Article

Social Networking and Small Businesses: A Marriage Made in Heaven?

The advent of social networking these days gives smaller businesses a bigger voice in the market, allowing them to rise to a level nearly at par with their larger competitors – and elevating the playing field to a battle of efficiency, cost effectiveness, and quality service rather than advertising and marketing budgets. One of the most difficult challenges smaller businesses face is having a bigger presence in the market. While many of these companies offer good, quality services at much more affordable rates, they are many times overshadowed by larger firms that have bigger budgets to spend on marketing, advertising, and the like. Things have changed, though, with the advent of social networking. What was once a simple, social, get-to-know-each-other tool between people on the internet has now evolved into a tool that small businesses can take advantage of in order to get their voices heard. The gist of social networking for business is the simple concept of reaching potentially millions of people at a mere fraction of what is normally spent on advertising and traditional marketing. The wide reach of social media allows businesses to find their voices and showcase what they can do. The playing field then moves from an unfair balance of advertising budgets to a battle of service quality and value for money, as it should be – and many smaller firms can compete effectively in this arena. There are many ways to tap into the social networking phenomenon to boost your online presence and aid in your marketing. If you are interested in knowing more about this, please contact us and we’ll be glad to assist you in developing strategies that fit your specific requirements and needs.

Social Networking and Small Businesses: A Marriage Made in Heaven? Read More »

Google Apps and Microsoft Office 365—Two Options for Email in the Cloud

While the decision to have some of your IT resources “in the cloud” can be a complex one, one area we get asked about often is email and productivity applications. Below is a summary from two industry giants: one from Google and the other from Microsoft, and see how they compare: Google Apps Google Apps is a service from Google that started in 2006, with the introduction of Gmail—a hosted email service, and which later incorporated other apps such as Google Calendar, Groups, Talk, Docs and Sites. Google Apps allow customers an independently customizable version of these Google products under their own domain name. The entry level option is free, but the package offered for Businesses is a paid service with an annual fee per user and additional storage space. Storage. Gmail, Google Apps’ email service starts with a sizable 7GB of free storage. Business users get 25GB. Bear in mind however that this storage space is shared with any data you have in other Google properties such as Picasa Web Album and Google Docs. Extra space can be bought however starting with USD $5 per year for an extra 20GB of storage. E-mail attachment sizes are limited to 25MB. Calendaring and Task Management . Gmail can be integrated with the overall excellent Google Calendar application. Google Calendar allows you to easily share personal calendars with colleagues, or create shared calendars used by groups of people (such as a calendar to track meeting room reservations, marketing events and others). Google Calendar also offers a built-in, but somewhat underpowered task management tool. Tasks can readily be added with due dates, but not readily shared or cannot be nested or linked with other tasks. Spam filtering, security and reliability. Gmail’s spam filtering features a community-driven system. Email tagged as spam by users help identifies similar messages as Spam for all other Gmail users. Generally the system works well, although some have complained that it can get over aggressive in its filters. In terms of security and reliability — Gmail has been criticized in the past with showing ads in its free Gmail service that display based on key words in the user’s messages — potentially violating their privacy. Its paid service offers however the option of disable these ads. Reliability is generally good with very few, but widely publicized disruptions in service. Usability. Gmail offers a host of unique usability enhancements that make it different from most other mail services. For one for a web app it loads really fast, as Google has been known to studiously optimize web page loading performance for their products. Another is that it offers a threaded view of messages by default. It also uses a starring/labeling system to tag and segregate messages instead of using folders. Another interesting enhancement done recently is the ability to sort messages by “importance” where it learns based on your usage over time what email messages it thinks you think are important. Mobile access. Gmail offers a version optimized for mobile devices, as well as support for a variety of devices for their native mail applications such as iOS and Android. Overall Gmail is a solid mature choice if you are thinking of moving email to the cloud and are not afraid of being on the bleeding edge of cloud services and technology. Microsoft Office 365 Microsoft Office 365, like Google Apps, offers a host of applications such as online versions of productivity tools which we all already know and use such as Word, Excel and PowerPoint. Most however work best when they are used in conjunction with your desktop-installed Office applications. Focusing on email, Office 365 offers a Hosted Exchange service, which transforms the mature, business-proven on-premise application to an on-demand service. Compared to Google Apps, it is quite new — being introduced only last June this year, although its suite of products in an alternate form has been around for much earlier. Storage. Microsoft’s Hosted Exchange email service gives users 25GB of storage. Attachment file sizes are limited to 35MB. Additional storage can be purchased for $2.5 per GB per user per month. Calendaring and Task Management. Exchange integrates a mature feature set for personal productivity including calendaring, resource management, and task management. As an example tasks can be grouped, color coded and easily sorted. Emails can be converted as tasks and so on. Spam filtering, security and reliability. This is an area where perhaps Microsoft easily outshines Google with Exchange’s roots as an enterprise-class application. It offers spam protection, antivirus and others via Microsoft’s Forefore Online Protection for Exchange technology. It offers other features such as more full features user management, identity access management, mail archiving, etc. If you are in a highly regulated industry like financial services or healthcare these features may be essential for your business. Usability. While the web apps of Office 365 is not as fast loading or as slick as Google, it does offer familiarity. Modeled after their desktop brethren, or directly integrating with them — they offer a smoother migration experience for users specially if they have been weaned on Outlook. Mobile access. Like Gmail Microsoft made sure to support a variety of devices on launch, as well as integration with a variety of devices — specially enterprise stalwarts like Blackberry mobile phones. Overall Office 365 is a solid choice if you are thinking of moving email to the cloud but may be hesitant with changing the apps your users already know and use. Also if you are a business with strict policies related to security and compliance — this service may be something your auditors and IT people may be more comfortable with. Interested in learning more? Can’t decide which to try? Let us know and find out how we can help get you the right balance between your existing IT systems and infrastructure and the cloud.

Google Apps and Microsoft Office 365—Two Options for Email in the Cloud Read More »

Switch to VoIP Phones for your Business

Switch to VoIP Phones for your business and reap the benefits of using a unified network for voice and data. Voice-over-Internet Protocol (VoIP) is basically technology that allows you to make and receive calls over data networks. Instead of traditional phone services which channel analog signals such as the sound of your voice over copper wires, VoIP converts these sounds to digital form first — so that they can be sliced, diced, packaged, and routed over a digital network. Because VoIP technology uses the same ideas behind data networking, and allows the use of the same networks used by computers, voice traffic can also be routed through the Internet as well. Suddenly you can now dramatically reduce the cost of voice communications, as well as achieve creative combinations of both services to create new applications for use. With today’s advancements in technology, and the constant lowering of prices as technology achieves mass adoption, VoIP is now within easy reach for most businesses — even small ones. In fact, many have already made the switch to an all-VoIP infrastructure, using a combination of VoIP phones and VoIP communication systems. Here are ten reasons why you may want to consider switching to VoIP for your phone and office communication systems: VoIP can allow you to dramatically reduce the cost of communications, especially for interstate or international communications, since everything can go through the Internet instead of having to go through expensive long distance toll charges. You can make and receive calls from multiple devices — for instance, on a dedicated phone, your PC via a software-based phone, or even a mobile phone with VoIP capabilities. It’s easier to add extensions to your phone. You can provide a local number or extension for all your staff without additional costs or cabling. VoIP allows companies to maximize investments already made in their network infrastructure. The same network that handles the flow of data such web access and email can now accommodate voice as well — no need to add and maintain additional wires and devices. VoIP allows your employees to be more productive and efficient by giving them the ability to receive and make calls anywhere with a data connection. VoIP reduces the complexity associated with having to manage multiple networks and devices for communication. A company can potentially set up their office network so that each employee can use a single device such as a computer or a smart fixed or mobile phone to handle everything from email, chat, messages, faxes, and more. You can use VoIP as a tool for real-time collaboration along with video conferencing and screen sharing. You can potentially unify your communication channels, streamlining communications and information management — for instance, marrying email with fax and voice in one inbox. You can employ presence technologies that come standard with VoIP phones and VoIP communication systems. This technology can tell colleagues about your presence or give you info on the status and whereabouts of your staff. You can employ intelligence into how your calls are handled, such as: providing automatic call routing based on the number, time of day, etc; providing an interactive voice response when a call comes in, such as voice prompts that guide callers; call reporting; and more. VoIP is certainly a technology that has come of age. It’s cheap, ubiquitous, and easy to use. Interested? Contact us and we can help you make the switch to VoIP for your business today!

Switch to VoIP Phones for your Business Read More »

iPads in the Office

Citing numbers released by Apple recently, it has been reported that nearly 86 percent of Fortune 500 companies in the US report deploying or testing the iPad . Many large companies are clearly looking at the iPad as something not just for leisure or entertainment but also for business. Are you considering doing the same? Read on to find out how you can put the iPad to work for your business. The iPad for many is a revolutionary device in that it brings the full power and experience of computing into a form that is easy to hold, easy to transport, and easy to use. Manufactured by Apple, the device uses the same operating system as its earlier iPod Touch and iPhone devices. And just like its smaller brethren it does away with conventional input devices like the mouse or keyboard, instead requiring just the user’s fingers to touch, navigate, and interact with the operating system and installed applications. Key to the success of the device has been the availability of thousands of applications from third-party software vendors – in fact, nearly a hundred thousand of them . These applications range in categories from entertainment, media, education, and even productivity and business. Using these productivity and business applications for the iPad, you can effectively use these devices in the workplace. Here are some specific work scenarios in which you may want to consider the iPad in your business operations: For presentations. Because of its portability, the iPad makes a great device for showing and sharing presentations. Applications like Apple’s Keynote allow you to import and edit PowerPoint presentations. Accessories allow you to connect the device to a monitor or projector. If you’re thinking of doing virtual presentations, there are iPad apps that allow you to do that as well — letting you stream your presentation via the Internet. For Communication and Collaboration. The iPad has built-in applications for emailing, plus more can be added to support audio and even video conferencing. If you want to manage meetings, the iPad’s built-in calendar and address book apps make it a great replacement for a planner, while its larger screen makes it easier to read and manage than your cellphone or smartphone. It has built-in support for third-party mail and calendar applications like Microsoft Exchange, Google Mail, and Calendar. You can also download and use additional applications to help you manage your tasks, monitor projects, share files, post and read stuff in your social networks, and much more. For field assignments. The iPad’s light weight and portability make it a great companion while out on the road. You can install and configure VPN clients to securely connect to your office network when in the field, or use any of the business applications you use in the office — especially cloud-based ones. Again, using the built-in productivity tools you can use the iPad to manage your itinerary while on assignment. For travel. As a travel companion the iPad is unmatched, with a wide breadth of apps for managing flight and hotel booking information, expenses, and more. Use the built-in tools to manage your travel itinerary, and use the communication and collaboration tools to check on progress at the office. During lulls, breaks, or after office hours, easily shift modes and use the iPad as a media viewer or news reader for information and entertainment. Industry-specific apps. There are dozens more business cases in which the iPad can be put to work. For example, as a store or point-of-sale display, or even a point-of-sale device. Companies are using it to replace manuals, and schools are using it to replace stacks of books. There are many more ways the iPad can be used for business. Are you considering using it for your business as well? Do you know of other uses? Let us know!

iPads in the Office Read More »

New MacDefender Virus puts the ‘Mac = No virus’ Myth to Rest

Security experts have recently discovered a new threat to Mac OS X systems. Called the ‘MacDefender’, this malware is designed to fool users into downloading a fake anti-virus program, which informs users that the system is ‘infected’, and then tries to dupe or bully them into buying another fake anti-virus program. It is a widely held belief that one of the reasons Macs are superior to other systems is because of their ‘invulnerability’ to viruses, malware, and similar threats. All well and good, except for the fact that a recent rogue anti-virus malware that specifically attack Mac OS X systems has been discovered. So much for the ‘Mac = no virus’ myth. Called the ‘MacDefender’ and also known as Mac Security and Mac Protector, this malware tricks users by having them think that their system is under attack. It begins when users visit a malicious website where the program automatically downloads itself to the computer. If you have the “Open safe files after downloading” option selected, it automatically installs itself onto the system. The original installation package is then also automatically deleted. Next, a new menu item appears on the Mac OS X menubar. You’ll see a small orange shield that becomes red, which supposedly means that there are viruses in your system. You’ll then be prompted to “register” – which involves giving out your credit card information – to a website to clean the virus. If you don’t, the malware will then direct your browser to porn sites to ‘encourage’ you to register and pay up. To know more about how MacDefender works, check out this video . While Macs are certainly targeted less than Windows systems, the threat of getting infected by viruses and malware is very real, especially if myths like Macs being impervious to viruses persist. To know more about protecting yourself from threats like these, please contact us so we can draw up a plan to keep your system safe and secure.

New MacDefender Virus puts the ‘Mac = No virus’ Myth to Rest Read More »

User Education in the Fight Against Malware

With the security software of many businesses becoming more and more advanced these days, cyber-thieves are resorting to socially engineered cyber-attacks to bait unsuspecting employees with scams like phishing to infiltrate IT systems. This is why it is important to train your employees against becoming victims of such underhanded strategies. One of the things many people fail to realize is that securing business data from malware and other sorts of cyber-attacks doesn’t stop with implementing the right security software. These days, cyber-criminals also use all sorts of tricks to bait unsuspecting employees into being catalysts for malware entering your system. Reports cite that as much as 60 percent of cyber and malware attacks on businesses are done through social engineering – meaning that instead of a direct attack on your system, hackers are using ploys found on email and social networks to get people in your organization to unwittingly introduce malware into your IT infrastructure. This is why it’s equally important to put emphasis on training your employees to recognize common cyber-attack strategies such as phishing, or how to use proper virus scanning software so any external or thumb drives they plug into their computers are malware-free. Remember, it only takes one mistake from a gullible employee to open the gates of your system to keyloggers and other sorts of malware and viruses. Keeping your company’s IT system safe is an investment. Getting the right security protocols and then training your employees to not only use and respect these protocols but also be more aware about security risks goes a long way in keeping your data safe and your operations stable.

User Education in the Fight Against Malware Read More »

New Flaw Called “Cookiejacking” Allows Hackers to Hijack Cookies in IE

Users of Internet Explorer beware: security researchers have found a new flaw in the popular Microsoft browser that allow hackers to commit something called “cookiejacking”, which enables them to steal information and data from IE cookies from any website. Despite a few flaws, Internet Explorer remains one of the most commonly used browsers in businesses today, making it a ripe target for hackers looking for security flaws to exploit. One such flaw has been discovered recently by a security researcher in Italy. Dubbed “cookiejacking”, the flaw allows hackers to hijack a cookie of any website, thereby allowing them to gain access to passwords, credit card information, and various other data stored in the cookie. The flaw is found in any version of Internet Explorer in any version of Windows. However, users must first drag and drop an item before the exploit can be activated. It might sound like a bit of a stretch, but hackers are known for their creativity, so expect that a seemingly appropriate situation will be presented in which you will find it perfectly normal to do a drag-and-drop action. Microsoft responded to the threat by labeling it as “low risk”, citing the level of user interaction required for cookiejacking to occur. It did, however, encourage users to be more vigilant and alert, as well as to refrain from clicking suspicious links and visiting dubious websites. Regardless of what platform or OS you use, there is always the constant threat from cyberattacks – all it takes is one attack to break through and put important business data at risk. It is essential to always educate users on how to avoid being victimized by scams and hacks, and to have the right security software to ensure that your company’s information is safe and secure. If you are interested in user training for security and / or better security protocols, please give us a call and we’ll be happy to draw up a custom security blueprint that’s tailor-made to meet your needs.

New Flaw Called “Cookiejacking” Allows Hackers to Hijack Cookies in IE Read More »

Google Wallet: Google’s New e-Wallet Service

Google may soon find itself going head to head with services like PayPal as it debuts a new service called Google Wallet, which enables users to transform their smartphones into virtual credit cards. Simply swipe over a participating outlet’s cashier to pay for your bills and earn loyalty points and coupons at the same time. Smartphone technology has grown by leaps and bounds these past few years, and having a smartphone these days is almost synonymous to being online all the time. Software giant Google has decided to tap into this phenomenon with a new service called “Google Wallet”, which enables users to make purchases and payments from their smartphones. Partnering with Mastercard, Macy’s, Subway, American Eagle, Citibank, and Sprint, Google assures users that their e-wallet service is safe. The service requires that smartphones have a special chip that allows the user to simply “tap” or “swipe” the phone at participating stores to pay for merchandise or services. When you swipe your smartphone’s e-wallet, you also earn coupons and points for rewards. The technology is also designed so that the user can turn the chip off when Google Wallet is not being used, making it safe from hackers. If the smartphone is lost, the data can also be wiped remotely. A similar system to Google Wallet has been operational in some countries including Japan for some time now, but its use is limited to only certain areas and stores there. While the concept of Google Wallet has great potential, there are still several limitations to the system as Google continues to look for more partners for the enterprise before its official launch, which is slated for within a month or two.

Google Wallet: Google’s New e-Wallet Service Read More »

Measuring ROI (The ROI Series—Part 4)

Calculating the ROI of a Technology Investment, The ROI Series—Part 4: Cost savings are usually important to small businesses even in the best of times. New technology solutions may be necessary for survival and growth, however — and they may not be as expensive as you think when you consider their return on investment (ROI). In this four-part series, we’ll explain what ROI is, help you understand indirect ROI, and provide guidelines for predicting and measuring the ROI of a technology investment. Part 4: Measuring ROI If you’ve been following this series, you’ve already learned what ROI is and how you can use it to make sure your technology implementations are profitable. But the process doesn’t stop there: it’s important, once you’ve implemented a new technology solution, to track its benefits. There are many direct and indirect benefits of implementing new technology, as we’ve described — but in most cases, companies don’t know what they are. In many cases, what you measure is clear. Consider a service company that implements customer service software designed to help phone representatives more quickly resolve customer issues. To determine ROI, the company simply measures the number of calls per employee before and after implementing the software. In other cases, companies don’t measure what we call the relevant “value drivers.” Some companies don’t know what to measure; others know what to measure but don’t know how to do it. The end result: only 17 percent of CFOs measure ROI for outsourcing projects, according to Hewitt Associates. As an example of how this could happen, consider a manufacturing company that implements software designed to reduce errors in a product line, thereby improving quality. While the company may be tracking the increase in quality (in the form of fewer returned goods, for example), it may not be considering other value drivers. How about waste? We can assume that quality has improved, fewer products have been scrapped — but the company doesn’t have a business process in place that can track costs incurred from waste. How do you identify value drivers? Follow the workflow. IT will always impact your business processes in some way. For example, it might eliminate, create, or change a business process. So to identify value drivers, look at the results you hope to achieve from these business process changes. As an example, consider the service company we referenced previously. As a result of its new customer service software, the company might reduce its customer service employees from five to four. This change in business process shows that one value driver is the reduction in labor costs due to increased efficiency, resulting in a direct ROI. Another value driver might be improved customer service, resulting in an indirect ROI. As another example, consider a company that implements software to track employee performance against objectives. In the past, it has paid bonuses randomly; now it has a methodology. This change in business process shows that one value driver is the savings in bonuses not paid due to non-performance, resulting in a direct ROI. Another value driver might be improved employee morale and effort, resulting in an indirect ROI. Generally, a year of data collection should be sufficient to determine the changes in costs and revenues that will drive both direct and indirect ROI, providing you with solid data to determine just how effective your IT investment has been.

Measuring ROI (The ROI Series—Part 4) Read More »

Eight Actions You Can Take to Guard Against Data Loss

Data loss disasters come in many forms, ranging from simple human errors to “acts of God” that cannot be controlled. However, you can control how you prepare for such occurrences – and the steps may be easier than you think. What would happen to your business if you had a major data loss? The possibility is definitely there; this can’t be denied. Data loss disasters come in many forms, ranging from simple human errors to “acts of God” that cannot be controlled. However, you can control how you prepare for them. Here are eight questions you can ask yourself to test your disaster preparedness. First: Do we back up our data? It’s amazing how many small businesses do not have a backup system in place. It’s so easy to assume disaster won’t strike you. But data loss doesn’t always come from huge, cinema-worthy disasters. They can result from simple everyday errors – yet have huge disastrous results. Don’t let this be you. Do we back up all of our account information? Many small businesses tend to keep their accounts data on one employee’s PC, instead of the network which is on their backup schedule. But what if you lose your customer database? Be sure it’s included in the files to be backed up. Do we back up our email files? Ever wish you had that one email from a few months back, in which a customer gave you the “go ahead” – but now they’re refusing to pay for your work? These days, email is increasingly used as legal evidence of agreements or notices to proceed. If they’re included in your backup, you can easily pull up even deleted emails – received or sent. Is our Calendar and Contact information backed up? What if you came to work one morning and your online calendar and address book was gone? What appointments and communications would you miss, and at what cost? Most of the time, by default your Outlook Contact and Calendar files are stored on the individual PCs. Make sure these files are included in your backup set. Do we back up folders and files from each computer? In addition to important information that is stored in shared networks, think about the files that each of your employees create and use on their own hard drives. Spreadsheets, letters, memos, databases – wouldn’t it be a shame to lose all that work? Are we always saving our files to an area that will be backed up? Consider where each and every file your work on is being saved. Will it be included in your backups? Develop policies and educate your employees on where to save their work so it’s included in your backup schedule. Do we back up data frequently enough? This answer to this question is – how much work are you willing to risk? Say you complete an important contract on Tuesday morning, and an employee accidentally deletes it that afternoon. But you only run backups on Monday, Wednesday, and Friday. Bye-bye contract! A more frequent backup schedule would have saved the day. Do we know where our backups are and how to use them? If you use USB drives, external hard drives, or backup tapes for your backups, are you storing them offsite in a safe place? Even if your files are backed up to the cloud, do you know how to recover them in case of an emergency? Knowing your backup system and keeping it safe will ensure you can get back to business quickly and efficiently. Even if you already have a backup system in place, take a few moments to think about your specific business. If the unthinkable happened, exactly what data would you need to get back up and running? What could you not operate without? Once you identify these things, simply make sure they are included in your backup. Need help? We’re experts in guiding small businesses in setting up a backup system that meets their unique needs. Give us a call today to discuss the options available to keep your business data safe and sound.

Eight Actions You Can Take to Guard Against Data Loss Read More »

Scroll to Top