(Something You’ll RUSH To Do Once You Read This Survey That Reveals Just How Dirty Your Keyboard Is!) Since there’s a holiday or month for just about every cause imaginable, it should come as no surprise that cleaning your PC now has its own official month, awarded by none other than “The Vinegar Institute.” But before you dismiss this one, consider this little factoid: ABC news reported that a study in England revealed that the average office keyboard had bacteria and germ levels up to five times higher than those commonly found on a toilet seat. The study, headed up by Dr. James Francis, a British microbiologist, took culture samples from 33 office keyboards in London, and compared these samples to swabs taken from toilet seats in the same office buildings, containing nasty germs such as e-coli and staph bacteria. Kinda gives new meaning to the term, “computer virus!” So how do you not only disinfect your keyboard but also get those annoying smudges and fingerprints off your monitor? Here are a few tips: Turn off the monitor. It’s not required, but it makes smudges and smears easier to see. Use a compressed air to get rid of light dust buildup in your keyboard and screen. Never use a dish rag or paper towel to clean your monitor since they can scratch the screen; and you never want to use water on your keyboard! Don’t use products with ethyl alcohol or ammonia based products to clean your monitor. Products like Windex can yellow flat-screen or laptop monitors. Instead, use a cleaning product designed for monitors and use a lint-free cloth designed for the job. Note: Each monitor manufacturer has its own special instructions for cleaning so make sure you read what those are before attempting to clean up anything. Lightly moisten your cloth with rubbing alcohol or cleaning solution to wipe off your mouse or keyboard areas. Never apply the liquid directly to the screen, keyboard or other electronic parts. A Q-tip dipped in alcohol will quickly clean your keyboard. Just make sure you don’t drip the liquid down between the keys. Free Gift: Refer a potential new client to us during the month of January and get a FREE computer cleaning kit!
January Is National Clean Up Your Computer Month
How To Stop Employees From Indulging In Excessive Personal Cell Phone Use At Work
Thanks to smart phone technology, it seems like everyone is “plugged in” to 24/7 web access, texting, and e-mail; not to mention phone conversations. In some cases, people have become so addicted to their phones that they’re texting constantly, even while driving, having dinner with their families or using the bathroom! Clearly these devices can become a major distraction at work, causing major problems with productivity, especially if you want your staff to be focused on getting critical projects completed accurately and on time. But mandating a “no cell phone” policy may be too harsh. So where’s the balance? Here are a few tips: Implement a personal cell phone usage policy in writing. Taking a personal call from the daycare about a sick child may be acceptable, but spending 3 hours plus organizing a wedding is not. This should include certain etiquette rules, such as turning the ringer off during meetings or speaking softly to avoid disrupting others. If possible, get your employees involved in creating the policy; explain why you are doing it and that you want to make it fair and reasonable. Usually there are only a small percentage of employees who truly abuse the system, so you’ll find most employees will be on board with the policy and happy to provide input. Post this policy throughout the office as a reminder. Review this policy with each employee and have them sign it. Provide some flexibility for those in unusual circumstances, such as an employee with a sick child or with a recent death in the family. Enforce the policy so everyone knows you are serious about it. One of the best ways for management to do this is by walking around. Since personal cell phones are not connected to the company’s network, you really won’t know if anyone is violating the policy unless you physically walk around to check on them from time to time. Lead by example! Don’t expect your employees to stay off their cell phones if you are constantly texting and talking on yours. Attention: Your cell phone policy can be included in your AUP (acceptable usage policy) that directs how employees may or may not use company resources (Internet, e-mail, etc.). For more help in creating these policies, contact our office!
Shiny New Gadget Of The Month: HP ePrint
The new HP ePrint lets you print documents and images from virtually any PC or phone simply by e-mailing them to your printer. If you can send an e-mail, you can use ePrint. Here’s how it works: First, you assign an email address to your printer and connect it to the Internet through either a wireless or wired connection. To print something, simply send an email containing your document to your printer’s address – it’s that simple! You can print images, Microsoft Word documents, Excel spreadsheets, PowerPoint presentations, PDFs, and photos. You can view and manage print jobs sent to your printer using your printer Job History that is available on HP’s ePrintCenter. One downside is that some documents printed with ePrint may appear different from the original in style, formatting and text flow. For documents that need to be printed with a higher quality (such as legal documents), you might want to go the traditional way of printing directly from your PC. The HP ePrint service is available free of charge with your HP ePrint-enabled printer and doesn’t require any special software or smart phone apps to work.
“The Top 5 Worst High-Tech Habits To Break In 2011”
Admit it; you have some bad habits when it comes to maintaining the security and “health” of the high-tech tools you dearly depend on. Since it’s a fresh, new year, we thought it would be appropriate to point out the top 5 bad habits you should work on fixing in 2011. Not backing up your data. Funny how most people start their confession of not backing up their data with the words, “I know it’s bad, but…” If you know, then why are you still doing it? There’s absolutely no good reason to let this one continue. Call us and we’ll hook you up with a solid backup plan that will make sure you can be back up and running again FAST. Relying on tape drives to backup your data. This is almost as bad as bad habit #1. Why? Because tape drives have an average failure rate of 100% – and that’s not a typo. It’s not a matter of “if” but “when” is your tape drive going to fail. Trash ’em and get a better system in place! Using weak passwords. If you’ve ever used the word “password” as your password, we’re talking to you! A good password should contain a combination of numbers and upper and lower case letters. Not installing the latest security patches and software updates. Once a new patch is released by a software vendor, it acts like a green light for hackers who instantly implement viruses and scams to take advantage of those individuals who don’t regularly update (patch) their system. Printing and storing paper documents for everything. The cost of installing a document imaging (also called document management) solution has come down dramatically, and it is now easier than ever to implement. Plus you get the added benefits of saved storage space, saved time in searching for documents, instant access to any paper file via the Internet, fewer lost files, less chance of losing critical documents to fire, water, or wear and tear, AND a cost saving on paper and ink. With all these benefits, why on earth would you still stick to your Stone Age paper filing system? Want help in breaking any of these bad habits? Call today for a no-obligation, no-pressure consultation on how we can help you break these bad high-tech habits for good!
Need A Break? Tax Law Extends Single-year Equipment Deduction Through 2011
When you acquire equipment for your businesses, you can deduct the entire cost in a single year, thanks to a tax break that’s been extended through the end of 2011. In the past, business equipment such as computers and machinery had to be deducted over a number of years. Then a new tax code provision was enacted to help spur economic growth. That provision, called Section 179, allowed taxpayers to deduct the cost of equipment as an expense rather than requiring the cost of the property to be capitalized and depreciated. In other words, single-year deductions were permitted — much to the benefit of small and medium businesses. The Section 179 deduction started out at $25,000, increased to $125,000 then $250,000, and finally ended up at $500,000. And many assets qualify for the tax break, including computers, software, office machines and furniture, manufacturing equipment, and vehicles that weigh more than 6,000 pounds. How does it work? Lets’ say you have a $600,000 profit and don’t want to pay taxes on that entire amount. At the same time, you need new computer equipment. You can buy that new equipment for $500,000 and only owe taxes on $100,000 of your profits. Section 179 was set to expire at the end of 2010, but it’s now been extended. The Tax Relief Act of 2010, signed on 12/17/10, allows business owners to take Section 179 deductions through the 2011 tax year. That means 2011 is a great year to consider purchasing equipment, because the immediate writeoff helps businesses such as yours keep more cash free for other purposes. “There is a big advantage to having that cash flow right away,” says Abe Schneier, a senior manager at the American Institute of Certified Public Accountants. “Even in the best of times, it is hard for many small businesses to borrow money for any sizeable investment.” Related articles: Equipment eligible for the Section 179 deduction
Use ReadyBoost to Speed Up Your Computer
ReadyBoost can speed up your computer by using storage space on most USB flash drives and flash memory cards. Read more.
Majority of Malware Attacks are Triggered by USB Enabled Drives
It looks like gone are the days when employees can safely transfer files using the ever reliable USB device. According to various reports, there is an increasing number of malware attacks targeting USB devices. Small businesses should be very wary of using USB drives, without considering security parameters to prevent these malware threats. A USB device is indeed a useful, economical way to transfer data. In fact, according to Gartner IT research and advisory company, there were roughly 222 million USB devices shipped in 2009. However, a recent study shows that though USB devices are a convenient means of transferring information, they can also serve as channels to transmit potential threats. In fact, 25% of malware these days is built to spread via USB devices. Most small businesses particularly are utilizing USB drives for the convenience they bring. But as consumers become more technically savvy about malicious attacks via email and other modes, cyber offenders are now shifting to USB devices to spread malware. Moreover, they want an easier and faster way of hacking into secured computers, making malware distribution via USB devices a viable option. Being a small to medium-sized business, your company might also be at risk for the following reasons: Outdated operating systems. Newer versions of operating systems like Windows Vista and Windows 7 definitely provide more security against malware-infected USB devices. If you’re still running on Windows XP, contact us immediately and we will update your operating system to avoid unwillingly sharing your confidential business information to servers across the globe. We will ensure that you have the latest version of Windows, Macintosh, or whatever OS your company uses. Insufficient security knowledge. Not all employees are familiar with malware attacks via USB devices. Some may even plug a misplaced flash drive into their work PC, hoping to find its rightful owner—without knowing that it contains a script that can search sales record and or contact list. As your IT service provider, we will help you implement security guidelines against unsafe USB use to prevent potential malware attacks that can ultimately harm your business operations. No other options to share information. Most small businesses solely rely on USB devices to share data with their employees. While it is convenient, using them on a daily basis can be unreliable and risky. Talk to us about cloud-based solutions and other better and more secure methods to share and store files. We believe that USB-spread malware is even more perilous than email and other means of transmitting malware. That’s why companies, no matter how big or small, should take this alarming issue seriously. Contact us soon and let us help you protect your business from any would-be malware attacks.
Business Benefits of Unfriending
The drive to be more intimate can benefit your business. If you have a tighter circle of customers, you will establish yourself as a channel for consumption. This will make your next sale easier compared to the first. November 17, 2010 was declared by Jimmy Kimmel during his television show as “National Unfriend Day”, the opportunity for all Facebook users to declutter their Facebook pages by “unfriending” people in their friends’ lists. He claims that Facebook has been “cheapening” the idea of friendship. To many the idea was hilarious, but others are seriously considering the wisdom of unfriending. Is Kimmel on to something here? Can unfriending benefit your online business? Research shows that as social media gets bigger, we’re getting smaller. Brian Wong, a network marketer says it simply: “With the growth of social networking, I am finding it increasingly difficult to separate business connections and personal connections.” He says that having almost 1,000 friends on Facebook has made it difficult for him to see the feeds and updates of his “real” friends and important business partners. Lately there is a growing trend of de-scaling on the internet. People have started “pruning” their social lives online. For example, the popular Farmville app lost 30 million players this year, and people are beginning to realize that conversations and comments are more important than a huge number of blog hits. So how can de-scaling and unfriending help your business? The drive to be more intimate can benefit your business by allowing you to form a tighter circle of customers, more successfully establishing you as a preferred channel for consumption. Luckily, there are tools that can help you descale your social networks: Path – Offers small-scale communities where people feel more comfortable sharing personal information. It controls who can view your information and does not include features that make your content viral. Letter.ly – A subscription-based newsletter for bloggers who feel that public posts decrease the quality of conversations. This newsletter opens discussion only to people who pay, or who are privately invited to read a blog post. GroupMe – A texting app which limits your group text participants to only 14, to ensure that meaningful dialogues take place. What about the flip side of unfriending and descaling? While you’re considering who to eliminate from your social circles, your contacts are likely doing the same. Here are some tips to help you make their cuts: 1. Be selective in your communications. Of course, your product is important – to you. But not every little detail is as important to your audience. Be sure to focus on key features and benefits from your audience’s perspective. 2. Stay on topic. Always give relevant communications to your customers, and never rant or badmouth competitors. This is a sure way to lose customers. 3. Provide value. In addition to talking about your product or service, find ways to provide value to your circle of friends. Understand topics and pain points important to them, and provide valuable information and advice to help them succeed. You’ll soon come to be considered as a valuable resource to your contacts – one that they want to keep in their online social groups. One thing is clear: quality is still more important than quantity, especially in the current economic downturn when people are downsizing everything. Start “pruning” your social network – and take steps to avoid being pruned – and you’ll reap the benefits of having a tight circle of loyal friends and customers.
5 Folders to Clean Up Today
A new year means a fresh start (or a compulsive desire to stay organized). Why not start today? Here are 5 folders we’ve identified on your PC or Mac that could use a little reorganizing. It may require a few hours of your time to do, but trust us, it’ll make you feel warm and fuzzy inside when they’re clear. Read more.
Number of Infected Websites Doubles in One Year
According to a new study released by security firm Dasent, the number of malware-infested websites has increased to 1.2 million in 2010, from 560,000 in 2009. Dasient , a company specializing in combating malware on websites, has released a new report claiming that over 1.2 million websites were found to be infected by malware in the third quarter of 2009 , more than double the number during same period last year. These infected websites are especially dangerous since, unlike other forms of malware vectors, they don’t require the user to click on a link or open an attachment. They infect users through “drive-by-downloads” or by just visiting the infected website. Hackers take advantage of the dynamic and interactive features of today’s modern websites and social networking sites to deliver their payload. Other dangerous forms of infected websites are those hosting fake antivirus scams, which fool users into downloading malware posing as legitimate antivirus software, as well as malvertisements, which pose as legitimate advertisements but instead are malware vectors. With the growing threat of malware, how confident are you that your systems are safe? Contact us today and find out how we can help.