Blog

May 26th, 2015

BusinessContinuity_May26_BEven with a business continuity plan in place, the success of an organization means more than safe and secure critical data. It is crucial that business owners make sure they can take care of their most important asset — their employees. To that end, here are five business continuity mistakes to avoid in order to ensure your employees’ peace of mind.

Mistake #1: Assuming your employees will be there to support you

Companies that survive unexpected incidents are the ones that thought about their employees’ needs. It is important that your management team are aware of the business continuity plan’s SWOT analysis, which examines the strengths, weaknesses, opportunities and threats you face in a disaster. Review and obtain formal management sign-off on the SWOT analysis and have your management team make decisions in advance about actions that require expenditure.

Review decisions on paying all employees during a period of business interruption for a minimum period of time. Communicate your strategy and message to your employees to let them know that you will be there to support them and their families in the event of a crisis. This way, your employees will have peace of mind knowing you and the company are there for them, and in turn they will be there to support you.

Mistake #2: Using only words, not actions

Once you have your business continuity plan documented and your SWOT signed off, you need to think about the small stuff to ensure your plan is executable. This includes logistical considerations like food, travel and living requirements, medical aid and monetary support.

Walk the walk and ensure your medical providers have made arrangements in advance. Have an Employee Assistance Program (EAP) in place to make sure your employees have access to people who can give them support in the event of an incident. Staff will remember if you provided them with care and support, and will remember even more clearly if you didn’t.

Mistake #3: Not showing your employees how the plan will work

While many business owners worry about downtime, they overlook the fact that explaining the plan and its execution to employees is critical to minimizing lost productivity.

As part of your maintenance program, include your employees as well as your security, medical and EAP team in the testing process. Execute a live test where various providers can demonstrate their capability to support your employees. This way, your employees will know that you care and can have faith you will be able to support them when the tables have turned.

Mistake #4: Not dealing with your employees first

When an incident occurs, the first assessment most businesses make is to determine the impact it has on the company. But how do you execute that process without people? When disaster strikes, your employees will naturally want to be taking care of their families, not your business.

Ensure your crisis management team addresses the people issues first. Where are they? What do I need to do for them? Are there any special employee needs I must address? After having accomplished this, you gain the ability to show your people that you’re in control and that you truly care.

Mistake #5: Reacting rather than communicating

In the event of a disaster, the most important thing to get right is communication. It is imperative that your employees know you can provide them with the most up-to-date information.

Set up a toll-free hotline so your employees can call in for regular updates, or create an open forum where your employees can tell you what you could have done better and what failed. With that, you provide consistent messaging and you can eliminate second-hand information and employee guesswork, while gaining insight into what could have been improved.

If your business continuity plan takes into account that your employees are your biggest assets, you’ll have peace of mind knowing the core of your organization is still standing strong even if the worst should happen.

Looking to learn more about business continuity and how it can help your business? Contact us today and see how we can help.

Published with permission from TechAdvisory.org. Source.

May 26th, 2015

164 B_Biz IntelWhen you were new to the world of websites and analytics, your goal may have initially been to increase your business’s site traffic to maybe 50 visitors a day. Once you hit 50, you then reached 100 soon after, and then 200. Yet with each higher traffic milestone realized, you didn’t see the corresponding sales conversion. What happened? When it comes to website analytics, it’s not all about traffic. Engagement with your site content is just as important. Here’s how to track your engagement metric using Google Analytics.

How do you measure engagement?

Just because a page receives a large amount of traffic, doesn’t mean it has quality content on it that visitors value. Half of the visitors to your most trafficked blog post or service page can easily bounce within seconds. So to figure out which pages your customers like, you need to measure engagement. And the easiest way to do that is by looking at the amount of time a visitor spends on a page.

Generally speaking, if a visitor is on a page for five minutes or more, they’re likely reading, watching or listening to some form of content you posted. Of course there’s the off chance that maybe he or she took an extended bathroom break after landing on your page or forgot to close it and continued surfing the web in another window. But if a consistent number of visitors are spending several minutes on a given page, you can feel confident that most of them are engaging with the content.

Why does engagement matter?

Simple. The more your visitors engage with your content, the more likely they’ll visit your website again or - even better - become a loyal customer.

You can measure engagement by following these four steps in Google Analytics:

1. Track engagement over a long period of time

We’re not just talking a month or two, but more like years. This will show you which pages are performing best in the long run. To do this, open Google Analytics. Then in the top right corner of the screen, input your date range and then click Apply.

2. Measure all pages

You need to look at time spent on all your pages to see what’s performing best. In the navigation bar to the left of your screen, click on the following in the order below:
  1. Behavior
  2. Site Content
  3. All Pages

3. Compare the average time visitors spend on a page

Under the main graph that displays visitor numbers to your site, you'll see a search box with the word “advanced” next to it. To the right of that, you'll see five buttons. Click on the second button from the right - the Comparison button. To be sure you’re clicking on the correct one, hover your mouse over it and the word “comparison” will pop up.

Slightly below the comparison button and to the left, choose Average time on page as your secondary metric.

4. Mind the Green bars

After you’ve followed the above steps, green bars will appear to the right of some of the pages displayed. The higher the bar, the greater amount of time a visitor is spending on a page.

With this data at your disposal, now you can understand what content your customers find valuable - and then focus on creating more of it.

Want to know more about how to gain valuable insights from your business data? Give us a call today.

Published with permission from TechAdvisory.org. Source.

May 25th, 2015

HealthcareIT_May25_AHealthcare institutions today are increasingly opting for mobile devices to increase their employees’ productivity and collaboration, and to deliver better patient care and customer service. Yet the benefits come with the potential risks of data breaches and threats. Without proper security measures in place, hackers could steal patients’ healthcare data and use it for personal gains. Protecting patients’ information is a must for your healthcare organization - here’s how you can secure healthcare data.

Encrypt data

Data encryption stops hackers in their tracks of stealing information. When you set up connected device systems with service providers, whether it’s cloud systems or data transfer channels, make sure that data traffic of the device and its software application is encrypted when communicating your institution’s private networks and those of your outsourcing providers’. Personal healthcare information can be compromised during the collection and transmission processes. Encrypt data to protect information from being stolen.

Protect passwords

When setting up a system, connected devices are automatically deployed with default usernames and passwords, most of which are all too familiar for attackers. After setup is complete and before critical information is collected and transmitted, you should change the password immediately. Also, the connected device network shouldn’t be configured in a way that exposes authentication credentials in your institution’s network.

Authorize devices

Privacy protection can be strengthened by securing device and authorizing permissions. The devices should be configured to prevent data from being accessed or removed by all others except the authorized device holders. Restrict devices from accessing data beyond its intended operation, and set up permissions so that the generated data can only be accessed by an authorized person with a need to handle the information.

Inspect personnels

One of the loopholes in healthcare data security lies in employees. Former employees - both of your healthcare institution, vendors and its subcontractors - can be the source of unauthorized disclosure. Check for potential data breaches regularly, detect and repair the damage before it spreads. Additionally, issue security policies and watch over your current employees to ensure good personnel practice. This is especially important at the network administrator level, since that manager holds the key to your healthcare data.

As a healthcare business owner you should enter into agreements with your IT service provider to ensure the connected devices and network system is up-to-date and protected by multiple layers of security.

If you want to learn how to protect your healthcare institution from hackers, get in touch with us today - our cybersecurity experts are on hands to help.

Published with permission from TechAdvisory.org. Source.

May 25th, 2015

164_Biz V_BRunning a business is time consuming. You likely are so busy managing staff, looking for growth opportunities and satisfying your clients that you have little time to search for technology solutions that can benefit your business. Even worse, you may be so frustrated with your current IT system that you make an impulsive technology purchase that causes more harm than good. To help you avoid this pitfall, we’ve listed five IT investment mistakes every business owner needs to be aware of.

Investing in the newest technology instead of the best fit

It’s the job of every marketer to make you believe the newest technology on the market will resolve all your problems. And while the latest cloud or virtualization offering is likely to make things better for many individuals and organizations, it isn’t going to work for everyone.

Don’t let the flash and hype of a new product deceive you. Take the time to think about the results you’re trying to achieve with technology. Make a list of them, and when you’re done match those criteria with the product that fits. Any good IT provider will be happy to serve as your consultant to ensure you make the best choice.

Believing everything will magically work together

As technology evolves, it is inevitably becoming simpler to use. Consumers want user friendly products and solutions that are easy to implement, and nowadays that’s what they’re getting - at least most of the time. Because of this belief that all products are going to be plug-and-play, many business owners hold the misguided assumption that any new technology they implement is automatically going to synchronize with their other IT. It is simply not true.

Though many technologies are compatible with one another, your business is taking a big risk - that could result in massive downtime and wasted money - if you implement a new tool that doesn’t integrate well into your current system and workflow. Be smart, do some research or consult with an IT professional before making a purchase.

Assuming your team doesn’t need support and training

Now that you’ve found the perfect fit technology and you’re sure it will integrate into your current IT setup, you go ahead and purchase it. You let out a sigh of relief as you kick back and let your sparkly new IT solution power your company to new levels of success and profits in a SMB “happily ever after” fantasy. Sound too good to be true? That’s probably because it usually is.

Don’t forget that not all of your employees are going to instinctively know how to use the new technology. Consult with your IT provider to see if they offer support and training. If not, you may want to look elsewhere or find an alternative solution before you buy.

Forgetting to create a budget

More and more IT solutions are packaged with pay-as-you-go monthly pricing. While this is a great way to help you avoid large upfront capital investment, if you implement too many different technologies too fast - and without thinking about the recurring costs - you could quickly run out of money before having properly created a complete technology platform.

Think about what you’re comfortable spending on IT before you open your wallet. Do some research, and either draft a budget on your own or acquire the assistance of a consultant to help you along.

Failing to get staff input

It’s wise to consult with the employees who will be using the new technology you implement, on a daily basis. It’s even wiser to do it before you purchase it.

The truth is that not all of your employees may be on board with the new product. They may actually even know some downsides to it you weren’t aware of. Regardless, it’s smart to consult with them beforehand, or you may find yourself in a constant fight getting them to adopt it.

Need to consult with an IT professional to create a complete technology solution for your business? We’re happy to serve you in any way possible.

Published with permission from TechAdvisory.org. Source.

May 25th, 2015

SocialMedia_May25_BSocial media marketing is one of many effective methods to expand your business’s reach to a wider group of audience that could eventually turn into potential customers. When we think of social media marketing, our thoughts immediately turn to Facebook. Yet there is another alternative social media platform worth looking into - Twitter. As a small business owner you should leave no stone unturned, so consider using Twitter to market your business and drive more customers. Here are some Twitter best practices.

Tweet regularly

Consistent tweeting indicates an active, healthy profile. If you only tweet only once a week, or worse still once a month, most of your followers will forget about you. You’ve worked hard to get them to follow you, so make an effort to keep them engaged by interacting with them on a regular basis. Make sure you tweet relevant or useful information, content your followers will read, retweet, and favorite. Come up with a tweet schedule and refer to it when you’re running out of ideas.

Follow trends

It pays to stay on top of the latest happenings in your industry. Try to put your business in the light by following relevant hashtags and trending topics. This way you’ll always have something new to share with your followers. Add trending hashtags to your tweets, in order to reach new users that have similar interests.

Use visuals

People tend to understand visual content more than text. You should try to create a dynamic experience for your Twitter audience by adding different types of media to your tweets, such as images and videos, which are proven to receive more views, clicks, and shares than plain-text tweets.

Retweet great content

Don’t be afraid to retweet when you see something worth sharing with your followers. Retweeting somebody else’s Twitter content has its own benefits - you create a good relationship with other influencers on Twitter, and it shows your followers that you’re an active member of your online community.

Track mentions

Know what’s being said about you by tracking brand mentions and keywords. This is a great method to provide distinctive customer service or to reach out to new customers. For instance, when someone is tweeting feedback on your products or services, take the opportunity to respond politely. And when you see someone tweet about their needs for a specific service you can provide, jump in to the conversation and introduce your company.

Integrate with other marketing efforts

Twitter is much more effective when integrated with your other marketing activities, such as email subscriptions. For example, if you’re running a promotion or contest via Twitter, let your email subscribers know about it, since they are another customer base who want to receive messages from you - that’s why they signed up in the first place.

If you want to implement Twitter to your business’s social media marketing campaigns, get in touch with us today and we can help.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
May 22nd, 2015

InternetSocRepMngmnt_May22_BHow often do you use your favorite search engine to check on a company’s products, services, and feedback before dealing with them? That’s exactly what most people do these days - they research a company and see what others have to say. The same thing applies to your business. If you have a bad online reputation, you’re going to feel it hit your bottom line hard. Managing and maintaining your online reputation is therefore as important as having one in the first place. Let’s take a look at the reasons your business needs a positive online reputation.

Trust and credibility

Trust and credibility are two important factors and could either make or break your business’s online reputation. If you can over-deliver on your customers’ expectations, there’s a good chance they will spread the word about their experience - and that’s great for your business. Take the time to earn your clients’ trust, and you’ll be rewarded with a strong brand image that will attract more potential clients for years to come.

Increased sales

Customers are more likely than ever to research brands, products, and services online before they make the decision to purchase. Make sure you have social media accounts ready, and ask your existing customers to follow you. Post regularly about your products, along with other valuable content related to the nature of your business to grab your customers’ attention. Personal interaction with customers is a great strategy to boost sales, so don’t let their comments go unanswered - see that you respond in a timely manner to every one of them to show that you value their business.

Online insights

Today, it’s very common to see negative feedback on a business’s social media pages. If things aren’t addressed properly, a negative comment or review could be the start of your business’s downfall, since they spread like wildfire online. By establishing an online presence you will gain a valuable insight into what your clients and competitors are saying about you and, if it’s something bad, you can step in and rectify the issue before it goes viral.

Show your best side

Potential customers are online right now, researching your company before doing business with you. Some of them don’t know you well enough to make immediate decisions, and so will judge your business on the basis of the information that is available to them. Whatever the products or services you provide for customers, once the feedback appears online, it sticks. This is a chance to present your company in a good light to attract more customers, which converts into increased revenue.

Always remember that it can only take a few seconds to destroy a brand’s online reputation that took years to build. Contact us today for advice on how to build an online reputation for your business.

Published with permission from TechAdvisory.org. Source.

May 21st, 2015

164_Office_BWith Google Apps and Office 365 revolutionizing the way people work, you may feel that Microsoft Office is quickly becoming a dated product that will soon be packed away to the back of the closet. But with the 2016 version set to launch in autumn of this year, Microsoft is looking to change your mind. Now they’re adapting their classic Office package for today’s modern workforce. Here are four of the new features that are reinventing the way you look at your Office applications.

Cloud focus for Outlook attachments

Microsoft knows that sharing attachments amongst co-workers and teams can be a hassle. With many collaborators still sharing documents and files the old fashioned way - attaching it to an email and then sending to others - it’s easy for users to get confused and send an incorrect or outdated version.

To solve this problem, Microsoft is gently nudging us to use the cloud. Now when you add an attachment to an email, you’re now asked if you’d also like to share a link to a file on your OneDrive, OneDrive for Business or SharePoint account.

Showcasing easy ways to use Office better

If you’re like most people, you probably aren’t using Office to its full potential. And who can blame you? Between Word, Excel, PowerPoint and more, there are literally hundreds of features and tools you can use - if only you had the time to discover them all.

To help you get the most out of Office, Microsoft has now added a Tell Me box in the top center of your program title bar. This tool gives you an easy way to get questions answered. For example, if you want to project your desktop screen to a second monitor or create a graph in Excel, simply type your question into the Tell Me box and Microsoft will find the answers that most closely fit your search criteria.

Sway

Look out PowerPoint, here comes Sway - the new, hipper Office application that makes creating fluid, stylish presentations easy. With Sway, you can now gather content from various sources across the web, and then easily organize it into a presentation that can be viewed on a smartphone, laptop, iPad or other device.

What makes Sway more exciting than PowerPoint is in the process of gathering content: simply drag files, photos or video from YouTube, OneDrive and various social networks into the app. Once you have your content, you can easily organize it and adjust your design to create a unique look and feel for your presentation.

Better Data Protection

With Office 2016, Microsoft has raised the bar for data security. Now administrators can set and enable Data Loss Protection policies for Word, Excel and PowerPoint.

Unlike in older versions of Office, administrators now have a range of security options at their disposal. For example, they can prevent data from being copied and pasted outside of Office 2016 applications, restrict files from being sent to certain individuals, and implement file-level encryption for Word, Excel and Outlook.

Want to learn more about Microsoft Office 2016? Have questions about other Office products? Give us a call.

Published with permission from TechAdvisory.org. Source.

May 18th, 2015

Healthcare&EMRGeneral_May18_AMany people in developing countries have limited access to high quality healthcare services. This is due to the fact that healthcare workers in remote areas have difficulty in identifying patients, who may have no birth certificate or passport, and whose medical records have previously been written on paper. This is where SimPrint come in - to provide healthcare staff easier access to the medical records for patients in the developing world.

Designed by a team of British postgraduate researchers, SimPrint is a miniature fingerprint scanner synced with a healthcare worker’s smartphone via an application that identifies a patient’s records.

How it works

SimPrint’s core function is to retrieve patients’ medical records via a quick, on-the-spot fingerprint scan. The device doesn’t actually hold the records itself - it merely connects with them via mobile apps, syncing information between the user’s smartphone and the server. The SimPrint system downloads and keeps a patient’s data in local storage on the phone, which means that healthcare workers can update medical records offline, even in areas with limited mobile connectivity.

The researchers have also been keen to protect user security and privacy. That’s why they make sure SimPrint never transfers raw fingerprint images, and employs powerful data encryption when information is transmitted between the phone and server, in order to prevent potential data breaches.

The features

  • Hardware - SimPrint’s hardware design consists of a double-layered circuit board, fingerprint sensor, and Bluetooth 2.0 module.
  • Connectivity - SimPrint can connect to any Bluetooth 2.0 compatible phone via a wireless network.
  • Compatibility - SimPrint can seamlessly integrate with nearly any smartphone device.
  • Security - SimPrint uses the same level of encryption found in online banking and financial systems.
  • Price - The SimPrint device costs $40 per piece, a price that healthcare organizations can afford.

Challenges

New healthcare devices are often faced with usability challenges, and SimPrint developers are currently working on improving the fingerprint recognition of infants, who have fewer unique identifiers on their fingerprints, and laborers whose rough hands could make getting a print difficult.

The British postgraduates received funding from the Gates foundation, established by Microsoft founder Bill Gates to improve global healthcare. Although SimPrint is in its early stages of testing, it is a promising and valuable tool in healthcare outreach in the developing world.

Looking to implement new technologies in your healthcare business? Drop us a line today and see how we can help.

Published with permission from TechAdvisory.org. Source.

May 14th, 2015

WindowsNews&Tips_May14_BMicrosoft is working to overcome the terrible reputation of Windows 8. The operating system was a major disappointment and was criticized badly by many who use it. Now Microsoft intends to stage a comeback by launching the all-new Windows 10. A raft of new innovations and features have been implemented into Windows 10, all of which are aimed at improving user experience. Microsoft has refreshed the overall appearance with a much cleaner, easier-to-understand design. Here are the key features of the new Windows 10.

Microsoft Edge

Windows 10 comes with a new Internet browser called Microsoft Edge. Formerly named Project Spartan until around three months ago, Edge is officially a replacement for the aging Internet Explorer. Edge allows you to add notes, while accessing web pages, for future reference. It also comes with a new reading mode that removes all the other distracting elements of a web page and leaves you with just the text. This allows for a good reading experience, not to mention faster loading time.

Cortana

Cortana is Microsoft’s personal assistant and the rival to Apple’s Siri. When Cortana first arrived in preview versions of Windows 10, there were several bugs and compatibility issues. But Microsoft has been working hard to address these. Just like on Windows Phone devices, you can interact with Cortana using either text or natural voice queries. Cortana can perform many basic tricks and tasks, such as taking notes, scheduling meetings, setting alarms, calling people on Skype, and playing music. She can also scour your computer, OneDrive account, and even your business network to find files based on your input.

Continuum

Windows 10’s Continuum feature is designed to make the OS work seamlessly on hybrid desktop and tablet devices. Users are able to switch between touch and desktop modes, depending on the device they’re using. When you unplug your keyboard and mouse, a small popup will appear asking whether Windows should switch to tablet mode. Once tablet mode is enabled, all the windows on the desktop will immediately go to full screen. On the other hand, if you plug in a keyboard and mouse, Windows 10 will launch another pop-up asking whether you wish to return to desktop mode. Another impressive feature of Continuum is the ability to connect your Windows Phone with a PC, essentially turning your smartphone into a pocket-friendly desktop.

Start Menu

The absence of the the Start menu in Windows 8 caused dissatisfaction among most Windows OS fanatics. Microsoft won’t make the same mistake twice. And so the Start menu will be returning to Windows 10 at the front and left of the home screen. When opened, the menu splits into two columns - one the traditional list of programs, the other app-style icons. A universal search function has been added to the Start menu, making for easier file browsing.

Windows 10 is made first and foremost for desktop users, whereas its predecessor Windows 8 was aimed at mobile and touchscreen devices. Microsoft has hinted that Windows 10 will be launching in late July 2015, available in 190 countries and 111 languages.

If you’re looking to incorporate Windows OS into your business, contact us today and see how we can help.

Published with permission from TechAdvisory.org. Source.

May 13th, 2015

164_Security_BIf you’re considering transitioning your business to the cloud, have you considered the security of the platform? While providers would like us to believe that the friendly fluffy cloud image used to market the service means it is automatically secure, the truth is that the reality is far different. Just ask one of the nearly seven million Dropbox users who had their accounts hacked. This is not meant to scare you, but only to make you aware that cloud security needs to be taken seriously - especially if you’re a business owner. To help you take the correct precautionary measures as you transition to the cloud, we’ve put together a list of actions you can take to ensure cloud security.

The cloud is playing more and more of a significant role in business. Yet, as more companies jump on the bandwagon, very few of them seem to be taking cloud security seriously. According to a recent survey, the "Security of Cloud Computing Users Study" , only 50 percent of those surveyed had investigated the security of the cloud services they used.

To ensure you put in place proper security measures when beginning your cloud venture, here are five actions every small business owner should take.

Ask your IT provider what cloud security policies they have in place - this is probably the single most important security measure you can take. Find a trusted IT provider and have a candid conversation with them about their cloud security policies.

Ask where the location of the physical cloud servers are - when you have “the conversation”, don’t forget to ask about this. Believe it or not, some cloud servers may not even be stored in your own country. Wherever they are, it’s wise to make sure they’re located in a safe data center area with proper security afforded to them.

Create unique usernames and passwords - your login credentials represent one of the cloud’s main security vulnerabilities. Take the time to come up with a better password than “12345” or “football.”

Use industry standard encryption and authentication protocols - IPsec (Internet Protocol Security) is a reliable technology choice.

Encrypt data before it’s uploaded to the cloud - whether you do it yourself or your cloud computing provider does it for you, this is a must to ensure security.

When it comes to trusting the security of a cloud service provider, transparency is key. The provider should take security seriously, be able to explain their security policies clearly, and be willing to answer any questions. If they can’t do one of these, it’s a clear sign of a red flag.

Are you ready to talk cloud security and transition your business into the cloud? Call us today. We’re happy to answer all your questions.

Published with permission from TechAdvisory.org. Source.

Topic Security