Blog

November 19th, 2014

Windows_Nov17_BHeartbleed has to be one of the biggest security issues of the year. While it has largely been dealt with via updates and new software, Microsoft has announced that a similar and equally large security threat is affecting nearly all servers running Windows Server. While there is a fix for this, it is an issue you should be aware of.

The new security problem

On November 11, 2014 Microsoft released a patch for nearly all versions of Microsoft Server, along with patch notes that included the reason why the patch was released. In short, it was released to plug a security gap that the company calls Schannel Remote Code Execution Vulnerability.

This cryptically-named vulnerability essentially allows hackers remote code access by sending specific packets of data to a server. Data packets are made up of basic units of data communication combined in order to send data over a network.

Hackers can structure certain data into packets then breach a bug in Microsoft Server software, potentially allowing a hacker full remote access to that server and the ability to execute whatever code they so choose, including giving themselves full access to the systems and data hosted on your server.

This bug is particularly destructive because it affects the Schannel library on servers, which is responsible for encryption and authentication in Windows.

What versions of Windows server are affected by this bug?

This bug can potentially be found on nearly every version of Windows and Windows Server currently in use by companies, including:
  • Windows Server 2003
  • Windows Vista
  • Windows Server 2008
  • Windows 7
  • Windows 8/8.1
  • Windows Server 2012/2012 R2
  • Windows RT/RT 8.1
In other words, pretty much any business using Windows and Windows Server is at risk.

What should we do?

While this appears to be a big issue, and in truth it is, Microsoft has noted that they are unaware of anyone actually exploiting this bug as of the writing of this article. The company has also released a patch - MS14-066 that is supposed to fix the problem.

Therefore, the best action you can take is to update all of your systems running Windows. While it primarily affects servers, this could become a widespread issue if systems are not updated. What we recommend is contacting us as soon as possible. We can help ensure that all of your systems are updated and protected from this bug.

If you would like to learn more about Windows and how you can keep your systems secure, please do call us today.

Published with permission from TechAdvisory.org. Source.

November 19th, 2014

SocialMedia_Nov17_BFor an effective social media strategy, most businesses realize that they need to have a presence on more than one major social platform. While this has led to the creation of Twitter accounts for businesses, many struggle to generate content and posts due to the character limit. To help, here are 10 tips that can increase the effectiveness of your Twitter campaigns.

  1. Keep posts on the shorter side - This may seem ridiculous, after all there are only 140 characters allowed per tweet, but keeping tweets short allows users to add their own comments and ideas when they retweet. Try keeping your tweets below 100 characters.
  2. Twitter is not about promotion - Studies have proven that tweets that promote a company or product don't usually do as well as messages that are more conversational in nature. If you want to ensure maximum interaction, aim for a mixture of tweets that consists of about 80% conversational and 20% promotional.
  3. Know what time to tweet - Each market is different, so take the time to research tweeting habits. If you see that the majority of your target audience is active during after-work hours, then it would make sense to tweet when they are more likely to be online. Remember, many Twitter users are connecting via their mobile devices, so you are probably better off tweeting during lunch hours, as well as pre- and post-work.
  4. Know what days to tweet - Much like knowing what time to tweet, it is a good idea to also know which days are best to tweet in order to maximize engagement. For example, if you are trying to interact more with other businesses (B2B) then it is best to tweet on days when the companies are open and an owner or manager is more likely to be looking at business systems and social accounts. Customers, however, are usually more receptive to messages on days when they aren't working e.g., Saturday and Sunday.
  5. Use hashtags - Hashtags in Twitter allow for categorization and make tweets searchable. For example, if you use the hashtag #fresh in a tweet and then search for 'fresh' on Twitter, you should see similar posts using the same hashtag.
  6. Use hashtags sparingly - There is a common trend in social media to use hashtags for nearly every word. This makes posts difficult to read and usually leads to people not sharing or retweeting your content. Instead, try to work one to three hashtag, at most, into your tweets naturally.
  7. Realize Twitter moves fast - The average trend on Twitter lasts about one hour, to one day. So, if you see a trend developing or beginning, act quick to join the conversation. Posting after the trend has faded will usually lead to tweets being ignored.
  8. Don't act on every trend - Trends come and go so quickly on Twitter that it can be tempting to try to jump on each one, or as many as possible, in order to get your message out to as many people as possible. However, not every style and subject will be relevant to your business. By shoehorning content to fit trends you could come across as insincere and lose interest from followers.
  9. Watch who you follow - Following people is one of the quickest ways to grow your own follower base - usually because users will follow those who follow them. But, when it come to business, you want to be sure to follow users who are relevant. For example, follow your customers, strategic partners, and even competitors. Following Twitter users who aren't relevant to your business is not going to get your messages read by the right people.
  10. Keep an eye on Twitter - In order to effectively spot trends and see what your target market is saying, it is worthwhile to use a program like Tweetdeck, which allows you to see all tweets, track hashtags, topics, and more.
If you would like to learn more about using Twitter in your business, contact us today to see how our services and solutions can boost your social media presence.
Published with permission from TechAdvisory.org. Source.

Topic Social Media
November 18th, 2014

Office365_Nov17_BOne of the more important selling points of an Office 365 plan is the fact that many subscriptions come with full versions of Office which are always the latest available. For Mac users however, updates are usually well behind the Windows versions. This is starting to change, as Microsoft has recently introduced a new version of Outlook for Mac users while also announcing a plan for new versions of other Office for Mac apps.

New Outlook for Mac

Historically, when a new version of Office has been released, Mac users have had to wait six or more months for Mac versions to be introduced. With Office 365, users have had to wait even longer, as the company decided to focus on developing mobile apps first. This has now changed, and a new version of an Office app for Mac users - Outlook - has been released.

There are a number of improvements being implemented with the new version of Outlook for Mac, including:

  • A more modern user interface - Throughout the past year, Microsoft has been steadily updating the look of Outlook across all devices and versions, to create a more modern style. The new version for Mac introduces this updated design, which brings it more in line with the other newer versions of Outlook. Beyond this, scrolling has been made smoother which makes the program feel as if it runs much better.
  • Increased performance and reliability - Because email is an integral part of any business, Microsoft has re-tooled the database that supports Outlook for Mac and the way the program uses resources. This relates to increased reliability, less crashes, and generally faster performance.
  • Office 365 push email support - If you enable this for your business's Office 365 accounts, emails will be pushed automatically to users. This means messages will be delivered faster; in real-time for many.
  • Enhanced online support for searching Exchange archives - If your business employs either an onsite or hosted Exchange server, the new version of Outlook for Mac will enable online searching for message archives stored on Exchange.
  • Faster first-run and email downloads - When you first open Outlook to check your email, you will now see your emails far quicker, with email downloads faster too thanks to better syncing with Exchange servers.
There are a number of new features included in the latest version of Outlook for Mac. Overall, it looks much better and many users will notice that it is not only easier to use but also faster. If you would like to update to the newest version you can do so by:
  1. Logging into Office 365 via your browser.
  2. Pressing the Gear icon followed by Office 365 Settings.
  3. Selecting Software followed by Outlook for Mac.
  4. Downloading the program and installing it.
Before you do this however, we strongly recommend contacting us. We can help ensure that all of your files are backed up and ready for an update. Beyond that, we can work with you to ensure that the program is installed and set up so that you can simply open the program and go.

New versions of Office for Mac coming soon

Upon announcing the new version of Outlook for Mac users, the company also introduced their roadmap for the release of new versions of Office programs for Mac users. The company has noted that in the first half of 2015 they will release beta versions of the next versions of Word for Mac, Excel for Mac, PowerPoint for Mac, and OneNote for Mac. Final releases will be made available in the second half of 2015.

From what we know, businesses with Office 365 subscriptions will be able to update to the new versions for free, while other users will likely have to wait, as a price list has not been made available at this time.

If you are looking to learn more about Office 365 for Mac, or any other system, contact us today to see how we can help ensure tech developments work for your business.

Published with permission from TechAdvisory.org. Source.

November 14th, 2014

VoIP_Nov10_BA common trend in many households is the adoption of mobile devices as the main home phone. In fact, in 2013 it was estimated that almost 41% of households in the US were only using mobile devices. This number continues to grow as mobile devices continue to become more popular. Because of this, many business owners are considering getting rid of their landline or VoIP solution and switching exclusively to mobile devices for their business.

Why a fully mobile system is tempting

Mobile systems and devices can be tempting for many business owners largely because they offer decreased costs and better overall calling features, not to mention business-centric apps that allow you and your employees to be more mobile.

This, combined with the fact that many employees are increasingly adopting mobile devices, means that it is certainly tempting to make the switch away from traditional landline systems. However, this might not necessarily be the best idea for your business.

Why you shouldn't switch to a full mobile system just yet

As part of a business, you and your employees likely rely heavily on your phone system and the various features it offers. Within many businesses, the phone system - VoIP or landline - is the backbone of a larger, more unified communications system.

You need these to work flawlessly and seamlessly together so that you are reachable when your clients need to contact you, with minimal downtime and dropped calls. While mobile devices and networks do offer generally large percentages of uptime and reliability, there are still issues with dropped calls and less-than-clear communications. This can pose a real issue for employees who rely on phones.

Beyond this, it can be tricky to manage mobile devices in the company, as these devices are quickly becoming prime targets for thieves and hackers. This means an increased security risk for your company, especially if you don't have systems in place to efficiently manage these devices. Ultimately, a full mobile system integrated at this time could lead to increased costs, if not set up and handled in the right way, despite the perceived lower costs initially.

Mobile still has a place however

As we said above, mobile systems can help businesses enhance the overall effectiveness of office communications especially when combined with existing phone systems like landlines or VoIP. Firstly, they offer employees who are working remotely, or away from the office, a quick and easy way to check in without having to invest in potentially costly phone systems. This is especially true because of the number of communication apps that can be installed.

Secondly, they really do enable teams to be more mobile within the office. For example, if you have employees talking with customers, they can quickly check the status of a product or service on a mobile device instead of having to find a phone and call someone.

Essentially, in a few years, mobile systems will be powerful and reliable enough to fully replace existing systems, but for now, it is best to stick with VoIP or landlines in the office with mobile devices playing more of a support role.

If you are looking to learn more about communication systems in your office, contact us today to see how our services can help.

Published with permission from TechAdvisory.org. Source.

Topic VoIP General
November 13th, 2014

Security_Nov10_BIn October of last year news broke about a new form of malware called Cryptolocker. This malware posed a particularly large threat to many business users and led to many quick and important security updates. Now, almost a year later, it appears that the second version of this - CryptoWall - has been released and is beginning to infect users.

What is Crypto malware?

Crypto malware is a type of trojan horse that when installed onto computers or devices, holds the data and system hostage. This is done by locking valuable or important files with a strong encryption. You then see a pop-up open informing you that you have a set amount of time to pay for a key which will unlock the encryption. If you don't pay before the deadline, your files are deleted.

When this malware surfaced last year, many users were understandably more than a little worried and took strong precautions to ensure they did not get infected. Despite these efforts, it really didn't go away until earlier this year, when security experts introduced a number of online portals that can un-encrypt files affected by Cryptolocker, essentially neutralizing the threat, until now that is. A recently updated version is threatening users once again.

Cryptolocker 2.0, aka. CryptoWall

Possibly because of efforts by security firms to neutralize the Cryptolocker threat, the various developers of the malware have come back with an improved version, CryptoWall and it is a threat that all businesses should be aware of.

With CryptoWall, the transmission and infection methods remain the same as they did with the first version: It is most commonly found in zipped folders and PDF files sent over email. Most emails with the malware are disguised as invoices, bills, complaints, and other business messages that we are likely to open.

The developers did however make some "improvements" to the malware that make it more difficult to deal with for most users. These changes include:

  • Unique IDs are used for payment: These are addresses used to verify that the payment is unique and from one person only. If the address is used by another user, payment will now be rejected. This is different from the first version where one person who paid could share the unlock code with other infected users.
  • CryptoWall can securely delete files: In the older version of this threat, files were deleted if the ransom wasn't paid, but they could be recovered easily. In the new version the encryption has increased security which ensures the file is deleted. This leaves you with either the option of paying the ransom or retrieving the file from a backup.
  • Payment servers can't be blocked: With CryptoLocker, when authorities and security experts found the addresses of the servers that accepted payments they were able to add these to blacklists, thus ensuring no traffic would come from, or go to, these servers again. Essentially, this made it impossible for the malware to actually work. Now, it has been found that the developers are using their own servers and gateways which essentially makes them much, much more difficult to find and ban.

How do I prevent my systems and devices from being infected?

Unlike other viruses and malware, CryptoWall doesn't go after passwords or account names, so the usual changing of your passwords won't really help. The best ways to prevent this from getting onto your systems is:
  • Don't open any suspicious attachments - Look at each and every email attachment that comes into your inbox. If you spot anything that looks odd, such as say a spelling mistake in the name, or a long string of characters together, then it is best to avoid opening it.
  • Don't open emails from unknown sources - Be extra careful about emails from unknown sources, especially ones that say they provide business oriented information e.g., bank statements from banks you don't have an account with or bills from a utilities company you don't use. Chances are high that they contain some form of malware.
Should your files be attacked and encrypted by this malware, then the first thing you should do is to contact us. We can work with you to help find a solution that will not end up in you having to pay the ransom to recover your files.

If you are looking to learn more about CryptoWall malware and how to boost your security and protect your data and systems, then we could you your first line of tech defence.

Published with permission from TechAdvisory.org. Source.

Topic Security
November 12th, 2014

Productivity_Nov10_BAs a business owner, you probably send out emails pretty regularly. Some of these emails are likely to colleagues who will then send a message to a third party on your behalf. This inevitably entails going back-and-forth between you and your employee. This can cut down productivity and lead to mistakes. One way to avoid this is to pre-draft the message that will be sent along.

What exactly is a pre-draft?

The idea behind pre-drafting an email message is that it helps to reduce the amount of back and forth between two parties when one of the parties is contacting a third party. If you have ever had an employee draft a message that came from you then you are likely well aware of the number of emails that can go back and forth before the email actually goes out.

Essentially a pre-draft is a message included in the original message that is to be sent along to a third party. When you include a draft message, the person who will be sending the message can then just cut and paste the content, personalize it, maybe tweak a sentence here or there, and then send it along.

How do I create one?

If you are currently working on an email message that will be sent by another employee on your behalf, try to come up with the outline and basic message yourself. It's best to clearly mark this message in the original email by using a flag like: "Message to send", and changing the actual message to another font or color.

Because most of these messages will be personalized, include placeholder text where your staff member can personalize the message. For example, To . This not only makes it easier to spot areas that need to be personalized, it also means messages can be sent out quickly and easily.

When is this useful?

To be honest, pre-drafting won't work for every type of email you send. But, there are some situations when this comes in handy, including:
  • When you are asked to provide a testimonial on a service. You can write a basic testimonial with areas for customization.
  • When you need to send follow up emails connected to a recently sent email campaign or message. You can draft a basic follow up message that can then be customized as your employees see fit.
  • When you want to post something on numerous social media sites. You can simply write the post once, then provide spots to customize based on the network.
  • Introductions and references. If you have been asked to provide a reference or an introduction, then draft a standard message which can then be changed as needed.
If you mark these emails as a pre-draft, or place them in a pre-draft folder, they can then be quickly found and modified in the future.

Looking to learn more about increasing productivity in your business? Contact us today to see how our systems can help.

Published with permission from TechAdvisory.org. Source.

Topic Productivity
November 6th, 2014

BI_Nov03_BFor many businesses it is important that there is steady and productive interaction with clients and that they can capture important data from these interactions. While there are many ways to achieve both these objectives, there is one way that is gaining traction with many companies, especially those who want to capture better data: gamification.

What is gamification?

It's human nature to be competitive, and many of us exercise this nature by playing games. Be it team sports, board games, video games, or even office-related games, many of us partake in some form of game on a regular basis. Gamification is the incorporation of game elements, such as points, rules of play, competition, etc. into business-related processes.

By implementing game elements into areas like marketing or training, you can drive engagement, while also collecting better data, primarily because most people will be more willing to provide relevant information when they are invested in a game.

When it comes to implementing these elements into business processes, many companies tend to focus on either customer gamification or employee gamification.

Customer gamification

The vast majority of customer-oriented gamification relates to rewards programs and repeat customers. Small to medium businesses who have successfully implemented these elements usually do so via social media and mobile apps. Repeat customers gain points for each purchase and when they reach a certain level receive a freebie perhaps or a rebate. This in turn drives the need to keep purchasing and to "win".

Many businesses have been successful in implementing this game characteristic into social media, where people who interact gain levels and therefore access to such benefits as discounts. Businesses implementing customer-oriented gamification often see both increased engagement and better data flowing into the organization. In fact, many businesses have found that the data implemented through these elements has been useful in decision-making and overall business intelligence efforts.

Employee gamification

Employee-based gamification is usually employed by businesses to encourage teams and individuals to work together towards a common goal. For example: Implementing a point or badge-based sales system where at certain sales levels badges are awarded, which can then be used for a reward, has proven to be incredibly successful for many sales-oriented companies. Publicly announced results and recognized rewards can also be a great employee motivator.

As with customer gamification, employee gamification can be a great source of data. For example, by tracking where employees are, and their results, you can quickly see weak spots or places where help may be needed. Essentially, more data means the ability to make better decisions.

Should my company implement gamification?

While this may sound like an exciting, and useful tactic to implement in your business, it's not for everyone and it won't fit well with all activities. What you should do is to look at whether the objectives and goals of the program you wish to implement can also be paired with gamification.

If you find that gamification, or elements of it, won't benefit your business program, then it's best not to implement it for the sake of it.

How to implement gamification

There are a wide number of mobile apps developed around gamification, along with social elements and ideas. What we suggest is talking to us to see how we can help first. We can work with you to find solutions and ways to implement your solutions. Contact us today to start the game of business success.
Published with permission from TechAdvisory.org. Source.

November 5th, 2014

iPad_Nov03_BWhen Apple launches a new or updated product the company usually holds a press event where they announce the release in style. This was the case with the iPhone 6 and 6 Plus, but did you know that the company has quietly released new versions of the iPad Air and iPad mini? If you are looking for a new tablet, here is a brief overview of these latest Apple devices.

The iPad mini 3

First up is the third version of Apple's smaller iPad - the iPad mini 3. The immediately noticeable changes with this year's device is the home button. It now has the metal ring right around it which enables the Touch ID feature so that you can unlock your device using your fingerprint.

Touch ID also enables users to pay for items using the Apple Pay feature that has just been released. Sadly, for the iPad mini 3, this is limited only to in-app and iTunes purchases as there is no NFC chip in the device to enable it to work with in-store terminals.

Aside from a slightly changed exterior and the extra Apple Pay related features, the device is more or less exactly the same as the iPad mini 2. It still boasts a 7.9 inch retina display and the same A7 processor found in the mini 2.

The major difference is that you can purchase the mini 3 with 64 GB or 128 GB of storage, which is not available for the mini 2. Unfortunately, the price of the device starts at USD 100 more (USD 399 for the 16 GB version) than the mini 2, which costs USD 299 for the 16 GB version. In other words you are paying USD 100 for the fingerprint unlock and semi-functional Apple Pay.

At this time, Apple has noted they will continue to sell the mini 2, which for many businesses will remain the better deal largely because it is less expensive yet offers exactly the same hardware and size.

The iPad Air 2

As the name implies, the iPad Air 2 is the second version of the popular iPad Air which was introduced last year. As with the mini 3, the Air 2 has seen a slight change to the home button with the introduction of the Touch ID feature that allows users to unlock their devices using their fingerprint.

The new version also enables the Apple Pay feature so users can use their fingerprint to approve purchases. Sadly, there is no NFC chip in the device, so you won't be able to use the device to make purchases at stores.

Beyond this, there are a number of interesting changes that many business users will find useful including:

  • A faster processor - With what Apple calls the A8X processor, the iPad Air 2 is one of the fastest and most powerful tablets on the market. Users have already noted faster website loading times and better overall responsiveness, especially when running graphics intensive apps.
  • A thinner, more mobile body - Apple reduced thickness with the iPad Air 2, making it thinner than any other iPad. At 6.1 mm, you will be able to use the device all day without it feeling awkward in your hand.
  • A less reflective display - While the displays on the iPad have always been top of the line, there have been complaints in the past about how the glass on the device is a bit too reflective. With the Air 2, a less reflective display is being used which supposedly cuts glare down by as much as 56%. This means you will be able to see what is on the screen more easily in more locations and situations.
  • The Apple Sim - For users in certain countries like the US and UK, the cellular version of the iPad comes with what is called the Apple Sim. This sim card is universal in that it allows you to connect to the mobile network of your choice without having to switch cards. This also makes switching networks and plans much easier.
If you are considering picking up the iPad Air 2, the 16 GB Wi-Fi only version starts at USD 499. If you would like to learn more about how these devices can be used in your office, contact us today to learn more.
Published with permission from TechAdvisory.org. Source.

Topic iPad
November 4th, 2014

Office365_Nov03_BFor businesses looking to integrate Office 365, there are a number of plans available. Some offer full versions of Office 2013, while others include just Office Web Apps (OWA) - browser-based versions of Office. Because of the different plans available, it can be slightly confusing to figure out which one to go with. Here are five questions to help you decide.

1. Am I comfortable doing all, or most of my work in a browser?

Because Office Web Apps is browser-based, you will be spending a fair amount of time in your browser. Many of those who have switched to OWA have found that it takes time to get used to working with the system. Because of the way many of us work, you will start to see multiple windows and tabs open with different documents which could lead to increased confusion and more time finding the tab and window you need.

What's more, you will need to ensure that all browsers on all computers in your company are kept up-to-date if you want to use OWA. For example, older versions of Internet Explorer may not support OWA. This means you will need to spend time ensuring that everyone within the business is updating when necessary.

To get around this, you can work with a company like us who can ensure that browser activity is not only secure, but also up-to-date, which basically guarantees OWA will work when you need it to.

If, however, you are not comfortable using your browser for everything, then it may be a good idea to go for an Office 365 plan that includes the full version of Office 2013.

2. Am I going to collaborate on files with users both in and outside of the organization?

Many business tasks are real team efforts, where users need to collaborate on documents. While this is possibly with any Office program, one of the biggest weaknesses of traditional Office installs is version control.

If you have shared one document with a number of different users you will quickly find that the changes they make and send back to you are likely going to need to be manually added back into the original document. This takes time and can lead to confusion, errors, and a lack of productivity.

With OWA, any document you create is stored on your OneDrive account and can be easily shared with other users. When the document is opened, all changes are made directly to the main document in real time. This means each user can see the changes show up as they are being made, which increases the effectiveness of collaboration.

Of course, this is possible with almost all Office 365 plans - especially if you also integrate SharePoint, but OWA offers by far the easiest solution to collaboration. So, if you collaborate a lot, then OWA may be a better version of Office to use. That being said, if you just need a few people to edit documents or offer comments, then Office 365 plans with Office 2013 will usually be the better option.

3. Will I need to format documents, or need advanced features?

The Web-based versions of Office offer many of the key features found in the desktop versions. However, some advanced features, like in-dept formatting, adding charts, etc. are not currently available with OWA.

While many users find OWA is enough to meet their day-to-day document production needs, those who use the advanced features of each Office app will be better off with Office 365 plans that offer full installs of Office 2013.

4. Will I need more Office apps than just the core five?

Currently, OWA apps available to users are: Word, Excel, PowerPoint, OneNote, and Lync. These five major apps cover the majority of document production needs for most users, however, if you require other Office apps, like Access, or Publisher, that aren't included in OWA, then you will be better off going with an Office 365 plan that offers Office 2013.

5. Will I be constantly connected to the Internet?

In order to get the most out of OWA you will need to have a strong and constant Internet connection. While you can create documents offline, you will need to connect in order to save and update them. If you spend a lot of time out of the office, this may be a real inconvenience, especially if you often struggle to find a solid Internet connection.

What we recommend is talking to an Office 365 vendor like us. We can explain the different Office 365 plans in depth and how you can integrate them into your office. Contact us today to learn more.

Published with permission from TechAdvisory.org. Source.

October 31st, 2014

Security_Oct27_BAs businesses continue to implement more and more Internet-based systems, there is always the risk that systems could be breached and security compromised. If you conduct business online, there are a number of measures you can take to ensure that your activities and your company's vital information are secure. Here are five.

1. Use two-factor authentication whenever possible

Two-factor authentication, or two-step authentication as it is also known, is the idea of using two pieces of information to log into accounts: Your usual password and a code that is usually sent to a mobile device or generated by a code generator.

By utilizing this safety feature, you can further increase the security of your accounts, largely because the chances of someone getting their hands on both the generated code and your password are slim.

Some sites don't use a code and instead ask a question that needs to be answered every time you log in. If this is the case, make the question something that is difficult for a hacker to guess. For example, use your address from 10 years ago instead of your current address.

2. Audit who has access to what data

Between all of your online accounts and social media profiles you will likely be surprised at just how much information about you can be found online. There are a multitude of scare stories online, where someone has had their accounts hacked and identity stolen, largely because they had left pertinent information online without even thinking about it.

It is a good idea to audit what information you have online. This includes looking at the contact and personal information you have on social media profiles, account information, etc. Ideally, if it is not necessary information, then it shouldn't be shared. As for social media profiles, make sure only the absolute basic personal information is online and limit who can see this information.

3. Watch what is posted on social media

Because of the nature of social media, we often feel the need to share our whole lives online. This can often lead to oversharing, and even sometimes oversharing of personal information. There are stories online of thieves monitoring social media for businesses posting about how they are going to be closed for a holiday, with all staff gone. Once a thief finds this information, they then break into the business without worrying about people being there.

If you are going to share information online, be sure to limit the potentially sensitive information that you post, especially if the content is shared with the public.

4. Change your passwords regularly

It seems like almost every week news breaks of a password or account information breach. What this translates to is the fact that your accounts are always facing a potential risk. Therefore, you should make it a habit to change your passwords on a regular basis.

Most experts recommend at least once every three months, but if there is a breach where your account information may have been leaked then naturally change your passwords straightaway.

To ensure maximum security, you should use a different password for each account, and keep these as separate as possible.

5. Work with an IT partner who can offer enhanced Internet security

Ensuring that your business is secure online can be an on-going battle that you will likely not win easily. One of the best steps to take is to work with an IT partner like us. We offer a variety of Internet security solutions that can help stop malware intrusions before they infect your systems, block access to potentially harmful sites, and even scan Internet-based email solutions. In other words, we can help improve your overall online security.

If you are looking to learn more about how we can help your business be secure online, contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Security