Blog

March 4th, 2015

Sec A 164Most of us know we should make our passwords more difficult (sorry, folks, “1234” or "qwerty" just doesn’t cut it) and use an up-to-date version of antivirus software. But all too often, we opt for an easy life - use familiar passwords and put upgrades on the back burner. But security can be simpler than you think so here are a few not-so obvious tips that will make your online experience a whole lot safer. Here are three to keep in mind.

Embrace two-factor authentication

Also known as two-step verification, most of us have likely dealt with this at one time or another. When you’re logging onto your bank’s website or your email account from a different computer than you normally use, you’re sometimes prompted for a one-time password - sent to you via text message, email or via some other method.

Nowadays, many sites such as Facebook, Dropbox and Twitter also give you the option to use two-factor authentication each time you log in. So if you’re looking for an easy way to up your security, it can give you that extra protection without slowing you down too much.

Update browsers and devices

Did you know that dated versions of browsers, operating systems and even other software packages can create an easy entry point for hackers? Often, new updates are created specifically to fix security holes. And hackers are ever aware that people can be lazy - saving that update for another day that never seems to come. They’ll often try to take advantage of this, searching for outdated devices to infiltrate while their victims watch Youtube on last year’s version of Firefox.

Yes, installing an update might take 15 minutes of your time. But it can pay dividends in preventing a security breach that could cost you or your business thousands.

Use HTTPs

When was the last time you typed those letters into a browser? Probably not this decade. It’s no wonder most people are unaware of this tip. So for those who are oblivious, https is the secure version of http - hypertext transfer protocol. Believe it or not, that last “s” actually adds an extra layer of protection. It encrypts information sent, both ways, between a website’s server and you.

You’re probably thinking, adding that last “s” to http (or even typing in http in general) is a complete pain in the rear. So to make this easier you can actually install a program like “HTTPS Everywhere” that’ll automatically switch an http into an https for you. Currently “HTTPS Everywhere” is available for Firefox, Chrome and Opera.

Looking for more tips to boost your internet security? Get in touch to find out how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
March 3rd, 2015

Productivity_Mar3_AHow much time in your organization is spent reading, sending and replying to emails? Chances are, the answer is “too much”. It’s a modern day epidemic - we all spend far too much time in our inboxes, and we rely on email too much to keep us in check and on task. But even before you get to the body of the email itself, by focusing on writing concise and consistently structured email subject lines, you can make life easier and more productive for both you and your recipient. Foster a culture of email subject discipline in your company and you’ll see the results in improved productivity and efficiency - here are three tips to get you started.

Specific subjects spell success

If someone sends you an email that’s headed simply with the word “report”, how are you meant to know what they want from you? Do they need you to write a new report, proofread one they’ve already written, or print a report for them? You inevitably start reading the email without the first idea of what it is you’re being asked to do.

In an ideal situation, when you receive a new email you want to know in an instant - just from the subject line - what the message is about. And that is something you should make possible for recipients of your own emails too. So structure your subject line using keywords - for instance, change that “Report” to “Sales Report for February 2015”. Better still, give your colleague all they need to know at a glance - “Draft Sales Report for February 2015 by Monday, 1pm” - so that the body of the message is preserved for you to get down to details as succinctly as possible.

Use prefixes and suffixes

Another simple way to help your recipient understand at a glance what you need from them - and to make it easier for them to categorize their incoming emails, too - is to specify right in the subject line what type of message it is that you are sending them. Emails come in all shapes and sizes, and by placing a prefix before or a suffix after your main subject line, you’ll get quicker results.

For instance, if your email needs a definitive response from the recipient, start it with “ACTION:” followed by the subject. An example would be “ACTION: Draft Sales Report for February 2015 by Monday, 1pm”. If, on the other hand, you are simply dropping your colleagues a quick notification that the printer is out of order, you can use one or both of “FYI” (for your information) and “NRN” (no reply needed). For example: “FYI: Printer out of order until further notice” or “NRN: Printer out of order until further notice.”

You can take this one stop further. If you can get your entire message across in the subject line alone, then that’s exactly what you should aim to do. That way, your colleague can read the subject line, add the task to their to-do list and delete it straight out of their inbox. To quickly signal that there’s nothing in the email body, you can suffix your subject line with “EOM” (end of message) - for example, “FYI: Printer out of order until further notice. EOM”.

Keep it consistent

These tricks will only help you beat a never-ending inbox if they’re adopted and applied consistently across your organization. Make them a part of your company’s basic IT training, and encourage your staff to use them in their own work and to pull up others who fall back into bad habits. They may be skeptical at first, but they’ll soon jump on the bandwagon once they start to realize how much less time they spend managing their email account!

Think too about introducing standardized formats for subjects of emails you and your teams send on a recurring basis. For example, if you regularly send reports around for review, prefix your subject line with “Report for Review:”, followed by the topic of the report. Or if your employees send you a weekly update on their workstreams, have them title it “Weekly Update:” followed by the date. That way, you can set up filters in your inbox and have those emails smartly stored in one place, ready for you to look through when the time is right, rather than clogging up your inbox and making it look like you have more urgent tasks to complete than you actually do.

Want to learn how to use email systems efficiently to boost your firm’s productivity? Chat to us today about the innovative email solutions we can provide.

Published with permission from TechAdvisory.org. Source.

Topic Productivity
March 2nd, 2015

HealthcareGeneral_Mar2_ANowadays professionals in healthcare services use Electronic Medical Records (EMR) to gather a patient’s data and record medical information. EMR are more beneficial than paper records because they eliminate the problems of poor handwriting and allow users to organize and store data more efficiently. They are also one of the best tools to ensure a patient’s safety, prescribe medication, and manage chronic illnesses. However, with so many EMR vendors out there, choosing the best EMR to suit your healthcare practice can be overwhelming. Here are some criteria to consider when selecting an EMR system.

Determine your requirements

This is a very important process and should not be something you leave to the vendor with no input yourself. EMR offer a vast selection of functions, and you don’t want to end up choosing one that is irrelevant to your practice. The first thing you must do is to narrow down the features you need. You should make a list of all requirements from the ground up: patient admission, patient scheduling, medication lists, visual reports, and so on. Then you need to prioritize the features that would bring the most value to your practice.

Get the appropriate EMR for your specialty

Most EMR products have a wide range of capabilities while others meet specific needs for medical practices. EMR systems with broad functions may not offer the features that you need. On the other hand, the right EMR will be customized to suit your specialties, which will provide a familiar workflow. For instance, doctors who specialize in midwifery will need a unique EMR platform designed for this type of work. So ensure you have the right tools to do your job!

Simple Usability

For healthcare professionals, dealing with patients and medicines can be time consuming enough, without systems and processes making things more complex. EMR should make the whole treatment process easier, not harder. How do you know whether your EMR solution is easy to use? You can try out the demo version and road test a few common functions that assist in your everyday routine. You should be able to figure out how to use it more or less right away. Simplicity helps a lot, especially when implementing a new system - you need employees to be able to catch up quickly.

Support and upgrades

As with other types of software, you’ll want all the support you can get from your vendor. Reputable sellers will usually provide 24/7 support, which is beneficial as most likely you’ll come across technical problems at some point. You never know when you might need someone ready to answer questions late at night. And when it comes to software, support often includes upgrades with new features and bug fixes. Find out more about your potential vendor’s track record in giving quality care and consistent software updates.

Vendor viability

Take into account your vendor’s plans for the future before buying their EMR product. You’re not just buying from your vendor, but you’re also creating a long-term relationship with them. Remember that technology is always changing, as are medical regulatory standards. So you’ll want to make sure that your vendor will be in business in the long run, and that they have the ability to invest in future development. After all, EMR implementation can be costly and you don’t want to be making major changes to your EMR system every few months.

If you want to adopt EMR in your healthcare business, get in touch with us today and see how we can help.

Published with permission from TechAdvisory.org. Source.

March 2nd, 2015

Trouble aheadBusinesses are exposed to disasters all the time, including IT system failures, power outages, or even natural disasters. These causes will cripple your business unless you have a business continuity plan (BCP) ready. A good BCP allows your business to continue on running everyday operations seamlessly. It makes sure that you can service your customers in a satisfactory manner, even when you’re facing technical issues. Therefore it’s very important to come up with a continuity plan, if you don’t already have one.

Relevant factors such as your business’s resources, location, suppliers, customers, and employees must be carefully analyzed before a business continuity plan can be formed. It is also necessary to test the plan and check whether it’s working or not. Here are some proven methods to test your continuity plan’s efficiency.

Review the BCP

You have a business continuity plan ready with all the necessary information, contingency locations, personnel, contacts and service companies. The question is can you really pull it off? Have the plan reviewed regularly, or at least quarterly. Gather a team of individuals, heads of departments and managers to discuss the plan. Focus on the business continuity plan’s feasibility and pinpoint any areas where it might be strengthened.

Determine time and duration to test the plan

You should decide how often you test your business continuity plan, and for how long. Even if you have a solid plan in place, it’s still wise to review it again after a few months. Come up with a schedule for testing the plan and share it with employees. Testing time may take anywhere from one day to two weeks. However it can also take as little as three hours to determine the effectiveness of the plan by monitoring employees’ responses and decision-making abilities, based on the guidelines of the business continuity plan.

Outline objectives to employees

Most business continuity plans fail because they have never been properly relayed to employees. Emphasizing the plan’s importance to your business and demonstrating it to employees is crucial. You need to outline objectives for the business continuity test to your employees, informing them how you plan to measure its success and failure, so that they get a general idea of their roles and your expectations.

Create a scenario

Create a fake scenario that affects your business - whether it’s setting off fire alarms or announcing another disaster. Employees should act as though the scenario is genuine, and refer to their duties in the business continuity plan, going through it step by step. Monitor the time it takes to get everything under control, from contacting customers to checking business resources and temporary meeting locations.

Evaluation

After the business continuity plan is put to test, gather your employees to discuss the plan’s overall performance. Identify where it needs improvement and encourage the parts that worked best. Make changes to key persons and actions where necessary, to ensure that the continuity plan is working at its best.

Having a business continuity plan is good, but testing it regularly is equally important. Contact us today and see how we can help you cope with unexpected disasters.

Published with permission from TechAdvisory.org. Source.

February 27th, 2015

Happy  Mature Man Using CellphoneWindows Phones may not have the biggest market share in the smartphone industry, but they have a number of useful features for business people. Whether you're seeking the ability to do business presentations, increase productivity or manage devices remotely, Windows Phones have the capability for this and more. So if you’re using a Windows Phone, you can improve business performance by taking advantage of these features.

Data Sense

Nowadays, telecommunication service providers restrict your Internet usage to a few gigabytes of data on a monthly basis. When you’ve exceeded this data limit, your Internet speed goes down drastically, and you might even have to pay extra to maintain speed. Data Sense allows business users to stay productive while on the go by monitoring their data usage. You can set a monthly data limit and Data Sense will help you control background applications and save certain downloads for when you’re connected to a Wi-Fi network. This way, you can save your precious connection speed for when you need it most.

‘Running late’ notification

At important business meetings, you don’t want to be the one seen as unprofessional for turning up late, especially if you haven’t been able to let people know what's happening. But even if you strive to be on time for every appointment, sometimes things are beyond your control. The ‘running late’ notification in the Windows Phone calendar app lets you send a quick message to your colleagues, to alert them to the fact that you’ll be late for a meeting. Simply do this by setting a default message, then choose a meeting in your calendar. The notification feature will pull contact information from your address book and send an email to attendees of your choice. Just make sure you have a good excuse when you do turn up!

Office Remote

This powerful application turns your Windows Phone device into a remote control for Microsoft Word, PowerPoint, and Excel documents. Business presentations are easier with Office Remote, which you can use to jump between PowerPoint slides and control a laser pointer to draw your audience’s attention. You can also use it to store your speech notes, and you can glance down to monitor your presentation time on the screen. Office Remote is simple to implement, requiring only Bluetooth and a small piece of add-in software that allows you to connect your Windows Phone and PC.

TeamViewer

What happens when you’re out of the office, and a client calls to request information stored on your computer? Well, the good news is you don’t need to rush to your desk. With TeamViewer, you can access your PC’s desktop right from your Windows Pphone device, as long as the computer is turned on and running the TeamViewer program. This can save you a lot of time when you’re outside and need to check a file or run a program on the go.

Mobile device management

If your business deals with confidential client information, then deploying Windows Phones to your employees can be risky. Microsoft has come up with Windows Intune, an application to centrally manage and secure your employee’s Windows Phone devices. Windows Intune allows the administrator to manage updates, control which applications can be installed, and protect the devices from viruses and malware.

If you want to integrate Windows Phones into your business, contact us today to get started.

Published with permission from TechAdvisory.org. Source.

February 26th, 2015

Hardware_Feb26_AWearable technology is here to stay - there’s no denying that. Whether it’s Google Glass, watches that monitor heart rate, or jewelry that alerts you to incoming calls and text messages, there is a growing trend for high-tech clothing and accessories, and it represents a growing market. These are the sort of gadgets that can bring innovative technology to your very person, and therefore boost day-to-day productivity in life and business like never before. But since the apparent flop of Google Glass, it seems increasingly likely that Apple’s move to bring its Watch product to market will take time to catch on. Here’s why you might want to hold off jumping on the Apple Watch bandwagon just yet.

The battery dwindles all too quickly

Much like your smartphone - perhaps even more so, in fact - if you buy yourself an Apple Watch then it’s likely you will want it to travel with you everywhere. That means it’s going to be on your wrist, in use and burning through its battery charge, for a good portion of the day. It might not be running at full capacity the whole time, but it’s unlikely to be on complete standby either. You might use it to check the time, the weather, your e-mails. It might sound an alarm when you need to leave the office for a client meeting, display your fitness regime progress at a glance, or help you find directions to the convention you’re attending tomorrow morning.

And while Apple claims its Watch will hold out on you for between three and four days when in one of two standby modes, in truth there’s no way those modes are going to get much use when you’re playing with your brand new toy. In fact, experts believe that with moderate to heavy use you could expect it to begin powering down after just two and a half hours. That’s not much help if you are hoping to use it as a more convenient replacement for your smartphone. Though Apple is rumored to be mulling over a more powerful battery, that will likely be released at some point in the future - in the meantime, less than perfect battery life will be off-putting to potential Watch users.

It’s late to the party

Okay, so Apple has demonstrated before that it can show up after everyone else and still do a great job of ruffling feathers - it certainly wasn’t the first smartphone around, and yet it has managed to do an impressive job of market domination. But Apple’s rivals have been in the smartwatch arena for some time and that means companies like LG, using the Android Wear platform to develop their devices, have the benefit of almost a year of customer feedback behind them. Put simply, they already have more of an idea than Apple as to what consumers are looking for in terms of both design and features. With Apple likely to be playing catch-up for some time, it seems probable that it will be a while before the Apple Watch will become a must-have gadget.

It’s just too Apple - and yet not

Apple has carved a reputation out of devices that sell themselves thanks to killer apps that make them essential purchases. When the idea of the Apple Watch was first touted, it was meant to do the same - a comprehensive fitness regime tracking app that revolutionized your exercise routine would have put it well and truly on the map. Yet technological capability and regulatory compliance appear to have got in the way, and what has made it to market seems to be a watered down version of the dream. Without this, the device looks to be scheduled for release with little to really wow its audience aside from incorporation of the Apple Pay service.

And yet Apple Watch appears to have burned itself on two fronts because, while its apps have failed to impress critics, the distinctive Apple design goes against the grain of industry efforts to make wearable tech look less tech-y. With watches especially, the aim has been to produce devices that look like their traditional, analog cousins, in order to make it feel more socially acceptable to wear them. Nonetheless, having the latest iPhone release has undoubtedly become a status symbol, and Apple’s refusal to rein in its branding could prove to be a worthwhile gamble and make the Apple Watch even more attractive to consumers.

Of course, Apple will count on its legions of fans to make the Watch a success in spite of whatever shortcomings it might have. Wearable technology is certainly here to stay, and the Apple Watch release is a development for both consumers and businesses to keep a close eye on. Though you might want to hold back on the Apple Watch being the productivity boosting device your company has been longing for, it could yet win its way into our technological hearts - you’ll have to watch this space (excuse the pun).

To learn more about the benefits to your business of wearable technology and other hardware solutions, give us a call today.

Published with permission from TechAdvisory.org. Source.

Topic Hardware
February 25th, 2015

YCloud 1_164ou’ve been thinking about signing up for Cloud services. But you’re skeptical, and lingering questions are still bouncing around your mind. Will the Cloud really help my business? Will it increase profits? What is its true value and purpose? If you still have any doubts about this so-called futuristic technology, read on. We’ll clear up what the Cloud is really all about and how it actually benefits your business.

You might say that many businesses sign up for the Cloud because it is touted as a revolutionary technology. And if you’re one of those that has already hopped on the bandwagon, you may actually be among the soon-to-be disappointed.

The reasoning behind this is simple. Businesses who get the most out of the Cloud know which specific problems it will solve for their organization before they even sign up. They know which workflows and tasks can benefit from, and have their efficiency boosted by, Cloud technologies. And they’ve identified how the Cloud can rewire their work processes.

The true purpose of the Cloud

Did you catch the word “efficiency” in the block of text above? If you did, then you’ve identified the true value the Cloud brings to a business. Don’t believe the hype that the Cloud will somehow magically boost your bottom line. Although it has that potential, the Cloud is all about efficiency. It can save you time searching for important documents, updating software, and replacing documents stored on a lost laptop. And it enhances efficiency and collaboration among your staff. What's more, when your business is in the Cloud, your business is everywhere. And that means increased efficiency.

Where businesses go wrong with the Cloud

Besides jumping on the Cloud bandwagon without considering where it can benefit your business, a major reason the Cloud fails for SMBs is because they’ve chosen the wrong vendor. The truth is, some vendors are going to try and oversell you on Cloud services you don’t need. Instead of getting a whole suite of Cloud services such as software plugins, a new Cloud infrastructure and development platforms, maybe your business would benefit much more by just keeping it simple with Google Apps. Sometimes pork and potatoes are going to beat a steak. It really just depends on your objectives.

Secondly, if you’re a small business, make sure the IT provider you’re talking to caters to small businesses. If their target customers are large enterprises, you’re likely going to be overpaying for a service that doesn’t align with your business model.

Does the Cloud really add value to my business?

Have no doubt that the Cloud can improve efficiency if you know where to implement it. A study of 757 SMBs by Exact and the Centre for Enterprise and Economic Development Research found that one in five SMBs surveyed had implemented Cloud technologies, and 78% of those were operating at levels above industry standards.

In conclusion, is adapting the Cloud going to instantly start making you money? Likely not. But it will impact your business in other valuable ways for the long run. You’ll have increased flexibility, scalability, improved processes and streamlined workflow. Is all this good for business? Well, what do you think?

To figure out how the Cloud can effectively fit into your business model, contact us today.

Published with permission from TechAdvisory.org. Source.

February 23rd, 2015

SocialMedia_Feb23_AHave you heard that social media can be used to skyrocket your business to unprecedented heights of success? You probably have; people like to talk. But unfortunately, not a lot of this talk is backed up with practical tips on how to go about it. So if you’re tired of waffling in the social media stratosphere, read on for some smart, focused advice that will breathe new life into your social media efforts.

Undoubtedly, the most important strategy to use in your social media plan is...to have a strategy to begin with. Know how much time you can dedicate to social media, block out the hours to focus on it and don’t waste that time checking out friends’ vacation photos or celebrity twitter feeds.

If you don’t have a strategy, you’re going to waste time posting irrelevant updates that won’t engage with your audience. To help you plan an effective social media strategy, here are three crucial tips to get you off on the right foot.

Initially focus on the big three

Most social media experts agree that the three platforms that generate the most business leads, engagement and brand exposure are Linkedin, Facebook and Twitter. When you’re getting started, your efforts should be primarily focused on these three. After you’ve gained followings here, then you can start forging paths into YouTube, Instagram, and Pinterest amongst others.

Post at prime exposure times

Studies have shown that around lunch and dinner time are ideal posting times (since everyone is uploading photos of their meals). As for which days, many marketers agree your posts are most likely to get noticed on Tuesdays and Thursdays. So these are the times to deliver those high-impact messages you’ve been randomly shooting out.

Find the value in your post

On social media, you should always be focused on selling your services, right? Wrong. Only 15% of your posts should concern news about your business and its products. The other 85% should focus on providing fun, valuable and timely content.

When you create a new post, you should ask yourself what’s in it for the customer. What do they get from reading it? Seriously, why is someone going to share your post or talk about your business unless it adds value to their life? Think about the posts you share personally. Do they provide value to your friends and family? We’re guessing the answer is yes.

For more tips on how social media can create buzz for your business, contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
February 19th, 2015

RepAMost people over the age of 20 would agree it’s not wise to accept a friend request from a stranger on Facebook. That profile image of a voluptuous vixen in a string bikini, that you swore you just saw in a lipstick commercial, is likely a dude who lives in his parent’s basement with nothing better to do than hack your account. But when it comes to LinkedIn, what’s the right move when a stranger sends you an invite? Here are some of the reasons you might want to accept or reject that LinkedIn invitation.

Why to reject

Rejectors of stranger invitations have a common argument that’s hard to dispute. If you connect with a stranger, and a trusted member in your network (who you actually know) asks for an introduction to that connection, you may look a bit silly saying you’ve never met the guy. This scenario can obviously be a bit awkward. And LinkedIn rejection enthusiasts like to use this argument as their trump card to silence the opposition.

To go along with this, they may further ask what would happen if that stranger started requesting introductions to valued members of your network? Again, you might find yourself in an awkward situation.

The core philosophy of any LinkedIn invite rejector is that your network should be made up of people you know and trust. Some people see a connection on LinkedIn as an endorsement of that person. If strangers in your network have a bad reputation that you don’t know about, and others see that you’re connected with them, it could be a bad reflection on you.

Why to accept

More people seem to lean toward connecting with LinkedIn strangers than against. But does that actually make it the right decision? Why do people choose to accept invitations from people they don’t know?

People with 500+ connections appear powerful, even if most of their connections are with strangers. Seriously, think about it. Who would you be more likely to trust, a person with 70 connections or one with over five hundred?

More connections also mean a higher chance of being found. More and more recruiters are jumping on the LinkedIn bandwagon and, whether you’re looking for freelance work or for a new job, LinkedIn is a great place to be found. The more connections you have, the easier it is for you to appear in search results.

What’s more, a higher connection count can lead to your profile reaching a larger audience. If you have a business, feel like you have something to say or just want to speak your mind in a professional manner (save the posts about your drunken exploits for Facebook), LinkedIn presents an excellent opportunity to get your voice heard. And the more connections you have, the more people you’ll have the opportunity to influence.

The choice is yours

There is no right or wrong answer when it comes to connecting with strangers on LinkedIn. It comes down to personal preference and objectives. If you want your network to be trusted individuals you actually have a relationship with, then it’s better for you to reject those stranger requests. On the other hand, if you’re looking for more opportunities and are self-employed, connecting with strangers can be a great way to drill up more business.

But there is middle ground, too. Maybe you don’t connect with just any old stranger (like that guy who works for the Bank of Nigeria), but if there is someone who is a friend of a friend or who works in your field, it might be worth connecting with them. Remember, your friends were once strangers too, so maybe that request from Bill who works at your local hardware store will turn into a blossoming business relationship. You’ll never know if you don’t try.

If you’re looking to learn more about LinkedIn and other social media platforms, contact us today and see how we can help.

Published with permission from TechAdvisory.org. Source.

February 18th, 2015

Security_Feb18_AWhether we use them for business or pleasure, we all want the confidence that the online services we use to store files, post life updates or check our email are given adequate security protection to safeguard our information. But since high-profile breaches such as the celebrity photo leaks of 2014, the security of Apple platforms has been in the limelight. So it is a welcome move that Apple has extended its two-step authentication feature to the popular FaceTime and iMessage applications.

After the fall-out from the celebrity photo leaks, Apple extended the two-step authentication process (also known as two-step verification) to iCloud, the online storage platform at the center of the scandal. The feature was initially introduced only to the user IDs for access to Apple accounts; the motivation for the launch of that extra security measure was the hacking of a journalist’s data back in 2013. But what is two-step authentication and how does it work to protect your data?

The premise behind two-step authentication, which experts recommend all businesses implement as part of their security strategy, is actually pretty simple. Usernames and passwords are all too easily stolen by malicious parties, whether by phishing emails or a more sophisticated hacking attack. So, rather than typing just your username and password to access your account, the password is teamed up with a four-digit verification code which is newly and uniquely generated each time you attempt to access your account.

The verification code is delivered by text message (meaning that to use the two-step verification feature, you’ll need to have a cellphone to receive the SMS on). As a result, even if a hacker manages to get hold of your password, unless they also have your phone by their side then they won’t be getting into your account. This authentication method is already used by organizations around the world including banks, mobile service providers and other companies who recognize the added layer of security that it brings. And now you can give yourself the same level of protection to ensure that only you can FaceTime your family and send iMessages to your friends.

Fear not, there’s a backup plan to ensure that you can still access your accounts if you happen to forget your password or if something happens to your phone so you can longer receive authentication codes. Apple also provides you with a 14-character recovery key that will get you back in if all else fails. To enable two-step authentication for your FaceTime and iMessage applications, login to your Apple ID account, select Password and Security and then click Get Started under Two-Step Verification.

To find out more about using two-step verification and other security measures to protect your business, contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Security