Blog

May 14th, 2015

WindowsNews&Tips_May14_AWindows 8 was a disappointment. The user interface was too complex for general users and many critics were not impressed with Windows 8’s features. And so Microsoft plans to leave the Windows 8 blunder behind and move on to Windows 10. Numerous changes have been made and new features added to Microsoft’s new flagship operating system. Here are the top features that Microsoft hopes will be enough to regain its reputation and clients’ confidence.

Microsoft Edge

Windows 10 comes with a new Internet browser called Microsoft Edge. Formerly named Project Spartan until around three months ago, Edge is officially a replacement for the aging Internet Explorer. Edge allows you to add notes, while accessing web pages, for future reference. It also comes with a new reading mode that removes all the other distracting elements of a web page and leaves you with just the text. This allows for a good reading experience, not to mention faster loading time.

Cortana

Cortana is Microsoft’s personal assistant and the rival to Apple’s Siri. When Cortana first arrived in preview versions of Windows 10, there were several bugs and compatibility issues. But Microsoft has been working hard to address these. Just like on Windows Phone devices, you can interact with Cortana using either text or natural voice queries. Cortana can perform many basic tricks and tasks, such as taking notes, scheduling meetings, setting alarms, calling people on Skype, and playing music. She can also scour your computer, OneDrive account, and even your business network to find files based on your input.

Continuum

Windows 10’s Continuum feature is designed to make the OS work seamlessly on hybrid desktop and tablet devices. Users are able to switch between touch and desktop modes, depending on the device they’re using. When you unplug your keyboard and mouse, a small popup will appear asking whether Windows should switch to tablet mode. Once tablet mode is enabled, all the windows on the desktop will immediately go to full screen. On the other hand, if you plug in a keyboard and mouse, Windows 10 will launch another pop-up asking whether you wish to return to desktop mode. Another impressive feature of Continuum is the ability to connect your Windows Phone with a PC, essentially turning your smartphone into a pocket-friendly desktop.

Start Menu

The absence of the the Start menu in Windows 8 caused dissatisfaction among most Windows OS fanatics. Microsoft won’t make the same mistake twice. And so the Start menu will be returning to Windows 10 at the front and left of the home screen. When opened, the menu splits into two columns - one the traditional list of programs, the other app-style icons. A universal search function has been added to the Start menu, making for easier file browsing.

Windows 10 is made first and foremost for desktop users, whereas its predecessor Windows 8 was aimed at mobile and touchscreen devices. Microsoft has hinted that Windows 10 will be launching in late July 2015, available in 190 countries and 111 languages.

If you’re looking to incorporate Windows OS into your business, contact us today and see how we can help.

Published with permission from TechAdvisory.org. Source.

May 13th, 2015

164_Security_AWhile many IT providers often tout the revolutionary benefits of the cloud, very few address the security aspect of it. But the fact of the matter is that when you’re using a cloud service, you’re moving information out of your hands and into those of a third party. So doesn’t it make sense to take precautions? Dropbox alone has previously had the accounts of nearly seven million users hacked. That being said, it’s wise to take precautions and ask the right questions of a cloud computing provider. That’s why we’ve compiled a list of actions you can take to ensure security when you're in the cloud.

The cloud is playing more and more of a significant role in business. Yet, as more companies jump on the bandwagon, very few of them seem to be taking cloud security seriously. According to a recent survey, the "Security of Cloud Computing Users Study" , only 50 percent of those surveyed had investigated the security of the cloud services they used.

To ensure you put in place proper security measures when beginning your cloud venture, here are five actions every small business owner should take.

Ask your IT provider what cloud security policies they have in place - this is probably the single most important security measure you can take. Find a trusted IT provider and have a candid conversation with them about their cloud security policies.

Ask where the location of the physical cloud servers are - when you have “the conversation”, don’t forget to ask about this. Believe it or not, some cloud servers may not even be stored in your own country. Wherever they are, it’s wise to make sure they’re located in a safe data center area with proper security afforded to them.

Create unique usernames and passwords - your login credentials represent one of the cloud’s main security vulnerabilities. Take the time to come up with a better password than “12345” or “football.”

Use industry standard encryption and authentication protocols - IPsec (Internet Protocol Security) is a reliable technology choice.

Encrypt data before it’s uploaded to the cloud - whether you do it yourself or your cloud computing provider does it for you, this is a must to ensure security.

When it comes to trusting the security of a cloud service provider, transparency is key. The provider should take security seriously, be able to explain their security policies clearly, and be willing to answer any questions. If they can’t do one of these, it’s a clear sign of a red flag.

Are you ready to talk cloud security and transition your business into the cloud? Call us today. We’re happy to answer all your questions.

Published with permission from TechAdvisory.org. Source.

Topic Security
May 11th, 2015

SocialMedia_May11_AIt has surely been a long time coming, and now it is official - the days of advertising-free conversations on Facebook Messenger are numbered. The social networking giant has confirmed that its private messaging service, a recent addition to its suite as a standalone app, is to become supported by advertising. While the move is unlikely to prove popular with ordinary users, it marks an interesting development for social media observers and presents new marketing opportunities to businesses. Here’s what you need to know.

As well as Facebook Messenger, which the company has definitively announced will feature advertisements, it looks likely that WhatsApp will also become ad-supported. Facebook acquired WhatsApp in February 2014 for $22 billion, despite the company only generating 2013 revenues of $10.2 million and overall making a net annual loss of $138.1 million. At the time, Mark Zuckerberg indicated that the company would not seek to monetize either service until they had reached a billion users, while WhatsApp founder and CEO said that the plan remained for the app to focus for several years on growth rather than monetization.

The latest announcements appear to signal a change in those tactics. While there has so far been no concrete decision on the form that advertising in either app would take, the intention appears to be for Facebook Messenger to test the water, with WhatsApp following its lead once a successful formula has been found. Executives have suggested that they wish to explore alternatives to conventional banner ads. They have also reinforced the message that the two apps, which seek to serve different purposes and audiences, will remain independent of one another.

The sheer number of users now communicating on the WhatsApp and Facebook Messenger platforms each month is testament to the value that Facebook could drive from placing advertisements on the services. Unlike its main site, which serves advertisements, the Facebook Messenger app currently makes no profit. Until now, WhatsApp’s only revenue stream has been the nominal $0.99 annual subscription fee it collects from users after a year’s free trial - and the service remains completely free in developing countries outside of Europe and North America. But for businesses, too, the potential of advertising on Facebook Messenger and WhatsApp provides exciting new marketing opportunities and the chance to interact more closely with both potential and existing customers.

Learn more about using Facebook and other networks - both for advertising and wider social media marketing - to grow your business; give us a call today.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
May 6th, 2015

Productivity_May6_AIt’s late afternoon - you’re working on your desktop computer, providing live support to one of your clients. Suddenly your screen goes black and your Internet connection drops. Too bad your IT department announces that it will take several hours to restore power. Sometimes disturbances like sudden power outages can impair your business reputation and productivity. Consider applying the following tips to keep your productivity humming during power blackouts.

Install a UPS for each computer

A UPS (uninterrupted power supply), is an alternative, emergency power source. During a power outage, your computer will turn itself off automatically as there's no power. UPS prevents that by running your computer off its own battery. If you’re working on a file when a power blackout occurs, UPS is especially helpful. It can only buy your computer a few minutes of time at most, but that’s enough time to save vital files and power down. If you still need Internet access, try another method we’ve listed below.

Find a Wi-Fi connection

The advancements in technology made it possible for you to take your work outside the office. You can resume your business activities and Internet connectivity by using the mobile data plan from your smartphone or tablets, and then access your files via cloud storage and file sharing applications. If you don’t have a data plan, then head to the nearest Wi-Fi-friendly place to continue your work, such as a coffee shop. VoIP software installed on your portable devices can help you to connect to your clients efficiently.

Make good use of your batteries

Now is not the time to browse social media or play games. When you take your work offline, it’s best to preserve your devices’ batteries by doing only important tasks and turning off power-sucking applications. Buy an extra charging device to extend your battery life, if necessary.

Finish offline tasks

When no Internet connection is available, you can take the time to clear off any neglected offline duties, whether it’s clearing up desks or arranging files and documents. You can even gather a team to brainstorm new ideas for projects, or discuss any ongoing issues within your organization.

Work from home

If a power outage renders your employees helpless in their duties, then sending them home with a business laptop won’t hurt, if they’re able to continue their work from there. There are many ways to keep them accountable without being intrusive and, as long as they are making progress in their jobs and are able maintain their professional integrity, there’s not much to complain about. Make sure telecommuting is only allowed when necessary though - working alongside colleagues and sharing ideas face-to-face is still one of the best ways to induce productivity.

Achieving power-free productivity is possible when you have a plan prepared for the situation. For more productivity tips to boost your business’s bottom line, give us a call today.

Published with permission from TechAdvisory.org. Source.

Topic Productivity
May 5th, 2015

164_BizV_AFor many businesses, social media is the the wild frontier of marketing. More and more companies are jumping on the bandwagon but it can seem a lawless place. This is why many newcomers tend to waffle around with no clear strategy and call it quits if they're not making fast progress. But while it's true that social media can seem challenging when you’re first getting started, it pays dividends if you're willing to put in a little time and effort. This is why we’ve put together some practical tips that will help you measure your social media ROI more easily.

Why it’s difficult to track social media ROI

The reason many business owners find it difficult to track social media ROI is because they don’t understand the purpose of the platforms from the perspective of traditional marketing. It's all too easy to expect immediate payoffs and profits, not to mention increased business. But while social media itself moves and changes fast, businesses should remember it still takes time to increase brand recognition, build relationships and enhance a company's reputation, whatever the platform. It is brand recognition that produces more sales in the long run. So don't lose heart if you are not making progress in the first couple of months. If you play the longer game, you'll enjoy more success.

So how do you measure ROI?

It comes down to tracking everything you can, including:
  • Online purchases
  • Online contact forms
  • Video views
  • E-book Downloads
  • Social interactions (this includes Facebook likes, Twitter follows and more)

To track these, you can use any or all of the three methods below.

Tagging Urls

Tagging a URL is basically adding a “tag” or more characters/words to the end of the original URL. Below are two examples of a normal URL and tagged URL:

Normal URL: www.AllstarIT.com/harddrive.html.

Tagged version of the same URL: www.AllstartIT.com/harddrive.htm?utmcampaign=BannerAdharddriveAd&utm_small=BannerAd

Adding this tag allows you to easily track which of your social media campaigns are producing the desired results. Without doing this, you run the risk of of all your social media visitors being recognized as organic, rather than ones that have come from a specific campaign or strategy you’re implementing. An excellent tool to build your unique URL is Google’s URL builder.

Google Analytics

This is the most obvious strategy for tracking your social media campaigns, and Google has long been the market leader in tracking the success of online marketing. A Google Analytics account can be set up in a matter of minutes, and then makes it easy to track your campaigns. Go to Acquisition and then check All Referrals. Here you’ll see where people are discovering your site - be it a Google organic search or social media network.

Call Tracking

Call tracking is often used to track the ROI from Facebook ad campaigns, though it can also be used on other social media platforms. This tactic allows you to measure how many phone calls you are getting from your customers on social media sites.

To do this you list a different phone number on a particular social media page than on your business website. For example, if the number listed on your business website is 763-984-6577, you instead list 763-984-6555 for the social media page you’re tracking. By seeing how many people call the number listed on the social media page, you’ll gain a better understanding of how effective that particular page or ad is. If it’s effective, you’ll know to use whatever methods are working from this page or ad in your other social media efforts.

Want more ideas on how to measure social media ROI or to get more value out of your IT investments? Get in touch today.

Published with permission from TechAdvisory.org. Source.

May 4th, 2015

BusinessContinuity_May4_AIn today’s business world, companies with a business continuity plan (BCP) are more likely to survive a disaster than those that don’t have one. There are several components to consider when it comes to planning a BCP, some of which are more important than others and must be included in order for a BCP to be successful. If you’re looking to create a BCP, or already have one in place but aren’t convinced of its efficiency, check out these must-read principles.

Backup strategies are tested regularly

Most businesses nowadays, if not all, employ technological tools to assist in managing their everyday business operations. As a result, a massive amount of data is stored on their on-site servers. Should a disaster strike, all valuable information would be damaged or lost. Backup plans are advisable, of course, but even these are useless without regular check-ups and testing. You’ll want to verify that your backups include all of your company’s strategic data, and that they are fully functional in the event of a disaster.

All employees are involved

Your employees are the essence of your business. They help drive your business forward, and therefore each and every one of them needs to understand the essentials of your business continuity plan. Schedule a meeting with each department, outlining everyone’s role in the plan, then revise the plan again with the whole company. Make sure everyone has a part to play in order to avoid having some employees feeling left out. Be sure to also let your employees know that they are your most valuable assets, and that you’re willing to help them in any way you can during a disaster, whether it’s encouraging them to prepare an emergency plan for their families or allowing them to work remotely from home if necessary.

Identify and prioritize critical functions

What are your company’s greatest strengths? A good business continuity plan exposes your most important business functions. All inventories and resources related to those functions must be accurate and created in advance. But sometimes, determining truly critical functions can be a real challenge - and incorrect assumptions can cripple the whole BCP, so this needs to be addressed in the early stages of planning. Once you’ve identified your critical business functions, you’ll be able to continue your business operations smoothly, even if not quite normally, during a disaster.

Succession plans exist for key employees

This is one of the most often overlooked aspects in a business continuity plan. Key employees are the life and soul of a BCP, usually having the knowledge and expertise that precede the plans on paper. Are you able to execute the plan if your key employee is missing? Do a simple test without your key members. Put an alternative candidate in charge of the situation and forbid the key employee from participating and giving direct instructions. Assign alternates for each part of a BCP, and ask them to perform disaster recovery functions in place of key employees. Having two people to count on is always better than one!

Having a BCP is one thing, but having one that actually works well is something you should strive to achieve. If you’re planning to implement a business continuity plan in your company, contact us today and we can help.

Published with permission from TechAdvisory.org. Source.

May 4th, 2015

Wolf Consulting, Inc. has been named to Penton Technology’s annual MSPmentor 200 North America Edition for 2015, a distinguished list and report identifying North America’s top 200 managed service providers (MSPs). MSP’s are firms that provide a variety of computer networking and Information Technology consulting services and proactive support services to keep the computer networks of their client organizations running smoothly.

“It is an honor to have been selected for this award and to be recognized in the MSPmentor Top 200.” said Lloyd Wolf, President of Wolf Consulting, Inc. “It validates our team members, our processes, our network management tools, our proactive approach and the effort we have put in to provide the highest level of network management, service and support for our clients – so they get the best results from their Information Technology.”

The MSPmentor 200 North America Edition is based on data from MSPmentor’s national and global surveys. The MSPmentor 200 North America Edition recognizes top managed service providers based on a broad range of criteria and performance metrics. “We want to congratulate Wolf Consulting Inc. and look forward to covering their growth and service delivery strategies in the year ahead,” said Marcia Parker, Executive Director, Penton Technology Group.

Wolf Consulting, Inc. is one of only seven Pennsylvania-based companies to achieve this nationwide honor, and the only firm that is locally owned and operated in the Greater Pittsburgh Area to be named to the list for four years in a row. All of the honorees on the MSPmentor 500 Global Edition list and the MSPmentor 200 North America Edition list can be found by visiting http://www.mspmentor.net/top501.

MSPmentor, produced by Penton Technology, is the ultimate guide to managed services. MSPmentor features the industry’s top-ranked blog, research, webcasts and videos. It is the number one online media destination for managed service providers in the world.

About Wolf Consulting, Inc.
Wolf Consulting, Inc. provides computer networking, custom software development, and IT consulting services to small & mid-size businesses in the Greater Pittsburgh area. The firm has been in business for 25 years, and is headquartered in Murrysville, PA. For more information, visit www.WolfConsulting.com.

About Penton Technology Group
Penton drives performance for more than 16 million professionals each and every day. They rely on us to deliver: Insights, information & workflow tools to inform critical business decisions; networking & community to engage them with industry peers & partners; and data & marketing services to advance their business performance & deliver ROI. For additional information on the company and its businesses, visit www.penton.com.

May 2nd, 2015

We wanted to know “What makes Wolf Consulting different?” so we decided to go straight to the source and ask our clients why they chose us. One common theme that came up in their responses was trust. Our clients see us as a trusted business partner because of reliability, proactive approach, caring, experience, knowledge, technology and tools, value and results. To view some client testimonials, please visit our Testimonials page. Here’s what one of our clients had to say:

Over the years, our organization used a series of different internal IT people responsible for the support and management of our computer systems and Information Technology. We, as well as our IT infrastructure underwent many changes, void of any true strategic plan. We simply were not getting the full value from our Information Technology investment – to help us meet our goals or serve our membership well.

Since we outsourced our computer support to Wolf Consulting, Inc. in early 2014, we have got much better results. The first onboarding day was very impressive, with many members of their team coming onsite to meet our staff, introduce themselves and to get to know our organization and our systems. They quickly analyzed our specific needs and developed a real plan. Shortly thereafter, they implemented new technology which met those needs, and which was more secure and more stable than we experienced in the past. Since then, they have continued to provide excellent proactive service and support to keep things running well. Thanks to outsourcing our computer support to Wolf Consulting, we are now able to focus on our core business, knowing their team is making sure our network continues to run well, is safe and secure, and will grow with our organization.

Stephanie G.
Director
Nonprofit Professional Membership Association

Topic Articles
April 29th, 2015

Security_Apr29_AData breaches occur every day, even to the most secured firms and well-known financial institutions - and it could happen to your company as well. How can you be sure that your network is completely protected from hackers? As a business owner you can’t afford to face a data breach, since it could cost you the two things that matter most to your company - clients and reputation. But employing even the most basic security measures can discourage many hackers enough for them to abandon their malicious attempts. Here are some tips to safeguard your corporate data.

Get rid of passwords

We are all accustomed to setting passwords to our online accounts, and the tip is always the same - set strong passwords, and change them regularly. But according to Verizon, a global communications and technology leader, a quarter of data breaches analyzed in this year’s report could’ve been stopped if the victimized company had applied more than a password in its defenses. The problem is that passwords can be used with any computer, which is why companies like Facebook and Google have replaced passwords with USB tokens. Tokens, when plugged into a company’s computer, act as a verification device and an extra layer of security.

Encrypt all data

Encryption is a great obstruction to hackers, since it scrambles and descrambles data each time someone tries to read it. Encryption also causes compatibility issues if the data is not being accessed via the company’s own network systems. While applying encryption can be costly, it is certainly well worth the money if it can protect your business data from leaking into the wrong hands.

Keep systems up-to-date

The technology world is moving at a fast pace. Hackers are always upgrading their tools to take advantage of outdated security systems, and so companies should do likewise to protect their valuable resources. Yet many companies who use software don’t install updates immediately. If the update intends to close security loopholes, delaying an update exposes you to external attacks. So install software updates as soon as they come out in order to give hackers no reason to penetrate your systems.

Back up frequently

Although you’ve implemented several security layers to your data, sometimes hackers can find their way in. This is why you need to back up data frequently, whether it’s on-site, off-site or by way of cloud backups. In the worst-case scenario if your systems do get infiltrated, you can restore lost data from those backups and quickly strengthen security.

Monitor connectivity

Many businesses have no idea how many computers they have, so it’s very hard to keep track of which computers are online. Sometimes a company’s computers and servers are online when they don’t need to be, making them a tempting target for attackers. With that in mind, it’s advisable to configure business servers properly, ensuring that only necessary machines are online and that they’re well-protected.

It’s much more expensive to fix a data breach than to prevent one. If you’re looking to check your business IT systems for potential threats, contact us today and we can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
April 27th, 2015

164_Soc_AIn today’s Internet loving culture, social media is becoming a necessary function for growing your business. And rightly so, because it’s a great way to expand your outreach, find new customers and share valuable information about your business or industry. But there are certainly some social media no-nos that need to be avoided. Along with that, there are also actions that will give you a strategic advantage and boost your reputation. So when it comes to Facebook, LinkedIn and Twitter, here’s how to network like a pro.

Facebook

Many people think of Facebook as a useful platform to keep in touch with family, friends and colleagues. However, in a business sense, it can be used to exchange ideas and opinions, promote your brand, and interact with customers.

A proven strategy to grow a more engaged network here is to share informative, valuable articles that will benefit your followers. Additionally, posting photos that emphasize your unique selling proposition and mission is a strategic way to personalize your brand.

There are, however, a few no-nos when it comes to Facebook. With Facebook being predominantly a place to connect with family and friends, it’s easy to fall into the trap of posting whatever comes to mind. So when you’re wondering whether or not you should post a particular comment or image, ask yourself, “Would I be okay publishing this on the front page of a newspaper?” If the answer is no, it’s best to hold off on hitting the post button. Finally, if you’re using the platform in a business sense, avoid sharing pictures of your dinner, newborn baby or anything too personal. Your customers are likely to be confused or turned off.

LinkedIn

The social network that is most obviously suited for professional purposes is LinkedIn, and it’s an exceptional platform to grow your business. To do that, it’s important to keep your company information up to date and remain active on the platform. A couple of ways to generate activity are to share or comment on articles, join professional groups and update your network with current company milestones, events you’re attending and other news about your organization.

When it comes to growing your network on LinkedIn, there’s a big debate as to whether or not to connect with every Tom, Joe, Dick and Sally who sends you an invite. There are advantages and disadvantages to both, but as far as brand awareness is concerned it makes sense to connect with more people. However, it’s a good idea to take a moment and do a quick profile check on the potential connection. Not everyone retains a professional profile and image on LinkedIn, and connecting with the wrong people could potentially hurt your reputation.

Twitter

Want to connect with people from around the world, stay on top of trends and share your ideas with professionals you respect? Twitter is the platform to do just that. Like the other two platforms mentioned above, you can also share articles and advice, and ask questions.

An element that makes Twitter especially unique is the hashtag, and you can use it to take your networking to another level. For example, if you’re attending an industry event or other networking opportunity, you can search Twitter for the associated event hashtag. This will help you discover who will be in attendance - like colleagues and professionals you’d like to meet - which gives you a great opportunity to maintain and grow your network.

Interested in finding out how else you can use social media to boost your business? Send us a message to find out more.

Published with permission from TechAdvisory.org. Source.

Topic Social Media