Blog

June 19th, 2014

androidtablet_June18_CMost businesses rely on tablets and their apps to help increase productivity and work output. Android tablets are one solid option with countless work apps which many people opt for. Still, without their knowledge, most tend to give permission screens no more than a cursory glance when installing apps. This can be a big mistake as checking app permissions and being aware of common permissions is vital in keeping your Android tablet safe, secure, and efficient.

Checking app permissions

Head into Settings on your Android tablet, go to Apps and then tap on any app and scroll down to the bottom of the page to see the permissions that have been granted. Note that you are not able to switch individual options on or off, so it’s all or nothing.

However, there are various third-party apps you can install to give you a better look and more control over app permissions. One of those apps is SnoopWall, which once installed will set itself as an administrator to comprehensively audit and manage the security setup on your tablet.

Common permissions 101

Modify, delete, and read storage: This gives an app permission to access the storage on your device in order to save and edit files. Most apps will require some kind of access, if only to keep temporary logs on your device. Keep in mind that any app with these permissions can also access your public folders like your photo gallery as well as your music folder.

Find and use accounts on devices: Facebook, Twitter, and Google accounts are often integral to the way you use your phone, letting you send a Tweet from anywhere and upload photos onto your Facebook account at any time. This permission simply gives an app the ability to tap straight into these accounts to make life easier for you. Bear in mind that the app can potentially access any information stored in the account in question.

Full network access: Most apps require some kind of Internet access, whether it’s for software updates, syncing, or retrieving data from online sources. Full network access is used when retrieving adverts to display, but as with most permissions, you’re relying on the app in question to use this privilege responsibly.

Phone status and identity: This permission enables apps to recognize when a call comes in and gives you the chance to answer it by pausing the current app in the background.

Prevent tablet from sleeping: When your tablet goes into sleep mode, it can interrupt certain processes such as data being written to the internal storage. This permission enables an app to keep your device awake while important system tasks are being carried out. It can also be used by video players to keep the screen on.

Read and send text messages: There are countless apps that want to replace your tablet’s SMS functionality, and this permission is used to automatically scan your incoming texts for authorization codes (used where two-step authentication is involved). This is another classic example of a permission that can be very useful or very worrying. It is vital that you make sure that the app asking for this permission has a clear use for it.

Read your contacts: While a whole range of apps ask for it, this isn’t something you want to give away without good reason. The ability to share content with your friends in some way is often the underlying purpose for this permission, but also so that the app can quickly auto-complete the names of your contacts whenever required.

Sticky broadcasts: This permission is all about the way apps communicate with each other. Android treats each app as if it were a separate user: broadcasts enable these apps to talk to one another (sometimes without your knowledge), and the stickiness controls how long they hang around in the device’s memory for. If an app wants to communicate something to other apps or to Android a long time after the event, it then uses a sticky broadcast.

There are plenty of other permissions to consider but these are the ones you’ll run into most frequently on your Android tablet. It’s important that you pay attention to app permissions in relation to new apps as well as apps you’re already using to ensure your tablet’s security.

Looking to learn more about app permissions? Get in touch today and see how we can help.

Published with permission from TechAdvisory.org. Source.

June 13th, 2014

security_June13_CThe parallel rise of technological advancement and malicious Internet activity is evident. With advances in technology comes an increase in security threats which, if not taken care of right away, can severely affect your business’ efficiency and overall success. With that in mind, it’s time you familiarized yourself with the top security best practice guidelines which will go a long way to ensuring your business is safe and secure.

10 Security practice guidelines for businesses

  1. Encrypt your data: Encryption of stored data, filesystems, and across-the-wire transfers is essential to protect sensitive data as well as to help prevent data loss due to equipment loss or theft.
  2. Use digital certificates to sign all of your sites: You should obtain your certificates from a trusted Certificate Authority, and instead of saving your certificates on the Web server, save them to hardware devices like routers or load balancers.
  3. Implement a removable media policy: Devices like USB drives, external hard disks, external DVD writers or any writeable media facilitate security breaches coming into or leaving your network. Restricting the use of those devices is an effective way to minimize security threats.
  4. Implement DLP and auditing: Be sure to use data loss prevention and file auditing to monitor, alert, identify, and block the flow of data into and out of your network.
  5. Use a spam filter on your email servers: Using a time-tested spam filter such as SpamAssassin will remove unwanted email from entering your inbox and junk folders. It is important that you identify junk mail even if it’s from a trusted source.
  6. Secure websites against MITM and malware infections: Start using Secure Sockets Layer (SSL) which creates a secure connection between a user and server, over which any amount of data can be sent securely. Through SSL, you’ll be able to scan your website daily for malware, set the Secure flag for all session cookies, as well as use SSL certificates with Extended Validation.
  7. Use a comprehensive endpoint security solution: Using an antivirus software alone is not enough to provide defense against today’s security threats. Go for a multi-layered product to prevent malware infections on your devices.
  8. Network-based security hardware and software: Start using firewalls, gateway antivirus, intrusion detection devices, and monitoring to screen for DoS attacks, virus signatures, unauthorized intrusion, and other over-the-network attacks.
  9. Maintain security patches: Make sure that your software and hardware defenses stay up-to-date with new anti-malware signatures and the latest patches. If your antivirus program doesn’t update on a daily basis, be sure to set up a regular scan and a remediation plan for your systems.
  10. Educate your employees: As simple as it sounds, this might be the most important non-hardware, non-software solution available. An informed user will more likely behave more responsibly and take fewer risks with valuable company data resulting in fewer threats to your organization.
Businesses cannot afford to take chances with security. Why? Because doing so can trigger a domino effect, causing a cascade of problems that can lead to operational outages, data loss, security breaches, and the subsequent negative impact to your company's bottom line. Looking to learn more about security for your business? Call us today for a chat.
Published with permission from TechAdvisory.org. Source.

Topic Security
June 4th, 2014

AndroidTablet_June02_CAndroid tablets are among the most feature-rich tech devices currently available. One of the most basic requirements is being able to connect, and often this is using a data network. While being able to connect to the net over a data network is great, many subscription plans limit the amount of data you can use each month. Because of this it can be easy exceed this limit, leading to some people having to pay substantial amounts.

Here are three things you can do in order to minimize and track the amount of data you are using on your tablet.

1. Turn off your data when you aren't using it

All modern tablets have the ability to connect to a Wi-Fi network, and many of us have these in the office and at home. While many tablets have the ability to switch between connection types automatically, there is always the chance that you may loose connection and switch to a data network without knowing.

If this happens, you could see your data allowance quickly drained. Therefore, it's worthwhile turning off your data when you aren't using it. On most devices, you can do this by:

  1. Going to your device's home screen.
  2. Swiping down from the top and either selecting Settings or tapping on the profile image (usually a person icon) and tapping Settings.
Under Wireless & Networks tap on Data usage. Next, slide the tab Mobile data from On to Off. On some devices you may see Mobile Data right on the Settings menu, and sliding it to Off will turn off your device's data connection.

If you are going on vacation or out of your data provider's service area this is useful thing otherwise you may incur roaming charges which are usually costly. Note, that when you do turn your data off you will still be able to connect to the Internet over Wi-Fi.

2. Set a limit on the amount of data used

On Android devices using newer versions of Android there is actually a built in data tracker that allows you to see how much data you have used in a given period. You can access it by:
  1. Going to your device's home screen.
  2. Swiping down from the top and either selecting Settings or tapping on the profile image (usually a person icon) and tapping Settings.
  3. Selecting Data usage.
Note, this may be in a different location on your phone, it depends on the manufacturer. It can be found in the device's settings menu, just take a look at the options related to mobile and data.

With Data usage open, you should see a graph that displays the amount of data you have used during the current month. If you tick Set mobile data limit you can manually set a limit for your data. If you go over that limit, your device will automatically disable mobile data. We suggest setting it for around 10-20MB below the limit on your contract. You can also set a warning limit that will let you know when you are approaching a certain amount of data.

If your billing cycle doesn't begin at the start of each month, press Data usage cycle and select Change cycle… to set the dates to fit with the monthly charge cycle.

3. Audit the amount of data your apps are using

If you open the data usage part of Settings and look under the chart that displays the amount of data you have used you should see a list of apps that have used data, ranked by the amount each app has used.

You can see which app is using how much data and from here you can adjust how you use an app. For example, if you see that YouTube has been using a high amount of mobile data, it may be a good idea to restrict viewing videos to when you are on Wi-Fi.

If you see that apps are using data despite the fact that you aren't actually using the apps you can restrict the app from using data in the background. Many apps use data to keep their content up-to-date or available for the next time you open them. Try tapping on the app names in the list below the graph and a new window will open.

Take a look at the pie graph and you will see two sections: Foreground and Background. Foreground indicates how much data the app is using when it's open while Background shows how much is used while the app is closed.

If you tick Restrict background data at the bottom of the window, the app will not be allowed to use data while it isn't open.

Looking to learn more about your Android tablet? Contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

June 3rd, 2014

androidphone_June2_CWith more customized features and an increasing number of apps, Android devices have become a solid option for business users. The problem is that many people are running out of storage space on their devices. There is an increasing need to have instant access to different documents and an ever increasing number of apps installed. But never fear as there are several ways you can get more storage on your Android device.

MicroSD card:

The best way to get more storage on your Android device is to buy a microSD card. A decent 64GB card can be bought for as little as USD$40 and inserted straight into your smartphone or tablet. Go to Settings and Storage and assign what you want to be saved to your microSD card in the future, as well as moving existing files to maximize storage space.

It's important to note that not all devices have microSD storage slots. The Nexus 5, for example, does not support a microSD card, so make sure your device can support expanded storage in this way first.

Cloud storage:

While a fair number of Android devices do have a microSD card slot, an alternative option for freeing up space is to use cloud storage. Those that haven’t embraced the changes the cloud have brought may find it a little tricky at first, but it soon becomes second nature. We recommend using cloud storage apps to store images, important files, and any files which are either too big or too small to make accessing them via a data connection worthwhile.

One of the best ways to access cloud storage is to download an app to your Android device. The perk here is that with most cloud storage apps, you can set these to automatically back up selected files. Make sure to check that your files are saved on the cloud app and then you can delete the files from your smartphone or tablet to create more space. The only downside to this is that you’ll need Internet or data connection to view photos on your Android device.

Delete unused apps:

If you have a new Android device and you’re already running out of space, you can free some by deleting any bloatware that might have come preinstalled on your device. Some bloatware apps can’t be deleted, but most of them can be removed. Simply go to Settings then tap Apps and then tap the app you want to delete and press the Uninstall button.

If you’ve had your Android device for some time, chances are that you have downloaded many apps including those that are rarely used now. Uninstalling these apps is a great way to free up some space. Simply open your app drawer, tap, and hold on an app to uninstall. When your home screen pops up drag the app to the top of the device and drop it over Uninstall to delete.

Wireless hard drive:

A wireless hard drive is a final option for gaining access to more storage space on your Android device. It is exactly the same as a portable hard drive, except that you connect to it via Wi-Fi.

One of the best wireless hard drives available right now is the Kingston Digital Wi-Drive 32GB which can be bought for as low as USD$50. These wireless hard drives are usually available from 32GB to 1TB, so make sure you choose one that will cover your future usage as well.

Having more storage space on your mobile device will not only enhance your work security but also give you some room to breathe. Looking to learn more about Android phones and what each one has to offer? Call us today for a chat.

Published with permission from TechAdvisory.org. Source.

June 3rd, 2014

SocialMedia_June02_CSocial media is quickly becoming one of the more useful marketing tools a business has. While a corporate profile can be a great way to connect with existing customers, many businesses find that because of the high number of people actually using these sites, these platforms are perfect for marketing and advertising, and ultimately in reaching and penetrating target markets. One way you can get your ads in front of people is through the use of social PPC.

Define social PPC

Businesses who advertise through social media have a number of ways they can get their ads and content seen on this platform. The most popular is based on one of the Internet's oldest marketing schemes: Pay-per-Click, or PPC.

In a broad sense, PPC is the act of paying an advertiser or website to place ads at strategic locations. Placing these ads is usually free, or comes with a nominal fee, but when a user clicks on the ad and goes to the destination site, the owner of the ad pays the advertiser or site a small fee.

In relation to social media, social PPC is simply ads which are placed on the social networks. For example, you can pay Facebook to place an ad on the right-hand bar of certain user's News Feeds. If they click on the ad, Facebook will then charge you a set amount for that click.

Where social PPC differs from other types of PPC, more specifically search PPC - paying search engines to display your ads - is that it is more display oriented. With search PPC, you pay the engine to show your ad when specific search keywords are entered. With social PPC, you pay the site to display your ad regardless of what the user is looking at.

3 Common misconceptions about social PPC

While this process is becoming more popular with businesses, especially those who have integrated social media into their marketing plans, there are some common misconceptions that seem to be floating around.

1. Starting small is the way to go

As with most strategies in business, when starting something new you often want to test the waters before jumping in full scale. Many companies who are trying social PPC for the first time will often start with one or two campaigns running at the same time. While this may work for small businesses with an unproven profile, those with an established profile and marketing strategy may want to try running 3-5 campaigns at the same time.

The reason for this strategy is that it can help spread out the overall views, along with enhancing the quality of information and results. For example, you can easily compare and establish what is working when you have more than two alternatives to compare.

2. You need to be active on the services you target

Despite what some people in charge of marketing believe, you don't need to be active on a social network in order to be able to use social PPC features. Many networks, like Twitter, simply require that you have an account in order to be able to use the ad features.

If you do want to use the ad features of different social networks, you should be sure to at least have a fully completed profile. This includes address, name, location, and business info. Of course, if you want to enhance the success of your initiative, an active profile will help but it is not necessary.

The best example of this is if you want to use the promoted post feature in Facebook. You will need to have content in order to actually use this feature successfully and the more content and followers you have, the higher the chances of what you promote being seen.

3. You MUST be using Facebook Ads

Facebook is the most popular social media platform, and many businesses already have a Facebook Page. But many feel that in order to maximize the potential of their Page, they need to be advertising using Facebook Ads.

Sure, it can help to use this service, but it isn't the only one out there. You do have other options, including different platforms such as LinkedIn and Twitter. To really get the most out of a social PPC campaign you should try different platforms anyway. For example, if you want to target other business customers try using LinkedIn, which is where this target group may be more likely to be found than through Facebook.

Looking to learn more about social PPC or using social media in your company? Contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
May 30th, 2014

voip_May26_CImplementation of a VoIP solution can offer businesses many tangible benefits. However, without proper management and IT support for VoIP solutions, you could see a negative impact on your productivity. You may experience limited communication from both customers and employees, especially when it comes to mobile or remote workers. The challenge is how you can expand your VoIP capabilities to become effective on-the-go.

To benefit from the positives that VoIP can bring to businesses it is necessary that VoIP works with the reality of your business needs. When it comes to catering for out-of-office workers, there are a variety of ways you can help expand the mobility of your VoIP services.

1. Look into Unified Communications

If your employees are able to bring their own personal mobile device to work, your IT administrators likely rely heavily on users complying with your company’s policies. It is up to you to establish good security and compliance measures in order to meet the needs of both your customers and employees.

A solid solution is to look into Unified Communications (UC), which integrates real-time communication services such as instant messaging, telephony, data sharing, and video conferencing. In other words, UC helps bridge the gap between VoIP and other computer-related communication technologies, as well as help control presence, a status indicator that conveys willingness to communicate and single number reach.

2. Employ easy to use apps

Believe it or not, most top-rated business apps began as user-focused tools to help people find data more independently. Some of these apps have transformed into more customized tools to keep focus on specific business needs. The one problem with this is that satisfying these needs often sacrifices overall usability. If your employees are struggling to use the mobile version of your VoIP solution, then they likely won't.

What this can lead to, especially when a mobile solution is required, is use of unauthorized apps. The problem then is that this can lead to an increased security risk. To avoid this, try implementing an app or tool that is easy to use, easy to navigate and easy to manage.

3. Work with an experienced solution manager

When looking to expand existing VoIP solutions, or implement new ones, it can be tough to actually manage the solution and ensure that it works when you need it to. One of the best ways to achieve this is to work with an IT partner like us. The perk to outsourcing management of a solution to us is that you can have us get your apps and solution set up and then take over administration of your mobile services once his is established.

4. Cloud support

Having on-premise equipment and support for your VoIP solution is a good idea. However, the problem here is your existing IT team may not be ready for the challenge of providing cloud-based mobile app or voice support. We recommend you go for a hosted VoIP solution, which delivers the same cost-effective, network-based service but where the equipment is based at a provider’s site rather than in your data center. This eliminates the cost of on-premise gear, maintenance costs, and overall management, while increasing the overall effectiveness of your mobile solution.

Expanding VoIP mobile capabilities can enhance business productivity by effectively keeping both your customers and employees in contact with your business more easily. If you’re interested in learning more about VoIP solutions, don’t hesitate to contact us today.

Published with permission from TechAdvisory.org. Source.

Topic VoIP General
May 21st, 2014

AndroidTablet_May19_CAndroid has become a far-reaching system, found on almost every type of mobile device. Tablets are among the most useful of these devices, and many Android tablet owners use Google's apps like Drive. In an effort to make Drive even more accessible, Google has recently released standalone versions of Drive's productivity apps.

A tiny problem with Google Apps

While the number of companies using Google Apps is certainly on the rise, there is a slight issue with the way the office productivity apps are set up. In order to access them on your mobile device, you have to first either open Drive in your browser or open the app. From there you can access the different files and open and read or edit them.

If, for example, you want to create a new spreadsheet, you have to open the Drive app and then create the spreadsheet on there. While this setup is great for many users, if you are a heavy user of Drive, and want to find this spreadsheet later on down the road, you are possibly going to have to search for it in Drive, potentially wading through hundreds of files.

This makes the productivity suite on mobile devices like tablets slightly less efficient, and could extend the time you need to take to work on a project. To many tablet users, this is counterintuitive to the main reason people use tablets in the first place - the device and the apps are meant to speed up work or at the very least accelerate efficiency.

Google's solution

Google has realized this issue and set out to fix it. Their simple solution was to create standalone versions of their popular productivity apps. What this means is you can now download the Docs, Sheets, and in the near future Slides, app. Opening each individual app will show all of your related files.

When you open the Docs app, for example, you will be presented with a list of all of your Docs, with the last opened or edited at the top. At the top of each app is a menu bar. Pressing the magnifying glass will allow you to search for a Doc while the other buttons rearrange the viewing order of your files.

Press the file folder and the folders on your Drive that contain Docs (if you are in the Docs app) or Sheets (if you are in the Sheets app) will be displayed. Finally, pressing the plus sign will allow you to create a new file. The files that you open using this app can be read and edited just as they would be in Drive.

The best feature of these apps

While these apps are ideal for mobile users, the best feature of the standalone versions is that support for offline creation and editing of files is built in. This means that if you aren't connected to the Internet, you can still open the app and create a new file or even edit existing ones. This is regardless of whether you have selected them to be available offline from the browser or mobile version of Drive. If you open the app, it should update all documents automatically to their last backup.

Where can I get these apps?

The apps are currently available for free on the Google Play store. You can find the Docs app here, and the Sheets app here. Keep your eyes peeled for the Slides app, which Google has noted will be out soon.

Looking to learn more about Google's mobile products? Contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

May 13th, 2014

Security_May13_CThe tool that allows the vast majority of businesses to utilize the Internet in order to carry out their day-to-day operations is the browser. While there are numerous browsers available, many businesses rely on Internet Explorer (IE). This browser comes pre-installed on all machines using Windows. However, if you use IE, there is a new exploit that you should be aware of.

What exactly is a zero-day flaw?

A zero-day flaw is a security vulnerability that is taken advantage of by hackers on the day it is discovered. In other words, there are zero days between the discovery of the vulnerability and people taking advantage of it.

The way most software programs work is if a user finds a security flaw, they will usually inform the developer who will then develop a fix and release it in a patch that users download. The problem is, sometimes it is a hacker who discovers this vulnerability. Instead of reporting it, they start to capitalize on the flaw, exploiting it to attack other users before the developer becomes aware of it and has a chance to fix it.

The IE zero-day flaw

In late April, news broke that a zero-day flaw had been discovered in Internet Explorer's code. The flaw affects IE versions 6-11 - essentially every supported version of the browser. Hackers had found a previously unknown flaw that allowed them to gain the same access rights as a user.

How it worked is that the hackers sent emails to users with links to a website that hosts a malicious code. These emails were largely phishing in nature, meaning they aimed to get the user to click on a link in the email. Some of the subject lines used in attacks included:

  • Welcome to Projectmates!
  • Refinance Report
  • What's ahead for Senior Care M&A
  • UPDATED GALLERY for 2014 Calendar Submissions
In these emails there was a link to a website that hosted a code which could then be executed if the user visited the site using IE. When executed this could potentially expose the user's system. Once vulnerable, the hackers could install malicious software without the user's knowledge.

How do I guard against this exploit?

The good news is that Microsoft has released a patch that fixes this exploit. This has definitely been welcomed, and what is really interesting is that Microsoft has actually released the update for XP users as well - this coming after the cessation of support for XP.

To guard against the exploit you should firstly update the version of Internet Explorer that you are using. The easiest way to do this is to go to the Internet Explorer website and download the latest version - version 11 - of the browser. Version 11 can run on both Windows 7 and 8, so the vast majority of users should already be running this latest version.

If you are using an older version, Microsoft has pushed the patch out via both IE's automatic update feature - so restarting the browser should install the update. The other option is Windows Update. Simply running the Update program and installing the updates should ensure that the latest version of IE is installed.

For Windows 7 and 8 users, you can do this by:

  • Opening the Control Panel on your system.
  • Clicking on System or Performance and Maintenance followed by System.
  • Selecting Automatic Updates from the menu in the window that opens.
  • Following the instructions in the new window that opens.
Once installed, you should restart your computer if you aren't asked to do so. If you noticed that Automatic Updates was already ticked, try restarting your computer and this should install the updates.

If you are using XP, you can visit the Microsoft Update website using Internet Explorer and following the instructions.

Aside from updating your browser, you should ensure that your anti-virus and malware scanners are up to date and scheduled to scan your system on a regular basis. Be sure to look at all emails closely as well, if one seems a bit dodgy, or you receive one from someone you don't know, it is best to ignore it and delete it right away.

Businesses who are using XP should seriously consider updating because Microsoft will not be introducing security updates in the future, leaving your systems at greater risk of attack. At the very least, it may also be a good idea to switch to another browser like Firefox or Chrome, both of which will work on XP and are updated regularly.

Worried that your systems are not secure enough, or still running XP? Contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
May 8th, 2014

AndroidPhone_May06_CWith the advent of Heartbleed, Bluebox released the Bluebox Heartbleed Scanner, a tool that can help smartphone users see if they are vulnerable to the Heartbleed bug. Despite the fact that around two-thirds of the Web is vulnerable, nobody knows the full extent of the problems it has caused yet. The sooner you learn more about Bluebox the better you can protect yourself against the threat that it poses.

The whole Internet community was thrown into chaos as soon as word about Heartbleed leaked out. Major companies were quick to respond and released updates to counter Heartbleed. It is a threat that you need to be aware of.

How Heartbleed works

Heartbleed is a weakness in the OpenSSL software which allows any attacker to steal information directly from the memory space of an application. This information includes private keys which keep data securely coded as it travels in the Internet.

This problem may seem insignificant to some but it’s important to note that the kind of information that can be stolen may include login data and online financially related accounts like PayPal and other money transferring sites.

The extent of damage caused by Heartbleed

Given the popularity of OpenSSL, the extent of damage expected is high. In fact, it did not come as a surprise that this threat even reached mobile devices through installed mobile apps. This is because mobile apps have built-in encryption to allow users to log-in safely.

Smartphones and the Heartbleed threat

Apple has claimed that its iOS is safe and Heartbleed cannot cause any problem to iOS devices. The same cannot be said though for all Android devices. Google has admitted that almost all versions of Android from 4.1 up contain vulnerable versions of OpenSSL. These devices are relatively safe though since all but Android 4.1.1 had the heartbeat feature turned on by default. However, the possibility of some OEMs switching the heartbeat feature back on in their phones is not remote, making the threat still very much real for all.

Bluebox and the Bluebox Heartbleed Scanner

In response to this threat, security software company Bluebox has developed an app that can scan your phone, available on the Google Play Store. When the Android major master key vulnerability was discovered in the past it was also Bluebox that stepped in and released a similar tool to address the issue.

This latest scanner allows smartphone users to check their devices to see whether they are safe or not. The Bluebox Heartbleed Scanner looks for apps installed within a device that carry their own OpenSSL versions. In turn, it checks the versions of the library to see if heartbeat is enabled.

The user’s part in addressing the problem

It is important to remember that once the scanner has detected apps that show vulnerability, the user need to do two things. Firstly, you need to report this in the apps review section of Google Play Store. This warns other users of an app's vulnerability. Secondly, you need to send an email to the developers. This notifies them and allows them to address this problem in their next update releases.

If you have any questions regarding the security of your devices, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

May 6th, 2014

SocialMedia_May06_CMarketing is an integral part of business operations and there are some useful strategies that can be employed, with one of the most effective being content marketing. This is creating your own branded content and sharing it on various platforms. When carried out successfully, businesses can see increased brand recognition and many more benefits. The question is how exactly a business can be successful with content marketing.

In a recent infographic published on LinkedIn, a number of interesting facts were highlighted about what the most successful content marketers have in common. Here are some of the findings from the infographic and the related reports it is based on.

What do successful content marketers have in common?

Regardless of the industry, the more successful content marketeers have the following four traits in common:
  1. They have a content marketing strategist - According to the statistics, almost 86% of the successful companies have a dedicated content marketing strategist.
  2. They have a strategy - While not 100% necessary, over 66% of successful companies have a content strategy and plan, or roadmap, that dictates what content is produced and when.
  3. They spend a lot more of their marketing budget - It can be tough to split any budget, but the more successful companies spend nearly 40% of their marketing budget on content marketing, as opposed to the least successful who only spend up to 16%.
  4. They find creating content far easier - This one is kind of silly at first glance - of course it follows that whatever you find easier you will be more successful at. However, if you hire a strategist who knows what they are doing, creating content will be easier, and more likely more successful.

How exactly are they successful?

From the figures from the infographic it is easy to see what the successful content marketers have in common, but the question we really should be asking is, "What makes them so successful?"

1. Use lots of social media

The main thrust of content marketing is to get the word out in as many ways as possible. Social media is the best and most versatile way to do this, and that's why over 87% of businesses use this platform. But for a truly successful strategy you need to use more than one site and in fact the most successful use seven sites at least to share their content.

This makes sense as the more platforms you use the higher the chance that your content will be viewed. So which platforms are the most popular? LinkedIn, Twitter and Facebook are the three most popular but other platforms like YouTube, Pinterest and Google+ can also prove effective.

2. Diversify your content

In many cases diversification of services or ideas can be one of the best ways of driving a business forward. This is especially true with regard to content marketing, where the best marketeers use an average of 13 different tactics. In descending order, the five most popular tactics are:
  1. Social media
  2. Articles on your website
  3. e-newsletters
  4. Blogs
  5. In-person events
Some other tactics used include, publishing books, ebooks, and branded content tools.

While 13 may seem like a large amount, especially for small businesses, the message is clear: To be successful with content marketing, you should diversify and utilize a number of different tactics as possible.

3. Have specific goals for your campaigns

As with most aspects of business, you need a clear direction in order to be successful. Without a goal there is a good chance that your content initiatives will be somewhat aimless and lacking in overall effectiveness. There are a near endless number of targets businesses can set for their content initiatives. The three most common are:
  1. Raising brand awareness
  2. Lead generation
  3. Customer acquisition

4. It's not all digital

One interesting finding was that one of the most effective ways to drive a content marketing strategy was through face-to-face events. In fact, over 70% of content marketeers believe that these in-person approaches are effective.

What this indicates is that while digital strategies are useful, and can be a great way to reach a wide number of different customers, these can go hand-in-hand with traditional style marketing. As well as focusing on producing digital content you might want to integrate this with some good old fashioned physical collateral.

At the very least, you should be attending events that are relevant to your industry, as well as networking. By getting your name out in person, you can encourage other to connect to you on the Web where they can view your content on various platforms and interact with you online, increasing the overall effectiveness and reach of your content.

Looking to learn more about content marketing and how our various solutions can help you deliver? Contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Social Media