Tag Archive for: qs_3

BusinessIntelligence_Dec28_CIn today’s competitive business world, it’s imperative that you have a thorough understanding of who your visitors are and what are their expectations. If you’re looking for a powerful analytical tool for your company’s website, Google Analytics one of the best options in the market. Yet trying to understand Google Analytics and its strategic use can make your head spin. If you’re just starting out, here’s an overview of Google Analytics and its key metrics that are noteworthy.

What exactly is Google Analytics?

Google Analytics is a free website analytic product offered by Google. It is an application that collates visitor data from your website and provides basic statistics and analytical tools for search engine optimization (SEO). The data is used to generate reports that give you insights as to how your visitors are engaging with your website.

With Google Analytics, you can analyze your traffic to discover whether your target market is finding your website, how they’re finding it, and if they’re taking the actions you expect them to take while on your site. By tracking and analyzing your traffic you can increase the engagement and enhance your marketing strategies.

Google Analytics’ Key Metrics

Navigating Google Analytics can be mind-numbing, since you are likely to get lost in its many features, variables, and settings. Check out these basic key metrics that will help you analyze your website traffic.

Unique Visitors
Most people tend to confuse this metric with “Visits”. The Unique Visitors metric can give you an accurate number as to how much real traffic you receive on a daily basis because, unlike the Visits metric, it doesn’t solely rely on cookies to count. This means any of your visitors would be counted once, even if they cleared their computer of cookies.

Pageviews
The Pageviews metric should increase in direct proportion to the numbers shown in Unique Visitors. This metric represents how deep your unique visitors go into your website pages. If the percentage is low, your content may not be engaging enough to encourage visitors to explore the your website further than the home or landing page.

Bounce Rate
The Bounce Rate metric will tell you the percentage of visitors who left your website after viewing only one page. High bounce rates can mean that your website is not appealing to visitors in certain aspects such as the design, content, navigation, and so on. Tracking your website’s bounce rate will quickly help you identify things that are not working well on your website, so you can fix the problem accordingly and ensure you grab visitors’ attention from the first click.

Traffic Sources
This metric shows which sources drive the most and least traffic to your website. Generally there are four types of metrics: Referral, Direct, Organic Search, and Social.

  • Referral traffic – These visitors found your site via your off-page marketing efforts, such as backlinks and blog articles on other websites.
  • Direct traffic – These visitors are highly targeted, since they type your URL directly into their web browser.
  • Organic search – These visitors discover your site after searching a keyword in a search engine, usually from Google.
  • Social traffic – These visitors came from social media platforms, such as Facebook, Twitter, and Instagram.

These are the metrics that matter to tracking your website’s visitors. They consist of basic numbers that are easy to understand and interpret. Once you get a handle of these metrics, you can make your way to more advanced metrics that provider deeper level and more accurate insight.

For more tips on how to utilize your business data with Google Analytics, contact our specialists today.

Published with permission from TechAdvisory.org. Source.

BusinessContinuity_Jan4_CThere is nothing worse than having a productive day at the office become undone due to a power outage. Losing power for even a single minute can have far reaching effects on your company’s operations as you need to make sure everything is running properly and all data is accounted for. While power outages can be a nuisance, with proper preparation you’ll have no trouble in persevering when the lights go off.

Power outages are one of the only disasters that can strike just about anywhere in the United States. If you are in Seattle chances are tropical storms are not going to be an issue and if you’re in Miami you aren’t going to fret over a blizzard, but losing power can occur anywhere, at any time and without warning.

A Department of Energy report noted that power outages cost American businesses nearly $150 billion in 2014 and added that increasing demand for energy coupled with an aging infrastructure could see the number of blackouts increase. While weather-related events are the most common cause of power outages in the U.S., it is far from the only thing that can disrupt energy service.

Since this is a problem that will continue to plague businesses, especially those ones that are unprepared, it’s important to be ready should a blackout strike. Here are a few things you should consider when it comes to power outages.

Power outages hurt in more ways than you think

The most notable issue a business faces when a power outage occurs is an inability to work. Employees often times sit around unable to do anything until the power is turned back on. Once the power does return, additional time is needed to safely turn everything back on and to check if all your files are still there.

There are also numerous indirect consequences that your business may face either during or after a power outage. These include a loss of revenue from potential sales, a decrease in customer satisfaction and a drop in your company’s reputation. The more your company is prepared for a power outage, the better continuity you will see and the less damage will be done. While it may be impossible to completely avoid issues caused by blackouts, you can minimize their impact.

Be ready in case of an outage

One of the biggest sources of frustration for employees during a blackout is losing files they had been working on. Autosave features do help prevent this but sometimes you’ll still lose that one important note or sentence you didn’t have the chance to save. Uninterruptible power supplies (UPS) are one way to buy your employees a little extra time should the power go out. You’re able to plug your computer into these devices and they will operate as a battery when the power goes out. The life of these power stations is anywhere from ten minutes to an hour for some models which should give you enough time to save your work and properly shutdown your computer.

If you want to stay in business during a power outage, a standby commercial generator can help. These normally run on propane or natural gas and immediately switch on as soon as your main power supply goes out. If you aren’t concerned about the lights but want to keep your employees productive, equipping them 4G enabled devices with Office 365 or Google Apps will let them continue to work on files that have been saved and stored on the cloud.

Always test your outage plans

Regardless of what your company’s plans are during a power outage, you will need to test them on a regular basis to ensure everything runs smoothly when the real thing does happen. If you utilize a UPS or standby generator, you will want to test these out every six months at the very least to make sure they function properly. If your business has special plans for what employees need to do during a power outage, you should run a practice drill on a yearly basis to ensure everyone is up to speed on their duties.

They key to business continuity is preparation. Let our team of experts help prepare your business for anything thrown its way in 2016 and beyond.

Published with permission from TechAdvisory.org. Source.

SocialMedia_21Dec_CCommunicating via social media is a way of life for many of us, and these days it’s almost unheard of to not have a Facebook account, but what do you do to stay in touch with friends and family if you don’t have access to one of the popular social media platforms because your government has banned them? This post takes a look at how a country like Iran stays connected despite Facebook and Twitter being blocked – and why the instant messaging app Iranians do use is so wildly popular.

While China is probably the most well known country for restricting their population’s ability to view certain websites, whether through a desire to restrict access to information that might harm the country’s image or because of industry competition, there are other nations which also exercise strict control over what their people can and cannot see online.

Take Iran for example. Its citizens are denied access to Facebook and Twitter while Instagram is partially blocked due to the fact that it is possible to block individual accounts whilst leaving other parts of the platform online. Of course, anyone wanting to update their Facebook status, send tweets or upload a risqué selfie can do so using a VPN. But most VPNs charge a monthly subscription for their services and even then the access can be sketchy at best. However there is one social media platform in Iran that is freely available and that is Line, the instant messenger chat application. Unlike China which has blocked Line (something that is more to do with it being direct competition to the homegrown chat app WeChat than freedom of speech), in Iran Line is big news. In particular its social media function, called Timeline, is connecting people throughout the country, and in some surprising ways.

Texting someone is yesterday’s news, and messaging apps are the primary form of quick communication for people everywhere. And in Iran the app of choice used to be Viber – at least it was until it was blocked by Iranian officials at the end of last year. In its place came Telegram, a Russian chat app which has almost 60% of its total users in Iran. Line doesn’t currently compete with Telegram when it comes to messages, but that could change at any time, mainly thanks to some users of the latter’s penchant for spreading pornographic content.

In direct contrast to that, the Japanese owned Line is intent on maintaining its wholesome image – and Iranian companies are recognizing that and using Line as a platform to market themselves. And it’s no great surprise when you look at the numbers: well known for being one of, if not the, biggest blogging communities in the world, Iranian citizens are devout readers and creators of online content. What is particularly attractive to marketers in Iran is that a staggering 90% of people in Iran who use Line are actually active on a daily basis on Timeline.

But using Timeline in an official capacity is not as simple as merely opening an account and updating your status as it is on say, WeChat, Twitter or Facebook. Line stipulates that anyone who wants to open an ‘Official Account’ – be they a corporation or a celebrity – must apply to be a Line Partner. Line can decide whether or not to accept their ‘partner’ and, if deemed a good match for the platform, the company or person in question will then be made to sign an agreement and pay a subscription – and periodic fees. Harsh as this may seem when compared to free platforms, it is precisely this which enables Line to ensure its content is continually updated whilst also being of a permissible standard. And it is this policy of control and moderation that allows Line to operate unfettered in Iran.

So who are the Iranian celebrities who have signed up for an official Line account? The country’s first adopter was AlireSaa, a viral celebrity famous for humorous musical clips and anecdotes. At the time of signing up with Line he had around 320,000 Instagram followers – a number which took him two years to build. But after just five weeks on Line he had already beaten this – and his number of followers doesn’t show signs of abating any time soon – his fan base is already tipping the 500,000 mark.

So why is AlireSaa so phenomenally popular on Line but less so on Instagram? The answer lies in the fact that, aside from being partially blocked in Iran (although AlireSaa’s account was not) there are a number of features that Line offers to its official account holders that other social media platforms do not. One of these is Line’s ‘On Air’ sessions which uses live chat. AlireSaa used this feature to run a video contest for followers. His fans were treated to a two hour long live chat with their hero and were able to submit videos of themselves performing one of AlireSaa’s musical clips.

A staggering amount of people engaged with AlireSaa, who let’s remember is not a global superstar – 50,000 of them in fact and 10,000 of them submitted videos during the two hour window. When he announced the live chat, AlireSaa had 215,000 Line followers – a number which exploded as news of the contest spread like wildfire on the app’s Timeline feature.

If you’re still of the opinion that social media is a waste of time and can’t do anything for your business, maybe it’s time to take another look. If you want to follow in AlireSaa’s shoes and become a viral success, why not get in touch with us today. We can’t promise to make you an Internet superstar but we can help point you in the right direction.

Published with permission from TechAdvisory.org. Source.

Female hand giving a bribe to businessman - closeup shotThe threat of being infected by malicious software is part and parcel of spending time on the internet, and no sooner have the antivirus and security software programs released an update or new patch than cyber criminals are scrambling for ways to circumvent them. In addition, as end users become savvier to the tricks and scams used to steal our data, money or identities, new tactics are employed to try and fool us. And that includes Chimera, a new strain of ransomware which has recently been uncovered.

Business is booming in the world of cyber crime, and scammers, extortionists, phishers and hackers are constantly on the lookout for new ways to exploit our fears and naivety in order to boost their bank accounts, steal our data, or simply cause us mayhem for their own twisted pleasure. One of worst types of malware for playing with our emotions – and therefore increasing the likelihood of us capitulating to its demands – is ransomware. If you don’t know how this program works, read on for an introduction.

If your computer has been infected by ransomware, the first sign that something is wrong is normally discovering that you are unable to open one or more of your files. That’s because the malware encrypts them, rendering them completely inaccessible. The next thing you see will be a ‘ransom note’, either in the form of an email or a notice that appears directly on your screen. You will be told that if you want to see your files again you will need to pay a sum of money. After making payment you will (allegedly) be sent a code that will allow you to decrypt your files.

Some types of ransomware up the fear factor even further by pretending that the FBI, CIA or other national law enforcement or government agency is behind the ‘kidnapping’. You will be told that your files are being held hostage because you have downloaded pirated software or files, or visited an illegal or illicit website – such as those depicting extreme pornography or threatening national security. Regardless of whether or not you are guilty of any of the above – be it a visit to an x-rated website, or downloading a pirated copy of the latest episode of The Walking Dead, your first instinct is probably to panic. The thought of no longer having access to any of our information, files or data is enough to make most of us break out into a cold sweat. If you haven’t backed up, everything from your vacation pictures to your company’s data could be lost for good.

The problem for ransomware creators, however, is that many users have wisened up to their tactics, and are refusing to pay, instead calling in an IT specialist to try and restore their encrypted files. This has left cyber criminals needing to find a way to boost ‘trade’. And that is where Chimera comes in. Christened by the Anti-Botnet Advisory Centre – a part of Germany’s Association of the Internet Industry – unlike previous forms of ransomware, which were indiscriminate when choosing their victims, this latest threat primarily targets businesses.

An employee will receive an email, purporting to be an application for a job within your firm, or some kind of corporate deal. This email will include a link ostensibly to the applicant’s resume or to details of the offer, but will in fact go to an infected file stored in Dropbox. Chimera then infects the user’s computer and encrypts any local files. Once the PC has been rebooted, the ransom note will be displayed on the desktop. Payment is usually set at around $680 USD, which must be paid in Bitcoins. And in order to further scare the victim into paying, the note will also state that failure to make payment will result in the user’s files being published online.

If there is a slight silver lining to the Chimera cloud, it is that the Anti-Botnet Advisory Centre has not found any proof that files have been published – at least not yet. In fact, it is still unknown whether the ransomware does actually take the encrypted files or if it is just an empty threat. Regardless, it is still a threat which could easily convince many users to pay the ransom. And should Chimera make good on its threats, the ramifications for a business are huge – and that’s without taking into consideration the nightmare of having your files encrypted in the first place. With Chimera targeting businesses of all sizes, and random employees within the business at that, isn’t it time you took another good look at your organization’s security posture?

Contact us today and talk to one of our security experts. We’ll be more than happy to help ensure that your small or medium-sized business isn’t taken hostage by Chimera or any other type of ransomware.

Published with permission from TechAdvisory.org. Source.

Organizing business and personal tasks and meetingsAs shown by recent high-profile hacking scandals – targeting everyone from Sony Entertainment to the extramarital-affair-facilitating website Ashley Madison – cyber crime shows no sign of disappearing any time soon. In fact, experts predict that 2016 is going to be an even busier year for cyber criminals, hackers and scammers. So what do you need to know in order to be able to keep your small or medium-sized business safe next year? Here we take a look at what could be in store.

If you think that only big corporations and prominent organizations are targeted by cyber criminals, you are making a deadly mistake. It might be tempting to sweep cyber crime under the carpet and assume that you are flying below the average hacker’s radar, but that simply isn’t true. In fact, it’s the polar opposite, since smaller enterprises are actually far more likely to be at risk than larger ones, owing to their typically less sturdy security postures.

So where does that leave you as a small or medium-sized business owner or manager? Does it mean you need to be taking your cyber security even more seriously? You can bet your bottom dollar it does, as industry experts predict that 2016 is only going to become more of a minefield when it comes to online crime.

The headline trend that IT security professionals pinpointed this year was that no longer were criminals hacking into websites purely to bolster their bank accounts. 2015 has seen the emergence of another strain of hackers, launching cyber attacks as part of a moral crusade. These people are not purely after money although in some cases this may also be a contributing factor – instead, their claimed motivation is revenge, or righting what they perceive as wrong. It is this diversification in the hacking community that has led security watchers to predict that, as we enter 2016, we are likely to see some different behavior from hackers.

Among the unpleasant predictions being made, a number of experts agree that hacks of a destructive nature will be on the rise. The fact that hackers are using attacks for retribution rather than simple monetary gain means that a wider cross-section of organizations may well find themselves being preyed upon, all the way from government agencies – traditionally ignored by hackers – to online retailers and other commercial websites.

Remember when Snapchat got hacked back in October 2014, and the hackers threatened to make public as many as 200,000 photos? Well, the bad news is that apps are going to continue to be targeted. In particular, those mobile apps that request access to your list of contacts, emails and messages can, in the wrong hands, be used to create the kind of portal that enables a cyber criminal to steal data or gain access to a company’s entire network. All this means that in 2016, hackers could be taking advantage of apps to do more than just steal your social media photos – they might have in mind the takedown of your entire company.

As a local business owner, social engineering – a means of tricking an individual into disclosing revealing or personal information about themselves or their company – is something you definitely need to be concerned about. You might pride yourself on being too savvy to fall for a cyber criminal’s tricks, but what about your employees? Can you be sure that each and every one of them exhibits the same amount of self control, cynicism, and wariness that you do? Not only that but, as we enter a new era of online threats, the criminals that use social engineering are growing in confidence and creativity. Dodgy emails from a bizarrely named sender containing a link to an unheard-of website are yesterday’s news. Modern social engineering is highly evolved and extremely cunning, and has the potential to convince even the most streetwise internet user.

How confident are you that your entire team of employees would be completely infallible in the face of a stealth attack from a seemingly innocent source? Could you trust them to restrain from divulging not only their personal details but also information pertaining to your company? Multiply the number of employees in your company by the number of phone apps they potentially use, and add to that the fact that any one of them could at any time be targeted by a social engineering scam, and the end result is a less-than-perfect security posture.

The sad fact is that there are people who want to do you harm – regardless of whether you hold confidential information about celebrity salaries, or are privy to a database full of cheating spouses. People, no matter how well meaning or vigilant, are the weakest link in any security chain, which means that ensuring your business’s safety necessitates educating your staff and ensuring that your network is impenetrable.

Professional training and a vulnerability assessment are two great places to start, so why not get in touch with us? We’ll make sure your business is as hack-proof as it can be.

Published with permission from TechAdvisory.org. Source.

BusinessValue_Dec25_CBig data. You may have heard of it; after all it’s been putting in an appearance at boardroom meetings across the globe for some time now. But what actually is big data? And what does it mean when applied in a business environment? More importantly, what can it do and how can it help your organization to succeed? And getting down to the nitty-gritty, does the term big data actually mean anything – or is it just another empty industry buzz word? The good news is that it’s not, and using big data can actually help drive profit. Read on to learn more.

So, we’ve established that big data is causing a stir and creating a buzz in companies that are in the know. In fact, it’s become hip to bandy about the phrase whenever one is trying to impress their boss, senior management or fellow co-workers. But like any lingo or jargon that is currently cool, it really doesn’t count for a whole lot if it doesn’t mean anything, particularly in the workplace.

The good news is that, unlike some of the more hackneyed expressions thrown around by those colleagues that are so desperate to impress their seniors, big data does actually mean something. And, more to the point, it can help your business thrive. Big data can help you achieve that end result that everyone in business is chasing: profit.

This is why big data is trending so sharply at the moment – after all, every owner or manager of a small or medium-sized business wants to grow their bottom line. Times are hard in many industries: increasing competition from abroad, the threat of the internet to bricks-and-mortar stores, a difficult economic climate – the list goes on. But what if something as simple as using your business’s data could push you heads and shoulders above the competition, and help turn around that downwards or flatlining arrow on your sales chart and point it upwards in the direction of success?

But before we get to that; what actually is “big data”? Why is it big? Well, we may have said that using data to grow profit is simple but, in actual fact, it’s really not as easy as all that. Big data is used to refer to various sets of data that are so huge and so complex that the traditional methods of processing data are virtually useless. Database management tools and other processing applications become redundant and are just not up to the task of capturing, storing, searching for, sharing, transferring, analyzing, and visualizing data.

Instead of looking at separate small sets of data, big data – as the name implies – looks at larger sets that contain far more information. This enables anyone analyzing the results to cross-check the sets and pinpoint trends, both positive and negative, across the entire business. As a result, owners and managers can make more informed decisions that affect the company in a more beneficial way than is possible by merely looking at small, isolated sets of data.

Big data therefore plays a valuable role in strategy and planning, and also helps troubleshoot worrying or problematic trends that threaten the performance and profitability of the business. Put simply, using big data to assist in making decisions for your company is about being able to see the bigger picture (to use another tired corporate buzz phrase). Decisions made with all the facts at hand will naturally help increase revenue, as opposed to blindly feeling in the dark and making changes to one area or department that may negatively affect another.

There are a number of ways that you can use big data analytics to make better decisions and increase profit. Crucially, it allows you to see what really makes your customers tick. Nowadays many businesses offer different ways for their customers to communicate with them. From email to a website, to phone calls and human interaction, all of these present you with meaningful information about your clients’ behavior. Knowing what your customers rely on you for, how they interact with you, and where they may hesitate or stumble when using your services, provides a wealth of knowledge just waiting to be mined. However, a lot of this data is unstructured and therefore cannot be analyzed using traditional means. That’s where big data comes in: it can help you uncover the information you need to really understand your customers.

Of course it goes without saying that a deeper understating of your customers can help you grow your customer base, increase repeat business, heighten customer loyalty, and reduce bounce rates and the number of dissatisfied customers. But that’s not all – analyzing this data will allow you to develop new products or services, create stronger, more effective marketing campaigns, and create an all-round better experience for the people that matter most – the people you serve.

Want to learn more about big data, and find out how it can have a seriously positive impact on your business’s revenue? Talk to us today – we have the knowledge and experience to help you really get the most out of your company’s intel.

Published with permission from TechAdvisory.org. Source.

Young businessman carrying light bulb on backAre you making the most of one of your business’s greatest assets? Along with your loyal customers, your team of enthusiastic and hardworking staff, and your tastefully decorated store or office, there is an all-too-often-unsung hero just waiting to help you take your business to the next level: your data. You’ve probably read articles extolling the virtues of data mining, but just how does a small or medium-sized organization actually use data to grow their business?

Many small and medium-sized businesses shy away from data analytics due to the perceived complexities of dealing with the myriad of facts and figures. A head for figures is something many of us lack – and, even if you have no problem with the math, there’s the time involved in setting aside a part of your busy schedule to track your analytics.

But the sooner you embrace your data, the sooner you can start adding real value to your business through this extremely valuable, and often untapped, source. But just how does a smaller enterprise actually set about doing that? After all, even the most humble of mom and pop stores or home-office-based entrepreneurs has access to an often bewildering array of trackable metrics.

The key point is that, if data is to be of any value, it needs to be easy to collect, collate and analyze. There’s no point spending half your working week mired in incomprehensible spreadsheets and charts if you can’t extract useful information and then apply it in a meaningful way that meets your end goals.

When thinking about analytics, it can be easy to feel overwhelmed. Not only that, but the vast majority of business owners would much rather spend their working lives filling dental cavities, laying flooring, solving legal disputes or selling fitted kitchens – whatever your own particular specialist skill might be – than learning about and trying to apply data analysis techniques. That’s where an analytics dashboard can help. These take the hassle out of unearthing all that data, and present your metrics to you in a more understandable format. But with an array of different tools to choose from, what should you consider if this is the route you decide to take?

  • How easy is it to use? There’s no point investing in a dashboard solution if you don’t understand the way the data is presented to you; you still won’t be able to apply it in any meaningful way.
  • How deep will the analysis go? You’ll likely want to be able to track trends, compare results over time, and chart your success.
  • Is the data easy to apply? You want your dashboard to simplify the application of data within your business environment, and make it easy for you to take action.
  • Does it save you time? If you’re currently spending frustrating hours sifting through reams of facts and figures, this is a huge consideration. You need your dashboard to supply pertinent information in an easy-to-read format.
  • Is it compatible with other programs and apps? If you’re operating an online store, you will want the dashboard to work with your POS and shopping cart. You may also want it to track website analytics and social media engagement.

Once you’ve decided on a data analytic dashboard, how do you know which metrics to look at? Every business will differ depending on their industry and individual needs or challenges, but there are a couple of points you will want to bear in mind.

Look for data trends
To make the leap from looking at data to making plans and actually doing something, you need to highlight your most important metrics and use them as something to action. Let’s say you find it hard to retain customers; you know this and your data backs it up. Clearly you’re not doing enough to ensure your customers return. That could indicate you’re spending too much time and money on attracting new clients. Now you can take action: do you need to improve your customer service or offer more products or services? Create a marketing plan that targets past customers by telling them about something new or by offering them a discount.

Analyze your past customers
Now you have easy access to data that shows you your best selling products or services, your peak selling periods, and more. This will help you get to know your customers far better, track their behavior, and plan ahead when it comes to adding services, buying inventory, or preparing for busy spells.

Whether your aim is to attract new customers, retain old ones, expand your offering, or discern whether opening a new location is a viable option, your data will prove to be an indispensable friend. After all, customers may come and go – but your data will always be there for you.

If you’d like to learn more about adding value to your business with data analysis, or want to explore data analysis dashboard options, get in touch with us today – we’ll be happy to advise you on the options best suited to your needs.

Published with permission from TechAdvisory.org. Source.

BusinessContinuity_Dec22_CNatural disasters have increased exponentially in the last few years – something that has resulted in a number of small and medium-sized business owners turning to business interruption insurance for protection. Covering many scenarios that regular business insurance simply ignores, adequate protection can be the make-or-break factor when it comes to surviving a natural or manmade catastrophe.

So why do small and medium-sized organizations tend to forego business interruption insurance policies? Chances are it, like so many things, comes down to cost. But can you really afford to ignore the additional protection that interruption insurance offers, or is it safe to cut corners and hope that your regular business insurance will have you covered in the event of a disaster?

While an interruption insurance policy may cost you anywhere from $750 to $10,000 or more (the cost is normally dependent on the size of your business), the fact is that your standard insurance policy will not cover you completely when a catastrophe strikes.

Take for example the spate of superstorms that have ravaged the United States over the past decade. From Hurricane Katrina to the more recent Sandy, small businesses and enterprises throughout the US have been left devastated after feeling the wrath of Mother Nature. While a best-case scenario may entail losing a few days sales during a power outage, at the other end of the scale you could find yourself dealing with a destroyed warehouse, an office that no longer has a roof, or thousands of dollars worth of stock destroyed by flooding.

And the reality is that your regular insurance is probably not going to reimburse you for storage or relocation costs if you need to move operations elsewhere, temporarily or otherwise. The majority of policies will only cover the loss of, or damage to, physical items like stock, equipment and property. They will usually not cover you for any loss in profit if a disaster means that you need to temporarily cease trading. On the other hand, tightly drawn up business interruption insurance should cover you in the event you need to move. It should also cover a decrease in sales due to power failures that shut your communication lines down, as well as a drop in profits due to delays in the delivery of stock or equipment.

Think the chances of a natural disaster affecting you are still slim despite the scenes of chaos and devastation reported in the media? Consider that a recent survey conducted by insurance giant Allianz found that there are now typically 600 major incidents per year – compare that to the previous 400 per annum and it doesn’t take a mathematician to figure out that disasters are on the rise.

So, as a small or medium-sized business owner, what do you need to know before you consider purchasing interruption insurance? If you’re thinking of adding interruption coverage to your existing policy, first record your current net income – but watch out because, if your net profit is high, you might be hit by a low per-incident limit. You could find your insurer has limited your coverage and left you inadequately protected.

Is business booming? If you are undergoing rapid growth, keep records spanning many months so you have proof of revenue increase. Without this, you will not be able to forecast month-on-month profit growth and your insurer might cap coverage at the rate of the previous year’s profit, not at your accelerated one. Be aware, too, that the type of interruptions you want protection for should reflect the areas covered in your general business policy. If your existing policy doesn’t include coverage for fire damage, neither will your interruption insurance.

There are many other aspects of an interruption policy to take into account – such as add-ons that protect you in the event of a power outage (something that standard policies normally don’t normally cover), and knock-on effects caused by a disaster at your supplier’s end.

Once you have taken out interruption insurance, should you have to use it then the most important aspect for you will be getting reimbursed. Crucially, you need to be able to provide your insurer with as many details concerning profit loss as possible. Consider storing files electronically, either offsite or in the cloud. That way, if your office or store is destroyed, you’ll still have access to your documents – and a far greater chance of recovering your losses.

If you’d like to learn more about protecting your data, files and documents, as well as about business continuity planning to help you get back up and running should disaster strike, please get in touch with our team today.

Published with permission from TechAdvisory.org. Source.

Security_Dec18_CSomething known as “state-sponsored cyber attacks” may not be something you have heard of until now. But with both Facebook and Google viewing the problem as serious enough to warn their users about, it seems this is an issue that could be here to stay. And now with Twitter also recently taking steps to alert their users about possible account hacking attempts, this may well be something that many of us should be concerned about.

But how at risk actually are you from a state-sponsored cyber attack? Is your small or medium-sized business in danger of being targeted? And who is behind these hacking attempts? Well, going by the warnings recently issued by Twitter, reports so far suggest that people, companies or organizations connected to internet security and freedom of speech are currently most likely to be at risk. But ‘currently’ is somewhat ambiguous, for in the world of cybercrime things can happen at lightning speed, and someone who is a target today might be deemed out of danger tomorrow – and vice versa.

As always, the best form of protection is to be forewarned, and you can only do that by learning as much as you can about the latest threats, scams and attacks. If you are a Twitter user, be it personal or for business use, you may be wondering why you have not yet heard of these alerts. That’s because Twitter’s messages were only sent to a small, and mostly rather niche, group of users. The email informed these users that Twitter was contacting them as a precaution due to their accounts “possibly” having been hacked by the state-sponsored actors. The email also stated that they believed that the actors may (or may not) be associated with a government, and that those involved had been looking to obtain personal information such as email addresses, phone numbers and/or IP addresses. So far, so vague!

Twitter then goes on to say that, although they have no evidence that any accounts were compromised or any data was stolen, they are actively investigating. They also lamented the fact that they wished they could say more…but that they had no additional information at that time. The email goes on to attempt to reassure users that their accounts may not have been an intentional target, but admits that if a user tweets under a pseudonym, that Twitter understands they may have cause for concern. But with so many Twitter users tweeting under a different name – and perfectly innocently, at that – what’s the real cause for concern here?

The issue lies with the type of accounts that were mostly targeted. The majority of these belonged to people or organizations connected to, or concerned with, cyber security. In fact, Twitter even offered some handy advice on protecting your online identity, suggesting users read up on the subject at the Tor Project website. Somewhat coincidentally, one of the victims of the attempted Twitter account hack is an activist and writer who currently educates journalists about security and privacy – and who used to work for the Tor Project. Another is a Canada-based not-for-profit organization involved with freedom of speech, privacy and security issues, and one of its founders is a contractor for the Tor Project.

Other Twitter users who received the email are also involved in some way or another in cyber security, albeit as self-described “security researchers” or simply by way of following or engaging with the online security community. This might lead you to the conclusion that, if you’re not in the business of security and instead keep your tweets to sport, entertainment, and the latest must-have gadgets, you are not at risk. But we urge you not to be so hasty. That’s because, within that small group of people who were contacted by Twitter, a large proportion of them had nothing to do with activism, freedom of speech, calls for greater privacy, or anything of the sort.

This means that, far from brushing this latest round of cyber threats under the carpet, individuals and business owners – whatever industry they are in – do have at least some cause for concern. As yet Twitter has not released details of the state the “actors” are sponsored by, so for now we are none the wiser as to whether it’s a homegrown issue or one from further afar – say North Korea or China.

What does all this mean for you as a business owner or manager? It means that you should be taking your online security more seriously than ever. It’s no longer just your network that is at risk; now simply having an account on a social media site such as Facebook or Twitter could be providing less-than-desirable third parties with the portal they need to access your company’s private information.

If you’d like to know how to ensure the online safety of your organization, give us a call today. Our experts have experience in everything from securing your computer network to increasing safety when it comes to sending out those all-important tweets!

Published with permission from TechAdvisory.org. Source.

Security_Dec17_CIt’s safe to say that malware attacks, phishing scams, and social media engineering practices are going nowhere fast. That means that, whether you are a home user or the owner or manager of a small or medium-sized business, if you choose to ignore safer online security practices you are putting your identity and the security of your company at serious risk. But what are big providers like Google doing to stop cyber threats in their tracks? After all, surely the onus is on them to provide a service that is secure as it possibly can be?

With more than one billion people using Google’s search engine on their desktops, and over a billion more accessing it through mobile devices, it is clear that security is – or should be – paramount. Google already claims to protect desktop users with its Safe Browsing service, but what about its mobile users?

With cyber threats ranging from the annoying, such as adware, to the unsavory – hello spyware – and the downright terrifying (ransomware, we’re looking at you), mobile device users are increasingly demanding to know that they are being adequately protected when using Google’s products, tools and services. So in order to protect the mind-bogglingly large number of people who are using Google on their smartphones, laptops, notebooks and tablets, Google recently unveiled plans to extend its Safe Browsing service to mobile users – or at least to who are using Chrome on an Android device.

Whether you regard this as a blatant ploy to get users to switch to Android is something we’ll let you decide for yourself, but the fact is that Google is taking steps to protect its users. Back in August 2014, the company bolstered its Safe Browsing warnings with messages alerting users to unwanted software programs trying to sneak onto their computers by attaching themselves without warning to a legitimate download. In addition, both the Android platform and the Google Play Store have security measures in place to weed out potentially dangerous apps.

However, not every cyber security threat comes from an app or installation so, while Google is doing the right thing by guarding against threats in these areas, there are other issues that require a different means of protection. Enter social engineering, and phishing in particular, which can cause untold harm – such as data or identity theft – to a business or individual.

In order to protect against social engineering, an up-to-date list of malicious websites needs to be stored upon the device – this enables Google to send an alert to the user before they get ambushed. But there are problems with this which Google has had to overcome, not least of which is how to keep the list updated in the face of new threats. Compounding this issue further are factors that are unique to mobile browsing: mobile data speeds can be slow and connectivity patchy, depending where the user is. A fast, stable connection is crucial when the timing of an alert is paramount. Not only that, but using mobile data costs the end user money!

Bandwidth (and battery) limitations mean Google has had to find a way to ensure the data they send to users is as small as possible. Protecting their customers is crucial – but so too is not sapping battery life and data plans. Because this boils down to connectivity and speed factors, a device’s location is now taken into account. For example, if a known phishing scam is only affecting certain locations, only devices that are in that part of the world receive a warning.

Google also prioritizes data by sending information on a need-to-know basis – in other words, bigger threats take precedence over more minor issues. They have also designed the software to limit network traffic, and to be as light as possible on memory and processor usage.

Since its announcement in early December, Google is now protecting all Chrome users on Android devices as default, making Safe Browsing part of their Play services from Version 8.1 onwards. Chrome Version 46 is also the first app to initiate Safe Browsing.

How do you know whether you are protected by Safe Browsing mode? Go to your settings in Chrome, and check your Privacy menu. How do you know if your small or medium-sized business stands the best chance of survival in the face of a cyber attack or phishing scam? Talk to us today and we’ll be more than happy to share our up-to-date knowledge with you.

Published with permission from TechAdvisory.org. Source.