Blog

January 14th, 2015

Security_Jan12_CThe scale of the recent security breaches at Sony, which led to the cancellation of The Interview’s theatrical release, can make the company’s problems seem beyond the realm of the average small business. But the security mishaps that created the circumstances for the hack are as applicable to modest local and regional companies as they are to multimillion dollar corporations. These three tips will take you back to security basics and help avert your own big-screen drama.

Don’t let basic security habits slip

Our modern-day instinct tells us that the answer to potential security breaches is to install new layers of antivirus software, firewalls and further encryption systems. While these are all worthy additions to your company’s armor of security shields, they will do little to help if good old-fashioned protective habits are allowed to slide.

Instill a disciplined, security-conscious mentality in your organization, and keep the messages simple so that staff remember and follow them. Focus on regularly changing passwords and keeping them secret, being vigilant about avoiding unexpected links in email messages, and limiting network access for the likes of external contractors to that which is absolutely necessary.

One of the ways hackers made their way into the Sony network was by tricking administrators into thinking they had a legitimate need for access: teach your staff to be careful, and praise cautiousness even if it turns out access is warranted. Encourage staff to flag up potential security lapses, and make sure they know that reports will be followed up and loopholes closed.

Take a flexible and agile approach to IT

IT changes, and so do the ways best suited to keeping it safe. This means it is vitally important to keep your IT systems up to date, and where necessary to do away with outdated practices that could leave your business technology exposed. This involves more than just ensuring that your network is running updated antivirus software to catch the latest bugs and worms - it means staying abreast of emerging methods to mitigate potential threats from hackers worldwide.

All of this uses staff and resources that your small business might not have - which is where outsourced managed services come in. Using a managed service provider as an add-on to your own IT team can give you extra flexibility and the ability to keep abreast of industry security developments, even when you lack the time to do so yourself.

Equally, know when it is time to ditch data - think of emerging social networks like Snapchat, which set messages to self-destruct after a set time, as your cue to make your data retention policy less permanent, particularly in relation to email. If you no longer have a business need or a regulatory requirement to retain information, then delete it - in the process you can limit the possible damage even if the worst should occur and you fall victim to an external attack.

Backup, backup, backup

The last thing you want in the event of a security breach is for it to hit your day-to-day operations - the potential damage caused by the hack itself is likely to give you enough to worry about. But that is exactly the situation Sony found itself in after its latest hack, with its email system down and staff forced to return to the days of pen, paper and even the fax machine.

As well as ensuring alternative means of communication remain open to your business in the aftermath of a possible attack, it is also vital to make sure that you retain access to the information most critical to your work. Regular, secured backups help ensure that, whatever happens, the show is able to go on and your firm’s productivity and revenue are not unduly hit. Engaging professionals to undertake your backups on a managed service basis also means this can happen routinely and without fail, while you stay focused on running your business.

Want to learn more about how to reduce your IT network’s vulnerability to attack? Get in touch with us today.

Published with permission from TechAdvisory.org. Source.

Topic security
January 13th, 2015

office365_jan12_AMicrosoft is set to roll out security even further for Office 365 users to reflect the growing use of data collaborative business apps. This extended reach will provide tools to protect crucial data shared using SharePoint Online, OneDrive for Business, Windows File Share and Office apps. The security plans promise more control of data in real-time.

Beyond email security

There has long been an awareness of security when it comes to email content and Office 365 incorporated data loss prevention in Exchange and Outlook, as well as Outlook Web App. It is understandable that when you write an email you don't want the information within it to be seen by anyone else, and whilst Google maintains its email scanning policies, data loss prevention tools can help stop hackers from getting a glimpse of your private data. This is all well and good but sharing critical data via email is not the only way to exchange information and Microsoft's latest data loss prevention strategy recognizes these changes.

Collaboration needs to be safe

Microsoft has enhanced collaboration capabilities with Office 365 but along with these new ways of sharing data, there needs to be solid security measures in place too. Documents in Word and spreadsheets in Excel are created using applications and then shared via various collaboration tools. To ensure this data is safe, access restrictions and permissions need to be activated.

Data loss prevention in SharePoint and OneDrive for Business

Recently eDiscovery has allowed users of SharePoint and OneDrive for Business to identify sensitive information within collaborative content. This security is set to expand to policies on restricting and blocking access, user education and to include email notifications.

Data loss prevention in Windows File Share

Windows File Server already has file classification infrastructure in place, whereby the server scans files to identify sensitive data. This data is then tagged and classified according to the definitions users set, with an ability to initiate action on these identified or classified files. The latest security, or data loss prevention, measures involve this content classification being extended to Office files in Exchange, SharePoint and OneDrive for Business. In time this will continue to grow to include centrally managed policies and allow for greater user education within companies.

Data loss prevention in Office applications

This protection is being expanded to Microsoft applications so that when content is created users will be able to set up policies with regard to sharing permissions at the same time. Tips connected to the policies that have been established will then be offered as well. Initially, Excel will benefit from this expansion, with Word and PowerPoint being included later in the year.

The importance of data loss prevention

With so many different ways to create and share content, it is essential that business leaders can take advantage of a stable strategy for preventing data loss. If sensitive and crucial information is allowed to leak out this could potentially be incredibly damaging to a business and put productivity and profitability in jeopardy. With greater collaborative tools comes greater risk and the latest plans for Office 365 data loss prevention are a welcome layer of security to protect against data dangers.

Find out more about how Office 365 can benefit your business. Get in touch today.

Published with permission from TechAdvisory.org. Source.

Topic Office 365
January 1st, 2015

hardware_Dec25_AIf you want to keep your business data and systems secure it is essential that you have an antivirus or antimalware scanner installed on every system. While the install rates of these programs in businesses is nearly 100%, there is an increasing trend where some companies are letting their subscriptions expire. So, if your antivirus subscription expires is this really a big deal?

What happens when an antivirus subscription expires?

While each program will treat an expired subscription slightly different, generally speaking, most will still function in some way. You will normally be able to run a scan, but you likely won't be able to deal with any malware or security threats. Features like automated scanning will also be turned off.

Other programs will stop updating the essential virus and malware databases that are used by the program to identify and clean new malware. This means that while you will be secure from known viruses and security flaws up to the date of the last database update, you will not be secure against newly discovered viruses.

Some popular programs like Kaspersky offer an antivirus scanner trial version or a program that comes with a newly purchased computer.With programs like these, they will normally stop functioning once the trial period is over. Yes, they will still open, but you won't be able to scan or perform any tasks.

In short, when your subscription expires, your systems will no longer be secure, or as protected as they should be. Interestingly enough, in mid-November 2014, Microsoft released its Security Intelligence Report 17. This report found that computers and systems with expired malware were only slightly less likely to be infected than systems without any malware scanners installed.

What do I do if my subscription is about to expire?

Before your subscription expires you should take steps to back up all of your systems and data. The reason for this is that should something happen you have a clean backup to revert to. Once this is carried out, then consider renewing your subscription. Most programs allow you to do this directly from the scanner itself, so it is often fairly straightforward.

As a business owner however, you are going to need to keep track of your systems and licenses. What we recommend is creating a spreadsheet with information on the subscription applied to all systems. Take account of when the scanner was installed on each system, how long the subscription period is for, and when it will expire.

What if my subscriptions are about to expire, but I don't like my current program?

There may come a time when the scanner you have selected simply isn't living up to your expectations. Maybe it takes too long to scan, uses too many resources, or simply isn't able to protect all of your systems. Regardless of the reason, switching scanners is always an option.

If you are thinking of moving to another scanner, we strongly recommend that before you do anything, you back up your systems. You can then start looking for other systems. We strongly recommend that you contact us, as we can help identify a solution that will work for your business and systems. We can then help ensure that the transition is carried out in a way that will not leave your systems open to attack.

We may have a managed antivirus solution that will work for your business. By using a system like this, we can help protect your systems, keeping them secure and always up to date, all without you having to get involved. All you need to do is get in touch to find our more.

Published with permission from TechAdvisory.org. Source.

Topic Hardware
December 31st, 2014

security_dec24_CThere are so many ways that hackers can gain access to your computers and systems it boggles the mind. One of the more popular tactics employed is the increasingly common spear phishing. In early December 2014, news broke of a new, super savvy, spear phishing campaign that had succeeded in scamming top Wall Street companies and could be a danger to small businesses as well.

What is spear phishing?

Spear phishing is an advanced form of phishing where attackers troll the Internet for relevant information about you and then create a personalized email that is sent to you. This email is usually developed so that it appears to be coming from a friend or trusted partner and contains links to a site or program that can initiate an attack or steal information.

More often than not, these links are to websites where you enter account information, passwords, and even bank account details, or any other personal information which can be used to break into computers and even steal your identity.

What is this latest spear phishing attack?

This new form of spear phishing, being carried out by an organization who calls themselves FIN4, has actually been around since as early as mid 2013. When they attack Wall Street listed companies they are doing so to steal valuable plans and insider information.

What we know is that they send highly savvy and targeted emails to people at a company, trying to harvest Microsoft Outlook account information. Once they have this crucial data they then target others inside, or connected to, the organization, with the same email, while also injecting the code into ongoing messages. This method can spread the attack quickly, leading to a potentially massive security breach.

In the email examples of this phishing threat, the attackers write mainly about mergers and other highly valuable information. They also include a link to a forum to discuss the issues raised further. These emails come from people the recipient already knows, and the link is to a site that asks them to enter their Outlook account and password before gaining access. When this information is entered, it is captured by the attacker and used to launch more attacks.

What can we do to protect our systems?

From what we know, this attack is being carried out largely against law firms, finance companies, and other large organizations. While this discounts many small businesses, there is a good chance that the attackers will turn to small businesses operating with larger companies at some point.

Because this is an email-based attack, you need to be extra vigilant when opening all emails. Be sure to look at the sender’s address, and read the body of the email carefully. While hackers generally have good English skills, they aren’t fully fluent, which means you will notice small mistakes. Also, keep in mind previous emails sent by the recipient. If the tone and style is off, then the email may be fake.

It is important to always look carefully at all links in email messages. If a link looks suspicious, then ask the recipient for more information or to tell you where the link goes. If you come across any site asking you to enter account information, be extra careful. Look at the URL address in your browser, if it doesn’t sat HTTPS:// before the address, then it may be a good idea to avoid this.

If you have any questions on spear phishing and how you can prevent it, contact us today to see how we can protect your business.

Published with permission from TechAdvisory.org. Source.

Topic security
December 30th, 2014

BCP_Dec23_AWhen it comes to backing up your important business data, there are many options available to your company. One of the increasingly common choices is to use online or cloud-based backups. Despite the popularity of these systems, there is still confusion over what exactly online backup is and the benefits it can bring businesses.

What exactly is online backup?

In a wide sense, online backup is a backup system where your files, folders, and even systems, are backed up to an offsite storage server over your Internet connection. Tech experts also refer to this service as remote or cloud-based backup.

When you back up your files and systems to an online solution, your files are stored off site, usually in redundant data centers. This means that should something happen to your files you can access the system via another computer and restore your backups onto that computer, as long as you have an Internet connection.

For many companies, this is arguably the most efficient form of backup, not because of the backup method itself, but because of the fact that your backups are stored remotely The chance your data will be accessible if your business faces disaster increase, as data can be recovered quicker than most other systems.

How do online backups work

Like most other technical systems out there, there are numerous varieties of online backups. Some of the most effective are image-based, which take a snapshot of a computer or server at a specific time and then upload this to the remote backup servers. This snapshot contains the whole system as it is and can be easily recovered.

Other solutions can be automated to back up specific files and folders, and run through a Web-based interface that can execute a backup from almost anywhere. Beyond this, many systems can be managed by a company like us. We can implement a system that works best for your company and your data, and then manage it so that your data will always be available when you need it. Should something go wrong, we can even help you recover your systems.

4 Benefits of online backup

Companies that implement an online-based backup have been able to realize the following benefits:
  1. Decreased recovery time - Because your data is stored online, as long as you have an Internet connection you can begin recovery at the click of a button; there is no having to go find your backup, then figure out how to recover it. Most companies see a generally reduced backup recovery time when they implement an online system.
  2. Increased backup reliability - Over time, physical systems break and need to be replaced, and this can happen at any time. Because online systems are managed by other companies, whose main job is to ensure backups are always available, you see increased reliability with these systems.
  3. Decreased costs - Physical backup systems can be costly, especially if you have a large number of systems or a large amount of data to back up. Many online providers charge a flat monthly fee that often works out to be less costly than other solutions. Beyond this, you don't need to invest in physical backup solutions and the storage space to house and maintain these. As a result you should see lower costs.
  4. Increased data availability - As long as you have an Internet connection, your data will be available. This means you don't have to worry about your offsite physical data being okay, if you have a problem or disaster strikes on your premises. With online services data is available when you need it.
If you would like to learn more about online backup, contact us today and let us reveal just how dynamic and effective our solutions can be. Don't wait until you have to face a backup issue to back up your vital data!
Published with permission from TechAdvisory.org. Source.

December 18th, 2014

SocialMedia_Dec15_AWhen working with social media in your business there are a number of metrics commonly used to determine whether the content you create and share is effective. One of the best metrics to employ is the number of shares each piece of content receives. More shares usually means higher visibility and therefore a greater impact. However, many businesses struggle to get their content shared. Here's four reasons why.

1. The vast majority of people are hesitant to share content

According to a study conducted by Carnegie Mellon University and Facebook over a 17 day period, approximately 15.3 billion comments and posts were written but were then deleted and not posted on Facebook alone.

While the reasons will have been varied, the numbers highlight that the vast majority of users are sensitive to what they post on Facebook, and most most likely other networks as well. What does this mean for businesses? Well, you need to ensure that the content you are posting offers value to not only your audience, but their audience as well.

Think about when you have shared content on any network. You probably didn't do so 100% for yourself, but instead shared the content or created a post so your audience would interact with it, or possibly get something out of it. Think of this as the "hmm, that's interesting, other people will like it too, so I'll post it" mentality. By sharing content others enjoy or respond to you get the benefit of increased recognition.

If you can create content that gets people to think this way, there is an increased chance that they will share it.

2. Facebook users want to be seen in a positive light

According to a study carried out by INC. 80% of respondents share content because it shows that they are being a good friend to those they care about. People use social media to foster good relationships and connect with those they care about. And if somebody regards your posts as potentially able to tarnish their image on social media, they won't share it.

Businesses looking to capitalize on this need to try to create content and campaigns that help users better relate to one another. Combine this with the above example of creating interesting-to-share content and you will be more likely to see an increase in shares.

3. Content doesn't fit our salient identities

Because social media has become an extension of society, many experts apply common social science principles to it. The most commonly applied theory is of the five identities (relational, personal, social, superficial, and collective) that determine how people behave in a certain situation.

If you are posting content that doesn't fit with an an individual's current identity then it's not going to be shared. So, how can businesses capitalize on these changing identifies? One effective way is to get to know your main target audience; how they act and react to certain social cues, and then create content to fit with this behavior.

For example, if your target group for posts is parents, then using language and content that triggers parental instincts could increase shares as parents associate better with it.

You might want to widen your focus too and try developing content that capitalizes on different identities, tracking what works best.

4. Content doesn't mesh with a user's values and goals

The same INC. study found that after being a good friend, 63% of users surveyed noted that they were more likely to share content that reflected their goals, values, and dreams.

How can a business capitalize on this? The best way is to get to know your audience. Look at their posting and sharing habits and the type of content they share on a regular basis. This may change over time, but you will see patterns evolve for different groups. If you can develop and post content that reflects these main goals and values then you are more likely to see your content being shared. Try different approaches and keep in mind who you are developing content for.

If you are looking to learn more about social media, contact us today to see how our systems can help you integrate it with your business success.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
December 12th, 2014

productivity_Dec12_AEmail has become the main form of communication for many businesses. When first launched, many people treated email as simply an electronic version of company memos and letters and therefore created and styled them as such. Over time, email has become much more informal, and while this is great it can lead to problems in overall clarity of communication. However, there is one effective way you can ensure all of your messages are clear and understandable, by adopting PAR.

Better email structure for small businesses

In order for your emails to be clearer and to get the overall message across easily, you might want to implement a PAR structure. This three part framework has been used by many business owners and managers to improve overall communications, and consists of:

Problem

At the very top of the email, below the salutation, provide a brief yet clear overview of the problem which is the subject of the email or the reason you are making contact. When writing this overview don't assume anything, including shared knowledge or agreements, unless you have discussed these with all recipients beforehand. The key here is that you are looking to be able to summarize the main issue.

If you need more than two paragraphs, then you should probably create a longer form report that is attached in the email. The reason for this is because the vast majority of people will simply scan an email, and if it's too long, they will usually skip it, or possibly miss key points. If it is easy to scan and read, then there is a greater chance all parties will be on the same page.

Beyond this, if you are struggling to come up with a short explanation or can't clearly summarize the problem in writing, then email may not be the best medium to be using. Opt instead for a meeting or phone call to discuss the issue more fully.

Action

After stating what the problem is, clearly mark any proposed actions or recommendations using a relevant heading, then specifically lay them out in an easy to read format. You want to be as specific as possible here, ensuring that all parties understand what you want to happen and the actions they will need to take as a result.

For example, if you use vague language, such as: "I need this by the end of the month", people may only carry out what you are asking for on the very last day of the month. Instead, you might be better to give a specific delivery date, and possibly a set time, so that any deadlines are clearly defined. Bulleted and numbered lists can really help here, as long as they are clear and understandable and don't muddle the issue.

Results

Finally, identify the expected results based on the actions you want the recipients to take. This helps ensure that every recipient knows what they should be striving for, as well as serving as an indicator of whether the problem has been specifically solved or not.

If the results aren't met, you have a good opportunity to look back at the process and see if there is any room for improvement, or try to pinpoint exactly why something went wrong or didn't happen as you planned. This in turn, if leveraged correctly, can help improve overall productivity.

Looking to learn more about increasing productivity in your office? Contact us today to see how our systems can benefit your business.

Published with permission from TechAdvisory.org. Source.

Topic Productivity
December 11th, 2014

BusinessValue_Dec11_AThe beginning of a new year can be rather stressful and expensive for everyone, employees and business owners alike, with new plans and goals set in place right after long holidays. While it is great to start anew, it can be tough to justify or find the funds for new expenses, even if there is a real need. Instead, you may want to look for cost saving tools that can help improve business operations for less. To help, here are five free or affordable tools that can make your business life easier.

1. Canva

If you are a business owner, chances are that you aren’t the world’s best graphic designer, unless you run a graphics company of course! In order to design graphics, icons, flyers, and even posters you need specific graphics software. This can be expensive and the software is not going to be easy to use for design novices. You may even need an in-house graphic designer. This is where Canva comes in.

Canva is an online app that allows users to quickly and easily create professional looking graphics using drag and drop functionality and a wealth of free, or affordable, stock images. In other words, you can create designs in a short amount of time.

The service itself is free, but some images do need to be purchased.

2. FreshBooks

Most business owners are not certified accountants either, and even if you understand the basics of accounting and tracking of finances, the money side of your business is often a full time or at least a specialized job. If not handled correctly, this could spell disaster for your business. One solution is cloud-based FreshBooks.

FreshBooks is accounting software that allows you to invoice clients, track payments, accept payments, track expenses, and access financial reports at the click of a button. Beyond this, you can connect FreshBooks with your payroll services to ensure that your employees are paid on time.

The platform offers a free plan that allows you to track and manage one client, while paid subscriptions start at USD 19.95 a month.

3. Hootsuite

Many businesses have a presence on more than one social media network. While this is a great way to reach out to the highest number of customers, it can be a chore to manage and maintain a presence on all of these networks all of the time. Hootsuite is specifically aimed at this task.

Hootsuite is a tool that allows you to manage your social media accounts from one platform. Using Hootsuite you can schedule posts, set up streams, establish keyword tracking, and track engagement. It really is a one-stop-shop for all of your social media platforms.

Hootsuite offers a free subscription which allows you to manage three social media profiles, while a business subscription starts at USD 8.99 and allows you to track up to 50 profiles and gives you access to more advanced analytics and features.

4. Podio

Managing projects and ensuring that all employees are aware of what they should be doing, and what others are doing, can be one of the toughest tasks for any business owner. Sure, spreadsheets and communication work to a point, but there is always room for error and of course improvement, which is what Podio provides.

Podio is a project management app that allows you to easily manage projects, tasks, deadlines, and even files. Using an intuitive dashboard that all users have access to, employees and managers can easily see who is doing what, as well as what needs to be done and what has already been done.

Podio is free with limited features for five users and costs USD 9 per user, per month for the full subscription plan.

5. CoSchedule

If you have a blog, either on WordPress or hosted by WordPress, sharing the articles you post on your social media profiles is a great way to increase content reach and interaction. However, it can be time consuming to actually create posts on each different platform, unless you use CoSchedule.

With CoSchedule you can write your social media posts for a blog article and schedule them to be posted once the article goes live. Think of it as automating the sharing of your blog articles. This will save you time, while making it easier to manage your content, largely because the calendar included in CoSchedule is easy to work with and gives you a good view of your content.

CoSchedule is USD 10 per month, per blog.

If you are looking for more affordable ways to improve your business operations, contact us today to see what boost we can offer you at a price you can afford in 2015.

Published with permission from TechAdvisory.org. Source.

December 11th, 2014

VoIP_Dec11_AIt's the holiday season, and regardless of the industry you work in, or where you are located, there is a good chance that during this busy time your phone systems will see an increased load. It seems that as the year comes to a close people want to communicate more, and so you need to ensure that your VoIP systems can handle the increased volume.

Establish VoIP system monitoring

Before you know whether your systems are ready for an increased call volume, you should establish monitoring tools that allow you to keep track of call volumes and how the systems hosting your VoIP solution are faring. If you notice that a spike in call volume during peak hours leads to decreased call quality, or perhaps an increased load on systems, then it may be a good idea to invest in a new solution that can help carry this extra burden.

Because this is the holiday season, and your staff and even IT providers may be away on leave, a monitoring solution can be helpful in predicting when issues may arise. You and your IT team can then help prepare for an increase in call volume and any problems that may crop up when they are away from work. This ensures that your systems won't go down when you need them most.

Check your VoIP equipment

Sometimes, problems with VoIP don't have anything to do with your service provider or even the underlying servers that host the solution, but the physical VoIP lines and phones themselves. One common issue with VoIP is that if equipment is too close to other VoIP equipment, you may see a degradation in call quality.

Therefore, you should take care to ask your employees if they have noticed lower call quality lately, especially if two VoIP devices are close to one another. If there have been issues, moving them further apart should clear this up.

Beyond this, take the time to inspect all cables and connections to ensure they are in good condition and able to deal with the increased wear and tear the holiday season can bring. If equipment is looking a little past it, now may be the time to look for new devices and solutions that can help boost your communications.

Set data priorities on your router

Most modern business routers have an important feature called QoS, or Quality of Service. This allows users to set bandwidth limits for different activities and even create priority lists. Because you will likely be getting more calls during the holiday season, it is a good idea to ensure that the extra bandwidth will be there when you need it.

Because your router is also in charge of assigning bandwidth to your VoIP solution, using the QoS feature is a good way to ensure that calls are receiving the bandwidth they need to remain clear. Take a look at the way data and bandwidth is being used in your network and set limits on non-essential activities that may be using higher amounts. For example, it may be a good idea to reduce the bandwidth assigned to streaming services and apply the extra percentage to your VoIP solution.

Work with an IT partner

These tweaks and updates can be time consuming and a bit of a chore to carry out, especially if you are not a tech expert. What we recommend is contacting us, so our VoIP experts can work with you to ensure your network is configured for the higher call volume, equipment is working, and servers are ready. We can even offer suggestions on better systems that can improve communications while reducing costs. Be prepared for the holiday season, contact us today.
Published with permission from TechAdvisory.org. Source.

Topic VoIP General
December 9th, 2014

Facebook_Dec08_AAt work, the Internet is both a great tool that enables more efficient work and a massive distraction to many, especially those who are active on social media. Check with any employee and you can probably guarantee that they have accessed Facebook while at work. While this can irk some employers, Facebook is tackling this issue head on and is developing a new social network just for businesses, potentially called Facebook at Work.

What is Facebook at Work?

In late November, Facebook announced that they are developing a new social network which may be called Facebook at Work. As you can guess by the clue in the title, this is going to be a business-oriented venture that will bring the popular social network, or elements of it, to the workplace.

For many businesses, this popular social network is not really a part of every business operation. Sure, marketing and sales may use this platform, and others, as a way to reach out and connect with customers, but few organizations are known to use Facebook internally as a communication and social network for employees.

Those who do use the network in the office often use their personal accounts and have noted that they would like an easy way to separate work from personal life, while still remaining on the network. Many businesses would also prefer that employees didn't bring their personal lives and Facebook accounts to the office because this can lead to breaches in privacy and even important data being compromised, especially if a personal account is hacked.

The best way to think of this new platform is that it is Facebook strictly for work. While it is still in the development stages, some interesting details have emerged. There is no official name for the network, thus far, but sources at Facebook have noted that the codename for the product is Facebook@Work.

What Facebook@Work will look like

From what we can tell, the network will look and work much the same as the existing version of Facebook. Users will be able to create profiles, join groups, post on each other's News Feeds, and even send messages using the popular Facebook Messenger. Where it will differ is that it will have collaborative tools that allow users to share and work on the same documents.

This network will be completely separate from the personal Facebook site, with users having a different password and username. Information between a personal and work account will not be shared either. This should make the network more secure, or at least minimize the use of personal accounts for work-related tasks.

What we don't know

We do know that Facebook@Work, or Facebook at Work, is currently being developed by a London-based branch of Facebook who seem to be also acting as the main testers. However, we are unsure at this time if the network is being developed strictly as an internal network, which will be used only within a company, or if it will be more like LinkedIn, where it will allow you to connect with similar professionals.

Interestingly enough, Facebook has been using its own network and various groups as a major part of their own internal communication tools amongst departments. For example, when an employee joins a new department they are added to a secure group and group chat where updates are posted, questions are asked, and work is supposedly assigned and agreed upon. It could be that the company is developing something along these lines for external release too.

We don't know exactly when this network will be introduced, but you can be sure that it will be debuted sometime in 2015, possibly with a rollout in the next year. If your business uses social platforms, or is looking to integrate social media in the near future, this business-oriented social media platform could be worth keeping your eyes on.

Stay tuned as we will be covering this further in the future. Meanwhile, if you have any questions about how best to utilize Facebook in the office please contact us today.

Published with permission from TechAdvisory.org. Source.