Need Customer Support?click here

Posts Tagged as general articles (page 11)

Working Smarter and More Efficiently with Instant Messaging

Are you avoiding instant messaging (IM) for fear that it will distract your employees and cut productivity? In fact, the opposite may be true. What is IM? IM is software that allows you to communicate in real time with other people who have the same software. It’s like email, but instantaneous. IM was originally considered a way to stay in touch with friends and family, but lately it’s taken off in the workplace. That’s because IM offers a fast, convenient way for employees to interact with colleagues or clients in real time. In fact, many cutting-edge employers now encourage their employees to use IM instead of phone calls or e-mails. Benefits include: Increased productivity: Workers can remain at their workstations instead of walking across the office or picking up the phone to obtain information, and the need for time-consuming meetings is reduced. Real-time communication with vendors and customers. Connection of traveling employees through mobile devices. Where can you get it? While there are many free IM services available such as AOL, Yahoo!, Skype, and MSN, many companies now offer solutions specifically designed for business. We can work with you to determine the best solution for your specific needs How to get started: Select a single provider. Expand services as needed. While basic IM may be adequate for some small businesses, others may benefit from expanded offerings, such as text conferencing, pop-up messaging, and email integration. Make sure your information is protected from external threats such as hackers and viruses. Create a usage policy to avoid internal misuse. Ensure that all employees know the rules and have installed the software on their systems. To be effective, your IM application should be carefully integrated with your existing IT system and workflow. Give us a call today and we’ll help you through these steps to implement a secure and productive IM solution.

Continue reading »

Go Green!

These days there’s a lot of buzz about “ going green ” – helping preserve the environment, conserving energy, and looking for sustainable ways to grow the economy. The IT industry is doing its part as well, with “ green computing ,” which is basically computing by more efficient and sustainable means. You can get on board with some of the suggestions below: Save on energy, save on costs: A lot of today’s computing devices feature power management features and energy saving modes, thanks largely to US government efforts to develop energy-efficiency standards called Energy Star. This is a voluntary labeling program adopted by many vendors to clearly identify and promote their efforts in bringing down energy costs for customers as well as to showcase their own use of eco-friendly production processes and materials. When you purchase Energy Star products and make full use of their features, you not only help the environment but also save significantly on your energy bills. Reuse and Recycle: Consider retiring old equipment and replacing it with more energy-efficient models. Reuse what you can (such as RAM modules, cables, controller cards, and drives), and find a reputable recycler to help you dispose of remaining parts safely. Consolidate what you have: Be eco-smart about your purchases. Advances in technology such as machine virtualization now allow you to consolidate computing resources on fewer machines, such as all-in-one printers, saving not only upfront capital costs but also recurring operating expenses such as maintenance, space, power, and cooling. Over time this means less equipment goes into landfills, better utilization of resources, and more money freed up to apply where it counts – to growing your business. Do more with less: Instead of travelling, consider teleconferencing. Instead of hiring full time, onsite employees consider telecommuting arrangements. Not only do you reduce your carbon footprint by reducing transportation impact but also save a considerable amount of time and money as well. Outsource IT: For non-core elements of your operations, consider outsourcing , which leverages economies of scale by sharing resources among several customers without losing efficiency or effectiveness. For example, instead of hosting your own website, outsource it to a hosting service provider instead. We have lots of ideas for going green at your office and saving energy costs along the way. Give us a call and we’ll be glad to share them with you.

Continue reading »

The Greatest Threat to Your Security May Be Your Employees

While everyone is worried about security threats outside the  company’s firewall such as hackers, viruses, and worms, research suggests that the greatest risk may come from none other than the company’s very own employees. Not all of these risks are necessarily borne of malicious intent on the part of employees. Some risks may come from unwitting participation, temptation, or simply ignorance. Here are just some examples of security risks you should watch out for: Data theft. With the ease with which employees can connect small devices and transport data outside the company’s four walls, the risk of your sensitive data falling into the wrong hands becomes very real. Set up clear guidelines and policies regarding the use of removable storage media . You can, on your own or with the help of your IT consultant or service provider, lock down your PCs to disallow connection to removable drives or portable media devices if appropriate. Data loss. Accidents happen. Set up backup systems so that you can recover data quickly in case employees accidentally delete a file, are unable to secure a PC from viruses and worms, or are careless with the physical state and functioning of their assigned PCs. Data leaks. With the proliferation of multiple channels of online communication such as e-mail and IM , the threat of employees leaking sensitive company data to outside parties is very real. Provide clear guidelines and policies for the proper use of these communication channels in the workplace, and if needed, set up methods to block access to these services. Ask your IT consultant for help. Intellectual property violations. Illegal downloads or the illicit sharing of copyrighted material can also pose a significant threat to your organization. Legal action or the loss of your company’s hard-earned reputation can be debilitating and difficult to get over. Online Phishing and E-mail Scams. In phishing or e-mail scams, deception is used to gain unauthorized access to confidential data. Make sure you or your IT consultant set up filters to block such e-mails, or use security software to block access to this type of website. Lax/missing access controls. Be prudent and place access control policies on key information resources within your organization, such as e-mail or your accounting system. Provide each employee with access only to relevant information needed to complete his or her particular job. It’s not easy to protect yourself from security breaches, especially when they come from within your organization. Get advice from an expert. Contact your IT Service provider today to find out more. Related articles: Workers ’stealing company data’ (news.bbc.co.uk) Gasp! Fired workers are taking confidential data (news.cnet.com) A multilayered strategy helps neutralize internal security threats (techrepublic.com)

Continue reading »

Instant Messaging for Business

Instant Messaging , or IM, can be a boon for any business because it saves time, improves efficiency, and even enables greater employee/customer intimacy. IM allows real-time communication and interaction between two or more people via the Internet , and its use is growing steadily. IM provides users with instant feedback about the presence of online “buddies” or users you know – for instance, whether they are online, busy, or currently offline, what they are currently doing, and whether they are able to successfully receive your communication. Even when one party is not currently connected to the Internet, you can leave offline messages for later viewing. Information sent can be in the form of text, media, and recently even voice and video. While IM has traditionally been used for quick and instant personal interaction such as chatting between friends and family, people are now finding that it can be effective in business as well. But before diving in and using IM in your organization, be aware that there can be significant risks. For instance, it can expose the company to outside threats such as hackers and viruses, or from problems from within such as employees sharing secret or sensitive information to outside or unauthorized parties. Finally, if not monitored properly, it can be a huge timewaster if employees spend their time chatting with colleagues, family, and friends instead of working. Here are some tips to get the most out of IM safely and effectively within your organization: Create guidelines for use . Let employees know of the dangers and risks in using IM. Create policies to allow the use of IM only for certain people within the organization (such as sales) and only during certain times of the day. Ask your IT consultant to configure your network to enact the restrictions you want. Standardize . Choose one piece of IM software (such as Google Talk, AIM or MSN ) and try using it internally first. You won’t be able to prevent some employees from adding buddies outside of work, so make sure to ask them to separate buddies inside the company from those outside. IM software allows you to easily create “buddy lists” to do this. Know when to use it . IM is a tool that can complement e-mail on one end and voice calls on the other. Consider using e-mail for detailed information sharing or communications such as memos, requests, letters, and proposals that readers need to refer to repeatedly. Consider using voice calls for more intimate interaction, clarifying communication, or in cases when you need to build rapport with the recipient. IM can be something in between the two, such as when you need to ask a quick question, send a short update, or get presence information . Keep it short . Keep IMs short and direct. In IM, unlike in voice conversations, you don’t need to do go through pleasantries. Unlike email, because of their real-time nature, IMs can be intrusive so be conscious of what the other party is dong and to make it brief and to the point when necessary. Use your status to your advantage . IM software allow you to set your status (i.e., Busy or Away) to let others know if you are free to take their messages. You can also set your status to Invisible so that you can be aware of others’ presence but be invisible to others. Set your preferences . Most IM software allow you to control certain behaviors, such as window pop-ups, whether to archive messages or not, whether to startup automatically when you log in, and much more. Explore the features of your software and use them to your advantage.

Continue reading »

The Conficker Threat – Be Prepared

The past couple of weeks, a new malicious and particularly virulent worm known as Downadup, also more popularly known as Conficker has started to infect millions of PCs. In fact by some estimates, it has infected over 10 million PCs worldwide. As with many threats proper prevention can greatly reduce or eliminate your problem. This worm is particularly dangerous as it can infect your PC in many ways. You can be infected by simply visiting your favorite Web site, downloading a file or email from the Internet, loading a USB drive, or just by leaving your networked computer on, overnight while you’re asleep. The worm takes advantage of known vulnerabilities in Windows to spread. Its removal can be difficult, as it blocks many known antivirus software and associated websites. In some cases it even disables antivirus software already installed or the Windows Update service. After infection, it may choose to run rogue software on the machine, or use it as a host to infect other machines. Particularly troubling, security experts believe, is that on April 1st, a new variant of the worm will begin to randomly check various websites on the Internet to download new instructions. What those instructions are unknown at this point and could be anything as harmless as telling a joke, displaying an ad or as harmful as destroying files or even stealing usernames and passwords. The worm itself is not new, it made its first appearance late November 2008, known under the names Conficker or Kido. It shouldn’t have spread if people had made sure to the latest Windows and other updates were applied to their PCs and have kept up to date with their security vendors’ latest antivirus releases. Also since it spreads via network shares, making sure to use strong passwords on shared network drives would have helped to contain it early as well. If you aren’t sure if your PC and network are protected, make sure to contact your IT service provider for advice. Here are some other articles you might want to check out for more information: Related articles: The Conficker worm’s evil genius. (slate.com) Conficker Worm Draws a Counter-Attack – PC World (domainmacher.com) FAQ: Conficker worm (cbc.ca) Your Quick Guide to the Conficker Worm (shankrila.com) Windows PC Worm Set to Activate on April 1st (littlegreenfootballs.com)

Continue reading »

The ROI Series – Calculating the ROI of a Technology Investment – Part 3

When an economic downturn starts to hurt, small businesses often hunker down and cut costs. But new technology solutions may be necessary for survival and growth—and they may not be as expensive as you think when you consider their return on investment (ROI). In this three-part series, we’ll review what ROI is, explain how an ROI analysis can help you save or make money, and provide guidelines for analyzing the ROI of a technology investment. Part 3: Analyzing ROI As we explained in Part 1 and Part 2 of this series, today, more than ever, small businesses considering a technology investment should analyze not only the costs of that investment, but the expected ROI as well. Unfortunately, few models exist to guide you through that analysis, and with good reason: Determining ROI involves looking at many components, then applying those components to your particular situation. Doing this requires making many choices, so first, let’s look at the things one must consider—from both a cost and benefit perspective—when considering the ROI of a technology investment. Your existing technology infrastructure. There are few companies without existing technologies in place—and any new solution will need to work with these systems to be effective. There will likely be costs associated with the new technology’s impact on existing systems—but there will also be benefits. For example, a new technology might offer more efficient automation of workflow or improved information collection, storage, and access. Your b usiness processes. A new technology can clearly improve your businesses processes as described in Part 2 of this series—by reducing downtime, improving productivity, and lowering costs. But implementing the new technology will likely involve training staff in using the technology—and that can have associated costs. Your external relationships. Finally, no business is an island: Your systems may link to customer and vendor systems. As a result, any new technology may impose constraints or require changes of external organizations or individuals—in the way information is delivered or received, for example. To solve this puzzle, it can be helpful to ask three different but related questions about the technology solution’s cost , effectiveness, and efficiency . Cost: Can you afford the technology—and will it pay for itself? To answer these questions, you’ll need to know the cost of the solution itself and the monetary value of the resources used to implement it, measured in standard financial terms. You’ll then compare the dollar cost of all expenditures to the expected return (in terms of the projected savings and revenue increases). You may need to project the cost and return over a multi-month or multi-year time span in order to show a payback period. Effectiveness: How much bang for your buck will you realize? Now the analysis becomes more complex. Analyzing the effectiveness of a technology solution requires you to look at its costs in relation to how effective it is at producing the desired results—in essence, to expand your measurement of ROI beyond cost savings and revenue increases to include performance relative to your company’s goals. To do this, you’ll probably want to look at unit cost or activity cost. Efficiency: Is this the most you can get for this much investment? Finally, you’ll want to ask whether the technology will produce the greatest possible value relative to its costs. That can present difficulties, as it will require you to conduct a similar analysis on many alternatives, perhaps simulating the performance of the alternatives in some way. These three types of measurements differ in several ways. While the first is based simply on Financial metrics—i.e., cost in pure dollar terms—the other two include production output metrics, including the quality of goods or services and customer satisfaction. These production output metrics may even extend to employee morale, or in the case of some companies (such as manufacturers of “green” products or non-profits), social or political benefits. All of these measurements, however, help you answer the same basic question: whether an economic downturn is a time to reduce technology spending, or a time to examine priorities and decide which technology investments will pay off in the long-term.

Continue reading »

The ROI Series – Calculating the ROI of a Technology Investment – Part 1

When an economic downturn starts to hurt, small businesses often hunker down and cut costs. But new technology solutions may be necessary for survival and growth—and they may not be as expensive as you think when you consider their return on investment (ROI). In this three-part series, we’ll review what ROI is, explain how an ROI analysis can help you save or make money, and provide guidelines for analyzing the ROI of a technology investment. Part 1: Understanding ROI There are two ways to look at the value of technology: total cost of ownership (TCO), which quantifies only the cost of a project, and ROI, which quantifies both the cost and expected benefit of the project over a specific timeframe. Traditionally, businesses have used TCO when analyzing the cost of internal infrastructure projects such as upgrading an e-mail system. But even with internal systems, ROI can be a better method: If your old e-mail system goes down, for example, your sales team can’t contact customers electronically and must spend more time making phone calls. If your employees spend two more hours on calls than they would on e-mails, you’ve actually lost money by not upgrading your e-mail system. When it comes to any non-internal technology, however, ROI has long been the gold standard. That’s because technology can drive profit growth by increasing revenue. Looking at ROI is particularly important when an economic downturn limits your budget. Indeed, an economic downturn may be the best time to assess your technology spending—because by investing wisely during a downturn, you can strengthen your future. As an example of how ROI works, consider the case of a small, high-end electronics boutique. The current point-of-sale (POS) software program is beginning to show strains from the company’s expansion and increasing inventory, and customer service issues are arising—a problem since the company’s mission is to provide exceptional customer service. The company’s owner believes implementing a new POS software program will help address these issues, but deploying it will be costly. The key question is which will cost more in the long-term: spending the money to provide a solution—or the losses the boutique will incur by not doing so? That question may be easier to ask than to answer. As important as determining ROI is, there is still little consensus about how to measure it accurately. ROI, it seems, is in the eye of the beholder. That’s because ROI has many intangibles—things that don’t show up in traditional cost-accounting methods but still maximize the economic potential of the organization, such as brand value, customer satisfaction, and patents. For example, a knowledge management system may not reduce your costs in obvious ways, so how can you justify it in a tight economy? You probably can’t if you measure ROI by asking what a project will do for your bottom line in a year. But if the new system leads different parts of your company to collaborate, which in turn produces better goods and services that lead to top-line growth, then your ROI is strong. In Part 2 of this three-part series, we’ll go into more detail about how a technology investment can provide a high ROI.Later, in Part 3, we’ll offer some guidance for conducting your own ROI analysis.

Continue reading »

The ROI Series – Calculating the ROI of a Technology Investment – Part 2

When an economic downturn starts to hurt, small businesses often hunker down and cut costs. But new technology solutions may be necessary for survival and growth—and they may not be as expensive as you think when you consider their return on investment (ROI). In this three-part series, we’ll review what ROI is, explain how an ROI analysis can help you save or make money, and provide guidelines for analyzing the ROI of a technology investment. Part 2: How ROI can Justify a Technology Purchase In Part 1 of this series, we examined the basics of ROI—and also noted that ROI is in the eye of the beholder because it has many intangibles. This month, we’ll go into more detail about the different ways a small business can realize a ROI on technology investments—even in an economic downturn, when the conventional wisdom is to cut expenditures. There are three ways that a technology investment can pay off: Reduced downtime. Some downtime is clearly associated with lost revenues: When your website is down, for example, revenue will be lost as a result of customers not being able to place orders. But when internal computers and networks fail, employees are idle—and this, too, could ultimately cost you money. Businesses that have upgraded and efficient IT systems, and those that have managed services vs. a break/fix model (also known as service on demand), simply have busier employees—and busier employees bring in more revenue. Increased productivity. Technology allows employees to do more work in less time. For example, a new database management application might improve timely access to accurate information (which would result in less time spent searching for data) or reduce errors (which would result in less time spent revising work or handling customer complaints). Or, a network with remote connectivity might result in less lost time when employees are traveling, Lower costs. Technology allows small businesses to spend less. For example, a new inventory management application might reduce inventory costs. A new teleconferencing system might reduce travel costs. And a new process management system might reduce headcount, which can lead to lower labor costs. Just how much could you benefit financially from a technology solution? As just one example, Microsoft surveyed 25 small businesses that used Microsoft Windows Small Business Server 2003, a network operating system that provides small businesses with secure Internet connectivity, an intranet, file and printer sharing, backup and restoration capabilities, a collaboration platform, and more.The average cost of the package was $11,650—which included $3,341 in hardware, $2,003 in software, $4,561 in installation, and $1,477 in downtime, plus incremental support. The 25 users surveyed saw a payback of total costs in just 4.9 months. The total average annual benefits were $40,409 and total three-year benefits were $121,227. The software resulted in an average ROI of 947 percent, with some companies realizing a ROI of as much as 2,000 percent. Getting at those numbers, however, may be the greatest challenge of ROI analysis. Because ROI is not one simple thing, there isn’t one simple way to measure the costs, returns, and benefits of a technology solution. In Part 3 of this series, we’ll look at the many different questions one must ask during a ROI analysis.

Continue reading »

Using social networking to win customers

As a busy small business owner, you may not have had time to learn much about social networks. Or, you may think that social networking is just a way that teenagers “meet” other teenagers through the internet using applications like FaceBook or MySpace . However, many small businesses have found that social networks are a great way to get new customers and retain existing ones. According to Forrester Research (November 2008), membership levels in the leading social network sites are as follows: Bebo : 40 million Facebook : 120 million LinkedIn : 30 million experienced professionals representing 150 industries MySpace : 110 million Reunion : 32 million Second Life : 16 million Twitter : 5.57 million What is social networking? Social networking web sites allow you to connect with friends, family, and colleagues online, and to meet people with similar interests. The largest social networking sites have millions of members. Common to most social networking sites is the viral nature of building contact or friend lists and sharing with them. It is an exponential process. Mary knows ten people who each know ten more people – and soon there is a network of hundreds of people communicating with one another about what is happening in their lives. When new members join a social networking site, they provide profile information about themselves and their interests. They also have the option to join groups that have similar interests within the social networking space. For example, on MySpace there are 34 group categories, each with tens of thousands of separate groups. Many individual groups have over 10,000 members. People in the groups and forums provide information to one another about their experiences and thoughts. For a small business, the utility of social networks comes from these groups with similar interests. Here is a sample comment about a local dentist I found on a recent forum post: “Awesome Orthodontist (name withheld)! He’s got a great staff and they all have a great sense of humor … I live downtown Dallas and it’s worth the drive”. This type of unsolicited endorsement, read by potentially thousands of people, is worth much more than a paid ad. Social network members will trust words from people just like them more than they will believe slick advertising or yellow page listings. Social networking success story This recent news story illustrates the power of social networking: “ Electoral triumph built on a Web revolution ”. As Barak Obama considered running for President of the United States, he had a meeting with Marc Andreessen, the founder of Netscape and a board member of Facebook. Obama wondered if social networking could help him. “It was like a guy in a garage who was thinking of taking on the biggest names in the business,” Andreessen recalled. “What he was doing shouldn’t have been possible, but we see a lot of that out here and then something clicks. He was clearly supersmart and very entrepreneurial, a person who saw the world and the status quo as malleable.” The rest, as they say, is history. How your small business can take advantage of the power of social networking Tune in to what is being said about you on social networking sites. If someone asks a question that is within your expertise – help them. Track online comments about your organization or your products. If there is misinformation, provide corrections. Register with LinkedIn – this is a site specifically committed to linking businesses and professionals. Join in. Add your own comments to the blogs or upload short videos. Who is more qualified than you are to talk about your company? Small business owners are very busy people, and monitoring and interacting with social networks may seem like another task on your already full plate. This is where your IT consultant can help. By setting up monitoring and tracking alerts on your system, you can optimize the time you spend on these important activities. Your IT consultant may also suggest software services that help you assess the return on your investment.

Continue reading »

What can Web 2.0 mean to small businesses

It’s almost impossible to find a company today that does not have a website that provides at least information about the company and ways to make contact. This is known as Web Technology 1.0, and it favors large businesses with significant resources to apply to their web presence. Today, meet Web 2.0, the next generation of internet-based information sharing. It’s richer and deeper in content, and broader in scope. So, what exactly is Web 2.0, and how can your small business take advantage of this new technology? What is Web 2.0? In the good old days (about four years ago), the web was comprised of sites published by companies that described their services and products – it was often nothing more than advertising. The web was flat and the information flow was one way. Web 2.0, on the other hand, favors quality information content and supports interaction. To appreciate Web 2.0’s advances, it is helpful to understand why people use the internet. As well stated by Janice Redish in her book on writing web content that works, “People come to the internet to answer a question or get help completing a task. They want information that is easy to find and understand, is accurate, up to date, and credible.” Web 2.0 is all about content that provides real information. Because many people now have access to broadband which supports fast downloads of data, Web 2.0 encourages expanding content types to include audio and video presentations. Finally, Web 2.0 takes advantage of links and tags. Links are websites referenced in your writing that add related content to the topic. Clicking on the link takes your visitor to the referenced site. Tags are metadata, which is data about, well, data. According to Master Media News ,  “ A tag is a relevant keyword or term associated with or assigned to a piece of information (a picture, a geographic map, a blog entry, a video clip, etc.), thus describing the item and enabling keyword-based classification and search of information.” How Web 2.0 can help your small business Web 2.0 can level the playing field between you and your larger competitors – those with bigger budgets. Remember: web searchers do not care if you are a large, well-established company or a small business just getting started. They simply want information and help. If you do that well, you will be perceived as credible, and you may win over a new customer. Your website embraces Web 2.0 by offering meaningful articles about your products, the technology behind them, and by helping buyers make an informed purchase decision. This is not selling; rather, you are educating and helping. When implementing the Web 2.0 philosophy, your site provides links to other sites that may help a customer or potential customer, even if that means mentioning a competitor. You are solving the searchers’ challenges by doing some of the search work for them. You can also encourage your visitors to add comments or suggest additional links. A powerful way to use Web 2.0 strategies is to post short, how-to videos about your products. For many people, pictures are more believable and provide better training than words. Think of the questions customers ask you, and offer video answers with the credibility of an expert. If this all seems to be beyond your capability, ask your IT consultants to help. Your IT consultant can add interactive services to your site and help create video and audio files, as well as suggest low-cost methods to increase the quality and quantity of information on your site.

Continue reading »