Blog

July 15th, 2014

Office365_July14_BWhen people send files as attachments, they’re often looking to collaborate with others for feedback and improved work quality. This, however, has been a time consuming process up until now. For example, when you send an email to your colleague, they must download the file, make their edits, re-attach the file to a new email and then send it back to you. All that ends now, for Outlook Web App has just introduced new features that will help simplify your email tasks while enhancing collaboration.

Side-by-side view of documents and email

When your colleague sends you a document to review, you’ll see the document attached in an email in your Inbox. When you open the attachment, you can now see the contents of that document within the email itself. No more flipping back and forth between windows to get the information you need.

Files supported for viewing in this new feature include Microsoft Word, Excel, PowerPoint files, most types of image files and PDF files. You can perform all of the standard messaging actions right from within this unified view making it easy to review information in the email alongside the attachment itself.

Easy document editing and reply

What do you do when you want to edit the attachment in your email? You download the attachment, make your changes, re-attach the file and send your reply. Now you can say goodbye to all that hassle. With the new side-by-side view, all you have to do is simply click Edit a Copy right above the attachment and message.

When you do this, a draft reply-all message is created for you to store this new edited version of the attachment. Then, a new editable copy of the attachment you received is created and renamed with your name at the end of the filename. This way you can differentiate the new copy of the file from the original one. The new copy of the attachment is live, meaning any changes made are automatically saved. Once you're done editing, simply type a response in the email and click Send. Types of files supported for editing include Word, Excel and PowerPoint files created in Microsoft Office 2007 and above.

Additional enhancements

In addition to the side-by-side view and edit-and-reply enhancements, the attachment user interface has also been updated. Now when you attach files, the overview is bigger and better looking. You can also now download multiple attachments at once in the form of a single zip file, making life a tad easier.

While Outlook Web App's added features might not be a total game changer, you can be sure that the next time you’re looking to collaborate, you’re able to do so faster and easier. Want to learn more about Office 365 and its apps? Contact us today.

Published with permission from TechAdvisory.org. Source.

July 12th, 2014

Office-2013-suiteToday’s organizations constantly are looking for ways to improve efficiency while keeping a lid on IT costs. But factors such as feature sets, usability, availability and effort of support can a big part in the overall cost of any enterprise productivity suite. Which is best? Microsoft Office alternatives have emerged, but there are good business reasons to stick with Office.

Let’s start by looking at the price tags of Microsoft Office 2013, Office 365, Google Apps for Business, and OpenOffice subscriptions, and then move into differentiators among them.

Office 2013 can be purchased in many different ways under many different plans. The cloud version of Office — Office 365 — includes desktop versions of Office 2013 in the Enterprise E3 plan. This E3 plan costs $20 per user per month with an annual commitment, and it comes with desktop versions of Word, Excel, PowerPoint, Outlook and other popular applications for up to five PCs or Macs.

You also get 50 GB of email storage per user, 25 GB of SkyDrive Pro storage, Active Directory integration and online conferencing. In addition, Office includes social media and collaboration tools, Office Mobile for iPhone and Android, compliance tools, and a slew of other perks.

Google Apps for Business with Vault costs a flat $10 per user per month and offers 30 GB of storage. It also provides all Google products, such as Gmail, Calendar, Drive, Docs and Sheets, under one umbrella. Google’s messaging and collaboration tools are used by organizations of all sizes.

At the lowest end of the pricing scale, OpenOffice-Enterprise costs only $400 per year for up to 100 users, and $2 per year for each additional user. OpenOffice provides productivity tools that are similar to the look and feel of desktop Office applications but, as is the case with most open source products, messaging and collaboration aren’t part of the core package.

The following table offers a general comparison of the costs of productivity suite subscriptions for 1,000 users. As a disclaimer, it doesn’t incorporate volume discounts into its calculations, which, for Office 365, are neither transparent nor easy to nail down.

This is just a what-if scenario, so don’t use these numbers to make a pitch to senior management for one suite over another. You’ll need to do the homework for your own specific environment to determine more realistic pricing.

Table: costs of productivity suite subscriptions for 1,000 users

So, why would an organization stick with (or convert to) Office when presented with other, less expensive alternatives?

Office provides the most features

Even if the suite costs more than Microsoft Office alternatives, it also offers the most features by far — technologies that leading businesses use every day. Many administrators feel they can’t meet user needs with only basic Web mail and calendaring and less-robust desktop tools. Nor do they want to deal with add-ons to provide those capabilities. They need full-featured applications and services that are available with a click or two instead of having to spend time to hunt down supplemental applications to fill any gaps.

Those of us who use Office regularly and then use Google Apps or OpenOffice know that their feature sets aren’t the same. SmartArt, a wide variety of document and presentation themes, mail merging, Quick Parts, signature lines, and an interactive function library are just a handful of features that are lacking or nonexistent in the Google and OpenOffice products.

Some argue that the additional features of Office are used by only 20% of users and that the other 80% get by just fine with Google Apps or OpenOffice. That might be true, but what does an admin do when a user needs a missing feature right away? Not having the tools a user needs can kill the “productivity” part of a productivity suite.

Office also comes with new efficiency features that set it apart from its competitors. For example, Office applications may now be tied to a Microsoft account. That means customizations, recent document lists and other settings are available whenever a user logs on from any device using the same Microsoft account.

For example, a user could save an Excel workbook in SkyDrive from a PC, then access that same workbook from a different device. Office then pops the user to the location in the file where he or she last made changes.

For organizations that need to support touchscreens as well as conventional mouse/keyboard setups, the Office 2013 interface is natively designed for both. The Office interface seamlessly supports gesturing, such as swiping and pinching. It also provides text and object selection handles optimized for touch or mouse, as well as the ability to drag objects into place easily.

Admins know how to support Office

Microsoft provides a plethora of configurable settings, giving admins fine-grained control over access, authorization, sharing and integration with social media. Not all of those settings are available in Google Apps for Business or OpenOffice-Enterprise.

More on Microsoft Office and alternatives

LibreOffice and OpenOffice tempt Microsoft Office users

Why you should upgrade to Office 2013 — or not

Mobile users may find that Office alternatives offer flexibility

New collaboration tools provide a viable Office alternative

FAQ: What you need to know about Office 2013 features

Do enterprises even need Office anymore?

IT administrators experienced in implementing and supporting Office can also run into friction when rolling out Google Apps for Business in particular. The most frequent hurdle to transitioning from Office to Google involves changing all accounts, which is time-consuming for admins and users, and can force an organization to alter its current business model.

If you’re running Office 2010 or a previous version today and plan to move to Office 2013, the migration should be relatively straightforward. Desktop admins can use the free Office 2013 Resource Kit for deployment.

Users know how to use Office

Because Office has been a staple on business and home computers for years, users are familiar with its menus and features. They know how to navigate around its tools, even when they change from version to version. And its interface stays the same whether someone is working on a PC, tablet or another mobile device. Switching to a competing suite involves a learning curve for everyone and can greatly reduce efficiency.

Compatibility issues abound with Microsoft Office alternatives

When you’re collaborating with folks from different organizations and sharing documents, how often do you get a word processing document in a format other than Word (.docx) or a spreadsheet that’s not Excel (.xlsx)? Rarely. Part of the reason is that you can save a Google Apps or OpenOffice document in Word format or a spreadsheet in Excel.

However, when you open the file in an Office application, you often run into problems with formatting, along with text boxes, placement of images, columns and so on. Let’s say you get a highly formatted document created in Google Apps or OpenOffice and you open and attempt to edit it in Word. If someone spent a lot of time formatting the documents, those efforts are usually wiped out after the conversion.

The same thing applies to documents created in Office, then opened in Google Apps or OpenOffice. Also, templates developed in Office don’t hold up well when the document is passed from an Office user to a Google Apps or OpenOffice user.

Office is always available

When you run Office 2013 on the desktop, your users have a full version of the Office tools available. That’s a critical feature for organizations that don’t have constant access to the Internet. The same is true of OpenOffice-Enterprise, but not of Google Apps for Business.

However, Google is making inroads with an enterprise-ready version that’s available offline as well as online, so the “always available” factor will likely be a standard benefit of all three suites within the next few years.

Office 2013, Google Apps for Business and OpenOffice-Enterprise are all great suites, but the latter two provide varying coverage and implementations for the tools that employees need to get their jobs done. For a full-featured suite that’s always available whether online or off, Office still rules.

About the authors:

Kim Lindros is a full-time writer, content developer and project manager who has worked around IT since the early 1990s. She co-authored MTA Microsoft Technology Associate Exam 98-349 Windows Operating System Fundamentals (Wiley, 2012) and PC Basics with Windows 7 and Office 2010 (Jones & Bartlett Learning, 2010), among other textbooks, and developed numerous college and corporate courses focused on IT security, Microsoft technologies and Microsoft Office. Lindros has also co-authored certification-related articles with Ed Tittel.

Ed Tittel is a 30-year-plus veteran of the computing industry who has worked as a programmer, a technical manager, a classroom instructor, a network consultant and a technical evangelist for companies that include Burroughs, Schlumberger, Novell, IBM/Tivoli and NetQoS. He has written and blogged for numerous publications and is the author of over 140 computing books with a special emphasis on information security, Web markup languages and development tools, and Windows operating systems.

Original Source

July 10th, 2014

Security_July07_BAs technology continues to expand and improve, many people have come to prefer to use their own systems over their office's tech offerings. This is largely because many of us have newer personal devices that allow us to do so much more than the computers we use at our office. As a result, the issue of BYOD (Bring Your Own Device) has become far more important, especially due to the fact that if left unchecked, BYOD could pose a security risk to your organization.

What should I do about BYOD?

The first reaction of many office managers and business owners, worried about security threats that could stem from BYOD, is to impose an outright ban of devices. While telling your staff they are not to use their devices for work may seem like a quick and easy solution, you can be 100% sure that there will be employees who ignore this policy and use their personal devices for work regardless.

This could put your business at a higher security risk if the rule is ignored, especially if you don't implement any security measures to protect your networks and data. In order to minimize the potential threats BYOD can expose your business to, we suggest you do the following:

1. Consider embracing BYOD

Instead of simply banning personal devices in the workplace take a step back and look to see if there are any benefits BYOD can offer. For example, if you operate on razor thin margins and have not replaced hardware in years, there is a good chance your employees will have better systems at hand. This could help you reduce your overall tech costs.

The same goes for phones for your employees. Why not offer to pay for the plan and allow employees to use their own devices? Of course, you are going to want to implement security measures and usage rules, but if this is easily achieved then it may help reduce your overall operating costs. Before you do implement a system like this however, we strongly recommend you read the rest of this article and follow the steps below.

2. Set up separate networks for employee devices

Oftentimes, the main reason employees bring their devices to the office and use them for work purposes, especially when it comes to mobile phones, is because they can happily connect to Wi-Fi for free without using their data plans throughout the day.

Chances are high that because they use the work Wi-Fi on their device for non-work tasks, they simply keep using the device when they are doing work related activities. This could pose a security risk, especially if you run business-critical operations on the same network. You could nip this potential problem in the bud and simply install another Wi-Fi network for mobile devices and non-critical business processes.

It is usually quite affordable to simply purchase another line and the networking equipment to support this, not to mention the fact that it will keep business-critical processes secure from errant malware. As an added bonus, you will likely see increased productivity because the bandwidth demand will be limited, so important data will move quicker.

3. Educate your staff about security

In our experience, the vast majority of BYOD related security risks are exposed by mistake. An employee may have a virus on a personal phone and be unaware of it. When they connect to the network it can then be unintentionally spread to other computers resulting in a potentially massive security breach.

One of the simplest ways to prevent this is to educate your employees about proper mobile safety. This includes how to spot apps that could contain malware, sharing security threat updates, and teaching your employees how to secure their devices. You really need to stress just how important security is to them.

On top of this, contact an IT expert like us for a recommended anti-virus and spyware scanner for mobile devices that users can easily install. Encourage employees to not just install this but to keep it up to date too. Many of these mobile specific scanners are free and just as powerful as desktop versions.

4. Work with an IT partner to establish a solution that works for you

Beyond education and simple network establishment, it is a great idea to work with an IT partner like us. As experts, we keep tabs on the trends and solutions related to BYOD and will work with you to establish a program that works for your company.

It may be that you don't actually need to integrate BYOD but to update hardware or software to newer versions instead. It could be that there is a simple solution to employees feeling frustrated with slow performance of existing systems at work.

If you do implement BYOD, we can help establish security measures and policies that will ensure your networks and employee devices are secure. The best advice we can give however, is to do this before you start allowing BYOD, as it can be far more challenging to implement and enforce changes when employees are already using their devices at work.

Looking to learn more? Contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
July 10th, 2014

BI_July07_BAs businesses continue to become increasingly networked, there is an exponentially increasing amount of data being made available to them. While this data can be really useful, a lot of it can also be less so, or even useless. However, you are going to continue to collect data, and in order not to be overwhelmed with the sheer volume you should have a well defined data collection system in place.

What is well defined data collection?

Everyone collects data, even people who don't use computers. The key to being able to successfully leverage the data you have available to your business lies in a strong foundation - in this case, how you collect your data. With an appropriate system in pace you will know what data to collect and measure, and just how important it is. From here, you can more effectively analyze and interpret it, allowing you to make more informed decisions.

If you are looking to implement a new data collection system, or improve on how you currently collect it, here are six tips that can help:

1. Think about what customer interactions are important

Often the most important data you need is in relation to your customers. Your first step should be to define important customer interactions. For example, if you own an online store, you will likely want to know where your customers come from, the items they click on, items they add to their cart, and items they ultimately buy.

By first identifying important interactions to track, you can then look for metrics and data collection methods related to these interactions. This makes it easier for you to track the most important data.

2. Think about what behavior-related data is important

Don't just focus on those customers who have completed a purchase or followed through the whole business chain. Think about what behavior could produce data that is important to your organization.

To continue the online store example from above, this information could include how far down the page people scroll, how many pages deep they go when looking at product categories, how long they spend on a site, and where those who don't convert leave from.

Collecting and analyzing data like this can be a great determinant of what is working well and what needs to be improved upon.

3. Look at important metrics you use

Sometimes the way you collect your data will depend on how you plan to measure it. This includes the different metrics you use to define the success or failure of marketing plans, sales initiatives, and even how you track visitors.

Be sure to identify which ones your business currently uses, as these will often point you towards the relevant data you will need to collect.

4. Identify the data sources you are going to use

In many businesses there are redundancies with data collected. For example, a CMS (content management system) will often have some of the same data points as Web analytics, or a POS (Point of Sale) will have some of the same data points as an inventory system. Due to this, you are going to have to identify what systems will provide what data.

On the other hand, many businesses use data from multiple systems for one key metric. In order to ensure that you are collecting the right data, you will need to identify these sources and ensure that they are compatible with your data collecting system. If they aren't, you could face potential problems and even make wrong decisions based off of incomplete data, which could cost your business.

5. Keep in mind who will be viewing the reports

When implementing data collection systems and subsequent data analysis systems, you will likely start generating reports related to this data. It is therefore a good idea to identify who will be reading these reports and what the most important information they will need is.

This information will be different for each audience, so be sure to identify what data they judge to be important. For optimal results, you should think about who will be reading the data reports and what relevant data needs to be collected in order to generate them.

6. Set a reasonable frequency for collection and analysis

This can be a tough one to get right, especially if you work in an industry with high fluctuation or your business is in a constant state of change. Your best bet is to look at when you think you will be needing data. For example, if you are responsible to submit a monthly sales report it might be a good idea to collect data on at least a bi-weekly basis in order to have enough to develop a report at the end of the month.

You should also look at who will be getting the reports and how long different campaigns or business deals will be in place. The frequency will vary for each business, so pick one that works best for your systems and business.

If you are looking to implement a data collection system, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

July 4th, 2014

BusinessValue_June30_BIn the first part of this article, last month, we began to take a look at the content companies create for social media and how they can go about not only getting it shared but also increasing the overall shareability of the content they create. From creating longer blog articles, to using images, and playing on certain emotions, we shared five useful content sharing tips. In this month's article, we look at five more tips that can help ensure your blog articles and content are more likely to be shared via social media.

6. Lists of 10 items are great

One of the most popular forms of blog article written these days is the list article. These articles usually cover three to more than 20 items or tips related to one central topic. Articles of this type are popular because they are not only quick to write, but are also quick to digest as they can be broken up into easy-to-read sections - perfect for those who scan articles on their mobile devices.

With so many lists out there, it can be tricky to nail just how long your list of tips, ideas, etc. should be. From social data pulled by social media experts over at BuzzSumo, it appears that articles with 10 list items get the most shares. It is therefore a good idea to strive to reach 10 points when creating this style of list article.

Some articles however can get quite lengthy, even with 10 items. One strategy might be to separate the list, like we have with this article. Of course, shorter lists can work well too, especially if these include powerful tips. We suggest trying to aim for 5-10 items when you are writing your list articles.

7. People share what they trust

This has been an age-old truth: people go with companies they trust. It has been proven time and again that users will often follow what their friends and people they trust recommend. What this translates to when it comes to the shareability of your articles is that the source of the content needs to be trustworthy.

This can be difficult to establish, especially if you are a new business or new to social media, One of the best ways to achieve this is to include bylines and author bios on your articles. Putting the name of the author (byline) at the top of an article and a brief bio at the bottom will help increase the legitimacy of the article in the eyes of the reader, increasing their trust levels over time,

Another quick way to increase legitimacy is to share an article on specific social networks. Your first thought is likely to be to share away on Facebook, but think about how Facebook is used - people generally share everything, even if it's not trustworthy. Instead, look to the more professional networks like LinkedIn and Google+. Generally, people on these platforms build more professionally oriented networks, often built on trust.

By sharing an article with a byline and bio with your groups in LinkedIn you can quickly build trust, especially if you are active within your network. Once people start to trust your content, there is a higher chance they will read it and consequently share it too.

8. What's old can be new

Have you ever followed a post on Facebook, or any other social media? If you have, you likely know how short of a lifespan content has - when it comes to shares at least. Almost all content posted on social media sites has a lifespan of about three days to a week at most. What do we mean by this? Well, normally after three days you will see the number of interactions - shares, likes, etc - drop by as much as 98%. Go beyond three days and you will usually see another huge drop in the number of shares from the three day mark.

Essentially after three days to a week, your content will likely not be shared or even seen. Most of us know this, and are often quick enough to produce more content and posts in order to keep followers engaged. However, some content can actually be re-shared to keep up or to further interest.

Not all content - articles included - can, or should, be reposted, such as time relevant content like an announcement. Reposting these three weeks after the fact likely does not provide any value to the reader. Content that is written to be always viable however e.g., tip articles, how-tos, etc. are great potential content for resharing.

Some information never really gets old and can be useful to a new audience. Resharing previously posted content like this ensures more people will see and interact with it. For best results, try promoting an article you think was useful about one week after you first posted. Also, be sure to look at season or holiday relevant content - there is a good chance this can be reposted at the relevant time.

9. Know when to share your content

Often, the most important key to increasing the shareability of your content is actually posting it when your desired audience is online. By posting at, or just before, these key times, you increase the chance of the content being seen and interacted with. While there is no set timeframe, you can figure out when best to post through trial and error.

Before you start however, look at your previous content and see when it was interacted with most. Take a look at the days and times, and track this for a few weeks. You should start to see a trend emerge, with the most interactions happening at a certain time and date. Also, apply a little common knowledge. For example, if your target audience is other business owners or managers, posting midday will likely mean content will be missed. However, posting after normal business hours could improve your chances.

From here, try posting content at different times to see what works, and adjust your schedule accordingly.

10. Realize this will all take time

When looking to improve the reach of your content, you need to realize this will take time. Even if you follow these tips, you won't see immediate results. Chances are high this will take months to pay dividends. The key here is to stick with it and to experiment. Try a few different strategies at a time to see what works and doesn't, then go back to the drawing board and improve your plans.

If you are looking to learn more about leveraging social media in your business, we may be able to help. Contact us today for a chat.

Published with permission from TechAdvisory.org. Source.

July 3rd, 2014

HealthcareIT_July03_AThe compliance date for ICD-10 is farther away than it once was, but it’s still coming — and health-care practitioners should be moving forward with preparedness plans, if the results of a recent survey are any indication.

The survey — which questioned physician practices, hospitals, payers, vendors, and others — was conducted by eHealth Initiative and the American Health Information Management Association (AHIMA).

It found that most health-care organizations are using the extra time afforded by the delay of ICD-10 compliance to October 15 to invest, train, and test. Most organizations said they're ready for testing, but some are more prepared than others. Around 40 percent of respondents said they'd start end-to- end testing by the end of 2014, and 25 percent reported that they’d begin by the end of 2015. And, to minimize productivity loss, 68 percent of respondents said they will conduct additional training, with 31 percent hiring more coders to help with the transition.

Concerns about ICD-10 remain, however. One pertains to preparedness, with 45 percent of respondents reporting that they don't have a good sense of their partners' readiness. Another pertains to financial impact, with 38 percent of respondents saying they thought their revenue will decrease, and 14 percent saying they think it will stay the same. Only 6 percent think it will increase.

Clearly, while the ICD-10 transition seeks to improve accuracy of claims and quality of care, not everyone has a clear plan to derive value from it. But now, it seems, is the best time to prepare. We recommend that you contact us today to learn more about how we can help ensure that you are ready for ICD-10.

Published with permission from TechAdvisory.org. Source.

July 2nd, 2014

Windows_June30_BHow did we ever manage without hibernation in the past? The feature was first introduced with Windows XP and is one of the operating system's (OS) most useful power functions. However, with Windows 8 this feature is not readily visible, so you need to find out not just what this feature is about but also how you can enable it on Windows 8.

What is Hibernation mode?

Hibernation allows you to power down your computer while retaining its current operating state e.g., leaving programs open. In other words, with hibernation, your computer saves the contents of its Random Access Memory (RAM) to your hard disk or other non-volatile storage, so that when you want to resume your work you can start where you last left off. Available on every Windows OS, hibernation can usually be set in your power settings manually or even automatically so that it activates when your laptop's battery is low.

How to enable hibernation on your laptop or computer running Windows 8:

  1. In your system tray, click the battery icon and select More power options from the panel that pops up.
  2. In the Power Options window, select either Choose what closing lid does or Choose what the power button does from the left panel.
  3. In the power options window, click on the blue text that says Change settings that are currently unavailable.
  4. At the bottom of the window, a new set of options will become available. Check the box next to Hibernate and click Save changes. Voila, the hibernate feature will now show up in the power options window that is displayed when you press the power button on your computer or laptop.
This feature allows you to resume work from where you left off within seconds, since you don’t have to boot up your computer nor re-open programs you were using. Not only that, but hibernation saves more battery power than sleep mode and uses no power while hibernated, a feature most laptops can really benefit from.

Hibernation is also useful if hardware maintenance has to be performed which requires powering down the hardware. For servers which need to be started up as quickly as possible after maintenance, hibernating and getting going again can be much quicker than shutting down and restarting the server applications.

Despite the benefits of hibernation, it is important to note that your computer does need to be shut down every once in a while to avoid performance degradation. Moreover, you should avoid hibernating your computer when you know you won’t be using it for a long period of time.

Hibernation mode can help boost productivity, decrease boot-up time, as well as help save your computer’s battery time. Interested in learning more about Windows 8/8.1 and its features? Contact us today for a chat.

Published with permission from TechAdvisory.org. Source.

July 2nd, 2014

SocialMedia_June30_BThere are numerous social networks a company can join, but if they are looking to connect to other businesses, colleagues or potential hires the network of choice should be LinkedIn. This powerful network is designed for professionals and offers many benefits that other networks, like Facebook and Twitter, don't or are not able to. As a result, many business owners attempt to build a profile that will work well for them on LinkedIn. The question many ask however is how to go about achieving this.

In this article we will go over eight important steps you need to take in order to build the perfect LinkedIn profile. In fact, we came across a great infographic on Link Humans that could be a big help when following these steps. We strongly suggest you take a look at this when building your profile.

Step 1: Establish your profile

While you don't have to join LinkedIn, it is a good idea if you are looking to connect with other business owners and colleagues through a more professional, business style networking oriented social network. If you do want to connect at this level, the absolute first thing you need to do is to create a profile. This can be done by:
  1. Going to LinkedIn's website (linkedin.com).
  2. Clicking on Join Today.
  3. Entering the relevant information on the following page. We recommend using the name the majority of your customers and clients know you by and your work email address. Personal email addresses are fine if you don't want to fully represent your company.
  4. Selecting Join LinkedIn.
If you use your Facebook account for business, you can also sign up using your Facebook account. Just follow steps 1. and 2. above and click Sign Up with Facebook. You will be asked to log into your account (if don't already have Facebook open in another tab on your browser) then approve the account access rights. Once you've done this you should see your basic profile pop up.

Step 2: Select an appropriate picture

LinkedIn is a work-related network, and to that end you will need to present the right corporate image; this means uploading a professional profile photo. This image should clearly show your face and be cropped to show mainly your head and upper body. The background should be clear or unobtrusive, allowing you to be the main focus.

If you don't have any professional head shots, it might be a good idea to get some taken. Most photographers can snap a few for you, and will be able to provide you with information about how to pose and dress for the shots.

You can add an image to your profile by:

  1. Logging into your profile.
  2. Hovering over Profile which is located in the menu bar at the top of the screen.
  3. Clicking on Edit Profile followed by the camera icon at the top of your profile.
  4. Pressing Change photo and then selecting the image you would like to use as your profile picture from a file on your hard drive.
  5. Ticking Save to set your picture.
The reason a good picture is more important than on other networks is because it has been proven that profiles with professional looking pictures are easier to find and also enhance the potential that other members will want to connect or even recognize you.

Step 3: Fill in your basic information

Once you have a great picture set on your profile go back to the editing screen and add your basic information. This includes your name, role, location, and company. Also, click on the Edit Contact Info tab to the right-hand side of your basic information section. Add as much contact info as you feel comfortable with; we recommend your email address and company website at the very least.

Step 4: Determine who your main audience will be

Before you begin to fill in your profile, you should take time to determine what the purpose of this profile will be. Will it be used to find new colleagues? Or will it be used to connect and communicate with your colleagues? Or, will it used to find prospective clients? Each reason will determine what information you should include in your profile along with the relevant keywords.

For example, if you would like to find new employees you can tailor your profile to show what you do in your job and what makes it so great. You can then also come up with more relevant keywords to use in your content. For example, using the words 'career' and 'job' and including in your summary information about who you are looking for will definitely attract prospective hires. However, this profile likely won't attract colleagues or clients.

Don't feel that you have to limit yourself to one set function however. For example, there are many crossover terms that both clients and prospective employees will search for. So, if you want to use your LinkedIn profile for more than one reason, take some extra time and try to figure out which keywords and ideas you think will work well. The great thing about LinkedIn is that you can always edit everything at any time. So, if you want to switch your audience, you can easily do so by simply editing parts of your profile and changing keywords.

Step 5: Write a solid summary

The summary of your LinkedIn profile is a place where you highlight who you are. Take time to craft this so that you can showcase what you do and your main strengths. Be sure to use relevant industry and position specific keywords and terminology that you believe your audience will be searching for, as this language will make your profile easier to find in searches.

The key here is to write a summary that not only explains what you do and your experience, but showcases who you are. Use active language like 'I', 'my', and 'me', and be sure to include a way for people who don't have a LinkedIn profile to contact you - usually an email, link to your website or a phone number.

Step 6: Add your past and present positions

Once your summary is finished, you should move onto your current and past positions. This section should reflect your resume and highlight the experience you are talking about in your summary. It would be helpful to try and work in some of the keywords you used in the summary or identified earlier in order to really make your experience really stand out.

Chances are you aren't looking for work, so you can deviate a little from your resume here, and highlight what you do best, or how you can help your audience best. Feel free to leave out points that may not be 100% relevant or interesting e.g., how many people you manage, sales goals, etc.

Step 7: Start connecting

Once your profile is mostly complete with experience and a summary, you can start looking for people to connect with. Start by searching for people that you know or work with on a regular basis and inviting them to connect.

Next, join a few groups that are related to your position and industry. These can be found by hovering your mouse over Interests which is located in the menu bar near the top of the window. Select Groups from the menu that drops down and then select Find a group from the right-hand side of the page that opens. Some groups are private and will require you to ask to join them, but don't be afraid of sending in your request.

Once you have joined some groups and started to make connections be sure to be active on the network. It will help to join in on conversations held in your groups and post content on a regular basis. And, if you meet new clients or people don't be afraid of looking them up on LinkedIn and asking to connect with them!

Step 8: Work on your awards and recommendations

Finally, start recommending people that you know. You can do this by going to a colleague's profile and scrolling down to their Skills and Endorsements section. Find skills that you know they possess and press the + Endorse button beside the skill. Most people will also do this for you as well.

If you have won awards in the past, be sure to include these as well, especially if they are relevant to your intended audience. Just be sure to pick the awards that really highlight your skills, as an Employee of the Month award may not be the most relevant.

From here it's really just a matter of tinkering with your profile on a regular basis. Be sure to be active and ensure that your profile really reflects who you are. Doing this will create a stand-up profile you can be proud of.

Looking to learn more about LinkedIn and how to use it for your business? Contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
July 1st, 2014

Office365_June30_BFor many businesses, the cloud and cloud-based solutions are becoming increasingly popular. Microsoft Office 365 is one of the most commonly integrated cloud-based solutions amongst small to medium businesses. With a suite of familiar and powerful apps, it offers a wide variety of features. In mid June, Microsoft announced a new program, the Office 365 roadmap, that allows business users to see what new features are coming soon.

The Office 365 roadmap

Earlier in 2014, Microsoft announced that they would be moving to a faster rollout schedule for their popular software solutions like Office 365. This means that we can expect to see updates for some software being introduced on a fairly regular basis.

Because of this, it would help to know exactly what Microsoft is working on and when you can expect an update or introduction of new features. To cover this, Microsoft has recently announced an Office 365 roadmap that covers what the company is doing in relation to the business oriented version of Office 365.

You can view the roadmap on this Microsoft website which has been designed to showcase the status of features based on:

  • Launched - Features that have been completed and implemented in various Office 365 apps. These features should be accessible to all Office 365 for Business users.
  • Rolling out - Features that have finished development and are ready to be implemented to the various apps but are not accessible to most users at this time, but will be in the near future.
  • In development - Features that Microsoft developers are working on or testing, but aren't ready to be implemented.
  • Canceled - Features that have been canceled; developers are no longer working on these, and they won't be implemented into Office 365 apps.
When you visit the roadmap site, you can click on the different sections and see the recent features that are relevant to each. For example, if you click on Launched, the recently launched features will drop down. Click on one to see a brief overview of the feature, along with a link to learn more.

This can be a useful site for businesses, especially if you rely on Office 365's features and are interested in which new ones will be introduced. We should stress however that the features listed on the site are relevant only for Office 365 for Businesses and Enterprises. Private and Home users may not necessarily see these features introduced.

Office 365 First Release program

For those users who look at the Rolling Out section of the roadmap site, and would like to have access to fully tested and supported features that are just about ready to roll out, Microsoft has also introduced a new program called First Release.

This program allows Office 365 for Businesses and Education users to sign up and gain access to upcoming features two weeks or more before they are introduced. If you would like to sign up for this program, you can do so as long as you are the admin of your account. If you are the admin for your Office 365 accounts, you can enable First Release by going into the Service Settings area from your management console. You should see an option to enable First Release, which you need to tick to turn on.

Once this is enabled you should be notified within a month letting you know that the first batch of early features is ready to implement. Microsoft has noted that the features implemented early via First Release will apply to the Office 365 user experience, SharePoint Online and Exchange Online. At this time, other apps like Lync Online will not be part of the program, but you can probably expect this program to expand to cover other apps in the coming months and over the next year.

Both the roadmap and First Release features could prove useful for power users of Office 365. If you are looking to learn more about these concepts and how Office 365 can be used successfully in your business, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

June 26th, 2014

Security_June23_BVirtual machines are just gateways to a server, and cyber criminals want access to data on those servers. While you might think you’re keeping your virtual environment safe, there are several virtualization security myths which if believed can have a serious impact on your platforms, leaving them susceptible to attack. It’s vital that you are aware of these untruths to make better decisions about your business’s virtual environment.

Myth No.1: Existing endpoint security will protect our virtual environment

Most traditional endpoint security solutions are virtual-aware and provide low levels of protection. This simply isn’t enough. Depending on the virtualization platform used (VMware, Microsoft, etc.), your traditional endpoint security suite can probably recognize virtual endpoints. However, this physical software often can’t bring its full tool set of anti-malware to the virtual world, meaning it can only perform basic tasks such as on-access scanning.

Therefore what you need is a solution that has been designed to keep both virtual and physical computing environments secure. There are a wide-number of solutions out there, and the best one for your business will depend largely on the virtual environments you employ. We strongly recommend talking to IT experts like us, as we can help determine, or even offer, the strongest security based.

Myth No.2: My existing anti-malware doesn’t interfere with my virtual operations

Performance issues can create security gaps that don't exist in your physical environment. Traditional endpoint security uses an agent-based model where each physical and virtual machine has a copy of the security program’s agent on it. This agent communicates with the server while performing security tasks. This is fine for physical machines, but if you have 100 virtual machines running off of one main environment that has been infected with malware, you’ll also have 100 instances of malware running on the machines.

This high level of duplication can cause massive performance degradation and waste tons of storage capacity. Therefore, you should make an effort to ensure that all of your systems including the main ones are without malware. This not only makes every system secure, but can also speed up overall operations.

Myth No.3: Virtual environments are inherently more secure than physical environments

Sadly, this just isn’t always true. Virtualization is designed to allow software, including malware, to behave as it normally would, and malware writers will target any and all weak points in a business’s network to accomplish their goals. An attacker who compromises one virtual machine and finds a way to jump to the hypervisor - the system that enables the virtualization - then has access to every virtual machine on that host.

Therefore, malware scanners on both the user and main systems would be a good idea. If it does happen to get on a system, the chances of it spreading are drastically reduced.

Myth No.4: Using non-persistent virtual machines effectively secures a network

In theory, any machine that encounters malware is wiped away and recreated cleanly. However, we are now seeing malware that is designed to survive teardown of individual machines by spreading across the virtual network. This allows it to return when new virtual machines are created.

Additionally, being too eager to create new machines on demand can result in virtual machine sprawl, which happens when virtual machines are created but then forgotten. This leads to an unmaintained virtual endpoint operating without your knowledge. Even if the rest of your virtual machines are secure, it’s possible for one machine to eavesdrop on the traffic of another virtual machine, leading to privacy and security risks.

The best solution to this is to employ an IT manager who can track and maintain systems. Many IT partners offer a solution like this, so experts like us may be able to help ensure your systems are secure.

Myth No.5: Specialized virtual security programs are more or less the same

There are various approaches to virtualization security and your network will probably need a blend of available options. This all depends on what you’re trying to protect.

A non-Web-connected server is going to have entirely different security needs than a virtual desktop of a server that manages customer information. Implementing one without the other simply just won’t do in today’s world, where attackers are set on getting their hands on your data.

Proper security is vital in making virtualization a critical component of your business IT infrastructure. Looking to learn more about virtualization and its components? Contact us today and see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Security