The 3 Biggest Problems New Orleans and Northshore CEOs Have With Most IT Firms

The 3 Biggest Problems New Orleans and Northshore CEOs Have With Most IT Firms
If you are a highly successful, results-oriented CEO who wants to focus your time, energy and money on growing your company, but find yourself constantly distracted and slowed down by chronic computer problems and incompetent IT support, then you probably don’t need us to tell you how frustrating that is.

Our research shows that most successful New Orleans and Northshore CEOs have 3 big problems when dealing with most IT support companies. See if you agree…

Problem #1: You Have Constant Technical Problems.
Maybe you’ve experienced this yourself: you hire a so-called IT expert to support your computer network, but every time they “solve” a problem, two more crop up. Or the problem they were supposed to have solved keeps coming back again and again. Then, to add insult to injury, they don’t check their work, they keep charging you to come back and repair the same issues or they waste your time trying to explain why the problem is happening instead of just taking care of it.

Problem #2: They Don’t Understand How Critically Important Your Time Is.
If you’re like most busy executives we work with, you’re the most important player on the team, with multiple time-sensitive projects and critical deadlines that can NOT be missed, yet most computer guys don’t seem to understand this. When you call their office, you get voice mail. When they finally get around to calling you back, they waste your time with a million dumb questions and walking you through a number of mind-numbing tasks (like rebooting), wasting even MORE of your time while they try to get a clue. If they can’t fix your computer that way, then you have to wait around for them to show up, take it back to their office, fix it and bring it back – a process that could take days. Meanwhile, your blood pressure is going through the roof because you need to get back to work.

You shouldn’t have to tolerate this type of poor service. Our stance is that you shouldn’t be having those kinds of issues in the first place. Second, when you DO have a problem, it should be addressed IMMEDIATELY – not hours or days later.

Problem #3: Poor Communication And Service.
From arrogant technicians who talk over your head to zero communication on the status of your requests and projects, another BIG problem many business owners have with their IT person is poor communication skills. On top of that, NONE of them seem to understand basic business concepts and want to have a conversation about the technical details rather than just getting it done.

Imagine being able to just tell your consultant what you’re trying to achieve in your business and they make it happen – and provide REAL value by advising you on how to make those outcomes happen faster, cheaper and with less effort.

I hope you will find this post informative and useful. I am looking forward to hearing your comments. That’s all I have for today, until next time make it a great day!

Posted in Uncategorized | Tagged , , , , , , | Comments Off

What You Must Do to Increase the Value of Your Growing Firm

What You Must Do to Increase the Value of Your Growing Firm

This month, I am recommending that all business owners and top executives read Verne Harnish’s book “Mastering the Rockefeller Habits”.

Last month I was honored to hear Mr. Harnish speak live about The Most Powerful, Proven Way To Secure Rapid, Profitable Growth For Your Business. I took so many notes and gained lots of valuable information. I have already started to implement some of his ideas at Ener Systems. I wanted to share Mr. Harnish’s book with all of you. I know you will take away many great ideas that you can implement.

Verne Harnish also has a website filled with many useful ideas. You should go check it out www.gazelles.com .

I hope you will find this post informative and useful. I am looking forward to hearing your comments. That’s all I have for today, until next time make it a great day!

Posted in Uncategorized | Tagged , , , , , , , , | Comments Off

The Single Most Dangerous Assumption Businesses Make About Bank Security That Can Cause Them To Lose ALL Their Money

The Single Most Dangerous Assumption Businesses Make About Bank Security That Can Cause Them To Lose ALL Their Money

Here’s a shocker to most business owners: You’re bank often can NOT reclaim money stolen from your bank account due to fraud or cyber-crime. That means if money gets drafted from your business bank account from a hacker, phishing attack, identity theft or by any other means, you have little to no chance of getting it back.

This often comes as a surprise to businesses who think the FDIC will “save” them from getting their accounts wiped out, and can get the money back once taken. The reality is that the FDIC insurance is to protect you from bank failure, NOT fraud. So if your debit card or account information gets accessed by a hacker and you don’t notice it within the same day, you can pretty much kiss that money goodbye.

Recent studies have shown that 83% of small businesses take no formal measures against cyber threats even though almost half of all attacks are aimed at them.

Here are 5 essential steps you can take right now to protect your business:

1. Enforce A Strict Company Password Policy. This is a simple step, but it is still violated by many companies every day. Make sure that you and your employees change passwords regularly, don’t use the same password for all accounts and require complex passwords.

2. Set Up A Firewall. Small business owners tend to think that because they are “just a small business”, no one would waste time trying to hack into their network. The fact is that hackers will target the weakest link. Without a firewall, that “weak link” is YOUR company.

3. Designate A Banking-Only Computer. Banking fraud is one of the biggest threats to small business. The 2011 Business Banking Study showed that 56% of businesses experienced payment fraud (or an attempt at fraud) and 75% experienced account takeover and fraud online. By using a single computer solely dedicated to online financial transactions (no e-mail, web-surfing, Facebook, YouTube, etc.) it’s much harder for outsiders to gain access to your information.

4. Back Up Your Files Daily. It just amazes me how many businesses never back up their computer network. You can lose data as well as money in a cyber attack. Thanks to many new cloud based technologies, you can even schedule offsite backups to occur automatically. If the data in your business is important to you, make sure that you have more than one copy of it.

5. Educate Employees. You staff is the first line of defense AND your biggest security hole at the same time. Uneducated employees are one of the most common causes of data breaches. Make sure that they are aware of the do’s and don’ts for your company with regards to data security. 

I hope you will find this post informative and useful. I am looking forward to hearing your comments. That’s all I have for today, until next time make it a great day!

Posted in Uncategorized | Tagged , , , , , , , , , | Comments Off

9 Steps To Take Now To Be Certain Your Finances Are Protected Online

9 Steps To Take Now To Be Certain Your Finances Are Protected Online

Seems like we’ve been inundated over the past 6 months with rampant cybertheft. Target, Nieman Marcus, Yahoo and even mysterious $9.84 credit-card charges. Unfortunately, in the world we live in, this is most likely the norm going forward and not just a blip on the radar.

So, how can you stay protected online? While there is no way to absolutely, positively, 100% stay safe online, by taking these 9 steps, you will be as safe as possible.at night knowing you have a way to continue to operate when disaster strikes.

1. Only Shop On Secure Websites. Before you type your credit card into a website, ensure it is secure. Look for “https://” in the address bar of your web browser when you are checking out.

2. Avoid Financial Transactions Over Public Wifi. You can’t guarantee that free or shared WiFi access is secure. Ok to connect for browsing the web, but avoid financial transactions on these connections.

3. Use A Secure Network For Financial Transactions. Protect your computer with a firewall, antivirus and anti-spyware software.

4. Setup Banking Alerts For Unusual Or Large Transactions. Ask your bank to notify you of any suspicious or large transactions.

5. Use Credit Cards Instead Of Debit Cards. Most credit cards offer better fraud protection, plus if money is stolen from a debit card, then it has already left your bank account.

6. Pick Complex Passwords. Use phrase acronyms and keyboard combinations. Never use repeat passwords or words in the dictionary for your financial accounts.

7. Never Directly Answer Or Respond To An Email From Your Bank. Criminals have become very adept at appearing that they are a financial institution when they are not. Never rely on links in emails to access your financial accounts.

8. Install Available Security Updates On Your Computer, SmartPhone and Tablets. Many cybercrimes target known security holes on your computing devices. Stay up to date to stay secure.

9. Check Your Bank Balances And Statements Regularly. Good ol’-fashioned visual checks on your balances and a scan of your transactions are the best practice to be sure that nothing has slipped through the cracks.

I hope you will find this post informative and useful. I am looking forward to hearing your comments. That’s all I have for today, until next time make it a great day!

Posted in Uncategorized | Tagged , , , , , , , , , , | Leave a comment

Storm Season Is Upon Us…Are You Protected?

Storm Season Is Upon Us…Are You Protected?

Spring begins on March 20th! It’s not too late to prepare for those pop-up storms that occur randomly at this time of year often resulting in everything from ice damage to lightening fires. During this time of year the threat of fire, flood, severe storms, water damage from office sprinklers, and even theft is very real.

One of the most valuable assets for any company is its data. Hardware and software can easily be replaced, but a company’s data cannot!

As a reminder to all of our clients and friends, here are some simple things you should do to make sure your company is ready for any natural disaster.

1. Back Up Your Data Remotely! Everyone knows that data should be backed up on a daily basis, but many people still use in-house backup systems that will get damaged in a natural disaster or fire, and can easily be stolen. We recommend backing up all data to an off-site location, and we offer this as a service to our clients.

2. Use a Quality Surge Protector With Uninterruptible Power Supply Battery. A high quality surge protector combined with an uninterruptible power supply battery backup will go a long way in protecting sensitive electronic equipment from surges and other electronic irregularities that can destroy your computer’s circuitry.

3. Make Sure Your Servers Are Off The Floor Or In The Cloud. If your office gets flooded, having your equipment off the floor will prevent it from being completely destroyed. Server racks can be purchased and installed very inexpensively. Or consider moving your critical server equipment to the cloud and be protected no matter the weather!

4. Have A Disaster Recovery and Business Continuity Plan. Every business should have some type of plan in place for continued operation after a disaster. Would people know where to go? Who to call? How to log in and access data remotely? Hopefully you’ll never need it, but having a simple plan will make you sleep a lot easier at night knowing you have a way to continue to operate when disaster strikes.

I hope you will find this post informative and useful. I am looking forward to hearing your comments. That’s all I have for today, until next time make it a great day!

Posted in Uncategorized | Tagged , , , , , , | Leave a comment

How Long Would It Really Take To Crack Your “Strong” Password?

How Long Would It Really Take To Crack Your “Strong” Password?

How many @’s, %’s and other crazy symbols are in your password right now? Are they really all that necessary? According to a recent Carnegie Mellon study, the answer is no. The only thing that really influences your password strength is its length! Not whether it has X minimum characters or Y maximum characters. And not whether it has a kazillion combinations of numbers, letters and other doodads that are bound to confuse most of your employees.

Regular Password Changes Decrease Security

In the recent past, regularly scheduled password changes were a common friend of network security. However, with most computer users now requiring upwards of 20-30 passwords between work and home, this whole password security game has gotten a bit out of control. When pressed to change their password regularly, your poor employees start to use “sucky” passwords pretty quickly because they need something that is easy to remember. Or just as bad, they create a good password and then write it on a sticky note to put on their computer monitor so they don’t forget!

How To Choose A Strong Password

You want to choose a password that is hard for anyone to guess. Ideally you would want to use a lengthy string of letters, numbers and odd characters AND still be able to remember it easily. One way to do this is by creating a random phrase and using the first letter of every word, substituting +’s or &’s for the word “and” or numbers like 4 for the word “for” (or any similar tricks that are easy for you to remember). As an example, the phrase “I love my computer guys and they are the best company for me!” would translate to a password of “ilmcg+trtbc4m.” That’s easy to remember and almost impossible to crack. In fact, you can test out your password at http://passfault.appspot.com/password_strength.html to see just how strong it really is. The password we created above would take 1,306,628,104 centuries to crack…. Now that’s a strong password!

Using A Password Management Solution

Even if you have a strong password, you should never use the same password on different websites. Your online banking password should be different than Facebook, which should be different than Gmail, which should be different than your network password at work. A quick and easy way to remember all of these unique strong passwords is to use a “Password Management Solution.” A few of the most popular tools you can test out are KeePass, RoboForm and AnyPassword. These tools allow you to securely keep track of all of your passwords while remembering only one.

I hope you will find this post informative and useful. I am looking forward to hearing your comments. That’s all I have for today, until next time make it a great day!

Posted in Uncategorized | Tagged , , , , , , , , , , | Leave a comment

5 Tips for Keeping Your Inbox Empty

5 Tips for Keeping Your Inbox Empty

Does your Inbox always seem to be overflowing with messages? Here are 5 tips for managing your Inbox to keep it empty.

1. DELETE any message after scanning the from and subject line that is not needed or obvious SPAM.

2. DELEGATE any message or task that requires delegation by forwarding the message to the appropriate person.

3. DEFER messages that are not immediately actionable.

4. RESPOND to all messages that will take less than 2 minutes of your time.

5. DO all messages that are left in your Inbox. After you DELETE, DELEGATE, DEFER and RESPOND the only messages left in your Inbox are items that you will work on today.

These tips will help you maintain an empty Inbox. There are applications that can be added to help with the delegating and deferring steps. SaneBox and Getting Things Done are some examples of these types of applications.

I hope you will find this post informative and useful. I am looking forward to hearing your comments. That’s all I have for today, until next time make it a great day!

Posted in Uncategorized | Tagged , , , , , , , , , | Leave a comment

5 Smart Tips For Mobile Devices

5 Smart Tips For Mobile Devices

If you’re planning on heading out of town – or simply to the coffee shop to work – here are a few tips to keep in mind.

1. Protect your devices from thieves. All mobile devices should be passcode-protected and loaded with apps that will help you track and find them in case they get lost or stolen. For iPads and iPhones, there’s the free Find My iPhone. Android users can try Lookout Mobile Security. These apps allow you to remotely wipe the device in case they fall into the wrong hands; you definitely don’t want to expose yourself to identity theft or allow someone access to your company’s network and client data. Also, never leave your device anywhere you wouldn’t leave your wallet.

2. Backup. Mobile devices get lost and destroyed more often than desktop computers because you’re dragging them around from place to place and exposing them to non-gadget friendly environments; therefore, make sure you are backing up all the data to the cloud. All it takes is a spilled cup of coffee to erase those precious family photos and videos; and most people don’t think about backing up their phone.

3. Take caution when connecting to free public Wi-Fi. Hackers with routers and readily available software set up rogue hot spots for spying and serving you fake websites. They often name these hot spots something generic such as “Coffee Shop” or “Linksys” to fool you into thinking they are safe. You think you’re connecting to the coffee shop’s Wi-Fi, but you’re actually accessing the web through their portal. If you are going to use public Wi-Fi, simply use it for general web surfing, not shopping, banking or accessing critical data.

4. Turn off sharing. If you use a laptop, you might have it set to share files and folders with other computers at work or home. However, you don’t want those setting “on” when connecting to a public network. When connecting to a public hotspot for the first time, Windows will ask you for a location type; choose “public” and it will automatically reset your settings to turn off sharing.

5. Carry your own connection. If you’re going to access your bank account, go shopping online or need to access critical data when traveling, invest in your own personal Mi-Fi connection. If you don’t have one and you need to make an emergency balance transfer or an immediate purchase to save a significant amount of money, it’s safer to use your cell phone. When banking, use your bank’s official app and sign up for any extra security they offer. For example, Bank of America’s SafePass program sends a text message with a 6-digit code to authorize a transaction. The code expires as soon as you use it.

I hope you will find this post informative and useful. I am looking forward to hearing your comments. That’s all I have for today, until next time make it a great day!

Posted in Uncategorized | Tagged , , , , , , , , , , | Leave a comment

5 Steps To Moving From Your iPhone To An Android Phone

5 Steps To Moving From Your iPhone To An Android Phone

Android phones have come a long way in the last few years, and the Apple iPhone may have lost a bit of the pizazz that it had just a few years back as the new phone on the block.

If you’re thinking of making the jump from iPhone to Android, here are 5 critical areas of your phone you need to consider before you move:

1. E-mail, Contacts and Calendars. If you’re using Microsoft Exchange for e-mail, then this step should be a breeze. All of your e-mail, calendars and contacts should be housed on your Exchange server and will populate automatically once you set up your account. If you’re using Google Apps for these services, it will be even more seamless!

2. Apps. Your iOS apps are going to be stuck on your iPhone and not transferable. You’ll certainly find the Android version of these same apps on the other side, but be sure to check this out ahead of time so that you’re not stuck searching for a workaround for a critical work function upon arrival.

3. Music. The easiest way to move your music from iTunes onto your Android phone is by creating a Google Music account on the same computer where iTunes is installed. You can then use Music Manager’s iTunes option during setup. You can even continue to use iTunes and sync any new purchases with your Google Music account automatically.

4. Photos and Videos. Your best option to move photos and videos is to simply download them from your iPhone to your computer and then re-upload whatever you want/need to your new phone. Another option is to use a cloud sharing service such as Dropbox to move these files wirelessly across devices.

5. Text Messages. If you must move text messages, use the free iSMS2droid app. Or use the Samsung Kies software to restore an iPhone backup (if you have a Samsung Android phone).

Finally, if you’re really thinking about moving from your old iPhone to an Android phone, make sure to pick a higher-end Android phone, such as the Samsung Galaxy. To be happy with your decision, you’re going to need to feel like you’ve actually upgraded.

I hope you will find this post informative and useful. I am looking forward to hearing your comments. That’s all I have for today, until next time make it a great day!

Posted in Uncategorized | Tagged , , , , , , , | Leave a comment

Would You Rather Text Than Talk?

Would You Rather Text Than Talk?
Essential Tips For Business Texting

You use your iPhone or Android for everything else. Your spouse even texts you to grab some milk at the store or to tell you they’ll be gone when you get home. It’s quick, easy and gets the job done. Why not in business too?

If you’re going to text for business purposes, follow these 7 texting tips to keep it professional:

1. Consider if your message is urgent. Your text may interrupt your recipient…be sure there’s a good reason for that interruption.

2. Is e-mail better? Most people prefer business communications via e-mail as it better respects their time and ability to respond appropriately. Text messages are also easily lost if sent at a bad time.

3. Do they only e-mail you? If yes, respond to them in the same way. If they e-mail, send an e-mail. If they call, call them back.

4. DON’T TYPE IN ALL CAPS. DON’T YOU FEEL LIKE SOMEONE IS YELLING AT YOU WHEN THEY TYPE IN ALL CAPS? DON’T SEND E-MAILS OR TEXTS IN ALL CAPS.

5. Proofread your message. Ever hear of “Auto-Correct” in text messages? Some can be downright embarrassing. If you’re taking the time to write the message, take the extra seconds to proofread.

6. No abbreviations! Your recipient shouldn’t have to decipher your text message with a decoder ring. Be as clear as you can with proper grammar and pronunciation. No sense in risking losing a customer who gets fed up with your messages.

7. Include your name in the message. Not everyone knows who you are simply by your cellphone number. Assume that the person doesn’t know who the message is coming from.

If you do text in a business environment, especially with a customer or prospect, follow these 7 tips to ensure that you are perceived as the true business professional that you are!

I hope you will find this post informative and useful. I am looking forward to hearing your comments. That’s all I have for today, until next time make it a great day!

Posted in Uncategorized | Tagged , , , , , , , , , , | Leave a comment