Blog

June 16th, 2009

Microsoft Windows 7 will be in stores October 22, but surprisingly few details of its features have been released. Thankfully, Ed Bott, a ZDNet blogger, researched it for his readers. We now know that, like its predecessor Vista, Windows 7 will ship with different editions: Home Basic, Home Premium, Professional, and Ultimate/Enterprise, and the new Starter Edition, specifically for Netbooks. All share the same enhancements in speed, performance, and security, as well as many UI enhancements and new applications such as Internet Explorer 8 and Windows Media Player 12. The entry-level editions lack support for business-specific features such as encryption, virtualization, and the ability to join a domain, and limited customization options (lack of support for the Aero interface, for example). The premium editions feature interesting new add-ons such as support for Touch Applications. Vista customers will be happy to know that Microsoft announced an upgrade program for customers who have purchased Vista before Windows 7’s release. Want to know if Windows 7 will benefit your business? Give us a call today and we’ll help you decide. Related articles:

Windows 7 – It’s like Vista, only less annoying

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
June 15th, 2009

Google announced the release of a new Local Business Center feature called Search Dashboard that promises to help small businesses gain insight into how visitors came across their local listings.

Local Business Center is a Google service that allows business owners to enhance their business listings in Google Maps and other search results. With Search Dashboard, users are able to view statistics on how local listings are found across different websites within Google. For example, it shows when website visitors clicked on driving directions included with listings as well as those visitors’ Zip Codes.

Let us show you how this service can help you target ads to regions where your customers and prospects live.

Related articles:

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
June 8th, 2009

Research recently released by antivirus vendorsMcafee and Panda suggest that searching for certain key words onInternet search engines can prove dangerous.Hackers and malware authors have become adept at Search Engine Optimization and are using frequently searched key words to create sites that will rank favorably in search engines, but are a host for malware or phishing attacks.

According to the report, many popular search terms are targeted, such as: lyrics downloads, free downloads, swine flu, and rihanna. Users are urged to always protect themselves by using patched systems and updated protection tools such as antivirus software. We can help you make sure you’re protected when surfing the Internet – give us a call today.

Related articles:

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
June 8th, 2009

A new study, “Understanding Growth Priorities of Small and Medium-sized Businesses” conducted by the Economist Intelligence Unit and sponsored by services company Verio, finds that 83 percent of small-business executives are optimistic about their potential for growth once the economy turns.More than half of the respondents believe there will be a worldwide economic upturn by the middle of next year. One-quarter expect to see the global economy begin to recover by the end of 2009 and 34% anticipate a rebound by mid-2010.

An interesting insight from the study reveals the expected role of technology in the recovery. Approximately 57 percent of the executives surveyed “agree” or “strongly agree” that technology will be a huge deciding factor in their ability to emerge successfully from this recession. About 20 percent said they would invest more heavily in innovative technology to help them surpass their competitors.

Are you one of them? Give us a call and we’ll help you explore ways technology can help your company grow.

Related articles:

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
June 1st, 2009

Tech-savvy criminals have thought of with a new way of scamming us out of our money. In a twist to “phishing” (when spoofed websites are used to trick users into surrendering passwords or credit card numbers), “vishing” is when phone calls using spoofed caller ID numbers hide the identity of the caller and trick people into surrendering sensitive information. Usually, vishing attacks play a recorded message that tells users to call a toll-free number, where they are asked via an automated attendant to punch in a credit card number or other personal information. Attacks are on the rise since with Voice over IP phone technology, caller ID spoofing is very easy to do.Protect yourself by registering your number with the National Do Not Call registry at donotcall.gov. Some criminals and unscrupulous telemarketers may ignore the list, and if you continue to get calls, it’s a tip that the offer is bogus. Contact the authorities immediately if you do get scammed, and always play it safe and don’t surrender your information to unknown sources.

Related articles:

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
June 1st, 2009

Security company Websense released a survey of of 1,300 IT professionals worldwide revealing that although social media or the use of “Web 2.0″ technologies such as blogs, wikis and social networks are already pervasive in business, a majority of IT managers seem ill equipped to manage its use, much less protect against security concerns associated with it. According to the survey, 70 of the top 100 most popular websites, many of which are social media sites, had hosted malicious content at some point. The study points to 150,000 spoofs of Facebook alone. In addition, 57 percent of data-stealing attacks are conducted over the Web. Because the nature of Web 2.0 sites allow for users to create and post their own content, it’s easy for cyber criminals to gather information and use it for threats, attack or fraud. Though 80 percent of the IT managers surveyed were confident in their company’s Web security, only nine percent said they have the necessary tools to protect against social media threats. If you feel your organization may be at risk, give us a call today – we can help.Related articles:

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
May 25th, 2009

Last May 14th, reports indicated that hackers had launched a phising attack on Facebook’s 200 million users, successfully stealing passwords from some. The hackers set up websites designed to look like the Facebook home page. Victims were directed to log back in to the site, but were routed to the fake site instead, unwittingly giving away their passwords. Facebook has deleted all references to the fake domains, which included www.151.im, www.121.im and www.123.im. This is the latest in a string of campaigns launched by hackers to steal personal information from users and to spread spam. Facebook’s large user base makes them an attractive target for many cybercriminials. Users are urged to seek help from authorities or trusted IT consultants if they believe their accounts were compromised, or to avoid similar scams.Related articles:

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
May 4th, 2009

Research conducted by SIS International Research and sponsored by Siemens found that small and midsized businesses (SMBs) with 100 employees could be leaking a staggering $524,569 annually as a result of communications barriers and latency. The study identifies these top five pain points, in order of estimated cost:

  • inefficient coordination
  • waiting for information
  • unwanted communications;
  • customer complaints
  • barriers to communication

In addition, researchers determined that the time spent per week dealing with communications issues was more than 50 percent higher in companies with more than 20 workers. In hard costs, your company could be losing up to half a million dollars each year by not addressing employees’ most painful communications issues!
The good news:  we can help you implement applications and services to greatly improve your inter-company communications, including collaboration tools such as email and shared calendards and address books, social media technologies such as blogs and wikis, and IP-based communication tools such as instant messaging (IM) and Voice-over-IP (VoIP). Call us today and let us help you stop this expensive leak.Related articles:

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
May 4th, 2009

Microsoft recently announced the release of the newest service pack to Microsoft Office 2007, and has finished work on the second service pack update to Windows Vista. The MS Office update includes a collection of stability and performance updates as well as support for more file formats including Open Document Format (ODF) and Portable Document Format (PDF) files. The Windows Vista update includes support for Bluetooth 2.1, an updated Windows search technology, and the ability to natively record data to Blu-ray discs. Download the Microsoft Office 2007 service pack to install and watch out for the Windows Vista update soon. Ask us how your workflow can benefit from these helpful new releases.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
April 27th, 2009

Looking for a website or online resource for Security Tips and Best Practices? Check out the Federal Trade Commission’s (FTC) OnGuardOnline program, which the FTC began in partnership with cybersecurity experts, online marketers, consumer advocates, and federal officials in 2005. While there, check out the articles and free resources such as videos, games, and downloadable files to help you guard against Internet fraud, hacking, and other security threats.The site also offers the following seven vital security practices:

  1. Protect your personal information. It’s valuable.
  2. Know who you’re dealing with.
  3. Use security software that updates automatically.
  4. Keep your operating system and Web browser up-to-date and learn about their security features.
  5. Keep your passwords safe, secure, and strong.
  6. Back up important files.
  7. Learn what to do in an “e–mergency.”

If you suspect Internet fraud, you can register a complaint using this form. The FTC enters Internet, telemarketing, identity theft, and other fraud-related complaints into Consumer Sentinel, a secure, online database used by law enforcement officials in the U.S. and overseas. Check out the site or contact your IT Consultant to help you implement the recommendations from the site.

Related articles:

Published with permission from TechAdvisory.org. Source.
Bookmark and Share