Friday, 13 May 2016

Slack - Team communication for the 21st century.

Companies have been adopting Slack‘s group-messaging app surprisingly quickly in the year or so since it launched. Startup founders often mention Slack when someone asks them which apps their teams love to use. Let's take a look.

Channels
Organize your team conversations in open channels. Make a channel for a project, a topic, a team, or anything—everyone has a transparent view of all that’s going on.


Private Channels
For sensitive information, create private channels and invite a few team members. No one else can see or join your private channels.

Direct Messages
To reach a colleague directly, send them a Direct Message. It's completely private and secure.

Drag, drop, and share your files.
Not just your messages, but all your files, images, PDFs, documents, and spreadsheets can be dropped right into Slack and shared with anyone you want. Add comments, star for later reference, and it’s all completely searchable.
If you use any services like Google Drive, Dropbox, or Box, just paste the link and that document is immediately in sync and searchable too.

All your tools in one place.
Connect all the tools you use to Slack and avoid all that constant switching between apps. Set up your integration so that you get all your notifications directly within Slack—from support requests, code check-ins, and error logs to sales leads—all of them searchable in one central archive.

Search your entire archive.
Everything in Slack—messages, notifications, files, and all—is automatically indexed and archived so that you can have it at your fingertips whenever you want. Slack also indexes the content of every file so you can search within PDFs, Word documents, Google docs, and more. With one search box and a set of powerful search operators, you can slice and dice your way to that one message in your communication haystack.

Everywhere you go.
With fully native apps for iOS and Android, whatever you do on one device is reflected everywhere. Everything is in sync. We’ll keep your place so you can always pick up wherever you left off.

Customize your notifications whether you’re on your computer or mobile device. Dial them up to be alerted about everything or dial them down to focus on just a few things.

Reclaim your workday.
Less email. More productive. Our customers see an average 48.6% reduction in internal email, helping them enjoy a simpler, more pleasant, and more productive work life.

See the data
Slack is free to use for as long as you want for teams of all sizes. Create a new team
You can easily upgrade to paid plans, which offer more features and controls.

Final Notes about the SLACK

8,000 customers signed up for the service within 24 hours of its launch in August 2013. In February 2015, the company wrote that around 10,000 new daily active users were signing up each week, and had more than 135,000 paying customers spread across 60,000 teams.By April, those numbers had grown to 200,000 paid subscribers and a total of 750,000 daily active users. In 2015, Slack passed more than a million daily active users.

The Financial Times wrote in March 2015 that Slack was the first business technology to have crossed from business into personal use since Microsoft Office and the BlackBerry.



Tennessee Pour House owner honored by Small Business Adminsitration



Angel Carrier, owner of the Tennessee Pour House, has won the SBA Woman Owned Business of the Year for Tennessee.  She was nominated by the Tennessee Small Business Development Center at Volunteer State Community College.
Located at 880 Greenlea Blvd. in Gallatin, Tennessee Pour House uses fresh, ethically-sourced products for its coffee and other offerings. Angel says her goal is to help improve the local and global community one cup at a time.
Angel came to the TSBDC at Volunteer State Community College in the fall of 2013.  Coming from Colorado, Angel wanted to open a specialty coffee shop in the rural community of Westmoreland. She learned steps to open a business in Tennessee, created a business plan and financial projections to reach her goal.
And in the spring of 2014 Angel opened the Tennessee Pour House. She used the business plan and projections to self-finance and hire employees.
After creating a following and reaching break-even, Angel decided to move the business to Gallatin in 2015, to reach a larger population.
Carrier again used the services of TSBDC and did her own research to find her next location and develop a new marketing strategy.
“The TSBDC has been a great resource in helping us start and grow our business,” Carrier said.
"Working with Angel has been awesome," said Charles Alexander, director of the TSBDC. "She is a bundle of energy and has worked very hard to create a niche here in Gallatin.  She has a loyal following and brings something new to our area.”
Since moving the business to Gallatin, Tennessee Pour House has expanded into a breakfast and lunch menu that provides a multitude of organic and vegan options.
Tennessee Pour House coffee is also sold at 40 Kroger locations throughout Middle Tennessee, including the Kroger Marketplace on Nashville Pike near Cages Bend Road.

Thursday, 5 May 2016

Are You Protected Against Hackers?

With so much of our personal data out there thanks to ecommerce and social networking, it’s no wonder hackers and cyber criminals are able to help themselves to our information, which can have catastrophic results. Hacking can lead to such quagmires as identity theft, scams, theft, and file destruction. Is your personal and business data safe?


What can you do to protect your personal and company data against hackers and cyber crime?


Make it Strong – The first step to protect your data is having strong passwords. Use as many characters as possible, both capital and lowercase letters, and at least one number and one symbol. Leave out obvious details such as your name or date of birth. Avoid easy-to-answer security questions, ones to which the answer can be easily found online (your high school, pet’s name, favorite team, etc.). Also, don’t use the same password for all of your accounts. Having unique passwords will limit the potential damage if one of your accounts is compromised.

Back it Up – Regularly back up your files locally, making multiple copies of them to prevent against hard drive failure. This is especially important for your business, because lost business data usually adds up to lost time and money. So, make sure your backup system is fail-proof. Or, get even more backup protection by utilizing Managed IT Services, offered by many business solution providers, which will securely backup and store your data to protect against hackers and other disasters.

Secure Your Network Devices - An often overlooked area that’s vulnerable to hacking is your printing and imaging hardware. Threats aren’t just limited to outside attacks from cyberspace. People both inside and outside your organization can actually hack your devices and steal information from document images that are saved on the hard drives of your imaging devices. Your office equipment provider can help you take measures to secure these devices.

Browse Facebook Securely – Facebook accounts are frequent targets of hackers, so if you use Facebook, take advantage of the security measures provided to you. In your account settings enable ‘secure browsing’ to use an encrypted connection (https://) instead of a standard connection (http://).

Watch Where You Click – Never, ever click on a link in an e-mail from someone you don’t know. Phishing creates bogus e-mails attempting to lure you to a phony website and have you enter your username and password.

In the information age your personal data is out there; however, employing these methods will make it more difficult for hackers to get their hands on it.


Tuesday, 3 May 2016

How Secure is Your Data?

Your Confidential Data Could be at Risk


Think confidential information and documents are protected by your company’s IT security policies? Think again.


A recent survey by Harris Interactive revealed that 51 percent of survey respondents said they process confidential information through printers, copiers, and multi-function devices.

Additionally, 39 percent of employees who print, scan, or copy confidential information at work are concerned whether the information on their printing and imaging devices will remain secure.

These are valid concerns considering there is a very close link between the security of your business and your printing environments. Copiers, printers, fax machines, scanners, and multi-function devices pose a serious risk to your business’ overall security. These devices retain latent document images and text, leaving sensitive information and proprietary data extremely vulnerable to a security breach.

But, securing your print environment is easy with a Managed Print Services (MPS) Program that’s designed to assess all of your devices, provide a detailed security report, and develop a highly secure strategy for your future. Your customized plan can also include usage controls that ensure private information is only accessed by authorized users, and will also help you achieve regulatory compliance. Shrewd business owners know that security breaches damage your brand and can result in heavy fines, so this is protection that pays dividends in the long run. 



Here’s the bottom line:


An MPS solution will not only optimize your output fleet to cut costs and increase efficiency, but will also provide you with the peace of mind that your entire printing and imaging environment is safe and secure.

Contact us today, and you’ll understand why we place the highest priority on your company’s data and are committed to helping you protect your valuable information. 

To learn more about how MOM can help you with your managed print services needs, visit our website at http://www.momnet.com/Managed-Print-Services1 or click here try out our FREE PRINT SAVINGS CALCULATOR.