Blog

April 2nd, 2015

SocialMedia_Mar30_AFor businesses using Facebook to promote themselves locally, nationally or even globally, your page like count is pretty much the holy grail. It’s arguably the most important metric you can use to get a handle on the reach of your posts and the effectiveness of, and return on investment, from your Facebook marketing efforts. Yet Facebook recently announced that business page owners would see a drop in their like count. Here’s what you need to know.

Facebook’s announcement means that since March 12 you may have seen a drop in the number of likes, or fans, attributed to your page. If you’ve been wondering what you did wrong to cause the drop, you can rest assured that it’s unlikely to be a result of ineffective marketing or unengaging content on your part. Rather, Facebook has been hard at work removing inactive accounts from the social network.

The kind of Facebook accounts affected by the move are those of deceased users whose friends or family have opted to have the profile memorialized. The page remains visible, but is clearly marked as in remembrance of the user and becomes a place for relatives to share memories. Accounts also affected are those whereby the user has opted to deactivate their profile and take a break from the site. In the case of deactivated profiles, if the user later returns to Facebook and begins using their profile again, the like will be re-added to your page’s count at that point.

In making this move, Facebook aims to ensure that the like count for a page more accurately reflects the number of active users who actually see and engage with the page’s content. There’s no denying that it is easy to become distracted by high like counts, when often the reality is that only a fraction of those users are the people you are aiming to target, or indeed real humans at all. The social network already filters out likes and comments for specific posts from those with deactivated or memorialized accounts, so this change simply represents an extension of this policy to the more visible metric of a page’s overall like count. From Facebook’s perspective, the move also helps it to deliver a better overall experience, since taking the bloatedness out of artificially inflated numbers helps users get a better idea of which pages are popular and which are most relevant to their needs and interests.

Businesses should consider Facebook’s shift a positive one, since it leaves you with a clearer perspective on the real audience your page is getting and removes the potential to be seeking false comfort from a high page count that doesn’t actually reflect the level of active engagement. The move has echoes of recent efforts by Instagram to flush out spam accounts from its system - some high-profile celebrities saw their follower counts drop by the thousands after these accounts were banished. Though the dip in Facebook page likes may continue for a further few weeks as more accounts are flushed out from the count, most page owners will notice only a small difference. If you suffer a more drastic drop, treat it as a wake-up call to try new tactics to deliver engaging content and organically drive a more genuine Facebook audience.

Need advice on how to build a social media audience and use it to generate leads? Get in touch today and see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
April 1st, 2015

iPhone_Mar27_AiPhone users around the world rejoice - your busy life can now be kept in order on your favorite smartphone, as Google has finally unveiled the long absent Calendar app for Apple fans. There will be no more trying to half-heartedly integrate the features of Google Calendar with your iPhone’s in-built scheduling tools. You can now happily order your existence completely to the tune of your Google-dependent existence, and that longing need be no more.

Like its Android sibling, Google Calendar for iPhone takes a colorful approach to displaying your engagements in a daily or three-day view; much like the web version, events from different calendars are categorized by color for quick and easy identification. As well as your existing Google calendars, the app imports and works with any different calendars you already have setup using your phone’s own tools. You can also take a step back and look at the whole month at a glance - though you don’t see individual appointments in this view, it allows you to select a specific date from the calendar and zoom back in to check what you have going on.

Continuing the aesthetic theme, the app takes your diary entries and prettifies them - think a background image of palm trees if you enter the details of your upcoming holiday to the Bahamas. You’ll also get useful supporting data for your day-to-day events, like maps to get you to your next meeting or an idea of the weather when you jet into a new city for the night. And if you’re a Gmail user, you can have the app automatically create events from your email - perfect for having details of meetings and travel bookings plugged into your schedule for easy reference. Features like this bring you the benefits of travel planning apps like Tripit without the hassle of having to forward each email confirmation across first.

Adding diary engagements manually is a breeze, too - this functions in much the same way as the web-based Google Calendar, except that you can tap into your iPhone’s contact list to select those you want to invite to your events. The app can also go some way to predicting where you’ll host each event, and so autofill the location for you.

While many of the features of the app are not dissimilar to things you can already accomplish using Google Calendar on the web, the app’s release means all of those tools are finally bundled up and easily accessible to those of us who just can’t stray too far from our iPhone. A switch to the new Google Calendar for iPhone app means a big step up in performance and productivity if you’re currently using the far more basic features of your phone’s in-built calendar app.

Want to learn more about using the iPhone in a business setting? Give us a call today.

Published with permission from TechAdvisory.org. Source.

Topic iPhone
April 1st, 2015

Security_Apr1_AIn today’s technology-driven world, everyone uses email as the central hub for their personal internet activities, whether it’s communication, forum registration or newsletter signups. Email is one of the most useful tools the internet has made possible. But as emails become more prevalent, the importance of email security becomes more significant than ever. Applying these email management tips will protect your email account from hackers and viruses.

Use separate email accounts

Most people use a single email account for all their personal needs. As a result, information from websites, newsletters, shopping deals, and messages from work get sent to this one inbox. But what happens when someone breaks into it? There’s a good chance they would be able to gain access to everything else.

Having multiple email accounts will not only boost your security, but also increases your productivity. You can have a personal account to communicate with your friends and family, another solely for receiving emails from work, and one recreational account for various website registrations and getting newsletters. Wise email users never put all their eggs in one basket!

Set strong passwords

Too many email accounts have predictable passwords. You might be surprised to learn that email passwords like ‘123456’, ‘qwerty’, and ‘password’ itself are still the most common around. For the sake of security, be a little more selective with your passwords. Spending a few moments on coming up with a good password will be beneficial in the long run. Mix upper and lower case letters, numbers, and special characters to form a unique password that makes sense and is memorable to you, but no-one else. Also, never use the same password for all your email accounts. This way, if someone hacks one of your accounts, all of the others are still safe.

Beware of links and attachments

When you see a link in an email, don’t click on it unless you’re expecting the link from a known source, such as from your friend or a confirmation link for your game account registration. The truth is that you never know where those links might lead you. Sometimes they can be safe, but other times they can infest your computer with viruses and malware.

Similarly, if you’re expecting a file from your friend or family, then go ahead and open the attachment. It’s always good to know the person sending the file. But be wary of attachments in emails from strangers. Even if the file name looks like a JPEG image, you should never open it. File names can be spoofed, and innocent files may be a clever virus in disguise, ready to latch itself onto your computer the moment you click on it.

Beware of email phishing

Phishing is a type of online scam when malicious users send you an email, saying that they’re representatives from high-profile websites like eBay, Facebook or Amazon. They claim that there’s a problem with your account, and that you should send them your username and password for verification. The fact is that, even if there was a genuine issue with your account, these companies would never ask for your password. You should ignore these phishing emails and sweep them into your spam box.

It all comes down to common sense when you’re dealing with email security issues. If you’re looking to secure your business emails, give us a call today and see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
March 30th, 2015

HealthCare_Mar30_AElectronic Medical Records (EMR) are growing fast in popularity among healthcare service providers. EMR eliminates paper-based medical information, therefore providing healthcare staff with faster accessibility and easier navigation through patients’ medical records. Although EMR has a user-friendly interface, it is a highly complex system to implement. And without proper planning and implementation, you may not achieve the results you had hoped for. So here are some things to keep in mind when your healthcare business is implementing EMR.

Make sure the way is clear

The most important step before you start implementing EMR is to ensure that your organization’s governance supports this project all the way. You don’t want to have to change direction halfway through the implementation, when things are just about to fall into place. Working closely with key stakeholders and department leaders will help you to avoid roadblocks. So make sure everyone agrees to this strategic change before proceeding.

Assign leaders

Good leadership from dedicated staff is crucial for EMR implementation success. So you need to form a team of representatives from each department. This group of employees must be committed to participating in an EMR implementation plan and managing meetings. It’s important for assigned leaders to have a thorough understanding of the whole EMR implementation process, so they can relay accurate information to their subordinates. These staff should always be present and visible for any inquiries related to the EMR integration.

Prepare for change

The implementation of EMR will most likely change the way your employees work. The transition can be intimidating and, if not addressed early, can lead to a lack of understanding and participation. That’s why EMR implementation leaders must prepare organization members for change. In addition to educating employees about the importance of EMR and how to use it, ongoing support must also be provided during the implementation phase. For instance, setting up helpdesks to answer questions can clear up confusion. Making an early announcement about the transition will also alert employees about the change.

Forecast costs

Implementing EMR can be costly for major healthcare providers. There will be additional costs along the way and, if you approach this with limited resources, you may not fully succeed with the implementation. It is important to accurately predict overall costs required for spreading the word, training employees, and providing support during implementation.

Involve everyone

Since EMR will be used across the whole organization, every employee should be informed about its implementation. They should also receive proper training to learn more about EMR, how to use it, and the benefits it will bring to health care operations. Feedback should be collected from employees before, during, and after the implementation process.

Implementing EMR can be a tricky and time-consuming task, but will definitely benefit your health care practice in the long run. If you want to adopt EMR in your organization, give us a call today.

Published with permission from TechAdvisory.org. Source.

March 27th, 2015

AppleMacOS_Mar27_AApple announced the release of an all-new MacBook at its Spring Forward Apple Watch event earlier this month. This latest innovation in the MacBook family is simply named the New MacBook, creating a new product line alongside the existing MacBook Pro and MacBook Air. Here’s a rundown of the New MacBook’s specs and features, and how they might impact your work if you’re thinking of using one.

Design

You’ll be amazed how compact the New MacBook is. It is currently the thinnest notebook Apple has to offer, measuring only 13.1 millimeters in thickness. It is also very light, weighing only two pounds, or less than a kilogram. MacBook series usually come in silver, but the New MacBook is available in Space Gray and Gold hues, similar to the iPhone and iPad.

Display

The New MacBook sports a high-definition Retina display, with a resolution of 2304x1440 pixels. The 12-inch display screen is wide and roomy enough to engage with web browsing, applications and programs efficiently.

Keyboard and Trackpad

Apple has always incorporated some of the best keyboard and trackpad technologies in its MacBook machines. A big keyboard change sees the traditional scissor mechanism replaced with a butterfly mechanism, offering users a better typing experience. The butterfly mechanism is wider and is made from a stiffer material, meaning that it’s more stable, responsive, and takes up less vertical space.

In addition to keyboard improvements, Apple has also made changes to its trackpad. The new Force Touch Trackpad is pressure sensitive, and can tell the difference between a tap and a click. You can take advantage of the Force Touch and find new ways to interact with the MacBook, such as activating certain applications by putting more pressure on the trackpad.

Silent operation

The New MacBook doesn’t need a built-in fan to cool itself down. With the assistance of Intel’s Core M chip, the New MacBook generates less heat, and disperses sidewards the heat that it does create. It will remain cool and virtually silent, even when you open multiple programs.

Battery life

Apple has made major improvements in the New MacBook’s battery capacity, despite its thinner and lighter design. The newly-designed battery extends the New MacBook’s life further, allowing up to nine hours of web browsing, or ten hours of watching videos.

Price and release date

The New MacBook will retail between $1500 and $2000, depending on specifications. Apple will begin selling the New MacBook on April 10 through its online store.

To learn more about how your business can benefit from using Mac devices, give us a call today.

Published with permission from TechAdvisory.org. Source.

Topic Apple Mac OS
March 23rd, 2015

BusinessContinuity_Mar23_AA business continuity plan (BCP) is often defined as a method of putting businesses back on their feet in the event of a disaster. With this in mind, companies are increasingly concentrating their efforts on developing a BCP so that, when unexpected disasters strike, they can minimize damage and continue to function as normally as possible. But with many abbreviations and terms that may sound unfamiliar to average employees, or even business owners or managers, understanding these common BCP terms is vital.

Battle box - a tool box where necessary equipment and vital information are stored. These objects and pieces of information should be useful in a disaster. Typical items include a first aid kit, laptop, protective equipment, and communication devices.

Business impact analysis (BIA) - a process to evaluate the impact that a disaster may have on a business. The BIA shows what a business stands to lose if some parts of its functions are missing. It allows you to see the general picture of your business processes and determine which ones are the most important.

Call tree - a comprehensive list of employee contacts and their telephone numbers. Call trees are used to notify out-of-office employees about a disaster. Companies can use a software program to contact people on the call tree by sending automated emails and text messages. In order for a call tree to work, employees should provide alternative contact options and their information must be up to date.

Data mirroring - a duplication of data from its source to another physical storage solution or the cloud. Data mirroring ensures that crucial information is safe, and companies can use the copied data as backup during a disaster.

Exercise - a series of activities designed to test a company’s business continuity plan. When an exercise is carried out, there will be an evaluation to decide whether a BCP is meeting standards or not. An exercise can identify gaps in, and the drawbacks of, a BCP and is therefore used as a tool to revise and improve a business continuity plan.

Hot site - an alternate location equipped with computers, communication tools and infrastructures to help a business recover information systems affected by the disaster.

Plan maintenance - a process of maintaining a company’s business continuity plan so that it is in working order and up to date. Plan maintenance includes scheduled reviews and updates.

Recovery time objective (RTO) - a period of time in which companies must recover their systems and functions after a disaster. This is the target time for a business to ideally resume its delivery of products and services at an acceptable level. RTO may be specified in business time (e.g. one business day) or elapsed time (e.g. elapsed 24 hours).

Business continuity plans can be a hassle to design and implement without proper understanding of their requirements. If you want to learn how you can protect your business from disasters, give us a call today.

Published with permission from TechAdvisory.org. Source.

March 20th, 2015

iPad_Mar20_ASince the launch of the original iPad Mini, it has seemed like the direction of travel has been towards smaller, more portable devices. In many ways it mirrors the trend in mobile phone development prior to the arrival of smartphones on the scene - every device was smaller than the last. But, dress it up how you like, there’s no avoiding the fact that when you decrease the size of a device, some of its features end up being sacrificed too. Here’s why you might want to dust down that old, full-sized iPad and start rediscovering it in all its glory - or better still, grab a brand new iPad Air 2.

It’s big enough to share

Whether in meetings or on the go, the full sized iPad screen is better suited to showing documents, images and web sites to others. The iPad Mini may be more easily portable, but its screen size is comparable to that of the iPhone 6, and a phone just isn’t the best platform for displaying information to a group. The screen size on models like the iPad Air makes this much easier and more effective.

It takes great photos

For some time, the iPad camera seemed inferior to that of the iPhone. But the iPad Air 2 changes all that - the 9 Megapixel camera makes it perfect for photo needs in the office. We’re thinking instant capturing of whiteboard scribbles at the end of a brainstorming session, quickly and efficiently scanning documents, and maybe just the odd workplace selfie. It’s suddenly comparable to the camera power of the iPhone and superior to that of the iPad Mini. Combine that with the bigger screen, and the business productivity advantages of the full-sized iPad Air 2 are plain to see.

It’s a productivity machine

Again it comes partly down to the full-sized screen, but a more generously proportioned iPad - whether that’s the new iPad Air 2 or an older model - is simply better for getting the job done. While the iPad Mini boasts the same resolution as the iPad Air 2, the latter’s extra screen area gives you more space to work with. The Mini offers the same amount of limited room for maneuver as the latest iPhone model, which is fine when you’re on the move and want to complete a quick task on the fly, but less so when you need to get serious work done. The larger screen allows you to drag and drop information, move things around and switch between multiple applications at ease.

Getting the highest levels of productivity out of your technology is all about selecting the gear that works best for you. Want to learn how to best deploy iPads and other Apple devices in your business? Give us a call.

Published with permission from TechAdvisory.org. Source.

Topic iPad
March 19th, 2015

Virt 164_ATo migrate to the Cloud or virtualize your machines? That is the question. Both Virtualization and Cloud Computing have benefits. But figuring out which one is right for your organization is another story. If you’re having trouble deciding which technology is the best choice for the future of your business, this article will help you figure it out.

The difference between Cloud Computing and Virtualization

To understand which technology you need, you first need to understand the role of that technology in your business.

Virtualization is basically using virtual hardware or software stored off-site, instead of the actual physical asset being in your office. A common asset many organizations choose to virtualize is a server. So if you’re thinking about buying a new server, you may want to consider investing in a virtual one instead. The advantage of this is that you’ll free up office space and save money on the upfront expense of an in-house server as well as its maintenance costs.

Cloud Computing, on the other hand, is not about individual assets, but instead is an operational model. Your business will run through the Cloud, where employees can create documents, interact with each other and customers, and even store files and data. The main advantage of the Cloud is that it increases operational efficiency and boosts organizational productivity.

Arguments for virtualizing

If you’re considering either the Cloud or Virtualization and have done neither, it makes sense to think about Virtualization first. With both Virtualization and the Cloud, you’re essentially changing the architecture of your business - from physical to virtual. Virtualization, however, is a small change, while Cloud Computing is a more dramatic one. If you opt for going all in with the Cloud right away, it may be a bit mind jarring for some of your staff as they get used to the new technology. And this could slow down their productivity. Virtualizing a few technology assets, instead of your entire workflow system, is an easier way to get a grasp of working with virtual technology for the first time.

A more fundamental reason to choose Virtualization is that you’re just looking to create more office space. In this case Virtualization is a no-brainer.

Arguments for the Cloud

If your organization gets to the point of needing to add virtualized machines or servers quickly, the Cloud can automate this process. However, your IT department must be ready and willing to hand this process over to your end users.

Also, if your organization has been using virtualized machines for some time or is simply ready to overhaul its workflow and operational process altogether, then the Cloud is likely a better fit for your business.

Which is the best choice for your business?

What it comes down to is operational efficiency (Cloud Computing) or saving money and space on individual assets (Virtualization). What’s more important to you?

And do you have a progressive organization and staff that are ready to adapt to using virtual technologies? If not, then Virtualization may be the initial step you need to start changing your organization’s infrastructure to compete in the modern business world.

Want to learn more about Virtualization and Cloud Computing? Contact us today.

Published with permission from TechAdvisory.org. Source.

March 18th, 2015

Security_Mar18_AWe all know that it’s important to maintain high security vigilance across whole spectrum of your IT, from changing your email password regularly to locking your work computer when you are away from your desk. But there are few areas where it couldn’t be easier to score an own goal and make life easy for fraudsters than in the realm of financial services. From your online banking system to mobile payment platforms, these are accounts where it’s absolutely vital to be on your guard against possible intruders. Peer-to-peer payment provider Venmo just made it a little easier to do that.

The Venmo platform is known for its convenience and ease of use, and is commonly used to split the cost of drinks, dinner, taxis and the like. The app is now adding a raft of new security-focused features, in response to criticism of its record for ensuring the security of its customers and their financial transactions.

Back in February, a Venmo user discovered his account had been hacked and used to withdraw almost $3,000 from his credit card. The intruder had also thought to change the email address associated with the Venmo account and to disable notifications of payments, but Venmo did not tell the genuine user about the changes that had been made. Venmo was decried for letting basic lapses in security exist in its trendsetting platform.

Now the service is doing what it can to pick up the pieces and up the ante on the security front. The most obvious change is to incorporate automatic email notifications when changes are made to the basic personal details associated with a Venmo account - a feature which many believe should have been built in from the word go. But the app will also add multi-factor authentication, another name for the two-step verification that can be enabled within Google Apps and other services. This feature makes it more difficult for would-be intruders to gain access to your account, even if they manage to get hold of your password.

Multi-factor authentication works by requiring not only your password for login, but also a second piece of information such as a one-time code - often generated on-the-spot and sent by SMS to the user’s cell phone - or the answer to a pre-set security question. Insisting on two phases to the sign-in process allows another opportunity to stop potential fraudsters in their tracks. The changes being implemented by Venmo also reflect the growing awareness on the part of technology companies for the need to get serious about security and protect the integrity of their systems and their users’ data.

You can put multi-factor authentication to use in your IT systems to keep your business protected. Get in touch with us and we’ll show you how.

Published with permission from TechAdvisory.org. Source.

Topic Security
March 16th, 2015

SocialMedia_Mar16_AWhen taking your business online, it’s crucial you make use of different tools to help boost your online presence. Hashtags are an example of such tools; they are the key to social media buzz and have been added to various social media platforms. Isn’t it time you got a comprehensive view of how different social media sites make use of hashtags, as well as how you can get the most out of them for your business?

Twitter

Twitter hashtags don’t support special characters like +, !, $, %, -, ^, &, * but do support letters, numbers and underscores. There are no hashtag limits as long as you keep your message within the usual 140 characters.

The best way to use hashtags in Twitter is through hosting and participating in Twitter chats. You don’t need to be in an event to network with people through the official hashtag; event organizers usually market the official hashtag very well. In other words, you’ll get additional exposure if you use it.

Useful Twitter hashtag tools include:

Hashtagify which tracks trending hashtags and shows related hashtags for any base terms you provide. TwChat lets you discover, participate in and host Twitter chats. This is best used for monitoring and archiving any hashtag streams.

Instagram

Just like Twitter, Instagram hashtags don’t support special characters like +, !, $, %, -, ^, &, *, but do support letters, numbers and underscores. You can add up to 30 hashtags to a single photo or tag your photo after publishing it by listing the hashtags in the comments.

After you tag your post with a hashtag, you’ll be able to tap on the hashtag to see a page that shows all photos and videos people have uploaded with the same hashtag. Instagram hashtags can dramatically increase your following, especially if you use hot and trending hashtags which are easily found here.

The best use of hashtags on Instagram is to participate in hashtag games like #tbt (Throwback Thursday) and #MondayBlues. Both can increase your following and interactions since people click on these specific hashtags to see photos of other participants. Additionally, location-based hashtags also work very well on Instagram, whether abbreviated or in full, for example #LA and #LosAngeles.

Facebook

Facebook hashtags are similar to other social platforms; they support the standard set of characters including numbers, letters and underscore but don’t support special characters.

However, searching by hashtag on Facebook is a little unlike the rest, in that when you search for a hashtag you often end up on a Facebook page instead of a hashtag search result page. But there’s an easier way to generate hashtag search results - simply add the hashtag text after facebook.com/hashtag/, for example facebook.com/hashtag/cats.

You can also bring up hashtag search results by clicking on any hashtag in your Facebook stream. Do keep in mind that Facebook’s ranking algorithm is complex and seems to classify hashtags according to how closely you are related to the person posting the update, as well as how often the two of you interact.

The growing use of hashtags has changed how we use different social media platforms for the better. Still, it’s important to understand how these different platforms make use of hashtags in order to optimize them to your business’s advantage. Looking to learn more about how social media can help your business? Contact us today!

Published with permission from TechAdvisory.org. Source.

Topic Social Media