Blog

October 8th, 2014

iPad_Oct07_AiOS 8 has been released, and for those who have an iPad 2 and newer, you have likely already upgraded. While the latest version of iOS does bring some great changes, there are reports that older devices have seen a dramatic increase in battery drain. This is never ideal, especially when you might expect a newer version of an operating system to increase battery life. To help, it could be a good idea to track apps using the most battery.

How to see the battery power apps are using on iOS 8

One of the first things you should do when you notice that your battery is draining faster than normal is to look at how much power each app is using. This can be done by:
  1. Tapping on the Settings app.
  2. Selecting General from the menu bar on the left-hand side of the Settings app.
  3. Tapping on Usage which is located in the menu that opens in the right side of the screen. Selecting Battery Usage.
In the window that opens you will be able to see basic battery information like how long you have used the device since its last charge, and how much power has been used. While this is useful in its own right, there is also valuable information about what apps are using the most power.

This data displays apps that are using the most power first, so you can quickly see what apps are power hungry and take action. In iOS 8, a new tab was actually introduced into the Battery Usage tracker, which shows a seven day running average of the most power hungry apps.

Tapping on the tab that says Last 7 Days at the top of the screen will bring this information up. This is useful because it gives you a better view of the truly power hungry apps.

What do I do with apps that are really draining my iPad's battery?

There are a number of things you can do, including:
  • Uninstalling the app: If the app with the highest battery drain isn't overly useful, then possibly the best step to take would be to uninstall it. Another option may be to look for a similar app and give that a try to see if it fares any better on battery use.
  • Change when you use the app: Some apps, like video recording suites, bandwidth or processing-heavy apps like games, drain your battery quickly when they are running. Instead of using them while on battery power, try to use them when your iPad is plugged into a power source.
  • Limit use until the app is updated: If you are experiencing battery drain, there is a good chance that other users are as well. You can either limit the use of the app until an app update is issued, (most updates will usually fix battery issues), or try to contact the developer directly. Take a look on iTunes for the app and you should see developer contact information there.
  • Dim the display: The iPad has a great display, and many apps look good when you have the display's brightness set at its brightest. The issue with this however, is that a super-bright display will drain your battery quickly. Try turning the display brightness down as low as possible in order to slow how fast the battery is drained.
  • Limit network connections: Similar to your display, having Wi-Fi or Bluetooth radios always on will also drain your battery. If you aren't connected to Wi-Fi, or don't have any Bluetooth devices, then it is best to turn them off. The reason for this is because if they are on, they constantly look for a connection which eats up battery power.
If you are looking for more ways to decrease or manage the power drain on your iPad contact us today to see how we can help.
Published with permission from TechAdvisory.org. Source.

Topic iPad
October 8th, 2014

AndroidTablet_Oct07_AFor most new Android tablets, or those running Android 4.4 and newer at least, one of the stock apps included with all devices is Google Hangouts. This chat app is available across all Android devices and various Google apps like Gmail. It enables users to chat on a number of devices, and has recently been updated with not only a new look, but calling features.

Looking at the new version of Hangouts

In late September, Google launched a new version of Hangouts for Android devices. With it came a new redesign that reflects the upcoming Android L's Material Design look. When you update and launch the app you will notice that it has changed slightly, with a light green bar across the top and three to four icons:
  • A person: Tapping this will show you your connections, ranked by frequent contacts first, then alphabetical after that. Selecting a contact will open up either a new chat (if you have never messaged the person before), or will open up an ongoing chat (if you have messaged them before).
  • A speech bubble: Tapping this will open up existing chats and SMSs (if you have a SIM card for your device) listed in chronological order.
  • A plus sign: Tapping this will allow you to search for a contact to either start a new chat with, or continue chatting with.
  • A phone: This is a new connectable app called Google Hangouts Dialer (more on that below). It may not show up on some devices.
Tapping your name at the top of the bar will slide a menu in from the left with a number of options including: Invites, Archived conversations, Moods, Settings, etc. Overall, the new update makes the app look much better and even easier to navigate.

Looking at Hangouts Dialer

Since 2009, Google has offered VoIP-like calling features through an app called Google Voice. People who signed up for this could make low cost or free calls to anywhere in the US and Canada, and some other countries as well. Like most other VoIP services, they could also call internationally for low rates.

Users in the US could also pick a local number which could be used for incoming calls. When anyone dialed that number, as they would any other mobile or landline number, the call would go over the Internet or data connection. What is interesting about this is that the number was free, so anyone with an existing data connection or Wi-Fi could theoretically obtain a free phone number.

Earlier this year, rumor broke that Google was going to be getting rid of Google Voice. Instead, the company announced that they would be merging it into Google Hangouts, thereby bringing VoIP calling and Google Voice features into the already useful chat app.

In mid September, shortly after the main Hangouts update, the company introduced the Hangouts Dialer app which, when installed, essentially turns the app into a phone. For those with Google Voice accounts, you will be able to migrate your account into Hangouts and continue using the service as you ordinarily would.

Migrating Google Voice to Hangouts

This migration can be done by launching either Hangouts or Voice. You should see a box pop-up on Hangouts asking you if you want to turn on phone calling in Hangouts. If you select yes, you will need to download the Hangouts Dialer app. From here, open the Google Voice app and you should see a blue box at the top asking you if you would like to migrate to Hangouts. Pressing Turn it on! will start the migration.

Once this is complete, you can use either the Hangouts Dialer or Hangouts app to place VoIP or Google Voice calls. For those who don't have Google Voice, or who live in an area where it isn't available, you can still call other contacts using Hangout's VoIP functionality. Just open a chat, and tap on the phone icon at the top of the screen.

This feature, while currently limited to users in the US and Canada, is great for tablet users who are looking for a way to connect to the office, but don't want to shell out for both a tablet and a phone. If you would like to learn more about this app, or how Android tablets can fit into your organization, contact us today.

Published with permission from TechAdvisory.org. Source.

October 2nd, 2014

Security_Sep29_AWith the ever growing number of security threats faced by businesses around the world, the vast majority of business owners have adopted some form of security measures in an effort to keep their organizations secure. But, how do you know the measures you've implemented are actually keeping your systems safe? Here are five ways you can tell if your security measures aren't sufficient.

1. Open wireless networks

Wireless networks are one of the most common ways businesses allow their employees to get online. With one main Internet line and a couple of wireless routers, you can theoretically have the whole office online. This method of connecting does save money, but there is an inherent security risk with this and that is an unsecure network.

Contrary to popular belief, simply plugging in a wireless router and creating a basic network won't mean you are secure. If you don't set a password on your routers, then anyone within range can connect. Hackers and criminal organizations are known to look for, and then target these networks. With fairly simple tools and a bit of know-how, they can start capturing data that goes in and out of the network, and even attacking the network and computers attached. In other words, unprotected networks are basically open invitations to hackers.

Therefore, you should take steps to ensure that all wireless networks in the office are secured with passwords that are not easy to guess. For example, many Internet Service Providers who install hardware when setting up networks will often just use the company's main phone number as the password to the router. This is too easy to work out, so changing to a password that is a lot more difficult to guess is makes sense.

2. Email is not secure

Admittedly, most companies who have implemented a new email system in the past couple of years will likely be fairly secure. This is especially true if they use cloud-based options, or well-known email systems like Exchange which offer enhanced security and scanning, while using modern email transition methods.

The businesses at risk are those using older systems like POP, or systems that don't encrypt passwords (what are known as 'clear passwords'). If your system doesn't encrypt information like this, anyone with the right tools and a bit of knowledge can capture login information and potentially compromise your systems and data.

If you are using older email systems, it is advisable to upgrade to newer ones, especially if they don't encrypt important information.

3. Mobile devices that aren't secure enough

Mobile devices, like tablets and smartphones, are being used more than ever before in business, and do offer a great way to stay connected and productive while out of the office. The issue with this however is that if you use your tablet or phone to connect to office systems, and don't have security measures in place, you could find networks compromised.

For example, if you have linked your work email to your tablet, but don't have a screen lock enabled and you lose your device anyone who picks it up will have access to your email and potentially sensitive information.

The same goes if you accidentally install a fake app with malware on it. You could find your systems infected. Therefore, you should take steps to ensure that your device is locked with at least a passcode, and you have anti-virus and malware scanners installed and running on a regular basis.

4. Anti-virus scanners that aren't maintained

These days, it is essential that you have anti-virus, malware, and spyware scanners installed on all machines and devices in your company and that you take the time to configure these properly. It could be that scans are scheduled during business hours, or they just aren't updated. If you install these solutions onto your systems, and they start to scan during work time, most employees will just turn the scanner off thus leaving systems wide-open.

The same goes for not properly ensuring that these systems are updated. Updates are important for scanners, because they implement new virus databases that contain newly discovered malware and viruses, and fixes for them.

Therefore, scanners need to be properly installed and maintained if they are going to even stand a chance of keeping systems secure.

5. Lack of firewalls

A firewall is a networking security tool that can be configured to block certain types of network access and data from leaving the network or being accessed from outside of the network. A properly configured firewall is necessary for network security, and while many modems include this, it's often not robust enough for business use.

What you need instead is a firewall that covers the whole network at the point where data enters and exits (usually before the routers). These are business-centric tools that should be installed by an IT partner like us, in order for them to be most effective.

How do I ensure proper business security?

The absolute best way a business can ensure that their systems and networks are secure is to work with an IT partner like us. Our managed services can help ensure that you have proper security measures in place and the systems are set up and managed properly. Tech peace of mind means the focus can be on creating a successful company instead. Contact us today to learn more.
Published with permission from TechAdvisory.org. Source.

Topic Security
October 1st, 2014

BCP_Sep29_AMany business owners and managers readily acknowledge the fact that they need to be prepared for a disaster, and most do have backup-plans in place should something actually go wrong. The thing is, it can be difficult to actually know if your plan will be enough to see your business through a disaster. What can help is knowing the common ways business continuity plans (BCP) fail.

There are many ways a business continuity or backup and recovery plan may fail, but if you know about the most common reasons then you can better plan to overcome these obstacles, which in turn will give you a better chance of surviving a disaster.

1. Not customizing a plan

Some companies take a plan that was developed for another organization and copy it word-for-word. While the general plan will often follow the same structure throughout most organizations, each business is different so what may work for one, won't necessarily work for another. When a disaster happens, you could find that elements of the plan are simply not working, resulting in recovery delays or worse. Therefore, you should take steps to ensure that the plan you adopt works for your organization.

It is also essential to customize a plan to respond to different departments or roles within an organization. While an overarching business continuity plan is great, you are going to need to tailor it for each department. For example, systems recovery order may be different for marketing when compared with finance. If you keep the plan the same for all roles, you could face ineffective recovery or confusion as to what is needed, ultimately leading to a loss of business.

2. Action plans that contain too much information

One common failing of business continuity plans is that they contain too much information in key parts of the plan. This is largely because many companies make the mistake of keeping the whole plan in one long document or binder. While this makes finding the plan easier, it makes actually enacting it far more difficult. During a disaster, you don't want your staff and key members flipping through pages and pages of useless information in order to figure out what they should be doing. This could actually end up exacerbating the problem.

Instead, try keeping action plans - what needs to be done during an emergency - separate from the overall plan. This could mean keeping individual plans in a separate document in the same folder, or a separate binder that is kept beside the total plan. Doing this will speed up action time, making it far easier for people to do their jobs when they need to.

3. Failing to properly define the scope

The scope of the plan, or who it pertains to, is important to define. Does the plan you are developing cover the whole organization, or just specific departments? If you fail to properly define who the plan is for, and what it covers there could be confusion when it comes to actually enacting it.

While you or some managers may have the scope defined in your heads, there is always a chance that you may not be there when disaster strikes, and therefore applying the plan effectively will likely not happen. What you need to do is properly define the scope within the plan, and ensure that all parties are aware of it.

4. Having an unclear or unfinished plan

Continuity plans need to be clear, easy to follow, and most of all cover as much as possible. If your plan is not laid out in a logical and clear manner, or written in simple and easy to understand language, there is an increased chance that it will fail. You should therefore ensure that all those who have access to the plan can follow it after the first read through, and find the information they need quickly and easily.

Beyond this, you should also make sure that all instructions and strategies are complete. For example, if you have an evacuation plan, make sure it states who evacuates to where and what should be done once people reach those points. The goal here is to establish as strong a plan as possible, which will further enhance the chances that your business will recover successfully from a disaster.

5. Failing to test, update, and test again

Even the most comprehensive and articulate plan needs to be tested on a regular basis. Failure to do so could result in once adequate plans not offering the coverage needed today. To avoid this, you should aim to test your plan on a regular basis - at least twice a year.

From these tests you should take note of potential bottlenecks and failures and take steps in order to patch these up. Beyond this, if you implement new systems, or change existing ones, revisit your plan and update it to cover these amendments and retest the plan again.

If you are worried about your continuity planning, or would like help implementing a plan and supporting systems, contact us today.

Published with permission from TechAdvisory.org. Source.

September 25th, 2014

WindowsPhone_Sep25_AThe app is arguably the most integral part of any smartphone operating system. It is apps that give our devices the functionality we all want, and the number of apps available is constantly growing. Because of the increase, we are also seeing a rise in malicious software that makes its way onto app stores like the Windows Phone Store. These can pose a security risk, but the question is, how you can spot malicious apps and report them.

To begin with, we should make clear that app store hosts like Microsoft do have strict security measures in place that strive to keep malicious software off of stores and therefore users' devices. That being said, there is always a chance that an industrious hacker can subvert these security controls and get their app onto the online stores. To counter this, here's four tips on how you can spot fake or malicious apps.

  • Look at the name - If you are looking at an app on the Windows Phone Store, always look at the name of the app. Some malicious software that has made its way onto the Store has had a spelling mistake in the name. If in doubt, do a quick search on the Internet for the app and the correct spelling. Should nothing turn up, it may be a good idea to avoid it.
  • Look at the publisher information - All apps for Windows Phones require that the developer/publisher includes information about the app and themselves. If you are looking to download what seems like a popular app, take a look at the listed producer or developer, and then search on the Internet for their site. If the developer of the app appears to be different, or there are differences in the spelling, it is best to avoid installing it.
  • Look at social media stats - On the Windows Phone Store, below the install information, are counters for social media likes and shares. If the app information states it is a popular app and yet there are no social shares, then this may indicate it is actually fake. You should therefore err on the side of caution.
  • Look at comments - Lastly, look at the comments/reviews of the app. The Windows Phone Store uses stars to provide a quick overview of how much people like each app, but if you read comments you can quickly get an idea of exactly what people say about specific apps. If you see words like Fake, Doesn't work, etc. then it is a good idea to skip installing it.
While it can help to be able to identify apps, you should also know how to report apps that you believe are malicious or fake. You can do so by:
  1. Opening the app's page on the Windows Phone Store.
  2. Scrolling down and clicking on Report concern to Microsoft.
  3. Selecting from a list of complaints. Note: Pick the one that is most appropriate to the issue, for example if it is a fake app then select Misleading app.
  4. Pressing Submit.
The plus side of the Windows Store is that Microsoft does usually act quickly to remove identified apps, so the actual chances of you downloading one are fairly low. But, it is always better to be safe than sorry. If you are looking to learn more about Windows Phones and how they can fit into your organization, contact us today.
Published with permission from TechAdvisory.org. Source.

September 25th, 2014

AndroidPhone_Sep22_AMobile operating systems incorporate a huge number of similarities when compared to desktop systems, with one of the most useful being the ability to create folders. On Android devices, folders are used to group similar types of apps together, thereby reducing the space taken up by icons. If you have an Android device, do you know how to manage your folders?

Creating folders

On most devices, when you install a new app the icon will be automatically added to your home screen, or onto a screen where there is space. While this is useful, many of us have a large number of apps installed, and it can be a bit of a chore actually finding the icon you are looking for.

The easiest solution is to group icons together into a folder. This can be done by:

  1. Pressing and holding on an app on your device's home screen.
  2. Dragging it over another app and letting go.
You should see both of the icons moved into a circle and kind of hovering over each other. This indicates they are now in a folder. It is important to note that these folders only appear on your home screen. If you combine say Facebook, Twitter, and LinkedIn apps into a folder on your home screen, they will not be put into a folder in your app drawer.

Naming folders

When you create new folders, you will notice that there is no text below the icon as there is with other icons. This is because you need to name the folder, which can be done by:
  1. Tapping on the newly created folder.
  2. Tapping on Unnamed Folder in the pop-up window.
  3. Naming the folder.
  4. Pressing Done at the bottom of the keyboard.
The name you assign to the folder will show up under each icon on your home screen. If you are going to use different folders, it is a good idea to pick names related to the apps they contain. For example, if you put all of your email apps in one folder, call the folder 'Email'. This will make your apps easier to find.

Adding/removing apps from folders

You can easily add apps to folders by either dragging them from the home screen over to the folder and letting go, or:
  1. Opening your device's app drawer (usually indicated by a number of squares).
  2. Finding the app you would like to put into a folder.
  3. Pressing on it, and holding your finger down until the home screen pops up.
  4. Dragging it over the folder you would like it to be placed in.
  5. Letting go.
If done right, the app's icon should be automatically dropped into the folder. You can also remove apps from folders by tapping on the folder where the app is, pressing on the app, then dragging it up to Remove, which should appear at the top of the screen. This will remove it from the home screen, but will not uninstall the app. You can also tap on the app and move it out of the folder to an empty place on the home screen.

Moving folders

You can move a folder's location the same way you do so with an app: Tap and hold on the folder until the screen changes slightly and drag it to where you would like it to be. On newer versions of Android, the apps should all move to make room for the folder.

Deleting folders

Finally, you can delete a folder by either dragging all of the apps out of the folder, or pressing and holding on the folder until the screen changes and dragging it up to Remove. This will remove the folder and all the stored app icons, but it won't delete the apps.

If you have any questions about using an Android device, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

September 24th, 2014

SocialMedia_Sep22_AFor many small to medium businesses, social media has become an integral part of their overall business strategy. Most businesses have a presence on at least one platform, but one issue many business owners and managers struggle with is how they should be using social media effectively. To help, here is an overview of the three most common ways small to medium businesses use social media.

1. To be a resource for existing and potential clients

This approach is by far the most popular used by businesses of all sizes. The main idea here is that social media is used as essentially a two-way street where you can pass information about the company, products, and industry to your followers. In turn, they interact with the content and eventually start to turn to your profile and page when they are looking for information.

One of the best ways to be successful with this approach is to provide your followers with information about the company, facts, tips about your products and industry, and links to other relevant content.

By sharing content, users will generally interact with it more and begin to see your company as a reliable source of information. This often translates into enhanced brand awareness and potentially sales.

The downside with this approach however, is that it can be time consuming to constantly develop new content. Most companies eventually reach a point where what they produce and share is pretty much the same, and overall payoffs begin to decrease. One way around this is to work with professionals to come up with dynamic and different content.

2. To provide customer service/support

These days, when someone has a problem with a company's services or products, the first port of call for complaints is often social media, largely because it's the most convenient place to vent where you can get instant reactions.

It therefore makes sense to create support or customer service presence on these channels. Some companies have even taken to launching support-centric profiles, where customers can contact them about anything, from complaints to questions, and receive a personal answer. For many companies this is ideal because it eliminates the hassle of customers having to call a support line and dealing with automated machines.

This approach can prove useful for businesses because it often makes it easier to reach out to disgruntled customers and track overall brand satisfaction. The downside is that you will need someone monitoring services 24/7, and to respond in a timely manner which may be tough to do for many smaller businesses.

3. To sell something

There are an increasing number of businesses who have launched social media profiles with the intent of selling a product or service. The actual sales may not take place through social media but the information on these profiles and platforms channels potential customers to an online store or to contact a company directly. Social media's instantaneous nature makes for a tempting platform, especially when you tie in different advertising features and include content like coupons, and discounts.

While this hard sales line can be appealing to businesses, many users are seemingly put off of companies with profiles that only focus on selling via their platforms. The whole idea of social networking is that it is 'social'; this means real interactions with real people. Profiles dedicated only to trying to sell something will, more often than not, simply be ignored.

What's the ideal use?

One of the best approaches for small to medium businesses is to actually use a combined approach. Most people know that ultimately, businesses with a presence on social media are marketing something, but focusing solely on this could turn customers off.

A successful split that many experts have touted is the 70-20-10 rule. This rule states that you should make 70% of your content and profile focused on relevant information to your audience. 20% of content should be content from other people and 10% of content should be related to selling your products or services e.g., promotional.

If you want to use social media for support as well, it is a good idea to create a separate profile dedicated just to this end. If complaints are lodged or noticed using your main account, direct them towards the support account.

As always, if you are looking for help with your social media strategy, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
September 19th, 2014

Security_Sep15_AData breaches are growing both in number and intensity. While many businesses have turned to cloud apps for better security measures, some experts and businesses worry about the cloud, mentioning that it could see an increased data breach risk. This leads to a collision course between data breaches and cloud usage. But it doesn’t have to end in a fiery crash, as there are steps you can take to prevent a cloud and data security breach.

The cloud opens up some great tech advancements for businesses and is here to stay. However, as with all tech developments, you need to also be aware of any vulnerabilities and security issues as they change and develop at the same time too. If you use the cloud and want to proactively prevent cloud-and-data security breaches then here are five tips to follow:

  1. Know your cloud apps: Get a comprehensive view of the business readiness of apps and which ones render you more or less prone to a breach. Ask yourself these questions: Does an app encrypt data stored on the service? Does it separate your data from that of others so that your data is not exposed when another tenant has a breach? The idea here is to know exactly what each cloud service employed offers and how your company uses them.
  2. Migrate users to high-quality apps: Cloud-switching costs are low, which means that you can always change and choose apps that best suit your needs. If you find ones that don’t fit your criteria, take the time to talk to your vendor or switch; now more than ever you have choices, and the discovery process in step one will help you find out what these are.
  3. Find out where your data is going: Take a look at your data in the cloud. Review uploads, downloads, and data at rest in apps to get a handle on whether you have potential personally-identifiable information (PII), or whether you simply have unencrypted confidential data in or moving to cloud apps. You wouldn’t want cloud-and-data breaches with this critical data.
  4. Look at user activities: It’s important to understand not only what apps you use but also your data in the context of user activity. Ask yourself: From which apps are people sharing content? According to tech news source, VentureBeat, one-fifth of the apps they tracked enable sharing, and these aren’t just cloud storage apps, but range from customer-relationship management to finance and business intelligence. Knowing who’s sharing what and with whom will help you to understand what policies to best employ.
  5. Mitigate risk through granular policy: Start with your business-critical apps and enforce policies that matter to your organization in the context of a breach. For example, block the upload of information covered by certain privacy acts, block the download of PII from HR apps, or temporarily block access to vulnerable apps.
The key to preventing a cloud-and-data security breach lies in careful attention to your cloud applications and user activity. Analyzing your apps and looking into user activities might be time consuming, but the minimization of cloud-and-data security breaches makes this task worthwhile. Looking to learn more about today’s security? Contact us and let us manage and minimize your risks.
Published with permission from TechAdvisory.org. Source.

Topic Security
September 18th, 2014

Productivity_Sep15_AAlmost every employee in every role relies on technology in order to do their job. When technology is working, everything hums along and productivity is solid. The second our technology stops working however, we can find ourselves struggling to even complete the most basic of tasks. The result can be a dramatic drop in overall productivity. The thing is, we know our systems will eventually breakdown. But, do you know what to do when this actually happens?

What to do when your systems stop working

Often, our first reaction when our technology or systems stop working is to either panic, or get angry. Once we are over this, we often feel desperate to get the problem fixed but may be at a loss as to what to do.

When technology does breakdown, here are some recommended steps you should take:

  • In the words of Douglas Adams, "Don't Panic!" - One of the more popular quotes from the immensely successful Hitchhiker's Guide to the Galaxy is "don't panic". This rings true for the vast majority of tech problems. While you may feel like you are facing a big issue at the time, most systems can be fully recovered. This is especially true if you have backup solutions in place.
  • Note what you were doing before the problem occurred - This is an important step, as when something does go wrong, one of the first things tech support will ask you is what you were doing before the problem occurred. The more information that you can give them, the more likely they will be able to solve the problem faster.
  • Ask your colleagues if they are having the same problems - Because so many business systems are networked together, many techs will want to see if problems are localized to your computer or are network wide. Armed with this information, it is far easier to work out the most effective solution.
  • Try turning it off and on again - When faced with many tech problems, you will be asked to turn the system - be it your computer, an app, server, etc. - off and on again. Sometimes the fault lies in the software or short-term memory (RAM) of systems, and turning the system off and on again is enough to fix this.
  • Google it - If an issue persists and it is related to the software on your computer, or a website, try searching the Internet for an answer. If the page doesn't load, you then know the problem is related to the Internet connection. Should the problem be with a cloud service, checking the provider's website or social media feeds is useful to check for post status updates of their systems.
  • Don't rush into a supposed fix - It can be tempting to try out the first supposed fix you come across or someone suggests. The problem is, some 'fixes' can actually end up harming a system even more. For example, you may find suggested fix for a phone that has been dropped into water that says to take the device apart and dry it with a blow dryer. This will damage components, and also void your warranty, which could make the issue even more expensive to deal with. Instead, you should seek the advice of an expert like us.
  • Don't overreact - Have you ever felt so frustrated you have wanted to reach out and smack your computer? While this may make you feel better on one level the reality is that you could make a bad situation worse. When faced with any tech troubles it is best to walk away for a short time so that you can deal with the situation in a calm and collected way.
  • Call your IT partner or IT helpdesk - If the system doesn't work after restarting we strongly recommend stopping there and reaching out to your IT helpdesk or an IT partner like us. We have the experience to investigate the problem, and we can usually come up with an answer and hopefully a fix in a short amount of time.

Preventative steps you should take

While it is inevitable that systems will eventually breakdown, it doesn't mean we are powerless to prevent this from happening, or at least minimizing the potential fallout. One of the easiest preventative measures you can take is to try and take care of your devices and systems. This includes being careful to not physically damage them, while also being sure to watch what you install on your systems, and implementing security standards.

We also strongly recommend working with an IT partner like us. We can help manage your systems and implement measures to keep them working long into the future. Beyond that, we can help monitor systems so that should something start to go wrong, we can begin to implement a fix even before you notice it. And, if something should break down, we can either fix it ourselves or recommend an expert who will be able to help.

Looking for help keeping your systems running and employees productive? Contact us today to learn more about our services and how they are designed to help.

Published with permission from TechAdvisory.org. Source.

Topic Productivity
September 17th, 2014

BusinessValue_Sep15_AOne way to really expand your online presence is through content marketing. Many business owners and managers are aware of this, but may be unsure as to how they can ensure that any content marketing is successful. There are many ways in which you can achieve a good result and here are four tips to help you achieve a great content marketing strategy.

What are the benefits of content marketing?

Before looking into ways you can implement content marketing that works, it is a good idea to look at the benefits of this type of marketing for businesses. One of the biggest pluses is that it boosts online engagement between you and your customers. If a customer sees that you are producing quality content that appeals to them, they will be more likely to interact and consider you when they need your products or services.

The other major advantage of a good content marketing strategy is that it helps show search engines like Google that your website and online presence are active. Because of the way search engines work, more active sites are usually ranked higher in results. If your website and overall Internet presence is seen to be active on a regular basis, you could possibly reach the first page of search results, which can lead to a boost in site visits, inquiries, and even sales.

If you have been considering implementing a content marketing campaign, or are looking to improve your existing efforts, the following four tips could help.

1. Always have a goal

The main thrust of many successful content marketing initiatives is that they tell a story. As with any narrative there needs to be an ending and in the case of content marketing this endpoint is a goal - something you want the reader to do. What do you want to achieve? Do you want customers to call? Do you want them to learn how to use your product?

By working backwards, you can then determine the right voice to use and best way to reach those customers who are most likely to react positively to the content. This also makes it easier for you to separate your campaigns and even launch multiple strategies at the same time.

Beyond this, having a goal can really help you narrow down the type of content you need to create. If for example, you know what customers you want to attract and how you want them to ultimately act, you can create content that is more appealing to them.

2. ABT

One of the most popular sayings amongst content marketers is to, "Always Be Testing (ABT)". When developing content you should be striving to test your content. Consider if certain images work better than others, as well as headlines, layouts, and content types, etc.

This could be as simple as developing three different social media posts and testing them with different market segments, or locations. You can then take what you have learnt from the tests and apply this to future posts.

The same can be said for more advanced content like blog posts or white papers. If you create different versions and layouts, and track the general downloads and interaction with the content, you can usually figure out how various people are reacting in different ways to a variety of content.

It is important to note here that content marketing is not a quick payoff style of marketing. You need to invest time, money, and effort into this and be willing to always be tweaking content. It takes time to pay off, but the time invested in testing what works and what doesn't work will help you develop better, more useful content.

3. Share and share alike

Creating content and just putting it on existing sites or sharing it with existing clients is not the most efficient way of making your content marketing show returns. Combine this with the fact that you will likely be using platforms like social media which are constantly changing and adding new content, and there is a good chance your content won't even be seen.

What you should aim to do is to share the content as much as possible. Share it on all of your social media platforms, link to it on your site, add it to emails, use the various social media content promotion features, and most of all: Share it again.

If you truly believe content is useful to your target market, you should aim to post it at least three to four times on social media. One of the most effective strategies is to share it on different days at different times, usually with a space of at least a week or two between posts. This can help maximize the numbers who see it.

4. Be prepared to fail

Failure is a part of business, and coincidently, it is also a part of content marketing. Face it, you might create content that just simply won't click as you intended. If this happens, your first reaction might be to pull the content and try something different. This may not be a good idea.

Sure, if the content is stirring up trouble, or has offended people, then it is likely best to remove it. But even if you aren't seeing the results you had hoped for, stick with the content for a bit. Try reposting it, and promoting more vigorously. It could very well be that users just didn't see the content.

As we stated above, successful content marketing takes time and effort. Once you realize this, and combine it with the fact that not everything will work, you should see a viable strategy surface over time.

If you are looking to learn more about content marketing and how our systems can help support it then get in touch and we can share our thoughts on how to be proactive and get results.

Published with permission from TechAdvisory.org. Source.