Copeland Data News - January, 2015
Happy New Year!!! With 2015 already upon us, many of us are wondering, "where did the time go?"
System breaches resulting in the compromise of personal information indicate that security continues to be a concern.
Microsoft is enjoying success with their Surface Pro 3 tablets, catering to business users who need a small, nimble device that works within a corporate Windows infrastructure.
That being said, if you come across anything that you would like to discuss, never hesitate to drop us a note. We are here to help and serve you in any way we can!
In this issue of Copeland Data News
Windows 10, the successor to Windows 8/8.1, will be released later this year. Microsoft, however, is not yet saying exactly when that will be.
Some of the features of Windows 10 include:
A personal assistant like Apple's SIRI that will be on all Windows 10 devices, whether that be desktops or phones, or anything in-between.
Like we see on Android and Apple's iOS, a notification area will house all messages from various sources.
- Two-Factor Authentication
On Standard and Enterprise versions of Windows 10, in addition to a username and a password, another question will be asked in order to keep your systems more secure. Examples may include "Name of your high school" or "Name of your first pet."
- Start Menu
The Start menu is back with additional functionality, including enhanced web searching via Bing.
- Snap Assistant
Allows the user to create multiple desktop environments for different purposes.
Windows 10 is what many say Windows 8/8.1 "should have been." While Windows 7 has been the standard enterprise desktop the past few years, Windows 10 is the logical transition. Business users, generally speaking, avoided the Windows 8/8.1 editions for many reasons.
Windows 10 is said to run the same code base on all devices (desktops, smartphones, tablets) and will be the first operating system with a unified strategy like this.Pricing has not been disclosed by Microsoft for Windows 10 as of this writing. Microsoft is also considering a subscription option where the user can rent it month-by-month.
As time goes on, we need to be aware that Millennials (18- to 30-year-olds) view the business world differently from their parents. We need to understand and adapt to Millennials in two different ways:
- Millennial Prospects/Customers: We need to realize how they view products or services and how they prefer to buy them. We need to provide access to these products and services in a way that is comfortable and familiar to them or they will take their business elsewhere.
- Millennial Employees/Associates: We need to understand what their goals are and how to best use their unique talents and perspectives to support our organizations and provide better products and services.
Millennials typically share the following attributes:
- Millennials are naturally more tech-savvy. They know their way around the devices they use every day.
- Millennials are very well-connected to others.
- Millennials tend to multi-task well, likely encouraged by the technology with which they grew up.
- Millennials prefer using technology to buy products and services versus face-to-face interaction.
- Millennials tend to judge a company rather quickly on its "digital face" - websites, Facebook pages, and phone apps. They tend to ignore companies that don't pay attention to their digital presence and view them as companies with which they would rather not work.
The list can go on and on, but the key point is that Millennials comprise a very important demographic that cannot be overlooked when developing business strategies. It is time to look at your web content and other digital offerings with Millennials in mind. Retool your image, corporate voice and communication methods to adapt to a generation central to business growth.
Amazon.com has numerous books specifically written on this subject if you want to learn more.
The every-rising cost of resources provides a challenge to businesses trying to turn a profit.
People, or "human resources," are no exception. With so many distractions like Facebook, YouTube, games, news websites, Pinterest and online shopping, an associate who is not focused on his or her work during the business day is extremely costly to your business. It is critical for many companies to ensure their employees are working distraction-free and as effectively as possible. This is where Spector 360 comes into play.
Spector 360 is a software solution that monitors and archives your employees' computer activities. With this in place, you can easily analyze where your employees are spending their time each day.
Spector 360 is installed on a server or "headless" desktop (like MailClone, for instance) and can be configured to monitor any number of computers on your network.
Spector 360 Features and Benefits:
- Complete Internet & PC Monitoring
Every facet of PC usage is monitored and recorded at the workstation level providing you with valuable information on how your office PCs are being used.
- Activity Visibility Across Devices
Watching only computer activity leaves you vulnerable to data theft and leaks on your smartphones. Spector 360 gives you unmatched visibility into what your employees are doing, regardless of the device.
- Centralized Management
PC recordings, including Events, Screen Snapshots and Email Attachments are transferred to a centralized depository (called the Data Vault) allowing for quick access, backup and review by the Spector 360 Dashboard application.
- Scalable Architecture
The flexible architecture of Spector 360 allows your monitoring and surveillance capabilities to expand as your company grows.
- Rapid Deployment
MMC-based deployment tools make installation, configuration and ongoing data collection easy.
- Data Security & Integrity
With multi-level user accounts, optional file encryption for Email Attachments and Snapshot files, and a centralized SQL database, Spector 360 offers multiple layers of security for your recorded data.
The client recorder installs in seconds and operates in "stealth mode" so your employees are unaware that they are being monitored.
Assign roles to those using Spector 360 to restrict their views when monitoring certain employees or departments. For example, you can restrict the view of a front line manager so he sees only the data collected from the employees in his department.
- No Performance Impact
The additional overhead incurred to monitor your employees is marginal and will not impact your network or the computers being monitored.
End User Benefits include:
- Intuitive & Easy to Use
The Spector 360 Dashboard, with its feature rich User Interface and built-in Wizards, offers both a "High Level View" and "Detailed View" of how your employees use the Internet and Computer Resources.
- Feature Depth
Spector 360 provides you with numerous tools and capabilities, making it the most powerful Employee Monitoring package on the market.
You can create customized charts and reports to address the specific needs of your organization.
Powerful search capabilities are provided that allow you to sift through voluminous data to locate a specific word or string.
- Information Accessibility
There are more than 50 built-in charts and reports that can be generated quickly on demand.
Business are paying more attention to the cost of human resources these days. Additionally, employee monitoring for remote users is even more essential. The product pays for itself quickly because the cost of an inefficient or distracted employee is staggering. If you want to talk more about employee monitoring tools like Spector 360, please let us know.
Did You Know?
Data is the lifeblood of business today and backups are critical. We are seeing that in many cases, backup logs, typically sent by email, are not being monitored properly and consistently. We urge you to review this practice in your organization, as failed backups after a period of time could result in a business having no data to restore.
PCI, the Payment Card Industry, has been making moves to shift liability from the provider (Master Card, Visa, etc.) to the businesses processing cards, which may be you. This mandate is likely to change later on this year. The use of payment cards with embedded chip technology is being driven by the fraud and theft occurring over the last few years. You may want to talk to your credit card processor about how these changes may relate to you.
Prevent server and infrastructure problems before they become too costly by implementing CDS Monitor on your servers and optionally on your desktops. CDS Monitor watches your network and reports to us critical issues that, if left unmanaged, will result in system downtime and loss of services to your users. We are notified within minutes, immediately review the issue and follow-up with you regarding the situation at hand. Most companies today are moving towards this managed approach to ensure their systems remain stable and available. Please ask us about CDS Monitor for your organization.
Business Internet needs are changing. Lower-priced connections worked well in the past when Internet activity was limited to email and light web browsing, but these low-speed connections (7 Mbps and less) are no longer effective. Time Warner, for example, has effective pricing on their 35x5 connection (35 Mbps download and 5 Mbps upload). In some cases, the difference between a low-end connection and a great connection may be as little as $30/month.
CryptoLocker-style viruses continue to penetrate business systems. Keep educating your users to only click on links and attachments from trusted sources and when expected. If they suspect that they clicked on something suspicious, have them immediately unplug the network cable or power to the machine. Urgency is critical to help stop the progress of destruction onto your network.