Blog

November 25th, 2014

BCP_Nov24_CRegardless of what your business is, or where you are located, you may at some point face a disaster that affects your business operations. In order to make it through troubled waters without serious harm to your business you need to have a Disaster Recovery Plan in place. To help ensure that your strategy is ready, here are five tips that other businesses have learnt from facing disasters that you can work into your plans.

1. Have a full copy of your data backed up outside of your operating region

Almost every company, regardless of size, has backup measures in place. These backups can be either physical or digital, and are supposed to be carried out on a regular basis. If a disaster strikes, having access to your data can help ensure that you can recover your systems and resume operations in the minimal amount of time.

While backups are great, if you keep your backups in the same area as your main systems, or even if your offsite backups are in the same region, there is a chance that a large disaster, like a flood, or power outage, could also affect these backups too. One of the best solutions is to keep a current backup offsite, and outside of your operating region, with most experts recommending at least 150 miles (250 km) away from your main business area.

How do you achieve this? The best option is to use cloud-backup. Many providers host their backup service at a number of different data centers in various locations, so that should a disaster strike both your business and a nearby data center, your data is still safe at other centers.

2. Realistically test your plan

It can be tempting to simply develop a plan and then test it in a closed environment once or twice a year, make some changes where necessary and then sit back and hope it works. In truth, for any plan to really be effective it needs to be tested in a realistic environment. If this is not carried out then there is a possibility that the plan could fail when activated.

Because disasters come in almost any form and size, you are going to want to first identify as many potential problems as possible. From here, test your recovery plans based on these scenarios and see how effective they are. Be sure to also involve your colleagues and employees, as they too will need to know what to do when disaster strikes and what their role in the recovery of data is.

A good way to look at these tests is to think of them more as practice runs. As with anything, the more your practice the easier and more effective it becomes. In this case, good practice could literally save your business.

3. Update your plan as you update your systems

When you develop a recovery plan, you need to base it on the systems and technology you currently have in your business. However, these systems and devices may not be in use six months, to a year from now, or you may introduce new systems and improvements.

As soon as you make any changes, your existing recovery plan could become obsolete. Therefore, you need to ensure that when you introduce new systems or technology you are also updating the recovery plan to cover and fit with these changes.

4. Create an accessible plan

Many experts agree that having a physical plan that employees can see and access during a disaster is one of the best ways of ensuring that it is actually implemented properly. Therefore, when you develop a Disaster Recovery Plan make sure that all of your employees can access it at any time. This includes during and immediately following a disaster.

Beyond this, you need to make sure that the plan is consistent. If you update the master plan, but fail to update the copies you store in say a public cloud, or at different worksites, this will lead to confusion and even an increased recovery time or complete recovery failure. When you do update your plan, let all parties involved know that it has been updated and remind them where they can find copies of the plan.

5. Don't be the only fully-trained disaster recovery expert in your company

As a business owner or manager it can be easy to try and run everything yourself. Afterall, it is your business and you know exactly how to look after everything, right?. The problem is that if you are the only fully-trained disaster recovery person you are making yourself the weakest link in the plan.
Published with permission from TechAdvisory.org. Source.

November 21st, 2014

Security_Nov17_CNet Neutrality is one of the biggest tech-related issues currently making its way through the American Government. In mid-November President Obama made his stance on the issue known, while also introducing a plan for it and thereby bringing the subject to worldwide attention. Here is an overview of what Net Neutrality is and how it can affect you.

What is Net Neutrality?

In order to define Net Neutrality, we should first look at the main idea behind what the Internet is: a free and open medium where individuals can express and house thoughts, ideas, and more. It was founded on one principal, and one principal alone: All information and Internet traffic MUST be treated equally.

This free, open, and fair principle is what we call Net Neutrality. In practice, this idea prevents Internet providers, and even governments, from blocking legal sites with messages they disagree with, and restricting access to services and sites that don't meet their business needs.

What exactly is the issue?

At this time, major telecommunications companies providing Internet access are trying to push legislation through the US court systems that will essentially make it legal for them to throttle Internet speeds; asking other providers to pay fees in order to speed up access to sites and to even block some sites.

There are laws currently in place, set by the FCC (Federal Communications Commission), that prohibit providers from collecting, analyzing, and manipulating user traffic. In other words, according to the FCC, the role of the Internet providers should be to simply ensure traffic and data gets from one end of the network to the other.

Last year, it was uncovered that US telecommunications giant, and Internet Service Provider, Comcast demanded that Netflix pay them millions of dollars or they would limit the Internet speed of Comcast users trying to access the streaming service. Netflix tried to negotiate but the result was that Comcast did indeed cut user speeds. Netflix paid to avoid this from happening again. This act is an obvious breach of the main tenet of Net Neutrality: Equal access for everyone.

Combine this with the January 2014 ruling that the FCC had overstepped its bounds in regards to this topic and the increased lobbying by telecommunications giants against Net Neutrality, and you can quickly come to realize that the Internet as we know it is under threat.

How will this affect my business?

If nothing is done, there is a very high chance that you will be paying higher rates for Internet-based services (because the providers will be asking other companies to pay to guarantee speedy access which will then be passed along to you via higher rates). You may even be forced to use services you don't want to use because they offer better access speeds on your network.

Beyond this, because so many businesses rely on websites and the hosting companies that enable us to access them, there is a very real risk that these hosts may have access speeds cut. This in turn could mean that it will take more time for some users to access your website and services. Think of how you react when you can't access a website, you probably just search for another similar site which loads easily - now imagine this happening to your site. In other words, you could see a decrease in overall traffic and therefore profits.

What can I do about this?

First off, we highly recommend you visit The White House's site on Net Neutrality, and read the message that President Obama has recently posted there. To sum it up, he believes that Net Neutrality should be protected and the Internet should remain open and free. He has even laid out a plan with four rules that the FCC should enact and enforce:
  • No blocking - Internet providers are not to block access to any legal content.
  • No throttling - Internet providers cannot slow or speed up access speeds based on their preferences.
  • Increased transparency - The FCC is to be more transparent and push providers to follow the Net Neutrality rules.
  • No paid prioritization - There is to be a ban on providers insisting other companies pay to have equal access speeds.
You can bet that this plan will be met by stiff resistance both in government and by the telecommunications companies themselves. The FCC is an independent organization and it is up to them to select whether or not they want to enact President Obama's plan. One thing you can do is to publicly submit your comments to the FCC via this website. Any comments made will be seen by the FCC and are are publicly viewable. In the past, enough public pressure has been able to sway FCC decisions, so share this article and the links in it with everyone you know, asking them to take action as well.

What about other countries?

For now, the Net Neutrality battle is largely US based. The vast majority of Internet traffic starts or at least passes through the US. This means that if the telecommunications providers (many of whom own international subsidiary providers) can limit access to sites in the US it could very quickly become a world issue. Beyond this, other countries often follow laws that the US enacts, so it could only be a matter of time before we see similar bills passed in other countries.

In short, this is a major issue that could see the end of the Internet as we know it. If you would like to learn more about Net Neutrality and how you can help ensure the Internet remains free and open, contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Security
November 19th, 2014

SocialMedia_Nov17_CYou've heard it before, and will hear it again: In order to have an effective social media presence you need to be active on more than one network. Many businesses realize this fact and are active on networks such as Twitter. The problem with Twitter, however, is that it can be difficult to master. To help, here are 10 Twitter tips.

  1. Keep posts on the shorter side - This may seem ridiculous, after all there are only 140 characters allowed per tweet, but keeping tweets short allows users to add their own comments and ideas when they retweet. Try keeping your tweets below 100 characters.
  2. Twitter is not about promotion - Studies have proven that tweets that promote a company or product don't usually do as well as messages that are more conversational in nature. If you want to ensure maximum interaction, aim for a mixture of tweets that consists of about 80% conversational and 20% promotional.
  3. Know what time to tweet - Each market is different, so take the time to research tweeting habits. If you see that the majority of your target audience is active during after-work hours, then it would make sense to tweet when they are more likely to be online. Remember, many Twitter users are connecting via their mobile devices, so you are probably better off tweeting during lunch hours, as well as pre- and post-work.
  4. Know what days to tweet - Much like knowing what time to tweet, it is a good idea to also know which days are best to tweet in order to maximize engagement. For example, if you are trying to interact more with other businesses (B2B) then it is best to tweet on days when the companies are open and an owner or manager is more likely to be looking at business systems and social accounts. Customers, however, are usually more receptive to messages on days when they aren't working e.g., Saturday and Sunday.
  5. Use hashtags - Hashtags in Twitter allow for categorization and make tweets searchable. For example, if you use the hashtag #fresh in a tweet and then search for 'fresh' on Twitter, you should see similar posts using the same hashtag.
  6. Use hashtags sparingly - There is a common trend in social media to use hashtags for nearly every word. This makes posts difficult to read and usually leads to people not sharing or retweeting your content. Instead, try to work one to three hashtag, at most, into your tweets naturally.
  7. Realize Twitter moves fast - The average trend on Twitter lasts about one hour, to one day. So, if you see a trend developing or beginning, act quick to join the conversation. Posting after the trend has faded will usually lead to tweets being ignored.
  8. Don't act on every trend - Trends come and go so quickly on Twitter that it can be tempting to try to jump on each one, or as many as possible, in order to get your message out to as many people as possible. However, not every style and subject will be relevant to your business. By shoehorning content to fit trends you could come across as insincere and lose interest from followers.
  9. Watch who you follow - Following people is one of the quickest ways to grow your own follower base - usually because users will follow those who follow them. But, when it come to business, you want to be sure to follow users who are relevant. For example, follow your customers, strategic partners, and even competitors. Following Twitter users who aren't relevant to your business is not going to get your messages read by the right people.
  10. Keep an eye on Twitter - In order to effectively spot trends and see what your target market is saying, it is worthwhile to use a program like Tweetdeck, which allows you to see all tweets, track hashtags, topics, and more.
If you would like to learn more about using Twitter in your business, contact us today to see how our services and solutions can boost your social media presence.
Published with permission from TechAdvisory.org. Source.

Topic Social Media
November 18th, 2014

Office365_Nov17_CAn increasingly large number of businesses are integrating Office 365 and Macs into their offices. One issue with this however is that Office for Mac usually lags behind, version wise, when it comes to Office. This is starting to change though, as Microsoft has recently introduced a new version of Outlook for Mac and a roadmap as to when we will see new versions of other Office for Mac programs introduced.

New Outlook for Mac

Historically, when a new version of Office has been released, Mac users have had to wait six or more months for Mac versions to be introduced. With Office 365, users have had to wait even longer, as the company decided to focus on developing mobile apps first. This has now changed, and a new version of an Office app for Mac users - Outlook - has been released.

There are a number of improvements being implemented with the new version of Outlook for Mac, including:

  • A more modern user interface - Throughout the past year, Microsoft has been steadily updating the look of Outlook across all devices and versions, to create a more modern style. The new version for Mac introduces this updated design, which brings it more in line with the other newer versions of Outlook. Beyond this, scrolling has been made smoother which makes the program feel as if it runs much better.
  • Increased performance and reliability - Because email is an integral part of any business, Microsoft has re-tooled the database that supports Outlook for Mac and the way the program uses resources. This relates to increased reliability, less crashes, and generally faster performance.
  • Office 365 push email support - If you enable this for your business's Office 365 accounts, emails will be pushed automatically to users. This means messages will be delivered faster; in real-time for many.
  • Enhanced online support for searching Exchange archives - If your business employs either an onsite or hosted Exchange server, the new version of Outlook for Mac will enable online searching for message archives stored on Exchange.
  • Faster first-run and email downloads - When you first open Outlook to check your email, you will now see your emails far quicker, with email downloads faster too thanks to better syncing with Exchange servers.
There are a number of new features included in the latest version of Outlook for Mac. Overall, it looks much better and many users will notice that it is not only easier to use but also faster. If you would like to update to the newest version you can do so by:
  1. Logging into Office 365 via your browser.
  2. Pressing the Gear icon followed by Office 365 Settings.
  3. Selecting Software followed by Outlook for Mac.
  4. Downloading the program and installing it.
Before you do this however, we strongly recommend contacting us. We can help ensure that all of your files are backed up and ready for an update. Beyond that, we can work with you to ensure that the program is installed and set up so that you can simply open the program and go.

New versions of Office for Mac coming soon

Upon announcing the new version of Outlook for Mac users, the company also introduced their roadmap for the release of new versions of Office programs for Mac users. The company has noted that in the first half of 2015 they will release beta versions of the next versions of Word for Mac, Excel for Mac, PowerPoint for Mac, and OneNote for Mac. Final releases will be made available in the second half of 2015.

From what we know, businesses with Office 365 subscriptions will be able to update to the new versions for free, while other users will likely have to wait, as a price list has not been made available at this time.

If you are looking to learn more about Office 365 for Mac, or any other system, contact us today to see how we can help ensure tech developments work for your business.

Published with permission from TechAdvisory.org. Source.

November 18th, 2014

GoogleApps_Nov17_COne of the biggest weaknesses of browser-based cloud systems like Google Drive, is that you generally are not able to open files using apps installed on your computer directly from the browser. Many of us who use Drive agree that being able to do so would probably help increase overall adoption of the system, and in fact, Google has recently integrated the ability to do this in Drive.

Looking at the new Google Drive feature

As stated above, the main idea behind this new Drive feature is being able to open files stored in Drive using applications installed on your computer. With previous versions of Drive you usually had to first download the file from Drive, then open it with the program on your computer. If you wanted to update the file, you would then have to upload it back to Drive.

This is hardly ideal for companies, especially those who want to use Drive as their main file storage system. Google has now updated Drive, thereby enabling you to open files in Drive using apps on your computer.

For example, say you have a Google Sheet you use to track sales data and want to export this to your tax program. With the new update you will be able to right-click on the file in Drive and open it in the tax program without having to download and open it on your computer first. When you save the edits you make, the changes will be made to the file directly in Drive.

How do I enable this?

If you would like to use this feature, you first need to ensure that you are using the latest version of Drive. You can enable this - if this hasn't already been done - by opening Drive in Chrome, pressing the cog, and selecting Turn on the new Drive.

Once you have enabled the new Drive, you need to download the Drive app to your computer. This can be found on the main Drive website. Once installed on your computer, go ahead and sync it up with the account you use for work or the account you use for Drive.

When you want to open a file using an app, open Drive in Google Chrome and right-click on a file. Select Open with and you should see relevant apps installed on your computer in the drop-down menu that opens.

We should note here that not every file type will be compatible with this feature and it only works with Google Chrome. For example, if executable files (.exe and .dmg) will not work as they need to be physically present on your computer. Some file types that will work however include:

  • Any Microsoft Office file (.PPTX, .DOCX, .XLSX) can be opened using the related Office program.
  • Images like .JPEG, .TIFF, .PSD, .PNG, etc. can be opened by either your computer's default image viewer or Adobe Photoshop if this is installed.
  • Video files like .MOV, .AVI, .MP4, etc. can be opened using certain video apps on your computer.
  • Audio files like .MP3, .MPEG, and .WAV, can be opened using some apps like Quicktime.
Please note that you do need to have relevant apps installed on your computer, and you need to be using the latest version of Google Chrome for this to work.

If you would like to learn more about this feature, and using Drive in your business, contact us today.

Published with permission from TechAdvisory.org. Source.

November 13th, 2014

Security_Nov10_CLast year saw a number of highly publicized security threats that many companies struggled to deal with. One of those was some nasty malware called Cryptolocker, which held your files for ransom. While this has now largely been dealt with, news is surfacing of a second version - called CryptoWall - that has begun to infect users.

What is Crypto malware?

Crypto malware is a type of trojan horse that when installed onto computers or devices, holds the data and system hostage. This is done by locking valuable or important files with a strong encryption. You then see a pop-up open informing you that you have a set amount of time to pay for a key which will unlock the encryption. If you don't pay before the deadline, your files are deleted.

When this malware surfaced last year, many users were understandably more than a little worried and took strong precautions to ensure they did not get infected. Despite these efforts, it really didn't go away until earlier this year, when security experts introduced a number of online portals that can un-encrypt files affected by Cryptolocker, essentially neutralizing the threat, until now that is. A recently updated version is threatening users once again.

Cryptolocker 2.0, aka. CryptoWall

Possibly because of efforts by security firms to neutralize the Cryptolocker threat, the various developers of the malware have come back with an improved version, CryptoWall and it is a threat that all businesses should be aware of.

With CryptoWall, the transmission and infection methods remain the same as they did with the first version: It is most commonly found in zipped folders and PDF files sent over email. Most emails with the malware are disguised as invoices, bills, complaints, and other business messages that we are likely to open.

The developers did however make some "improvements" to the malware that make it more difficult to deal with for most users. These changes include:

  • Unique IDs are used for payment: These are addresses used to verify that the payment is unique and from one person only. If the address is used by another user, payment will now be rejected. This is different from the first version where one person who paid could share the unlock code with other infected users.
  • CryptoWall can securely delete files: In the older version of this threat, files were deleted if the ransom wasn't paid, but they could be recovered easily. In the new version the encryption has increased security which ensures the file is deleted. This leaves you with either the option of paying the ransom or retrieving the file from a backup.
  • Payment servers can't be blocked: With CryptoLocker, when authorities and security experts found the addresses of the servers that accepted payments they were able to add these to blacklists, thus ensuring no traffic would come from, or go to, these servers again. Essentially, this made it impossible for the malware to actually work. Now, it has been found that the developers are using their own servers and gateways which essentially makes them much, much more difficult to find and ban.

How do I prevent my systems and devices from being infected?

Unlike other viruses and malware, CryptoWall doesn't go after passwords or account names, so the usual changing of your passwords won't really help. The best ways to prevent this from getting onto your systems is:
  • Don't open any suspicious attachments - Look at each and every email attachment that comes into your inbox. If you spot anything that looks odd, such as say a spelling mistake in the name, or a long string of characters together, then it is best to avoid opening it.
  • Don't open emails from unknown sources - Be extra careful about emails from unknown sources, especially ones that say they provide business oriented information e.g., bank statements from banks you don't have an account with or bills from a utilities company you don't use. Chances are high that they contain some form of malware.
Should your files be attacked and encrypted by this malware, then the first thing you should do is to contact us. We can work with you to help find a solution that will not end up in you having to pay the ransom to recover your files.

If you are looking to learn more about CryptoWall malware and how to boost your security and protect your data and systems, then we could you your first line of tech defence.

Published with permission from TechAdvisory.org. Source.

Topic Security
November 12th, 2014

BusinessValue_Nov10_CBusinesses in different industries often have unique needs when it comes to the technical systems they integrate. One system however is universal in that every business needs it: The phone system. If your business is looking for a new communications set-up you will quickly find a wealth of options out there. Here are tips you can follow to make sure that you get the best system for your business.

1. Know the types of systems out there

Phone systems, as with many other types of technology, have evolved and changed drastically from the traditional phones that we are all familiar with. As a result, it pays to be aware of the four main types of phone systems available for small to medium businesses:
  • Key systems - These systems are commonly found in many older small businesses as they were designed for up to 40 users. Typically, a Key system offers businesses basic features like hold, line switching, line management, etc.
  • PBX - Private Branch Exchange, is private phone networking technology that enables businesses to manage up to hundreds of phone lines and numbers. PBX is usually employed by larger businesses who need multiple phone lines and the ability to network offices together.
  • Hosted PBX - These are PBX systems that are managed and hosted by a provider. The system itself is usually housed offsite, which means less up-front investment for the company.
  • Centrex - These are specific business features and packages developed for your business by a major telecommunications provider which are usually added onto your monthly phone bill.
Generally speaking, these four types of phone systems are available in two ways:
  1. Analog - Traditional landline phone systems offered by phone companies, commonly referred to as PSTN (Public Switched Telephone Network). Analog is familiar to many business owners as it uses existing lines strung by telephone companies.
  2. Digital - Newer phone systems that use network connections to transmit voice communication. The most common of these systems is VoIP (Voice over Internet Protocol).
While there are four main systems, the increasingly popular adoption of digital systems like VoIP has led to Key and PBX systems essentially merging together into one platform. Some providers however do offer scaled down versions of PBX over network connections that they refer to as Key systems.

2. Consider these four questions

As you are looking for a new system? If so, it might be a good idea to ask yourself the following questions:
  1. How many lines and phones will I need? This will likely be one of the first questions a vendor will ask when you start looking for a new system. Take some time to think how many phone lines you will need. For example, will you need one for every employee? Or will a line for every major office or department be enough? You will quickly find that some teams won't need lines at all, while others will need one for every person.
  2. How much do I want to manage this system? If you want to have complete control over every line, the supporting systems, and the hardware itself, then going for a hosted solution may not be the best of ideas. On the other hand, if you are looking for a solution that is simple to manage for you, then hosted or managed solutions might be the answer.
  3. How fast will my business grow? If you are expanding quickly, then you will need a system that can develop with you. Many landline systems require technicians to install new lines which can take time, so businesses that are growing quickly may benefit more from digital systems.
  4. What other equipment will I be using? This is important to know before you talk to vendors because some systems may not work well with existing technology, or other systems you may be using. If you make a list, vendors can then help you quickly find a system that is compatible with your other equipment.

3. Ask your users what features they need

Before looking for a new phone system, you should ask the people who will be using the system what features they need in order to do their jobs to the best of their ability. Some teams may need wireless devices in order to better talk to customers, while others might find video conferencing worthwhile; others still may need a more unified communications platform, including text and instant messages.

The key here is to develop a list of features that your business will need before looking for a new phone system. This will make it easier to find one that fits your needs.

4. Work with your IT partner

We can work with you to help you find the best solution for your business; be it managed, digital, or analogue. If you are looking for a new phone system, contact us today to learn more about our solutions and how we can help.
Published with permission from TechAdvisory.org. Source.

November 11th, 2014

GoogleApps_Nov10_CWithout a doubt, email is one of the most essential business tools. Many people find it quicker and easier to simply email someone instead of calling and as such, businesses have integrated platforms like Gmail which have fast become indispensable tools. The problem with this is that it is a challenge to manage emails and this can create problems when it comes to finding important information. Recently, Google launched a new app called Inbox, which could help combat this problem.

What is Inbox?

Inbox is an Android, iOS and Web service that helps us get things done and work with our email messages in a new way. Your emails still go to your gmail account; just think of this as an app or service that helps you reduce overall inbox clutter while being able to quickly access the info you need. It achieves this by:

Bundling useful messages together

With Inbox, all similar messages are brought together into one category or bundle. Think of the categories feature introduced for Gmail last year, but on a grander scale. If for example, you travel a lot for work, travel related emails like flights, hotel bookings, and messages related to meetings will be grouped together.

The great thing about this is that you can teach Inbox to group emails in a way that suits you. This allows more control over categories and message bundles, while making it easier to find related messages. For example, if you use your work account to pay bills and to receive receipts for online payments, you can manually filter these together and Inbox will 'bundle' these together in the future.

Highlighting important information

Inbox highlights important information in emails, including: Flight information, event information, and even documents attached to messages. This not only makes it easier to see the most relevant information, it can even help reveal information you may have missed.

Beyond this, Inbox also displays real-time information from the Web. For example, if you have a flight and it is going to be delayed, this information will be shown in the email as a highlighted update.

Adding reminders

With Inbox you can automatically create reminders that notify you at a set time of a task you need to complete. This is an interesting feature because it really centralizes our to-do list into a place where we are already looking at important messages and information.

There is also a sub-feature of the reminders built into Inbox called Assist. This feature provides you with relevant information for your reminders. For example, if you set a reminder to meet a client for lunch at a restaurant, you will see the restaurant's name and number displayed in the reminder. Google has noted that this will work for flights as well - so, if you receive an email with flight information and booking numbers, you will get a link via Inbox to check-in directly.

How do I get Inbox?

For now, you can download the Inbox app for iOS and Android, but in order to use it you will need an invite. If a friend or colleague has one, they can invite other users to join, or you can email inbox@google.com and request an invite. Google sends these out on a fairly regular basis, so you should receive one in the near future.

If you are looking to learn more about Inbox, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

November 11th, 2014

Facebook_Nov10_CChange is a constant process with Facebook and most of the time it's for the better. Earlier this year, the social media company announced some pretty big changes to the Graph algorithm that powers search results. One of the more important changes companies with Facebook Pages need to know about centers around the way Likes can be used. In short: forcing people to Like your Page to gain access to content - a practice called Like-gating - is no longer tolerated.

Like-gates to be left open

In the past, it was a fairly common trend for businesses with Facebook Pages to limit the access followers had to their Pages or other information and campaigns. One of the most popular examples of this is if having to Like a company to enter a contest with them.

Facebook considered this an unfair practice, largely because it essentially defeats the purpose of a Facebook Page - which is to provide all Facebook users with equal access to business information and content. So, in August of this year, they announced that Like-gating would no longer be allowed as of November 5, 2014. This is being enforced through Facebook's recent update to the Graph algorithm which ranks Facebook Pages and other content in search results.

Companies that have been using this method to limit access to content and campaigns on Facebook will now likely see a negative drop in overall Page ranking - where you show up in search results. If this applies to you and you want to avoid this there are three things you should do as soon as possible:

1. Remove all existing Like-gates

This is important, because all Like-gate related content or campaigns are now likely going to hurt your overall Page ranking. You should audit your company's Facebook Page and look for any content or tabs that you have set a Like-gate restriction on. This includes campaigns or tabs that you have enabled using third-party apps (i.e. apps not designed by Facebook).

Essentially, you want to ensure that all content on your Facebook Page, and all marketing campaigns that use Facebook, are open to all users, not just the ones who have clicked Like on your Page.

2. Change your access gates

What is interesting about this change is that Facebook has not outright eliminated the right to limit access to your campaigns. For now, they are just focusing on ensuring that you don't need to Like something to gain access to it.

The reason for this is largely because of the way many business use Facebook - to run campaigns that gather information while offering a benefit to followers. Think of contests that give something away. Before, some businesses required that users Liked the content in order to gain entry to the campaign. Now that this is not possible you could try implementing gates such as a form that needs to be filled out in order to enter.

This method, often referred to as action-gating (requiring someone to take an action before being allowed to access content) is still fine to use, largely because it doesn't force users into taking an action, it is up to them whether they want to say fill out a form to enter a contest or not. Beyond that, the idea of filling out a form to enter a contest to gain access to information has been a standard business practice since long before Facebook.

By action-gating some content and contests or promotions, you should also be able to limit spammers, and increase the overall quality of data you gather, and of your followers.

3. Ask for Likes

Facebook has been quite clear that the new Graph algorithm will punish Facebook Pages that require users to click Like to gain access to content. So, instead of forcing people to Like something, why not just ask them to Like it instead?

Companies that have been following this method of gaining Likes have found that simply asking people for a Like won't necessarily work. Instead, you should try to include some benefits or reasons as to why users should click Like. For example, creating a badge that goes onto Facebook campaigns that says "Like us for updates, new contests, great freebies, etc." will likely see more interaction.

Similarly, putting a suggestion at the end of emails and forms on your website has also proven to work well. The key here is if you provide your followers with value and a reason to Like your page, they generally will. With some creative thinking and a different strategy you may find that overall interaction with your Page increases beyond what it would have done with a Like-gate approach.

If you are looking to learn more about this change, and how it can affect your company, contact us today.

Published with permission from TechAdvisory.org. Source.

November 6th, 2014

BusinessValue_Nov03_CAny business owner knows that technology is constantly evolving. It really feels as if a new system or device is being introduced on a daily basis. This fast-paced development has subsequently forced IT teams to also move quickly to keep up. IT can now be divided into three main areas, all of which businesses should be investing in.

1. Commodity-oriented IT

IT is made up of systems that support day-to-day operations, so it is essential that you invest in this area because it is what supports your core business practices. Without proper investment, your employees may not be able to carry out their tasks adequately. Commodity IT is essential but it does not bring increased value to your company. Sure, implementing a new email system could save money but it does not directly lead to increased profits.

One of the best ways businesses can get the most out of commodity IT is to first identify which systems the business relies on. From here, you can look to see if improvements can be made that will reduce overall expenses and increase productivity. Regardless of what you do with commodity IT, all changes and improvements should be operations-oriented; making jobs easier.

2. Business value focused IT

Business value IT involves any system that supports key operations and processes that drive overall business value. Essentially, these systems are not only essential, but they allow businesses and customers to do what they need to do. A good example of business value IT for companies with online stores is the technology that supports the store. Without it, customers would not be able to make purchases from the company.

With this form of IT you want to invest in systems that increase the value you offer customers and employees, while increasing your bottom line.

3. New opportunity IT

New technology and systems can help give your business a competitive advantage when properly integrated, while increasing overall business value. A good example of this is leveraging a new social media platform to help gain customer insights, or implementing technology that allows your business to capture and analyze data quickly and easily.

Companies able to incorporate new technology will often find that they have somewhat of a first mover advantage, and if leveraged correctly you could see increased profits and customer retention.

Get a good IT strategy

The vast majority of companies choose to focus a large percentage of their IT budgets on commodity IT. What this results in is a focus on simply maintaining existing IT systems, without actually investing in new systems. Ideally, you want to minimize your technology upkeep expenses, and invest more in discovering new technology and systems.

How do you do this? That's where a company like us comes in. As your IT partner, we can help ensure that your systems are managed effectively, costs are minimized, and we can even go so far as to help you find and implement new systems. Contact us today to see how our solutions can help maximize your IT investments.

Published with permission from TechAdvisory.org. Source.