3
privacy-policy,paged,page-template-default,page,page-id-3,paged-37,page-paged-37,qode-social-login-1.1.3,qode-restaurant-1.1.1,stockholm-core-1.1,select-child-theme-ver-1.1,select-theme-ver-5.1.8,ajax_fade,page_not_loaded,wpb-js-composer js-comp-ver-6.0.5,vc_responsive
Title Image

Privacy Policy

  • Sort Blog:
  • All
  • Cloud Computing
  • Disaster Recovery Management
  • IT Security Services
  • Managed IT Services
  • Office 365
  • Our Blogs
  • Press Releases
  • Uncategorized
  • VOIP Services

6 Must-Have Chrome Extensions

Google Chrome is the most popular and most used browser in the world. And because of its unparalleled speed, user-friendly interface, and powerful performance, it’s also touted as the best browser. But did you know that the Chrome Web Store is full of extensions you can install to add extra features to your browser? Here are some extensions you should definitely try.

StayFocusd

As the name suggests, StayFocusd helps you stay focused. This is a perfect tool for people who work on computers all day to stop themselves from getting distracted by the many wonderful things on the internet. Essentially, it’s an extension that restricts your time on websites that can cause your productivity to dip, particularly social media sites like Facebook, YouTube, and Twitter. Once you’ve reached the time limit, StayFocusd blocks access to those sites, reminding you to focus on your work.

AdBlock

AdBlock claims to be the most popular extension for Chrome. It has over 10 million active users, and for good reason. In a virtual world full of advertisements, AdBlock offers a break by blocking most ads from showing on Chrome. It’s also bound to improve your experience and increase the speed of your browser, since it blocks shady advertisements on the web, some of which are designed to trick people into downloading something that could harm their computers.

LastPass

Remembering passwords can be quite a headache; good thing there’s LastPass. While Chrome already has a built-in password manager, LastPass is a better option when it comes to password management. Instead of trying to memorize countless passwords for your online accounts, LastPass can generate new and secure passwords every time you log in to a website and sync your passwords whenever you need them. With LastPass, you can easily gain access to your accounts, enter credit card details, and fill out online forms with just a few clicks.

Evernote Web Clipper

Never lose anything on the internet again by storing web pages on Evernote. While you can mark sites by using Chrome’s built-in bookmarks option, Evernote is a more powerful option. The extension allows you to quickly and easily save web content from Chrome and transfer it straight into your Evernote account. With the press of a button, you can grab an image from the web page, make annotations, create summary links, and save a distraction-free version for later use.

Pocket

Pocket is another way to keep track of your favorite web content. With Pocket, you can save articles, videos, and any other web pages for later viewing. Simply hit the Pocket extension button when you come across something interesting and that page will automatically be synced to all your devices, so you can view it at any time, even without an internet connection. With Pocket, you can set things aside when you have important work at hand. If you can’t read the content now, Pocket it for later.

Momentum

Momentum is an alternative new tab page that replaces the default Chrome landing page. Equipped with a personalized dashboard that features a beautiful scenic background, a daily inspirational quote, the weather report, a to-do list, and quick links widgets for your favorite sites, Momentum could just be the dose of inspiration you’re looking for.

Learn more about the different productivity apps the Chrome Web Store has to offer. Get in touch with our experts today.

Boost Your Productivity with these Outlook Tips

Microsoft’s development team continues to improve and update its Outlook email application, which means some users have a hard time keeping up with the new and exciting features that show up. If you want to stay updated on the latest productivity-boosting tricks, this article is for you.

Clean Up your inbox

No matter how meticulously organized your Outlook inbox is, there’s always room for improvement. For a little computer-assisted help, try the ‘Clean Up’ feature.

From your Inbox, click the Home tab and choose from Outlook’s three Clean Up options:

  • Clean Up Conversation – Reviews an email thread or a conversation and deletes redundant text.
  • Clean Up Folder – Reviews conversations in a selected folder and deletes redundant messages.
  • Clean Up Folder & Subfolders – Reviews all messages in a selected folder and any subfolders, and deletes redundant messages in all of them.

Ignore (unnecessary) conversations

An overstuffed inbox is often caused by group conversations that aren’t relevant to you. The Ignore button helps you organize your inbox and focus on relevant emails.

  • Select a message, then click Home > Ignore > Ignore Conversation. You can also do this by opening a message in a new window and clicking Ignore under the Delete function. To recover an ignored message, go to the Deleted Items folder, and click Ignore > Stop Ignoring Conversation.

Send links instead of a file copy

Help your colleagues save storage space by sending a link to a cloud version of a file instead of the file itself. This is particularly useful when sending massive files. You can also set permissions to allow recipients to edit and collaborate on linked files in real time.

  • Upload the file you wish to send on OneDrive and send it to your recipients. From the message box, click Attach File > Browse web locations > OneDrive.

Improve meetings with Skype and OneNote

Outlook allows you to combine Skype’s HD video and screen-sharing features with OneNote’s organizational and project planning functions. It’s easy:

  • Go to the Meeting tab in Outlook, then click Skype meeting and send the link to the participants. After the meeting has started, select Meeting Notes (under the Meeting tab) and choose whether you want to Take notes on your own or Share notes with the meeting.

Tag contacts

To get the attention of a specific person in a group email message, use the @Mention function. This works particularly well for emails sent to multiple recipients or if you simply want to convey the urgency of your message.

  • In the email body or meeting request, type the ‘@’ symbol followed by the first and last name of the person you wish to tag (e.g., @firstnamelastname).
  • To search for emails you’re tagged in, select Filter Email from the Home tab and choose Mentioned, then choose Mentioned.

These are just a few strategies for getting more out of Microsoft’s email platform. To unlock Outlook’s true potential, you need the support of certified IT professionals. Give us a call today.

Windows 7 End of Life: 6 Crucial Questions Answered

On January 14, 2020, the world will bid a fond farewell to the beloved Windows 7 operating system.Well, sort of. Microsoft has declared that, after that date, it will no longer update or support the system. It’s the final nail in the coffin for a trustworthy, oft-touted software package that’s been running on fumes since newer versions hit the scene. And, as with any funeral, there are some arrangements to be made for the millions of businesses that have stuck it out to the end.Got questions? Here’s everything you need to know about the coming changes – and what you should do now to prepare.What does “End of Extended Support” mean?  First, end of extended support does not mean that Windows 7 will stop working, but critically, end of support does mean that Microsoft will stop developing the product and there will be no further security updates.How many people are still using Windows 7? The number will surprise you, especially since mainstream support for Windows 7 ended in 2015. As of December 2018, Windows 7’s user share was still 42.8% of all Windows PC, with Windows 10 accounting for 45.5%. Even more shocking, that was the first month since its release three years ago that more computers were running on Windows 10 than its predecessor, Windows 7.If we have more than 6 months..do we need to start the upgrade process now?  Yes. Keep in mind as you budget for your IT expenditures, any upgrades or replacements should be in place for several months before the January 14 end of life date. That means you’ll have time to work with a trusted IT provider to transition smoothly and avoid any down time or interruptions.Why does it take some businesses so long to adapt to end of life announcements? Many reasons, all of which will be familiar to any business owner: the expense and the time-consuming work required to update and upgrade computers, particularly for small and medium-sized businesses. The use of important legacy software that relies on an outdated operating system. Older equipment that may not respond well to the system requirements necessary for an upgrade to a new operating system. The time and expense required to training employees to use new systems.How easy is it to upgrade to Windows 10?  That depends on the age of your desktop or laptop computer. With minimum specifications needed to run a Windows 10 Operating System, there is some speculation that as Windows 10 evolves the existing specs may no longer be sufficient.  We recommend that desktop PC’s are replaced every 4 years; with the cost of the upgraded Windows 10 license and professional services associated with the upgrade process, this might be the best time to perform a refresh of older machines.  Having your employees upgrade to newer, faster computers will definitely improve productivity and overall job satisfaction, with will all contribute to your company’s bottom line.What will happen if we don’t upgrade our systems? When Microsoft ended support for its popular Windows XP operating system in 2014, it affected 40% of the world’s estimated one billion computers. But change arrived slowly, even with a long rollout and multiple security announcements. Five years later, around 5% of the world’s computers still use Windows XP, even though several ransomware attacks (most notably WannaCry) have targeted legacy systems still running XP. As hackers realize how many potential cybercrime victims are still running Windows 7 beyond January 14, 2020, they’re sure to turn their attention in that direction.Sticking with Windows 7 after that date means your system will be extremely vulnerable to malware and viruses, as well as technical bugs.  We do not recommend that you leave your company in this vulnerable position.Good news to keep in mind: when Microsoft introduced Windows 10, Microsoft adopted a new policy for the sustainability of their products, a model known as Windows as a Service (WaaS). It incorporates continuous updates and support for current product offerings, like Windows 10.This policy will be a boon for businesses that are using Windows 10 since you’ll be able to remain up-to-date with the latest fixes and updates, without the need to upgrade to a new operating system. WaaS ensures a smooth transition between iterations of a single operating system, so even if Windows 10 looks completely different years from now, incremental updates will happen behind the scenes without a major disturbance.If your business is still using Windows 7, the time is now begin planning for its end of life date. Net Activity can assist you in that planning and help you create a schedule for the transition. We can help you implement a number of solutions that will enable a smooth transition to a more modern operating system. Contact us to get started!It’s time to release yourself from the grasp of Office 2003/2007 and step into the 21st century with Office 365.Download our Office 365 Migration Checklist today.

Social Media Is Big Business For Criminals

The rise of Social Media has been a game changer for businesses around the world, creating opportunities for customer engagement that were previously unimaginable. Unfortunately, business owners aren’t the only ones reaping the benefits of Social Media. The hackers of the world are in on the game too, and for them, Social Media represents a giant piggy bank that they’ve only begun tapping into.

Even now in the early stages of cybercriminal attacks on Social Media, the payoffs have been enormous. Social media attacks have been netting them a staggering $3.25 billion dollars a year. As shocking as that figure might be, it’s important to remember that cybercrime on Social Media is a relatively new phenomenon. Between 2013 and now, the number of cybercrime incidents involving social media has quadrupled.

The attacks take many forms, but one way or another, they come down to abusing the trust that is so essential for a functioning Social Media ecosystem.

Some attackers set up scam pages hawking illegal pharmaceuticals. Others gravitate toward cryptomining malware, while others still ply the Social Media waters intent on committing digital currency fraud or feigning a romantic connection to get money and personal information from their victims. Even if you’re one of the rare companies that doesn’t have a significant Social Media presence yet, that doesn’t mean you’re safe from harm.

Gregory Webb, the CEO of Bromium, recently spoke on the topic, outlining a danger that many business owners are simply unaware of.

“Social Media platforms have become near ubiquitous, and most corporate employees access Social Media sites at work, which exposes significant risk of attack to businesses, local governments as well as individuals. Hackers are using social media as a Trojan horse, targeting employees to gain a convenient backdoor to the enterprise’s high value assets.”

In light of this, it’s probably well past time to sit down with your employees and make sure they’re aware of the risks they’re exposing you to when they access Social Media accounts at work.

Spring Cleaning Your Business and Its Technology

Spring seems to be the natural time, after what are commonly dreary winter months, to revitalize and refresh your environment – why shouldn’t your business be included? Not only does it help your operations, a clean environment also has many direct benefits for your employees. Let’s review the effects of keeping your business, and its technology, in order.

Why You Want to Keep Your Technology Clean, Inside and Out
If your business is like most, you rely on technology to help manage things. While your particular operations may use different solutions than one in another industry will, your technology is an essential piece of your business. Therefore, you need to make sure that it can meet two criteria.

First, it needs to remain in proper working order, and secondly, it needs to be organized so that the resources you rely on it for are easy to access and utilize.

In order for these criteria to be met, your office technology needs some attention to both its physical components, and the information those components give you the ability to store, access, and edit. Furthermore, an unkempt technology strategy can have some detrimental effects to your overall productivity and even your general success as a business.

Benefits of Digital Office Organization
First, consider the state of your digital file storage. Is it organized properly, with documents and resources saved in the correct folders, with proper labelling and an intuitive, hierarchical system? If not, it will do you quite a bit of good to take the time and organize these files so that they can be found for reference more easily in the future.

This is because this organization will enable you and your employees to find the things you need more easily, which means you and your employees will therefore be able to find them more quickly. This creates time savings that, while apparently insignificant when considered individually, can add up to be fairly significant after all. Secondly, taking the time to establish a filing system will also give you the opportunity to audit your old materials as you organize them into it. Perhaps some of them are due to be revisited and updated, and others are outdated to the point where they can be archived away or deleted safely. Going through your materials and making this call can easily save you some headaches in the future and help build beneficial habits for the future.

If part of your clutter problem is due to your reliance on physical files that are stored in bulky filing cabinets around the office, you might consider adopting a digital file storage solution and starting off with this hierarchical system in place. Not only does this make sense from a financial standpoint (fewer paper files means less paper and ink to buy), it is also environmentally responsible and allows you greater control over who in your organization has access to particular files.

Organizing Your Inbox
We’ve all learned the hard way how easy it is for a mess to pile up, and few places make that piling up more visible than your email inbox. While you know that there are certainly important messages mixed and buried in there, there’s also going to be plenty of conversations that you were privy to, but not really involved in, or situations that have long since been resolved and no longer require your attention.

However, while these messages may not currently seem important, there is always a chance that they will be at some point in the future. It is better to take messages like these and, similarly to your business data and files, create a filing system to organize them in a place where they won’t pile up and potentially bury pertinent emails.

Another strategy to consider: If your preferred email solution offers it, is to have messages that meet predetermined criteria automatically sent to a relevant folder. Perhaps emails with a certain word or phrase in the subject line are moved to one folder, while emails from a few particular contacts are sent to another. As a result, you know where you can find these emails later to refer back to them, and it helps keep your inbox from becoming too formidable.

Optimizing Your Desktop and Browser
There are plenty of ways that your computer’s desktop can become a clogged mess, and an equal amount of ways that the same can happen to your browser. Fortunately, the same strategy that applies to your filing system and your email can also apply to the stuff you have cluttering your desktop.

How much of it should actually be stored in the shared company resources? These documents should be the first to take care of, transferring them over to the appropriate file location. Once you’ve done that, you can create another folder hierarchy that cleans up your desktop and organizes the cluttered materials into a logical and navigable system that makes sense to you.

The same goes for the shortcuts and extensions that you have saved in your browser of choice. Try running an audit of your installed extensions and uninstall any that you don’t really use. The same goes for your bookmarks, which can themselves be arranged into a hierarchical system or removed.

Even your computer’s start-up process can be optimized, as we’ve discussed on our blog. Have IT help you audit the programs that your computer runs during start up and remove any that simply don’t matter, if appropriate.

Cleaning Your Computer
Of course, a big part of keeping your technology clean means maintaining your workstations and servers, removing dangerous dust buildup and making them generally look nice.

As you might imagine, it isn’t as though you can just turn on a vacuum and give your computer a once-over. In fact, this is exactly what you shouldn’t do. Your workstation, whether you’re working with a desktop or laptop, is filled with fragile components that can easily be damaged by the static build-up a vacuum produces. Instead, you should use simple tools that will allow you to gently cleanse the exterior as needed, such as a can of compressed air to remove dust from your keyboard. There are specialty wipes available for purchase that are made specifically for electronics that are effective for a quick wipe-down as well. As a precaution, make sure that your device is powered down during the cleaning process, and that it is only powered up when completely dry.

When cleaning your monitor, you should avoid using liquid as much as you can, electing instead to use a microfiber cloth to wipe the screen down very gently.

You may also want to request that IT occasionally crack open your device and do a bit of tidying up on the inside as well, removing the dust that will collect on the inside and trap in heat.

Cable Management
Few things look as overwhelming as cables that are left to just splay everywhere. Not only does this make it easier for dust and debris to collect around your crucial components, it simply looks awful, sloppy, and entirely unimpressive. Some basic cable management can quickly make a mass of cords and wires more discrete and more aesthetically pleasing, while also reducing a safety hazard in the office.

Tidying the Office
Of course, the phrase ‘spring cleaning’ is largely associated with giving your environment a good, refreshing clean, and less about tending to technology needs. This is also a very important activity, as it provides assorted benefits that will be discussed below.

So, in addition to seeing to your technology, go through the office and tidy up as you would any other place of business. Clean the floors, sanitize the bathrooms, and fix up the employee break room (including the fridge). This may also be a good opportunity to consider redecorating and giving your office a refreshed new look to match its newly cleaned state.

Why a Clean Office is Better
At the beginning of this article, it was referenced that there were assorted benefits to having a tidy and organized office. These benefits range from providing a better workplace for your employees to staying compliant with various regulations.

First, a clean workplace means that your employees are able to enjoy greater productivity than they would in one that is filled with clutter and chaos, and morale is higher in a clean workplace than in one that is dusty, grimy, and unattended. Stress has been shown to be reduced, and morale is markedly higher, as is an employee’s ability to focus on their tasks. Additionally, a clean workplace is one with fewer germs, which means that employees will have an easier time staying healthy and coming in to work.

Of course, there are also other people that you have to impress. Any clients or customers that visit your business will have what can be honestly considered a second chance at a first impression every time they visit. A disheveled and unorganized office can quickly put them in a negative mindset that only makes your job harder. Furthermore, there are laws and regulations that require workplaces to be maintained to a certain standard for the benefit of an employee’s health and safety.

Besides, wouldn’t you feel more motivated to spend your day in a nice, clean office, using equipment and solutions that work well, rather than one that’s looks and feels busy and cluttered and is filled with grimy workstations that only slow down your progress?

What You Can Do About It
Of course, once your office is cleaned, you will want to keep it that way. That’s why it is important to establish cleanliness and order as a part of your expectations of office culture and encourage your employees to consider themselves accountable for their own area. Remind them that they represent the company just as much as the company represents them and should always present and conduct themselves accordingly.

To help you get to that point, Net Activity is here to help as well. We can apply our expertise to make many of the activities described above much easier to accomplish, speeding up your spring cleaning and helping you get back to your improved operations that much quicker. Call 216-503-5150 for more information.

How Secure is your Messaging App?

Messaging applications have carved out a foothold in businesses, clearly proving their operational benefits. However, it simply isn’t responsible to leverage a solution without making sure that the solution is secure. There are a few criteria that you should consider to determine how secure your chosen application really is.

The Criteria
When evaluating your messaging solution, ask yourself:

  • Are my messages encrypted (and how encrypted are they)?
  • How transparent is the application to scrutiny?
  • How are messages deleted?
  • How much metadata is kept?

We’ll review why these questions are the important ones to ask.

Are my messages encrypted (and how encrypted are they)?
Encryption is a method of scrambling data so that it is incredibly difficult to interpret, accomplished through an algorithm known as an encryption key. Without going into too much detail, this makes any data that has been encrypted extremely secure.

Most major messaging applications use encryption today, but not all of them follow the most secure practices.

For instance, applications like Google Hangouts and Skype encrypt the messages that their users send… but also retain a copy of the encryption keys. This is so they can access the messages sent and collect data to power advertising. This also means that your data is left vulnerable if a cybercriminal makes their way into the application’s servers, or if the government waves a search warrant at them.

More common, fortunately, are apps that utilize end-to-end encryption, where the application only holds the keys that encrypt the data, accessible by the users. The users, on the other hand, hold the keys that decrypt the data again. As a result, not even the company hosting the messaging application can access the contents of their users’ messages, never mind cybercriminals or law enforcement. WhatsApp and Signal are two apps that now leverage this approach. In fairness, Skype does offer this capability as well in its Private Conversation feature, but it isn’t enabled by default.

How transparent is the application to scrutiny?
Taking the developer at their word is one thing… it’s quite another for independent and impartial experts to be able to confirm the claims that are made about an application’s security. For this reason, applications based on open-source code are generally more trustworthy, as they are scrutinized by experts who discover and report any vulnerabilities.

A few applications provide their source code openly, including Signal, Telegram, and Wickr, while WhatsApp and Facebook Messenger don’t quite qualify but are based on the open-source Signal protocol.

If an application is closed-source, like iMessage is, a user is entrusting the developer completely to maintain the security of the messages sent.

How are messages deleted?
While sending a message securely is key, the security of the message once it reaches its destination should not be overlooked. After all, if someone without authorization gains access to the device later, encryption isn’t going to do squat to protect your data. However, if you are able to delete the message after it is delivered, security is suddenly much more likely.

Skype, Telegram, and Signal all allow a user to do so. In fairness, so does WhatsApp, but it needs to be deleted within 13 hours.

Some apps feature self-deleting messages, described under various names, that destroy themselves after so much time has elapsed. Signal has “disappearing messages” with a customizable time. As we have established previously, not all apps offer the same functions, and this does nothing to delete any screenshots of your message that the recipient may have taken.

How much metadata is kept?
In addition to the contents of your messages, you want to know that your chosen application is also protecting your security via the metadata it stores. Metadata can contribute to security issues through user profiling, as it includes things like the identities of both sender and recipient of a given message, when communications were made (and for how long), IP addresses, and even the kinds of devices used. In short, it can say a lot about you.

This is precisely why you want to make sure you know what data your messaging application will collect, as well as what it will preserve. This site offers a handy breakdown of many popular applications, broken down side-by-side.

Hopefully, this information will enable you to make the best choice for your business. For more assistance with your business’ security and operations, Net Activity has the IT solutions that you need. Call 216-503-5150 for more information.

How Good is your Disaster Recovery Plan?

You may think you know all about disaster recovery plans (DRP) from attending conferences or reading up on the subject. But one of the best ways to learn is by example, and the following real-life case offers valuable lessons. Learn about the DPR audit of a state government office and the knowledge gained from it.

Hosting certain types of data and managing a government network legally bind you to maintain DRPs. After an audit of the Michigan Department of Technology and Budget, several failures led to a trove of helpful tips for small- and medium-sized businesses attempting to create a bulletproof disaster recovery plan.

Update and test your plan frequently
What was one of the first and most obvious failures of the department’s DRP? It didn’t include plans to restore an essential piece of their infrastructure — the department’s intranet. Without it, the employees are unable to complete even the most basic of tasks.

The reason for the oversight? The last time the plan was updated was in 2011, leaving out more than six years of IT advancements. If annual revisions sound like too much work, just consider all of the IT upgrades and improvements you’ve made in this year alone. If they’re not accounted for in your plan, you’re destined to fail.

Keep your DRP in an easy-to-find location
It may seem a bit ironic that the best way to store your top-of-the-line business continuity solution is in a binder, but the Michigan Department of Technology and Budget learned the hard way that the alternatives don’t work. Auditors found the DRP stored on the same network it was meant to restore. Which means if something had happened to the network, the plan would be totally inaccessible.

Your company would do well to store electronic copies on more than one network in addition to physical copies around the office and off-site.

Always prepare for a doomsday scenario
The government office made suitable plans for restoring the local area network (LAN), but beyond that, there was no way for employees to get back to work within the 24-hour recovery time objective.

Your organization needs to be prepared for the possibility that there may not be a LAN to go back to. Cloud backups and software are the best way to keep everything up and running when your office is flooded or crushed beneath a pile of rubble.

Your DRP is more than just a pesky legal requirement. It’s the insurance plan that will keep you in business when disaster strikes. Our professionals know the importance of combining both academic and real-world resources to make your plan airtight when either auditors or blizzards strike. Contact Net Activity today to learn more about bringing that expertise to your business.

Troubleshoot your Wi-Fi with ease

You’ve invested in Wi-Fi routers so you can access emails, collaborate in real time, browse Facebook, and watch YouTube videos at blistering speeds. But when your Wi-Fi refuses to work the way it should, the frustration sets in and you begin to contemplate smashing your router into pieces. Avoid that temptation with these five easy ways to troubleshoot common Wi-Fi

Range constraints

Wi-Fi works via radio waves that are broadcast from a central hub, usually a piece of hardware known as a router. To avoid a weak signal in your office, make sure:

  • Your router is placed in a centralized location and not tucked away in the corner.
  • Your Wi-Fi antennae are either in a fully horizontal or vertical position for optimal signal distribution.

Note that Wi-Fi range constraints can also occur from interference, so if your office is situated in a highly populated area, try changing your router’s channel.

Slow speeds

Despite a high-speed or fiber optic internet connection, slow load times can still occur for a number of reasons. To optimize speeds, try the following:

  • Make sure your router is located in the same room as the devices connecting to it.
  • Install more routers to better accommodate a high number of connected devices.
  • Close bandwidth-intensive applications such as Skype, Dropbox, YouTube, and Facebook.
  • Disable your router’s power-saving mode.
  • Create a new router channel to avoid network bottlenecks.

Connection issues

We understand how frustrating it can be when the Wi-Fi network shows up on your device but still won’t connect. Before you give up, these solutions might help:

  • Determine whether your Wi-Fi connection is the problem or if your internet is down by plugging your laptop directly into the router via an Ethernet cable. If you can’t get a connection, then Wi-Fi isn’t the culprit.
  • Factory reset your router with a paperclip or a pen and hold down that tiny button for about 30 seconds.
  • Try rebooting your device.

Unstable connections

Random hiccups in your Wi-Fi connection are normal from time to time. However, if they become a constant nuisance in your office, try the following quick fixes:

  • Move your router to a different spot or even a different room.
  • Avoid having too many routers in the same location, as that can confuse your device.

Network not found

Router glitches can result in your Wi-Fi network not appearing at all. Two solutions that can resolve this problem are:

  • Disconnecting the router from the power source and waiting at least 30 seconds before reconnecting it.
  • Replacing an old router; if it’s over three years old, you’re probably due for a replacement.

When you experience Wi-Fi issues, these tips will help you avoid serious downtime. But if you’d rather have a dedicated technology provider take care of your hardware needs, give us a call at 216-503-5150 and we’ll be happy to help.

Here’s How to Protect Your Personal Data When Using Social Media for Your Business

Social media is a great tool that your business can use to communicate with clients and prospective customers, but in an age where you can expect your employees to have their own accounts, it can be devastating to overlook the security issues associated with it. Today, we’ll examine how you can protect your organization from its employees’ social media use.

Most social media sites require that you create an account to represent your business, but in order to do this, Facebook and LinkedIn require you to have a personal account prior to creating a business page. To this end, we’ll be providing tips on how to keep your personal accounts safe from other users, thereby protecting your business.

Facebook
First, you’ll need to create a personal profile. Facebook doesn’t allow Pages to be created without having a personal profile. Once you have done this, you can use the blue bar at the top of the page to find the feature to Create a menu item. From these options, select Page. From here, select the Business or Brand option to fill in the requested information.

You can hide the personal information on your profile page by accessing the Settings via the drop-down arrow at the top-right of the window. From here, you can navigate to the Privacy sub-menu.

To lock down your account, set Who can see your future posts to Only me. You can also limit past posts.

Furthermore, you should take these actions.

  • Under the How People Find and Contact You area, you need to select Friends of Friends for Who can send you friend requests.
  • Set Who can see your friends list to Only Me.
  • It’s important that you set Who can look you up using the email address you provided to Friends and do the same for the option Who can look you up using the phone number you provided.
  • Uncheck the box on Do you want search engines outside of Facebook to link to your profile, too.
  • Next, you’ll want to click on the Timeline and Tagging option on your left. Change the option for Who can post on your timeline to Only me.

With all these settings configured in this way, only your Facebook friends will be able to see your account.

LinkedIn
LinkedIn also requires you to make an account before creating an official business page. Once you have an account set up, you can create a business page by clicking on Create a Company Page + under the nine-dot menu and following the prompts given.

You can hide your LinkedIn profile by accessing Settings & Privacy. Under Privacy, you’ll see several options allowing you to customize the information that LinkedIn shares with others.

While social media can lend a considerable amount of visibility to your business, it shouldn’t come at the cost of security. For more tips on how to be as secure as possible with your business, subscribe to our blog.

3 Things You Can Do to Hold More Effective Meetings

Do you ever feel like your business’ meetings simply don’t go as planned? These are often the most dangerous kind of meetings, as employees who have better things to do may find that meetings aren’t a great way of using their time (or their skills) properly. If you are having meetings that just seem like a waste of time, it’s your responsibility to start thinking about how you can improve them. Here are a few tips:

Have Better Agendas
How does your business currently conduct meetings? Perhaps you go in with a specific topic in mind, or maybe they are weekly meetings that are held whether you have something of substance to say or not. Either way, it’s best to go in with an agenda (and stick to it) if you want the most productive meetings.

Use Better Technology
Technology can give your meetings a kickstart when they are otherwise simply people sitting around a table and having a chat. You can use media, including slideshows and infographics, to provide context for the conversation. Furthermore, if meeting in the office isn’t an option, you can implement mobile technology and web conferencing software to keep your team connected regardless of where they are located.

Hold an Open Forum
People like to feel involved in meetings, and they will enjoy them more when their involvement means something. You can open up your meetings at the end for people to voice concerns or make statements. This can, in turn, open up a dialogue that may not otherwise have been created.

Does your business need a hand elevating its meeting game? Net Activity can help.  To learn more reach out to us at 216-503-5150.

Special Year End Pricing !!

Microsoft Teams Rooms Systems For Small/Medium Meeting Room