While many companies think the federal Red Flag Rule applies only financial institutions, if you invoice customers for your goods or services, it applies to you, too. Regulations designed to minimize identity theft went into effect in June of 2010. Are you complying with them? The federal government’s so-called “Red Flag Rule” requires all businesses that are potential identity-theft targets develop plans to spot red flags and prevent theft. Red flags include suspicious photo IDs, unverifiable addresses and Social Security numbers, and questionable account activity, to name just a few. While many companies think the Red Flag Rule only applies to financial institutions, it actually applies to all creditors — with creditors being defined as “businesses or organizations that regularly provide goods and services first and allow customers to pay later,” according to a Frequently Asked Questions guide prepared by the Federal Trade Commission, which will enforce the Red Flag Rule. In other words, if you invoice customers for your goods or services, you’re a creditor — and the Red Flag Rule applies to you. How can you comply? You’ll need to have a written policy that specifically addresses how you will prevent and handle identity theft. Other recommendations include data encryption, annual updates of your written policy, and staff training. While this may seem onerous, you don’t want to ignore the legislation. Fines are $3,500 per violation — and the threat of a lawsuit from customers whose identity has been stolen. Related articles Do You Comply with the FTC’s Red Flag Fule?
Continue readingHandy Twitter Tools to Connect Successfully with Your Twitter Followers
Since its initial launch as a microblogging service in 2006, Twitter has taken the World Wide Web by storm, and if there’s ever a popularity contest among social networking platforms, Twitter would most likely be the winner. On its own, Twitter is a great service for connecting with people. However, without the third party tools, it wouldn’t be as phenomenal as it is today. There are countless Twitter tools and apps available today. Here’s a list of six that are sure to be useful and effective in building relationships with your Twitter followers. The first section introduces some basic tools, which you can skip if you’re already a Twitter expert. The second section describes tools that you may not have previously heard of, but are worth checking out since they can boost visibility, traffic, and clients. The Basics Link Shorteners – Most Tweets (posts) on Twitter are not the usual “what I had for lunch” Tweets, but are more often people sharing links of articles, videos, photos, and more. Sharing links is a great way to help people better understand your field of interest and expertise while also helping them discover great content online. However, many links are very long, and do not fit within Twitter’s 140-character limit – so as the term implies, a link shortener shortens a specific link/URL. Try sites like Bit.ly , TinyURL and tr.im to easily condense your very long URLs into just 15-20 characters, leaving you room to comment.In addition to the practical need of shorter URLs, a majority of these tools also provide useful tracking reports so you can monitor the number of people who clicked on your links, which were the most popular, the dates when people clicked them, as well as give you an idea which topics are the most popular with your Twitter community. TweetMeme – That ever-present gray and green “re-tweet” logo enables readers to quickly re-post or “re-tweet” your post to their own Twitter followers. TweetMeme is a wonderful means to encourage your audience to spread the news about your status, tips, and words of wisdom.Like link shorteners, TweetMeme also tracks your links as they pass through the Twitterverse, and shows the total number of times your link was re-tweeted. Aside from helping you determine the popularity of given topics, it also lets the feisty competitor in us compare the success of our posts versus others and even ourselves. TwitPic – This is one of the numerous tools that let you take pictures with your mobile phone and post them directly on Twitter. Other similar tools are: TwitGoo , img.ly and yfrog . These tools are also usually integrated into whatever Twitter mobile application you’re using. You can also obtain statistics to monitor responses on your pictures. You can still also opt to link your followers to a Flickr account, Facebook page, or a web page that displays your pictures. Cast your Twitter net even farther… There are a lot of nifty Twitter applications out there that will help you create a solid and engaged community. When you’re ready to take your Twitter skills to the next level, below are three tools to get you started. TweetSwell – This great app allows you to create Twitter-based polls, wherein each reply doubles as a tweet and helps the poll become viral. TweetSwell can also help maintain your brand identity by ensuring that your poll pages are synchronized with your custom-made Twitter layout. Similar apps are: Twtpoll and TwtSurvey . TwtVite – Somewhat related to Eventbrite , TwtVite enables you to use Twitter to get together in the real world. Check out the animated video to get a feel for how it works. For an actual example, read this case study about a Milwaukee bar owner who used TwtVite in hosting the biggest Tweetup in the Midwest . TwtQpon – Online coupons offer small businesses a fantastic opportunity to drive lots of new and repeat clients. This app creates online coupons that can be published on Twitter and many other social network sites. While apps such as Groupon and Living Social can also make online coupons, TwtQpon is specifically designed for social networks.
Continue readingMalicious Software Dupes Users by Scaring Them
If you’ve seen a popup window warning you that your computer may be infected with a virus, think twice before clicking on it — you might be getting duped into spending money on malware. Security firm McAfee has published a report early in the year showing that up to a million people worldwide fall victim to so-called “scareware” each year. Scareware, or rogueware, is software that poses as legitimate security software but in reality are dupes to steal credit card information from users, or even worse are Trojan Horses to spread malware. Scareware is distributed primarily through the Internet via malicious websites that pop out windows that fool users into thinking their system may be infected. Users who click on the popup windows are redirected to a website which encourages them to buy fake security software online. Scareware are especially dangerous as it hits users in many ways: by duping them out of their money, injecting viruses or other forms of malware into their system, or even holding them ransom — for instance, by taking over users’ systems then demanding more payment to free the data stored in the infected computer. It’s a good thing that there are many ways to protect your system against scareware. One is using security software from legitimate and well established software vendors — through their legitimate sales channels. Another is by being prudent with offers and downloads when online. For a small business there are other ways such as blocking or filtering these malicious websites to ensure the security of the entire business. If you want to find out more about these solutions to protect small business networks — let us know. We offer managed security services for small business that can protect against online threats.
Continue readingAre You Keeping Your Disaster Recovery Plan Updated?
Businesses experience problems or complications all the time. These may range anywhere from natural calamities to accidents to hardware and equipment malfunctions, among many others. They can slow down your business or seriously hamper your operations. Most probably, you have this covered, and you may already have a disaster recovery plan. The question is: when did you last update it? As you know, businesses continually evolve and go through changes. Changes in the market constantly dictate changes to your products, services, systems, and processes. The same is true of your disaster recovery plan, and if you don’t keep up with these changes and plan for them in your disaster recovering plan, it’s almost as bad as having no plan at all. Especially with the expanding proliferation of technology around us, the way we do business constantly changes, and the way we address problems must adjust as well. You no longer can rely on the same plan you had years ago since your technology environment has most likely changed significantly since then. As a result, it’s a good idea to review and update your disaster contingency plan periodically – especially when your business goes through a drastic change. It’s also a good plan to give your plan a dry run to identify what works and what doesn’t. Better to find that out now than after a disaster happens and it’s too late to adjust the plan. It’s a constant process to keep your disaster recovery plan updated and relevant, and this process should be integrated into how you go about your business. Need help and advice? Contact us and we’ll assist you in developing and implementing a flexible plan that keeps your business safe today – and tomorrow.
Continue readingIs Spending Extra for Smartphone Protection a Smart Move?
Smartphones benefit companies because they improve productivity. Providing protective cases to employees with Smartphones reduces liability to replace damaged devices. Many businesses all over the world issue Smartphones to their employees. While they can seem expensive for many small to medium-sized business owners, with the greater amount of work done at a faster pace, Smartphones are an ideal business solution. However, since Smartphones are lightweight and portable they are carried around everywhere, making them very prone to accidental drops. Despite the advances in technology, some Smartphones are more prone to damage than others. Touchscreens are generally more susceptible to damage because they usually don’t have an extra layer of plastic on their screens. And when these devices are damaged, not only do you incur the cost of repair or replacement, you also risk losing valuable data that’s stored in them. So, should you spend more to protect your employees’ Smartphones? Some people think it depends on your industry. According to Tim Doherty, research analyst for small to mid-sized business markets at research firm IDC, most blue-collar employees should be provided with protective cases for their Smartphones since their work environments are more likely to be physical in nature. Equipping these employees with cases like the OtterBox or rugged devices such as those being offered by Motorola is a good move. Meanwhile, according to Doherty, white-collar employees using Smartphones only have “a moderate risk of drop or damage” because they usually put their devices inside their bags or pockets. Still, providing these employees with “a basic rubberized case makes a lot of sense,” adds Doherty. He also adds that providing cases lessens “the company’s liability to replace damaged devices.” Some analysts think, however, that cases citing damaged Smartphones due to accidental drops have been exaggerated. Analyst and Partner Michael Gartenberg of Altimeter Group believes that cases can protect and personalize your Smartphone, but he does not agree that these cases are essential accessories. Gartenberg claims that, “Most phones are rugged enough to handle the usual bumps and abrasions of everyday life and most screens are quite scratch resistant.” He adds that normal maintenance will ensure that most Smartphones work well. In addition, Gartenberg believes that if users are aware that their Smartphones have additional protection, they may tend to be less careful when using their devices. Still, Tim Bajarin, President of Creative Strategies, a firm that provides industry analysis for the technology sector, believes that a Smartphone case “isn’t much of an investment . . . yet it can go a long way.” As Bajarin says, we should treat these cases as insurance. With just a little extra expense, you not only protect a $200 to $300 Smartphone, you may also save your business from a loss of thousands of dollars worth of data stored in a single device.
Continue readingHow Your Business Will Benefit from Using Electronic Signatures
Turnaround times are accelerated with the use of electronic signatures because you don’t keep your customers waiting while you search for contracts or forms. Additionally, adding an electronic signature to a document is just like signing on paper. There is no need to change your customers’ habits and they are assured that even with remote handling, all their documents are secure. Signatures have been the most accepted means of authentication since ancient times. During the Roman Empire, a combination of seals and signatures were recognized as the primary source for document and legal contract authentication. In the 1830s, electronic communications became legally recognized “electronic signatures” when the telegraph and Morse Code were invented. In 1976, Martin Hellman and Whitfield Diffie introduced public key cryptography, wherein cryptographic keys were first distributed over an unprotected public network. The first electronically signed document was an agreement between two nations – a Joint Communique signed by Ireland and the United States in 1998. What is an electronic signature or e-signature? There are different definitions for this term, but for the purpose of US law, the US Code defines it as “an electronic sound, symbol, or process, attached to or logically associated with a contract or other record and executed or adopted by a person with the intent to sign the record.” Why are businesses using electronic signatures? Electronic signatures help cut costs. Studies show that among US companies alone, 30 billion paper documents are copied or printed every year. The associated cost for each document is estimated to be $6.50. Five hundred documents are signed by the average authorized employee each year, which means that the total annual cost of using paper documents per employee is $3,250. Electronic signatures are good for the environment. The reduction of paper usage will not only cut down operational costs, but will also help save our environment. For every person who uses e signatures, the savings is equal to ¾ of a barrel of oil, ½ of a tree, or 150 pounds of carbon emissions per year. Electronic signatures help reduce fraud. When documents are signed electronically, the integrity of the content is guaranteed. E-signatures also enable real-time verification of the handwritten signature as opposed to a pre-defined biometric profile. Any manipulation within a document that involves an e-signature will automatically result in making the signature invalid. Electronic signatures help increase customer satisfaction. Turnaround times are accelerated with the use of electronic signatures because you don’t keep your customers waiting while you search for contracts or forms. Additionally, adding an electronic signature to a document is just like signing on paper. There is no need to change your customers’ habits, and they are assured that even with remote handling all their documents are secure. Electronic signatures give entrepreneurs more time to increase sales. Because workflow is much faster with the use of electronic signatures, processing times are reduced and sales people and consultants have more time to spend on getting new business. This can significantly increase the company’s revenue. E-Signatures and Mobile Devices Many business owners have come to realize the importance of using e-signatures in business. In fact, some businesses have even adapted this signing process for the smaller screens of mobile devices. If the transaction involves straightforward, simple sales contracts, a mobile e-signature is ideal. The customer sees and agrees to what exactly what is being purchased on the spot, and this allows salespeople to work more efficiently. For lengthy documents however, especially those that have several form fields that require considerable interaction with the client, a PC format is more suitable. How Legitimate are E-Signatures? As for the legitimacy of e-signatures, you need not worry. In 1999, the European Union passed the EU Directive for Electronic Signatures, and on the 30 th of June, 2000, US President Bill Clinton signed into law the Electronic Signatures in Global and National Commerce Act (ESIGN), which signified that all signed electronic contracts and documents are as legally binding as a paper-based contract.
Continue readingEfficient IT for Less for Your Small Business
Back in the day, only big companies were eligible to use state-of-the-art IT solutions and enjoy 24/7 security. Thanks to Managed Services, superb yet economically priced IT is now readily available to small and medium-sized businesses. Like a lot of small to medium-sized businesses these days, you perhaps have become greatly reliant on Information Technology (IT). You certainly want your own IT department to offer the functionality and security that huge organizations benefit from. But cost is most likely holding you back — the large amount of money needed to design, install and maintain such a setting is usually too expensive for smaller organizations. Fortunately, today you can have both the best IT and the most cost-efficient solution — because in Managed Services, they are one and the same. Managed Services is an IT model that provides IT management and security remotely. Utilizing the latest and most sophisticated technology, we can readily monitor and manage your network, determine possible issues, and solve them before they harm your business. These are the 2 major advantages: Superior IT – With Managed Services, you can accomplish the functionality and security that previously was only available to large companies. Inexpensive Price – Enjoy better IT without costing a fortune. Because of economies of scale, Managed Services enables you to create an infrastructure that delivers essential IT services to staff and clients without having to build or maintain these services internally. Contact us now to learn how our Managed Services can help improve your IT and save you money.
Continue readingIncidents of Electronic Fraud Now Outnumbering Physical Theft
Incidents especially alarming in many emerging markets. A poll of over 800 senior executives around the world showed that companies for the first time are losing more from the theft of their electronic assets than from physical assets. This was recently revealed by Kroll , a risk consulting firm. The incidents were especially alarming in emerging markets such as China, Colombia, and Brazil — where more than 9 out of 10 businesses report victimization. Most susceptible are firms that deal in information, such as businesses in professional services, media, technology, and finance. Often, according to the respondents, the perpetrators are the company’s own employees. Companies today should closely examine how information is managed within the organization. Appropriate levels of control should be provided, and policies, procedures, and tools need to be implemented to make sure access is carefully controlled and monitored and information is secured. Are you confident that your firm is safe from attack not only from outside the organization but also from within? If not, contact us today to find out how we can help.
Continue readingDisaster Recovery Plan: Why It’s Impossible to Survive Without One
Since disasters are erratic in nature, any forward-thinking company knows that it cannot survive one unprepared. With a disaster recovery plan in place, you’ll have peace of mind and the confidence that your business can continue after a disaster — and without much interruption. Simply put, organizations that suffer data losses generally fail as a consequence. In fact, that statement is based on study by the Department of Trade and Industry, which discovered that 70% of small businesses that experience a major data loss eventually go out of business within 18 months. This statistics shows that a majority of small businesses have failed to protect themselves against a number of problems. According to Ontrack, data loss is due to the following: Human error – 44% of the time System or hardware breakdown – 32% of the time Software malfunction – 14% of the time Computer virus – 7% of the time Site disaster – 3% of the time Data loss is very catastrophic—because your data is critical to your business. To illustrate this, just imagine the outcome if you lost access to your IT systems, including: Client databases Supplier information Financial reports and documents — from invoices to tax records Product catalogs Marketing materials Emails and correspondences Document templates Employee records Like insurance to your business assets, the same idea is applicable to your data. Regardless of its location, your data needs to be constantly protected from every potential danger. The good news is that with a strong disaster recovery plan and an efficient backup solution, you can easily resume business in just minutes or a few hours in most instances. With these crucial things in mind, it’s best to protect your data to secure your business. Ask us how today.
Continue readingBe Seen, Be Found through Geolocation
More and more people these days are looking to geolocation for directions in the same way people looked at yellow pages years ago. The thing is, things aren’t so simple anymore, so you need something more than a generic description to put yourself on the map and make yourself felt. There’s a boom in geolocation platforms these days. Geolocation is a means through which people can track various locations through their mobile phone devices. Experts see a continued rise in the relevance and effects of geolocation, especially for small and medium-sized businesses who are looking for good but cost-effective ways to put themselves on the proverbial map. “When you’ve expanded the ability to track geolocation data from the 200 to 1,000 large businesses that could previously afford it to 26 million small businesses, you’re bound to see a bunch of creative experiences built around that data,” says Yan-David Erlich, CEO of Morpho, a new geolocation firm. The potential is vast, and there is little to lose. Especially considering the success of geolocation-enabled social network platforms such as Foursquare, putting yourself on the geolocation map might just be more than worth your while. Here are a few tips to get you started: Be a direct part of the community. Create an account, participate, and make yourself (or at least someone to represent your online presence) regularly felt. Customization is always key. Share something unique about your business – don’t make your profile generic and ordinary. You have to stand out, so choose a particular trait of your business you are particularly proud of, or something that sets you apart from the rest. Make sure to utilize as many keywords possible – but only within the bounds of practicality. And don’t forget links to your own website. Know what the competition is up to. There’s nothing wrong with checking out what competitors are doing to establish themselves in the geolocation map. Who knows, you might even learn a thing or two, and then be able to apply improvements and adjustments to your own strategies. Read the whole article at: http://technology.inc.com/telecom/articles/201007/geolocation.html?partner=newsletter_Technology If you are looking at taking some concrete steps to establishing yourself and making your presence much more significant, please don’t hesitate to contact us and we’ll be happy to sit down and develop a customized geolocation strategy that works for you.
Continue reading