Blog

April 11th, 2014

Security_Apr11_AThe security of systems like servers and computers that connect to the Internet should be one of utmost importance for business owners and managers. However, there are always security flaws being exposed which could expose your systems and data to malicious hackers, who could really endanger your business. Over the past few weeks a massive massive security flaw with cryptographic software has come to light. Codenamed Heartbleed, this bug makes stealing data almost ridiculously easy.

Background info about secure transmission of information on the Web

Most sites on the Internet rely on Secure Sockets Layer (SSL) technology to ensure that information is transmitted securely from a computer to server. SSL and the slightly older Transport Layer Security (TLS) are the main technology used to essentially verify that the site you are trying to access is indeed that site, and not a fake one which could contain malware or any other form of security threat. They essentially ensure that the keys needed to confirm that a site is legitimate and communication can be securely exchanged.

You can tell sites are using SSL/TLS by looking at the URL bar of your browser. If there is a padlock or HTTPS:// before the Web address, the site is likely using SSL or TLS verifications to help ensure that the site is legitimate and communication will be secure. These technologies work well and are an essential part of the modern Internet. The problem is not actually with this technology but with a software library called OpenSSL. This breach is called Heartbleed, and has apparently been open for a number of years now.

About Heartbleed

OpenSSL is an open-source version of SSL and TSL. This means that anyone can use it to gain SSL/TSL encryption for their site, and indeed a rather large percentage of sites on the Internet use this software library. The problem is, there was a small software glitch that can be exploited. This glitch is heartbleed.

Heartbleed is a bug/glitch that allows anyone on the Internet to access and read the memory of systems that are using certain versions of OpenSSL software. People who choose to exploit the bugs in the specific versions of OpenSSL can actually access or 'grab' bits of data that should be secured. This data is often related to the 'handshake' or key that is used to encrypt data which can then be observed and copied, allowing others to see what should be secure information.

The problem with Heartbleed

There are two major problems with this bug. The first being that if an attacker can uncover the SSL handshake used by your computer and the server that hosts the site when you login or transmit data they will be able to see this information. This information usually is made up of your login name, password, text messages, content and even your credit card numbers. In other words, anything that gets transmitted to the site using that version of SSL can be viewed.

Scary right? Well, the second problem is much, much bigger. The hacker won't only be able to see the data you transmit, but how the site receiving it employs the SSL code. If a hacker sees this, they can copy it and use it to create spoof sites that use the same handshake code, tricking your browser into thinking the site is legitimate. These sites could be made to look exactly same as the legitimate site, but may contain malware or even data capture software. It's kind of like a criminal getting the key to your house instead of breaking the window.

But wait, it gets worse. This bug has been present in certain versions of OpenSSL for almost two years which means the sites that have been using the version of OpenSSL may have led to exposure of your data and communication. And any attacks that were carried out can't usually be traced.

Am I affected by this?

What makes this so different from other security glitches is that OpenSSL is used by a large percentage of websites. What this means is that you are likely affected. In fact, a report published by Netcraft cited that 66% of active sites on the Internet used OpenSSL. This software is also used to secure chat systems, Virtual Private Networks, and even some email servers.

We have to make it clear here however: Just because OpenSSL is used by a vast percentage of the Internet, it doesn't mean every site is affected by the glitch.

The latest versions of OpenSSL have already patched this issue and any website using these versions will still be secure. The version with Heartbleed came out in 2011. The issue is while sites may not be using the 2011 version now, they likely did in the past meaning your data could have been at risk. On the other hand, there are still a wide number of sites using this version of OpenSSL.

What should I do?

This is a big issue, regardless of whether a website uses this version of OpenSSL or not. The absolute first thing you should do is go and change your passwords for everything. When we say everything, we mean everything. Make the passwords as different as possible from the old ones and ensure that they are strong.

It can be hard to tell whether your data or communications were or are actually exposed or not, but it is safe to assume that at some time or another it was. Changing your passwords should be the first step to ensuring that you are secure and that the SSL/TSL transmissions are secure. Another thing you should be aware of is what sites are actually using this version of OpenSSL. According to articles on the Web some of the most popular sites have used the version with the bug, or are as of the writing of this article, using it. Here are some of the most popular:

  • Facebook
  • Google
  • Gmail
  • Yahoo
  • Yahoo Mail
  • Instagram
  • Pinterest
  • Amazon Web Services
  • GoDaddy
  • Intuit
It would be a good idea to visit the blogs of each service to see whether they have updated to a new version of OpenSSL. As of the writing of this article, most had actually done so but some were still looking into upgrading. For a full list of sites, check out this Mashable article.

If you have a website that uses SSL/TSL and OpenSSL you should update it to the latest version ASAP. This isn't a large update but it needs to be done properly, so it is best to contact an IT partner like us who can help ensure the upgrade goes smoothly and that all communication is infact secure.

Contact us today to see how we can help ensure that your company is secure.

Published with permission from TechAdvisory.org. Source.

Topic Security
April 10th, 2014

BusinessValue_Apr07_ABusiness owners often have more than one role, overseeing many different aspects of the day-to-day operations at once. A possible problem that can arise though is that they may not be experts in every area which can cause confusion or issues. Take for example Web design - business owners might know what they want their pages to look like, but lack the ability to effectively communicate their ideas to Web designers. The best way to get what you want is to speak the same lingo and learn some popular Web designer terms.

Here are 20 of the most used Web design terms that could help you communicate effectively with designers and developers about what you want from your website:

  • Alignment - The position of the various elements on your page. Alignment can be focused on the borders of the page, or positioning of elements based on other elements - e.g., aligning all images to the left side of the page, and making sure the text is aligned to the right of each image.
  • Banner - A form of advertising that is usually at the top of a page and goes from one side to the other. On many sites, the banner also contains links that can be clicked through to reach other pages.
  • Below the fold - The point on the page where viewers will begin to scroll after the page has loaded. Generally you put the most important information above the fold (what the visitor sees first) and supplement information below it.
  • Color wheel - A circle of colors that allows designers to easily pick out primary, secondary, and tertiary colors, as well as complimentary and contrasting colors - e.g., on most wheels red is opposite green because they complement one another.
  • CSS - Cascading Style Sheets allows designers to dictate the look and feel of a page. These are usually codes that dictate the font, color, and layout of a Web page.
  • DPI - Dots Per Inch is the resolution of an image or monitor. The higher the DPI, the higher the resolution or quality of the image.
  • Entry and Exit pages - This indicates where a viewer enters your page from an external source, and where a viewer will usually exit your site from. The vast majority of entry pages are the homepage, so these should be designed to capture and maintain interest. Exit pages can be the homepage, or perhaps a signup form.
  • GIF - Pronounced Jif, is an image format that is best suited for small images with few colors. These can also be animated.
  • Header - This is the absolute top of any page.
  • HTML - Hyper Text Markup Language, is the main language used to write webpages. For example, the bullet points in this article would be written as < ol><li>HTML - Hyper Text ...</li></ol>. Browsers read this code and translate the directions given.
  • JPEG - An image format best suited to pictures and images with a large number of colors. The vast majority of images on the Internet and websites are uploaded in the JPEG format.
  • Lorem Ipsum - Placeholder text is used by developers when creating mockups of pages or layout so they can see how the text will look when the page is finished. This can be any form of text and is usually nonsensical, like 'Lorem Ipsum Dolor'.
  • Orphan - A word or short sentence that appears by itself, below the text on a page. Generally these should be avoided, and can be easily 'adopted' by adjusting spacing between letters and words, or editing content.
  • Parent/Child elements - With HTML and other Web languages there is a relationship between elements (parts of code). Parents dictate elements that will be inherited by other codes (children) that are within the main parent group. For example, if you assign a headline a certain style this style becomes the parent. Any other elements like a bolded word within the headline will be a child. The child will take the same style as the headline and have the added bold format as well.
  • Pixel - The smallest element of any image and your monitor. It is essentially one dot of color. The resolution of images and monitors (how clear the image is) is often displayed in pixels. The higher the number of pixels, the higher the resolution and quality.
  • PNG - An image format that is most commonly used for images that have large amounts of uniform color or transparent backgrounds.
  • Script - A small bit of code that enables browsers to do more than just displaying text. If you've ever watched a video while on a website or downloaded something directly from a page, you have interacted with a script.
  • Watermark - A mark of ownership which is usually applied to the background of images or content. This is used to highlight ownership and deter theft of visual content. If you plan to post images on your site that you create, you might want to consider adding a watermark as protection.
  • White space - Space that surrounds text, images or other parts of the page. It is generally believed that the more white space there is, the easier it is to read content and draw attention to important aspects of a page.
  • Wireframe - A visual representation of a website's layout with directions for visuals, location of content, and style for each page. This is usually constructed before the site is built and is more or less a road map for developers.
Of course, these are just a few of the terms designers and developers use on a regular basis. If you want to understand how to get the best out of your website and technology then we're here to help.
Published with permission from TechAdvisory.org. Source.

April 9th, 2014

Windows_Apr07_AMicrosoft's Windows 8 operating system supports the traditional desktop but was designed to mainly improve the experience of tablet users. It was released in 2012 and received mixed reviews, especially as its new interface was so different from the look of the previous operating systems. The most noticeable change is the Start screen, which displays applications in tile format. Last year saw the release of Windows 8.1 and in early April 2014 the release of the latest update to Windows 8.1 - Windows 8.1.1, or Windows 8.1 Update 1.

Go directly to the desktop instead of the Start screen

The Start screen was introduced with the release of Windows 8 to make it more convenient for tablet users to navigate apps. However, this is something that many mouse users and those who are used to older versions of Windows have found difficult to use. With the first version of Windows 8, there was no way to change this setting before.

With the 8.1 update released last year, you were able to change your settings so that your computer booted directly to your desktop, instead of the Start screen. Now, with Windows 8.1.1 new computers that don't have a touch screen should automatically boot into the familiar desktop screen. Users who have the OS installed already can still set Windows to boot directly to the desktop.

Here’s how:

  1. Go to the Control Panel.
  2. Select Appearance and Personalization.
  3. Choose Taskbar and Navigation.
  4. Select the Navigation tab.
  5. Enable the option that says “When I sign in or close all apps on a screen, go to the desktop instead of Start” by clicking the checkbox next to it.
  6. Click the OK button to save the change you've made.
You should now go directly to the desktop screen once Windows is started or when you close an application, instead of being taken to the Start screen.

Updated Start screen interface

Aside from the applications that you see on the Start screen, you can easily view all available apps by clicking on the down arrow on the lower left of the screen. You will also see a search button on the upper right side, as well as a power button next to it that you can click to shutdown, restart or put the computer into sleep mode. Moving your mouse to the bottom part of the screen will also show you the taskbar with the Start button and other apps appearing on it.

When you right click an app on the Start screen it will no longer launch the application bar. Instead, you will be given various options, which is what would usually be the case when you right click. These options include turn live tile off, resize, uninstall, pin to taskbar, and unpin from start.

Photos and other media no longer open with apps on the Start screen

With the first version of Windows 8, photos and other media were opened by default using the Metro apps on the Start screen. With Windows 8.1.1, images are now automatically opened using Photo Viewer, while other media is opened using Windows Media. This is the same experience that the older Windows operating systems provided, which most users are familiar with.

Pin Metro apps to the taskbar

The taskbar is a popular Windows desktop feature, allowing you to pin your most used or open desktop apps to. However, with Windows 8 and 8.1 you couldn't pin Metro apps to the desktop taskbar. With the new update you can post Metro apps to the taskbar and even interact or launch them from the desktop.

A dedicated Settings tile

For those that prefer to use the Start screen there is a new Settings tile that has been added. This can really help customizing your computer far easier.

If you have any queries about the latest Windows update which is free to download, get in touch. We have the answers!

Published with permission from TechAdvisory.org. Source.

April 9th, 2014

SocialMedia_April07_ASocial media is an important tool for any business, and those that want to really engage with customers and valuable connections really need to have visual forward content. The problem many business owners come across is in finding the right software to create this content. Sure, you can use a program like Adobe Photoshop, but while using an expert can prove too expensive, going it alone can be too difficult to achieve for many. There are other tools available.

In this day and age where compelling visuals are possible online, it is extremely important to learn how to create attractive visuals to aid your social media marketing campaigns. You at least need a working knowledge of how to enhance your photos and make them more attention-grabbing. There are a number of free or highly affordable tools out there that can help you do just that.

PIXLR - This advanced photo editor works like Photoshop, only it is easier to use and therefore ideal for beginners. You can create images from scratch or perform advanced image editing. Using fairly simple tools can maximize the potential of images. For quick editing, there’s PIXLR EXPRESS or PIXLR O-MATIC, which are free to use. Visit the PIXLR website to learn more and start use these programs.

PicMonkey’s Online Photo Editor - This photo editor can transform ordinary images into fantastic photographs in just a few clicks. Select the image that you want to modify and add special effects such as fancy text, or simply crop and re-size. The photos edited using PicMonkey can be uploaded on Facebook and other social media platforms. PicMonkey is free to use so you can just go to the website and start editing away. For added frames and special effects there’s a premium version you can upgrade to for USD $33.33 per year.

LiveLuvCreate - This website can be used without any charge and offers a variety of design layouts and graphics. Using this platform you can edit your own images and there are also a ton of images created by users on its library that can help give you inspiration. Among the tools available are borders, filters, and photo effects, as well as fonts, colours, and styles. Visit the website to set up an account and start editing your images today.

Canva - If you want to create your Facebook cover photos from scratch, or if you want to design some blog images, this is a free application that might prove useful. This tool is very convenient and can be used to create business cards, invitations, posters, and presentations. Visit the website today to start creating your own visuals.

Quozio - If you are into quotes, Quozio lets you upload famous and favorite quotes, visualize them, and then share them on your social network. Simply enter an interesting quote and then select a background image. Instead of simply posting what’s on your mind, you can make a quote more attractive and appealing by transforming it into a visual using this free app. Visit the site today to visualize your next quote.

Whether you are posting on Facebook, Twitter, or any other social network, your content cannot come alive without the use of quality graphics and images. If Photoshop does not work for you, these other tools are ideal substitutes for creating appealing graphics for a variety of social media platforms.

Make sure to share your own list of top photo tools for everyone to see! And, if you would like to learn more about leveraging social media in your business, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
April 9th, 2014

CompTIA Managed Services Trustmark™ signifies commitment to industry best practices

Erie, PA April 7, 2014 – Szymanski Consulting, Inc. announced today it has received the CompTIA Managed Services Trustmark™, a respected industry credential that signifies its adherence to best practices for technology service delivery and customer interaction.

“Earning this credential identifies Szymanski Consulting, Inc. as a business that meets or exceeds the best business practices the IT industry has to offer,” said Nancy Hammervik, senior vice president, industry relations, CompTIA. “This includes managed services agreements, standard operating procedures, systems and tools for delivering services and general business operations.”

The Trustmark was developed by CompTIA, the non-profit association for the information technology industry, in collaboration with industry experts and leaders, to identify businesses that have made a commitment to the highest levels of integrity and sustained quality service.

“Szymanski Consulting is honored to receive this prestigious credential. It validates our commitment to excellence” says Cathy Szymanski, Director of WOW

To earn the CompTIA Managed Services Trustmark, Szymanski Consulting was evaluated on several aspects of their business operations, including organizational structure, technology tools and systems they utilize, standard operating procedures and IT service specific activities. The company also committed to abiding by a code of conduct and provided customer references.

Visit CompTIA Managed Services Trustmark to learn more.

About Szymanski Consulting, Inc.

Founded in 1978, SCI began with a mission to help small and medium-sized businesses like yours get a real return on their technology investments. Since then, we have remained dedicated to providing state-of-the-art IT support, service and products that allow our clients to get ahead of the competition and achieve greater success.

About CompTIA

CompTIA is the voice of the world’s information technology (IT) industry. Its members are the companies at the forefront of innovation; and the professionals responsible for maximizing the benefits organizations receive from their investments in technology. CompTIA is dedicated to advancing industry growth through its educational programs, market research, networking events, professional certifications, and public policy advocacy. Visit http://www.comptia.org/home.aspx or follow CompTIA at http://www.facebook.com/CompTIA and twitter.com/comptia.

Contacts:

Szymanski Consulting, Inc.
Cathy Szymanski, Director of WOW
8127 Nathan Circle
Erie, PA 16509
814-455-6069 x300
http://www.szy.com

Topic Articles
April 8th, 2014

Office365_Apr07_AOneNote is one of the Microsoft products that comes with most versions of the Office suite. It can also be installed as a standalone application for free. This program is available on various platforms, including Windows PC, Mac, Windows Phone, Android, and iOS devices. It is also accessible via your Web browser as part of OneDrive, which was formerly known as SkyDrive. OneNote acts as your digital notebook, allowing you to easily save and organize information and files.

If you are looking for a powerful note program, OneNote has some great features.

Access and edit notes anywhere

Windows PC, Mac, iOS, Android, and Windows Phone all support OneNote. Install the appropriate version and you can access your notebooks from any of these devices. Previous versions require that you manually sync your notebooks to make them accessible on all devices. However, with the latest version this is no longer required as your notes are automatically synced on your OneDrive. This means you can view and edit them anywhere where you have an Internet connection.

You can access notes on your mobile device that you originally created on your computer. If you have access to a computer that does not have OneNote installed you can easily find the application on the Web. If you go to OneNote’s page on the Web you can log in to the account linked with your installed versions of OneNote and use as you normally would.

Organize data in notebooks

OneNote is a great tool for organizing different data and files. You can create various notebooks that contain information on specific subjects. For instance, you could create a notebook for personal use, a notebook containing client information, etc. Each of these notebooks can then contain various sections with color coded tabs, making it easy to organize files.

This feature is helpful, especially if you are working with a large volume of data. Searching for specific information or data is also straightforward with a convenient search function. You can simply type your keyword in the search field and wait for the result. Click on your chosen result and you will be taken to that particular note.

Third party integration

The latest version of OneNote also has a new cloud API that allows third party applications to be used. This allows users to enjoy more features, as they are not just confined to the features that are native to OneNote. One of the apps that you can use is OneNote Clipper. Install this on your browser and use it to automatically save clippings from the Web in just one click.

Work on important tables

Tables are often used for creating databases or for comparing and listing data. Creating tables in OneNote 2013 is more convenient as it now allows you sort data within a table, designate header rows, as well as change the color of the cells. You can also insert an Excel spreadsheet into your notes.

Write handwritten notes

If you are using a touch capable device you can write notes or draw using a stylus or your fingers. This is especially helpful for jotting down quick notes or reminders about what to insert on a page. Circling or underlining a word or group of words is quick and easy to do.

Organized data and files are easy to access, which is vital when you need this information at your fingertips. OneNote keeps data in order so you can easily find what you need when you need it.

Find out how OneNote and other tech innovations and updates can support your business productivity. Get in touch today!

Published with permission from TechAdvisory.org. Source.

April 4th, 2014

Security_March31_AMalicious software (more commonly known as malware) can be found on almost any system, most often being downloaded and installed on computers. It can cause a myriad of annoyances, like unwanted pop-ups and system freezing, and some forms can even gain unauthorized access to your PC, stealing personal information. It's therefore essential that malware is prevented. Malware on work computers can disrupt a company’s operations and may put the security of data in jeopardy.

Signs of a malware infection

Before proceeding with the steps on how to respond to malware infections, we first need to learn about the signs and symptoms of a malware infection. These include:
  • Several pop-ups appear even when not browsing the Web.
  • Unusual slowness of the computer and Internet connection.
  • System hangs or freezes.
  • Corrupted programs.
  • Antivirus is disabled.
  • E-mails sent to or from your account which you did not send.
  • High network activity, even when not using large programs or accessing huge data.
  • Redirected access to some sites.

How to respond to a malware infection

In case you experience any of these symptoms, the first thing to do is to ensure that your antivirus and antispyware program is updated. This is to make sure that they detect the latest known threats on their database. You should then run scans to see if an infection is detected. If it is, the programs usually have a way to remove the infection. You then need to follow the steps the program recommends.

If this doesn't work, disconnect the infected computer from the network to prevent the spread of the malware. Furthermore, avoid accessing the Web and using vital information such as bank account and credit card information. Let the technical department or your IT partner handle the concern since they are trained in determining and eradicating system malware infections.

Once the problem has been pinpointed, a tech specialist will go through the process of eliminating the infection. This includes backing up data on the computer and restoring the system to its original state. Depending on the extent of the infection, the computer may need to be wiped clean, or reformatted before restoring backed-up files.

After the whole process, the computer must be tested to ensure that the infection has been totally removed. Moreover, further investigation and studies must also be done to determine where the problem started, as well as to create a strategy as to how to prevent this from happening in the future.

How to prevent a malware attack

Prevention is better than a cure and this definitely applies to malware infections. It’s best to arm yourself with knowledge on how to avoid malware attacks and prevent your systems from being infected.
  1. Ensure that security protection is always updated and that you run system scans on a regular basis.
  2. Avoid downloading attachments or clicking links from unknown sites or senders.
  3. Enable firewall protection.
Malware can hugely affect business operations and the security of private information. One of the best ways to prevent this is to work with an IT partner, like us, who can help recommend and install protection systems. You might want to think about getting help in managing these solutions too, to ensure that your systems are secure at all times.

If you have questions or concerns with regards to malware prevention and resolution, feel free to call us. Our support team is always ready to help.

Published with permission from TechAdvisory.org. Source.

Topic Security
April 3rd, 2014

VoIP_March31_AVoIP, or Voice over Internet Protocol, refers to the technology used in communicating calls and videos via an Internet connection. Since its introduction in the market, more and more companies have switched from using regular phone lines to this method of communication. There are several good reasons why many businesses choose to use VoIP, so if your company is still using older methods of communication you might want to learn about VoIP and decide if it’s time to make the switch.

More affordable communication costs

Using VoIP services like users communicate to other users either for free or at drastically lower call rates than regular providers, as long as they are connected to the Internet.

Other VoIP services let you use your existing phones that are connected to the Internet to enjoy unlimited calls for a lower price compared to the per minute charge of telephone companies. These service providers offer different packages to choose from, many of which might suit the size of your company, your business needs, and your budget.

More affordable hardware and software

If you are having second thoughts about using VoIP because you are concerned that the hardware and software used would cost you a fortune, fret not. The vast majority of VoIP systems require little to no installation and many can run using existing equipment.

When it comes to the hardware, companies that choose to use VoIP through a computer need a working sound card, which your computer probably already has, as well as a headset or microphone and speaker, whichever you prefer.

Other service providers may also require the use of VoIP phones. The price of these phones is also not that costly and in some cases these phones might be provided by the VoIP providers for a nominal monthly fee.

VoIP supports multiple calls at the same time

A regular phone line normally only lets you talk to one person at a time. VoIP allows multiple calls, including conference and group calls, which is an important advantage to many businesses. This makes it easier for employees, management, and business associates to collaborate with each other and to communicate with clients.

It’s also faster for clients to connect with customer support. As a result, their concerns can be handled and resolved faster, which in turn improves the customer experience and strengthens your business relationship with them.

VoIP offers more features that traditional systems

Aside from supporting multiple calls simultaneously, there are also several more features that you can enjoy from using VoIP. These features may vary from one particular service to another, but the most common features include:
  • Fax
  • Voicemail
  • Caller ID
  • Call waiting
  • Call forwarding
  • Call blocking
  • 411 directory
  • Last number redial
There are also advanced features that some service providers offer, including call transfer, return call, speed dialing, SMS, and area code selection. Many of these features come included in VoIP subscriptions, which help keep costs of add-ons low.

These are just some of the reasons why you might choose to switch to VoIP for your business communication. If you have further questions about VoIP, don’t hesitate to give us a call. Our support team is always ready to help.

Published with permission from TechAdvisory.org. Source.

Topic VoIP General
April 2nd, 2014

gloStream_Apr02_AIn a surprising move, the House of Representatives approved a bill that includes a delay to mandatory ICD-10 implementation until October 2015. After the announcement we are sure that many medical practices breathed a long sigh of relief.

The problem: Without a fix to the Sustainable Growth Rate (SGR) formula, Medicare physicians face a 24% reimbursement cut beginning April 1. This is obviously something that does not sit well with many of the country's medical practitioners - and rightly so. No one wants to see hard-earned profits sink because of a medical bill.

Joseph Pitts introduced a bill, H.R. 4302, that proposed to replace the reimbursement cut with a 0.5% payment update through the end of 2014 and a 0% percent payment update from January 1 through March 311, 2015.

The American Medical Association, which wants payment stability for its constituents, responded by urging House of Representatives members to vote down the proposed legislation. The code sets were caught in the crossfire.

Note: Before the ICD-10 delay takes place (and the SGR fix becomes permanent), the Senate must vote on the proposed legislation and President Obama must sign it into law. It would be a good idea to keep abreast of this issue because it will likely directly affect your practice.

If you are looking for help upgrading to ICD-10, or ensuring your practice meets established standards, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

April 2nd, 2014

Productivity_Mar31_APresentations are an integral part of any business, regardless of size. There is a good chance that you will have to give at least one presentation in your career, with many people giving so many they lose count. Many small businesses are starting to hire remote workers or carry out business over large distances, which forces them to create presentations online. However, with this type of presentation it can be especially hard to attract and keep an audience's attention.

If you are creating an online presentation to a remote audience there are a number of factors you should keep in mind if you want to grab your audience's attention and keep them following and paying attention. Here are five of the most important tips:

1. Make it visual

For the most part, visual presentations have a higher chance of success - that is, the message being grasped by the audience. This is especially true for online and remote presentations, largely because when more people are on a computer, partaking in a presentation, they will often be multi-tasking.

If you have a ton of text there is a good chance you will lose your audience within the first couple of slides. Instead aim for a presentation that is heavy on graphics and visually appealing. Using bright or contrasting colors will draw the eye and will increase the time you have your audience's attention.

If your presentation is about a product create picture slides with a minimal amount of text; let the product speak for itself. For presentations involving graphs and charts, include these graphics and a couple of key points. The rest you can fill in with spoken narrative.

2. Focus on the audience

Online presentations and those using meeting software should be audience-friendly. This means making it easy for them to join and partake in the presentation by sharing slides, and also asking if anyone has any points to add or even expand upon with an interactive presentation element.

While presenting, there will be slides and points that are more important than others. To highlight this you can 'sign-post' the salient points. Make these visually larger if they are text, and pause to point this out with the script by telling your audience: "This is the most important point"; essentially demanding they pay attention.

Finally, try to limit technical glitches. This can be the quickest way to lose engagement if your Internet cuts out or the computer crashes. Try to present at a time when you know connection will be strong and stable and have a backup in place in case something goes wrong.

3. Adapt to different audiences

Every person in the audience will have different expectations of your presentation. Some will want just the facts, while others might be looking to be convinced by an opinion or argument expressed in the presentation. You should take the time to get to know your audience and what they expect and then develop the presentation around this idea.

If you do your homework and know a bit about your audience, you can take steps to connect with them early in the presentation, if not before, and drive engagement.

4. Create, edit, practice, edit, practice, edit, practice, present

It may sound a bit redundant to edit and practice multiple times, but it really will help when leading an online presentation. First you should create your presentation, then edit it. You are looking to keep your slides as short as possible - no more than four points and two minutes spent talking for each slide.

Really the first edit should be about content, grammar and spelling. Once this is done, practice presenting as you would on the actual presentation day. Start with a blank desktop screen, log into the software/site you will be using, load the presentation, share it, and then actually present. Time yourself and note any issues.

Next, go back and edit the presentation some more, making sure you aren't spending too much time on one slide or that each of the slides does not have too many confusing points, etc. Keep practicing and editing until you are not only comfortable, but know the content inside and out.

You could also try recording your voice. This will allow you to hear where you need to work on inflection and overall style. If you find that you are tuning yourself out when you listen to the presentation, you may want to practice some more and try to inject some extra interest, whether through humor or engaging facts and ideas. This is really vital is you won't have that face-to-face contact with a physical presentation where you are present. If you sound engaging, the audience are more likely to connect with you.

5. Develop your own style

No one likes a dull presentation where you just talk about what's on the slides. Try to give your presentation a narrative arc and structure. Where possible include personal experiences or even tell a relevant joke from time to time. If you are passionate and show that you are trying to connect your audience will likely not click away from the presentation or drift off to other work or simply to surf the Internet and Facebook.

If you are looking to learn more about presentations and how to use software for expert presentations, or even how to conduct your next remote presentation, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Productivity