of the killer features of Office for Mac 2016.

Cloud power

Office for Mac 2016 takes the power of the cloud and puts it to full use, bringing the advantages of its cloud-oriented Office 365 applications to its flagship package. As a result, you can now access your Office documents whenever and wherever, and no matter which device you are using. Aside from Office 365, the new software is also integrated with OneDrive, OneDrive for Business, and SharePoint.

It’s now possible to jointly author Word and PowerPoint documents with colleagues, and to make challenges simultaneously. Much like Google Docs, you can run a chat conversation alongside the document, in order to discuss the changes you are each making. Word and PowerPoint automatically flag up updates to the document that you might not have spotted already. These features are already available to Windows-based users of Office.

Sharing documents also becomes simpler, with a dedicated sharing button in the applications’ top right corner that allows you to invite colleagues to collaborate on the document you’re working on. It’s possible to share a document either as an attachment or as a link, and of course to control access rights for each person to whom you give access. You can open others’ Office documents right from your email account and get straight to editing.

Ribbon refresh

Until now, there have been differences in the options available on the ‘ribbon’ of icons that appear beneath the File, Edit and other menus at the top of the screen. You might see one thing on your Mac but another on your PC, and another still on your tablet. With Office for Mac 2016, Microsoft has taken the opportunity to fix those inconsistencies, so you’ll now find the options you need in the same places across all the platforms you use. A new task pane is also intended to help simplify graphics editing.

Email grouping

The updates to Outlook, and OneNote too, were actually released in 2014 and so are technically not new with this release. But one such useful update that is carried through to Office for Mac 2016 is the organization of Outlook emails by conversation, as is the case with Gmail. Emails can be sorted using a variety of other criteria, too.

Presentation aids

Office for Mac 2016 makes life a little easier for those presenting using PowerPoint slides. While your audience is shown the final product on your big screen, you can benefit from having ‘presenter view’ open on your monitor. This dedicated view gives you access to all of your presentation’s slides, any associated notes and also a timer to help you keep pace.

The entire suite of Office for Mac 2016 applications - including Word, Excel, PowerPoint, OneNote and Outlook - is available for free upgrade during Microsoft’s preview period, which runs until later this year. Once that comes to an end, you’ll need an Office 365 subscription or perpetual licence in order to keep making the most of the package’s features.

To find out more about boosting your company’s productivity with Microsoft Office applications, give us a call today.

Published with permission from TechAdvisory.org. Source.

March 11th, 2015

MobileGeneral_Mar06_BThere’s big business in mobile payment platforms, and they are here to stay. Consumers are increasingly attracted to the ease and convenience of Apple Pay and Google Wallet, and adopting these platforms means turning more prospects into clients - and then keeping them hooked for the long haul. Now Google has given the sector a further boost, by announcing its new Android Pay platform. Here’s what you need to know about getting on board with this and other mobile payment platforms.

When Google launches Android Pay, it will act as more than just another app like Apple Pay, or Google’s existing Wallet app (which will continue to be in use, and will be powered by Android Pay). This means it will be useful to developers and retailers looking to allow users to make payments for products and services from right within their apps on Android devices.

Apple technology already enables iPhone users to buy goods in real-life stores using near-field communication (NFC), and Google’s Android Pay system will do the same. A similar technology to Apple's is Google’s local storage of bank card information, which takes away the need for you to have a phone signal to make payments. There are also benefits to security - another feature that Android Pay will adopt from its rival is the use of one-time, automatically generated credit card numbers for each transaction. This helps to fight fraud because even if the retailer you shop with subsequently suffers a data breach, any card numbers the fraudsters get hold off would have expired already.

Google ultimately hopes that its Android Pay system will also include support for fingerprint scanning and other security features, further boosting the peace of mind you can have while using it to shop and settle up.

Competition is beefing up in the mobile payment platform arena. While Google Wallet failed to gain much traction when it first launched in 2011 - it was considered by many to be ahead of its time - the recent growth of Apple Pay appears to have revived hope in the Google alternative. What’s more, Samsung recently debuted Samsung Pay, which is big on payment security and will come as default on the latest models of the Galaxy and Edge range of devices. The Samsung system has the potential to quickly achieve far greater reach since, while Apple Pay only works where retailers already have NFC installed, Samsung recently acquired the firm LoopPay, and as a result Samsung Pay will also support the use of conventional magnetic credit card readers.

And even PayPal is moving in on mobile payment territory. Though the company has for some time had its own apps that make it easy to send cash to friends or suppliers, or to make purchases at participating retailers, PayPal is still better known for its web-based payments system. However, PayPal recently acquired Paydiant, a startup due to launch later in 2015 with a competitor to all the other mobile payment platforms, known as CurrentC. It could prove stiff competition indeed, since it’s backed by retailers like Wal-Mart and 7-Eleven.

Don’t be fooled into thinking that your business can ignore the rapid growth of mobile payments. To find out how to leverage them to your benefit, get in touch with us today.

Published with permission from TechAdvisory.org. Source.

March 9th, 2015

BusinessContinuity_Mar09_AYou’ve been putting that business continuity plan off for months now, but you’ve finally decided to go through with it. You start by talking to members of your staff, partners and service providers. And it doesn’t take long to see that everyone has a different opinion about what to recover first when disaster strikes. The head of your IT department demands your servers are top priority, while your Vice President argues that without network security being reestablished pronto, your business is left vulnerable to even further damage. Who’s right? It may be difficult to decide. That’s why we’ve compiled these fundamental ideas to consider when drafting your business continuity plan.

Speak to many members of your organization

And not just your IT department - which may sound like a bit of an oxymoron coming from an IT provider’s blog. However, the reason behind this is simple. Suppose you have an IT staff member called Jane, who is responsible for a series of applications that automate your e-commerce system. If you call a business continuity meeting concerning to identify assets to prioritize during a disaster, what do you think Jane will say? She’ll likely point to her group of applications, since to her this is what she prioritizes and spends her days on. And it’s not just Jane; each staff member will probably voice that their particular job (whether that’s security, server maintenance or something entirely different) needs to be prioritized. It’s human nature to think of your responsibility and role first. We all do it.

The key is to get more than one opinion. It’s not a bad idea to start with the leaders of your company, and then work your way down. Leaders generally think in a broader sense about your organization as a whole, rather than one particular facet of it.

Consider where your business is going

When developing your business continuity plan, it’s easy to fall into the trap of thinking about your business as it is today. While you’ll draft your plan in the present, it needs to be created with the future in mind. For example, if you’re considering joining the Cloud or virtualizing your servers in the next year or so, how is this going to impact your plan? It’s smart to think of this sooner rather than later, as it could cause a major shift in your priorities. If you start deploying your business continuity plan but then have to switch gears further down the line, it’ll likely cost your company a lot of money.

Examine the interdependency of your business

Remember to connect the dots between your IT department and business processes. For instance, if your email system can’t run without the use of a particular IT application, it will do no good for you to have your email system as a priority 1 issue and that IT application as a priority 3. In this scenario, the IT application would need the same priority as the email system - if not higher, or else your email system will simply not work.

The point is to map out the interdepencies of your business processes and IT, so that you know what depends on what. That way you’re not left in a pickle when disaster strikes.

Need help getting started with your business continuity plan? Contact us today to learn how we can help.

Published with permission from TechAdvisory.org. Source.

March 6th, 2015

Android 164 BWhat if you could be in two places at once? On that beach chair in the Bahamas and at an office meeting in Indiana simultaneously? Sound too good to be true? Maybe not. Telepresence robots are making this scenario more likely than you think. And with the power of the Android tablet, the future may be just around the corner. Here’s an inside look at a new technology that could revolutionize the way you work by allowing you to attend meetings while taking care of grandma.

What is a telepresence robot?

A telepresence robot is a remote controlled mechanism that acts as a robot when you can’t physically be somewhere in person. It uses a video enabled device that allows you to see and be seen, giving you a physical presence while you’re somewhere else in the world.

The telepresence robot that pairs with Android is not the first of its kind on the market. Both iRobot and Double Robotics have wheeled versions that were released in the past few years. The latter pairs with the iPad and navigates its environment using a segway.

What’s the deal with the Android version?

The Android tablet version that couples with the telepresence robot is called Origibot and is currently being crowdfunded on Indiegogo. Yes, that means there is a chance it may not see the light of day but, after raising 30% of its $18,000 goal in just three days (and with another 38 to go), people are clearly excited about the tech behind it.

The Origibot is roughly 29.5 inches high, made from both aluminum and stainless steel. It has wheels so that it can move around. And it comes with an optional arm and gripper. According to its creators, the Origibot can fill your pet’s bowl with water, carry drinks, water your plants and even bring Grandma her meds!

From a business perspective, an Origibot can take your place at the office if you’re a telecommuter. Then you’ll literally have a physical presence for meetings while you’re at home on your sofa or taking care of another matter.

How does it work?

Simply attach your Android tablet to the Origibot. Your tablet then connects with another Internet-enabled device that you control, through the company’s secure Cloud service.

Your connected device acts as a remote control for the Origibot, while the tablet allows you to see and hear what is happening in the space your Origibot occupies.

The advantages of Origibot

There are other telepresence robot options available. But what makes Origibot different is its price. If you pledge in advance on Indiegogo, you can get an Origibot from anywhere between $329 and $599. Once it hits retail, that price is projected to rise to $499-$899.

Compared to its competitors, this is extremely affordable - iRobot and Double Robotics both cost over $2,000.

The other difference is its size. The metal bar of the Origibot’s body is just a few inches in diameter and the wheeled base is 12.5 by 14 inches. This will make it easy to get through narrow places or maneuver around people. Perfect for serving drinks at that cocktail party you’re out of town for.

Want to learn more about the possibilities of the Android tablet? Contact us today.

Published with permission from TechAdvisory.org. Source.

March 4th, 2015

Sec B 164With over 3 billion internet users around the globe totaling roughly 40 percent of the population, the internet is rife with opportunities for hackers to steal your information. And with technology constantly evolving and the internet growing, it’s not likely to get safer anytime soon. It therefore pays to take extra precautions when surfing the web. That’s why we’ve compiled these three easy tips that can amp up your online security.

Embrace two-factor authentication

Also known as two-step verification, most of us have likely dealt with this at one time or another. When you’re logging onto your bank’s website or your email account from a different computer than you normally use, you’re sometimes prompted for a one-time password - sent to you via text message, email or via some other method.

Nowadays, many sites such as Facebook, Dropbox and Twitter also give you the option to use two-factor authentication each time you log in. So if you’re looking for an easy way to up your security, it can give you that extra protection without slowing you down too much.

Update browsers and devices

Did you know that dated versions of browsers, operating systems and even other software packages can create an easy entry point for hackers? Often, new updates are created specifically to fix security holes. And hackers are ever aware that people can be lazy - saving that update for another day that never seems to come. They’ll often try to take advantage of this, searching for outdated devices to infiltrate while their victims watch Youtube on last year’s version of Firefox.

Yes, installing an update might take 15 minutes of your time. But it can pay dividends in preventing a security breach that could cost you or your business thousands.

Use HTTPs

When was the last time you typed those letters into a browser? Probably not this decade. It’s no wonder most people are unaware of this tip. So for those who are oblivious, https is the secure version of http - hypertext transfer protocol. Believe it or not, that last “s” actually adds an extra layer of protection. It encrypts information sent, both ways, between a website’s server and you.

You’re probably thinking, adding that last “s” to http (or even typing in http in general) is a complete pain in the rear. So to make this easier you can actually install a program like “HTTPS Everywhere” that’ll automatically switch an http into an https for you. Currently “HTTPS Everywhere” is available for Firefox, Chrome and Opera.

Looking for more tips to boost your internet security? Get in touch to find out how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
March 2nd, 2015

Trouble aheadIn the unexpected event that a disaster strikes, you need to have a continuity plan to keep your business running. If you don’t have one, or if your existing plan is outdated and ineffective, your business is at risk of losing potential clients and credibility. Imagine you’re halfway through a product presentation, when suddenly the whole building’s power goes out and the screen goes pitch black. Not impressive at all. This is why you must have a business continuity plan in place to minimize damage and prepare for emergencies.

Relevant factors such as your business’s resources, location, suppliers, customers, and employees must be carefully analyzed before a business continuity plan can be formed. It is also necessary to test the plan and check whether it’s working or not. Here are some proven methods to test your continuity plan’s efficiency.

Review the BCP

You have a business continuity plan ready with all the necessary information, contingency locations, personnel, contacts and service companies. The question is can you really pull it off? Have the plan reviewed regularly, or at least quarterly. Gather a team of individuals, heads of departments and managers to discuss the plan. Focus on the business continuity plan’s feasibility and pinpoint any areas where it might be strengthened.

Determine time and duration to test the plan

You should decide how often you test your business continuity plan, and for how long. Even if you have a solid plan in place, it’s still wise to review it again after a few months. Come up with a schedule for testing the plan and share it with employees. Testing time may take anywhere from one day to two weeks. However it can also take as little as three hours to determine the effectiveness of the plan by monitoring employees’ responses and decision-making abilities, based on the guidelines of the business continuity plan.

Outline objectives to employees

Most business continuity plans fail because they have never been properly relayed to employees. Emphasizing the plan’s importance to your business and demonstrating it to employees is crucial. You need to outline objectives for the business continuity test to your employees, informing them how you plan to measure its success and failure, so that they get a general idea of their roles and your expectations.

Create a scenario

Create a fake scenario that affects your business - whether it’s setting off fire alarms or announcing another disaster. Employees should act as though the scenario is genuine, and refer to their duties in the business continuity plan, going through it step by step. Monitor the time it takes to get everything under control, from contacting customers to checking business resources and temporary meeting locations.

Evaluation

After the business continuity plan is put to test, gather your employees to discuss the plan’s overall performance. Identify where it needs improvement and encourage the parts that worked best. Make changes to key persons and actions where necessary, to ensure that the continuity plan is working at its best.

Having a business continuity plan is good, but testing it regularly is equally important. Contact us today and see how we can help you cope with unexpected disasters.

Published with permission from TechAdvisory.org. Source.