Information Technology News & Information

Tired of IT Companies Doing More Harm Than Good?

Follow These 3 Simple Tips to Find the Technology Partner You Deserve! You’ve heard the stories: a business owner finds an IT company, thinks they seem great, and decides to work with them, but after a couple months, they find their calls aren’t being returned, their data isn’t being properly backed up, or worse, they try to change companies only to find their servers held hostage – leaving them stuck with a terrible IT company and no way to get out. Fortunately, not all IT companies do more harm than good. There are a lot of great ones out there that’ll act as your technology partner – being responsive and working with integrity. Here are 3 simple tips to help you find the technology partner you deserve: Ask About Their Credentials and Qualifications The IT industry has only been around for less than 35 years, and there’s nothing keeping unqualified people from entering the industry. Ask about credentials and qualifications before signing up. You want to make sure they’re qualified to help you achieve your goals and objectives through technology, and often, this means they should have the proper degrees, experience, and certifications to demonstrate expertise. Don’t Hesitate to Stop By Their Office for a Visit Make sure you stop by their office for a visit to get to know their staff, find out how each staff member treats you, and ensure you feel comfortable with their level of client service. A lot of IT professionals tend to speak in ‘tech-terms.’ Does it seem like they’re talking down to you or speaking in terms you simply don’t understand? You don’t want an IT company that can’t explain things in terms you understand. If they don’t have client service skills, don’t sign an agreement! Look for Signs of Credibility Don’t be afraid to ask how many clients they have, what type/size clients they have, and if you can speak to some of their existing clients. Also ask if they have any memberships with organizations in the community, publications, or media recognition. These are all great signs of credibility! Do they demonstrate thought leadership in the industry? Are they doing anything to stay ahead of evolving technology trends? Always look for signs of credibility. When you’re working with a great technology partner, IT becomes a business enabler – helping you take your business where you want to be. Call {phone} or email us at: {email}. Discover why we’re the technology partner you’ve been waiting for!

Information Technology News & Information

Is Your Business Prepared for a PCI Compliance Audit?

Audits. The very word probably makes you shudder. No one likes it when the auditors come knocking at their door – you just know they’re going to ding you for something. But that only happens if you don’t take a moment to breathe and do a simple preparedness check ahead of time. Is your business prepared for a PCI compliance audit? If you accept credit cards, you must be compliant with the Payment Card Industry (PCI) data security standard. That extends not only to you and your employees, but to any other companies or individuals with access to your IT systems. If someone can access your data, they’re obligated to meet PCI compliance too. First of all, you need to retain an audit-trail history for a time period that fits with your use and legal regulations. That’s different from business to business – you need to find out how long you need to maintain your records! The main thing that affects what you’re required to do for an audit is your PCI level: Level 4 – Less than 20,000 transactions per year Level 3 – 20,000 to 1 million transactions per year Level 2 – 1 to 6 million transactions per year Level 1 – Over 6 million transactions per year Additionally, you need to be able to prove that you have the right IT security processes in place to maintain confidentiality and security for all your transactions. Are you using the right firewalls to protect your networks? Do you have encryption on any emails that might involve payment card information? Are all your systems properly secured against unauthorized access of data? These are vital questions you need to answer before the auditors come knocking. If it turns out you’re non-compliant, banks and credit card institutions can impose fines ranging up to $500,000! So how do you ensure you’re prepared for a PCI compliance audit? It’s simple: DO ONE YOURSELF. If you run your own audit before a mandated one comes along, you’ll discover any vulnerabilities or missteps while there’s still time to fix them. The team at {company} is here to help. We’re the experts in PCI compliance for {city} businesses. We provide a full PCI compliance service: A risk assessment to improve your data security. Advice for staff training on security awareness, so your employees have the information and skills they need to meet the latest PCI standards and regulations. Notifications about potential vulnerabilities ranked by order according to their seriousness. This way, you can address the most important first. Protect your customers, protect your employees, and protect your livelihood – Contact {company} at {phone} or {email} to ensure your {city} business is prepared for a PCI compliance audit.

Information Technology News & Information

Save Your Money and Work From Home: Why Accounting Firms Need to Look at Cloud Computing

May 18 is Accounting Day 2015, an event for financial professionals all across the world to share their secrets and help each other succeed. Are you ready to find out how to improve your business, save your money, and better serve your clients? {company} is proud to serve accountants and other financial services firms all across {city}, and that’s why we’re going to share the big IT secret that accountants should be taking advantage of to get ahead for 2015: Cloud computing. The cloud can seem like a buzzword these days, but with the right team on your side helping you take advantage of its power, it can make huge differences in your productivity and bottom line: Work anywhere, anytime: With data stored in the cloud, you’re not tied to the desk. Access QuickBooks or other applications, and all your data on any device, whether you’re in the office, visiting a client, or kicking back at the cottage. Protect data from disaster: Applications and files saved in the cloud are safe from anything that could damage or destroy in-office equipment. Even if a flood or fire destroys your office, you can keep working on any computer, and business won’t stop. Hire the right people, regardless of location: Cloud computing makes remote work and collaboration easy – you don’t need to be in the same office to share work! Pick and choose your team with care, regardless of where they call home. Connect with clients from around the world: And it’s easy to choose clients regardless of location too! They can upload financials to your cloud with the click of a button, so you can manage their books from the other side of the world! Save your money: You manage your clients’ money, but you need to be smart with your own too. Cloud computing makes it easy to turn IT from a capital expense to an operating expense, with predictable monthly fees for applications and storage, and easy scaling to your size and needs. On May 18, you’ll be able to learn all kinds of tips and tricks to make serving your clients easier than ever before, but none of them will do as much for you as cloud computing – so long as you have the right partner by your side making it easy. The team at {company} are your go-to experts in cloud computing solutions in {city} for accountancy and financial services firms. We’ll meet with you, learn about your business, and help you find the right cloud solutions for YOUR needs. Contact us at {phone} or {email} to schedule a complimentary consultation for Accounting Day 2015!

Information Technology News & Information

5 Tips You Need to Consider to Keep Your Data Secure While Traveling

Smartphones don’t just make doing business easier; they aim to impact, and improve, every part of our life. When you’re traveling, smartphones and laptops will certainly come in handy. Still, whether you’re traveling for work or personal reasons, you need to ensure your keeping your devices secure. Are you taking extra precautions to protect your data and information when you go on vacation? If not, you need to start following these tips. Lock Your Devices When They’re Inactive Mobile devices and laptops are lost every single day. In fact, around 100 smartphones are lost or stolen every minute in the US. Are you prepared to deal with the fallout of losing a device that holds sensitive business and personal data? Prevention is the best form of protection – make sure you lock your devices to keep all of your content and contacts private. Set your devices to auto-lock after the shortest delay you can. Pick a complex password or passcode. With your phone, think about enabling the “wipe device after 10 wrong guesses” option. If someone is continuously trying to break in, they’ll eventually be totally shut out. iDevices also offer Find My iPhone apps and Android offers Device Manager to track lost or stolen devices. Remember That Public Wi-Fi Isn’t Safe Public Wi-Fi is often a huge help – it keeps up connected when we’re away from home. Security bugs are common in Wi-Fi routers, though, and they infect any devices that are connected. A better alternative is using a prepaid SIM card when you travel and pay-as-you-go data. Many businesses also use VPNs to keep their data secure. Public Wi-Fi puts your business and personal info in jeopardy, so always use alternate methods when possible. Turn Off Location Apps like Facebook, Twitter and Instagram use geo-tagging which prompt your phone for a location. Even if your GPS is turned off, your phone will still figure out where you are by keeping track of Wi-Fi access points around you. Always consider leaving your phone in Airplane mode throughout a trip. Be Careful Using Public Computers When you’re using public devices, you never know what you’re getting. They may be infected with malware that will end up spying on your personal information. Hackers can also attach themselves to ATMs to steal financial information. Being cautious isn’t a bad thing, especially when you’re dealing with sensitive data. Layer Your Protection Don’t ignore prompts to update your computer and devices – new updates mean patched vulnerabilities and better protection. Remember that smartphones need security, too. Mobile solutions will keep you protected when you’re using your phone for work-on-the-go. Don’t let your guard down just because you’re on vacation. For more helpful IT security tips and tricks, contact {company} at {email} or by phone at {phone}.

Information Technology News & Information

The Demise of SEO

Google may not be panicking just yet, but it is clear change is coming to the way we find information on the internet. There are other search engines out there, but really, Google continues to rule when it comes to searching online. Besides, you know that you’ve made it to the top of your field when you become a verb and “I’m going to Google that” becomes part of the vernacular. As a business owner dependent on the internet to build and grow your business, you already know the importance of maintaining a Google-friendly website to ensure your SEO (Search Engine Optimization) efforts keep you at the top of the search rankings. But keep in mind, all things change over time, and if recent trends are a prediction of the future, then the way we use the internet is also going to change. SEO and Cynicism Efforts to improve SEO have long been associated with questionable tactics and finding ways to “game” the system to improve ranking have practically become a science. Google continues to change its search algorithms to punish those attempting to outright manipulate the search criteria, but the fact remains that Google receives a lot of money from firms paying to ensure they rank at the top of a search list. As consumers become more educated and understand how search results are now driven by the use of paid ads and paying for certain keywords, cynicism continues to grow. This cynicism is now bordering on mistrust and some consumers are actively turning to other ways to find information online. One area that has expanded greatly in the last few years is the use of mobile apps. Services like Uber, Airbnb, and – dare we say, Tinder – are but a few examples of how these niche sites are coming to the fore. If you have Uber on your smartphone, for instance, you do not need to search online for a cab and we will see even more segmentation like this in the future. The Power of Social Media Marketing types have always known about the power of the referral. This is especially true with service industries where a happy customer testimonial can be far more convincing than typical ad copy. What’s even more compelling is when that referral comes from a family or trusted friend. We are seeing this trend emerging within the main social media channels like Facebook and Twitter. Individuals now often turn to their social media contacts for information or advice on everything from a good restaurant or a movie to see on a Friday night and this is just another example of how reliance on generic web searches is on the decline. So what does this mean for SEO? Well, it may be a bit early to write off SEO altogether, but you definitely need to think about additional ways to engage your audience. Social media continues to expand its reach and you ignore the impact these channels will have on consumers at your own peril. Have questions?  Give us a call.  Not only are we your trusted IT partner, but we can handle all your business technology including making sure you have the right SEO team and partner.

Information Technology News & Information

What You Need To Look For When Hiring an Apple Consultant for Your Business

Macs were once thought of as nothing more than a niche tool for graphic designers and other creative professionals. Some thought they were simply too expensive, but the main thing holding Macs back is that there weren’t enough business-oriented applications available on them at the time.  For businesses that had to crunch numbers or pump out text documents or perform any other sort of left brain activity on a regular basis, PCs had the software they needed. Things have changed. Now there is more business software available on Macs (including Microsoft Office), allowing businesses in all fields to takes advantage of the benefits offered by switching to Macs: they are built better and last longer than PCs, they’re less vulnerable to viruses, and, perhaps the most convincing selling point, they offer a more intuitive user experience. All these benefits do come with considerable investment, especially when you consider that PCs cost a lot less. To get the most value out of investing in the best computers available, you’ll have to invest also in high-quality support to keep those investments up and running. You need a certified Apple consultant that knows the brand well and can fix problems fast whenever they pop up. Here are 3 tips that will help you weed out high-risk applicants and identify the best possible Apple consultant hire. Money-back guarantee You need to secure a written (don’t be naïve: a spoken word contract won’t do you any good in an actual dispute) agreement that guarantees if you’re not satisfied with the service, you can have your issues resolved at no extra cost for additional work hours. If they’re still not able to provide the level of service you were expecting, you deserve a full refund. The knowledge and skill set possessed by the prototypical Apple Consultant is valuable, but that doesn’t mean good candidates are impossible to find. It shouldn’t be difficult to find a consultant confident in their abilities and willing to guarantee satisfaction. Any candidate who hesitates to guarantee their services is likely to end up a disappointment if you make a leap of faith and hire them. Check their references One major red flag is a lack of references. A good applicant should have at least three quality references, preferably with one or more references from a business of a similar size and in a similar field as yours. Don’t take applicants at their word. A lot of potential hires look great on paper – it’s up to you to confirm that what is printed on their resume is more fact than fiction. Call each reference yourself to gauge how enthusiastic they are about the candidate, and also just to check and confirm that they exist in the first place. Remote capability You’ll want someone local who can come in quickly when on-site service is necessary, but it’s also important to have a consultant that can contribute remotely. Not all problems require an on-site fix. It saves you money and saves your consultant time when problems can be resolved remotely. Remote capability isn’t just about convenience. It also improves your level of service: a consultant who can fix network issues remotely is able to find a solution to downtime faster than a consultant that has to pick up everything and drive to your office before they can even start working on a solution. Sometimes a clear-cut stud of a candidate walks through the door and makes the hiring process easy. More often, you’ll have a group of similarly-qualified applicants and making the right hire is a real challenge. Contact {company} at {phone} or {email} if you need help finding the right expert to maintain your Macs.

Information Technology News & Information

Accounting Firms Can Benefit from Cloud Computing

To celebrate Accounting Day, here is a look at how moving to cloud-based computing could benefit your firm. May 18 Is Accounting Day.  Are Your IT Systems In Order? There is a good reason why cloud computing is on the rise. Firms moving to the cloud can realize significant savings on hardware acquisition and maintenance; economies of scale are enhanced as it costs less to add users than traditional IT infrastructure; and it is much easier to share data and enable remote access so users can work from anywhere. But what does the “cloud” really mean? To put it as straight-forward as possible, the cloud refers to services and software that you access via the internet instead of locally on your computer or your firm’s office server. Netflix, Yahoo Mail, and Dropbox are all examples of cloud services you likely already use, but there are also many advantages business can gain by ditching that collection of old servers in the closet of your office and making the move to the cloud. To help you understand these benefits, here is a look at some critical areas in which cloud-computing could help your accounting firm. Data Security By the nature of your work, you have access to highly-sensitive data and you have a legal and ethical obligation to protect that data. It is understandable that you may have trepidation about moving your data from a physical server on your site, to some location “in the sky”. Therefore, you should work with an IT vendor that is partnered with a data center that has undergone a formal security audit. Formerly known as a SAS 70 report, an AICPA Service Organization Controls Report ensures that the data center storing your data has been vetted and approved by the American Institute of Certified Public Accountants. Email Given the volume of emails and the need to store email trails required of all accounting firms, a cloud based email system can be a tremendous advantage over an in-house system. Microsoft Hosted Exchange and Google Apps Premium Edition are the two best-known examples of cloud-based email systems that provide excellent security and full back-up capabilities at a significant savings over a typical in-house system. File Storage Because all your files are stored online, it is not necessary to obtain expensive data servers on site. Nor is it necessary to purchase software to supplement the servers or employ extra IT staff to maintain everything. Backing Up Your Data and Disaster Recovery For accounting firms that keep data onsite, the cost and effort of backing up all that data can be overwhelming. Typically, backup is done via tape and requires either dedicated resources within the firm, or the services of an outside agency to ensure the proper schedule is followed. Data retrieval can also be time-consuming and requires expertise to manage. Cloud computing vendors externally manage the backup process and provide compete data security through a “self-healing” infrastructure. This consists of a system whereby redundant backup centers are employed so that if for any reason the primary center is not available, the backup becomes the primary data source. This ensures data is secure and always protected. Attempting to replicate this process through an off-site data center connected to your onsite servers is very costly. Remote Access and Sharing of Data The ability to access data from any location and to easily share data across geographical locations is a primary benefit of adopting cloud solutions. Because your data files are not stored in a single, physical location, your information can be accessed anywhere you have an internet connection. This also makes it much more efficient to share files between offices. Have questions about how the right IT can help your Accounting firm?  Call {phone} or drop us an email at {email}.  Call today.

Information Technology News & Information

WordPress Flaw Leaves Sites Open to Attack

WordPress scrambles to release security fix for vulnerability   WordPress issued an emergency fix to the major 4.2 version of its widely-used blogging software released just last week. The hurriedly launched version 4.2.1 was in response to a zero-day flaw that put tens of millions of WordPress sites at risk. Jouko Pynnonen, a researcher with a Finnish IT company, discovered that by using a malicious JavaScript, a would-be hacker could attack a targeted site. The vulnerability could potentially impact all sites running version 4.2 or earlier of the WordPress platform. According to Pynnonen, the issue lies with how WordPress handles input into the comments section of a blog post. The flaw enables hackers to run JavaScript stored in the comments section that could then allow the hacker to assume administrator privileges. Pynnonen first blogged about this vulnerability on April 26th just three days after the release of version 2.4. He described the defect as a stored Cross Site Scripting (XSS) vulnerability. To understand how this flaw can be used, a hacker simply needs to post some basic JavaScript code in the comments field and include sufficient text to exceed more than 64K of data. Once the comment is processed by the site administrator, the code will be executed. “If triggered by a logged-in administrator, under default settings, the attacker can leverage the vulnerability to execute arbitrary code on the server via a plugin and theme editors,” said Pynnonen in a recent blog post. In a statement released Wednesday, WordPress stated, “This is a critical security release for all previous versions and we strongly encourage you to update your sites immediately.” Have questions about your website security?  Contact us immediately at {phone} or drop us an email at {email}.

Information Technology News & Information

Forgotten Your Shortcut Keys? 

Thanks to Karen Turner from Turner Efficiency for sharing these shortcut tips with us. Reducing keystrokes with shortcut keys will save seconds that add up to minutes. Computer Control Ctrl Esc = shows the start menu Ctrl Alt Delete = interrupts the process Ctrl Shift = French keyboard F5 = refreshes the screen Typing Ctrl B = bold Ctrl I = italic Ctrl U = underline Deleting Delete = recoverable Shift Delete = totally gone Editing Ctrl C = copy Ctrl X = cut Ctrl V = paste Ctrl P = print Of course, there are more. Got a favorite? Please share.

Information Technology News & Information

1 Million New Threats Emerge Every Day: How Is Your Malware Protection?

Cyberattacks are getting sneakier and more creative, and businesses are struggling to stay one step ahead. Last year was huge for high-profile cybercrime; from major corporate attacks to the Heartbleed bug, to Sony’s public information leaks. Are you ready to combat malware? An analysis by Symantec showed that in 2014 attackers were working faster than companies were able to defend themselves. Plus, the attacks they were launching were more malicious and damaging than ever before. More than 317 million new pieces of malware were created just last year; that’s nearly one million new threats every day. How Are They Getting In? Hackers are relying on old computer bugs that companies haven’t got around to fixing yet. In about 90% of cases, hackers used computer bugs that have existed since at least 2002. One popular glitch is in how an IT manager remotely managed corporate PCs – it’s been around since 1999. Due to either lack of time or expertise, many companies just aren’t patching these vulnerabilities. Think of how quickly these viruses spread – when a hacker releases a wave of malware-filled spam emails, it takes just 82 seconds for someone to become the first victim. Now, there are a number of new ways criminals are spreading and using malware. In particular your business needs to pay attention to these. Digital Extortion: Blackmailing is becoming bigger and bigger – ransomware attacks surged 113% last year. Hackers steal documents, files, or photos from a victim’s computer and then demand a monetary ransom in order to decrypt or return the files. Sophisticated Attacks: Attackers are getting more complex and selective than ever. For example, hackers will hide malware inside software updates and wait for the user to install them. Basically, they’re making companies infect their own systems. Social Media: Scams run through social media are on the rise. You do the work yourself, sharing videos or stories that have been infected or lead to scam websites. You need to look out for links or stories that don’t seem right and always think before you click. To talk with a knowledgeable and reliable IT team in {city} that will talk to you about malware protection and other essential business security, contact {company} at {email} or by phone at {phone}.