Author: seth

  • Online shopping? Watch out for these red flags

    Online shopping? Watch out for these red flags

    Who doesn’t like online shopping? Online shopping has opened up a whole new world to us. Get whatever you want, whenever you want, without wandering from store to store. It doesn’t matter if it is too hot to venture outside or if there’s a blizzard out there, you do your shopping from the comfort of your couch and the stuff at your doorstep. You get great deals, some are better than in-store specials. But, did you know cybercriminals love the concept of online shopping as much as you do. Cybercriminals are exploiting the growing popularity of online shopping to cheat unsuspecting buyers through techniques such as phishing, malware injection, etc. Here are a few tips that may work to keep you safe from being a target of cybercriminals as you shop online.

    How to determine if the ad or shopping site is genuine?
    As you browse the web, you will come across various ads targeted at your interests. Businesses engage in ‘Retargeting’ which means they use cookies to target you with very specific ads until you buy something. For example, look at a wallet and, you will see ads for wallets on various other sites you browse even if they are not shopping sites. Are those ads genuine? Before clicking on any ad you see online and making a purchase, be sure to verify if the ad is genuine. The same goes for shopping sites. Before you shop, you need to ensure the site is genuine, especially since you will be sharing your credit card details or Personally Identifiable Information (PII) such as your address. Here are a few things to check before you make that online purchase.

    English: Keep an eye out for grammatical errors or spelling mistakes in the ad. Fake ads and sites may look a lot like the actual ones, but spelling mistakes or grammar errors may tell the true story. Scammers don’t have content writers to write great sales content!

    Check the URL: When at a shopping site, always check the URL in the address bar to ensure it is genuine. For example, if you see www.1amazon.com or www.amazon-usa.com, you should know it is not the same as www.amazon.com. Checking the URL also lets you detect website cloning and phishing. Website cloning is one of the most popular methods used by scammers to fleece consumers. As the term suggests, the cybercriminal first creates a ‘clone’ site that looks exactly like the original one, barring a very minor change in the URL.

    Don’t Get Phished!
    Phishing is when you receive a message, usually through an email or a text message asking you to take an action, such as clicking on a link, filling out a form, logging into an account, etc., Such messages look as though they are genuine. But, the form fill, account login, or link will take you to a spurious site where your information will be captured for bad use. Checking the URL will help you detect phishing frauds as well.

    Check before you download anything: Sometimes you may receive a link and asked to download a coupon or a gift card that entitles you to a sizable discount. It may be a fraud. In fact, it probably is.

    Download only from legitimate marketplaces: With so many shopping options it is tempting to download every new app that you come across. But, only download from authorized marketplaces like Google Play Store for Android or the App Store for iOs.

    At the end of the day, remember, there is no free lunch. If something seems too good to be true, it probably is.
  • The Sky’s the Limit for SMBs Taking to the Cloud

     
     
    The Sky’s the Limit for SMBs Taking to the Cloud
     
    There has been a lot of hype about cloud computing transforming the way small-to-medium sized businesses do business. Proponents of the cloud say that cloud computing has leveled the playing field, allowing SMBs to finally compete with bigger companies despite their limited financial resources and staffing.
     
    Still, many are apprehensive to make the jump. They’re hesitant to give up control and they fear the cloud will expose them to greater security risks. Moving to the cloud definitely requires a leap of faith, but a recent ComScore study, completed on behalf of Microsoft , suggests that those who are froggy enough to take the leap (sorry) have no regrets once they do.
     
    In fact, more than half of those surveyed wish they had adopted it earlier and feel that the benefits far outweigh their initial worries.
     
    What are those benefits?
     
    Enhanced Privacy and Security
     
    According to the study, 94 percent of companies who’ve adopted cloud services believe they’re now more secure than they were before, thanks to the cloud’s spam management and up-to-date systems and antivirus protection.
     
    Less Downtime and More Confidence
     
    61% of those surveyed reported fewer instances of downtime since their move to the cloud. Even those who still experienced downtime events felt that they were shorter in duration and that full recovery could be achieved much quicker.
     
    93% indicated that they were more confident in their ability to fully recover after an outage. Comparatively, 73% responded that they felt the integrity of their data in the cloud was stronger than previously, which is interesting since data integrity has often been the biggest worry about the cloud.
     
    Environmental Friendliness
     
    Any company striving to be more “green” will appreciate the environmental benefits of moving to the cloud.  A  recent six-month study conducted by the Berkeley Lab  found that moving 86 million U.S. office workers to the cloud resulted in the use of 87% less energy, leaving enough leftover electricity annually to power a city the size of Los Angeles for twelve months.
     
    Cost Effectiveness
     
    Cost effectiveness and greater ROI (return on investment) are the most important factors in getting CEOs and major decision makers to support shifting to the cloud.  A  Rackspace commissioned study conducted by Vanson Bourne , found that 62% of respondents felt that adopting cloud computing strategies freed up money that could be reinvested in other operations like marketing, customer service, product development, and expansion into new markets.
     
    Conclusion
     
    While there is a competitive advantage that can be realized by moving to the cloud, those who are still apprehensive should migrate to the cloud at a pace they’re comfortable with. Once they implement cloud monitoring, and understand it a bit more, most SMBs grow more comfortable with the cloud and expand their use of it.
     
    Contact us at  Slappey Communications
  • Blog – Slappey Communications acquires On Technology in Taylor, Texas

    Slappey Communications Acquires ON Technology in Taylor, Texas

    We are so excited to announce the acquisition of the successful telecommunications company, ON Technology, in Taylor, Texas – making this the third acquisition Slappey has made over the past year. Acquiring ON Technology allows us to continue our growth further across the South than just our local market.

    “We are so excited to add ON Technology to our Slappey family. The added knowledge and expertise from ON Technology along with their tools and services will enable us to enhance our customer experience and support across the Southeast,” said CEO of Slappey, Will Slappey.

    Slappey is based in Birmingham, AL and has served the local market for the past 37 years. Now, alongside three new companies, and growing, we are able to provide more in-depth and experienced personnel, diverse tools and solutions, and better service and afterhours support to all customers. Slappey plans to continue to grow as the leading provider of technology and telecommunications to small-large businesses.

    Customers will continue to be served by their local technology company, Slappey, RevTel, Presidium, On Technology, staff whom they know and trust.

    Founded in 2005, ON Technology is a quality IT provider with a full scope of proactive Managed Services, going one step further than just fixing an issue, but also finding and fixing the cause and avoiding costly reoccurrences. ON Technology has the expertise to service any industry from healthcare to automotive, city government to food services, agriculture and industrial to real estate and recreation. In a nutshell, if there are IT needs, ON Technology has a solution to meet those needs. All services, management and operation are centralized in Taylor, Texas, a suburb of Austin.

    Check out their website below to learn more about who they are.
    http://www.on-technology.com/

  • Be Proactive: How to Avoid Potential Network Failures

     
     
    Be Proactive: How to Avoid Potential Network Failures
     
    For small- to medium-sized businesses (SMBs), an IT network failure can be devastating because they don’t have the resources of large corporations to bounce back from such disasters. Preparation against such devastation may be the only course for them to avoid failure and survive with the least damage if failure occurs. SMBs must be proactive in recognizing the eventuality of a cyberattack or human error that can cause data loss and disrupt business continuity. This is what needs to be done to help prevent a potential failure.
     
    Be prepared:  Being proactive is an essential step for preparation against a disaster. There are two ways to determine how to best prepare to prevent potential failure of your infrastructure. First, you need to identify the weaknesses throughout your systems, and second, determine how you are going to eliminate those weaknesses and protect your network.
     
    Identify the weaknesses:  Determine how and why your system could fail. Examine all aspects of your hardware and software. Assess all the internal and external factors that could contribute to failure of your networks. Here are some questions you need to know the answers to.
    • Does customer access and/or employee productivity often stall because of downed systems? In these situations, how quickly is your IT support able to minimize the damage?
    • Can you say with certainty that your business will be back online and be able to access lost data with minimal disruption in case of failure?
    • Your critical data should be backed up frequently. The data on personal laptops, iPads and other mobile devices should also be backed up. Are all these steps being taken, and how often?
    • Are all backups stored in a location off-site and are they quickly accessible in the event of corruption, fire or flood?
    • Are you using any custom-made software? Can it be reinstalled and updated when needed?
    • Are your systems truly protected from hackers and viruses? Do you change passwords when employees leave the company?
    • How often do you test your backup processes?
    The answers to all these questions should give you a clear picture of your network’s ability to survive in case of a catastrophe.
    Here are five steps that you can take to protect your networks
    1. Backup files every day: There are a large number of businesses that never backup data. Only 23% of SMBs are backing up their data daily, and only 50% are doing it weekly. A number of issues can result in loss of data. You should backup data every day.
    2. Check backup procedures regularly: Don’t find out accidentally that your backup system is not working properly. By then it could be too late. It may seem like your data is being backed up normally, but check frequently if it is backing up the way it should be. In this age of BYOD make sure all employees are also following procedures to backup data on their laptops, iPads, etc.
    3. Make sure virus protection and firewalls are always enabled: Many companies either don’t have virus protection installed or it is disabled. That renders their networks vulnerable to virus attacks from emails, spam and data downloads. Corrupted files will not only bring your systems down, but they can spread to your customers and email contacts. That will spell disaster for your reputation. Hackers are always looking for unprotected and open ports online that they can attack with malicious code or files. That can cause permanent data loss.
    4. Monitor server drives: Dangerously full server drives can cause many problems, ranging from program crashes to sluggish email delivery. Servers should be monitored and maintained regularly to avoid these problems.
    5. Check built-in logs: Frequent reviews of built-in logs can reveal small issues. You will have a chance to prevent them from becoming bigger, harder-to- manage problems that can bring your systems down.
    Summary: We now know IT system failures have very serious consequences for SMBs. We also know that they can avoid such failures by being proactive. Many SMBs are now turning to cloud-based services and virtualized backup solutions to mitigate downtimes and network failures. Virtualization and cloud computing have enabled cost-efficient business continuity by allowing entire servers to be grouped into one software bundle or virtual server – this includes all data, operating systems, applications, and patches. This simplifies the backup process and allows for quick data restoration when needed.

  • UPGRADING YOUR BUSINESS PHONE SYSTEM: WHAT ARE YOU AFRAID OF?


    Making a major upgrade to your phone technology for business purposes can seem like a high-risk endeavor. Many business owners are hesitant to make the jump because of the perceived costs of the investment and a fear of the unknown when it comes to learning new technology. Fortunately, today’s phone systems are versatile and efficient enough to save you both time and energy once they are in place, so you can put your fears to rest.

    NEW PHONES COST TOO MUCH

    If you are just beginning to shop for new phone technology for business, you may be looking solely at the price of buying brand-new equipment up front. However, if you take a step back and look at your current system, you may be surprised to see how much it is already costing you. Over the last three years, how much have you spent annually on phone lines/internet, service, maintenance, repairs and random replacement parts to keep things running? Now look at what a new phone system will cost you annually and consider how much additional work you will be able to get done with the added functionality of a modern system. In many cases, new phone systems will actually save you money each month by reducing the cost of other expenses.

    NEW TECHNOLOGY IS TOO COMPLICATED

    Sure, there are plenty of new terms in use to describe today’s phone technology, but really the fundamental pieces of the phone have remained the same. If you are attached to your current desktop phone sets, or if you like the layout of your phone system as it is, there may be ways to improve your efficiency behind the scenes. Upgrading your software or moving to a cloud-based system may be possible while still maintaining the same physical equipment that your employees have always used. This is also a great way to save money on your upgrade by reusing equipment that’s already in place. Just make sure you ask your phone technology specialist to ensure that the equipment will be compatible with your upgrade.

    I DON’T WANT CUSTOMERS TO BE CONFUSED

    Some companies fear that updating their equipment will mean that phone numbers and extensions have to change. Fortunately, today’s technology is extremely flexible and will allow you to retain the phone numbers that are already in place, letting you move extensions over exactly as they were. This way, your new phone technology for business will maintain continuity of service for your customers and you won’t miss a beat.

    If you’re still on the fence about whether or not a phone technology upgrade is a good idea, the best thing you can do is sit down and run the hard numbers to see what you’re spending today and what you could be spending in the future. In addition, planning ahead for an upgrade gives you far more control over what devices and technology you choose, rather than waiting until there’s an emergency and you need to implement a whole new system overnight. With the help of an expert, you will find that new phone technology for business will help you overcome your fears.

  • Are your data security measures strong enough?

    Are your data security measures strong enough?

    Let me start this blog by asking you a question. How did your business respond to the security threats brought on by the COVID-19 pandemic? The reason we are discussing this is because a recent survey conducted by Password Keeper and Ponemon Institute revealed that during the 2020 Coronavirus pandemic, the effectiveness of organizations’ IT posture in terms of cybersecurity dipped by almost 30%.

    One of the main reasons for the compromise in IT security was the hurried transition of so many businesses to the remote work model. Working from home often meant the staff were using their personal computers to access work data, sometimes, even on shared WiFi networks without the latest software updates, security patches and firewalls–all invitations to cybercriminals. But, the research also pointed out that almost 50% of the respondents were also concerned about the physical safety of their data. When employees work from home, business data is stored on their personal devices. This includes personal laptops, desktops, thumb drives, external hard disks and sometimes, even smartphones and tablets. Ensuring the data stored in such a manner is not lost, stolen or inadvertently made public is a huge challenge. The cloud can help resolve this challenge to some extent. By migrating your data to the cloud you get a range of benefits such as
    • It is easily accessible-from anywhere, anytime using an internet enabled tablet, computer or even a smartphone
    • The cloud service provider offers multiple layers of security to keep your data safe from prying eyes
    • There is no chance of losing data due to misplaced thumb drives or computer hard disk crashes
    An MSP offering cloud services will be able to assist you in making the transition from physical data storage to the cloud smoothly. They can also address cybersecurity concerns and offer solutions. However, migrating to the cloud alone is not the solution to all data security issues. You will still need to train your staff on how to identify and avoid malware attacks, phishing scams and to practice basic password hygiene and data security best practices.
  • Are Managed IT Services Right For You? A Few Things to Consider

     
     
    Are Managed IT Services Right For You? A Few Things to Consider
     
    How do you get a small business to recognize the value of manages IT services? In the start-up environment, we encounter an eclectic bunch of personality types. There is a reason people become entrepreneurs or C-level execs. When we meet the owners or decision makers at smaller companies and organizations, we can tell right away why they’re where they are. They’re visionaries. They’re risk takers. They’re competitive. They want to be in charge.
     
    Therefore, they aren’t always quick to place the fate of their business technology in the hands of a third party. They’ve come as far as they have by being in control and they’re hesitant to give up that control. But we’ve learned a few things along the way.
     
    For example, the Type A personality is highly independent but also very competitive. So we tap into the competitive advantage that managed IT services gives them.
     
    The Type B personality is creative and doesn’t like static routines. But their ears perk up when they hear terminology like “cutting-edge” and we can then paint the big picture for them once their listening.
     
    But anyone we do business with has to be committed to the efficiency, security, and stability of their business technology to see our value proposition. And they have to recognize that managing their IT infrastructure is an investment they cannot take lightly.
     
    So here are a few things we commonly have to address before any deal for managed IT services is signed.
     
    Is my business large enough to even consider managed services?
     
    The truth is, any company, regardless of its size or the number of people they employ, will run more efficiently if its technology is monitored, maintained, and managed properly.
     
    These are facets of your operations that drive profitability and give our Type A personalities that competitive edge they crave. And they can rest easy whenever business is booming because their technology is built to sustain their growth. That’s the big picture that our Type B personality can appreciate.
     
    How is making another IT investment a cost-savings move for my business?
     
    There are still many SMBs who feel a greater focus and investment should go towards their core operations or marketing and sales. They only worry about technology when it breaks, figuring they’ll just call a service technician to come to the office and fix whatever the problem is. Or buy some new hardware at Office Depot.
     
    There are some very obvious flaws to this strategy.
    • You’re paying way too much when it’s way too late – An issue that was likely preventable with early detection has escalated into a full blown business disruption and that on-call technician likely charges a high hourly rate, on top of hardware replacement costs, and may not get to your site right away. Being proactive rather than reactive to technology issues is important.
    • Don’t forget productivity killers – It’s taking your employees too long to boot their computers. Servers and applications are running slowly. Employee devices are full of Malware. Non-technical employees are running around troubleshooting tech problems. If you see this, your present approach to IT management is killing employee productivity and your bottom line.
    • What happens internally is noticed externally – Don’t think for a second that customers or clients don’t notice outdated or slow internal technology and mismanagement. If your site or applications are down often, run slowly, or your customer service rep tells them “I’m sorry, our system is down”, they’re noticing and it’s hurting your business.
    When all is said and done, professionally managed IT services will give you a competitive edge, guarantee your business is always leveraging the newest most cutting-edge technology, and enhance your relationships with customers and clients – all while reducing costs.
     
    Contact us at Slappey Communications

  • 3 things your Managed Services Provider (MSP) wants you know

    3 things your Managed Services Provider (MSP) wants you know

    Are you considering bringing a MSP on board? Or perhaps you already have one. Either way, for you to truly benefit from your relationship with a MSP, you need to build a solid bond with them. As a MSP who has been in this business for long, I can tell you the 3 important steps that will help you get there.

    Share, share, share

    Your MSP is your IT doctor. Just as you would share everything about your health with your doctor, you need to share everything related to your business that impacts your IT, with your MSP. Give us an overview of your business and answer questions such as

    • What you do exactly as a business
    • Who are your key clients
    • Which industry verticals do you serve
    • What are your peak and lull seasons, if you have them
    • What are the core regulatory codes that apply to you based on the industries you work for
    • What are your business expansion plans for the near future and in the long run
    Sometimes clients shy away from discussing all these things because they don’t trust the MSP enough. There is a fear of the MSP sharing business plans and other confidential information with their competitors. As a MSP, I can tell you that we work best with clients who trust us. When you are trusting us with the lifeblood of your business–your IT infrastructure, you should be able to trust us with your plans for your business.

    Let’s talk often

    While it’s great that you outsource your IT completely to us, it is still important that we meet and talk. Your business needs may change over time and we don’t want to be caught off-guard. We know you are busy, but set some time aside every month or even every quarter to catch up with us and discuss your IT challenges and needs.

    Take us seriously

    Your IT is our business, and we take our business very seriously. So, when we tell you something, such as–to implement strong password policies, limit data access, upgrade antivirus, etc., please take notice!

    Teamwork forms the core of any successful relationship. Same holds true for your relationship with your MSP. Trust us, pay attention to us and hear us out. We’d love that…and we’d love to work with you!
  • BUSINESS TELECOMMUNICATION: CHALLENGES ALABAMA BUSINESSES FACE


    For Alabama businesses, the decision to upgrade communications systems can be colored by a number of challenges. Like anywhere else, quality and accessibility of services can vary greatly between large cities and rural areas. In addition, special consideration must be given to user friendliness and implementation processes. Here are a few of the most common challenges that Alabama business owners face when it comes to business telecommunication decisions.

    Accessibility of Service

    Probably the biggest challenge faced by companies throughout Alabama is the difference in the types of services available by location and the price of those services. Many of us take for granted the idea that high-speed Internet is available in the city while fewer options are available in rural areas. However, many areas in the city are only serviced by a single Internet or phone service provider, which means you may be paying more for that service than you would in a more competitive neighborhood, and you may not be able to get the type of service you want. For instance, large portions of major cities still lack support for fiber optics, and may only have one broadband provider available.

    Quality of Service

    The next challenge for business telecommunication in Alabama is the quality of service you are getting from your telecom company. Much of Alabama still operates on a strict Monday through Friday 9-5 schedule and has yet to catch up to the 24/7 business model that the Internet has brought us. As a result, if you are having phone troubles after hours, you need to know how much it will cost you to get a service tech out to fix the problem and how long it will take. In some cases you can expect to wait several days before they can get to you. Before you sign a contract with a telecom provider, make sure you ask about their service policy and weigh your risks appropriately.

    Cultural Difficulties

    Alabama is one place in the country that is home to an aging working population, who may or may not have kept up with the major changes in technology of the last few years. If your company employs a wide range of employees from across different demographics, you will need to mix and match business telecommunications products with the employees who will use them most effectively. Your older employees may prefer email-based solutions and simple phones while your younger and more tech savvy employees can make good use of chat-based systems and other advanced options. If you are shifting to more advanced technologies for all employees, you need to know whether or not your telecom provider offers training and support to get everyone on the same page before the new system goes live.

    Companies throughout Alabama have already had success upgrading their business telecommunication systems in a wide variety of industries. However, you must take great care to make sure that you are getting the best service available for your money. Even if you face hurdles with the type and price of service available in your area, there are options available that can save you money and improve reliability. You will also need to plan your business communications investment to meet the technical needs and expectations of your team members to avoid confusion during implementation.


  • Business Trade Shows Part II: During the Event



    We’re back. In the last post, we talked about building momentum toward a trade show exhibition. Today, let’s look at your efforts during the show itself.

    You already should have sent out a reminder the morning of the show in posts on all your social media accounts, an article on your website blog, and a general email that you’re exhibiting. Now it is time to work the booth.

    First, recognize that your goal is to use this show to develop as large a list of prospects as possible. That means you not only want visitors at the booth, you need their contact information. The proven way to get attendees contact information is to offer them something for free, or run a contest for something worthwhile. Most booths will offer some give way, coffee mug, etc. at the booth if visitors sign a contact info sheet. People can’t resist free stuff, no matter how much they don’t need another mug or could afford to buy them on their own by the caseload. Therefore, have give a ways.

    You can also run a contest for those willing to take the time for a demo of your product or service. If they will take the extra step, enter them for a raffle for something of greater value, such as an iPad or tablet.

    If anyone shows special interest, keep your non-exhibit hours open to schedule meetings for coffee or a demo.

    Beyond getting prospects, use the show for broader networking. Work the other booths and introduce yourself to other exhibitors to get your name known. You can never do enough networking, and you never know when it might pay off. If the exhibitor entrance fee does not include entrance to other networking events such as meals and meet-and-greet-happy-hours, consider buying a ticket for access. These offer additional opportunities to network.

    Finally, don’t forget social media. Throughout the show, post pics of yourself with clients or prospects who visited your booth. You can even use the event hashtag if they have one to help your business generate buzz!

    Next time, let’s talk about what to do once you get back home.