Blog

October 2nd, 2009

social networkingSocial Networking websites are usually associated with consumer services such as MySpace and Facebook. But did you know that there are literally dozens of social networking websites out there specifically targeted toward businesses? InsideCRM.com’s editors have compiled a list of the top “50 Social Sites That Every Business Needs a Presence on” which is available online at their website.

This list is divided into five categories:

  1. Social-Media or Social-Bookmarking Sites, which allow users to share their favorite websites or track and vote upon various online articles and resources.
  2. Professional networking sites, which allow networking among organizations and individuals for business purposes.
  3. Niche sites, which target a specific community of users in a particular industry, profession, or with specific shared interests.
  4. General social media sites, which have business applications such as the popular Twitter service.
  5. Job sites, which are geared towards recruitment and talent management.

Head out to InsideCRM.com to find out more.

Related articles:

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
October 2nd, 2009

Etiquette for the Electronic AgeFrom the heavyset computing devices of Charles Babbage to today’s simple novelty items, electronic devices and gadgets have become smaller, more functional, and more integrated into our daily lives. With mobile phone calls, SMS, and email we are seemingly in constant need to be in touch with other people electronically.

And therein lies the problem. Many people seem to put such a high priority on immediately replying to electronic communication that they often unintentionally offend the people they are actually physically with. For example, how does that colleague doing the “Blackberry Prayer” during a meeting – hunched over a handheld device, texting and emailing – make you feel?

Here are a few etiquette tips when using our electronic devices:

  • When in meetings, turn your phone off – or at least put it in silent mode.
  • Check your messages and return calls and emails after meetings, not during them. It’s much more polite to explain to a caller or email sender that your response was delayed because you were in a meeting rather than explaining to everyone with you that the person on your phone is more important than them.
  • If you are expecting an urgent call you must take, inform others about it before the meeting begins. When your phone vibrates, excuse yourself quietly and take the call outside.
  • Never wear an earpiece while in a meeting.
  • Don’t use your mobile phone or PDA while you are talking to somebody – it gives the impression that the person you are talking to is unimportant and insignificant.
  • Loud ringtones are inappropriate for certain settings, so make sure they’re off at the right times.
  • If you need to use speaker phone, ask the person on the other line for permission first, and announce who else is in the room with you. Many people are (understandably) uncomfortable not knowing who else may be listening to them.
  • While in video conferences, treat the people on the other end of the line as if they were actually in the room with you. No discreet playing of Plants vs. Zombies on your iPhone while the brand manager from the other end of the line is giving his sales report – regardless of how boring it may be.

Remember: electronic correspondence can never replace actual human interaction and conversation. Even though we’re in the electronic age, the old saying still applies: “Politeness is to human nature what warmth is to wax.”

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
October 1st, 2009

smb securityA recently released a report entitled “Voice of IT: State of SMB IT”, detailing  purchasing, technology usage, and IT staffing trends among small and medium businesses worldwide. The report surveyed over 1,100 IT professionals working in SMBs, 80 percent of whom were decision makers or influencers within their respective companies.

Not surprisingly, a substantial number (39 percent) of the companies surveyed cut their IT budgets in 2009, with an average cut of 22 percent from 2008 levels. Among the areas where companies are saving money is hardware, with the average planned lifespan for machines such as desktops, laptops, servers, and switches increasing by 26 percent.

Despite this, a significant number (31 percent) report that budgets remained flat, while as many as 30 percent reported an increase in budget in 2009 from the previous year. Among the areas where companies are investing money is in software, specifically security software. 46 percent of SMBs indicated that they plan to invest in antivirus and antispam software, while 38 percent plan to put their money in data backup and recovery software. A growing trend is virtualization, with 30 percent of participants planning to invest in virtualization solutions.

How does your company compare? Do you think your company is investing enough in IT security? Contact us now to see how we can help you invest your IT budget where it brings the most value.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
September 22nd, 2009

watchout_dirty_websiteIn a previous post, we pointed out how just browsing the web these days can possibly infect your PC with malware. To show how dangerous surfing can become, Symantec recently released their list of the “Dirtiest Websites of Summer” – the top 100 infected sites on the Internet based on number of threats detected by their software as of August 2009. The list identifies websites that could compromise security with risks including phishing, malicious downloads, browser exploits, and links to unsafe external sites.

Some interesting findings from the study:

  • The average number of threats per site on the Dirtiest Websites list is roughly 18,000, compared to 23 threats per site for most sites
  • 40 of the Top 100 Dirtiest Sites have more than 20,000 threats per site
  • 48% of the Top 100 Dirtiest Web sites feature adult content
  • 3/4 of the Top 100 Dirtiest Web sites have distributed malware for more than 6 months
  • Viruses are the most common threat represented on the Dirtiest Websites list, followed by security risks and browser exploits

You can read more about this research at Symantec’s website. If you suspect your PCs are at risk, or if you want to ensure your website doesn’t get hijacked by cybercriminals, contact us. We can help.

Related articles:

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
September 19th, 2009

More SMBs usingA recent study by the Kelsey Group reveals that more small and midsized businesses are using digital media, specially the Internet, to promote or advertise their business. Their study, conducted with research partner ConStat, indicates that the penetration of digital/online media increased from 73 percent in August 2008 to 77 percent in August 2009, while that of traditional media such as TV, radio, and print decreased from 74 percent to 69 percent during the same period.

This is a clear indicator that the Internet has become an important source for many businesses to generate and manage their business. Potential business can come anywhere – from their website, queries in search engines, online ads, and lately even social networking sites. According to the study, for businesses that track lead sources, the percentage that does so using the Internet has increased from 22 percent in 2008 to 30 percent in 2009.

Although the Internet can often be a scary for many SMB’s and their prospects place with threats such as spam, malware, phising, and more, this study reveals that it is still a source of tremendous value for those who know how to use it effectively.

Related Information:

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
September 18th, 2009

Small Firms BeingOrganized criminals believed to be based in Eastern Europe are robbing small to midsized US businesses of millions of dollars via an elaborate scheme aided by malicious software. Recent reports reveal that over the past few months, several businesses have fallen victim to unauthorized fund transfers whereby hundreds of thousands of dollars from the businesses’ bank accounts have been transferred to accounts in Europe, and in some cases, to the accounts of willing or unwitting accomplices in the United States.

According to the reports the victims, usually the company CFO or owner, were sent malicious software as attachments to email, which when opened remained resident on the victims’ machines and stole the victims’ passwords to their online banking websites. The cybercriminals used this information to initiate transfers from their accounts of up to US $10,000 at a time to evade notice and detection from their bank’s anti-fraud or money laundering detection systems and protocols.

Your business might be at risk. Make sure you are protected from this type of fraud by securing your PC and network from malicious software. Do not open suspicious-looking attachments and make sure you have the necessary protection in place, such as firewalls, antivirus software, and other methods of protection. Need help? Contact us today.

Related articles:

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
September 16th, 2009

remote_supportAs a result of the past year’s economic climate, many small and medium-size businesses have increased their efforts to mitigate risks and lower costs—and more and more are turning toward remote IT support to fulfill those goals.

Remote support tools allow IT providers to support an entire company’s computing infrastructure, wherever and whenever needed, from their own offices. This helps address the needs of a market that significantly benefits from doing more with less— small and medium businesses.

Some of the benefits of remote support include:

  • No travel time. As long as the issue doesn’t require on-site support, you won’t pay for time spent traveling to your site.
  • No waiting. Response time is faster because support staff can address your needs immediately with online access to your machines and servers.
  • Less work interruption. Because support can be done remotely, much support work can be done after hours, or behind the scenes as you continue to work. No more downtime while support staff takes over your physical desk.
  • Lower costs. IT support staff can work on all of your computers simultaneously from their own offices, saving time – and therefore money.
  • Proactive monitoring prevents problems from ever happening. Instead of waiting to come out and fixing your infrastructure when it’s already broken, remote support provides ongoing network monitoring, management, and unlimited remote support that prevents problems from occurring in the first place – all for one fixed monthly fee.

Contact us today for details on how our remote IT support solutions can help your business stay on track.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
September 3rd, 2009

what_is_virtualizationVirtualization is generating a lot of buzz in IT circles these days because it promises to dramatically change the way many companies manage and operate their IT infrastructure. Virtualization is a broad term that covers the creation of virtual computing resources—such as storage, the network, or even an entire machine. For example, using virtualization you can create virtual machines on one computer, each running its own operating system.

According to research from the Yankee Group, 26% of medium businesses (100-499 employees) and 43% of enterprises (500+ employees) are using server virtualization today, and within 24 months, the percentage for medium-sized businesses is expected to increase to 69%. Among small businesses (20-99 employees), 23% are using server virtualization in production servers, and 8% of very small businesses (2-19 employees) are following suit.

Here are some examples of how you can take advantage of virtualization:

  1. Reduce capex and opex. If you run a fair-sized organization with multiple servers, you can reduce your capital expenditures for new equipment or upgrades by purchasing a smaller number of machines and running your server workload off of them. Over time, this will reduce operating expenses because you’ll have fewer machines to maintain, less power and space consumed, and more machines more fully utilized.
  2. A cost-effective way to keep IT running. Some virtualization solutions include features that allow virtual machines to quickly recover in case of disaster or application downtime. Virtual machine loads can be transferred in real-time from one physical machine to another. This means that your accounting application or warehouse management system will always run even if the original machine it’s installed on goes down – if it’s installed on a virtual machine that can intelligently transfer the application to a standby system.
  3. Test multiple types of machines and run multiple applications on different operating systems. With machine virtualization, you can run multiple operating systems on a single PC. Thinking of running Windows 7 but are afraid some applications might not run properly on it? Use virtualization to run Windows XP within Windows 7. Want to use a Mac but your email is tied to Outlook? No problem! Buy a Mac, and use third party software to run Windows inside it.

Curious about virtualization and how it can help your business? Contact us today to explore ways that virtualization can increase your efficiency and lower your costs.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
September 2nd, 2009

healthy_computingCarpal tunnel syndrome and eyestrain are two of the most common conditions that affect habitual computer users. Whether or not these conditions pose serious health risks remains a subject of debate, but it’s safe to say that no one wants to suffer them. Both conditions are painful, and can affect your productivity. The good news is that there are simple ways to prevent suffering from either condition.

How to prevent eye strain:

  • Never stare too long at your monitor. Blink occasionally and use eye drops to avoid dry eyes.
  • Rest your eyes regularly for about 2-3 minutes. If you have time, take a power nap (5-15 minutes) – this not only gives your eyes a rest, but also gives your brain and body a well-deserved break.
  • Use glare-resistant glasses or a glare reduction screen for your monitor.
  • Avoid working in too-bright environments.
  • Reduce the brightness of your computer screen.
  • Place your monitor at least 20 inches from your eyes. If you can’t read the screen, increase the size of your windows. You may also want to visit an optometrist to see if you need glasses or a new prescription.

How to prevent carpal tunnel syndrome:

  • Adjust the height of your chair so that your arms and wrists are level with the keyboard.
  • Move and click on your mouse lightly.
  • Perform this wrist exercise several times throughout the day:
    1. Stretch your arms out in front of you, palms facing out – as if you were doing push ups. Hold for 5 seconds.
    2. With arms still stretched, straighten your wrists and relax you hands.
    3. After a few seconds, make tight fists and point them downward with your wrists. Hold for 5 seconds.
    4. Repeat step 2.
    5. Let your arms hang at your sides and then give them a gentle shake

Try incorporating these easy, quick, and safe tips into your daily routine. If they become habits, they’ll help you avoid the inconvenience and pain of carpal tunnel syndrome and eyestrain.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
September 1st, 2009

phishers_DollarsAnother reason to keep your computer malware free: cyber-pirates raided several businesses as well as a school in recent attacks through the Automated Clearing House (ACH) Network.

The losses, which ranged from $150,000 to more than $400,000, were accomplished by the crooks in mere minutes. Luckily for these companies, the banks managed to reverse some of the transfers. If they hadn’t, the losses would have amounted to $700,000 up to a whopping $1.2 million.

The modus operandi of the hackers is simple. Making use of the ACH network, they send out “phishing” emails to account holders. When the recipient clicks on the link, malicious software – a Trojan horse or virus – automatically downloads itself to the recipient’s computer, allowing the hacker to infiltrate the system. Keylogging software (software that tracks keystrokes) is installed, which gives phishers access account numbers, names, and passwords. They then divert the company’s funds into their own accounts.

ACH fraudsters can also use the same method to not only siphon off money into their own pockets, but also to establish “ghost employees”, which they insert into the payroll and qualify to receive regular paychecks.

While banks are doing their best to strengthen the system, they can only do so much, and experts admit that the ACH network is a very old system compared to today’s standards. The volume of money that flows through the ACH is also so massive that it is difficult to keep track of specific amounts for specific accounts.

Despite its shortcomings, the ACH system still remains widely used, and the best defence is to guard your system well. For our clients, we have firewalls and anti-malware software in place, but you should also make sure your bookkeepers and staff are briefed on how to avoid being the victim of fake phishing emails.

If you have any questions or concerns please give us a call.

For more details about this story, visit http://www.computerworld.com/s/article/9136334/Cyber_attackers_empty_business_accounts_in_minutes?taxonomyId=17&pageNumber=1.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share