Categories
Industry Insights IT Solutions Managed IT Services

CIOs are going beyond the IT Department

 

Over the years, successful CIOs have been shifting their focus from the back office to the front office.  This is where marketing, sales and customer service are the face of the company.  This is the new CIO, the business leaders that go beyond the IT department.

The new CIO works with all levels of the organization including clients therefore making IT more relevant than ever to the overall business strategy for growth and profitability.  IBM released a worldwide study that included over 1,600 CIOs from 20 different industries.  Approximately 60% of the CIOs are focusing on projects that ultimately serve to improve the overall customer experience.  The study shows that most CIOs are spending most of their time on tactical issues while the majority would rather be spending their time on strategic initiatives within the next three to five years.

 

So what is the new CIO looking at?

 

Mobile Computing Impact

The majority of companies out there are running a good portion of their business from a smart device. There are many things to look at such as entire workflows, training processes and IT policies in order to ensure uptime and security.  This all falls on the CIO to coordinate, plan and execute with multiple departments including the IT department.

 

Tech Support Help Desks

Since the new CIO is focused on the big picture, there still is an IT infrastructure that needs to be maintained using a proactive approach such as Managed IT Services providers.   Using economies of scale, many CIOs are finding it much easier to outsource their Tech Support Help Desk to a third party Managed IT Services provider or IT Support Services provider.  This takes a large responsibility of the CIOs plate and puts it in the hands of a trusted IT partner.  Many CIOs are outsourcing the services however they are using local partners

 

These are only two areas that the new CIO is looking at in order to meet their goals.  CIOs will be the forefront of many new companies however they are going beyond running the IT department.

 

365 iT SOLUTIONS is a leading IT consulting firm in Toronto. We provide industry leading Managed IT ServicesIT Support ServicesIT Outsourcing ServicesTech Support Services and Cloud Services.

Take advantage of our Complimentary Network and Security Assessment by 365itSolutions.com

Categories
Industry Insights IT Solutions Managed IT Services

Google Tricks You Do Not Know

Want to learn some interesting Google tricks?  There are many Google tricks out there however here are some Google tricks that will help you get the most out of Google.

Here is a list of some cool unknown Google Tricks:

  • Search in a website – If you are looking for in a specific information within a website simply follow this simple step. For example, if you wanted to search “365itsolutions” for information on the “cloud”, all you have to do is type “cloud site:365itsolutions.ca”
  • Search by file type – You can search for specific types of files by adding “filetype:” and the 3-letter file abbreviation. For example, “cloud filetype:doc”
  • Include or ignore words – If certain words are essential to your search, such as “the” or “and,” you can highlight them by putting quotation marks around them. You can also use the minus sign to specify particular items that you don’t want in your results. For example type “cloud –your data” would exclude the word “your” from the search.
  • Find related pages – If you find a website you really like, you can search for similar pages by typing “related:” in front of the web address. For example, if you wanted to search for websites similar to 365itsolutions, you would just have to type “related:365itsolutions.ca” and you will be shown a range of related websites.
  • Similar terms – Google can generate results that include synonyms by placing the “~” sign immediately in front of your search term. So, for example, a search for “wearable ~devices” will also return results for “wearable technology.”

So now that you have access to these Google tricks, go have some fun online.

__________________________________________________________________________________________________

365 iT SOLUTIONS is a leading IT consulting firm in Toronto. We provide industry leading Managed IT ServicesIT Support ServicesIT Outsourcing ServicesTech Support Services and Cloud Services.

Take advantage of our Complimentary Network and Security Assessment by 365itSolutions.com

Categories
Industry Insights IT Solutions Managed IT Services

You Have a Weak Password

IT professionals know it, Security experts know it and even hackers know it.  Your weak password are the weakest link in any IT infrastructure.

In a recent study, there have been some interesting numbers regarding weak passwords.  Over 40% of the population have had their passwords stolen at some point using multiple methods such as keylogging software.   Over 90% percent of passwords are vulnerable to hacking due to weakness.  Approximately 54% believe in the security of IT systems that rely on passwords alone.

The study also showed some places that people store their passwords including writing them on the keyboard in permanent marker or using a sticky note.

So how do you address a weak password?

There are multiple secure alternatives out there including password managers that can create long complex credentials.  Many new systems also include stuff as biometrics including fingerprint and facial recognition.  Try to keep it at least eight characters long and it does not contain your user name, real name, or company name.  Also, try not to use a complete word and do not repeat a password. Finally, ensure it contains characters, number and different case for characters.

LastPass is a good password manager and offers a wealth of multifactor authentication options. It is also an Editors’ Choice from PCMag.com but there are multiple other highly recommended software suites.

Remember, your weak password will put you and your business at risk.

 

365 iT SOLUTIONS is a leading IT consulting firm in Toronto. We provide industry leading Managed IT ServicesIT Support ServicesIT Outsourcing ServicesTech Support Services and Cloud Services.

Take advantage of our Complimentary Network and Security Assessment by 365itSolutions.com

We are Tech Support Toronto!

Categories
Industry Insights IT Solutions Managed IT Services

Remove Personal Data from Your Old Computers

So you purchased a new system, congrats!  The problem is that it creates a new challenge.  What do you do with your old PC and how do you remove your personal data?

The challenge is how you remove 100% of personal data.  Unfortunately, deleting your files, folders and emptying the recycle bin does not eliminate the data.  This just hides your files from the operating system until they’re overwritten.

So how do you remove personal data?

Simple, follow these four steps and your will completely erase everything on your old computer.

  1. Backup

You need to backup all files, folders and other data you want saved from your computer to an external hard drive or online backup service.  This will make transferring to your new system simple.

  1. Trade-in Program

Companies that offer trade-in programs will help remove personal data.  They will ensure that your old computer is wiped 100%.  Before selecting a company, verify that the company is reliable and trustworthy before allowing them to remove personal data from your old system.

  1. Re-install Windows

The easiest way to remove personal data is to re-install Microsoft Windows.  This will not only remove personal data, it will be removing all personal files, apps and any information you have stored.

  1. Third Party Programs

By following the steps above, this will ensure that you have removed personal data from your old computer.  If you would like to go the extra step, you can always use a third party program such as McAfee Shredder.    The tool will permanently delete and overwrite items you no longer need to ensure the information can’t be recovered.

 

365 iT SOLUTIONS is a leading IT consulting firm in Toronto. We provide industry leading Managed IT ServicesIT Support ServicesIT Outsourcing ServicesTech Support Services and Cloud Services.

Take advantage of our Complimentary Network and Security Assessment by 365itSolutions.com

 

Categories
Industry Insights IT Solutions Managed IT Services

Risk Online: Canadians at 30%

A recent survey shows that over 30% of Canadians are not protecting themselves and putting themselves at risk online.  The disturbing part of the survey is that simple things that should not be happening any longer are still happening therefore increasing their risk online.

There are many items when addressing the risk online however there are simple things such as sharing passwords, connecting to unsecured Wi-Fi. Also, another risk is having unsecured Wi-Fi in their business or home.

The recent survey was conducted by Symantec and researchers polled 1,000 Canadians regarding their habits and risk online.

Here is a breakdown of the interesting results from the survey:

  • 30% of respondents bring their work home with them and use personal PCs to do it.
  • 30% of have no security software on their devices.
  • Over 65% have logged into public Wi-Fi within the last 30 days.
  • 23% of those polled share their work and banking passwords.
  • 25% of respondents have shared their personal email password.

How do you reduce risk online?

  • Passwords – Do not share your passwords and do not store them in your browser.
  • Wireless – Always use secure networks including home and business.
  • Updates – Ensure your systems is up-to-date including all software packages.
  • Secure Passwords – Store all passwords and login information in a secure area or use a password manager.

To view the complete study, please click here to visit the Symantec website.   The online risk study is based on data from the Symantec Global Intelligence Network and security experts around the world.

365 iT SOLUTIONS is a leading IT consulting firm in Toronto. We provide industry leading Managed IT ServicesIT Support ServicesIT Outsourcing ServicesTech Support Services and Cloud Services.

Take advantage of our Complimentary Network and Security Assessment by 365itSolutions.com

Categories
Industry Insights IT Solutions Managed IT Services

Major USB Security Risk

 

Security experts have issued a warning regarding this USB Security Risk threat of a vast number of devices including sticks, keyboards and many other objects.

This USB Security Risk vulnerability is called “BadUSB” and means that hackers can now start using it to infect computers.

The upside is that vulnerability only affects one manufacturer, Phison.  The downside is that Phison USB sticks can infect any device.   The vulnerability works by modifying the firmware of USB devices, hiding malicious code in USB sticks and other devices in a way that’s impossible to detect.  Even completely deleting the contents of a USB stick wouldn’t get rid of the dangerous code.

“BadUSB” can be used to force computers into thinking that a USB device is a keyboard, allowing hackers to type whatever they like on your computer. Alternatively, it can replace legitimate software installed on a computer with a corrupted version that hackers can use to control a computer. Another use for the exploit is monitoring all internet traffic through a computer, allowing a hacker to spy on what you’re doing.

How it does spread?

The BadUSB malware spreads from an infected USB device to a computer, and from an infected computer to a USB device.  Now it is possible for hackers to start infecting people using the malware.

 

 

365 iT SOLUTIONS is a leading IT consulting firm in Toronto. We provide industry leading Managed IT ServicesIT Support ServicesIT Outsourcing ServicesTech Support Services and Cloud Services.

Take advantage of our Complimentary Network and Security Assessment by 365itSolutions.com

We are Tech Support Toronto!

 

Categories
Industry Insights IT Solutions Managed IT Services

iOS 8 Plagued by Crashes

 

Were you one of the lucky ones that were first to update to iOS 8?  Well the complaints have been piling up for Apple Inc. all thanks to the continuous problems with iOS 8.

Apple has pulled the first update from iOS 8 and launched a second release that was supposed to fix some bugs on the OS but within minutes of its release, the complaints came flooding in, again.

For iPhone 6 users, Apples asks that you reinstall iOS 8.  The company offered users instructions for reinstalling iOS 8.0 through iTunes.

The highest crash rates for iOS 8 have been for older iPhones like the iPhone 5, 5C and 5S.  Apps on these machines crashed 3.3 per cent of the time.

It should be noted that the iOS 8.0.2 update was released just two days ago and has been installed by millions of iPhone and iPad users. It remains to be seen whether the demand on the update was just too much for Apple to handle as users still experience glitches.

 

__________________________________________________________________________________________

 

365 iT SOLUTIONS is a leading IT consulting firm in Toronto. We provide industry leading Managed IT ServicesIT Support ServicesIT Outsourcing ServicesTech Support Services and Cloud Services.

Take advantage of our Complimentary Network and Security Assessment by 365itSolutions.com

Categories
Industry Insights IT Solutions Managed IT Services

Introducing Windows 10 and Free Windows Insider

 

Do you hate Windows 8? Well you are not alone.  Windows was so unpopular that Microsoft has tried to address everything with the upcoming Windows 10.

When Windows 8 launched, our tech support team experienced an increase in IT support issues all resulting from the changes to Windows 8.

 

So what’s new in Windows 10?

  • Start Menu is finally back!

Since the beginning of time or since Windows 95, we have been programed by Microsoft to head to the Start Menu button.  Then when Windows 8 popped up, Microsoft changed the Windows and introduced the Start Screen which was a full-screen of tiles.

The Start Screen was developed touchscreens however it was very difficult to navigate for users keyboards and mice.  It is no surprise to see Microsoft bring back the Start Menu in Windows 10 plus now they have integrated it into Live Tiles.  There is also a new feature will also switch up the Start button functionality depending on if you’re using your computer with a tablet or with a keyboard and mouse.

  • Windows 8 Apps can now run in Windows

Windows 8 apps ran in a full screen mode which it made it difficult to use Windows 8 apps alongside traditional desktop Windows apps.  Now with Windows 10 you can organize those apps just like any other Windows software.  You can have title bars and you can resize them.

  • Windows 10 is capable of multitasking

Several features in Windows 10 are for multitaskers.  Task view will let you set up different desktops for different uses so you can now have a profile for school or work.  The Start Menu search bar is more powerful by integrating with web searching and command lines.  Many companies never moved off Windows 7 they has a better workflow.

  • Microsoft wants market share and cares what you think!

Microsoft is finally listening to users.   They are now introducing Windows Insider Program which will allow you give you access to a preview build of Windows 10.   Microsoft will also allow you to send feedback about your experiences.  You can watch Windows VP Joe Belfiore on YouTube talk about Windows 10 features like the new Start menu, multiple desktops, and improved multi-tasking.  You can also learn how you can be part of Windows Insider Program. Click here for the video.

__________________________________________________________________________________________

365 iT SOLUTIONS is a leading IT consulting firm in Toronto. We provide industry leading Managed IT ServicesIT Support ServicesIT Outsourcing ServicesTech Support Services and Cloud Services.

Take advantage of our Complimentary Network and Security Assessment by 365itSolutions.com

Categories
Industry Insights IT Solutions Managed IT Services

How to Control IT Projects Costs

Many companies have to manage the bottom line while maintaining their IT budget.  There are many factors to consider including an understanding of the IT costs, aligning IT spending with business strategy and viewing IT expenditures as investments to increase business procedures and processes.

There are two factors to consider when looking at IT budgets and IT projects.

  1. Estimating what a project delivery will cost.
  2. Controlling costs during the project and after the delivery.

Here are some methods that will help predict and manage costs in any IT project you have planned.

 

Control Baseline Costs

Baseline costs is nondiscretionary money spent maintaining IT infrastructure.  These are the bare costs required to keep your IT infrastructure operating daily.  Baseline costs average 70% of all IT spending for the average organization.  These costs tend to rise over time due resulting in less money for discretionary project work.   This actually gives the appearance that IT costs are rising while the value derived from IT investments stays the same or actually goes down.

Good news is that baseline costs can be easily controlled using a couple of steps:

  1. Renegotiate vendor contracts
  2. Re-examine service levels
  3. Manage assets effectively
  4. Consolidate servers
  5. Maintain a solid IT infrastructure

By following these simple five steps, you can lower the percentage of the IT budget allocated to baseline costs and keep them in line and not over doing your IT budget.

 

Understand Long-term IT Costs

Ongoing application costs are about 40% to 60% of the original development cost for each year in a life cycle. The costs result in application support, maintenance, operations, software licenses, infrastructure, and allocated help desk.  Controlling these ongoing costs is critical.  You should collect and maintain information about all new development work underway.  With your IT consultants, communicate effectively and keep the lines of communications open. Always keep historical record of all costs on the project.

 

Implement Short-term Cost Cutting

Try to postpone capital purchases or negotiate better costs from trusted vendors.  Always control project scope of work and come to agreement with your IT consulting partner.  Control spending.  You should use external consultants to fill a knowledge gap or fill a resource gap on the project.

 

Implement Long-term Cost Cutting

Be strategic when it comes to your IT infrastructure.  You have to eliminate duplicate processes and systems while eliminating unnecessary costs in the process.  Reprioritize your IT projects on a regular basis and outsource selectively.

 

Quantify Your IT investments

Always evaluate your IT infrastructure.  IT exists to support your business processes and productivity.  IT allows you to reach your strategic goals.  IT infrastructure will improve operating efficiencies and productivity.

__________________________________________________________________________________________

365 iT SOLUTIONS is a leading IT consulting firm in Toronto. We provide industry leading Managed IT ServicesIT Support ServicesIT Outsourcing ServicesTech Support Services and Cloud Services.

Take advantage of our Complimentary Network and Security Assessment by 365itSolutions.com

Categories
Industry Insights IT Solutions Managed IT Services

365 iT SOLUTIONS on BNN and CTV regarding Shellshock virus

Are you worried about the Shellshock virus bug? You should be if you want to protect yourself and business.

Eric Neufeld, Technical Services Manager from 365 iT SOLUTIONS, has been featured on the BNN and CTV regarding the latest threat “Shellshock virus” bug.

 

  • Business Network News (BNN) video: “Thwarting cyber-attacks, the rising importance of Chief Information Officers.

Click here for full video on Business Network News (BNN).

 

  • CTV News video: “Shellshock virus bug: How can you protect yourself?”

Click here for full video on CTV News.

________________________________________________________________________________

Limit your exposure

Because cyber security experts are still trying to figure out Shellshock virus and the full scope of the threat remains unclear.  The biggest threat it poses right now is to servers because it affects the operating system on which they run: Linux.  If a server is being hacked, there’s not much a layperson can do about that aside from using security best practices, like using a password manager to keep different passwords with different web services.

365 iT SOLUTIONS is a leading IT consulting firm in Toronto. We provide industry leading Managed IT ServicesIT Support ServicesIT Outsourcing ServicesTech Support Services and Cloud Services.

Take advantage of our Complimentary Network and Security Assessment by 365itSolutions.com