8 Website Tips Guaranteed To Produce Results

8 Website Tips Guaranteed To Produce Results

Here are eight highly effective guidelines for better website conversions.

When designing buttons — particularly those for landing pages — it’s important to note a few fundamental principles that will boost your click-through rates and make your responses surge. Here are eight highly effective guidelines for better website buttons:

  • Use Contrast in Your Designs: Buttons need to pop off the page and look different from the rest of your content. Choose colors that stand out and look fresh, not dull or flat. Don’t be afraid to use bold, bright, saturated or even unusual colors. Your button text itself should contrast highly with the button colors so it’s super-readable.
  • Maximize Clickability: Buttons should look like buttons — typically, they should be rectangular and have slightly rounded corners. A 3-D look is also recommended, as is incorporating a rollover effect such as a color or depth change when a user rolls over them. Users should recognize buttons immediately when they see them.
  • Maximize Size: While you don’t want buttons that are as large as your content, don’t be afraid to make buttons big or oversized. If a user can’t find the buttons on your page, they might as well not be there at all! Experiment and see how big you can make buttons without them dominating your content. Remember to still leave white space as described below.
  • Add Directional Cues: Use arrows to point directly to your button and/or your call-to-action. Don’t be afraid to put the arrow right on the button itself or extremely close to it. Studies show that the presence of arrows boosts conversions more than their absence.
  • Use the Right Call-to-Action: The text on your button should describe exactly what the button does; some samples could be “Download My Free Tutorial” or “Request a Sample.” Never use a vague, indirect word or phrase like “Click Here” or “Submit.”
  • Add Supporting Information: Extra information that helps the call-to-action or clarifies the purpose of the button should be added either inside the button itself or immediately below it. It can be in smaller type if necessary. Some examples are “Downloads are always free!” or “There’s no obligation to join!”
  • Communicate Urgency: If you don’t communicate a sense of urgency, many people won’t respond to your offer. Instead, add words that convey a quantity or time limitation, such as “Today” or “Now,” to your call-to-action.
  • Incorporate White Space: Just as design elements grab people’s attention, the use of white space makes them stand out. Not enough white space on a page will make content and buttons all flow together so they’re indistinguishable from one another. Make sure there’s enough white space between your content and your buttons and between buttons themselves so each element is evident.

In general, buttons are as important as your content, if not more so, because they’re what a user employs to interact with your page. It’s critical that they’re useful and are appealing to users, so you can generate the outcome that you’re looking for.

Your best source for tips, tricks, and hacks

Computer Network Systems (CompNetSys),is your best source for tips, tricks, and hacks as well as news relating to the latest advances in technology to help you work smarter, not harder.

Call us @ 866.205.8123 or send us an email @ support.staff@compnetsys.com

Disabling SMBv1 – One Defense Against Wanna Cry Ransomware

As part of our ongoing efforts to warn the public about the Wanna Cry ransomware plague that is ravaging computer systems across the globe, the Computer Network Systems (CompNetSys) team is putting together educational articles such as this one to accurately describe ways you can fortify your business IT against the onslaught of pain being wielded by these criminals.

One of the methods of defense against Wanna Cry – suggested by many IT professionals – is the disabling of Server Message Block (SMB)v1 in Windows and Windows Server.

Warning: We do not recommend that you disable SMBv2 or SMBv3. Disable SMBv2 or SMBv3 only as a temporary troubleshooting measure. Do not leave SMBv2 or SMBv3 disabled.

Here are the instructions from Microsoft:

How to enable or disable SMB protocols on the SMB server

Windows 8 and Windows Server 2012

Windows 8 and Windows Server 2012 introduce the new Set-SMBServerConfiguration Windows PowerShell cmdlet. The cmdlet enables you to enable or disable the SMBv1, SMBv2, and SMBv3 protocols on the server component.

Notes When you enable or disable SMBv2 in Windows 8 or in Windows Server 2012, SMBv3 is also enabled or disabled. This behavior occurs because these protocols share the same stack.

You do not have to restart the computer after you run the Set-SMBServerConfiguration cmdlet.

  • To obtain the current state of the SMB server protocol configuration, run the following cmdlet:

Get-SmbServerConfiguration | Select EnableSMB1Protocol, EnableSMB2Protocol

  • To disable SMBv1 on the SMB server, run the following cmdlet:

Set-SmbServerConfiguration -EnableSMB1Protocol $false

  • To disable SMBv2 and SMBv3 on the SMB server, run the following cmdlet:

Set-SmbServerConfiguration -EnableSMB2Protocol $false

  • To enable SMBv1 on the SMB server, run the following cmdlet:

Set-SmbServerConfiguration -EnableSMB1Protocol $true

  • To enable SMBv2 and SMBv3 on the SMB server, run the following cmdlet:

Set-SmbServerConfiguration -EnableSMB2Protocol $true

Windows 7, Windows Server 2008 R2, Windows Vista, and Windows Server 2008

To enable or disable SMB protocols on an SMB Server that is running Windows 7, Windows Server 2008 R2, Windows Vista, or Windows Server 2008, use Windows PowerShell or Registry Editor.

Windows PowerShell 2.0 or a later version of PowerShell

  • To disable SMBv1 on the SMB server, run the following cmdlet:

Set-ItemProperty -Path “HKLM:\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters” SMB1 -Type DWORD -Value 0 -Force

  • To disable SMBv2 and SMBv3 on the SMB server, run the following cmdlet:

Set-ItemProperty -Path “HKLM:\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters” SMB2 -Type DWORD -Value 0 -Force

  • To enable SMBv1 on the SMB server, run the following cmdlet:

Set-ItemProperty -Path “HKLM:\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters” SMB1 -Type DWORD -Value 1 -Force

  • To enable SMBv2 and SMBv3 on the SMB server, run the following cmdlet:

Set-ItemProperty -Path “HKLM:\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters” SMB2 -Type DWORD -Value 1 -Force

Note You must restart the computer after you make these changes.

Registry Editor

Important This article contains information about how to modify the registry. Make sure that you back up the registry before you modify it. Make sure that you know how to restore the registry if a problem occurs. For more information about how to back up, restore, and modify the registry, click the following article number to view the article in the Microsoft Knowledge Base:

322756 How to back up and restore the registry in Windows

To enable or disable SMBv1 on the SMB server, configure the following registry key:

Registry subkey: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\ParametersRegistry entry: SMB1
REG_DWORD: 0 = Disabled
REG_DWORD: 1 = Enabled
Default: 1 = Enabled

To enable or disable SMBv2 on the SMB server, configure the following registry key:

Registry subkey:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\ParametersRegistry entry: SMB2
REG_DWORD: 0 = Disabled
REG_DWORD: 1 = Enabled
Default: 1 = Enabled

How to enable or disable SMB protocols on the SMB client

Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8, and Windows Server 2012

Note When you enable or disable SMBv2 in Windows 8 or in Windows Server 2012, SMBv3 is also enabled or disabled. This behavior occurs because these protocols share the same stack.

  • To disable SMBv1 on the SMB client, run the following commands:

sc.exe config lanmanworkstation depend= bowser/mrxsmb20/nsi
sc.exe config mrxsmb10 start= disabled

  • To enable SMBv1 on the SMB client, run the following commands:

sc.exe config lanmanworkstation depend= bowser/mrxsmb10/mrxsmb20/nsi
sc.exe config mrxsmb10 start= auto

  • To disable SMBv2 and SMBv3 on the SMB client, run the following commands:

sc.exe config lanmanworkstation depend= bowser/mrxsmb10/nsi
sc.exe config mrxsmb20 start= disabled

  • To enable SMBv2 and SMBv3 on the SMB client, run the following commands:

sc.exe config lanmanworkstation depend= bowser/mrxsmb10/mrxsmb20/nsi
sc.exe config mrxsmb20 start= auto

Notes

  • You must run these commands at an elevated command prompt.
  • You must restart the computer after you make these changes.

 

Other important safeguards against Wanna Cry ransomware include backing up all your essential files and applications, running a respected antivirus program, and being careful not to open any emails attachments that are from an unknown source.

Is your business prepared? Our cyber-security professionals are ready to help you fortify your business against this Wanna Cry ransomware onslaught.

Call us now at 866.205.8123 or send and email to support.staff@compnetsys.com for a cyber-security consultation.

Encryption backdoors – necessary or not?

Encryption backdoors – necessary or not?

Over the course of his recently concluded tenure as FBI Director, James Comey has repeatedly called for built-in backdoors to get around encryption on devices such as smartphones and tablets. Citing national security needs, Comey has on many occasions attempted to work with domestic organizations (and most recently, members of the international community) to implement a standard for backdoors.

encryption backdoor

“The ubiquitous default full-disk encryption on devices is affecting now about half of our work,” testified Comey during his testimony for the Clinton email investigation. “First six months of this fiscal year, FBI examiners were presented with over 6,000 devices for which we have a lawful authority search warrant or court order to open and 46 percent of those cases we could not open those devices with any technique. That means half of the devices that we encounter in terrorism cases, in counterintelligence cases, in gang cases, in child pornography cases, cannot be opened with any technique. That is a big problem.”

Encryption is a standard security practice used on millions of devices today, in which data is converted into a code in order to prevent unauthorized access. Comey’s intention is that companies that produce such devices, like Apple and Microsoft, would build a backdoor to allow authorized third parties, in the name of the law, or national security, to bypass encryption without the user’s consent.

The subject of encryption has been shrouded in debate since the FBI took on Apple earlier in 2016 when they needed access to a smartphone they believe contained information pertinent to their investigation of the San Bernardino shooting. In an effort to gain access to the terrorist’s smartphone, the FBI wanted Apple to create a backdoor system that would allow them to bypass any type of encryption at any time. The argument was that a “golden key” like this would allow the “good guys” to always have a way to make sure the “bad guys” weren’t hiding anything. Apple refused and ultimately won the day, both in terms of its own liability and in the court of public perception.

Even then, Comey didn’t give up. Even as recently as March of this year, Comey suggested the idea of an International Encryption Backdoor Partnership in the global community.

“I could imagine a community of nations committed to the rule of law developing a set of norms, a framework, for when government access is appropriate,” said Comey at the University of Texas during a national security symposium.

Despite the fact that Comey is no longer the FBI Director, the debate over the need for built-in backdoors around device encryption still stands – does it threaten and undermine personal privacy rights? Or is it ultimately necessary in order to uphold national security?

As Comey has stated on numerous occasions, encryption is a serious obstruction of justice when it comes to investigating terrorists and criminals that have potentially used encrypted devices to communicate with other contacts and store vital data. With a backdoor in place, the FBI could simply circumvent the encryption and access the data in question, potentially speeding up the investigation, making better use of government time and resources, and in the most dire of circumstances, saving lives.

However, that’s a lot of “ifs”. By the very nature of the situation, the FBI will never truly know whether they’re bypassing encryption to get useable data or not; it’s only once they’ve gotten in that they’ll know whether using the backdoor was worth it. At best, the implementation of backdoors isn’t a guarantee for stronger national security, and effectivity on the part of the FBI – it’s an educated guess.

Furthermore, the fact of the matter is that it’s not in the interest of companies like Apple to willingly compromise their user’s security (even when legally compelled to do so, as was the case with the San Bernardino shooting), and so there likely won’t be an initiative to implement backdoors on the developer side.

So what’s at stake if backdoors were to be implemented across devices?

If companies like Apple and Microsoft were to create built-in back doors for the FBI to bypass encryption, it would fundamentally weaken personal security across the nation. Many watchdogs and personal users involved in the debate worry about two key points: where the FBI will draw the line when it comes to using the backdoor on a case by case basis; and how likely it is that cybercriminals could steal the backdoor access from the FBI once it’s been created.

That said, if a backdoor in your device (and everyone else’s) would speed up investigations, prevent attacks, protect innocents, and ultimately save lives, some would argue that the infringement on personal security would be justified.

Given that Comey is no longer director of the FBI, for now, the debate will continue. What do you think? Are backdoors justifiable in the name of the judicial process and homeland security? Or will their abuse by government organizations and hackers be inevitable?

Benefits of Office 365’s Email Archiving Features

Benefits of Office 365’s Email Archiving Features

Outlook’s new feature allows you to hold onto deleted emails longer than ever. By setting a later purge date, you can hold onto important communications without cluttering your email folders.  

Office 365 Archiving

Most people have likely suffered the heartache of deleting an important email. You search and search again through your inbox and the communication is nowhere to be found. Although some providers archive emails automatically instead of deleting them forever, the emails are eventually purged from the server. With Outlook’s new feature you can hold onto emails longer and not worry about those emails disappearing for good a short month later.

Why Save Deleted Emails?

For each opened email, you have to make a clutch decision: archive or delete the communication? In some cases, like if you receive any spam, deleting the offending email is a no brainer. However, emails from contacts are often different. For instance, if a colleague sends a link to a website you need, you may decide to delete the email after finding the URL. However, a couple months down the road you may wish to bring up the email. If the email has yet to be purged, this saves you the headache of having to get in touch with your coworker to ask for him or her to resend the information. Another case for not prematurely deleting emails is to retrieve contact information. If you accidentally delete an email without copying contact details, you may have a hard time tracking down the sender to get back in touch.

Office 365 Presets

In most cases, deleted Outlook emails are automatically set to purge from the system after 30 days. For onsite Outlook inboxes run on an Exchange server, an administrator is responsible for setting the length of time for emails to stay in the Deleted folder. This timeframe is managed through the system’s Messaging Records Management feature. The default setting is for emails older than 30 days to get moved to a recoverable subfolder. The subfolder holds onto the emails for 15 days before completely removing them from the system. Onsite Exchange users were able to change this default setting in the past, but Office 365 administrators were stuck with losing emails permanently after 30 days. Luckily, the retention policy is now changed for Office 365 and administrators have the option for allowing the purge to take place a maximum of 24,855 days in the future. The date used by the system is the timestamp of the email or the last time the message was edited.

Don’t worry about any of these settings getting rid of your archived items. Once you save an email to a particular folder, the email can only be manually deleted from the server. Keep in mind there is a setting to delete expired items in Outlook within your Office settings. For instance, emails in your inbox have a default aging period of six months while outbox emails age after three months.

If you don’t have any system recovery options in place, prematurely purging Outlook emails can be disastrous. Make adjustments to your purge settings to have a holding place for emails you’re unsure if you should permanently delete or not.

The 5 Biggest Cybersecurity Risks & How to Protect Your Business from Them

At nearly $1 Trillion in earnings a year, the cybercrime business is now at record proportions. Hackers make big money from stolen data. Please, don’t let it it be your data.

In case you missed the news last week a massive ransomware attack called WannaCry shut down work at 16 hospitals across the United Kingdom and is still spreading accross the USA.

Download our free Ebook to learn more about the 5 biggest cybersecurity risks you must be aware of TODAY!

Download our free Ebook to learn more about 5 biggest cybersecurity risks you must be aware of TODAY!

<!-- Note :<!-- [et_pb_line_break_holder] --> - You can modify the font style and form style to suit your website. <!-- [et_pb_line_break_holder] --> - Code lines with comments “Do not remove this code” are required for the form to work properly, make sure that you do not remove these lines of code. <!-- [et_pb_line_break_holder] --> - The Mandatory check script can modified as to suit your business needs. <!-- [et_pb_line_break_holder] --> - It is important that you test the modified form before going live.--><!-- [et_pb_line_break_holder] --><div id='crmWebToEntityForm' style='width:600px;margin:auto;'><!-- [et_pb_line_break_holder] --> <META HTTP-EQUIV ='content-type' CONTENT='text/html;charset=UTF-8'><!-- [et_pb_line_break_holder] --> <form action='https://crm.zoho.com/crm/WebToLeadForm' name=WebToLeads2287140000000445009 method='POST' onSubmit='javascript:document.charset="UTF-8"; return checkMandatory()' accept-charset='UTF-8'><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --> <!-- Do not remove this code. --><!-- [et_pb_line_break_holder] --> <input type='text' style='display:none;' name='xnQsjsdp' value='fb8a45dfc98d91120a8fd5e90cf97ce092cbc5eb10ed77b22d91f6c7ad49baf6'/><!-- [et_pb_line_break_holder] --> <input type='hidden' name='zc_gad' id='zc_gad' value=''/><!-- [et_pb_line_break_holder] --> <input type='text' style='display:none;' name='xmIwtLD' value='e145708d49be7419b4da42b3289786a5c33dc6856f931ab958d49885cc7e7eb9'/><!-- [et_pb_line_break_holder] --> <input type='text' style='display:none;' name='actionType' value='TGVhZHM='/><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --> <input type='text' style='display:none;' name='returnURL' value='https://s3-us-west-2.amazonaws.com/content-delivery-ap/ebooks/ebook_Cybersecurity_cns.pdf' /> <!-- [et_pb_line_break_holder] --> <!-- Do not remove this code. --><!-- [et_pb_line_break_holder] --> <style><!-- [et_pb_line_break_holder] --> tr , td { <!-- [et_pb_line_break_holder] --> padding:6px;<!-- [et_pb_line_break_holder] --> border-spacing:0px;<!-- [et_pb_line_break_holder] --> border-width:0px;<!-- [et_pb_line_break_holder] --> }<!-- [et_pb_line_break_holder] --> </style><!-- [et_pb_line_break_holder] --> <table style='width:600px;background-color:white;color:black'><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --> <tr><td colspan='2' style='text-align:left;color:black;font-family:Arial;font-size:14px;'><strong>Leave us some basic information to claim your free eBook</strong></td></tr><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --> <tr><td style='nowrap:nowrap;text-align:left;font-size:12px;font-family:Arial;width:200px;'>First Name<span style='color:red;'>*</span></td><td style='width:250px;' ><input type='text' style='width:250px;' maxlength='40' name='First Name' /></td></tr><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --> <tr><td style='nowrap:nowrap;text-align:left;font-size:12px;font-family:Arial;width:200px;'>Last Name<span style='color:red;'>*</span></td><td style='width:250px;' ><input type='text' style='width:250px;' maxlength='80' name='Last Name' /></td></tr><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --> <tr><td style='nowrap:nowrap;text-align:left;font-size:12px;font-family:Arial;width:200px;'>Company<span style='color:red;'>*</span></td><td style='width:250px;' ><input type='text' style='width:250px;' maxlength='100' name='Company' /></td></tr><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --> <tr><td style='nowrap:nowrap;text-align:left;font-size:12px;font-family:Arial;width:200px;'>Email<span style='color:red;'>*</span></td><td style='width:250px;' ><input type='text' style='width:250px;' maxlength='100' name='Email' /></td></tr><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --> <tr style='display:none;' ><td style='nowrap:nowrap;text-align:left;font-size:12px;font-family:Arial;width:50%'>Description </td><td> <textarea name='Description' maxlength='1000' style='width:250px;'>5 biggest cyber security </textarea></tr><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --> <tr><td colspan='2' style='text-align:center; padding-top:15px;'><!-- [et_pb_line_break_holder] --> <input style='font-size:12px;color:#131307' type='submit' value='Download' /><!-- [et_pb_line_break_holder] --> <input type='reset' style='font-size:12px;color:#131307' value='Reset' /><!-- [et_pb_line_break_holder] --> </td><!-- [et_pb_line_break_holder] --> </tr><!-- [et_pb_line_break_holder] --> </table><!-- [et_pb_line_break_holder] --> <script><!-- [et_pb_line_break_holder] --> var mndFileds=new Array('Company','First Name','Last Name','Email');<!-- [et_pb_line_break_holder] --> var fldLangVal=new Array('Company','First Name','Last Name','Email');<!-- [et_pb_line_break_holder] --> var name='';<!-- [et_pb_line_break_holder] --> var email='';<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --> function checkMandatory() {<!-- [et_pb_line_break_holder] --> for(i=0;i<mndFileds.length;i++) {<!-- [et_pb_line_break_holder] --> var fieldObj=document.forms['WebToLeads2287140000000445009'][mndFileds[i]];<!-- [et_pb_line_break_holder] --> if(fieldObj) {<!-- [et_pb_line_break_holder] --> if (((fieldObj.value).replace(/^\s+|\s+$/g, '')).length==0) {<!-- [et_pb_line_break_holder] --> if(fieldObj.type =='file')<!-- [et_pb_line_break_holder] --> { <!-- [et_pb_line_break_holder] --> alert('Please select a file to upload.'); <!-- [et_pb_line_break_holder] --> fieldObj.focus(); <!-- [et_pb_line_break_holder] --> return false;<!-- [et_pb_line_break_holder] --> } <!-- [et_pb_line_break_holder] --> alert(fldLangVal[i] +' cannot be empty.'); <!-- [et_pb_line_break_holder] --> fieldObj.focus();<!-- [et_pb_line_break_holder] --> return false;<!-- [et_pb_line_break_holder] --> } else if(fieldObj.nodeName=='SELECT') {<!-- [et_pb_line_break_holder] --> if(fieldObj.options[fieldObj.selectedIndex].value=='-None-') {<!-- [et_pb_line_break_holder] --> alert(fldLangVal[i] +' cannot be none.'); <!-- [et_pb_line_break_holder] --> fieldObj.focus();<!-- [et_pb_line_break_holder] --> return false;<!-- [et_pb_line_break_holder] --> }<!-- [et_pb_line_break_holder] --> } else if(fieldObj.type =='checkbox'){<!-- [et_pb_line_break_holder] --> if(fieldObj.checked == false){<!-- [et_pb_line_break_holder] --> alert('Please accept '+fldLangVal[i]);<!-- [et_pb_line_break_holder] --> fieldObj.focus();<!-- [et_pb_line_break_holder] --> return false;<!-- [et_pb_line_break_holder] --> } <!-- [et_pb_line_break_holder] --> } <!-- [et_pb_line_break_holder] --> try {<!-- [et_pb_line_break_holder] --> if(fieldObj.name == 'Last Name') {<!-- [et_pb_line_break_holder] --> name = fieldObj.value;<!-- [et_pb_line_break_holder] --> }<!-- [et_pb_line_break_holder] --> } catch (e) {}<!-- [et_pb_line_break_holder] --> }<!-- [et_pb_line_break_holder] --> }<!-- [et_pb_line_break_holder] --> }<!-- [et_pb_line_break_holder] --> <!-- [et_pb_line_break_holder] --></script><!-- [et_pb_line_break_holder] --> </form><!-- [et_pb_line_break_holder] --></div>
5 Great Reasons to Move to Microsoft Bookings

5 Great Reasons to Move to Microsoft Bookings

Let your customers schedule and manage appointments online with Microsoft Bookings.

If your business involves scheduling appointments with customers, you need to give the Microsoft Bookings service a serious look. This online service, which is part of Office 365, simplifies the process of setting and managing appointments with customers. It’s ideal for businesses such as medical offices, law firms, consultants, advisors, auto shops, hair salons, or anyone who provides services on an appointment basis. Customers can set appointments themselves or you can do it for them.

Bookings has 3 primary components:

  • An online bookings page where your customers can schedule appointments with specific staff members. This page can be used as a stand-alone page or embedded in your website and works on desktop and mobile devices.
  • An online backend where you can view and manage appointments, set a staff list and schedules, specify your services and pricing, record customer preferences, and customize how the service works.
  • A mobile app you can use to view and manage bookings and access customer information from anywhere you can get an internet connection.

With Bookings, you can efficiently:

  • Bring in Business 24/7 – You get a customizable public web page your customers can use to book appointments around the clock.
  • Put an End to Phone Tag – Customers can view available times online and book the slot that’s most convenient for them. Customers who prefer to call can do so, and you can enter their information manually. Either way, confirmations are sent immediately and automatically.
  • Reduce No-Shows – Send automated appointment reminders to customers, on the schedule you define, with date, time, and directions. You can set the system up to remind staff members automatically too.
  • Offer Self-service Rescheduling and Cancellations – It’s easy for customers to change or cancel an appointment. All they have to do is click the link contained in the appointment confirmation email. You can control how much advance notice is required for cancellations.
  • Manage Bookings on the Go – With the mobile app, you can add or view appointments and access or change staff and scheduling info when you’re away from the office. You can also view customer information and call or text customers directly from your mobile device.

How it Works

Bookings appointments can be made two different ways: customers can schedule an appointment themselves using the online booking page or staff can manually enter appointments. To make an appointment, the customer first selects the service they want. Then, based on the availability schedule you created, they can choose a day and time and enter their contact information to book the appointment.

As soon as the appointment is submitted, the customer is sent an email confirmation notice. The notice contains details of the appointment and a link for directions. It also includes a link the customer can use to change or cancel the appointment.

At the same time, the date is automatically added to your calendar or your staff’s calendar. Bookings work with Outlook calendar and Google calendar. Your customers won’t see your linked business calendars; they’ll only see the Bookings calendar you publish online.

The configuration is highly customizable and easy to configure. To set it up, you simply:

  1. Enter your business information.
  2. Set your scheduling policies, such as length of appointments, acceptable cancellation times, and automatic notifications.
  3. Define your service offerings, including service name, description, location, and pricing. You can also add internal notes about the service.
  4. Create your staff list.
  5. Set employee working hours.
  6. Schedule business closures for vacations or other reasons.
  7. Publish your booking page.

Bookings is available to Microsoft customers who have an Office 365 Business Premium subscription. The Microsoft Bookings mobile app is available in the Itunes and Google Play app stores.

For more information on Microsoft Bookings or help getting started, contact Computer Network Systems today at 1.866.205.8123 or support.staff@compnetsys.com

Your best source for tips, tricks, and hacks

Computer Network Systems (CompNetSys),is your best source for tips, tricks, and hacks as well as news relating to the latest advances in technology to help you work smarter, not harder.

Call us @ 866.205.8123 or send us an email @ support.staff@compnetsys.com