Latest Post

Blog

How is BYOD a security risk?

Bring your own device (BYOD) strategy is when an employee uses their personal mobile device to work with your company from anywhere. This strategy can bring about many advantages to your business such as increased efficiency and convenience. However, this can also bring a number of security risks for your IT infrastructure and data. If you’re thinking of incorporating BYOD in your office, consider some of the risks involved before making a decision.

Data leakage

The biggest reason why businesses are weary of implementing a BYOD strategy is because it can potentially leave the company’s system vulnerable to data breaches. Personal devices are not part of your business’s IT infrastructure, which means that these devices are not protected by company firewalls and systems. There is also a chance that an employee will take work with them, where they are not using the same encrypted servers that your company is using, leaving your system vulnerable to inherent security risks.

Lost devices

Another risk your company has to deal with, is the possibility of your employees losing their personal devices. When devices with sensitive business information are lost, there is a chance that this could end up falling into the wrong hands. Additionally, if an employee forgets to use a four digit PIN code to lock their smartphone or tablet, anyone can gain unauthorized access to valuable company data stored on that particular device. Therefore, your company should consider countermeasures for lost devices like completely wiping the device of information as soon as an employee reports a missing or stolen phone.

Hackers can infiltrate your system

Personal devices tend to lack adequate data encryption to keep people from snooping. This along with the fact that your employees might not have updated their devices can allow hackers to infiltrate your IT infrastructure.

Connecting to open Wifi spots makes your company more susceptible to hackers. Open wireless points in public places can put device owners at risk because there is a chance that hackers may have created that hotspot to trick people into connecting. Once the device owner has connected, attackers can simply surveil web activity and gain access to your company’s accounts.

Vulnerable to malware

Viruses are also a big problem when implementing BYOD strategies into your business. Using personal devices means your employees can access whatever sites or download any mobile apps that your business would normally restrict to protect your system.

Jailbreaking or rooting a device also puts your systems at risk because it removes limitations imposed by the manufacturer to keep the mobile software updated and protected against external threats. It’s best to understand that as your employees have the freedom to choose whatever device they want to work with, the process of keeping track of vulnerabilities and updates is considerably harder. So if you’re thinking about implementing BYOD strategies to your business, prepare your IT department for an array of potential malware attacks on different devices.

So you might be thinking that it would probably be best to just avoid implementing a BYOD strategy in the first place. However, BYOD will help your business grow and adapt to the modern workplace, and should not be dismissed as a legitimate IT solution. It’s just important to educate your company about these risks so that problems won’t occur for your business down the line.

If you need some help implementing IT security solutions for your company, or if you have any concerns regarding IT, give us a call.

Published with permission from TechAdvisory.org. Source.

Connectors: the new Office 365 update

At work, we depend on several apps to be more productive around the office. However, with so many of them open in our web browsers, it can be a drag to constantly click in and out of tabs just to get the information we need. Fortunately, Office 365 Connectors for Groups allows you to stay on top of all the third party services your company is using. So how, exactly, do these connectors make your life easier? Here are a few things you need to know about the new Office 365 feature.

What can it do?

Office 365 Connectors enable users to access third party apps and services within their Outlook groups, rather than having to scour through dozens of windows to access a specific application. This new feature allows you to keep your company’s discussion in one place, and enables your employees to stay up-to-date regardless of the service used to broadcast an event. For example, your team members can be informed about a particular hashtag that your company is following on Twitter without having to explicitly open the page. Groups aren’t limited to one particular service either. With connectors you can use Twitter, Trello, Mailchimp, Bing, UserVoice and over 50 other services.

Small organizations can also take advantage of connectors. Office 365 lets you develop your own connectors by embedding the Connect to Office 365 button on your site. This allows users to connect to your service and get updates on your company, as they would with other third party services. Basically, with connectors, your Office 365 client becomes a hub for third party that keeps your company in sync to get more work done.

Connector card

Connector cards offer a user friendly way to interact with external applications. If a particular connector is added to a group, connector cards are generated within the group’s activity feed. While most cards will display events in plain text, some applications like Twitter and Trello provide formatted actions to interact with the card. Trello, for example, allows you to Assign or Comment on an event card.

Who can create a connector?

Office 365 group members can configure and use an array of connectors. Once you configure a connector for a specific group, that app will be also be available for other members. However, the person who added a connector to the group is the only one capable of modifying that app.

How do you access Office 365 Connectors?

With its public release, any Office 365 Mail user can use Office 365 Connectors for Groups. Simply navigate to a Group from your Outlook page and click on the Connectors tab at the top of the page. From here, you can connect the available third party services on offer to any of your Outlook groups. You can even configure the settings of your apps without ever having to leave Office 365. However you should probably only consider pulling in the applications that you think your group will be using the most.

As your business grows, you’re going to need more services to be more productive in the workplace. By aggregating them all in one place, you save time shifting around dozens of apps to find the information that you need. So the next time you create an Office 365 Group, help your team members work more efficiently by setting up some connectors.

If you’re interested in learning about the latest Office 365 updates, contact us today.

Published with permission from TechAdvisory.org. Source.

A crash course on the Blue Screen of Death

Everything seems fine at first, your PC is running normally but then a blue screen suddenly greets you. After restarting your computer you find that a lot of your unsaved work is gone. If this has happened to you before, rest assured, you’re not alone. What you’ve just encountered is the Blue Screen of Death (BSoD) and it appears when there is an issue with either your hardware or software. Fortunately, there are ways to troubleshoot these problems. Here are some of the common causes of a critical failure error and how you can fix them.

Find out what caused your BSoD

The next time you get the blue screen, don’t panic. This is just an alert to prevent further system damage to your computer and to indicate the cause of crash. The most important part of the blue screen is the error name which displays messages like “Driver_IRQL_not_less_or_equal”. For Windows 8 to 10 users, this information is usually displayed at the bottom of the screen. For troubleshooting advice, a memory dump containing details of your latest crash can be found in Event Viewer > System > Windows Logs and click any messages indicating an error. Under the General tab you will see a full report of your latest crash — this should be given to an IT technician so they can help you further.

Fixing the problem:

Update your drivers

Crashes are generally caused by problems with hardware or the driver software that is allowing that specific hardware to run. If you’re getting frequent blue screens, try to recall any recent changes you have made to your computer. Have you recently installed a new driver for an external device? You can also check if any drivers are conflicting by going to Control Panel > Device Manager. If you see a warning icon on any of the devices, there is something wrong with the device. Chances are, specific drivers are either outdated or weren’t properly installed.

To update, simply search online for your specific computer manufacturer and install the drivers provided in their list. Remember to only install the drivers that apply to the specific model of your device and your operating system. For example, if your operating system is Windows 8, only download Windows 8 related items for your specific model.

Other hardware problems

BSoD can also indicate hardware problems. Running very intensive programs that your CPU can’t handle will cause your computer to overheat and eventually crash. If you use a laptop, try to keep it on flat surfaces and away from fabric material as this could block the fan vents and cause your laptop to overheat.

Your RAM could also be faulty. Check if it’s attached to your CPU properly or go to Windows memory diagnostics to find out if you’re straining your RAM.

System restore

Using system restore will allow you to undo any significant software changes that are crashing your PC. To restore your computer to a previous time, go to Control Panel > System and Security > Backup and Restore then click on Recover System Settings for your Computer. From here you can select a restore point to a date where you think your computer was not experiencing frequent crashes.

Check for viruses

Some types of malware can cause instabilities in your operating system causing your PC to crash. If you are aware that your computer is infected with a virus, try running antivirus software. However, make sure you’re not running two antivirus software at the same time while you’re doing this. Both programs can conflict with each other and, in some cases, cause system crashes.

Clean reboot

This option is your last resort if none of the solutions above work. For Windows 8 or 10 users simply go to Settings > Update and Security > Recovery then select Reset this PC. If your computer is still getting frequent blue screens then it would be best to go to an IT consultant and have them look over your hardware.

The Blue Screen of Death is one of the biggest problems your company’s hardware is going to face. Consider using any of the above solutions to fix your blue screen and hopefully everything will be back to normal. If you would like to know more about any general hardware advice, or if you have any concerns regarding your IT, contact us today.

Published with permission from TechAdvisory.org. Source.

Technology ROI 101

Your technology needs to produce a return on investment. If it doesn’t, you’re wasting you and your staff’s time and money. But how can you ensure you gain that coveted ROI you’re after? What does it actually mean to have a positive ROI? And how can you tell if you have one? Here are a few tips for calculating the true costs of a new technology investment.

ROI basics

What does it mean to have a positive return on investment? It’s pretty simple. A positive ROI means the results a technology produces are greater than or equal to the amount of time and money invested. Obviously you want a positive ROI, but when is the right time to consider it? Should it be before or after you make a technology purchase? The answer is both. Before purchasing, you want to carefully consider whether a technology service or product is worth your money. Then months after you’ve implemented it, you should analyze whether or not you made a good investment. Doing this enables you to learn from your mistakes (if you made one) and make a wiser technology purchase next time.

Also, don’t forget to look at your technology currently in use. Ask yourself, is your technology simply keeping the lights on? Or is it providing a solid foundation for your business to grow? If the answer is the former, there are likely better options out there worth trying.

How to calculate ROI

When calculating ROI, it doesn’t have to be perfect. Here is a simple formula to get you started.

ROI = net gain/cost
Example: You spend $100 and make $150. Your net gain is $50
ROI = 50/100 = 50%

If you’ve yet to purchase a service or new equipment, you obviously don’t know how much profit it will generate. So you’ll have to do a bit of guesswork and estimation. It’s also important to consider some intangibles. Think about the productivity costs of staff time, disruption, and frustration (because most of us don’t work effectively when frustrated). Let’s take staff time for example. How much time will your staff save if you implement a Managed Services solution? With your employees no longer having to put out IT fires daily, what if your entire staff saves 50 hours a week because of it? How much does that add up to in saved salary expense? It’s important here not just to think about the savings in time, but also what your staff could be doing with those extra 50 hours. They could put those hours towards marketing or growing your business. And that alone could make up for the costs of the technology investment itself.

Intangibles don’t just apply to saving time, frustration and disruptions, but also the costs of implementing the new technology. For example, how much time will be required to train your staff on the new technology? What’s the cost of that? Also, how much time will it take to migrate from your old system to the new one? You should consider all of these when estimating your ROI.

Lastly, don’t forget to consider the unique circumstance of subscription purchases. Since you are usually paying these on a monthly basis, it can be a bit tricky to add up real costs. That’s why it’s important to use a timeline for these. For example, if you subscribe to software as a service, what’s the cost of that plan over the course of one year or five? How much money will you save over that time span?

What’s the benefit?

Besides the staffing example mentioned above, consider how a technology investment can create new revenue streams. For example, an investment in VoIP opens up an opportunity to offer video consulting to clients in parts of the country (or even world) that would normally be out of reach. This obviously leads to a new revenue stream and increased profits. So ask yourself, can the technology you’re considering create new revenue streams?

Next steps

Before making a technology purchase, it’s wise to talk with both management and end users about your decision. If you fail to consult your end users before implementation, they may disagree with your decision and therefore take longer to adapt or even rebel against it. Checking with them beforehand gives them a chance to offer valuable feedback on how it will be used in the trenches, and will get them onboard with the technology if you implement it. As for your management team, they can be a valuable resource to bounce ideas off of and gain insights about the technology you may have overlooked.

Lastly, ROI does not need to be calculated for every purchase. If you need to buy something small, like a new keyboard, just go and buy it. Save your ROI calculations for much larger investments that can have a dramatic impact on your business.

If you need help determining the ROI of a potential technology investment, feel free to give us a call for a chat. Our experts can help you determine the true benefits of a given technology and help you make a wise investment.

Published with permission from TechAdvisory.org. Source.

Cyber threats and the finance sector

The financial services industry has long been a heavily targeted sector by cyber criminals. The number of attacks that involved extortion, social-engineering and credential-stealing malware surged in 2015. This means that these institutions should strive to familiarize themselves with the threats and the agents behind them. Here are 7 new threats and tactics, techniques and procedures (TTP’s) that security professionals should know about.

Extortion

The cyber criminal Armada Collective gained notoriety for being the first to utilize distributed denial-of-service (DDoS) attacks. This occurs when multiple systems flood a targeted system to temporarily or completely disrupt service. They evolved the idea further and started to extort Bitcoins from victims who were initially notified of their vulnerability. If they didn’t comply with the ransom demands of the criminals, they would flood their systems until the victim’s network would shut down completely.

Social media attacks

This involved criminals using fake profiles to gather information for social engineering purposes. Fortunately, both Facebook and Twitter began to proactively monitoring for suspicious activity and started notifying users if they had been targeted by the end of 2015. However, you should still have your guard up when someone you don’t know, or even a friend or colleague, starts asking you suspicious questions.

Spear phishing

Phishers thrive off familiarity. They send out emails that seem to come from a business or someone that you know asking for credit card/bank account numbers. In 2015, phishers went to the next level and began whaling. This normally involved spoofing executives’ emails (often CEO’s) to dupe the finance departments to transfer large sums of money to fraudulent accounts.

Point-of-sale malware

POS malware is written to steal customer payment (especially credit card) data from retail checkout systems. They are a type of memory scraper that operates by instantly detecting unencrypted type 2 credit card data and is then sent to the attacker’s computer to be sold on underground sites.

ATM malware

GreenDispenser is an ATM-specific malware that infects ATM’s and allows criminals to extract large sums of money while avoiding detection. Recently reverse ATM attacks have also emerged, this is when compromised POS terminals and money mules to reverse transactions after money being withdrawn or sent to another bank account.

Credential theft

Dridex, a well known credential-stealing software, is a multifunctional malware package that leverages obfuscated macros in Microsoft Office and extensible markup language files to infect systems. The goal is to infect computers, steal credentials, and obtain money from victims’ bank accounts. It operates primarily as a banking Trojan where it is generally distributed through phishing email messages.

Other sophisticated threats

Various TTP’s can be combined to extracted data on a bigger scale. Targeting multiple geographies and sectors at once, this method normally involves an organized crime syndicate or someone with a highly sophisticated setup. For example, the group Carbanak primarily targeted financial institutions by infiltrating internal networks and installing software that would drain ATM’s of cash.

The creation of defensive measures requires extensive knowledge of the lurking threats and our team of experts is up-to-date on the latest security information. If you have any questions, feel free to contact us to find out more about TTP’s and other weapons in the hacker’s toolbox.

Published with permission from TechAdvisory.org. Source.

How to get the most out of Office 365

While many Office 365 users know the service can boost their company’s productivity, many aren’t utilizing it to its full potential. There are several key principles and tips that can make the service even more productive. So to help you get the most out of Office 365, here are some tips to follow.

Get all staff onboard

To maximize your company’s productivity on Office 365, every employee that uses a computer needs to utilize it. While this may sound easier said than done, you can encourage company-wide use by getting the leaders of your company to use it first. When your executives, managers and top employees are all using and promoting Office 365, it sets a good example that will help persuade all employees to fall in line.

Train employees

If your employees don’t know how to use Office 365, you will see little gains in productivity, and the cloud service becomes a wasted investment. This is why training is absolutely vital. Teach your staff all the ins and outs of the platform, so they can take full advantage of it.

One way to efficiently train your staff is to create or gather a series of short training videos, only a few minute in length. Shorter videos are easy to digest for your employees and help them retain the info. Best of all, they can be reviewed again and again, and used for all employees. This saves time for management, who is often responsible for employee training.

Utilize core tools

When you first implemented Office 365, what sold you on it? Likely it was the fact that it increases staff productivity by allowing them to work and collaborate from anywhere. So if you’re not yet utilizing the tools that enables them to do that, there’s no better time than now to get started.

Some of the core tools that enable you and your staff to become more productive and work from anywhere are OneDrive for Business (OD4B), SharePoint and Skype for Business. OD4B and SharePoint enable your staff to upload and save documents to a virtual drive, share that document with another group or user, and then edit it at the same time. This gives you and your employees the ability to access that document from anywhere, and essentially work from anywhere. Skype for Business also enhances productivity by creating a more flexible communication channel. Employees, colleagues and customers, can communicate easily wherever they may be in the world. From online meetings, to conference calls, video calls and instant messaging, you have a wealth of options for instant communication.

Don’t forget security

Not only can a security breach cost you money, but it can also destroy your employees productivity. While Office 365 already has security built in with Azure Active Directory, you should still be cautious of what files you add and share on the service. If you do upload files with sensitive company information to the platform, it’s wise to keep them under you or your executives direct control.

These four productivity tips should help your business make the most out of Office 365. If you’d like more ideas on how to better utilize the platform, make it more secure or need additional training, give us a call. We are happy to share our expertise for your maximum gain.

Published with permission from TechAdvisory.org. Source.

Tips on Windows 10 privacy protection

Long gone are the days where private information (like vault combinations and the name of your high school crush) are kept confined within a padlocked journal. Speculation has been circulating that Windows 10 gathers more info than it should. Whether or not you think privacy lines have been breached, here are some tips to protect your privacy in a matter of clicks.

Say goodbye to ad tracking

Every time you log on to surf the net, you are leaving a trail of breadcrumbs that lead directly to your online profile. This problem is easily solved by deactivating ad tracking. With Windows 10, however, it goes a tad further by using an advertising ID. They not only gather information based on web browsing but also when you use Windows 10 apps.

If you find this bothersome, launch the Settings app, go to General, and look for “Change privacy options”. You then move the slider from on to off, but if you want to make absolutely sure you have no virtual stalkers, head to choice.microsoft.com/en-us/opt-out and disable the “Personalized ads whenever I use my Microsoft account” tab.

Slip off the grid

Thanks to location tracking, nearby restaurants and future weather predictions are at your fingertips. While some might not mind this feature, there are others who wish to enjoy some privacy from their smartphones every once in awhile. To do so, launch the Settings app, then Privacy, and disable the Location tab.

But if you wish to share your location with certain apps, scroll down and activate the ‘Choose apps that can use your location’ tab, and choose your desired apps. Also, regularly clearing your location history doesn’t hurt either.

Cortana, why so clingy?

Albeit a very helpful digital assistant, Cortana requires access to your personal information. Turning it off completely just stops some of her data-collection, since whatever data she already knows, is stored in the cloud. So to break up for good, log into your Microsoft account and then clear all the information Cortana and other Microsoft services (ex. Bing maps) have gathered.

Other measures include clearing the information in your interests section or heading over to the “interest manager” tab and edit which interests you wish Cortana to track.

Disable Wi-Fi Sense?

This feature is designed to let you easily share Wi-Fi connections, but some have misunderstood it to be an opportunity to log onto your network and be naughty. Wi-Fi Sense allows you to share your network’s bandwidth with specific people while ensuring they can’t access your entire network. Vice versa, it lets you connect to Wi-Fi networks your friends share with you.

If it still worries you, launch the Setting app, go to Network & Internet > Wi-Fi > and click on Wi-Fi Sense. From there, deactivate two bars: “Connect to suggested open hotspots” and “Connect to networks shared my contacts”.

Prioritize privacy

All of the aforementioned tips should take about five to ten minutes to implement, but if you’d like to take it one step further, launch the Settings app, go to Privacy, and look on the left-hand side. Here, you will find various settings that allow you to make very detailed adjustments to your privacy. Enjoy!

We hope you find these five privacy protection tips helpful. If you need more help protecting your information or securing your network, give us a call.

Published with permission from TechAdvisory.org. Source.

How to be more productive in life and work

Between your customers, vendors, employees and other moving parts of your organization, it can be difficult to find the time to focus on your business. On a daily basis, you likely have to deal with dozens of tasks, and oftentimes don’t finish them all. So how can you fix this? How can you be more productive, complete your to-do-list and get out of the office on time? There are a couple of key productivity principles and technology solutions that can help.

Have a single focus

When Bill Gates and Warren Buffet were asked what the single most important reason for their success in life was, both answered with a single word: focus. It is that important. When you work on one task for an extended period of time, the quality of your work is at its highest. What’s more, you’ll also finish that task in a shorter amount of time than if you had to stop and start it repeatedly due to distractions.

This principle of focus can be applied to many areas of business and life. Whether you’re writing a report, sharing time with your family, or simply reading a book for your own pleasure, the quality of that experience improves with the more uninterrupted time you dedicate to it. Now, when it comes to IT and technology, this same principle can have a tremendous impact on your business. Not only do technology distractions – such as constantly breaking computers, security breaches, and slow servers – hurt your productivity, but they also crush your spirits. How can you focus on growing your business like this? This is where an MSP comes in. They can help eliminate all IT interruptions so you get back to doing what you do best – running your business. What’s not to love about that?

Obey Parkinson’s law

If you ever pulled an all-nighter as a university student, you may be familiar with Parkinson’s law. The principle states that the time it takes to complete a task expands or shrinks depending on the time allotted for it. For example, when you were hitting the books in high school or college, you may have noticed that a few students (and maybe you were one of them) would put off an important paper or project to the last moment and still end up getting an A. While at the same time, other students would take weeks to complete the same project or paper and only manage a B. So how did this happen? This peculiar phenomenon is the magic of Parkinson’s law at work. When you have less time to work on a project, you focus only on the important aspects of it. Oftentimes this is all you need to do a good job.

So whether it’s a company meeting or the amount of time you put towards researching your next vacation, apply Parkinson’s law to increase everyone’s focus and ensure you’re not wasting valuable time on the task. As for your IT, give your in-house staff a reasonable, yet specific amount of time, to complete a task. This will ensure they finish the job in a timely manner, and then move on to other projects. Alternatively, you can simply outsource all of your IT to an MSP for a single, flat monthly fee, and never have to worry about it to begin with.

Use technology to become superhuman

As human beings, technology enables us to become more than we could have ever dreamed of. Apps like Evernote can enable us to remember every valuable piece of information we encounter. Cloud technology can bring a remote workforce scattered around the country together so they can work on the same project simultaneously. VoIP gives you the ability to video-chat with business partners, loved ones, and friends while they’re as far off as Bangkok or Baghdad. Technology is reshaping not only the business world, but also the life of every individual on the planet. So when it comes to your own business, is your company going to take advantage?

We hope that these productivity tips will help improve your life in and outside of the office. If you’d like to know more about how IT can transform your business, to make it more efficient and profitable, give us a call today.

Published with permission from TechAdvisory.org. Source.

How to use LinkedIn to create business value

LinkedIn is a highly useful site, but many small businesses simply don’t make the most of it. The problem is that most of the information out there, that SMBs try to model, is focused on tips and strategies for larger organizations. And these strategies are simply not as effective when applied to the SMB. So what can the small or medium-sized business do to actually gain value from their LinkedIn efforts? Here are few tips to get you started.

Know LinkedIn’s purpose

Simply put, LinkedIn is not a content marketing platform. Yes, people do publish articles and posts, but if you have a small budget and are short on time, you will get more bang for your buck on social media networks that are more content marketing friendly. For example, Pinterest, Instagram, Facebook and Twitter are all far better options in this scenario. Many users are on these platforms to view content in one form or another. On LinkedIn, content can undoubtedly be viewed, but people are primarily there to make connections. Of course that doesn’t mean you shouldn’t post an occasional article on LinkedIn. It just means don’t make it the main source of your content marketing efforts.

Another way businesses misconceive LinkedIn is in terms of lead generation. Basically, you shouldn’t expect your LinkedIn page to generate a large amount of leads. As an SMB, your marketing budget is limited, so you’ll be better off using your advertising budget to drive leads to your actual website or even a Facebook business page. Your LinkedIn business page should be used instead to validate your experience, credentials, and professionalism. With that said, make sure your page is polished and updated with all this information.

Double down on business trips

We all know that LinkedIn is a great platform to connect with business colleagues. If you’re active on the platform, you likely have hundreds of connections. So when you make that next business trip, why not tap your network to book additional meetings in the city you’re traveling to? Ask yourself, which of your connections could help you extend your sales in that region or benefit your business in some other way? You don’t have to stick to business colleagues you know personally. You can create valuable new relationships by tapping your current LinkedIn network. To do this, search first and second degree connections using the geographic search option, and filter your results to job titles, industry, and company size of your ideal prospect. Once you’ve found potential contacts, see if you can get an introduction from one of your first connections, or simply InMail them and reach out yourself.

Your page is about your business—not you

A very common small business mistake on LinkedIn is making your company page about you, not your business. You may mistakenly create this page like your personal profile, listing accolades and job experience. What you should really be focusing on, however, is something much bigger: the story of your business or brand. A story will help engage your prospects, creating an impression in their minds, and also give you an opportunity to touch on the value your business provides to customers. Your profile should also include some of the top brands your business has helped. If one of your clients is Target, The Gap, Whole Foods or another big name, make sure to mention it, as it proves your credibility as a business or service provider.

Find talented hires

While big companies have the budget and time to post job openings on LinkedIn, as an SMB, there’s a good chance you’re lacking both. Fortunately, there’s an alternative way to find top talent on LinkedIn. Simply search for them yourself.

Before you get started, you need to know exactly what kind of hire you’re looking for. Think about people you already know who would be perfect for the job. While you may not have the ability or budget to hire them, look them up on LinkedIn and see their career path. What kind of roles did this person previously have? What kind of experience did he or she have before their current position? With this information in hand, now you can search for people who are in or have held similar positions, and will likely share qualities of your ideal candidate. Once you have a pool of potential applicants, reach out to them through InMail or a shared connection to see if they’re interested in your job.

Ask for help, and be helpful

Like all social media platforms, if you don’t engage with your connections, you’ll see little value generated from your time using it. However, with LinkedIn, the type of engagement you participate in can be extremely valuable for your business. All it requires is for you to ask for help or feedback. For example, if you have several logo designs for a new product and are unsure of which is best, share some of them with your network to get feedback. If you’re curious about a new productivity tool and wonder if it’s worth investing in, ask your network if anyone’s used it before. Oftentimes in the business world, people are happy to help you if you just speak up. However, don’t forget to return the favor. If you become the person who seems to only be taking advice without giving any in return, it can have a negative effect on your reputation.

If you’d like more ideas on how social media or technology can create value for your business, don’t hesitate to get in touch. Our IT solutions can help you overcome challenges, and create an even more valuable business.

Published with permission from TechAdvisory.org. Source.

How to make the most of Microsoft Word

Over the years, Microsoft Word has become the best word processor for businesses big and small. From creating documents such as company reports, forms, statements, and receipts to producing promotional materials, Word is able to accomplish all of these and much more. But its sheer number of features mean there are hidden functionalities unknown to many users. Here, we uncover some of the most useful tricks that will help you get the most from Word.

Combine text from multiple locations

We’re all familiar with the copy and paste function on PCs. The problem is, you can only copy one thing at a time, which makes it hard to combine pieces of text from various sources. And even if you manage to do so, the whole single copy and paste process can be long-winded and downright time-consuming.

Word has feature called “spike”, which allows you to cut pieces of text from documents and pages and paste them all in one go! To use it, simply highlight the text you want to copy and press Ctrl+F3. Repeat this and when you’re satisfied with what you have, you can paste everything on another document by pressing Ctrl+Shift+F3.

Format images

You probably already know that it’s possible to copy and paste, or drag and drop, images onto a Word document. But the image will place itself on a line of its own, pushing text above or below it. You can drag the image all day long to position it in a way you want, only to find that it’s not working properly. There’s a much better alternative. Simply right click on the image and select one of the layouts under Layout Options. You can position the image in line, behind or in front of text, and crop the image to remove unwanted areas.

AutoRecover feature

Microsoft Word can restore and recover unsaved documents when a crash occurs, but you can add another level of protection and peace of mind by enabling the AutoRecover feature. Navigate to File → Options → Save, and check the box that enables AutoRecover. This feature will automatically save your documents at regular intervals that you specify, minimizing the risks of losing important documents in an event where your computer crashes, reboots itself, or experiences any issues that shut Word down before you can hit the save button.

Use text boxes for layouts

Many people use Word only for reading and typing text. But did you know that you can play around with text boxes to make your documents more readable? By inserting text boxes and images, you can create rough mockups of ideas and projects, whether it’s website design or product catalogues. Adding text boxes is easy – just choose the Insert tab, click on Text Box and choose from many available styles and formats. You can customize text boxes with colors, frames and size.

Show hidden characters

If you’re a regular Word user, chances are you’ve come across that moment when something just feels a little off, whether it’s an extra space, out of place paragraph or weird bullet points. If you can’t understand why your document is behaving unexpectedly, you can get to the root of the problem by clicking on the paragraph symbol under the Paragraphs tab to make all the hidden marks (spaces, paragraphs, tabs) visible. This makes it easy to remove any characters that’s causing the error.

These tips may seem small, but they will make a big difference in helping you work more effectively towards your goals. Want to learn more Word tricks and tips? Get in touch with our professionals today and we’ll help you save time and increase productivity.

Published with permission from TechAdvisory.org. Source.