Carrollton Dermatology Associates
Dr. Thomas H. Lamb, MD.
Brighter Image, Inc.
RA-Lin and Associates
North Georgia Turf, Inc.
Most business users are familiar with using work applications like Microsoft Excel. While Excel creates charts and tables to make information easier to read, there’s a function that most users tend to forget, or are unaware of - headers and footers. So let’s see what they are and how adding them to your spreadsheet can help make your data even easier to read.
Headers and footers are useful in providing quick information about your document or data in a predictable format and also help set out different parts of a document. Simply put, they make calculations, graphs, and pivot tables much easier to read and follow.
These days, the security of various technology based systems is constantly being called into question. From attacks on mobile devices to ever increasing types of malware, many businesses are struggling to stay on top of their security. One of the best ways to help ensure your systems are secure is to be aware of common security issues. To that end, here are five common ways your security can be breached.
A common trick used by hackers is to plant malware in software and then place this software on a website. When a user visits the site, they are informed that they need to download the software in order for the site to load properly. Once downloaded, the malware infects the system. Other hackers send emails out with a file attached, where only the file contains malware.
There are a nearly limitless number of ways you can be tricked into downloading and installing malware. Luckily, there are steps you can take to avoid this:
If a hacker manages to access your computer and you are set up as the admin, they will have full access to your computer. This means they could install other malicious software, change settings or even completely hijack the machine. The biggest worry about this however, is if a hacker gets access to a computer that is used to manage the overall network. Should this happen, they could gain control over all the systems on the network and do what they please on it.
In order to avoid this, you should ensure that if a user doesn't need to install files or change settings on the computer, they do not have administrator access. Beyond this, installing security software like anti-virus scanners and keeping them up to date, as well as conducting regular scans, will help reduce the chances of being infected, or seeing infections spread.
For example, you leave your computer on when you go for lunch and someone walks up to it, plugs in a USB drive with malware on it and physically infects your system. Or, it could be they access your system and manually reset the password, thereby locking you out and giving them access.
What we are trying to say here is that not all infections or breaches arrive via the Internet. What we recommend is to ensure that you password protect your computer - you need to enter a password in order to access it. You should also be sure that when you are away from your computer it is either turned off, or you are logged off.
Beyond that, it is a good idea to disable drives like CD/DVD and connections like USB if you don't use them. This will limit the chances that someone will be able to use a CD or USB drive to infect your computer.
While it would be great to say that every business has the best employees, there is always a chance a breach can be carried out by an employee. The most effective way to prevent this, aside from ensuring your employees are happy, is to limit access to systems.
Take a look at what your employees have access to. For example, you may find that people in marketing have access to finance files or even admin panels. The truth is, your employees don't need access to everything, so take steps to limit access to necessary systems. Combine this with the suggestions above - limiting admin access and installing scanners - and you can likely limit or even prevent employee initiated breaches.
If this happens, your account is compromised. Combine this with the fact that many people use the same password for multiple accounts, and you could see a massive breach leading to data being stolen, or worse - your identity.
It is therefore a good idea to use a separate password for each account you have. Also, make sure that the passwords used are strong and as different as possible from each other. One tool that could help ensure this is a password manager which generates a different password for each account.
If you are looking to learn more about ensuring your systems are secure, contact us today to learn about how our services can help.
Laptops are one of the most useful tools at a business owner's disposal. These highly mobile devices allow you to take your work out of the office, or even just away from your desk. However, mobile as they are they still rely on batteries. The problem with some laptops however is that batteries don't last overly long, and there may be times when you aren't near a power source and find your battery running low. If you find yourself in this situation, here are six tips that can help preserve battery life until you find a power source.
Many laptops, including most PCs and all Macs, have shortcuts on the keyboard that allow you to modify the brightness of your screen. On almost all laptops, screen brightness is indicated by a sun icon, and pressing the smaller sun will decrease the brightness. On most laptops you can either just press the key with the brightness labels on it to decrease the brightness, while others will require that you press the FN key and the key with the label.
When activated, they will often manually override settings like screen brightness and turn off unnecessary services or connections like BlueTooth. To activate this on PCs, you can usually click on the battery icon in the lower-right bar of the main Windows screen and select your power saving mode.
If you have a Mac, press the battery icon at the top and select Open Energy Saver Preferences. This will allow you to modify how your laptop saves energy, including when to turn the screen and hard drives off.
When you are running low on power, try unplugging devices connected by USB. This is especially important if you have plugged your mobile phone or tablet into your laptop to charge.
You should also look to make sure other connection methods like Bluetooth are off. Disconnecting devices should allow your laptop to last a bit longer.
Most laptops allow you to turn the backlight off from the keyboard, much like the screen brightness. The location of these buttons will be different for each laptop, so be sure to consult your user manual if you can't find them.
So, when your battery starts to get low, try closing apps and programs you aren't using. This is especially true for apps that require larger amounts of computer resources like Photoshop or any graphics heavy program. Closing these will give you a precious few extra minutes, or more, of power.
The goal here is to try and stay in the same window or program, as switching programs will increase the drain of the battery. Sure, it won't be a massive spike in battery usage, but staying in the same window or app will help increase the time you'll be able to use your laptop on battery.
If you have a laptop and are looking for ways to get more out of your battery, contact us today to see how we can help.
Many businesses are constantly facing a potential disaster. It could be a major fire that wipes out your business, or something as simple as accidentally deleting an important spreadsheet. Regardless of the severity of the potential disaster, businesses need to be prepared and one of the best ways to prepare is to back up your data. In the first part of this article we covered four tips that can help. In this article, we take a look at the next four tips to help ensure your data is backed up.
If you are using solutions like the cloud or NAS (Network Attached Storage), you can usually automate the process by selecting which files and folders to back up and when. The software that powers these solutions will then do this automatically.
Ideally, your backups should be carried out automatically to ensure your data is available should you need it. But you should check periodically to ensure that your data is actually being backed up. This is especially true if you are backing up other systems, as there have been cases where employees have become frustrated by the backup process and simply turned it off. The business owner, thinking their data was being backed up would be in for a bit of a shock when systems crashed, if this was the case.
In order to really ensure backup redundancy we recommend that if your main backup is kept on-site, then the secondary backup should be on another storage medium that is kept off-site.
Essentially, think about critical data that is used in the company, but isn't physically kept on computers. It may feel like this is going a step too far with backups, especially for businesses who use email services like Exchange and Gmail. However, while the chances of these systems going down are incredibly rare, it could still happen. Therefore, you should conduct a monthly to bi-yearly backup just to ensure that data is there somewhere should something happen.
Also, testing is a good way to discover any problems, e.g., if someone has disabled backups, or one solution isn't working. This will ensure that your data is there when you need it.
If you are looking to integrate a data backup solution, contact us today to see how we can help.
Have you ever gone to talk with a colleague and gotten a look at their computer's desktop only to notice that they have files, apps, and folders strewn about in a seemingly random fashion? Or maybe you are guilty of a cluttered desktop. Many people tend to have somewhat unorganized desktops, especially if they have used the same computer for a number of years. The problem with this is that it can be a chore to find files and folders, and if your desktop has a ton of icons your computer could be more sluggish.
Want to tidy up your desktop? Here are six tips on how you can get your desktop more organized and even reduce virtual clutter too.
Take the time to think about what you use the most and which files and folders you really need to access instantly or which you use all the time. An easy way to figure this out is to simply auto-arrange your icons by right-clicking on an empty area of your desktop (where there are no icons) and selecting Auto arrange icons. This will arrange your icons into a grid format that makes them easier to see and work with. Then, right-click on empty space and hover your mouse over Sort by and select Date modified to order the icons by the date they were last modified, or opened, with the latest at the top.
In truth, you probably don't need all these shortcuts on your desktop. What you can do is create a folder on your desktop where all non-essential files and folders go. A folder like this is great to hold downloads or files that will only be used for a short amount of time.
The key here, is this folder is used for non-important, or temporary items. If you don't plan on keeping it, put the file, icon, etc. into this folder. Once you are done with the file, simply go into the holding folder and delete it.
It could help to also create a shortcut folder. When you install new programs on Windows, a shortcut icon is often automatically added to your desktop. However, these desktop shortcut should be for frequently used programs only. For programs that aren't really used that often, it is best to create a separate folder the shortcuts. This not only reduces desktop clutter, but puts shortcuts in one central location, making them easier to find.
To make this easier, open your desktop via the File Explorer. You can do this by opening any folder and clicking Desktop from the left-hand menu bar. This will make all of the icons and files on your desktop easier to see and work with.
Go through these and uninstall programs you no longer use, delete images you no longer need, move unimportant files, and place files in their relevant folders. Once complete, take a look at your browser to see where it downloads files too. If you have your browser set to download files to your desktop by default, try going into the settings and changing the download location to another file like the Downloads folder.
Of course, sticking with it won't always be easy, so maybe take time once every month or two to revisit your desktop and clean it up a bit.
If you prefer the traditional desktop view of Windows 7, or are using Windows 7, why not pin your important programs to the taskbar at the bottom of the screen? This can be done by right-clicking on an open app and selecting Pin to Taskbar. The programs will remain at the bottom of the screen, and can be opened by simply clicking on them.
Also, having an image you like also serves as a reminder to try to keep icons to a minimum in the first place. This could be a proactive solution to keeping desktop clutter down.
If you are looking to learn more about using Windows in your office, contact us today to see how we can help.
One of the main ideas behind LinkedIn is that the network is a virtual venue for people to share their thoughts, ideas, and observances with other like-minded users. Earlier this year the company introduced a new feature to their platform that allowed a select few users to create blog posts directly on LinkedIn. Now, the company has decided to open this up to all LinkedIn members.
In an effort to make sharing thoughts, ideas, expertise, etc. easier, LinkedIn has implemented the long-form post. This feature allows you to create longer content, such as blog articles and opinion pieces, and post this directly on LinkedIn. In other words, you can now use LinkedIn as a blog which is shared with your connections.
If you create long-form content, this could be a useful way to get posts out to an even wider audience than through your blog. This is because when you publish a post on LinkedIn, it becomes part of your overall profile, with the post being visible under the Posts section of your profile. New long-form posts will also be published and shared with all of your contacts automatically.
This means that you could technically increase the overall reach of your content, especially if the content you produce is useful to your LinkedIn connections.
If you do see the pencil icon, click on it to open the long-form post screen. It looks like most other Web-based publishing and writing platforms with the usual formatting buttons and text field where you input the content.
You can write your article directly on this page, but many choose to write using a program they are comfortable with and then copy and paste into the text field. If you want to add images to your post, you can simply click where you would like the image to slot into the content and select the camera icon from the menu bar above the text field. Select the image and hit Submit. You can then resize the image by clicking and dragging on it.
While in Preview mode, be sure to check the spelling and grammar, along with the overall formatting. If you spot anything that needs to be changed simply switch back to the editing tab on your browser and make any amendments.
When you have finished writing, formatting, and editing you can then hit the Publish button. This will then publish the content on your profile and share it with your connections.
If you have content that you think your connections and colleagues would benefit from reading, then this new LinkedIn feature could prove to be useful and should be considered as a larger part of your overall content strategy.
Looking to learn more about LinkedIn and how you can leverage it in your business? Contact us today to see how we can help.
When it comes to modern communication, many businesses look to network based strategies that allow calls to be placed over a network connection instead of via traditional methods. If you do some quick research into different solutions you will quickly come to the conclusion that there are two real leaders: VoIP and Unified Communications. While at first glance these may seem similar, they are in fact different.
VoIP is common these days because many businesses have high bandwidth Internet connections that can support it, and many solutions offer considerable cost savings compared to traditional phone lines.
Many UC solutions include:
One of the best examples of UC in use is the idea of a customer calling to ask a question about one of your products. They unfortunately call after business hours and decide to leave a voicemail message. After they hang up, software that powers the phone system translates the message into digital form and emails it to your marketing team. Your marketing manager receives the message, in email form, on their mobile device and is then able to call the client back.
This scenario likely happens using three different systems - voicemail, email, and VoIP - and three different programs. The thing is, these programs are all 'unified', so they work as one unit.
That being said, many VoIP solutions offer some form of UC features like voicemail, instant messaging, and video calls.
One of the biggest downsides of a UC solution is that it can require a fairly large investment; certainly larger than VoIP. If your business is operating on narrow margins you probably won't be able to implement a full UC solution all at once, instead having to implement it in steps.
Our best recommendation is that before you consider either, give us a call to learn more our solutions and how we can help your business get the right type of communication that will work for your business and budget.
When it comes to the technology in your business, it can often be a challenge to keep it running smoothly and working effectively. Frankly, many small business owners simply can't keep up and their business can suffer as a result. To avoid this, one of the smartest things you can do is outsource your IT to a Managed Service Provider (MSP).
Because many of these IT partners are focused on technology services, they can often provide technology services equal to, or better than, hiring an in-house IT team. Beyond that, most IT partners offer services at a fixed monthly rate, thus allowing your business to effectively budget for IT expenditures.
IT partners know technology and take the time to get to know your business needs and goals. From there, they can help pick and implement the best solutions that will support your current demands and provide the necessary IT platform on which you can stably expand your business.
By outsourcing your IT, you and your employees can focus on core business functions, without having to worry about pressing technology issues and staying up-to-date with tech developments. This results in an overall increase in productivity.
Many IT partners don't just install and manage systems, they also take the time to ensure that employees are comfortable with them and understand how to use them. This increases overall tech buy-in and can in turn reduce wasted investments, saving you money in the long run.
IT partners offer their services to many different companies and therefore need to ensure that they are using the latest technology. Because most of these services are offered over the Web, they can pass along the features and updates to your business without you having to invest in new technology.
Beyond this, many MSPs offer full-service solutions that include picking the best technology for your business. They can install systems based on your budget and also manage them, ensuring that systems remain up-to-date and fully support your business needs.
IT partners also operate in these industries and are compliant. This means that they can often ensure that your business and systems are also meeting regulations.
If you are looking for an IT partner who can help your business get the most out of your technology, contact us today to learn more about our managed services.
One of the most important tasks a business can do is to back up its data. It's really a matter of when you will lose important data, not if, and if it's not backed up there is a good chance it will be gone forever. In an effort to avoid this, it is worth taking your data backup seriously. To help, we have come up with a list of eight data backup tips.
Because of these differences, it can be difficult to back up and recover files properly. We recommend that you pick a naming and file system that every file and folder will follow across all systems. This means backups will be quicker, you will be able to see what is new, and you will spend less time organizing files.
Beyond this, an efficient naming and organization structure goes a long way toward making it easier to find files and recover them should your systems go down.
The same can be said for non-work related files. While these may be important to your personal life, they likely aren't to the business so should not be backed up onto your business backups.
Look at each file and folder and see if it has something to do with business decisions, or is in anyway tied to your business. If it is then it is probably a good idea to keep it.
Stay tuned for the next four tips coming soon. If you would like to learn more about data backups in the mean time however, please contact us today.
Facebook has come a long way since its launch as a social network for college students. One of the biggest steps forward for the platform was the introduction of apps. These apps have been at the core of the company's massive growth, but they do pose a bit of a security concern, especially since many of them request access to your profile and contact information. In an effort to curb this, Facebook has introduced two new login features.
Most people who want to try an app usually would rather not have to share their profile information for privacy reasons. In an effort to increase account privacy, Facebook has announced the anonymous login feature. This will let you log into different apps using your Facebook username and password without sharing your personal information.
For example, if you want to use your Facebook account to access Flipboard you can login anonymously and link your account to Flipboard, but your personal information like name, email address, contact number, etc. will not be shared. This feature will also make it so the app cannot post on your News Feed. In other words, say goodbye to those annoying game invites!
This feature has been released on Facebook's side, but the company is still working with app developers to get the feature integrated into their apps. Over the next year or so we should see more and more apps integrate this great privacy feature.
This information can include your username, email, friend list, birthday, Likes, etc. It also often includes another option to allow the app to post to Facebook on your behalf. While app developers certainly have the right to ask for this information, some users feel that apps often ask for too much private information. So, in an effort to tighten up privacy, the company has updated their Facebook app login. Now, when you go to log into an app using your Facebook account you can select what information is shared.
Click Log in with Facebook on many apps and you should see the usual permission window open, only now you should see a link that says 'Edit the info you provide'. Clicking this will bring up a list of permissions the app is requesting.
You will see check marks beside each line of permission. Many of these are actually optional, and you can now uncheck them to prevent that specific information from being shared. Also, by default, apps will no longer be able to post to Facebook on your behalf. You will need to approve this when you first connect to the app.
These two features are a great boost to account privacy. If you are looking to learn more about using them effectively contact us today to see how we can help.