Categories
Technology

Tip of the Week: Technology Has Your Business Covered

ttow_tech_business_400.jpg

Technology is an easy thing to take for granted, especially in an office that has countless solutions that are utilized on a regular basis. It doesn’t matter if you’re a small retail establishment, a large organization with multiple offices, or a factory to produce consumer items. Today, we’ll look at the various ways your business is changed for the better thanks to the use of technology.

Customer Service
Your customers are one of your most valuable assets, so it’s natural that you want to build a powerful bond with them. If you can’t support the products you sell to them, you’ll have a difficult time keeping your business in good standing with both current and prospective clients. Technology can help you maintain this positive relationship through the use of a ticketing system to handle customer complaints and concerns, and it also makes it easy to handle support for various services you might offer.

Social media and social networking in general provides businesses with more direct ways of interacting with consumers. Sites like Facebook and Twitter essentially offer a platform to promote a brand and knowledge base. Of course, this advantage can quickly become a detriment if it’s not managed properly, as you’re (again) dealing directly with customers–if they aren’t satisfied by your interaction, they’re more likely to share it and complicate public relations.

Productivity
To be successful as a business, you have to accrue money somehow. This is where productivity comes in–technology helps by enabling workers to get more done throughout the workday, building more value for your organization in the long run. For example, time-tracking software can help with task scheduling, giving employees the opportunity to accomplish more during the time they spend in the office. Moreover, you’ll be able to assign a monetary value to the time your employees spend on various tasks and streamline their work processes.

Many of today’s most helpful technology solutions come with built-in productivity solutions that allow for collaboration through the cloud. These cloud-hosted applications provide flexibility to workers so they can communicate in the way most efficient for them. Since these solutions are flexible and scalable, your business can adjust them as needed.

Finance
Money is a big part of why you’re in business, but you can’t do anything without funding of your own. You have a bottom line to keep in mind, after all. Technology can help businesses better manage their finances through online invoicing services to collect payments and reduce paper expenses. If you use software to manage payroll and other accounts, you’ll be able to handle them easily and more efficiently. If you can streamline these processes at all, your business can run much better and you’ll be better off in the long run.

Security
Security plays a critical role in the sustainability of your business, both on your network and in your physical office. You can’t let workers or other entities waltz around your network and your office uninhibited, as the opportunity to cause major damage is practically omnipresent in today’s business world. You need to implement not only network security solutions such as antivirus, firewall, content filtering, and spam blocking technology, but physical security solutions like security cameras, biometric security locks, and other measures as well. Doing so ensures the protection of all your business’ assets, whether it’s from a hacker or a careless employee.

A lot goes into making a business successful, and technology plays a large role in doing so. How does your business use technology? COMPANYNAME can help you get started thinking about the future for your organization. To learn more, reach out to us at PHONENUMBER.

Categories
Business

Why Your Business Needs to Define Its Ethical Code

define_ethics_code_400.jpg

As the technology that businesses have available to them develops, so does the propensity for this technology to be used unethically. This has become especially apparent where data collection is concerned, and what that data is used for after it has been collected. How can you keep operations moving both productively, and ethically?

Collection Concerns
Data collection is one of the current big concerns in technology. With another newsworthy data breach practically every other day, companies that accumulate data for seemingly little reason effectively put their clients and customers at a greater risk of having this data stolen. Reflecting upon this, it is no wonder that 75 percent of consumers are concerned about brands keeping track of their browsing habits.

Facebook has been the focus of some negative attention in past months thanks to these concerns. In addition to the Cambridge Analytica situation, Facebook has adopted artificial intelligence technologies to analyze their users. This analysis is used to predict future behaviors, these insights being sold to advertisers. While this brings up many legitimate concerns about data privacy, it also introduces a different topic: the need for a code of ethics surrounding the use of collected data, as well as how much data is collected.

Why This Is a Real Issue
It should come as no surprise that businesses and individuals have different priorities, and that these different priorities shape their ethics in different ways. Likewise, the primary purpose of any business is to generate revenue through profit. Therefore, it only makes sense that a business as a unit would have the motivation to collect as much data as they can – after all, the more data available, the more insights that could be presumably be gleaned, and the more successful the business would be… in theory.

However, as mentioned above, many businesses seem to collect as much data as they can just so they can have it. This is not a great approach for them to take for a few reasons. Most obviously, because it just enables more data to be compromised if a breach was to occur.

Without the guidance of a code of ethics leading your business decisions, the likelihood of risking your clients’ data for the sake of advancement – be it more insight, improved automation and artificial intelligence, or another business goal – becomes much higher.

Enforcing Ethics
In order to create a workplace that is in alignment with your determined ethics, you need to make sure of two things. One, that you clearly establish and share them within your business so that your employees are on the same page as you are, and two, that you stand by these ethics.

To accomplish this, learning your company’s ethics should be a part of an employee’s onboarding process, with a written document leaving no questions as to what will and won’t be tolerated. Then, you need to make sure that you not only listen when ethical violations are reported, but also allow those reporting them to remain anonymous.

What would be the most important aspect of your policy for employees to follow? Share it in the comments!

Categories
Technology

The New Version of Chrome has Interesting Changes

chrome_70-400.jpg

Chrome 70 has proven to be quite a divisive browser. While a lot of users are excited for the new changes to security, some are also worried about whether Chrome can maintain this security and its user-friendly interface. Here are some of the changes being made to Chrome 70 so you can choose whether this browser update is for you.

Extension Restrictions
One of Chrome’s largest advantages over its competition has to be its library of add-on extensions. Unfortunately, any kind of functionality with these additional “programs” can lead to security concerns. Google has had to slow down the production of extensions to create new requirements for developers to adhere to. One example is how cryptocurrency continues to be a major talking point, prompting extensions to include cryptocurrency mining and cryptojacking in their features. Google is shutting down these supplemental programs, as well as generally holding developers to higher standards than they previously were. It now demands that developer accounts be protected by two-factor authentication, as well as paying closer attention to apps that require lots of permissions or host their code remotely.

Security Measures
Chrome 70 is also packing in all kinds of new security features to keep phishing attacks away from end users. In particular, Chrome is trying to push education of its native password management tools, as well as warn users when the links they are about to access aren’t secure. In essence, this simply states that websites need to be secured if they want visitors, reinforcing the fact that websites need to prioritize security these days.

Login Concerns
While some changes have been accepted with open arms, others… not so much. While Chrome has allowed users to use the browser without logging into the browser, some have noticed that Chrome appears to log a user in, even if they are only using one service out of the many provided. This is primarily an issue because Google could potentially share the user’s data (think browsing history), which is not something that users traditionally take lightly. In the time since then, Google has announced that Chrome isn’t necessarily logging users into Chrome–it’s more of an in-between measure to show a user which of their accounts is currently logged in.

As with any new solution, there will be roadblocks and concerns that users might be faced with during the experimentation phase. What kind of experiences have you had with Chrome 70 so far? Let us know in the comments.

Categories
Business

Tip of the Week: Use Admin Accounts to Control Your Network

totw_admin_account_400.jpg

There are various types of user accounts that your employees and administrators can use to access their workstations, but one of the biggest points of contention to consider when planning out data access is the use of administrator accounts. Specifically, you want to avoid handing out administrator account access to users like it’s Halloween candy.

What’s the Big Deal?
You would think that assigning administrator accounts would prevent users from making poor choices with your data. The main difference between the two is that administrator accounts have many more privileges compared to the traditional account used by the average user. In fact, a traditional account is much safer to use unless you actually need administrator access to perform a certain task. Ordinarily, a normal user account can’t install software or mess around with important files in the system, but this isn’t necessarily the case for an administrator account.

Admin accounts are essentially the most powerful account on your computer. They have the permissions to perform just about any role on your PC. It’s the same role that your IT department uses to make any significant changes to your devices during updates and general maintenance. Every computer needs to have at least one admin account found on it, but if access from untrained users is allowed, they could make changes to important files needed for the computer to run properly.

Why You Should Limit Admin Account Use
While it might make sense to have admin permissions if you’re the only one who uses your computer, this is simply not the case on a managed network. There are security problems associated with using an admin account as your primary device account. What happens if your account gets compromised by some sort of malware? It’s simple; the malware will install on your admin account and be able to make any changes it wants to any of the important files only accessible by your admin account. While more permissions as the device owner might sound ideal, it only makes it easier for threats to leave a lasting effect on a device.

Standard accounts have more limited permissions, meaning that if they are compromised in any fashion, they will be more limited in the amount of damage they can cause. It’s for this reason that it’s best to limit administrator accounts as often as possible, as there is no guarantee you will never fall victim to such attacks.

To minimize the chance of your business’ endpoints falling prey to attacks, you should implement proactive measures against the countless possibilities out there–including a compromised admin account. To learn more about how your business can protect itself, reach out to us at PHONENUMBER.

Categories
Technology

VoIP Can Bring A Lot of Value

voip_has_value_400.jpg

Business technology can often augment communications and make collaboration easier, but administrators sometimes believe that these added perks come with a considerably higher price tag. When a solution comes around that can save money, like VoIP, business owners should consider it with serious intent to invest, as it can usher in an age of improved operations and efficiency for your employees, as well as a higher bottom line overall.

VoIP Improves Inter-Department Communication
Landline telephones in the office have been dated for quite some time. Even if they were once necessary to get in touch with coworkers and other departments, they are now quite antiquated compared to modern solutions. After all, there’s no guarantee that an employee will be available to take your call, as the workplace is filled with countless tasks that often require their full attention. Sure, you could leave a voicemail, but there’s no guarantee that the employee will see the message until it’s too late to respond. Since Voice over Internet Protocol doesn’t rely on your employees having a traditional handset, and instead has them using more mobile devices, they’re more likely to be available when you need them most.

VoIP Is More Flexible
Some organizations have employees who aren’t always able to work in the office for a variety of reasons. Perhaps they are simply on the move for conferences so often that they are just never in the office, or perhaps you have employees who work remotely from time to time (or even permanently). VoIP lets you stay in touch with these employees in the same way you can with your in-house team. Since VoIP can be used on mobile devices, laptops, and even desktops, it doesn’t matter where your employees work, as long as they have the VoIP application and a headset. In this way, VoIP is much more flexible than any traditional landline.

VoIP Allows for Additional Features
Landline phone services tend to have features built into them, but many of them are decided by the cable company that provides your telephone service. These features are often not what your business wants or even needs. VoIP services give your business all the features needed from traditional landline telephone services, including conference calling and voicemail, but with lots of additional features that add a quality to your business’ ability to communicate. You can take advantage of video conferencing and instant messaging built right into your VoIP solution. By going through a VoIP provider in this way, you save money by only paying for services you will use rather than those your cable provider assumes you want.

To get started with a VoIP solution today, reach out to us at PHONENUMBER.

Categories
Technology

Why (and How) You Need to Maintain Your Servers

maintain_server_400.jpg

It is impossible to understate the importance of a server to today’s businesses. We talk a big game as to how important data is, but we don’t often broach the topic of how important it is to ensure that your server is well-maintained. Below, we discuss how to determine what your servers need for optimal performance, and how you can be sure that they get it.

What Can Cause Problems in Your Server Room?
Of all the potential issues that your servers can face, the smallest ones can create some of the biggest problems – literally. For instance, there’s always the worry of dust.

Dust, and other similarly-sized contaminants, can easily make their way into your server’s components, where they build up and become an insulator. As a result, your equipment can become up to 30ºF warmer – and just like in human beings, a rise in internal temperature to this degree can be lethal.

Other contaminants include things that human beings generate, like skin particles and dander, or even the result of wear on the devices themselves, like belt debris from the climate control systems and metal shavings from the hardware. The worst culprit, however, is actually the soles of your feet. Approximately 80 percent of the most damaging debris can be introduced to your server room this way.

Mitigating Issues through Maintenance and Prevention
Consider what would happen if your server was to suddenly fail. All of the data you had worked to preserve and protect, investing in the infrastructure to house it and the solutions to mitigate external threats to it, would be gone. Therefore, it is important to remember that protecting your servers against inadvertent internal threats is just as critical as protecting them against external attacks. This is accomplished in two overarching ways: first, strict standards of cleanliness, and secondly, avoiding the introduction of contaminants.

Keeping it Clean
The less dust and grime there is in your server room, the easier it will be to keep the room nice and cool for your infrastructure. While the big cleaning jobs should be left to experienced professionals who have a history with cleaning computing equipment, there are some jobs that you should be able to handle.

After all, some cleaning may have to be done on a daily basis, especially if your server room is a high-traffic area. Careful vacuuming will help get rid of that notorious sole-grime that comes in, as well as a considerable amount of other dust. To clean your server components themselves, use an antistatic cloth to gently remove the grime, using compressed air to get into hard-to-reach places.

Avoiding Contamination
If possible, you might also want to make some changes to help reduce the amount of dust and grime that enters your server room in the first place. Installing air filters inside can help, as can (assuming you are able) creating a buffer room between your office and the server room itself, where special mats can be installed to help minimize contamination. Hats and booties can also help reduce the amount of human-borne contaminants entering the area.

Finally, do your best to stay out of the server room if at all possible. Avoid bringing potential contaminants into it, like cardboard, and clean off any tools and equipment before they are brought into the server room.

For more best practices to maintain your business’ crucial technology, reach out to COMPANYNAME at PHONENUMBER!

Categories
Technology

Know Your Tech: Accessory

kyt_accessory_400.jpg

We make a big deal about how important it is to take care of your computers. Whether that be routinely cleaning your PC, weeding through the unnecessary information stored on them, or utilizing a mobile device’s built-in security features to keep mobile malware from making the management of your company–wide mobile solution more difficult. Much of the time, however, your organization’s IT works as designed, creating no issues whatsoever. In those moments you begin to pay more attention to your accessories.

For this week’s tech term, we talk a little bit about accessories. In the past, accessories were mandatory to simply use any computer, but with the advent and prevalent use of smartphones and tablets, that isn’t always the case today. They do, however still make up a huge portion of the cost to businesses and individuals when purchasing a computer. Let’s take a look at the computer accessory market.

When looking to define what a computer accessory is, you’d have no trouble finding multiple definitions. On one hand, many computer accessories attach themselves to a computer, while others are there to provide additional functionality, security, or support. We’ll break them into two different groups: basic and advanced.

Basic Computer Accessories

Basic computer accessories are accessories that are typically less expensive, and don’t usually come with their own power supplies, although wireless technology has somewhat changed this. There are all types of simple accessories that include:

  • Cables and Wires
  • Keyboards and Mice
  • Speakers and Microphones
  • Webcams
  • Headsets
  • Flash Drives
  • Adapters
  • Bags and Cases

Advanced Computer Accessories

Advanced computer accessories typically have a higher price tag and come with their own power supply. Also called peripherals, these products typically perform advanced tasks or have more stand-alone value than basic computer accessories. Some include:

  • Printers
  • Scanners
  • Charging Stations
  • Digital Signage
  • External Storage
  • Power Protection

Essentially, every product you can buy beside the computer and the monitors is considered an accessory. Even peripherals that come with their own power supply are technically accessories for a computer (since you can’t use them without a CPU).

COMPANYNAME’s knowledgeable IT technicians are committed to providing useful technology support services to organizations like yours. To find out how we can help your organization best use its technology call us today at PHONENUMBER.

Categories
Miscellaneous

Which Browser is Best for Your Needs?

best_browser_400.jpg

There are a variety of web browsers out there, and that variety is much larger than most people think. While most can list off the main ones: Chrome, Safari, Edge, and Firefox, there are many more to consider. However, the real question remains: which one is best for you?

In a Nutshell: Probably Chrome…
The most used browser today is Chrome, with about 60 percent of the market share going to it. This isn’t an accident, as Chrome has historically prioritized the two things that Internet users want most – options and speed.

Chrome has always been fast, and despite some other browsers reaching comparable speeds, they just can’t match Chrome’s consistency in that arena. It also doesn’t hurt that Chrome has a remarkably simple interface that hides a massive amount of functionality, only supplemented by a huge extensions list.

However, Mozilla’s Firefox option has also exploded in popularity with its release of Quantum, which allows it to give Chrome a run for its money where speed is concerned. With additional security features and other useful elements, Mozilla is another tempting option.

Microsoft’s Edge browser is another option for many, especially if they prioritize the ability to easily share web pages through either email or assorted social networks, or to take notes on web pages and save them. Furthermore, as it was developed by Microsoft, the same company that develops Windows itself, Edge and Windows integrate quite well with each other.

…But It Depends
Of course, if your browsing tends to have a specific purpose or need, there are other browsers that may lend themselves better to your given objective. For instance, Opera has a feature called Opera Turbo, which can help make slow broadband speeds less of an issue.

Another option is Vivaldi, which would be ideal for those who want a customizable browsing experience. This browser lets a user create their own keyboard shortcuts and mouse gestures, as well as provides far more options that effectively allow the user to customize their own browser. Those who are particularly concerned about their online privacy might prefer the inherent features found in the Brave Browser or in the Tor Browser, and those who frequently download things from torrents might prefer Torch Browser.

At the end of the day, your choice will depend on your preferences. COMPANYNAME can help you weigh your options and make the best choice for you and your business. Give us a call at PHONENUMBER today.

Categories
Security

Are American Voting Systems Secure?

american_voting_secure_400.jpg

Election Day for the United States is November 6th, and regardless of your feelings regarding U.S. politics, the fact of the matter is that millions of Americans will soon go to the polls and cast their ballots. Unfortunately, what many of them don’t realize is how insecure their voting machines actually are, and how they are potentially putting their vote at risk.

What Most Polling Places Have
The majority of American polling places are operating with equipment that is fast approaching 15 years old. For reference, here’s a brief list of products and technologies that haven’t even been around for ten years yet:

  • Google Chrome
  • Airbnb
  • Spotify
  • Kickstarter
  • 4G
  • Mobile GPS
  • Instagram
  • The iPad

One cofounder of nonprofit group Open Source Election Technology, Greg Miller, puts it this way: “You have equipment that was introduced in 2005. In that time frame, how many times have you changed your mobile phone? And how many times have we replaced our laptops?” In short, the American voting system is reliant on, as Miller described it,”… obsolete hardware [and] software that relies on a diet of spare parts.”

The other cofounder of the nonprofit OSET, John Sebes, has demonstrated just how vulnerable these systems could potentially be to manipulation.

Most polling places collect all of the voting data onto a piece of portable media, like a CD or a USB drive, and bring it to a separate location to be tallied. Unfortunately, the machines used here are also usually outdated, as is the software used to process the results of the vote.

In a live demonstration on a national news network, Sebes used one of these machines to tally votes for two fictional candidates, Thorfer and Varda. In the example, Thorfer had won in a landslide with over 3,000 votes, the opposing Varda only receiving 100. However, with a very simple malware, Sebes was able to just switch the tallies, making “Varda” a fraudulent winner – and while access to these tallying computers is secured, some may not be secured as well as others are.

Furthermore, many polling places maintain a paper backup of the vote, just in case there needs to be a recount, but there are also many who have no paper backup at all. This includes some states known as “battleground” or “swing” states, where a much smaller number of votes can potentially have a significant impact on the final outcome.

How to Minimize the Issue
Unfortunately, the easiest solution to this problem is also impossible. One would think that there would be a singular set of standards for all polling places to abide by – but since the American Constitution specifies that each state is in control of its own electoral procedures, this consistency is effectively made impossible.

However, there are other ways that have been suggested to protect voting technology… some of which are decidedly lower-tech.

Temporarily Eliminate Online Voting
Some states have made online voting available, primarily to service members or other citizens who may be abroad, and many allow email ballots to be submitted. However, until security is improved for these methods, it has been suggested that they are suspended.

Utilize Physical Backups
Yes, we know. We generally say that all of your backups should be saved to the cloud, but in this case, that would be counterproductive. After all, a physically-generated paper backup that records each vote isn’t hackable (unlike a digital system) and could easily be used to cross-check any contested results.

Invest in Improved Voting Equipment
As one might imagine upon hearing that most American voting machines are over a decade old, updating the infrastructure that enables the prime responsibility of democracy is clearly not a priority for those dispersing the funds. It has been suggested that Congress get involved, funding research into improving these machines and replacing the problematic older machines, as was last done in 2002.

Americans view the right to vote as a basic human right, so it seems especially bad that their infrastructure can get in the way of their doing so. Don’t let your business technology do the same to your employees and their work. Reach out to COMPANYNAME for a better solution by calling PHONENUMBER.

Categories
Best Practices

Tip of the Week: 5 Windows Tricks

windows_tips_400.jpg

The Windows 10 operating system is the most common operating system for business use, which is what makes it surprising that so few know how to adjust its appearance to suit their preferences. For this week’s tip, we’ll go over a few ways to adjust what you’re seeing and/or looking at for maximum productivity.

Quicker Settings
Your settings are your greatest tool to control your Windows 10 preferences. If you need to change a setting on the fly, you can pull up the menu by pressing CTRL + I or Windows Key + I.

Zoom In/Out
Whether it’s a graphic you want a closer look at or text that’s just a smidge too small (or the opposite cases) the ability to zoom in or out on the entire screen can quickly become a handy trick to know. You have options here: you can either press CTRL + (+) or CTRL + (-) to zoom in or out, or press CTRL + Scroll Wheel to accomplish the same. Pressing CTRL + 0 will reset the screen to normal.

Changing Active Applications
If you’ve really got a good groove flowing as you work, pausing to switch windows with your mouse can really trip you up. With some practice, you can use a keyboard shortcut instead, eliminating this inconvenience. Holding Alt as you press Tab will bring up smaller versions of your active windows, and using the directional keys (while still holding Alt) will allow you to select a different one to work in.

Switching Monitors
Workplaces are seeing more and more multi-monitor setups in use. A shortcut makes it easy to move application windows around and across screens. To move a window to the other monitor, press Windows Key + Shift + Left/Right. Whether you choose left or right depends on which way you want your window to move.

You can use a simpler version of this shortcut to dock an application or browser window to the side of its current monitor, too. All you press for this one is Windows Key + Left/Right.

Shortcuts like these can turn you into a Windows power user in no time at all, with a little practice. Do you have a shortcut that you use frequently enough to make it second nature? Share it with us in the comments!