Blog

April 10th, 2014

BusinessValue_Apr07_CPretty much every profession has its own language or set of terms that those working in that field quickly master and use on an everyday level with colleagues. However, this can pose problems for those people not involved directly with a specific industry. For example, it can be a challenge for business owners to effectively communicate with Web designers and developers. To make things easier, it can be useful to know some of the more common Web design terms.

Here are 20 of the most used Web design terms that could help you communicate effectively with designers and developers about what you want from your website:

  • Alignment - The position of the various elements on your page. Alignment can be focused on the borders of the page, or positioning of elements based on other elements - e.g., aligning all images to the left side of the page, and making sure the text is aligned to the right of each image.
  • Banner - A form of advertising that is usually at the top of a page and goes from one side to the other. On many sites, the banner also contains links that can be clicked through to reach other pages.
  • Below the fold - The point on the page where viewers will begin to scroll after the page has loaded. Generally you put the most important information above the fold (what the visitor sees first) and supplement information below it.
  • Color wheel - A circle of colors that allows designers to easily pick out primary, secondary, and tertiary colors, as well as complimentary and contrasting colors - e.g., on most wheels red is opposite green because they complement one another.
  • CSS - Cascading Style Sheets allows designers to dictate the look and feel of a page. These are usually codes that dictate the font, color, and layout of a Web page.
  • DPI - Dots Per Inch is the resolution of an image or monitor. The higher the DPI, the higher the resolution or quality of the image.
  • Entry and Exit pages - This indicates where a viewer enters your page from an external source, and where a viewer will usually exit your site from. The vast majority of entry pages are the homepage, so these should be designed to capture and maintain interest. Exit pages can be the homepage, or perhaps a signup form.
  • GIF - Pronounced Jif, is an image format that is best suited for small images with few colors. These can also be animated.
  • Header - This is the absolute top of any page.
  • HTML - Hyper Text Markup Language, is the main language used to write webpages. For example, the bullet points in this article would be written as < ol><li>HTML - Hyper Text ...</li></ol>. Browsers read this code and translate the directions given.
  • JPEG - An image format best suited to pictures and images with a large number of colors. The vast majority of images on the Internet and websites are uploaded in the JPEG format.
  • Lorem Ipsum - Placeholder text is used by developers when creating mockups of pages or layout so they can see how the text will look when the page is finished. This can be any form of text and is usually nonsensical, like 'Lorem Ipsum Dolor'.
  • Orphan - A word or short sentence that appears by itself, below the text on a page. Generally these should be avoided, and can be easily 'adopted' by adjusting spacing between letters and words, or editing content.
  • Parent/Child elements - With HTML and other Web languages there is a relationship between elements (parts of code). Parents dictate elements that will be inherited by other codes (children) that are within the main parent group. For example, if you assign a headline a certain style this style becomes the parent. Any other elements like a bolded word within the headline will be a child. The child will take the same style as the headline and have the added bold format as well.
  • Pixel - The smallest element of any image and your monitor. It is essentially one dot of color. The resolution of images and monitors (how clear the image is) is often displayed in pixels. The higher the number of pixels, the higher the resolution and quality.
  • PNG - An image format that is most commonly used for images that have large amounts of uniform color or transparent backgrounds.
  • Script - A small bit of code that enables browsers to do more than just displaying text. If you've ever watched a video while on a website or downloaded something directly from a page, you have interacted with a script.
  • Watermark - A mark of ownership which is usually applied to the background of images or content. This is used to highlight ownership and deter theft of visual content. If you plan to post images on your site that you create, you might want to consider adding a watermark as protection.
  • White space - Space that surrounds text, images or other parts of the page. It is generally believed that the more white space there is, the easier it is to read content and draw attention to important aspects of a page.
  • Wireframe - A visual representation of a website's layout with directions for visuals, location of content, and style for each page. This is usually constructed before the site is built and is more or less a road map for developers.
Of course, these are just a few of the terms designers and developers use on a regular basis. If you want to understand how to get the best out of your website and technology then we're here to help.
Published with permission from TechAdvisory.org. Source.

April 9th, 2014

SocialMedia_April07_CBusiness customers can be largely visual creatures; judging a company by how it looks. When it comes to social media campaigns if the content of your business posts is not visually appealing you may find it hard to engage your clients. The question is, what tools can you can use to create visual content, especially if you aren't a Photoshop expert or graphic designer.

In this day and age where compelling visuals are possible online, it is extremely important to learn how to create attractive visuals to aid your social media marketing campaigns. You at least need a working knowledge of how to enhance your photos and make them more attention-grabbing. There are a number of free or highly affordable tools out there that can help you do just that.

PIXLR - This advanced photo editor works like Photoshop, only it is easier to use and therefore ideal for beginners. You can create images from scratch or perform advanced image editing. Using fairly simple tools can maximize the potential of images. For quick editing, there’s PIXLR EXPRESS or PIXLR O-MATIC, which are free to use. Visit the PIXLR website to learn more and start use these programs.

PicMonkey’s Online Photo Editor - This photo editor can transform ordinary images into fantastic photographs in just a few clicks. Select the image that you want to modify and add special effects such as fancy text, or simply crop and re-size. The photos edited using PicMonkey can be uploaded on Facebook and other social media platforms. PicMonkey is free to use so you can just go to the website and start editing away. For added frames and special effects there’s a premium version you can upgrade to for USD $33.33 per year.

LiveLuvCreate - This website can be used without any charge and offers a variety of design layouts and graphics. Using this platform you can edit your own images and there are also a ton of images created by users on its library that can help give you inspiration. Among the tools available are borders, filters, and photo effects, as well as fonts, colours, and styles. Visit the website to set up an account and start editing your images today.

Canva - If you want to create your Facebook cover photos from scratch, or if you want to design some blog images, this is a free application that might prove useful. This tool is very convenient and can be used to create business cards, invitations, posters, and presentations. Visit the website today to start creating your own visuals.

Quozio - If you are into quotes, Quozio lets you upload famous and favorite quotes, visualize them, and then share them on your social network. Simply enter an interesting quote and then select a background image. Instead of simply posting what’s on your mind, you can make a quote more attractive and appealing by transforming it into a visual using this free app. Visit the site today to visualize your next quote.

Whether you are posting on Facebook, Twitter, or any other social network, your content cannot come alive without the use of quality graphics and images. If Photoshop does not work for you, these other tools are ideal substitutes for creating appealing graphics for a variety of social media platforms.

Make sure to share your own list of top photo tools for everyone to see! And, if you would like to learn more about leveraging social media in your business, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
April 2nd, 2014

BusinessValue_Mar31_CA business website is arguably the most important marketing and branding tool today. It is often the first level of interaction customers have with your company and many visitors will decide whether to work with you based solely on how your website is designed. Therefore, you need a website that is designed to engage and meet your visitors' needs. One of the best ways to achieve this is to learn about common mistakes other businesses have made when designing their websites to avoid making the same errors.

The business value of a business website is that it creates a solid online presence and boosts your brand image and market reach. Even if your business is not Internet based, a website can be used to create a certain impression and ultimately contribute to your bottom line. The key is to make sure you create the best impression. Here are six of the most common mistakes businesses make with website design:

Mistake 1: Building for the sake of building

Websites are important and some businesses believe that they should have a website, so they go ahead and simply build one. You should first take steps to define your target market - who is it that you want and expect to visit your website.

Once you have a defined target market you can then take time to build your site for your market. For example, if the majority of your target market uses mobile devices to browse the Web you should take steps to design your site so that it is viewable on mobile devices.

You should also determine what you want visitors to do on your site. Some companies want them to click through to another site, while others want them to sign up. By defining how you want your visitors to interact you can then develop your content and design around this.

Mistake 2: Designing a website that is too busy

It can be tempting to put all of your information on one page or even have a ton of images and videos. The truth is, this can be distracting largely because once someone lands on your page, they won't know how to get around, find the information they want, or even to know what they should do next.

Busy or flashy websites with lots of animations or large amounts of text also usually don't scale all that well. So, when someone looks at your site on a mobile device they will likely find it too hard to navigate and leave, which is counter to what you are trying to achieve.

Instead, aim for a website that is simple and clean. Important information should be quick to find and read and it should be clear who you are, what you have to say, and what you want the visitor to do.

Mistake 3: Lacking call to actions

Most business related websites have a goal as to what they want visitors to do. Maybe it's download an app, call the company, or even sign make a purchase online. It is essential that you lead visitors toward what you want them to do in the most clear and concise way. The best way to do this is through a call to action. These are usually buttons at the bottom of sections or pages that motivate the user to click and follow the instructions on what to do next, be that sign up to something or get in touch.

The best calls to action stand out from the content, drawing the reader's eye and hopefully inspiring them to click. They should also be clearly written, simple, and direct. e.g., 'Call us today!' or 'Download now!'

Mistake 4: Misguided content

It may seem worthwhile to write in-depth content about your products or services but this isn't always the case. People skim read the basics on the Web and it's different than other mediums.

What you should do is condense down your content so that it only states the most important information. Tell the reader what your product or service does and provide a few of the most important benefits. What you are looking to do is develop enough interest so that visitors to your site will click on the call to action and connect with you.

If you have the time and profits, creating a more visual site where you showcase the products or show how you can help in a short video may lead to higher engagement and possibly higher customer conversions. Take a look at the popular software and service sites like Dropbox, Microsoft, and Google. The content is highly visible and simple, yet provides just enough information so the user knows what the service is and what they are expected to do.

Mistake 5: Static content

It can be tempting to invest the time to write a great website, get the content online then just leave it sitting there. The Internet changes and what might have been regarded as great website design and content a couple of years ago may not be seen in the same light today.

It is advisable to periodically update your site's design and content to reflect current trends; making it more modern. Another related aspect of your content is that you need to ensure that your content is up-to-date. If you are hosting a contest and put the information on your site, you should make sure to take it off of your site, or update it when the date passes. It looks a little unprofessional to have content that is still talking about 2012 or even 2013.

Mistake 6: Doing it yourself

The vast majority of small business owners and managers don't have in-depth Web design skills, yet are determined to build their company's website themselves. This can lead to unexpected problems or a website that doesn't meet your needs. We strongly recommend that you work with a qualified designer who can help ensure that your website is designed and built to high standards.

If you are looking to boost your website's design contact us today. We can help!

Published with permission from TechAdvisory.org. Source.

March 27th, 2014

BI_March24_CBusiness Intelligence or BI applications are used by businesses from different fields for their information analysis. These tools help determine what individual businesses may be doing right or wrong, which can help them decide on the best path to take to reach their goals. BI tools are helpful to many businesses. However, some business owners question how these tools can be used in different departments.

There are various BI tools available nowadays that support small to large companies. You can find Business Intelligence tools that fit your company’s size, needs and budget. These applications can be used in different areas of the business:

Marketing Department

A marketing department is responsible for promoting a company’s products, services and brand to increase public awareness. With successful marketing, a business can attract potential clients that can be possibly turned into creating sales revenue. The company can use BI to determine which campaigns are successful or not, as the case may be. Through this, investments can be focused on those campaigns that work whilst avoiding those that have previously failed.

Sales Department

Sales managers and supervisors can also use BI to analyze successful deals, as well as those that they have lost, to see what strategies have worked. The system can also help determine which sales teams hit or exceed set goals in order to analyze what they are doing right. Moreover, this helps determine which products or services are most saleable so these can be pushed further to attain more goals.

Finance Department

BI software makes analyzing, reporting, and managing financial data more convenient. Those who are involved in the process can easily access the information they need through the system. Analysis is easier as the data is organized and accurate. Money in and money out can also be tracked with greater efficiency.

Moreover, these tools often come with features that allow users to create scenarios and determine the possible results from there. This is extremely helpful in deciding on the best action to take as the tool gives you a view of the probable outcome. The success rate is higher if forecasting using a BI tool.

Inventory

Business Intelligence also plays a vital role in inventory tracking of products, items or supplies. For instance, companies in the retail industry can track the movement of products or items from the suppliers to the warehouse and on to their delivery to clients. Any problems encountered in the process can be quickly identified so they can be fixed in time.

Items in demand can also be pinpointed, as well as low stock and overstocks. Items that are low in stock can be ordered immediately, especially if they are in demand, to ensure that the needs of clients are met. This also lets you avoid overstocking, which can be a waste of money when investment is better used for fast moving items.

These are just some of the ways businesses can use BI in their operations. If you have further questions about the topic, do not hesitate to give us a call. We’ll be more than happy to assist you.

Published with permission from TechAdvisory.org. Source.

March 20th, 2014

Security_Mar17_CAny business that employs technology in any aspect will eventually begin to worry about how secure their systems are. In order to ensure security, many companies implement a security strategy. While these strategies are a great way to ensure the security of your business systems and data, there is one element that many business owners forget: The audit.

Auditing and the security security strategy

Auditing your company's security is important, the only problem business owners run across is where and what they should be auditing. The easiest way to do this is to first look at the common elements of developing security strategies.

These elements are: assess, assign, audit. When you develop a plan, or work with an IT partner to develop one, you follow the three steps above, and it may be obvious at the end. In truth however, you should be auditing at each stage of the plan. That means you first need to know what goes on in each stage.

During the assessment phase you or your IT partner will need to look at the existing security you have in place. This includes on every computer and server and also focuses on who has access to what, and what programs are being used. Doing an assessment should give you an overview of how secure your business currently is, along with any weak points that need to be improved.

The assignment phase looks at actually carrying out the changes you identified in the assessment phase. This could include adding improved security measures, deleting unused programs or even updating systems for improved security. The main goal in this phase is to ensure that your systems and networks are secure.

Auditing happens after the changes have been made and aims to ensure that your systems are actually secure and have been implemented properly. Throughout the process you will actually need to continually audit and adjust your strategy.

What exactly should be audited?

When conducting an audit, there are three factors you should focus on:
  1. The state of your security - Changing or introducing a security plan usually begins with an audit of sorts. In order to do this however, you need to know about how your security has changed in between audits. Tracking this state and how it changed in between audits allows you to more efficiently audit how your system is working now and to also implement changes easier. If you don't know how the state of your security has changed in between audits, you could risk implementing ineffective security measures or leaving older solutions open to risk.
  2. The changes made - Auditing the state of your security is important, but you should also be auditing the changes made to your systems. For example, if a new program is installed, or a new firewall is implemented, you will need to audit how well it is working before you can deem your security plan to be fully implemented. Basically, you are looking for any changes made to your system that could influence security while you are implementing a new system. If by auditing at this point, you find that security has been compromised, you will need to go back to the first step and assess why before moving forward.
  3. Who has access to what - There is a good chance that every system you have will not need to be accessed by every employee. It would be a good idea that once a security solution is in place, that you audit who has access to what systems and how often they use them. This stage of the process needs to be proactive and constantly carried out. if you find that access changes or system access needs change, it would be a good idea to adapt your the security strategy; starting with the first stage.
If you are looking for help developing a security strategy for your business, contact us today to see how our managed solutions can help.
Published with permission from TechAdvisory.org. Source.

Topic Security
March 19th, 2014

BCP_Marc17_CIsn’t it disturbing how a disaster (whether man made or natural) can devastate your business? While disasters are inevitable, you can mitigate risks and lessen the damage to your business in the event of one through a DRP (Disaster Recovery Plan). While it may not seem important to some businesses, especially if yours has never been faced with a disaster, a DRP would be a good idea.

While there are several facets to a DRP that are going to determine whether it will be effective or not, making sure that you’ve considered these 5 tips is definitely a good start.

1.) Commitment from management

Because the managers are the ones who will coordinate the development of the plan and be the central figures who implement the recovery plan, it’s crucial that they are committed to it and are willing to back it up.

They will also be responsible for setting an allocated budget and manpower to creating the actual plan. That said, it’s very important that they know the concept behind it and how huge of an impact a DRP can have on a business.

2.) A representative on each department should be available when creating a DRP

It’s unthinkable to believe that your DRP is well optimized when you haven’t had a representative from each department coordinate with you while creating the recovery program.

Considering how they themselves are the front line of your organization with the best knowledge about how their department works, it’s a huge plus that you should take advantage of when creating a DRP.

With the representatives on your team, you’ll be able to see things from their perspective and gain first-hand knowledge from those who do the actual work.

3.) Remember to prioritize

In an ideal world, you should be able to restore everything at the same time after a disaster strikes. But since most businesses usually have a limited amount of resources, you will usually have to recover systems one at a time.

Because of this, you need to have a hierarchy or a sense of priority when determining which systems should be recovered first. That way, the most important systems are immediately brought back up while the less important ones are then queued in order of their importance.

4.) Determining your recovery strategies

This is one of the main focal points of a DRP since this phase tackles the actual strategies or steps that you’ll implement to recover your systems.

When determining your actual strategies, it's important that you brainstorm and think about all the options that you have to recovering your systems. Don’t simply stick with the cheapest possible strategy or even the most expensive ones.

You have to remember though that the simplest strategy to implement is probably the best one. That is, as long as the simplest strategy covers the critical aspects of your system recovery.

That said, avoid over complicating your strategies as you might face unnecessary challenges when it comes to the implementation of the recovery strategy.

5.) Do a dry run at least once a year

Your DRP shouldn’t end with the concept alone. No matter how foolproof you think your strategy is, if you haven’t tested it you most likely have missed something important.

It's during the dry run phase that the need for extra steps (or the removal of one) are made even more evident. You can then start polishing your strategies according to how your dry run plays out. It would also be a good year to practice your plan each year and update it accordingly.

These tips will help you ensure that your DRP will remain effective should a disaster occur. If you’re having a hard time figuring out how to go about the process of creating a DRP, then give us a call now and we’ll help you with the process.

Published with permission from TechAdvisory.org. Source.

March 6th, 2014

Security_May03_CAs a business owner or manager you face important security issues on a daily basis to look after business computers and systems. From malware to bugs in software, there is almost always a security issue to be dealt with and it can be an uphill battle dealing with them. But, knowledge is power and knowing about security threats can help you battle them more effectively. One of the latest threats to come to light is a bug in Apple's software that all Apple users should know about.

About the bug

News broke on many security websites mid-February about a potentially critical security flaw in Apple's systems following the company releasing an update to their mobile operating system, iOS.

The update notes released by Apple noted that the patch "provides a fix for SSL connection verification." This is a fairly common update as it is aimed at improving the security of communications between websites and the device. However, security experts found out that without the update attackers who can connect to a network are able to capture sensitive information being sent in banking sessions, email messages, and even chat messages using what's called an SSL/TSL session.

What exactly is SSL/TSL?

Secure Sockets Layer (SSL) and Transport Layer Security (TSL) are used in networks to essentially establish an encrypted link between a server and your computer. They are most commonly used to secure websites and the transmission of data. Take a look at some websites and you may see a padlock on the URL bar, or https:// in the URL. This indicates that the website is using SSL or TSL encryption to protect the data that is being transmitted e.g., your bank account information on a website.

In other words, SSL and TSL are used to ensure that information is exchanged securely over the Internet.

What was the problem and what software was affected?

It was found that there was a bug in the code Apple's software uses to establish a SSL connection which causes the whole SSL system to fail, potentially exposing data that should have been encrypted to anyone connected to the network with the right tools.

According to security experts, this bug has been found to affect devices running older versions of iOS 7, OS X 10.8 and newer, Apple TV, and possibly iOS 6. It is important to note that the bug is only found in Apple's SSL technology. Any app that uses Apple's version of SSL could be affected.

Has Apple solved this?

Luckily, Apple has released updates to all of their devices that should solve this security exploit. If you have not updated your device or computer since the middle of February you could be at risk.

How do I prevent my systems from being affected?

The first thing you should do is to update all Apple related apps and devices, including all mobile devices. If you are unsure about whether your apps are secure enough, try using another app, especially another browser. The reason for this is because browsers like Chrome and Firefox all use a different SSL technology and are unaffected by this bug.

You should also remain vigilant and not connect to any open or public Wi-Fi connections or even secured Internet connections that could be easy to break through. Basically, as long as you update you should be fine. However, it may be worthwhile using another browser if you are really worried about whether you have a secure connection.

If you are looking to learn more about this security flaw, or how you can secure your business from threats like this, contact us today. We can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
March 5th, 2014

BusinessValue_Mar03_CBusiness owners and managers are often looking for ways to connect with their customers, drive value and build brands. The difficulty is that there's no easy solution to achieve this. Many business have a website and social media profile but find these are often not enough to drive relationships and business forward. Another element you might want to try, that can help drive business connections, is blogging.

If you're looking to get people more involved and connected with your company, spread your brand image and message, and perhaps establish your company as an industry leader, then blogging might just be the answer.

There is little doubt that companies that blog effectively do see an increase in overall value. That being said, it can be a challenge to develop and maintain a successful blog.

Here are 7 tips for businesses looking to start a blog or develop an existing one into a more successful platform:

1. Define your topics and your audience

As with almost every business process, there needs to be a solid foundation on which to build your blog, such as the topics you write about and your audience.

Take a minute to establish who your target audience is, such as your average customer. Pick some basic characteristics that cover the majority of this group. Focusing on who you are writing articles for can make writing not only easier but more relevant and effective.

Many of the most successful business blogs choose blog topics based on their services or products and news. The key is to select topics based on what you think your audience will find useful or interesting. You might not want to spread your blogs over too many topic areas as these can be hard work to cover on a regular basis. About 4-8 is a good amount to aim for.

2. Be consistent

With defined topics and a target audience in mind, you are well on your way to establishing a solid foundation for your blog. The next element is to devise a calendar of how often you write blogs and cover certain topics. If, for example, you picked four topics this could equate to one article a month for each topic.

What you are striving for is consistency. You should be writing and posting a new article at least once a week, or more. If you establish a calendar based around your topics you will find it easier to write content on a regular basis and soon it will become a natural part of your weekly tasks.

3. Be relevant

Even with defined topics, it can be a struggle to come up with new ideas for blogs. It can be tempting to write about a new product or feature, but you have to be careful that it doesn't read too much like boring marketing material.

Instead, focus on what your audience would like to read. Often the most successful articles are those that answer common questions asked by clients, or talk about how a product or service can help a client. Other articles could be related to your products rather than directly about them. For example, if you own a coffee shop then writing about food that goes well with coffee might be an interesting blog idea.

Personal opinions can provide an interesting perspective and many readers find these types of business blogs refreshing. However, you do need to be careful of ostracizing those who might not agree with you or putting people off with negative blogs.

4. Don't forget the CTA

Remember, your business blog needs to have a purpose: You want to not only develop interest in the company, but to drive business. At the end of most if not all of your articles you can include a call to action (CTA) that suggests to the reader to contact you, come in for a visit or email.

5. Keep articles easy to read

It can be tempting to write a 4,000 word article with a ton of great information. Google and many search engines do look positively at long-form content and this might work well for your search rankings. The only problem is that when many of us read articles online we skim them, looking for salient points and skipping up to 90% of the article.

To that end, keep articles on the shorter side - around 500-1,000 words. Use shorter sentences and headings like H3 and bold to separate content and make it more scannable. Writing a longer article? Split it into two, three or even four parts. This helps drive interest to return to check out the new parts when they are posted.

6. Promote and share your content

Share your blog content on your social media profiles. This increases the reach of your blog, but also drives traffic to your website. You can put an easy to see link to your blog on your homepage and even in email headers.

Many writers also find success in contributing, or writing a blog for other websites. This helps not only spread your ideas, content, and company name, but can also help find content for your blog as other writers contribute to yours. Try contacting friends and colleagues to see if they would like you to write a post for their blog.

7. Remember you don't have to be the only contributor

Finally, you don't have to be the only person writing your blog. Ask your employees if they have any article ideas they would like to write about. The more writers contributing, the more content there is. This also takes the pressure off of you having to develop, write, and post everything, as well as offering a different voice for variety.

If you are looking to launch a blog, contact us to see how we can help.

Published with permission from TechAdvisory.org. Source.

February 28th, 2014

BI_Feb24_CIn order for a business to get more out of their existing and future data, many are relying on Business Intelligence (BI) solutions. If you are looking into a BI system for your business you will likely come across data related terms that are important to know about. Three of the most commonly asked about are data mining, data warehouse, and data mart.

What is a data warehouse?

The concept of a data warehouse is an interesting one and also a difficult one to define and pin down largely because it can cover such a broad area. The most concise definition we can give is that it is a database that integrates data from many different locations and databases into one consolidated database.

Data warehouses store both current and historical data, and rarely contain unique data. Instead, they aggregate data from other sources in order to make this more accessible. They might store important information from sales, marketing, ERP, customer interactions, and any form of database in order to quickly generate BI related reports.

The name undoubtedly conjures up the idea of a large warehouse-like building storing infinite amounts of data. However, most data warehouses are actually tables which are created by taking data from various sources and cleaning it up so that relevant data is stored in the warehouse in a way that makes it easier to reach when needed.

What is a data mart?

A data mart is a smaller data warehouse that stores data. These are based on a specific area or business function e.g., finance or marketing, etc. In fact, most modern data warehouses are actually made up of a series of smaller data marts.

The key difference between a data mart and a data warehouse is that data marts are usually smaller, focusing on one specific area, while a data warehouse covers the whole organization.

What is data mining?

When talking about Business Intelligence, many experts will refer to data mining. This is the act of analyzing data in order to identify patterns. The data that is mined can then be transformed into useable information. Many companies store this mined data in databases, a data warehouse, or a data mart.

Want to learn more about these terms and how your company can benefit from a BI solution? Contact us today.

Published with permission from TechAdvisory.org. Source.

February 20th, 2014

Security_Feb17_COne of the most common threats to business and individual systems is phishing. This form of hacking is well known and many users have educated themselves on the more traditional methods used by hackers. This has forced hackers to come up with different phishing techniques, and one of the methods that is causing problems is spear phishing.

What is spear phishing?

Spear phishing is a specialized type of phishing that instead of targeting a mass number of users, as normal phishing attempts, targets specific individuals or groups of individuals with a commonality e.g., an office.

Generally a hacker will first pick a target and then try to learn more about the related people. This could include visiting a website to see what a company does, who they work with, and even the staff. Or they could try hacking a server in order to get information.

Once they have some sort of information, usually a name, position, address, and even information on subscriptions, the hacker will develop an email that looks similar to one that another organization might send e.g., a bank. Some hackers have been known to create fake email accounts and pose as a victim's friend, sending emails from a fake account.

These emails are often similar to official correspondence and will always use personal information such as addressing the email to you directly instead of the usual 'dear sir or madam'. The majority of these emails will request some sort of information or talk about an urgent problem.

Somewhere in the email will be a link to the sender's website which will look almost exactly like the real thing. The site will usually ask you to input personal information e.g., an account number, name, address, or even passwords. If you went ahead and followed this request then this information would be captured by the hacker.

What happens if you are speared?

From previous attack cases and reports, the majority of spear phishing attacks are finance related, in that the hacker wants to gain access to a bank account or credit card. Other cases include hackers posing as help desk agents looking to gain access to business systems.

Should someone fall for this tactic, they will often see personal information captured and accounts drained or even their whole identity stolen. Some spear phishing attacks aren't after your identity or money, instead clicking on the link in the email will install malicious software onto a user's system.

We are actually seeing spear phishing being used increasingly by hackers as a method to gain access to business systems. In other words, spear phishing has become a great way for people to steal trade secrets or sensitive business data.

How do I avoid phishing?

Like most other types of phishing related emails, spear phishing attempts can be easy to block. Here are five tips on how you can avoid falling victim to them.
  • Know the basic rule of business communication - There are many basic rules of communication, but the most important one you should be aware of is that the majority of large organizations, like banks, social media platforms, etc., will not send you emails requesting personal information. If you receive an email from say PayPal asking you to click a link to verify your personal information and password, it's fake and you should delete it.
  • Look carefully at all emails - Many spear phishing emails originate in countries where English is not the main language. There will likely be a spelling mistake or odd wording in the emails, or even the sender's email address. You should look out for this, and if you spot errors then delete the email immediately.
  • Verify before you click - Some emails do have links in them, you can't avoid this. That being said, it is never a good idea to click on these without being sure. If you are unsure, phone the sender and ask. Should the email have a phone number, don't call it. Instead look for a number on a website or previous physical correspondence.
  • Never give personal information out over email - To many this is just plain common sense - you wouldn't give your personal information out to anyone on the street, so why give it out to anyone online? If the sender requires personal information try calling them or even going into their business to provide it.
  • Share only essential information - When signing up for new accounts online, there are fields that are required and others that are optional. Only share required information. This limits how much a hacker can get access to, and could actually tip you off. e.g., they send you an email addressed to Betty D, when your last name is Doe.
  • Keep your eyes out for the latest scams - Pay attention to security websites like those run by the major antivirus providers, or contact us. These sites all have blogs where they post the latest in security threats and more, and keeping up-to-date can go a long way in helping you to spot threats.
If you are looking to learn more about spear phishing or any other type of malware and security threat, get in touch.
Published with permission from TechAdvisory.org. Source.

Topic Security