Steve Thomas - IT Consultant

164_C_ProdWhen many people think of remote working, they imagine a person lounging on the couch in their pajamas with a laptop. Does this vision stir up images of productivity? We doubt it. That’s why it’s important to instill the proper habits of a work-from-home culture into your remote workers’ minds. Here are a few principles every employee should consider when working remotely.

Don’t change your routine

Would you go to the office without brushing your teeth or combing your hair? Probably not. Believe it or not, it’s not a good idea when you’re working remotely either. Sometimes the simple act of preparing for your workday – jumping in the shower, shaving and so on – can put you in the right frame of mind to work. If you or your staff are finding it difficult to be productive at home, try sticking to a pre-work routine and see if it makes a difference.

Designate a specific workspace

Attempting to work while sitting in your bed or lounging on the couch can be a recipe for a productivity disaster. So instead, try designating a specific space where you work everyday. It can be as simple as a desk set apart from the rest of your living room or bedroom, but just make sure it’s not cluttered with non-work items (like a TV remote or fiction novel), and that it’s properly lit and comfortable.

If you’re working from a coffee shop, airport or other public place, consider using a pair of headphones to help drown out the noise so you can focus. Eliminate as many distractions as possible, and the productivity will come.

Stay connected to your team

Thankfully, cloud computing has made it unbelievably easy for your remote workers to stay connected to the office wherever they are. If your business is setup with Google Apps, Microsoft Office 365 or another cloud product, make it a requirement that your employees access it daily and remain available. When your staff is connected to your business this way, it will strengthen their relationship with other employees and the organization as a whole. Generally speaking, more connected employees are more productive ones.

Log off

When you work remotely, the line between work and personal life blurs more than ever. To avoid burnout, it’s important you discipline yourself to log off after you’ve put in a full day’s work. Whether you choose to work from 9 to 5 or 4pm to midnight, define work hours and stick to them. This will help you completely disconnect at the end of the day, which will ensure that you’re properly rested and prepared for the next.

Want more tips on productive habits for remote working? Are you ready to empower your staff with cloud computing to help them along? Let’s talk. Call us today.

164_B_ProdDo you have a staff of young employees who are working remotely around the country? How do you know they’re staying productive and not watching YouTube videos all day? For employees who are undisciplined and new to the remote working world, working from home or a coffee shop can be a breeding ground for unproductivity. How can you help your staff develop the habits they need to remain productive while they’re out of the office? Here are a few ideas that will help any remote worker keep their head on straight and focused on the job.

Don’t change your routine

Would you go to the office without brushing your teeth or combing your hair? Probably not. Believe it or not, it’s not a good idea when you’re working remotely either. Sometimes the simple act of preparing for your workday – jumping in the shower, shaving and so on – can put you in the right frame of mind to work. If you or your staff are finding it difficult to be productive at home, try sticking to a pre-work routine and see if it makes a difference.

Designate a specific workspace

Attempting to work while sitting in your bed or lounging on the couch can be a recipe for a productivity disaster. So instead, try designating a specific space where you work everyday. It can be as simple as a desk set apart from the rest of your living room or bedroom, but just make sure it’s not cluttered with non-work items (like a TV remote or fiction novel), and that it’s properly lit and comfortable.

If you’re working from a coffee shop, airport or other public place, consider using a pair of headphones to help drown out the noise so you can focus. Eliminate as many distractions as possible, and the productivity will come.

Stay connected to your team

Thankfully, cloud computing has made it unbelievably easy for your remote workers to stay connected to the office wherever they are. If your business is setup with Google Apps, Microsoft Office 365 or another cloud product, make it a requirement that your employees access it daily and remain available. When your staff is connected to your business this way, it will strengthen their relationship with other employees and the organization as a whole. Generally speaking, more connected employees are more productive ones.

Log off

When you work remotely, the line between work and personal life blurs more than ever. To avoid burnout, it’s important you discipline yourself to log off after you’ve put in a full day’s work. Whether you choose to work from 9 to 5 or 4pm to midnight, define work hours and stick to them. This will help you completely disconnect at the end of the day, which will ensure that you’re properly rested and prepared for the next.

Want more tips on productive habits for remote working? Are you ready to empower your staff with cloud computing to help them along? Let’s talk. Call us today.

164_A_ProdTechnologies such as cloud computing are freeing employees from their desks and lighting the fuse to the remote working revolution. For employees who lack discipline or a strong work ethic, a remote worksite is a breeding ground for a lack of focus and unproductivity. What can you do to help them out? Here are some ideas you can provide your staff (or take advantage of yourself) to develop the proper habits for successful remote working.

Don’t change your routine

Would you go to the office without brushing your teeth or combing your hair? Probably not. Believe it or not, it’s not a good idea when you’re working remotely either. Sometimes the simple act of preparing for your workday – jumping in the shower, shaving and so on – can put you in the right frame of mind to work. If you or your staff are finding it difficult to be productive at home, try sticking to a pre-work routine and see if it makes a difference.

Designate a specific workspace

Attempting to work while sitting in your bed or lounging on the couch can be a recipe for a productivity disaster. So instead, try designating a specific space where you work everyday. It can be as simple as a desk set apart from the rest of your living room or bedroom, but just make sure it’s not cluttered with non-work items (like a TV remote or fiction novel), and that it’s properly lit and comfortable.

If you’re working from a coffee shop, airport or other public place, consider using a pair of headphones to help drown out the noise so you can focus. Eliminate as many distractions as possible, and the productivity will come.

Stay connected to your team

Thankfully, cloud computing has made it unbelievably easy for your remote workers to stay connected to the office wherever they are. If your business is setup with Google Apps, Microsoft Office 365 or another cloud product, make it a requirement that your employees access it daily and remain available. When your staff is connected to your business this way, it will strengthen their relationship with other employees and the organization as a whole. Generally speaking, more connected employees are more productive ones.

Log off

When you work remotely, the line between work and personal life blurs more than ever. To avoid burnout, it’s important you discipline yourself to log off after you’ve put in a full day’s work. Whether you choose to work from 9 to 5 or 4pm to midnight, define work hours and stick to them. This will help you completely disconnect at the end of the day, which will ensure that you’re properly rested and prepared for the next.

Want more tips on productive habits for remote working? Are you ready to empower your staff with cloud computing to help them along? Let’s talk. Call us today.

Virtualization_May28_BBusinesses today rely on their applications and critical documents more than ever before to stay efficient and competitive. With that in mind, virtual machines are often the go-to platform to ensure precisely that; but things may change with the increasing popularity of containers. What exactly are containers, though? Are they better than virtual machines? Here we take a look at which will best fit your business.

Containers, just like virtual machines, are used for storing files, critical data and applications in an organized manner following specific access rules. So how do they differ from virtual machines, and what are the pros and cons of containers? We’ll take a look below.

Containers can pack a lot more applications into a single cloud or data center than a virtual machine can. And because containers only require little memory from an operating system and its supporting programs and libraries, you can put two to three times as many as applications on a single server with a container than you can with a virtual machine. In addition, containers allow you to create a portable, consistent operating environment for development, testing and deployment.

Still, there’s a lot more to containers than how many apps you can put in a box, and not everything about them is sweet. One of the problems with containers that is often overlooked is security. Simply put, containers do not contain. What this means is that if a user or application has superuser privileges within the container, the underlying operating system could be cracked. And while you can secure containers by mounting a /sys filesystem as read-only among other options, it takes a lot of time and effort to do so.

Another container security issue stems from the release of many containerized applications. This is a problem because if you happen to install the first container that comes to hand, you’re likely to have brought a Trojan Horse into your server. You need to inform your staff and employees that they simply can’t download apps from the Internet into a container like they do games for their smartphone. Not only that, but breaking deployments into more functional discrete parts using a container is possible, but means more parts for you to manage. The whole point of a container is to run a single application, so the more functionality you stick into a container, the more likely it is you should actually be using a virtual machine in the first place.

So how do you decide between containers and virtual machines? Ask yourself whether you need to run the highest possible number of instances of a particular application on the fewest possible servers, because if so then containers are the best option for you. But if you want the flexibility of running multiple applications on your servers and you have a variety of operating systems, virtual machines are your safest bet.

Looking to learn more about how virtualization can help your business prosper? Contact us today – we’re sure we can tailor a solution that meets your unique needs.

Virtualization_May28_CVirtual machines have been gaining much popularity for the past couple of years, providing businesses with efficient data and application storage space that allows more to be done with less effort. But with the arrival of containers, another virtual storage option, how do you know which is better for your company? Here, we’ll explore and answer exactly that.

Containers, just like virtual machines, are used for storing files, critical data and applications in an organized manner following specific access rules. So how do they differ from virtual machines, and what are the pros and cons of containers? We’ll take a look below.

Containers can pack a lot more applications into a single cloud or data center than a virtual machine can. And because containers only require little memory from an operating system and its supporting programs and libraries, you can put two to three times as many as applications on a single server with a container than you can with a virtual machine. In addition, containers allow you to create a portable, consistent operating environment for development, testing and deployment.

Still, there’s a lot more to containers than how many apps you can put in a box, and not everything about them is sweet. One of the problems with containers that is often overlooked is security. Simply put, containers do not contain. What this means is that if a user or application has superuser privileges within the container, the underlying operating system could be cracked. And while you can secure containers by mounting a /sys filesystem as read-only among other options, it takes a lot of time and effort to do so.

Another container security issue stems from the release of many containerized applications. This is a problem because if you happen to install the first container that comes to hand, you’re likely to have brought a Trojan Horse into your server. You need to inform your staff and employees that they simply can’t download apps from the Internet into a container like they do games for their smartphone. Not only that, but breaking deployments into more functional discrete parts using a container is possible, but means more parts for you to manage. The whole point of a container is to run a single application, so the more functionality you stick into a container, the more likely it is you should actually be using a virtual machine in the first place.

So how do you decide between containers and virtual machines? Ask yourself whether you need to run the highest possible number of instances of a particular application on the fewest possible servers, because if so then containers are the best option for you. But if you want the flexibility of running multiple applications on your servers and you have a variety of operating systems, virtual machines are your safest bet.

Looking to learn more about how virtualization can help your business prosper? Contact us today – we’re sure we can tailor a solution that meets your unique needs.

Virtualization_May28_AVirtual machines are a robust platform for storing data, documents and applications for most organizations today. But with the emergence of containers, another platform for virtual file storage, the question arises: which platform is right for my business? With that in mind, let’s take a look at how containers and virtual machines differ and which would be best for your organization.

Containers, just like virtual machines, are used for storing files, critical data and applications in an organized manner following specific access rules. So how do they differ from virtual machines, and what are the pros and cons of containers? We’ll take a look below.

Containers can pack a lot more applications into a single cloud or data center than a virtual machine can. And because containers only require little memory from an operating system and its supporting programs and libraries, you can put two to three times as many as applications on a single server with a container than you can with a virtual machine. In addition, containers allow you to create a portable, consistent operating environment for development, testing and deployment.

Still, there’s a lot more to containers than how many apps you can put in a box, and not everything about them is sweet. One of the problems with containers that is often overlooked is security. Simply put, containers do not contain. What this means is that if a user or application has superuser privileges within the container, the underlying operating system could be cracked. And while you can secure containers by mounting a /sys filesystem as read-only among other options, it takes a lot of time and effort to do so.

Another container security issue stems from the release of many containerized applications. This is a problem because if you happen to install the first container that comes to hand, you’re likely to have brought a Trojan Horse into your server. You need to inform your staff and employees that they simply can’t download apps from the Internet into a container like they do games for their smartphone. Not only that, but breaking deployments into more functional discrete parts using a container is possible, but means more parts for you to manage. The whole point of a container is to run a single application, so the more functionality you stick into a container, the more likely it is you should actually be using a virtual machine in the first place.

So how do you decide between containers and virtual machines? Ask yourself whether you need to run the highest possible number of instances of a particular application on the fewest possible servers, because if so then containers are the best option for you. But if you want the flexibility of running multiple applications on your servers and you have a variety of operating systems, virtual machines are your safest bet.

Looking to learn more about how virtualization can help your business prosper? Contact us today – we’re sure we can tailor a solution that meets your unique needs.

BusinessValue_June2_COver the past few years, technology has taken the business world by storm. With so many people using search engines to find answers, products, and local service providers, you really are missing out if you’ve failed to establish a business website. As more and more business owners jump into the website game, the scramble for the search engines’ prime spots becomes more fiercer than ever. But applying a well thought-out search engine optimization (SEO) strategy can take you straight up to the top. Here’s what you need to know to build an online presence.

SEO defined

The practice of SEO has been around just about as long as search engines themselves. SEO is basically a methodology of techniques and tactics used to increase the number of visitors to a website by obtaining a high-ranking placement in search engine results. There are a lot of crackpot theories about SEO out there, and you’ll have to sift through them to find the techniques that really work for your business.

There’s a saying in the world of SEO that if you’re not first, you’re last. When it comes to SEO there’s no short cut, and the idea of getting your business website ranked on the first page of Google search results in one day is ludicrous. To make things clearer, we’ve compiled a list of the basic SEO practices business owners tend to overlook.

1. Research keywords
Keywords are key to your online presence. Add the right keywords to your website and your chances of being found are much higher. First, invest time in keyword research. Find out which keywords your customers are using in search engines, and gather all crucial data for SEO purposes, whether it’s search volume, trends, or competition. Make a list of keywords related to your niche. Don’t be tempted to only go after phrases with the highest search volume – they will be very hard to rank for and might be too broad.

2. Create quality content
Based on the researched keywords, generate high quality content with the focus on your readers. Make sure this content reads naturally for human visitors – don’t overdo it by stuffing keywords into your text in the hope of getting high rankings, as most search engines will penalize your website for using this underhand tactic. Good content has relevant keywords in it, but a great one has the keywords while also providing real value to visitors.

3. Place call-to-action buttons
A business website should always have a call-to-action to convert visitors into customers. Make sure you add a call-to-action button to each of your most important pages, whether that means the About Us page, service pages, FAQs, or case studies. Call-to-action buttons may vary. They don’t always have to lead to a contact form; they can be links to other content, incentive offers, free downloads – the list goes on.

4. Create an internal link structure
After you have quality content, you must show the search engines that your site has a page hierarchy. The general rule of thumb is, all your articles should link back to the home page, service pages, and even other articles. Linking internally allows for easier navigation for your visitors, and there’s a good chance they will spend more time on your website, which is good for SEO purposes.

5. Install analytics tools
Tracking your visitors’ behavior on your website is important. Connect your website to analytics tools like Google Analytics and Google Webmaster Tools to gain valuable insight into your website’s statistics. By closely monitoring performance, you can eliminate keywords that aren’t generating you leads, and tweak content that visitors ignore.

SEO is an ongoing process that requires patience and time. These suggestions are meant to set a stronger foundation for your business to expand. If you’re looking for other ways to increase business value, get in touch with us today.

BusinessValue_June2_BThe Internet has transformed the way businesses approach clients. More and more people are using the Internet to search for what they want, and if your company’s website is ranked high in popular search engines then you can easily attract more visitors – which means more potential clients. But the question is, how can you get to that top spot in the search engines when there are a large number of competitors out there? The answer is simple – by integrating search engine optimization (SEO) into your website. Want to learn how? Here’s an overview of SEO and how to boost your online presence.

SEO defined

The practice of SEO has been around just about as long as search engines themselves. SEO is basically a methodology of techniques and tactics used to increase the number of visitors to a website by obtaining a high-ranking placement in search engine results. There are a lot of crackpot theories about SEO out there, and you’ll have to sift through them to find the techniques that really work for your business.

There’s a saying in the world of SEO that if you’re not first, you’re last. When it comes to SEO there’s no short cut, and the idea of getting your business website ranked on the first page of Google search results in one day is ludicrous. To make things clearer, we’ve compiled a list of the basic SEO practices business owners tend to overlook.

1. Research keywords
Keywords are key to your online presence. Add the right keywords to your website and your chances of being found are much higher. First, invest time in keyword research. Find out which keywords your customers are using in search engines, and gather all crucial data for SEO purposes, whether it’s search volume, trends, or competition. Make a list of keywords related to your niche. Don’t be tempted to only go after phrases with the highest search volume – they will be very hard to rank for and might be too broad.

2. Create quality content
Based on the researched keywords, generate high quality content with the focus on your readers. Make sure this content reads naturally for human visitors – don’t overdo it by stuffing keywords into your text in the hope of getting high rankings, as most search engines will penalize your website for using this underhand tactic. Good content has relevant keywords in it, but a great one has the keywords while also providing real value to visitors.

3. Place call-to-action buttons
A business website should always have a call-to-action to convert visitors into customers. Make sure you add a call-to-action button to each of your most important pages, whether that means the About Us page, service pages, FAQs, or case studies. Call-to-action buttons may vary. They don’t always have to lead to a contact form; they can be links to other content, incentive offers, free downloads – the list goes on.

4. Create an internal link structure
After you have quality content, you must show the search engines that your site has a page hierarchy. The general rule of thumb is, all your articles should link back to the home page, service pages, and even other articles. Linking internally allows for easier navigation for your visitors, and there’s a good chance they will spend more time on your website, which is good for SEO purposes.

5. Install analytics tools
Tracking your visitors’ behavior on your website is important. Connect your website to analytics tools like Google Analytics and Google Webmaster Tools to gain valuable insight into your website’s statistics. By closely monitoring performance, you can eliminate keywords that aren’t generating you leads, and tweak content that visitors ignore.

SEO is an ongoing process that requires patience and time. These suggestions are meant to set a stronger foundation for your business to expand. If you’re looking for other ways to increase business value, get in touch with us today.

BusinessValue_June2_ATechnology has completely changed the way we do business. Gone are the days when customers had to drop by your company to purchase your products and services. Now they can simply visit your website, see what you have to offer, and make an online payment – all in a matter of minutes. But if you want to expand your customer base, your website needs to rank high in search engines, so that it’s easy for potential customers to find you. That means implementing search engine optimization (SEO) strategies; here’s all you need to know about SEO to increase your online presence.

SEO defined

The practice of SEO has been around just about as long as search engines themselves. SEO is basically a methodology of techniques and tactics used to increase the number of visitors to a website by obtaining a high-ranking placement in search engine results. There are a lot of crackpot theories about SEO out there, and you’ll have to sift through them to find the techniques that really work for your business.

There’s a saying in the world of SEO that if you’re not first, you’re last. When it comes to SEO there’s no short cut, and the idea of getting your business website ranked on the first page of Google search results in one day is ludicrous. To make things clearer, we’ve compiled a list of the basic SEO practices business owners tend to overlook.

1. Research keywords
Keywords are key to your online presence. Add the right keywords to your website and your chances of being found are much higher. First, invest time in keyword research. Find out which keywords your customers are using in search engines, and gather all crucial data for SEO purposes, whether it’s search volume, trends, or competition. Make a list of keywords related to your niche. Don’t be tempted to only go after phrases with the highest search volume – they will be very hard to rank for and might be too broad.

2. Create quality content
Based on the researched keywords, generate high quality content with the focus on your readers. Make sure this content reads naturally for human visitors – don’t overdo it by stuffing keywords into your text in the hope of getting high rankings, as most search engines will penalize your website for using this underhand tactic. Good content has relevant keywords in it, but a great one has the keywords while also providing real value to visitors.

3. Place call-to-action buttons
A business website should always have a call-to-action to convert visitors into customers. Make sure you add a call-to-action button to each of your most important pages, whether that means the About Us page, service pages, FAQs, or case studies. Call-to-action buttons may vary. They don’t always have to lead to a contact form; they can be links to other content, incentive offers, free downloads – the list goes on.

4. Create an internal link structure
After you have quality content, you must show the search engines that your site has a page hierarchy. The general rule of thumb is, all your articles should link back to the home page, service pages, and even other articles. Linking internally allows for easier navigation for your visitors, and there’s a good chance they will spend more time on your website, which is good for SEO purposes.

5. Install analytics tools
Tracking your visitors’ behavior on your website is important. Connect your website to analytics tools like Google Analytics and Google Webmaster Tools to gain valuable insight into your website’s statistics. By closely monitoring performance, you can eliminate keywords that aren’t generating you leads, and tweak content that visitors ignore.

SEO is an ongoing process that requires patience and time. These suggestions are meant to set a stronger foundation for your business to expand. If you’re looking for other ways to increase business value, get in touch with us today.

Security_May27_CIf your business is lacking adequate security protection, the doors are wide open to an attack from outside. To make things worse, security threats are constantly evolving and developing, rendering them more difficult to keep up with. At least Google is on your side – its recent introduction of physical Security Keys for Drive for Work users means an extra layer of safeguarding for the cloud-based data files you rely on to power your organization.

Google already offers security precautions like two-step authentication, which provides additional protection by requiring you to enter not only your password but also a one-time code received by SMS or similar. This is a crucial weapon in the fight against hackers, since weak usernames and passwords are still be the primary reason for accounts being breached. Security Keys now take things one step further, strengthening your Google Drive account’s coat of armor to an even greater extent.

The Security Key is a physical USB device that is plugged into your computer, and which sends an encrypted signature, instead of a password or other code, to verify your identity and permit you access to your Google account. Crucially, Security Keys are inexpensive – starting from around $6 per unit – and require no additional software for deployment, use or management. Administrators have the ability to track when and where each key is used, as well as being able to disable them if lost and issue backup codes to allow staff uninterrupted access even if they do misplace their key.

Simplifying the login process is also a key part of what Google has tried to achieve with Security Keys. To that end, the first time you use your key to access your Google account on a particular computer, you can opt for Google to remember that device. On subsequent occasions you can quickly sign in using only your password, and without requiring either your key or a two-step authentication code. You can still sign in using your key on other machines, and if a hacker tries to access your account without your key they will also be prompted for a two-step verification code (which, unless they have access to your cell phone, they shouldn’t be able to provide).

Security Keys aren’t an entirely perfect solution, though – there are some significant limitations to the technology. For one, you can’t use them on mobile devices, since they require a USB port to work, and they only allow you to access your Google account through the Chrome browser. Windows, Mac OS, ChromeOS and Linux operating systems are all supported, but if you’re working from your phone or on a browser other than Chrome then you’ll need to continue using two-step authentication. Google says you can mix and match different methods of verification, opting to use Security Keys where they are supported and two-step verification otherwise (or if you don’t have your key with you).

What’s more, only Google Drive currently supports Security Keys – it’s not yet possible to use them with Google Apps, for example. But, while the technology is primarily targeted at Google Drive for Work users, it’s possible to link a single key to multiple accounts, meaning you can use it to access both your work and personal Google accounts. Some users have also queried how much of a safeguard the technology really provides in the absence of an additional PIN code or fingerprint authentication being required for activation, suggesting that a stolen Security Key could be used to access a computer that a user has previously asked Google to remember. But Security Keys do appear to offer at least some additional protection, which will be of comfort to businesses handling sensitive data.

Give us a call to find out how to employ Security Keys and other technology solutions to bolster your protection against network intrusion and data breaches.

Security_May27_AInformation security is on everyone’s mind – all too often we hear of a high-profile data breach in the news, and even the smaller scale attacks that don’t make headlines can wreak havoc on growing businesses. So it’s heartening to know that Google places a high premium on security. Their latest move to bolster protection for Google Drive for Work sees the introduction of physical Security Keys – here’s what you need to know.

Google already offers security precautions like two-step authentication, which provides additional protection by requiring you to enter not only your password but also a one-time code received by SMS or similar. This is a crucial weapon in the fight against hackers, since weak usernames and passwords are still be the primary reason for accounts being breached. Security Keys now take things one step further, strengthening your Google Drive account’s coat of armor to an even greater extent.

The Security Key is a physical USB device that is plugged into your computer, and which sends an encrypted signature, instead of a password or other code, to verify your identity and permit you access to your Google account. Crucially, Security Keys are inexpensive – starting from around $6 per unit – and require no additional software for deployment, use or management. Administrators have the ability to track when and where each key is used, as well as being able to disable them if lost and issue backup codes to allow staff uninterrupted access even if they do misplace their key.

Simplifying the login process is also a key part of what Google has tried to achieve with Security Keys. To that end, the first time you use your key to access your Google account on a particular computer, you can opt for Google to remember that device. On subsequent occasions you can quickly sign in using only your password, and without requiring either your key or a two-step authentication code. You can still sign in using your key on other machines, and if a hacker tries to access your account without your key they will also be prompted for a two-step verification code (which, unless they have access to your cell phone, they shouldn’t be able to provide).

Security Keys aren’t an entirely perfect solution, though – there are some significant limitations to the technology. For one, you can’t use them on mobile devices, since they require a USB port to work, and they only allow you to access your Google account through the Chrome browser. Windows, Mac OS, ChromeOS and Linux operating systems are all supported, but if you’re working from your phone or on a browser other than Chrome then you’ll need to continue using two-step authentication. Google says you can mix and match different methods of verification, opting to use Security Keys where they are supported and two-step verification otherwise (or if you don’t have your key with you).

What’s more, only Google Drive currently supports Security Keys – it’s not yet possible to use them with Google Apps, for example. But, while the technology is primarily targeted at Google Drive for Work users, it’s possible to link a single key to multiple accounts, meaning you can use it to access both your work and personal Google accounts. Some users have also queried how much of a safeguard the technology really provides in the absence of an additional PIN code or fingerprint authentication being required for activation, suggesting that a stolen Security Key could be used to access a computer that a user has previously asked Google to remember. But Security Keys do appear to offer at least some additional protection, which will be of comfort to businesses handling sensitive data.

Give us a call to find out how to employ Security Keys and other technology solutions to bolster your protection against network intrusion and data breaches.

Security_May27_BData breaches are all too common and, without adequate protection, every business is at risk of external attack. In fact, it’s never been more important to ensure your organization’s policies and procedures are foolproof, and that you have contingency plans in place should something go wrong. Google just made that easier for Drive for Work users, by adding physical Security Keys to its safeguarding toolbox. Here’s what you need to know.

Google already offers security precautions like two-step authentication, which provides additional protection by requiring you to enter not only your password but also a one-time code received by SMS or similar. This is a crucial weapon in the fight against hackers, since weak usernames and passwords are still be the primary reason for accounts being breached. Security Keys now take things one step further, strengthening your Google Drive account’s coat of armor to an even greater extent.

The Security Key is a physical USB device that is plugged into your computer, and which sends an encrypted signature, instead of a password or other code, to verify your identity and permit you access to your Google account. Crucially, Security Keys are inexpensive – starting from around $6 per unit – and require no additional software for deployment, use or management. Administrators have the ability to track when and where each key is used, as well as being able to disable them if lost and issue backup codes to allow staff uninterrupted access even if they do misplace their key.

Simplifying the login process is also a key part of what Google has tried to achieve with Security Keys. To that end, the first time you use your key to access your Google account on a particular computer, you can opt for Google to remember that device. On subsequent occasions you can quickly sign in using only your password, and without requiring either your key or a two-step authentication code. You can still sign in using your key on other machines, and if a hacker tries to access your account without your key they will also be prompted for a two-step verification code (which, unless they have access to your cell phone, they shouldn’t be able to provide).

Security Keys aren’t an entirely perfect solution, though – there are some significant limitations to the technology. For one, you can’t use them on mobile devices, since they require a USB port to work, and they only allow you to access your Google account through the Chrome browser. Windows, Mac OS, ChromeOS and Linux operating systems are all supported, but if you’re working from your phone or on a browser other than Chrome then you’ll need to continue using two-step authentication. Google says you can mix and match different methods of verification, opting to use Security Keys where they are supported and two-step verification otherwise (or if you don’t have your key with you).

What’s more, only Google Drive currently supports Security Keys – it’s not yet possible to use them with Google Apps, for example. But, while the technology is primarily targeted at Google Drive for Work users, it’s possible to link a single key to multiple accounts, meaning you can use it to access both your work and personal Google accounts. Some users have also queried how much of a safeguard the technology really provides in the absence of an additional PIN code or fingerprint authentication being required for activation, suggesting that a stolen Security Key could be used to access a computer that a user has previously asked Google to remember. But Security Keys do appear to offer at least some additional protection, which will be of comfort to businesses handling sensitive data.

Give us a call to find out how to employ Security Keys and other technology solutions to bolster your protection against network intrusion and data breaches.