Blog

June 15th, 2010

Want to get rid of that annoying white box that appears around your logo when you place it in PowerPoint? ZDNet’s Techguide shares a useful tip on how to remove the background so your logo looks great on any color slide.  Read more

http://www.zdnetasia.com/remove-that-annoying-background-from-your-company-logo-62063214.htm

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
June 10th, 2010

Online security website OneITSecurity recently interviewed Charlie Miller, second-year Pwn2Own contest champion, and he shared several interesting insights on browser security – especially with the use of Adobe’s Flash plugin. In Pwn2Own, a contest held in CansecWest Conference, participants are offered a reward for finding vulnerabilities in popular software and operating systems.

Charlie’s interview is particularly relevant with the recent headline mentions of Adobe Flash with Apple’s refusal to make Flash work with their popular iPod, iPhone, and now iPad products, citing its instability and poor security. Microsoft, in its most recent Security Intelligence Report, pointed to Flash was as the most commonly exploited browser vulnerability in the first half of last year.

Charlie seems to share the same view, citing security issues as evidenced by the long list of security patches alone this past few months. His tip? Use Microsoft IE 8 on Windows 7 without Flash to be as secure as possible. If you can’t avoid using Flash, make sure you are using the most up-to-date version with all security fixes and patches applied.

Too busy to do it yourself? Get in touch with us and we can do it for you as one of the many tasks we take care of with Managed Services.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
June 5th, 2010

If you travel for business, chances are you need to connect to the Internet while on the road. Here are some tips to help:

Set up wireless access. If you travel frequently, sign up for a wireless data plan from your service provider. Depending on the features of your mobile phone, you can use it as a substitute for your laptop for accessing your emails or browsing the web. Some devices support tethering—where you use your device as a wireless modem for network access. Newer generation netbooks and laptops natively support 3G, which allows these devices to browse the Internet in places where WiFi is not available.

WiFi is your friend. If you haven’t signed up for a wireless data plan, your mobile phone is limited in its features, or you prefer to use a laptop that only has support for WiFi, do your homework and research whether your destination or nearby areas provide WiFi access.  Websites such as WiFi Hot Spot List, JiWire, and gWiFi.net provide a database of places offering free WiFi. HotelChatter.com provides an annual list of Best WiFi Hotels as well.

Dial-up as a last resort. You can always resort to dial-up if your location only provides fixed-line telephone access. Some ISPs still provide dial-up as an option and it’s a good idea to keep their access numbers just in case.

Feel secure with VPN. If you are accessing sensitive data while travelling, certain programs will ensure secure access via public Internet connections.  One example is the use of Virtual Private Network (VPN) software which can create a private network between two or more computers. If your company provides this service, use it. If not, contact us and we can set one up for you. Note that while you have access to office resources such as company file servers, printers and email as if you were there, you could possibly be restricted to the same security policies as well.

Interested in finding out more? Contact us to find out how we can help you stay connected on the road.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
May 31st, 2010

password tipThe average computer and Internet user manages over a dozen passwords for various websites. You probably have passwords for your computer, your company email, your personal online email accounts, your favorite social networking websites, your twitter feed, your online bank account, your favorite online store, and more. Using the same password for everything is not very secure, but keeping track of unique passwords for each can be a pain. Here are some quick tips to help you not only create secure passwords, but also easily manage them:

Do not use real words. Words such as “password”, “god”, “love” or some other common phrase can easily be guessed at by hackers. In addition, hackers use tools that automate guessing – randomly trying words from a dictionary one at a time until it gets it right.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
May 27th, 2010

picThere are few (if any) people who’ll tell you that technology has reached its limit. On the contrary, technology continues to grow every day, leaving information technology companies scrambling to keep up and not get left behind.

The demands of your industry can be taxing, but one way to make sure that you’re one of those at the top is to always keep your software up to date. Updating software will allow you to deliver your services in a more efficiently and effectively. Updates give you access to improved features that help you work faster and improve your overall output. Updates also fix bugs that cause problems you might not be affected by it now, but sooner or later will come back to bite you – so it’s best to avoid them altogether.

Another important reason to update involves security. New viruses and malware are constantly developed, and criminal identity theft rings are on the rise throughout the world. You need to guard against the damage that can be caused by malicious software. Your company’s continued operation, as well as the privacy of your data (and that of your clients), depends on up to date software – especially anti-virus programs.

Updating software is a key part of keeping your business on top of its game. Staying current may sound easy – but it can be difficult to make sure things stay secure and are compatible with your current hardware and applications. Don’t hesitate to give us call and find out how our Managed Services takes the headache out of staying up to date.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
May 24th, 2010

air travelThere are plenty of general tips at various websites and blogs for air travelers, but few address travelling with your laptop and gadgets in tow. The following advice will save you time and perhaps even make the trip a more pleasant experience.

Keep it light. Bring the absolute minimum you need. Stuff can easily get lost, shuffled around, or become quite heavy in a run from one gate to the next. If you’re a frequent traveler opt for a netbook or an ultralight laptop. And if a PDA or smartphone will serve your needs, use that instead.

Carry it on. Don’t put your gear in your check-in luggage – you’d be appalled at how your luggage is handled at some airports. It’s routinely stacked, thrown around, and dropped. Always bring your expensive electronic equipment on board with you.

Be prepared to unpack it. In many airports, you’ll be asked to unpack your laptop for x-ray. Normally you’ll be asked to put it in a bin on the conveyor belt for x-ray. Make sure to use a carrying bag that’s easy to open and repack.

Be alert. It’s very common for technology items to be stolen in airports and even on the plane. Never let your items out of your sight. Don’t leave them behind where they can get lost, and always be on guard.

Keep it accessible. Airport regulations require you to shut off your device during the takeoff and landing. Keep your devices easily accessible, preferably near your body or tucked into the pocket seat in front of you. If you have information stored in your phone or mobile device such as your itinerary, the person who is picking you up at the airport, rental car information, etc., you’ll thank yourself later for keeping it within easy reach.

Traveling can be exciting, but without the proper preparation can also be a pain. Hopefully these tips will help make your next air travel adventure more pleasant.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
May 22nd, 2010

manage serviceIndustry analyst IDC predicts that the global economic recession will have a dramatic impact on small and mid-sized companies. But that doesn’t means these companies will stop spending on information technology (IT).

“Small and mid-sized businesses…will be increasingly interested in the productivity gains made possible by advanced technology,” said Raymond Boggs, vice president of SMB research at IDC. “New mobile communications solutions, videoconferencing, and online resources will be especially attractive, as will alternative approaches to technology acquisition and deployment.”

The reason, says IDC, is that these advanced technologies can help reduce costs and provide growing businesses with an important competitive edge.

One way to gain access to these advanced IT technologies is through Managed Services, which offers smaller companies access to and quick deployment of affordable best-of-breed technologies. Managed Services is cost-effective because it offers companies a way to make use of precious capital by fulfilling their IT needs on a pay-per-use basis.

Who can benefit from Managed Services?

  • Smaller companies that don’t employ dedicated IT staff but want to take advantage of the latest developments in security, backups, messaging, and business communications.
  • Mid-size companies with some in-house IT staff that want to see productivity gains among by eliminating problems and downtime.

Contact us for more information about how our Managed Services can increase your productivity while saving your money.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
May 21st, 2010

disasterAs networks and devices become increasingly complex, more and more things can go wrong. As a result, disaster recovery plans have also become more complex.

Is yours good enough?

According to Jon William Toigo, the author of Disaster Recovery Planning, 15 or 20 years ago a disaster recovery plan might consist of powering down a mainframe and other computers, disassembling components, and drying circuit boards in the parking lot with a hair dryer. That’s because a disaster, in those days, was usually a fire that set off a company’s sprinklers.

Today, there are many more threats, including sabotage. Moreover, most companies’ IT systems are too large to be recovered using such a simple hands-on approach. Even if you could recover from a disaster in the manner Toigo recalls, you probably wouldn’t want to due to the downtime it would require—downtime that could have a significant financial impact.

Consider the case of Hurricane Katrina. When it slammed the U.S. Gulf Coast in 2005, it wiped out the communications infrastructure of a whole region, uprooting 1,000 wireless towers and knocking down 11,000 utility poles. Many businesses were forced to shut down entirely—even critical ones, including 25 hospitals and 100 broadcast stations. But clients of such company did stay in business—by relocating to off-site facilities equipped with the computing power and backed-up data to keep systems and services online. Some even utilized 18-wheelers with servers and other office equipment inside.

Disaster recovery in the modern age is a detailed, step-by-step course of action for quickly getting back on your feet after a natural or manmade disaster. The details may vary depending on your business needs, and can be developed in-house or purchased as a service.

How prepared are you for disaster? Call us today for a review of your plan.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
May 21st, 2010

It seems that even the most innocuous machines in the workplace can serve as a security threat to companies. According to this report from CBS News, many office copiers save the images they copy on a dedicated hard disk installed inside them. This means that everything from mundane memos to your most sensitive information such as financial statements and contracts are stored – and could potentially extracted.

So the next time you dispose of a copy machine, if you’re not sure what’s stored on it and how to get it off – give us a call to help out.

To see the news report, watch this video.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
May 21st, 2010

shortcut keyYou can create a keyboard shortcut for your favorite websites using Internet Explorer. Read more

http://www.computerhope.com/tips/tip1.htm

Published with permission from TechAdvisory.org. Source.
Bookmark and Share