Macs and PCs—Why Can’t We Just Get Along?

It’s not uncommon nowadays to see both Macs and PCs together the same office. Technology has progressed to a point where both types of systems can now get along smoothly with each other. Its easy to share files between the two systems, share printers, have them communicate to each other on the same network, even run the same applications on both systems! Read on to find out how. Unlike a few years ago when Microsoft’s Windows operating system virtually dominated office desktops everywhere, today we are increasingly seeing the use of other operating systems in the office. Typically these other systems are some model of Apple’s Macintosh running its own operating system called the OS X. The OS X, known for its sleek graphics, great multimedia handling capabilities, and easy-to-learn user interface, has gained favor among many users and businesses. Sometimes, however, problems arise when having to use different systems in the same office or network environment. Here are some tips to eliminate common issues your users might face when working with others on a different system: File Sharing . There was a time when transferring files between a Mac and a PC was a painful process requiring understanding different file system structures, resource forks, file name limits, and other such nonsense. Thankfully those days are over. Many Mac applications today can open files created on a PC and vice versa — such as office documents, images, video, and more. Getting files from one system to another is also easy as you can transfer via a removable drive. Both systems should recognize the file system on the drive — especially if it was formatted using Window’s file system (doing it the other way around might be a bit more difficult). OS X “Leopard” Macs can also read or write to drives that have been formatted using a special format from Microsoft called NTFS, and other freely downloadable utilities can also help. If this sounds like too much work to understand, you can also simply burn a CD or email files from one system to another — or better yet, set up a network for file sharing. Making Macs and PCs talk on the same network . If you’re a little more tech savvy, you can connect your Macs to your PCs directly or via a network. Typically this requires a network cable connected to both devices and having network sharing turned on. Enabling network sharing is outside the scope of this tip, but many online resources are available to help you connect a PC to a Mac or a Mac to a PC. Running the same desktop applications on both a Mac and a PC . For really advanced users, did you know that you can run Windows on a Mac or OS X on a PC? The former is bit easier and more common, thanks to techniques such as dual booting or virtualization. In dual booting (what Apple calls “Boot Camp”), you essentially install both operating systems on a Mac and on power up, you can choose which operating system to boot. Virtualization on the other hand is way slicker as you can run both operating systems at the same time. In virtualization, you boot Windows in a window within OS X, allowing you to effectively run Windows applications on a Mac. There are also many commercial applications that can help with this. The future: Cloud Applications. As we all start to access more cloud-based applications, the operating system you use is no longer as critical. As long as your systems have an Internet connection and a browser, then you can use different systems and it doesn’t matter what operating system or hardware is being used. So running both Macs and PCs in the same office is not necessarily a bad thing, as it has been in the past. Dozens of options exist today to make the situation manageable, if not downright easy. If you need help, don’t worry — we’re here to assist. Call us today to find out how you can get Macs and PCs to work together for your business today.

Continue reading

Epsilon Sets the Bar for What NOT to Do in Online Security

Many IT service providers are learning valuable lessons from the Epsilon incident – which saw one of the world’s biggest email service providers become a victim of cyber-criminals, compromising a substantial amount of information entrusted to them by their clients. There’s been a lot of buzz recently about Epsilon, one of the biggest email service providers in the world, as it suffers from the backlash of allowing itself to be a victim of phishing efforts – which has affected the business data of as many as 50 major companies who are clients of theirs. Reports are also citing Epsilon’s failure to heed an alert from a business partner which advised the provider to be on its toes against potential attacks from cyber-criminals targeted towards email service providers. The damage estimates vary, with Epsilon citing only about 2% of their data being stolen, but the impact is undeniable. Cyber-criminals now have access to a sizable number of personal data stored through Epsilon – passwords, account numbers, and even the purchasing / buying habits of the customers of Epsilonงs clients. Many of Epsilon’s clients are now sending out messages to their own customers, warning them that their email addresses may have been compromised. It’s a lesson to companies, big and small, to pay more attention to beefing up their security protocols, since all it takes is one breach to endanger all of your data. In addition to having the right security software, it also helps if you require your employees undergo proper user training to make sure that they won’t be easily baited by scams like phishing, and will be more aware of how to contribute to the safety of your business data. Failing to do so puts not only your company, but also your clients, at risk. If you’d like to make sure your systems are safe, call us and we’ll evaluate your current security measures and suggest ways to make critical improvements.

Continue reading

Google Goes Social with Google +1

Google +1 is an experimental program by Google aimed at making searches much more effective and efficient. Through a nifty +1 icon that appears beside Google search results, users with a Google profile can recommend sites by simply clicking on the +1 button. While still in the experimental stage, there is a lot to be excited about with Google’s new thingamajig, Google +1 from Google Labs. Google +1 is essentially a button next to each search engine result that you can click when you want to recommend a particular link or website. Google describes it as something you use “to give something your public stamp of approval, so friends, contacts, and others can find the best stuff when they search.” The program is not available for everyone just yet, but participating and testing it out is easy. You’ll need a Google profile to participate, then just go to google.com/experimental and click the “Join this experiment”. After a few minutes, you’ll begin seeing a +1 icon / button beside results on any Google search results page. Click the button for sites you want to recommend, and Google will ask you to confirm. On your Google profile, you’ll have a tab where you can see the sites you’ve recommended through +1. You’ll also have the option to uncheck the box that will allow Google to use your +1 information to send you targeted advertisements. Especially for businesses, a +1 for your website can maximize your SEO capabilities as well as lend credibility to your website. Anyone can +1 your website – colleagues, clients, and even friends – so the more +1s for your site, the more visible it becomes. Try Google +1 and see how it works for you.

Continue reading

There’s More to Backups than Just Backing Up

While doing regular data backups is the norm in many businesses, many forget an integral factor in ensuring that the backup system works – actually testing it. One of the most basic actions a company takes – big or small – with its data is back it up. It’s become a mantra in this age in which information is more easily stored and managed digitally: steps must be taken to ensure that data is regularly backed up. If any malfunction, misfortune, or human error occurs, with a good backup system you won’t stand to lose thousands or even millions of dollars in lost data. But there’s more to backups than meets the eye. Let’s say you have a backup system and you lose your data – how sure are you that you will actually be able to get all of it back? It’s surprising that while many companies do back up their data, very few actually conduct tests in actual data restoration. How can you be sure that your backup system will perform as expected when the time comes? It’s especially important for you to iron out all the kinks in a system as essential as your backup before you actually need it. When the worst happens, one of the last things you want on your plate is contending with any glitches or complications that you missed in your data restore system because you failed to test it properly beforehand. Not having a smooth and well tested restore system defeats the purpose of having backups in the first place. After all, what’s the point of having backups if you can’t retrieve your data properly? You need an efficient system that is regularly tested to make sure that your precious data can be easily and smoothly restored when circumstances call for it. If you’re not positive that you’ll be able to access all of your data if disaster should strike, give us a call. We’ll evaluate your backup and restore processes and make recommendations to ensure your business data will be at your fingertips no matter what happens.

Continue reading

Do Multiple Monitors Make You More Productive?

Studies have shown that dual or multiple screen monitors can help boost productivity significantly, enabling businesses to complete tasks and meet client concerns much more efficiently and speedily. At first glance, people may find the use of dual screens a bit excessive and therefore unnecessary, but the truth is that there is more to it than it may seem. In truth, there are a lot of advantages to using dual screens, provided that you can cope with the cons and challenges of utilizing such as system. The primary advantage of dual or multiple screens is increased productivity. Several studies have shown that using such a system can boost productivity anywhere from 10 to 40 percent. Especially if you use multiple programs at the same time, it allows you to better keep track of workflow, have a improved view (physically and metaphorically) of what tasks you are working on, and divide tasks based on the monitors you are using. For example, you might need to be constantly online on social networking websites like Twitter, Facebook, Linkedin, or Formspring to interact with your clients and give immediate responses to queries and concerns. In addition, you may need to attend to other tasks, which can be confusing when done all in one screen. With a dual monitor setup, you can keep your social networking tasks on one screen, and the rest of your tasks on the other. Space consumption and resources may be an issue for some, but given the increased productivity that goes with adapting such a system, you will find your tasks accomplished much earlier and much more efficiently. This can effectively offset any additional costs, especially in the long run. If you are looking to give this type of system a try, please contact us and we’ll be glad to draw up a proposal that will meet your particular requirements. Additional resources: Advantages and Disadvantages of Working with Multiple Screens

Continue reading

Security: Don’t be the Next Victim

Symantec recently released a study showing dire figures – at least 50% of SMBs out there have little to no disaster-preparedness plan, which if left unchecked can cost thousands of dollars in lost revenue. The risks are real enough, with an SMB standing to lose somewhere in the ballpark of $12,500 PER DAY when operations are interrupted because of security breaches or malware attacks. According to Symantec, of the 1288 SMBs they surveyed worldwide, about half have no security or disaster-preparedness plan whatsoever. Of that 50 percent, 36 percent intend to get or create a plan in the future, while the remaining 14% have no plans on their agendas whatsoever. With these figures, it’s hardly surprising that the study also found that many SMBs only act when it’s too late – which causes not only lost revenue for them, but for their clients as well. More than half of the surveyed SMB clients – 552 – said that they have had to switch providers due to unreliable and irresponsible service. Numbers do not lie: security is more important than you might think. Don’t wait until the last minute to find out just how essential it is before enacting a security plan of your own – for your sake as well as that of your clients. Having the right kind of system in place is vital to keeping your operations smooth and efficient, as well as enabling you to better respond to your clients’ needs. If you want to know more about implementing the proper security and disaster-preparedness protocols for your business, please contact us and we’ll be happy to sit down and create a customized plan that will meet your specific needs and requirements.

Continue reading

HR Managers Must Think About Data Security, Too

Employees have access to a wide variety of electronic information, from the moderately important (such as email lists) to the critical (such as financial records and trade secrets). Upon their departure, HR managers should work with IT to ensure that employee account access is blocked. Remember the days when employees kept important information in paper files? They are long gone. According to a study conducted by the University of California at Berkeley, almost all of today’s new information is stored electronically. And that could mean trouble for your company when an employee resigns — because electronic documents are both easy to copy, and portable. That makes them more prone to theft than paper documents. Case in point: In August 2009, DuPont filed a lawsuit against a research scientist who allegedly stole more than 600 files by copying them to a portable hard drive. And that wasn’t an isolated incident; another DuPont research scientist was sentenced to an 18 month prison term for stealing proprietary information worth $400 million. Think employee data theft doesn’t apply to your type of business? Think again. A 2009 study conducted by the Ponemon Institute found that data theft is rampant in the business world. According to the study, 59 percent of employees who quit or are fired take confidential business information with them. And when the employee works in IT, the access to confidential data is even greater. A 2008 study by Cyber-Ark Software found that almost 90 percent of IT employees would take sensitive company data with them if they were laid off. The lesson: When employees leave, you must take steps to protect the electronic information they have access to. This may include customer information, financial records, trade secrets, intellectual property, and email lists, to name just a few items. We recommend that when an employee leaves, you prevent his or her account access, set the account for immediate review, save any necessary files (which may involve consulting with other departments for verification of documents), then delete the account. In addition to protecting data, this will also optimize server space and open up more storage space for the company. While some employees might argue that they need access to their personal files before departing, and you may grant such access (supervised, on a case-by-case basis), it is not required; any of the information that is located on a company computer is company property. In a sensitive situation it’s always good to let us know ahead of time so we can help you prepare for a well-managed and secure transition.

Continue reading

Email Encryption: Why It’s Important

When we create a letter in the analog world, we take the time to seal that letter in an envelope to keep it safe from prying eyes — especially if that letter contains sensitive information. If it’s highly confidential information we might even resort to obfuscation such as using coded text, or making sure that it is delivered via secure channels such as by special messenger. Encrypting email is relatively easy with today’s software. Usually it involves the use of a public key and a private key. The public key is available to everyone, and if you want to send someone an email message you would use that person’s public key to encrypt that message. That person in turn would use his private key, to which only he has access, to decode that message. Software such as the latest versions of Microsoft Outlook supports this feature , and even flags you if the recipient’s email software does not support encryption. Some systems take it a step further by allowing you to digitally sign your emails, so that other people can verify that it is you who actually sent the email and not someone else. This is especially important since hackers sometimes spoof or impersonate the identities of others to fool unsuspecting users. If you are interested in finding out more about email encryption and security, contact us today to find out how we can help make sure your messages are safe and secure.

Continue reading

The Importance of a Business Continuity Plan

Japan’s earthquake was devastating to many companies, particularly electronics manufacturers. But the losses weren’t limited to Asia; many American companies felt the aftershock. The lesson to be learned: disasters can strike unexpectedly, and can have far-reaching impact. What Japan Can Teach Us about Business Continuity When a powerful earthquake rocked northeast Japan in March 2011, the impact was felt across the globe — a powerful reminder of how important disaster recovery plans are to all businesses. You may think of disasters as being relatively rare events, like earthquakes—but however rare in any one location, events such as these can have an effect on many other locations. Case in point: According to Bloomberg, at least 35 companies derive 15 percent or more of their sales from Japan. Among them are Aflac (an insurance company), Rambus (a memory-chip interface manufacturer), and Coach (a retailer). For example, Japan generated about 75 percent of Aflac’s 2010 sales. American ports and shippers were also affected:  the Port of Los Angeles temporarily suspended the transfer of hazardous materials and bunkering fuel operations. The point is that disasters, whether acts of nature or man-made mishaps, can strike unexpectedly at any organization. Recovering from a catastrophe can be very demanding, expensive, and time consuming — especially for those who haven’t taken preventative measures and preparations. What can you do to prepare? Develop a Business Continuity Plan (BCP), which will enable your business to resume normal operations after a significant data loss or network downtime due to natural disasters, sabotage, theft, or equipment failure. Even if you already have a BCP, it’s important to make sure that your plan is flexible and scalable, and can adapt to the natural changes that your business undergoes. For example, software and hardware installations, updates, and modifications are an important part of business continuity planning. Your data should be properly and regularly backed up, and you need storage and recovery systems and procedures that are continually updated with changes that constantly occur in your IT. In addition to having a flexible and scalable BCP, you also need a highly skilled IT staff that is up to speed on the importance of backup and recovery of data. It’s important that this staff is properly trained to implement your BCP in the event that your business experiences a major data loss. Unfortunately, companies routinely suffer significant data loss because they discover the errors in their systems too late — usually while trying to recover the data. Your business is important to you — and to us, too. We’re here to help you create or fine-tune a BCP that is best suited to your unique business needs, as well as prepare and assist your staff in implementing the plan should it become necessary. Contact us for more details.

Continue reading

Windows Small Business Server 2011 Standard Comes Packed with New Features

Users of the old Windows Small Business Server 2008 will be glad to know that Microsoft has finally released a new SBS – Windows Small Business Server 2011 – which has improved features designed to make businesses function better. Microsoft has released an upgrade to its Small Business Server Platform – Windows Small Business Server 2011 Standard. Based on the Windows SBS 2008, it carries most of the easy-to-use features that have made it a standard in many businesses, plus several new features that make it a much more efficient and effective business tool. Some key features of Windows SBS 2011 Standard include: the ability to recover files with automatic backup in case files and documents get compromised or lost; the ability to share documents and files from a central hub; access to information both in and outside the office; and new business software and application compatibilities. Microsoft has also made the migration of data and other information from the old platform much easier, based on input from partners who tested the software during the beta phase of its development. Other major changes that Windows SBS 2011 addresses are upgrades to both the Exchange Server and SharePoint foundation, as well as the SQL server. The upgrade also provides better remote access and better security, as well as an easier-to-use internal website that serves as a hub for users and clients to access information and data. If your business is running Windows Small Business Server 2008, it might make sense to upgrade. If you would like to know more about how this upgraded platform can help your business, please contact us and we’ll be happy to provide a free assessment of your options.

Continue reading