Blog

September 11th, 2014

BI_Sep08_AIn business, as in life, we constantly try to make predictions about the future. How will sales be next year if we implement a new procedure? What will the weather be like for the annual staff event next week? It's no surprise then that businesses of all sizes have started to embrace the idea of predictive analytics. However, many business managers are unsure as to exactly how to work with this form of analytics effectively. To help, here is an overview of the three main components of predictive analysis all business owners and managers should be aware of.

Together, these three elements of predictive analytics enables data scientists and even managers to conduct and analyze forecasts and predictions.

Component 1: data

As with most business processes, data is one of the most important and vital components. Without data you won't be able to make predictions and the decisions necessary to reach desired outcomes. In other words, data is the foundation of predictive analytics.

If you want predictive analytics to be successful, you need not only the right kind of data but information that is useful in helping answer the main question you are trying to predict or forecast. You need to to collect as much relevant data as possible in relation to what you are trying to predict. This means tracking past data, customers, demographics, and more.

Merely tracking data isn't going to guarantee more accurate predictions however. You will also need a way to store and quickly access this data. Most businesses use a data warehouse which allows for easier tracking, combining, and analyzing of data.

As a business manager you likely don't have the time to look after data and implement a full-on warehousing and storage solution. What you will most likely need to do is work with a provider, like us, who can help establish an effective warehouse solution, and an analytics expert who can help ensure that you are tracking the right, and most useful, data.

Component 2: statistics

Love it, or hate it, statistics, and more specifically regression analysis, is an integral part of predictive analytics. Most predictive analytics starts with usually a manager or data scientist wondering if different sets of data are correlated. For example, is the age, income, and sex of a customer (independent variables) related to when they purchase product X (dependent variable)?

Using data that has been collected from various customer touch points - say a customer loyalty card, past purchases made by the customer, data found on social media, and visits to a website - you can run a regression analysis to see if there is in fact a correlation between independent and dependent variables, and just how related individual independent variables are.

From here, usually after some trial and error, you hopefully can come up with a regression equation and assign what's called regression coefficients - how much each variable affects the outcome - to each of the independent variables.

This equation can then be applied to predict outcomes. To carry on the example above, you can figure out exactly how influential each independent variable is to the sale of product X. If you find that income and age of different customers heavily influences sales, you can usually also predict when customers of a certain age and income level will buy (by comparing the analysis with past sales data). From here, you can schedule promotions, stock extra products, or even begin marketing to other non-customers who fall into the same categories.

Component 3: assumptions

Because predictive analytics focuses on the future, which is impossible to predict with 100% accuracy, you need to rely on assumptions for this type of analytics to actually work. While there are likely many assumptions you will need to acknowledge, the biggest is: the future will be the same as the past.

As a business owner or manager you are going to need to be aware of the assumptions made for each model or question you are trying to predict the answer to. This also means that you will need to be revisiting these on a regular basis to ensure they are still true or valid. If something changes, say buying habits, then the predictions in place will be invalid and potentially useless.

Remember the 2008-09 sub-prime mortgage crisis? Well, one of the main reasons this was so huge was because brokers and analysts assumed that people would always be able to pay their mortgages, and built their prediction models off of this assumption. We all know what happened there. While this is a large scale example, it is a powerful lesson to learn: Not checking that the assumptions you have based your predictions on could lead to massive trouble for your company.

By understanding the basic ideas behind these three components, you will be better able to communicate and leverage the results provided by this form of analytics.

If you are looking to implement a solution that can support your analytics, or to learn more about predictive analytics, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

September 4th, 2014

Security_Sep02_AWith smartphones playing a larger role in today’s daily business, the need to recharge them while you are on the go increases. And when you’re nowhere near your charger, that public charging kiosk can look pretty promising. But what you might not know is that common traits in smartphone hardware and software design makes recharging phones through public chargers prone to juice jacking. If you're not sure what that is then let’s find out and also discover how you can avoid juice jacking too.

What’s juice jacking?

Regardless of the kind of smartphone you have, whether it’s an Android, iPhone or BlackBerry, there is one common feature across all phones: the power supply and the data stream pass over the same cable. This setup allows for juice jacking during the charging process whereby user access is gained on your phone by leveraging the USB data/power cable to illegitimately access your phone’s data and/or inject malicious code onto the device.

The attack can be as simple as an invasion of privacy, wherein your phone pairs with a computer concealed within the charging kiosk and information such as private photos and contact information are transferred to a malicious device. However, on the other hand, it can also be as invasive as an injection of malicious code directly into your phone. According to security researchers at this year’s Black Hat security conference, your iPhone can be compromised within one minute of being plugged into a harmful charger.

Exposure to a malicious kiosk can also create a lingering security problem even without the immediate injection of malicious code. Once a device is paired to a computer, it can access a host of personal information on the device, including your address book, notes, photos, music, sms database, typing cache, and even initiate a full backup of your phone, all of which can be accessed wirelessly at anytime.

How do I avoid it?

The most effective precautions center around simply not charging your phone using a third-party system. Here are some tips to help you avoid using public kiosk charger:
  • Keep your devices topped off: Make it a habit to charge your phone at your home and office when you’re not actively using it or are just sitting at your desk working.
  • Carry a personal charger: Chargers have become very small and portable, from USB cables to power banks. Get one and throw it in your bag so you can charge your phone anytime you’re at the office or while on-the-go if you use a power bank.
  • Carry a backup battery: If you’re not keen on bringing a spare charger or power bank, you can opt to carry a full spare battery if your device has a removable battery.
  • Lock your phone: When your phone is truly locked as in inaccessible without the input of a pin or equivalent passcode, your phone should not be able to be paired with the device it’s connected to.
  • Power the phone down: This technique only works on phones on a model-by-model basis as some phones will, despite being powered down, still power on the entire USB circuit and allow access to the flash storage in the device.
  • Use power only USB cables: These cables are missing the two wires necessary for data transmission and have only the two wires for power transmission remaining. They will charge your device, but data transfer is made impossible.
Even the tiniest detail like charging your phone from a kiosk charger could affect the security of your device. While there are many substitutes to using a third-party system, ultimately the best defense against a compromised mobile device is awareness. Looking to learn more about today’s security and threats? Contact us today and see how we can help.
Published with permission from TechAdvisory.org. Source.

Topic Security
September 3rd, 2014

BCP_Sep02_AMany people wonder why it’s necessary to perform business impact analysis (BIA) when they’ve already invested a large amount of time on a risk assessment. The answer is simple: because the purpose of a BIA is different, and wrong results could incur unnecessary expenses or create inadequate business continuity strategies. To that end, let’s take a look at five tips for successful business impact analysis.

Five tips for successful business impact analysis:

  1. Treat it as a (mini) project: Define the person responsible for BIA implementation and their authority. You should also define the scope, objective, and time frame in which it should be implemented.
  2. Prepare a good questionnaire: A well structured questionnaire will save you a lot of time and will lead to more accurate results. For example: BS (British standard) 25999-1 and BS 2599902 standards will provide you with a fairly good idea about what your questionnaire should contain. Identifying impacts resulting from disruptions, determining how these vary over time, and identifying resources needed for recovery are often covered in this. It’s also good practice to use both qualitative and quantitative questions to identify impacts.
  3. Define clear criteria: If you’re planning for interviewees to answer questions by assigning values, for instance from one to five, be sure to explain exactly what each of the five marks mean. It’s not uncommon that the same event is evaluated as catastrophic by lower-level employees while top management personnel assess the same event as having a more moderate impact.
  4. Collect data through human interaction: The best way to collect data is when someone skilled in business continuity performs an interview with those responsible for critical activity. This way lots of unresolved questions are cleared up and well-balanced answers are achieved. If interviews are not feasible, do at least one workshop where all participants can ask everything that is concerning them. Avoid the shortcut of simply sending out questionnaires.
  5. Determine the recovery time objectives only after you have identified all the interdependencies: For example, through the questionnaire you might conclude that for critical activity A the maximum tolerable period of disruption is two days; however, the maximum tolerable period of disruption for critical activity B is one day and it cannot recover without the help of critical activity A. This means that the recovery time objective for A will be one day instead of two days.
More often than not, the results of BIA are unexpected and the recovery time objective is longer than it was initially thought. Still, it’s the most effective way to get you thinking and preparing for the issues that could strike your business. When you are carrying out BIA make sure you put in the effort and hours to do it right. Looking to learn more about business continuity? Contact us today.
Published with permission from TechAdvisory.org. Source.

August 27th, 2014

socialmedia_Aug26_AHave you ever looked at images and visuals posted by businesses and users on Instagram? While many users take photos using their mobile devices, there are many images that simply look way too good to be taken with a phone camera, especially the ones without filters. Many business owners want to know how they too can take quality images like these too.

The truth behind some of Instagram's best images

Those awesome Instagram photos we see aren't always taken using mobile phones. Instead, many users use digital cameras which offer much better image quality. You can capture some amazing shots with a higher end DSLR cameras with multiple lenses.

If you have one of these cameras and are looking to create high-quality images for Instagram, or any other social media site, you may be slightly confused as to how to get the images onto the platform - especially since many of us use this via the mobile app. To make uploading a little easier, here is a brief guide detailing how to get images from your digital camera onto Instagram.

1. Transfer and process images

Once you have taken photos with your camera, you will need to get them off of your camera's memory and onto your computer's hard drive. Most camera's have apps that allow you to do this, so be sure to follow the instructions in the app that came with it.

When your images have been transferred to your computer, you are likely going to want to process them a little bit. This is especially true if you have a DSLR or other high-end point-and-shoot which takes RAW images. These can be quite large and are not compatible with Instagram.

Most images taken with a camera are quite large in size, so you are going to need to use an image editing program like Adobe Photoshop, or free tools like Pixlr to process them. What you are looking to do is to crop your images so that they are square.

If you are used to the advanced photo editing features, then do your edits before cropping. When you crop your images you should crop or resize them so that they are 640X640 pixels. This is the size of all images taken using Instagram's camera app.

Also, be sure to save the images as JPEGs, as this is the image format used by most smartphone cameras.

2. Save processed images in their own folder

It helps to create a folder somewhere on your hard drive (we recommend in the same folder where you save all of your other folders) that is specifically for images you want to post on Instagram.

When you have processed and edited the images to your liking, save the images here. Try using an easy to use file name like the date and a letter or note so you can easily tell which images are which, so you know which to use.

3. Move the images to your device

You can move images using the cloud or by manually transferring the images to your phone. If you decide to manually transfer your files, you will need to plug your device into your computer.

For users with iPhones, you can open iTunes and click on your device followed by Photos. Then select the box beside Sync photos from. Select the file you created in the step above and then Sync to transfer the images over.

For users with Android devices, plug your phone into the computer and drag the folder you created in the step above into the Photos folder of your Android device.

For Windows Phone users, plug your device into your computer and open My Computer on your desktop. You should see your device listed in the window that opens. Open the file system for your device and drag the image files you created above into the Photos folder of your phone.

If you choose to use the cloud to transfer your files, use the operating system's cloud (e.g., iCloud, Google Drive, or OneDrive) to upload the files. Just be sure to use the same account as the one on your phone.

4. Add images to Instagram

Once the photos are either on your device, or in the cloud, you can now upload them to Instagram. This can be done by:
  1. Opening the app and tapping on the camera icon.
  2. Tapping on the button in the bottom left of the screen.
  3. Selecting where the image is located on your device. E.g., the Gallery app if you placed the photos in your phone's hard drive, or the cloud service you used.
  4. Editing them as you see fit.
Once this is complete, you should be able to post your images as you usually do with any other Instagram image on your phone. Take the time to add filters, and hashtags as well as a good description before you post.

If you would like to learn more about using Instagram to share your images then get in touch and we will show you the advantages of the bigger picture.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
August 25th, 2014

Security_Aug18_AIt seems like nearly every week, and in some cases nearly every day, there is some security breach announced. The vast majority of these assaults tend to revolve around online user accounts, where password, account information, and even usernames are stolen. Over the years, there has been a general trend where the number of accounts breached or compromised is growing, and in early August news broke about possibly the biggest breach to date.

The latest big-scale breach

In early August, it emerged that a Russian hacker ring had amassed what is believed to be the biggest known collection of stolen account credentials. The numbers include around 1.2 billion username and password combinations, and over 500 million email addresses.

According to Hold Security, the company that uncovered these records, the information comes from around 420,000 sites. What is particularly interesting about this particular attack is that such a wide variety of sites were targeted when compared this with other attacks which tend to either attack large brand names or smaller related sites.

How did this happen?

Despite what many believe, this was not a one-time mass attack; all sites that were compromised were not attacked at the same time. Instead, the hacker ring - called the Cyber Vor - was likely working on amassing this data over months or longer. How they were able to amass this much information is through what's called a botnet.

Botnets are a group of computers infected by hackers. When the hackers establish a botnet, they attack computers with weak network security and try to infect them with malware that allows the hacker to control the computer. If successful, users won't even know their computer has been hacked and is being used by hackers.

Once this botnet is established, the hackers essentially tell the computers to try to contact websites to test the security. In this recent case, the computers were looking to see if the websites were vulnerable to a SQL injection. This is where hackers tell the computers in the botnet to look for fillable sections on sites like comment boxes, search boxes, etc. and input a certain code asking the website's database to list the stored information related to that box.

If the Web developer has restricted the characters allowed in the fillable text boxes, then the code likely would not have worked. The botnet would notice this, and then move onto the next site. However, if the code works, the botnet notes this and essentially alerts the hacker who can then go to work collecting the data.

So, is this serious and what can I do?

In short, this could be a fairly serious problem. While 420,000 sites may seem like a large number, keep in mind that the Internet is made up of billions of websites. This means that the chances of your website's data being breached by this ring are small. That being said, there is probably a good chance that one of the sites related to your website may have been breached.

So, it is a cause for concern. However, you can limit the chance of hackers gaining access to your information and a website's information.

1. Change all of your passwords

It seems like we say this about once a month, but this time you really should heed this warning. With 1.2 billion username and password combinations out there, there is a chance your user name for at least one account or site has been breached.

To be safe, change all of your passwords. This also includes passwords on your computer, mobile devices, and any online accounts - don't forget your website's back end, or hosting service. It is a pain to do, but this is essential if you want to ensure your data and your website is secure from this attack.

2. Make each password different

We can't stress this enough, so, while you are resetting your password you should aim to ensure that you use a different one for each account, site, and device. It will be tough to remember all of these passwords, so a manager like LastPass could help. Or, you could develop your own algorithm or saying that can be easily changed for each site. For example, the first letter of each word of a favorite saying, plus the first and last letter of the site/account, plus a number sequence could work.

3. Test your website for SQL injection

If you have a website, you are going to want to test all text boxes to see if they are secure against SQL injection. This can be tough to do by yourself, so it's best to contact a security expert like us who can help you execute these tests and then plug any holes should they be found.

4. Audit all of your online information

Finally, look at the information you have stored with your accounts. This includes names, addresses, postal/zip codes, credit card information, etc. You should only have the essential information stored and nothing else. Take for example websites like Amazon. While they are secure, many people have their credit card and billing information stored for easy shopping. If your account is hacked, there is a good chance hackers will be able to get hold of your card number.

5. Contact us for help

Finally, if you are unsure about the security of your accounts, business systems, and website, contact us today to see how our security experts can help ensure your vital data is safe and sound.
Published with permission from TechAdvisory.org. Source.

Topic Security
August 21st, 2014

BValue_Aug18_AIn many countries around the world, businesses are required to meet the needs of all employees. For able-bodied employees, one system will usually be able to meet needs, but disabled employees may have different requirements. Therefore, businesses should ensure that they develop an accessible technology plan.

What is accessible technology?

Accessible technology, also commonly referred to as assistive technology, is the idea of creating or implementing technology and systems that cater to employees with disabilities. While not every company will have or require accessible technology, it is required by many countries that businesses meet the needs of disabled employees.

To that end, it is a good idea to develop a plan on how to implement accessible technology. To help, here are five steps you could take:

1. Defining your strategy

The accessible technology strategy should be the first thing you develop as it will be the foundation of the overall plan. When looking at your strategy you should define how accessible technology fits into your overall organization plan and how it will fit with your existing strategies.

What you are looking to do is to figure out how this form of technology will fit with existing systems and increase overall operating effectiveness. From here, you can define the overall objectives, budget, and vision for the plan.

2. Identifying requirements

In this step, you should look closely at existing technology in the organization and the needs of your employees. Because each company is different and the needs of employees are different you should be careful to also identify the technology needs of your employees.

When looking at both the needs and existing systems you can work to come up with an overall set of requirements, along with a general priority. For example, will you need to modify existing computers or purchase new ones?

The key idea here is that you need to figure out exactly what you need.

3. Picking the new technology

Once you have identified what changes you need to implement, what new technology you will need, and your budget, you can then begin looking for the best solutions. The most effective way to do this is to work with it experts like us who can help you find and integrate the best technology and changes that will meet your adaptive technology needs.

4. Implementing and training

Once you have defined the changes, and new technology to integrate, you need to implement it. This may include altering physical devices and machines where necessary, and then testing the systems to make sure they are working properly.

It is also be a good idea to train your employees who will be using the systems, and the team who will be managing the systems.

5. Maintaining

As with all tech systems, it is important to realize that the solution you implement will not work forever, and will eventually require maintenance, updating, or even replacing. You should take steps to audit systems on a regular basis to ensure they are still meet the needs of your company and employees.

This can be a time consuming and potentially costly step, especially if you neglect it. We strongly recommend working with a company like ours, who can help manage your solution and ensure that updates and any necessary changes are implemented when they are needed, and that should needs change, systems are subsequently updated to meet the new requirements.

If you are looking to implement accessible technology in your business, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

August 14th, 2014

The amount of data both available to, and generated by, a company is increasing exponentially. While some smaller to medium businesses are coping fine with the growth, many are struggling with managing their data, let alone leveraging it to help make better decisions. If you find that your business isn't coping with data, one solution may be to implement a data warehouse.

What is a data warehouse?

A data warehouse is a system used by companies for data analysis and reporting. The main purpose of the data warehouse is to integrate, or bring together, data from a number of different sources into one centralized location. The vast majority of the data they store is current or historical data that is used to create reports or reveal trends.

Possibly the biggest benefit of a data warehouse is that it can pull data from different sources e.g., marketing, sales, finance, etc. and use this different data to formulate detailed reports on demand. Essentially, a data warehouse cuts down the time required to find and analyze important data.

While not every business will need one right this minute, a solid data warehouse could help make operations easier and more efficient, especially when compared with other data storage solutions. That being said, it can be tough to figure out if you actually need one. In order to help, we have come up with five signs that show your business is ready to implement a data warehouse.

1. Heavy reliance on spreadsheets

Regardless of business size, the spreadsheet is among the most important business tools out there. Used by pretty much every department in a company, they can be a great way of tracking data. The problem many business owners run across however is that spreadsheets can grow to immense sizes and can become unwieldy.

Combine this with the fact that each department has spreadsheets that you will likely need to pull data from in order to generate a report. If this is the case, you are creating manual reports, which can take a lot of your time.

If you are struggling to find the data you need because it is spread out across different sheets, in different departments, then it may be time to implement a data warehouse.

2. Data is overwhelming your spreadsheets

Spreadsheets are designed to operate with a set amount of data (rows and columns). Reach, or exceed this limit, and you will find that the file becomes sluggish or will downright prevent you adding more data.

While it can take a while to get to this point, companies will reach it if they keep adding to their data. At this point you will see a drop in productivity and overall effectiveness in how you use your data. Therefore, a data warehouse that can combine data from different sheets may be a great solution.

3. You spend too much time waiting

If you set out to develop a report, only to find out that you need to wait for colleagues to provide the information on their spreadsheets, or to analyze their data, you could find yourself waiting for a longer than expected time.

This makes you highly ineffective and can be downright frustrating, especially if employees are too busy or just can't provide the information needed. Implementing a data warehouse can help centralize data and make it available to all team members more effectively. This cuts down the time spent actually having to track it down and communicating with colleagues.

4. Discrepancies in data and reports

Have you noticed that when team leaders or members in different departments create reports that the data or findings are different from yours, or other reports? Not only is this frustrating, it is also time consuming to sort out and could lead to costly mistakes.

This can be amplified if some departments have data sources that they don't share with other teams, as this can throw doubt into the solidity of your data and other reports. If you have reached this point, and realize that there are discrepancies in your data, it may be time to look into a data warehouse which can help sort out problems while ensuring mistakes like duplicate data are eliminated.

5. Too much time spent generating reports

Ideally, we should be able to generate a report using existing data almost instantly, or with as few clicks as possible. If you find that when generating a report you have to keep going to different sources to check if the data is updated, or to keep manually updating other sources, you could quickly see the amount of time needed to develop a report grow.

Because data warehouses consolidate data, you only have to turn to one source for data. Combine with the fact that many data warehouses can be set up to automatically update if source data is updated or changed, and you can guarantee that the data you are using is always correct.

Looking to learn more about data warehouses, or about the different data solutions we offer? Contact us today.

Published with permission from TechAdvisory.org. Source.

August 7th, 2014

Security_Aug05_AThese days, the security of various technology based systems is constantly being called into question. From attacks on mobile devices to ever increasing types of malware, many businesses are struggling to stay on top of their security. One of the best ways to help ensure your systems are secure is to be aware of common security issues. To that end, here are five common ways your security can be breached.

1. You are tricked into installing malicious software

One of the most common ways a system's security is breached is through malware being downloaded by the user. In almost every case where malware is installed the reason is because the user was tricked into downloading it.

A common trick used by hackers is to plant malware in software and then place this software on a website. When a user visits the site, they are informed that they need to download the software in order for the site to load properly. Once downloaded, the malware infects the system. Other hackers send emails out with a file attached, where only the file contains malware.

There are a nearly limitless number of ways you can be tricked into downloading and installing malware. Luckily, there are steps you can take to avoid this:

  • Never download files from an untrusted location - If you are looking at a website that is asking you to download something, make sure it's from a company you know about and trust. If you are unsure, it's best to avoid downloading and installing the software.
  • Always look at the name of the file before downloading - Many pieces of malware are often disguised with file names that are similar to other files, with only a slight spelling mistake or some weird wording. If you are unsure about the file then don't download it. Instead, contact us as we may be able to help verify the authenticity or provide a similar app.
  • Stay away from torrents, sites with adult content, and movie streaming sites - These sites often contain malware, so it is best to avoid them altogether.
  • Always scan a file before installing it - If you do download files, be sure to get your virus scanner to scan these before you open the apps. Most scanners are equipped do this, normally by right-clicking on the file and selecting Scan with….

2. Hackers are able to alter the operating system settings

Many users are logged into their computers as admins. Being an administrator allows you to change any and all settings, install programs, and manage other accounts.

If a hacker manages to access your computer and you are set up as the admin, they will have full access to your computer. This means they could install other malicious software, change settings or even completely hijack the machine. The biggest worry about this however, is if a hacker gets access to a computer that is used to manage the overall network. Should this happen, they could gain control over all the systems on the network and do what they please on it.

In order to avoid this, you should ensure that if a user doesn't need to install files or change settings on the computer, they do not have administrator access. Beyond this, installing security software like anti-virus scanners and keeping them up to date, as well as conducting regular scans, will help reduce the chances of being infected, or seeing infections spread.

3. Someone physically accesses your computer

It really feels like almost every security threat these days is digital or is trying to infect your systems and network from the outside. However, there are many times when malware is introduced into systems, or data is stolen, because someone has physically had access to your systems.

For example, you leave your computer on when you go for lunch and someone walks up to it, plugs in a USB drive with malware on it and physically infects your system. Or, it could be they access your system and manually reset the password, thereby locking you out and giving them access.

What we are trying to say here is that not all infections or breaches arrive via the Internet. What we recommend is to ensure that you password protect your computer - you need to enter a password in order to access it. You should also be sure that when you are away from your computer it is either turned off, or you are logged off.

Beyond that, it is a good idea to disable drives like CD/DVD and connections like USB if you don't use them. This will limit the chances that someone will be able to use a CD or USB drive to infect your computer.

4. It's someone from within the company

We have seen a number of infections and security breaches that were carried out by a disgruntled employee. It could be that they delete essential data, or remove it from the system completely. Some have even gone so far as to introduce highly destructive malware.

While it would be great to say that every business has the best employees, there is always a chance a breach can be carried out by an employee. The most effective way to prevent this, aside from ensuring your employees are happy, is to limit access to systems.

Take a look at what your employees have access to. For example, you may find that people in marketing have access to finance files or even admin panels. The truth is, your employees don't need access to everything, so take steps to limit access to necessary systems. Combine this with the suggestions above - limiting admin access and installing scanners - and you can likely limit or even prevent employee initiated breaches.

5. Your password is compromised

Your password is the main way you can verify and access your accounts and systems. The issue is, many people have weak passwords. There has been a steady increase in the number of services that have been breached with user account data being stolen. If a hacker was to get a hold of say your username, and you have a weak password, it could only be a matter of time before they have access to your account.

If this happens, your account is compromised. Combine this with the fact that many people use the same password for multiple accounts, and you could see a massive breach leading to data being stolen, or worse - your identity.

It is therefore a good idea to use a separate password for each account you have. Also, make sure that the passwords used are strong and as different as possible from each other. One tool that could help ensure this is a password manager which generates a different password for each account.

If you are looking to learn more about ensuring your systems are secure, contact us today to learn about how our services can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
August 6th, 2014

BCP_Aug05_AMany businesses are constantly facing a potential disaster. It could be a major fire that wipes out your business, or something as simple as accidentally deleting an important spreadsheet. Regardless of the severity of the potential disaster, businesses need to be prepared and one of the best ways to prepare is to back up your data. In the first part of this article we covered four tips that can help. In this article, we take a look at the next four tips to help ensure your data is backed up.

5. Automate your backup

It can be tough to actually remember to back up your files, especially if your business is busy. Therefore, you could look into an automated backup solution. At the very least, you should set a schedule as to when backups are conducted and set what is being backed up. While this isn't a full automation, a schedule will help.

If you are using solutions like the cloud or NAS (Network Attached Storage), you can usually automate the process by selecting which files and folders to back up and when. The software that powers these solutions will then do this automatically.

Ideally, your backups should be carried out automatically to ensure your data is available should you need it. But you should check periodically to ensure that your data is actually being backed up. This is especially true if you are backing up other systems, as there have been cases where employees have become frustrated by the backup process and simply turned it off. The business owner, thinking their data was being backed up would be in for a bit of a shock when systems crashed, if this was the case.

6. Back up your backups

Redundancy of your backups is just as important as actually backing up your data. You should keep a backup of your backup in case something happens to your original backup. While this doesn't have to be carried out as often as the 'normal' backup, this should be done on a regular basis.

In order to really ensure backup redundancy we recommend that if your main backup is kept on-site, then the secondary backup should be on another storage medium that is kept off-site.

7. Don't forget data stored on non-physical drives

What we are referring to here is the data stored on different services like your email, social media, and non-physical locations. This is especially true if you say have you own servers. It's highly likely that there is data stored on these services as well, and should they go down and you haven't kept a backup, you may lose important information.

Essentially, think about critical data that is used in the company, but isn't physically kept on computers. It may feel like this is going a step too far with backups, especially for businesses who use email services like Exchange and Gmail. However, while the chances of these systems going down are incredibly rare, it could still happen. Therefore, you should conduct a monthly to bi-yearly backup just to ensure that data is there somewhere should something happen.

8. Test your backups

Finally, it is beneficial to actually test your backups from time-to-time to ensure that they are not only working but the data is actually recoverable. If you do a trial run on recovering your data, you can get a good idea of how long it will take to retrieve this information when you actually need to recover it. You can then take steps to optimize this and let the relevant people know.

Also, testing is a good way to discover any problems, e.g., if someone has disabled backups, or one solution isn't working. This will ensure that your data is there when you need it.

If you are looking to integrate a data backup solution, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

July 30th, 2014

SocialMedia_July28_AOne of the main ideas behind LinkedIn is that the network is a virtual venue for people to share their thoughts, ideas, and observances with other like-minded users. Earlier this year the company introduced a new feature to their platform that allowed a select few users to create blog posts directly on LinkedIn. Now, the company has decided to open this up to all LinkedIn members.

About LinkedIn's new publishing platform

Like other social networks, LinkedIn allows users to publish posts on their profile which are then visible to other users. In the past, there was a limit as to how long the posts could be, which influenced how users shared the content they generated. Most would simply copy and paste a link to their content into a post on their LinkedIn profile.

In an effort to make sharing thoughts, ideas, expertise, etc. easier, LinkedIn has implemented the long-form post. This feature allows you to create longer content, such as blog articles and opinion pieces, and post this directly on LinkedIn. In other words, you can now use LinkedIn as a blog which is shared with your connections.

If you create long-form content, this could be a useful way to get posts out to an even wider audience than through your blog. This is because when you publish a post on LinkedIn, it becomes part of your overall profile, with the post being visible under the Posts section of your profile. New long-form posts will also be published and shared with all of your contacts automatically.

This means that you could technically increase the overall reach of your content, especially if the content you produce is useful to your LinkedIn connections.

Writing long-form content on LinkedIn

If you would like to start publishing long-form content using your LinkedIn profile, you should be able to do so by:
  1. Logging into your LinkedIn profile.
  2. Pressing the pencil in the box that says Share an update…
Note: This update is still rolling out to users, so you may not be able to produce long-form content just yet. If you don't see the pencil in the Share an update… box, you will need to wait for a few weeks, or until you get an email from LinkedIn saying the feature is ready for you to use.

If you do see the pencil icon, click on it to open the long-form post screen. It looks like most other Web-based publishing and writing platforms with the usual formatting buttons and text field where you input the content.

You can write your article directly on this page, but many choose to write using a program they are comfortable with and then copy and paste into the text field. If you want to add images to your post, you can simply click where you would like the image to slot into the content and select the camera icon from the menu bar above the text field. Select the image and hit Submit. You can then resize the image by clicking and dragging on it.

Saving and editing your content

Once you have finished writing we strongly recommend you hit the Save button at the bottom of the text field. This will save the content to your profile, but will not post it. This means you can edit the content before publishing. To do this, click on Preview which will open your post in another window, allowing you to see what the post will look like on your profile.

While in Preview mode, be sure to check the spelling and grammar, along with the overall formatting. If you spot anything that needs to be changed simply switch back to the editing tab on your browser and make any amendments.

When you have finished writing, formatting, and editing you can then hit the Publish button. This will then publish the content on your profile and share it with your connections.

If you have content that you think your connections and colleagues would benefit from reading, then this new LinkedIn feature could prove to be useful and should be considered as a larger part of your overall content strategy.

Looking to learn more about LinkedIn and how you can leverage it in your business? Contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Social Media