Blog

February 9th, 2016

2016Feb9_Security_BWhen it comes to Internet security, a reported 87% of small businesses have no security policies in place at at all. And considering that employee error is one of the most common causes of an online security breach, it makes sense to have rules in place that your staff need to follow. So to help you create some security policies of your own, we’ve outlined four important areas to cover.

Internet

In today’s business world, employees spend a lot of time on the Internet. To ensure they’re not putting your business at risk, you need a clear set of web policies. Here are three important ones to keep in mind:
  1. Employees should be using the Internet for business purposes only. While this is undoubtedly hard to avoid without blocking specific websites, having a policy in place should at least cut back on employees spending time on non-business related sites.
  2. Prohibit unauthorized downloads. This includes everything from music to games, and even data or applications.
  3. Accessing personal email should not be done on business devices. If employees must access their own email account during the day, they can do so on their smartphone or other personal device.
These are just a few Internet policies to get started, but you should also consider including information on your recommended browsing practices and your policies for using business devices (such as company phones) on public wifi.

Email

Just like with the Internet policy mentioned above, company email accounts should only be utilized for business use. That means your employees should never use it to send personal files, forward links or perform any type of business-related activities outside of their specific job role. Additionally, consider implementing a standard email signature for all employees. This not only creates brand cohesion on all outgoing emails, but also makes it easy to identify messages from other employees, and hence helps prevents spear phishing.

Passwords

We’ve all heard the importance of a strong password time and time again. And this same principle should also apply to your employees. The reason is rather simple. Many employees will create the easiest to crack passwords for their business accounts. After all, if your organization gets hacked, it’s not their money or business at stake. So to encourage employees to create strong passwords, your policy should instruct them to include special characters, uppercase and lowercase letters, and numbers in their passwords.

Data

Whether or not you allow your employees to conduct work on their own device, such as a smartphone or tablet, it is important to have a bring your own device (BYOD) policy. If your employees aren’t aware of your stance on BYOD, some are sure to assume they can conduct work related tasks on their personal laptop or tablet. So have a BYOD policy and put it in the employee handbook. In addition to this, make sure to explain that data on any workstation is business property. That means employees aren’t allowed to remove or copy it without your authorization.

We hope these four policies have shed some light on best security practices. If you’d like more tips or are interested in a security audit of your business, do get in touch.

Published with permission from TechAdvisory.org. Source.

Topic Security
February 5th, 2016

2016Feb6_BusinessContinuity_BPower outages, disasters and other disruptions happen. And thousands of businesses around the globe are affected by them every year, with lost profits ranging into the millions, if not billions. So how can your business protect itself and stay open when the unexpected strikes? Here are five common business continuity strategies that many companies rely on.

Backup your data, applications and servers

Today, companies are more dependent than ever on IT and their business data. If these critical components suddenly become inaccessible, can your business stay open? For most business owners, the simple answer is no. This is why backing up these elements is vital to your business’s success. Backing them up ensures they can be restored quickly in the event of a disaster, security breach, or damage to IT equipment.

Obviously, to ensure the accessibility of your IT, you need to backup all your data, applications and servers regularly. The keyword here being “regularly”. While in the past most businesses would do this on-site and with tape backups, today more and more businesses are using the cloud. Some of the prime reasons for backing up to the cloud are as follows:

  • Affordability
  • Backups can be automated, therefore saving you time
  • Cloud providers usually backup your data to multiple locations (so if one of their facilities goes down, your backup is still safe at another site)
  • Backups can be accessed from anywhere, whether it’s at an employee’s home or at an alternate office
  • If you need to use it, backups can be restored quickly

Virtualize servers and desktops

When you virtualize your servers or desktops, they can be used at any location - be it at your workplace, home, or a coffee shop in the Bahamas. In terms of business continuity, this is useful in case your main office suddenly becomes unusable due to a disaster such as a flood, a break-in, or if you’re simply unable to get there because of hostile weather conditions.

Have a backup power supply

Power outages essentially zap all your employees productivity. No electricity means no work. And that means you’re paying them to do nothing. Having a backup power supply like a generator will ensure that when the electricity goes down, your employees can continue working. A good solution is an uninterrupted power supply (UPS). When you have this, a power outage will not affect your employees ability to work. They can work seamlessly through it, as if nothing ever happened. Also, if you have a server room, the UPS will ensure your vital servers stay cool.

Utilize social media

Whether it’s Facebook, Twitter or Google +, most people are on at least one social network these days. And if there is any kind of weather-related disaster, social media is usually one of the first places customers, colleagues, staff and vendors will check to see the status of your business. This is because even if the phone lines or local power goes out, social media is usually accessible. So when it comes to business continuity, have at least one active social media account you use to keep your customers and followers informed.

Implement Unified Communications

Unified Communication (UC) can essentially create a virtualized communication infrastructure. That means instead of your communication tools - like phones, instant messaging, video calls - all being stored locally at your workplace, you can access them anywhere. So for whatever reason if your office is inaccessible, employees can still use your phones and other communication tools from their homes. What’s more, UC tools can route business calls to your employees smartphones. That means they’ll never miss an important call, even if they’re not in the office.

So there you have it, five tools to ensure your business operates continuously no matter what comes your way. If you’d like to implement business continuity technology in your business or develop a continuity plan, we’re happy to help.

Published with permission from TechAdvisory.org. Source.

January 27th, 2016

2016Jan25_BusinessContinuity_BWhen and if disaster strikes, is your business going to continue to operate and cater to customers despite a possible long-term hardware failure or a network disruption? If you answer no or are not even sure what to do, you are part of a majority of business owners who have not considered disaster preparedness and the crucial role it plays in business survival. This post helps small or mid-sized businesses (SMBs) gain some understanding about Disaster Recovery (DR) and how important DR planning is today to protect against unexpected and costly downtime.

As we all know, unpredictability is a fact of life. The aftermath of Tropical Storm Bill in Texas and recent floods in South Carolina are a grim and unfortunate lesson for many overconfident business owners who think their companies are spared from the likelihood of cataclysmic weather, technological malfunctions, or human actions. A 2014 survey by the IT Disaster Recovery Preparedness (DRP) Council reveals just how many companies worldwide are at risk: 73 percent of SMBs are failing in terms of disaster readiness. What does this mean? It means that 3 out of 4 companies aren’t prepared to handle emergencies and save their businesses from a worse-case scenario.

If it’s not clear and compelling enough for a business owner like yourself to consider putting a well-conceived Disaster Recovery (DR) plan into place, perhaps it’s time to give it some thought. Doing so can save you years of business loss. Here is some useful information about what DR is all about and how it can ensure your business’s survival in the wake of unforeseen circumstances.

What is Disaster Recovery (DR)?

Disaster recovery is a plan for restoring and accessing your data in the event of a disaster that destroys part or all of a business’s resources. It is a key component involving many aspects of business operations that requires this information to function. The job of a DR plan is to ensure that whatever happens, your vital data can be recovered and mission-critical applications will be brought back online in the shortest possible time.

What kind of disasters are likely to happen?

Business disasters can either be natural, technological, or man-made. Natural types of disasters include floods, earthquakes, tornadoes, hurricanes, landslides, tsunamis, and even a pest infestation. On the other hand, technological and man-made disasters involve hazardous material spills, infrastructural or power failure, nuclear power plant meltdown or blast, chemical threat and biological weapons, cyber attacks, explosions, or acts of terrorism and civil unrest.

Why does your business need DR?

Regardless of industry or size, when an unforeseen event takes place and causes day-to-day operations to come to a halt, a company will need to recover as quickly as possible to ensure you will continue providing services to clients and customers. Downtime is one of the biggest IT expenses that any business can face. Based on 2015 disaster recovery statistics, downtime that lasts for one hour can cost small companies as much as $8,000, mid-size organizations $74,000, and $700,000 for large enterprises.

For SMBs particularly, any extended loss of productivity can lead to reduced cash flow through late invoicing, lost orders, increased labor costs as staff work extra hours to recover from the downtime, missed delivery dates, and so on. If major business disruptions are not anticipated and addressed today, it’s very possible that these negative consequences resulting from an unexpected disaster can have long-term implications that affect a company for years. By having a Disaster Recovery plan in place, a company can save itself from multiple risks including out of budget expenses, reputation loss, data loss, and the negative impact on clients and customers.

How do I create a DR strategy for my business?

Creating, implementing and maintaining a total business recovery plan is time-consuming but extremely important to ensure your business’s survival. Many organizations don’t have the time or resources to dedicate to this process. If you would like to protect your company from unexpected disasters but need further guidance and information on how to get started, give us a call and our experts will be happy to discuss Disaster Recovery options and solutions with you.
Published with permission from TechAdvisory.org. Source.

January 25th, 2016

2016Jan20_Security_BWhen it comes to the online security of their business, many SMB owners consider it an afterthought. They think their business is too small to be of any concern to cyber criminals, and there’s good reason for this mentality. How often are security breaches to SMBs listed in the news? Rarely. In fact, you may not be able to think of a single one. But today, that’s about to change. A recent NY Times article documented the story a small business that was lucky to survive a ransomware attack.

Last holiday season, Rokenbok Education, a small, California-based toy company of seven employees realized its worse nightmare. During the busiest time of the sales year, the files in their database had become unusable, infected with malware. The hackers used ransomware, a malware designed to hold a business’s data hostage, to encrypt their files and demanded a payment to make them usable again. However, instead of paying the ransom, Rokenbok restructured their key system. To do this it took four days. That’s four days of downtime, lost sales, and confused customers who likely lost confidence in the integrity of their company. Luckily this did not put Rokenbok Education out of business. But many SMBs aren’t so fortunate, and are forced to close after such a security debacle.

So why do security breaches like this happen to SMBs?

There are many reasons, but a common one is that small and medium-sized businesses often focus on profits over security. And really, it’s hard to blame them. When you’re small, you want to grow your organization as quickly as possible. And you likely think that because you’re small, no one is going to attack you. However, nowadays hackers are on to this way of thinking. They know that SMBs don’t focus as much on security, which make them a perfect target. In fact, according to Timothy C. Francis, the enterprise lead for Cyber Insurance at Travelers, 60 percent of all online attacks in 2014 targeted SMBs.

So what can your business do to protect itself against online attacks? There are a range of options, but it’s best to start off with an audit of your current security system to see where the holes are. This audit should check areas of risk which include customer data, employee access, and assets such as servers, computers and all Internet-enable devices.

After that, an obvious thing to do is to strengthen your passwords. While this has been said thousands of times over, many SMB owners do not take heed. Clay Calvert, the director of security at the Virginia-based firm MetroStar Systems, notes that hackers analyze how we create passwords and use big data analytics to crack them. “They have databases of passwords,” Calvert said. The best way to create a strong password is to make it long with a mix of characters. Password managers that encrypt your passwords can also help.

Aside from passwords, there are many other ways to boost your business’s security that include installing a firewall, keeping your antivirus up-to-date, and moving data over to the cloud (instead of storing it on company servers). Also, since many security attacks occur because an employee clicked on a malicious website or link, training your employees is a smart move. A good way to start this training is to create an employee manual that includes security guidelines they must follow. For ongoing training, you can keep them up-to-date on the latest security threats through email updates and regular meetings. Once you feel confident that your employees are up-to-speed and your security practices are updated, you can try hiring ethical hackers to test your systems and try to break through your security. This will let you know if there are any security holes you missed.

Calling in a security specialist

However, if all of this sounds far too much to bother with, consider outsourcing your security to a service provider that specializes in digital security. This can oftentimes save valuable time and money in the long run. Best of all, this can provide peace of mind, knowing that you have a security specialist watching over your business.

If you’re feeling overwhelmed and unsure where to start with your business’s security, we’re happy to help perform a thorough audit and provide you the digital security solution you need to keep your business protected. Security worries don’t have to keep you up at night, and we can help you implement the measures that will protect your business from disastrous security problems.

Published with permission from TechAdvisory.org. Source.

Topic Security
January 22nd, 2016

2016Jan22_BusinessIntelligence_BFor some owners, business intelligence is the bane of their business. Staring at complex charts and graphs and trying to make sense out of them can be a major headache. But what if there was a way to simplify your data even more? Believe it or not, it is a possibility. And here’s how one product is trying to do just that, in order to simplify business intelligence for today’s business owner.

Earlier this week, the Chicago-based company, Narrative Science, integrated with the business intelligence and visualization software company, Qlik. The fruit of this integration is a new way of looking at your data beyond your standard charts and graphs. Yes, charts and graphs are still used, but now there is a new element that comes into play: story. Qlik now enables businesses to take the data on their charts and graphs and automatically turn it into a narrative that will explain the most important and relevant points of their data. These stories are presented in easily understood, natural language and can be personalized to the audience who is reading them. For example, if you want to change the format, language style or detail of the story, you can easily adjust these.

How storytelling can help with business intelligence

While charts and graphs are easy to read for people who are regularly looking at them, there can be a learning curve for those who are new to the specific set of data they’re analyzing. And when you are presenting a series of charts and graphs to a group of colleagues, it may be difficult for you to convey the data in an easily understandable way. This is why storytelling can be a vital tool with your business intelligence efforts.

Everyone can relate to a story. In fact people have been doing so since the stone age as evident by the carvings on cave walls depicting different tales. Today, all it takes is a simple click of your remote to see hundreds of different stories appear on your TV. Storytelling makes it easy to digest information for anyone. This is why both morals and ethics are often illustrated in parables or stories to convey their message. These stories that many of us heard from childhood, like the story of King Solomon who suggested cutting a living child in two to settle an argument or of King Midas and the golden touch, remain in the minds of many of us for a lifetime.

Stories stick in our brains. And they can make it easy to understand complex information, which can be especially helpful when it comes to data. This is why Qlik’s new data to story function sounds so exciting. It aims to make it easier to present data in a more user friendly way. This will hopefully save time and headaches for people trying to understand complex data. Of course, since it is so new, only time will tell what kind of impact it will have and whether or not it will live up to expectation.

Want more of the latest business intelligence news? Need help making sense out of your data, or looking for other ways new technology can help? Get in touch with our IT experts today.

Published with permission from TechAdvisory.org. Source.

January 21st, 2016

2016Jan21_BusinessValue_BAre you confused on just how to measure the value of your company’s social media? Don’t worry about it because you are not alone. While there is a lot of information out there in regards to the subject, it is something that experts still don’t necessarily agree on. This has made it difficult for businesses, especially smaller ones, to gauge just what kind of value social media offers them. Here are a few pointers to help your SMB get a better idea of your social media’s value.

ocial media is important for your business and it can have a great deal of value for your company if utilized correctly. Of course measuring this value is an imperfect science. While we don’t have a magic formula to help you figure it out, we do have a few things for you to consider when it comes to estimating it for yourself.

Followers matter but…

...they are not the end all be all when it comes to your social media efforts. When social media first started, it was all about how many followers you had. In the eyes of consumers, more followers equaled more credibility. However, that sentiment is no longer a prevailing thought among consumers and the number of followers you have won’t make or break your organization.

However, having a lot of followers does still reflect well on your business and it also gives you an easy way to reach your target audience directly. This is where it becomes important to monitor things like average clicks, the number of clicks the page you shared got, and conversion rate - the number of people who clicked on your share that turned into a sale or lead. If you have 100,000 followers but don’t get clicks, then your social media doesn’t hold a whole lot of value. The next point comes in handy if you’re having trouble monitoring all of these.

Simplify the way you monitor social media

A lot of businesses make a simple mistake that convolutes the way they estimate the value of social media. That mistake is failing to create unique campaigns and contact points for each social media channel. Doing this can make it difficult to determine just what leads and sales are coming from which media. Here’s an example for you. Your business shares a link on Facebook, Twitter and LinkedIn to a page on your website where people can download a free report. You get 150 people to download which is good but it can be hard to determine just where everyone came from to download the report unless you have advanced tools like Google Analytics at your disposal.

That’s why for every promotion or pitch page on your website that you share via social media, you should create a distinct URL for each one so you can easily monitor where people are coming from. This will help you understand what kind of value each of your social media channels has. You might also want to consider creating a separate phone number for each social media channel so that way when a person does call, you will know where they came from. This option is especially easy and cost effective to implement if you have a VoIP phone system in place.

Set social media goals

Without goals in place, it’s pretty hard to figure out the value of anything including social media. If you already have social media goals established, then these are probably the place to start in determining the value of your company’s social media. If goals have not been set up, you are going to want to create some and see if your company is able to reach these. That’s because the easiest way to determine if something has business value is to establish if it can help your company reach its goals. If you see that social media isn’t doing this, then you’ll need to reconfigure your strategy accordingly. If social media is adding value, then you will want to dig deeper using different tools to get a better idea of just what that value is.

If you aren’t using social media to add value to your business, then you are losing out. And if you aren’t utilising technology to assist in these efforts then you are really falling behind. Talk to our experts today to see how you can get started.

Published with permission from TechAdvisory.org. Source.

January 19th, 2016

Productivity_Jan19_BWorking from home may sound like a faraway dream, but with the inception of the Internet, it has become a reality. Today, more and more organizations are allowing their staff to work remotely instead of coming into the office every day. The results have been positive - employers notice an increase in productivity, work quality, and staff loyalty. However, telecommuting does present some challenges of its own. We’ve compiled a few tips to help you become more productive at home.

One of the major concerns that business owners have when allowing people to work from home is the limited amount of control they have over their staff. Companies fear that most employees might become unproductive if they become their own boss and are responsible for managing their own hours. While it is easy for remote employees to feel disconnected from work, if you make communication a top priority, telecommuting can actually work wonders.

So have you been given the privilege to work from home? Check out the following tips to ensure a productive day.

Get dressed

It’s important not to dress too casually when working at home. That’s why wearing your pajamas while working can be counterproductive. There’s no need to choose an overly formal attire - like a suit with a tie - but at least wear something comfortable yet presentable that will help you get into a work frame of mind.

Create a focused workspace

Select a workspace that’s neither too comfortable nor uptight. The best method to get into the mindset of ‘going to work’ is to create an environment that allows you to easily focus on the tasks at hand. This can be a room with a door to keep out family members, or simply a space that’s free from all sources of distractions such as your smartphone, snacks, or the television. But in the end, it all comes down to personal preference - do you enjoy working in a clear space, or a cluttered chaos? Would background music distract you or help you concentrate? Do you like working in a bright environment, or prefer a dim area? Take these into consideration before choosing your workspace.

Plan ahead

The secret to working more productively is to have an organized plan of action. Write down the plan so you can prioritize tasks properly and schedule what needs to be done and when it must be completed. Also, it’s always helpful to know your most productive hours. This is so you can schedule your most challenging tasks during those hours and set aside easier ones in your least productive periods.

Stay away from social media

Social media is considered by many as the biggest time and productivity killer. So if your duties don’t involve managing your company’s Twitter account or responding to customers’ requests via Facebook inbox, you should steer clear from these social networking sites. There are many applications out there that allow you to block social media websites and notifications, but of course you wouldn’t have to resort to such measures if you can exert some self-control and discipline.

Invest in technology

Another thing to consider about working from home is the technology to help you work easier, such as a second monitor. Sometimes you will also need certain tools to stay connected to your company, clients, and colleagues. These tools may include but are not limited to web conferencing software, document sharing applications, or screen sharing programs.

These tips will turn your home into an office that will keep your working hours productive and disciplined throughout the day. If you’re looking to implement IT solutions that will encourage a more productive work environment, get in touch with our experts today.

Published with permission from TechAdvisory.org. Source.

Topic Productivity
January 18th, 2016

The holidays are behind us now, and many of us have made (and possibly broken) resolutions to reign in our appetites and make better decisions regarding our personal health and fitness. This New Year is also a great time to assess your company’s IT fitness, curb your “Risk Appetite,” and resolve to tighten up loose cyber security controls.

When you make your personal New Year’s resolutions, you set your goals for the New Year, assess your lifestyle and implement the necessary changes to meet your goals. The same pattern holds true when setting your goals for your company’s cyber security in 2016. A few simple changes can make a big difference.

How to set Cyber Security Goals:

  • Start by understanding your company’s Risk Appetite.
  • Next, assess your level of risk and compare it to your appetite.
  • Finally, make the necessary changes to reduce your exposure to cyber security risk and bring it in alignment with your true requirements.

What is Your Risk Appetite?

Simply stated, your Risk Appetite is the amount of exposure to cyber security threats your business is willing to accept in order to compete effectively or gain a competitive advantage within your market. Accepting zero risk is no more realistic than pledging to go on a zero calorie diet. A certain amount of Internet exposure is necessary to keep your business alive but your inherent risk is directly linked to the number of points that your IT systems make contact with the public Internet. The key is to eliminate unnecessary risk while recognizing and controlling the necessary links to the outside world.

Assess Your True Risk Level.

Look at all the ways you are using the Internet in your business and determine if they are all necessary to your business and that exposure falls within your level of Risk Appetite. Some examples of Internet exposure are:

  • Business use: Email, web access to hosted applications, marketing activities, social media, web site maintenance, web research, branch and core system communications, remote access to internal systems, email on mobile devices, etc.
  • Personal use: Shopping, personal email, social media, web browsing, guest Internet access, etc.

Look at each Internet access point critically. Does a particular workstation even need to access the Internet?

Go On A Risk Diet.

Finally, look at ways you can limit your risk to a necessary level by eliminating or isolating necessary exposure to the Internet. Good cyber security is best achieved by using the “least permissions” principal. This means permitting each individual and network resource access only to systems, programs and websites necessary to do their specific job. For smaller companies, where one individual may wear many hats, this may pose a challenge. It is important to take security concerns into account when making task assignments.

Use whitelisting for applications and websites. This means blocking all websites and applications except those that are explicitly required for business purposes using desktop and Internet firewalls. For those that need regular access to multiple Internet sites for marketing and research, establish a separate physical network with a separate Internet connection. Internet connections and workstations can be very inexpensive, and a wireless “guest” Internet connection easy to establish. The key is to keep web traffic on a different network than your vital business operations. Malware from the web can’t compromise security if it never touches the systems.

Start the New Year right and be honest when determining what Internet access is truly necessary for your company. It’s not necessary or desirable to go on a crash diet and eliminate Internet use entirely, but cut out the unnecessary risk and your cyber health will be much better for it.

Mike Gilmore is Chief Technology Officer for RESULTS Technology. Gilmore has more than 25 years in IT and is the former COO and CFO of Liberty Savings Bank. He holds a BSc from Missouri State University, an MA from the University of Arizona, and an MBA from Rockhurst University. He can be reached at mgilmore@resultstechnology.com

January 18th, 2016

(Lenexa, KS, January 13, 2016) – RESULTS Technology, a managed computer services firm headquartered in Kansas City with offices in St. Louis, has been named on the Kansas City Business Journal’s Top IT Outsourcing Companies list. RESULTS Technology was ranked 21 this year, up from 25 last year.

“This award validates that RESULTS is providing our clients with the right solution,” said Patrick Murphy, President. “RESULTS Technology is based on the concept that we deliver “Worry-Free IT” by managing, measuring, reporting, using, and maximizing our customer’s IT assets. We continue to move up this list which shows us we’re doing something right.”

“I’m very proud to be part of an exceptional team of people who are committed to excellence in everything they do. RESULTS Technology has not only transformed current IT practices by focusing on the person rather than the technology, but is leading the way in providing managed computer services to small business owners across Kansas City and St. Louis,” said John French,” Chairman and CEO of RESULTS Technology.

Each year, the Kansas City Business Journal gathers information for its annual rankings through the participation of managed service providers and IT service providers in an annual survey. The Journal publishes lists each issue delivering a detailed picture of the corporate, professional and industrial segments of Kansas City.

About RESULTS Technology

RESULTS Technology is a leading provider of proactive IT solutions for small and midsized businesses. Founded in 1992, their full-service technology solutions include
RESULTS Information Technology Administration (RITA™)
, a family of Managed Services that provides clients with the peace of mind that their network and the invaluable data it holds are properly maintained and secure. All of RESULTS’ services are delivered with a consultative approach and supported by their own in-house expert team of engineers. RESULTS Technology is one of only a few IT companies in the region who have an
SSAE16 certification.
This certification is the gold standard for service organizations and ensures that the firm’s controls have been strictly assessed by a third party auditor. Headquartered in Lenexa, Kansas, RESULTS Technology is consistently ranked as one of the best IT firms in both Kansas City and St. Louis. The firm was named one of the Top 25 Small Businesses in 2014 by ThinkingBigger Media. For more information, visit http://www.resultstechnology.com
or call 913-928-8300.

Topic Articles, General
January 14th, 2016

Productivity_Nov30_BWe know, we know; sometimes there just aren’t enough hours in the day to get everything done. More than ever before our busy personal lives and hectic working ones are demanding more and more of our attention and even the best laid plans and good intentions can get waylaid by a sheer lack of time. If you’re constantly under pressure to get things done and are starting to feel like you’re drowning, take a look at the following productivity tips.

When it comes to business, competition is fiercer than ever: you might have rivals undercutting your prices, you could be a bricks and mortar store pressurized by internet-based sellers, or perhaps you’re struggling to get a grip on your processes, marketing plans or even employees. By upping your efficiency stakes, working in a more agile fashion, and simply getting more work done more quickly, you could find that you’re holding the key to solving your problems.

Your issues with productivity might be personal, or they may well stem from your staff. As a small or medium-sized business owner or manager, you can’t afford to sit back and let your own inertia or disorganization, or your employees’ lack of dynamism, drag your company down. Take action and start getting to grips with your workload and help your business get 2016 off to a far more efficient start.

Take time out first thing

Okay, admittedly taking ‘time out’ sounds counterintuitive for increasing productivity, but hear us out. By taking a few minutes at the start of every morning, you’ll be getting the day off to a calm and orderly start, thereby increasing the chances of you being more productive, as opposed to running around like the proverbial headless chicken for the rest of the day.

Part mindfulness and part preparation, begin by emptying your head of any thoughts. Be in the moment and spend a minute or two breathing deeply. Next, consider the things most playing on your mind in relation to what needs to be done either today or in the near future. Jot them down on a piece of paper, followed with a short outline on how you are going to tackle them. Then set your mind to going forth and making those resolutions happen, one by one.

Quit multitasking

Some reports say that multitasking can negatively impact on your productivity by as much as 40 percent. When we’re taking on more than one task at a time, the perception is that we’re killing it productivity wise and getting loads done. The reality is that we’re spending the majority of the time jumping from one thing to the next and not fully focusing on any of them.

You need to exercise willpower to commit to ‘singletasking’ but before long it should come as second nature. Pick one thing that you are going to work on and stick to it until you have finished, or at least done everything you can for the time being. This includes not checking your email during that time – surely one of the biggest productivity sappers of all time. If the temptation is too strong, log out of your inbox on your computer, and set your phone to silent if you have audible alerts configured. If you’re worried you’re going to overlook something during this time period, use an online or physical notepad to note down spur of the moment thoughts or ideas.

Reassess your working hours

It’s no secret that the traditional 9 to 5 is on the way out. Being connected and contactable around the clock is putting paid to that, but is being constantly online actually counterproductive? How effective are you really at 11pm at night when you’re slumped in front of The Walking Dead with a beer and a spreadsheet full of data?

Take a tip from the latest round of startups that are taking a sledgehammer to the idea that we need to work around the clock, and are instead turning the working week on its head. The CEO of one rising startup has gone as far to institute a five-hour workday that runs from just 8am to 1pm, taking into account that studies show people are more productive earlier in the day. The theory goes that making people sit in an office for 8 hours a day, whilst giving them ample time to be productive, equally gives them just as many hours to waste time. A shorter working day could instill a greater sense of urgency in employees, who in turn respect the company’s consideration of their personal lives and work harder.

Depending on your business, changing your working hours may not be practical, but it could still be food for thought - and adopting a singletasking approach and planning your day ahead calmly and clearly is achievable and will never hurt.

If you’d like to find out how implementing better IT and more efficient procedures can help you beat the productivity blues, get in touch with us today.

Published with permission from TechAdvisory.org. Source.

Topic Productivity