Microsoft is retiring Windows 7 soon, and small businesses still using it are risking data breaches and deteriorating performance. Waiting until the last minute to upgrade to Windows 10 from Windows 7 could be risky. Instead, discover a smarter way to handle this and future upgrades.
About Reid Johnston
This author has yet to write their bio.Meanwhile lets just say that we are proud Reid Johnston contributed a whooping 10 entries.
Entries by Reid Johnston
Malware-packed phishing emails to small businesses are increasing — because they flat-out work. And the fallout for you and your customers can be catastrophic. Learn to spot typical phishing ploys, and follow four best practices to protect your business from phishing.
For an entrepreneur, a breakthrough product or service idea is the seed. Research makes it grow. Here’s how Twin Cities startups and small businesses can get professional help researching key business areas, plus some IT areas you’re probably wasting time trying to learn yourself.
Giant data breaches at giant corporations make headlines just about every month. But small businesses have become the favorite target of hackers. Fight back: Defend your small business’s IT network by following our annual 11-point IT security checklist.
It’s a seller’s market for Minnesota small businesses. But Andy Kocemba, who counsels small business sellers, says you can still leave big money on the table. Before putting your business on the market, answer four critical questions — one of which relates to your IT infrastructure.
Scheduling meetings can be tricky when you run a small business, especially when you include people from outside your business. If you use Microsoft Office, learn how to share your Outlook calendar. Here’s a quick guide, plus tips on two free apps that help you set up meetings quickly.
We all have favorite apps that we use every day. Here are a few that will make you more productive and efficient.
Jog.ai – This is a neat web service that you can use to take meeting notes for you. Jog.ai acts as a middle-man recording your telephone calls. It not only gives you a high-quality recording, but will also transcribe your call, so it is searchable later. While you’re on a call, you can use the jog.ai web app to ‘mark’ important parts to refer back to later. Best of all, it will “listen” for keywords like “action item” and automatically highlight that part of your call. Just make sure you let the other caller know if you’re talking to someone in a state that requires that kind of notification.
LastPass – Lastpass stores your passwords securely behind a super-strong “master password” and also supports multi-factor authentication to further protect your credentials. Lastpass syncs between your different computers, and mobile devices, so you can always access your important sites. Other really useful features; securely sharing credentials with others, and storing credit card and bank information – automatically filling out web-forms so you don’t need to track down your wallet!
Boomerang – A great plugin for Outlook or gmail.com Boomerang reminds you to follow up on emails at some point in the future if the recipient doesn’t send you a reply. But – one of the most powerful features is the ability to “share” preferred meeting dates with someone via email. For example; if you’re trying to setup a conference call, you can pick a couple of dates/times that are available on your calendar and include those in the message. Boomerang will automatically send an invite to both of you with the time-slot that the recipient selects. I find this to be a little more personal than services like Calendly.com
Calendly – This is a great service that automatically syncs with your calendar and creates a simple website that shows your availability. You can create different “booking templates” for things like 30-minute calls, 60-minute face-to-face meetings. Calendly will let you specify specific minimum & maximum availability ranges, as well as custom fields that are added to the meeting. Now when someone says; “Hey are you available next week?” You can reply with your Calendly link, and they can pick a time that you’re available – that works for them too!
Interested in trying out any of these apps? We can help you install them and integrate them with your existing systems! Just contact us and we’ll be happy to help!
Its clear that the Equifax breach is a big deal due to the type of information exposed. We’re sharing some simple tips to protect your personal information, and protect your business at the same time. Still relevant a year later!
Everyone should use a password manager like LastPass, 1Password or Roboform to ensure they’re using separate, complicated passwords on each website visited. This article will specifically show some quick tips/videos about using LastPass. You’ll primarily use the app through Chrome/IE extension. The video below will show you how to use it. Creating secure passwords is easy. […]
September 1, 2017
TechGen is pleased to announce that it has been awarded the ISO 27001:2013 certification.
ISO 20071 is an internationally recognized set of security standards that outlines hundreds of controls designed to protect IT infrastructure as published by the International Organization for Standardization (ISO). These standards address a wide range of physical, technical, and legal controls relevant to mitigating vulnerabilities and risks to data. The 2013 edition of the standards is the most recent, and most rigorous; addressing policies around access control, business continuity, human resources, incident management, physical security, and technical procedures.
TechGen has demonstrated to A-LIGN, an independent, third-party auditor, that it has technical controls in place and formalized IT Security policies and procedures. A-LIGN is an ISO / IEC 27001 certification body accredited by the ANSI-ASQ National Accreditation Board (ANAB) to perform ISMS 27001 certifications. Customers can be assured that TechGen takes concerns about the safety of their data extremely seriously, and has committed to meeting the highest standards available to protect them. This certification is a demonstration of that commitment to clients. TechGen continues to design, implement, monitor and maintain security controls that protect client information.