IT support isn’t just technology support; it’s business support. That’s because using IT as a strategic asset can differentiate your company and increase your profits. Be one of the few companies that really “gets” IT. Ask us how you can use it to gain an edge. Differentiate your company and increase your profits — with IT It’s easy to think of IT as a tool that comes with a cost — but doing so is a big mistake. That’s because IT, when used properly, can be a strategic asset. It can make your information more accurate, improve your employees’ response time, and even differentiate your company in the marketplace. To make IT a strategic asset as opposed to a tool, it needs to add value. To determine where to make improvement, you’ll want to look at your value chain, which includes all the activities your business performs, and ask which ones earn profits. For example, if you’re a manufacturer, better IT could result in more efficient supply purchasing. If you’re a retailer, better IT could result in fewer units needing after-sales service and repair. Focus on improving IT in those areas and you’ll likely improve profits. An added benefit of this exercise: The use of IT in a new way may create even more opportunities for your company. For example, the Internet allowed Apple to invent iTunes, and now mp3 downloads have overtaken CD sales. Even small businesses can experience this. Case in point: The invention of iTunes has given many startup software companies a distribution channel for apps that otherwise may not have been invented. But the idea doesn’t have to be visionary in this way: YourLittleFilm.com, a small business that creates custom short films, used customer relationship management (CRM) software to help follow up on business leads , and got a 10 percent response rate. How and where you add value with IT developments will depend on your business model. There is little point, for example, in automating production if your customers cherish hand-made products. However, you might find that investing in a CRM system might give you a more efficient way to track your customers’ preferences and provide them with a more personalized service. Using your IT as a strategic asset gives you tools to manage clients worldwide, increases your visibility, and lets you compete with much larger players. Contact us to find out how you can use technology to gain an edge.
Continue readingThe ROI Series, PART 1: ROI Basics
The ROI Series: Calculating the ROI of a Technology Investment—Part 1 : Cost savings are always important to small businesses — but that doesn’t mean you should skimp on technology. New technology may be necessary for the survival and growth of your business, and may not be as expensive as you think when you consider its return on investment (ROI). In this four-part series, we’ll explain what ROI is, help you understand the types of ROI, and provide guidelines for predicting and measuring the ROI of a technology investment. PART 1: ROI Basics There are two ways to look at the value of technology: total cost of ownership (TCO), which quantifies only the cost of a project, and return on investment (ROI), which quantifies both the cost and expected benefit of the project over a specific timeframe. Traditionally, businesses have used TCO when analyzing the cost of internal infrastructure projects such as upgrading an e-mail system. But even with internal systems, ROI can be a better method. If your old e-mail system goes down, for example, your sales team can’t contact customers electronically and must spend more time making phone calls. If your employees spend two more hours on calls than they would on e-mails, you’ve actually lost money by not upgrading your e-mail system. As an example of how ROI works, consider the case of a small, high-end electronics boutique. The current point-of-sale (POS) software is beginning to show strains from the company’s expansion and increasing inventory, and customer service issues are arising — a problem since the company’s mission is to provide exceptional service. The company’s owner believes implementing a new POS software program will help address these issues, but deploying it will be costly. The key question is which will cost more in the long term: spending the money to provide a solution, or the losses the boutique will incur by not doing so? That question may be easier to ask than to answer. As important as determining ROI is, there is still little consensus about how to measure it accurately. That’s because ROI has many intangibles — things that don’t show up in traditional cost-accounting methods but still maximize the economic potential of the organization, such as brand value, customer satisfaction, and patents. In the next part of this series we’ll discuss these intangibles
Continue readingMacs and PCs—Why Can’t We Just Get Along?
It’s not uncommon nowadays to see both Macs and PCs together the same office. Technology has progressed to a point where both types of systems can now get along smoothly with each other. Its easy to share files between the two systems, share printers, have them communicate to each other on the same network, even run the same applications on both systems! Read on to find out how. Unlike a few years ago when Microsoft’s Windows operating system virtually dominated office desktops everywhere, today we are increasingly seeing the use of other operating systems in the office. Typically these other systems are some model of Apple’s Macintosh running its own operating system called the OS X. The OS X, known for its sleek graphics, great multimedia handling capabilities, and easy-to-learn user interface, has gained favor among many users and businesses. Sometimes, however, problems arise when having to use different systems in the same office or network environment. Here are some tips to eliminate common issues your users might face when working with others on a different system: File Sharing . There was a time when transferring files between a Mac and a PC was a painful process requiring understanding different file system structures, resource forks, file name limits, and other such nonsense. Thankfully those days are over. Many Mac applications today can open files created on a PC and vice versa — such as office documents, images, video, and more. Getting files from one system to another is also easy as you can transfer via a removable drive. Both systems should recognize the file system on the drive — especially if it was formatted using Window’s file system (doing it the other way around might be a bit more difficult). OS X “Leopard” Macs can also read or write to drives that have been formatted using a special format from Microsoft called NTFS, and other freely downloadable utilities can also help. If this sounds like too much work to understand, you can also simply burn a CD or email files from one system to another — or better yet, set up a network for file sharing. Making Macs and PCs talk on the same network . If you’re a little more tech savvy, you can connect your Macs to your PCs directly or via a network. Typically this requires a network cable connected to both devices and having network sharing turned on. Enabling network sharing is outside the scope of this tip, but many online resources are available to help you connect a PC to a Mac or a Mac to a PC. Running the same desktop applications on both a Mac and a PC . For really advanced users, did you know that you can run Windows on a Mac or OS X on a PC? The former is bit easier and more common, thanks to techniques such as dual booting or virtualization. In dual booting (what Apple calls “Boot Camp”), you essentially install both operating systems on a Mac and on power up, you can choose which operating system to boot. Virtualization on the other hand is way slicker as you can run both operating systems at the same time. In virtualization, you boot Windows in a window within OS X, allowing you to effectively run Windows applications on a Mac. There are also many commercial applications that can help with this. The future: Cloud Applications. As we all start to access more cloud-based applications, the operating system you use is no longer as critical. As long as your systems have an Internet connection and a browser, then you can use different systems and it doesn’t matter what operating system or hardware is being used. So running both Macs and PCs in the same office is not necessarily a bad thing, as it has been in the past. Dozens of options exist today to make the situation manageable, if not downright easy. If you need help, don’t worry — we’re here to assist. Call us today to find out how you can get Macs and PCs to work together for your business today.
Continue readingEpsilon Sets the Bar for What NOT to Do in Online Security
Many IT service providers are learning valuable lessons from the Epsilon incident – which saw one of the world’s biggest email service providers become a victim of cyber-criminals, compromising a substantial amount of information entrusted to them by their clients. There’s been a lot of buzz recently about Epsilon, one of the biggest email service providers in the world, as it suffers from the backlash of allowing itself to be a victim of phishing efforts – which has affected the business data of as many as 50 major companies who are clients of theirs. Reports are also citing Epsilon’s failure to heed an alert from a business partner which advised the provider to be on its toes against potential attacks from cyber-criminals targeted towards email service providers. The damage estimates vary, with Epsilon citing only about 2% of their data being stolen, but the impact is undeniable. Cyber-criminals now have access to a sizable number of personal data stored through Epsilon – passwords, account numbers, and even the purchasing / buying habits of the customers of Epsilonงs clients. Many of Epsilon’s clients are now sending out messages to their own customers, warning them that their email addresses may have been compromised. It’s a lesson to companies, big and small, to pay more attention to beefing up their security protocols, since all it takes is one breach to endanger all of your data. In addition to having the right security software, it also helps if you require your employees undergo proper user training to make sure that they won’t be easily baited by scams like phishing, and will be more aware of how to contribute to the safety of your business data. Failing to do so puts not only your company, but also your clients, at risk. If you’d like to make sure your systems are safe, call us and we’ll evaluate your current security measures and suggest ways to make critical improvements.
Continue readingGoogle Goes Social with Google +1
Google +1 is an experimental program by Google aimed at making searches much more effective and efficient. Through a nifty +1 icon that appears beside Google search results, users with a Google profile can recommend sites by simply clicking on the +1 button. While still in the experimental stage, there is a lot to be excited about with Google’s new thingamajig, Google +1 from Google Labs. Google +1 is essentially a button next to each search engine result that you can click when you want to recommend a particular link or website. Google describes it as something you use “to give something your public stamp of approval, so friends, contacts, and others can find the best stuff when they search.” The program is not available for everyone just yet, but participating and testing it out is easy. You’ll need a Google profile to participate, then just go to google.com/experimental and click the “Join this experiment”. After a few minutes, you’ll begin seeing a +1 icon / button beside results on any Google search results page. Click the button for sites you want to recommend, and Google will ask you to confirm. On your Google profile, you’ll have a tab where you can see the sites you’ve recommended through +1. You’ll also have the option to uncheck the box that will allow Google to use your +1 information to send you targeted advertisements. Especially for businesses, a +1 for your website can maximize your SEO capabilities as well as lend credibility to your website. Anyone can +1 your website – colleagues, clients, and even friends – so the more +1s for your site, the more visible it becomes. Try Google +1 and see how it works for you.
Continue readingThere’s More to Backups than Just Backing Up
While doing regular data backups is the norm in many businesses, many forget an integral factor in ensuring that the backup system works – actually testing it. One of the most basic actions a company takes – big or small – with its data is back it up. It’s become a mantra in this age in which information is more easily stored and managed digitally: steps must be taken to ensure that data is regularly backed up. If any malfunction, misfortune, or human error occurs, with a good backup system you won’t stand to lose thousands or even millions of dollars in lost data. But there’s more to backups than meets the eye. Let’s say you have a backup system and you lose your data – how sure are you that you will actually be able to get all of it back? It’s surprising that while many companies do back up their data, very few actually conduct tests in actual data restoration. How can you be sure that your backup system will perform as expected when the time comes? It’s especially important for you to iron out all the kinks in a system as essential as your backup before you actually need it. When the worst happens, one of the last things you want on your plate is contending with any glitches or complications that you missed in your data restore system because you failed to test it properly beforehand. Not having a smooth and well tested restore system defeats the purpose of having backups in the first place. After all, what’s the point of having backups if you can’t retrieve your data properly? You need an efficient system that is regularly tested to make sure that your precious data can be easily and smoothly restored when circumstances call for it. If you’re not positive that you’ll be able to access all of your data if disaster should strike, give us a call. We’ll evaluate your backup and restore processes and make recommendations to ensure your business data will be at your fingertips no matter what happens.
Continue readingDo Multiple Monitors Make You More Productive?
Studies have shown that dual or multiple screen monitors can help boost productivity significantly, enabling businesses to complete tasks and meet client concerns much more efficiently and speedily. At first glance, people may find the use of dual screens a bit excessive and therefore unnecessary, but the truth is that there is more to it than it may seem. In truth, there are a lot of advantages to using dual screens, provided that you can cope with the cons and challenges of utilizing such as system. The primary advantage of dual or multiple screens is increased productivity. Several studies have shown that using such a system can boost productivity anywhere from 10 to 40 percent. Especially if you use multiple programs at the same time, it allows you to better keep track of workflow, have a improved view (physically and metaphorically) of what tasks you are working on, and divide tasks based on the monitors you are using. For example, you might need to be constantly online on social networking websites like Twitter, Facebook, Linkedin, or Formspring to interact with your clients and give immediate responses to queries and concerns. In addition, you may need to attend to other tasks, which can be confusing when done all in one screen. With a dual monitor setup, you can keep your social networking tasks on one screen, and the rest of your tasks on the other. Space consumption and resources may be an issue for some, but given the increased productivity that goes with adapting such a system, you will find your tasks accomplished much earlier and much more efficiently. This can effectively offset any additional costs, especially in the long run. If you are looking to give this type of system a try, please contact us and we’ll be glad to draw up a proposal that will meet your particular requirements. Additional resources: Advantages and Disadvantages of Working with Multiple Screens
Continue readingSecurity: Don’t be the Next Victim
Symantec recently released a study showing dire figures – at least 50% of SMBs out there have little to no disaster-preparedness plan, which if left unchecked can cost thousands of dollars in lost revenue. The risks are real enough, with an SMB standing to lose somewhere in the ballpark of $12,500 PER DAY when operations are interrupted because of security breaches or malware attacks. According to Symantec, of the 1288 SMBs they surveyed worldwide, about half have no security or disaster-preparedness plan whatsoever. Of that 50 percent, 36 percent intend to get or create a plan in the future, while the remaining 14% have no plans on their agendas whatsoever. With these figures, it’s hardly surprising that the study also found that many SMBs only act when it’s too late – which causes not only lost revenue for them, but for their clients as well. More than half of the surveyed SMB clients – 552 – said that they have had to switch providers due to unreliable and irresponsible service. Numbers do not lie: security is more important than you might think. Don’t wait until the last minute to find out just how essential it is before enacting a security plan of your own – for your sake as well as that of your clients. Having the right kind of system in place is vital to keeping your operations smooth and efficient, as well as enabling you to better respond to your clients’ needs. If you want to know more about implementing the proper security and disaster-preparedness protocols for your business, please contact us and we’ll be happy to sit down and create a customized plan that will meet your specific needs and requirements.
Continue readingHR Managers Must Think About Data Security, Too
Employees have access to a wide variety of electronic information, from the moderately important (such as email lists) to the critical (such as financial records and trade secrets). Upon their departure, HR managers should work with IT to ensure that employee account access is blocked. Remember the days when employees kept important information in paper files? They are long gone. According to a study conducted by the University of California at Berkeley, almost all of today’s new information is stored electronically. And that could mean trouble for your company when an employee resigns — because electronic documents are both easy to copy, and portable. That makes them more prone to theft than paper documents. Case in point: In August 2009, DuPont filed a lawsuit against a research scientist who allegedly stole more than 600 files by copying them to a portable hard drive. And that wasn’t an isolated incident; another DuPont research scientist was sentenced to an 18 month prison term for stealing proprietary information worth $400 million. Think employee data theft doesn’t apply to your type of business? Think again. A 2009 study conducted by the Ponemon Institute found that data theft is rampant in the business world. According to the study, 59 percent of employees who quit or are fired take confidential business information with them. And when the employee works in IT, the access to confidential data is even greater. A 2008 study by Cyber-Ark Software found that almost 90 percent of IT employees would take sensitive company data with them if they were laid off. The lesson: When employees leave, you must take steps to protect the electronic information they have access to. This may include customer information, financial records, trade secrets, intellectual property, and email lists, to name just a few items. We recommend that when an employee leaves, you prevent his or her account access, set the account for immediate review, save any necessary files (which may involve consulting with other departments for verification of documents), then delete the account. In addition to protecting data, this will also optimize server space and open up more storage space for the company. While some employees might argue that they need access to their personal files before departing, and you may grant such access (supervised, on a case-by-case basis), it is not required; any of the information that is located on a company computer is company property. In a sensitive situation it’s always good to let us know ahead of time so we can help you prepare for a well-managed and secure transition.
Continue readingEmail Encryption: Why It’s Important
When we create a letter in the analog world, we take the time to seal that letter in an envelope to keep it safe from prying eyes — especially if that letter contains sensitive information. If it’s highly confidential information we might even resort to obfuscation such as using coded text, or making sure that it is delivered via secure channels such as by special messenger. Encrypting email is relatively easy with today’s software. Usually it involves the use of a public key and a private key. The public key is available to everyone, and if you want to send someone an email message you would use that person’s public key to encrypt that message. That person in turn would use his private key, to which only he has access, to decode that message. Software such as the latest versions of Microsoft Outlook supports this feature , and even flags you if the recipient’s email software does not support encryption. Some systems take it a step further by allowing you to digitally sign your emails, so that other people can verify that it is you who actually sent the email and not someone else. This is especially important since hackers sometimes spoof or impersonate the identities of others to fool unsuspecting users. If you are interested in finding out more about email encryption and security, contact us today to find out how we can help make sure your messages are safe and secure.
Continue reading