Blog

July 16th, 2015

164_A_O365Earlier this month, Microsoft announced they’ll be replacing their current E4 Office 365 suite with the new upgrade - E5. With an unspecified release date for later this year, E5 will have a direct effect on current E4 users and those who are thinking about signing up for a new Office 365 package. Here’s what you need to know about this new version, and how it could impact your business.

What’s included in E5?

According to Microsoft’s Office Blogs July 13th post, the tech giant announced that the E5 plan will include the following new capabilities:
  • Skype for Business services with support for features including Cloud PBX and PSTN Conferencing
  • Analytic features such as Delve Organizational Analytics and Power BI Pro
  • Advanced security features like Customer Lockbox, eDiscovery, Advanced Threat Protection and Data Loss Protection
With these new service offerings, Microsoft believes that business owners will be able to reach new customers and increase value for their existing ones.

The cost?

While Microsoft’s Office 365 current E4 package costs $22 a month in the US, there was no official announcement of the price for the E5 version.

However, since E5 will include services such as Advanced Threat Protection, which currently costs an additional $2 per user/month, as well as Power BI Pro, which is priced at $9.99 per user/month, a price increase seems inevitable - and very well could be significant.

Your options

Because E4 will be retired when E5 is released, that means that current E4 users will have to either upgrade to E5, or change to E3 plus Cloud PBX.

For those who have yet to sign up for Office 365, however, you’ll also have the additional options to choose an E1 or E3 package with available upgrades.

Is it worth it to upgrade to E5?

That all depends on your business, and likely the price of the upgrade. However, the question you need to ask is, “will the new capabilities enhance your organization enough to justify the higher cost? If you need additional help understanding how E5’s new features and capabilities can create value in your business, we’re happy to assist you.

Curious to learn more about the Office 365 E5 package? Get your questions answered, and give us a call today.

Published with permission from TechAdvisory.org. Source.

July 8th, 2015

164_Sec_ALog on to Facebook, Instagram or Twitter, or even simply take a walk in a city park, and one thing is clear: the selfie revolution is upon us. And now it looks as though this contemporary pastime is becoming more than just a social media trend. Major industry players are now using facial recognition technology to replace passwords as the new method of online identification. MasterCard is the most recent corporate bigwig to join the party.

At the beginning of this autumn, MasterCard will acquire the help of 500 customers to test out a new application that enables people to verify their identity and authenticate online transactions with a facial scan. What does this mean? Instead of using a traditional password at the online checkout, MasterCard wants to give you the option to snap a selfie instead. According to the credit card giant, they’ve partnered with every smartphone company in the business to make this mode of identity verification possible.

Why is this happening?

A quote from Ajay Bhalla, security expert at MasterCard, suggests this is an attempt by the credit card giant to appeal to a younger crowd of digital natives. "The new generation, which is into selfies...I think they'll find it cool. They'll embrace it," Bhalla recently said.

That said, the “cool” appeal to youth is likely not the only reason for this change. The firm is likely attempting to make online purchases both more secure and more convenient.

How it works

To use this technology, users will have to download a dedicated app, which they can then use to take a photo of themselves at checkout. But how does MasterCard prevent a thief from using a photo of you to fake your verification? Simple - the app requires you to blink to prove that you’re a living, breathing human being.

However, it’s been noted by critics that, in today’s technological world, even a blink can be animated on a static photo. This leaves those of us with security concerns wondering whether MasterCard will make this app more secure before it’s released.

Note as well, though, that MasterCard is not getting rid of traditional passwords completely. Users will still have the option of the more conventional method of verification, as well as the choice of fingerprint scanning to check your identity.

Is this where the future of online security is headed?

With the release due later this year of a similar Windows 10 security application to identify users using biometrics, it appears that this is where the future of online security is headed. And with ever more applications and online services requiring a password, it is becoming increasingly difficult for the average web user to create one that is both unique and secure for each individual service. So whether it’s facial recognition, a fingerprint scan or some other technology that’s yet to be perfected, it seems as though some sort of more advanced security solution is inevitable.

Want more of the latest security news? Looking to implement new security to protect your IT infrastructure from cyber threats? Get in touch today.

Published with permission from TechAdvisory.org. Source.

Topic Security
July 3rd, 2015

164_Soc_AMost of us know that gaining a foothold on social media takes time and effort. But if you’re at the point where you’ve already put in hundreds of hours of work with few results to show for it, you’re likely doing something wrong. There could be a number of different reasons for this, but here is a common trap that a lot of social media newbies fall into. And it starts with your content creation.

Don’t recycle content

Google any recent news story, and you’re likely to find anywhere from a few to several dozen articles on the same subject. And unfortunately, the content is so similar that you can barely differentiate one from the next.

If you want to stand out from others on the social media scene, find something new to talk about. In general, if you want to get noticed by new customers or followers, it’s best to avoid widely covered topics. Everyone and their grandma will be writing about it, which creates much more competition for your version.

If you must create content about mainstream topics, make sure you take the time to come up with a fresh perspective, and share valuable information that hasn’t been touched on yet.

Be fearless in your content

Similarly, it’s absolutely essential that, across all the content that you produce, you share a unique perspective. Many people end up parroting the same thing as everyone else because they are afraid to offer their true opinion. Don’t be afraid to speak up and be controversial. If you’re going to develop a social media persona that stands out, you need to develop your own voice - and a thick skin. There is always going to be someone who disagrees with you, especially on the web where it is easy to remain anonymous.

Additionally, there’s a reason that the saying “there’s no such thing as bad publicity” is famous. In fact, when you write polarizing content that will have a fair share of supporters and naysayers, people are hardwired to react to it. This is for the same reason that humanity as a whole shares a universal love of stories - whether that’s in the movies, in a novel or around a campfire. A story is nothing without conflict. When you produce content that creates a real life conflict of opinions, you have a better chance of it making some noise on social media.

But - be honest and show integrity

Don’t say something controversial just for the sake of it. Give your honest opinion. The key to every aspect of sales is developing trust. That means that with any customer or potential follower you come into contact with, whether through social media or other means, you should show your true self. You’ll have a better chance of gaining a customer or follower for life.

Controversy or not, always be professional

There’s no reason to start a flame war, or resort to name calling and insults. People are going to have strong feelings about controversial content. Emotions are going to come up and people can say some pretty mean things - especially on the internet. Don’t get caught up in the comments and negativity. If you do, it is sure to leave a bad taste in the mouths of your current customer base and followers.

Want more insights into growing your social media presence? Speak up today.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
July 1st, 2015

BusinessValue_Jun16_ANo matter how wonderful your company’s product or service, if you don’t advertise then no one will know about it. The goal of any advertising campaign should be to reach the largest audience for the lowest cost possible. If executed properly, advertising will serve as a powerful tool to boost your business’s profits sky high. But if you get it wrong, advertising can become a huge money sink. With that said, we have compiled some marketing tips to ensure that your online advertising campaigns deliver results.

Prioritize blogging

Blogging is an excellent marketing tool for businesses. Unfortunately most companies don’t spend much time or effort developing their blogs, which is a huge mistake. To get the most out of your blog, you will need to write quality content that adds value for your website visitors. The benefits of having a blog increase tenfold if you publish regularly, since potential customers will see you as an expert in your field, and are more likely to purchase what you have to offer.

Advertise in the right places

There are a number of online advertising channels out there, among them Facebook Ads, Google AdWords and Youtube Ads. The question is whether you know which one is the right fit for your business. You need to spend your marketing budget on the right advertising method to gain the highest return on investment. Do some research about your potential customers and determine who they are, and what they read, watch and listen to. This way you can pinpoint the best advertising platform to ensure that you reach your target market.

Start using videos

Videos offer an excellent way to market your business. Studies show that customers are more likely to buy if they see a video about your product or service on your landing pages, so make sure you include one if you can. Be creative when you’re making videos to promote your business; you could start building an online reputation by creating instructional videos that help your potential customers solve common problems. Commenting on videos relevant to your niche is also an effective way to increase your brand visibility.

Be active on social media

Prudent businesses are aware of the importance of establishing a social media presence through the main social networks like Facebook and Twitter. But simply posting articles or links is not going to offer many marketing benefits for your business. You’ll need to go the extra mile to maximize the benefits of social media. Some tips include taking the time to respond to your followers’ comments, keeping your profile updated and fresh with new information, and following and sharing content from other users.

Make sure your website is responsive

More and more of us are using mobile devices to browse the Internet and look for local products and services. Make the effort to ensure your website is mobile-friendly and automatically scales to fit all screen sizes, so that it is accessible and functional for mobile users. Major search engines now penalize non-responsive websites by lowering their search rankings when viewed on mobile devices, so you’ll need to adapt accordingly to avoid their wrath.

Contact us today and learn how our IT services can help you gain more customers and add value to your business.

Published with permission from TechAdvisory.org. Source.

June 29th, 2015

BusinessContinuity_Jun25_AData backup is one of the most important aspects of your company's infrastructure. Without data availability, your business will come to a standstill. So it's bizarre that most business owners fail to have a proper data backup strategy in place - and when disasters strike, it will be too late to act. You really do need to take a proactive approach to backing up your data and keeping your business functioning normally at all times. There are several methods and devices you can use for backing up data - here are some to consider.

There’s no one-size-fits-all solution when it comes to data backups. You’ll want to consider the pros and cons of each of the backup devices below before making a purchase.

USB stick

USB flash drives are basically miniature hard drives that you connect to your computer using a USB port. The drives are extremely cheap, with prices depending on their capacity. They’re also portable, and can be used to backup information from several computers to the same drive.

Although USB sticks are highly convenient, they’re still not a complete backup solution, and are best suited for intermediate backups, such as storing file recovery programs or critical business documents.

External hard drive

An external hard drive is perfect when used as backup storage media. It has the lowest cost per gigabyte when compared to the other backup devices out there. External hard drives use the same plug-and-play functionality as USB sticks, so you can plug the drive into your computer and immediately start selecting the files you want to backup. The transfer rate is also very fast, and you can backup a large amount of data within seconds.

One of the evident drawbacks of using an external hard drive is that you’ll need to update your backups on a regular basis, or else new files won’t be included. There’s also the risk of the device being stolen or misused. For instance, a colleague may take your drive when you’re away from your desk, or a disgruntled employee may copy all of your important business files and take it with them when quitting.

Network attached storage

Network attached storage, or NAS for short, is a dedicated device with its own IP address. It can be used as a multimedia server, and can function as an email or lightweight database server. NAS offers data redundancy, meaning it will generate a backup of your backups, so you can ensure your files are fully protected.

The main downside of NAS is its inability to scale beyond the limits of the system; you have to purchase additional hard drive bays when you need more capacity. You also have to take full responsibility for data security if you’re implementing NAS.

Cloud storage

Cloud storage is becoming more and more popular among businesses of all sizes, due to its many benefits such as allowing users to access data anywhere on smartphone devices, as well as enabling you to work with the most current hardware and up-to-date software. It is also affordable, since you’ll only have to pay for what you use. What’s more, cloud computing is very convenient, because your service provider will take care of the installation, management, and maintenance processes.

On the downside, some cloud service providers don’t employ sufficient security measures on their systems, so your data could be exposed to potential cybersecurity threats. This means that it is not always the ideal solution for companies dealing with very sensitive data - medical practices and law firms, for example. Predicting costs can also be hard; if your business is growing rapidly, then you might find you have not adequately planned for incremental costs.

Choosing the best system for backup is a critical decision that will impact your business on a daily basis. There are trade-offs among backup devices, which is why you need to choose the solution - or solutions - best suited to your business. Contact us today and our experts will assess your company’s needs and provide the best backup solutions for you.

Published with permission from TechAdvisory.org. Source.

June 19th, 2015

BusinessIntelligence_Jun9_ACompanies today are adopting business intelligence (BI) tools to represent data in a way that makes information comprehension and analysis simple. But all too often business owners make mistakes in selecting and implementing a BI software solution, resulting in unnecessarily high costs and ineffective execution. To help, we have put together the most common BI mistakes organizations make, and how to avoid them.

Mistake #1: Not defining business problems

One of the biggest mistakes in BI implementation is jumping to conclusions too soon without first identifying what your business wants to accomplish. When it comes to integrating BI into business operations, there’s no such thing as a one-size-fits-all solution. Looking for a single BI tool to solve all analytics problems is one of the main reasons many BI projects fail.

You need to clearly define the business problem you’re trying to solve, and understand the specific tools required to solve those problems. Only then will you be able to select and purchase the BI tool that best suits your needs.

Mistake #2: Not getting buy-in from end users

Even the best BI tools are ineffective if they’re not properly utilized. Forcing your employees to use newly purchased BI technology without informing them or hearing their thoughts beforehand is a big mistake.

Instead of telling employees they have to use something, first focus on highlighting the benefits of the new BI system. Help employees understand why they’ll want to use it, and convince them by showing them what they stand to gain from the new BI technology.

Mistake #3: Rushing implementation

A rushed deployment of new technology is often times not a successful one. When it comes to deploying BI solutions, patience is key. If you hurry into BI implementation too quickly, your end users may not have enough time to develop the skills required to use the software effectively.

Take an incremental approach to implementing BI solutions. Make a list identifying business problems and, rather than expecting to solve every business problem all at once, try to prioritize specific outcomes you want to achieve. When you have solved the first issue, move on to the next one and so on until you have incrementally solved all the problems on the list.

Mistake #4: Insufficient training

New BI systems are complex structures that require a lot of training in order for users to make the most of them. If users lack the skills necessary to operate the software, then bottlenecks can occur. The product may be left dormant for long periods of time as users wait for experienced IT staff to resolve teething problems.

Spend wisely on providing ongoing training, so that users really understand how to use the system. Consider hosting weekly lunch sessions where a different aspect of the BI system is discussed. You could also provide online training videos that enable users to learn more about the new system at their own pace.

Mistake #5: Not making use of information and reports

BI tools are designed to analyze raw data and turn it into valuable information that can be used in business decision making. But some organizations fail to exploit the information fully - it is not shared, not analyzed, and not acted on. BI software can generate reports on various data points, identify risks, and predict trends. It’s important to leverage the information gathered and to apply it to your business’s objectives and goals.

Business intelligence software is a highly useful tool that, when used properly, can drive your business forward. Avoid these mistakes in order to make the most of your BI solutions. If you’re looking to implement BI tools to your company, contact our experienced consultants today and see how we can help.

Published with permission from TechAdvisory.org. Source.

June 18th, 2015

Office365_Jun4_AEmail plays a huge part in the average day of the modern business person, but it’s easy to see how many of us get overloaded. The sheer number of messages we now receive through email is enough to prove a distraction from our real jobs. And for all the tips we might read on how to block out email-free periods of our day, or unsubscribe from unwanted newsletters, somehow the trash keeps coming. Even setting aside spam, much of the email we receive just isn’t the kind of thing we need to deal with right away. Outlook’s new Clutter feature, recently rolled out to all users, can help you fight your inbox nightmares.

Originally announced at Microsoft’s Exchange Conference at the start of 2014, the Clutter add-on for Outlook began rolling out last November to Office 365 business customers who had signed up for the first release. During the initial trial period for Clutter, the function was disabled by default - now that’s been changed, and as of June 15 the tool was due to be turned on by default for all Office 365 users.

At the heart of Clutter is a desire to prioritize email, and move less important messages from your inbox so that you can review and deal with them at your convenience. With only your highest priority emails waiting for you in your main inbox, the idea is that you enjoy fewer distractions and so enhance productivity in your real job - which, for most of us, isn’t email at all. Clutter is an intelligent tool, meaning it picks up hints on which emails are important to you based both on the type of the message and how you are addressed in it. It also uses the Office Graph social feature to track your prior actions both within the Outlook Web App and on Outlook clients for desktop and mobile devices.

Messages identified as lower priority are whisked away to a specific Clutter folder for you to review when you have the chance. Alternatively, you can simply choose to ignore the messages, treating the Clutter folder as another kind of junk filter, and the messages will remain conveniently out of view. In order to ensure that it doesn’t inadvertently start mis-identifying messages as low priority, Microsoft is keen to stress that Clutter won’t do anything until it is confident it has a thorough understanding of your behaviors and your email preferences - for most people this will happen within a matter of days, depending on the volume of email you receive.

You’ll receive daily and weekly notifications so you’re aware which messages Clutter is moving, and don’t miss something important - significantly, these notifications are no longer sent as emails, since replacing an inbox-cluttering message with another one would seem to somewhat detract from Clutter’s purpose. If a message is wrongly picked up as low priority and moved to your Clutter folder, you can move it back to your inbox to be dealt with sooner, and Clutter will learn from the mistake in order to improve its handling of your messages in the future. In the same way, you can choose to proactively teach Clutter about your preferences by marking specific low-priority messages as Clutter.

According to Microsoft, Clutter already shifts more than a million low-priority messages daily, and saves its users almost an hour and a half in productivity each month - figures which are expected to rise as the tool is adopted more widely. If you’ve already enabled Clutter manually, or have enabled it but later switched it off, nothing will change; if you haven’t yet taken any action at all, it will be automatically turned on for you if it hasn’t been already. If you want to disable it, you can do so from the Options page of either Outlook on the Web or the Outlook 2016 Preview, or can simply click the turn it off link at the bottom of notifications.

Clutter gives you a highly personalized email filter that knows which messages are of interest. If you want to learn more about using Office 365 in your business, give us a call.

Published with permission from TechAdvisory.org. Source.

June 8th, 2015

SocialMedia_Jun8_AWith social media being such a big part of everyday life, it likewise plays a huge role in online marketing. There are many social platforms a business can use to reach out to audiences, but the one that stands out from the crowd is Facebook. Over the past few years, Facebook advertising has seen steady growth in revenue, thanks to its specific audience targeting methods that allow business owners to lower their new customer acquisition cost significantly. If you haven’t tried Facebook ads, you’re truly missing out on one of the most powerful marketing tools out there. To that end, here’s a step-by-step guide to implement Facebook ads in your business.

1. Create a Facebook Business Page

First things first: before you can advertise on Facebook, you must have a Facebook Business Page. Log in to your Facebook account and, on the news feed page, click on Create a Page from the left column. Choose the category of your Page that best describes the nature of your business. Then fill out all your business information, including your website, hours of operation, phone number, address, and email. Finally, add creative profile and cover images to attract potential visitors.

2. Define your Facebook ads goals

Facebook offers a variety of advertisement options to choose from, depending on your business’s needs. That’s why it’s important to create goals for your ads, to make sure you’re spending your money wisely while achieving your business goals. Start by asking yourself why you’re utilizing Facebook ads in the first place; defining advertising goals and strategies will help you choose the right type of Facebook ad.

3. Choose an objective for your campaign

Now that you have a Facebook ad goal in mind, it’s time to translate those goals into objectives for your campaign. For instance, if you want to drive more visitors to your business website, your Facebook ad objective is to Send people to your website, but if you want to increase your number of social media followers you would choose the objective Promote your Page. From your Page, click on Create ads and choose an objective to get started.

4. Target your audience

This is the step where most businesses fail at Facebook advertising. You can target your ads based on location, age, gender, language, interests, and behavior. By defining the right audience group, your Facebook ads will be shown to the right people and will give a high conversion rate. After you’ve chosen your target audience, you can decide how much money you want to spend, and choose the time to run your ad.

5. Customize your ad

This process is equally as important as audience targeting. In this step you have the option to choose how your ad will look, by adding up to five images and text that will accompany them. The text is only 90 characters long, so make sure your copy portrays what the content is about, so it will encourage people to click on your ad. Then choose where you want your Facebook ad to show from four options - the news feed, mobile news feed, right column, or audience network.

6. Place your order

The last step is to click on the Place Order button to submit your ad to Facebook for review. You’ll receive an email from Facebook once your ad has been reviewed and approved and is ready to launch.

Facebook advertising requires effective planning, testing, and measuring. You need to experiment in order to find the campaign that works best for your business. If you’re interested in advertising on Facebook or through other social media platforms, drop us a line and see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
June 2nd, 2015

BusinessValue_June2_ATechnology has completely changed the way we do business. Gone are the days when customers had to drop by your company to purchase your products and services. Now they can simply visit your website, see what you have to offer, and make an online payment - all in a matter of minutes. But if you want to expand your customer base, your website needs to rank high in search engines, so that it’s easy for potential customers to find you. That means implementing search engine optimization (SEO) strategies; here’s all you need to know about SEO to increase your online presence.

SEO defined

The practice of SEO has been around just about as long as search engines themselves. SEO is basically a methodology of techniques and tactics used to increase the number of visitors to a website by obtaining a high-ranking placement in search engine results. There are a lot of crackpot theories about SEO out there, and you’ll have to sift through them to find the techniques that really work for your business.

There’s a saying in the world of SEO that if you’re not first, you’re last. When it comes to SEO there’s no short cut, and the idea of getting your business website ranked on the first page of Google search results in one day is ludicrous. To make things clearer, we’ve compiled a list of the basic SEO practices business owners tend to overlook.

1. Research keywords Keywords are key to your online presence. Add the right keywords to your website and your chances of being found are much higher. First, invest time in keyword research. Find out which keywords your customers are using in search engines, and gather all crucial data for SEO purposes, whether it’s search volume, trends, or competition. Make a list of keywords related to your niche. Don’t be tempted to only go after phrases with the highest search volume - they will be very hard to rank for and might be too broad.

2. Create quality content Based on the researched keywords, generate high quality content with the focus on your readers. Make sure this content reads naturally for human visitors - don’t overdo it by stuffing keywords into your text in the hope of getting high rankings, as most search engines will penalize your website for using this underhand tactic. Good content has relevant keywords in it, but a great one has the keywords while also providing real value to visitors.

3. Place call-to-action buttons A business website should always have a call-to-action to convert visitors into customers. Make sure you add a call-to-action button to each of your most important pages, whether that means the About Us page, service pages, FAQs, or case studies. Call-to-action buttons may vary. They don’t always have to lead to a contact form; they can be links to other content, incentive offers, free downloads - the list goes on.

4. Create an internal link structure After you have quality content, you must show the search engines that your site has a page hierarchy. The general rule of thumb is, all your articles should link back to the home page, service pages, and even other articles. Linking internally allows for easier navigation for your visitors, and there’s a good chance they will spend more time on your website, which is good for SEO purposes.

5. Install analytics tools Tracking your visitors’ behavior on your website is important. Connect your website to analytics tools like Google Analytics and Google Webmaster Tools to gain valuable insight into your website’s statistics. By closely monitoring performance, you can eliminate keywords that aren’t generating you leads, and tweak content that visitors ignore.

SEO is an ongoing process that requires patience and time. These suggestions are meant to set a stronger foundation for your business to expand. If you’re looking for other ways to increase business value, get in touch with us today.

Published with permission from TechAdvisory.org. Source.

June 1st, 2015

Security_May27_AInformation security is on everyone’s mind - all too often we hear of a high-profile data breach in the news, and even the smaller scale attacks that don’t make headlines can wreak havoc on growing businesses. So it’s heartening to know that Google places a high premium on security. Their latest move to bolster protection for Google Drive for Work sees the introduction of physical Security Keys - here’s what you need to know.

Google already offers security precautions like two-step authentication, which provides additional protection by requiring you to enter not only your password but also a one-time code received by SMS or similar. This is a crucial weapon in the fight against hackers, since weak usernames and passwords are still be the primary reason for accounts being breached. Security Keys now take things one step further, strengthening your Google Drive account’s coat of armor to an even greater extent.

The Security Key is a physical USB device that is plugged into your computer, and which sends an encrypted signature, instead of a password or other code, to verify your identity and permit you access to your Google account. Crucially, Security Keys are inexpensive - starting from around $6 per unit - and require no additional software for deployment, use or management. Administrators have the ability to track when and where each key is used, as well as being able to disable them if lost and issue backup codes to allow staff uninterrupted access even if they do misplace their key.

Simplifying the login process is also a key part of what Google has tried to achieve with Security Keys. To that end, the first time you use your key to access your Google account on a particular computer, you can opt for Google to remember that device. On subsequent occasions you can quickly sign in using only your password, and without requiring either your key or a two-step authentication code. You can still sign in using your key on other machines, and if a hacker tries to access your account without your key they will also be prompted for a two-step verification code (which, unless they have access to your cell phone, they shouldn’t be able to provide).

Security Keys aren’t an entirely perfect solution, though - there are some significant limitations to the technology. For one, you can’t use them on mobile devices, since they require a USB port to work, and they only allow you to access your Google account through the Chrome browser. Windows, Mac OS, ChromeOS and Linux operating systems are all supported, but if you’re working from your phone or on a browser other than Chrome then you’ll need to continue using two-step authentication. Google says you can mix and match different methods of verification, opting to use Security Keys where they are supported and two-step verification otherwise (or if you don’t have your key with you).

What’s more, only Google Drive currently supports Security Keys - it’s not yet possible to use them with Google Apps, for example. But, while the technology is primarily targeted at Google Drive for Work users, it’s possible to link a single key to multiple accounts, meaning you can use it to access both your work and personal Google accounts. Some users have also queried how much of a safeguard the technology really provides in the absence of an additional PIN code or fingerprint authentication being required for activation, suggesting that a stolen Security Key could be used to access a computer that a user has previously asked Google to remember. But Security Keys do appear to offer at least some additional protection, which will be of comfort to businesses handling sensitive data.

Give us a call to find out how to employ Security Keys and other technology solutions to bolster your protection against network intrusion and data breaches.

Published with permission from TechAdvisory.org. Source.

Topic Security