Home
About
Contact Us

Home>blog
Wed, 08 Feb 2017/

8 ways technology impacted your life in 2016

There was no shortage of good and bad news from the world of technology last year. Here's 8 ways technology impacted your life in 2016. Samsung's Galaxy Note 7 was banned by airlines The ban was enforced amid fears the phones would explode mid-flight. The phone was well received by critics when it was first released. Not even a week later, the first report of the phone exploding came from South Korea. Samsung recalled all Galaxy Note 7s, only having to recall them again when replacement phones started exploding too. Samsung has now permanently discontinued production of the Galaxy Note 7. Apple users had to buy new headphones Apple released the iPhone 7 in September. But, for the first time since the Walkman, the iPhone 7 had no standard 3.5mm headphone jack. New wireless headphones were needed. Tech analysts described Apple’s decision to remove the headphone jack as yet another way for Apple to try and steer the technology market. The Census Night Debacle The 2016 census was conducted online for the first time. The website crashed on census night and didn't come back online for 40 hours. A DDoS cyber-attack from overseas was found to be the cause. Virtual Reality became an actual consumer product Facebook, Sony, Samsung and Google all launched virtual reality headsets in 2016. It's not just for gamers, either. Alzheimer's Australia is using virtual reality to help people with dementia, reducing the need for medication. Australia's own virtual reality industry is expected to grow to $US2.16 trillion by 2035. We came one step closer to self-drive cars The United States adopted its first nationwide guidelines on self-driving cars (including requirements that the cars make ethical decisions). Details about the first self-driving car to be developed in Australia were also announced. Self-driving cars are expected to play a big role in reducing road trauma and congestion. Pokemon Go got everyone going Pokemon Go was reportedly installed on more smartphones than Tinder was. It was even said to have more daily users than Twitter for a short time. Unfortunately, there were cases of people crashing cars while playing the game – even a report that a player in the USA discovered a dead body while searching for Pokemons. You had to change your passwords The risk of being hacked seemed to increase two-fold. Even Hillary Clinton's campaign for president was impacted by an email hack, which the CIA now says Russia was behind. In other examples, Yahoo revealed more than a billion user accounts had been stolen in one of the biggest hacks in history, and a group called Fancy Bears leaked private medical records of athletes from the World Anti Doping agency. Fake news became the headline Experts say the proliferation of fake news influenced the 2016 US election. Many fake news stories spread on Facebook, prompting the social media site to announce it would introduce tools to help users stop the spread of fake news. The trend of fake news contributed to Oxford Dictionaries choosing the word "post-truth" as its Word of the Year. Post-truth describes circumstances in which appeals to emotion and personal belief become more influential in shaping public opinion than objective facts. What to do for 2017 Multi IT & Telephony Solutions are IT industry experts. Contact us now for your IT plan for 2017. The 8 ways technology impacted your life in 2016 is just a slight indication of what is in store for 2017.
VIEW MORE
Thu, 20 Nov 2014/

10 ways to impress at your next meeting

[one_half] We have all had it. The famous first meeting nerves. Either as a child on your very first date, or as an adult on your very first job interview. Meetings are a vital part of everyone's lives and making a positive impression and impact at that meeting is critical to your future plans. Whether it is a business meeting, job interview or simply a meeting with colleagues these tips will help you stand out and achieve. So in a brief 10 ways list, here are some points to remember for your next meeting. [/one_half] [one_half_last] [/one_half_last] Prepare in Advance Preparation is key! you've heard it a thousand times before and that's because its true. Being prepared gives you an edge over anyone, whether its being more knowledgeable, being able to respond quicker or giving you confidence, it all comes through preparation. State your objectives before hand You know what you want to say, do and accomplish from this meeting, but do they? A little communication before the meeting goes a long way in the success of that meeting. Arrive Early There are only 2 reasons a person is late for the interview. They are either dead or they dont care. Arriving early gives the impression you value that persons time and gives you the hidden benefit of preparing better for the meeting. giving you time to think about what to say and what to discuss. Be Presentable You are about to enter an impressive meeting where everyone will be blown away by what you say. dont let the way you are dressed distract them from the message you are trying to deliver. Your presentation is a package that starts from your first impression and like it or not the way you dress will be judged. Understand the other people in the meeting Regardless of the success or position of the person they will have personal interests and personal likes and dislikes. Knowing these will help you connect to that person, thus leaving them with a positive impression not only about the meeting but about you as well. Bring something to the table This is a deal breaker. If you are able to find out the names of the people involved in the meeting and are able to present them each with their own personalized document with their name on it your meeting is already half way to success. Even if you dont know their names make sure you bring something along, a paper and pen just to take notes also goes a long way. Make eye Contact Looking the person in the eye will help you to connect with them on a personal level. It shows confidence and that you are paying attention to what they are saying, all of which gains admiration and respect. Try get an in depth understanding of their business or them. In today's world you need an edge. The competition is tougher and more ruthless than ever. You need something to separate you from the competition, this is where your knowledge of them or their business puts you clear of everyone else. Having just something that no one else knows about is the difference between success and failure. That something gives you the edge and makes you invaluable. Commit and show enthusiasm Highest energy always wins. Its ok to get excited, its actually better than ok, its good! People love to see you are passionate about what you are doing and excited to be there. Them seeing your enthusiasm and excitement will make them feel more comfortable with the commitment you are about to do following on from the meeting. Follow up and Follow Through You have just had a brilliant meeting and are feeling on top of the world. its important to share that feeling with the people you just committed to. You need to follow up, a simple email thanking them for their time and stating everything you are about to do will help you and them to build a long lasting relationship.
VIEW MORE
Thu, 20 Nov 2014/

4 Must Have features for a Business Phone System

If you’ve been researching new phone systems for your business recently, it’s perfectly understandable that your head is spinning. With so many vendors in the marketplace promoting the features of their wares, and the glut of statistics available on the Internet hyping the benefits of various solutions, pinpointing exactly which capabilities your company should employ to meet its communications needs is, frankly, a project. Every company has different communications needs, so what you need in your office may not be what the competitor up the street requires in a phone system. There are, however, a few crucial features any quality business phone system must include: Mobility Mobile and remote working is more popular than ever, so any phone system you adopt should offer a top-flight mobile solution. The service should enable employees to take their office extensions with them anywhere they go, so they’ll never miss important calls from clients or customers. The system should also include presence, which is part of a robust mobile solution, as it allows employees to set their status so co-workers can instantly see the best way to contact them. Unified Messaging In business, simple is generally good—and unified messaging makes communications simpler. Instead of having to check a fax machine or waste time dialing into a voicemail system to retrieve a message, best-in-class phone systems deliver all communications directly to your email inbox. Faxes are delivered as PDFs and voicemails are retrievable directly from the inbox without calling into a system. WebRTC-based Videoconferencing WebRTC is the next transformative communications technology, so if a vendor isn’t leveraging the innovation, it should be a major red flag. WebRTC makes videoconferencing easy by allowing users to initiate virtual meetings through a Web browser. All it takes to get started is a few mouse clicks, and once the meeting is created, the organizer sends a link to invitees who click it and enter the conference immediately. Whether the conference involves attendees who work in the same company or representatives from different organizations, nobody has to download anything or install any plug-ins to participate in the meeting. Easy Installation and Management Best-in-class phone systems should be simple to set up, deploy and manage; 3CX takes this principle to another level, as it is the only software-based PBX that can run on an existing Windows machine. Installing 3CX is as simple as plugging an IP phone into the network and letting 3CX automatically detect and configure it. Managing 3CX Phone System is simple as well. Any upgrades or changes to the service can be made through the 3CX management console, eliminating confusion and the need for helpdesk calls. Now You Know What to Look for If you are considering a phone system that lacks any of the aforementioned features, it’s time to take a step back and look again. Now that you know what to look for it should be easier to wade through all the information out there and make a sound decision for your company. Contact Us to find out how our Telephony Solutions transformed communications for other businesses. Find out more about 3cx on our website.
VIEW MORE
Fri, 21 Nov 2014/

The 3 important offerings of Office 365

Trust is the foundation of every good relationship. That’s as true in business as it is in friendship. Today, more than 1.2 billion people worldwide trust Microsoft Office to provide a reliable productivity solution with commercial-grade privacy, security and compliance features to keep their data secured. With more organizations moving to the cloud, and more people using cloud-based services such as Office 365 to work anywhere, anytime, and across multiple devices, trust has never been more important. We are committed to doing the best job of achieving three key objectives: •protecting your privacy •securing your data in the cloud •helping you comply with regulatory standards Read on to learn more about how we can help with security, privacy and compliance when you move your organization’s data to the cloud. How Office 365 protects your privacy Office 365 uses your data for only one purpose: to provide you the services. That’s a commitment we make right in our contract. We have a rich history of offering and honouring privacy-friendly terms with our services and continue to play a leadership role in this area. Office 365 was the first cloud-based business productivity service to help customers meet Health Insurance Portability and Accountability Act (HIPAA) requirements, by convening academic, public- and private-sector experts to help craft a business associate agreement (BAA) that would meet the needs of universities, health systems, and many other regulated organizations. Microsoft were also the first to receive written confirmation from the European Union’s data protection authorities that Microsoft’s enterprise cloud contracts meet the high standards of EU privacy law. In addition, we were one of the first to sign the K-12 School Service Provider Pledge to Safeguard Student Privacy. We recognize that you need control over who accesses your organization’s data in the cloud. This is why Microsoft provide advanced data loss prevention controls and controls that let you restrict the copying, printing or forwarding of emails that contain confidential information. Microsoft offer controls to help restrict the accidental leakage of sensitive information such as credit card numbers via their services by providing real-time alerts to users attempting to share such content, and we even enable the admins in your organization to set policies that will automatically encrypt such content. How Office 365 keeps your data secured Office 365 offers built-in security and compliance capabilities, which means you don’t have to spend extra time and money finding trustworthy third-party apps to ensure you have an enterprise-grade solution that is secured and compliant. Office 365 users who were surveyed in a recent study commissioned by Microsoft and conducted by Forrester Consulting saw the following savings, on average, after moving to the cloud and adopting Office 365: •6.8% reduction in compliance costs •10.7% reduction in time spent on eDiscovery •73% decrease in the number of data breaches •32% reduction in the cost of those breaches. With more customers accessing corporate data on multiple devices, and collaborating on team sites and shared drives, we are constantly innovating to keep your data secured. Last month at TechEd Microsoft announced new updates to the built-in security capabilities in Office 365. New mobile device management (MDM) capabilities, set to roll out in the first quarter of 2015, will enable secured access to corporate data in Office 365 services from a diverse range of smartphones and tablets, including iOS, Android, and Windows Phone devices. In addition, the expansion of Data Loss Prevention (DLP) capabilities beyond email to additional Office 365 services and Office clients will help you protect sensitive content no matter where it is stored and shared within our services. How Office 365 enables regulatory compliance At Multi, we not only help you meet your compliance needs, we help you exceed them. Microsoft have built more than 1000 controls into the Office 365 compliance framework that enable us to stay up to date with ever-evolving industry standards. Meanwhile, their specialist compliance team continuously tracks standards and regulations, and develops common control sets for Microsoft product team to build into Office 365. Multi's work to help our customers stay compliant never stops. Microsoft are currently working to meet ISO 27018, an international code of practice that establishes controls to protect Personally Identifiable Information (PII) in accordance with the privacy principles in ISO/IEC 29100 for the public cloud-computing environment. Microsoft not only offer you transparency about where your data is stored, who has access to it and when but also offer you meaningful choices in these matters. Get more information To learn more about the privacy, security and regulatory compliance capabilities of Office 365 and how they compare with the competition’s offering, Contact Us to have an IT professional discuss everything with you. View Office 365 and all its features on our website
VIEW MORE
Tue, 25 Nov 2014/

3 Ways to Protect Your Data During a Power Outage

[one_half padding="0 5px 0 0"] The only thing longer than the Load Shedding schedule is the list of damaged equipment and data loss we have seen from it. When Rolling Blackouts and Load Shedding occur, protecting your computer and network may not be on your list of priorities. However, Load Shedding damaged equipment is more common than you think. With the high demand on Eskom you may experience power outages, power spikes, and brownouts that could affect your computer system. Protect your computer, and the data held within it, by preparing yourself and your company for potential power issues by following 3 simple steps. [/one_half] [one_half_last padding="0 0px 0 5px"] [/one_half_last] 1. Power spikes Power surges, or power spikes, are sudden increases in voltage. For example, when lightning strikes close to your home or business, you may experience a power surge. A power surge can cause damage to your computer's fuses and circuits. One of the simplest ways to protect your data is to invest in a quality power surge protector. This will protect the devices and circuits in your home. Plug all your computer equipment into a surge protector to avoid this common hassle. 2. Power outages Power outages are often hard to predict. Inclement weather, short circuits, and power station issues may all result in the loss of electrical power outages. If you are using your computer at the time of the outage, your settings may not be saved. Any data inputted into software programs, such as Microsoft Word or Excel, after your last save of the document is likely lost. Therefore, it is critical to save your work early and often. 3. Brownouts Brownouts, also known as voltage sags, occur when the power supply to the computer system is lower than the demand required to properly power the equipment. The lowered voltage often causes computers to shut down or malfunction. Installing an uninterruptible power supply (UPS) is an efficient way to protect your data against brownouts and surprise power outages. The system keeps your computer running for a few extra minutes while you save active data. Then, you can safely shut down equipment without harm to the devices or loss of data. The UPS is often used as a battery backup system for a PC. Even with the installation of a generator a UPS is highly recommended to prevent the brief power outage where your data is lost and equipment is damaged until the generator kicks in. With Power Outages and Load Shedding a common weekly occurrence a proper plan needs to be put in place to minimize the damage caused. Contact Us for more information on how you and your company can better prepare your IT infrastructure for the next Power Outage.
VIEW MORE
Wed, 03 Dec 2014/

Why your company needs an Internet Policy

With computers and Internet access such an integral part of every business, and the Internet filled with everything from gambling to X-Rated websites, it is critical that every business has an Internet Use Policy in place. This policy can help prevent your employees from accidentally or intentionally causing harm to your company or your company’s reputation. While you don’t want to give your employees the idea that they are living in George Orwell’s 1984, you want them to have a clear understanding of practices that are and are not appropriate during work hours. It is necessary for companies to create an Internet policy that everyone can live with. Why Have An Internet Use Policy? The purpose of a business is to make money. In order to accomplish this, the company has to have productive employees. The Internet can be a time drain and often prevent employees from being as productive as they should be. With such a wide range of information available on the Internet, it is necessary to clarify the company’s expectations of its employees regarding Internet access. With a strong policy in place, the employee, as well as the employer, will find Internet use less confusing and frustrating. Another important reason to have a strong Internet Use Policy is to save your company from unnecessary lawsuits. Unless you have a clear policy on what is and is not acceptable on the Internet in your company, you can risk having an unfair dismissal lawsuit on your hands when an employee is abusing the company’s Internet. What Elements Should Your Internet Usage Policy Contain? When planning your Internet Use Policy, it should contain certain key elements such as: The company Internet is for company business only and to be used only during company business hours All work done on company computers during business hours, including all emails, is company property and can be accessed by the employer at any time. Establish what type of computer use is unacceptable such as accessing personal social media accounts, personal email, pornographic websites, etc. Employees must refrain from accessing websites, creating, or forwarding email that promotes any type of discrimination such as racial or sexual discrimination, or that is defamatory or harmful towards another person or group. Employees are not allowed to gain access to or attempt to access other employee’s computers, employee stored information, or any information unauthorized by the company. In addition to the guidelines above, inform your employees that whatever is done by the company, for the company, and on the company computers should remain confidential and within the confines of the company. In addition, let employees know that when they access unapproved sites, they risk infecting the company computer system with viruses that could possibly shut down the entire company network. Having an Internet use policy in place helps to eliminate any confusion and possible abuse that could prevent a company from functioning productively. A solid Internet use policy help to make the work environment more pleasant and more conducive to getting the necessary work done in order to have a successful business. Creating a safe and productive environment is important for any business, and one way to ensure that is to implement an Internet use policy.
VIEW MORE