The Enstep Blog
Get the latest technology insights and IT tips.
5 Benefits of Managed Security Service Provider
In the dynamic realm of technology solutions, Enstep stands as a beacon of expertise. As...
Using Outlook to Access your Gmail Account
Do you have a Gmail account but prefer using Outlook to access your email? You can configure your Gmail to behave like a normal mailbox so that you can download it using your favorite desktop or mobile client such as Outlook. You can then access your mail offline, and use tools you already use with Outlook, such as Outlook’s mail formatting features and MS Office integration. Here’s how: 1. First set up your Gmail account for POP or IMAP . If you use other Outlook features such as Tasks and Notes, consider using Google App Sync for Outlook instead. 2. In Outlook, add a new email account. Remember to use your email address when setting up your account (including ‘@gmail.com’ or ‘@your_domain.com’). For the exact steps, follow the instructions here . 3. Are you using a mail client other than Outlook? Check out instructions from Google here .
If the Internet Had a Superwoman, it would be Dawn Song
With hackers and electronic thieves constantly on the lookout for the latest exploits and security breaches they can take advantage of, it is comforting to know that there are also people behind bold initiatives to make our web experiences much safer. If you think hackers are the only ones doing their research to release newer and scarier viruses and malware on the web, think again. It is comforting to know that there are also very capable people doing what they can to make the internet a safer place – like Professor Dawn Song, associate professor at the University of California at Berkeley and MacArthur Foundation fellow. In a nutshell, Professor Song has been looking at different ways to make the internet experience more secure. Her two initiatives – WebBlaze and BitBlaze – are aimed toward developers who want to create better and much more secure programs and applications. WebBlaze is a compilation of different strategies from Song and other like minds who tackle different problems and solutions in all sorts of platforms, and BitBlaze is an analysis tool for malicious software. While we won’t go into too much detail (it involves very complicated math), the gist is that Song and her colleagues are drawing up some very solid solutions to constantly evolving security issues on the web. It’s exciting to see developments like these in the security industry. As threats continue to evolve, so does the means through which they are fought. The more we use the internet and the more the online experience becomes integral to the day-to-day operations of businesses big and small, the more important securing your data and information becomes. And because of efforts such as Professor Song’s, we can expect security programs to be much more effective and efficient as time passes. Know more about BitBlaze and WebBlaze Learn more about Dawn Song here If you are looking to assess and beef up your security systems, we’d be happy to sit down with you and take a look at improvements that can make your business and your data much more secure.
Twitter Turns 5 and Continues as a Powerful Social Networking Tool
Twitter is now five years old, and the social networking website famous for its 140-character “tweets” continues to make waves as both a powerful social networking and social marketing tool. Social networking and “microblogging” site Twitter turned five years old recently, a testament to how effective this kind of approach to social networking is. And in those five short years, the number of users has ballooned to up to 200 million, sending around 140 million tweets a day around the world – and the number continues to grow. March 21, 2006 marked the day Twitter co-founder Jack Dorsey sent the first ever tweet that read, “just setting up my twttr.” Since then, people have used the service to broadcast all sorts of things, provided they stay within the 140-character limit – from what they ate that day to updates about news and current affairs. Much more relevant to businesses, though, is how Twitter has become an integral part of internet and social media marketing. Twitter offers a plethora of advantages that enable businesses to share information on the web much faster than traditional means. And it’s not only for small businesses. Big organizations such as ESPN (@espn, 1,098,906 followers), Dell (@DellOutlet, 1,581,201 followers), and Amazon (@amazondeals, 204,838 folowers) use Twitter’s wide reach and large audience to update about promotions, events, and other information. Twitter enables businesses to get in touch with audiences and gain feedback almost instantly. It’s a win-win deal – clients get to say what they want in a short, brief 140-character tweet, and businesses can respond and make the necessary improvements very efficiently. Twitter also helps direct more traffic and visitors to websites and gives the impression of a hands-on, responsive service (provided website updates are timely and relevant). The platform on which Twitter operates makes for a fast-paced exchange of information that, with the right marketing strategies, can be very advantageous for businesses. If you want to know more about how to harness this very effective medium to beef up your internet marketing efforts, give us a call and we’ll be happy to sit down with you and create strategies that meet your needs.
Battling Stubborn Bandwidth Hogs
Major sporting events can be a cause for concern for business owners and managers as employees shift their attention from work to keeping themselves updated through video streaming or engaging in online gambling. It’s important that you have the right tools at your disposal to keep things in check. One of the many challenges businesses face is managing bandwidth and keeping productivity at a maximum. These challenges are especially apparent during major sporting events when hundreds of hours of productivity are lost to non-work activities. During these times, many sports fanatics do their best to stay updated with the latest news in sporting events. And while there is nothing wrong with being a fan, there is a problem when office hours – not to mention precious bandwidth – are wasted on these unproductive activities. Besides video streaming live telecasts or replays of matches and games, there are also those who engage in online betting and gambling, especially during the final legs of a tournament or competition. Unfortunately, it’s not uncommon for some employees to spend the majority of their time at the office on these pursuits, with little to zero accomplishments for the day. The problem is truly a serious one, with studies showing millions of dollars in productivity lost during popular sporting events. That’s beside the bandwidth wasted on what is, from a professional standpoint, useless and irrelevant activities. Naturally, the value of losses in productivity and bandwidth vary from company to company, but any loss is a loss that affects your bottom line. The good news is that these kinds of situations can be prevented. With the right software, you can be immediately alerted when a particular workstation is consuming an unusual amount of bandwidth. This will not only help you cut off the bandwidth usage, but also help you identify employees who are wasting company resources. You can even use this software to catch people who might be illegally downloading content from the web through torrent or peer-to-peer programs, which also pose security threats to your system. If you’d like to learn more about solutions to better manage your bandwidth and productivity, please don’t hesitate to give us a call and we’ll be more than happy to sit down with you to discuss a customized approach for your organization.
Customize the Windows 7 Logon Screen
Would you like to customize the Windows 7 Logon Screen and use your own wallpaper image? There are actually several ways to do this. The first method involves editing the registry and creating a folder containing your own custom images. However, if you are uncomfortable doing this, or if it seems like too much work, there is a free application that can do it for you called Windows 7 Logon Background Changer . The download is a zip file, and once you unzip it, just run the installer. After installation, the program will allow you to choose from images already on your drive and view a preview of how it will look. Find out more by downloading the program .
Outsourcing Your Wi-Fi Hotspot
More and more people are demanding that business establishments they visit provide free Wi-Fi. Setting up the hotspot network yourself might seem to be a good idea, but you’re probably missing a lot of fundamental security protocols that leave your network open to abuse. Many businesses have seen the demand for free Wi-Fi at their establishments jump drastically, as more and more people feel the need to be online as often as possible for personal and business purposes. In response to this demand, one of the most common solutions is to allow clients and customers to use the business’s existing internal network. Some companies provide a password, while others simply leave the connection open to all. However, a better solution is to have an outsourced service or company provide the Wi-Fi hotspot you allow others to use for free. Why? One of the most important benefits is security. Companies trying to handle their own Wi-Fi hotspots – especially small businesses without in-house IT resources – are likely to make fundamental mistakes that leave their networks vulnerable and exposed to abuse and infiltration. Outsourced Wi-Fi providers are experts in giving you a secure system that protects your own network and by extension, your business. Another benefit of using an outsourced Wi-Fi hotspot provider is that you also have greater control over the network, allowing you to impose rules such as bandwidth and website limits. You can also determine whether you want to require the people who’ll be using the hotspot to log in with a password (which you provide), or simply enjoy an open connection. Another important point is the marketing that comes with the free Wi-Fi service – while you are providing your clients with a free internet connection, your primary goal is to promote your business. If you want to know more about outsourced Wi-Fi, feel free to contact us so we can discuss a custom blueprint for a Wi-Fi hotspot for your business.
Add or Remove Apps from Microsoft Office 2007 or 2010 Suite
When you installed MS Office 2007 or 2010, you had the choice of installing the entire suite or picking and choosing which apps you wanted. If you now find you want to change those selections, we can help. Read more .
How Skype TV is Changing Businesses Around the World
Skype, together with its partners Panasonic and Samsung, has developed the first generation of Skype-enabled TVs that allow you to call and receive video calls from anyone who has Skype, and make video calls to users with Skype (v5.0+) for Windows or Mac on their computers or laptops. Technology continues to evolve each day, and the internet especially has made life easier and more convenient. You can shop online, conduct research from any location, bank online, and even have meetings and conferences online. There’s no need to fly from one state or country to another for board meetings, and no need to pay for expensive telephone bills for conference calls. Downloadable internet programs allow you to meet as long as you want, and if both parties have downloaded the same program – it’s free. One such program is Skype. Skype is a software application that enables registered users to make voice calls and group chats over the internet, as well as use offline messaging, instant messaging, and chat history storage. Calls between Skype users are free, and calls to landline and mobile phones can be made for a fee using a debit-based user account system. In January 2006, video conferencing between two users was introduced, and in 2010 Skype began offering free video conferencing with up to 5 people. Today, Skype has brought video conferencing a step further: to your widescreen TV. The Skype-enabled TV was developed by David Dinka and his team as a result of interviews conducted worldwide asking respondents about their communication needs. The interviews uncovered a common desire to be able to speak to their colleagues, family, and friends from a more comfortable place than their desks, and they prefer to make video calls on a big screen. Together with its partners Panasonic and Samsung, Skype has developed the first generation of Skype-enabled TVs that allow you to call and receive video calls from anyone who has Skype. You can also video call users with Skype for Windows or Mac (version 5.0 and above) on their computers or laptops. How does it work? You’ll need a Skype-enabled TV (Sony and VIZIO will also offer models later this year) and a webcam developed specifically to work with your TV and Skype. These special webcams have built-in microphones that allow you to make calls from a distance without having to shout or move closer to the TV. Some Panasonic TVs will even allow you to make HD video calls. To maximize your video calls, it’s recommended that you have a 1Mbs symmetric broadband connection. For entrepreneurs with several offices around the country or even around the world, this will be especially useful, allowing them to link offices and have a full-time video connection for free. And with Skype TV, you won’t have to stay glued to your desk staring into the small screen of your computer during conference calls. You can be seated comfortably on your sofa with a clear view of everyone involved. And because the service is free, you won’t have to worry about rushing through meetings to keep operation costs down. You get your work done at the pace that you set. For more details about Skype TV, please visit the Skype website: www.skype.com.
How to Reverse “Never Remember” for a Password in Firefox
Have you ever clicked “Never Remember” for a password, only to decide later that you do want Firefox to remember it? Here’s how you can get Firefox to re-prompt you. Read more .
A Primer of Softphone Technology for PABX
Softphones make communication much easier by using an internet connection to make a call. But for businesses, PABX softphones offer much more secure communication for your day-to-day operations. Technology has always had a profound impact on the way we do business, especially these days with the constant need to stay in touch with bosses, clients, and co-workers. A breakdown in communication often means a dip in productivity – so you always need to have the best and most effective means of communication at your disposal. One of these means is softphones, which are basically software programs that allow you to make calls in much the same way as you do using a telephone or mobile device, except it’s through your internet connection. The most popular softphones include Skype, MagicJack, or Yahoo Messenger’s call feature. However, there are also softphone technologies that can utilize your PABX (private automatic branch exchange) network, which – while more limited in a general sense – are much better for businesses because of the security they offer. Softphones on PABX work better for business purposes because of the nature of the PABX networks themselves. The privacy and exclusivity for your business communications are maintained, and PABX softphones make communication convenient without compromising security. If you want to know more about softphone technology for your PABX network, please don’t hesitate to contact us and we’ll be happy to discuss a detailed service blueprint that will work for you.
Access Hidden Regional Themes in Windows 7
Windows 7 offers location-specific Aero themes based on the language and location you pick during installation. But did you know you can access other hidden themes from different countries? Read more .
Important Update: President Signs Red Flag Clarification Act into Law
Professional service providers such as attorneys, accountants, and doctors no longer fall within the definition of a creditor under the Red Flag Rule. The Federal Trade Commission’s (FTC) so-called “Red Flag Rule,” which requires all businesses that are potential identity-theft targets to develop plans to spot red flags and prevent theft, received much criticism for being too broad. But now there’s some relief: S. 3987, the Red Flag Clarification Act, which President Obama signed into law in December 2010. To recap, under the Red Flag Rule, the FTC had been interpreting “creditor” broadly by including organizations that defer payment for goods or services and bill clients later. This led to widespread concern that the Red Flag Rule would be applicable to entities not typically thought of as creditors, including law firms and health care providers. The Red Flag Clarification Act exempts such entities by revising the definition of creditor to exclude creditors “that advance funds on behalf of a person for expenses incidental to a service provided by the creditor to that person.” Essentially, the Red Flag Clarification Act limits the scope of the Red Flag Rule to creditors that regularly and in the ordinary course of business obtain or use consumer reports in connection with a credit transaction; furnish information to consumer reporting agencies in connection with a credit transaction; or advance funds to a person based on the person’s obligation to repay the funds. The legislation does include a provision that would allow other types of creditors to be subject to the Red Flag Rule if the agency with authority over the creditor (such as federal banking agencies) determines that the creditor has accounts that are subject to a reasonably foreseeable risk of identity theft.
Understanding Private and Virtual Private Networks
Why are companies rolling out their own private networks? Find out what private networks are and how you can benefit. The world is flat. That is if you ask New York Times columnist and Pulitzer Prize winning author Thomas Friedman, who wrote a book of the same name describing just how the world got flatter and flatter thanks to a whole host of factors, one of which is technology. Technology — most notably computers, telecommunication devices, and the Internet — has allowed individuals and organizations to create, communicate, and collaborate like never before. One question that always pops up, however, is how to maintain privacy and security in this brave new world of greater transparency and connectedness. Until recently, the only way was through cumbersome and expensive means. Companies, especially large corporations, previously resorted to setting up their own infrastructure (think miles and miles of cable, satellite uplinks, or large line-of-sight communication links) or leasing infrastructure from telecommunication companies, just to be able to set up and maintain their own private and secure telecommunication networks that can span large distances. With the advent of the Internet, however, setting up private networks has become much cheaper and easier. Virtual Private Networks, or VPNs, allow companies to create their own secure, private networks within the public network using technologies such as encryption and other security mechanisms to ensure that only authorized users can access the network and the data within. The Internet is used only as the transport layer, radically reducing cost and time to set up because of its ubiquity, simplicity, and scalability. Examples of how a VPN can benefit your organization include the ability to: Allow your people to work anywhere at any time — as long as they have Internet access and VPN support. Link together your offices and employees anywhere in the world, securely and cost effectively. Extend your operations around the world — sell online, move goods across borders, recruit talent from anywhere! Can you think of other ways a VPN can help you and your organization? Let us know. Thinking of setting one up right away? Call us and find out how we can help.
Move Cache Memory to RAM for Faster Firefox
Mozilla Firefox too slow? Here’s a tip for speeding up Firefox by moving cache memory to RAM. Read more .
What Are QR Codes, Anyway?
In a society where more and more people are relying on smartphones to stay connected, internet marketing strategies must now incorporate smartphones into their approach. One way to do this is marketing through QR codes. Smartphones are becoming more and more popular these days, as both hardware and software developers add features to phones and operating systems that make them much more appealing to potential buyers. And as smartphone technology continues to improve in terms of providing more connectivity to the user – not only through the mobile network but to the internet as well – it follows that your internet marketing strategies will need to incorporate the smartphone factor. One simple strategy that you can employ is using QR Codes, or Quick Response Codes, which are simple 2D barcodes that can be scanned using a smartphone. Numerous scanning applications are available to read these barcodes, and once read the code will redirect the user to any link you set up. QR Codes are also fairly easy to create, making them a great on-the-fly strategy if you want to market something quickly and easily. An additional strength of QR Code-driven marketing lies in the volume of people who use smartphones today – which gives you a large audience from the get go. For such a small piece of code, there are countless options for how you can use them to your advantage. If you are interested in learning more about using QR Codes, give us a call and we can come up with several strategies that can cater to your specific needs.
Where do you go
from here?
Reach out and find out how great Enstep support can be!















