5-ways-byod-will-evolve-in-2016

5 Ways BYOD Will Evolve in 2016

In the technology realm, nothing stays at a standstill. Bring your own device (BYOD) was a hot trend for enterprises in 2015, and it’s certainly not dying down or going away this year.

In fact, a recent Tech Pro Research report found that 72% of organizations were allowing BYOD in the workplace or planning to do so in the near future. BYOD continues to thrive in workplaces all over the world, with the majority of companies allowing employees to bring in their personal devices to conduct business.

Wearable devices and the “Internet of Things” (IoT) are also being thrown into the mix, making the topic of mobility and security a bit more complicated. But there’s no doubt that BYOD will continue to make waves in 2016 and take on exciting new avenues. Here are five possible ways that this policy will evolve in the new year.

1. BYOD will go from being a work perk to more of a business requirement.

The days of you begging to bring in your smartphone and tablet into the office will be long gone. In fact, companies will start requesting or even requiring employees to hook up their personal devices to do company work. Tech research and advisory firm Gartner predicts half of employers from all over the world will require BYOD by the end of 2016.

More businesses of various sizes and industries are beginning to realize the many benefits of BYOD, such as remote working and greater flexibility. As more organizations start empowering their employees with mobility, the remote workforce will grow steadfastly. Also, smaller companies in their early stages will begin to experience real gains from BYOD.

2. The Internet of Things will dominate.

BYOD will no longer be confined to smartphones and tablets. The Internet of Things (IoT) – basically devices talking to devices – will continue to make strides in the mobile landscape. With the rising trend of wearables, personal sensors, and environmental monitors, innovative business leaders will figure out how to factor these into their company strategy.

3. Mobile device management will be needed.

As the complexity and scope of BYOD grows, the strategy and guidelines needed to manage mobile devices in the workplace will grow in accordance. Corporations will have to rely on experienced IT companies to plan out how they can handle the onset of BYOD and the influx of changes in the mobile market. IT departments will need to define mobile device guidelines and requirements for its uses and the best security policy for it.

4. Storage may be a growing problem.

This issue doesn’t necessarily concern storage limitations or costs, but rather where business-sensitive files end up. Do you ever recall a time when you saved a document locally only to later delete its contents entirely by accident, resulting in you being unable to find it?

Centralized cloud storage and synchronization allows you to seamlessly access and save documents across various devices, both personal and corporate-owned. But setting the proper storage up requires a lot of forethought and planning by both users and IT departments. Managing more devices means keeping track of more locations and more opportunity for confusion and chaos. Luckily, using predictable settings and controls and following a secure mobile management policy can help you maintain the information on your devices more easily.

5. Security will be more of a challenge.

Lack of security is one of the biggest reasons why companies are not on board with BYOD. And their concern is a valid one. Firms that allow BYOD practices will have to work harder than ever with their IT department or tech provider to contain and regulate it.

To put it simply, there are millions of devices out there that store and have access to sensitive corporate data. These precious devices can easily wind up in the hands of unauthorized individuals, leading to higher security risks. Although the benefits of BYOD have always resulted in a security tradeoff, this concern will only grow more prominent in 2016.

To learn more about keeping your workforce up-to-date with the latest technology, contact i.t.NOW for a free consultation!

Team members in front of the I.T. Now car

CRAM the Car Event Was a Success Thanks to You!

i.t.NOW wants to give a HUGE thanks to all of our clients and partners for their participation in the Cram the Car event!  We were able to cram the i.t.NOW car up to the roof with donations for the family support center as well as collect hundreds of dollars in cash donations from our generous donors.  We’re excited to have a part in supporting such a great cause, and hope to have the opportunity to continue to work with this organization in the future.  Thanks for helping to make this event such a big success!

Check out our photo gallery of the event and what each of you helped make possible by showing your support.

Apple’s New OS X Mavericks

It’s time to upgrade again. Macintosh has released their newest operating system: OS X Mavericks. A free download available since October 22nd of this year. It is less a new system and more an improvement on the old OS X systems. So if you are an Apple fan, there will still be all the features you love with some new ones added in and more power. Apple claims there are 200 new features. This new system should be more powerful and efficient while still enhancing user-friendly tools. A few handy apps have been added to the dock: icloud keychain, ibooks, and maps. Geared toward the ultimate convenience, the new OS X is user-friendly and handy on the go.

Power to the apps

The apps sync automatically like before through icloud, but now it saves everything you were working on between all devices down to the page you left off reading and the browser tabs you had open. The sync is automatic, saving you time and trouble. And since the new apps are native apps, they have added benefits including full-screen view, access offline, and they’re faster.

It looks like most of the work has gone into improving the speed of the OS X. When apps are pulled up but are hidden or not actively being used, they slow down with App Nap. Low level activities are grouped together to make split-second idle times for the CPU that don’t affect performance. And are you tired of videos and ads that play automatically in the margins when you open a window? Safari Power Saver stops them from draining your battery power by holding them on pause until you click play. And when you start to reach your memory’s max, memory from inactive apps will automatically be compressed to give you more playing space.

Working out the kinks

Judging from user comments on Apple’s website and some tech rumor sites, most users with the new system are happy with the upgrade. But as happy as many users are, there are a significant number of issues. The problems users have had with mail accounts, specifically email getting deleted or not sending in Gmail and Microsoft Outlook not syncing, have been looked at by Apple. They have an upgrade for mail, but there continue to be some issues. QuickLook which gives a quick preview of a document or file before you open it, is slow. And the video player QuickTime 10.3 converts many video files before it will play them resulting in slower playback or even lower video quality.

A complaint that always comes up about Apple products is the lack of customization options. When they make something new, they often get rid of the old. This most heavily applies to design and system behaviors. For example, the dock has a new look and there is no option to change the appearance to earlier versions. Folders opened in Finder open up in new tabs with no option to have them open in new windows as they once did. If you don’t like the idea your iCloud adapting to automatically syncing everything you do, you don’t really have a choice. Keep in mind that some problems are only an issue for some users.

Does your Mac qualify for an upgrade?

From the Apple website:

To install Mavericks, you need one of these Macs:

  • iMac (Mid-2007 or later)

  • MacBook (13-inch Aluminum, Late 2008), (13-inch, Early 2009 or later)

  • MacBook Pro (13-inch, Mid-2009 or later),

  • MacBook Pro (15-inch or 17-inch, Mid/Late 2007 or later)

  • MacBook Air (Late 2008 or later)

  • Mac mini (Early 2009 or later)

  • Mac Pro (Early 2008 or later)

  • Xserve (Early 2009)

Your Mac also needs:

  • OS X Mountain Lion, Lion, or Snow Leopard v10.6.8 already installed

  • 2 GB or more of memory

  • 8 GB or more of available space

 

References:

Apple.com: What’s new in OS X Mavericks

MacRumors: Mavericks

ArsTechnica.com: Five complaints Ars readers have about OS X Mavericks

Adware, Spyware, Malware and Viruses

Any computer owner has heard of all the many potential dangers that can crash your system. The words “malware,” “adware,” “spyware,” and “viruses” are used to describe the potential dangers that come from connecting your computer to the Internet. By understanding the differences between these malicious programs, you can better identify potential problems with your computer. Here’s a quick guide to help you know the distinctions between these individual threats.

Malware is defined as a software program that is intentionally designed to cause harm. Malware can infect a computer either through accidental installation by the user or by sneaking through other programs. Malware only describes programs that are deliberately designed to damage a computer’s hardware.

Adware is a type of malware that contains advertising that automatically displays without the user’s consent. Adware is usually connected to and downloaded with other programs. Adware often works together with Spyware, allowing it to target its adverting to your specific interests.

Spyware is another type of malware that is designed to spy on the computer user. Spyware is often used by hackers to collect keystrokes and other information, which allows them to steal passwords and other personal information. Spyware can also be used to record a user’s actions and browsing habits to help adware.

A virus is a program that is created with the intention to cause havoc with your computer. A virus infects your computer and can cause errors, crashes, and even destroy your hardware. Viruses tend to keep a low profile at first, allowing them to spread more completely through your computer before causing its full harm. A virus is unique due to the fact that it can grow and replicate itself. Viruses are dangerous as they can travel through an Internet connection, enabling them to travel from one computer to another. Viruses can also be transported through infected files and webpages.

Email Management 101

Email has become one of the leading methods of communication in the business world, used to manage projects, serve customers, secure new business, and correspond with fellow employees. You and your employees probably use email on a daily basis. The amount of information passing through your company’s email servers creates several different challenges and risks, making it essential to have a trustworthy email management to keep your computers and information safe and secure.

Companies should keep copies of all email correspondence for several years, in case they are required to provide them during litigation or investigation. However, most servers are not equipped to handle the vast amounts of emails held in inboxes, sent, and deleted folders. The mass quantities of emails held in the server can negatively impact its performance, leading to slow speeds or crashes.

Email management services work to take the pressure off your email server, increasing its performance and decreasing your risk of losing valuable information. Email management systems capture and copy all emails that are created and received by your employees. The system uses a classification scheme to assign proper controls and to manage content. It then creates an archive of every email correspondence, usually by creating a copy of the email and storing it in a separate location.

A good email management system gives you peace of mind that your email system will always be available, running at full speed, secure, and fully backed-up. Many will also help make your email available from any location through mobile applications or web access. The system makes sure that all email, calendars, and contact are available and in sync no matter where your employee is accessing them. Whatever the demands and uses of your email server, an email management system can help your business run efficiently and effectively.

The Importance of Computer Back Up

We’ve all been there. That moment when you have just finished a huge project and before you can hit save, your computer crashes. The frustration that hits when all that work and all those hours are lost is extreme and can often spawn the regret of “if only I had saved my work along the way.”

This regret is multiplied to the nth degree when you lose not just one file but all the information contained on your computer. In today’s society, when the average person keeps the vast majority of their personal information, photos, files, and documents on their computers, it is essential to back up your computer. While no one wants to believe that it could happen to them, the data and memory on your computer can be lost, deleted or damaged without any warning. Hard drives fail, power failures and spikes can damage your hardware, and viruses can erase or damage everything on your machine. Having your computer properly backed up can bring you the peace of mind that all your information is safe no matter what may happen.

It is not necessary to back up everything on your computer. The most important thing to do is go through the files and information that is most important to you. Most people do not realize the amount or importance of these files until they are lost. A few of the most common files to back up are:

  • Photos
  • Home Videos
  • Music purchased from the Internet
  • Important work and school projects
  • Important family documents
  • Software purchased from the Internet
  • Internet bookmark lists
  • Email contact list

There are many different programs, software and hardware available to back-up your computer. Most of them are quick and easy, leaving you with the confidence that you, and your computer, are prepared for anything that may happen. If you are not sure which program is right for you, contact i.t.NOW and we will be happy to help you set up the right back up program for your business.

Firewalls

Have you ever been on the Internet at work and run into a message declaring that you cannot access a site due to your firewall? What exactly is that firewall? And how is it ultimately helping you?

Firewalls, in a nutshell, are barriers designed to protect your computer from being accessed by other computers or systems that could cause your computer harm. Just as a physical firewall is built to keep fires from spreading from one area to another, a firewall helps prevent dangerous material from spreading from the Internet to your computer. A proper firewall allows your computer to access the vast amounts of good and helpful information available on the Internet while keeping it safe from any dangerous material embedded into websites or from any malicious hacker attack.

Your firewall is located at the gateway or junction point between your private network (your computer or your company’s network) and a public network (the Internet). Firewalls can be located on a secure host computer or installed through a software program. Firewalls are established with certain standards and criteria and are tasked with examining all traffic between the two networks to make sure that the material being transmitted meets those standards.

When the firewall senses that material does not meet its standards, it blocks that material from getting through. Depending on your firewall, you may receive a notice when your firewall has been activated and you may be given a choice in whether or not you want to proceed. Firewalls will also keep track of any attempts to access your private network from hostile or unauthorized users.

Firewalls are an important precaution for anyone who has a private network connected to a public one. Anyone who connects a computer to the Internet, whether through broadband or wireless, is vulnerable to malicious attacks and pranksters. Firewalls help protect your equipment, your network, your company, and your personal security.

News Release: Utah Kids

KARING FOR UTAH KIDS AND I.T.NOW HOST 10th ANNUAL SATURDAY WITH SANTA EVENT

KARING FOR UTAH KIDS AND I.T.NOW HOST 10th ANNUAL SATURDAY WITH SANTA EVENT

Event to raise funds for children and families in need

Cottonwood Heights–Karing for Utah Kids, a local non-profit organization, is
partnering with i.t.NOW, a Utah-based computer services company, to host a Dec.
4 fundraising event for various Utah children’s charities. More than 1,000
handmade blankets and toy bears which will be available for purchase at the
Saturday with Santa event. Proceeds from the event will be donated to various
Utah children’s charity organizations for cancer, diabetes, trauma and more. The
event will run from noon to 4 p.m. at Cottonwood Heights Elementary School at
2415 E. 7600 S.

Karing for Utah Kids is a Utah-based 501(c)(3) non-profit organization that
supplies financial support to various Utah children’s charities. It’s managed by
an all-volunteer board of trustees.

The event, open to the public, will feature free pictures with Santa and free
food. Children’s games, drawings and face painting will also be available.

Entertainment will include Cowboy Ted (a radio personality who promotes healthy
lifestyles for kids), and Munchkin Radio (a children’s radio station). In
addition, the Arts Council of Cottonwood Heights will bring its Winter Songfest,
a collection of local children’s choirs.

One hundred percent of the sales will benefit the Foundation for Children &
Youth with Diabetes, Bikers Against Child Abuse (BAC) and Trauma Awareness and
Treatment. Funds will also support families in need through the Sub for Santa
program.

“This time of year is always very special for children, and we want to be sure
these children have a bright and enjoyable holiday season,” said Butch Jentzsch,
founder of Karing for Utah Kids. “Seeing the joy and the smiles on their faces
is what continues to drive this effort year after year. The addition of
Cottonwood Heights Arts council’s winter songfest and special guests will make
this truly a great holiday event for all.”

In addition to i.t.NOW’s sponsorship, the event is supported by the City of
Cottonwood Heights and the Canyons School District.

For more information about Karing for Utah Kids and its programs, visit
www.utahkids.org. For more information on i.t.NOW, visit www.itnow.net.

ABOUT KARING FOR UTAH KIDS

Karing for Utah Kids is a non-profit 501(c) (3) charitable organization founded
to make a difference in the lives of children in Utah. All donations directly
benefit Utah children’s charities and are fully tax-deductible in accordance
with state and federal law. Karing for Utah’s Kids is governed by an
all-volunteer board of trustees who bring a combined 40+ years of experience in
volunteer work for local and national charitable organizations and more than 20
years of executive management in Fortune 500 companies.

News Release: Best Year

i.t.NOW, A LOCAL INFORMATION TECHNOLOGY COMPANY,
CONCLUDES BEST YEAR EVER

NEWS RELEASE
FOR IMMEDIATE RELEASE
FOR INFORMATION: Spencer Randle, XO Marketing, (801)529-7072,

i.t.NOW, A LOCAL INFORMATION TECHNOLOGY COMPANY, CONCLUDES BEST YEAR EVER
Company increases sales, hires seven employees, and promotes and supports
local charities

Salt Lake City—i.t.NOW, a Utah-based information technology (I.T.) and managed
services company, recently concluded its most successful year since the
company’s creation in 2005.  i.t.NOW hired seven new employees and added 800
machines to its management services, bringing the 2010 total to 2,300
machines, a growth of more than 60 percent since 2009.

“2010 was an excellent year for us.  Even in a down economy, we were able to
continue growing our business, allowing us to hire employees for all aspects
of the business: Sales, operations, technical support and office management,
just to name a few,” said i.t.NOW Founder and CEO Phil Robinson.

Robinson added, “2011 will be even better.  With cloud computing being
integrated into all aspects of I.T., we’re preparing to offer several
cloud-based solutions, which would save our clients money and allow them to
run any application on just about any device.  We also recently upgraded our
partnership with DELL from premier to certified.  This means we can pass
greater savings on to our clients, especially with hardware and storage
solutions.”

i.t.NOW was also awarded a MountainWest Capital Network Utah 100 Award, which
highlights the 100 fastest growing companies in Utah.  The Utah 100 is
determined by the percentage of revenue increases from 2005 through 2009.

“In addition to experiencing growth throughout the year, i.t.NOW also gave
back to the local community.  2010 was such a great year for us that we wanted
to pass on our good fortune to those in need,” said Robinson.

In December 2010, i.t.NOW helped local non-profit Karing for Utah’s Kids raise
money for multiple children’s charities and the Sub for Santa Program with the
Saturday with Santa charity event.  The event, which was free to the public,
sold handmade blankets and bears to raise funds.  One hundred percent of the
sales benefited the Foundation for Children & Youth with Diabetes, Bikers
Against Child Abuse, and Trauma Awareness and Treatment.  Funds also supported
five families in need through the Sub for Santa program.

“The Saturday with Santa event was the best we’ve seen.  We made 175 percent
more in sales than 2009. I had 30 volunteers helping with the event, including
those from i.t.NOW, and I needed all of them,” said Karing for Utah Kids
Founder Butch Jentzsch.

For more information on i.t.NOW and its services, visit www.itnow.net.