Blog

November 13th, 2014

Security_Nov10_CLast year saw a number of highly publicized security threats that many companies struggled to deal with. One of those was some nasty malware called Cryptolocker, which held your files for ransom. While this has now largely been dealt with, news is surfacing of a second version - called CryptoWall - that has begun to infect users.

What is Crypto malware?

Crypto malware is a type of trojan horse that when installed onto computers or devices, holds the data and system hostage. This is done by locking valuable or important files with a strong encryption. You then see a pop-up open informing you that you have a set amount of time to pay for a key which will unlock the encryption. If you don't pay before the deadline, your files are deleted.

When this malware surfaced last year, many users were understandably more than a little worried and took strong precautions to ensure they did not get infected. Despite these efforts, it really didn't go away until earlier this year, when security experts introduced a number of online portals that can un-encrypt files affected by Cryptolocker, essentially neutralizing the threat, until now that is. A recently updated version is threatening users once again.

Cryptolocker 2.0, aka. CryptoWall

Possibly because of efforts by security firms to neutralize the Cryptolocker threat, the various developers of the malware have come back with an improved version, CryptoWall and it is a threat that all businesses should be aware of.

With CryptoWall, the transmission and infection methods remain the same as they did with the first version: It is most commonly found in zipped folders and PDF files sent over email. Most emails with the malware are disguised as invoices, bills, complaints, and other business messages that we are likely to open.

The developers did however make some "improvements" to the malware that make it more difficult to deal with for most users. These changes include:

  • Unique IDs are used for payment: These are addresses used to verify that the payment is unique and from one person only. If the address is used by another user, payment will now be rejected. This is different from the first version where one person who paid could share the unlock code with other infected users.
  • CryptoWall can securely delete files: In the older version of this threat, files were deleted if the ransom wasn't paid, but they could be recovered easily. In the new version the encryption has increased security which ensures the file is deleted. This leaves you with either the option of paying the ransom or retrieving the file from a backup.
  • Payment servers can't be blocked: With CryptoLocker, when authorities and security experts found the addresses of the servers that accepted payments they were able to add these to blacklists, thus ensuring no traffic would come from, or go to, these servers again. Essentially, this made it impossible for the malware to actually work. Now, it has been found that the developers are using their own servers and gateways which essentially makes them much, much more difficult to find and ban.

How do I prevent my systems and devices from being infected?

Unlike other viruses and malware, CryptoWall doesn't go after passwords or account names, so the usual changing of your passwords won't really help. The best ways to prevent this from getting onto your systems is:
  • Don't open any suspicious attachments - Look at each and every email attachment that comes into your inbox. If you spot anything that looks odd, such as say a spelling mistake in the name, or a long string of characters together, then it is best to avoid opening it.
  • Don't open emails from unknown sources - Be extra careful about emails from unknown sources, especially ones that say they provide business oriented information e.g., bank statements from banks you don't have an account with or bills from a utilities company you don't use. Chances are high that they contain some form of malware.
Should your files be attacked and encrypted by this malware, then the first thing you should do is to contact us. We can work with you to help find a solution that will not end up in you having to pay the ransom to recover your files.

If you are looking to learn more about CryptoWall malware and how to boost your security and protect your data and systems, then we could you your first line of tech defence.

Published with permission from TechAdvisory.org. Source.

Topic Security
November 12th, 2014

Productivity_Nov10_CAs a business owner or manager, you likely send out a large number of emails each day. A certain percentage of your emails are probably sent to other colleagues, with the idea that they then create a message to send to a third party on your behalf. One way to ensure that the message gets through, while avoiding too much back and forth communication between you and your colleague, is to pre-draft the email.

What exactly is a pre-draft?

The idea behind pre-drafting an email message is that it helps to reduce the amount of back and forth between two parties when one of the parties is contacting a third party. If you have ever had an employee draft a message that came from you then you are likely well aware of the number of emails that can go back and forth before the email actually goes out.

Essentially a pre-draft is a message included in the original message that is to be sent along to a third party. When you include a draft message, the person who will be sending the message can then just cut and paste the content, personalize it, maybe tweak a sentence here or there, and then send it along.

How do I create one?

If you are currently working on an email message that will be sent by another employee on your behalf, try to come up with the outline and basic message yourself. It's best to clearly mark this message in the original email by using a flag like: "Message to send", and changing the actual message to another font or color.

Because most of these messages will be personalized, include placeholder text where your staff member can personalize the message. For example, To . This not only makes it easier to spot areas that need to be personalized, it also means messages can be sent out quickly and easily.

When is this useful?

To be honest, pre-drafting won't work for every type of email you send. But, there are some situations when this comes in handy, including:
  • When you are asked to provide a testimonial on a service. You can write a basic testimonial with areas for customization.
  • When you need to send follow up emails connected to a recently sent email campaign or message. You can draft a basic follow up message that can then be customized as your employees see fit.
  • When you want to post something on numerous social media sites. You can simply write the post once, then provide spots to customize based on the network.
  • Introductions and references. If you have been asked to provide a reference or an introduction, then draft a standard message which can then be changed as needed.
If you mark these emails as a pre-draft, or place them in a pre-draft folder, they can then be quickly found and modified in the future.

Looking to learn more about increasing productivity in your business? Contact us today to see how our systems can help.

Published with permission from TechAdvisory.org. Source.

Topic Productivity
November 12th, 2014

BusinessValue_Nov10_CBusinesses in different industries often have unique needs when it comes to the technical systems they integrate. One system however is universal in that every business needs it: The phone system. If your business is looking for a new communications set-up you will quickly find a wealth of options out there. Here are tips you can follow to make sure that you get the best system for your business.

1. Know the types of systems out there

Phone systems, as with many other types of technology, have evolved and changed drastically from the traditional phones that we are all familiar with. As a result, it pays to be aware of the four main types of phone systems available for small to medium businesses:
  • Key systems - These systems are commonly found in many older small businesses as they were designed for up to 40 users. Typically, a Key system offers businesses basic features like hold, line switching, line management, etc.
  • PBX - Private Branch Exchange, is private phone networking technology that enables businesses to manage up to hundreds of phone lines and numbers. PBX is usually employed by larger businesses who need multiple phone lines and the ability to network offices together.
  • Hosted PBX - These are PBX systems that are managed and hosted by a provider. The system itself is usually housed offsite, which means less up-front investment for the company.
  • Centrex - These are specific business features and packages developed for your business by a major telecommunications provider which are usually added onto your monthly phone bill.
Generally speaking, these four types of phone systems are available in two ways:
  1. Analog - Traditional landline phone systems offered by phone companies, commonly referred to as PSTN (Public Switched Telephone Network). Analog is familiar to many business owners as it uses existing lines strung by telephone companies.
  2. Digital - Newer phone systems that use network connections to transmit voice communication. The most common of these systems is VoIP (Voice over Internet Protocol).
While there are four main systems, the increasingly popular adoption of digital systems like VoIP has led to Key and PBX systems essentially merging together into one platform. Some providers however do offer scaled down versions of PBX over network connections that they refer to as Key systems.

2. Consider these four questions

As you are looking for a new system? If so, it might be a good idea to ask yourself the following questions:
  1. How many lines and phones will I need? This will likely be one of the first questions a vendor will ask when you start looking for a new system. Take some time to think how many phone lines you will need. For example, will you need one for every employee? Or will a line for every major office or department be enough? You will quickly find that some teams won't need lines at all, while others will need one for every person.
  2. How much do I want to manage this system? If you want to have complete control over every line, the supporting systems, and the hardware itself, then going for a hosted solution may not be the best of ideas. On the other hand, if you are looking for a solution that is simple to manage for you, then hosted or managed solutions might be the answer.
  3. How fast will my business grow? If you are expanding quickly, then you will need a system that can develop with you. Many landline systems require technicians to install new lines which can take time, so businesses that are growing quickly may benefit more from digital systems.
  4. What other equipment will I be using? This is important to know before you talk to vendors because some systems may not work well with existing technology, or other systems you may be using. If you make a list, vendors can then help you quickly find a system that is compatible with your other equipment.

3. Ask your users what features they need

Before looking for a new phone system, you should ask the people who will be using the system what features they need in order to do their jobs to the best of their ability. Some teams may need wireless devices in order to better talk to customers, while others might find video conferencing worthwhile; others still may need a more unified communications platform, including text and instant messages.

The key here is to develop a list of features that your business will need before looking for a new phone system. This will make it easier to find one that fits your needs.

4. Work with your IT partner

We can work with you to help you find the best solution for your business; be it managed, digital, or analogue. If you are looking for a new phone system, contact us today to learn more about our solutions and how we can help.
Published with permission from TechAdvisory.org. Source.

November 6th, 2014

BusinessValue_Nov03_CAny business owner knows that technology is constantly evolving. It really feels as if a new system or device is being introduced on a daily basis. This fast-paced development has subsequently forced IT teams to also move quickly to keep up. IT can now be divided into three main areas, all of which businesses should be investing in.

1. Commodity-oriented IT

IT is made up of systems that support day-to-day operations, so it is essential that you invest in this area because it is what supports your core business practices. Without proper investment, your employees may not be able to carry out their tasks adequately. Commodity IT is essential but it does not bring increased value to your company. Sure, implementing a new email system could save money but it does not directly lead to increased profits.

One of the best ways businesses can get the most out of commodity IT is to first identify which systems the business relies on. From here, you can look to see if improvements can be made that will reduce overall expenses and increase productivity. Regardless of what you do with commodity IT, all changes and improvements should be operations-oriented; making jobs easier.

2. Business value focused IT

Business value IT involves any system that supports key operations and processes that drive overall business value. Essentially, these systems are not only essential, but they allow businesses and customers to do what they need to do. A good example of business value IT for companies with online stores is the technology that supports the store. Without it, customers would not be able to make purchases from the company.

With this form of IT you want to invest in systems that increase the value you offer customers and employees, while increasing your bottom line.

3. New opportunity IT

New technology and systems can help give your business a competitive advantage when properly integrated, while increasing overall business value. A good example of this is leveraging a new social media platform to help gain customer insights, or implementing technology that allows your business to capture and analyze data quickly and easily.

Companies able to incorporate new technology will often find that they have somewhat of a first mover advantage, and if leveraged correctly you could see increased profits and customer retention.

Get a good IT strategy

The vast majority of companies choose to focus a large percentage of their IT budgets on commodity IT. What this results in is a focus on simply maintaining existing IT systems, without actually investing in new systems. Ideally, you want to minimize your technology upkeep expenses, and invest more in discovering new technology and systems.

How do you do this? That's where a company like us comes in. As your IT partner, we can help ensure that your systems are managed effectively, costs are minimized, and we can even go so far as to help you find and implement new systems. Contact us today to see how our solutions can help maximize your IT investments.

Published with permission from TechAdvisory.org. Source.

November 6th, 2014

BI_Nov03_CBusinesses who are looking to increase or encourage customer and employee interaction, while simultaneously boosting the quality and amount of data collected, have a number of options at their disposal. One of the increasingly popular choices is called gamification. Here is a quick overview of the process and how some small businesses have implemented it.

What is gamification?

It's human nature to be competitive, and many of us exercise this nature by playing games. Be it team sports, board games, video games, or even office-related games, many of us partake in some form of game on a regular basis. Gamification is the incorporation of game elements, such as points, rules of play, competition, etc. into business-related processes.

By implementing game elements into areas like marketing or training, you can drive engagement, while also collecting better data, primarily because most people will be more willing to provide relevant information when they are invested in a game.

When it comes to implementing these elements into business processes, many companies tend to focus on either customer gamification or employee gamification.

Customer gamification

The vast majority of customer-oriented gamification relates to rewards programs and repeat customers. Small to medium businesses who have successfully implemented these elements usually do so via social media and mobile apps. Repeat customers gain points for each purchase and when they reach a certain level receive a freebie perhaps or a rebate. This in turn drives the need to keep purchasing and to "win".

Many businesses have been successful in implementing this game characteristic into social media, where people who interact gain levels and therefore access to such benefits as discounts. Businesses implementing customer-oriented gamification often see both increased engagement and better data flowing into the organization. In fact, many businesses have found that the data implemented through these elements has been useful in decision-making and overall business intelligence efforts.

Employee gamification

Employee-based gamification is usually employed by businesses to encourage teams and individuals to work together towards a common goal. For example: Implementing a point or badge-based sales system where at certain sales levels badges are awarded, which can then be used for a reward, has proven to be incredibly successful for many sales-oriented companies. Publicly announced results and recognized rewards can also be a great employee motivator.

As with customer gamification, employee gamification can be a great source of data. For example, by tracking where employees are, and their results, you can quickly see weak spots or places where help may be needed. Essentially, more data means the ability to make better decisions.

Should my company implement gamification?

While this may sound like an exciting, and useful tactic to implement in your business, it's not for everyone and it won't fit well with all activities. What you should do is to look at whether the objectives and goals of the program you wish to implement can also be paired with gamification.

If you find that gamification, or elements of it, won't benefit your business program, then it's best not to implement it for the sake of it.

How to implement gamification

There are a wide number of mobile apps developed around gamification, along with social elements and ideas. What we suggest is talking to us to see how we can help first. We can work with you to find solutions and ways to implement your solutions. Contact us today to start the game of business success.
Published with permission from TechAdvisory.org. Source.

November 4th, 2014

Office365_Nov03_COffice 365 for businesses offers a wide variety of plans with different options. Some include full versions of Office 2013, while others have just browser-based Office Web Apps (OWA). When looking for an Office 365 plan, it can be confusing as to whether OWA will be enough, or whether you will need the full version of Office 2013. To help you decide, here are five questions you can ask yourself.

1. Am I comfortable doing all, or most of my work in a browser?

Because Office Web Apps is browser-based, you will be spending a fair amount of time in your browser. Many of those who have switched to OWA have found that it takes time to get used to working with the system. Because of the way many of us work, you will start to see multiple windows and tabs open with different documents which could lead to increased confusion and more time finding the tab and window you need.

What's more, you will need to ensure that all browsers on all computers in your company are kept up-to-date if you want to use OWA. For example, older versions of Internet Explorer may not support OWA. This means you will need to spend time ensuring that everyone within the business is updating when necessary.

To get around this, you can work with a company like us who can ensure that browser activity is not only secure, but also up-to-date, which basically guarantees OWA will work when you need it to.

If, however, you are not comfortable using your browser for everything, then it may be a good idea to go for an Office 365 plan that includes the full version of Office 2013.

2. Am I going to collaborate on files with users both in and outside of the organization?

Many business tasks are real team efforts, where users need to collaborate on documents. While this is possibly with any Office program, one of the biggest weaknesses of traditional Office installs is version control.

If you have shared one document with a number of different users you will quickly find that the changes they make and send back to you are likely going to need to be manually added back into the original document. This takes time and can lead to confusion, errors, and a lack of productivity.

With OWA, any document you create is stored on your OneDrive account and can be easily shared with other users. When the document is opened, all changes are made directly to the main document in real time. This means each user can see the changes show up as they are being made, which increases the effectiveness of collaboration.

Of course, this is possible with almost all Office 365 plans - especially if you also integrate SharePoint, but OWA offers by far the easiest solution to collaboration. So, if you collaborate a lot, then OWA may be a better version of Office to use. That being said, if you just need a few people to edit documents or offer comments, then Office 365 plans with Office 2013 will usually be the better option.

3. Will I need to format documents, or need advanced features?

The Web-based versions of Office offer many of the key features found in the desktop versions. However, some advanced features, like in-dept formatting, adding charts, etc. are not currently available with OWA.

While many users find OWA is enough to meet their day-to-day document production needs, those who use the advanced features of each Office app will be better off with Office 365 plans that offer full installs of Office 2013.

4. Will I need more Office apps than just the core five?

Currently, OWA apps available to users are: Word, Excel, PowerPoint, OneNote, and Lync. These five major apps cover the majority of document production needs for most users, however, if you require other Office apps, like Access, or Publisher, that aren't included in OWA, then you will be better off going with an Office 365 plan that offers Office 2013.

5. Will I be constantly connected to the Internet?

In order to get the most out of OWA you will need to have a strong and constant Internet connection. While you can create documents offline, you will need to connect in order to save and update them. If you spend a lot of time out of the office, this may be a real inconvenience, especially if you often struggle to find a solid Internet connection.

What we recommend is talking to an Office 365 vendor like us. We can explain the different Office 365 plans in depth and how you can integrate them into your office. Contact us today to learn more.

Published with permission from TechAdvisory.org. Source.

October 31st, 2014

Security_Oct27_CAny business with Internet-based systems should be taking the appropriate steps to ensure that their activities and information are secure from the ever-expanding number of online threats. This can be tough, especially for businesses who operate almost exclusively online. To help, here are five tips that can help keep your online activities safe from attacks.

1. Use two-factor authentication whenever possible

Two-factor authentication, or two-step authentication as it is also known, is the idea of using two pieces of information to log into accounts: Your usual password and a code that is usually sent to a mobile device or generated by a code generator.

By utilizing this safety feature, you can further increase the security of your accounts, largely because the chances of someone getting their hands on both the generated code and your password are slim.

Some sites don't use a code and instead ask a question that needs to be answered every time you log in. If this is the case, make the question something that is difficult for a hacker to guess. For example, use your address from 10 years ago instead of your current address.

2. Audit who has access to what data

Between all of your online accounts and social media profiles you will likely be surprised at just how much information about you can be found online. There are a multitude of scare stories online, where someone has had their accounts hacked and identity stolen, largely because they had left pertinent information online without even thinking about it.

It is a good idea to audit what information you have online. This includes looking at the contact and personal information you have on social media profiles, account information, etc. Ideally, if it is not necessary information, then it shouldn't be shared. As for social media profiles, make sure only the absolute basic personal information is online and limit who can see this information.

3. Watch what is posted on social media

Because of the nature of social media, we often feel the need to share our whole lives online. This can often lead to oversharing, and even sometimes oversharing of personal information. There are stories online of thieves monitoring social media for businesses posting about how they are going to be closed for a holiday, with all staff gone. Once a thief finds this information, they then break into the business without worrying about people being there.

If you are going to share information online, be sure to limit the potentially sensitive information that you post, especially if the content is shared with the public.

4. Change your passwords regularly

It seems like almost every week news breaks of a password or account information breach. What this translates to is the fact that your accounts are always facing a potential risk. Therefore, you should make it a habit to change your passwords on a regular basis.

Most experts recommend at least once every three months, but if there is a breach where your account information may have been leaked then naturally change your passwords straightaway.

To ensure maximum security, you should use a different password for each account, and keep these as separate as possible.

5. Work with an IT partner who can offer enhanced Internet security

Ensuring that your business is secure online can be an on-going battle that you will likely not win easily. One of the best steps to take is to work with an IT partner like us. We offer a variety of Internet security solutions that can help stop malware intrusions before they infect your systems, block access to potentially harmful sites, and even scan Internet-based email solutions. In other words, we can help improve your overall online security.

If you are looking to learn more about how we can help your business be secure online, contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Security
October 30th, 2014

Hardware_Oct27_CTechnology is an integral part of any business. The problem with this is technology ages and eventually needs to be replaced. Because of the sheer amount of new systems and hardware components being introduced on a daily basis, it can be confusing to work out whether you should upgrade or not. To help, here are five signs that might want to consider updating your business's hardware.

1. Replacement parts are difficult to find

Computers, servers, and even mobile devices are made up of a number of different parts of hardware that rely on other parts in order to operate properly. If one breaks down, there is a good chance that the whole system will stop working.

Luckily, for many newer pieces of hardware and systems, replacements are easy to come by. But, if something breaks and you are having trouble finding replacement parts then it might be a good idea to consider upgrading. The reason for this is because parts that are more difficult to find are usually going to cost more when you can actually find them. While this may be ok for one system, if you have more than one system using the same components there is a good chance that these will also need to be replaced, leading to increased costs.

2. Repair costs outweigh replacement costs

Some hardware components can only be repaired by experts with highly specialized skills. What this means is that should this hardware break, you will likely be facing a fairly high repair bill. What we recommend is to always get a quote on how much it will cost to repair your broken hardware first.

When you have this quote, look at the price of replacement components. If it's more affordable to replace, then this is usually a better option. Of course, you are going to want to ensure that any replacement parts are actually compatible with your system, so before you go purchasing be sure to ask check with your IT partner.

3. You are running 'legacy' systems

Legacy systems are computers and technology deemed to be old by experts. For example, computers running Windows XP, or computers purchased before the release of Windows 7 would be considered legacy systems.

While these may be working like a charm now, they will eventually break. When this happens, you will see higher repair costs when compared with new technology. Beyond replacement costs is the fact that many manufacturers and software developers have stopped supporting older systems. This means that should an error occur, you will not necessarily be able to get support from the company who made the hardware. This can lead to repair delays and lost productivity.

Now, not every "old" system will need to be replaced right away. What we recommend is talking to an IT partner like us. We can help you determine if your older systems do actually need to be replaced, and suggest affordable alternatives.

4. Hardware is impeding productivity

If you or your employees are struggling to complete work because of constant computer crashes, or slow systems, productivity will be lower than it could be. Should you notice this in your office, it is a good idea to look into upgrading your systems in order to enable employees to do their jobs properly.

5. Your systems don't meet minimum requirements

If you are going to install new software or systems that require other hardware components, be sure to look at the minimum requirements. Almost every piece of software indicates which requirements must be met in order for the software to work.

If your systems don't meet these minimum requirements, then the software won't work. Should they meet them, but just barely, the software will work but there is a good chance that it won't work as well as it could do. Should you not meet the requirements, you will need to upgrade your hardware.

Looking to upgrade, or for some advice on how you can keep your systems working? Contact us today to learn more about our services and how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Hardware
October 22nd, 2014

SocialMedia_Oct20_CSocial media, for many companies, has become an integral part of their overall marketing strategy. In order to be successful with your social marketing initiatives, you need to develop content that users will share. This is easier said than done though, especially when it comes to selecting the type of content to develop. Here are five types of popular content that should be shared.

1. Selfies

The 2013 "word of the year", according to the Oxford English Dictionary, has become so popular it's no mean feat to avoid it these days. Truth be told, the selfie is popular for a reason: It is a quick way to get people to engage with your content.

The key here is to know when to take a selfie for your social media sites. What you want are selfies that make your company look more human, for example a group lunch meeting or after-work game night that shows people having fun. When done in the right way, selfie posts can increase interaction. Just be sure to limit the number you post, as too many could lead to you being perceived as being too focused on your company and not your customers.

2. Inside looks

When we find a product or service we like, we are often curious to learn more about it. This includes learning more about the company that makes the products or services and how it operates.

If you have a growing fan base, why not create content that provides customers with an inside look at some aspect of your business. Take pictures of your office, videos about how your products are made, or perhaps write content about how certain services are created and delivered. Basically, try to come up with content that gives people an inside view of the company.

The reason this type of content works is because it often gives customers a deeper understanding about a business, and creates a closer connection to the products and services. If you can increase overall attachment, you can increase the chances that customers will interact with content, stay loyal to your brand, and even share information about your company or recommend you.

3. Quotes

Famous quotes can be a great way to get a message across in a strong way. If for example you are hosting a Thanksgiving party, or Halloween party, adding a themed quote to your post could be a great way to encourage social media users to interact with it.

Also, if you can find quotes that are relevant to your industry, you could post these whilst asking for opinions or to further a point you're trying to make.

4. Fill in the blanks

While this may sound a little simple, posts that ask your audience to fill in a blank can be a great way to drive engagement while giving your customers a chance to tell their own story. For example, if you are a bakery who produces well-known donuts, asking a question like: "The first time I had this donut was _." could be a good way to inspire customers to interact with you.

5. Videos

One of the more drastic changes many social media sites like Facebook have implemented in the past couple of years is a feature that automatically plays a video when someone pauses on it while scrolling. While not fully welcomed by all users, this move has actually led to the number of video views increasing by as much as two times.

While creating a video because everyone else is, is a bad idea, if you have content that you know can be turned into a useful video e.g., a how-to video, then this could be a great way to reach your target market in an interesting way.

If you are looking to learn more about how you can leverage social media in your business, contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
October 21st, 2014

Office365_Oct20_COffice 365, the cloud-based version of Office, is quickly becoming one of the most popular software suites used by small and medium businesses. With an ever increasing number of businesses migrating to this solution, it is not surprising that so many businesses consider making the move. However as there is always a chance of failure it is best to learn how to avoid this by being aware of the five of the most common ways an Office 365 migration can fail.

1. Slow Internet connection speeds

Because Office 365 is primarily cloud-based, you are going to need a solid bandwidth connection to use it. When migrating your files and system over to Office 365, you will likely need to consume a large quantity of bandwidth. This demand will often be enough to to tax most small business lines, resulting in lower Internet speeds all around while the migration is happening. If this is being carried out during business hours, employees might struggle to do their jobs properly if they are reliant on the Internet.

Beyond this, Office 365 is most often delivered over an Internet connection, rather than in-house servers. This means that the day-to-day demand for bandwidth will increase. If you are already noticing slow speeds and service interruptions before implementing Office 365, you will likely see these issues compounded after implementation.

To avoid this, you should ask an Office 365 provider to test your existing network connections to ensure that your Internet connection can handle the migration and day-to-day operation of Office 365. If not, a provider should be able to offer you a solution.

2. Mailboxes and files are too big

While the business versions of Office 365 do come with 50 GB of email storage and over 1 TB of file storage per user, actually getting your emails and files online could take a while, especially if you have users whose email inboxes are approaching the storage limit.

As a general rule of thumb, larger files will cause the migration of files to take longer. If this is not prepared for, then you could see migration affecting work or even continual issues of data not being available when it's needed.

To avoid this, you should encourage your staff to archive their email inboxes and either delete or remove emails with large attachments that aren't necessary.

3. Uninformed users

The average Office 365 migration takes from one to three days, depending on the size of the business and the amount of data moving over. If you start a migration without informing users that some files and emails won't be accessible over this time, or that even some systems may not be working, you could end up with employees unable to do their jobs and creating resentment of the new platform.

To avoid this, you should inform your employees about how the migration will run and what they can expect during the migration. Beyond this, you should try to run training sessions on how to use the new systems to ensure that everyone is familiar with it before they start to use it. This will increase the overall chance that the platform migration and subsequent use will be successful.

4. Older, less compatible software installed on systems

While many versions of Office 365 do come with subscriptions to the latest version of Microsoft Office, there is support built in for systems that are running slightly older versions of Office. If your business is using a version of Office that is older than Office 2010 (e.g., Office 2003), you will not be able to properly use Office 365.

Beyond this, you will also need to be using the latest version of Internet browser. If you use Chrome or Firefox, this won't be a problem, however if you use Internet Explorer you will need to be sure that you are using the latest version. Should you be using older systems, especially those no longer supported by Microsoft, you may also have trouble accessing Office 365 because you may be unable to upload to the latest version of Internet Explorer.

The good news about Office 365 is that actual systems requirements are low, so almost every business will be able to integrate it. We recommend that in order to avoid failure, or being unable to use all of the features, you should ask your provider to ensure that your software and systems are able to support Office 365.

5. Migrating yourself

On paper, migrating to Office 365 is a fairly simple and straightforward process. What many companies find, when they choose to migrate themselves, is that the process is often much more difficult than expected. Many companies come across unexpected issues that require an IT expert to solve.

In order to ensure a smooth migration from start to finish, it is a good idea to work with an IT provider like us. We can ensure that your systems are ready and the migration is smooth. Contact us today to learn more.

Published with permission from TechAdvisory.org. Source.