Blog

May 4th, 2009

Research conducted by SIS International Research and sponsored by Siemens found that small and midsized businesses (SMBs) with 100 employees could be leaking a staggering $524,569 annually as a result of communications barriers and latency. The study identifies these top five pain points, in order of estimated cost:

  • inefficient coordination
  • waiting for information
  • unwanted communications;
  • customer complaints
  • barriers to communication

In addition, researchers determined that the time spent per week dealing with communications issues was more than 50 percent higher in companies with more than 20 workers. In hard costs, your company could be losing up to half a million dollars each year by not addressing employees’ most painful communications issues!
The good news:  we can help you implement applications and services to greatly improve your inter-company communications, including collaboration tools such as email and shared calendards and address books, social media technologies such as blogs and wikis, and IP-based communication tools such as instant messaging (IM) and Voice-over-IP (VoIP). Call us today and let us help you stop this expensive leak.Related articles:

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
May 4th, 2009

Microsoft recently announced the release of the newest service pack to Microsoft Office 2007, and has finished work on the second service pack update to Windows Vista. The MS Office update includes a collection of stability and performance updates as well as support for more file formats including Open Document Format (ODF) and Portable Document Format (PDF) files. The Windows Vista update includes support for Bluetooth 2.1, an updated Windows search technology, and the ability to natively record data to Blu-ray discs. Download the Microsoft Office 2007 service pack to install and watch out for the Windows Vista update soon. Ask us how your workflow can benefit from these helpful new releases.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
April 28th, 2009

ConfickerThe past couple of weeks, a new malicious and particularly virulent worm known as Downadup, also more popularly known as Conficker has started to infect millions of PCs. In fact by some estimates, it has infected over 10 million PCs worldwide. As with many threats proper prevention can greatly reduce or eliminate your problem.

This worm is particularly dangerous as it can infect your PC in many ways. You can be infected by simply visiting your favorite Web site, downloading a file or email from the Internet, loading a USB drive, or just by leaving your networked computer on, overnight while you’re asleep.

The worm takes advantage of known vulnerabilities in Windows to spread. Its removal can be difficult, as it blocks many known antivirus software and associated websites. In some cases it even disables antivirus software already installed or the Windows Update service.
After infection, it may choose to run rogue software on the machine, or use it as a host to infect other machines. Particularly troubling, security experts believe, is that on April 1st, a new variant of the worm will begin to randomly check various websites on the Internet to download new instructions. What those instructions are unknown at this point and could be anything as harmless as telling a joke, displaying an ad or as harmful as destroying files or even stealing usernames and passwords.

The worm itself is not new, it made its first appearance late November 2008, known under the names Conficker or Kido. It shouldn’t have spread if people had made sure to the latest Windows and other updates were applied to their PCs and have kept up to date with their security vendors’ latest antivirus releases. Also since it spreads via network shares, making sure to use strong passwords on shared network drives would have helped to contain it early as well.
If you aren’t sure if your PC and network are protected, make sure to contact your IT service provider for advice.

Here are some other articles you might want to check out for more information:

Related articles:

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
April 27th, 2009

Looking for a website or online resource for Security Tips and Best Practices? Check out the Federal Trade Commission’s (FTC) OnGuardOnline program, which the FTC began in partnership with cybersecurity experts, online marketers, consumer advocates, and federal officials in 2005. While there, check out the articles and free resources such as videos, games, and downloadable files to help you guard against Internet fraud, hacking, and other security threats.The site also offers the following seven vital security practices:

  1. Protect your personal information. It’s valuable.
  2. Know who you’re dealing with.
  3. Use security software that updates automatically.
  4. Keep your operating system and Web browser up-to-date and learn about their security features.
  5. Keep your passwords safe, secure, and strong.
  6. Back up important files.
  7. Learn what to do in an “e–mergency.”

If you suspect Internet fraud, you can register a complaint using this form. The FTC enters Internet, telemarketing, identity theft, and other fraud-related complaints into Consumer Sentinel, a secure, online database used by law enforcement officials in the U.S. and overseas. Check out the site or contact your IT Consultant to help you implement the recommendations from the site.

Related articles:

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
April 27th, 2009

Social Media such as Blogs, Micro-blogs, Wikis, and Social Networks are not only helping many people communicate and connect, but are also powerful tools for business as well. They can be used to promote your products and services, engage customers in meaningful conversations, network and develop new relationships, or simply to distribute information about your business online. Recently, the media has been awash with reports about Facebook, LinkedIn and Twitter, but many of you may be unclear about the concept, or unsure of its relevance to your business activities. Learn more about this new media online. Get to know how these tools can benefit your business or contact your IT Consultant for advice.

Related articles by Zemanta:

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
April 3rd, 2009

April fool’s day came and went, but so far the much feared attack from Conflicker never materialized, leaving security researchers to ponder what’s next for the notorious Internet worm. Although it didn’t release any detectable malicious payload, the arrival of April 1 did trigger a change in its behavior, with experts finding a finding a changed domain generation algorithm that opens up unfettered communication to 500 of the 50,000 potential newly generated domains. The latest variant, Conficker C, now has the ability to contact its command and control centers for further instructions while circumventing interference from the security community, which up until now had been able to block communication with its parent domains. At this point users are still advised to patch their operating systems or to seek the assistance of their IT service providers to make sure all variants of the worm has been removed. Read more at Channel Web.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
April 3rd, 2009

Never before have startup entrepreneurs and small business owners had access to so much marketing advice and tools as we have today on the Web.  There are hundreds of free or near free tools out there that you can use: from sites that help you create your own logos, print your own business cards, set up your own website, even make your own marketing swag. There are literally hundreds of even more sites that in turn give advice on how to use these tools to market your business more effectively such as Inc Magazine, Entrepreneur Magazine, and Fast Company. Its easy to use your PC and Internet to help you grow your business—so get started today!

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
April 2nd, 2009

PC World posts a nice overview of the highly infectious Conflicker Worm. The Worm is dangerous as it uses several methods of attack. Once one computer in a network is infected, it often has ready access to other vulnerable computers in that network and can spread rapidly. The worm can download and install additional malware from attacker-controlled Web sites as well. Since that could mean anything from a password stealer to remote control software, a Conflicker-infected PC is essentially under the complete control of the attackers. Conficker and other worms are typically of most concern to small businesses that don’t regularly update the desktops and servers in their networks. If you’re not sure your network security is up to day get some help to find out.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
April 2nd, 2009

Janet Attard of The Business Know-How Blog posts 18 tips for small businesses considering outsourcing. She offers insight on how to get the best possible results from outsourced work. Among them:

  1. Know the results you want to achieve.
  2. Understand how long it should take to complete the work. (Ask others in your industry if you’re not sure.)
  3. Set a realistic time table for achieving results.
  4. Insist on all service providers and vendors document their work
  5. Offer feedback and praise

When it comes to your outsourced computer support and network management these are great tips to keep in mind.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
April 2nd, 2009

Microsoft announced that is has granted system builders a “flexible” delivery date of Windows XP licenses to customers beyond the official phase-out deadline of January 31, 2009. PC vendors still have to purchase licenses before that date, but can now choose to take delivery of those licenses through May 30, 2009. For all small businesses it’s important to have a plan to manage computer support for end-of-life products. If you’re not sure where you stand now might be a good time to get a thorough review of your licensing.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share