Technology advice, practical solutions and real results.

Tuesday, August 31, 2010

How Do You Calculate the Cost of Inconvenience?

When you’re running a business and have multiple competing (and urgent) priorities, you might not even think about how much money you’re wasting on insignificant computer problems. We’re not talking about major server crashes or seeing your whole office go down in flames – we’re talking about little problems like spam.

Remember, time is money.

The higher the salary of the person who’s losing the time, the more money you’re losing. And the more time a high-dollar person spends on minor computer annoyances, the less time they’re spending on adding value to the business.

That’s one of the biggest problems associated with small-business executives wasting even 10 minutes trying to reinstall a mouse driver or retrieve a deleted file. Those are 10 minutes they might have spent following up with a sales prospect or uncovering a major miscalculation in next year’s budget.

Read about our simple formula for determining the true cost of lost time by clicking here:

CMIT Solutions Home Office Blog.

Friday, August 27, 2010

Malware Spread Through USB Devices

25% of all new worms are designed to spread through the portable storage devices.
A security company reports that a USB drive was used to compromise U.S. military networks in 2008.



While a quarter of all 2010's worms rely on USB devices to spread to other PCs, a recent Panda Security survey of more than 10,000 small- and medium-sized firms found that 27% of those victimized by a malware infection in the last year reported that the attack had originated with infected USB hardware, primarily flash drives.
Other devices that connect to PCs via USB, including smartphones, cameras and music players, also are a threat, added Corrons. "All these devices have memory cards or internal memories and therefore it is very easy for your cell phone, say, to be carrying a virus without your knowledge."

The USB infection vector isn't new. Two years ago, the 'Conficker worm' made headlines worldwide after it spread using flash drives, among other avenues.

Read this FULL article on Computerworld for more details.

Wednesday, August 25, 2010

Microsoft Release of IE 9 Public Beta

Microsoft is releasing Internet Explorer Version 9 public beta on September 15th. It is stated that there are new features such as quick-release tabs and a Chrome-like address-search bar. It is complete with a new "chrome" look overall.

A photo of the new IE9 interface leaked as shown here:


The new browser will run only on Vista and Windows 7, not the much more popular Windows

Microsoft declined to confirm the details leaked by its Russian press site or comment on its IE9 interface plans.

To read more about Microsoft's new release, click the link below.

computerworld.com

Reclaim Lost Hours by Making Outlook Sort Your Mail for You

Who wants to wade through a swamp of emails to find the stuff that’s really important to you? Instead of manually sorting all your email into folders, you can use rules in Outlook to do that sorting for you. Rules are triggered by an action – either the arrival of an incoming email or the sending of an outgoing one – and they can save you a lot of valuable time by automatically performing a specified task.

Let’s take a very simple and straightforward example. You’re subscribed to receive daily emails from an airline. These emails are occasionally useful, so you don’t want to drop off the subscription list, but you also don’t want them cluttering your inbox.
Solution: Create a rule that says whenever an email comes in from this particular sender, it goes into its own special folder. That way you can just check the folder whenever it’s convenient for you.


First, create a folder in your inbox called Airline Alerts.
Next, go to the Tools menu and click Rules and Alerts. On the Email Rules tab, click New Rule.


That will bring you to the Rules Wizard, where you have a number of different options. You can use a templated rule, or you can write your own. In this case, we’ll use a templated one because it’s pretty straightforward. The rule we’re going to create will apply to a particular sender upon the arrival of the email. So first, we’ll select the first option: “Move messages from someone to a folder.” Then click the Next button.

The process that follows will ask you a few questions about what conditions the rules should apply under, what action you want the rules to follow, and if there are any exceptions to the rule.
In the next screen, click the first box, which says “from people or distribution list.” This tells Outlook to only apply the rule to messages that arrive from specific people or a distribution list. In the window at the bottom, you’ll see the rule written out in sentence form, with highlighted text indicating where you need to supply a few details. Click on the highlighted text (“people or distribution list” and “specified”) to add your specifications. Here, we’ll use
info@AnywhereAirlines.com and the Airline Alerts folder.

The next screen you see will ask you what you want to do with the messages. We just want them to move to the Airline Alerts folder – we don’t want them forwarded, deleted, copied, or anything else – so we’ll click the top box. Then click Next.

You’re now looking at a screen that’s asking you if there are any exceptions to your rule. Are there any conditions under which you wouldn’t want an email from info@AnywhereAirlines.com to go straight into the Airline Alerts folder?

Let’s say you definitely want that email delivered directly to your inbox if the airline has cheap fares to Acapulco, Phoenix, or Reykjavik. Click “except if the subject or body contains specific words,” then go down to the window at the bottom and click that highlighted text. In the next screen, type in those three city names. They’ll automatically appear in the Search List. When you’re done, click OK

Your Rule Description now includes the exceptions you just entered.

In the next screen, you’ll be asked to give the rule a name. It’s best to go with something descriptive that will remind you about what the rule involves.

Click Finish, Apply, and OK. You’re done!

For a more detailed description of this process that includes images to walk you through it, click here: CMIT Solutions Home Office Blog.

Wednesday, August 18, 2010

"One Note": The Best Project Management and Note Taking Tool

OneNote users give the software rave reviews -- so why aren't more people jumping on board? For starters, many people don’t even know it’s installed on their computers. It comes with Microsoft Office 2007 Home and Student Edition, Microsoft Office 2007 Ultimate edition, Microsoft Office 2010, and is available as an add-on to previous versions.

Second, OneNote carved out an early following among tablet PC users and maintains a bit of its niche reputation, even though it’s well suited to laptop or desktop use. (Its handwriting recognition features make it a natural fit for the tablet PC and for anybody who relies heavily on handwritten notes -- such as students, mathematicians, and engineers.)

OneNote basically takes a number of different input types -- typed text, handwritten text, images, and more -- and collects them all in a single easy-to-navigate interface. It's basically set up like a notebook, with tabs to separate sections, and a second tier to define pages within each of those sections.

Read more by clicking here: One Note Support Page

Tuesday, August 10, 2010

How You Can Use The Web To Become A Better Leader

When was the last time you spent even 60 minutes on your own professional development? If you can’t remember, you’re not alone. One of the biggest challenges business owners and managers face is they get so busy in their day-to-day operation that they neglect their most important asset, themselves. Forbes.com leadership expert Lisa Earle McLeod says, “ You’re the biggest asset your business has. If you’re not developing your own skills, it’s like not maintaining your equipment or your customer base. Eventually your business will suffer.” But who has time to read a book or attend a seminar when you’ve got a business to run?

That’s where the web comes in. Online learning is exploding, and webinars are one of the most effective ways you can develop your skills without investing a lot of time or money. McLeod, who runs a sales and leadership training firm, says, “Personal development doesn’t have to be boring, expensive or time-consuming. We do a lot of webinars for our clients because it enables us to take a single topic, like selling skills, employee engagement or organization skills, and provide people with quick, easy to use advice and tools, no travel required.”

CMIT has partnered with McLeod to create a webinar series titled “Grow Your Small Business Without Giving Up Your Life.” As a CMIT QuickTip subscriber, you’re invited to attend for free. (registration info below)

Here are McLeod’s 10 Tips for getting the most out of any webinar:

1. Be Choosy - Your time is valuable. Look for webinars that provide true skill development rather than just an overview of something. Think about what would have the biggest impact on your life or business.

2. Consider the Source - Look at who’s offering the webinar and who’s leading it. There are tons of webinars out there and many of them are just sales pitches in disguise. Make sure the webinar is sponsored by a trusted source and is being delivered by an expert in the field.

3. Expect Takeaways - A good webinar should provide you with a downloadable tool you can use right away and that you can share with your employees and colleagues.

4. Block Out Time – Treat the webinar as you would a client meeting or any other important appointment. If you’re serious about your development, you'll schedule time for it.

5. Turn Off Email – Multi-tasking is a myth. If you’re going to attend, make sure you’re fully focused.

6. Log On Early – Many webinar providers, including CMIT's provider Go To Meeting, do a system check and take a minute to load, especially the first time. Log in a few minutes early to make sure you’re ready before the official start time.

7. Choose Your Audio – Webinars usually give you the option of dialing in via phone, or listening via your computer. Make your choice when you log in. If you want to be able to ask questions and your computer doesn't have a microphone, choose the phone option. If you choose listening from your computer, make sure your speakers and mic are on.

8. Participate - If the webinar gives you an option; by all means participate. It will make the call more meaningful for you and everyone else. In many cases, if you ask a question you’ll get expert advice from someone you might not otherwise have access to.

9. Share Recordings – Most webinars provide a link to a recording of the call after the fact. If you learned something, share it with your colleagues and employees.

10. Apply and Enjoy – The ideal webinar is entertaining AND informative. So take a breath before you start, grab pen and paper to record useful info, settle into your chair, and show up with a learner attitude. This is about improving your business and your life, it should be fun and interesting.

Read the Full Article also on:
CMIT Solutions Home Office Blog.

Friday, August 6, 2010

Secure Search Gives You Extra Privacy on Google

Google recently began offering another layer of privacy when you search. Searches conducted from https://encrypted.google.com/ will travel over a secure connection between the user’s computer and Google servers. So why would you want to do this, and what does it mean for you?
First, the “why.” The most common reason for wanting to do an encrypted search is the same reason you’d want any Internet transmission to be encrypted: it inhibits snooping by third parties.

But there are other reasons, as well. In an unencrypted Google search, the search term is saved in your search history and will autopopulate the next time you type in the beginning letters of the phrase. With encrypted search, those terms aren’t stored locally so they won’t pop up.
As PCWorld’s Tony Bradley points out business confidentiality can be seriously threatened by unencrypted search. Read by clicking here: http://www.pcworld.com/businesscenter/article/196949/benefits_of_google_encrypted_search.html

[Unencrypted] searches may yield hints regarding ongoing research and development, confidential intellectual property, upcoming product or service announcements, or other sensitive information that is not intended for unauthorized consumption. Google encrypted search does not store that information, so there is no risk of someone stumbling onto it later.
Bottom line: if you’re doing confidential research on the Web, you should definitely consider doing it over an encrypted connection.

Read more on the CMIT Solutions Home Office Blog.

Monday, August 2, 2010

Business Owners Take Precautions Against Power Outages

More and more businesses rely on their electronic cash registers, alarm systems, computers on a daily basis. When faced with a power outage, or summer thunderstorms, it is a threat to your business.

Rich Grebinger, vice president and co-owner of National Tax Consultrants Inc., was featured in an article found in the Wall Street Journal discussing how his business was saved during a power outage. He credited us, CMIT Solutions of South Nassau, in this article for protecting his accounting business from shutting down during a storm that knocked out power for 5 days in Merrick, NY. Normally, this power outage would bring his business to a screeching halt. The firm's computer remained intact and employees were able to be moved to an area in the building that wasn't affected by the storm. Mr. Grebinger estimates that the protective software saved the firm "tens of thousands of dollars" in potential damages from lost data and productivity. He stated, "it would've been a nightmare."
Here at CMIT we protect our clients by installing protective software on each unit in order to prevent data from getting destroyed. Backing up the systems data is also another process that we stress with high importance as part of a disaster recovery plan. We believe in keeping people's businesses running smoothly and efficiently even in times of unexpected disaster.
Read the full article by clicking the link below: