Categories
Blog

9 Cybersecurity Terms You Need To Know

Every business should have a comprehensive cybersecurity plan and a competent team that can execute that plan. Otherwise, cybercriminals and malicious actors can and most likely will take advantage of security vulnerabilities to access company data and cause damage. But as important as it is to have skilled IT professionals looking out for your business, it is equally important to educate yourself in the basics of cybersecurity so that you can avoid compromising your valuable information accidentally.

The following list of cybersecurity terms is one that every business owner, manager, executive and other professional should be aware of. The more you understand the basics of cybersecurity, the better equipped you will be to protect your valuable business data and personal information moving forward.

Cybersecurity Tips

9 Cybersecurity Terms Every Business Professional Should Know

1. Malware

From the time the average family had a personal computer in the house, most people had heard of computer viruses. Today, it is still common for many people to think of all types of attacks to computer systems and networks as viruses. In truth, a virus is only one type of attack that you need to be aware of. There are many other types of attacks, which along with viruses, fall under the umbrella of malware. Anything that is made to access your network or data—or cause damage to your network or data—is referred to as malware.

2. Phishing

Like the common term it comes from, phishing can be thought of as throwing out attractive bait in hopes that someone will bite and give up their valuable information. Phishing involves making a website or application that looks just like a site or app that people trust. You might get an email from Google or the IRS that looks legitimate. It could claim that the company needs you to update your information or your password and then take that info and give it to a cybercriminal.

3. Antivirus

An antivirus program is just like it sounds—a program for fighting computer viruses. What it is not is a program that will handle all of your cybersecurity needs. It will search for common viruses and eliminate those viruses, but it will not necessarily protect against other types of malware. Your antivirus can only scan the drives it has access to, and can only identify viruses that have already been identified by the company that makes the program.

4. Social Engineering

Social engineering refers to deceiving people instead of computers. While creating malware requires focusing on technical aspects, social engineering focuses on ways to manipulate people into doing what you want them to do. The scams where people ask you to cash checks on their behalf and send them the money because they are out of the country are an example of social engineering.

5. Ransomware

A common type of malware being put out by cybercriminals is known as ransomware. Ransomware takes some of your sensitive data and encrypts it so you cannot access it. The cybercriminal then demands a ransom for you to get access to your data. All of the cybersecurity terms you see that end with ware are types of malware.

6. Zero-Day Attacks

One of the biggest weaknesses of antivirus programs or other anti-malware programs is that they can only detect and protect against malware that has already been identified. Cybersecurity experts are constantly on the lookout for new malware, but they are not able to catch every piece of malware before it compromises systems and networks. There are always holes in the protective layers offered by cybersecurity teams. When a piece of malware compromises a hole, or vulnerability, in standardized security layers, it is known as a zero-day attack.

7. Redundant Data

While cybersecurity experts and your IT team are always striving to protect your system and network from attacks, sometimes your data can still become compromised—like with a zero-day attack. The reality of cybersecurity is that there is always the possibility of compromise, which is why backing up your data is a necessity. Not only does backing up your data protect against cybersecurity threats, but it also protects against equipment failures.

A quality backup will be quarantined in a facility that is not in the same location as your business.

8. Patch

A patch is what software developers send out when they discover a gap in the security of their programs. You should download available patches regularly to ensure optimal protection.

9. Intrusion Protection System (IPS)

An IPS is placed between your firewall and your system to identify intrusions and stop them before they cause damage.

For more information about cybersecurity for your business, please contact our team.

Categories
Blog

4 Things to Consider When Hiring a Dallas IT Services Company

Dallas IT Services Company

When your business technology isn’t working properly, it can have an impact throughout your organization — and beyond. Your customers, your suppliers and your staff can all be negatively impacted by problems with your infrastructure. Having access to a team of talented technical experts can mean the difference between reduced productivity and falling sales and a business with a bright outlook in the future. From understanding best practices for implementing office productivity software to providing a proactive method for communication and collaboration, how you go about creating a solid IT infrastructure is a crucial decision for your business. Here are four key considerations when you’re hiring a Dallas IT services company.

1. Communication Should be Clear and Open

If you’re not a technical guru, it can sometimes be difficult to understand your IT team. Even the simplest questions can become complex if someone is speaking over your head, and that’s the last thing that you need from your IT services company! Providing your employees with the help desk support that they need should be easy, with communications that make sense and quick responses to your questions. Complex tech jargon not only creates confusion internally, but it can result in miscommunication between teams when you’re discussing deliverables and timelines. Stress with potential partners that clear and open communication is a priority for your team.

2. Support for Your Key Business Software

While Microsoft Office is the premier business productivity software on the market today, business professionals and IT teams alike still have technical problems with the suite. Your IT-managed services partner should have a firm grasp of the platform and the challenges associated with implementing and scaling this solution. Licensing is another concern, as you need to know that your technology partner has access to obtain the licenses that you need for your organization. You may find that working with a Microsoft Certified Partner is the best option to ensure that your business productivity software needs are being adequately met.

3. Find a Great Cultural Fit

Is your business pretty easy-going, or are you more of a “business casual on Fridays only” type of shop? There are no right or wrong answers, but it’s vital that work with organizations that understand the way you desire to do business. Perhaps your teams would rather speak to someone on the phone than use chat to report a problem — you need to know that this will work with your managed services provider, too. Even the style of communication from formal to informal is a consideration when you’re finding the ideal partner to understand your team.

4. Support When, Where, and How You Need It

Is your potential support company accessible when you need them? Desktop support for your business is not an 8-5 job, as staff members work a range of hours from a variety of different locations. Your technical support team must be able to remotely access your computers securely while helping walk staff members through any questions in a positive way. Determine whether you want or need an IT services team to be able to come onsite, and how often that type of service might be requested. It’s important to ask about onsite support upfront, as that can be an important request in the future and you don’t want any surprises.

The right IT services partner will be a true extension of your business team, looking out for your best interests and those of your staff members. They will never talk down to your team and have a high degree of patience with staff members who may need a little extra coaching. Finally, you need to ensure that the response time for your requests is fully defined before you finalize your contract. At Data Magic, we believe that IT support should be seamless and work just like magic. If you are ready to get started with the proactive support that your teams deserve, contact us today at 469-635-5500 or fill out our quick online form for your free initial consultation.

Categories
Blog

How To Remove Microsoft Office Metadata?

Microsoft Office Metadata

This article covers the definition of metadata and how to view, manage and delete it in Microsoft applications.

What is Metadata?

Metadata is information about your data. It contains facts that can’t be disputed, the same way data does.

Here is an example from Microsoft Word. Let’s say you’re writing a letter to a co-worker. The letter consists of characters that form words and sentences. To the computer, this is translated as a series of ones and zeroes that make up the data associated with your letter. Other information about the letter includes when it was typed, who wrote it, when it was saved, and what version of Word you used. These facts are metadata.

How Can You View Office Metadata in the File?

You can view the metadata associated with your Excel, Word and PowerPoint files. (Metadata for Outlook email is more complicated and isn’t covered here.)

  1. Open the workbook, document or presentation you wish to check.
  2. Click on the File menu in the top-left of the screen.
  3. On the Info screen, you’ll see the Pages, Size, Total Editing Time, Words, Created, Last Modified, and Related People options.
  4. At the bottom of the list, click Show All Properties for more information.

NOTE: Look at the Template data. Keep in mind that a template with your name or company name can be used to trace the file back to you.

How Can You View Office Metadata in Windows Explorer?

You don’t have to open the file to view the metadata. Here’s how to view it in Windows Explorer:

  1. Open Windows Explorer and go to your saved file.
  2. Right-click on for filename or icon and click Properties.
  3. Click on the Details tab of the Properties window. The metadata appears in a list.

What’s the Best Way to View Metadata for All Your Microsoft Files?

You can use Extensible Markup Language (XML) to view the metadata for all your presentations, documents and workbooks. XML is used to store metadata in computing, including Microsoft Office files.

Let’s use a Word document as an example of how to use XML to view metadata:

  1. In Windows Explorer, go to your saved file.
  2. Make a copy to protect the original file.
  3. Select the copied and either click the F2 button or right-click to select Rename.
  4. Change the file extension to .zip. (NOTE: Each Office filetype ending in x contains compressed XML documents.) Click Yes on the warning that appears.
  5. Right-click the file to choose Extract All…
  6. You will be asked where to save the extracted files and whether to show them when finished. Leave the default values and click Extract.
  7. The extraction produces three folders as well as an XML file. You can examine the files to view the stored information. When you double-click an XML file, it usually opens in Internet Explorer.
  8. You should be able to piece together what the information means. These XML files may include your name: core.xml under the docProps folder, and document.xml and people.xml in the word folder.

How Can You Delete Metadata from Microsoft Files?

Here are the steps to follow to delete your information from these files in Excel, Word or PowerPoint:

  1. Click on the File menu in the top-left corner.
  2. On the Info page, select Check for Issues near the middle of the page.
  3. Select Inspect Document and the Document Inspector opens.
  4. Ensure that all the Document Inspector checkboxes are checked, then select the Inspect button.
  5. Once the Document Inspector finishes, you can see the information it found. If you see a green checkmark in a circle, it found no data for that category. A red exclamation mark indicates it found data of that type.
  6. There’s a Remove All button next to the data type’s description. Click it to remove all data of a certain type. Scroll down to ensure you clear all the desired data.
  7. To double-check, click the Reinspect button to see if you missed anything.
  8. Save your document so that the data isn’t re-entered.

What are the Steps to Ensure the Metadata was Deleted?

First, repeat the steps under “How Can You View Office Metadata in the File?” When you inspect the document.xml, people.xml and core.xml files, there shouldn’t be any personal data. Change the extension from .zip to .docx, to open the file in Word.

How Can You Delete Metadata using Windows Explorer?

This method strips metadata from several files at the same time.

  1. Open Windows Explorer and go to the file with the metadata you want to take out. Right-click it to select Properties.
  2. Under Properties, click the Details tab then select both Remove Properties and Personal Information.
  3. There are two ways to remove information. Remove the metadata from the original file or a copy.

How Do I Remove Metadata from Original File?

  1. Select Remove the following properties from this file:
  2. Check the boxes you want to remove or choose Select All button.
  3. Click OK.

Can You Make a Copy with No Metadata?

This makes a copy of your file with the “Copy” appended to the filename. This copy will have no associated metadata.

  1. Under the Remove Properties window, click Create a copy with all possible properties removed
  2. Click OK.
  3. Compare the properties of the original and copy to view the changes.

Are You in the Clear Now?

What you do next with the document determines whether your metadata stays gone. Digital processing, such as emailing it, may add metadata. The best option is to print and mail the document to avoid add metadata that could be traced back to you.

Categories
Blog

Not Getting the Networking Results You Want?

Networking Results: Why Dallas Organizations Need Reliable IT Services and IT Support

Problems with your networking may not show up right away, but they can certainly make themselves known over time. Dallas businesses today need networking results and uptime guarantees from their IT service company.

Data Magic Computer Services Guarantees Networking Results

Computers and servers that crash on a regular basis, internet connections that are running too slowly and holes in your network security are insidious issues that can plague your business for years if they are not quickly resolved. This type of situation can feel like whack-a-mole, where you resolve one problem and another keeps cropping up soon after — because you’re not solving the root problem, you’re only remediating a side effect of the core issue. It’s vital that you work with an IT managed services provider who understands local businesses and who is willing to put in the time and attention to assure that your networking is done right the first time.

Causes of Poor Network Performance

There are a variety of factors that can contribute to poor network performance, such as malware or imperfect design and engineering. These preventable issues can happen with technology partners that are overly aggressive in putting in platforms or infrastructure before taking the time to learn about the needs of the business. Something as simple as the way computers are configured can cause an exceptional strain on smaller businesses, one that can be difficult to rectify without rebuilding a significant portion of your business networking. Today’s fast-moving bits and bytes need a powerful cabling network to funnel enough network power and computing capability to individual workstations. Fine-tuning your network is as much an art as a science and requires a team with an extensive understanding of business needs as well as technology chops to properly implement the solution.

Boost Productivity with Exceptional Networking

Conversely, exceptional networking strategies can be implemented in such a way that the technology disappears into the background for your business users. When staff members are able to simply use the tools at their disposal, they are more satisfied with their jobs as well as being more productive on a daily basis. Hiring and training new staff members is a major expense for any organization, making it an urgent requirement to do everything possible to retain top talent. You don’t want to risk losing your best employees due to frustration caused by technical glitches that affect staff and customers alike.

Enhancing Your Multi-Channel Customer Experience

Your customers interact with your brand in a variety of ways: on the internet, in person, via SMS text message, email and on the phone. Understanding how all of these pieces of the customer puzzle work together is most effective when your customers and your staff members have a holistic view of the customer. Without adequate network connectivity, it’s impossible to have seamless communication that today’s customers demand. With the wealth of competitors on the market, you have to take every means at your disposal to create a unique and memorable customer experience. Not only should your customers appreciate that they are able to complete transactions across any available platform, but they will also tell their friends and neighbors how much they enjoyed doing business with you.

The Power of Local Connections

If you are not getting the network results that you expect from your internal IT team or your current technology partners, it may be time to review your network infrastructure with a more proactive partner. At DataMagic, we believe in technology support for Dallas business that works like magic. IT managed services shouldn’t simply be an on-call specialist to solve current problems, but should also make recommendations on how to resolve long-term issues or optimize productivity throughout the business. We utilize top-tier monitoring technology to ensure that we spot slowdowns as quickly as possible so remediation can begin immediately.

Want to see the difference that having a fully-engaged, local IT services partner means for your business? Contact the professionals at DataMagic today at 469-635-5500 or request a free initial consultation online today. We provide Apple support, computer repair, managed services, IT consulting and more for local businesses and take pride in our service levels for all customers.

Categories
Blog

Cyber Security Advice: 6 Crucial Strategies

Computer Security Tips

Cyber security is more important than ever before. The news is full of stories of leaks and breaches large and small. Some of these result from sophisticated, targeted hacks, and others occur thanks to enterprising hackers taking advantage of security holes in insecure or out-of-date software.

At the end of the day, though, just about every organization has the same weak link: its employees. The finest security tools are no match for bad (or just naïve) behavior from your employees. With that in mind, today we’ll review 6 strategies and tips crucial to improving your employees’ cyber security behavior.

1. Use Long, Complex Passwords

People tend to be lazy. It’s a part of human nature. If your IT policies allow people to set their passwords to “password” or “12345”, you can be assured some of your employees will do just that. Short, simple, easy-to-guess passwords are a security threat to your business. Not only can passwords like these be easily guessed by a human, they take next to no time to be brute forced by hacking tools.

Encourage (or, better, require) your employees to use long, complex passwords. A phrase that’s memorable to the employee is a good start. Add in some complex characters (symbols, mix of capital and lowercase) to increase the complexity further.

2. Understand That Everyone Can Be Targeted

Don’t think of cyber crimes in the same way people used to think about military conflict: as something that occurs between large entities with high-powered offensive and defensive capabilities. Yes, it’s the Targets and Experians of the world that make the national news when they are breached, but those high-profile cases are the exception, not the rule.

Smaller hackers aren’t going after hard targets, like governments or Wall Street. They’re going after soft targets: small and medium businesses that think they “can’t afford” good cyber security. In other words, they’re going after you.

3. Don’t Go Swimming and You Won’t Get Phished

One of the best tools hackers use is phishing. Phishing starts with your employees receiving a fake email. It could look like a legit business message or like a message from a vendor or service that you’re already using (like Microsoft Office 365). In other cases it looks interesting, tantalizing, or even salacious. These emails will contain a link or an attachment and will encourage users to click the link and log in or to open the attachment.

But the links and attachments aren’t what they appear to be. Once users do those actions, their credentials or devices are compromised.

Our best advice here is don’t go swimming so you won’t get phished. Don’t click on suspicious links, no matter how interesting they look. Don’t open attachments from unfamiliar accounts. If the email looks to be from a legit service (like Office 365), navigate to that service manually instead of by clicking the link. Lastly, if you’re not sure about an email, check with your IT group before continuing.

Computer Network Security

4. Consider the Security of the Network You’re Using

One of the advantages of cloud services is the ability to access many work systems from anywhere. As more and more firms move to cloud software and cloud services, those firms’ users need to stay up to date on security best practices. Employees dealing with sensitive company information or accessing customer data should only do so on secure networks. Public computers, free Wi-Fi at the corner café, and your cousin’s open Wi-Fi network are all examples of insecure network environments. Save the sensitive stuff for a more secure environment like the office.

5. Be Physically Aware

Many cyber attacks are perpetrated through actual, physical access to systems. Employees can be shockingly careless with company tech. If you walk away from your computer, phone, or tablet — even just for a second — lock the device. This is true even in your own cubicle or office. You never know when a disgruntled coworker might attempt to compromise something while posing as you.

Also, make sure employees understand that devices can be compromised by anything that’s plugged into them. Computers can be compromised by plugging in a flash drive or SD card that’s infected with malware. Be sure you trust the source of any external device that’s coming into your company.

6. Beware Social Engineering

Employees also need to watch out for social engineering schemes. These are similar to phishing schemes, but instead of stealing credentials using a fake form or website, thieves convince employees to hand credentials over outright. Don’t be afraid to hang up on (or stop emailing with) someone claiming to be from an important vendor (we’ll use Microsoft again). If anyone is asking an employee to supply credentials or to take actions on your computer or network, that’s a huge red flag. Legitimate vendor contacts likely wouldn’t need the employee to do this for them. Employees can call back directly using a number they know is legitimate. If the concern is real, the real support team will know about it.

Conclusion

These 6 strategies will help your employees resist cyber intrusions, but there is so much more for your team to know. For more comprehensive help with your cyber security strategy, contact us today.

Categories
Blog

What Is Technology Competence

According to the LawSites blog, as of this writing, there are 36 states that have adopted the ABA’s updated Model Rule 1.1, which states that lawyers should maintain technology competence. The rule is purposefully vague to allow for the constant changes in technology that the legal industry is encountering. Unfortunately, the vagueness can create some anxiety for lawyers who want to meet the requirements of the rule. What does the ABA mean by “technology competence”, and how can lawyers achieve competence?

Lawyers discussing Technology Compentence

To better understand the expectations of the ABA and the states embracing its rules, it is necessary to take a closer look at how technology has impacted legal representation and ways that it can improve a lawyer’s practice.

Your main goal as a lawyer has always been to represent your client to the best of your ability. It was once enough to be knowledgeable in your legal area to ensure competent representation, but skilled representation today also means being able to use technology to improve efficiency, security and ideally the results you get for clients.

Technology Competence—The Basics

Update to ABA Model Rule 1.1

To get a grasp on what technology competence means for you and your practice, it is helpful to read the updated ABA rules:

Maintaining Competence

To maintain the requisite knowledge and skill, a lawyer should keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology, engage in continuing study and education and comply with all continuing legal education requirements to which the lawyer is subject.

As you can see, the rule is not terribly specific about what it means to be competent in technology for a lawyer. It states that you should, “…keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology…” However, if you consider what the relevant technologies are in law—and their benefits and risks—you can get a clearer idea of how to approach tech in your own practice.

Relevant Technology in Law

There are some technologies that are quite relevant to the practice of law and are being used by lawyers across the country and the globe. These include:

Electronic Discovery

Discovery has always been the backbone of case building, but electronic tools have increased the power and efficiency of the discovery process in numerous ways. These tools allow for more comprehensive preservation of information, more thorough review of information and faster production of information. Failing to leverage electronic tools in the discovery process is doing clients a disservice.

Law Firm Technology Competence in USA

Internet Investigations

You do not have to be a professional internet investigator to get a lot of benefit out of internet searches. Just being able to do simple internet searches for information can make the investigation process faster and more thorough than it otherwise would be. There are also numerous tools available online for conducting investigations.

Cyber Security

Considering that most of the information you obtain for clients and from clients will be digital, it is incredibly important that you take basic cyber security measures to protect that information. From hackers looking to blackmail victims to government agencies reviewing every bit of information they can get their hands on, there is a multitude of actors who can target your data and compromise your practice.

Understanding the Technology Used by Clients

The clients you represent are using technology in a myriad of ways. You need to have a basic understanding—or possibly a much more in-depth understanding—of what tech they are using and how they use it. That means educating yourself not only on legal tech but also on any tech pertinent to your clients and their legal needs.

Courtroom Technology

There are a variety of tech tools that can make you more effective in the courtroom. They can help you better organize, present and explain information to your audience. Every little advantage you can get can make a difference when presenting your case.

Legal Technologies that Make Business Easier and More Efficient

Many legal technology tools are fairly mundane, but that does not make them any less useful. You can leverage them to provide your legal services with less work on your end. File sharing, automated document assembly and electronic court scheduling are all useful.

Using Technology to Better Serve Your Clients

Your ability to serve your clients is improved in many different ways through technology competence. While it may take time and effort to improve your competency, the benefits of doing so can be significant for both your clients and your practice.

To learn more about legal technologies that might benefit your firm, please contact our managed IT services team.

Categories
Blog

Tech Competence and Attorneys: New Changes You Need To Know About

If you are a lawyer or if you are hiring a lawyer, technology competence, often shortened to tech competence, is a term that you should be aware of. Recently, changes have been recommended in regard to tech competence and attorneys. Here is everything that you need to know about this topic.

Law Firm IT Support

What is Tech Competence?

Lawyers have always had a duty to be competent in the areas of law they practice. However, in 2012, the American Bar Association made a change to the Model Rules of Professional Conduct. The change being made was to make it clear that attorneys need to take steps to be competent in regard to technology. This change stated the lawyers need to stay competent in regard to the benefits and risks associated with technology that is relevant to their firm and line of work. Each state was free to adopt or reject this change, and to date, 36 states have adopted this change.

What New Changes Have Been Recommended in Regard to Tech Competence?

A committee met and issued a report in February of 2019 that recommended revisions be made to the current Rules of Professional Conduct in regard to technology. The changes that the committee recommended making were designed to make it clear that it is an attorney’s job and legal responsibility to ensure that they are competently representing their client. The changes that are being recommended to ensure that law firms and lawyers understand that this duty reaches into the technology that they use. The committee wanted to make it clear that it is a lawyer’s duty to ensure that client information is confidential, and as such, they are responsible for protecting against unauthorized access. Unauthorized access can occur if a database gets hacked or emails are intercepted.

The committee designed with making changes issued its report in February of 2019. The public was given the opportunity to comment and provide feedback through April 19, 2019. Currently, the recommendation is being reviewed by the D.C. Bar Board of Governors. Ultimately, they will decide if the recommendations should be passed on to the District of Columbia Court of Appeals, who ultimately sets the rules of practice within the District of Columbia.

IT Services Law Firms

How Can Your Law Firm Ensure You Are Meeting the New Guidelines?

While the changes in regard to tech competence and lawyers have not yet been approved, it is expected that it will be. It is also expected that many of the 36 states who adopted the tech competence changes will follow the District of Columbia’s lead and adopted these rules. As such, you may find yourself wondering what this means for you as a law firm, lawyer or individual or business looking to hire a law firm. If you are a lawyer or law firm, you need to ensure that you are taking steps to protect any personal client information. You need to ensure your website is secure, that you are sending all confidential emails in an encrypted manner, and take steps to ensure your cloud is secure. As a client, you want to ask law firms what steps they have taken to ensure the technology they use is secure.

As technology advances, new changes will likely be made to tech competence and the way it impacts attorneys and law firms. Being proactive and ensuring the technology you use is secure is the best way to meet your requirements under the new guidelines.

Categories
Blog

How to Make Calls with Amazon Alexa

 

Did you know you can use just about any Amazon Echo device to make phone calls for free? You can do the same in the Alexa app on iOS or Android, whether or not you have an Echo device. You can also call others in your contacts on their Echo devices instead of their phones. These services can be convenient, and they are real money savers for people paying per minute for their cell or landline phone. In today’s tech tip we’ll show you how to make calls with Amazon Alexa.

Step 1: Open the Alexa App on Your Phone

Making phone calls using Alexa is an opt-in service, meaning you’ll need to enable it and set it up before it will work. Open the Amazon Alexa app on your phone, and tap on the menu bars (likely in the upper left). Choose “Things to Try”. On that page, choose “Calling”. This area reveals several videos and explainers on how to get calling with Alexa set up.

Alternatively, you can simply ask your Echo device, “Alexa, how do I set up calling?” for verbal instructions. Those are nice, but you’ll end up needing to work in the app anyways. For that reason, we think it’s easiest to start in the app.

Step 2: Give Alexa Access to Your Contacts

In the Amazon Alexa app, open the Communicate tab by tapping on the Communicate button in the bottom row. If you’ve not done this before, the app will ask for access to your contacts. Tap OK to grant access.

If you want to use the Alexa app to make calls directly from your phone, you can do it from this screen. Simply select the contact you want to call, choose the right number (cell, work, or home), and the call should begin.

Step 3: Talk to Your Echo Device

If what you really want to do is make calls using your Echo device, you should be able to do so after following steps 1 and 2. You have to know the right lingo, however. You can start with a simple phrase like “Alexa, make a call.” Your Echo device will respond with a question of its own, asking who you want to talk to.

Some of your contacts can be reached multiple ways, so you’ll need to be specific with Alexa. Alexa should understand commands like “Call mom’s cell phone” or “call Shawna at work.” You can also call numbers not in your contacts list with “Alexa, call (555) 356-4321.”

To call another Echo device, simply say “Alexa, call Leslie’s Echo.” If Leslie has calling enabled on her echo, you’ll get patched right through.

If you want to explore phrases in more detail, look back at the “Things to Try” area in the app.

Note: Alexa Can’t Do Everything

One thing to note before diving into the world of phone calls with Alexa: Alexa and her associated devices do have some limitations. There are a few types of phone calls that Alexa can’t make. First, and most importantly, Alexa can’t call 911 or other emergency service numbers. These services need to know where you are, and even though you might think Alexa knows that, the functionality isn’t foolproof enough to support emergency calls.

Alexa also can’t (or won’t) call those pricey 1-900 numbers. (Yes, that’s still a thing.) Similarly, directory assistance and information lines of the 211, 411, or “star-88 on any cell phone” variety aren’t compatible with Alexa’s calling technology. For now, Alexa also won’t call internationally, nor will it respond to “call 1-800 CONTACTS” or other letter-to-number prompts.

Conclusion

Making phone calls through Amazon Alexa is a great way to save if you’re still counting minutes on your landline or cell phone plan. Follow the steps above to enable the feature and give it a try today.

Calling With Alexa

Categories
Blog Mailchimp

Start With Data Security

A huge component of IT security revolves around your data. Where it’s stored, how much of it you hold on to, where it’s gathered from, and how it’s protected are all things you need to think about when evaluating your IT security as a whole.

Check out this week’s Tech Tip for part one of our look at what goes into keeping your business IT secure.

If you have questions, give me a call at (469) 635-5500 or email me at datamagic@datamagicinc.com.

Regards,

Chase

Categories
Blog

The CEO/CIO Relationship: A Vital Tie

In its look at the top 10 strategic technology trends for 2019, Gartner notes that businesses need to address an astounding number of technologies that will change the way companies run, their business models and their internal processes.

CEO/CIO Vital Tie

From the rise of artificial intelligence and autonomous objects to augmented analytics programs and immersive technologies, companies must consider what technologies they, their customers and their competitors expect and adopt.

Today, that means that c-suite leaders need to reconsider the roles of and the relationships between the CEO and CIO.

What Are the Traditional Relationships Between CEOs and CIOs?

Consider the paths to leadership for both roles. CEOs today, especially in non-tech companies, typically rise due to their acumen on the business side of a company. They demonstrate leadership and mastery of product or service areas, delivering consistently impactful results (particularly in revenue). The CEO has a public-facing role and commands authority, shaping the marketing messages, interpreting financial results and assessing sales past and future.

The CIO has likely grown up on the technology side. At many businesses, the CIO’s role traditionally has been to “keep the lights on,” focusing on keeping networks operational, overseeing system installations, upgrades and maintenance, and keeping users, endpoints, websites and networks protected.

In many companies, the CIO has not even been a direct report to the CEO and their relationship has been relatively distant.

The different backgrounds and, in some cases, language used in the two roles has made it difficult for the two leaders to have productive relationships.

Today, that paradigm no longer makes sense.

What Is Different Today Regarding the CEO/CIO Relationship?

Digital transformation is at the heart of growth and progress. There are few if any industries that not being shaped, influenced and changed by the increasing reliance on digital technologies. That makes the role the CIO plays very different than it was just a few years ago.

The prevalence of technology as a key driver of business strategy, structure and outcomes means that IT can no longer be considered a cost center. It needs to be at the table when key decisions are made about a company’s future direction, investments, hiring, and prioritization.

“As CEOs increasingly turn their attention to digital innovation as a top priority, they are counting on CIOs to drive it,” noted a recent article. “The IT leaders they used to frown at in budget meetings are now considered strategic business partners.”

This shift can be unsettling, especially among other executives who have not stayed abreast of their technical skills and knowledge.

What Needs to Change in the CEO/CIO Relationship?

Communication is one of the most essential skills to develop in a new relationship. The CEO needs to understand the technologies, the scope, the potential impact and the risk of not moving forward with opportunities. CIOs also need to be fully conversant with the business’ priorities, goals, objectives and present state of technology adoption and use.

One important aspect of the changing relationship is inviting the CIO to the table. Recent versions of the annual Harvey Nash/KPMG survey show the evolution of role and influence has begun but is still not where it needs to be.

The 2017 survey notes that “the CIO has progressively become more influential.” The number of CIOs at the table has grown, from 38 percent reporting being a part of an executive committee in 2005 to 62 percent in 2017. Three-quarters reported attending board meetings in the past year to discuss IT strategy, digital transformation, technology investments and cybersecurity.

The 2018 edition notes that CIOs among companies considered digital leaders are likely to have more of a strategic role. The most effective are able to frame for the CEO the advantages of digital transformation around revenue growth.

“They work with the executive team to influence and guide the enterprise on the effective use of digital technologies,” the article notes. “They help create a vision on how to use digital to transform the enterprise and grow.”

The changes represent a shift in how the CEO and CIO relationships are changing. Access to board members, involvement in critical decisions and influence in the c-suite are all reflections of how CEOs perceive and value the CIO role.

However, there is still room for improvement. Even the CIOs among the top 25 percent of companies demonstrating digital leadership only rate 59 percent on a scale of strategic influence.

There are shared responsibilities in order to change to a high-impact CEO/CIO relationship. The CEO needs to lead by example, signaling the importance of digital transformation and the CIO’s lead role in achieving it. CIOs need to bring ideas to the table that relate to the business outcomes and opportunities available, not just “shiny new gadgets.”

What If My Business Is Too Small to Have a CIO?

Digital transformation is not just for enterprises. Small- and medium-sized businesses also need to leverage the technical opportunities to differentiate and grow. For many SMBs, that means turning to a “virtual CIO” relationship with a managed IT service provider that can deliver IT consulting, assessments, strategy, solutions and budgeting. Working closely with a CEO and other business leaders, the virtual CIO can provide the insights and vision necessary to leverage the changing digital landscape.

A powerful relationship between the CEO and the CIO, whether internal or through a managed services provider, is essential for transformation to be successful.

Skip to content