Home
About
Contact Us

Home>blog
Wed, 17 Jan 2018/

How to reduce data loss in Office 365

For businesses, the security of sensitive data is critical. If this information is lost or stolen, it could lead to crippling financial losses, legal disputes, and more importantly, loss of customer trust. And while those of you with Microsoft Office 365 installed have some security and compliance tools, there are still some data protection best practices you need to consider. Here are seven of them: Take advantage of policy alerts Establishing policy notifications in Office 365’s Compliance Center can help you meet your company’s data security obligations. For instance, policy tips can warn employees about sending confidential information anytime they’re about to send messages to contacts who aren’t listed in the company network. These preemptive warnings can prevent data leaks and also educate users on safer data sharing practices. Secure mobile devices With the growing trend of using personal smartphones and tablets to access work email, calendar, contacts, and documents, securing mobile devices is now a critical part of protecting your organization’s data. Installing mobile device management features for Office 365 enables you to manage security policies and access rules, and remotely wipe sensitive data from mobile devices if they’re lost or stolen. Use multi-factor authentication Because of the growing sophistication of today’s cyberattacks, a single password shouldn’t be the only safeguard for Office 365 accounts. To reduce account hijacking instances, you must enable Office 365 multi-factor authentication. This feature makes it more difficult for hackers to access your account since they not only have to guess user passwords but also provide a second authentication factor like a temporary SMS code. Apply session timeouts Many employees usually forget to log out of their Office 365 accounts and keep their computers or mobile devices unlocked. This could give unauthorized users unfettered access to company accounts, allowing them to compromise sensitive data. But by applying session timeouts to Office 365, email accounts, and internal networks, the system will automatically log users out after 10 minutes, preventing hackers from simply opening company workstations and accessing private information. Avoid public calendar sharing Office 365 calendar sharing features allows employees to share and sync their schedules with their colleagues. However, publicly sharing this schedule is a bad idea. Enabling public calendar sharing helps attackers understand how your company works, determine who’s away, and identify your most vulnerable users. For instance, if security administrators are publicly listed as “Away on vacation,” an attacker may see this as an opportunity to unleash a slew of malware attacks to corrupt your data before your business can respond. Employ role-based access controls Another Office 365 feature that will limit the flow of sensitive data across your company is access management. This lets you determine which user (or users) have access to specific files in your company. For example, front-of-house staff won’t be able to read or edit executive-level documents, minimizing data leaks. Encrypt emails Encrypting classified information is your last line of defense to secure your data. Should hackers intercept your emails, encryption tools will make files unreadable to unauthorized recipients. This is a must-have for Office 365, where files and emails are shared on a regular basis. While Office 365 offers users the ability to share data and collaborate flexibly, you must be aware of the potential data security risks at all times. When you work with Multi IT, we will make sure your business keeps up with ever-changing data security and compliance obligations. And if you need help securing your Office 365, we can help with that too! Simply contact Multi IT on 011 435 0450 today!.
VIEW MORE
Thu, 18 Jan 2018/

Bluetooth users beware!

Bluetooth technology helps simplify our daily lives -- it allows for hands free communication, a quick and easy way to share content with friends, family, colleagues, and more. In fact, 45 percent of Americans have Bluetooth enabled across multiple devices. This raises the question: Does using Bluetooth leave our doors opened to hacker attacks? Google paid a settlement fee of $7million for unauthorized data collection from unsecured wireless networks in 2013. While their intention likely wasn’t theft, many disagreed and called them out for Bluesnarfing, a method most hackers are familiar with. What is it? Bluesnarfing is the use of Bluetooth connection to steal information from a wireless device, particularly common in smartphones and laptops. Using programming languages that allow them to find Bluetooth devices left continuously on and in “discovery” mode, cybercriminals can attack devices as far as 300 feet away without leaving any trace. Once a device is compromised, hackers have access to everything on it: contact, emails, passwords, photos, and any other information. To make matters worse, they can also leave victims with costly phone bills by using their phone to tap long distance and 900-number calls. What preventive measures can you take? The best way is to disable Bluetooth on your device when you’re not using it, especially in crowded public spaces, a hacker’s sweet spot. Other ways to steer clear of Bluesnarfing include: Switching your Bluetooth to “non-discovery” mode Using at least eight characters in your PIN as every digit adds approximately 10,000 more combinations required to crack it Never accept pairing requests from unknown users Require user approval for connection requests (configurable in your smartphone’s security features) Avoid pairing devices for the first time in public areas Bluesnarfing isn’t by any means the newest trick in a cybercriminal’s book, but that doesn’t mean it’s any less vicious. If you’d like to know more about how to keep your IT and your devices safe, give Multi IT a call on 011 435 0450, we’ll be happy to advise.
VIEW MORE
Fri, 19 Jan 2018/

SEO considerations for your sites’ images

When working with web platforms like WordPress, there are three letters that induce anxiety in any business owner: SEO (search engine optimization). It’s one of the most confusing aspects of running a modern business, and web apps that rate your SEO with no more than a red or green light don’t make it any easier. Read on to find out whether your site’s images are the cause of that annoying red light. Do my images really affect my SEO? One of the reasons images tend to be overlooked when auditing SEO is because it’s easy to forget just how many your website has. Maybe when you first built your site you had a few photos on your homepage, but nowhere else. Over time however, you probably added countless visual elements in blog posts, landing pages and team photos -- drastically increasing the influence of your images on your SEO. Image resolution and load speed The first thing to check is how your images affect your site’s speed. If you’re using ultra high-resolution photos, users on mobile devices or satellite data connections will have trouble loading your site. Site load times affect your site’s ranking on Google, so make sure to pare them down to a more reasonable resolution and save them as web-friendly file types (GIF, JPEG and PNG). Keywords and image title The days of keyword-stuffing are long gone, but that doesn’t mean you can get away with uploading images with filenames like DSC2558.jpg. Before uploading an image to your site, make sure to name it something relevant to the content, such as gym-trainer-helping-lift.jpg or call-center-customer-service.jpg. This makes it easier for search engines to derive information about the content from the images on a page. “Alt text” and title text Even though Google is getting better at recognizing image content without any help from text identifiers, describing your images in your website’s backend is still important for SEO. Every image on your site should have as much text-based information as possible without disrupting the user experience. To see how this works in WordPress, open up your site dashboard and click on Media. This will display all the images, videos and audio on your site. Select any photo and click “Edit more details.” Whatever you include in the Caption field will be shown below the image, so make sure it corresponds with your content. If it doesn’t work with the content, skip it. In this case user experience takes priority over SEO. The Alternative Text and Description fields will be shown to visitors only if the image doesn’t load or if they select it manually. They may not seem all that important, but these should be considered non-negotiable for SEO purposes. Check that your site is doing all these things before requesting another SEO report. If your score changes, start regularly auditing your image optimizations. If you’re still seeing red, there are a number of web- and cloud-based platforms that can help you improve your content. Give Multi IT a call today on 011 435 0450 to find out more!
VIEW MORE
Mon, 22 Jan 2018/

Basic PC fixes are costing you money

When your employees seek your IT security staff’s help to fix their personal computer (PC) problems, it’s often perceived as a productive use of everyone’s time. After all, employees must have working computers and IT professionals are expected to resolve any technology issues. What doesn’t get acknowledged, however, is that instead of troubleshooting technical problems, your technology support staff could be spending their time on more productive tasks. Cost of fixes According to a survey of technology professionals, companies waste as much as $88,660 of their yearly IT budget as a result of having security staff spend an hour or more per work week fixing colleagues’ personal computers. The ‘wasted amount’ was based on an average hourly salary of IT staff multiplied by 52 weeks a year. Other than knowing how much time is wasted, what makes things worse is that IT security staff are among the highest paid employees in most companies. The fixes have mostly to do with individual rather than department- or company-wide computer problems that don’t necessarily benefit the entire company. The resulting amount is especially staggering for small- and medium-sized businesses (SMBs) whose limited resources are better off spent on business intelligence tools and other network security upgrades. Other costs All those hours spent on fixing personal computers often means neglecting security improvements. The recent WannaCry ransomware attacks, which successfully infected 300,000 computers in 150 countries, demonstrate the dangers of failing to update operating system security patches on time. It should be a routine network security task that, if ignored, can leave your business helpless in the face of a cyber attack as formidable as WannaCry. It didn’t make much money, but had it been executed better, its effects would have been more devastating to businesses, regardless of size. Profitable projects could also be set aside because of employees’ PC issues. For SMBs with one or two IT staff, this is especially detrimental to productivity and growth. They can easily increase their IT budgets, but if employees’ negligible computer issues keep occurring and systems keep crashing, hiring extra IT personnel won’t do much good. What businesses should do The key takeaway in all this is: Proactive IT management eliminates the expenditure required to fix problematic computers. Bolstering your entire IT infrastructure against disruptive crashes is the first step in avoiding the wasteful use of your staff’s time and your company’s money. Even if your small business has the resources to hire extra staff, the general shortage of cyber security skills also poses a problem. Ultimately, the solution shouldn’t always have to be increasing manpower, but rather maximizing existing resources. Having experts proactively maintain your IT eliminates the need to solve recurring small issues and lets your staff find a better use for technology resources. If you need non-disruptive technology, call Multi IT today on 011 435 0450 for advice and to find out more!
VIEW MORE
Tue, 23 Jan 2018/

Marketing your SMB with Pinterest

A while back, Pinterest launched its first paid advertising service, “Promoted Pins,” which is geared toward large enterprises. Recently, a similar product named “DIY Promoted Pins” was released for small- and medium-sized businesses. This shows how popular social media has become in helping to establish an online presence for your business, and here are some tips to get you started. Know your audience According to a study conducted by Ahalogy and AcuPOLL Precision Research, Inc., Pinterest is largely used by women, mostly “Millennial Moms.” If your typical customer demographic is predominantly male, your marketing efforts would probably be better spent elsewhere. But if your business caters to women between the ages 15-29, you should consider creating an online presence on Pinterest. Think like a content marketer Users are looking for engaging content, which is why 59% of active Pinterest users go for Pins that lead to blog posts, articles, and even photos. The most popular topics on the platform are more visual (e.g., food, fashion, decor, etc.), so if you don't have highly visual content, then infographics, images from blog entries, and even photos of staff members also do the trick. Look for inspiration Getting stuck in a creative rut happens to the best of us, so check out the boards that are saving your Pins to get some fresh insight. There's a good chance that people saving your Pins have related content that can help you gain insight into what your typical customer is interested in. Not only that, it also helps you identify trends and come up with new ideas for a marketing campaign. Categorize your boards By creating and properly labeling multiple boards -- one for each of your products or services -- your users are able to engage not only with your general content but also with content they’re more interested in. Determine posting frequency Excessive pinning might overwhelm or simply annoy your audience, but not pinning enough might cause followers to lose interest. Create a posting schedule and gauge audience reaction before making any changes to the frequency of Pins. In order to surpass the stiff competition, you’ll need all the help you can get, and that includes social media marketing. If you have any questions about Pinterest and how it can help your business grow, don’t hesitate to give Multi IT a call on 011 435 0450 or to visit our website!
VIEW MORE
Wed, 24 Jan 2018/

6 more Office 365 productivity tricks

By now, you’re probably familiar with popular Office 365 productivity features like Skype for Business, and real-time collaboration in Word, Excel, and PowerPoint. You might even remember a few time-saving keyboard shortcuts that will make your Office 365 experience a lot smoother. But even after all that, there’s still much to learn about Office 365. Here are some more tricks that can boost your productivity. Declutter your inbox If you’re having trouble managing the overwhelming amount of emails in your inbox, then using Office 365’s “Clutter” feature can clear up some space. To enable this feature go to Settings > Options > Mail > Automatic processing > Clutter then select Separate items identified as Clutter. Once activated, you need to mark any unwanted messages as “clutter” to teach Office 365. After learning your email preferences, Office 365 will automatically move low-priority messages into your “Clutter” folder, helping you focus on more important emails. Ignore group emails Are you copied on a long email thread you don’t want to be part of? If so, simply go to the message and find the Ignore setting. Doing this will automatically move future reply-alls to the trash so they never bother you again. Of course, if you ever changed your mind, you could un-ignore the message: Just find the email in your trash folder and click Stop ignoring. Unsend emails In case you sent a message to the wrong recipient or attached the wrong file, Office 365 has a message recall function. To use this, open your sent message, click Actions, and select Recall this message. From here, you can either “Delete unread copies of this message” or “Delete unread copies and replace with a new message.” Bear in mind that this applies only to unread messages and for Outlook users within the same company domain. Work offline Whenever you’re working outside the office or in an area with unstable internet, it’s a good idea to enable Offline Access. Found under the Settings menu, this feature allows you to continue working on documents offline and syncs any changes made when you have an internet connection. Offline access is also available in your SharePoint Online document libraries. Use Outlook plugins Aside from sending and receiving emails, Outlook also has some awesome third-party plugins. Some of our favorite integrations include PayPal, which allows you to send money securely via email; and Uber, which lets you set up an Uber ride reminder for any calendar event. Find more of productivity-boosting plugins in the Office Store. Tell Office applications what to do If you’re not a fan of sifting through menus and options, you can always take advantage of the Tell Me function in your Office 2016 apps. When you press Alt + Q, you bring up a search bar that allows you to look for the functions you need. Suppose you need to put a wall of text into columns on Word but can’t find where it is specifically. Just type ‘column’ and Microsoft will help you with the rest. These tricks and features themselves will definitely increase productivity. And fortunately, there’s, there’s more coming. Microsoft continues to expand Office 365’s capabilities, and if you truly want to make the most out of the software, don’t be afraid to explore its newly released features. For more Office 365 tips and updates, get in touch with Multi IT today. Call Multi IT on 011 435 0450 OR Visit our Website
VIEW MORE