Blog

May 26th, 2016

2016May26_Office365_AProductivity, collaboration, freedom. These words are often touted when the benefits cloud technology are mentioned. But do all businesses that make the cloud switch achieve these? Unfortunately the answer is no. Some businesses flounder in the new technology, and some even become less productive because of it. So how can you avoid such a fate? Well, attitude plays a big role. Here are three mental shifts to make before your cloud migration.

Consider cloud value over costs

When considering the cloud, too many business owners get hung up on costs. Instead, it makes more sense to think about how the cloud impacts their business and saves them money. The old saying, “you have to spend money to make money” is ever so true here. And as a business owner, the cloud is no different than any other investment you took to grow your organization. That’s why you should remember the cloud provides you value, such as the ability to work anytime, anywhere, and easier collaboration.

And of course, you shouldn’t just think of how the cloud benefits yourself, but also your IT managers and staff. In fact, before migrating to the cloud, why not go ahead and ask your IT leaders just how the cloud will benefit your business? They’ll likely mention how it can boost the productivity levels of all your employees, while making everyone’s job easier.

Think “strategy” before migration

Once you’ve considered the value the cloud provides, you’ll likely have some ideas of what goals you’ll want it to accomplish at your business. If you haven’t, now is the time to do so - before signing up for the service. Let’s say for example, you want to gain the productivity benefits of your staff being able to work from anywhere at anytime. How can you do this? When you roll out the cloud in your company, have the specific goal of increasing mobile use or adoption among employees. Talk with your IT leaders to devise a plan they can implement.

When it comes to your other cloud goals, clearly define them beforehand and then talk with your IT staff to come up with the nuts and bolts plan to accomplish that goal. By doing this, you’ll achieve much better results with your cloud service.

Learn to love the quickly evolving nature of the cloud

As the cloud is still a new technology, it is rapidly changing. New updates, features and enhancements are rolled out regularly, and if you want to get the most out of your cloud it’s best to keep up. Of course, this is a scary idea for many business owners and IT managers alike as the old way of doing things is rolling out new features and apps over long periods of time.

Some cloud services make it easier than ever to keep up with changes. Let’s take Office 365 for example. Adding users and implementing new changes can take mere minutes. Yes, it may be scary to do so, but remember, Microsoft and your IT managers are in your corner - they are there to support you. Of course, you may still have some bad memories from updating your legacy technology. Let us assure you, updates to Office 365 are nothing like this and require a small learning curve. Most new features are intuitive by nature, making adjustment to these changes painless and problem-free.

One of the best ways to assure your cloud updates go as smoothly as possible is to have an IT leader who’s enthusiastic about the technology be responsible for managing it. A cloud enthusiast is much more likely to be up-to-date on the newest features and enhancements and can quickly share with you whether or not an update will benefit your business.

When it comes to cloud migration for your business, it’s pretty much an all or nothing decision (unless of course you go with virtualization, which is a different topic altogether). The cloud will become an integral part of your business, and you and all of your staff will interact with it on a daily basis. So be prepared for a big transition and a big payoff of higher productivity and connectivity for you and your staff.

Are you ready to embrace the cloud with a solution like Office 365? Give us a call, and talk with us about a cloud migration today.

Published with permission from TechAdvisory.org. Source.

Topic Office
May 20th, 2016

2016May20_BusinessContinuity_AJust because your IT provider has a plethora of awards and certifications under its belt doesn't mean that you can blindly hand over your business’s future to them. Often times, there are some aspects in your business continuity plan that tend to be overlooked by your provider. We have rounded up some of these issues that could appear when you enact your business continuity plans.

Over-optimistic testing

The initial testing attempt is usually the most important as it’s when IT service providers can pinpoint possible weak points in the recovery plan. However, what usually happens is a full transfer of system and accompanying operations to the backup site. This makes it difficult to look at specific points of backup with too many factors flowing in all at the same time.

Insufficient remote user licenses

A remote user license is given by service providers to businesses so that when a disaster strikes, employees can log in to a remote desktop software. However, the number of licenses a provider has may be limited. In some cases, more employees will need to have access to the remote desktop software than a provider’s license can allow.

Lost digital IDs

When a disaster strikes, employees will usually need their digital IDs so they can log in to the provider’s remote system while their own system at the office is being restored. However, digital IDs are tied to an employee’s desktop and when a desktop is being backed up, they are not automatically saved. So when an employee goes back to using their ‘ready and restored’ desktop, they are unable to access the system with their previous digital ID.

Absence of communications strategy

IT service providers will use email to notify and communicate with business owners and their employees when a disaster happens. However, this form of communication may not always be reliable in certain cases such as the Internet being cut off or with spam intrusions. There are third-party notification systems available, but they are quite expensive and some providers sell them as a pricey add-on service.

Backups that require labored validation

After a system has been restored, IT technicians and business owners need to check whether the restoration is thorough and complete. This validation becomes a waste of time and effort when the log reports come in a manner that is not easy to compare. This usually happens when IT service providers utilize backup applications that do not come with their own log modules, and have to be acquired separately.

These are just some of the many reasons why business continuity plans fail. It is important for business owners to be involved with any process that pertains to their IT infrastructure. Just because you believe something works doesn’t necessarily mean that it works correctly or effectively. If you have questions regarding your business continuity plan, get in touch with our experts today.

Published with permission from TechAdvisory.org. Source.

Topic business
May 17th, 2016

2016May17_Security_AImageMagick, one of the internet’s most widely used image processing services, is susceptible to attacks that may put your site at a huge risk of exploitation, according to recent reports. The discovery of this vulnerability means attackers could potentially steal your site’s data, or corrupt it entirely. Let’s take a look at what your SMB should be doing to protect itself from this security flaw.

What is ImageMagick?

ImageMagick is a tool that allows sites to easily crop, resize, and store images uploaded by third parties. Vendors continue to improve user interfaces and experiences by consolidating functions into all-in-one packages, which means administrators are becoming increasingly unaware of what specific services they are actually utilizing. ImageMagick is deeply integrated into countless web services and many webmasters may not even be aware they are using this unsafe software.

How can an image make my site vulnerable?

Recently, it was discovered that images can be uploaded that force ImageMagick into executing commands and permitting attackers to remotely insert harmful code into vulnerable sites. Images are actually made up of complex code that is translated into photos, icons, etc. Different file extensions use what are called “Magic Numbers” to define their file types. Manipulating these numbers allows attackers to exploit a flaw in ImageMagick. The service scans the uploaded file, and attempts to decode the source information whenever it detects the file is not what it claims to be. Scanning that code and attempting to rectify the file misappropriation can then trigger whatever was hidden inside the image and result in remote command of your site.

How should I protect my site?

ImageMagick has admitted knowledge of the security flaw and promised to release a patch very soon. Until then, experts advise implementing multiple workarounds to keep your systems safe. However, if you're not well acquainted with your web server and its code, then it's wise to consult an expert instead of attempting these changes on your own.

For those who are familiar, follow these steps. The first is to temporarily incorporate lines of code that preemptively block attackers from exploiting these holes. Those lines of code, and where to insert them, can be found here.

The next step is double checking that any image files utilizing the ImageMagick service aren’t hiding any harmful information. This can be accomplished by opening an image file with a text editor, and checking for a specific set of letters and numbers at the beginning of the text that define what type it is. The list of these “Magic Numbers” can be found here, and will reveal if an image is hiding its true purpose.

Ideally, administrators will halt all image processing via ImageMagick until a patch is released from the developers.

Data security is one of the most crucial aspects of any SMB, however, keeping up with the constant flow of security exploits and patches can be overwhelming for administrators of any ability level. Why not contact us to learn more about keeping your network secure and protected from exploits like this one?

Published with permission from TechAdvisory.org. Source.

Topic Security
May 13th, 2016

2016May13_SocialMedia_AAre your tweets not getting enough exposure? With so many other social media campaigns out there, it can be tricky to get the attention of followers in Twitter. While posting regularly and writing bold headlines are important in grabbing the audience’s attention, there are other Twitter tactics that you should be employing in order to get the most retweets. Listed below are just a few ways to maximize your company’s reach over Twitter.

Schedule your tweets

There is absolutely no point in tweeting out any content if your audience isn’t even awake for it. That’s why it’s important for you to tweet at the right time to get the most retweets. Usually people won’t be retweeting in the morning and are more likely to retweet around 2pm to 6pm EST. However, if your followers live in different time zones and countries, the time you should be tweeting may vary. Twitter tools like Tweriod track down the geographical distribution of your audience and pinpoints the optimal time you should be tweeting to get the most retweets.

Use links

The next time you tweet out something, try embedding a link in your post. Whether it’s news, sports or celebrity updates, people will put some effort in keeping up-to-date with their interests. Studies have also shown that links to instructional posts get the most amount of retweets as well. The problem is, 140 characters is not enough content for your followers. So by satisfying your audience’s curiosity, you motivate them to pay you back by sharing your tweet out to their friends.

Ask for retweets

This is perhaps the most obvious tactic to get some retweets. Using call to action phrases such as “please retweet” significantly increases your chances of a retweet. Of course, you probably aren’t the only one asking for retweets. Adding something to sweeten deal, like a prize for one lucky person who retweets you, gives people incentive to do so.

Use visuals

Intriguing images can inspire retweets. Images are a great way to convey a lot of information in a short amount of time, and social media users love that. Some have found that, using colorful images and infographics in their tweets significantly increased their engagement rates and found that more followers were retweeting their content. It’s probably because there’s just more content to engage with other than a witty 140 character thought.

Use retweetable words

Research has shown that some words are more retweetable than others. Words like you, twitter, please, retweet, post, blog, social, free, media, help are the top 10 most retweetable words. However common-use words in any conversation such as “lol, haha, work, sleep or watching” are less likely to get retweeted. Unless you’re someone incredibly famous, it’s best to avoid using conversation filler words and stick to the buzz words that encourage people to share your tweets out to everyone they know.

Use quotes

Quotes express a lot in one simple line, making it perfect for any Twitter posts. Depending on your audience, a thoughtful quote can really move their fingers to click that retweet button. The next time you’re running out of ideas for tweets, dig up some good quotes relevant to your topic to get those retweets going. However, don’t continuously plug in quotes into your tweets. The trick is to do it occasionally, so you don’t risk people tuning out of your tweets.

#Hashtag

You’ll notice that the more popular tweets tend to have at least one hashtag. Using hashtags on keywords helps categorize your tweets with similar ones, giving your posts a bit more reach and, hopefully, more retweets. Just make sure you don’t overdo it as #thiscanbequiteannoying.

We get that small business may find it tough getting their name discovered among so many social media accounts. But if you consider some or all of these Twitter tactics, you have a better chance of getting more eyes on your tweets. If you want to learn more about useful Twitter tactics to increase your exposure and engagement, give us a call today.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
May 11th, 2016

2016May11_Office_AMicrosoft Word is used by over one billion users worldwide, and of those how many are using it to its full potential? Over the years Word has transformed into a complex design tool that allows it to move far beyond simple text editing. Most users know how to change a font or center their text, but how many know how to track changes on a collaborative document or remove formatting from pasted text? Staying up to date on the features listed in this article will drastically increase the efficiency and productivity of your document creation processes.

Writing outside the box

Not all of your documents are simple line-by-line writing, and even the ones that are might require a bit of unique formatting. We’ve all wrestled with textboxes, customized margins and indents, but did you know that you can write anywhere on a Word document simply by double clicking wherever you’d like to insert your text? No more counting how many times you pressed the spacebar, no more spending 10 minutes formatting your textbox, just double click and start typing.

Customize your AutoCorrect

No matter how often or how much we write every day, there are still words, phrases and special characters that we can’t seem to master. Increase your typing speed by personalizing AutoCorrect to fix your commonly misspelled words without prompting you. Most of these are preprogrammed into Word (pretty much any ‘i’ before ‘e’ mixup), but customizing your own settings can solve issues like accented letters that are missing from your keyboard, or replacing short abbreviations with verbose technical terms. Just go to the File menu, click on Options, select the Proofing tab and click on the AutoCorrect options to explore all of your options.

Apply document formatting to pasted text

No matter how original your content is, there will always be reasons to copy from an outside source and paste to your own. You may need a quote, a piece of data or just an outside voice to your writing. When using the copy and paste function, you may need to remove formatting carried over from the original source. Although the icons and interface of this feature have changed throughout different versions of Word, Microsoft has been careful to always leave it as an option for users. Simply adding the Windows key to your copy shortcut (Ctrl+Windows Key+V) will integrate the copied material into your content. Default paste options can be further customized in the Options menu.

Collaborate with Review tab features

After the content has been written, you may want to invite others to edit your document with Microsoft’s Track Changes function. Once selected, anything altered in the content will be timestamped, highlighted and underlined in a color that changes in accordance with each editor. This allows you to see the original text along with suggested edits from colleagues. If an edit seems too drastic or risky, users have the option to leave comments or suggestions attached to the document, like a virtual sticky note. After the collaborative process is over, changes can be accepted or rejected individually, or en masse. All of these features can be found under the Review tab along the top of the screen.

Find and Replace

Most users know about using the Ctrl+F shortcut to find text in their documents, but not as many are aware of the Replace function. There are several hypothetical situations when you may need to replace several uses of an incorrect word or phrase. In a technical document you may realize late in the writing phase that you’ve misused a term, or in a marketing piece you may decide to change the name of a product or service; regardless, there is a simple one-step solution. After opening the Find window, simply click on the Replace tab and type the original word or phrase into the top field and the corrected word or phrase into the bottom field. From there you can choose to automatically replace all instances, or review them one by one. In addition to using this trick to fix errors, you can also use it as a shortcut to typing difficult and complex phrases by initially writing a shortened version and replacing it with the full phrase after you’ve finished writing.

Undo and Redo

Almost everyone knows the shortcut for undoing nearly any action in Microsoft Office - Ctrl+Z. Far fewer people know, and actively employ, the redo shortcut. This is a quick solution for viewing and comparing different formatting and layout options, and with a tracking history of 100 actions you’re pretty safe from changing so much that you can’t return to where you started.

Microsoft Word is one of the most universal document editing programs in the world. Don’t let creative, design and formatting speed bumps slow the development of your content when there are existing solutions tucked just a few menus away. An up-to-date understanding of Word and its functions can drastically alleviate the headaches of editing and formatting your files. If you’d like to know more about Word and other Microsoft Office products, shoot us an email.

Published with permission from TechAdvisory.org. Source.

Topic Office
May 10th, 2016

2016May10_Hardware_AServers are the heart of most modern SMBs. They host intranetwork data, customer data, and facilitate product delivery. Like any piece of equipment in your workflow, servers need to be carefully cared for in order to keep you up and running. With the strain that most businesses put on their servers, one of the most important maintenance variables is temperature management. Understanding why keeping your servers cool is vitally important and could save you from an expensive crash, troubling data loss or reduced hardware reliability.

How does temperature affect my servers?

Extreme temperature in server hardware can result in different forms of damage. Most SMBs see total failure as the most concerning outcome. A server that completely crashes for any reason results in costly data loss and service interruptions, but the unbiased advisory organization Uptime Institute warns about overheating that doesn’t result in total failure. Every 18 degrees higher than 70 degrees Fahrenheit, hardware reliability decreases by 50%. This decrease in reliability can be just as, if not more, expensive for your hardware budget in the long run.

Cooling methods can’t just be implemented and forgotten, they must be closely monitored to ensure the health of your server hardware--short and long term. Options for temperature management range from simple low-budget solutions to expensive outsourced alternatives; determining your server management budget will greatly depend on what types of methods you intend to implement at your SMB.

Cooling methods

Which system you use to cool your server largely depends on how much power your hardware is using. The higher the watt, the harder it’s working. It will be easier to determine the scope of your temperature management needs when you have a thorough understanding of your power consumption.

PCWorld advises that simple conduction management is adequate for any equipment operating at less than 400 watts. This means simple solutions like positioning your server away from walls, low ceilings, cable clusters and anything else that can block hot air from dissipating naturally.

For watts between 400 and 2,000, strategic ventilation becomes a necessity. Adding passive ventilation is viable up to 700 watts, but fan assisted ventilation will be required above that up to 2,000 watts. With the increased power consumption, temperatures will rise and air movement needs to be more closely managed. At this stage simple vent and oscillating fans will suffice.

Anything higher than 2,000 watts needs to utilize dedicated cooling solutions. This means air-cooled units to actively reduce server room temperature. Depending on the size and arrangement of the space, a simple self-contained unit may be enough to reduce rising temperatures back into acceptable ranges. However, if you’re not sure, you should schedule a consultation with a vendor to consider more drastic cooling and monitoring methods.

Keeping your servers running at ideal temperatures means smoother data operations, lower hardware budgets and one less thing to worry about at your SMB. As your business continues to grow and develop, keep close tabs on increasing server loads--it could save you from devastating data loss. If you’d like more detailed advice about server management, or have any other questions about your hardware setup, contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Hardware
May 3rd, 2016

2016May3_BusinessIntelligence_AFrom free information products such as ebooks to brochures and email campaigns, today’s marketers have a wealth of tools and tactics at their disposal. While content marketing and social media garner most of the attention in the marketing world, it’s easy to forget about tried and true techniques that are as effective today as they were twenty years ago. Recent data supports that one age-old sales tool in particular is still incredibly effective today, and even beats out some newer marketing tactics. What is it? Let’s take a look.

What is one thing every consumer has in common? They all love to save money. This is why the marketing technique of offering coupons is still as effective today as it was decades ago. Shocked? Don’t believe this is true? Well, let’s explore some statistics.

A recent report by Valassis, a large marketing firm that serves clients across the globe, provided some enlightening information on the effectiveness of coupons. Here’s what they discovered in terms of how coupons influence consumers.

  • 82% of all consumers are more likely to buy from a brand they wouldn’t normally because of a coupon
  • 85% are influenced to try a new product because of a coupon
  • 84% are more likely to switch brands because of the weekly specials on offer
  • 24% choose to shop at another brand’s store over their preferred because of better advertised bargains
This same report also uncovers some interesting data about brand loyalists, revealing that 78% are more likely to buy from a brand they wouldn’t normally patronize, due to a coupon. While this number is surprising close to the amount of total consumers influenced by coupons (as mentioned in the first bullet point above) this next bit of data may come as more of a surprise: 43% of brand loyalists have a more positive view of a company that offers coupons over those who don’t.

While this recent report goes a long way to revealing the benefits of coupons, how do they compare to another common marketing offer used today: free information products?

The appeal of coupons over information products

According to one marketing firm based in Waterford, Connecticut, a coupon was chosen 9 out of 10 times over an ebook when offered simultaneously. This raises an interesting question: why would a coupon be more effective than a free ebook or other information product? Let’s look at some common psychology triggers at play here.

Broad appeal - simply put, coupons have mass appeal. While information products are likely to be seen as more valuable to those with a higher education, a coupon can appeal to all income brackets - from the very wealthy to the very poor.

Instant value - to gain results from an information product requires a time investment and action. For example, if a customer receives a free 30 page ebook that explains how to get the best discounts on electronic equipment, he or she needs to read the book and then take action (and possibly create a plan) to gain the rewards of that time investment. Many consumers would rather spend their time doing something else, but a coupon on the other hand offers immediate value. Simply hand it over to the service provider, and you save money instantly. What’s not to love about that?

Uniqueness - the online marketplace is flooded with free information products. While they’re still an effective tool to gain a prospect’s email address, far fewer businesses offer coupons on their website, especially in the small business sector. By offering a coupon, you provide a free offer that immediately separates you from the pack.

The point here is that just because a marketing tool is popular doesn't mean it’s the most effective. This is why we encourage you to review data and statistics before implementing any marketing technique in your business. It can save you a whole lot of time and also make your business stand out.

Want more valuable business information that can help you connect better with your customers? Curious to learn how IT can help collect data more easily? Call us today to find out more.

Published with permission from TechAdvisory.org. Source.

Topic business
April 28th, 2016

2016Apr28_Security_AKnow thy enemy. When it comes to hackers, most business owners get hung up on the technical and mechanical details of a cyber attack forgetting another important aspect: motive. Why are they attacking people and organizations in the first place? And who are they targeting? By answering these questions you’ll have a better understanding of what resources need the most protection in your business.

Script Kiddies

When it comes to skill level, Script Kiddies are at the bottom of the totem pole and often use scripts or other automated tools they did not write themselves - hence the name. With only an elementary level of technical knowhow, Script Kiddies usually don’t cause much damage...usually. The Script Kiddy virus known as the Love Bug which sent out an email with the subject-line “I LOVE YOU” fooled millions of people, including some in the Pentagon, in the early 2000’s. The virus reportedly caused around 10 billion in lost productivity and digital damage.

So who is a Script Kiddie? Most of the time they’re simply bored youth looking for a thrill or notoriety. Many never evolve into a full-time hacker, and instead just use their skills as a hobby. Oddly enough, many Script Kiddies find a career later on working in the security industry.

Hacktivist

If you’ve heard of Anonymous, LulzSec or AntiSec, then you’re familiar with Hacktivists. These groups are made up of members of varying skill levels, all the way from Script Kiddies to some of the most talented hackers in the world. Their mission is largely politically motivated as they aim to embarrass their targets or disrupt their operations, whether that be a business or government body. Two of the most common ways they attack their target are by stealing sensitive information and exposing it or denial of service (DDoS) where a server is overloaded till it finally crashes.

As a small or medium-sized business owner you are not necessarily immune to Hacktivist disruption. If your business or a company you’re associated/partnered with participates or provides services that can be seen as unethical, such as Ashley Madison (who fell victim of a major Hacktivist attack last year), then you too may be targeted by Hacktivists.

Cyber Criminals

Often talked about in the media and well-known by most SMBs, cyber criminals are after one thing: money. Their targets run the gamut, including everyone from individuals to small businesses to large enterprises and banks. But what do these targets usually have in common? They either have a very valuable resource to steal or their security is easy to exploit...or a combination of both of these. Cyber criminals can attack in a number of ways including using social engineering to trick users into providing sensitive information, infecting an organization/individual with ransomware or another form or malware, or exploiting weaknesses in a network.

Insiders

Perhaps the scariest type of hackers are the ones that lurk within your own organization. Insiders are made up of disgruntled employees, whistleblowers or contractors. Oftentimes their mission is payback; they want to right a wrong they believe a company has perpetrated toward them, so they’ll steal sensitive documents or try to disrupt the organization somehow. Edward Snowden is a prime example of an insider who hacked his own organization - the US government.

Now that you know what motivates your enemy, you’ll hopefully have a bit of an idea as to whether or not you’re a target. To learn more about how to secure your business from these types of hackers, get in touch with our experts today.

Published with permission from TechAdvisory.org. Source.

Topic Security
April 26th, 2016

2016Apr26_Hardware_AHave you been stuck using the same mouse for several years now? If you’re feeling a bit of pain in your mouse clicking hand, then it’s probably time to consider an upgrade. We don’t always pay attention to it, but a good mouse can make a big difference. The perfect mouse will let you work efficiently, be easy to wield, and is comfortable enough to save your wrists and fingers from injury. So the next time you’re in the market for new mice, keep these these tips in mind.

Cable or wireless?

Choosing between a wired or a wireless mouse is a factor you have to consider if you’re planning on purchasing a new mouse. Wireless mice are generally more comfortable since your range of movement isn’t limited by a cable and they’re usually very travel friendly. However they tend to be less responsive than their wired counterpart, which can be a problem for users requiring more precise mouse control. In some cases, wireless mice can also interfere with other wireless devices nearby. Furthermore, wireless mice require batteries, which can be a drag if you forget to buy some at the store. If you’re planning on using the same mouse for both work and home, you run the risk of losing the tiny USB receiver for your wireless mouse.

On the other hand, wired mice are cheaper and easier to use since you simply plug it in and you’re good to go. The only problem you’ll have to worry about is dealing with tangled wires. So when you’re deciding on a new mouse, think about whether you’re looking for comfort or convenience.

Ergonomics matters

You’re going to be using the new mouse for a while, so it’s important to choose a mouse that feels comfortable in your hands. When deciding on the right mouse, focus on the size and the grip of the device. The size of the mouse usually comes down to the individual’s hand size. For example, someone with smaller hands might find larger mice quite unwieldy. Certain mice can also accommodate for different types of grips:
  • Fingertip grip: With a smaller and flatter body, this mouse allows you to control the entire device with just your fingertips. This type of mouse usually provides you with more precise control of your cursor. However, it doesn’t give any room for your palms to rest on, increasing the risk of carpal tunnel syndrome. Avoid using this grip unless your work requires a lot of photo, video or sound editing.
  • Palm grip: Palm grips are the complete opposite of fingertip grip mice. With a bump at the back end for your palms, this type of mouse reduces the stress on your forearm and wrist. This grip sacrifices precision for comfort so people prone to repeated stress injuries (RSI) should definitely opt for this type of grip instead.
  • Claw grip: This type of mouse is usually the one people are most accustomed to. Named after the shape your hand makes when you hold this type of mouse, claw grip mice give you the best of both the palm grip and the fingertip grip. Like the palm grip, your palms can rest on the mouse but this type of grip also gives you a bit more control. While the palm grip is still the most ergonomical mouse, the claw grip gives a good balance of both comfort and precision.

Do more than right and left clicks

Don’t just assume that extra buttons on a mouse would mean that it’s only meant for gamers. Extra buttons add more functionality to your mouse. For instance, you can assign your spare mouse buttons to Copy and Paste so you’ll no longer have to input keyboard shortcuts. Want to switch between open windows quickly? You can assign the Alt + Tab (for Windows) and Command + Tab (for Mac) to those mouse buttons. While this isn’t a requirement when picking a new mouse, it’s definitely a neat feature that will save you some time.

DPI (dots per inch)

For precise movements, higher sensitivity is a must. Whether you’re editing images, videos or audio files, you’re going to require more precise mouse movements to execute them well. If you ever had to move your mouse around because your cursor was stuck, then a high sensitivity mouse can solve your problems. Try looking for mice with 1200 DPI or greater for finer control.

Mouse specifications could be the last thing on your mind when it comes to buying new hardware. But comfort is important. A good mouse with the right fit, can make you more efficient and reduce the risk of injury. If you need some help setting up the best hardware for your company, give us a call. We’re happy to help.

Published with permission from TechAdvisory.org. Source.

Topic Hardware
April 25th, 2016

2016Apr25_InternetSocialNetworkingAndReputationManagement_A500+ LinkedIn connections can open doors. It can lead to more business, new clients, and provide social proof to yourself or organization. However, getting to 500+ connections can seem like a daunting task, especially if you have a business to run. So how can you break through and become a LinkedIn power networker? Here are a few tips to get you to 500+.

Network every day

If you’re struggling to grow your LinkedIn network, you may not be spending enough time on the platform. If you want to become a power player, you need to use the social network often. So dedicate 15-30 minutes a day to network on LinkedIn, and make it a goal to reach 500+ connections.

Join and participate in groups

Utilizing LinkedIn groups presents an opportunity to meet other professionals (and eventually add them as connections) as well as learn and share valuable advice. The point is not to just join a group, but actively participate in them. This requires a degree of focus and smart selection.

How many groups should you join? Shoot for around ten. This will ensure you have time to participate in each group and connect with its members. As for the groups you join, you’ll obviously want to join those in your industry, but you should also diversify. So choose five within your industry and five that relate to your other interests or provide you an opportunity to learn from its group members. Some suggestions to consider are an alumni group for your university, groups that represent causes/charities you care about, and groups that relate to a new skill you’re hoping to learn. Obviously, all the groups you join need to be active. If members only post in a group once a week, this is a red flag to avoid joining.

Once you’ve joined, you should spend some time each day contributing in at least five of your ten groups. You can ask questions, provide advice, or share valuable articles or original content you’ve created. Once you’ve developed a rapport with group members, you’ll have an easy, non-awkward way to connect with them.

Personalize your “Connect” request

The less you know a person, the less likely they are to connect with you if you send a generic connection request. You know the one: “I'd like to add you to my professional network on LinkedIn.”

Many people will simply ignore requests like this. This is why it’s important to include a quick note that either refreshes that person’s memory of you, mentions a common interest or connection you might share, or simply introduces yourself and your reason for connecting. The more personal your note the better.

Use keywords in your profile

Just like Google, Bing and the other search engines, keywords help you get found on LinkedIn. Plant these keywords in your professional headline, profile summary, and skill endorsement section. How do you know what keywords to use? Think about what you want yourself or your business to be endorsed for. What skills do you have to offer your clients? For example, if your business specializes in web solutions, some keywords you may think about using would include SEO or “web content”. As for your skills, be careful not to choose keywords that are too narrow. For example if your business is in the financial services and tax preparation industry, don’t use the names of niche tax solutions you specialize in like “estate taxes” or “small business taxes” as your endorsed skills. Instead, choose more general words like “tax preparation”. By doing this, your connections will be more likely to endorse you as it’s a broader category.

By following these tips and spending at least 15 minutes a day on LinkedIn, you’re sure to see the number of connections you have grow. And the more connections you make, the less work you’ll have to do to grow your network as more and more people will send you connection requests instead. This will provide more business opportunities and chances for you to meet new clients. If you’d like more ideas how to improve your social media efforts, feel free to email or give us a call.

Published with permission from TechAdvisory.org. Source.

Topic Social Media