Directive Blogs
Having strong passwords for your online accounts is very important, but sometimes you may want a little more protection in the event your password gets stolen or someone forces their way through it. If you use Google's Gmail service, you can set up your account, then you will need two forms of authentication to get into your email.
Do you work in an office and sit in front of a desk all day? Chances are, you have experienced back pain or tight shoulders. Maybe you get headaches from staring at the computer all day. Well today we will discuss some tips on how to reduce the negative effects that office work can have on your body. Working these tips into your day can have a dramatic effect on your mental and physical health and you will feel all the better for it.
Think back a few years ago before the Apple ipad (if you are in the medical field, there is a good chance you'll relate to this). Remember back when "tablet" computers were essentially laptops sans-keyboard with little plastic styluses? Now kindergarteners are using tablets instead of chalk boards. What happened?
Today, your employees are more and more technologically empowered. With the consumer electronics market teaming with amazing gadgets and high-end devices, cool tech is no longer reserved for fancy geek toys. With employees bringing in their own smartphones and tablets, mobile security becomes a big concern for small businesses.
Small business owners and Entrepreneurs wear many hats. They have certain strengths and a drive to make money using the skills that they have. But there are many facets to running a business. Someone needs to do the accounting, the networking, inventory, manage employees, do sales calls and more. Then, someone needs to manage the technology.
The consumer electronics market is inundated with countless mobile devices with flashy interfaces, sleek profiles, and names that are more ridiculous than most car makes. Understandably, it's hard to keep up and when picking out a smartphone for yourself or your business, the demos at the store don't give you much of an insight. Here's an extensive cheat sheet on what to look for when making a new smartphone purchase.
Technology is changing quickly and businesses are seeing a wide variety of options replacing traditional IT methodology that is driving change and productivity to businesses of all sizes. It's getting easier to take work with you with mobile devices and hosted services, but are these just expensive new toys or do they provide serious benefits to businesses?
There comes a time when you are looking at a new laptop and you are asked the question: Do you want a Solid State Drive, or a traditional Hard Disk Drive? Well here is a quick run-down of both technologies in the hopes of shedding some light on the issue. By the time you are done reading this article, you will be better able to answer that question.
Microsoft Office and Windows 7 provide many keyboard shortcuts that can improve your ability to multitask and get things accomplished quickly. Most of these shortcuts will work in previous versions, like Windows XP, Vista and the Microsoft Server Operating Systems as well. Give them a try, and the next time your tech comes by, be sure to show off your new skills.
Computer viruses are pretty serious threats, and can cause huge expensive issues for businesses. Many cases of malware and computer viruses actually use your computer to commit real crimes. The FBI states that hundreds of thousands of people will likely lose the ability to surf the web if they have a particular piece of malware.
Techies get pretty excited over neat new gadgets and integrating them into day-to-day life, so when we heard about Sony's new SmartWatch, it caught our attention. Will smart watches become the next thing in the not-so-distant future or will they become flops like New Coke and Betamax?
Nobody likes thinking or talking about this (except maybe if you are in the insurance business), but businesses are fragile entities. Enough hardship and loss will greatly weaken the foundation that keeps the business running smoothly. What if your business suffered from a fire, devastating flood, or even a misfortunate bolt of lightning that destroys your server? Would you be able to pick up the pieces and start over?
Global Payments, a credit card processing firm, announced that as many as 1.5 million credit card numbers were stolen due to a security breach last month. Issues like this seem more and more common place in the news and it is important to know what to do if you suspect that your credit card has been hacked.
We've seen a pattern over the years as Microsoft releases operating systems where every other operating system is great, while the releases in between are somewhat lacking. Windows 98 was pretty solid, as was XP, however the middle-child Windows ME? Not so much. This kind of progression is usually reserved for Star Trek films. What does this mean for Windows 8, the successor of the great Windows 7?
Most digital cameras produce very high resolution images, which is fantastic for printing, but higher quality image files means larger file sizes, and these days images aren't quite as portable as they used to be. Fortunately, Outlook has a great feature to reduce the size of image attachments for you.
Over the past couple years we've seen a huge shift in the reliability and functionality of the tablet PC. What was once was a struggling market of just a few overpriced, bulky, devices that were neither practical nor stylish has become the next big consumer product. Tablets have been making it into the business world, supplementing smartphones as a new addition to mobile arsenals. We're going to highlight the best two tablets on the market that you can buy right now.
There's a lot of buzz around Windows 8 for technology lovers, and for good reason. Microsoft is making it's next operating system dramatically different than previous incantations, and it sounds like we'll be seeing a lot of this OS in the future on a lot of different platforms, ranging from desktops and notebooks to tablets, and possibly even more.
We've been blogging a bit about ways to prepare for laptop theft and what to do if a company laptop is actually stolen. Laptop and mobile device theft is a widespread issue for businesses and can lead to data theft which can be extremely costly; much more than the mere price of the hardware. This issue is all too familiar with NASA, which admits that thousands of mobile device theft incidents have occurred over the past few years.
To most people, computer viruses are things that cause annoyance, downtime, and cost money to fix. That's pretty bad on it's own, but some viruses are much more complex than others and can be far more dangerous. Let's look at Stuxnet, coined as the first weapon made entirely out of code, and why it is so frightening.
Business owners, this one is definitely for you. You've probably experienced the fact that shaving expenses here and there can lead to more flexibility and long-term savings, but at what cost? Are you limiting your company by nixing those extra services and costs? Sometimes you can get more and still save money. Let's look at a few ways Upstate New York businesses can do just that.
The problem with carrying around an expensive, portable piece of equipment is that it's possible for someone to pick it up and run with it. According to LoJack, a security firm that focuses on stolen property, two million laptops are stolen each year. What should you do if you are a victim of laptop theft?
Unfortunately cell phone service providers are discovering that smartphone users love their bandwidth. With the majority of carriers dropping unlimited data plans, when a user goes over their limit massive charges can apply. Let's cover a few tips to limit the amount of bandwidth you use on your smartphone.
Google has gradually become a major part in our lives. Most of us use it every day to find answers, research products, and determine what Upstate New York restaurants are open on a Sunday night. Google is on our phones, we watch videos on YouTube, and we get from point A to point B with Google maps. So what does Google know about us?
Whether you are going completely paperless or just want to send digital copies of paper documents, there are a lot of solutions out there for quickly scanning a doc and converting it to PDF for easy archiving and emailing, but most of these devices aren't exactly portable. Here's a quick way to digitize documents with the camera on your Android smartphone.
There has been a growing trend where businesses are allowing more employees to work from home or other remote locations. Technology makes this possibly by letting users remote into their work environment securely as if they were sitting at their desk at the office. VoIP phone solutions can even bring the worker's office phone to them, no matter where they are.
Twitter is a fantastic networking resource for professionals, brands, and businesses. Having a strong presence on Twitter can mean more traffic to your website and an easy way to get in touch with customers and prospects. The hardest thing about diving into social media is knowing what to say. Here's a quick list with a few ideas to get you started.
Internet privacy is no new issue. Between malicious hackers trying to breach private information, governments trying to regulate it, and organizations trying to track as many metrics as they can, the Internet continues to chug along for the most part just fine. Are YOU concerned about Internet privacy?
Last time we went over how to dress up your PowerPoint presentations with SmartArt, a feature in many Microsoft Office applications. Today we're going to be showing you how to create charts to display various types of data in PowerPoint, but like before, these will work much the same in other Office products such as Microsoft Word.
Nobody wants to spend more than they have to, especially when it comes to those necessary evils like bills, utilities, insurance, and the general costs of keeping things running smoothly. At Directive, our goal is to provide outstanding enterprise-level solutions for small business prices. Let's talk about a few ways to cut long term IT costs.
This has been a pretty common topic for us on the Directive blog. We've seen a lot of Upstate New York clients and customers suffer the consequences when online retailers and other account providers experience a security breach. It is equally vital for consumers to know what to do in the event of a security breach as it is the company that is actually breached.
This month Google announced that their search results will now contain personal results from friends and connections made in Google+. Twitter, the real-time searchable social network, publicly announced that they thought this was not a good idea. Will personalizing search results make for a better Google experience or will it hurt? Let's take a look.
CES, a massive consumer electronics tradeshow, always presents some neat new gadgets and doodads to ogle over, and this year was no exception. One of the biggest hits at the event this year was Samsung's Transparent Smart Window. Describing it doesn't do it justice, hit the jump to see a video of it in action!
Hard drives have been getting bigger (capacity-wise) and cheaper over the past decade which is great news for everyone. Toshiba predicts that in 2012 that over 2 zettabytes (2 trillion gigabytes!) of data will be created and replicated (double from 2010). While costs are going down, data growth is still a challenge for data centers and IT administrators.
On the topic of identity theft, social media accounts are becoming a high target for hackers, especially for spreading malicious viruses. To some, losing control over their Facebook or Twitter accounts could be just as devastating as having their credit card stolen. Trouble is, for many users, having one login account stolen means hackers have access to their other accounts too.
When you mention the term 'disaster recovery,' most people think about the big ground-shattering events like earthquakes, fires, floods, tropical storms, etc. While these natural events are certainly disasters and devastating in their own right, smaller things can constitute as a disaster for your business, and they aren't seasonal.
Your identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let's talk about a few of these statistics and what it means.
Busy business owners don't always have time to be technically savvy. Sure, you can pick things up pretty quickly, but when it comes down to the latest technology, you simply don't have the time to sit down and do the research. Walking down any electronics aisle you are likely to be bombarded by choices. Remember when it used to be simple? (Wait, it was never simple!) Let's classify some of the modern devices out there for mobility geared towards someone just like you.
Computer viruses and malware have been around for a long time, and cybercriminals have always tried to package their malevolent doings under a veil of deception. One method that has been in place for a while now is called scareware. Often disguised as something that appears to want to help your computer, scareware will scam users into paying for a service that isn't beneficial.
Granted, growing up we were made to believe that by now we'd have flying cars and robot butlers, but technologically speaking we're in a pretty great era of gadgets and conveniences that aren't just giving us cool toys to play with, but are changing the way we communicate, learn, and work. Let's look at what's in store for the world in 2012.
Last time we spoke about creating your contact list in Excel when performing a mail merge. Of course, you can also use your Outlook contacts, and if you are running any sort of CRM software it is pretty likely it exports its own spreadsheet that can be used in a mail merge. Let's go over how to perform a mail merge now that you have your list.
Want to send out a large number of documents that are almost the same aside from a few specific areas? One example would be a letter to all of your existing clients about a new product or service, but you want each letter to address the recipient's name and company. This looks like a job for the mail merge!
Let's get theoretical here. Let's say your friend Hank suffers from chest pain. It could be nothing, but chest pain isn't something you want to mess around with, so you suggest that Hank goes to a doctor to get it checked out. There are certain things in life you don't just let happen without getting an assessment to make sure they don't turn into bigger issues, right? Your business's IT security is one of those things.
You've probably seen these funny barcode-like symbols popping up and wondered if they mean anything. These days they are all over the place - on websites, in magazines, and even in television ads. What are these mysterious glyphs? Should we be concerned? And of course the question on all of our minds, how can I use them to market my business?
When computer equipment overheats it increases the chances of a crash. Heat (or inadequate heat removal) can even cause long term damage on expensive hardware. You may have noticed that your server room/network closet is a little warmer than the rest of your business. All computer equipment produces heat, and servers are known to pump out a lot of it. Let's talk about ways to keep your important technology cool to prevent crashes and other issues.
When computer equipment overheats it increases the chances of a crash. Heat (or inadequate heat removal) can even cause long term damage on expensive hardware. You may have noticed that your server room/network closet is a little warmer than the rest of your business. All computer equipment produces heat, and servers are known to pump out a lot of it. Let's talk about ways to keep your important technology cool to prevent crashes and other issues.
Server virtualization offers a ton of benefits for small businesses - less energy consumption, easier management, better hardware utilization, smaller footprints... but diving in recklessly can cause a lot of expensive headaches. Let's take a look at a few things to consider when switching over to a virtual solution.
Recently we mentioned Evernote as a great note taking app that is supported across multiple operating systems and mobile devices. We compared it to Microsoft OneNote as a lighter alternative that is easy to set up and sync across a plethora of devices. However, diehard fans of OneNote probably don't want to make a switch to a whole other platform. Today we're going to talk about ways to mobilize your OneNote notebooks as well as some other features that are exclusive to OneNote that you might not know about.
It's always important to be prepared for emergencies, and for a small business these days even a minor disaster can have long term ramifications with serious consequences. Whether the disaster is short lived, like a power outage or hardware failure in your server, or a more serious event like a flood or fire, you want to be able to get back in business as quickly as possible Here are some steps Upstate New York businesses should take to prepare and add to their disaster plans.
Are you the kind of person who takes meticulous notes? Do you carry around a pen and pad with you so you never forget a single line item from meetings, presentations, or your grocery list? Enter Evernote, a free application that gives you an easy-to-use note taking solution that syncs your notes across multiple devices.
Take a look, a good hard look, at your employees. They are working diligently, right? You've staffed the company with some quality A-players and everyone has taken responsibility for their work. You see good communication, organization, and dare we say motivation emanating from each member of your well-armed team. Or maybe you don't and the company is working on improving that - we understand. We also understand that while an employee might be a rockstar at their job, they could still pose a risk to IT.