Blog

August 12th, 2015

By Mike Gilmore, RESULTS Technology Chief Technology Officer

As an IT Auditor with responsibility to assure information security, I’m often asked “what is the one thing that keeps you up at night that could result in a data breach?” My simple answer is “social engineering.” Television and the movies might lead you to believe that the world is full of hackers using sophisticated technology to subtly sneak through your defenses. But the truth is that the bad guys are using common internet features like email, social media and web sites to trick you into opening the door for them. Fortunately, there is something you can do to shore up your virtual walls against the attacking hordes. Read More








Topic Articles
August 10th, 2015

BusinessContinuity_Aug10_BEnsuring the implementation of effective business continuity planning (BCP) is an essential requirement for organizations today. Disasters strike at the most unexpected times and, when they do, you need to be prepared for the worst. While most organizations recognize the importance of BCP, their ability to execute a successful implementation is limited by certain challenges. With that said, we’ve listed some issues you need to be aware of, and what you can do about them.

Challenge #1: Prohibitive costs

Business continuity planning has become exponentially expensive as availability requirements increase. Many solutions require substantial investments on the installation and maintenance of additional hardware, software, and data center infrastructure. These requirements drive up the cost of business continuity, and many company owners are reluctant to invest in protective measures.

The solution Instead of relying on costly physical servers to accommodate your backups, consider using efficient and affordable cloud computing solutions. You can transfer your important business files to the cloud and eliminate the expense of having to install and manage hardware infrastructure and software licenses.

Challenge #2: High complexity

Traditional business continuity planning is complex to implement, manage and execute. From managing the recovery infrastructure to updating disaster recovery documentation and testing the BCP to find and close potential loopholes, the prospect of embarking on a BCP project can be daunting, and the whole experience can prove time consuming. Combine with the pressure of your ordinary day-to-day duties, it can seem almost impossible to focus your attention on initiating a BCP.

The solution With all this in mind, it makes more sense to hire a professional IT service provider to plan, implement, and execute your business continuity plan. This way you can leverage their experience and expertise to ensure that, in the event of a disaster, your company will be able to get back on its feet and resume business operations as quickly as possible.

Challenge #3: Lack of staff involvement

There are so many requirements to be considered in a business continuity plan. And the more employees your organization has, the more difficult it is to relay the essence of the plan for everyone to understand. Staff involvement isn’t an option - it’s an absolute necessity if you wish for a successful BCP implementation!

The solution Depending on the size of your organization, you can either hold a company meeting to announce the essentials of your BCP, or schedule a meeting with key staff members who take an active role in the planning process. To create a long-lasting BCP program, you need to get everyone on the same page by emphasizing the importance of the plan in an easy-to-understand way.

Business continuity planning is one of the most important things you need to have in place. You never know when, or in what form, a disaster will strike - all the more reason to take a preventative approach to securing your company and all you’ve worked for.

Need a reliable partner to take care of all your business continuity planning needs? Get in touch with us today - we have exactly what you need to prepare and protect your company.

Published with permission from TechAdvisory.org. Source.

August 6th, 2015

MobileGeneral_Aug04_BSiri, Google Now and Cortana are just three examples of the growth in the use of artificial intelligence that has come about in recent years. They are powered by one element of artificial intelligence, known as Natural Language Processing (NLP). NLP involves a computer turning verbatim human language into useful analysis, and its role in the various devices we now use is increasing all the time. Here’s what you need to know about NLP.

There’s more to Natural Language Processing than voice recognition

Voice recognition might be among the most well-known practical uses of NLP in the technology we encounter in everyday life - but that likely has more to do with the popularity of the services that employ it, like Siri, Google Now and Cortana, than the merits of voice recognition in comparison to other NLP functions that tend to stay out of the limelight.

Truth be told, there’s a whole lot more to artificial intelligence than NLP. In fact, NLP is more effective in analyzing text data than it is sounds, which is precisely why digital assistant apps first use voice recognition to turn your commands into text data, and then use other NLP capabilities to search online for related information.

Natural Language Processing has already moved beyond its infancy

It’s tempting to believe that elements of artificial intelligence like NLP are still in the realm of the sci-fi movies, and that they are a long way from being useful to the technology we use in our everyday personal and business lives. It’s tempting, but further from reality than you might realize. That said, it’s true that to date there has been no commercial use of NLP that has truly exploited its full capabilities; even its deployment in a recently launched project to automate customer service only really scratches the surface.

What is clear is the shape that future uses of NLP will need to take. We already know that NLP alone doesn’t always judge context well, since it needs to learn about its environment first - without turning to other sources, for example, one app employing NLP would struggle to differentiate between providing traffic information and diagnosing a health complaint. The key, at least for now, is to restrict the scope in which NLP operates - by limiting its use to a travel app, for instance, NLP could learn about the various travel arrangements you make and then devise itineraries for you.

It works with more than just large-scale data

While it’s undeniable that NLP can be put to great use in analyzing vast swathes of aggregated information, for example taking masses of social media data and being able to assess the feelings of users towards the subject in question, that’s not the limit of its capabilities. Contrary to popular belief, NLP can also be used to interpret much smaller-scale data in real time. This is where its true value comes into play in terms of being able to take natural-language user input, in an app setting for example, and make decisions that add value to our mobile experience.

Whether for automated customer service or comprehensive sales applications, it’s clear that Natural Language Processing - and other aspects of artificial intelligence - hold the potential to be of value-adding benefit to the business world in the near future. It’s an area that’s very much still in development - and so even more exciting, and important to watch - but now is the time to discover how best to implement NLP technologies into your company. By getting ahead now, you can offer a customer experience that truly sets you apart from the competition. To find out how we can help you achieve just that, and at the same time maximize the value you drive from mobile technologies more generally, give us a call.

Published with permission from TechAdvisory.org. Source.

July 30th, 2015

164_Prod_ BHave you heard of Managed Services, but are still unsure of how they can help your business? Do you often hear IT providers trying to sell them with words and phrases like “productivity” and “more profits”? If you’re looking for a clearer description of just how Managed Services can increase your productivity, today is your day. Here’s the truth about how this common IT service can take your productivity levels to heights you’ve never seen.

Managed Services essentially amounts to preventative IT maintenance. What this means for your business is that little IT problems are nipped in the bud as soon as they bubble up, and before they have a chance to compound into much bigger, more costly ones. But before we delve deeper into how this increases your business’s productivity levels, it makes sense to look at the history of this service and the role of “preventative maintenance” in our culture.

Why preventative maintenance matters

Managed Services have been around for decades. But despite this, many businesses have been slow to catch on. And really, is it all that surprising? Preventative maintenance is not exactly a priority in mass culture. Whether you hire a mechanic to replace a catalytic converter, a plumber to repair a leaky pipe or doctor to correct your coronary heart disease, many of these oftentimes preventable problems have been culturally accepted as commonplace. Yet people are so used to the mindset of thinking “everything is okay until it’s not”, which is really where the true problem lies.

Additionally, when preventable problems are ignored long enough to the point they explode into emergency repairs, your wallet almost always suffers. This is just as true for a network crash to your business’s IT infrastructure as it is for a trip to the emergency room for a neglected health problem.

Because Managed Services prevent catastrophic IT repairs that surprise you out of nowhere, your bottom line will enjoy long-term savings. Along with this, you’ll also get a significant bump in your productivity levels.

How does Managed Services boost productivity?

To answer this question, it makes sense to look at a fundamental principle of productivity - focus. Imagine if you’re trying to complete a new marketing strategy for the next quarter. You’re doing some research, compiling a list upcoming networking events and trade shows to attend, when suddenly you’re disrupted by an urgent phone call. After you’re off the phone, you return to your research, and then your secretary bursts in with an handful of vendor invoices you need to sign off on. As these disruptions continue to pile up, what happens if your IT breaks down and you’re unable to use your computer? Basically, you don’t get anything done during the day. You become stuck.

When it comes to IT, Managed Services take preventative measures to ensure your IT is always running at its optimal level, so that you don’t suffer technology breakdowns or distractions that blow your focus - preventing you and your staff from getting any work done. Smooth running IT won’t resolve all your productivity problems, such as your staff focusing more on Facebook or their phone rather than their work, but it will resolve all of those that relate directly to technology. No longer will your business be held down by daily computer disruptions and associated repairs, and instead you and your staff can move forward and focus on growing your business. That is the beauty of Managed Services. More productivity, focus and growth for your entire organization.

Have more questions about Managed Services? Give us a call today. We’re happy to provide you the information you need.

Published with permission from TechAdvisory.org. Source.

Topic Productivity
July 28th, 2015

BusinessValue_July28_BWhen it comes to increasing your employees’ efficiency and productivity, technology can provide countless opportunities to streamline workflows, eliminate redundant processes and reduce costs within your organization. If you’re looking to stay ahead of the competition, you need to ditch the traditional ways of working and implement technology to your practices to encourage more employee productivity - here’s how.

Change office communication

In order to increase efficiency, set up instant messaging software such as Skype on your employees’ workstations. This allows them to send instant messages to correspondents instead of having to get up from their desks to see whether the person is available. Of course, if you need to discuss big projects or issues, face-to-face communication is likely the best choice. But you can simply send a quick message for more trivial conversations, saving precious minutes and allowing you to get more work done.

Install video conferencing

Traveling to offsite meetings and training sessions takes time and, all too often, time spent on the road is time lost. Rather than commuting for hours outside your office, opt for a networked phone solution that offers video calls and conferencing. This way you can hold a video conference to discuss business matters from the comfort and convenience of your office. You can also take things up a notch and equip the conference room with tools to pull up documents and have them displayed on a big screen, so that everyone in the meeting can follow the conversation with ease.

Upgrade workstations

Outdated technologies and workstations limit your business’s progress, and are a hindrance to developing clued-up, efficient employees. Aging phone systems and slow networks can frustrate your team and bring productivity to a standstill. So it’s important to take the time to assess your current workstations, applications, hardware, and tools. This doesn’t mean that you have to buy a set of entirely new workstations. But you should replace obsolete equipment with more up-to-date machines. In addition, make sure all software and applications are up-to-date to ensure maximum efficiency and employee satisfaction.

Implement ERP software

Enterprise Resource Planning (ERP) is business process management software that allows organizations to automate processes and centralize data in order for employees to collaborate more efficiently. ERP software provides employees with up-to-date business information that they can easily access and make use of. What’s more, ERP also eliminates redundant data entry and reduces the number of spreadsheets that are used to record critical business data, by storing information in a centralized database.

To get the maximum return on your technology investment, it’s also important to partner with a knowledgeable and reliable service provider. Get in touch with our tech experts today to find out how we can implement technology to help your employees become more efficient and productive.

Published with permission from TechAdvisory.org. Source.

July 27th, 2015

Through a recent merger with Visionpace-IT, RESULTS Technology has hired six additional team members and we’ve hired a summer intern. Every one of our new professionals bring a deep technical acumen to the company. Their combined abilities will play a pivotal role in helping us bolster our customer service.

Joining the RESULTS Technology team are:

Russ Swall, Client Retention Manager
Russ comes to RESULTS Technology with more than 40 years of technology and business leadership experience. Prior to joining the company, he was President and CEO of Visionpace-IT, a Managed Service Provider in Independence, Missouri. Swall also owns Visionpace, a software development firm specializing in Agile software methodologies and techniques.



Bill Risenhoover, Technology Engineer
Bill is focused on enhancing RESULTS proactive customer service experience and will lead the company’s technicians. Bill comes to RESULTS with more than 20 years’ experience in Management Information Systems. Prior to joining RESULTS, he was Visionpace-IT’s Operations Manager. He was also with Sprint for several years and was a UNIX Engineer for Wal-Mart in Bentonville, Arkansas. Bill has a Bachelor of Science degree in Management Information Systems from the University of Arkansas.


Adam Hurshman Service Technician
Prior to Visionpace-IT, Adam worked at Sprint, Gateway, and Yellow Freight. He is a Microsoft Certified Professional (MCP) and co-owned Your Mobile IT, a mobile technology development firm in Kansas City.





Michael Mathia, Service Technician
Prior to Visionpace-IT, Michael was the CEO and Lead Technician at Hypertech Computer Solutions in Derby, KS. He is a Microsoft Certified Solutions Expert and a graduate of Wichita Area Technical College.





Jason Renno, Field Engineer
Jason is also an instructor at ITT Technical Institute. He was also the IT Manager there and spent 15 years at Capital Electric Companies. He is a graduate of DeVry Institute of Technology.





Kelly Troxell, Administrative Assistant
While with Visionpace-IT she was responsible for answering the Service Desk and routing calls as well as office management. She has a Bachelor of Science in Business Administration from Central Missouri State University.






Matt Wilderson, Service Desk Summer Intern
Matt is currently a sophomore majoring in computer science at Kansas State University. He is with us for the summer.






Topic General
July 22nd, 2015

164_Sec_BSince many of us out there have been using the internet for decades, it’s likely that most of us have had our systems infected by malware at one point or another. But how many of us actually know what the differences are between malware, viruses, trojans, and other online threats? For those without a clue, here’s a description of four of the most common ones and the security measures you can take to keep your business protected.

Malware

Malware is the short version of the word malicious software. And this is a general term that encompasses many types of online threats including spyware, viruses, worms, trojans, adware, ransomware and more. Though you likely already know this, the purpose of malware is to specifically infect and harm your computer and potentially steal your information.

But how do the different types of malware differ from one another? How can you protect your business from them? Let’s take a look at four of the most common forms of malware below.

Virus - like a virus that can infect a person, a computer virus is a contagious piece of code that infects software and then spreads from file to file on a system. When infected software or files are shared between computers, the virus then spreads to the new host.

The best way to protect yourself from viruses is with a reliable antivirus program that is kept updated. Additionally, you should be wary of any executable files you receive because viruses often come packaged in this form. For example, if you’re sent a video file, be aware that if the name includes an “exe” extension like .mov.exe, you’re almost certainly dealing with a virus.

Spyware - just like a spy, a hacker uses spyware to track your internet activities and steal your information without you being aware of it. What kind of information is likely to be stolen by Spyware? Credit card numbers and passwords are two common targets.

And if stealing your information isn’t bad enough, Spyware is also known to cause PC slowdown, especially when there is more than one program running on your system - which is usually the case with a system that’s infected.

A common mistake many people make is they assume their antivirus software automatically protects them from Spyware. This is not always true as some antivirus isn’t designed to catch spyware. If you’re unsure if your antivirus prevents Spyware, get verification from your vendor. And for those that are already suffering from Spyware infestation, two programs that work wonders to clean it out are Malwarebytes and SuperAntiSpyware.

Worms - similar to viruses, worms also replicate themselves and spread when they infect a computer. The difference, however, between a worm and a virus is that a worm doesn’t require the help of a human or host program to spread. Instead, they self-replicate and spread across networks without the guidance of a hacker or a file/program to latch onto.

In addition to a reliable antivirus software, to prevent worms from infecting your system you should ensure your firewall is activated and working properly.

Trojan - like the trojan horse from ancient greek mythology, this type of malware is disguised as a safe program designed to fool users, so that they unwittingly install it on their own system, and later are sabotaged by it. Generally, the hacker uses a trojan to steal both financial and personal information. It can do this by creating a “backdoor” to your computer that allows the hacker to remotely control it.

Similar to the other malware mentioned above, antivirus software is a dependable way to protect yourself against trojans. For further safety, it’s wise to not open up suspicious attachments, and also ensure that your staff members aren't downloading any programs or applications illegally at the office - as this is a favorite place hackers like to hide trojans.

Curious to learn about other common malware that can cause trouble for business owners? Want to upgrade your existing network security system? Give us a call today, we’re sure we can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
July 21st, 2015

BusinessIntelligence_Jul21_BData visualizations, when done properly, are the best and easiest way for us to understand a vast amount of information. Businesses are able to utilize data visualizations to great advantage, from summarizing annual sales report to visualizing marketing strategies in an easy-to-understand format, and much more. A poorly presented visualization, however, can not only show misleading information, but it might also confuse business users into making wrong decisions. Make sure you don’t fall victim to these common data visualization mistakes.

Inconsistent visualizations

It’s important to be consistent when presenting your data, otherwise users will have to stop and figure out how to read each new picture before they can comprehend what it says, wasting time and defeating the purpose of data visualization. Luckily, there are some best practices you can follow. For instance, try choosing colors that go well together. Use only 2-3 colors at most throughout your visualization - any more and you’ll find that your pictures might be hard to read. Also, use the same iconography and typography in each picture so your audience can quickly understand the information.

Displaying too much data

Overly complicated data visualizations are sure to turn off most audiences because they can’t figure out where and what to focus on. Your customers, colleagues, and employers want specific, relevant answers. The quicker you can deliver those answers, the better. Irrelevant data gives your presentation a cluttered look, making finding relevant information more difficult for readers. The solution? Find a compromise between showing too much data and not showing enough overall. Use good judgement.

Oversimplifying data

The purpose of data visualization is to present data in a way that’s easy to understand. While it’s all too easy to simplify data, if you go too far and leave out crucial parts, your audiences won’t be able to see or grasp the main point of the presentation. Instead of trying to oversimplify data, it’s better to include all important criteria and organize them into a structure so audiences can easily understand what’s being presented to them.

Choosing the wrong visualization

This is one of the most common mistakes made in data visualization. There are many different types of data out there, and each of those types require different analytics and tools to use. For example, if you want to present a sales growth comparison in the last 5 years, it’s better to use bar charts that can clearly show the difference at a glance. If you want to show a relationship between two metrics, on the other hand, you should use a scatter chart to show results.

The best way to avoid all these errors is to focus on your goals first. It’s likely that you’ll have to make changes along the way, which is actually a good thing, because it will make your presentation more accurate and effective.

Want to learn more about other business intelligence tools to implement in your company? Give us a call today.

Published with permission from TechAdvisory.org. Source.

July 15th, 2015

164_Prod_BPeople like to speculate about what the most disruptive productivity killers are in offices around the country, but do they really have a clue? It’s easy to point fingers at email, social media, or lack of discipline as sources of common distractions, but what are the real issues? In a survey of 2,175 hiring and human resource managers released by CareerBuilder last month, the true sources of lost productivity on the job are revealed.

Here are the top 10 productivity busters according to CareerBuilder’s June 2015 survey.

  1. 52% - Cellphones & texting
  2. 44% - Internet
  3. 37% - Gossip
  4. 36% - Social media
  5. 31% - Email
  6. 27% - Coworkers chatting
  7. 26% - Meetings
  8. 27% - Snack and/or smoke breaks
  9. 17% - Loud coworkers
  10. 10% - Sitting in a cubicle

Why are these findings a big deal?

According to the managers who took the survey, the consequences of these distractions can be pretty severe. A few examples they gave were lower quality of work, dissatisfied employees who have to pick up the slack of lower performers, missed deadlines, and even loss of revenue.

So how do you prevent these productivity killers from disrupting your business?

The chief human resources officer at CareerBuilder mentioned that one of the most effective ways to increase productivity is to simply take a break, which may come as quite a surprise since “Snack and/or smoke breaks” is listed as number 8 for productivity killers.

However, it should be noted that not all breaks are created equal. Listening to loud music or getting caught up in gossip on social media may not actually give employees the sense of rejuvenation they need when they return to work. They key is for staff members to take a break that will re-energize and give them a fresh focus. Some suggestions are to simply take a walk or perform some form of light exercise or stretching.

On a more humorous note, the survey also revealed some of the more unusual non-work activities employees partook in while on the clock. Employers reportedly found their staff doing everything from taking a nap on the CEO’s couch, searching for a mail order bride, and even taking a sponge bath in the restroom sink.

Want more tips on how to boost employee productivity. Curious to see how technology can help? Send us a message today.

Published with permission from TechAdvisory.org. Source.

Topic Productivity
July 8th, 2015

164_Sec_BA picture is worth a thousand words - and now a selfie may even be worth more. Later this year, MasterCard plans to jump into the facial recognition-based trend of online security with an app that allows users to verify online purchases with a selfie. But is this technology secure? Will it replace traditional passwords for good? Here’s what you need to know.

At the beginning of this autumn, MasterCard will acquire the help of 500 customers to test out a new application that enables people to verify their identity and authenticate online transactions with a facial scan. What does this mean? Instead of using a traditional password at the online checkout, MasterCard wants to give you the option to snap a selfie instead. According to the credit card giant, they’ve partnered with every smartphone company in the business to make this mode of identity verification possible.

Why is this happening?

A quote from Ajay Bhalla, security expert at MasterCard, suggests this is an attempt by the credit card giant to appeal to a younger crowd of digital natives. "The new generation, which is into selfies...I think they'll find it cool. They'll embrace it," Bhalla recently said.

That said, the “cool” appeal to youth is likely not the only reason for this change. The firm is likely attempting to make online purchases both more secure and more convenient.

How it works

To use this technology, users will have to download a dedicated app, which they can then use to take a photo of themselves at checkout. But how does MasterCard prevent a thief from using a photo of you to fake your verification? Simple - the app requires you to blink to prove that you’re a living, breathing human being.

However, it’s been noted by critics that, in today’s technological world, even a blink can be animated on a static photo. This leaves those of us with security concerns wondering whether MasterCard will make this app more secure before it’s released.

Note as well, though, that MasterCard is not getting rid of traditional passwords completely. Users will still have the option of the more conventional method of verification, as well as the choice of fingerprint scanning to check your identity.

Is this where the future of online security is headed?

With the release due later this year of a similar Windows 10 security application to identify users using biometrics, it appears that this is where the future of online security is headed. And with ever more applications and online services requiring a password, it is becoming increasingly difficult for the average web user to create one that is both unique and secure for each individual service. So whether it’s facial recognition, a fingerprint scan or some other technology that’s yet to be perfected, it seems as though some sort of more advanced security solution is inevitable.

Want more of the latest security news? Looking to implement new security to protect your IT infrastructure from cyber threats? Get in touch today.

Published with permission from TechAdvisory.org. Source.

Topic Security