Home
About
Contact Us

Home>blog
Wed, 21 Feb 2018/

CRM tips and tricks for beginners

Customer relationship management (CRM) software is essential for every marketing, sales, and customer service department. It allows you to capture your customers’ information and keep a record of their interactions with your business. If you’re new to the concept of CRM, here are some tips and tricks to help you get the most out of it. Always update customer information A CRM system is only effective when the data it provides is current. If the customer’s address, company name, or preferred method of contact has changed, your staff should be recording this information immediately so your sales and marketing teams are always equipped with the right information. Use purchasing history for upselling opportunities It’s easier to sell to existing customers than acquiring new ones. Boost your sales performance by analyzing your existing clients’ purchasing history and designing promotions or events designed just for them. For example, if they recently purchased a razor from your online store, you can program your CRM to recommend related products like shaving cream or aftershave. Not only does this widen your profit margins, it also makes customers’ lives a lot easier and promotes repeat business. Automate processes Take advantage of the workflow automation features in CRM apps to eliminate time-consuming and repetitive tasks. For instance, when a new lead is added to your CRM (via newsletter subscriptions or website visits), the CRM can be programmed to send follow-up emails, offer promotions, and other interactions to keep your business at the forefront of their attention. This saves you from writing the same canned responses while also making sure that you’re engaging your clients throughout the entire sales process. Learn from analytics CRM also makes it possible to analyze customer trends and behavior. If you noticed a spike in demand for certain products and services during the holidays, be more aggressive in pushing them out next year. If certain email campaigns were more successful than others (e.g., higher open rates, click-through-rates, and potential customers), understand what elements were responsible for that success and try to replicate them the next time you send a newsletter. Customer data should also be used to shape sales and marketing tactics. A salesperson that already knows the client’s name, locations, and preferences can deliver more personal sales pitches and has a better chance of closing a deal. The point is this: If you're not learning from your data, your business growth will be limited. Integrate CRM with other business software Tying CRM software to other programs makes it even more powerful. Integration with accounting software combines customer and financial data, eliminating redundant manual data entry and providing more insightful reports. When used alongside a VoIP system, your staff will get relevant customer information from multiple databases displayed on one screen when they’re about to make a call. Get some CRM support Last but not least, work with a CRM provider that offers 24/7 support. Ideally, they should be keeping your data safe, updating your software regularly, and advising you on how to use complex CRM features. This may seem like a lot, but the important thing to remember is that just like every technology investment, CRM requires active participation from executives, managers, and front-line staff. If you need more advice on keeping customers happy or want to know what technologies can add value to your business, call Multi IT on 011 435 0450 today.
VIEW MORE
Thu, 22 Feb 2018/

Black and white: Not all hackers are bad

When a cyber security researcher stopped the spread of WannaCry, the headlines praised him as a savior. But just a few short months later he was in handcuffs for allegedly creating a piece of malware that steals banking information. Even if he is innocent, it’s important to understand the difference between white hat, black hat and even gray hat hackers. A complicated history Since all the way back in the 1950s, the term hacker has been vaguely defined. As computers and the people who worked with them became more accessible, the word was used to describe someone who explored the details and limits of technology by testing them from a variety of angles. But by the 1980s, hackers became associated with teenagers who were being caught breaking into government computer systems. Partially because that is what they called themselves, and partially because the word hacker has an inherently aggressive ring to it. Today, several of those pioneering hackers run multimillion-dollar cyber security consulting businesses. So what should you call someone who uses their knowledge for good? “White hat” hackers Sometimes referred to as ethical hackers, or plain old network security specialists, these are the good guys. Whether it’s selling what they find to hardware and software vendors in “bug bounty” programs or working as full-time technicians, white hat hackers are just interested in making an honest buck. Linus Torvalds is a great example of a white hat hacker. After years of experimenting with the operating system on his computer, he finally released Linux, a secure open-source operating system. “Black hat” hackers Closer to the definition that most people outside the IT world know and use, black hat hackers create programs and campaigns solely for causing damage. This may be anything from financial harm in the form of ransomware to digital vandalism. Albert Gonzalez is one of the many poster children for black hat hacking. In 2005, he organised a group of individuals to compromise poorly secured wireless networks and steal information. He is most famous for stealing over 90 million credit and debit card numbers from TJ Maxx over the course of two years. “Gray hat” hackers Whether someone is a security specialist or a cyber criminal, the majority of their work is usually conducted over the internet. This anonymity affords them opportunities to try their hand at both white hat and black hat hacking. Today, there are quite a few headlines making the rounds describing Marcus Hutchins as a gray hat hacker. Hutchins became an overnight superstar earlier this year when he poked and prodded the WannaCry ransomware until he found a way to stop it. During the day, Hutchins works for the Kryptos Logic cybersecurity firm, but the US government believes he spent his free time creating the Kronos banking malware. He has been arrested and branded a “gray hat” hacker. The world of cyber security is far more complicated than the stylised hacking in Hollywood movies. Internet-based warfare is not as simple as good guys vs. bad guys, and it certainly doesn’t give small businesses a pass. If you need a team of experienced professionals to help you tackle the complexities of modern cyber security, call Multi IT on 011 435 0450 today.
VIEW MORE
Wed, 14 Feb 2018/

What you need to know about malware

You’ve all heard of viruses, spyware, ransomware and trojans. But did you know that they’re all types of malware? They’re all designed to ruin your digital life, but different types of malware put your computer at risk in different ways. Understanding what sets them apart can keep your business guarded. Viruses Once created to annoy users by making small changes to their computers, like altering wallpapers, this type of malware has evolved into a malicious tool used to breach confidential data. Most of the time, viruses work by attaching themselves to .exe files in order to infect computers once the file has been opened. This can result in various issues with your computer’s operating system, at their worst, rendering your computer unusable. To avoid these unfortunate circumstances, you should scan executable files before running them. There are plenty of antivirus software options, but we recommend choosing one that scans in real-time rather than manually. Spyware Unlike viruses, spyware doesn’t harm your computer, but instead, targets you. Spyware attaches itself to executable files and once opened or downloaded, will install itself, often times completely unnoticed. Once running on your computer, it can track everything you type, including passwords and other confidential information. Hackers can then use this information to access your files, emails, bank accounts, or anything else you do on your computer. But don’t panic just yet, you can protect yourself by installing anti-spyware software, sometimes included in all-purpose “anti-malware” software. Note that most reputable antivirus software also come bundled with anti-spyware solutions. Adware Are you redirected to a particular page every time you start your browser? Do you get pop ups when surfing the internet? If either situation sounds familiar, you’re likely dealing with adware. Also known as Potential Unwanted Programs (PUP), adware isn’t designed to steal your data, but to get you to click on fraudulent ads. Whether you click on the ad or not, adware can significantly slow down your computer since they take up valuable bandwidth. Worse still, they’re often attached with other types of malware. Some adware programs come packaged with legitimate software and trick you into accepting their terms of use, which make them especially difficult to remove. To eradicate adware, you’ll need a solution with specialized adware removal protocols. Scareware This type of malware works like adware except that it doesn’t make money by tricking you into clicking on ads, but by scaring you into buying a software you don’t need. An example is a pop up ad that tells you your computer is infected with a virus and you need to buy a certain software to eliminate it. If you fall for one of these tactics and click on the ad, you’ll be redirected to a website where you can buy the fake antivirus software. Scareware acts more like a diversion from the other malware that often comes with it. A good antivirus solution will help scan for scareware too, but you should patch your operating systems regularly just to be safe. Ransomware Ransomware has become increasingly common and hostile. It encrypts your computer files and holds them hostage until you’ve paid a fee for the decryption code. Because ransomware comes with sophisticated encryption, there aren’t many options unless you have backups of your data. There are some tools that can protect against ransomware but we recommend that you backup your data and practice safe web browsing habits. Worms Similar to viruses, worms replicate themselves to widen the scope of their damage. However, worms don’t require human intervention to replicate themselves as they use security flaws to transmit from one computer to the next, making them far more dangerous than your typical virus. They often spread via email, sending emails to everyone in an infected user’s contact list, which was exactly the case with the ILOVEYOU worm that cost businesses approximately $5.5 billion worth of damage. The easiest ways to protect your network from worms is to use a firewall to block external access to your computer network, and to be careful when clicking on unknown links in your email or unknown messages on social media. Trojans Usually downloaded from rogue websites, Trojans create digital backdoors that allow hackers to take control of your computer without your knowledge. They can steal your personal information, your files, or cause your computer to stop working. Sometimes hackers will use your computer as a proxy to conceal their identity or to send out spam. To avoid trojan attacks, you should never open emails or download attachments from unknown senders. If you’re skeptical, use your antivirus software to scan every file first. In order to keep malware at bay, you need to invest in security solutions with real-time protection and apply security best practices within your office. If you have any questions or concerns, or simply need advice on how to strengthen your business’s security, just give Multi IT call on 011 435 0450 and we’ll be happy to help.
VIEW MORE
Fri, 23 Feb 2018/

Office 365 gets a slew of new upgrades

There’s a good reason why businesses like Office 365: It’s a feature-rich productivity suite that gets plenty of upgrades throughout the year. Last month, Microsoft announced four new upgrades that will make the cloud platform even more irresistible for small- and medium-sized businesses. Microsoft Connections Email marketing campaigns are a great way to build relationships with contacts and increase sales, but they’re often difficult to manage. With Microsoft Connections, you can easily launch a campaign in minutes using pre-designed templates for newsletters, referrals, and promotions. As you acquire more contacts, Connections allows you to segment your mailing list so you can target different customers. For instance, you can send product promotions to clients who have stayed with your business for more than six months. After firing off your emails, performance charts track important metrics like open rates, clickthrough rates, new sign-ups, and canceled subscriptions that can be used to improve future campaigns. Microsoft Listings Microsoft Listings helps you seamlessly manage your online presence. Whenever you update your business profile, Listings automatically publishes those changes across your Facebook, Google, Bing, and Yelp accounts, allowing you to keep important information like business hours up to date. What’s more, Listings includes a web dashboard where you can monitor page-views, reviews, and likes, helping you assess your company’s online reputation. Microsoft Invoicing Another useful addition is Microsoft Invoicing, a tool that helps you generate price estimates and invoices. When combined with enterprise resource planning (ERP) software, you can program workflows that automatically redirect invoices, pending payments, and estimates to the right accountant. This application works for credit, debit, and PayPal transactions. Office 365 Business Center The Office 365 Business Center brings Connections, Listings, and Invoicing all under one roof. This means information listed on one application is automatically registered onto another, saving you from inputting data multiple times. The main hub also features a unified dashboard where you can track an email campaign’s performance, Facebook impressions, and any outstanding invoices, giving you full visibility into your accounting and marketing processes. According to Microsoft, these powerful features will be generally available for Office 365 Business Premium subscribers in the coming months. But if you want to get early access, consider joining the Office 365 Insider program. Office 365 will likely have even more surprises for SMBs this year, so make sure to keep in touch with Multi IT on 011 435 0450 to get the latest rundown on feature releases and Microsoft news.
VIEW MORE
Mon, 26 Feb 2018/

Technology: What to do with your dinosaur PC?

When smartphones first outsold PCs in 2010, people no longer have to put up with slow and bulky computers to do business. This comes as no surprise why many stashed their aged PCs away. But there are ways to breathe new life into your ancient laptop and computer, so if you haven’t trashed them, it’s time to plug them in. You might have to do some light upgrades like install more RAM and a bigger hard drive, depending on how old your PC is, but it’ll be worth it. Once you’ve done that, explore these options: Try a lighter OS While you might be tempted to install a new Windows or macOS on your old computer, they won’t work optimally without a fast processor. However, Linux-based operating systems, which come in a variety of options called “distros”, will make your computer feel brand new without exhausting its hardware. Popular distros options like Ubuntu, elementary OS, and PinguyOS, can be easily installed, have similar interfaces as Windows, and come with a ton of software packages. The best part is they only require a minimum of 4GB of RAM, which means you won’t have to invest much at all. Make a NAS server Network-attached storage (NAS) is a server for your home or small business network that allows you to store files that need to be shared with all the PCs on the network. If your old PC has at least 8GB of RAM, you can use it to make your own NAS instead of purchasing one. Simply download FreeNAS, a software accessible from any OS (Windows, MacOS, Linux) that enables you to make a shared backup of your computers. FreeNAS features access permissions and also lets you stream media to mobile OSes, like iOS and Android. However, if you prefer turning your PC into a private cloud for remote access and data backup, Tonido is a great alternative. Compatible with Mac, Windows, and Linux, it turns your PC into a storage website so you can access files from anywhere on any device. Tonido offers up to 2GB of file syncing across computers. There’s even Tonido apps for iOS and Android for mobile access. Secure your online privacy Wouldn’t it be great if you could turn your old computer into a dedicated privacy PC so you won’t have to worry about compromising privacy while browsing the web? With The Amnesic Incognito Live System (TAILS), you can. This Linux-based software routes all your internet traffic and requests through TOR Project, a software that makes it extremely difficult for someone to track you online. All of TAILS’ integrated applications like web browser, Office suite, IM client, and email software, are pre-configured for robust security and privacy protection. Take your media up a notch If you’re looking for a way to listen to your music, podcasts, or watch videos on other PCs, or mobile devices, a server software like Kodi can help. What it does is bring all your digital media together into one user-friendly package so you can use your old PC as an audio and video hosting platform. From there, you can play files on other devices via the internet. There are remote control apps for iOS or Android users and even an app for Kodi playback on the Amazon Fire TV. Kodi works on any device running Windows, Mac OS, Linux, and even rooted Android and jailbroken iOS devices. We’re always on the lookout for ways to help our clients make the most out of their technology investments. If you’d like to know more about how to utilize other hardware to your business’s advantage, give Multi IT a call on 011 435 0450.
VIEW MORE
Tue, 27 Feb 2018/

Surf the net with Microsoft Edge

People prefer one web browser over another for all kinds of reasons, including ease of use, applications, security and of course, performance. If you’ve recently downloaded Windows 10, there’s a new browser on the block: Microsoft Edge. Here are some nifty features you may find useful. Import favorites You can easily import the list of websites you've marked as favorites from any web browser to Microsoft Edge. You can do this by going to the More actions tab (located right next to the address bar), then Settings, and clicking on the Favorites settings tab. From there, choose the pages you want to add to your favorites list and click Import. Change font size in reading view Even with your reading glasses on, a website’s font can be too small to read. Microsoft Edge allows you to adjust the reading view by going to Other actions and selecting the Settings tab. From there, scroll down and click on the Reading section that will allow you to adjust the font size and even brightness to your liking. Make notes on the website Ever wished you could write on, circle, or highlight specific parts of a website and share them with your friends? Microsoft Edge lets you do just that with its new note feature. Select Make a web noteand use tools such as the ballpoint pen or highlighter, or add a typed note on the page you’re browsing. When you’re done, click Save or Share to complete the process. Reading list This feature allows you to save articles, e-books, or any other content you wish to peruse later. By signing in with a Microsoft account, your reading list will appear on all your Windows 10 devices. Select Add to favorites or reading list, and then Reading list > Add. You can also add a link to your reading list by right-clicking on any link without having to visit the page. Ask Cortana Microsoft Edge users can easily access Cortana, Windows’ voice-activated personal assistant since it is built into the web browser. Cortana can make dinner reservations, offer additional discounts on certain shopping websites, and download applications that you may find useful. Simply highlight a word, phrase, or image, press and right-click it, and then select Ask Cortana to get more information or find related images. View and delete browser history As you browse the web, Microsoft Edge remembers and stores the information you’ve entered into forms, passwords, and sites you’ve visited. Most of it will be stored on your PC; but if you use Cortana, some of the data will be stored in the cloud which will be used to better assist you. If you need to delete cache history, you can do so by following either of these two methods: View your browsing history at Hub > History, then select Clear all history. If you want to retain certain data, you can choose what to remove, then select Clear. Since Cortana’s browsing history is stored in the cloud, select Change what Microsoft Edge knows about me in the cloud, then select Clear browsing history. Switching from one web browser to another isn't always as smooth as it is made out to be. In order for users to make the most out of their time online, they require a period of adjustment. If you still have questions about making Microsoft Edge your default browser, get in touch with Multi IT's experts today on 011 435 0450.
VIEW MORE