Blog

February 28th, 2014

ERP_Feb24_AImplementing new business systems is never easy, but the alternative can cause you a lot more pain. Trying to get by with the accounting system that got you started so many years ago may be frugal, but is it wise? ERP (Enterprise Resource Planning) systems have become more affordable and easier to support through cloud options.

There are many ways that your business will benefit from upgrading to modern systems that take advantage of the latest technology. Let’s look at some of the top requirements for businesses today and how ERP solves them.

  1. Need to make decisions fast. With ERP you can deliver reports and dashboards that combine data from every department to your managers no matter where they are.
  2. Highly productive employees. With the high cost of providing benefits to employees, you need to keep them focused on making money, not filling out forms. ERP will automate many of the manual processes that workers now waste precious time doing.
  3. Promote great customer service. It’s never been easier for customers to find a new supplier. ERP connects the information across the organization so that you can answer your customer’s questions fast and accurately, every time.
  4. Support multiple distribution channels. To expand your reach in the market, you need to support internet, channel and direct distribution. ERP will connect all your systems to central inventory and supply chain to expand your horizons.
  5. Accurately match costs with income sources. When you take on new projects, you need to know whether you are really making a profit on them. ERP will allow you to track all the costs related to projects or jobs to ensure profitable engagements.
  6. Support remote employees. Employees need to be productive in the field or at home. ERP systems will allow remote workers to access and enter information via the web, wherever they are working.
  7. Manage industry-specific requirements. Your business is unique and accounting systems generally aren’t. With ERP, you can build workflows and reports that simplify the specialized requirements of your industry.
  8. Simplify compliance. Meeting the reporting requirements like IFRS, Sarbanes-Oxley and others can take a huge manual effort. Instead of spending weeks and months combining spreadsheets, your accounting team can use ERP to focus on more productive tasks.
  9. Support global commerce. If you are doing business across boundaries, you need ERP to help you translate currencies and support workers in other countries.
  10. Attract young workers. Young people have no patience doing manual tasks they know can be simplified with technology. With ERP you can simplify work for everyone and show younger workers you will stay relevant in a changing world.
Replacing your accounting system with updated ERP system will help every department in your business. With the affordability of ERP and the ease of supporting applications through the cloud, the reasons to keep your old accounting system going are dwindling. Let’s talk about your growing options with ERP.
Published with permission from TechAdvisory.org. Source.

February 28th, 2014

BI_Feb24_CIn order for a business to get more out of their existing and future data, many are relying on Business Intelligence (BI) solutions. If you are looking into a BI system for your business you will likely come across data related terms that are important to know about. Three of the most commonly asked about are data mining, data warehouse, and data mart.

What is a data warehouse?

The concept of a data warehouse is an interesting one and also a difficult one to define and pin down largely because it can cover such a broad area. The most concise definition we can give is that it is a database that integrates data from many different locations and databases into one consolidated database.

Data warehouses store both current and historical data, and rarely contain unique data. Instead, they aggregate data from other sources in order to make this more accessible. They might store important information from sales, marketing, ERP, customer interactions, and any form of database in order to quickly generate BI related reports.

The name undoubtedly conjures up the idea of a large warehouse-like building storing infinite amounts of data. However, most data warehouses are actually tables which are created by taking data from various sources and cleaning it up so that relevant data is stored in the warehouse in a way that makes it easier to reach when needed.

What is a data mart?

A data mart is a smaller data warehouse that stores data. These are based on a specific area or business function e.g., finance or marketing, etc. In fact, most modern data warehouses are actually made up of a series of smaller data marts.

The key difference between a data mart and a data warehouse is that data marts are usually smaller, focusing on one specific area, while a data warehouse covers the whole organization.

What is data mining?

When talking about Business Intelligence, many experts will refer to data mining. This is the act of analyzing data in order to identify patterns. The data that is mined can then be transformed into useable information. Many companies store this mined data in databases, a data warehouse, or a data mart.

Want to learn more about these terms and how your company can benefit from a BI solution? Contact us today.

Published with permission from TechAdvisory.org. Source.

February 26th, 2014

Office365_Feb24_CMicrosoft Excel continues to be a desktop favorite even in modern business. With its recent introduction into the world of Web apps, it has made productivity-on-the-go possible. The extension of Excel’s reliable functionality to the Web is indeed a great addition to a complete Excel 365 experience. If you are planning to use this program, there are a few tips it's worthwhile knowing about first.

Thumbs up for the ease of familiarity

The basic shortcut keys are pretty much the same across all Microsoft applications, regardless of the platform. If you’re already familiar with the shortcut keys, the Excel Web App is going to be a breeze for you.

Those who need a refresher will find some helpful shortcuts as we go along. Keep in mind that when collaborating on a file, you need to check the share settings and make sure that you have permission to edit that workbook or many of the shortcuts may not work.

Commonly-used shortcuts

The familiar Ctrl + C and Ctrl + V still work for copy and paste respectively. While Ctrl + Z and Ctrl + Y work for undo and redo. Ctrl + X moves an item from one cell to another.

Remember that when you copy the contents of a cell and paste it into another cell within the same workbook, the characteristics or formatting of the source will also be copied into the destination cell. Whereas, if you paste an item from outside the Excel Web App, the item is inserted as plain text and you will have to apply formatting.

Tables and hyperlinks can also be inserted into Excel. Ctrl + K inserts a hyperlink, while Ctrl + T inserts a table.

The arrow keys remain the same, allowing you to move from cell to cell e.g., right, left, up or down.

There is also no change with the formatting shortcuts such as Ctrl + B for Bold, Ctrl + I for Italics, and Ctrl + U for Underline.

A tip for spreadsheet presenters

If your spreadsheet involves charts and visuals, you might want to consider using the Excel Web App version as the visuals appear sharper. While there isn't a huge difference, even a little boost in visuals can make a huge difference to the overall effectiveness of a presentation.

Using the Web versions of Office programs is a great way to stay on top of your game beyond office hours, as workload necessitates. What can Excel and Office 365 do for your productivity? Get in touch and we'll show you.

Published with permission from TechAdvisory.org. Source.

February 20th, 2014

Security_Feb17_COne of the most common threats to business and individual systems is phishing. This form of hacking is well known and many users have educated themselves on the more traditional methods used by hackers. This has forced hackers to come up with different phishing techniques, and one of the methods that is causing problems is spear phishing.

What is spear phishing?

Spear phishing is a specialized type of phishing that instead of targeting a mass number of users, as normal phishing attempts, targets specific individuals or groups of individuals with a commonality e.g., an office.

Generally a hacker will first pick a target and then try to learn more about the related people. This could include visiting a website to see what a company does, who they work with, and even the staff. Or they could try hacking a server in order to get information.

Once they have some sort of information, usually a name, position, address, and even information on subscriptions, the hacker will develop an email that looks similar to one that another organization might send e.g., a bank. Some hackers have been known to create fake email accounts and pose as a victim's friend, sending emails from a fake account.

These emails are often similar to official correspondence and will always use personal information such as addressing the email to you directly instead of the usual 'dear sir or madam'. The majority of these emails will request some sort of information or talk about an urgent problem.

Somewhere in the email will be a link to the sender's website which will look almost exactly like the real thing. The site will usually ask you to input personal information e.g., an account number, name, address, or even passwords. If you went ahead and followed this request then this information would be captured by the hacker.

What happens if you are speared?

From previous attack cases and reports, the majority of spear phishing attacks are finance related, in that the hacker wants to gain access to a bank account or credit card. Other cases include hackers posing as help desk agents looking to gain access to business systems.

Should someone fall for this tactic, they will often see personal information captured and accounts drained or even their whole identity stolen. Some spear phishing attacks aren't after your identity or money, instead clicking on the link in the email will install malicious software onto a user's system.

We are actually seeing spear phishing being used increasingly by hackers as a method to gain access to business systems. In other words, spear phishing has become a great way for people to steal trade secrets or sensitive business data.

How do I avoid phishing?

Like most other types of phishing related emails, spear phishing attempts can be easy to block. Here are five tips on how you can avoid falling victim to them.
  • Know the basic rule of business communication - There are many basic rules of communication, but the most important one you should be aware of is that the majority of large organizations, like banks, social media platforms, etc., will not send you emails requesting personal information. If you receive an email from say PayPal asking you to click a link to verify your personal information and password, it's fake and you should delete it.
  • Look carefully at all emails - Many spear phishing emails originate in countries where English is not the main language. There will likely be a spelling mistake or odd wording in the emails, or even the sender's email address. You should look out for this, and if you spot errors then delete the email immediately.
  • Verify before you click - Some emails do have links in them, you can't avoid this. That being said, it is never a good idea to click on these without being sure. If you are unsure, phone the sender and ask. Should the email have a phone number, don't call it. Instead look for a number on a website or previous physical correspondence.
  • Never give personal information out over email - To many this is just plain common sense - you wouldn't give your personal information out to anyone on the street, so why give it out to anyone online? If the sender requires personal information try calling them or even going into their business to provide it.
  • Share only essential information - When signing up for new accounts online, there are fields that are required and others that are optional. Only share required information. This limits how much a hacker can get access to, and could actually tip you off. e.g., they send you an email addressed to Betty D, when your last name is Doe.
  • Keep your eyes out for the latest scams - Pay attention to security websites like those run by the major antivirus providers, or contact us. These sites all have blogs where they post the latest in security threats and more, and keeping up-to-date can go a long way in helping you to spot threats.
If you are looking to learn more about spear phishing or any other type of malware and security threat, get in touch.
Published with permission from TechAdvisory.org. Source.

Topic Security
February 20th, 2014

Hardware_Feb17_CNo matter where you look, business are going mobile at an increasing rate and a lot of them are going for the laptops. Considering how handy yet powerful these machines are, who can blame them right? This is exactly the reason why you need to equip yourself with basic knowledge about the device. Knowing its parts will not only help you with maximizing its use, it can also help you with maintenance and doing upgrades.

Let's take a quick look at the five most important parts of every laptop you will hear techies talk about on a regular basis and what they do.

1. Hardware

The hardware is the tangible/physical parts of the equipment. Think about your touchpad, keyboard or basically the body of your laptop and everything contained within. Essentially, every computer part you can touch, or see, is hardware. This includes the device itself and all the physical components that make it up.

2. The motherboard

A motherboard is where you usually find chips, power connectors, and memory slots (among many others). This board contains the components that make the computer work and is usually located in the center of your laptop with all other parts connected to it. It is also sometimes called the system board or MoBo for short.

If you take your laptop apart - something we don't advise doing because it will likely void any and all warranties - you should be able to see the outer components of a motherboard, with the memory and hard drive usually visible. The board will be below these components and you will usually have to dismantle other components to access it. All components, or parts, connected to the board are delicate, so it is best to let a trained professional deal with the board and any repairs.

3. The case

The case or the computer tower is where the laptops/computers inner components are housed. Many retailers will refer to this as the shell or body.

These days most laptop cases are made with a strong plastic or some form of aluminum and the size is usually dependent on the motherboard’s components and the screen. While many manufacturers say that their cases are made of strong aluminium or some other material, many are there to simply house the hardware or take damage, protecting the delicate inner components.

4. The processor

The processor is the laptop’s brain. It works together with the OS (operating system) to control the laptop. An important thing to note about processors is that it produces a lot of heat. This is why fans and cooling devices are in place and usually located at the back or bottom of the laptop.

The processor is among the most important parts of the laptop because it allows the computer to function. It can read the code stored in the memory of the computer and tell the other parts to do what the code states.

5. Memory

The memory in laptop is where data is stored. The data can be stored in either a chip with a short term memory or a drive.

There are two types of memories. The first is RAM - Rapid Access Memory which is where instructions the processor may need in the near future are stored. RAM relies on electricity to store this information and quickly loses any data stored on it without power.

The second type of memory is the Hard Disk. This device, or drive, is where all data is stored including your files and the code for all the programs installed. When in operation, code the processor needs will be copied from the hard disk to the RAM. Hard disks usually have a high amount of storage - averaging at least 500 GB or Gigabytes, while RAM usually has a small amount - averaging 4 to 8 GB.

When looking at the specs, or specifications, of a computer many manufacturers and stores will list a number under memory and another under storage. Memory is RAM, while storage is usually related to the hard disk. That being said, some stores will group both together, so it is a good idea to pay attention to the specs.

You’re time to share!

If you need help with your laptop, be it upgrades, maintenance or perhaps you just need some expert advice, then call us now. We’ll be more than happy to help you.
Published with permission from TechAdvisory.org. Source.

Topic Hardware
February 14th, 2014

ERP_Feb11_AA recent study by Aberdeen Group found that service organizations whose workers serve customers from the field put reduced margins at the top of the current challenges list. Changing customer dynamics and increasing competition followed closely behind.  The good news is that all three of these challenges can be improved when your business management systems are fully integrated with ERP.

Improve scheduling to optimize service tech productivity

By automating the scheduling processes, you can apply rules to manage priorities and best routes to keep service techs working and customers happy. Keep you technicians informed of schedule changes with alerts delivered to their mobile device.

Asking your customers to wait hours for the technician to arrive doesn’t go over too well these days. When field service techs are connected to the back office of the business, the dispatchers in the office can schedule with confidence and notify customers when there will be an unexpected delay.

Put information in the hands of workers to diagnose problems in fewer calls

With full information delivered to a mobile device, technicians can get to work without having to ask customers questions that have already been answered. Access to product specs and parts inventory allows technicians to give customers answers to cost and timing questions on the spot. With complete product service information available through their mobile device, field techs can research the problem and solve the issue on the first call.

Accelerate billing times for faster cash turnaround

For many organizations, bills don’t go out until the service tech has returned to the office and turned in paper work orders. Entering service call information is time consuming and error-prone. When service techs are connected to ERP through mobile devices in the field, you can bill the customer before the truck leaves the driveway.

Monthly maintenance contracts are a popular replacement for expensive annual payments. Can you offer your customers the convenience of automated monthly billing? ERP will allow you to automate the contract billing and collection processes to streamline cash flow.

There are many more ways that connected data – delivered to and from the field – will help your service teams improve profits. Let’s talk about how we can make your service business improve margins and deliver on customer expectations.


Published with permission from TechAdvisory.org. Source.

February 14th, 2014

Security_Feb11_CAs information technology systems get more complex, computer malware also gets stronger and more aggressive. An effective security strategy to protect your computer system from a variety of malware is to employ the concept known as defense in depth. In its simplicity, it involves implementing multiple secured layers wrapped around your computer system.

Just like the human body, a computer system can also be attacked by many viruses that can infect and disrupt computer operations. And what's worse is it doesn’t just disrupt the operations of your computer, but these viruses and other malware can gather sensitive information or even gain access to other private and secured computer systems on the same network.

Although computer viruses aren't deadly, they can spread at an unimaginable rate across your entire computer system, affecting your database, networks and other IT-related sources. You can get these viruses by opening bogus email messages, downloading unknown file attachments, and accidentally clicking ads that pop up your screen. This is why there is a need for a strong and effective security system to protect your network.

One of the tested and proven security strategies used today is defense in depth. This concept focuses on the coordinated and organized use of multiple security countermeasures to keep your database safe from intrusive attackers. Basically, this concept is based on the military principle that a multi-layered and complex defense is more difficult to defeat than a single-barrier protection system.

The defense in depth strategy assures network administrators by working on the basis of the following guiding principles:

Defenses in multiple places

The fact that many viruses can attack the network system from multiple points means that you need to deploy strong defense mechanisms at multiple locations that can endure all types of attacks.

Defense in depth focuses on areas by deploying firewalls and intrusion detection to endure active network attacks and also by providing access control on servers and host machines, to resist distribution attacks from the insiders. This multi-layered defense also protects local and area-wide communication networks from denial of service attacks.

Multiple layered defense

Defense in depth is an extremely effective countermeasure strategy, because it deploys multiple layered defense mechanisms between the attacker and its target. Each layer of the defense has a unique mechanism to withstand the virus attacks. Furthermore, you need to make sure that each layer has both detective and protective measures to ensure the security of the network.

The reason for wrapping the network with multiple layers of defense is because a single line of defense may be flawed. And the most certain way to protect your system from any attacks is to employ a series of different defenses that can be deployed to cover the gaps in the other defenses. Malware scanners, firewalls, intrusion detection systems, biometric verification and local storage encryption tools can individually serve to protect your IT resources in a way others cannot.

Perhaps the final layer of defense should be educating your employees not to compromise the integrity of the computer systems with potentially unhealthy computer practices. As much as possible, teach them the dos and don’ts of using the computer, as well as how they can prevent viruses and other computer malware coming in and destroying your system.

If you’re looking to give your computer systems better protection against the harmful elements that the internet can bring, then give us a call now and we’ll have one of our associates take care of you and help defend your business.

Published with permission from TechAdvisory.org. Source.

Topic Security
February 12th, 2014

Office365_Feb10_CMicrosoft Office 365 is an online service developed especially for businesses, to help them consolidate their office software into one perfectly organized cloud platform. This cloud version of Microsoft Office aims to provide a set of top-notch features that cater to the special needs of different business establishments through the acquisition of subscription plans.

What is Office 365?

Office 365 is an online subscription-based suite of Microsoft's popular Office programs. After users pick a subscription plan, they just have to connect online, set up a secured account, download the files they need, and roll on to work. In order to get the most out of Office 365, there are some features you should definitely know about.

Exchange Online

Exchange Online is available as a stand-alone install - you don't need to purchase a full Office 365 subscription - or can be a part of Office 365. It’s a hosted version of Exchange Server, Microsoft's messaging platform, which provides businesses with the essential digital communications they need.

This feature allows businesses to run email, instant messaging, calendars, address tracking, and more. It also allows you to connect to your version of Microsoft Outlook from any Web browser. Furthermore, you can access your email and edit your Outlook based calendars and contacts from your smartphones.

SharePoint Online

SharePoint Online is Microsoft’s new version of document sharing. It's available in many Office 365 subscriptions and allows users to find, analyze, manage, and share information, as well as collaborate on projects.

In addition, SharePoint online offers more social features, such as sharing your timeline in a Facebook-style status post and on your calendars. It has its own version of local syncing of data and HTML-based applications that you can also build or purchase.

Lync Online

Microsoft Lync Online, formerly known as Microsoft Office Communicator, is an instant messaging service that has replaced Windows Messenger for Exchange Server. The advantage of Lync Online is that it allows users, especially business owners, to be collaborative with a multitude of other users in real-time.

Getting everyone to be involved in a conference or meeting is easy because all of your contacts entered in Microsoft Outlook can be synced with Lync.

Office Web Apps

Office Web Apps are simply a Web-based version of the Microsoft Office Productivity Suite. Basic Web-based versions of Office include Word, PowerPoint, Excel and Note.

This feature is free of charge for SkyDrive users and comes with every Office 365 subscription. While it is useful for basic document creation and editing, the Web apps are missing some of the more advanced features of the installed versions.

If you want to know more about Microsoft Office 365 and its existing features, connect with us first.

Published with permission from TechAdvisory.org. Source.

February 12th, 2014

SocialMedia_Feb10_CMarketing is an incredibly important lifeline and function of nearly every business. With successful marketing a company will likely be more successful and able to grow. Nowadays, social media has become a large part of marketing, especially platforms like Twitter. While at first glance, Twitter is easy to use, there is a one big mistake many companies make that can harm the reach of their content and posts.

Social media is an always evolving idea, so what works one day won't necessarily work in the near or foreseeable future. Combine this with the various changes and features of the different social media platforms and it is nearly impossible to master every service.

When it comes to Twitter, one of the most popular features is using @username to bring the tweet to the attention of the user and to tweet about them. When you do this you and the person will be able to see it, along with people who follow that person.

What is the #1 mistake Twitter users make?

The problem is, many people put the @username at the beginning of the tweet. What this does, as we stated above, is only make the tweet visible on your feed, to the user and their followers. Why is this a problem? Well, it comes from how most businesses use Twitter. They use it to share content, e.g., a blog article or a video, etc.; to essentially tweet about the person, not at them. You see this in many tweets, for example, "@microsoft's new blog is great. Read it!"

While you want to share the content with people other than those who created it, putting @user at the front of your tweet actually limits the audience to the person who created the content and their followers - in other words the opposite of what you intend, unless Microsoft is your target audience of course!

How do you avoid mistake tweets?

If you are looking to tweet about someone or the content that user has created, using the @user is still a good idea because it will bring to the content-creator's attention that you are sharing their content. This is a great way to form relationships and even have these individuals and businesses share your content. In turn, this can help increase the potential of your content being seen by a wider audience.

For many tweets it makes sense to put the @username first as it helps make the overall tweet easier to read. The problem is, this will also limit your audience. So, for those who want to have their cake and eat it too, so to speak, add a period before @username e.g.," .@microsoft's new blog post is great. Read it!".

What this does is ensure that the tweet isn't addressed only to the user, but can be seen by everyone.

Looking to learn more about utilizing Twitter or any other social media as a part of your marketing strategy? We have a lot to tweet about and can help you tweet too.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
February 11th, 2014

Security_Feb10_CIt's 2014, and that means that it's an Olympic year. This year the Winter Olympics are being held in Sochi, Russia. As with almost every other Olympics there has been a number of organizational issues to deal with to ensure the Games run smoothly. Unlike other events however, one of this year's big issues is hacking of the computers and phones of attendees and visitors.

Hacking at the Winter Olympics 2014

Well before the Olympics even started in Russia, the Russian government said that they will be surveilling phone and computer communications. Many scoffed at this, writing off the government as being overly ambitious and boasting about a nearly impossible task. The thing is, the Internet in Russia may not be as secure as many believe, being full of hackers. At least according to a report aired on NBC shortly before the games started.

In the report, reporter Richard Engel took new, never opened laptops and mobile devices to Russia and used them. He found that within 24 hours all of the devices had been hacked, exposing the data stored within.

In part of the segment, Engel and a security expert go to a local coffee shop in Moscow and search for Sochi on a mobile device. Almost immediately the device is hacked and malicious software downloaded. Engel notes that the hackers have access to data on the phone along with the ability to record phone calls.

In a follow-up segment, Engel explains a bit more about the laptop issues. When he boots one up and connects to the Internet, hackers are almost immediately snooping around the information, transferring from the machine to the networks. Within a couple of hours, he received a personalized email from a hacker welcoming him to Russia and providing him with some links to interesting websites. Clicking on the link allowed the hackers to access his machine.

One issue is that it hasn't been stated in any reports whether the Russian government is behind this, or if it's hackers out to steal information. While you can be sure that the Russians are monitoring communication during the Winter Olympics, it is highly likely that they are not the ones installing malware on phones, rather it's probably organized crime rings or individual hackers.

I'm not at Sochi so why do I care?

As a business owner half the world away you may be wondering why this news is so important to you, or why you should care. Take a look at any tech-oriented blog or news channel and you will quickly see that the number of attacks on devices, including malware, phishing, spam, etc. is on the rise. It's now likely a matter of when you will be hacked, not if.

Combine this with the fact that many businesses are going global, or doing business with other companies at a big distance. This has caused many people to go mobile and the tools that have allowed this are laptops and smart devices. Because so many people are now working on a laptop, phone or tablet, these devices have become big targets. The main reason for this is that many people simply don't take the same safety precautions they take while on the office or even the home computer.

Hackers know this, so logically they have started going after the easier targets. The news reports concerning Russia highlight this issue and is a warning business owners around the world should be aware of, especially if they are going to be traveling with computers or phones that have sensitive information stored within.

That being said, there are a number of tips you can employ to ensure your data is secure when you go mobile. Here are six:

1. Use cloud services wherever possible

Cloud storage services can be incredibly helpful when traveling. They often require a password to access and are usually more secure than most personal and even some business devices. If you are traveling to an area where you are unsure of the security of the Internet or your devices, you could put your most important data in a trusted cloud storage solution.

This is also a good idea because if your device gets stolen, the data is in the cloud and is recoverable. If you have data just stored locally on your hard drive, and your device is stolen, there is a good chance it's gone forever. For enhanced security, be sure to use a different password for every service.

2. Back up your data before leaving

Speaking of losing data, it is advisable to do a full system backup of all the devices you are taking with you before you leave. This will ensure that if something does happen while you are away, you have a backup of recent data that is recoverable.

3. Secure and update all of your devices

One of the best ways to ensure that your data is secure is to update all of your devices. This means ensuring that the operating systems are up-to-date and any security updates are also installed.

Also, ensure that the programs installed on the devices are updated. This includes the apps on your phone, including the ones that you don't use.

You should also secure your devices by not only having an antivirus and malware scanner but also requiring a password to access your device.

4. Watch where you connect

These days Internet connections are almost everywhere. In many public spaces like airports, coffee shops, restaurants, etc. many of the connections are open, or free to connect to, and don't require a password.

While this may seem great, hackers are known to watch these networks and even hack them, gaining access to every bit of information that goes in and out of the network. When you are traveling, try avoiding connecting to these networks if you can. If you really have to, then be sure not to download anything or log into any accounts that hold private data.

5. Know the risks of where you are going

Before you leave, do a quick search for known Internet security issues in the area you will be visiting. If you find any news or posts about threats you can then take the appropriate steps to secure your system ahead of time.

6. If in doubt, leave it at home

In the NBC report, Engle finishes by telling viewers that if they are at all unsure about the security of their devices, or are worried about their data, they should leave the device at home, or delete the data before going. This is a good piece of advice and maybe instead of deleting data completely, you could move it to a storage device like an external hard drive that you leave behind.

If you are looking to learn more about ensuring the security of your devices while you are away from the office contact us today. We have solutions to help.

Published with permission from TechAdvisory.org. Source.

Topic Security