by Felicien | Nov 13, 2017 | Education
We are issuing a warning to businesses to be on the lookout for the “GlobeImposter” or “Fake Globe” ransomware virus, which is once again making headlines. This variant of the ransomware virus has become part of a large-scale email-based campaign that manages to slip past the defenses of some unsuspecting companies.
GlobeImposter, also known as Fake Globe, is distributed through a malicious spam campaign. This can be spotted by it’s a lack of message content and an attached ZIP file. This type of spam is known as “blank slate”. It can also be distributed through exploits and malicious advertising, fake updates, and repacked infected installers.
As with all ransomware, GlobeImposter encrypts the victim’s files, making them irrevocable without payment. Most ransomware has a built-in file extension filter that will leave executable files intact. This variant, however, encrypts all executable files, rendering the system unbootable as a result.
It is vital that we properly educate our clients and provide the right tools to minimize the serious risk at hand.
While antivirus and firewalls are incredibly effective in reducing risk, you need a more robust security solution in place to defend against the increasingly dangerous threat landscape. To be fully protected, companies will need a proper, reliable backup and disaster recovery (BDR) solution with online and offline backup solutions as the ultimate failsafe against successful attacks.
by Felicien | Nov 13, 2017 | Education
What Your Company Should be Doing to Stay Secure?
Most internet users today share a common burden: managing the passwords for various email accounts, online portals, and social media profiles. However, for business owners, managing passwords is a whole different ballgame. They have to keep track of employee account passwords, email passwords, software program passwords and most importantly, company Wi-Fi controls.
Unfortunately, Wi-Fi passwords often get put on the back burner and are assumed to not be very important in the grand scheme of business responsibilities. However, neglecting Wi-Fi password management in the business setting can leave companies open to massive cybersecurity risks that threaten their livelihood and continuity.
Back to Basics: What is a Wi-Fi Network Password?
A common misconception is that wireless network passwords only involve internet access. In reality, much more than web access is at stake when it comes to wireless network passwords. Wireless broadband routers allow administrators to manage their company networks through a specified account. Anyone who knows this account username and password can log in to the router, which gives them complete access to the router’s features and information about connected devices.
Most manufacturers set up all routers with the same default username and password. The username is often something straightforward like “admin” or “administrator.” The password field follows suit using simple defaults like “password” or “public”. However, users are given the option to personalize and change router passwords from the default settings to customize and better secure networks.
What are the Risks? How Weak Wi-Fi Security Leaves Business Networks Exposed to Risk
It’s incredibly important for business owners to change default passwords when setting up a new router. The default passwords and usernames for leading market routers are well known among hackers and cybercriminals. In fact, this info is often posted publicly on the internet for anyone to find.
If default passwords are left untouched, anyone who comes within signal range of a company’s Wi-Fi router can attempt to log in. If they make it inside, they can change passwords and settings, wreak havoc, shut down the router and hijack the entire company network. While there are limits on a Wi-Fi routers signal reach, in many cases it extends outside the office to surrounding buildings and homes at the very least.
Strategic Protection: How to Better Secure Your Company Wi-Fi Network in Uncertain Times
To avoid the risks outlined above, business owners should have clear and explicit Wi-Fi password SOP’s in place. Implementing hardline policies for managing Wi-Fi security is the best way for business owners to keep company networks on lockdown and safe from invasion.
Here are some strategic considerations to keep in mind when developing Wi-Fi security policies:
Change default passwords immediately upon install
As mentioned, changing default passwords immediately is critical. To do this, administrators can log into the router’s console with the current password to then set a new, strategic password. Administrators should change the username as well if the router offers this capability.
Also, note that changing the default password to a weak one like “123456” or “password1” does not help. Choose a strong and strategic password that hasn’t been recently used and is difficult to guess.
Schedule regular password change dates
To maintain network security for the long-term, implement a change of the administrative password periodically. In fact, experts recommend changing Wi-Fi passwords every 30 to 90 days.
Planning password changes on a set schedule help make it a standard practice in your office. It’s also a good standard practice for managing passwords in other areas like email and other online accounts.
Be Smart with Storage of Passwords and Password Policies
Whatever you do, don’t undermine your efforts to stay secure by storing password policies and login info inconspicuous or easily-accessible places. For this kind of information, it’s probably best to develop and on-paper, hard-copy approach to storage. Storing this information on the company network leaves all of it exposed to potential risk or loss.
Office managers or administrators should have a designated place where a binder of Wi-Fi password information can be kept. The binder should contain password change policies, including dates of previous and upcoming password changes. Additionally, keep a record of recently used passwords as well as a designated section for the current one. This avoids reusing passwords and creates a master log where forgetful employees can look up Wi-Fi security info as needed.
Open Door Policies: Setting up a Secure Guest Wi-Fi Profile to Share Web Access with Customers & Visitors
Another key consideration that business owners need to make in their efforts to manage Wi-Fi security is network use by customers and guests. It’s become second nature for consumers and professionals to assume they can access Wi-Fi while visiting business institutions of all kinds. Providing business visitors and customers with access to the Internet brings many benefits, but if you are going to open your network to guests, security cannot be an afterthought.
Businesses who do not properly manage guest Wi-Fi leave themselves exposed to considerable risk. Visitors on the network could engage in morally or ethically questionable activities on your company network. They may accidentally or deliberately install malware or ransomware, or visit phishing websites. Securing guest Wi-Fi for business visitors will protect visitors and your network, prevent man-in-the-middle attacks, malware downloads and block phishing attacks. Secure guest Wi-Fi also keeps businesses protected from any kind of legal liability.
Here are some tips for creating secure Guest Wi-Fi profiles:
Implement Network Segregation
Segregating your network is important for two reasons. First, it ensures that visitors will not be able to gain access to parts of the network used by your employees. Your internal network must be totally separate from the network used by customers and guests. It should not be possible for guests to see your network assets, confidential files, and company resources.
Secondly, in the event of a malware infection due to guest web access, network segregation ensures the attack will not spread from the guest network to your internal network. Businesses should implement a network firewall or create a separate VLAN for guest use and use a software firewall to protect servers and workstations from guest network traffic.
Always Change Defaults
We’ve said it once and we’ll say it again. Changing default passwords and usernames is one of the most basic security practices. However, it’s often the one that’s most commonly forgotten. There are countless reports of data breaches that have occurred because of the failure to change default passwords.
It is also a good idea to change your SSID for your Wi-Fi network. The SSID should reflect the name of your business and it should be quite clear to your customers which is network is yours. Failure to do this makes it easier than ever for hackers and criminals to set up rogue access points and launch man-in-the-middle attacks.
Stay on Top of Firmware Updates
Like all tech updates, firmware updates are issued for a reason. They patch vulnerabilities that are easily exploited by cybercriminals to gain access to business networks and devices.
If these vulnerabilities are exploited, your business network can be hijacked by malicious individuals. Businesses should have policies in place that require firmware updates to be installed regularly and promptly, with checks performed monthly.
Encrypt Company Wi-Fi Network Signals
You want to make it as easy as possible for your guest Wi-Fi network to be accessed by your customers and visitors. However, be sure you don’t make it too easy for hackers to spy on individuals connected to your company network.
Encrypt your wireless network with WPA2 encryption. You can then post the SSID and password strategically to make it as easy as possible for legitimate guest users to access the network.
Filter Content
Managing and securing guest Wi-Fi also involves implementing and managing controls over the content that can be accessed on your Wi-Fi network. Content filtering is a must for any business offering guest Wi-Fi capabilities. Access to any kind of adult content should be blocked, including: pornography, gambling sites and other web content that is ethically or morally questionable.
Content filtering solutions will also protect your customers from accidental malware and ransomware downloads while blocking phishing websites. Consider using a cloud-based web content filter as they require no additional hardware purchases and allow for remote monitoring.
Increased internet access is without a doubt making life easier for businesses and consumers alike. Access to the information highway is great, but businesses especially need to be aware of the threats posed by anytime, anywhere Wi-Fi access. Keeping business networks dynamically secure with strategic passwords should be at the top of the priority list for any modern business.
Protecting your company’s continuity means protecting your company network. Phoenix Technologies has helped countless businesses implement security strategies that keep Wi-Fi networks dynamic and secure.
by Felicien | Nov 13, 2017 | Education
Recently, headlines have been dominated by reports of broadband users across Australia getting less than they paid for. National Broadband Network (NBN) customers across the country have been experiencing less than stellar broadband speeds. In fact, speeds were far less than promised by Internet Service Providers (ISPs) and far less than customers paid for.
Since the news broke, the Australian Competition and Consumer Commission (ACCC) has come forward to warn retail ISPs like Optus and TPG. Head of the consumer watchdog organization, Rod Sims, has urged internet providers to implement refunds for overcharged customers and claims they face potential litigation if not.
Understanding the Problem: Telstra First Identifies Over-Charge Issue in Late Spring 2017
In short, certain telcos across Australia have been accused of knowingly selling broadband packages to customers using fibre-to-the-node (FTTN) NBN connections, that we’re simply incapable of offering any top-tier bandwidth speeds over 50 Mbps.
Leading ISP, Telstra first went public in May, announcing that it was aware of customer overcharges and would start a process to identify, contact and refund eligible customers. Following suit, ISP Optus claimed that they too would undertake the same process. However, ACCC head Rod Sims claims that while Optus made an effort publicly to right the wrong, they’ve offered limited plans for action since.
“We are pleased that Telstra proactively reported this serious problem to the ACCC and has co-operated in creating a remediation plan for affected customers,” said Sims.
“Optus were more engaging publicly than they were with us,” added Sims. “They were saying things in public about what they will do, but the ACCC will start engaging directly with them right now. I think most of the other ISPs are in a similar position but you think given those statements, Optus should have no problem providing a similar undertaking [to Telstra].”
Most of the customers eligible for a refund will likely be connected to the NBN via the most common fibre-to-the-node connection (FTTN). FTTN connections help to provide broadband connection and other data services through a common network box, which is often called a node.
Who’s to Blame? Understanding How Australian Telco’s Obtain Broadband Capacity from NBN Co.
The failed promises on broadband speeds have left many customers wondering who their disappointment and anger should be directed at. While they purchased broadband packages from ISP’s like Telstra and Optus, fingers were initially pointed at the National Broadband Network Corporation for failing to provide adequate speed to providers.
However, to better understand the problem and ensure blame games don’t cloud the issue, let’s explore the process for how Australian ISPs purchase broadband capacity from NBN and what that means for consumers.
NBN Co. is the company responsible for building and implementing a wholesale broadband network to service the entire country.
Retail ISPs like Telstra and Optus are required to purchase necessary amounts of bandwidth from NBN to adequately serve their customers.
Retail ISPs are required to purchase enough NBN bandwidth to match the service agreements and promised download speeds they offer to customers.
When promises of lightning-fast download speeds are made, but an ISP hasn’t bought enough NBN capacity to support it, the service package simply will not live up to the hype.
Simply put, NBN serves as the on-ramp and various Internet Service Providers are the highways.
Solving the Problem: Putting Activation Processes in Place to Avoid Future Rip-Offs
Widespread warnings to ISPs by the ACCC come in response to Telstra’s submission to the consumer watchdog, outlining how it will provide refunds or special offers to roughly 42,000 customers who over-paid for unattainable speeds on their NBN service.
With Telstra setting the bar high, Sim’s claims that remaining Australian ISPs should follow suit quickly if they want to avoid direct legal action.
“We’ve been warning [ISPs] for some time that we were concerned about this kind of behaviour,” said Sims. “Now that we’ve got this undertaking from Telstra, we’ll be approaching most other ISPs to say we’d like an undertaking in similar terms and if we don’t get it, there’s a very real chance there will be litigation to follow.”
In part of Telstra’s submission to the ACCC, the ISP said from now on, when connecting new customers, hard-line policies will be in place to test the connection and ensure end-users can reach and maintain the download speeds they paid for. If the test fails, Telstra will know right away that something must be remedied.
Ending the Blame Game: Getting to The Bottom of Broadband Speed Issues to Protect Consumers
Sims and the ACC claim that Telstra’s new policy will be a critical force in ending the blame-game between NBN Co. and the various ISP’s across Australia.
“For example,” says Sims. “If you can’t get 25 Mbps download speeds on your service, you’ll be almost certain it’s because the retailer didn’t buy enough capacity. Fibre-to-the-node has difficulty supporting 100 Mbps or even 50 Mbps. But 98% of the time, it can support speeds of 25 Mbps.”
“So it will become very likely that if you’re on a connection speed of 25 Mbps – even if its fibre-to-the-node – if you’re having problems it’s very likely your retailer hasn’t bought enough capacity from the NBN.”
With Telstra leading the charge, the ACCC is strongly urging other Australian ISPs to be transparent, identify customers eligible for a refund and get policies in place for remedying the issue. As mentioned, without swift and deliberate action on the part of all relevant ISPs, retailers could leave themselves open to litigation, not to mention damaged reputations.
For Australian broadband consumers, voicing your dissatisfaction is critical. If you’ve recently purchased a broadband package from any of Australia’s Internet Service Providers, make sure that your connection and download speeds have been living up to what you paid for. If you’ve experienced less-than-promised speeds, you should contact your service provider directly and ask them what’s being done to remedy the bandwidth issue.
Consumers have rights. In an increasingly technology-driven consumer landscape, it’s critical that these rights are protected and that customers are getting exactly what they paid for.
If you’re confused by the technical jargon or would just like an expert’s perspective on the issue, reach out to a local technology firm for consultation and guidance. Technology should make your life easier – it should never rip you off.
by Felicien | Nov 13, 2017 | Education
Google Platform is Affordable and Practical for Busy Professionals
Google has finally come up with a catchy and appropriate name for its online platform of apps and Cloud storage. Google’s G Suite offers small business owners a dynamic collection of business-focused apps and Cloud space at very affordable prices. In fact, depending on your usage requirements, businesses can take advantage of G Suite for as little as $5-10 per month, per user.
G Suite comes equipped with all the apps business owners need, including Gmail, Google Drive, Google Docs, Google Hangouts, Google Slides, Google Sheets and Google Calendar. While the apps are the same ones individual Google users have been using for years, their design and implementation in G Suite make them smarter, more intuitive and more business-focused than ever.
Lay of the Land: Getting to Know the Basic Benefits of G Suite
G Suite is designed specifically to help business leaders work smarter, not harder. G Suite operates as a company’s central hub, where all aspects of a company’s business are easily accessible and optimized for the modern business landscape. Let’s explore some of the key areas that G Suite helps business owners optimize:
Communication & Connection
G Suite is jam-packed with apps to help businesses communicate and connect with clients and colleagues. Gmail and Inbox serve as powerful and customizable email hubs that centralize key communications and business tasks.
Additionally, the Google Calendar offers integration and syncing capabilities to optimize client and team meetings.
Furthermore, apps like Hangouts, Groups, and Google+ help businesses better organize their communication processes and form more meaningful and strategic connections with associates.
Collaboration & Productivity
With a collection of apps that rivals Office 365 packages, team collaboration and productivity are optimized forcefully in G Suite. Docs and Sheets – Google’s answer to Word and Excel – offer the ability for real-time collaboration of business documents using an online browser.
Slides, Google’s version of PowerPoint, offers the same collaboration capacity and a unique collection of stylish and well-organized presentation templates to help business presentations make a stronger impact.
The Sites and Forms apps help business owners optimize web presence. The Sites app offers a unique platform where team members can collaborate to build engaging websites. The Forms app allows businesses to create unique and business-focused surveys, registration forms and help request forms, with built-in tools for response analysis.
Storage & Access
G Suite makes data access, storage and sharing more streamlined than ever. On the baseline plan, the Google Drive app offers business owners 30GB of Cloud storage – more than double the space available on the free Google Drive app.
Even better, the Business Plan, for companies with more than 5 employees, offers unlimited Cloud storage and an improved admin control panel as well as access to the Vault app for email archiving. These dynamic Cloud storage options will make it easier than ever for employees to access, store and share data as needed – from anywhere, anytime.
In addition to these baseline apps, G Suite also offers a variety of other dynamic features including:
Business email addresses for all employees,
Video and voice calling capabilities,
Reliable security and administration controls,
24/7 phone and email support,
Advanced search capabilities,
File import/export tools,
Auditing tools for business insights and more, depending on your service level.
Futuristic Focus: How G Suite is Using Machine Learning to Make Business Run Smoother
Google has made a serious effort to implement strategic machine learning tools, directly into G Suite. The machine learning mechanisms can analyze a company’s actions within all the connected suite apps and begin to drive optimization in the background.
Google VP of Apps and Google Cloud, Prabhakar Raghavan, explains that the goal of the machine learning strategies is to make G Suite function as a part of the team for businesses in any industry. G Suite is designed specifically to help streamline the repetitive machine-like tasks that eat up valuable business hours.
Here are some of the leading machine learning tools that will be implemented in the newly-branded G Suite:
Quicker Access
Searching for files as they’re needed can be time-consuming using traditional systems. However, with machine learning strategies in place, the Google Drive app is more intuitive than ever and will recognize more quickly what you’re looking for and bring recent or commonly used files to the forefront.
A Smart Calendar
Machine learning tools have been implemented into the Calendar app for some time. The smarter Calendar app is designed to streamline the organization of regular business meetings by automatically letting you know when team members are available or offering directions to common business meeting locations.
Data Management and Analysis
The whole point of Spreadsheets is to help businesses better analyze and understand trends based on data. Machine learning in Google Sheets works to understand business files and automatically creates charts to track and report data trends.
Google Docs with a Virtual Team Member
Machine learning in Google Docs is really like having a virtual team member to collaborate with. Using the Explore function on the Docs app, businesses owners can check out search topics and websites that will add substance and credibility to the document at hand.
Presentation Formatting
The most annoying part of preparing any business presentation is ensuring that everything is formatted correctly to look outstanding on screen. Formatting can often take a huge chunk of time, but machine learning tools in Slides offers automatic format capabilities. Even better? The Slides app has the same Explore function as Docs, making it easier than ever to add relevant web content to your slides.
Choosing a G Suite Service Plan: Finding the Right Service Package for Your Business
In true Google fashion, G Suite service package subscription has been kept simple and straightforward. Businesses are only given three options to choose from, all of which are affordable and allow companies to customize their G Suite experience to meet their unique business needs.
Business owners have the option of choosing between three service tiers:
BASIC
G Suite: $5 per user, per month.
BUSINESS ß BEST VALUE FOR SMALL BUSINESS
G Suite Business: $10 per user, per month
ENTERPRISE
G Suite Enterprise: $25 per user, per month.
All versions support HD video conferencing via Hangouts and round the clock customer support is available via email and phone. However, some features will vary based on your service package. You can compare features here.
It’s also important to note that there are specific versions of G Suite created for Government and Education institutions, titled G Suite for Government and G Suite for Education respectively. These specialized versions offer unique features to help these industries better manage operational challenges.
Google has also kept the set-up process for G Suite as easy and quick as possible. It only takes a few seconds to sign up for G Suite and once a business account is created, the users will be redirected to the G Suite Admin Console. There, business administrators can make key considerations for users, company profiles, billing, reports, app & device management, security, and support.
Inviting employees to join the company G Suite can be done in one of two ways: manually adding team members or importing a CSV file containing user details. Then, administrators can set controls for which team members have access to which apps and features. Finally, administrators always have the option of disabling unused apps from the G Suite altogether.
Optimizing your G Suite: Considerations for Managing and Making the Most of Your G Suite Account
Once you’ve got your G Suite set up, it’s important to understand some final key factors that will help your company manage and make the most out of G Suite’s optimizing power. Check out the leading G Suite optimization features below:
Mobile Device Management
G Suite provides users with a designated Mobile Device Management section, which lets administrators mark passwords as mandatory and enable Google Sync on user devices to keep all team members up to date. You can also select devices individually by setting up a manual approval process and remotely wipe old employee devices.
The Admin Console
The Admin Console is G Suite’s pilot cabin. It offers a variety of extra tools that enable group creation, third-party app management, and domain management. It also provides connection to free Google services such as Google Analytics, AdWords, Google+ and Google App Engine.
The Vault
The Vault feature is limited to the Business and Enterprise plans and is suitable for companies who like to store email, chat, and files in adherence to government and regulatory compliance. Data retention policies can be set up to cover all employees or according to particular dates, groups or search terms. G Suite offers automatic and easy-to-use search, analysis and reporting tools as well.
File Sharing
File sharing in G Suite can be done seamlessly, with a click on the “Share” button, which has options to share with the public, anyone with the unique link, anyone within the company, or only with a specific set of people.
Apart from widely used Microsoft Office document formats, G Suite apps also support various other formats including Open Document Format, Rich Text Format, PDF, plain text and zipped HTML. Additionally, Google Sheets lets you save spreadsheets in CSV and tab-separated value formats, and presentations can be downloaded in SVG and PNG formats.
Security
Google has deployed custom-built servers and network infrastructure directly into G Suite. This infrastructure maintains a standardized environment and continuously monitors it to detect any changes or threats. Even better? User data in G Suite travels over the internet and among data centers via end-to-end encryption
G Suite offers a variety of other dynamic security features for administrators including strategic spam filters, 2-factor authentication controls and the capability to implement customized Data Loss Prevention policies.
No matter your reasons for considering G Suite, it’s clear to see that the optimized business hub offers benefits for companies across all industries. Depending on the size and unique demands of your business, making the switch to G Suite can offer huge streamlining and optimization power.
However, like with any business decision, it’s critical to be informed. In a modern business world, an organization’s digital headquarters is what makes a business move, so make sure you know exactly what’s required for deploying any final solutions.
If you’re thinking about deploying G Suite as your company’s digital hub, you should make sure the deployment is customized and strategic. If you have specific questions about certain aspects of G Suite and how to best optimize the platform for your business, don’t be afraid to reach to a local technology firm for a consultation.
by Felicien | Nov 10, 2017 | Education
It’s a question that most modern professionals have pondered at one point: which is better, PC or Mac? There’s no clear-cut answer. However, while Windows PC has long been the popular choice among business owners, there is a significant pattern emerging. More and more companies are choosing to make the switch from Microsoft to Apple.
If you’re one of these companies, or if you’ve ever considered making the switch from PC to Mac, you probably have some questions and concerns about making the switch as seamless as possible. Check out the info below to get the inside scoop on streamlining your switch from PC to Mac.
Understanding the Mac Difference: What Draws Windows Users to Make the Switch?
There’s no point in waging a war between PC and Mac – people have preferences and some prefer to stick with what they know. However, there are some key benefits that a switch to Mac offers – especially for business owners. While the increased price tag often leaves business owners wary, there really are concrete reasons to support Mac investments. We’ll get into some of the leading security and functionality benefits later, but for now, let’s break down the basic benefits of switching to Mac.
Ease of Use
First and foremost, Mac users agree: the machines are easy to use and highly intuitive. Mac users rave about the usefulness of Mac keyboard shortcuts and the overall efficiency of the Mac interface and operating system. Safe to say, most business owners would agree: what’s better than a new device that’s easy to use?
Quality & Value
While Mac devices generally look sleeker and nicer than their Windows counterparts, Mac benefits aren’t limited to their good looks. Mac devices are built with high-end materials, they last for years longer than PC’s and they hold their value incredibly well. This means that while PC’s might be cheaper, you’ll spend a lot less on replacements and repairs in the long run with Apple.
Modernity & Connection
Another great thing about switching to Mac is saying goodbye to annoying and time-consuming driver updates. Mac’s updates are designed to be quick, easy and automatic – leaving professionals more time to work on core business tasks. Even better? As iPhones quickly become the dominating personal devices for modern professionals, switching to Mac makes the syncing of critical info more accessible.
Re-Examining Security: Security Considerations when Switching to Mac
Okay, let’s get to the really good stuff. For business owners in a modern business world, IT security is the leading technology priority. Business leaders want to know that no matter what tech tools their using, their company data is secure and protected from invasion. Many modern PC users might have their heart committed to Windows Defender, however, there are a variety of intuitive and built-in security tools that make the switch to Mac worth it.
Here are a few key security highlights that Mac machines offer:
The great thing about Mac is that it offers countless security features directly built-in to its Unix-based operating system. In addition to this built-in threat management and detection features, Apple prides itself on implementing its own security protocols, meaning Mac’s have a reputation for being more secure than their Windows counterparts.
Specifically, Mac programs like Gatekeeper use automatic controls to block any programs that have not been digitally approved by Apple. This means that no unauthorized programs can be run on a Mac without explicit approval from machine administrators.
While many Mac users don’t use any external anti-virus programs, the most prudent of business professionals prefer to have an additional line of defense. Luckily, there are a variety of anti-virus programs designed to work optimally with Mac. You can check out the leading options
Operating a Mac: Functionality Considerations for Former Windows Users
Perhaps the most important consideration when making the switch from PC to Mac is making sure you know how to use your new machine. Without knowing the ins and outs of how Mac’s function – as compared to PC’s – business hours can be eaten up while employees try to figure out the lay of the land.
Here are some key functionality concerns to help new Mac users post-switch:
My system freezes or crashes – what do I do?
For life-long PC users, Ctrl-Alt-Delete is the go-to rescue command when a PC would freeze or an application would stall. New Mac users often get panicked when they realize their Mac keyboard doesn’t have the same function. However, you need not worry that your Mac is dead in the water when the system freezes.
In fact, many Mac users claim that crashes on Apple machines are so uncommon that a Ctrl-Alt-Delete function isn’t even necessary. However, in true Apple fashion, there is a command in place to force-quit crashed or frozen applications. Simply hit Command-Alt-Esc to reboot the app or your machine and get business moving again.
How in the world do I ‘right-click’ on a Mac?
So, you set up a bunch of brand new Mac’s for your team and all of a sudden you’re getting constant questions about the mousepad. On Mac laptops, the mousepad is a giant square with no separations to designate left and right click buttons.
However, there are, of course, a variety of ways for users to ‘right-click’ on a Mac. Users can hold down CTRL while clicking or they can add a ‘secondary click function’ by navigating System Preferences and selecting Trackpad. However, it should be noted that most modern Mac’s can deploy a right-click simply by clicking the bottom-right corner of the Trackpad.
How can I easily transfer my PC data to my new Mac machine?
Once the switch has been made, a huge challenge for business teams is ensuring that all previous PC data is successfully transferred to the new network of Mac’s.
If a company’s old PC’s are equipped with the Windows Vista Service Pack 2 or any later version of Windows, the file transfer process is very simple. Users simply have to download the iCloud application to the Windows Control Panel.
Then, it’s as simple as logging into the iCloud on the control panel using the new Apple ID associated with a Mac machine. Then, you’ll be able to easily sync all your PC files using the iCloud app and they’ll be automatically accessible on the new Mac. For Windows users who were operating on older versions of Window’s can still transfer files, but will need to use a third-party, cloud-based file sharing solution like Google Drive.
I like the Windows OS – is there any way I can use Windows 10 on my Mac?
For some tech users, coming to understand an entirely new operating system is especially challenging. A brand-new Mac will be no use to a veteran Windows user who can’t get a handle on the new OS.
In these cases, it is, in fact, possible to run Windows 10 on a new Mac. In fact, many experts claim that running Windows operating systems on Mac machines offers a much more stable operational experience. To run Windows on a Mac, however, businesses will need access to a virtual machine like those explained here.
Application Management: Navigating Business Apps After Switching from PC to Mac
Professionals rely on a variety of business applications to draft documents, connect with clients and colleagues and manage productivity. For most, the widespread application base is the Microsoft Office suite which includes Word, Excel, PowerPoint, Outlook etc. Luckily, for Office fans, Mac is equipped to support Office 365 subscriptions. Even better? The Mac-based Office apps function nearly identically to the Windows counterparts.
For most, sticking with what you know is the smartest option. However, for those looking to make a complete departure from Microsoft, there Apple offers its own collection of applications, called iWork. Check out some of the leading Mac apps below:
Pages
Pages is Apple’s equivalent to Word and it offers a variety of the same easy-to-use documentation features. The app also includes a variety of dynamic and eye-catching templates that help business drafts stand out.
Numbers
Numbers is Apple’s answer to Excel. Spreadsheets are a critical resource for business operations in any industry. Numbers tries to improve on the mundane Excel format by including colorful tabs and easy to understand features, making it a much less intimidating interface to use.
Keynote
Almost everyone who has worked in a professional setting has created or watched a PowerPoint presentation. Apple’s equivalent is called Keynote and helps users create appealing and professional presentations, with easy-to-use themes and dynamic transitions between slides.
Mail
Mail is the adequately named answer to Microsoft’s Outlook mail. The built-in mail app is straightforward, easy-to-use and sits readily available on the machine’s desktop.
There are also huge benefits to taking advantage of Apple’s dynamic and optimized photo and video-editing apps in more creative industries. Add the ability to collaborate with others, using cross-platform compatibility, and iWork becomes serious competition for Microsoft Office in the pursuit of creating a productivity powerhouse for businesses.
If you’ve decided to make the switch from Windows to Mac, that’s great! Keep the above considerations in mind and you should have nothing but smooth sailing. No matter what your reasons are for switching, Mac devices and operating systems bring a variety of benefits for the most dynamic and busy business professionals.
by Felicien | Nov 10, 2017 | Education
Unpredictable weather patterns are making it more and more difficult for business owners to feel confident in their business continuity strategies. From snow-storms and flash-flooding to tornadoes, hurricanes, and wildfires, the wrath of Mother Nature poses a serious threat to continuity, no matter the industry.
Of course, the first and main priority in wicked weather is to make sure your employees and their families are safe and sound. However, once the initial danger has passed, many business owners are faced with figuring out how to keep business moving during inclement weather and the corresponding recovery periods.
First Things First: Get an Inclement Weather Policy in Place
There’s a common misconception that inclement weather policies are for large corporate enterprises with massive workforces. However, planning for the future isn’t something just big business worries about. Small business owners with teams of 50 or less should be proactive with inclement weather plans and policies just as much as the big guys.
Many modern business owners already have strategies in place to make remote business and work-from-home a possibility. However, even for organizations that do 100% of their business on-site, creating strategies for remote-work capabilities in the case of extreme weather isn’t as hard as you’d think.
If you don’t have a policy in place, your company should have a handle on the basics including:
In the case of bad weather, how many employees would be kept from work?
How will you notify your team in the case of an office-closure?
Is it possible for your team members to work from home?
If so, what resources are necessary to help them stay productive?
Are there work devices that can be sent home with employees when extreme weather conditions are pending?
Getting to know the ins and outs of your company’s unique demands and needs will help you create inclement weather policies that keep your team members productive and safe, no matter the forecast.
Working Through the Storm: Strategies for Helping Employees Connect and Work from Home
Once you’ve nailed down the basics, the question becomes: how can I provide what my employees need to stay productive when they can’t get to the office? Check out these top considerations for making work-from-home a breeze:
Figure out your Equipment Needs
When nasty weather moves in and the office shut down, employees expected to work from home will need the devices necessary to do so. Most if not all employees likely have some web-connected device at home, but it’s important to figure these things out ahead of time.
For assurance, it’s a good idea to have a collection of mobile devices – like laptops or tablets – on hand for employees to take home and work on if needed. While many will likely be okay to work on their personal devices, having this emergency stash makes it impossible for business opportunities to be left out in the storm.
Provide a Secure Way to Connect
If your employees are going to work from home during bouts of nasty weather, it’s important that they have a secure way to connect to company networks and access company data.
A Virtual Private Network (VPN) has traditionally been the common way for employees to gain remote access to their business email and files. However, VPNs are often clunky, time-consuming and must be set up on a remote desktop server. Not to mention, if employees are using personal devices while working at home, they may experience technical connection issues with the VPN, slowing productivity even more.
The more modern approach to remote connection is set up secure, cloud-based access and file sharing solutions. Cloud platforms can be accessed safely through a web browser from anywhere and can make it far easier for employees to connect with company data. With these solutions, it doesn’t matter whether an employee is on a laptop, desktop, mobile or tablet — if it has a browser, employees will have the ability to securely access what they need.
Determine the Data That Should be Available
When setting up a home-base in the Cloud, it’s important to understand what company data is most important for employees working remotely. System administrators can set preferences for who has access to what and most Cloud solutions offer ways to track data access and file activity, to keep tabs on access dates, times, users and IP data.
Also, as stated before, Cloud solutions should be implemented with IT security top of mind. That said, they should also be developed in a way that mirrors the way your employees already work. This is essential for streamlining wide-spread access and keeping productivity high through extreme weather conditions.
Manage Client Expectations
Inclement weather creates service obstacles for businesses of all kinds. However, the obstacles are especially challenging for companies that serve widespread geographical locations. It can be hard for a client to understand your company’s weather emergency when it’s 75 and sunny where they are. Regardless of location, be sure to keep your clients in the know when nasty weather hits.
To make sure business stays moving, employees can easily send password-protected links for client access and review. Additionally, business owners can proactively create an online portal where clients can access, review, download or upload important documentation.
Keep Employees Seasonally Informed with Regular Policy Reviews
Finally, a key factor in being prepared for the weather involves regularly revisiting inclement weather policy documents, keeping them posted somewhere centrally accessible for employees, and scheduling regular company-wide policy reviews to ensure all team members are in the loop.
Additionally, your inclement weather policies should have considerations for the various seasons and types of weather that may be experienced. Paying specific attention to the kinds of weather you’re likely to experience in each season and drafting policies to reflect those realities will bring your weather preparation plan full circle.
When it comes down to it, nasty weather can really slow down a company’s momentum. However, there is no need for inclement weather conditions to result in the complete shutdown of your business. Employees can be set up to work from home proactively, so long as a business owner takes the steps to clearly outline inclement weather policies and provide team members with the equipment and programs they need to connect.
Unfortunately, there’s no hardline strategy for predicting the weather and its impacts on communities and businesses. However, there are concrete ways for business owners to stay one step ahead of Mother Nature. Don’t wait for the next blizzard or massive storm to think about your company’s plan for inclement weather.