Centrend

Author name: admin

Is It Illegal To Track Your Employees’ Activities When They’re Working From Home?

Along with the surge of people working from home or in hybrid situations over the last few years, there has also been an increase in employers looking for ways to monitor their employees’ work activities to ensure they actually ARE working when remote. This is no surprise given the new “quiet quitting” trend that has now evolved into “Bare Minimum Mondays” and “Try Less Tuesdays.” Sadly, some employees are taking advantage of working remotely as a way of working less. Of course, not all remote employees are slackers – but how can an employer know the difference? That’s where tools like Teramind and ActivTrak come into play. These are software tools that can be installed on employees’ workstations and laptops to monitor their activity, both while in the office and remote. Not only will these tools provide insights into productivity and where employees are spending their time, an employer can also see when someone checks in to work and leaves for the day. These apps can also help in ensuring employees aren’t surfing inappropriate websites during work hours using company resources. While many people are against monitoring, it’s perfectly legal in the US, provided this is for work-related activities on workplace devices. Monitoring laws do vary by state, so you should always check with an HR attorney on any employee-related monitoring. While there is no requirement to gain consent on a federal level, some states require that you establish consent before monitoring. It’s also legal to monitor company-owned devices outside of work hours, including Internet traffic, search terms, websites visited, GPS geolocation and content viewed, to name a few things. If you issue your employees’ phones, you are legally allowed to monitor them as well. It’s even legal to monitor your employees’ own personal devices if you have a BYOD (bring your own device) to work, provided those devices are used for work purposes. If you are thinking of rolling out employee-monitoring software, here are a few recommendations. Let your employees know you WILL be monitoring them, and how, before rolling out any monitoring activities. Being totally transparent about what you are monitoring and why is important to establishing and maintaining trust with your employees. Most people would be very upset to discover you were monitoring them without their knowledge. While it’s legally your right (in most states) to monitor without letting them know, we feel it’s best to be open about this so they understand what’s being recorded. Put in writing what is and isn’t allowed during work hours and on company-owned assets. If you don’t want employees visiting what you deem as inappropriate websites and mixing personal activities with work activities on company-owned devices, let them know that. If they work from home, set guidelines such as start and end times for work and how long and how frequently they can take breaks, detailing when they need to be available (at work). No one likes getting a speeding ticket when there’s no speed limit signs posted. Be absolutely clear on your expectations and put them in writing so there’s no risk of “You never told me that…” happening. Get legal advice before implementing any kind of monitoring software, cameras or activities. Laws can change – and with privacy of data becoming more critical (and a legal hot potato), we suggest you work with an HR attorney to make sure you’re not violating anyone’s rights. Recently, the fast-food restaurant White Castle was hit with a lawsuit that could cost them up to $17 billion for using fingerprint login software for their employees to access certain systems. The lawsuit claims they violated Illinois’s biometric identification laws by asking employees to use their fingerprint as a secure way of logging in to their systems without first gaining consent. So, while it’s legal to monitor employees, you still need to be mindful of employment laws and data and privacy protection of the employees you monitor. Need help implementing a more secure and productive remote workplace? Click here to schedule a quick call to discuss your options and to get ideas on how we can help you and your entire team be productive and safe, no matter where or how you choose to work.

Is It Illegal To Track Your Employees’ Activities When They’re Working From Home? Read More »

The One Lesson Business Owners Miss When Training Employees That Can Cost Them Thousands

Training employees on anything can be an expensive process. You incur the cost of investing in necessary materials plus the time it takes away from your employees doing revenue-generating activities. But what’s worse when it comes to cyber security training is the expense you’ll incur if that training fails. Recent studies show that human error plays a role in a shocking 90% of data breach cases! Smart business owners are taking a proactive approach and training their employees on cyber security do’s and don’ts. While we applaud their efforts and encourage all owners to take this step, research suggests their efforts aren’t paying off. Despite their willingness to train employees, the number of data breaches continues to increase. What gives? We’ll be first to say it – cyber security training can be boring. And what happens during boring presentations? People aren’t engaged, so they tune out and miss the critical information needed to keep your company secure. After the presentation, they sign off, saying they have learned the lessons, but have they really or are they a ticking time bomb in your organization? The latter is likely true. If you want the information to stick, you must take some additional steps – and the most important is putting them to the test! According to Education World, interactive activities are six times more effective when learning and remembering material than simply listening to a lesson. You can incorporate this tactic by putting employees to the test to find out whether or not they can apply what they learned. One of the best ways to do this is to use phishing simulations. Here’s how the process works: A third party creates a realistic but fake phishing e-mail that shows identifiable signs discussed in the training. An example could be creating an e-mail that is similar to the CEO’s requesting private information, an outside company sending a bad link, etc. You can customize it to look like something relevant that your employees could potentially see and fall for. The employees are then put to the test. You choose which employees will receive what links and what dates the e-mails will be sent. Will they be able to identify the threats or will they fall for the scams? The results are collected and shared with you to develop more comprehensive training programs and help you identify which employees are your biggest risks so you can provide specific coaching. Another great way to use phishing simulations is to send out the tests before the training. When employees see that people in the company are making mistakes, they are more likely to pay attention to the lesson. It’s not enough to just teach the information! It must be learned and implemented every day to be effective and keep your organization secure. If you’re looking for effective cyber security awareness training for your employees, our team has a comprehensive program that will engage, teach and test your employees so you can have peace of mind knowing they are working to keep your company safe. Book a FREE call using the link to get in touch with our team and get started on your cyber security training session today. https://calendar.app.google/jSA1tteBxFJKnJkX6

The One Lesson Business Owners Miss When Training Employees That Can Cost Them Thousands Read More »

Cybercriminals Are Deploying Powerful AI Powered Tools To Hack You – Are You Prepared For What’s Coming?

An Arizona family was recently in the news warning others about how they were the target of a ransom call in which scammers used AI (artificial intelligence) to clone their daughter’s voice to convince the parents they had kidnapped their daughter, with the apparent goal of extorting money. DeLynne Bock, the mother of Payton Bock and target of the con, said she feels she can easily spot a fake scam call, but this was on a whole other level. According to the news story, the scammers called their home, where DeLynne’s husband answered the call. A man on the other end of the line was screaming and using foul language, saying his daughter had caused an accident, hitting his car, and couldn’t find her insurance. From there, he started making threats, saying he had her tied up in the back of his truck.  What made the call so convincing was the deep fake of her daughter’s voice on the other end of the line – pleading for help, crying. Unable to reach her daughter by phone, DeLynne called the police while her husband kept the man on the phone. “I called the police, and they’re saying, ‘This is possibly a scam situation.’ I said, ‘There is no way this is a scam. This is my daughter’s voice,’” DeLynne said. “This wasn’t just some person pretending. As a mother, you know your daughter’s voice, and this was my daughter.” Apparently, this wasn’t the first time this happened which is how the police were able to suggest it could be a scam. This is just the latest iteration of how hackers are using AI to produce deep fakes to extort money. AI and ChatGPT have been in the news recently for a reason – AI is an extremely powerful tool that, if put in the wrong hands, can do a lot of harm.  It’s not a stretch to imagine the use of AI to fake a CEO’s voice, signature, or writing style in an e-mail, text, call, or instant message to trick an employee into sending money or doing things that would severely harm the organization, such as providing a login or access to the company’s network, data or critical applications. Or similarly use this same type of approach to scam clients or patients into giving up confidential information or payments.  A report released by security experts at Home Security Heroes showed that 51% of common passwords could be cracked in less than one minute using an AI. Both the length and complexity of the passwords factored into the speed of successfully cracking the password, but even a complex password with seven characters using both uppercase and lowercase letters, numbers and symbols took just minutes to crack. This means it’s hypercritical for all business owners to no longer rely on strong passwords and simple antivirus to protect their organization.  Today, all businesses should have some type of security awareness training for their employees. For example, simply sharing this article and others we publish like them with them can go a long way toward making sure they’re always on high alert for scams; but sharing the occasional article is not enough. You should have some type of ongoing reminders and formal training so that it’s always top of mind. Employees AREN’T “too smart” to fall for these scams. If someone can trick a mother into believing her daughter has been kidnapped by duping her daughter’s voice, they can trick an employee into clicking on a link, giving them access or transferring funds – and it’s happening right now to a lot of businesses. Second, you need to work with your IT company to ensure they have implemented robust cyber security tools and protections, as well as disaster recovery protocols so if you are ransomed, you can be sure to recover your data. This is not an area to be cheap about. Most people stubbornly believe it won’t happen to them, or that it will be a minor inconvenience, not the costly, business-crippling, and devastating disaster that a cyber or ransomware attack can have. An ounce of prevention goes a long, long way toward minimizing your risk.   If you want to make sure your IT services provider is protecting you properly, click here (https://calendar.app.google/jSA1tteBxFJKnJkX6) to request a FREE IT Security Risk Assessment. This assessment is not time-consuming, invasive, or difficult to do, but will give you the unvarnished truth about your current security and whether or not you will be properly and brilliantly prepared for a cyber-attack.

Cybercriminals Are Deploying Powerful AI Powered Tools To Hack You – Are You Prepared For What’s Coming? Read More »

Facebook Owes You Money!

How To Apply For Your Share Of Facebook’s Recent $725 Million Privacy Lawsuit Here’s a shocker: Facebook is being forced to pay a whopping $725 million in a settlement following a number of lawsuits claiming they violated users’ privacy. This is in addition to another class action lawsuit for $650 million for storing and collecting the biometric data of nearly 1.3 million Illinois residents without their knowledge or consent.  The lawsuits allege that Facebook shared data from users and their friends with third parties without the users’ knowledge or consent and then failed to monitor or direct how these third parties accessed the data or what they did with it. The plaintiffs’ lawyers estimate about 250 to 280 million people may be eligible for payments as part of this suit. The money being paid to each person depends on how long they’ve had a Facebook account and how many people actually file claims. Users will get “points” for every month they’ve had an account between May 24, 2007, and December 22, 2022. The money will be split (after lawyers’ fees are paid, of course) based on those numbers, so don’t expect a financial windfall that will allow you to move to Beverly Hills. The only people getting rich here are the lawyers. If you had a Facebook account during the dates above, you’re automatically part of the settlement, but you must submit a claim by August 25 of this year using this website. If you do nothing, you won’t get paid and you’ll give up the right to sue or be part of another lawsuit against Facebook related to these claims. However, if you’re feeling ambitious (and have deep pockets to pay the legal fees), you can choose to opt out of this lawsuit and attempt to sue Facebook separately, under your own initiative.  We should all be happy that big tech companies accessing, selling, and sharing our data without our knowledge or consent are being held accountable; but it’s not enough to depend on lawyers or our government to protect our identity and personal information. Companies like Meta make far too much money from our data to turn away from selling it and using it. For example, Meta made over $116 billion last year from a FREE app. That money is coming from selling access and data. This lawsuit, while sizeable, only represents just 0.62% of the company’s total revenue – a rounding error. The entire dark web and the rise of hacking demonstrate how much money there is to be made from gaining access to personally identifiable information, so you need to be careful you don’t end up a victim of your data being stolen, shared, and sold.  One of the ways to prevent your information from being shared is by going into the privacy settings on Facebook and finding “Your Facebook information.” From there, click “Off-Facebook activity” and “Recent activity” to clear your history. You can also click “Manage future activity” and choose “Disconnect future activity” to disable this feature. Of course, if you like the ads you get from Facebook this will (should?) make all of that go away.  Another suggestion is to check the privacy settings on your phone to ensure apps installed aren’t getting free access to your camera and microphone unless specifically given permission by you to perform those functions. Many apps will install with that access feature turned on and require you to opt-out.  Of course, as a business owner, YOU have to also think about how you are storing and using your client’s data. As this lawsuit proves, the government is taking data privacy and protection seriously, which is why you’re seeing more regulatory compliance for data security and privacy hitting all industry sectors. If you want to make sure you’re not accidentally exposing your clients’ data and violating data protection laws, schedule a quick call with us to discuss your concerns and see if there are ways we can help you avoid exposing your clients’ and employees’ data by accident. 

Facebook Owes You Money! Read More »

Microsoft Teams Productivity Tips Every SMEs Needs To Know

Every business needs the right tools to get the job done and to keep your team on track. But juggling multiple apps and software can be a nightmare when trying to keep information streamlined and easily accessible. That’s where Microsoft Teams for small businesses comes into play. In this article, we’ll explore the 10 best Microsoft Teams hacks so everyone in your company has everything they need at their fingertips.  The 10 Best Microsoft Teams Hacks For Small Businesses 1) Share And Co-Edit Files The demand for coworking capabilities has risen in recent years. And while modern working conventions have dictated the need for more collaborative software, there are real statistics to back up the benefits of co-editing.  According to a study from Deloitte, “When workers collaborate, 73% do better work, 60% are more innovative, 56% feel more satisfied, and 15% work faster.”  Microsoft Teams understands this and has continued to develop its ability to share and co-edit files. With 10 GB of cloud storage per user, it’s easier than ever to work on documents with others no matter where you are.  You can also quickly share document files by attaching them to a chat within Microsoft Teams so there’s no need for extra emails to share information. 2) Filter Messages  Along with our previous point, running an efficient business often means having messaging software that can keep up. However, it can be overwhelming when you have a sea of messages and no way to mark or find what you’re looking for.  Not anymore. With Microsoft Teams, you’re able to filter messages and find exactly what you need. This replaces the need to use an additional messaging service, such as Slack, and keeps everything within one comprehensive platform.  This eliminates the headache of switching back and forth between platforms and having to have multiple windows open all the time to get work done.  3) Host Meetings Hosting meetings is another huge capability of Microsoft Teams. The software allows you to schedule virtual meetings with hundreds of participants at a time. That means you have everything you and your team need, no matter the size of your business. Recent updates have also expanded the ability for co-hosting breakout rooms as well. More features mean more ways for your team to connect! 4) Live Translated Captions  2023 updates for Microsoft Teams have increased accessibility as well. For example, there’s a new setting you can toggle on and off that will allow for live translated captions to appear during meetings.   The system will save your settings for every meeting, or you can simply toggle it off when you no longer need it. The choice is ultimately yours. You can also get the meeting transcripts when done to quickly review just the one part you were looking for! 5) Chat Features  One of the best features of the Microsoft Teams experience is the chat. With unlimited chats and the ability to filter through them, as we mentioned earlier, your team can have important conversations while also getting work done in the same place. New this year, the platform now allows you to delete chats on your end while leaving them open on the other person’s when you no longer need the information. In addition, you can easily add people to existing conversations, and AI technology can suggest who you might want to talk to next. These features make it easier than ever to collaborate with others and keep everyone on the same page. 6) Picture-In-Picture Functionality  Not every meeting needs your full attention. Teams have picture-in-picture functionality that allows you to have a meeting playing while you are doing other things.  That means you don’t have to put down other work while you’re on less important calls and can multitask.  7) Do Not Disturb In addition to picture-in-picture display options, there are other ways you can value your time with Microsoft Teams settings.  This platform allows you to toggle on “do not disturb” when you need to step away from your desk, are taking a vacation, or going home/logging off at the end of the day.  There are plenty of things that can wait until tomorrow, and you deserve to set healthy boundaries when it comes to getting work done and taking time for yourself and your family.  8) Data Encryption When you’re using an all-in-one comprehensive platform, a lot of information is exchanged. Between attaching important documents to chat threads to day-to-day communications, you need to know that all your information and your client’s information is safe.  Microsoft Teams has you covered. With data encryption, you don’t have to worry about private information leaking on the internet. That means peace of mind for you and everything you work with. 9) Multi-Question Polls The last feature we’ll mention that’s new in 2023 is the ability to have multi-question polls within a meeting. This gives you more flexibility to ask the questions you need and gives you an easy place to collect that data. It’s never been easier to run a meeting and gather information. 10) Save MONEY (Thousands a month!) Most businesses already have Microsoft Teams included in their current software package and can save a lot of money by eliminating redundant services. Paying for dozens (or hundreds) of employee licenses for Slack, Zoom, Monday, Basecamp and more may be a thing of the past using the features already included in Microsoft Teams. Many companies we look at are needlessly spending tens of thousands or more on these other services and that money goes straight to the bottom line.  Microsoft Teams For The Win Whether you’re looking for a solution to messaging, collaborative working, video calls, document sharing, or accessibility features within your organization, Microsoft Teams can help your small business accomplish exactly what you need.  With these 10 features — and many more — you will be better equipped to work together as a team and won’t have to waste time cobbling together multiple apps along the way.  Centrend Inc. specializes in working with small businesses to make them more productive and profitable while keeping their data and business protected. To see what we can do for you, click here https://calendar.app.google/jSA1tteBxFJKnJkX6 or go to: www.centrend.com to schedule a quick discovery call.

Microsoft Teams Productivity Tips Every SMEs Needs To Know Read More »

10 Common Tech Problems SMEs Are Eliminating From Their Business Forever

They say, “You get what you tolerate” and now more than ever, we’ve been conditioned to tolerate worse service at higher prices. Companies get a ‘free pass’ simply by saying phrases like “the labor shortage,” “because COVID,” or “inflation.” But it doesn’t have to be that way. While you may be able to still do business even with some less-than-stellar vendors in some areas if all your computers were to suddenly stop working, your network go down, your files gone, chances are you’d be dead in the water. Your business depends on technology, and you need to make sure everything is up and running RIGHT and you’re protected ALL the time. Here’s a list of ten common problems, complaints, and just downright failures in service we hear of all the time…and I’ll show you how to eliminate them in your business. When you call your IT company, your message goes to voice mail and you’re stuck waiting hours (or even days) for a call back so your problem gets resolved. You often must reach out multiple times to get a problem resolved and you need to check back to see what the status is and get a timeframe. Your IT company doesn’t proactively monitor, patch and update your computer network’s critical security settings daily (or at least weekly) leaving your entire business vulnerable to attacks. Your IT company doesn’t offer proof that they are backing up ALL your data, laptops, and devices. Your IT company doesn’t meet with you regularly (at least once a quarter) to report what they’ve been doing, review projects and offer new ways to improve your network’s performance instead of waiting until you have a problem to make recommendations. Your IT company doesn’t provide detailed invoices that clearly explain what you are paying for. Your IT company doesn’t explain what they are doing and answer your questions in terms that you can understand, NOT in “geek speak” and they don’t routinely ask if there’s anything else they can help with, no matter how small. Your IT company doesn’t proactively discuss cybersecurity with you or make recommendations for protecting your network from ransomware and offer employee training videos, so they don’t fall victim to a scam. Your IT company hasn’t provided you complete network documentation, and they hold the “keys to the kingdom” refusing to give you admin passwords so you’re totally helpless if something goes wrong and you can’t get a hold of them. Techs arrive late and dressed like they just got out of bed, and you cringe every time you need to make that call because they’ll make you feel dumb or like they are ‘doing you a favor’ even though you’re paying them! If you’re tolerating any of these common problems, know that you don’t have to! You could be paying for substandard support and worse, not be keeping your company protected. This could jeopardize your data and your network’s security and cost you thousands in lost productivity because you and your employees are spending time dealing with problems that shouldn’t exist. If that’s the case, then it’s time you see what else is out there and make sure you’re getting what you pay for. To schedule a free 10-minute discovery call to see how we can get rid of your tech issues, go to https://calendar.app.google/jSA1tteBxFJKnJkX6 or call us at 774-241-8600.

10 Common Tech Problems SMEs Are Eliminating From Their Business Forever Read More »

The Biggest Risk Is Not The One You Don’t Take, But The One You Don’t See

“The biggest risk is the one you don’t take” is a mantra you’ll hear motivational speakers deliver in their presentations to make the argument that you should throw all caution to the wind and go for it (whatever “it” is). And while that may be a good piece of advice to get someone to take action on an idea (and get the speaker applause at the end of their presentation), truly smart, experienced entrepreneurs and business executives NEVER throw “caution to the wind” and take wild risks. They take calculated risks, weighing consequences and putting buffers, hedges, and checks in place to reduce the risk and potential losses. They look for the risk because they know unchecked optimism is not only foolish, but dangerous, and Murphy is always standing by with a big wrench in hand, ready to throw it into your best-laid plans. If you follow Warren Buffett’s two rules of investing, you’ll see this same caution: Rule #1 – Never lose money. Rule #2 – Never forget Rule #1. A good question to ask yourself is where are YOU putting your business and your money at undue risk? While you cannot prepare for and prevent EVERY risk in your business, one area where we see a lot of businesses taking huge, unmitigated risks is with their data and cyber security. Despite the overwhelming evidence that the risk and the financial consequences of cyber-attacks are enormous, we still hear, “Nobody is going to hack us…we don’t have anything they want,” or “We can’t get hacked because _____,” with the blank being things like “we use cloud applications” or “we have a good firewall,” “our people are too smart to click on bad links in e-mails,” or other similar “reasons” for their false sense of security. They explain it away. Candidly, it’s our belief that this is not founded in confidence and logical thought but based on willful neglect and a desire to avoid spending the funds necessary to truly secure their data, their business, and their finances. And while I completely understand that nobody wants to spend a lot of money on IT, the risk doesn’t cease to exist just because you choose to ignore it.  One of the smartest investors in the world, Howard Marks, CEO of Oaktree Financial, said, paraphrased, the less risk you perceive, the more risk there is. For example, if I don’t think there’s any chance I can die in a car wreck on my way to the store, I’ll fail to put on my seat belt, text while I drive, and be a lot less cautious about paying attention to the road than if I thought there was a very high chance I could be in a fatal crash. The lower the risk perceived, the higher the risk actually is, because we lower our guard and don’t protect against it.  That’s exactly why small businesses are the #1 target for hackers. They’re EASY prey. Sure, they don’t get the bragging rights of bringing down a company like Dole or hacking into Microsoft Azure, but hacking millions of small businesses for a few thousand dollars each in ransomware pays. You just don’t hear about these attacks because they don’t make the evening news, just like you don’t hear about the 6 MILLION car wrecks that happen every year. Only the big ones – or the ones that seriously impact rush hour traffic – get noticed.  If you are not all that certain that you are truly and fully protected against such hacks, click here (https://calendar.app.google/jSA1tteBxFJKnJkX6) to schedule a brief discovery call with us. We can conduct a quick and easy cyber security risk assessment and tell you for sure if your current IT company is protecting you, and what level of risk you’re at for a cyber-attack. It’s free and comes with no expectations or cost.  Remember, not all successes are measured in gains secured. Sometimes success is defined as losses avoided. If you were given the chance to go back in time and unwind 2 or 3 financial, business, or life decisions you’ve made, knowing what you know now, I’m sure everyone would take that opportunity. Most likely, you’d go back and warn yourself about dumb mistakes you made and put protections in place to avoid losses you incurred. Sadly, there’s no genie in a bottle to make that happen, so an ounce of prevention against cyber-attack IS, without a doubt, worth a pound of cure. Call us today for your FREE Cyber Security Risk Assessment.

The Biggest Risk Is Not The One You Don’t Take, But The One You Don’t See Read More »

5 Seemingly Innocent Download Habits Your Employees Must STOP Now To Avoid A Ransomware Attack

Once upon a time, you could install antivirus software and go about your merry way online and in your inbox, opening, clicking, and downloading files without care. Today, antivirus alone cannot and will not protect you, especially if you INVITE the hack by downloading a file that is infected with a piece of code designed to circumvent your security protocols. Whether it’s a personal computer, phone, or laptop you use for business, here are 5 things you need to STOP doing now to ensure you don’t get hacked. STOP downloading apps from unknown sources. There are thousands of free apps available online that are very tempting to download. Hackers are masters at curiosity and “clickbait” designed to nail you in a moment of weakness. To prevent rogue apps and programs from installing, configure your devices to disallow the installation of programs from unauthorized sources. On your phone, ONLY download apps from your device’s respective app store that are tested and forced to meet the store’s security and privacy requirements.Business owners: while I’m sure all of your employees are trusting souls, it IS possible (and recommended) to have business machines locked down, preventing your employees from downloading any applications (or files) that could harm you and compromise your security. STOP surfing the web unprotected, particularly when accessing downloads. This is particularly true if you are on public WiFi. Starbucks is not going to guarantee your Internet connection is safe, nor is any other business, restaurant, or location offering free Internet access. Talk to your IT company (that’s US!) about installing more than just antivirus, but endpoint protection solutions, like a VPN, that will “hide” you from cyber criminals and filter out nefarious websites and attacks so you CAN use public WiFi without the fear of inviting a hack. STOP opening and downloading files e-mailed to you without extreme caution. Phishing attacks via e-mail are still the #1 way hackers gain access to a network. It’s very common for an attacker to hack into someone’s e-mail and get their list of friends, colleagues, coworkers, and their boss to send e-mails that appear legitimate on “their” behalf, even using their actual e-mail – these are highly sophisticated phishing attacks. So, before you open or download ANY file e-mailed to you, make sure it was the one you were expecting. It’s far safer to use IT-managed file sharing like OnDrive, SharePoint, or Citrix ShareFile to send attachments. But the bottom line, if ANY file “feels” wrong or suspicious about a file download, including a weird extension or suspicious file name, CALL the person who sent it to verify. If it’s important, they can send it again. STOP downloading “bloatware.” It’s common for legitimate, reputable apps to sneak in other applications or toolbars you don’t need. They sell this as a sponsorship to make more money every time one of their users downloads an app. The best way to spot these is to look for checkboxes when installing that automatically opt you into services by default. So, before you hit “Next” and keep rolling to get your app installed, take a second to really read and review what you’re agreeing to when installing that new app. STOP downloading music, software, games, movies, and the like from websites like BitTorrent, RARBG, 1337x, and similar peer-to-peer file-sharing sites. It’s very common for file-sharing networks to be breeding grounds for hackers who post files infected with malicious software for people to download. Some of the ads on these sites are malicious as well. Don’t feel “safe” just because you have antivirus – because you’re not.  Business owners: after showing this to your team for both their work and personal devices, click here (https://calendar.app.google/jSA1tteBxFJKnJkX6) to schedule a quick 10-minute call to find out how we can implement security systems that will give you stronger protections against hackers and against employees who accidentally click on or download a malicious file. 

5 Seemingly Innocent Download Habits Your Employees Must STOP Now To Avoid A Ransomware Attack Read More »

How To Get More Productivity Out Of Every Employee (And Make Them Happier About It)

You’ve heard the phrase “Get with the program!” It’s often used as a direct order to someone to fall in line with the way things are supposed to be done at your company. The problem is, most business owners don’t have “a program” for employees to get with, and therefore they get wild and erratic results, as well as a lot less performance, output, and productivity, from each person they employ. Then everyone’s frustrated – you, because nobody is doing what you need them to do, and them, because they weren’t given clear instructions and guides on the work and results they are supposed to be doing. Given the current economic environment, with inflation still high, salary demands on the rise, and a potential hard recession looming, no business can afford to employ people who aren’t “with the program” anymore. To be clear, I’m not talking about a sweatshop, boiler-room “manual” of step-by-step instructions on every little thing you do in your office (although that may be necessary for some positions and tasks). I’m talking about a well-thought-out and clearly communicated set of RESULTS and EXPECTATIONS for each person in your company, so they can be extremely clear about what results they are supposed to be delivering for you. We call it a job scorecard. For example, is the purpose of your receptionist to “answer the phone” or is it to be the “director of first impressions,” ensuring that every client, prospect, or person calling your office is delighted by how they are treated and helped? To ensure every prospect is promptly connected with a salesperson and not left to wander in your phone tree or leave a voice mail for some unknown stranger, hoping for a callback? Most simply tell their assistant, “Answer the phone.” But even a rude, stupid, and willfully spiteful person can do that. Are you sure that’s what you want? Left to their own devices, some employees might do just that. How often have you called a company to talk to someone in “customer service” and they made you angrier and more upset than before you called in? My point exactly. So, step one is make sure every employee has a scorecard that clearly defines the following: Mission of the Position: What’s the purpose of that position? To increase sales? Delight customers? Prevent cancellations and churn? Develop clients and nurture repeat business? Start here when thinking of positions in your company. Key Results: Once you know the mission of the position, the next section you need to articulate is what key results that person is supposed to achieve in a way that’s measurable. For sales and marketing professionals, that’s easy. Secure $100,000 in new sales every month. Generate 10 qualified appointees/leads a week. In customer service, that might be a client “saves” or upgrades. On a service desk, like ours, it may be the speed of tickets cleared and customer satisfaction ratings. For leaders, it may be hitting certain revenue and profitability targets. To the best of your ability, give everyone at least one, but no more than three, key results they need to achieve. This takes the drama out of performance because if it’s measured, it’s not based on an opinion or anecdotal evidence. Specific Responsibilities: Next, make sure every employee has a list of specific actions, tasks, and responsibilities they must fulfill every day, week, month, quarter, and year. That way you avoid dropped balls and overlooked tasks because “no one told me I was supposed to do that.” Of course, if you’re clear on the outcomes a person needs to accomplish, the tasks nearly write themselves – after all, if the goal is to lower churn or increase sales, and employees are compensated that way, it’s infinitely easier to “motivate” them to do what’s necessary. Once you have these roles and scorecards, it’s helpful to share them with the entire team so everyone in the company understands what each person’s roles and responsibilities are. One way of sharing is in Microsoft Teams, where you can create Wikis, To-Do lists, file sharing, checklists, and chat to collaborate on projects that cross multiple departments and employees.  If you want help exploring how to use any of these tools in your company, click here to schedule a quick discovery call to see what’s possible. 

How To Get More Productivity Out Of Every Employee (And Make Them Happier About It) Read More »

Death By CHEAPNESS

Southwest Airlines’ recent fiasco that caused them to cancel over 16,700 flights, leaving people stranded across America, was the epitome of what’s happening with so many businesses right now across the US. A total and complete meltdown in service due to cheapness. During their busiest season, Southwest had to apologize for miscommunications that led to thousands of their customers being left stranded at airports. In Nashville, the airport police were telling checked-in travelers whose Southwest flights had been canceled that they would be arrested and physically removed for trespassing if they didn’t voluntarily leave the secure area because their boarding passes were no longer valid. Southwest employees were getting into verbal fights with obviously frustrated passengers, and very little communication was offered to passengers.  This little nightmare is estimated to have cost Southwest in the neighborhood of $725 million to $825 million, not to mention the loyalty of its customers and the damage to its reputation. Now, how’s the cost of that IT upgrading looking, Mr. CEO? Of course, nobody likes to invest money into IT upgrades and other “infrastructure” improvements. Money spent on a new website will drive new opportunities into your organization and (hopefully) give you an advantage over your competition. An easy investment. Money spent on office remodeling can be enjoyed every day, making employees happier and impressing clients who visit the office – another “easy” investment that delivers visible, tangible ROI instantly. But NOBODY likes to spend thousands of dollars on basic IT upgrades – UNTIL the meltdown brings your organization to a grinding halt at the worst possible time.  So, what should you spend on IT? According to a study done by TechTarget, companies generating less than $50 million in revenue spend an average of 6.9% of their total revenue on IT costs. But with regulatory compliance laws and cyber-attacks on the uptick, those budgets need to be increased in order to simply avoid a massive loss. Another survey, conducted by Capterra, showed that 75% of SMBs said they would be spending 10% to 20% MORE in 2023 on software and IT than in the previous year. A HUGE increase.  What are they spending it on? Cyber security being driven by compliance regulations and risk management is, without a doubt, one of the big areas of increase in spending. Another is workforce enablement to give employees more flexible (but secure) ways to work from home, on the road, or in the office. And finally, many companies are investing in any kind of technology that will reduce their need for and dependency on growing their workforce. Overhead walks on two legs – so, if a business can increase productivity without adding people, that’s always a win. Being “too cheap” in anything as a means to improve profits is a terrible long-term strategy. In fact, it’s a misnomer to even call it a “strategy.” It’s simply a short-term fix that should only be used in the most dire of times. Cutting IT spending to the quick gives a false sense of savings, as Southwest Airlines discovered. It’s not a problem until it IS. Then you have a giant, expensive mess to clean up that could cost you far more in losses than in money saved short term.  Book a 10-minute discovery call to see what you should expect to pay for IT in your area. 

Death By CHEAPNESS Read More »

Scroll to Top