Increase Your Productivity with Dual Monitors

Increase Your Productivity with Dual Monitors

Conventional wisdom states that cluttered workspaces lead to a disorganized mind. Mess prevents productivity and begins to hamper professionalism. Shouldn’t that apply to the computer desktop too? Let’s see how to Increase Your Productivity.

The simplest way to clean and organize your digital desktop is to add more space. Just adding a second screen doubles the available room and makes organization a breeze.

Getting work done with a single-monitor setup is a balance of poor compromises. There never seems to be enough space and the little space available is full of clutter and mess. Switching between windows or tabs wastes time and distracts from work to be done. Stacking windows together, side-by-side, or top and bottom wastes valuable screen real estate. The resulting clutter of windows makes it hard to focus on what is important.

While most tasks can be tackled feasibly with a single monitor; two makes the same tasks faster, simpler, and much more enjoyable.

Two Monitors, Many Uses

Data entry with two monitors is far easier than data entry with one. Having source data on one screen, laid out in large type, and the destination on another makes the job a breeze. By eliminating the need to scroll tiny windows or switch tabs, forget and repeat; the same job can be done in a fraction of the time.

Graphic design, image manipulation, and editing are key areas that make the most of a dual screen setup.

Stacking one image on each screen allows you to make quick comparisons to make sure your work is going in the right direction. Organizing your editing space is made simple too. Stacking your tools, menus, and options on one monitor with your image maximized on the other helps to stay focused and finish the task.

Beyond Just Two

Having more than a single screen helps you to track tasks you need to keep on the back burner. A team chat window to keep on top of collaboration, status updates for business-critical services, or the latest stock price. These windows and dialogues can remain open and serving updates on a secondary screen while you keep your work focused on your first.

It is not uncommon for stock traders or financial analysts to maintain 6 or more screens running from a single computer. Many uses this to track various stocks or indices so they don’t miss a beat.

Setup How You Like It

Multiple monitors can be arranged in almost any practical configuration imaginable. While traditionally positioned in landscape orientation, second, third, or fourth monitors are often rotated 90 degrees to portrait orientation.

This setup is used often by software engineers, editors, and users reviewing large amounts of text. The lengthwise orientation allows multiple pages to be read from the screen at any one time.

Multi-screen setups, no matter how they are arranged, behave the same as if all the monitors were just a single screen. Mouse input moves from one monitor to another as if there was no difference between them. From the user’s perspective, there is no difference to how they interact at all.

A Boost to Productivity

There is a scientific advantage to multi-monitor setups too. A survey by Jon Peddie research found that adding an extra monitor boosted a user’s output by as much as 20 to 30 percent.

A productivity advantage of even 10 percent is prized and very hard to come by in the business world. Receiving a productivity reward of over 20 percent for just the cost of adding a second monitor is something few firms can afford to pass up.

The satisfaction of decluttering your digital desktop and keeping your focus in the zone is worth it alone.

Give us a call at 319-227-7000 if you would like us to boost your setup by adding a second monitor.

2018-11-04T12:09:44+00:00November 6th, 2018|Uncategorized|0 Comments

Business Tools to Take Your Business Out of The Office

Business Tools to Take Your Business Out of The Officebusiness tools

Being engaged in business used to mean staying wired in at the office eight to twelve hours a day. In the modern day, this is completely untrue. Often the most efficient workplace is spread far and wide and always on the go.

Today you can completely unplug from your desk with just your laptop computer and 4G modem. The freedom to work out of the office and even on the move is a huge advantage gifted to modern businesses. A simple mobile phone tether is enough to work from anywhere in the world.

The Right Tools for the Job

The most important part of working on the go is ensuring you don’t lose touch with your team. Maintaining total collaboration between team members can be tricky. Luckily, there are tools that will help you to stay on top.

Microsoft Office 365 provides the traditional tools and support of Microsoft office, but adds remote team collaboration and cloud support too. Files can be saved into the cloud, worked on, and accessed anywhere for review. At one time, remote working meant taking a copy of a file somewhere else to work. Changes to the original weren’t reflected in the remote copy and at least one version was destined to be lost forever.

Software packages such as OneDrive allow the entire team to work on a single centralized file saved to the cloud. Whether you edit on a beach, plane, or train; your team in the office gets the same version you do, at the same time.

Collaborative Working

The key to remote working is the ability to collaborate in a digital space with everyone at once. Modern software such as Office 365 allows all team members to be working on a single document at the same time.

Whether the project calls for killer spreadsheets, expertly crafted documentation, or a knockout presentation; everyone can pull together and hit it out of the park.

Even when you’re not working out of the office or busy on the road, collaborative software can help to power your team working locally too.

Admin Done Remotely

Modern software has impacted the way in which we do bookkeeping and accounts too.

Similar to being tied to your desk in years gone past; accounting software was once stuck solidly in the desktop too. Previously, batch runs of calculations were required to provide reports on a weekly, bi-weekly, or monthly basis. Today, cloud computing has opened up ways to speed up business in ways we couldn’t have imagined.

Cloud-based accounting packages such as Xero or Quickbooks Online allow for your accounts to be done remotely. Moving the resource and strain out of your firm takes it out of sight and out of mind.

Security and maintenance of your accounts databases, for example, falls to cloud professionals instead of your business. Rather than waste company time on submitting documents and calculating taxes they are done in the cloud and submitted to you instead.

Make your Accounts Work for You

Maintaining your accounts is made as simple as logging into a single portal. This tool allows you to take both your admin and your work out of the office and keep it on the go.

By the time your accounts are due, your accountant simply has to log in remotely and pick up where you left off. By the time taxes are due the work is done and you can get on with the important things.

Getting work done out of the office and on the go is a huge boost to productivity. Modern technology enables you to keep team members up to speed, continue collaborating, and even stay on top of your accounts from anywhere in the world.

Give us a call today at 319-227-7000 to talk about how we can help you unwire from the office.

2018-11-04T11:30:50+00:00November 6th, 2018|Uncategorized|0 Comments

5 Ways to Extend Your Phone’s Battery

5 Ways to Extend Your Phone’s Battery

Today’s phones can help us do more than ever before. In addition to making phone calls, we use them to send messages, post photos on our favorite apps, watch videos, play games, and endless other activities. Since our phones can accomplish so much, we’re on them often. That means we’re draining a lot of phone battery. In our busy lives, we aren’t always near an outlet and don’t always have a phone charger ready. If our phones die, we risk missing out on important notifications and being unable to easily communicate with others. So what strategies can we use to extend our battery life?

Check Apps’ Battery Usage

When it comes to battery usage, not all apps are created equal. While checking your email uses a small amount of power, any apps that use GPS drain a significant amount of your phone’s battery. This is because they are constantly talking to the GPS satellites. Check to see which of your apps are draining your battery most and limit usage.

Turn off Wi-Fi and Bluetooth

If you aren’t on your personal Wi-Fi, it’s always good to connect to the Wi-Fi wherever you are. However, this isn’t always an option. When you’re not connected to a strong Wi-Fi, it’s good to turn both Wi-Fi and Bluetooth off when you aren’t using them. They drain a large amount of data because, even when not connected to anything, they are searching for your home’s Wi-Fi and car’s Bluetooth. That’s how they autoconnect when you are back within their range. Downloading podcasts, videos, and audiobooks at home can save your battery when you’re out because you won’t have to stream these items over Wi-Fi.

Lower your Phone’s Brightness

One of the easiest ways to save battery is to reduce how bright your phone’s screen is. The brighter your screen is, the more phone life it is using up. Most phones adjust the brightness levels based on how light your surroundings are. You can override this and turn the level down to save battery. The more you dim it, the longer your battery will last.

Go on Power Saving Mode

When you put your phone in Power Saving Mode, it stops it from automatically checking to see if there are new emails, powers off your display faster, and reduces screen brightness. It also turns off certain visual effects and some other features take a lot of battery. On some phones, it also makes your apps run a little slower.

Buy a Built-in Battery Case

Some people need to use power-draining features often and have phone-heavy lifestyles. If this is you, it may still be a struggle to keep your battery lasting throughout the day. If all of the other options aren’t sufficient, you can buy a phone case with a built-in battery. This extra battery charges your phone while using it making it last longer throughout the day.

While any of these methods will help you extend your phone’s battery, it’s best to combine a few options. Our phones make our lives much easier, but they can’t do anything for us if they’re dead because we let the battery run out. Even more importantly, we want our phones usable in case of an emergency. Luckily, using these methods will help keep our batteries alive throughout the day. Just remember to charge them again at home.

Are you in need of our services? Contact us now at 319-227-7000.

2018-10-06T21:46:18+00:00September 11th, 2018|Uncategorized|0 Comments

Right Tech for Your New Business

How to Get the Right Tech for Your New Business

Right Tech

Congratulations on your new business! Start-up costs can easily escalate, and tech is often one of the bigger expenses. It’s not that everything is high priced, but the sheer number of technologies available can overwhelm smart decision making. The latest tech is dangled in front of you with amazing features you didn’t know you needed, and suddenly your budget has gone boom!

Here’s how to get the tech right for your business, without the headache and drama.

1. Check if you actually need it

In a lot of cases, using a cloud application means you can skip the big server purchase, along with the on-site technician to manage it. Many of your business programs will have a cloud option that allows you to get all the benefits without the big expense. Before you make the tech purchase, work out which applications you’ll be running and whether a local installation or cloud access is preferred. As part of this stage, think about how you’d like to use the applications – perhaps remote access is a priority, or perhaps collaboration will underpin your business culture. This level of clarity is often overlooked and the number 1 reason why tech expenses spiral.

2. Get expert advice

It’s easy to ask friends and family what to buy, but there are many more factors to consider than just their personal preference. You trust their opinion, of course, but they may be speaking from a consumer perspective or basing their recommendation on brand loyalty. Every business is different and pairing the correct technology with the business will save you a lot of money in the long run.

3. Buy business grade

Unfortunately, the computers and laptops you see in department stores aren’t up to business standard. They’re designed for home users to perform quick tasks, not run a full 8 hour (or more) workload. Business grade systems have additional features that your business needs, plus longer warranties and better support. Even the attached devices like networking or printers are built to a higher standard, to last longer and perform better. Considering the cyber climate we live in, taking a special interest in the security offered by the business grade technology is a wise decision.

4. Prioritize flexibility

Businesses evolve rapidly during their first few years and the last thing you want to do is go out and buy new tech, playing catch-up with your vision and smushing together an assorted mismatch of devices. Your new technology should be as scalable as your business, which means making purchase decisions based on strategy, not price. Perhaps this means instead of workstations for employees, you only need tablets. Rather than having a fixed point of sale system, you might choose mobile checkout devices so your staff can assist customers on the go. These examples highlight how easy it is to commit to certain tech because it’s ‘what you do’ but later discover you’re locked into a certain way of doing business. Trying to change your processes down the line impacts productivity, efficiency and culture in a big way, so we recommend buying with your future success in mind.

5. Choose an IT partner

During your set up and moving ahead through growth, you’ll need an IT partner who can not only help with your purchase strategy but support you through any tech problems as they arise. That’s the difference between a partner and a supplier, they’re committed to driving long-term business success.

You’ll be able to call on your partner and know they’re immediately up to speed with your business, they know how IT can help leverage your competitive advantage and which critical systems they should focus on. Getting good tech in place shouldn’t be seen as just an expense. It improves productivity and allows you to serve your customers better while enjoying consistent growth.

If you need an IT partner to help your business grow, give us a call at 319-227-7000.

2018-10-06T22:54:57+00:00July 17th, 2018|Uncategorized|0 Comments

5 Tech Travel Tips You Can Use

5 Tech Travel Tips You Can Use

Travel Tips

Travelling soon? For most people, this also means making sure your tech is packed and ready for the adventure. Smartphones, ebook readers, tablets, laptops and smart watches are now so light and portable that you’d never think of leaving them behind, plus they can add a ton of value your experience.

Here are a few tips to consider before you hit the road.

1. Backup to the cloud

While you’re relaxing on a beach or hiking your way to freedom, your tech is always going to be exposed to a level of risk. This might range from accidentally leaving your laptop at a cafe to having it stolen from your bag, but either way the problem is the same – your data is now gone. If you’ve backed up your devices to the cloud (eg Evernote, Microsoft OneNote or OneDrive) you’ll be able to access your files easily and securely from anywhere.

Hot tip: Scan or save important documents like itineraries and passports to the cloud.

2. Pack the right cables

Begging random strangers for a loan of their cable isn’t much fun, so remember to bring the exact cables and chargers you’ll need. Most smartphones and tablets use universal plugs like Micro USB, USB C or Apple Lightning, so you can get away with only packing one cable. Many locations now offer powered USB ports but be sure to also pack the right charger as well, it’s a convenience you’ll appreciate. If you’re travelling overseas and the socket is different, remember to pack a plug converter, and depending on your destination, you might even find the voltage is different. It’s a good idea to check whether you also need a voltage converter before you try and charge.

3. Download offline data

It’s no secret that global roaming can give nasty bill shocks. The easy access data you normally use over Wi-Fi or get included in your cell plan has us all accustomed to being connected. While travelling, you might find yourself in a location where data costs a fortune or it’s not available at all. Download any files you might need, including important documents like itineraries and bookings, so that you can access them even without a connection.

4. Update and scan

Just like you’d make sure you’ve got the right vaccinations and travel gear, make sure your tech is ready to travel too. Set aside a few minutes to run updates for your operating systems and apps. The last thing you want to deal with one your trip is a cyber attack! While you’re doing your pro-active thing, turn on password protection for all devices so that only you can unlock them.

Hot tip: Use a complex password that is hard for thieves to guess.

5. Mark your territory

Almost exactly the way it sounds, let everyone know this tech belongs to you. Write your cell number on portable devices in case you get separated so whoever finds it can give you a quick call and save the day. Don’t want to use permanent marker on your shiny tech? Grab some sticky labels you can peel off when you get home.

You can also get little Bluetooth tracking tags to stick to your gear, so that if you ever lose something you can chase it down. Similarly, you might like to consider enabling the “find my” feature on Apple devices. Having this feature switched on also means you can disable your device remotely, an excellent security option if it’s been stolen.

Need help preparing your tech for travel? Give us a call at 319-227-7000

2018-10-06T22:56:52+00:00July 10th, 2018|Uncategorized|0 Comments

Is it Time to Retire That Program? Here’s How to Tell for Sure

Is it Time to Retire That Program? Here’s How to Tell for SureTime to Retire That Program

Your business has likely been using the same set of applications for some time. Perhaps since the day you started, a long time ago. While you’ve been replacing computers and devices regularly to maintain your competitive advantage, the standard installation has remained largely the same. The programs do the job and everyone knows how to use them, so why upgrade? In some cases, it’s completely fine to keep that legacy program.

However, there are some aspects you should consider:

Support Available

Occasionally, and more frequently with software from smaller developers, the author has moved on from supporting the program. Perhaps they’ve closed the business, sold it, or pivoted directions completely. Either way, they’re no longer interested in helping you get the best from the program. Every time your employees come up against a problem they have nowhere to turn and productivity takes a hit as they try and come up with a workaround. Meanwhile, you run the risk that it could suddenly stop working after a Windows update, begin clashing with other essential software, or even create gaping holes in your security. As you are aware, even the bigger companies like Microsoft stop supporting software after a while, as they have with earlier versions of Windows. Having support available to both assist and protect is a huge asset to your business.

Hardware Compatibility

Imagine picking up a brand-new computer and trying to insert a 5 ¼ floppy disk – that’s the 1980s retro square ones bigger than your hand – it doesn’t matter how effective that program will be, modern technology simply has no idea what to do with it. Thanks to the rapid advancement of computer hardware, you may find a simple component refresh leaves your legacy program completely incompatible. The latest CPU that’s supposed to speed things up suddenly brings your entire business to a standstill, purely because it’s too advanced. Many owners work around this by keeping some older systems running exclusively for that program, but as the classic hardware fails, you may find yourself struggling to find replacement parts or technicians able to install them.

Security Vulnerabilities

Broadly speaking, the longer a program has been around, the longer hackers have had to discover its weaknesses. It could be a flaw in the program itself, or in the operating system that runs it. For example, the application may only run on Windows XP, but Windows XP is one of the earlier versions that Microsoft has stopped supporting. As the older operating systems and programs aren’t being patched, cyber criminals pour more energy into finding flaws they can exploit. It’s open season in their minds, and a free ticket to all your connected systems. It’s how hospitals across the UK found themselves infected with ransomware last year, simply because they were running programs with known weaknesses.

As it’s not always feasible to replace a program immediately, we can help you run it on a virtual machine. That is, running the older operating system or program from within another program. You’ll have increased security, an element of support and a strong backup system while you work to find a replacement program. These types of solutions are very specialized and resource hungry though, so let us know if you need help. The other option is to migrate to a new program that does what you want, and is supported, hardware compatible and secure. If you’ve been running the old program for some time, this may feel quite daunting at first. Before you rule it out, keep in mind you’ll also be gaining the benefits of faster software, more integrated processes and a highly flexible system.

Need to talk through your options? Give us a call at 319-227-7000

2018-10-06T23:02:08+00:00July 3rd, 2018|Uncategorized|0 Comments

What’s Best for Your Computer: Shut Down or Sleep?

What’s Best for Your Computer: Shut Down or

Sleep?Shutdown or Sleep

Most homes are trying to reduce power costs by turning off lights and appliances, but do the same rules apply to computers? After all, it requires more than flicking a switch on your way out the door. Some people believe you should shut down after every use to save wear and tear, others believe you should never shut down your computer – ever. Others simply want to make sure the pages and apps they left open are still there waiting for them. So, who’s right and what are they really doing?

Back when computers were clunky behemoths that took a long time to start, you’d go nuts at the person who shut it down when it was your turn. If you have an older computer, maybe you still do. Modern computers actually have two options for their downtime: Shut down or sleep.

When it shuts down, the system goes through and closes any open programs (often prompting you to save first), then gradually cuts power to all components. It’s a methodical process that seems quite fast to us but is actually made of 100+ intentionally ordered steps. If there’s a sudden blackout or you hold the power button until it turns off, it means the steps aren’t followed and damage is possible. The second option is to put your computer to sleep. This can be triggered by an automated timeout or a user click. Your system uses a special type of memory called RAM to hold all your running programs exactly as you left them but use minimal power. The hard drive stops spinning, the graphics card lets the screen go black, and even the system fan slows to become almost silent. When you wake it by moving the mouse or pressing a key, it ‘wakes’ again almost instantly.

Reasons to Shut Down

A switched off computer isn’t drawing power which is a tick for the environment. But shutting down is about more than saving power. It can sometimes give improved stability over a machine that’s been running for days/weeks. This is because every time you shut down, you give your computer a chance to clear out all temporary junk files it’s been carrying in memory. It also triggers various health checks on startup that may otherwise be missed, important routines like checking for updates or scanning for viruses. It’s certainly more convenient to spend an extra minute booting up than lose everything to a cyber-attack. For older computers or those under heavy strain like gaming or video editing, shutting down also provides a necessary chance for the components to cool down.

Reasons to Sleep

Speed is the big selling point here. You can literally sit down and start working where you left off without the delays of bootup, finding your program, opening your saved files, scrolling down… it’s all right there and ready. You can even tell it how long to wait before putting itself into sleep mode, just in case you get called away and forget. Windows updates still run in the background, so that’s okay, but it’s important to note that your computer might get stuck waiting for a reboot that never comes. Those pending updates may stack up, ineffective until it either forces a reboot or becomes unstable enough that you give in to a restart.

The best method is….

Since the whole point of having a computer is that it’s ready to work when you are, we recommend shutting down at night when it’s definitely not in use but using sleep mode during the day. Updates will get all the rebooting they need, memory is refreshed for the new day, and you’ll get the best of both worlds – speed and stability.

 

We can help your computer boot faster, give us a call at 319-227-7000.

2018-10-06T23:11:28+00:00June 12th, 2018|Uncategorized|0 Comments

Fake Invoice Attacks Are on the Rise – Here’s How to Spot (and Beat) Them

Fake Invoice Attacks Are on the Rise – Here’s How to Spot (and Beat) ThemFake Invoice

Businesses around the world are being struck with a cyber-attack that sends victims a fake invoice that looks real enough to fool to most employees. It’s an old scam that used to see bills faxed or mailed in, but it’s made its way into the digital world and instances are on the rise.

Chances are you’ve already seen some of the less effective attempts, like an email advising your domain is expiring, except it’s not from your host and your domain is nowhere near expiration. These new attacks are more advanced, in that they look completely legitimate and are often from contractors/suppliers you actually use. Logos are correct, spelling and grammar are spot on, and they might even refer to actual work or invoice numbers. The sender name may also be the normal contact you’d associate with that business, or even a co-worker, as cyber criminals are able to effectively ‘spoof’ real accounts and real people. While it’s worrying that they know enough about your business to wear that disguise so well, a successful attack relies on you not knowing what to look for, or even that fakes are a possibility. With that in mind, here are two types of invoice attacks you might receive:

The Payment Redirect

This style of fake invoice either explicitly states payment should be made to a certain account, perhaps with a friendly note about the new details, or includes a payment link direct to the new account. Your accounts payable person believes they’re doing the right thing by resolving the invoice and unwittingly sends company money offshore. The problem usually isn’t discovered until the real invoice from the real supplier comes in or the transaction is flagged in an audit. Due to the nature of international cybercrime, it’s unlikely you’ll be able to recover the funds even if you catch it quickly.

The Malware Click – Rather than go for the immediate cash grab, this style of attack asks your employee to click a link to download the invoice. The email may even look like the ones normally generated by popular accounting tools like Quickbooks or Xero, making the click seem safe. Once your employee has clicked the link, malware is downloaded that can trigger ransomware or data breaches. While an up-to-date anti-virus should block the attack at that stage, it’s not always guaranteed, especially with new and undiscovered malware. If it does get through, the malware quickly embeds itself deep into your systems, often silently lurking until detected or activated.

How to Stay Safe

Awareness is key to ensuring these types of attacks have no impact on your business. As always, keep your anti-virus and spam filters up to date to minimize the risk of the emails getting through in the first place. Then, consider implementing a simple set of procedures regarding payments. These could include verifying account changes with a phone call (to the number you have on record, not the one in the email), double checking invoices against work orders, appointing a single administrator to restrict access to accounts, or even two-factor authorization for payments. Simple pre-emptive checks like hovering the mouse over any links before clicking and quickly making sure it looks right can also help. Like your own business, your contractors and suppliers are extra careful with their invoicing, so if anything looks off – even in the slightest – hold back on payment/clicking until it’s been reviewed. Fake invoices attacks may be increasing, but that doesn’t mean your business will become a statistic, especially now that you know what’s going on and how you can stop them.

We can help increase your security, talk to us today. Call us at 319-227-7000

2018-10-07T10:28:19+00:00May 7th, 2018|Uncategorized|0 Comments

3 Essential Steps Before You Fire an Employee

3 Essential Steps Before You Fire an Employee

Your employees need access to your various business accounts so they can do their job, but what happens to those passwords when you fire them? Nobody likes to think of firing their employees, or why you’d need to, but nonetheless, it’s a responsibility every business owner must face at some point. While your accounts team will no doubt be on top of stopping their paychecks, it’s important to take the same proactive stance to strip their system access.

Most of the time, the former employee leaves under good terms and you’ll wish them well. If you’re lucky, they’ll even manage hand-over to their replacement so your productivity losses are minimal. Other employees may leave your business reluctantly or in a storm of anger and suspicion. While you’ll have very different feelings about the two scenarios, the risk to your business remains high until action is taken. Here are 3 steps you can take to protect your business from retaliation and other password-related disasters.

Limit access to a need-to-know basis

You might be surprised how often a new employee is presented the entire business on a platter when their actual job requires little more than a computer login. Accounts, strategy, customer details, industry secrets…all those sensitive aspects of your business that have made it a success – exposed. A better policy is to limit access to only what the employee needs to do their job. Rather than view it as a lack of trust, your employees will appreciate the care you’ve taken to protect your business (and their job). It also helps keeps them from being overwhelmed, confused or tempted if the situation ever turns sour. Likewise, take a few moments to delete old or temporary accounts that are no longer required, as you never know when a hacker or disgruntled employee will squeeze through the gaps.

Change passwords fast

On average, it takes at least a week before passwords are changed after an employee is fired, if at all. Unfortunately, this is the one type of delay your business can’t afford. In 2017, an ex-employee from the American College of Education held their entire email system to ransom for $200,000 after an unhappy exit. Stories of others stealing client databases are also common, especially as they leave to start their own business or work for a competitor. It’s not just full-time employees either, contract and part-time employees such as social media managers and customer support email specialists often have access to more of your business than you might imagine. Recent rulings make it easier for business owners to prosecute former employees who access their systems, however as we know, it only takes seconds to login and wreak absolute havoc. Knowing you can force those bad eggs into a lengthy court case is poor comfort considering the extent of damage you’ll likely endure. The best option is to change passwords fast – even before your employee knows they’re fired. This lessens the chance of revenge attacks and opportunistic access.

Use a password manager

If you have good password manager like LastPass, reducing your risk becomes mostly automated. You’ll be able to keep your logins in a central vault that only you can see, and share based on business roles/need. There’s even an option to share passwords without letting employees see them in plain-text. Instead of writing passwords down somewhere and manually entering them each time, they’ll be able to connect securely with a click. Plus, you can revoke the share at any time. If their role changes or they’re fired, you can use the dashboard to see who is having access to what and add/revoke at will. If you’re not sure what that employee has been up to, you can also generate reports of their history.

We can help you set up password management and lock down your network. Call us at 319-227-7000

2018-10-07T10:36:19+00:00April 3rd, 2018|Uncategorized|0 Comments

Travel With Your Tech: What You Need to Know

Travel With Your Tech: What You Need to KnowTravel with Your Tech

Taking a business trip can be stressful at the best of times. Whether you’re off for an overnight conference, a week’s partnership or a longer project, you essentially pick up your entire business and take it on the road. Besides showing up in the appropriate clothing (which you absolutely packed, right?), keeping your tech up and running becomes your number 1 priority. Take a look at our tech tips for business travelers:

Be careful with free WiFi

Most hotels have free WiFi, as do libraries, cafes, and bookstores. It’s now easy for any business to open their WiFi to the public, with or without a catchy password. Unfortunately, that convenience can come at a huge cost. The wireless network you use to check your email while relaxing with a latte could be operated by a hacker. Most of the time, even the wait staff at the café wouldn’t be able to tell the difference either.

Even if you connect to the proper free network, someone could easily capture your information as it travels through the air. Using a VPN can help, as will making sure you connect only to wireless networks that require a password. Once connected, make sure the sites you visit have the little HTTPS lock.

Connect via your cell phone

Hotel WiFi is notorious for being slow or insanely expensive. You may find that your mobile phone allows you to tether or hotspot a connection. That means you connect your laptop to your phone via WiFi or cable and piggy back on its mobile internet connection. Many carriers and phones allow this, but not all. Importantly, if you’re in a foreign country it can also be worthwhile getting a local sim card rather than pay expensive roaming charges.

Don’t forget power adapters

You’ve seen it before…people scrounging around for a charger or cable, huddling around in groups until their device has enough juice to get them through a few more hours. Of course, it’s only funny when it happens to other people. Be sure to pack your correct power adapters and cables, along with any plug/voltage converters required to match your destination. It’s worth carrying your USB charging cables on your person, as many planes and airport shops now offer a place for you to plug in for a quick boost.

Have plans for being offline

Sometimes you simply can’t get online, which will do you no good when you’re checking into a hotel and your booking details are tucked safely away in your cloud email. You can print out essential travel and business details on paper, but if you have a lot or don’t want to carry them, you can also save them to a document. Emails can be copied and pasted into a Word document, or you can print to PDF by pressing Print > Save to PDF (or similar). Many apps also have an offline mode that allows you to store the information on your computer, including Evernote and Netflix.

Need a VPN or tech checkup before you go? Call us today at 319-227-7000.

2018-10-07T12:44:37+00:00January 2nd, 2018|Uncategorized|0 Comments