Blog

February 20th, 2012

Heard of BYOD, or "bring your own device", to work before? More and more companies are letting or even asking their employees to bring their phones or laptops to work. There are obvious benefits, but also dangers that may not be as obvious. Read on to find out what they are.

You may have noticed more and more of your employees or colleagues bringing their own computing devices to work—be it their mobile phone, tablet, or laptop. Or perhaps in your company or in other companies you may have seen, they have let people decide which device they prefer because they are used to it at home. You may not realize it, but this is all part of a large trend called the "consumerization" of IT, in which the influence of consumer technology is being increasingly felt in the workplace. With the wide availability of cheap but powerful mobile devices and online services, a growing number of people are being exposed to the latest technology at home first—adopting them at a rate faster than most businesses are able to manage. This flips on its head the old paradigm in which traditionally new technologies would be rolled out to businesses first, before they would find their way to consumers.

This trend, plus the increasing sophistication of young workers today and their frustration with the tools available to them at the office, is pushing some companies to adopt a "bring your own device" or BYOD policy at work. They are not alone. According to research by technology analyst group Gartner, end users, not the IT department, will soon be responsible for 50 percent of business IT procurement decisions—ultimately bringing and running their own systems on company networks. Meanwhile, according to management consultants Accenture, around one-third of today's younger generation of workers (a group called "millenials") not only wants to use the computer of their choice at work, but also wants control of the applications they use too.

The benefits companies cite to adopting a BYOD policy are many, among them:

  • Savings on capital expenses and training costs in using company equipment—compensating employees instead via other means such as flexible work hours, subsidized purchases, insurance, and other benefits.
  • Less management headache—effectively letting employees decide what to use releases the company from some overhead and management responsibilities.
  • Improved employee satisfaction—by giving employees the freedom to use devices and applications that they prefer.
However, before you consider letting employees bring their own personal technology to the work place, be aware that there are also disadvantages, and sometimes very real dangers in doing so. These include:
  • Non-standardization of hardware, operating systems, and applications. If your business operations require that some equipment is integrated with others, then BYOD can in the long run actually increase IT management costs and decrease efficiency.
  • Exposing your network to malware or security vulnerabilities and breaches. When your employees bring their own devices to work, you lose important control over their security. Consumer devices often don't employ comparable bullet-proof security technologies mandated by businesses.
  • Leakage of confidential or proprietary information. Employees will naturally do what they want with the data on their devices, even if it doesn't belong to them, or it's against company policies. Employees can also lose precious company data when they misplace or damage their personal devices.
  • Lower economies of scale in procurement. Essentially because everyone is buying devices on their own, you miss out on the chance to consolidate purchases and lower purchase costs for everybody.
Have you adopted a BYOD policy at work? Thinking about it? Worried about this trend? If you need to understand BYOD better so you can define a policy for your staff, contact us and see how we can help.
Published with permission from TechAdvisory.org. Source.

February 16th, 2012

A few years ago, Voice-over-IP or Internet telephony was touted as the next big wave in technology. However, it previously came with a big price tag—but not anymore. With the great strides made in technology the last few years, VoIP is now readily within reach for many businesses—large or small.

If you are running a business, then there is no reason you shouldn't be using Voice-over-IP, or VoIP, to reduce telecommunications cost, streamline operations, and improve the flexibility for your organization today.

VoIP, simply put, allows telephone communications to run over your data network or the Internet. The benefits of this setup are many, and the following are just a few.

  1. VoIP allows companies to maximize investments already made in their network infrastructure. The same network which handles the flow of data such as web access and email can now accommodate voice as well—no need to add and maintain additional wires and devices.
  2. VoIP can allow you to dramatically reduce the cost of communications, especially for interstate or international communications—everything can go through the Internet instead of incurring expensive long distance toll charges.
  3. VoIP allows your employees to be more productive and efficient by giving them the ability to receive and make calls anywhere with a data connection, using their laptop, mobile phone, tablet, or virtually any device connected to the Internet.
  4. VoIP increases the number of features you can use with your phone system. For example, it's easier to add extensions to your phone. You can provide a local number or extension for all your staff without additional costs or cabling. You can also set up sophisticated auto answering routines and call routing. You can marry voice messages with email and faxes all in one inbox.
  5. You can use VoIP as a tool for real-time collaboration—along with video conferencing and screen sharing. You can employ presence technologies that come standard with VoIP phones and VoIP communication systems. Communicate with colleagues about your presence or receive info on the status and whereabouts of your staff.
Previously, all these benefits were only available with a big price tag and a critical limitation—the unavailability or unreliability of the company's Internet connection—but not anymore. With the great strides made in technology and the wide availability and affordability of broadband connections over the last few years, VoIP is now readily within reach for many businesses—large or small

VoIP is certainly a technology that has come of age. It's cheap, ubiquitous, and easy-to-use, and any business should have VoIP in their toolset. If you are interested in learning more about how VoIP can help your business, contact us today to find out more!

Published with permission from TechAdvisory.org. Source.

February 14th, 2012

Connecting to wireless hotspots is common nowadays as people travel more, use more portable devices, and are allowed the freedom to work from anywhere. However they can be terribly unsecure. Here are tips you can use to securely connect to hotspots.

Wireless internet access, or WiFi, is now so common that it can be found virtually anywhere—in airports, shops, restaurants, and other public spaces. The near ubiquity of these wireless "hotspots" can be a great boon for many of us who need Internet access to check on emails for work or updates from friends on our favorite social network.

Unfortunately not a lot of people know about the risks these wireless hotspots potentially pose. Here are 8 ways to ensure you can surf securely from wireless hotspots:

  1. Disable your WiFi adapter when not using your wireless device. This ensures that your device does not connect to any wireless hotspot without you knowing it.
  2. Connect only to secure hotpots. In many places, open networks implement no password and no encryption, potentially exposing everything you send out from your computer to malicious hackers. Therefore, whenever possible it's best to connect in places where some encryption—either WEP or WPA, is employed. Often your device will show a lock icon to identify secure, password protected and encrypted hotspots vs open and unsecured ones.
  3. Use VPN or Virtual Private Networking. VPNs allow you to establish a secure channel of communication to your office network over the public Internet.
  4. Use only secure software. The use of software is also something you should be aware of—some browsers , instant messengers, email clients, and online services are more secure than others. So use the more secure ones such as those that implement some sort of encryption or similar methods whenever possible.
  5. Disable sharing. If your device or operating systems share resources such as folders, printers, and other items, consider turning them off to lessen the possible entry points into your system which malicious hackers or software can exploit.
  6. Use a firewall. For example, most modern desktop computers have a firewall built in which acts as a barrier between your device and malicious software and hackers. These can bar from entry or filter out any attempts to access to your system without your approval.
  7. Encrypt files. If you have sensitive files on your computer, consider encrypting them so you can avoid having them fall into the wrong hands if your system does get compromised.
  8. Remove sensitive or confidential information from your device before using hotspots. This is the safest way of ensuring that your valuable data isn’t compromised when connecting to hotspots.
Wireless hotspots can be great for anyone traveling on business or for those always on the road. Being proactive regarding the security issues that you might encounter can go a long way in ensuring your safety and privacy when using them. If you or others in your business need to go online using hotspots, we can help you set up your machines for secure access by implementing security software, consulting on software security, and more. Contact us today to find out more.
Published with permission from TechAdvisory.org. Source.

Topic Security
February 13th, 2012

While there are a lot of free tools, applications, and software available on the Internet, it can be a chore sorting out the good from the bad. To make things easier for you, here are a few handy tools you can use to boost productivity while saving on costs.

It is a constant challenge for small businesses to meet ever-changing and ever-evolving IT requirements while balancing a budget and keeping costs reasonable. And with software applications being one of the major factors that contribute to IT maintenance costs, it is always welcome news to come across free tools that work well and efficiently despite the lack of a price tag.

ThinkFree Online Office One of these applications is ThinkFree Online Office, which is a cloud application that enables you to create and edit documents in common formats. It also comes with free 1GB of storage and allows you to work from anywhere, since the documents are stored online. And with its own app for Android users, ThinkFree is particularly advantageous to people who need to work on the go.

ReqMan Another free cloud-based application that can prove useful is ReqMan, an online project management tool. You can use this to manage and track your different projects using various templates the service provides. And since it's in the cloud, mobile personnel and staff who are given access to your ReqMan account can work even when they're out of the office.

Gliffy Gliffy is a free tool that you can use to create all sorts of technical illustrations – diagrams, floor plans, flowcharts, and more. The basic plan is free, but you also have the option to subscribe to their more fully featured plans for a minimal fee.

ScheduleOnce For managing schedules, calendars, and the like, ScheduleOnce allows you to keep better track of all your appointments, meetings, and deadlines through a single tool. It integrates with your calendar on Google, and then allows other people to see your open times when they can schedule a meeting with you. Think of it as a one-stop-shop for your scheduling needs.

If you want to know more about these tools and how you can best utilize them, please feel free to contact us. We’ll be happy to guide you and help you make the most out of these types of applications to improve your efficiency and bottom line.

Published with permission from TechAdvisory.org. Source.

February 3rd, 2012

The AutoRun feature in Windows for thumb and other portable storage devices is a double-edged sword. While making file management and access for portable storage much easier and faster, it also enables certain types of malware to access and install themselves onto your system.

One of the most common entry points of malware and viruses into a system is through USB thumb drives. Besides the fact that these little drives, while versatile, get plugged in to numerous CPUs which increases the risk of them picking up some sort of infection, the AutoRun feature on most (if not all) portable drives enables certain malware to automatically install itself into the system the USB is currently plugged into.

The AutoRun function is not harmful by itself – it was originally designed for more convenient file management and use of portable drives. However, a number of malware and viruses have harnessed this function to enable easier entry into an otherwise secure system.

The most feasible solution, besides running frequent security checks against any portable drive that's plugged into your system, is to disable AutoRun. This will cost you some convenience in the short run, but will gain you much more system security. There are several system utilities that can disable AutoRun for you, or you can do it through the Windows registry.

If you want to know more about disabling AutoRun and making your system more secure from various modes of infiltration or attack, please contact us so we can discuss possible custom solutions that best meet your needs.

Published with permission from TechAdvisory.org. Source.

Topic Security
February 1st, 2012

Desktop Virtualization is starting to gain the attention of more and more businesses with its promise of simplifying IT management, strengthening IT security, and ultimately gaining new efficiencies and cost savings in the business. Read on to find out how.

There is growing interest in Desktop Virtualization with its promise of improved manageability, security and efficiency for the business. Simply put, Desktop Virtualization is new technology that separates the system software such as the operating system and applications from the underlying hardware.

Desktop virtualization allows the hardware, like a laptop or a server, to run multiple operating systems. Imagine having your Mac running Microsoft Windows and Office, or your Dell running OS X and GarageBand for example. To stretch the concept even further, operating systems and applications can be housed on remote machines – such as a server farm in Texas – which you access via the web. The applications are not resident on your computer at all.

Desktop virtualization shifts the burden of managing the system software from you or your in-house IT teams to someone else—people who can do a better job managing and updating your Windows and Office software than you can. If you have a fairly large organization managing a large number of machines, centralizing support allows the organization to gain from economies of scale—ie less people to manage more machines at less cost. Leveraging the computing power of server farms with faster machines also allows employees to get more value out of aging desktops and laptops.

Enabling anytime, anywhere access to applications and data, Desktop Virtualization connects your employees to the tools they need no matter where they are. As organizations support more and more remote employees, using desktop virtualization technology gives them access to their Windows desktop anywhere in the world, at any time, on any device.

Are you supporting remote workers or is your hardware slowing down your employees? Let's talk about Desktop Virtualization and how you can try it for your organization today.

Published with permission from TechAdvisory.org. Source.

January 31st, 2012

Simply put, Business Intelligence (BI) tools make the process of slicing and dicing large amounts of data easier and faster, so you can gain insight into data to make better decisions. BI tools allow you to view and manipulate large amounts of data and present it in user-friendly format such as via tabular reports or visual charts and graphs.

There has been plenty of coverage about BI for large enterprises, business intelligence is just as important for small businesses. BI is simply using tools to view, manage, and manipulate what are often large sets of data from the past to be able to gain insights into the future. BI is a type of application software that businesses employ to manage their businesses better—often working along or in concert with their data, transaction and customer management systems.

Some of the common types of BI tools include data querying and reporting software, online analytical processing systems(OLAP), data mining and data visualization systems, digital dashboards, business process and business performance management systems, geospatial systems, and others.

The most widely used BI tool is the common spreadsheet, Microsoft Excel. Most businesses already own and use Excel, so it is easy to understand. If you are using a spreadsheet to help you make sense of your data to make better decisions, you are already using BI. But as your business grows, and the volume of data you need to manage grows along with it, it may be time to consider upgrading to more powerful tools.

Is it time for your business to move beyond Excel? Let us show you how easy BI can be. Contact us so we can help you get started.

Published with permission from TechAdvisory.org. Source.

January 30th, 2012

The big difference between Android and the iOS is the fact that, on an Android device, you can play Flash videos. There are times however when this seeming advantage can be a disadvantage as Flash (such as Flash ads) can slow down your browsing experience or even crash your browser. There is a solution.

You can turn off Flash if you choose to. Simply go to your Browser's Settings by pressing on the Menu/Options button, then go to Advanced and change 'Enable plug-ins' setting from "Always on" to "On demand." Flash applications will now appear as an arrow that you must touch to start.

Published with permission from TechAdvisory.org. Source.

Topic Tech Tips
January 30th, 2012

There are times when you may want to capture what is currently being shown on your iPad's screen. That’s easy to do on an iPad.

Simply press the Home button and then the Sleep/Wake button simultaneously. When you hear a click, the screenshot has been taken. You can then go to the photos gallery to see all of your captured screenshots.

Published with permission from TechAdvisory.org. Source.

Topic Tech Tips
January 16th, 2012

Headaches using printers usually don't have anything to do with hacking, but now they do. Recent research done by experts from Columbia University have discovered a flaw in many printer systems that are connected to the Internet a flaw that allows easy entry by hackers into the networks printers serve.

When it comes to printers, we usually think about ink, paper jams and minor irritations but certainly NOT getting hacked. But recent research suggests that printers can be used by hackers to infiltrate computer systems.

According to researchers at Columbia University, printers that are connected to the are the weakest (and almost always unnoticed) link that can compromise an otherwise secure system. Details are emerging, as the research was done under government and corporate grants. The Federal Bureau of Investigation got the first look at the research results, followed by people from Hewlett-Packard. What is clear is that this new research reveals that printers CAN be used by hackers or online thieves not only to infiltrate networks, but also to steal personal information and even identities.

The security flaw involves the printer software used to run "embedded systems" which enables both advanced functions and connects the printer directly the Internet. Alarmingly, researchers were able to hack into a printer, and give it instructions to continuously heat up the part of the device that dried the ink after it’s applied to the paper. The resulting heat caused the paper to turn brown and smoke.

The implications of this type of security flaw are concerning, but can be addressed properly and promptly with the right planning. HP is looking into the study for their own line of printers and business owners should also take precautionary steps to protect already installed devices on their networks.

If you want to know more about how you can ensure that your systems are secure, give us a call so we can sit down with you and discuss a security blueprint that meets your specific needs.

Published with permission from TechAdvisory.org. Source.

Topic Security