kinetik IT blog spot

Tech Buzz at its best

Email Best Practices

While the variety of social media outlets we use on a daily or weekly basis have changed how we communicate, email is still the method of choice in business. And it’s used a lot: according to the Radicati Group, email is still the predominant form of business communication, with over 100 billion business email messages sent and received each day in 2013.

For business, email is the primary way to communicate, and having a well‑formed email signature and maximizing its effectiveness is a boon to any type of business entity. When contacting clients via email, there are some best practices to construct an effective signature, keeping in mind the preferences of both the recipient and the email client.

Begin the email signature with an accepted signature delimiter: essentially two hyphens together, this element helps email clients recognize the separation of the body of the email from the proceeding signature lines. 

A good signature will include the individual’s name, company, position or title, and contact information. Lines of text in a signature are better kept to three lines, and 72 characters per line, which generally eliminates text wrapping to the next line. With so many ways to make contact, it’s best to choose one or two to use in the signature—having several options may feel overwhelming.

When using graphics, it's best to have an absolute URL graphic, meaning the graphic should be pulled from the server. For instance, the logo or any icons in a signature should be located on the company server, and then be linked in the signature using the actual URL to that.

It’s important to note that, for some email clients, more than one image for every 40 words can be flagged and end up in the spam or junk folder, so using an appropriate amount of images will ensure messages arrive in the client’s inbox intact.

Located in Phoenix/Scottsdale, Arizona, Kinetik IT is a full-service information technology and Internet services provider, offering a wide array of technology and internet strategy solutions, as well as sound advice.  To learn more about services and products, and to stay up to date with Kinetik IT, visit www.Kinetik-IT.com or follow Kinetik on Facebook, LinkedIn or Twitter.

Hacking Webcams

When whistleblower Edward Snowden released classified NSA documents in May 2013, the world suddenly became acutely aware of government surveillance of civilians—even of those who posed no threat to national security.

According to the Guardian, GCHQ (Government Communications Headquarters, the UK version of the NSA) “files dating between 2008 and 2010 explicitly state that a surveillance program code-named Optic Nerve collected still images of Yahoo webcam chats in bulk and saved them to agency databases, regardless of whether individual users were an intelligence target or not.” Disturbingly, many of these images, it is reported, are explicit in nature. And, of course, it’s not just the government: hackers have also figured out ways to spy via webcam.

Unlike many viruses, Mac webcams are just as vulnerable as those installed in PCs. Most laptops with built-in cameras come with an important privacy feature: a light that activates when the camera is in use, with seemingly no way to be deactivated. Information to the contrary has come to light, however. As quoted in the Washington Post, “Marcus Thomas, former assistant director of the FBI’s Operational Technology Division in Quantico, said in a recent story in The Washington Post that the FBI has been able to covertly activate a computer’s camera — without triggering the light that lets users know it is recording — for several years.”

Since the release of the Snowden documents and what’s come to light in their aftermath, we’ve learned much more about the extent to which monitoring occurs, and have become more vigilant about online and network security, as well as the processes our computers employ while in use. 

While technical fixes exist to remedy this situation, sometimes an easy, old-fashioned approach is the most effective: physically obstructing the webcam while not in use. This can be accomplished by simply placing a post-it note over the lens, though more creative options are readily available on Etsy, including puffy felt stickers, snap-on plastic covers, and, of course, hand-crocheted ghost cozies.

To learn more about services and products – including Computer Network Managed Services & Remote Monitoringvisit www.Kinetik-IT.com or follow Kinetik on Facebook, LinkedIn oTwitter.

The WHY of Creating Microsoft Access Solutions

At a time when so much information is stored in the cloud, and many companies  operate remotely, Microsoft Access may not be the first program to come to mind when thinking about database management. But in fact, Access is one of the most mature Microsoft products released in 1992. 

Microsoft Access is a powerful and useful information management tool which systematically stores information for reference, reporting, and analysis.  The way the data is organized allows for in-depth analysis, and management – far better than is possible with spreadsheet applications. More than just a list or table, a database is a formidable tool, allowing for relationships between tables and dictate which data is mandatory to be entered by the user and much more. This allows a user to easily retrieve, sort, analyze, and report data without compromise.

These points are moot, however, if a client doesn’t understand how a database can help them achieve their end results. When working with this type of client, start with the why.

If ten Access developers were asked what they do, the answer would, most likely, include several variations on this response: "I deliver custom business solutions for companies using Microsoft Access."

The above answer is correct – that’s technically what the developer does, and the how is by using Microsoft Access VBA. But what about the why? Why is it that they do what they do?

Data is the lifeblood that drives a company.Every company relies on accurate data to run their business. Without accurate data, there is no business. From orders, customers information,  to appointments, sales, inventory etc., it's all data and it's all vital in the operation of a business.

If data is the lifeblood of the business, a professional database development company can help by creating a solid database design and architecture which is the foundation of any database, ensuring integrity of the data. . Lack of data integrity has substantial consequences such as duplicate records, lost data, and orphaned records. Eventually lack of data integrity will affect your business operations. Access Developers are in a unique position to help business, from small to midsize using an amazing tool without parallel.

Thinking about the question again, a better answer would be something like this:

"Because data is one of a business’s most important assets, our passion is helping you protect and discover its power."

To learn more about services and products, and to stay up to date with Kinetik IT, visit www.Kinetik-IT.com or follow Kinetik on Facebook, LinkedIn or Twitter.

Security Tips for Business

To ensure online safety, users should start with the basics – whether it’s for business or personal use.  Namely, users should make sure the computer is clean from data compromising software such as spyware before completing any online transactions related to banking or personal information; users need to have a complex password; and, when online, users must verify websites are secure and sensitive information is encrypted by the provider.  For business-specific security, a few more considerations apply.

While tips for business security are similar to those for personal use, businesses need to view things from a more comprehensive enterprise-minded level.  For businesses, it’s imperative not only to have anti‑spyware and anti‑virus software installed, but also maintaining security updates and patches are installed in a timely fashion.  It’s also imperative for businesses to ensure that backups of data are performed on time.

It’s not enough just to back up data, either.  At Kinetik I.T., we recommend trying once a month to restore a file from a backup to verify it was done correctly, ensuring that data is accessible when needed.  “We have often seen it happen where a company, after doing years of backups, has never tried to restore a file. Then, when they lose data and try to restore it, it’s very disappointing to find that all the time and effort they’ve spent on backups has been for naught.  And restoring a file is a quick and simple task – and it can make all the difference,” said Kinetik I.T. president Josette van Stiphout. Businesses should make sure data is backed up correctly, and that the restore is successful.

Businesses can also have a network assessment performed, which, in addition to assessing security, includes ensuring that employees only have access to the appropriate information and files, that the Active Directory is set up correctly, and that external vulnerabilities are being identified and taken care of.

Feel like your company’s online security isn't what it should be? Talk to a member of the Kinetik I.T. Team today to see how we can help.

Kinetik IT: Delivering Quality and Fostering Relationships

Josette van Stiphout, President of Kinetik IT, fell in love with technology as a junior programmer in the late 80s; shortly thereafter, she founded the Phoenix-Scottsdale area company that would become Kinetik IT.  “We were one of the first Microsoft-Certified Partners in the valley,” she said of the company’s beginnings. “They called it Solution Providers then. Initially, we were named Mach 2 Systems and in 2000, it was time to change the company’s identity to reflect the mission and vision for the company. The dynamic shifts in the software, technology and e-commerce industry caused us to evaluate where we wanted to be in then years. We were seeing many exciting changes in our industry that helped businesses of all sizes become more successful through utilizing technology. We wanted a name that helped to convey that by putting people, ideas and technology into motion, we are supporting the future success of Arizona businesses.

A front-runner in Microsoft Windows software development, web design, web application development and IT services, Kinetik IT is now a full-service information-technology and internet services provider, offering a wide array of technology and web services. 

Kinetik IT has always made a goal of fostering productive business relationships, on both ends of the spectrum – seeking out employees who embody efficiency and passion for their work, and developing custom software and database systems and building long-term solutions for clients by uncovering and catering to their most important needs.

Kinetik IT designs custom software solutions – bridging the gap between marketing and technology – and developing desktop, web applications and mobile solutions to optimize organization and revolutionizing the way clients do business.

To learn more about services and products, and to stay up to date with Kinetik IT, visit www.Kinetik-IT.com or follow Kinetik on Facebook, LinkedIn or Twitter.

 

 

Never Give Up.

Search the internet for the phrase, “Never give up,” and you’ll come across several eponymous images.  Undoubtedly, the most well-known is that of the frog who, while cradled precariously in the craw of a bird about to eat him, is doing his best to wring the neck of his winged opponent.  Another image is that of a mouse wearing the tiniest helmet, perched in front of an ever-so-enticing cheese-loaded mousetrap.  In both instances, the underlying message is that hard work comes naturally when you’re passionate about what’s at stake.

Working in the information technology arena has never been smooth sailing, at least not for any extended period of time.  Since its inception, the industry has weathered its share of booms and busts, followed by more of the same. “I would say, our biggest accomplishment is that in 24 years we've been through the ups and downs of the technology bubble, 9/11, economic downturn,” says Josette van Stiphout, President of Kinetik I.T. “We've had several highs and several really lows and within that 24‑year period. Nonetheless, during the trying times, we did not choose the easy way out, resorting to lay-offs or salary decreases. Instead, we did whatever we had to do to keep our staff employed. We believe our staff is better off not having to worry about having a job or not. We want them to focus their energy positively, such as on exceeding our clients’ expectations.” Our business philosophies and loyalty to our employees are quite different than what is the norm for corporate America.

Working in such a volatile industry, the key to Kinetik I.T.’s 24-year longevity has been in the passion and commitment of our people to deliver high-quality custom desktop and web-based software systems and long-term I.T. solutions for our clients.  We do this by first uncovering, then catering to the client’s most important needs.  Because our employees embody both efficiency and passion for their work, bridging the gap between marketing and technology and revolutionizing the way our clients do business is more than just work to us – it’s our goal, our mission. And we’ll never give up.

To learn more about services and products, and to stay up to date with Kinetik IT, visit www.Kinetik-IT.com or follow Kinetik IT Phoenix on Facebook, LinkedIn or Twitter.