Blog

February 13th, 2015

BC_164_AIt’s Monday morning, you’re the first one into the office as usual. You take your keys out and unlock the door only to find your office in complete disarray. Documents are thrown everywhere, chairs are knocked over and the worst part - all of your computers are gone. To your right, you notice a smashed window and a trail of keyboards and cables. Then it hits you. You’ve been robbed. Situations like this can happen to businesses of all sizes. The question is, are you prepared? Here’s how you can create a business continuity plan that keeps you open and making profits when the unexpected strikes.

The difference between disaster recovery and business continuity

While it’s easy to overlook the differences between a disaster recovery and business continuity plan, there are actually some key variations you should be aware of.

Disaster recovery is the restoration of business operations and IT infrastructure after a disaster has already occurred. Business continuity, on the other hand, is focused on maintaining business operations and profits throughout a disaster. While disaster recovery is mainly focused on the slice of time immediately following a disaster (how you replace your equipment and restore IT infrastructure asap), business continuity looks at the bigger picture - the continuity of the company as a whole. It ensures you can run your business and maintain profits during the process of recovering from a catastrophe. It generally includes a disaster recovery plan as part of it.

Creating your business continuity plan

The first step in creating your plan is to identify which of your IT assets are vulnerable to disaster. To do this, you need to ask yourself some important questions, starting with what might happen if you were to lose the functionality of a specific asset for a day, a week or even longer. Answering this question will help you identify your most critical IT assets; the ones that are integral to your business operations.

Here are some other important questions to ask when drafting your business continuity plan:

  • What is the purpose of my business continuity plan?
  • What disasters can affect my IT infrastructure?
  •  What are my key business areas?
  • Which different business areas, assets and departments depend on each other?
  • What is the longest amount of time I can go without functionality of IT assets?
Once you can answer these, it’s time to start planning. Write down your thoughts, and then contact an IT provider like us for assistance. We’ve helped countless businesses just like yours prepare themselves in order to remain operational throughout catastrophes. We can also help you identify potential problems that you may not have thought of.

Need help creating your business continuity plan? Contact us today to see how we can help you stay running and turning profits when disaster hits.

Published with permission from TechAdvisory.org. Source.

February 12th, 2015

SocialMedia_Feb12_AWhen it comes to social media, most of us have privacy concerns at the forefront of our minds. Who can see what we post? Who owns the photos we upload? It even comes down to wondering what happens to our social media identities when we die. It is part of the reason for the emergence and subsequent popularity of apps like Snapchat, which allow you to send a photo to a friend and at the same time specify when it will self-destruct. Now, a new entrant to the app marketplace is taking things a step further - it wants to protect your privacy by filling Facebook with pictures of cats.

But there is more to it than that: the team behind social messaging app Wickr aren’t looking to post images of our furry friends just for the fun of it. In fact, the feline factor is just one feature of the app, known as the Wickr Timed Feed. Wickr actually promises to offer greater security and privacy controls than similar apps like Snapchat - but whereas Snapchat simply lets you set your images to self-destruct once they have been seen by the recipient, Wickr takes an alternative approach.

As well as allowing only pre-approved friends to see your photos within your Wickr feed, the app lets you share each photo through Facebook and control which of your friends can see it. So where do the cats come in? Well, when you first share to Facebook, no-one will see your photo - instead, they’ll see a decoy image of a funky-looking cat. However, Facebook users then have the option to click through to Wickr and, if they are one of up to 151 people you have pre-approved to have access to your real photo, it will be unlocked and the cat will disappear - at least, until the photo automatically self-destructs 24 hours later, as do images on your feed in the Wickr app itself.

If it all sounds a bit like security overkill, then that’s probably because it is. Sharing Wickr photos to Facebook also sounds a little cumbersome, and even more so the process for unlocking a cat-guarded photo, and this could have an adverse effect on widespread take-up of the feature. But it does address genuine concerns surrounding the far and often uncontrollable reach of images and information we post online. What’s more, it appears to be a way to prevent Facebook from claiming ownership of the photos we upload - as much a concern for professional photographers and companies using Facebook for marketing purposes, as for individuals using the platform to keep in touch with friends. Wickr claims that, because the cat photo is all that will be publicly visible unless the bona fide picture is unlocked, that will be the only thing to which the social network could claim to have ownership or reproduction rights.

Whether it catches on or not, the emergence of apps like Wickr is telling of the growing pressure for the usability of social media networks to be balanced with protection for their users’ privacy. It acts as a reminder to businesses to be aware both of potential issues with usage rights for corporate images shared online, and of the need to keep consumer concerns about data misuse in mind when designing social media marketing strategies.

To learn more about how to effectively put social media to work for your business, get in touch with us today.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
February 11th, 2015

Androidphone_Feb11_A2015 may have only just begun, but some of the big names in the mobile industry are already preparing to launch brand new Android smartphones to kick-start the year. Some of these models are upgraded versions of an existing device, with better features and more functionality. So before you rush into buying an Android phone, you might want to check out these latest devices scheduled to debut in 2015.

Samsung Galaxy S6

If you’re a Samsung Galaxy S5 fan, the new Galaxy S6 will be just what you’re looking for. Samsung plans to change the overall design of this model following criticism of Galaxy S5’s conservative style. There are rumors about its quad-HD screen with 2560x1440 resolution, metal unibody, a 64-bit Snapdragon 810 processor with 3GB of RAM, and better camera and battery performance. As usual, the S6 will be available in three storage options: 32GB, 64GB, and 128GB.

Galaxy S6 is expected to debut at the Samsung Unpacked event, scheduled for March 1st in Barcelona. The release date should be around a month after the official announcement. It’s unlikely that Samsung will be making the Galaxy S6 any cheaper than the current Galaxy S5. So far, the estimated price for the 32GB model is around $650, the 64GB model around $800, and the 128GB version could cost an extra $100 more.

Samsung Galaxy Note 5

The Note series from Samsung has always managed to impress Android users. This means Samsung has to come up with something special to stand out further. Word has it that the Note 5 will employ an Ultra HD, 4K display and a camera with up to 50 megapixels. You can also expect wireless charging and a two-day battery life.

The release date for Note 5 is still yet to be confirmed, but Samsung tradition suggests the launch will be somewhere during September and October. As for the starting price, Samsung’s Note series has always been costly, and Note 5’s additional features could further increase the price up to around $750.

Sony Xperia Z4

After Xperia Z3’s debut in September 2014, Sony has been working around the clock to strengthen its Z-series products. The Xperia Z4 is expected to have a 5.5-inch quad-HD screen with a Snapdragon 810 processor. Sony’s smartphones are well-known for their camera quality, and the Xperia Z4 may pack in an even more impressive camera and image sensor. The new sensor will be able to record videos much faster and smoother than the previous Xperia Z3.

Sony has announced that it will not be presenting Xperia Z4 at the world’s largest mobile trade show this March, so we can assume that it will be released at a later stage in 2015. The price is rumored to be around $600-$650.

LG G4

The one thing LG prides itself on is its innovation, and the new LG G4 is sure to house some extra features. There’s a possibility that the G4 will have an eye scanner to gain secure access to the phone, but a fingerprint scanner would be more likely. LG’s smartphones are already on top when it comes to screen resolution, so G4’s display will probably be ahead of its competitors. Furthermore, a new stylus known as the G Pen will replace the poorly received LG G3 stylus.

Since the G3 is available for $600, we can assume G4 to cost the same or more at its launch. Its release is expected to come in May 2015.

Want to find out how Android phones can fit into your workplace? Get in touch with us today and see how we can help.

Published with permission from TechAdvisory.org. Source.

February 10th, 2015

Virtualization_A_164You’ve likely heard of virtualization. It’s the ability to move both hardware and software out of your office to a vendor offsite - therefore freeing up office space and cutting costs. This likely sounds like a dream come true for small businesses, whose overheads need to be kept to a minimum. But with the ability to virtualize almost everything from networks to server hardware and operating systems, you may feel overwhelmed and have no idea where to start. With that in mind, let’s take a look at some tips that’ll take you by the hand into the world of virtualization.

The key to successful virtualization is to not virtualize too much too quickly. Choose one or two items you’d like to test out, and then give it a go. By only focusing on virtualizing a few assets, you’ll be able to accurately measure how much your business is benefiting from virtualization.

Once you’ve decided to make the jump into virtualization, here are a few tips to keep in mind.

Don’t virtualize for the sake of virtualizing

If you have 20 PCs running on an older operating system, but they are still producing results you’re happy with, it may be best to save your money and hold off on virtualization until you really have a need for it.

On the other hand, if you’ve been thinking about buying a new server, it may be smarter to consider getting a virtual server instead since the need is already there.

Understand the risks and challenges of virtualizing individual assets

Server, desktop and application vendors have unique and evolving licensing rules concerning virtualization. With vendor licensing audits becoming more and more frequent, you may be in for a major financial penalty if you’re not following the rules.

It’s been reported that one company saved $4 million in hardware expenses through virtualization. However, they lost $52 million for not remaining in compliance with the software licenses.

Try virtualizing more than one asset

If you start out only virtualizing your server and it doesn’t show immediate benefits, that doesn’t mean you should just give up on virtualization completely. The fact of the matter is that virtualization does save businesses millions of dollars every year in IT expenses, giving them a productivity boost in the process.

You can virtualize many physical assets of your business besides servers. This includes applications, laptop hardware, operating systems and more. All the virtualization process does is deliver these assets to you via the internet instead of having the physical product in your office. So if the server virtualization doesn’t work for you, maybe virtualizing another asset will.

Or it could simply be that your IT service provider is the real problem. Maybe you haven’t found the right virtualization vendor that works best for your business. The only way you’ll ever find out is if you don’t give up the first time you encounter a failure.

For more information about virtualization and how to effectively integrate it into your business, contact us today.

Published with permission from TechAdvisory.org. Source.

February 6th, 2015

BusinessValue_Feb6_AIn today’s society of instant gratification, people have short attention spans. They want to have everything accessible at their fingertips via smartphones and tablets. For businesses with an online presence, this is either a new opportunity - or a missed one. Establishing mobile strategies to target smartphone addicts can give you an edge over competitors who are not going mobile. Here are some mobile marketing tips that could help your business to fly high.

Use QR codes

As far as mobile marketing tools go, QR coding is among one of the most powerful. With QR codes you can set up announcements about special events, coupons, newsletters, updates on your latest products, etc. Your potential customers can simply scan the QR code with their mobile devices and see what you have to offer.

The real benefit of QR codes is they can be put virtually anywhere to lead people anywhere online. Imagine putting a QR code on a T-shirt and having it lead to an online coupon for special deals. While the possibilities for placing QR codes are endless, it’s probably not very useful to put them somewhere that doesn’t make sense, like on a street billboard; people can’t scan your QR code while they’re driving.

Buy Facebook mobile ads

Facebook currently has over 700 million active mobile users. Even if that number’s not increasing at the moment, it’s still huge. Many businesses that are competing online have a Facebook page and advertising plans already. But with the majority of mobile visitors on Facebook, all your content and ads should be easy to read and engage with.

Facebook mobile ads display better than normal ads on the right column on Facebook’s news feed. If you don’t make use of this feature, you might be missing out on a large audience.

Make your website responsive

Back in the old days all websites were static, meaning that content was fixed unless you edited the HTML files. Later came the dynamic website, where content was changeable once you refreshed a web page. Now we have responsive websites, which conveniently adjust themselves to different browser sizes or a mobile device’s screen size.

Responsive websites are the future of the web. Imagine how high the bounce rate is likely to be if a potential buyer visits your website on a mobile device, scrolls around to read your content with difficulty, gives it up as a bad job and finds your competitor’s website that is mobile-friendly. That’s why your business website is better off on a responsive design.

Mobilize your E-mail

There are many up and coming marketing tools, but email is still one of the best ways to get great results for businesses. As with Facebook, most people check their emails on a smartphone or tablet. Make sure your message reads well on mobile devices, or your customers might ignore and delete it or, even worse, unsubscribe from future emails.

There are plenty of mobile marketing tools out there. Before implementing them get in touch with us to find the best solution that works for your business.

Published with permission from TechAdvisory.org. Source.

February 4th, 2015

BI_Feb4_AThe business intelligence market is changing. While most of you are probably familiar with business intelligence software such as Excel, the new wave of BI products is making it easier for you to track down data and organize it into easily viewable graphs and reports. So if you’re looking for data on how well a new product sold this past year, you can save time by not having to gather that information and organize it yourself. Now Microsoft is joining the scene and trying to make noise with its free Power BI product offer.

What is Power BI?

Power BI is a Cloud service which mainly functions as a self-service data analysis tool. What makes it unique is its use of advanced visualization options (graphs, charts, etc.) and the ability to find data by using natural language to ask questions and get answers. For example, you can simply type, “which department had the lowest sales profits last month?” and then get a chart that will visually display the sales from the different departments.

Another distinct characteristic of Power BI is its ability to collect and analyze data from various applications and services. These include Salesforce.com, Marketo, Excel, Zendesk and more.

And lastly, being a Cloud based service, the data is easily shareable, and employees can access it whether they’re in the office or on another continent.

Do I really need data analysis for my business?

It’s easier to get ahead of the competition if you know where you’ve been. With knowledge of your past failings or successes, you’ll know what methods and strategies are working and which ones aren’t. Then you can make appropriate business decisions based on facts and not assumptions.

For some, Excel may give you the ability to track all the Business Intelligence you desire - if the data you need is relatively simple and is kept all in one place. But if you have large amounts of data over various applications, then a product like Power BI can be a huge time saver since you won’t have to waste hours finding and organizing it.

If Power BI is so awesome, why is it free?

Power BI comes in two versions: the free one and a pro version for $9.99 a month. The pro version will feature more support for streaming data, quicker scheduled data refresh, and more storage. But light to medium data analysis users will still gain much from the free version.

Likely the real reason for the free version of Power BI is to capture market share from Tableau software, which currently dominates the self-service analytics market. Microsoft appears to be trying to create a simpler data analytic system that will be less complex than Tableau and more appealing to non-tech users.

And once they get sign-ups, Microsoft can then use this as a gateway to sell other Microsoft business products.

Want to discover how Microsoft’s Power BI or other Business Intelligence products can give your business an edge? Contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

February 3rd, 2015

Browsers_Feb03_AWhen it comes to surfing the Internet, there is already a wide range of browsers available for typical users. Most browsers aim to appeal to everyone, which means they all start to feel very similar both in looks and features. While some users are satisfied using these browsers for everyday purposes, others prefer a more sophisticated tool that meets their needs more exactly. And so the former CEO of Opera, a renowned web browser, has unveiled a new browser with advanced functionality, called Vivaldi. Let’s take a quick look at Vivaldi and its features.

What is Vivaldi?

Back in 1994, Jon Von Tetzchner and his team developed the Opera browser, aiming to serve each user’s individual requirements. However, when the company diverted from its initial purpose, Von Tetzchner left Opera and decided the time was ripe to design another browser, Vivaldi.

Packed with various features, Vivaldi focuses on the needs of power users and on those who want to gain more from their browsing experience. Vivaldi is a Chromium-based application and has similar features to its predecessor, Opera. This is a clear attempt by Von Tetzchner and his team to continue remaking what they believe Opera should have been.

As well as the usual components that other browsers possess, Vivaldi packs in a number of functions that could be very useful for the kind of user who works with a lot of content, keeps a lot of tabs open and spends a lot of time on the Internet.

The Features

Here are some neat functions Vivaldi offers to its users. If you make the most out of these tools they might just work wonders.
  • Speed Dial - Vivaldi adopts the speed dial function from Opera. If you’re a fan you’ll realize it makes website navigation so simple. Speed dial allows you to organize websites based on your interests all on one page; e.g. News, Sports, Health, Tech.
  • Tab Stack - opening too many websites at once? Couldn’t find what you wanted under all those excessive tabs? Tab stack lets you arrange those messy tabs by adding multiple tabs on a single one. Simply drag and drop the tabs to your desired spot.
  • Quick Command - another powerful feature for power users. Quick command is an option for keyboard and shortcut users. You can customize and execute various settings such as opening tabs, bookmarks and other features with the keyboard.
  • Notes - taking notes from your favorite website has never been easier. With this function you can easily jot down what’s on your mind while browsing. Notes automatically remember which site you were browsing and allow you to add tags for future reference.
Despite being in its early stages of development, Vivaldi has many advantages and boasts impressive features for high-level users. Its efficiency in the long run remains to be seen. However, with the current functionality Vivaldi provides, it is a browser that all tech savvy users should consider.

Do you want to learn more about the best Internet browsers for your business? Contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Browsers
January 30th, 2015

Productivity_Jan29_ASmall to medium size businesses and startups have always had to squeeze the most they can out of a small team. But with every business trying to gain a foothold in the market and costs on the rise, productivity is more important than ever. Doing more with less is not an option anymore, it’s a necessity. It’s no wonder businesses are looking towards the latest technology to help carry the load. Below are four ways technology can help you make better use of your most valuable resource of all: your employees.

Work together from anywhere

With the onset of Cloud technology, it’s now possible for your employees to work easily from anywhere - be it Bangkok, Belize or Boston. With Cloud-based suite products, employees can log on from remote locations and access company files. All they need is a web-enabled device.

Cloud-based technology also makes it easier than ever for your staff to collaborate. While one employee is in a coffee shop in Vancouver and another is at a desktop in your office, they can both be editing the same document at the same time. This makes it easy for your staff to remain on the same page, both literally and metaphorically, which in turn boosts both productivity and profits.

While many SMBs use public Cloud applications like Google Drive, Dropbox and Evernote, private pro-level options are available, which come with more security and more features.

Keep all your data in the Cloud

The fact is that searching through spreadsheets for information stored in bloated data sets can be a huge waste of time. By having all your data in the Cloud, all your information will be in one place. So when you’re looking for that critical client receipt for your taxes, you’ll know where it is immediately.

Thanks to its remote access and collaboration possibilities, the Cloud also gives you and your staff easy access to all of your data wherever in the world you are.

Identify bottlenecks and upgrade your technology

Facing the facts about your current technology is key to increasing productivity. Yes we know you love your tablet from way back in 2008. You even named her Susie, after your niece, because they’re both so darn creative. But let’s face it, Susie is old now and is slowing down your business. She’s served you well, but it’s time to upgrade.

And desktops aren’t the only technology that can slow you down. There are also unreliable internet connections, obsolete software and outdated email providers. The list goes on…

The solution is to take a careful inventory of your current IT technology and see what’s keeping your business from reaching its true productivity potential. After you have your list, update your technology accordingly. Then create a plan to regularly upgrade your IT resources, so your employees are never being slowed down.

Outsource your IT

As the old saying goes, ‘out of sight, out of mind’. Whether you have a part-time contractor or a fully-staffed IT department, the mere presence of tech staff onsite in your workplace can be a distraction. When you’re focusing on sales or setting up meetings with potential clients, a knock at your door from your IT colleague - because he or she has just discovered a glitch in your system - can take you out of the flow of the task at hand.

On the other hand, outsourced IT departments are proactive in preventing technical issues from popping up in the first place. They’ll fix problems without you even knowing they existed, and without distracting you from your core work. All of which means a great boost to your day-to-day productivity - and therefore profitability.

Want to know more ways IT can enhance your company’s productivity? Contact us today to learn how.

Published with permission from TechAdvisory.org. Source.

Topic Productivity
January 29th, 2015

Security_Jan28_AAs far as viruses, worms and other security infections go, there are probably none quite as frustrating as Poweliks. While most threats can wreak havoc on your computer system and cause untold damage to your business as day-to-day processes are interrupted by unstable IT, information leaks and data losses, the majority at least leave a trace of their work that enables them to be detected and ultimately removed. Not so with Poweliks - this nightmare of a malware completely hides away in your system and is pretty much invisible. Here’s what you need to be aware of and how you can protect yourself against Poweliks.

What is Poweliks?

Security firm Symantec describes Poweliks as a trojan horse that performs malicious activities on the compromised computer. But it’s no ordinary trojan - unlike the majority, which infect your computer with malicious files, Poweliks is a silent and invisible threat that hides away in the memory registry of your system. It’s not entirely new for a virus to seek to cover its tracks by making itself "file-less" but, in contrast with Poweliks, most are wiped when you restart your computer and its memory is cleared. Worse still, Poweliks hijacks the legitimate processes and applications running on your network, inserting its code into them where it can largely evade detection.

First discovered back in August 2014, Poweliks has therefore created something of a headache for firms behind conventional security solutions like anti-virus software. Symantec and others have admittedly managed a number of updates to their protection in response to the threat posed by Poweliks. But although very minor records of the presence of the trojan are left behind by way, for instance, of registry logs, the signs of its destructive presence are much lower key than the computer world is used to, meaning Poweliks is unlikely to show up on most system scans.

Poweliks has links to Kazakhstan, the home of two servers the malware connects to once it is up and running from within your computer. The servers in Kazakhstan then send commands to the bug to tell it what to do next. In theory, this then makes way for the tool to be used to download other undesirable programs that could infect your system without your knowledge. It could equally be used to steal and disseminate data from your network.

How can I best protect myself?

As well as the anti-virus updates that have gradually been released - but which are still likely to have only a limited impact on threats of this type compared with those of the past - a number of Poweliks removal guides are now available online. Nevertheless, prevention as ever, remains better than cure. One method reported to have been employed in the distribution of the Poweliks infection is embedding it in a Microsoft Word document, which is then sent as an attachment to spam emails, and which the attackers hope your curiosity will lead you to open. Among the senders that these spam messages have masqueraded as being from are the United States Postal Service and Canada Post. Of course the best advice remains to be suspicious of any and every email attachment you open, particularly if you weren’t expecting mail or it's from someone you don’t know.

Should I be concerned?

In fact, revisiting your everyday security precautions is probably pretty good advice all round, since experts predict that this type of threat is likely to become ever more common as attackers seek to exploit the techniques of Poweliks in order for their infiltration to remain unnoticed for as long as possible. Sure enough, a number of copycat threats have already been detected by security specialists as of the start of 2015.

General awareness around web sites you choose to visit is also recommendable in particular, since others have also reported the bug making its way onto their systems thanks to so-called ‘drive-by download attacks’ - whereby simply visiting a malicious web site is enough to trigger the infection, and actively downloading a file isn’t even necessary. As a result, organizations may wish to consider more comprehensive filtering of internet access, or at the very least reactive blocking of known malicious sites, in order to prevent employees from inadvertently infecting a company network.

To find out more about IT security solutions and protecting your technology from attack, contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Security
January 28th, 2015

GoogleApps_Jan27_ASmartphone apps are there to make life easier, and maybe more fun - that’s the whole point of them. But while you might already be a keen user of the core suite of Google Apps - the likes of Drive, Gmail and Calendar - and perhaps have a few other essential apps on your phone that you use for a mixture of work and play, Google has a whole raft of other apps up its sleeve that you’ve probably never even heard of. The right apps can boost your productivity in and out of the office - here are five to consider adding to your phone’s home screen.

Google Wallet

For a long time PayPal has been the default digital payment system - the one that instantly comes to mind when you think of paying for goods or services online. Now that has begun to change, with the launch of Google Wallet and more recently Apple Pay, which are designed to make it easy for consumers to make payments with just a couple of taps on both mobile devices and more conventional platforms. In the latest change to this developing sector, Google Wallet has teamed up with payment processor WePay, which provides the technology behind invoicing programs, e-commerce platforms and charitable donation and crowdfunding sites. The move expands the reach of Google Wallet - and Apple is said to be not far behind, with a similar deal - and makes now a good time to equip yourself with one or both apps. Expect mobile platforms like these to play an increasingly visible role in both online transactions and physical, face-to-face purchases in retail outlets and elsewhere.

Google Gesture Search

Need to quickly track down contacts, messages, applications and other data and files on your phone? Google Gesture Search may only be available for Android devices at the moment, but it can speed up the process of searching for that elusive file or folder. The app allows you to use your finger to draw letters, numbers or symbols on your phone’s screen to identify the item you are searching for. The app is also intelligent in that the more you use it, the more it learns from your search history and makes better, more accurate guesses at what you’re hunting for. Clunky text searches that either yield hundreds of irrelevant results, or none at all, are a thing of the past.

Google Waze

Waze is designed to help you avoid traffic jams and smooth the pain of your travels, while it also allowing you to out for pesky speed cameras. However, it isn’t proving as popular with law enforcement. Perhaps understandably in the wake of recent shootings, authorities fear the police finding feature of the app - primarily intended to give a heads-up on speed traps - could make it all too easy for those so inclined to locate and attack police. All the same, because the app is based on crowdsourced data about congestion and cameras as submitted by users, it isn’t a totally comprehensive map and doesn’t contain anything that couldn’t already be spread by word of mouth. But it’s probably enough to make your next journey that little bit easier.

Google Translate

Okay, so you already know about this popular translation app, which can help you switch text between around eighty languages. You might even be aware that the app already offers support for voice-to-text translation, whereby you can speak or play a recording of a foreign language into your microphone and have Google instantly translate it into the language of your choice. But at the moment, you have to know which language the original recording is in, in order to select it from within the app - and that is what is about to change. Though there is currently no definite timeframe for release, it is reported that Google is expecting to roll out new features to enable the app to automatically detect a number of common languages and translate without the need for any further human input.

Google Authenticator

It’s not only your laptop that should be protected with a secure password - with the number of apps and volume of data likely held in the cloud via your Google account, an intruder gaining access could leave you and your organization at serious risk of a data leak or other security breach. More secure than a regular password alone, Google Authenticator makes it easy for you to put into place two-step verification - which security experts recommend should be standard practice. Once you have this app fighting your corner, logging in to your Google account involves entering your regular password alongside a random code generated by the app - making it far harder for outsiders to break their way in. And because the code is actually generated on the device itself rather than sent from a Google server, it doesn’t even matter if your phone is offline or lacking mobile connection at the time.

Want to learn more about how Google Apps can transform your business and help you work more efficiently? Get in touch with us today.

Published with permission from TechAdvisory.org. Source.