About Chris Wanamaker

This author has not yet filled in any details.
So far Chris Wanamaker has created 341 blog entries.

6 Ways to save energy with your PC

It’s a dilemma: you want to save energy, but you need to use your PC every day. You can turn off your computer when it’s not in use, but a plugged-in PC or electrical appliance, even when switched off, still consumes standby power. If this is the case, how exactly can you save energy? Here are some tips.

1. Disconnect your external devices

Devices that connect to your PC such as printers, headphones, and webcams consume power, too. That’s why you should disconnect or remove these devices from your PC when you are not using them.

2. Use a smart strip, especially for computers you cannot turn off

A smart strip is a series of several electrical outlets in one strip, with circuits to monitor and maximize your gadgets’ power consumption. It can electronically unplug any device so that they stop drawing current, and you save energy. By connecting your PC and peripherals like printers and scanners to the smart strip, you don’t need to unplug your equipment when […]

6 Ways to save energy with your PC2019-11-22T12:37:39-07:00

Preventing theft of service in VoIP

VoIP phone systems use the internet just like any PC. Therefore, hackers can gain access to your servers and data network through VoIP phones. Understanding how to combat theft of service in VoIP is critical, so if you want to learn how to do it, read on.

What is theft of service?

Internet-based phone systems are far more vulnerable to fraud compared to traditional telephony services. VoIP calls face threats ranging from identity theft, eavesdropping, intentional disruption of service, and even financial loss. Theft of service, the most common type of VoIP fraud, includes stealing usernames, passwords, and account information. Hackers usually introduce malware into your system to crash it or steal user passwords.

From a legal standpoint, theft of service means obtaining service from an individual or a company without payment. It may involve deleting or changing invoicing records, unauthorized invoicing, or taking the property of a service provider.

Also, hackers may simply want to crash your system and will flood the network with packets of data so that callers […]

Preventing theft of service in VoIP2019-11-22T12:37:17-07:00

Use Google Tasks to your advantage

As a small- to medium-sized business owner or manager, you deal with a long list of things to do every day. Keeping track of your tasks can be a challenge — but not if you use Google Tasks. This app can help you keep on top of everything you need to get done. Here’s how.

What is Google Tasks?

Google Tasks is a to-do list application that’s linked to your Gmail account and Google Calendar. With Google Tasks, you can create to-do lists for the day, week, month, or year. You can also add notes to provide more detail to each task as well as set reminders so you never miss a deadline. All lists you create are stored in the cloud, ensuring that you can access them on any internet-connected device whenever, wherever.

How to use Google Tasks

On your PC, you can easily access Google Tasks through your Gmail inbox. When you open Gmail, you’ll see a sidebar on the right. Click on the blue icon with a white […]

Use Google Tasks to your advantage2019-11-22T12:37:02-07:00

Awesome cloud tools your office must consider

As the end of the year nears, it’s a good time to reevaluate your IT priorities. And if cloud technology isn’t one of them, that needs to change. There are at least six types of apps and platforms every business should have. Let’s take a look at each.

Email

Every business needs email. And while there are plenty of non-cloud options to choose from, they require a lot of maintenance. Opting for cloud-based email means you pay for the service without worrying about hardware requirements or software updates. These issues, among others, will be handled by the provider and backed by service level guarantees.

File storage

Storing company files in the cloud is a great way to give employees more mobility and flexibility. Everyone can access information from almost any internet-enabled device without compromising security, since providers include things like encryption and multifactor authentication as part of the monthly service fee.

You can opt for either DIY cloud storage such as Microsoft’s OneDrive and Dropbox or a slightly more expensive managed solution […]

Awesome cloud tools your office must consider2019-11-22T12:36:43-07:00

Benefits of CRM for businesses

At the end of the day, the success of any business comes down to whether it’s making a profit. That’s why building and maintaining relationships with your customers — your primary source of revenue — is extremely crucial. To respond to this need, savvy business owners are implementing customer relationship management (CRM) systems as a part of their business operations.

What is a CRM system?

CRM is a system that allows businesses to manage, record, and evaluate their customer interactions to provide better services and boost sales. You can use CRM to store customers’ contact details, accounts, leads, and sales opportunities all in one place.

What are the features of a CRM system?

  • Data management – When customer data is recorded, the CRM system centralizes the data into one file, called a master file. Everyone within the company then has access to this data source, preventing confusion from inaccurate or duplicated data.
  • Collaboration – Nowadays, clients demand quick and efficient customer service, so all involved departments must work together to […]
Benefits of CRM for businesses2019-11-22T12:36:17-07:00

Revitalize your slow Windows PC

Two of the first things you should do if your Windows desktop is running slow is to clean up the hard drive and free up some disk space. One of the best ways to do this is to use the Disk Cleanup tool. It’s a program for conveniently weeding out old files that are no longer needed but are likely hindering your hard disk from performing optimally. Disk Cleanup also has the innovative capability of determining which files can be removed safely from your hard disk.

How to operate the Disk Cleanup tool

Disk Cleanup can easily be accessed through the start menu or by searching Disk Cleanup. Once opened, this tool automatically selects Drive C (though you can switch to other drives) and shows a list of file locations containing files that can be removed. Next to each file location is information about how much space it is taking up in your hard disk.

Each file location has a corresponding checkbox that needs to be selected in order to delete […]

Revitalize your slow Windows PC2019-11-11T08:00:18-07:00

How to use Twitter to grow your business

Twitter is one of the most popular social media platforms for businesses because it enables them to focus on public conversation and exposure. Businesses use Twitter to engage their customers and update them on various business activities and news. Follow these tips on how to make the most out of Twitter for your business.

Build a profile that stands out

If you’re just starting out on Twitter, you want to make your Twitter handle relevant to your company. If your brand name is already used by somebody else, you can add a CTA or an attractive description at the beginning of your company name.

For example, your company name is “LuckyABC”, but another company has the same name and is already using it as their Twitter handle, all you need to do is get creative and pick a handle like “ChooseLuckyABC” or “GetLuckyABC”. Don’t forget to refine your description, website link, and location so that your followers will get an immediate idea of what your business is.

Build your Twitter followers

You […]

How to use Twitter to grow your business2019-11-22T12:35:12-07:00

5 Bad business security practices

Companies — small- and medium-sized businesses, in particular — struggle to protect their data. For one, they make mistakes in the strategies they employ to protect their IT infrastructure. If your organization still does one or more of these bad security practices, act quickly to correct them.

Open wireless networks

With one main internet line and a couple of wireless routers, a whole office can go online. A wireless internet connection saves money, but there is an inherent risk that it’s an unsecure network.

If you need a secure network, plugging in a wireless router and creating a basic network is not enough. If you don’t set a password on your routers, then anyone within range can connect. With fairly simple tools and a bit of know-how, hackers and criminals can start capturing data that goes in and out of the network, and even attacking the network and computers attached.

Therefore, you should take steps to ensure that all wireless networks in the office are secured with strong passwords. Many internet […]

5 Bad business security practices2019-11-07T13:07:33-07:00

Protect your Android device

Protecting your Android device doesn’t have to cost you a fortune. Why spend more for its protection when there are free ways to do it? Our guide will help you find ways to safeguard your phone or tablet without having to spend a lot.

Protecting your Android device from digital risks and theft should be a priority as most hackers continue to exploit Android’s vulnerability. However, you don’t need to purchase expensive software to safeguard your device. Most of the best protection against common Android threats is available for free.

Here are ways to secure your Android devices.

Buy devices from vendors who release Android patches quickly

Beware of handset makers who don’t immediately release Android updates. By delaying the patches, these vendors allow your device to be vulnerable for the time being.

Always keep your software updated

Google releases security patches fairly regularly, and most newer phones automatically inform you of updates. Update your device and apps as soon as security patches are released.

Make sure to lock your screen

You can lock and […]

Protect your Android device2019-11-07T13:07:20-07:00

Why more businesses should virtualize

Not too long ago, cloud apps and platforms were the answer to IT efficiency. Today, virtualization is the solution everyone is talking about. And as a business owner, you probably want to know if virtualization can improve your business’s processes.

What is virtualization?

Virtualization is the creation of a virtual version of a device or resource, anything from a server to an operating system. This allows you to turn one physical server into a group of virtual servers that all share the same resources.

How is it different from other systems?

If you’re paying a provider for access to virtual IT resources, you have instant access to nearly limitless computing resources. It also gets rid of haphazard IT rooms, cables, and bulky hardware, reducing your overall IT overhead and management costs.

While many people confuse virtualization with the cloud, it’s better to think of virtualization as one of the many tools that enables cloud technology to function. For example, if you wanted to simultaneously run Windows and Mac OS X on the same […]

Why more businesses should virtualize2019-11-05T08:00:31-07:00