by Felicien | Nov 23, 2018 | Education
How do you usually shop when you need something like a gift for a friend, a new pair of shoes, or a bike for your son or daughter? Today more than ever before, Americans make a beeline for the computer or a big box store when it comes to getting through their shopping list.
And it’s not just clothes, toys, and gifts we buy at these places. Paper towel, cell phones, greeting cards, and all your groceries can be purchased at the same time — with just one trip to a large chain store or one click of a button.
So where does this leave the little guy — small businesses?
Small businesses are closing up shop, and fewer new businesses are opening than ever before. Unfortunately for everyone, this means less support to locally-run firms, more unemployment, cheaper goods, terrible customer services, and small towns that suffer.
But you can help!
Small Business Saturday is a way to pump life into the small businesses here in the U.S. — and around the world. Here’s a bit more about this special annual event and how you can participate this year!
What Is Small Business Saturday?
Small Business Saturday is a day that celebrates small businesses of all kinds around the country. This includes all types of independent retailers from locally-owned gyms, grocery stores, cafes, and restaurants to artists and craftsmen who sell their goods online, local farmers, and more.
When Is Small Business Saturday?
Every year in the United States, Small Business Saturday is celebrated on the first Saturday after Thanksgiving. This year, 2018, Small Business Saturday will take place on Saturday, November 24th.
How Did Small Business Saturday Start?
Especially since the 1960s, when the modern American shopping mall came into existence, big box stores and chains have taken over what was once a country dominated by small local businesses. Small and even medium-sized towns have seen their small businesses obliterated when bigger chain stores come into town. Usually, the smaller retailers can hold out for at least a year, but inevitably, it’s the big guys who win out.
Small Business Saturday started as a way to pump some life back into the small businesses around our nation — to honor and recognize them. The first celebration of this holiday was only celebrated in Massachusetts in 2010. It was created as a way to work against Black Friday, which inevitably favors large chain stores and retailers.
But since that time, the holiday has spread throughout the nation. From the start, Small Business Saturday was sponsored by both the non-profit National Trust for Historic Preservation and by American Express. There are now Small Business Saturday celebrations in the UK and elsewhere around the world as well.
Why Participate in Small Business Saturday?
If you’re a small business owner, it, of course, makes sense to raise awareness of your business and other small businesses around the nation and the world on this day!
If you’re not a business owner, it also makes sense. That’s because consumers like you profoundly impact whether or not small businesses are able to get off the ground or maintain their business. By patronizing small businesses on this day — and raising awareness for others — you’re putting your money where your mouth is and let the world know that you appreciate small businesses and want them to stick around.
How Can Small Businesses Participate in Small Business Saturday?
Small businesses should prepare for Small Business Saturday by promoting the day online and in-store. You might consider holding a special event, an open house, or the release of a new product or service on this day. For more inspiration, head here to Shop Small®’s Get Inspired page.
How Can Others Participate?
If you’re a consumer, the best way to participate in Small Business Saturday is to buy from and patronize small businesses!
This might mean shopping at your local grocery store instead of the big chain supermarket in your town. It might mean grabbing a coffee at a local café instead of a chain coffee shop. Or it could mean ordering a piece of art, a tool you need, or something else from an independent retailer online.
Don’t Forget to Spread the Word!
Lastly, whether you’re a shopper or you own or work at a small business yourself, one of the biggest things you can do to support Small Business Saturday is spread the word.
Tell your friends and family about Small Business Saturday, use the hashtag #ShopSmall on social media, and of course, don’t forget to get out there and spend your money at small businesses in your area this Saturday, November 24th, 2018!
by Felicien | Nov 22, 2018 | Education
In today’s digitally driven world, far too many personal and business devices are left unsecured. These devices don’t leverage strong passwords and fail to have the encryption needed to protect vital data. Whether companies choose to store data in public, private, or hybrid clouds, they should always ensure that the data is encrypted before it leaves their devices or networks. Additionally, when employees think that “this data isn’t important,” they are creating the weak links that hackers need to successfully infiltrate a device (or network) and subsequently steal unencrypted data, upload malware attacks, and otherwise wreak havoc on unsuspecting businesses. Unfortunately, far too many companies fail to understand the importance of encrypting both their devices and their data.
Why Should Businesses Encrypt Devices?
The primary reason that businesses need to encrypt all devices is due to the sensitive data that they hold. Take, for example, Amarillo, Texas which said that one of the companies in charge of a security payroll audit for the city lost a flash drive containing city employees’ names, bank deposit information, birthdays, social security numbers, and addresses. Fortunately, the flash drive was encrypted. However, if the device had been unencrypted, then the story could have been significantly more disastrous, especially when you consider the fact that each of the employees’ files could quickly be sold on the dark web or black market.
Secure Device Configuration
When devices are not correctly configured, then it doesn’t matter if your company has robust security protocols. With this in mind, securing devices is made easier when your business follows these vital steps:
Lockdown any services, including remote management systems, that you are not using.
Disable and/or change the default settings on ports.
Prohibit the use of outdated web technologies. In this vein, Java, NPAI, and Plugins need to be kept up to date to avoid any potential security vulnerabilities.
Create strong passwords.
Leverage encryption for any and all business communications, data, and devices.
It is important to note that you must complete all of the above steps. For example, if you use a strong password, but fail to properly encrypt your device, then it could still be subject to theft or hacking attempts. Fortunately, there are three additional steps that you can take to further protect your vital business data and devices.
3 Steps To A Strong Configuration
Securing your essential business data is made easier when you complete the following three steps.
Strong Passwords And Encryption. — Did you now that in 2017 81 percent of hacking-related breaches were due to stolen (or weak) passwords? In this vein, you must ensure that your employees are following password best practices. For example, the default password should never be used, the password should include both uppercase and lowercase characters, one number and one special character should be used, and the password should be between 8 to 16 characters. In addition to strong device and application passwords, you should always use encryption. It is especially crucial that sensitive data sent via email or stored on the cloud is appropriately encrypted.
Endpoint Protection. — Endpoint protection will require you to complete plug-in and browser updates, use an up to date anti-virus software, and implement a proven use Data Execution Prevention (DEP) and use Endpoint Threat Detection and Response (ETDR) that has been customized for your business needs.
Restrict The Number Of Login Attempts. — When an employee has an infinite number of login attempts, then their “strong password,” is made null-and-void. Instead, you should limit the number of login attempts to business devices or networks. As an added level of protection, you should ensure that employees can only access portions of your system from approved devices. After all, if an employee is using a compromised device to access your business network or data, then you are automatically opening the barn door for hackers to come in and wreak havoc as they decide what information they want to steal and inevitably sell.
The Bottom Line: Take The Steps Needed To Encrypt Data And Devices
If you want to ensure that your business data, devices, and networks remain secure, then you need to use the proper encryption methods. In addition to data and device encryption, you should also ensure that all devices have been appropriately configured. In conclusion, through endpoint protection, a restricted number of login attempts, secure passwords, and encryption best tactics, you can keep your vital business data safe from hacking attempts.
by Felicien | Nov 22, 2018 | Education
Australia’s cybersecurity strategy, launched in 2016 by former Prime Minister Malcolm Turnbull, is in need of a stronger public-private partnership to deliver on its action plan items to improve security for business. This is evidenced by the lack of full implantation of the strategy’s five core action items, lack of meaningful investment, and allocation of needed human resources necessary for the strategy’s success.
These lessons of past failure are a stepping stone for what needs to be done going forward for Australian businesses, of which small and medium-size companies comprise nearly 95 percent of the country’s business landscape according to the Small and Medium-Sized Enterprise Association of Australia (SMEA). These businesses are particularly vulnerable to cyber attacks and unwanted intrusions by outside individuals and groups deploying spyware, ransomware, and any other forms of malware designed to disrupt commerce.
It is therefore incumbent for the government, in partnership with the private business sector, and public citizens to look at ways to fully implement the recommendations of Australia’s 2016 cybersecurity strategy. Attacks that have taken place across the globe, including against the most recent U.S. Presidential election and a breach of the Australian Red Cross Blood Service’s data bring to the forefront the importance of acting with due speed to put in place a framework to prevent Australia from falling victim to the effects of an impending cyber attack.
The Action Plan Items
The five action items included in the report are:
Make the national cyber partnership strong
Create cyber defences
Increase global responsibility and influence
Promote growth and innovation, and
Create a cyber smart nation
Each of these action items was set forth as broad goal statements but without specifics or identifiable targets for implementation. For the cybersecurity strategy to result in meaningful outcomes for the country, and, in particular, for business in Australia, the group devising the policy must come together to better define the action plan items outlined in the strategy and put in place measurable goals and targets.
Accomplishing the spirit of the plan also requires a serious investment in technology by the Australian government. A technology assessment performed by management consulting group Deloitte entitled “What’s over the horizon?: Recognising opportunity in uncertainty,” in its Building the Lucky Country series (#6) outlines the steps that businesses need to take to cross the digital divide. This includes becoming less risk-averse and investing in increased cyber capability, through education, better security measures, and resiliency in the face of attacks when they occur.
Issues with Implementation
Various problems have occurred on the way to implementation of the country’s cybersecurity strategy. One of the most significant failings pointed out by the Australian Strategic Policy Institute (ASPI), an independent think tank providing expertise and advice on issues regarding defence, Australian national security, and cyber, is the lack of any plan for delivering on the actions items coupled with the nonexistence of a methodology for moving the strategy forward.
Funding is an issue that is easy to fix, provided that the government understands the importance of adequately supporting their desire to protect businesses and the public (as well as government institutions and other related organisations) from potential cybercrimes. Education and public awareness are also equally important and vital to the full implementation of Australia’s cybersecurity strategy.
A Commitment to Deliver
As former Prime Minister Turnbull stated as a prelude to setting forth the cybersecurity strategy, “A secure cyberspace provides trust and confidence for individuals, business and the public sector to share ideas and information and to innovate online.” The strategy is a recognition of the increasing attacks on the country’s cyber framework and the risks these attacks pose to the economy. The financial impact of open threats to Australia’s digital network also takes an emotional toll on consumers, who lose trust and confidence in the ability of institutions, both public and private, to protect their privacy and process their business in an orderly and efficient manner.
The evaluations of the country’s implementation of its cybersecurity strategy by organisations such as ASPI paint a bleak outlook as to actions taken to date to fully realise the goals of the plan. These evaluations also serve to remind business and government officials that the commitment to deliver on the promise of securing the country’s digital network begins with measurable actions that must include risk-taking, evaluation, adjustment, and forward-thinking progress.
by Felicien | Nov 21, 2018 | Education
Anyone who has passed a high school English class can tell you two things—writing is tough and plagiarism is wrong. Hiring an outside writer from a website such as Fiverr is a great way to create great content without exerting an overabundance of effort, but not every freelancer is honest.
That’s why it is incredibly important to take a little extra time to investigate the text to ensure it free from error and completely unique. Here is a list of the best online grammar and plagiarism tools for checking your writing.
What’s the Best Tool for Checking Spelling, Grammar, and Plagiarism?
While it is one of the most expensive tools on this list, Grammarly is hands down the best option for those who want to check everything including spelling, grammar, and plagiarism. This gives you the best of both worlds—a place to test your outsourced content for errors and the ability to quickly edit your own writing before sending out a social media post or important email.
Grammarly even offers plugins for Microsoft Office, Outlook, and various web browsers to give you easy access when you need to scan a document quickly. A limited version is available for free, but to enjoy all of the robust benefits including plagiarism detection it is recommended that you subscribe to the app.
What is the Best Tool for Checking Just Plagiarism?
If your only need is to check against duplicate content, then Plagiarism Checker X is an excellent choice. Compare multiple documents to search for repeated phrasing or deeply scan the web to find sources of plagiarism. You may also input a specific web address to find other sites matching particular phrasing, which is especially helpful to determine if your website’s unique content is being ripped off by other bloggers.
The program offers a limited option with a free trial or a more substantial one-time subscription fee for additional features. As a bonus, Plagiarism Checker X also comes with a keyword analysis tool that provides the number of times a particular word is used in a piece and the density of keywords.
Which Online Plagiarism Tools Allows Me to Scan the Web Automatically for Plagiarism?
In most academic circles, Copyscape is the gold standard for duplicate content and plagiarism checking. Why? This easy-to-use tool features the option to insert a URL and find instances of the same copy elsewhere on the web without having to set up an account. However, if you want the option to copy text into the checker, you’ll need to sign up and pay for credits.
This app does include a unique feature very applicable to bloggers and digital marketers alike: a monthly subscription service called Copysentry that sends you alerts anytime it finds content from your website elsewhere on the internet.
For developers, Copyscape also provides an API integration for quick scanning. This is especially helpful for those creating software aimed at the education sector where instructors need the ability to quickly and efficiently spot instances of plagiarism.
Which Plagiarism Checker Tool Offers Support for Multiple Languages?
While most plagiarism checker apps feature support for a variety of major languages, Plagiarisma is your best bet. This expansive program offers duplication checking for up to 190 global languages. It also allows you to paste text into an in-browser box or upload a document. Accepted file extensions include DOX, DOCX, TXT, XML, PDF, RTF, HTML, and a whole host of others to help meet your needs.
Not sure you want to use an online interface? Plagiarisma has several different plugins including those for Blackberry and multiple popular software programs. As with the other tools mentioned above, both a limited free version and paid versions are available.
What’s the Best Tool for Checking Readability?
If you’re just concerned about checking readability, then the Hemingway App is an excellent option. This free web-based service and allows you to paste in any text of your choice. It then information about sentence structure, passive voice use, and approximate reading level. This is an excellent tool for use on emails, white papers, memos, and other important documents where sounding authoritative and professional is important.
Outsourcing content is a great way to maximize efficiency. Using these plagiarism and grammar tools help ensure your text is original and free from errors.
by Felicien | Nov 21, 2018 | Education
A recent survey of Canadian chief information officers expressed disappointment in IT outsourcing. The feedback the CIOs provided present an exceptional opportunity for IT companies to respond and hone their services and customer service to better serve corporate clients.
The annual CanadianCIO Census, sponsored by IT World Canada, shows that CIOs are dissatisfied with the investments they’ve made in outsourcing. Among the findings:
Twenty-five percent of CIOs surveyed note that the outsourcing relationships had fallen short of expectations. That’s similar to the 2017 results, where 28 percent reported the same sentiment.
“As a service” computing is taking the place of many traditional outsourcing products.
Data indicate that more companies are investing in in-house staff, despite continued projected growth in outsourcing services. Gartner expects the outsourced IT market to reach $363 million by 2020 with 6.3 percent annual growth.
There is a gap in expectations versus reality when it comes to what an IT provider does.
It’s evident that the opportunity to deliver better services is high.
What Are the Gaps in Expectations Between IT Providers and Clients?
Too often, businesses that outsource believe that once the contract is signed, the provider is going to take care of everything. Executives may not understand the need to establish and maintain an ongoing dialogue and relationship with the IT provider.
This disconnect raises an important consideration for IT company leaders. It’s imperative that you’re transparent with clients about how to make the relationship work. Many IT providers position themselves as virtual CIOs and tout their ongoing advisory services. IT companies should establish their executives as thought leaders who will be available for ongoing consulting and brainstorming. Reinforce that your commitment to the client includes recommending new technologies and solutions as they emerge and analyzing performance data to support improvements that will advance business goals.
What Is Needed for Transition Planning?
When you present a plan to refine, add or replace technologies and processes, there’s a critical need to be sure that project management is clearly outlined. The client and provider need to be on the same page about what the transition to new solutions will mean, scoping out the sequencing, significant milestones, timelines and impact on operations. Transition and project planning are essential to managing expectations from leadership, employees and customers.
The project management plan also needs to focus on information sharing and knowledge transfer. IT companies can position themselves as comprehensive service providers by focusing not only on what happens on Day but what will be done to ensure the client’s organization will be ready and prepared.
When Is Customization a Problem?
Many IT providers tout their ability to customize solutions for each client, taking into account the unique needs, challenges and opportunities. This is an important marketing point and should continue to be front and center. However, customization can often cause frustration.
For example, when a new solution needs to fit the way the client does work, there needs to be a lot of dialogue about processes. Sometimes, the client has not documented those processes, the processes are inconsistently applied within the organization, or existing documentation is inaccurate. At that point, the outsourced service provider often has to build new documentation, a time-consuming process that can add additional hours and cost to a client’s bill. Clients that are not expecting that expense can become unhappy quickly.
IT providers can avoid these issues by being clear at the front end about time estimates and identifying typical unforeseen problems that might add to the final project costs.
How Can IT Providers Help Clients?
One approach to improving the experience for clients … and their satisfaction levels … is to suggest a three-pronged approach to management and governance:
Encourage clients to train their staffs on how to work best with your company. Offer to help develop that training and help staffs prepare for change.
Suggest the client’s company build a governance structure. A management committee, for example, could draft a charter defining the key metrics that determine the outsourcing efficacy and how problems will be addressed.
Recommend the client appoint relationship managers that have the authority to work closely with the service provider and report back regularly to company leadership.