October 21st, 2016

2016october21_hardware_aIn today's world, WiFi has become a necessity both at work and at home. People across the world use it to learn, work online, communicate through social media, stream videos, and more. But we all know that the internet can sometimes be uncooperative. And in an increasingly interconnected world, we need reliable tech resources that help keep us online. One of the technologies dedicated to making this happen is Google and their new WiFi system.

WiFi everywhere Google WiFi is able to offer fast WiFi across your home or business. Today, people install WiFi expecting it to simultaneously support multiple devices that might even be engaged in high-bandwidth activities such as VoIP and live streaming. The problem, however, is that the WiFi signal is often affected by the thickness of internal walls and the distance from the router. Google alleviates this problem by developing a WiFi system that’s expandable.

You can add Google WiFi points in different areas of your office to spread a strong network signal throughout your entire company. Google uses WiFi mesh technology, where every Google WiFi point builds a high-powered signal where all points combined offer the ideal path for data. As a result, high-speed WiFi is built across the house as all points connect to each other to broadcast a strong, high-speed connection. This means your company can say goodbye to slow downloads, poor call quality, and service interruptions.

Automatically optimize your connection Google WiFi can also keep operating at high speeds. It employs Network Assist Technology, a feature that automatically optimizes your wireless connection, keeping it fast without any fussing or manual adjustments on your end. Just imagine taking your office laptop or your iPad from your desk to the meeting room, without experiencing internet connection problems. Google’s Network Assist feature allows your devices to seamlessly transition between Google WiFi points in real time, meaning no delays or dead spots.

Manage your network with an app Google WiFi also comes with a companion app for when you want to manage your network. Available on iOS or Android, the WiFi manager app allows you to reduce bandwidth usage for a particular website, or pause the WiFi connection on certain devices when they’re not in use. You can also prioritize bandwidth for specific devices connected to your network so that you can conduct important VoIP conference calls without any interruptions.

Of course, when it comes to WiFi, security and privacy are top priority. With that in mind, the Google WiFi manager app comes with enhanced security and privacy settings that enable easy management of cloud content, user access control, wireless encryption systems, and automatic updates to keep your business safe at all times.

There’s no telling how well Google WiFi will perform in the market, but if your company values advanced security systems, fast internet speeds, and an easy-to-manage network, then Google WiFi is definitely hardware you should have.

Want to stay on top of the latest hardware trends and developments? Simply give us a call today to find out more.

Published with permission from Source.

Topic Hardware
October 19th, 2016

2016october19_businessproductivity_aThe internet is undoubtedly one of the most powerful tools for improving business productivity. But it’s also a magnet for procrastination. With unfettered access to the internet, it’s easy to stray away from your important work responsibilities. If done in moderation, five-to-ten minute breaks on Facebook, Twitter, and YouTube are harmless, but if employees spend several hours a day there, the internet is impeding office productivity. Fortunately, web monitoring can ensure your employees don’t overuse these sites.

Time-saving measures At times, the internet can be very addictive. Internet monitoring software saves employees from the temptation of online videos and games by restricting access to time-wasting sites that you deem unnecessary for business. But internet monitoring software doesn’t even have to be as extreme as denying permission to harmless social media websites. Just letting your employees know that you’ll be randomly monitoring their internet activity discourages them from taking prolonged visits to their Instagram page.

Avoiding harmful websites The internet hosts plenty of unsavory links and websites. Employees who haphazardly click phishing links or access malware-ridden pornography sites can put your business at risk. Working with infected machines can slow down the entire system and, in some cases, completely halt operations. But by using internet monitoring tools you can restrict access to dangerous websites, and identify reckless employees to remove their internet privileges, if necessary.

Controlling bandwidth usage Even while using the internet for the right purposes, bandwidth can be used up quickly. Internet monitoring gives you up-to-the-minute reports on your bandwidth usage. Once you have a clear understanding of your company’s overall bandwidth usage, you can then control its expenditure. This feature allows you to prioritize bandwidth for critical business applications and reduce bandwidth for less necessary websites.

Increasing productivity on the internet Internet monitoring software may be a powerful tool, but it should be used responsibly. As a business owner, you need to walk a fine line between over-surveillance and under-surveillance. What you should do is establish a clear internet policy. Then, explicitly define the disciplinary measures to be dispensed on anybody who goes against the requirements of the internet policy. And deal with time-wasting employees on a case-by-case basis. It’s unreasonable to remove everyone’s Facebook privileges because one or two abused theirs.

Employee productivity can be difficult to achieve, especially with the proliferation of what we would like to call, “procrastination software.” But with web monitoring software, you can truly get your business -- and your employees -- back on track. Looking for more ways to increase business productivity with technology? Give us a call. We’ll be happy to make suggestions.

Published with permission from Source.

Topic business
October 14th, 2016

2016october14_office_aEvery day we see more and more machine learning making its way into our lives. From phones and watches to computers and laptops, it's hard to do anything in the world today without interacting with ‘intelligent’ computers. Well, Office 365 has taken things to a new level, and will be getting more than a few of these features in the near future. Read on to prepare your business for all the changes coming to Office 365.


How many times have you been working in a Word document or an Outlook email and needed to quote a report or copy in a graph from another file? With 365’s new ‘Tap’ service, you have the option to do that without even leaving the application you're working in. Microsoft’s intelligent assistant will even suggest information and data for you to insert based on what you’re writing. You may not even have to make the search -- it will predict what you need in advance!


A blank canvas is always intimidating when creating a presentation. Quickstarter for PowerPoint and Sway gives you the boost you need by suggesting outlines, layouts, and even information based on the subject you’re presenting on. For example, if you’re holding a meeting to discuss a business retreat, Quickstarter will suggest page layouts and important text for lodging, transportation, itinerary, etc. Half of your presentation could be finished within minutes of starting it.


Sometimes it seems like everyone else has stunningly beautiful PowerPoint presentations while ours just look like stock templates. And that’s why we’re so excited about the announcement of Designer. All you have to do is insert your text and your photos or graphics, and Microsoft’s machine learning will automatically position, resize, and fade each component so it looks like a professionally designed slide.


Everyone has made a graph based on Excel data before. It’s probably the swiftest software solution for transforming numbers into charts on the market, and it’s getting a pretty cool upgrade. Now you can convert geographic data like country names into colored and categorized maps. Go ahead and select a second column of data and watch the countries light up based on the differences between the data points in the second column. Do you have sales data that’s organized by location? Maps will let you create a chart that displays that information with little to no manipulation necessary.


The last announcement comes in the form of a standalone dashboard for aggregating your work habits. MyAnalytics pulls data from various 365 tasks to help you recognize meetings trends, most productive times of day, and project progression. And if you’re not ready to do anything with this data yourself, the dashboard will make suggestions to you such as ‘focus time,’ best collaborators, and productivity goals.

With these exciting and intelligent additions, entirely new levels of business productivity are possible. Even before Microsoft announced these features, Office 365 reigned supreme as one of only a few truly wonderful pieces of productivity software. If you haven’t made the transition yet, there’s no better time -- call us today.

Published with permission from Source.

Topic Office
October 10th, 2016

2016october10_socialmedia_aFacebook is constantly working to improve communication between different parties. What started as a means to communicate socially is now used to improve communication at work, too, through Facebook at Work. After spending several years trying to find a way to turn FB into an enterprise solution, Facebook at Work will finally be launched today. The new service is meant to help workers communicate with their colleagues and share information. Let’s take a look at how.

Facebook releases generally take place in the company’s home country, the US. However, this time around the social media giant will launch its take on enterprise communication tools in London, where Facebook at Work was first dreamed up.

Facebook at Work has set its sights on improving productivity in the workplace. In addition to aesthetic updates like changing from the iconic blue color to a business-friendly grey, users will have a totally separate platform from the original Facebook. Work accounts are strictly for work interactions and will not mix with users’ personal profiles. So how is it different from just creating a work-friendly account on the original platform?

Facebook at Work creates a microcosm of the social media site, just for your company. Employees can communicate with coworkers, post pictures, plan for upcoming events, and make office announcements at ease. As an added bonus, Facebook at Work will employ auto-translate functionality to make communication between foreign nationals easy.

Aside from the fact that transitions will be easy with so many people already using the site for personal accounts, Facebook at Work is hoping Work Chat and Video Call options will be able to rival the likes of Skype for Business, Google Hangouts, and Slack. And with the addition of new avenues of privacy come new security guarantees. In an attempt to assuage the concerns of HR departments and paranoid employees alike, the improved security measures in Facebook at Work are separate from the personal platform and unique to the enterprise.

Regardless of whether or not you’re a fan of the original, Facebook at Work is a product keen on helping enterprises improve communications and increase work productivity. If you’re interested in getting in on the ground floor of this new workplace application, we’re your ticket. From product updates to completely new social media sites, we’re your one-stop-shop for getting the word out about your business and your product. Message us for more information today.

Published with permission from Source.

Topic Social Media
October 7th, 2016

2016october7_security_aSocial engineering is the ability to manipulate people into willfully giving up their confidential information. The data varies, but in terms of cyber security this usually means passwords and bank information. Criminals are using social engineering to gain access to your business and its network by exploiting employees who often don’t have a clue about what is happening. Avoiding it is a matter of training, and we’re here to educate you on the subject.

As more and more of our information moves into the digital realm, criminals are turning to social engineering to trick people into trusting them with their delicate information. People often trust others too easily and make themselves the targets of easy attacks from criminals. These attacks may come in the form of messages, baiting scenarios, fake company responses, and many others.

Most often, messages are sent to users in the form of an email that might contain a link or something to download. Although they may look legitimate, these emails often contain viruses; once the link is opened or you attempt to download it, a virus latches onto your computer, giving its creator free access to your email account and personal information.

Emails such as these can also come with a compelling story about needing help, winning the lottery, or even paying taxes to the government. Under the veil of legitimacy, criminals will ask you to trust them with your account details so they can either reward you or help you avoid fines and punishments. What you actually get is a bad case of identity theft.

In another scenario, criminals will bait their targets with “confidential information regarding their account.” This may come in the form of fake company messages that appear to be responses to your claims, which are followed up by a request for login details. While victims believe they are slamming the door on a crime by providing their information, they’ve actually provided their attackers with the keys.

There are several ways people can avoid becoming victims of social engineering. First, always ensure that you delete all spam from your email, and thoroughly research sources before responding to claims from a company -- even if it seems like the one you normally use.

The same applies for links. Confirm the destination of any link before clicking on it. Sites like are often used to shorten long and cumbersome links, but because users have grown accusomted to them they are often used to hide malacious misdirections.

Never give out sensitive information that includes your password, bank information, social security, or any other private details. No respectable financial institution will request this type of information through email or a site other than their own. If you’re unsure, navigate away from the page you’ve been sent to and visit the page you believe to be making the request. If the address doesn’t have the letter ‘s’ after ‘http,’ it’s likely a scam.

Last but not least, check that all your devices are protected by the most recent antivirus software. While the strength of social engineering lies in the fact that it’s people-driven rather than technology-driven, antivirus software can help detect and prevent requests from known cybercriminals.

Cyber security is essential to the success of any modern business. Don’t let yourself become victim to criminals who have mastered the art of social engineering. While we’re proud of our extensive experience as technology professionals, we also have more than enough expertise to keep your business safe from those who are using people-based exploits. Get in touch with us today for all your security concerns.

Published with permission from Source.

Topic Security
October 6th, 2016

2016october6_hardware_aStarting a business is a big step for entrepreneurs in the IT industry. However, this comes with a myriad of challenges, most of which relate to capital and resources. Among them is the availability of proper equipment. The equipment used in a company determines how smoothly the business will run and must be up to date to ensure success. Because acquiring the proper equipment is expensive, companies often resort to what is called ‘Hardware-as-a-Service’ (HaaS). It’s important to consider all of the advantages of this solution before making a decision, and we’ve compiled such a list here.

Upfront Capital

The main benefit of HaaS is that it enables businesses to conserve on upfront capital expenditures. By replacing these high costs with a lease structure and low monthly payments, resources can be redirected toward other budget items. As a result, the business will have more resources that it could have otherwise used to purchase the computers.

More modern hardware

For businesses with outdated equipment, HaaS is an easy workaround for them to upgrade their IT hardware. A service provider can supply the latest equipment at a lower monthly cost, and when their client’s machines age, upgrades can be provided without fear of incurring additional costs. By choosing this route, SMBs won't have to deal with disposing their old equipment. The service provider will take full responsibility for that.

Taxes and accounting

When it comes to tax payments, businesses that opt for HaaS are also at an advantage. Equipment will be listed as a service from a vendor rather than a capital expense -- thereby decreasing their tax liability. SMBs will enjoy all the benefits of cutting-edge equipment, without the taxes that usually accompany it. HaaS allows companies to get the equipment they need without running the risk of incurring more debt. Having a balance sheet with less debt is beneficial to the business, as it provides the business with secure financial services to expand.

However, when it comes to HaaS, it is important to consider what sort of technology the business needs. For example, if there is a substantial need for equipment, the best option is to choose HaaS rather than incur debt from purchases. For more information on managed IT solutions and outsourcing your technology difficulties to the experts, contact us today.

Published with permission from Source.

Topic Hardware
September 30th, 2016

2016september30_businessvalue_aMost people tend to think that the concept of virtual reality has a place with The Jetsons family, but not so much at the office -- think again. Recently, more and more businesses are exploring ways they can mesh virtual reality with daily business operations to possibly help benefit customer service and even employee satisfaction. Take your business to the next level by embracing three dimensions instead of two. Here’s why:

Create your own virtual product prototypes

With the help of virtual reality, you’ll no longer have to rely on manufacturing when you want to see what your product physically looks like and how it might work. These virtual products allow you to make any changes before going through with production. According to Abi Mandelbaum, CEO and co-founder of YouVisit, “Model creation in VR, for example, can save companies time and money, as these types of models or prototypes allow viewers to examine a product and make changes without the time or expense of building a physical model.”

Virtual designs for engineers

Especially beneficial for engineers, architects and other professionals that work with building or engineering large structures, virtual reality helps save both time and money. As an alternative to small models or 2D renderings, VR offers a more immersive experience that helps design and replicate structures.

Virtual tours

Let’s say that you’re a real estate agent showing houses to potential buyers. Your buyers might be in a different state or simply don’t want to spend time going from house-to-house. Virtual reality allows customers to see what the home looks likes in a three-dimensional setting without them having to actually be there.

Showing all the angles of a product

In order to entice buyers into making a purchase, they must first get an idea as to what it’s actually like, and they need to see as many angles as possible -- especially for products that customers don’t get to physically touch. With virtual reality, customers are given a better idea of what your product is like. Abi Mandelbaum says that “Virtual reality can allow current and potential customers to explore a product before they commit to making a purchase. Furthermore, VR completely immerses customers, helping place a product directly into their (virtual) hands or empowering viewers to see a product in action.”

Take customers on an adventure

If you are in any tourism or adventure-based business, you can use virtual reality to give customers a taste of what to expect from the attractions. Imagine that you have an amusement park and want to attract customers’ attention. You can opt to offer a short VR replication of one of your rides so people can see whether or not they’d like it. Or if you own a resort or campground, you’ll also be able to create reality versions of whatever activities you offer.

VR has the potential to take your small- and medium-sized business to the next level if done properly of course. If you have any questions about how you can mesh virtual reality with your company, don’t hesitate to send us an email or give us a call. We’ll be more than happy to assist with your queries.

Published with permission from Source.

Topic business
September 29th, 2016

2016september29_office_aThe cloud has made it easier for people, businesses, and companies to interact and collaborate. And one of the best productivity tools on the market is Microsoft Office 365, which is making it even simpler to store, organize and share files online. Thanks to its newest update, you can enjoy all these functions when working with teammates, business partners, and customers outside of your organization. Read on for all the details regarding 365’s new guest-collaborator feature.

This new functionality mainly centers around Office 365 groups. A 365 group is essentially an email address with Office privileges that several people have access to. For example, if you have an Editorial Group, each individual writer at your organization will receive emails, calendar invites, and document read/edit privileges sent to

If you’re interested in adding a guest from outside of your organization to an Office 365 group, the process is simple. From the group administration dashboard, click “Add Members.” Then, all you need to do is enter the email addresses of whomever you would like to add, and voilà.

Guest collaborators will receive an email alerting them of their new addition and access to group files, emails, and calendar items -- all accessible via Office on the web.

Take note, however, of Outlook’s alert: “You’re adding a guest to this group. As a member, they’ll have access to group content.” This will grant new guests all the same read/edit privileges as other group members -- including privileges from before the guest was added.

There is no requirement for guests to have a Microsoft account, and by always labeling the new member as a guest, original group members won’t ever have to worry about forgetting who should receive confidential document privileges.

Unless the guest is a trusted partner, we recommend creating 365 groups specially designated for the purpose of outside collaboration to ensure the privacy of your cloud documents. Administrators can remove them at any time, or guests can volunteer to leave on their own.

Adding and removing collaborators from outside of your organization may be as simple as adding an email address to a list, but the possibility for improved teamwork is limitless. If at any point in your workflow you feel that your work is suffering from bottlenecks in creation, communication, or collaboration, there’s a good chance Office 365 has a solution. If there’s anyone who will know that solution, it’s us. Message us today about collaborating on all your productivity dilemmas.

Published with permission from Source.

Topic Office
September 21st, 2016

2016september21_security_aAs with all technology, trendy phrases come and go with the passing of every IT conference and newly released virus. And when dealing with cybersecurity, keeping up with them all can mean the survival -- or demise -- of a business. If you’re looking for a list of the industry’s most relevant terms, you’ve come to the right place.


For a long time, the phrase ‘computer virus’ was misappropriated as a term to define every type of attack that intended to harm or hurt your computers and networks. A virus is actually a specific type of attack, or malware. Whereas a virus is designed to replicate itself, any software created for the purpose of destroying or unfairly accessing networks and data should be referred to as a type of malware.


Don’t let all the other words ending in ‘ware’ confuse you; they are all just subcategories of malware. Currently, one of the most popular of these is ‘ransomware,’ which encrypts valuable data until a ransom is paid for its return.

Intrusion Protection System

There are several ways to safeguard your network from malware, but intrusion protection systems (IPSs) are quickly becoming one of the non-negotiables. IPSs sit inside of your company’s firewall and look for suspicious and malicious activity that can be halted before it can deploy an exploit or take advantage of a known vulnerability.

Social Engineering

Not all types of malware rely solely on fancy computer programming. While the exact statistics are quite difficult to pin down, experts agree that the majority of attacks require some form of what is called ‘social engineering’ to be successful. Social engineering is the act of tricking people, rather than computers, into revealing sensitive or guarded information. Complicated software is totally unnecessary if you can just convince potential victims that you’re a security professional who needs their password to secure their account.


Despite often relying on face-to-face interactions, social engineering does occasionally employ more technical methods. Phishing is the act of creating an application or website that impersonates a trustworthy, and often well-known business in an attempt to elicit confidential information. Just because you received an email that says it’s from the IRS doesn’t mean it should be taken at face value -- always verify the source of any service requesting your sensitive data.


Anti-virus software is often misunderstood as a way to comprehensively secure your computers and workstations. These applications are just one piece of the cybersecurity puzzle and can only scan the drives on which they are installed for signs of well known malware variants.

Zero-day attacks

Malware is most dangerous when it has been released but not yet discovered by cybersecurity experts. When a vulnerability is found within a piece of software, vendors will release an update to amend the gap in security. However, if cyber attackers release a piece of malware that has never been seen before, and if that malware exploits one of these holes before the vulnerability is addressed, it is called a zero-day attack.


When software developers discover a security vulnerability in their programming, they usually release a small file to update and ‘patch’ this gap. Patches are essential to keeping your network secure from the vultures lurking on the internet. By checking for and installing patches as often as possible, you keep your software protected from the latest advances in malware.

Redundant data

When anti-virus software, patches, and intrusion detection fail to keep your information secure, there’s only one thing that will: quarantined off-site storage. Duplicating your data offline and storing it somewhere other than your business’s workspace ensures that if there is a malware infection, you’re equipped with backups.

We aren’t just creating a glossary of cyber security terms; every day, we’re writing a new chapter to the history of this ever-evolving industry. And no matter what you might think, we are available to impart that knowledge on anyone who comes knocking. Get in touch with us today and find out for yourself.

Published with permission from Source.

Topic Security
September 20th, 2016

2016september20_hardware_aAmong all the new-fangled gizmos and whatchamacallits that pop up daily, hard drives remain a vital component for all types of computers. It’s completely normal to get a new one every couple of years, but with the overwhelming amount of choices available, a simple purchase becomes a difficult ordeal. Because we don’t have a tech fairy that can conjure up what we need, we’ve compiled four things you need to know before purchasing your next hardware.

Hard Disk Drive VS. Solid State Drive

Firstly, you have to know which type of data storage you plan to use: Hard Disk Drive (HDD) or Solid State Drive (SSD).Capabilities of HDDs are on par with SSDs -- but that doesn’t mean there aren’t any pros and cons. An SSD is a type of drive that uses flash memory for storing data, as opposed to spinning metal disks found in the traditional HDD -- think of it like an extra large USB thumb drive.

On the upside, SSDs are faster at reading and writing data. They require less energy, are silent, and generally have longer lifespans. Downsides include small data capacities and a heftier price tag. It all boils down to what you're going to your needs. Go for HDDs if you have budget restrictions or are looking for a backup/external drive; go for SSDs if the drive will run frequently-accessed files and programs.

Physical size and interface

After deciding between an HDD or SSD, you now have to choose a form factor. Luckily there are only two choices: the 3.5-inch drive and the 2.5-inch drive. The right one will likely depend on your current setup. With traditional HDDS, data is stored on spinning metal disks, meaning that more disks will be needed to expand data capacity. Because of this, desktop HDDs tend to be 3.5 inches with a maximum capacity of 4 TB, whereas laptops are 2.5 inches with a maximum capacity of 2 TB. SSDs are made smaller since they don’t require any removable parts, meaning they’ll fit easily into the 2.5-inch form factor. Adapters are available if you need to use the SSD in a 3.5-inch connector.

Specifications and performance

Now that you know what kind of drive to buy, it’s time to narrow down the candidates and find the best one that suits your needs. Here are some factors you need to consider:
  • Storage capacity - HDDs come in various sizes, but due to physical limitations, they cap off at 4 TB. Whereas SSDs are much smaller and doesn’t exceed the 1 TB mark - some consumer-level SSDs rarely exceed 512GB.
  • Transfer speed - Performance of consumer-level HDDs are determined by multiple factors, and revolutions per minute (RPM) is an important one. Higher RPM means faster data transfer between drives.
  • Cache space - If a hard disk needs to transfer data from one section to another, a special area of embedded memory known as the cache is utilized. Larger cache enables data to be transferred faster (because more information can be stored at one time). Modern HDDs have cache sizes ranging from 8-12 MB.
  • Access times - HDDs have a couple of factors that impact their performance. One is the time it takes for the reader to start reading or writing data from the drive. For SSDs, you want to look for sequential read and write speeds (also known as sustained reading and writing speeds). Just as long as the speeds are within the SATA connector’s max speed, you'll be fine.
  • Failure rate - Though all things mechanical gradually wear and tear over time, not all HDDs are the same. Some models last six months where others make it past six years. You must do adequate research on a per-model basis before making a purchase.

External VS. Internal

The final step is to decide whether you want the hard drive to reside within of if it will get its own compartment outside. External drives are ideal for storage and backup purposes; they generally connect with a USB 2.0 that caps out at 480Mb/s -- newer models that support USB 3.0 boasts a max of 5.0Gb/s. Unless the model you get is USB 3.0 compatible, the speed will likely be insufficient when it comes to running an operating system.

Speed issues aside, they’re portable and can be shared with multiple computers. They can even be plugged into TVs and media centers for direct playback. If portability falls second to speed, or if your current system lacks a working data drive, internal is the best choice.

Now that you’re armed with the necessary information, buying your next hardware should be a pleasant experience, like a walk in the park. If you have further questions or would like to know more, feel free to contact us by phone or email; we’re more than happy to help.

Published with permission from Source.

Topic Hardware