Blog

April 11th, 2014

Security_Apr11_BThe Internet is an amazing thing, but being so big and accessed by so many people, it is never really 100% secure. There are always security issues being uncovered that could put your business and systems at risk. One of the latest flaws is possibly one of the biggest to be uncovered in years and could affect nearly every person and company on the Internet. Codenamed Heartbleed, this bug makes stealing data and viewing secure communication incredibly easy.

Background info about secure transmission of information on the Web

Most sites on the Internet rely on Secure Sockets Layer (SSL) technology to ensure that information is transmitted securely from a computer to server. SSL and the slightly older Transport Layer Security (TLS) are the main technology used to essentially verify that the site you are trying to access is indeed that site, and not a fake one which could contain malware or any other form of security threat. They essentially ensure that the keys needed to confirm that a site is legitimate and communication can be securely exchanged.

You can tell sites are using SSL/TLS by looking at the URL bar of your browser. If there is a padlock or HTTPS:// before the Web address, the site is likely using SSL or TLS verifications to help ensure that the site is legitimate and communication will be secure. These technologies work well and are an essential part of the modern Internet. The problem is not actually with this technology but with a software library called OpenSSL. This breach is called Heartbleed, and has apparently been open for a number of years now.

About Heartbleed

OpenSSL is an open-source version of SSL and TSL. This means that anyone can use it to gain SSL/TSL encryption for their site, and indeed a rather large percentage of sites on the Internet use this software library. The problem is, there was a small software glitch that can be exploited. This glitch is heartbleed.

Heartbleed is a bug/glitch that allows anyone on the Internet to access and read the memory of systems that are using certain versions of OpenSSL software. People who choose to exploit the bugs in the specific versions of OpenSSL can actually access or 'grab' bits of data that should be secured. This data is often related to the 'handshake' or key that is used to encrypt data which can then be observed and copied, allowing others to see what should be secure information.

The problem with Heartbleed

There are two major problems with this bug. The first being that if an attacker can uncover the SSL handshake used by your computer and the server that hosts the site when you login or transmit data they will be able to see this information. This information usually is made up of your login name, password, text messages, content and even your credit card numbers. In other words, anything that gets transmitted to the site using that version of SSL can be viewed.

Scary right? Well, the second problem is much, much bigger. The hacker won't only be able to see the data you transmit, but how the site receiving it employs the SSL code. If a hacker sees this, they can copy it and use it to create spoof sites that use the same handshake code, tricking your browser into thinking the site is legitimate. These sites could be made to look exactly same as the legitimate site, but may contain malware or even data capture software. It's kind of like a criminal getting the key to your house instead of breaking the window.

But wait, it gets worse. This bug has been present in certain versions of OpenSSL for almost two years which means the sites that have been using the version of OpenSSL may have led to exposure of your data and communication. And any attacks that were carried out can't usually be traced.

Am I affected by this?

What makes this so different from other security glitches is that OpenSSL is used by a large percentage of websites. What this means is that you are likely affected. In fact, a report published by Netcraft cited that 66% of active sites on the Internet used OpenSSL. This software is also used to secure chat systems, Virtual Private Networks, and even some email servers.

We have to make it clear here however: Just because OpenSSL is used by a vast percentage of the Internet, it doesn't mean every site is affected by the glitch.

The latest versions of OpenSSL have already patched this issue and any website using these versions will still be secure. The version with Heartbleed came out in 2011. The issue is while sites may not be using the 2011 version now, they likely did in the past meaning your data could have been at risk. On the other hand, there are still a wide number of sites using this version of OpenSSL.

What should I do?

This is a big issue, regardless of whether a website uses this version of OpenSSL or not. The absolute first thing you should do is go and change your passwords for everything. When we say everything, we mean everything. Make the passwords as different as possible from the old ones and ensure that they are strong.

It can be hard to tell whether your data or communications were or are actually exposed or not, but it is safe to assume that at some time or another it was. Changing your passwords should be the first step to ensuring that you are secure and that the SSL/TSL transmissions are secure. Another thing you should be aware of is what sites are actually using this version of OpenSSL. According to articles on the Web some of the most popular sites have used the version with the bug, or are as of the writing of this article, using it. Here are some of the most popular:

  • Facebook
  • Google
  • Gmail
  • Yahoo
  • Yahoo Mail
  • Instagram
  • Pinterest
  • Amazon Web Services
  • GoDaddy
  • Intuit
It would be a good idea to visit the blogs of each service to see whether they have updated to a new version of OpenSSL. As of the writing of this article, most had actually done so but some were still looking into upgrading. For a full list of sites, check out this Mashable article.

If you have a website that uses SSL/TSL and OpenSSL you should update it to the latest version ASAP. This isn't a large update but it needs to be done properly, so it is best to contact an IT partner like us who can help ensure the upgrade goes smoothly and that all communication is infact secure.

Contact us today to see how we can help ensure that your company is secure.

Published with permission from TechAdvisory.org. Source.

Topic Security
April 10th, 2014

BusinessValue_Apr07_BWhen it comes to Web design many business owners and managers work with a Web designer or developer. These Web experts often use terms that you may not be familiar with and which in essence sound like another language. This can make it difficult to communicate and to ultimately get your point across to achieve the website you want. To make dialogue easier, it might be helpful to learn some of the common Web design terms.

Here are 20 of the most used Web design terms that could help you communicate effectively with designers and developers about what you want from your website:

  • Alignment - The position of the various elements on your page. Alignment can be focused on the borders of the page, or positioning of elements based on other elements - e.g., aligning all images to the left side of the page, and making sure the text is aligned to the right of each image.
  • Banner - A form of advertising that is usually at the top of a page and goes from one side to the other. On many sites, the banner also contains links that can be clicked through to reach other pages.
  • Below the fold - The point on the page where viewers will begin to scroll after the page has loaded. Generally you put the most important information above the fold (what the visitor sees first) and supplement information below it.
  • Color wheel - A circle of colors that allows designers to easily pick out primary, secondary, and tertiary colors, as well as complimentary and contrasting colors - e.g., on most wheels red is opposite green because they complement one another.
  • CSS - Cascading Style Sheets allows designers to dictate the look and feel of a page. These are usually codes that dictate the font, color, and layout of a Web page.
  • DPI - Dots Per Inch is the resolution of an image or monitor. The higher the DPI, the higher the resolution or quality of the image.
  • Entry and Exit pages - This indicates where a viewer enters your page from an external source, and where a viewer will usually exit your site from. The vast majority of entry pages are the homepage, so these should be designed to capture and maintain interest. Exit pages can be the homepage, or perhaps a signup form.
  • GIF - Pronounced Jif, is an image format that is best suited for small images with few colors. These can also be animated.
  • Header - This is the absolute top of any page.
  • HTML - Hyper Text Markup Language, is the main language used to write webpages. For example, the bullet points in this article would be written as < ol><li>HTML - Hyper Text ...</li></ol>. Browsers read this code and translate the directions given.
  • JPEG - An image format best suited to pictures and images with a large number of colors. The vast majority of images on the Internet and websites are uploaded in the JPEG format.
  • Lorem Ipsum - Placeholder text is used by developers when creating mockups of pages or layout so they can see how the text will look when the page is finished. This can be any form of text and is usually nonsensical, like 'Lorem Ipsum Dolor'.
  • Orphan - A word or short sentence that appears by itself, below the text on a page. Generally these should be avoided, and can be easily 'adopted' by adjusting spacing between letters and words, or editing content.
  • Parent/Child elements - With HTML and other Web languages there is a relationship between elements (parts of code). Parents dictate elements that will be inherited by other codes (children) that are within the main parent group. For example, if you assign a headline a certain style this style becomes the parent. Any other elements like a bolded word within the headline will be a child. The child will take the same style as the headline and have the added bold format as well.
  • Pixel - The smallest element of any image and your monitor. It is essentially one dot of color. The resolution of images and monitors (how clear the image is) is often displayed in pixels. The higher the number of pixels, the higher the resolution and quality.
  • PNG - An image format that is most commonly used for images that have large amounts of uniform color or transparent backgrounds.
  • Script - A small bit of code that enables browsers to do more than just displaying text. If you've ever watched a video while on a website or downloaded something directly from a page, you have interacted with a script.
  • Watermark - A mark of ownership which is usually applied to the background of images or content. This is used to highlight ownership and deter theft of visual content. If you plan to post images on your site that you create, you might want to consider adding a watermark as protection.
  • White space - Space that surrounds text, images or other parts of the page. It is generally believed that the more white space there is, the easier it is to read content and draw attention to important aspects of a page.
  • Wireframe - A visual representation of a website's layout with directions for visuals, location of content, and style for each page. This is usually constructed before the site is built and is more or less a road map for developers.
Of course, these are just a few of the terms designers and developers use on a regular basis. If you want to understand how to get the best out of your website and technology then we're here to help.
Published with permission from TechAdvisory.org. Source.

April 4th, 2014

Security_March31_BA malware infection is an attack that you do not want invading your business systems. Malicious software can often make its way on computers without your knowledge, causing various disturbances. What’s even worse, is that vital information saved on your computer or data that you access online could be stolen. Computers must have proper protection. In the event that malware infection is detected an immediate response is required.

Signs of a malware infection

Before proceeding with the steps on how to respond to malware infections, we first need to learn about the signs and symptoms of a malware infection. These include:
  • Several pop-ups appear even when not browsing the Web.
  • Unusual slowness of the computer and Internet connection.
  • System hangs or freezes.
  • Corrupted programs.
  • Antivirus is disabled.
  • E-mails sent to or from your account which you did not send.
  • High network activity, even when not using large programs or accessing huge data.
  • Redirected access to some sites.

How to respond to a malware infection

In case you experience any of these symptoms, the first thing to do is to ensure that your antivirus and antispyware program is updated. This is to make sure that they detect the latest known threats on their database. You should then run scans to see if an infection is detected. If it is, the programs usually have a way to remove the infection. You then need to follow the steps the program recommends.

If this doesn't work, disconnect the infected computer from the network to prevent the spread of the malware. Furthermore, avoid accessing the Web and using vital information such as bank account and credit card information. Let the technical department or your IT partner handle the concern since they are trained in determining and eradicating system malware infections.

Once the problem has been pinpointed, a tech specialist will go through the process of eliminating the infection. This includes backing up data on the computer and restoring the system to its original state. Depending on the extent of the infection, the computer may need to be wiped clean, or reformatted before restoring backed-up files.

After the whole process, the computer must be tested to ensure that the infection has been totally removed. Moreover, further investigation and studies must also be done to determine where the problem started, as well as to create a strategy as to how to prevent this from happening in the future.

How to prevent a malware attack

Prevention is better than a cure and this definitely applies to malware infections. It’s best to arm yourself with knowledge on how to avoid malware attacks and prevent your systems from being infected.
  1. Ensure that security protection is always updated and that you run system scans on a regular basis.
  2. Avoid downloading attachments or clicking links from unknown sites or senders.
  3. Enable firewall protection.
Malware can hugely affect business operations and the security of private information. One of the best ways to prevent this is to work with an IT partner, like us, who can help recommend and install protection systems. You might want to think about getting help in managing these solutions too, to ensure that your systems are secure at all times.

If you have questions or concerns with regards to malware prevention and resolution, feel free to call us. Our support team is always ready to help.

Published with permission from TechAdvisory.org. Source.

Topic Security
April 2nd, 2014

Productivity_Mar31_BThere is a common trend with businesses, especially small to medium businesses, of hiring remote workers and also of working with clients at greater distances than ever before. As a result, an increasing number of businesses are creating remote presentations, or using software to present to an audience over the Internet. However, this style of presentation can be a challenge, especially when it comes to engaging your audience.

If you are creating an online presentation to a remote audience there are a number of factors you should keep in mind if you want to grab your audience's attention and keep them following and paying attention. Here are five of the most important tips:

1. Make it visual

For the most part, visual presentations have a higher chance of success - that is, the message being grasped by the audience. This is especially true for online and remote presentations, largely because when more people are on a computer, partaking in a presentation, they will often be multi-tasking.

If you have a ton of text there is a good chance you will lose your audience within the first couple of slides. Instead aim for a presentation that is heavy on graphics and visually appealing. Using bright or contrasting colors will draw the eye and will increase the time you have your audience's attention.

If your presentation is about a product create picture slides with a minimal amount of text; let the product speak for itself. For presentations involving graphs and charts, include these graphics and a couple of key points. The rest you can fill in with spoken narrative.

2. Focus on the audience

Online presentations and those using meeting software should be audience-friendly. This means making it easy for them to join and partake in the presentation by sharing slides, and also asking if anyone has any points to add or even expand upon with an interactive presentation element.

While presenting, there will be slides and points that are more important than others. To highlight this you can 'sign-post' the salient points. Make these visually larger if they are text, and pause to point this out with the script by telling your audience: "This is the most important point"; essentially demanding they pay attention.

Finally, try to limit technical glitches. This can be the quickest way to lose engagement if your Internet cuts out or the computer crashes. Try to present at a time when you know connection will be strong and stable and have a backup in place in case something goes wrong.

3. Adapt to different audiences

Every person in the audience will have different expectations of your presentation. Some will want just the facts, while others might be looking to be convinced by an opinion or argument expressed in the presentation. You should take the time to get to know your audience and what they expect and then develop the presentation around this idea.

If you do your homework and know a bit about your audience, you can take steps to connect with them early in the presentation, if not before, and drive engagement.

4. Create, edit, practice, edit, practice, edit, practice, present

It may sound a bit redundant to edit and practice multiple times, but it really will help when leading an online presentation. First you should create your presentation, then edit it. You are looking to keep your slides as short as possible - no more than four points and two minutes spent talking for each slide.

Really the first edit should be about content, grammar and spelling. Once this is done, practice presenting as you would on the actual presentation day. Start with a blank desktop screen, log into the software/site you will be using, load the presentation, share it, and then actually present. Time yourself and note any issues.

Next, go back and edit the presentation some more, making sure you aren't spending too much time on one slide or that each of the slides does not have too many confusing points, etc. Keep practicing and editing until you are not only comfortable, but know the content inside and out.

You could also try recording your voice. This will allow you to hear where you need to work on inflection and overall style. If you find that you are tuning yourself out when you listen to the presentation, you may want to practice some more and try to inject some extra interest, whether through humor or engaging facts and ideas. This is really vital is you won't have that face-to-face contact with a physical presentation where you are present. If you sound engaging, the audience are more likely to connect with you.

5. Develop your own style

No one likes a dull presentation where you just talk about what's on the slides. Try to give your presentation a narrative arc and structure. Where possible include personal experiences or even tell a relevant joke from time to time. If you are passionate and show that you are trying to connect your audience will likely not click away from the presentation or drift off to other work or simply to surf the Internet and Facebook.

If you are looking to learn more about presentations and how to use software for expert presentations, or even how to conduct your next remote presentation, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Productivity
April 2nd, 2014

BusinessValue_Mar31_BHaving a website is one of the most important marketing and branding tools a business can utilize. This is largely because visitors will often judge whether they want to do business with you almost solely based off of your website. Therefore, your website needs to be designed properly and look professional. In order to achieve this you need to know about the common mistakes small businesses make when it comes to website designs.

The business value of a business website is that it creates a solid online presence and boosts your brand image and market reach. Even if your business is not Internet based, a website can be used to create a certain impression and ultimately contribute to your bottom line. The key is to make sure you create the best impression. Here are six of the most common mistakes businesses make with website design:

Mistake 1: Building for the sake of building

Websites are important and some businesses believe that they should have a website, so they go ahead and simply build one. You should first take steps to define your target market - who is it that you want and expect to visit your website.

Once you have a defined target market you can then take time to build your site for your market. For example, if the majority of your target market uses mobile devices to browse the Web you should take steps to design your site so that it is viewable on mobile devices.

You should also determine what you want visitors to do on your site. Some companies want them to click through to another site, while others want them to sign up. By defining how you want your visitors to interact you can then develop your content and design around this.

Mistake 2: Designing a website that is too busy

It can be tempting to put all of your information on one page or even have a ton of images and videos. The truth is, this can be distracting largely because once someone lands on your page, they won't know how to get around, find the information they want, or even to know what they should do next.

Busy or flashy websites with lots of animations or large amounts of text also usually don't scale all that well. So, when someone looks at your site on a mobile device they will likely find it too hard to navigate and leave, which is counter to what you are trying to achieve.

Instead, aim for a website that is simple and clean. Important information should be quick to find and read and it should be clear who you are, what you have to say, and what you want the visitor to do.

Mistake 3: Lacking call to actions

Most business related websites have a goal as to what they want visitors to do. Maybe it's download an app, call the company, or even sign make a purchase online. It is essential that you lead visitors toward what you want them to do in the most clear and concise way. The best way to do this is through a call to action. These are usually buttons at the bottom of sections or pages that motivate the user to click and follow the instructions on what to do next, be that sign up to something or get in touch.

The best calls to action stand out from the content, drawing the reader's eye and hopefully inspiring them to click. They should also be clearly written, simple, and direct. e.g., 'Call us today!' or 'Download now!'

Mistake 4: Misguided content

It may seem worthwhile to write in-depth content about your products or services but this isn't always the case. People skim read the basics on the Web and it's different than other mediums.

What you should do is condense down your content so that it only states the most important information. Tell the reader what your product or service does and provide a few of the most important benefits. What you are looking to do is develop enough interest so that visitors to your site will click on the call to action and connect with you.

If you have the time and profits, creating a more visual site where you showcase the products or show how you can help in a short video may lead to higher engagement and possibly higher customer conversions. Take a look at the popular software and service sites like Dropbox, Microsoft, and Google. The content is highly visible and simple, yet provides just enough information so the user knows what the service is and what they are expected to do.

Mistake 5: Static content

It can be tempting to invest the time to write a great website, get the content online then just leave it sitting there. The Internet changes and what might have been regarded as great website design and content a couple of years ago may not be seen in the same light today.

It is advisable to periodically update your site's design and content to reflect current trends; making it more modern. Another related aspect of your content is that you need to ensure that your content is up-to-date. If you are hosting a contest and put the information on your site, you should make sure to take it off of your site, or update it when the date passes. It looks a little unprofessional to have content that is still talking about 2012 or even 2013.

Mistake 6: Doing it yourself

The vast majority of small business owners and managers don't have in-depth Web design skills, yet are determined to build their company's website themselves. This can lead to unexpected problems or a website that doesn't meet your needs. We strongly recommend that you work with a qualified designer who can help ensure that your website is designed and built to high standards.

If you are looking to boost your website's design contact us today. We can help!

Published with permission from TechAdvisory.org. Source.

March 27th, 2014

BI_March24_BSeveral companies nowadays rely on Business Intelligence or BI tools to analyze information generated by their business. These tools are either installed on computers or cloud-based and accessible on the Web. These applications allow users to ensure that everyone is on the same path with regards to achieving their business goals. The question is, how are different departments using them?

There are various BI tools available nowadays that support small to large companies. You can find Business Intelligence tools that fit your company’s size, needs and budget. These applications can be used in different areas of the business:

Marketing Department

A marketing department is responsible for promoting a company’s products, services and brand to increase public awareness. With successful marketing, a business can attract potential clients that can be possibly turned into creating sales revenue. The company can use BI to determine which campaigns are successful or not, as the case may be. Through this, investments can be focused on those campaigns that work whilst avoiding those that have previously failed.

Sales Department

Sales managers and supervisors can also use BI to analyze successful deals, as well as those that they have lost, to see what strategies have worked. The system can also help determine which sales teams hit or exceed set goals in order to analyze what they are doing right. Moreover, this helps determine which products or services are most saleable so these can be pushed further to attain more goals.

Finance Department

BI software makes analyzing, reporting, and managing financial data more convenient. Those who are involved in the process can easily access the information they need through the system. Analysis is easier as the data is organized and accurate. Money in and money out can also be tracked with greater efficiency.

Moreover, these tools often come with features that allow users to create scenarios and determine the possible results from there. This is extremely helpful in deciding on the best action to take as the tool gives you a view of the probable outcome. The success rate is higher if forecasting using a BI tool.

Inventory

Business Intelligence also plays a vital role in inventory tracking of products, items or supplies. For instance, companies in the retail industry can track the movement of products or items from the suppliers to the warehouse and on to their delivery to clients. Any problems encountered in the process can be quickly identified so they can be fixed in time.

Items in demand can also be pinpointed, as well as low stock and overstocks. Items that are low in stock can be ordered immediately, especially if they are in demand, to ensure that the needs of clients are met. This also lets you avoid overstocking, which can be a waste of money when investment is better used for fast moving items.

These are just some of the ways businesses can use BI in their operations. If you have further questions about the topic, do not hesitate to give us a call. We’ll be more than happy to assist you.

Published with permission from TechAdvisory.org. Source.

March 20th, 2014

Security_Mar17_BThe security of your computer, network and whole system is likely something that has caused moments of stress and even worry. In order to ensure that a business is secure, companies often adopt a security strategy. While these strategies are great, there is one common element that many businesses forget to carry out - the audit.

Auditing and the security security strategy

Auditing your company's security is important, the only problem business owners run across is where and what they should be auditing. The easiest way to do this is to first look at the common elements of developing security strategies.

These elements are: assess, assign, audit. When you develop a plan, or work with an IT partner to develop one, you follow the three steps above, and it may be obvious at the end. In truth however, you should be auditing at each stage of the plan. That means you first need to know what goes on in each stage.

During the assessment phase you or your IT partner will need to look at the existing security you have in place. This includes on every computer and server and also focuses on who has access to what, and what programs are being used. Doing an assessment should give you an overview of how secure your business currently is, along with any weak points that need to be improved.

The assignment phase looks at actually carrying out the changes you identified in the assessment phase. This could include adding improved security measures, deleting unused programs or even updating systems for improved security. The main goal in this phase is to ensure that your systems and networks are secure.

Auditing happens after the changes have been made and aims to ensure that your systems are actually secure and have been implemented properly. Throughout the process you will actually need to continually audit and adjust your strategy.

What exactly should be audited?

When conducting an audit, there are three factors you should focus on:
  1. The state of your security - Changing or introducing a security plan usually begins with an audit of sorts. In order to do this however, you need to know about how your security has changed in between audits. Tracking this state and how it changed in between audits allows you to more efficiently audit how your system is working now and to also implement changes easier. If you don't know how the state of your security has changed in between audits, you could risk implementing ineffective security measures or leaving older solutions open to risk.
  2. The changes made - Auditing the state of your security is important, but you should also be auditing the changes made to your systems. For example, if a new program is installed, or a new firewall is implemented, you will need to audit how well it is working before you can deem your security plan to be fully implemented. Basically, you are looking for any changes made to your system that could influence security while you are implementing a new system. If by auditing at this point, you find that security has been compromised, you will need to go back to the first step and assess why before moving forward.
  3. Who has access to what - There is a good chance that every system you have will not need to be accessed by every employee. It would be a good idea that once a security solution is in place, that you audit who has access to what systems and how often they use them. This stage of the process needs to be proactive and constantly carried out. if you find that access changes or system access needs change, it would be a good idea to adapt your the security strategy; starting with the first stage.
If you are looking for help developing a security strategy for your business, contact us today to see how our managed solutions can help.
Published with permission from TechAdvisory.org. Source.

Topic Security
March 19th, 2014

BCP_Marc17_BDRPs (Disaster Recovery Plan) although seemingly expensive or hard to implement, are a must have for your business. Since businesses spend thousands of dollars optimizing and upgrading their systems, doesn’t it make total sense to protect your investment? With a good DRP in place, you should be able to mitigate risks in case of a disaster.

While there are several facets to a DRP that are going to determine whether it will be effective or not, making sure that you’ve considered these 5 tips is definitely a good start.

1.) Commitment from management

Because the managers are the ones who will coordinate the development of the plan and be the central figures who implement the recovery plan, it’s crucial that they are committed to it and are willing to back it up.

They will also be responsible for setting an allocated budget and manpower to creating the actual plan. That said, it’s very important that they know the concept behind it and how huge of an impact a DRP can have on a business.

2.) A representative on each department should be available when creating a DRP

It’s unthinkable to believe that your DRP is well optimized when you haven’t had a representative from each department coordinate with you while creating the recovery program.

Considering how they themselves are the front line of your organization with the best knowledge about how their department works, it’s a huge plus that you should take advantage of when creating a DRP.

With the representatives on your team, you’ll be able to see things from their perspective and gain first-hand knowledge from those who do the actual work.

3.) Remember to prioritize

In an ideal world, you should be able to restore everything at the same time after a disaster strikes. But since most businesses usually have a limited amount of resources, you will usually have to recover systems one at a time.

Because of this, you need to have a hierarchy or a sense of priority when determining which systems should be recovered first. That way, the most important systems are immediately brought back up while the less important ones are then queued in order of their importance.

4.) Determining your recovery strategies

This is one of the main focal points of a DRP since this phase tackles the actual strategies or steps that you’ll implement to recover your systems.

When determining your actual strategies, it's important that you brainstorm and think about all the options that you have to recovering your systems. Don’t simply stick with the cheapest possible strategy or even the most expensive ones.

You have to remember though that the simplest strategy to implement is probably the best one. That is, as long as the simplest strategy covers the critical aspects of your system recovery.

That said, avoid over complicating your strategies as you might face unnecessary challenges when it comes to the implementation of the recovery strategy.

5.) Do a dry run at least once a year

Your DRP shouldn’t end with the concept alone. No matter how foolproof you think your strategy is, if you haven’t tested it you most likely have missed something important.

It's during the dry run phase that the need for extra steps (or the removal of one) are made even more evident. You can then start polishing your strategies according to how your dry run plays out. It would also be a good year to practice your plan each year and update it accordingly.

These tips will help you ensure that your DRP will remain effective should a disaster occur. If you’re having a hard time figuring out how to go about the process of creating a DRP, then give us a call now and we’ll help you with the process.

Published with permission from TechAdvisory.org. Source.

March 11th, 2014

Seventh Annual Report Identifies
World’s Top 501 Managed Service Providers (MSPs)

March 10, 2014: RESULTS Technology(Lenexa, KS) has surfaced on Nine Lives Media’s seventh-annual MSPmentor 501 Global Edition (http://www.mspmentor.net/top501), a distinguished list and report identifying the world’s top 501 managed service providers (MSPs). This year’s report includes:

  • MSPmentor 501 Global Edition
  • MSPmentor 100 Small Business Edition (top MSPs with 10 or fewer employees)
  • MSPmentor 200 North America Edition
  • MSPmentor 50 EMEA (Europe, Middle East, Africa) Edition
  • MSPmentor 25 AANZ (Asia, Australia, New Zealand) Edition
  • New: In-depth data tracking of per user and per device pricing data.

RESULTS Technology is the 161st MSP in the MSPmentorGlobal Edition and the 126th MSP on the MSPmentor 200 North America Edition

“This is a tremendous honor for our company,” said Patrick Murphy, Executive Vice President, RESULTS Technology. “The efforts of our employees is what truly makes RESULTS different and one of the leaders in the MSP community.”

The MSPmentor 501 report is based on data from MSPmentor’s global online survey, conducted October-December 2013. The MSPmentor 501 report recognizes top managed service providers based on a range of metrics, including annual managed services revenue growth, revenue per employee, managed services offered and customer devices managed.

“MSPmentor congratulates RESULTS Technology on this unique honor,” said Amy Katz, president of Nine Lives Media, a Penton business. “Qualifying for our MSPmentor 501 Global Edition puts RESULTS Technology in rare company.”

MSPs on this year’s global 501 list lifted their combined annual recurring revenues $2.61 billion, continuing seven straight years of strong growth. Together, those MSPs now manage more than 700,000 servers, according to Jessica Davis, managing editor, MSPmentor.

MSPmentor, produced by Nine Lives Media, is the ultimate guide to managed services. MSPmentor features the industry’s top-ranked blog, research, Channel Expert Hour Webcasts and FastChat videos. It is the number one online media destination for managed service providers in the world.

About Nine Lives Media
Nine Lives Media, a division of Penton (http://www.penton.com), defines emerging IT media markets and disrupts established IT media markets. The company’s IT channel-centric online communities include MSPmentor (http://www.MSPmentor.net), The VAR Guy (http://www.TheVARguy.com) and Talkin’ Cloud (http://www.TalkinCloud.com).

Contact:
Nine Lives Media, a division of Penton
Jessica Davis, Managing Editor, MSPmentor
jessica.davis@penton.com

March 7th, 2014

Productivity_Mar03_BWhen it comes to productivity, many business owners rely on to-do lists. However, writing an effective to-do list can be quite a challenging task. Though a lot of people jot down their tasks for the day or week ahead they don't always fully realize the benefits of their list because it is either poorly crafted or even missing items. The result is decreased effectiveness. Hopefully our tips will help you create an effective way forward to boost productivity.

Here are 5 tips which will help you devise an effective to-do list:

Add a notes section

A notes section is a general area for all the tasks in your to-do list. Its main purpose is to provide you with space to add notes about your tasks. Or, instead you can use this area to type in challenges that you encountered when handling specific tasks.

On the flip side, it could also contain the best practices that you employed which enabled you to finish the task effectively and efficiently. These notes are important because by revisiting these jottings you can learn from them and be better able to optimize your way of doing things and your approach.

Prioritize

Ignoring client meetings because you're supposed to be fixing your cabinet, for example, based on what’s written in your to-do list, is a sure fire way of negatively impacting your business.

Your to-do list needs to be devised in such a way that there is a clear sense of priority. The most important tasks should be added to the top most part of your list just to make sure that you don’t miss these and they are tackled and completed first.

Break down your tasks to bite-size activities

Can you imagine writing down 'work' in your to-do list? Having a to-do list with broad topics like this won’t help you in the slightest bit.

You need to break down your lists into more specific tasks so that they provide the clarity that you need to achieve. Here’s a good example of a well-constructed list:

  1. Send 20 outreach emails to prospects.
  2. Discuss with the team the concept of having a systems' mindset.
  3. Review the offer of client X and decide whether to accept it or not.
Notice how the examples above are more tangible compared to simply writing down 'work'? With a list like the one above, you should be able to comfortably tick each task with a clear idea of when it has been completed.

Add a deadline whenever possible

Adding a deadline helps you gauge your output. By being able to see whether you’re lagging behind you can make any necessary changes.

A deadline also prevents you from procrastinating since you’ll be more conscious of time and a definitive end point.

Be realistic

Adding a week's worth of tasks to your daily to-do list will just discourage and frustrate you. Be as realistic as you can when writing up your list. If you honestly think that you can’t finish all of the tasks within one day, then add some of them to the next. That way you won’t be frustrated with a long list of tasks that you haven’t completed at the end of each day.

If you are faced with productivity issues and are struggling to get the kind of output you're hoping for in your business, then put giving us a call at the top of your to-do list.

Published with permission from TechAdvisory.org. Source.

Topic Productivity