Public Wi-Fi Networks Pose Security Risks

These days, more and more people are on the go, and many of them bring their work with them. While connecting to public and open-access Wi-Fi hotspots is indeed convenient, using open networks also pose risks that endanger your security. While connecting to public and open-access Wi-Fi hotspots is indeed convenient, using open networks also poses risks that endanger your security. The open nature that allows anyone to use the connection also enables unscrupulous people to gain access to your private information. The whole act of stealing information from people who are using public Wi-Fi networks is called ‘sidejacking’. There are applications such as Firesheep, for example, that provide an easy-to-use platform that others can exploit to spy and harvest personal, sensitive information from you. And since Firesheep is a Mozilla Firefox plug in, virtually anyone can download and use it to sidejack people on the same network. You can’t be too cautious with your personal and business data these days, so you always need to have the proper laptop configuration and security infrastructure to protect your system, especially when you frequently avail of open and public networks. To know more about this, please feel free to give us a call and we’ll be happy to draw up some security options that meet your specific needs.

Read More

Clever Twitter Apps to Efficiently Connect with Your Twitter Followers

Twitter applications of various shapes and sizes are popping up all over cyberspace these days. But who’s got the luxury of time to try them all? In an effort to narrow down your options, here are 6 Twitter apps that you might find useful in getting in touch with your Twitter community. There are countless Twitter tools and apps available today. Here’s a list of six that are sure to be useful and effective in building relationships with your Twitter followers. The first section introduces some basic tools, which you can skip if you’re already a Twitter expert. The second section describes tools that you may not have previously heard of, but are worth checking out since they can boost visibility, traffic, and clients. The Basics Link Shorteners – Most Tweets (posts) on Twitter are not the usual “what I had for lunch” Tweets, but are more often people sharing links of articles, videos, photos, and more. Sharing links is a great way to help people better understand your field of interest and expertise while also helping them discover great content online. However, many links are very long, and do not fit within Twitter’s 140-character limit – so as the term implies, a link shortener shortens a specific link/URL. Try sites like Bit.ly , TinyURL and tr.im to easily condense your very long URLs into just 15-20 characters, leaving you room to comment.In addition to the practical need of shorter URLs, a majority of these tools also provide useful tracking reports so you can monitor the number of people who clicked on your links, which were the most popular, the dates when people clicked them, as well as give you an idea which topics are the most popular with your Twitter community. TweetMeme – That ever-present gray and green “re-tweet” logo enables readers to quickly re-post or “re-tweet” your post to their own Twitter followers. TweetMeme is a wonderful means to encourage your audience to spread the news about your status, tips, and words of wisdom.Like link shorteners, TweetMeme also tracks your links as they pass through the Twitterverse, and shows the total number of times your link was re-tweeted. Aside from helping you determine the popularity of given topics, it also lets the feisty competitor in us compare the success of our posts versus others and even ourselves. TwitPic – This is one of the numerous tools that let you take pictures with your mobile phone and post them directly on Twitter. Other similar tools are: TwitGoo , img.ly and yfrog . These tools are also usually integrated into whatever Twitter mobile application you’re using. You can also obtain statistics to monitor responses on your pictures. You can still also opt to link your followers to a Flickr account, Facebook page, or a web page that displays your pictures. Cast your Twitter net even farther… There are a lot of nifty Twitter applications out there that will help you create a solid and engaged community. When you’re ready to take your Twitter skills to the next level, below are three tools to get you started. TweetSwell – This great app allows you to create Twitter-based polls, wherein each reply doubles as a tweet and helps the poll become viral. TweetSwell  can also help maintain your brand identity by ensuring that your poll pages are synchronized with your custom-made Twitter layout. Similar apps are: Twtpoll and TwtSurvey . TwtVite – Somewhat related to Eventbrite , TwtVite enables you to use Twitter to get together in the real world. Check out the animated video to get a feel for how it works. For an actual example, read this case study about a Milwaukee bar owner who used TwtVite in hosting the biggest Tweetup in the Midwest . TwtQpon – Online coupons offer small businesses a fantastic opportunity to drive lots of new and repeat clients. This app creates online coupons that can be published on Twitter and many other social network sites. While apps such as Groupon and Living Social can also make online coupons, TwtQpon is specifically designed for social networks.

Read More

Force Firefox to Display Webpages with a Specific Font

Sometimes websites use fonts that are too small or otherwise difficult to read. Learn how to set up Firefox to display all webpages with a specific font and size of your choosing.   Read more

Read More

Fake Security Software On the Rise

Incidents of fake security software fooling users into spending money on malware are on the rise. Security firm McAfee has published a report early in the year showing that up to a million people worldwide fall victim to so-called “scareware” each year. Scareware, or rogueware, is software that poses as legitimate security software but in reality are dupes to steal credit card information from users, or even worse are Trojan Horses to spread malware. Scareware is distributed primarily through the Internet via malicious websites that pop out windows that fool users into thinking their system may be infected. Users who click on the popup windows are redirected to a website which encourages them to buy fake security software online. Scareware are especially dangerous as it hits users in many ways: by duping them out of their money, injecting viruses or other forms of malware into their system, or even holding them ransom — for instance, by taking over users’ systems then demanding more payment to free the data stored in the infected computer. It’s a good thing that there are many ways to protect your system against scareware. One is using security software from legitimate and well established software vendors — through their legitimate sales channels. Another is by being prudent with offers and downloads when online. For a small business there are other ways such as blocking or filtering these malicious websites to ensure the security of the entire business. If you want to find out more about these solutions to protect small business networks — let us know. We offer managed security services for small business that can protect against online threats.

Read More

Alphabetizing Last Names in Word

Sorting lists of names by last name is easy if they are listed in a LAST, FIRST order. But what if the names are in FIRST LAST order? This tip explains features in Word that make this possible. Read more.

Read More

Disaster Recovery Plan – Do You Have One?

The world today is full of potential problems that can seriously put a dent (if not completely derail) your plans for success. Do you have a means to shield your business from all these dangers? Do you have a remedy when things take a turn for the worst? To put it straight – do you have a disaster recovery plan? As you know, businesses continually evolve and must react to changes in the market and environment in order to stay competitive. Products, services, systems, and processes must be adjusted to stay relevant – and guess what? Your disaster recovery plan should get the same treatment. If not, it’s as if you have no plan at all. Especially with the proliferation of constantly changing technology around us, you can’t rely on same the plan you put in place several years ago. Most likely your company’s environment has changed drastically since then, and the safeguards and processes put in place before won’t work today. Because of this, it’s critical to review and update your disaster contingency plan every now and then – especially when your business has gone through a drastic change. It’s also a good idea to test your plan to identify areas of weakness, or situations you might not have anticipated, then use what you learn from the test to further adjust your plan. Making a disaster recovery plan is more than just a “nice to have” item on your checklist of business needs. If you don’t yet have a plan, or if you suspect your plan is out of date, contact us as soon as possible. We’ll be happy to work with you to create a current plan that keeps your company’s assets protected in the event of an emergency.

Read More

Tools to Edit PDF Files Online for Free

Here are some free online tools that can help you modify PDF files. What’s even better is they don’t require downloads or installation. The only requirement is an Internet connection and browser. Read more .

Read More

Smartphone ‘Cases’, Anyone?

For little extra expense, by providing protective cases for your employees’ Smartphones you not only protect a $200 to $300 Smartphone, you may also save your business from a loss of thousands of dollars worth of data if they’re damaged. Many businesses all over the world issue Smartphones to their employees. While they can seem expensive for many small to medium-sized business owners, with the greater amount of work done at a faster pace, Smartphones are an ideal business solution. However, since Smartphones are lightweight and portable they are carried around everywhere, making them very prone to accidental drops. Despite the advances in technology, some Smartphones are more prone to damage than others. Touchscreens are generally more susceptible to damage because they usually don’t have an extra layer of plastic on their screens. And when these devices are damaged, not only do you incur the cost of repair or replacement, you also risk losing valuable data that’s stored in them. So, should you spend more to protect your employees’ Smartphones? Some people think it depends on your industry. According to Tim Doherty, research analyst for small to mid-sized business markets at research firm IDC, most blue-collar employees should be provided with protective cases for their Smartphones since their work environments are more likely to be physical in nature. Equipping these employees with cases like the OtterBox or rugged devices such as those being offered by Motorola is a good move. Meanwhile, according to Doherty, white-collar employees using Smartphones only have “a moderate risk of drop or damage” because they usually put their devices inside their bags or pockets. Still, providing these employees with “a basic rubberized case makes a lot of sense,” adds Doherty. He also adds that providing cases lessens “the company’s liability to replace damaged devices.” Some analysts think, however, that cases citing damaged Smartphones due to accidental drops have been exaggerated. Analyst and Partner Michael Gartenberg of Altimeter Group believes that cases can protect and personalize your Smartphone, but he does not agree that these cases are essential accessories. Gartenberg claims that, “Most phones are rugged enough to handle the usual bumps and abrasions of everyday life and most screens are quite scratch resistant.” He adds that normal maintenance will ensure that most Smartphones work well. In addition, Gartenberg believes that if users are aware that their Smartphones have additional protection, they may tend to be less careful when using their devices. Still, Tim Bajarin, President of Creative Strategies, a firm that provides industry analysis for the technology sector, believes that a Smartphone case “isn’t much of an investment . . . yet it can go a long way.” As Bajarin says, we should treat these cases as insurance. With just a little extra expense, you not only protect a $200 to $300 Smartphone, you may also save your business from a loss of thousands of dollars worth of data stored in a single device.

Read More

Increase Productivity with Electronic Signatures

Because workflow is much faster with the use of electronic signatures, processing times are reduced and sales people and consultants have more time to take care of other customers. This can significantly increase the company’s revenue. Signatures have been the most accepted means of authentication since ancient times. During the Roman Empire, a combination of seals and signatures were recognized as the primary source for document and legal contract authentication.  In the 1830s, electronic communications became legally recognized “electronic signatures” when the telegraph and Morse Code were invented. In 1976, Martin Hellman and Whitfield Diffie introduced public key cryptography, wherein cryptographic keys were first distributed over an unprotected public network. The first electronically signed document was an agreement between two nations – a Joint Communique signed by Ireland and the United States in 1998. What is an electronic signature or e-signature? There are different definitions for this term, but for the purpose of US law, the US Code defines it as “an electronic sound, symbol, or process, attached to or logically associated with a contract or other record and executed or adopted by a person with the intent to sign the record.” Why are businesses using electronic signatures? Electronic signatures help cut costs. Studies show that among US companies alone, 30 billion paper documents are copied or printed every year. The associated cost for each document is estimated to be $6.50. Five hundred documents are signed by the average authorized employee each year, which means that the total annual cost of using paper documents per employee is $3,250. Electronic signatures are good for the environment. The reduction of paper usage will not only cut down operational costs, but will also help save our environment. For every person who uses e signatures, the savings is equal to ¾ of a barrel of oil, ½ of a tree, or 150 pounds of carbon emissions per year. Electronic signatures help reduce fraud. When documents are signed electronically, the integrity of the content is guaranteed. E-signatures also enable real-time verification of the handwritten signature as opposed to a pre-defined biometric profile. Any manipulation within a document that involves an e-signature will automatically result in making the signature invalid. Electronic signatures help increase customer satisfaction. Turnaround times are accelerated with the use of electronic signatures because you don’t keep your customers waiting while you search for contracts or forms. Additionally, adding an electronic signature to a document is just like signing on paper. There is no need to change your customers’ habits, and they are assured that even with remote handling all their documents are secure. Electronic signatures give entrepreneurs more time to increase sales. Because workflow is much faster with the use of electronic signatures, processing times are reduced and sales people and consultants have more time to spend on getting new business. This can significantly increase the company’s revenue. E-Signatures and Mobile Devices Many business owners have come to realize the importance of using e-signatures in business. In fact, some businesses have even adapted this signing process for the smaller screens of mobile devices. If the transaction involves straightforward, simple sales contracts, a mobile e-signature is ideal. The customer sees and agrees to what exactly what is being purchased on the spot, and this allows salespeople to work more efficiently. For lengthy documents however, especially those that have several form fields that require considerable interaction with the client, a PC format is more suitable. How Legitimate are E-Signatures? As for the legitimacy of e-signatures, you need not worry. In 1999, the European Union passed the EU Directive for Electronic Signatures, and on the 30 th of June, 2000, US President Bill Clinton signed into law the Electronic Signatures in Global and National Commerce Act (ESIGN), which signified that all signed electronic contracts and documents are as legally binding as a paper-based contract.

Read More

Advanced IT Solution at a Small Business Price

Gone are the days when advanced IT solutions are meant for only large companies. With Managed Services, even small businesses can now afford to utilize the most innovative IT — and experience the same functionality and security that big corporations enjoy. Like a lot of small to medium-sized businesses these days, you perhaps have become greatly reliant on Information Technology (IT). You certainly want your own IT department to offer the functionality and security that huge organizations benefit from. But cost is most likely holding you back — the large amount of money needed to design, install and maintain such a setting is usually too expensive for smaller organizations. Fortunately, today you can have both the best IT and the most cost-efficient solution — because in Managed Services, they are one and the same. Managed Services is an IT model that provides IT management and security remotely. Utilizing the latest and most sophisticated technology, we can readily monitor and manage your network, determine possible issues, and solve them before they harm your business. These are the 2 major advantages: Superior IT – With Managed Services, you can accomplish the functionality and security that previously was only available to large companies. Inexpensive Price – Enjoy better IT without costing a fortune. Because of economies of scale, Managed Services enables you to create an infrastructure that delivers essential IT services to staff and clients without having to build or maintain these services internally. Contact us now to learn how our Managed Services can help improve your IT and save you money.

Read More