Categories
Casserly Consulting Blog

Tip of the Week: Cloud Software for File Sharing

totw_cloud-sharing_400.jpg

Businesses have a lot to gain by personal file storage and sharing, but then again, so does the individual user. After all, even the most ambitious business owner has a personal life and people to share information with. How can you share files with people without leaving them vulnerable to data theft and worse? Here are some options that you can use for your personal file sharing solution.

 While there are a lot of products on the market for this purpose, some of the best are those that can also be utilized for business purposes. Most of these file sharing services take advantage of the cloud so they can be used more readily for collaboration or sharing. Here are some of the most popular storage systems at a consumer level.

Google Drive
Google Drive is an extremely helpful tool that can be used by both businesses and personal users alike. It makes it very easy to share files and collaborate in a cloud-based interface. You can share documents, spreadsheets, images, videos, and just about any other file you want to share with other people. You can control permissions for these files as well, controlling who can do what with it. This includes sharing and editing, among other things.

As far as pricing goes, the average user with a Google account can take advantage of Google Drive free of charge, with the option for increasing storage space for a modest fee.

Microsoft OneDrive
Just like Google Drive, Microsoft’s flagship cloud storage system OneDrive is a great solution that integrates Microsoft office applications with their OneDrive cloud storage. The neat thing about Microsoft OneDrive is that it can sync with your Microsoft Office to always update files that you might have stored locally on the device you’re accessing it from. Just like Drive, OneDrive can be an excellent tool for both a business and individual user, with many different plans available for both power users and casual users alike.

Ultimately, the choice is yours on how to proceed with a cloud service for your personal needs. Let us know which one you decide on in the comments below.

Categories
Casserly Consulting Blog

Reduce Your Costs By Outsourcing Your IT Management

managed_outsource_yourit_400.jpg

Your business deals with all types of troubles, but one trouble that can be extraordinarily costly is when your organization’s technology doesn’t work properly. That’s why many businesses hire an IT staff who work to mitigate technology-related problems. One issue you should be cognizant of is cost. Typically, IT professionals have training, certifications, and experience and demand an above average salary. If you have a small or medium-sized business that is working with tight margins as it is, it can be extremely difficult to take on new personnel costs; especially ones that don’t directly result in bringing revenue through the door.

A popular solution to this quandary is to outsource your organization’s IT management to a managed IT services provider (MSP), like COMPANYNAME. Our certified technicians will first assess your business’ information systems to get a good idea where your inefficiencies lie, then they’ll go to work devising a customized technology and management plan to fit your business’ needs. Starting a relationship with a baseline of knowledge we can deliver value through our cost-saving managed services that include:

  • Hardware & software support: We are the IT guys after all. We have relationships with some of the most notable vendors in the industry so our clients can get the hardware and software solutions they need to be the best version of their business. We’ll also ensure that any software you use will be up to date with the latest threat definitions.
  • Around the clock monitoring: In order to provide the ROI we intend to, our services have to reduce or eliminate your organization’s downtime. That’s why we monitor and proactively maintain your network and infrastructure with our state-of-the-art monitoring software. In doing so, if there is a threat to your network, or your hardware, we’ll know about it immediately, and we can take steps to remediate the issue. This allows you to get more from your hardware and avoid the operational problems that comes when you have to stop to deal with network and infrastructure issues. 
  • Backup and disaster recovery: Your business’ data is an extremely valuable asset, and as such, it has to be protected against situations that arise where you may lose it. Anything as benign as a storm could wipe out a lot of hard work. Our backup and disaster recovery platform not only backs up your data periodically, it creates copies that are sent off-site into the cloud, so that no matter what is thrown at your business, your data will be safe. 
  • Network security: Along with our monitoring and management program, we also ensure that your network is secured from the literally thousands of threats that face it every day. From malware to corruption to infiltration, our network security platform keeps your data available and your network working properly.
  • Vendor management: Along with having access to a myriad of top industry vendors, we also can help you manage your vendors, whether we use them or not.
  • Around the clock IT support: We offer a comprehensive help desk where technicians who have remote access to your end-points can solve situational computing problems for your staff 24/7.
  • Options: We also offer a whole cache of powerful IT solutions including cloud computing, communications, printing, conferencing, and physical security solutions that work for any-sized business.

If you are looking for a way to get the technology that can help you grow your business, you are just looking to reduce your IT management costs, or you are thinking of attempting to get your footing on a new IT initiative, call the IT professionals at COMPANYNAME today at PHONENUMBER.

Categories
Casserly Consulting Blog

Why It’s Great that Managed Services are Managed

managed_services_manage_400.jpg

One of the key benefits of managed IT services is right in the title. It’s managed, meaning that you don’t have to worry about maintaining or configuring your systems. Many small businesses see these kinds of advertisements out in the world but don’t necessarily understand what services are being marketed to them. We’ll take a deep dive into what you can expect from “managed” services for your organization.

Defining Managed Services
Managed services are any services your organization takes advantage of that aren’t managed directly by your company. Perhaps the best example is comparing it to the way the average consumer uses their email. Let’s say you use Gmail as your preferred email service for personal use. Do you manage the mail server running Gmail? Probably not, making the average Gmail user a patron of managed services. If you think about it in this sense, any service that your organization doesn’t manage on its own could be considered a managed service.

In the case of managed IT services, the term “managed” means anything that’s not hosted on your infrastructure or maintained by your on-site employees. This can be anything from cloud-based data storage and web applications to entirely hosted hardware infrastructures that are accessed virtually through the cloud. If you can think it, you can build it–the technology infrastructure of your dreams, without all of the frustration of managing and maintaining it on your own.

The rise of managed IT services has its roots in break-fix IT, where businesses would take their technology to a specialist in order to get issues resolved. This approach meant that they didn’t need employees to maintain the technology on-site, but it also came at a steep cost. Break-fix IT companies would take advantage of businesses that came to them in this fashion, taking care of immediate problems without taking measures for the long term. This meant that businesses would often experience even more issues without addressing the overarching problem, leading to wasted dollars and wasted time.

Now, back to the “managed” part. When a business isn’t managing its own IT, they don’t have to worry about these issues because they are being addressed by a company that A.) Knows how to take care of technology, B.) Takes proactive measures to ensure issues don’t reoccur, and most important of all, C.) Can save your business precious time and resources that can be better spent on other tasks. Imagine having enough time to invest in new outreach initiatives for potential clients, or finally having enough in your budget to not only invest in new technology solutions but implement great ways to increase your bottom line.

COMPANYNAME specializes in providing small businesses with the managed services they need to stay competitive with larger organizations. Managed services often come at a better price point than hiring an entire internal IT department, making it an attractive option for both businesses that don’t have resources to maintain an on-site infrastructure and those that have enough of a staff to manage one, but not enough to maintain it properly. We can either supplement your current help or function entirely as an outsourced IT provider. All you have to do is reach out and ask what we can do for your business.

To learn more about the managed IT business model, reach out to us at PHONENUMBER.

Categories
Casserly Consulting Blog

Know Your Tech: Encryption Key

encryption_key_400.jpg

Security is a necessity. Every technology professional will tell you this, but in an age where employees are taking information on the go, it’s trickier than it’s ever been before. Encryption is one of the ways that businesses are attempting to shore up their security, but this also requires having an encryption key. This week’s technology term is all about encryption, as well as how encryption keys protect your business’ data.

Defining Encryption and Encryption Keys
Encryption is the act of scrambling your organization’s data so that it can’t be seen by prying eyes. Anyone who doesn’t have the encryption key will see nothing but a bunch of nonsense. Through the use of algorithms, these keys are guaranteed to be unique, meaning that there are no two patterns that are alike. Of course, depending on the type of encryption being used, there could be one or two keys needed to decrypt information.

Symmetric algorithm: Symmetric algorithms are often called secret key encryption. This uses one key to encrypt and decrypt data. Since this makes for an efficient encryption method, it can be used to encrypt large amounts of data. The bad side of this encryption is that it only uses one single encryption key, so you need to make sure that it remains in your possession at all times.

Asymmetric algorithm: Asymmetric algorithms are commonly used in public/private encryption, in which there are two keys involved. The public key–the one used to encrypt data–can be shared, whereas the other–the private key–is private, and used to decrypt the data later. Asymmetric is considered the more secure of the two options, since the private key that decrypts the data isn’t actually shared.

What Are These Keys Used For?
Encryption keys are used for a variety of objectives, but the ultimate goal is still the same: security of both the data and the encryption keys themselves. The strength of the encryption key depends on several variables, including the length of the symmetric keys and the algorithm used to create it. These keys usually have short shelf lives called a crypto-period, meaning that you should understand details about how the encryption key will be used before committing to it and expecting it to work for you indefinitely.

  • Data encryption keys: These keys prevent data from being read by anyone who isn’t authorized to view it. These keys are also held onto for a bit past their crypto-period.
  • Authentication keys: An authentication key is used to determine that the data encrypted has not been altered at all while it’s in transit. This is ideal for sending and receiving data so that authenticity is guaranteed.
  • Digital signature keys: Digital signature keys are similar to authentication keys, but they take it a step further by applying a digital signature to the user. This means that someone who digitally signs a document can’t actually deny that they’ve done so.
  • Root keys: The public key infrastructure is used for authentication and digital signatures, and the root key is the highest level of key in this infrastructure. Due to the importance of this key, it’s generally protected by a hardware security module.
  • Master keys: A master key can be used to encrypt multiple other keys. This means that they need to be extremely secure with a hardware security module, and they should last for a long time, if not forever.
  • Key encryption keys: These keys can transport other encryption keys. They should be long-lasting and unchanging.

Does your organization want to take full advantage of encryption? To get started, reach out to us at PHONENUMBER.

Categories
Casserly Consulting Blog

Increased Network Complexity Necessitates Shifts in Monitoring Strategies

network_complexity_monitor_400.jpg

Businesses of all sizes have come to depend on their IT for productivity. IT administrators that constantly monitor their network and infrastructure reduce downtime, leading to higher resource availability. With the increasingly complex makeup of an organization’s network this becomes quite the task.

What Makes a Network Complex?
First we should mention that computers are complex machines and if you’ve ever tried to fix one without the specific knowledge it takes to do so, you more than likely ended up like everyone else who has tried, and called a professional. The traditional computing network was made up of centralized servers, end points in the form of workstations, and some networking equipment that allowed these machines to communicate with one another. Adding the availability of the Internet to that equation makes the network much more complex, mostly due to the breadth of the Internet as it exponentially increases your business’ exposure to threats.

Expanding that even further with the growing number of endpoints on a network due to the deployment of wireless networks that connect all the smartphones, laptops, and tablets to the network; and, all the other connected devices that are out there today… there is a lot of ground to cover. That’s not even considering virtualized data, cloud platforms, a website, and other higher-bandwidth applications such as video streaming or communications systems.

Network Monitoring Best Practices
Before we start listing ways you can monitor your network and infrastructure more effectively, we should mention that as trained professionals, we recommend entrusting your network monitoring to people who are versed with the makeup of your business’ network and infrastructure. Our managed IT services platform is a perfect complement to a large complex network filled with potential problems.

5 Monitoring Practices to Consider

  1. Pay Attention – This goes without saying, but by keeping the health of your network at the top of your list of priorities and monitoring components in real-time, you can be more proactive in fixing issues before they become downtime-causing problems.
  2. Find an Overreaching Solution – By integrating an end-to-end monitoring strategy, it gives you the power to coordinate efforts and present technicians with one version that they can act upon. Find a solution that handles both wireless and wired networks, virtual and physical environments, databases, and applications and supports all necessary protocols and languages to be able to monitor any device or program.
  3. Optimize Bandwidth – Data flow bottlenecks can absolutely hinder your business’ ability to utilize all the tools effectively. Monitoring bandwidth levels can bring about favorable results.
  4. Prepare to Scale – For the modern business, scalability is key. To ensure that the staff of your business has access to the productivity systems they require, being able to scale up or back–depending on the situation–is essential.
  5. Ensure Your Solution Is Flexible– When you choose a monitoring platform, be sure to choose one that doesn’t have inflexible licensing models as you need it to be able to work across all types of devices and applications.

The IT professionals at COMPANYNAME are experts and monitoring and managing business networks. Call us today at PHONENUMBER to find out more about how we can help you run a more efficient business with technology.

Categories
Casserly Consulting Blog

How Technology is Transforming the Way Students Learn

students_learn_technology_400.jpg

To educate the leaders of tomorrow, using technology from the past isn’t going to cut it. While some schools are still using technology from the last century, others are moving forward. Today, we will take a look at classroom technology innovations, and how to get this exciting new technology in the hands of more students.

The Modern Classroom
Like the modern office, the modern classroom is beginning to run on technology; and as a result, it is changing the way teachers need to teach. Teaching strategies that have been the same for decades are being questioned and altered, making the children of today more-or-less guinea pigs in the new way of learning. They are well-equipped for this alteration, however, as they are the first generation of people that have lived in the age of social media and are likely well more advanced at using technology to solve problems than previous generations. So while there are some inherent problems with kids growing up in the age of social media, for education, the concept is a major win.

One strategy modern teachers are using nowadays is called flipped learning. This is where children are asked to watch online lectures, videos, and other materials at home, then do what used to be called homework during class. The classwork isn’t just people sitting quietly at their desks with their five-pound textbook open any longer, it’s now a chance for the children to work collaboratively to solve problems and hone practical skills that can be used throughout their lives. Best yet, flipped learning allows for a more analytical approach to teaching, whereas in the past kids that had trouble with certain concepts would work on problems they didn’t understand at home, away from educators, leading to frustration and higher degrees of failure.

For the school that isn’t ready to flip education completely on its head, there is blended learning, which is a strategic combination of using traditional face-to-face teaching with technology-based assignments to get more out of each lesson plan. So, while there are still in-class lectures, and individual assignments, integrating the use of technology to find answers, present homework, and introduce concepts can go a long way toward getting the children using technology and gaining the skills they are going to need as a member of the future workforce.

What Are Some of the New Technologies?
There are several technologies that are being developed to help students (and people in general) learn more about the world around them. Let’s start in the classroom. One technology that is starting to become common in the classroom is the smartboard. If you haven’t seen one, it is in essence a whiteboard that is hooked up to a computer and has multi-touch capabilities. This provides a more immersive educational experience than the old overhead or slide projector. One feature that a smartboard has is that it can be mirrored to any Internet-connected computer, giving students (or whomever is viewing this content) the chance to follow along when they are out of the classroom or on their personal device within the classroom itself.

Another great tool is the smart table. Smart tables are computer-based, and Wi-Fi connected touchscreen tables that typically have many multi-touch points, some have as many as 80 unique touch points at the same time. Since the technology is more accessible, the smart table is great for younger students that need more hands-on learning.

Another technology that the classroom of tomorrow will almost certainly feature is virtual and augmented reality glasses. These technologies are just in their infancy, but the more applications they begin to create, the more they will be found in schools. AR specifically is a technology that many students can benefit from. Since it is a digital overlay over real life objects, it makes instructional learning more immersive and provides a student practical instruction rather than providing conceptual instruction. It won’t be surprising to see apps developed for tablets and smartphones that will provide step-by-step instructions to students in a wide variety of disciplines.

Securing the Technology
The process of getting students and teachers more connected and modernized isn’t just about acquiring new hardware and software. It’s also critical that teachers and administrators are taught how to use the technology and how to use it safely. Without proper security measures, sensitive information could be at stake, and putting a student’s identity or privacy at risk has deep ramifications. It’s critical that schools consult IT experts who understand IT security before deploying technology that connects to the Internet or the network in general.

How to Get Kids the Technology They Need
One big problem facing a lot of public schools is that they simply don’t have the funding to get enough of the technology into classrooms to make a difference for the students. Most school boards won’t propose major tax increases in order to fund classroom innovation, and it’s unreasonable to expect that educators foot the bill for this technology. For situations like this, teachers have turned to crowdsourcing and social media. The most popular platform used by educators is DonorsChoose.org , which was started by a teacher and can be used by educators to raise funds for school supplies and technology.

Another form of funding can come from social media. Reddit does a gift exchange for teachers. There are people from all around the world looking to help kids get a better education by providing them technology. Another is Digital Wish, where teachers can purchase donated technology and software. The site allows donations that can go into their Digital Wish account to help them purchase the technology they need.

Of course, you can always go the traditional route: writing to your congressman/woman, but a lot of times you’d be better off turning to Adopt a Classroom, a foundation set up for teachers who, on average, spend nearly $600 a year on classroom supplies. Go to adoptaclassroom.org for more information.

The world has seen its technology change quickly and education is going to have to represent where we are in society. Do you know of any technologies that students use nowadays that we didn’t touch on? Leave your thoughts with us in the comments section below and return to our blog for more great technology-based content.

Categories
Casserly Consulting Blog

Tip of the Week: Why You Shouldn’t Just Kill Power to Windows

no_just_kill_power_400.jpg

There’s a big difference between turning off any other appliance, like a stereo or a television, and turning off a computer. A computer takes much more time to shut down than your average device, but why is this the case? Is there a way to speed up this process? This tip will explain these processes and provide some ideas for how you can make this process much faster.

Why Shutdown is So Slow
Let’s take a look at this process as a whole. As a computer is running, there are many components that are doing different jobs. When a computer (or any computing device, like a phone or game console) is shut down, it needs to follow a procedure to make sure data doesn’t get lost. A full shutdown will aim to minimize damage to internal components, empty the RAM, wipe the virtual memory on the hard drive, remove all cached data, close all open applications, and turn off the operating system.

If your computer shuts down without going through this entire process, it could cause file corruption or other damage to its contents that could create issues.

Steps to a Proper Shutdown
It’s important to remember that even though there are a lot of different stages to the shutdown process, but it should go pretty quickly.

The first step in this process is that any applications that are opened are checked to make sure that the data has been saved. If not, the process is interrupted to inform the user. The computer then initiates a sequence that shuts down all services and programs, and it has to confirm that they have indeed been closed before eliminating any unneeded program data. A log is made of anything strange happening during the process, so the user can consult it later. All users are logged out of the system and the computer shuts down on an operating system level. Once this happens, any updates are installed, and the machine is turned off completely.

Speed Up Your Shutdown (and Startup) Times
There are ways your business can improve shutdown speed, but they are somewhat complex and difficult to do on your own with limited IT experience. This is why we recommend working with a provider like COMPANYNAME to make the process easier and more efficient for your organization. We can help your organization make sure that the shutdown process is as streamlined as possible. The same goes for your computer boot times. If you or someone on your staff has a laptop that seems to take forever to ‘wake up,’ there are steps we can take to investigate why and resolve it.

We recommend that your computers get restarted regularly (based on their performance) so as to help the computer keep itself in top working order. To learn more, reach out to us at PHONENUMBER.

Categories
Casserly Consulting Blog

A Better Way to Be Rid of Old Cables

new_recycle_cable_400.jpg

Are you drowning in old computer cables? Do they sit in a drawer and take up space? Chances are that you’ll have quite a lot of old cables that are sitting around collecting dust due to your organization picking up new devices that come with even more new cables. Sure, you might think you still need that old 25-pin serial cable for that legacy scanner from 1997, but it’s probably time to let go. While there is some merit to keeping old cables around just in case, the proper alternative to throwing out unneeded cables is to recycle them.

Take an Inventory
First, you need to see what cables you have on-hand. This includes cables, wires, and adapters. Basically, keep an eye out for anything that might be of value to your organization. This doesn’t mean to hoard them–rather, keep an eye out for anything that could potentially be useful, but not obsolete in the near future. For example, smartphone chargers with USB Type-A and Type-C cables might come in handy for travel or to keep as spares for staff.

Recycle (Don’t Discard) Your Unwanted Cables
If there are any cables remaining, you should always, always recycle them rather than throwing them in the trash. Modern computer and video cables are typically made out of valuable materials, such as copper and gold. On their own, they might not be worth much, but if everyone recycled their old cables instead of throwing them out in the trash, it would have a pretty large impact.

You can reach out to COMPANYNAME for assistance with getting rid of your unneeded and unwanted hardware. This goes for more than just cables–if you have anything at all that you simply don’t need, we’ll take it off your hands. If you just want a place to drop off your unneeded hardware, just call 1-800-RECYCLING or visit the National Center for Electronics Recycling website.

For help with recycling your unused technology, give us a call at PHONENUMBER.

Categories
Casserly Consulting Blog

5 Useful Cloud Apps for Small Businesses

cloud_apps_400.jpg

The cloud is a great tool that lets businesses take advantage of goods and services in never before seen ways. How does your organization use the cloud? Developers are trying to leverage the cloud to best assist businesses just like yours with their day-to-day functions, all the while improving flexibility and access to important information. Here are five cloud-based applications that your organization can benefit from.

QuickBooks Online
Quickbooks is one of the major accounting and payroll services out there, and Intuit has developed the platform for use in the cloud environment. QuickBooks Online can help your business build out invoices, track sales and expenses, manage accounts, download bank transactions, and schedule your invoices. QuickBooks Online is also compatible with many different devices, and it works well with over 300 other cloud-based applications. This provides your business with a dynamic and affordable solution.

Evernote
Evernote, a note-taking application, is now accessible through the cloud. Following this migration, users have discovered that Evernote is more functional and quick than ever before. Evernote can even save, and archive information found online so that it can be accessed at any time. Evernote has also added encryption to keep stored information safe.

DocuSign
You sign countless documents year after year. If you could get rid of all the meetings and time spent traveling to locations just to sign specific documents, how would you use this extra time? DocuSign makes this dream a reality by providing an application designed for this express purpose. You can remotely sign documents for a myriad of purposes, cutting down the time spent in between getting to a meeting location and signing the actual document.

Slack
Slack is a great communications system that can integrate with other project management and productivity cloud apps. Slack includes many features designed specifically to help your projects finish as quickly as possible, all while including various features, like message boards and instant messaging, so that all users can be kept in the loop on progress.

Asana
Asana is a cloud-based project management software that can be used for collaboration between projects, allowing you to set parameters and milestones that can be worked toward. This gives your team a way to visually gauge how much progress they are making on a project, as well as provides them ways to meet their deadlines, share files, be more productive, and create opportunities for success.

What are some cloud apps that you use to get more work done throughout the day? Let us know in the comments.

Categories
Casserly Consulting Blog

Tip of the Week: Excel Features for the Power User

excel_features_power_400.jpg

As useful as a spreadsheet can be to convey information, they can be a little drab and disengaging if the full capabilities of Microsoft Excel aren’t understood and leveraged. For today’s tip, we’ll go over a few little-known and underutilized features that can help you create spreadsheets with both more style, and more utility.

Visible Zeros
There is a fair chance that, at some point, you will need to input data into Excel that begins with zeroes, whether you’re documenting serial numbers or what have you. The trouble is, Excel has a habit of hiding these zeros, so 0056907 would display as 56907. This unfortunately renders the data inaccurate. However, an easy fix to this is to just add a quotation mark in front of the number. This prevents the zeros from being omitted, so instead of resulting in 56907, you would keep your original “0056907.

Adding a Drop-Down List
Adding a drop-down list to a spreadsheet is a simple, yet effective way to limit the input a particular cell will accept. The first thing you have to do is select the cell that needs to have drop-down capabilities, and then click Validate in the Data tab in the header menu. On the Settings page of the window that pops up, there will be a menu labelled Allow. From that menu, select List and highlight the cells that make up the options you want in your drop-down, and finally, click OK.

Accessing Tools on the Developer Tab
Depending on your needs, you may require some more advanced capabilities in your spreadsheet, like creating option buttons, creating macros, and other features. These can all be found in the Developer tab, which is hidden by default. In order to access it, you will first have to access the Excel menu at the top of your screen and select Preferences. Once you’re provided with the Preferences menu, select Ribbon & Toolbar. You will then see a list of the various options that you can add or remove from your Tabs. Selecting Developer will give you access to the tools that tab contains.

Shading Every Other Row
If spreadsheets have any faults, the eye can easily wander when one is looking at them. Adding shading to the formatting, more specifically, to break up individual rows can be very helpful to someone trying to read the information the spreadsheet has to share. To do this, you will need to highlight the area where you want to display the effect or use the Select All shortcut (Ctrl + A) to apply the effect to the entire sheet. In the Home tab, click into Conditional Formatting and select New Rule from the drop-down menu. You will then have a Style drop-down menu to select from, from which you should pick Classic, after which you should select Use a formula to determine which cells to format. Enter the formula =MOD(ROW(),2) and pick your desired color, and your spreadsheet should be striped quite nicely.

Do you know any other tricks to improve the use of Microsoft Excel? Share them in the comments!