Infinet

ThinkstockPhotos 77745701

Warning! Serious Threats Still Lurk In Many Companies

Warning! Running Windows XP Software Expose You To These 5 Serious Threats

Business Security ThreatsWe’ve all done it before – you find a program that you love, and you use it every day until it’s so old it stops getting support from the developer – in the case of Windows XP, that could be extremely dangerous for you and your business.

SanDisk reported in 2015 that roughly 25% of organizations were still using old versions Windows and didn’t plan on migrating until the software’s end-of-life. Windows XP was first introduced in 2001, and since then it has been one of the most popular operating systems with millions of users even two years after the end-of-life.

However, just how dangerous is it to just keep using the same program? It can’t be that bad, can it? In reality, it is incredibly dangerous. Here are the facts you need to know if you plan to keep using geriatric versions of Windows software:

No More Updates Or Patches… You Are On Your Own

One of the main issues with old software is that it isn’t issued new updates and patches. Once software becomes all but extinct, it no longer gets the same protection. Microsoft cannot possibly create patches and updates for all the software and programs it has ever released, so they instead focus on just their most recent software. If you are using an old version, this means that you are leaving your computer vulnerable to the latest security threats.

Doesn’t Play Well With Others

A second danger that comes with failing to update is software incompatibility. New applications cannot be made to accommodate all software that has ever been released, as they are optimized for only the most recent of operating systems. If you are still using Windows XP, then you are limiting your computer’s compatibility with other legacy software, which in turn limits what you can get out of your programs, and out of your network as a whole.

Security Threats

If you are a business that stores essential data, such as sensitive customer information, or payroll accounts, then you could run the risk of not complying with the law. Entrusting your business’ confidential information to a legacy application means you aren’t securing or protecting your data. In other words, you are leaving the doors unlocked and open; you might as well load the info on a flash drive to give directly to the hackers. If you are hacked, you would have to contact Microsoft to get a patch, and then you will have to fork over a large amount of cash. A customer support agreement with Microsoft can run a business $200-$600 per server. Keep in mind that the cost for a custom support agreement goes up each year.

Ransomware And Windows XP

Ransomware is a type of malware that prevents or limits users from accessing their system or files until a ransom is paid to the hackers. The cost of global ransomware incidents is estimated at $325 million for the year of 2015. By the end of 2017, this number had already multiplied to $5 billion. By the year of 2020, it could easily quadruple to $12 billion.

A good example of the dangers that come with Windows XP is the recent “WannaCry” ransomware that swept the UK’s National Health Service (NHS). The NHS had to shut down services throughout their hospitals and clinics due to this ransomware attack. It was reported at 90% of their NHS used at least one device that was still operating on Windows XP. Due to their computers being encrypted by the ransomware, the hospitals were forced to turn away patients while they fixed the problem. Keep in mind that this is software that has not been supported since 2014. As of January 2017, the number of Windows XP users dropped to 0.9% of the market, which seems relatively small and non-threatening – however, 0.9% of 2.17 billion is still 19.5 million.

Costs Out Of Pocket And Out Of Luck

Beyond risking your security and reputation of your company you are also forcing yourself to pay higher operating costs. Using old software has a much higher price for maintenance and bug-fixing. For example, if you needed a patch from Microsoft for Legacy Windows XP, you would end up paying more than you would to just update and replace the program.

Snail’s Pace Performance

Lastly, you will be suffering from inadequate performance and unreliability. Programs built in 2003 and before cannot keep up with the technology of 2018. This means that while Windows XP was cutting edge when it first came out, now it cannot keep up with the internet speed, or with the pace of faster servers. We all hate waiting for a program to open, or watching the spinning wheel while your computer tries to catch up – while you wait, your work continues to pile up. Imagine what this costs your company in downtime alone.

With so many issues, it’s hard to see why so many people have continued to use Windows XP. Years after the last update was offered from Windows, huge companies still cling to the operating system’s remains. The reliability and comfort of the operating system proved to be a fault in their own. Imagine if we lost 75% of our water utilities in the US, due to a preventable hack. Not only would be out of the water, but all the sensitive information that the utility companies hold would be left defenseless.

Continuing to use software that is out of date is like leaving your home unlocked, your doors open, and all your valuables on display and unsecured. Hackers don’t have to keep up with the latest software to make good money when businesses are making these kinds of mistakes. If you stay with Windows XP, you will be paying more for security vulnerabilities and poor performance – don’t let this happen to your company. The cost of the updated software will pay for itself by saving you the money you’d pay for the patch from Microsoft and in damages.

Warning! Serious Threats Still Lurk In Many Companies Read More »

ThinkstockPhotos 840617560

Your Step By Step Guide To Transitioning To VoIP

Get untangled from your landline, and let VoIP boost your business’ efficiency, reliability, and quality.

Business VoiP

A recent study revealed that 94% of business’ marketing budgets are spent trying to get consumers to call. If businesses are paying so much of their advertising and marketing budget on a communications system, shouldn’t it be reliable and efficient?

This need for a more reliable form of communication is forcing many businesses to make the transition from the landline to the VoIP. However, this transition can be a scary process. How are you supposed to make this transition while running your business? A lapse in phone service means a loss of communication with your customers, which could mean a loss of profit.

Why Move To VoIP?

The move to VoIP offers your business improvements in efficiency, reliability, and quality, all at an affordable cost. Landline phones are becoming obsolete – by choosing to remain with a landline system, your business may become obsolete as well.

Efficiency

VoIP provides your business improved efficiency by limiting issues that come from having to replace or fix phones, as well as complicated management of adding and or removing employees. On traditional landline phone systems, you would have to wait lengthy periods of time for a phone to be replaced, or for a roll truck to fix issues. All this time spent waiting for a fix costs you money.

With a VoIP system, you don’t have to deal with these issues, which means less downtime. VoIP also improves your business’ efficiency by providing you with numerous options for routing and answering calls, without the expensive on-premises technology and staff.

Reliability

VoIP provides your business improved reliability by delivering a clear, seamless quality of phone service. This service can run on multiple internet connections, and can even extend to your smartphone. VoIP can work reliably through anything that mother nature may throw at you from hurricanes to snowstorms. Additionally, if you lose your business due to a fire, your VoIP phone service will still work. This is one of the main reasons why there are now over 288 million VoIP users.

Quality

VoIP provides your business improved quality through clarity of your calls. These calls come with a digital readout display, and the option to work without a headset. For those that still wish to use a headset, they can receive their calls through the use of a “softphone”, which is software that allows users to make telephone calls through the internet on their computers.

Affordability

VoIP saves your business 40-80% compared to the cost of traditional landline phone service. Landlines now cost more than VoIP phone systems both in the initial setup, as well as in ongoing contracts. For example, landlines for five employees cost an average of $563/month, while VoIP services for the same amount of users costs only an average of $27.95/month.

Years ago, VoIP systems would cost $10-$50/month, after the cost of the headset (which usually cost $200 each). It’s easy to see how quickly this can add up. Today, VoIP comes at affordable rates as low as $0. Phones will be set up ahead of time, that way there is no lapse in your communication with your clients. This saves your business money by limiting the loss of contact, during this time of transition. Secondly, there is a “Proof of Concept” (POC), which allows you to have your phones in place, and try them out before deciding whether they’re right for your business.

Preparing For The Move

So how do you transition from traditional landline phones to VoIP, while at the same time shortening the loss of communication? Preparing for the move means you need to gather pertinent information such as how many employees you have, what your cabling needs are, what your current infrastructure is, and what are the nonnegotiable-features that you need from the new phone system.

Step By Step

You begin by evaluating your cost analysis. Fully understanding the budget upfront and ongoing ensures that you will be able to get the most out of this new program, without being oversold. After looking at the move from a financial standpoint, you are ready for your live demo. This provides you and your employees a chance not only to see all of the VoIP system’s features but also to try them out, in a risk-free environment. Once you decide on which features you need, you are ready to decide which service provider best fits your company’s needs. For 2017, the top three VoIP service providers were Ring Central, Vonage Business, and 8×8 Global Communications.

Once you have selected a plan and a service provider, you want to ensure that you have no network issues that could limit or infringe on the successful integration of your new VoIP system. From these network tests, you should make any adjustments or upgrades that you feel are necessary to ensure the best result for your business. Lastly, you will complete your trial period, or your Proof of Concept period, that allows you to see first-hand how the service works and if it meets your business needs. If so, then you move on to finalize the agreement, and select a “Go Live Date”.

After your VoIP system is up and running, employees should be trained to use all the features that they provide. Some of these features include having a virtual receptionist, voicemail-to-email, automatic call forwarding, and three-digit dialing. Training and ongoing support are a crucial part of developing and maintaining your successful relationship with your VoIP.

Moving to VoIP does not have to be a cumbersome and time-consuming challenge. It could mean a more efficient, reliable, and qualitative business. With the new VoIP service, you would be able to rid yourself of the hassles of maintenance agreements, capital expenditure, truck rolls, and lengthy wait periods that traditional landline phones come with. Lastly, you will have access to excellent customer care support 24 hours a day, seven days a week, and 365 days a year. Don’t let your phone system hold your business back from its full potential any longer. Disentangle yourself from your landlines’ limitations and see what the freedom provided by a VoIP system can do for your company.

Your Step By Step Guide To Transitioning To VoIP Read More »

ThinkstockPhotos 599954542

Microsoft Teams: Business Without Boundaries

Where you work is no longer defined by four walls and a door – not even by cubicle walls. Gone are the days where productivity requires a set geographical location, at least for some roles, anyway.

Recent years have seen the rise of the remote workforce that can effectively collaborate on projects from across the globe. Organizations can cut costs and increase productivity using various platforms that facilitate communication and collaboration, and it’s only becoming more popular.

Revolution or Evolution?

Major metropolitan cities from New York to Los Angeles are filled with your classic skyscrapers, and every town and suburb in between is dotted with professional office parks. However, are these buildings, once filled to the brim with bustling businesses, still relevant?

They’re no longer the norm – but why? Even with the periodic recession, the overall post-WWII American economy didn’t just emerge with success – it exploded! The “four walls and a door” was waiting for every entry-level candidate until the late 1980’s when the cubicle first gained popularity.

Fast-forward to today, and the latest concept to revolutionize the workforce isn’t revolutionary at all. Telecommuters now represent a significant portion of the global workforce, and do so quite ably. To say the idea of the office has evolved is quite the understatement: now, an office can be anywhere. From your desk at home to your local coffee shop, from the waiting room at your car dealership to Row 6 Seat B on your flight, telecommuting facilitates progress so long as you can access your files, email, and anything else you need to get the job done.

  • Did you know that telecommuting has increased by more than 300% in the past 20 years? Technology has made telecommuting easier and more effective and has helped organizations retain quality staff longer.

No longer is the stereotypical full-time staffer a given when organizations look to fill a role, either. People are now demanding flexibility in a job description, and what was once a 9-to-5 position is becoming obsolete. For more than a decade, flexibility has evolved into an expectation over a fringe benefit, and with good reason. A global remote workforce offers business without boundaries and productivity that never stops.

A Collaborative Culture

The evolving business culture demands evolving means by which to collaborate and connect. Digital platforms are plentiful, with features that cater to your business’ specific needs. Platforms like Basecamp and Trello are beloved by project managers, Salesforce.com and Microsoft Sharepoint offer great sales team support, and technology teams rely on tools like Microsoft Team Foundation Server – often shortened to TFS. Organization is critical to any company, especially when teams are separated by time zones.

Where would we be today without Microsoft? Microsoft and Windows have remained the primary professional computing mainstays for about 30 years. Microsoft Office remains the fundamental application suite on which companies rely for day-to-day operations, even when office space is nonexistent. The irony of the name is not lost on us, either!

Microsoft recognized an opportunity in the permanence of telecommuting. Never one to shy away from innovation, Microsoft launched a suite of applications catering to the “digital” crowd in 2011, under its Office 365 brand. If Microsoft Office is a basic tool for the 9-to-5 professional, the subscription-based Office 365 is a fundamental lifeline of the telecommuter. Office 365 allows the use of applications across a multitude of devices, as well as file hosting, email, and a range of other networking tools designed to feed our daily addiction to all things Microsoft.

Rumors began swirling in 2016 of a Microsoft acquisition bid for the cloud-based Slack collaboration tool, a darling of the technology industry – but why buy when you can create and customize? Microsoft’s Skype for Business product offered similar basic functionalities and was already installed on the digital desktops of millions of professional customers. In early 2017, Microsoft released what it believed to be the next-level professional platform: Microsoft Teams.

  • Slack offers itself as a “freemium” product, a marketing and pricing strategy where the base model of a product or service is widely available free of charge, but premium features are available for those willing to pay the added cost.

Making the Most of Your Microsoft

Microsoft didn’t face a great hurdle in convincing customers to “buy in” to Microsoft Teams, given its position as a new-and-improved version of anything currently on the market. If Microsoft Office was the predecessor to Office 365 and Skype for Business, Teams is the logical next generation.

Why is the next generation so important? Microsoft realizes that the workplace is evolving and that more businesses are hiring independent contractors, freelancers, consultants, and other external resources to support permanent staff – all of which work together toward one common goal. Microsoft Teams refers to these external resources as “Guests.” If collaboration is the cornerstone of professional success, then communication is the foundation upon which that stone is laid, and Guests don’t need to be granted full access to proprietary information.

The solution is Guest Access, and it’s a new feature in Teams, which customers have been requesting for some time. Aside from the previously mentioned independent contractors, etc., Guests may also include vendors, suppliers, or even interns. Guest Access is available to users who have an email address that corresponds to an Azure Active Directory or Office 365 work or school account.

Organizations can provide external access to their teams for applications to partners, resources, chat communication, and documents in channels while maintaining control and protection.

In Microsoft Teams, Guest Access is a tenant-level setting that’s turned off by default. Do you need help turning on this new feature? Follow these steps:

  1. The global admin needs to login to the dashboard: https://portal.office.com/adminportal/home
  2. In the left navigation menu, expand Settings and select “Service and Admin.”
  3. Scroll and select Office 365 Group settings.
  4. In the menu that opens, toggle the bottom option to “On,” giving Group Owners the ability to add Guests from outside the organization, and click “Save.”
  • This setting needs to be enabled because Team permissions are based on Groups.
  1. Next, scroll through the list to select Microsoft Teams
  2. In the left navigation menu, find the “Settings by user/license type” and select “Guest” in the drop-down menu and toggle setting to “On.”
  3. Click “Save.”

After changing these settings, Team Owners can add and manage Guest Access within their Team.

Microsoft Teams

Whether you include mostly in-house staff, a team of telecommuters, or a range of every type of resource at your organization, we can help you make 2018 the best year yet – as a team!

Microsoft Teams: Business Without Boundaries Read More »

The Comprehensive Guide to Understanding and Stopping Ransomware

Cybercriminals are everywhere. Both domestically and around the world, countless hackers work day in and day out to penetrate the digital defenses of businesses just like yours, using a variety of proven, effective, and ever-evolving methods. Whether they infect your system with malware hidden in a seemingly innocuous email attachment or con an unsuspecting employee out of vital information through social engineering, the end results are the same: data loss, financial damages, lawsuits, reputational damage, bankruptcy, and worse.

Ransomware

Our team of certified system professionals understand how serious the modern threat of cybercrime is to businesses in your industry, which is why we’ve developed this whitepaper as a vital resource to show you how hackers think, what methods they use, and how you can stop them from victimizing your business. Without the right knowledge, tools, and technology to prevent hackers from stealing your information, your business is left prone to a major data breach.

A recently popular type of malware is the “ransomware” variety, which encrypts a victim’s files (making them unreadable) and only offers the key to recover them after a ransom has been paid. The unfortunate reality is that when it comes to your business’ vulnerability to ransomware and other types of malware, it’s not a matter of IF, it’s a matter of WHEN. There are simply too many varieties of ransomware to guarantee total safety for your business.

IT security can be a complicated and scary subject when it comes to modern cybercrime tactics such as ransomware. Most business owners cannot confidently claim that their business’ network is secure. Can you?

When it comes to ransomware, the most important consideration is email security, and often, it can be as simple as ensuring that you and your staff know what to look for.

What makes a victim a victim?

The short answer is lack of awareness. Almost no hacking attempt can be a success without the victim playing at least some role in the process, such as:

  • Visiting a malware-infected, unsecured website, either via an email, inappropriate browsing habits, or otherwise.
  • Opening an untrustworthy attachment in an email from a hacker that’s disguised as coming from a sender such as a business contact, employee, client, government agency, etc.
  • Downloading files that include a stow-away malware program or virus.
  • Conducting any of the above while logged in with administrator rights provides even greater access to the hacker that’s infecting the system.

The bottom line is that digital security begins and ends with the user. Regardless of how modern, expensive or well-recommended your security software is, one wrong move by a single employee can be all it takes to infect your system. But that’s not the only threat to your security…

Is your technology making you an easy mark?

Outdated, unsecured, and just plain faulty technology is just as likely to make you an ideal target for hackers as an unsuspecting employee is. A major part of the investment in new technology is that it comes prepared to handle all previously identified hacking threats and security loopholes. The older your technology is, the more vulnerable it is to new hacking techniques.

Here are three vital considerations you should keep in mind when evaluating your current technology:

  • Patch regularly, and patch often: Did you know that the most common way cybercriminals get into a network is through loopholes in popular third-party programs? That means the computer programs you rely on to get work done every day could be leaving you vulnerable to security breaches if you fall behind on updates. That’s why patch management is such a crucial part of proper IT security, in order to help you stay ahead of the non-stop tide of oncoming digital threats.
  • End of Life (EOL) is FINAL: As good as it is to run a frugal business, it’s important to keep in mind that you’re not a college student trying to make an old, beaten up laptop last until you can afford a new one. You’re running a business, with much more to invest in and much more to lose. When your software reaches EOL, it will no longer receive the vital security patches it needs to keep you safe. At that point, as much as you may like the current operating system, you have to let it go and replace it with the new, secure version.
  • Legacy technology isn’t worth the risk: Legacy software is often the gap in an otherwise capable suite of digital armor. Your business may have a brand new infrastructure, top-of-the-line security technology, and fresh-out-of-the-box desktops, but in the end, your unpatched, out of date legacy web browser will be what does you in. Just as with EOL, don’t let your favorite bit of technology put you at risk.

What is malware, exactly?

It’s a word you’ve probably heard a lot. You know it’s bad, and that you have software (anti-malware) designed to help you stop it. But in the end, if you don’t really understand how the enemy operates, how can you expect to defeat it?

Malware comes in many different forms and is used by hackers in a number of different ways. It can be used to steal information, locate vulnerabilities in your IT systems for a secondary attack, or simply to cause damage. While cybercriminals continue to innovate new forms of malware and the ways they use it, there are currently three main types that you should be familiar with:

  • Malicious Scripts: This type attacks when you or a member of your staff visit the wrong web page. With the right conditions (user with admin rights, an outdated browser, lack of anti-malware software), simply loading the wrong web page is enough to infect your system.
  • Embedded Media: While this form also attacks from a web page, it is through an infected media that is embedded in the site, such as a video or audio file. If your browser media player isn’t up to date (which is extremely common among today’s users), simply playing the media file can lead to a malware infection.
  • Infected Files: The oldest form of the three is also the simplest. By downloading and running files (media codecs, screensavers, desktop images, etc.) that they haven’t properly inspected ahead of time, or that contain a hidden malicious file, the user openly invites malware into the system.

Types of Ransomware

While there are currently three basic forms of ransomware, cybercrime methodology is constantly evolving. In order to stay effective, hackers work non-stop to find new ways to deploy ransomware; keep in mind that best practices can quickly become outdated.

  • Locker ransomware: This type works by denying access to the infected device. Generally, the scheme involves posing as a member of law enforcement and claiming that the victim has been a party to illegal activity (copyright infringement, illicit photography or media, etc.).
  • CryptoLocker ransomware: This type employs powerful encryption to lock down the victim’s files and data, even if the malware is removed It usually makes its way to the user’s device through an email attachment that they are tricked into opening.
  • Crypjoker: This form emerged as recently as January 2016, specifically targeting Windows operating systems to encrypt and lock down the user’s data. As opposed to CryptoLocker, Crypjoker gets to the victim as a PDF file attached to an email.

How Can You Keep Your Business Safe From Ransomware?

When developing your ransomware defense, keep these recommendations in mind:

  • Make a considerable investment in a comprehensive backup data recovery solution so that you can restore your data at a moment’s notice when necessary.
  • Test your backup and cybersecurity measures thoroughly and regularly; create dummy files and then delete them to see how fast they can be restored, or schedule a day to literally unplug your critical systems to find out how long it takes to get online again.
  • Be sure to make the most of the available resources (both provided online and through expert IT consultants) to ensure that you’re not overlooking vulnerabilities in your IT security methodology.
  • Employ email filtering, encryption, and continuity solutions to ensure that your lines of communication are secured.
  • Equip your business with industry-tested security solutions like firewalls, antivirus, antimalware, and network monitors to keep your systems safe from external threats.
  • Make sure your software and browsers are updated and patched on a regular basis.
  • Train your employees in best practices for safe browsing and email conduct so that they don’t click the wrong link or download the wrong file.

Seems like a lot, right?

That can be a lot to handle for a business owner like yourself. You have clients to see to, employees to manage, and more on your plate every single day; should you really be expected to also oversee regular maintenance of your cybersecurity all on your own?

Of course not!

The best way to ensure that your business is kept safe is by outsourcing your cybersecurity management to a reliable and experienced Managed Services Provider like our Information Systems experts. For an easily budgeted monthly flat rate, you can enjoy the peace of mind that comes with knowing your business is safe from the whatever modern cybercriminals may throw at it.

The Comprehensive Guide to Understanding and Stopping Ransomware Read More »

Be a Social Superstar: The Unofficial Guide to LinkedIn Etiquette

The world of social media has only been around for about 15 years. From MySpace and LinkedIn to Instagram and Snapchat, there are a variety of social platforms to suit every person and every purpose. Younger generations not only accept that much of their day-to-day lives aren’t private, they willingly “live tweet,” or share up-to-the-moment play-by-play details – which is an entirely foreign concept to those who reached adulthood pre-Instagram (or likely before).

Etiquette

Perhaps the most interesting aspect of social media is the differentiation of the roles for each platform. While Facebook is the largest and most widely-used platform to share content, opinions, and thoughts with friends and family instantaneously, Instagram acts more like a family photo album updated for the digital age to allow for interaction.

LinkedIn stands out as it was launched with a different purpose–helping professionals connect. Today’s professionals can easily be divided into two groups: those that have integrated social media into their existing careers, and those who entered the workforce already has built a social network. Newer candidates just completing their academic career and entering their chosen profession have likely already amassed numerous connections across multiple platforms, and merely establish these same connections on LinkedIn – but is this the smartest approach? Conversely, established professionals and those labeled as experts in their chosen field with a decade or more of experience may have fewer connections, though not always. The chances are that these connections hold greater value, simply because of the time and energy invested in each relationship.

The concept of integrating social interaction into the professional world is far from new; however, digitizing social interactions revolutionized how business is done, and in nearly every industry. It’s also safe to assume these groups of professionals view Internet etiquette – or “netiquette” – differently.

Performing a quick Internet search will return hundreds of results on “how best” to represent yourself digitally. Beyond just having a profile, sharing content, and relishing each Like and Share, professionals look to LinkedIn as a resource to further their careers. Organizations share this approach, though through a lens of lead generation.

NO

  • Random connection requests

✔ YES

  • Genuine connections

Think about why you want to connect with this person – especially if they’re not someone you’ve interacted with much. Will both of you benefit from the connection? Can you help each other, from a professional standpoint?

  • Tip: Brief but personalized introductions instead of templates will go much farther in a connection request. The time it takes you to send a cold, standardized template to connect is about the same time the target professional may take to decline your request.

NO

  • Social stalking

✔ YES

  • Respect

Did you know that every time you visit someone’s profile on LinkedIn, if that person has a Premium membership, they will be alerted to your visit? Multiple visits can leave a lasting impression – and not necessarily the one you want to leave. Decide if you want to connect, either send the request or don’t, and then move on.

  • We know sending a request to connect and then being rejected can sting, but don’t try this repeatedly. If you sent a personalized message with your connection request, and the connection didn’t accept the request, they have a valid reason, and you should respect it.

NO

  • Selfies

✔ YES

  • Content of value

There are many places for personal photographs – “selfies” – but LinkedIn isn’t one of them. Casual images are seen as unprofessional, and a picture is worth a thousand words. In this case, those words speak about you and send the wrong message. Instead, share content that holds value. This content can be original, or shared from another source, but will offer information that your network will find useful.

NO

  • Strictly digital

✔ YES

  • See beyond LinkedIn

LinkedIn is the premier forum to match professionals with shared goals. Make each connection count! If you’re in the same geographical area, take the time to meet colleagues in your network for lunch or a cup of coffee. Chances are this will result in you keeping you both closer to the top of the list down the road when the need arises.

NO

  • One-way communication

✔ YES

  • Engage

By definition, a social platform is one where people communicate with each other. As already stated, use LinkedIn to post content that will have value to your network, but also respond to comments and engage with your network directly.

  • Did you know that when you respond to a comment on a LinkedIn post, the engagement is visible to the commenter’s entire first-degree network? Consider this a “free” boost to your visibility and take full advantage.

NO

  • Only use LinkedIn to find a new job

✔ YES

  • Build relationships and network

Don’t make the mistake of confusing LinkedIn with an Internet job board. LinkedIn recognized that many users take advantage of the platform’s extensive professional user base to network and find new career opportunities, and now LinkedIn offers a separate mobile app with this in mind. The goal is to keep job posts and applicants from overloading the content feed, maintaining the primary function of LinkedIn.

NO

  • Post whatever content, whenever

✔ YES

  • Take advantage of LinkedIn’s reach and Insights

LinkedIn has recently introduced a handful of robust tools for both individual users and organizations. They offer Premium features like Insights on a follower’s base and the reach of content posts, as well as paid content options for boosting reach beyond their network with sponsored content. Users can develop a sophisticated LinkedIn content strategy, allowing for deep audience analysis.

  • To pay, or not to pay? Sponsored content is LinkedIn’s version of advertising, but there are other paid options to expand your brand’s reach.

NO

  • All business, all the time

✔ YES

  • A healthy balance

While any activity on LinkedIn should have a purpose, remember to humanize your posts with lighter content sprinkled in. What does this mean? So long as it’s clean and tactful, a sense of humor is welcome on LinkedIn! If an organization collectively volunteers for an Adopt-A-Road program and shows pictures or videos of staff picking up trash, it’s nice to see the faces behind the content posts.

NO

  • Irregular, varied content

✔ YES

  • Be a brand ambassador

To represent yourself, and your brand, create a LinkedIn strategy and devise a content calendar. Whether you are responsible for your own individual LinkedIn profile, your brand’s profile page – or both – remember to own your brand, represent it nonstop, and truly embody how you want the public to perceive your brand. A strong brand ambassador is consistent and respected.

Be a Social Superstar: The Unofficial Guide to LinkedIn Etiquette Read More »

Talk to our Team