How to Choose the Best Video-Conferencing Solution for your Organization

Your organization is probably more dependent on video-conferencing right now than ever before. You may have chosen a product quickly asyou switched to a work-from-home (or partial wfh) environment. Now is the time to re-assess whether that software is really working for you and enabling the most productivity from you and your team.

You are not stuck with your first video conferencing solution decision!

Below, we have created a checklist to help you outline your video-conferencing needs. We can’t possibly go through the pros and cons of each available system, but we can help you make a good decision. Once you have filled out this checklist, feel free to reach out for a suggestion based on your requirements or use the links further below to conduct your own research. Read more

5 Tips for Better Home Internet Connectivity (during Covid-19 and after)

Poor or inconsistent Internet connectivity is one of the biggest struggles when working from home. At IT Direct, we have been hearing a lot about this particular struggle in recent weeks and would like to offer these five tips…

(If you would prefer video over written content, watch the video at the bottom of the article, where our CEO, Ari Santiago, talks about these tips during a recent webinar.)

Read more

8 Strategies for Getting the Most out of your PPP Funds

 

The Paycheck Protection Program (PPP) is one of the most aggressive government support packages for small and mid-sized business that we’ve ever seen. These funds, which are designed to enable companies to maintain their workforce and assist with rent, mortgage interest, or utilities during the Covid-19 crisis, may provide a cash cushion to support other business advantages as well.

We’ve summarized the ideas we collected to help more manufacturers continue on their path to Stage 4: Thrive. The 8 high-level business strategies include:

  1. Improve Health and Safety Policies
  2. Enhance Automation and Machine Technology
  3. Improve IT Value
  4. Hiring and Employee Benefits
  5. Enhance Sales and Marketing
  6. Smooth out Production Schedules
  7. Save on Capital Purchases
  8. Increase Cash Reserves

Read more

5 Tips for Better Video-Conferencing

With all the extra video meetings and video message recording going on, I thought I’d take a minute to give everyone some quick tips to improve the experience.  Here are 5 quick tips to get started. I hope you find these helpful, and if you have any other specific questions please ask so we can share the answers for everyone’s benefit. Read more

How to get your business ready for the future of IT (part 2)

In our first digital transformation post, we talked about the basics of digital transformation…what it means, how you prepare for it and the importance of a strong and secure infrastructure. If you missed that article, click here to read it.

In this post, we’ll talk about how the role of IT in business has changed over time and how your business approach can change along with it.

The IT Management Pyramid

The pyramid below describes the efficacy of your IT strategy as it improves and develops on the way to Digital Transformation. The goal is to move up the pyramid! The idea is to be continually thinking about how you use IT, the role of IT in business strategy, and where your IT is focused. Each tier of the pyramid is explained more fully below, along with the limitations and benefits of each stage as your business develops its IT strategy. Read more

Important Information About A Serious Security Risk

Over the last week, we have seen an increasing number of email scams. The way these are constructed makes them impossible to fully prevent (even with all of our proactive monitoring and safeguards) and, as a result, it is critical that we all take note of these important reminders:

  1. Don’t respond to emails asking for your information
    • Legitimate sources will not randomly send you an email to confirm your username/password or any personal information.  As a result, never respond to any random emails asking for this information, even if it appears to be from a trusted source such as a bank, the IRS, UPS, Microsoft 365, etc.
  2. Confirm the source
    • Never open any email attachments or click on links that you were not expecting, even if it appears to be coming from someone you know. If you get a random email with a link or an attachment you weren’t expecting, pick up the phone and call the source to confirm.
  3. Trust your gut
    • If something looks suspicious or out of place, verify the source or open a ticket with your IT help desk.  NOTE: Never verify a suspicious email by asking in a direct reply, criminals often monitor the replies and will respond to appear legitimate.
  4. Don’t send money
    • Ignore all emails coming out of nowhere requesting immediate payment, or funds transfers. If you get a request, particularly a random email purporting to come from someone within your company, take the time to contact them via phone to confirm. There is currently an uptick in people using publicly available information to pull off these “phishing” scams
  5. Check The “From” address details
    • Look at the “From” address on all emails. Scammers/malicious actors can use a Gmail, Yahoo or another freely available email service to create an email account and put a trusted name in the display name. This can easily be spotted by looking at the “from” address. For example, the from field could look like “Jane Doe jdoe@companyname.com (jeat8080@gmail.com)” – an attempt to look like it’s coming from Jane, but is really from the randomly named Gmail account in the header.  IGNORE these emails.

In summary – be careful, cautious, and smart to keep you and your computer network safe and secure.

Have a question about cyber security?

Looking for help assessing and improving your current network security? We are happy to help – give us a call (860.656.9110) or send in a request to talk by clicking here.

person looking at Office 365 on a mobile device

3 Benefits of Having Office 365 Support

Remember the first time you used Microsoft Word to create a document? How about your first PowerPoint with a ton of clip art? Microsoft Office isn’t that simple anymore, but it also makes your life easier if you know how to use it. If you’re struggling your way through the powerful software, let a managed service provider (MSP) help. Here are three benefits of having Office 365 support:

24/7 Office 365 Support

How many times have you intended to complete your work during regular hours but time got away from you? When you start to crank the midnight oil, but something goes wrong, a quick call to a customer service line will end with you learning about their hours of operation.

You might have installed the latest version of PowerPoint before leaving work, but if it crashes every time you open it, you might not be prepared for your presentation the next day. Without the help of a professional, you could spend hours searching for solutions that don’t even work. With an MSP, hours can turn into minutes.

An MSP knows how valuable the Office Suite is to your success, and 24/7 software support is one of the many services they include.

Expedited Office 365 Support

The alternative to having an MSP available to provide Office 365 support include you or Microsoft’s help line. As mentioned above, if it’s after hours, then you’re all on your own. But even if something goes wrong during your working hours, it’s still cutting into your productivity.

A quick call to your MSP will get you in touch with a real person who can provide the fastest solutions possible.

Increased Efficiency

If you’re still using Office applications like you did in the ‘90s, you might not know any better. But if an MSP sells you an Office 365 subscription, it’s their job to inform you of all the software’s benefits. Office 365 is no longer a couple of applications. It’s a powerhouse suite of tools to streamline your company’s workflow. From serving as your business’ inbox and calendar to cloud-based storage, Office 365 is a world of possibilities to explore. Let your MSP be your guide.

At IT Direct, we’ve studied every inch of Office 365 and can help you leverage the software to increase your business’ productivity.

Take advantage of Office 365!

Follow the futuristic interior space station toward your business growth.

5 Business Growth Secrets from Emperor Palpatine

Emperor Palpatine, the supreme ruler of the most powerful, tyrannical regime the galaxy has ever witnessed might seem a little brash, but he is nothing short of ambitious. Although Emperor Palpatine might lack in charisma, he is able to balance out his skills with candor. Palpatine’s directness led to his widespread appeal throughout the senate and granted him the ability to abolish the Imperial Senate. Emperor Palpatine has five business secrets that could help your business experience greater growth and success.

SURRENDER TO YOUR BUSINESS GROWTH

The power of the force is with you, if you choose the light or the dark side, give you whole heart to your business. In the words of Sheev Palpatine, “The dark side of the Force is a pathway to many abilities some consider to be unnatural.” Passion will keep you motivated as you go down the path of success and overall help you trust that you’re pursuing the right course of action.

PRACTICE, PRACTICE, PRACTICE

One cannot conquer the force without practice. The sith’s hunger for conquest and control is learned through the teaching of legendary masters who have shaped the struggle between light and dark.

GET A GUIDE

Trust those you choose to become partners with. Allow them to help you build a plan of action that encompasses wise time management, money, and resource management. Business partners are meant to solidify customer and employee loyalty through recognition, appreciation, and can work together towards achieving long term business growth.

VISUALIZE THE BUSINESS GROWTH

Not everyone is trying to become a mastermind of an evil empire, but Palpatine clearly understands what it takes to achieve success. Visualize the end goals you wish to achieve as your business continues to make headway.

PLAY THE EDGE

Be ambitious. Although Darth Sidious (Emperor Palpatine) used his position to manipulate galactic events to his own manipulative design, don’t use your role for evil. Take his execution and transform it in a positive light. You can become more competitive by studying the ongoing transitions that are happening within your market.
If you have any questions on how to be successful with your business growth or implement IT support services – Contact Us Today.  

Best Password Security Practices

The Guide to Password Security
(and Why You Should Care)

Find out how your password security can be compromised, and
how to create and manage secure passwords.

 

Passwords — especially those not supported by two-step verification — are your last lines of defense against prying eyes. This guide will help you understand how those passwords are exposed, and what you can do to keep them locked down.

HOW ARE PASSWORDS EXPOSED?

Before we dive into the how-tos of creating secure passwords, it’s important to understand why you need a supersecure password to begin with. After all, you might be thinking, “Who would want to hack my accounts?”

There are a few ways your account passwords can be compromised.

1. Someone’s out to get you. There are many people who might want to take a peek into your personal life. If these people know you well, they might be able to guess your e-mail password and use password recovery options to access your other accounts.

2. You become the victim of a brute-force attack. Whether a hacker attempts to access a group of user accounts or just yours, brute-force attacks are the go-to strategy for cracking passwords. These attacks work by systematically checking all possible passphrases until the correct one is found. If the hacker already has an idea of the guidelines used to create the password, this process becomes easier to execute.

3. There’s a data breach. Every few months it seems another huge company reports a hacking resulting in millions of people’s account information being compromised. And with the recent Heartbleed bug, many popular websites were affected directly.

WHAT MAKES A GOOD PASSWORD?

Although data breaches are out of your control, it’s still imperative to create passwords that can withstand brute-force attacks and relentless frenemies. Avoiding both types of attacks is dependent on the complexity of your password.

Ideally, each of your passwords would be at least 16 characters, and contain a combination of numbers, symbols, uppercase letters, lowercase letters, and spaces. The password would be free of repetition, dictionary words, usernames, pronouns, IDs, and any other predefined number or letter sequences.

Related Tutorials

Mastering the art of passwords

The 10 password commandments

How to check password strength

The security-savvy community evaluates password strength in terms of “bits,” where the higher the bits, the stronger the password. An 80-bit password is more secure than a 30-bit password, and has a complex combination of the aforementioned characters. As a result, an 80-bit password would take years longer to crack than a 30-bit password.

Ideal passwords, however, are a huge inconvenience. How can we be expected to remember 80-bit (12-character) passwords for each of our various Web accounts? That’s where many people turn to password managers like LastPass, Dashlane and 1Password.

KEEPING TRACK OF SECURE PASSWORDS

If you follow one of the most important commandments of passwords, you know that you absolutely must have a unique password for every service you use. The logic is simple: if you recycle the same password (or a variation of it), and a hacker cracks one account, he or she will be able to access the rest of your accounts.

Obviously, you can’t be expected to memorize dozens of complicated, 16-character-long passwords.

This guide thoroughly explores the different options for managing your passwords, including things like storing them on a USB drive, and even writing them down. Although it’s ultimately up to you, he presents a strong argument for using the ol’ sticky note method.

Using a Password Manager

Password managers store all of your passwords for you and fill out your log-in forms so that you don’t have to do any memorizing. If you want supersecure passwords for your online accounts (which is recommended), but you don’t want to memorize them all (also recommended), this is the way to go.

There are many options available, but a few crowd favorites are LastPass, Dashlane and 1Password. All three password managers essentially work the same way. There is a desktop program (or mobile app), which you’ll use to manage your passwords. Then, there’s a browser extension that automatically logs you into accounts as you browse the Web.

If you haven’t yet started using one, let me preemptively say: you’re welcome. Password managers are huge headache-savers, and you’ll wonder how you ever commanded the Web without one.

The tiny caveat is that you’ll still have to memorize one thing: Your master password. This unlocks all your other passwords. Make your master password extra-secure by composing it of at least 12 characters to ensure that it’s not vulnerable to any brute-force attacks. LastPass and other password managers like Dashlane and 1Password also have mobile apps, so you can easily access your passwords when you’re signing into accounts on your phone or tablet.

It’s worth noting, however, that just like any software, password managers are vulnerable to security breaches. In 2011, LastPass experienced a security breach, but users with strong master passwords were not affected.

 

Author Information

Sharon Profis (@sharonprofis)

January 1, 2016

Via CNET

 

April 2016 Tech Tips – Spring Cleaning for Your PC!

Here are your Tech Tips for the month of April to help you be more productive. As always, reach out anytime! We are here to help.

Springtime is here! While doing your Spring cleaning this season, don’t forget to include your PC. Many would be surprised to see the amount of dust and dirt that your computer can acquire in one year, as well as the long-term effects if ignored. Here are a few tips for polishing up your PC’s hardware:

  • Your hands are all over your keyboard and mouse all day, so it’s inevitable for them to harvest germs. Before cleaning your keyboard and mouse make sure that they are unplugged, and be sure to remove the batteries if they are wireless. Your keyboard has many small cracks and crevices, so before cleaning it, it is always a good idea to turn it upside down and attempt to shake out any debris. A can of compressed air can also be helpful for getting those hard to reach places in your keyboard. Following this, both devices can be cleaned with disinfectant wipes, and then dried with a microfiber cloth to polish.
  • You may not realize it, but your monitors are extremely sensitive. While cleaning your monitor screen, never use a purely alcohol-based product, as this can potentially strip some of the monitor’s coating. To avoid causing scratches on the screen, never use a standard cloth or paper towel while cleaning – always use a microfiber cloth.
  • Cleaning out the internal hardware of your computer is just as important as cleaning out the external, and it’s easier than you think. It is recommended to clean the dust out of your tower, primarily your fan, at least once every eight months using a can of compressed air. To do this, first make sure your computer is off and has had plenty of time to cool down. Next find an open, well-ventilated space for yourself, and gently open the tower casing. Using short, strong pumps of air, blow the dust off of your hardware. While cleaning your fan, be sure to hold it in place to avoid damage from spinning it the wrong way.

We hope with these tips, you won’t run from your PC Spring cleaning, and will have it looking like new in no time! The more effort you put into loving your computer, the more it will love you back!

Please feel free to contact us if you have any questions!