HOME

June 30th, 2015

Productivity_Jun17_AIn today’s fast-paced business environment, business productivity has never been more imperative for keeping up with the competition and boosting opportunities to stay ahead. But the fact is that many of the tips you read about simply don’t work, and they could even make things worse by actually lowering your productivity. With that in mind, let’s take a look at four productivity myths that you should avoid.

Don’t check email first thing in the morning

What’s wrong with this when it sounds like such a good tip? Well, reading and responding to email can derail your entire morning. Your ten minutes spent reviewing emails turns into half an hour, and suddenly you’re late for work. And in many industries you simply won’t have the time in the morning to go through every single email and find out what has been happening overnight.

The fix

You should check your email first thing in the morning but make sure not to respond unless it will take you less than a minute. Something that requires a simple “yes” or “no”, or that can be forwarded to someone who can take care of it for you, is fine. But for anything else that requires research or a longer response, mark the email as “unread” and go back to it later when you have more time. You can also add it to your to-do list so you’ll be sure to check it later. Skimming emails in the morning is a particularly good use of commuting time even if you can’t respond right away, plus it can help you prepare for your day by giving you an idea of what lies ahead.

Tackle the hardest task first

While this sounds reasonable, in most cases your hardest task can really set you back time-wise. Plus, without proper planning in terms of the time, resources and energy you need for it, tackling the hardest job first might end up deflating your hopes of a productive day.

The fix

Instead of starting the day with your most difficult task, build your confidence by starting with something smaller and easier. Simpler tasks will help get your momentum going and ease you into a productive mode. You could also cut that difficult project into smaller bite-sized to-dos, so you can tackle them individually without burning out.

Make one to-do list for everything

While it’s a good idea to get everything out of your head and down onto paper, having just one go-to list for all the things you need to get done is a huge mistake. Why? It can be quite the headache to pick tasks off a never-ending list. Once you see that long list, you’re more likely to be demotivated before you even get started on a task.

The fix

Write everything you need to do onto a list, then rewrite your list into specific, actionable tasks. Break your lists up into a work list, home list, side project list and so on. Having multiple lists that detail the specifics of what you need to do makes it easier for your brain to digest all this information, instead of having to wade through numerous things that you can’t possibly do all at the same time. Keeping your lists separate will help you stay focused on what really needs to get done first.

Stop multitasking

You’re already really busy doing just one thing, so it’s a bad idea to risk compromising the quality of your work by multitasking, right? Wrong! In today’s fast-paced world, you multitask without even knowing, whether it’s by listening to music while working, or when you’re reading an advertizing billboard while walking along the street.

The fix

Be selective with what you choose to juggle! For instance, walking and listening are two tasks that complement each other, whereas it can be too hard for the brain to split itself between simultaneously typing and listening.

It’s important to keep in mind that just because something is named “the best advice” doesn’t mean it’s best for you. Looking to find out more about how to boost productivity in your business? Give us a call; we’re sure we can help.

Published with permission from TechAdvisory.org. Source.

Topic Productivity
June 29th, 2015

BusinessContinuity_Jun25_AData backup is one of the most important aspects of your company's infrastructure. Without data availability, your business will come to a standstill. So it's bizarre that most business owners fail to have a proper data backup strategy in place - and when disasters strike, it will be too late to act. You really do need to take a proactive approach to backing up your data and keeping your business functioning normally at all times. There are several methods and devices you can use for backing up data - here are some to consider.

There’s no one-size-fits-all solution when it comes to data backups. You’ll want to consider the pros and cons of each of the backup devices below before making a purchase.

USB stick

USB flash drives are basically miniature hard drives that you connect to your computer using a USB port. The drives are extremely cheap, with prices depending on their capacity. They’re also portable, and can be used to backup information from several computers to the same drive.

Although USB sticks are highly convenient, they’re still not a complete backup solution, and are best suited for intermediate backups, such as storing file recovery programs or critical business documents.

External hard drive

An external hard drive is perfect when used as backup storage media. It has the lowest cost per gigabyte when compared to the other backup devices out there. External hard drives use the same plug-and-play functionality as USB sticks, so you can plug the drive into your computer and immediately start selecting the files you want to backup. The transfer rate is also very fast, and you can backup a large amount of data within seconds.

One of the evident drawbacks of using an external hard drive is that you’ll need to update your backups on a regular basis, or else new files won’t be included. There’s also the risk of the device being stolen or misused. For instance, a colleague may take your drive when you’re away from your desk, or a disgruntled employee may copy all of your important business files and take it with them when quitting.

Network attached storage

Network attached storage, or NAS for short, is a dedicated device with its own IP address. It can be used as a multimedia server, and can function as an email or lightweight database server. NAS offers data redundancy, meaning it will generate a backup of your backups, so you can ensure your files are fully protected.

The main downside of NAS is its inability to scale beyond the limits of the system; you have to purchase additional hard drive bays when you need more capacity. You also have to take full responsibility for data security if you’re implementing NAS.

Cloud storage

Cloud storage is becoming more and more popular among businesses of all sizes, due to its many benefits such as allowing users to access data anywhere on smartphone devices, as well as enabling you to work with the most current hardware and up-to-date software. It is also affordable, since you’ll only have to pay for what you use. What’s more, cloud computing is very convenient, because your service provider will take care of the installation, management, and maintenance processes.

On the downside, some cloud service providers don’t employ sufficient security measures on their systems, so your data could be exposed to potential cybersecurity threats. This means that it is not always the ideal solution for companies dealing with very sensitive data - medical practices and law firms, for example. Predicting costs can also be hard; if your business is growing rapidly, then you might find you have not adequately planned for incremental costs.

Choosing the best system for backup is a critical decision that will impact your business on a daily basis. There are trade-offs among backup devices, which is why you need to choose the solution - or solutions - best suited to your business. Contact us today and our experts will assess your company’s needs and provide the best backup solutions for you.

Published with permission from TechAdvisory.org. Source.

June 27th, 2015

To help address stalling iPad sales, Apple appears to have turned its attention toward business applications.

Enterprise trends towards cloud-based applications and services, mobility and Bring Your Own Device (BYOD) practices have also created a more favorable climate for Apple devices in businesses.our blog earlier this year, we wrote about the partnership announced last year between Apple and IBM to produce an anticipated 100 business apps for iPhones and iPads by the end of 2015.

Apple’s efforts to capture more of the enterprise market share appear to be part of a long-term strategy: Apple announced several features of the new iOS9 operating system that cater to businesses at their WorldWide Developer Conference for 2015 (WWDC 2015) in San Francisco. According to ZDNet, the iOS 9 updates designed for the iPad – including better multitasking, text management, and split screens could set the stage for an iPad Pro for enterprise. Experts speculate that Apple is trying to make it easier for businesses to adopt iPads as replacements for laptops in the coming years.

Other announcements from Apple’s WWCD 2015 include updates to OS X, Apple Watch, and Apple Pay, as well as a new streaming music service called Apple Music and a live 24/7 radio station called “Beats One Radio.”

Topic Articles
June 27th, 2015

There’s been an increased focus on the importance of DNS security in the media recently: The Federal Reserve Bank of St. Louis was breached using a vulnerability in DNS last month, and a few years ago, several media companies, including the New York Times and Washington Post, went offline because of similar types of attacks.

So what is DNS and why is it important to small business?

DNS stands for “Domain Name System” and it is a mechanism to make the Internet a more human-friendly place. The Domain Name System was originally invented to support the growth of email communications on the ARPANET (developed under the U.S. Advanced Research Projects Agency–ARPA).

The ARPANET launched on August 30, 1969, at UCLA, as the first wide area network. A network connection was added to the Stanford Research Institute later that year. By the end of 1972 there were 24 sites on the ARPANET, including the Department of Defense, the National Science Foundation, NASA, and the Federal Reserve Board.

In 1983, a military-only network called MILNET split off from the ARPANET; this military network later become part of the Department of Defense’s Defense Data Network. The National Science Foundation managed the non-military network that evolved into the public Internet we know today.

DNS is a system that ties alphabetical names to the numerical IP addresses that allow computers to “talk” to other. Alphabetic host names were introduced on the ARPANET shortly after its creation to make it more user-friendly because alphabetic names are much easier for people to remember than numeric addresses.

A key element of the DNS standard is a worldwide collection of DNS servers designed to be distributed and non-centralized in order to support a free and open source Internet. With no central location for all DNS servers, communications can continue even if a server was disrupted by an attack. Similarly, no one single company or government could shut of the Internet. It is a democratized system that has survived over 30 years, in spite of the incredible technological advances that have taken place during that time.

When you enter a domain name (e.g. google.com), your computer will find your nearest DNS server and ask it what the correct IP address is for that name. DNS will return the IP address and your computer can then communicate with the relevant machine.

A domain name registrar, like GoDaddy, is the service that assigns these names with IP addresses for the end user, such as when you get a URL for a website. The DNS server serving your domain – known as the authoritative name server, holds the requisite IP address information.

Many cyber attacks involving DNS knock the authoritative name server out of action and disrupt the ability to resolve the IP address. An inability to resolve an IP address will cause Internet software to fail and the affected domain is rendered inaccessible, including the capability to send and receive emails. This is why Internet service providers and hosting companies routinely deploy multiple DNS servers.

Historically, DNS hacks like the ones involving the St. Louis Fed and New York Times have been committed by sophisticated cybercriminals with large resources. While they do not typically target small businesses, there are precautions that can be taken to help avoid the risk of these types of attacks.

It is important for business owners to know who maintains the authoritative DNS server for their company’s domain. Many domain name resellers will host the DNS as a value-added service at no additional charge, as do practically all web hosts when you sign up with them. Often, businesses count on their web developers to handle this detail, but business owners should own their domain outright and have all the credentials. Businesses may want to consider paying for DNS services from companies that offer added security and protection. Verisign or OpenDNS, for example, provide detection and filtering software to prevent against harmful content and malware.

Topic Articles
June 27th, 2015

Microsoft is preparing to launch the Windows 10 operating system for PCs in July, with phones to receive the upgrade later this year. Here’s what you can expect from Windows 10 and how to prepare for the upgrade.

Windows 10 will be the most aggressive release of Windows for Microsoft, and the first major release under Microsoft’s new CEO, Satya Nadella, as Microsoft continues efforts to retire Windows 7 (which is nearly 10 years old), and after the lukewarm reception for Windows 8 three years ago.

The company has kept most details of the release quiet. Windows 10 pricing information hasn’t been officially published, however, it is reported that at least the first year will be free for upgrading from Windows 7 and 8, and it will be free for Office 365 subscribers.

A few features of Windows 10: 

  • Microsoft will offer one-click upgrades to everyone who is running older versions of Windows, promising to be the easiest upgrade of any version of Windows
  • Anything that is ‘certified’ to run on Windows 7 will run on Windows 10
  • Windows 10 is the leanest Windows ever released and technically it is faster than Windows 8 and much faster than Windows 7
  • Microsoft will have a unified store for phones and desktop to buy a single ‘app’ that runs on both platforms, beating Apple on this front

So what can your business do to prepare for Windows 10? 

1. Review your hardware replacement plan

Sinu recommends that a 36-month roadmap be in place for office machine replacements and that this be the center of any discussion around plans to upgrade to Windows 10. If Windows 10 is more quickly adopted than anticipated, then this plan would be accelerated. 

We caution our customers that there are costs and risks to upgrading to Windows 10 on old equipment and, more importantly, any equipment that is out of warranty brings risk to your business and should be a priority in your hardware replacement plan.

Sinu can assist with creating a replacement plan using Business Intelligence reporting available to all its customers through the Sinu portal. For instance, the “My Computer Replacement Plan” report parses your hardware inventory and looks at the warranty expiration date, ship date, Operating System version and memory to make a recommendation about the machine: Retain, Replace or Update. (See Sinu blog on replacement plans.)

2. Know your business solutions and whether they are ready for Windows 10

You should have an inventory of all the business solutions your company relies on. When considering upgrading to Windows 10, review your hardware replacement plan along with each business solution to make sure it will run on Windows 10 without issue. This often means contacting each vendor to ask how your version of that business solution will work with Windows 10, and you may be encouraged by these vendors to upgrade to their newest version for maximum security and performance. Reviewing each business solution for Windows 10 compatibility is needed before a plan to Windows 10 can be put together. Sinu can help with all these steps, and strongly encourages you to let us assist you with any hardware or software upgrades.

3. Windows for home users

For employees using Windows at home, consider giving them a heads up that Windows 10 is coming in late July and that their home machines might receive an offer for free upgrade. Encourage them to do a backup before trying to upgrade. (While no company should make concrete recommendations on how someone should handle their personal IT, backup is a generally accepted practice.)

4. Consider training

Almost everybody resists changes to the systems they are accustomed to, but does a change in software cause prolonged loss of productivity with your employees and/or have they been uncomfortable with previous Windows software changes?  If so, your team might need some training in Windows and, more specifically, Windows 10. Sinu can help you gain in-person, over the web, or self-help training in these areas so that your team knows what to expect, can open the programs they need, and is more comfortable with Windows 10 before it is installed on their computer.

The bottom line is that technology solutions will continue to evolve and before adopting new technologies we recommend an inventory of your current solutions and careful planning for any upgrades. Sinu is here with the tools and expertise to help plan and implement those transitions to ensure your employees are productive and your data is safe.

Topic Articles
June 19th, 2015

BusinessIntelligence_Jun9_ACompanies today are adopting business intelligence (BI) tools to represent data in a way that makes information comprehension and analysis simple. But all too often business owners make mistakes in selecting and implementing a BI software solution, resulting in unnecessarily high costs and ineffective execution. To help, we have put together the most common BI mistakes organizations make, and how to avoid them.

Mistake #1: Not defining business problems

One of the biggest mistakes in BI implementation is jumping to conclusions too soon without first identifying what your business wants to accomplish. When it comes to integrating BI into business operations, there’s no such thing as a one-size-fits-all solution. Looking for a single BI tool to solve all analytics problems is one of the main reasons many BI projects fail.

You need to clearly define the business problem you’re trying to solve, and understand the specific tools required to solve those problems. Only then will you be able to select and purchase the BI tool that best suits your needs.

Mistake #2: Not getting buy-in from end users

Even the best BI tools are ineffective if they’re not properly utilized. Forcing your employees to use newly purchased BI technology without informing them or hearing their thoughts beforehand is a big mistake.

Instead of telling employees they have to use something, first focus on highlighting the benefits of the new BI system. Help employees understand why they’ll want to use it, and convince them by showing them what they stand to gain from the new BI technology.

Mistake #3: Rushing implementation

A rushed deployment of new technology is often times not a successful one. When it comes to deploying BI solutions, patience is key. If you hurry into BI implementation too quickly, your end users may not have enough time to develop the skills required to use the software effectively.

Take an incremental approach to implementing BI solutions. Make a list identifying business problems and, rather than expecting to solve every business problem all at once, try to prioritize specific outcomes you want to achieve. When you have solved the first issue, move on to the next one and so on until you have incrementally solved all the problems on the list.

Mistake #4: Insufficient training

New BI systems are complex structures that require a lot of training in order for users to make the most of them. If users lack the skills necessary to operate the software, then bottlenecks can occur. The product may be left dormant for long periods of time as users wait for experienced IT staff to resolve teething problems.

Spend wisely on providing ongoing training, so that users really understand how to use the system. Consider hosting weekly lunch sessions where a different aspect of the BI system is discussed. You could also provide online training videos that enable users to learn more about the new system at their own pace.

Mistake #5: Not making use of information and reports

BI tools are designed to analyze raw data and turn it into valuable information that can be used in business decision making. But some organizations fail to exploit the information fully - it is not shared, not analyzed, and not acted on. BI software can generate reports on various data points, identify risks, and predict trends. It’s important to leverage the information gathered and to apply it to your business’s objectives and goals.

Business intelligence software is a highly useful tool that, when used properly, can drive your business forward. Avoid these mistakes in order to make the most of your BI solutions. If you’re looking to implement BI tools to your company, contact our experienced consultants today and see how we can help.

Published with permission from TechAdvisory.org. Source.

June 8th, 2015

SocialMedia_Jun8_AWith social media being such a big part of everyday life, it likewise plays a huge role in online marketing. There are many social platforms a business can use to reach out to audiences, but the one that stands out from the crowd is Facebook. Over the past few years, Facebook advertising has seen steady growth in revenue, thanks to its specific audience targeting methods that allow business owners to lower their new customer acquisition cost significantly. If you haven’t tried Facebook ads, you’re truly missing out on one of the most powerful marketing tools out there. To that end, here’s a step-by-step guide to implement Facebook ads in your business.

1. Create a Facebook Business Page

First things first: before you can advertise on Facebook, you must have a Facebook Business Page. Log in to your Facebook account and, on the news feed page, click on Create a Page from the left column. Choose the category of your Page that best describes the nature of your business. Then fill out all your business information, including your website, hours of operation, phone number, address, and email. Finally, add creative profile and cover images to attract potential visitors.

2. Define your Facebook ads goals

Facebook offers a variety of advertisement options to choose from, depending on your business’s needs. That’s why it’s important to create goals for your ads, to make sure you’re spending your money wisely while achieving your business goals. Start by asking yourself why you’re utilizing Facebook ads in the first place; defining advertising goals and strategies will help you choose the right type of Facebook ad.

3. Choose an objective for your campaign

Now that you have a Facebook ad goal in mind, it’s time to translate those goals into objectives for your campaign. For instance, if you want to drive more visitors to your business website, your Facebook ad objective is to Send people to your website, but if you want to increase your number of social media followers you would choose the objective Promote your Page. From your Page, click on Create ads and choose an objective to get started.

4. Target your audience

This is the step where most businesses fail at Facebook advertising. You can target your ads based on location, age, gender, language, interests, and behavior. By defining the right audience group, your Facebook ads will be shown to the right people and will give a high conversion rate. After you’ve chosen your target audience, you can decide how much money you want to spend, and choose the time to run your ad.

5. Customize your ad

This process is equally as important as audience targeting. In this step you have the option to choose how your ad will look, by adding up to five images and text that will accompany them. The text is only 90 characters long, so make sure your copy portrays what the content is about, so it will encourage people to click on your ad. Then choose where you want your Facebook ad to show from four options - the news feed, mobile news feed, right column, or audience network.

6. Place your order

The last step is to click on the Place Order button to submit your ad to Facebook for review. You’ll receive an email from Facebook once your ad has been reviewed and approved and is ready to launch.

Facebook advertising requires effective planning, testing, and measuring. You need to experiment in order to find the campaign that works best for your business. If you’re interested in advertising on Facebook or through other social media platforms, drop us a line and see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
June 3rd, 2015

164_A_ProdTechnologies such as cloud computing are freeing employees from their desks and lighting the fuse to the remote working revolution. For employees who lack discipline or a strong work ethic, a remote worksite is a breeding ground for a lack of focus and unproductivity. What can you do to help them out? Here are some ideas you can provide your staff (or take advantage of yourself) to develop the proper habits for successful remote working.

Don’t change your routine

Would you go to the office without brushing your teeth or combing your hair? Probably not. Believe it or not, it’s not a good idea when you’re working remotely either. Sometimes the simple act of preparing for your workday - jumping in the shower, shaving and so on - can put you in the right frame of mind to work. If you or your staff are finding it difficult to be productive at home, try sticking to a pre-work routine and see if it makes a difference.

Designate a specific workspace

Attempting to work while sitting in your bed or lounging on the couch can be a recipe for a productivity disaster. So instead, try designating a specific space where you work everyday. It can be as simple as a desk set apart from the rest of your living room or bedroom, but just make sure it’s not cluttered with non-work items (like a TV remote or fiction novel), and that it’s properly lit and comfortable.

If you’re working from a coffee shop, airport or other public place, consider using a pair of headphones to help drown out the noise so you can focus. Eliminate as many distractions as possible, and the productivity will come.

Stay connected to your team

Thankfully, cloud computing has made it unbelievably easy for your remote workers to stay connected to the office wherever they are. If your business is setup with Google Apps, Microsoft Office 365 or another cloud product, make it a requirement that your employees access it daily and remain available. When your staff is connected to your business this way, it will strengthen their relationship with other employees and the organization as a whole. Generally speaking, more connected employees are more productive ones.

Log off

When you work remotely, the line between work and personal life blurs more than ever. To avoid burnout, it’s important you discipline yourself to log off after you’ve put in a full day’s work. Whether you choose to work from 9 to 5 or 4pm to midnight, define work hours and stick to them. This will help you completely disconnect at the end of the day, which will ensure that you’re properly rested and prepared for the next.

Want more tips on productive habits for remote working? Are you ready to empower your staff with cloud computing to help them along? Let’s talk. Call us today.

Published with permission from TechAdvisory.org. Source.

Topic Productivity
June 2nd, 2015

BusinessValue_June2_ATechnology has completely changed the way we do business. Gone are the days when customers had to drop by your company to purchase your products and services. Now they can simply visit your website, see what you have to offer, and make an online payment - all in a matter of minutes. But if you want to expand your customer base, your website needs to rank high in search engines, so that it’s easy for potential customers to find you. That means implementing search engine optimization (SEO) strategies; here’s all you need to know about SEO to increase your online presence.

SEO defined

The practice of SEO has been around just about as long as search engines themselves. SEO is basically a methodology of techniques and tactics used to increase the number of visitors to a website by obtaining a high-ranking placement in search engine results. There are a lot of crackpot theories about SEO out there, and you’ll have to sift through them to find the techniques that really work for your business.

There’s a saying in the world of SEO that if you’re not first, you’re last. When it comes to SEO there’s no short cut, and the idea of getting your business website ranked on the first page of Google search results in one day is ludicrous. To make things clearer, we’ve compiled a list of the basic SEO practices business owners tend to overlook.

1. Research keywords Keywords are key to your online presence. Add the right keywords to your website and your chances of being found are much higher. First, invest time in keyword research. Find out which keywords your customers are using in search engines, and gather all crucial data for SEO purposes, whether it’s search volume, trends, or competition. Make a list of keywords related to your niche. Don’t be tempted to only go after phrases with the highest search volume - they will be very hard to rank for and might be too broad.

2. Create quality content Based on the researched keywords, generate high quality content with the focus on your readers. Make sure this content reads naturally for human visitors - don’t overdo it by stuffing keywords into your text in the hope of getting high rankings, as most search engines will penalize your website for using this underhand tactic. Good content has relevant keywords in it, but a great one has the keywords while also providing real value to visitors.

3. Place call-to-action buttons A business website should always have a call-to-action to convert visitors into customers. Make sure you add a call-to-action button to each of your most important pages, whether that means the About Us page, service pages, FAQs, or case studies. Call-to-action buttons may vary. They don’t always have to lead to a contact form; they can be links to other content, incentive offers, free downloads - the list goes on.

4. Create an internal link structure After you have quality content, you must show the search engines that your site has a page hierarchy. The general rule of thumb is, all your articles should link back to the home page, service pages, and even other articles. Linking internally allows for easier navigation for your visitors, and there’s a good chance they will spend more time on your website, which is good for SEO purposes.

5. Install analytics tools Tracking your visitors’ behavior on your website is important. Connect your website to analytics tools like Google Analytics and Google Webmaster Tools to gain valuable insight into your website’s statistics. By closely monitoring performance, you can eliminate keywords that aren’t generating you leads, and tweak content that visitors ignore.

SEO is an ongoing process that requires patience and time. These suggestions are meant to set a stronger foundation for your business to expand. If you’re looking for other ways to increase business value, get in touch with us today.

Published with permission from TechAdvisory.org. Source.

June 1st, 2015

Security_May27_AInformation security is on everyone’s mind - all too often we hear of a high-profile data breach in the news, and even the smaller scale attacks that don’t make headlines can wreak havoc on growing businesses. So it’s heartening to know that Google places a high premium on security. Their latest move to bolster protection for Google Drive for Work sees the introduction of physical Security Keys - here’s what you need to know.

Google already offers security precautions like two-step authentication, which provides additional protection by requiring you to enter not only your password but also a one-time code received by SMS or similar. This is a crucial weapon in the fight against hackers, since weak usernames and passwords are still be the primary reason for accounts being breached. Security Keys now take things one step further, strengthening your Google Drive account’s coat of armor to an even greater extent.

The Security Key is a physical USB device that is plugged into your computer, and which sends an encrypted signature, instead of a password or other code, to verify your identity and permit you access to your Google account. Crucially, Security Keys are inexpensive - starting from around $6 per unit - and require no additional software for deployment, use or management. Administrators have the ability to track when and where each key is used, as well as being able to disable them if lost and issue backup codes to allow staff uninterrupted access even if they do misplace their key.

Simplifying the login process is also a key part of what Google has tried to achieve with Security Keys. To that end, the first time you use your key to access your Google account on a particular computer, you can opt for Google to remember that device. On subsequent occasions you can quickly sign in using only your password, and without requiring either your key or a two-step authentication code. You can still sign in using your key on other machines, and if a hacker tries to access your account without your key they will also be prompted for a two-step verification code (which, unless they have access to your cell phone, they shouldn’t be able to provide).

Security Keys aren’t an entirely perfect solution, though - there are some significant limitations to the technology. For one, you can’t use them on mobile devices, since they require a USB port to work, and they only allow you to access your Google account through the Chrome browser. Windows, Mac OS, ChromeOS and Linux operating systems are all supported, but if you’re working from your phone or on a browser other than Chrome then you’ll need to continue using two-step authentication. Google says you can mix and match different methods of verification, opting to use Security Keys where they are supported and two-step verification otherwise (or if you don’t have your key with you).

What’s more, only Google Drive currently supports Security Keys - it’s not yet possible to use them with Google Apps, for example. But, while the technology is primarily targeted at Google Drive for Work users, it’s possible to link a single key to multiple accounts, meaning you can use it to access both your work and personal Google accounts. Some users have also queried how much of a safeguard the technology really provides in the absence of an additional PIN code or fingerprint authentication being required for activation, suggesting that a stolen Security Key could be used to access a computer that a user has previously asked Google to remember. But Security Keys do appear to offer at least some additional protection, which will be of comfort to businesses handling sensitive data.

Give us a call to find out how to employ Security Keys and other technology solutions to bolster your protection against network intrusion and data breaches.

Published with permission from TechAdvisory.org. Source.

Topic Security