Blog

ThinkstockPhotos 695337960

Hey All You Social Media Junkies…

Psst… Social Media Isn’t Just For Slacking Off At Work Anymore – Yammer Is The Best Social Media Platform For Your Business!

Microsoft’s business social media platform – Yammer – has everything you need to boost productivity at your place of business.

Microsoft Yammer

In September of 2008, Microsoft developed the social networking service known as Yammer. Designed to boost connections between businesses and enterprises, Yammer comes with many features and benefits that will prove invaluable to business-owners, employees, and other involved parties. Yammer is moreover easily integrated within Office 365 and ultimately, this product has an excellent track record of boosting workplace success.

One of the best benefits of Yammer is the ease of connecting with others. In order to get started with the program, the users will need an email address which coincides with the company’s network. Clients and other people who contribute to the business will likely need access to an external network, which can be created by the business owner.

Just about every entrepreneur aspires to grow his or her own business and Yammer helps to make this possible. The program allows company employees to communicate with one another, keep track of ongoing assignments/tasks, and exchange thoughts and ideas, regardless of geographical location. However, the ability to communicate with ease and effectiveness is not the only pragmatic upside to using Yammer.

In addition to simplifying communication, business owners will discover that Yammer provides insight into what each colleague is working on in addition to their areas of expertise. In a day and age where awareness and collaborations are often imperative for workplace success, Yammer’s ability to keep all company members on the same page will greatly benefit the business as a whole, thus ensuring maximum productivity.

Communication and keeping all workers on the same page are great priorities for any company. However, businesses that use Yammer will find that it’s an advantageous element to have in the marketplace. Many competing businesses either may not be aware of Yammer or may be unsure how to use it. These companies may therefore rely on sending mass emails to employees or scheduling conference room meetings, as opposed to using Yammer, where the content can be reviewed anytime and matters will not be complicated by a worker who misses a meeting for whatever reason. Ultimately, Yammer is a professional asset that saves time, capital, and trouble for business owners and the people who work for them.

Businesses and companies that use Yammer will moreover find that the program incentivizes and encourages their workers, which can make all the difference in the world. Many studies and successful people have affirmed that one’s work environment and atmosphere greatly impact their levels of professional excellence. Yammer’s ‘praise’ program congratulates workers when they do well. While some people may view this as wholly insignificant, at best, it can make a considerable difference for a staffer who has experienced a long, grueling, trying day. Nine times out of ten, when employees thrive, the business thrives, as a whole.

Not only does Yammer incentivize current employees, but the program also makes the training process for staff considerably easier and less expensive. Many businesses struggle with bringing new people on board and teaching them everything there is to learn and know about the company. However, with Yammer, new staffers are able to quickly communicate with a network of colleagues and learn the ins and outs of the business. Employees who feel comfortable and at ease in their place of business are markedly more likely to perform at higher levels and stay with the company.

The marketplace is an inherently competitive environment. Businesses with the best tools, operations, and employees are notably more likely to grow and succeed than their less advanced counterparts. Yammer provides a viable opportunity for companies to communicate more effectively, network with colleagues, incentivize staffers, and simplify the process of bringing new employees on board. Are you ready to take your company to the next level?

Hey All You Social Media Junkies… Read More »

ThinkstockPhotos 77745701

Warning! Serious Threats Still Lurk In Many Companies

Warning! Running Windows XP Software Expose You To These 5 Serious Threats

Business Security ThreatsWe’ve all done it before – you find a program that you love, and you use it every day until it’s so old it stops getting support from the developer – in the case of Windows XP, that could be extremely dangerous for you and your business.

SanDisk reported in 2015 that roughly 25% of organizations were still using old versions Windows and didn’t plan on migrating until the software’s end-of-life. Windows XP was first introduced in 2001, and since then it has been one of the most popular operating systems with millions of users even two years after the end-of-life.

However, just how dangerous is it to just keep using the same program? It can’t be that bad, can it? In reality, it is incredibly dangerous. Here are the facts you need to know if you plan to keep using geriatric versions of Windows software:

No More Updates Or Patches… You Are On Your Own

One of the main issues with old software is that it isn’t issued new updates and patches. Once software becomes all but extinct, it no longer gets the same protection. Microsoft cannot possibly create patches and updates for all the software and programs it has ever released, so they instead focus on just their most recent software. If you are using an old version, this means that you are leaving your computer vulnerable to the latest security threats.

Doesn’t Play Well With Others

A second danger that comes with failing to update is software incompatibility. New applications cannot be made to accommodate all software that has ever been released, as they are optimized for only the most recent of operating systems. If you are still using Windows XP, then you are limiting your computer’s compatibility with other legacy software, which in turn limits what you can get out of your programs, and out of your network as a whole.

Security Threats

If you are a business that stores essential data, such as sensitive customer information, or payroll accounts, then you could run the risk of not complying with the law. Entrusting your business’ confidential information to a legacy application means you aren’t securing or protecting your data. In other words, you are leaving the doors unlocked and open; you might as well load the info on a flash drive to give directly to the hackers. If you are hacked, you would have to contact Microsoft to get a patch, and then you will have to fork over a large amount of cash. A customer support agreement with Microsoft can run a business $200-$600 per server. Keep in mind that the cost for a custom support agreement goes up each year.

Ransomware And Windows XP

Ransomware is a type of malware that prevents or limits users from accessing their system or files until a ransom is paid to the hackers. The cost of global ransomware incidents is estimated at $325 million for the year of 2015. By the end of 2017, this number had already multiplied to $5 billion. By the year of 2020, it could easily quadruple to $12 billion.

A good example of the dangers that come with Windows XP is the recent “WannaCry” ransomware that swept the UK’s National Health Service (NHS). The NHS had to shut down services throughout their hospitals and clinics due to this ransomware attack. It was reported at 90% of their NHS used at least one device that was still operating on Windows XP. Due to their computers being encrypted by the ransomware, the hospitals were forced to turn away patients while they fixed the problem. Keep in mind that this is software that has not been supported since 2014. As of January 2017, the number of Windows XP users dropped to 0.9% of the market, which seems relatively small and non-threatening – however, 0.9% of 2.17 billion is still 19.5 million.

Costs Out Of Pocket And Out Of Luck

Beyond risking your security and reputation of your company you are also forcing yourself to pay higher operating costs. Using old software has a much higher price for maintenance and bug-fixing. For example, if you needed a patch from Microsoft for Legacy Windows XP, you would end up paying more than you would to just update and replace the program.

Snail’s Pace Performance

Lastly, you will be suffering from inadequate performance and unreliability. Programs built in 2003 and before cannot keep up with the technology of 2018. This means that while Windows XP was cutting edge when it first came out, now it cannot keep up with the internet speed, or with the pace of faster servers. We all hate waiting for a program to open, or watching the spinning wheel while your computer tries to catch up – while you wait, your work continues to pile up. Imagine what this costs your company in downtime alone.

With so many issues, it’s hard to see why so many people have continued to use Windows XP. Years after the last update was offered from Windows, huge companies still cling to the operating system’s remains. The reliability and comfort of the operating system proved to be a fault in their own. Imagine if we lost 75% of our water utilities in the US, due to a preventable hack. Not only would be out of the water, but all the sensitive information that the utility companies hold would be left defenseless.

Continuing to use software that is out of date is like leaving your home unlocked, your doors open, and all your valuables on display and unsecured. Hackers don’t have to keep up with the latest software to make good money when businesses are making these kinds of mistakes. If you stay with Windows XP, you will be paying more for security vulnerabilities and poor performance – don’t let this happen to your company. The cost of the updated software will pay for itself by saving you the money you’d pay for the patch from Microsoft and in damages.

Warning! Serious Threats Still Lurk In Many Companies Read More »

ThinkstockPhotos 840617560

Your Step By Step Guide To Transitioning To VoIP

Get untangled from your landline, and let VoIP boost your business’ efficiency, reliability, and quality.

Business VoiP

A recent study revealed that 94% of business’ marketing budgets are spent trying to get consumers to call. If businesses are paying so much of their advertising and marketing budget on a communications system, shouldn’t it be reliable and efficient?

This need for a more reliable form of communication is forcing many businesses to make the transition from the landline to the VoIP. However, this transition can be a scary process. How are you supposed to make this transition while running your business? A lapse in phone service means a loss of communication with your customers, which could mean a loss of profit.

Why Move To VoIP?

The move to VoIP offers your business improvements in efficiency, reliability, and quality, all at an affordable cost. Landline phones are becoming obsolete – by choosing to remain with a landline system, your business may become obsolete as well.

Efficiency

VoIP provides your business improved efficiency by limiting issues that come from having to replace or fix phones, as well as complicated management of adding and or removing employees. On traditional landline phone systems, you would have to wait lengthy periods of time for a phone to be replaced, or for a roll truck to fix issues. All this time spent waiting for a fix costs you money.

With a VoIP system, you don’t have to deal with these issues, which means less downtime. VoIP also improves your business’ efficiency by providing you with numerous options for routing and answering calls, without the expensive on-premises technology and staff.

Reliability

VoIP provides your business improved reliability by delivering a clear, seamless quality of phone service. This service can run on multiple internet connections, and can even extend to your smartphone. VoIP can work reliably through anything that mother nature may throw at you from hurricanes to snowstorms. Additionally, if you lose your business due to a fire, your VoIP phone service will still work. This is one of the main reasons why there are now over 288 million VoIP users.

Quality

VoIP provides your business improved quality through clarity of your calls. These calls come with a digital readout display, and the option to work without a headset. For those that still wish to use a headset, they can receive their calls through the use of a “softphone”, which is software that allows users to make telephone calls through the internet on their computers.

Affordability

VoIP saves your business 40-80% compared to the cost of traditional landline phone service. Landlines now cost more than VoIP phone systems both in the initial setup, as well as in ongoing contracts. For example, landlines for five employees cost an average of $563/month, while VoIP services for the same amount of users costs only an average of $27.95/month.

Years ago, VoIP systems would cost $10-$50/month, after the cost of the headset (which usually cost $200 each). It’s easy to see how quickly this can add up. Today, VoIP comes at affordable rates as low as $0. Phones will be set up ahead of time, that way there is no lapse in your communication with your clients. This saves your business money by limiting the loss of contact, during this time of transition. Secondly, there is a “Proof of Concept” (POC), which allows you to have your phones in place, and try them out before deciding whether they’re right for your business.

Preparing For The Move

So how do you transition from traditional landline phones to VoIP, while at the same time shortening the loss of communication? Preparing for the move means you need to gather pertinent information such as how many employees you have, what your cabling needs are, what your current infrastructure is, and what are the nonnegotiable-features that you need from the new phone system.

Step By Step

You begin by evaluating your cost analysis. Fully understanding the budget upfront and ongoing ensures that you will be able to get the most out of this new program, without being oversold. After looking at the move from a financial standpoint, you are ready for your live demo. This provides you and your employees a chance not only to see all of the VoIP system’s features but also to try them out, in a risk-free environment. Once you decide on which features you need, you are ready to decide which service provider best fits your company’s needs. For 2017, the top three VoIP service providers were Ring Central, Vonage Business, and 8×8 Global Communications.

Once you have selected a plan and a service provider, you want to ensure that you have no network issues that could limit or infringe on the successful integration of your new VoIP system. From these network tests, you should make any adjustments or upgrades that you feel are necessary to ensure the best result for your business. Lastly, you will complete your trial period, or your Proof of Concept period, that allows you to see first-hand how the service works and if it meets your business needs. If so, then you move on to finalize the agreement, and select a “Go Live Date”.

After your VoIP system is up and running, employees should be trained to use all the features that they provide. Some of these features include having a virtual receptionist, voicemail-to-email, automatic call forwarding, and three-digit dialing. Training and ongoing support are a crucial part of developing and maintaining your successful relationship with your VoIP.

Moving to VoIP does not have to be a cumbersome and time-consuming challenge. It could mean a more efficient, reliable, and qualitative business. With the new VoIP service, you would be able to rid yourself of the hassles of maintenance agreements, capital expenditure, truck rolls, and lengthy wait periods that traditional landline phones come with. Lastly, you will have access to excellent customer care support 24 hours a day, seven days a week, and 365 days a year. Don’t let your phone system hold your business back from its full potential any longer. Disentangle yourself from your landlines’ limitations and see what the freedom provided by a VoIP system can do for your company.

Your Step By Step Guide To Transitioning To VoIP Read More »

ThinkstockPhotos 599954542

Microsoft Teams: Business Without Boundaries

Where you work is no longer defined by four walls and a door – not even by cubicle walls. Gone are the days where productivity requires a set geographical location, at least for some roles, anyway.

Recent years have seen the rise of the remote workforce that can effectively collaborate on projects from across the globe. Organizations can cut costs and increase productivity using various platforms that facilitate communication and collaboration, and it’s only becoming more popular.

Revolution or Evolution?

Major metropolitan cities from New York to Los Angeles are filled with your classic skyscrapers, and every town and suburb in between is dotted with professional office parks. However, are these buildings, once filled to the brim with bustling businesses, still relevant?

They’re no longer the norm – but why? Even with the periodic recession, the overall post-WWII American economy didn’t just emerge with success – it exploded! The “four walls and a door” was waiting for every entry-level candidate until the late 1980’s when the cubicle first gained popularity.

Fast-forward to today, and the latest concept to revolutionize the workforce isn’t revolutionary at all. Telecommuters now represent a significant portion of the global workforce, and do so quite ably. To say the idea of the office has evolved is quite the understatement: now, an office can be anywhere. From your desk at home to your local coffee shop, from the waiting room at your car dealership to Row 6 Seat B on your flight, telecommuting facilitates progress so long as you can access your files, email, and anything else you need to get the job done.

  • Did you know that telecommuting has increased by more than 300% in the past 20 years? Technology has made telecommuting easier and more effective and has helped organizations retain quality staff longer.

No longer is the stereotypical full-time staffer a given when organizations look to fill a role, either. People are now demanding flexibility in a job description, and what was once a 9-to-5 position is becoming obsolete. For more than a decade, flexibility has evolved into an expectation over a fringe benefit, and with good reason. A global remote workforce offers business without boundaries and productivity that never stops.

A Collaborative Culture

The evolving business culture demands evolving means by which to collaborate and connect. Digital platforms are plentiful, with features that cater to your business’ specific needs. Platforms like Basecamp and Trello are beloved by project managers, Salesforce.com and Microsoft Sharepoint offer great sales team support, and technology teams rely on tools like Microsoft Team Foundation Server – often shortened to TFS. Organization is critical to any company, especially when teams are separated by time zones.

Where would we be today without Microsoft? Microsoft and Windows have remained the primary professional computing mainstays for about 30 years. Microsoft Office remains the fundamental application suite on which companies rely for day-to-day operations, even when office space is nonexistent. The irony of the name is not lost on us, either!

Microsoft recognized an opportunity in the permanence of telecommuting. Never one to shy away from innovation, Microsoft launched a suite of applications catering to the “digital” crowd in 2011, under its Office 365 brand. If Microsoft Office is a basic tool for the 9-to-5 professional, the subscription-based Office 365 is a fundamental lifeline of the telecommuter. Office 365 allows the use of applications across a multitude of devices, as well as file hosting, email, and a range of other networking tools designed to feed our daily addiction to all things Microsoft.

Rumors began swirling in 2016 of a Microsoft acquisition bid for the cloud-based Slack collaboration tool, a darling of the technology industry – but why buy when you can create and customize? Microsoft’s Skype for Business product offered similar basic functionalities and was already installed on the digital desktops of millions of professional customers. In early 2017, Microsoft released what it believed to be the next-level professional platform: Microsoft Teams.

  • Slack offers itself as a “freemium” product, a marketing and pricing strategy where the base model of a product or service is widely available free of charge, but premium features are available for those willing to pay the added cost.

Making the Most of Your Microsoft

Microsoft didn’t face a great hurdle in convincing customers to “buy in” to Microsoft Teams, given its position as a new-and-improved version of anything currently on the market. If Microsoft Office was the predecessor to Office 365 and Skype for Business, Teams is the logical next generation.

Why is the next generation so important? Microsoft realizes that the workplace is evolving and that more businesses are hiring independent contractors, freelancers, consultants, and other external resources to support permanent staff – all of which work together toward one common goal. Microsoft Teams refers to these external resources as “Guests.” If collaboration is the cornerstone of professional success, then communication is the foundation upon which that stone is laid, and Guests don’t need to be granted full access to proprietary information.

The solution is Guest Access, and it’s a new feature in Teams, which customers have been requesting for some time. Aside from the previously mentioned independent contractors, etc., Guests may also include vendors, suppliers, or even interns. Guest Access is available to users who have an email address that corresponds to an Azure Active Directory or Office 365 work or school account.

Organizations can provide external access to their teams for applications to partners, resources, chat communication, and documents in channels while maintaining control and protection.

In Microsoft Teams, Guest Access is a tenant-level setting that’s turned off by default. Do you need help turning on this new feature? Follow these steps:

  1. The global admin needs to login to the dashboard: https://portal.office.com/adminportal/home
  2. In the left navigation menu, expand Settings and select “Service and Admin.”
  3. Scroll and select Office 365 Group settings.
  4. In the menu that opens, toggle the bottom option to “On,” giving Group Owners the ability to add Guests from outside the organization, and click “Save.”
  • This setting needs to be enabled because Team permissions are based on Groups.
  1. Next, scroll through the list to select Microsoft Teams
  2. In the left navigation menu, find the “Settings by user/license type” and select “Guest” in the drop-down menu and toggle setting to “On.”
  3. Click “Save.”

After changing these settings, Team Owners can add and manage Guest Access within their Team.

Microsoft Teams

Whether you include mostly in-house staff, a team of telecommuters, or a range of every type of resource at your organization, we can help you make 2018 the best year yet – as a team!

Microsoft Teams: Business Without Boundaries Read More »

The Comprehensive Guide to Understanding and Stopping Ransomware

Cybercriminals are everywhere. Both domestically and around the world, countless hackers work day in and day out to penetrate the digital defenses of businesses just like yours, using a variety of proven, effective, and ever-evolving methods. Whether they infect your system with malware hidden in a seemingly innocuous email attachment or con an unsuspecting employee out of vital information through social engineering, the end results are the same: data loss, financial damages, lawsuits, reputational damage, bankruptcy, and worse.

Ransomware

Our team of certified system professionals understand how serious the modern threat of cybercrime is to businesses in your industry, which is why we’ve developed this whitepaper as a vital resource to show you how hackers think, what methods they use, and how you can stop them from victimizing your business. Without the right knowledge, tools, and technology to prevent hackers from stealing your information, your business is left prone to a major data breach.

A recently popular type of malware is the “ransomware” variety, which encrypts a victim’s files (making them unreadable) and only offers the key to recover them after a ransom has been paid. The unfortunate reality is that when it comes to your business’ vulnerability to ransomware and other types of malware, it’s not a matter of IF, it’s a matter of WHEN. There are simply too many varieties of ransomware to guarantee total safety for your business.

IT security can be a complicated and scary subject when it comes to modern cybercrime tactics such as ransomware. Most business owners cannot confidently claim that their business’ network is secure. Can you?

When it comes to ransomware, the most important consideration is email security, and often, it can be as simple as ensuring that you and your staff know what to look for.

What makes a victim a victim?

The short answer is lack of awareness. Almost no hacking attempt can be a success without the victim playing at least some role in the process, such as:

  • Visiting a malware-infected, unsecured website, either via an email, inappropriate browsing habits, or otherwise.
  • Opening an untrustworthy attachment in an email from a hacker that’s disguised as coming from a sender such as a business contact, employee, client, government agency, etc.
  • Downloading files that include a stow-away malware program or virus.
  • Conducting any of the above while logged in with administrator rights provides even greater access to the hacker that’s infecting the system.

The bottom line is that digital security begins and ends with the user. Regardless of how modern, expensive or well-recommended your security software is, one wrong move by a single employee can be all it takes to infect your system. But that’s not the only threat to your security…

Is your technology making you an easy mark?

Outdated, unsecured, and just plain faulty technology is just as likely to make you an ideal target for hackers as an unsuspecting employee is. A major part of the investment in new technology is that it comes prepared to handle all previously identified hacking threats and security loopholes. The older your technology is, the more vulnerable it is to new hacking techniques.

Here are three vital considerations you should keep in mind when evaluating your current technology:

  • Patch regularly, and patch often: Did you know that the most common way cybercriminals get into a network is through loopholes in popular third-party programs? That means the computer programs you rely on to get work done every day could be leaving you vulnerable to security breaches if you fall behind on updates. That’s why patch management is such a crucial part of proper IT security, in order to help you stay ahead of the non-stop tide of oncoming digital threats.
  • End of Life (EOL) is FINAL: As good as it is to run a frugal business, it’s important to keep in mind that you’re not a college student trying to make an old, beaten up laptop last until you can afford a new one. You’re running a business, with much more to invest in and much more to lose. When your software reaches EOL, it will no longer receive the vital security patches it needs to keep you safe. At that point, as much as you may like the current operating system, you have to let it go and replace it with the new, secure version.
  • Legacy technology isn’t worth the risk: Legacy software is often the gap in an otherwise capable suite of digital armor. Your business may have a brand new infrastructure, top-of-the-line security technology, and fresh-out-of-the-box desktops, but in the end, your unpatched, out of date legacy web browser will be what does you in. Just as with EOL, don’t let your favorite bit of technology put you at risk.

What is malware, exactly?

It’s a word you’ve probably heard a lot. You know it’s bad, and that you have software (anti-malware) designed to help you stop it. But in the end, if you don’t really understand how the enemy operates, how can you expect to defeat it?

Malware comes in many different forms and is used by hackers in a number of different ways. It can be used to steal information, locate vulnerabilities in your IT systems for a secondary attack, or simply to cause damage. While cybercriminals continue to innovate new forms of malware and the ways they use it, there are currently three main types that you should be familiar with:

  • Malicious Scripts: This type attacks when you or a member of your staff visit the wrong web page. With the right conditions (user with admin rights, an outdated browser, lack of anti-malware software), simply loading the wrong web page is enough to infect your system.
  • Embedded Media: While this form also attacks from a web page, it is through an infected media that is embedded in the site, such as a video or audio file. If your browser media player isn’t up to date (which is extremely common among today’s users), simply playing the media file can lead to a malware infection.
  • Infected Files: The oldest form of the three is also the simplest. By downloading and running files (media codecs, screensavers, desktop images, etc.) that they haven’t properly inspected ahead of time, or that contain a hidden malicious file, the user openly invites malware into the system.

Types of Ransomware

While there are currently three basic forms of ransomware, cybercrime methodology is constantly evolving. In order to stay effective, hackers work non-stop to find new ways to deploy ransomware; keep in mind that best practices can quickly become outdated.

  • Locker ransomware: This type works by denying access to the infected device. Generally, the scheme involves posing as a member of law enforcement and claiming that the victim has been a party to illegal activity (copyright infringement, illicit photography or media, etc.).
  • CryptoLocker ransomware: This type employs powerful encryption to lock down the victim’s files and data, even if the malware is removed It usually makes its way to the user’s device through an email attachment that they are tricked into opening.
  • Crypjoker: This form emerged as recently as January 2016, specifically targeting Windows operating systems to encrypt and lock down the user’s data. As opposed to CryptoLocker, Crypjoker gets to the victim as a PDF file attached to an email.

How Can You Keep Your Business Safe From Ransomware?

When developing your ransomware defense, keep these recommendations in mind:

  • Make a considerable investment in a comprehensive backup data recovery solution so that you can restore your data at a moment’s notice when necessary.
  • Test your backup and cybersecurity measures thoroughly and regularly; create dummy files and then delete them to see how fast they can be restored, or schedule a day to literally unplug your critical systems to find out how long it takes to get online again.
  • Be sure to make the most of the available resources (both provided online and through expert IT consultants) to ensure that you’re not overlooking vulnerabilities in your IT security methodology.
  • Employ email filtering, encryption, and continuity solutions to ensure that your lines of communication are secured.
  • Equip your business with industry-tested security solutions like firewalls, antivirus, antimalware, and network monitors to keep your systems safe from external threats.
  • Make sure your software and browsers are updated and patched on a regular basis.
  • Train your employees in best practices for safe browsing and email conduct so that they don’t click the wrong link or download the wrong file.

Seems like a lot, right?

That can be a lot to handle for a business owner like yourself. You have clients to see to, employees to manage, and more on your plate every single day; should you really be expected to also oversee regular maintenance of your cybersecurity all on your own?

Of course not!

The best way to ensure that your business is kept safe is by outsourcing your cybersecurity management to a reliable and experienced Managed Services Provider like our Information Systems experts. For an easily budgeted monthly flat rate, you can enjoy the peace of mind that comes with knowing your business is safe from the whatever modern cybercriminals may throw at it.

The Comprehensive Guide to Understanding and Stopping Ransomware Read More »

Call Now Button