Are you avoiding instant messaging (IM) for fear that it will distract your employees and cut productivity? In fact, the opposite may be true. What is IM? IM is software that allows you to communicate in real time with other people who have the same software. It’s like email, but instantaneous. IM was originally considered a way to stay in touch with friends and family, but lately it’s taken off in the workplace. That’s because IM offers a fast, convenient way for employees to interact with colleagues or clients in real time. In fact, many cutting-edge employers now encourage their employees to use IM instead of phone calls or e-mails. Benefits include: Increased productivity: Workers can remain at their workstations instead of walking across the office or picking up the phone to obtain information, and the need for time-consuming meetings is reduced. Real-time communication with vendors and customers. Connection of traveling employees through mobile devices. Where can you get it? While there are many free IM services available such as AOL, Yahoo!, Skype, and MSN, many companies now offer solutions specifically designed for business. We can work with you to determine the best solution for your specific needs How to get started: Select a single provider. Expand services as needed. While basic IM may be adequate for some small businesses, others may benefit from expanded offerings, such as text conferencing, pop-up messaging, and email integration. Make sure your information is protected from external threats such as hackers and viruses. Create a usage policy to avoid internal misuse. Ensure that all employees know the rules and have installed the software on their systems. To be effective, your IM application should be carefully integrated with your existing IT system and workflow. Give us a call today and we’ll help you through these steps to implement a secure and productive IM solution.
Go Green!
These days there’s a lot of buzz about “ going green ” – helping preserve the environment, conserving energy, and looking for sustainable ways to grow the economy. The IT industry is doing its part as well, with “ green computing ,” which is basically computing by more efficient and sustainable means. You can get on board with some of the suggestions below: Save on energy, save on costs: A lot of today’s computing devices feature power management features and energy saving modes, thanks largely to US government efforts to develop energy-efficiency standards called Energy Star. This is a voluntary labeling program adopted by many vendors to clearly identify and promote their efforts in bringing down energy costs for customers as well as to showcase their own use of eco-friendly production processes and materials. When you purchase Energy Star products and make full use of their features, you not only help the environment but also save significantly on your energy bills. Reuse and Recycle: Consider retiring old equipment and replacing it with more energy-efficient models. Reuse what you can (such as RAM modules, cables, controller cards, and drives), and find a reputable recycler to help you dispose of remaining parts safely. Consolidate what you have: Be eco-smart about your purchases. Advances in technology such as machine virtualization now allow you to consolidate computing resources on fewer machines, such as all-in-one printers, saving not only upfront capital costs but also recurring operating expenses such as maintenance, space, power, and cooling. Over time this means less equipment goes into landfills, better utilization of resources, and more money freed up to apply where it counts – to growing your business. Do more with less: Instead of travelling, consider teleconferencing. Instead of hiring full time, onsite employees consider telecommuting arrangements. Not only do you reduce your carbon footprint by reducing transportation impact but also save a considerable amount of time and money as well. Outsource IT: For non-core elements of your operations, consider outsourcing , which leverages economies of scale by sharing resources among several customers without losing efficiency or effectiveness. For example, instead of hosting your own website, outsource it to a hosting service provider instead. We have lots of ideas for going green at your office and saving energy costs along the way. Give us a call and we’ll be glad to share them with you.
Facebook Users Targeted By Phishing Attack
Last May 14th, reports indicated that hackers had launched a phising attack on Facebook ’s 200 million users, successfully stealing passwords from some. The hackers set up websites designed to look like the Facebook home page. Victims were directed to log back in to the site, but were routed to the fake site instead, unwittingly giving away their passwords. Facebook has deleted all references to the fake domains, which included www.151.im, www.121.im and www.123.im. This is the latest in a string of campaigns launched by hackers to steal personal information from users and to spread spam. Facebook’s large user base makes them an attractive target for many cybercriminials. Users are urged to seek help from authorities or trusted IT consultants if they believe their accounts were compromised, or to avoid similar scams.Related articles: Facebook users targeted by hackers in successful phishing attack Gadgetwise: More Facebook Phishing Trouble Today Hackers launch phishing attack on Facebook users
Instant Messaging for Business
Instant Messaging , or IM, can be a boon for any business because it saves time, improves efficiency, and even enables greater employee/customer intimacy. IM allows real-time communication and interaction between two or more people via the Internet , and its use is growing steadily. IM provides users with instant feedback about the presence of online “buddies” or users you know – for instance, whether they are online, busy, or currently offline, what they are currently doing, and whether they are able to successfully receive your communication. Even when one party is not currently connected to the Internet, you can leave offline messages for later viewing. Information sent can be in the form of text, media, and recently even voice and video. While IM has traditionally been used for quick and instant personal interaction such as chatting between friends and family, people are now finding that it can be effective in business as well. But before diving in and using IM in your organization, be aware that there can be significant risks. For instance, it can expose the company to outside threats such as hackers and viruses, or from problems from within such as employees sharing secret or sensitive information to outside or unauthorized parties. Finally, if not monitored properly, it can be a huge timewaster if employees spend their time chatting with colleagues, family, and friends instead of working. Here are some tips to get the most out of IM safely and effectively within your organization: Create guidelines for use . Let employees know of the dangers and risks in using IM. Create policies to allow the use of IM only for certain people within the organization (such as sales) and only during certain times of the day. Ask your IT consultant to configure your network to enact the restrictions you want. Standardize . Choose one piece of IM software (such as Google Talk, AIM or MSN ) and try using it internally first. You won’t be able to prevent some employees from adding buddies outside of work, so make sure to ask them to separate buddies inside the company from those outside. IM software allows you to easily create “buddy lists” to do this. Know when to use it . IM is a tool that can complement e-mail on one end and voice calls on the other. Consider using e-mail for detailed information sharing or communications such as memos, requests, letters, and proposals that readers need to refer to repeatedly. Consider using voice calls for more intimate interaction, clarifying communication, or in cases when you need to build rapport with the recipient. IM can be something in between the two, such as when you need to ask a quick question, send a short update, or get presence information . Keep it short . Keep IMs short and direct. In IM, unlike in voice conversations, you don’t need to do go through pleasantries. Unlike email, because of their real-time nature, IMs can be intrusive so be conscious of what the other party is dong and to make it brief and to the point when necessary. Use your status to your advantage . IM software allow you to set your status (i.e., Busy or Away) to let others know if you are free to take their messages. You can also set your status to Invisible so that you can be aware of others’ presence but be invisible to others. Set your preferences . Most IM software allow you to control certain behaviors, such as window pop-ups, whether to archive messages or not, whether to startup automatically when you log in, and much more. Explore the features of your software and use them to your advantage.
Look for New Microsoft Office and Windows Vista Service Pack
Microsoft recently announced the release of the newest service pack to Microsoft Office 2007 , and has finished work on the second service pack update to Windows Vista . The MS Office update includes a collection of stability and performance updates as well as support for more file formats including Open Document Format (ODF) and Portable Document Format (PDF) files. The Windows Vista update includes support for Bluetooth 2.1, an updated Windows search technology, and the ability to natively record data to Blu-ray discs. Download the Microsoft Office 2007 service pack to install and watch out for the Windows Vista update soon. Ask us how your workflow can benefit from these helpful new releases.
The Conficker Threat – Be Prepared
The past couple of weeks, a new malicious and particularly virulent worm known as Downadup, also more popularly known as Conficker has started to infect millions of PCs. In fact by some estimates, it has infected over 10 million PCs worldwide. As with many threats proper prevention can greatly reduce or eliminate your problem. This worm is particularly dangerous as it can infect your PC in many ways. You can be infected by simply visiting your favorite Web site, downloading a file or email from the Internet, loading a USB drive, or just by leaving your networked computer on, overnight while you’re asleep. The worm takes advantage of known vulnerabilities in Windows to spread. Its removal can be difficult, as it blocks many known antivirus software and associated websites. In some cases it even disables antivirus software already installed or the Windows Update service. After infection, it may choose to run rogue software on the machine, or use it as a host to infect other machines. Particularly troubling, security experts believe, is that on April 1st, a new variant of the worm will begin to randomly check various websites on the Internet to download new instructions. What those instructions are unknown at this point and could be anything as harmless as telling a joke, displaying an ad or as harmful as destroying files or even stealing usernames and passwords. The worm itself is not new, it made its first appearance late November 2008, known under the names Conficker or Kido. It shouldn’t have spread if people had made sure to the latest Windows and other updates were applied to their PCs and have kept up to date with their security vendors’ latest antivirus releases. Also since it spreads via network shares, making sure to use strong passwords on shared network drives would have helped to contain it early as well. If you aren’t sure if your PC and network are protected, make sure to contact your IT service provider for advice. Here are some other articles you might want to check out for more information: Related articles: The Conficker worm’s evil genius. (slate.com) Conficker Worm Draws a Counter-Attack – PC World (domainmacher.com) FAQ: Conficker worm (cbc.ca) Your Quick Guide to the Conficker Worm (shankrila.com) Windows PC Worm Set to Activate on April 1st (littlegreenfootballs.com)
Using Social Media for your Business
Social Media such as Blogs, Micro-blogs, Wikis, and Social Networks are not only helping many people communicate and connect, but are also powerful tools for business as well. They can be used to promote your products and services, engage customers in meaningful conversations, network and develop new relationships, or simply to distribute information about your business online. Recently, the media has been awash with reports about Facebook , LinkedIn and Twitter , but many of you may be unclear about the concept, or unsure of its relevance to your business activities. Learn more about this new media online . Get to know how these tools can benefit your business or contact your IT Consultant for advice. Related articles by Zemanta: More notes from “Social Media Marketing” Social Media Marketing Industry Report The 4 Customer Types of Social Media The Five Myths of Social Media Using social media to network
What’s Next for Conflicker?
April fool’s day came and went, but so far the much feared attack from Conflicker never materialized, leaving security researchers to ponder what’s next for the notorious Internet worm . Although it didn’t release any detectable malicious payload, the arrival of April 1 did trigger a change in its behavior, with experts finding a finding a changed domain generation algorithm that opens up unfettered communication to 500 of the 50,000 potential newly generated domains. The latest variant, Conficker C , now has the ability to contact its command and control centers for further instructions while circumventing interference from the security community, which up until now had been able to block communication with its parent domains. At this point users are still advised to patch their operating systems or to seek the assistance of their IT service providers to make sure all variants of the worm has been removed. Read more at Channel Web .
Protecting Against the Rampant Conficker Worm
PC World posts a nice overview of the highly infectious Conflicker Worm. The Worm is dangerous as it uses several methods of attack. Once one computer in a network is infected, it often has ready access to other vulnerable computers in that network and can spread rapidly. The worm can download and install additional malware from attacker-controlled Web sites as well. Since that could mean anything from a password stealer to remote control software, a Conflicker-infected PC is essentially under the complete control of the attackers. Conficker and other worms are typically of most concern to small businesses that don’t regularly update the desktops and servers in their networks. If you’re not sure your network security is up to day get some help to find out. Read more at PC World…
Where do you go
from here?
Reach out and find out how great Enstep support can be!





