Beat the IT Burden

Technology today allows us to accomplish more tasks faster than ever before. Paperless documents, remote collaboration and video conferencing have all lowered the costs and increased the speed of everyday business at an extraordinary rate.

The benefits of modern IT does however, come at a cost. Consistent maintenance has become a critical component of almost every business. The IT department is now as important to the functioning of a firm as sales, marketing, or management. The advantages that come with modern technology more than outweigh the drawbacks. It’s up to you as a business owner to balance both. In today’s highly competitive business environment the latest tips, tricks, and tools are essential to keeping ahead of the competition.

The Cost of Great IT

While well maintained IT is a powerful asset; poor, crumbling IT can quickly turn into a liability. Machines, servers and desktops need to be kept up to date with the latest operating system and security patches as a matter of priority. Data requires consistent back-up too.

Poor security and data backup measures put both your own and your customer data at risk from attack. Regular security updates close vulnerable gaps, while backups protect valuable data. Strong security protects your liability against losing your own and your customer data.

Determining what is and isn’t good IT practice for your firm takes the experience and knowledge of a professional. Good security involves more than one managed system to protect your assets. Good data backup is ideally done daily, involving more than a single copy in an off-site location. Without taking these steps at a minimum, a business is as little as one glitch away from a complete critical failure.

Managing Internal IT

The IT demands of every firm changes on a near-daily basis. Software is often added or removed, user accounts need to be added, removed, or changed and permissions require modification to suit ever-changing requirements. The time requirement of daily IT changes alone is more than many departments can handle.

Many small firms deal with accounts, permissions, and software at an individual level. Wherever this is the case, complications inevitably happen. Software and services get lost and forgotten in the system, often polluting other packages and causing IT issues throughout the firm. User accounts are often left on the system months or years after an employee has departed.

For reliable and secure IT management, managed group policies prevents bad systems. IT management allows staff to get on with their work without technology getting in the way. Data is managed at a department level, accounts are removed for staff that depart the business and software is installed by professionals. Using this approach the liability of the firm for IT failures is dramatically reduced.

Managing IT Without Added Burden

One of the major complaints about setting up well managed IT is the overhead that it adds to the firm. Staff costs, additional management, and the office space of an IT department is a daunting financial burden to add.

Staff costs alone can make building an equipped IT department prohibitively expensive. Qualified, dependable, knowledgeable IT staff demand a high salary and costly benefits. In addition, equipment costs and lead time to get up and running on your business systems drive the costs even higher. Some firms simply don’t have the space required to add an entirely new department to the business.

That’s why, for many businesses, outsourcing is the most effective way to update their IT without increasing business overhead. Outsourcing provides modern IT for a simple, fixed monthly cost. Removing the distractions of managing an entirely new department allows the business to focus on doing the job they do best.

What We Do

By trusting your IT to us, we ensure that your systems are up-to-date, secure, and fully backed up. We can keep you competitive by allowing you to accomplish more than ever before.

Along with day to day IT management, monitoring, and setup; we can assist your transition to paperless documents, setup remote working, and provide IT assistance to set up the latest technology that will enable you to succeed.

Allow us to help you do more than ever before. Bring your IT demands to us and we’ll provide you with the modern IT you need to let your business thrive. Call us today at  (416) 645-2469, (905) 667-0441 or email us.   

 

What’s Causing Your Bandwidth Woes?

Every time employees send or receive data online they need bandwidth. Like time and money, bandwidth is a scarce resource in many offices. After all, computers and digital devices rely on bandwidth to complete tasks online.

Bandwidth is the amount of information that can be sent or received per second. This might be measured in Kbps (thousands of bits per second) or Mbps (millions of bits per second). Many people think having a higher bandwidth will mean a faster user experience. In fact, it’s only one factor that affects response time. Bandwidth is actually about capacity more than speed.

Eight bits of information is one byte. A byte is the amount of memory it takes to store one character, such as the letter “Q.”

You can’t drive fast on a one-lane road when there’s a lot of traffic. You also can’t navigate the information highway as quickly in online congestion. If you’re the only one in the office late at night, you’ll have no trouble trying to stream an online webinar, but you might struggle to stream the same webinar when sales are on a video conference call and advertising are sending a graphic-heavy email.

What Is Using Bandwidth?

There is greater demand on bandwidth every day. Your business migrated to cloud services for greater mobility and online consistency, but sharing information in real time requires bandwidth usage to synchronize data.

Backing up to the cloud provides businesses with greater peace of mind, yet it can be a headache if that backup is happening right when you want to get on a video chat with a client – your connection can suffer. You’ll be that person who keeps dropping in and out of that important meeting!

When you’re using an online meeting tool (audio or video), you can also slow things down for others.

Even email needs bandwidth to send and receive data. The bigger the files (e.g. images or spreadsheets?), the more bandwidth activity. Uploading a few PDFs can take up 20-40Mb of the total, which can choke a network with limited upload capacity.

All those personal devices your people are bringing to work can make a difference, too. Smartphones will often start backing up to the cloud when they are on a Wi-Fi network.

Bandwidth Usage Solutions

Often, there is no option for greater bandwidth because the infrastructure where you’re located won’t support greater bandwidth. You’re already getting the most capacity your provider can offer.

Still, there are ways to better manage bandwidth:

  • Switch to a business-grade router or a Unified Threat Management (UTM) appliance. These allow you to identify and manage bandwidth usage better. They also add security (firewalls, filtering) to your network connection.
  • Set up Quality of Service (QoS) to rank the activities your business values more (e.g. configuring video conferencing to take data preference ahead of file downloads).
  • Block some devices entirely, such as employee phones backing up to the cloud.
  • Schedule some activities for a more convenient time (e.g. set your system backups to happen in the middle of the night, fewer people are likely to be trying to do things online).

Want to regain control of your internet capacity? A managed services provider can monitor traffic and usage, and help you set up a solution for smarter bandwidth usage.

Improve productivity and give employees something to smile about (other than a cat riding a vacuum cleaner on Facebook) with better bandwidth management.

Give us a call today at  (416) 645-2469, (905) 667-0441 or email us.   

PSSST… Are You Protected Against Leakware?

You’ve heard about ransomware by now. Cybercriminals access and encrypt your data. You have to pay a “ransom” for the key to unlock it. Leakware is similar, but now the bad actors are threatening to post confidential information online if you don’t pay up.

When you think about it, there are probably many things your business wouldn’t want shared publicly. This could be your IP, your secret sauce recipe, your customer database with all the details, or financial data: the works.

The public sector is particularly at risk against leakware, also known as extortionware. Attackers threaten to publish confidential citizen data online. Healthcare organizations are also top targets, with the bad actors saying they will publish the stolen sensitive data online.

Leakware doesn’t just affect you and your business. It can hurt all the people whose data is leaked. That information makes citizens or customers more likely to be victims of fraud or identity theft.

As with ransomware, leakware is costly. Beyond the actual ransom paid, you could pay associated costs such as:

  • downtime
  • lost sales opportunities
  • angry customers
  • attack mitigation and recovery
  • damage to company brand reputation
  • penalties for unmet contractual obligations to customers
  • fines for non-compliance
  • fees for fraud protection offerings to affected individuals

“Nearly 3 out of 4 companies infected with ransomware suffer two days or more without file access.” – Acronis

Leakware – Planning and Prevention

Leakware is a more recent evolution of ransomware. In Johannesburg recently, hackers compromised passwords, and financial and personal population data. They demanded four bitcoins, or else they would reveal the stolen information and how they breached city systems.

The City of Johannesburg chose not to pay, and it’s unknown if the data was released or not.

Preventing a leakware attack requires the same precautions as ransomware. To start, use antivirus software and maintain a strong firewall. It’s important that you keep security software up to date.

Don’t ignore those notifications about system or software version upgrades! They can contain the patches you need to prevent vulnerabilities. Bad actors are always exploiting new methods of spreading malware. Security patching is the manufacturer’s effort to stay ahead of criminals.

It’s also a good idea to limit access based on the principle of least privilege. Authorize users for access only to data, software, or systems that they need based on their roles. When those responsibilities change, reconfigure the user’s access. This makes it more difficult for a bad actor to get all your data, because few people have that level of access.

Set up content scanning and mail server filters. At the same time, don’t rely on technology alone. Educate staff about the risk of social engineering and using public wireless internet. Make sure your people use a trustworthy Virtual Private Network (VPN) when off-site.

Keep good data backups, as well. We recommend the 3-2-1 approach. Keep three copies of your data. Backup one version to the cloud, and have the other two stored on different devices (e.g. on your local computer and on a backup drive).

Leakware and ransomware are on the rise. No business or industry is immune. Protect your data. If you need help with your prevention efforts, give us a call (416) 645-2469, (905) 667-0441 or email us.   

11 Reasons To Upgrade To Office 365 Today

With Office 365, it seems common sense has finally prevailed, giving business the changes they actually want. It’s still Office, and your staff will still know exactly how to work it, but they’ll get so much more done.

1. The whole Mac/Windows drama is over

Office 365 brings with it a stack of benefits, but perhaps the most relieving is the in-built file compatibility across all platforms. No more converting (or corrupting) files back and forth, productivity black holes have essentially been eliminated.

2. It’s always ready to go

Microsoft is so confident in their cloud-based software and data storage; they’re giving a 99.9% uptime guarantee. You can even call a real life human for support.

Work online, offline or mobile – the choice is yours.

3. Security is built in

A large part of Microsoft’s uptime certainty comes from their extremely robust security protocols. Office 365 offers enterprise-grade admin controls at your end, as well as government-grade security at their end.

4. Generous data allowances

Each user gets 1TB of cloud space for file storage, which can be shared at folder or file level.

5. Work anywhere, anytime

Previously, staff needed to establish a VPN or manage security concerns which made working off-site difficult and cumbersome. Office 365 has solved that problem and working from anywhere is now easy.

6. Integrated organisation

 Calendar, email and contacts are all synced and updated across multiple devices: Laptop, desktop & mobile.

7. Yours for no upfront costs

Once upon a time, updating your Office version meant paying a small fortune and half a day downtime. Office 365 changes that, with no upfront cost or installation delay.

8. Mailbox storage through the roof

Forget the days of ‘user mailbox is full’ – each user is given a whopping 50GB in a gorgeous, easy-to-use mailbox.

9. Built in malware and spam protection

Data security doesn’t stop at file storage: email is scanned for malware and spam, protecting your organisation from all manner of attacks before they happen.

10. Collaboration tools and virtual meeting

Cancel your 3rd party services and bring all your collaborations into the one platform.

11. Integrated Team planning

Schedule tasks, meetings and track allocations from a top-down level to know exactly how projects are progressing.

12. Comply with Canadian Privacy Legislation

For Canadian clients, Office 365 is hosted in Canadian datacentres ensuring your compliance with  PIPEDA .

We can help with your Office 365 migration and setup – give us a call today at  (416) 645-2469, (905) 667-0441 or email us.   

Want to be notified when our next blog is posted, sign up here.

6 Simple Tips to Protect Your Customer Data

As cyber-attacks continue to make headlines, hackers are exposing or selling customer data files in record numbers. But just like with any threat, there are actions you can take to minimize risk and ensure your business retains a positive reputation among customers.

  1. Stop using the same password on repeat. Set a mandate for all staff that passwords must be unique for each user and for your workplace. That means it can’t be remotely like the one on their home PC, tablet or online banking. Passwords are hacked more than ever, so when you’re prompted for a password change, dig deep and really think about what goes into a hacker-proof password. If remembering them is a problem, consider one of the latest password management tools.
  2. Go on a shredding spree. How much sensitive data is being dumped into the recycling bin? Valuable customer data is often taken from the bins of small businesses and quickly sold or published. It’s not just good practice to shred sensitive documents, it’s the law. Take 5 seconds to run documents through the shredder or book in the services of a secure shredding company.
  3. Ditch the accounting spreadsheets. Still using an Excel doc for all your number-crunching? Besides making your accountant’s job harder (and more expensive), you’re opening your business to a massive range of vulnerabilities. Even with password-protection, spreadsheets aren’t designed to safeguard your financials or those of your clients. Upgrade to a proper accounting solution with built-in customer data protections and security guarantees.
  4. Train staff explicitly. You can’t rely on common sense because what you think is a given might be news to someone else. It can be extremely beneficial to hold special data-safety training sessions once or twice a year as a reminder, as well as take the time to induct new staff into the way things are done.
  5. Limit access to data. Just like the bank manager who guards the keys to the vault, you can limit who accesses your data. Revoke employee access as soon as they leave your business for good, and set rules around who can access what – and when. Do they need access to sensitive information while working from home? Should they be able to change the files, or only view them?
  6. Keep your software updated. Possibly the most preventable hack, having outdated software can be an open invitation for cyber-criminals. They look for known weaknesses in business software and waltz right in. While the nagging pop-ups and reminders to update can feel like a selling ploy, they’re actually helping your business to stay in the safe zone. Updated software gives you protection against new viruses and hacking techniques, plus closes off those nasty weaknesses.

If you would like to make sure your business is secure from data breaches, give us a call at  (416) 645-2469, (905) 667-0441 or email us.   

Want to be notified when our next blog is posted, sign up here.

Trades Should Add Technology to Their Tool Belts

There are many hands-on trades that haven’t traditionally needed technology. Yet modern tech tools help the plumber, carpenter, welder, or other trade improve productivity and competitiveness.

There are certain common tasks tradespeople face daily:

  • scheduling appointments with clients, suppliers, or inspectors;
  • tracking project deadlines and budgets;
  • communicating with project managers, customers, trades, office administrators;
  • paying employee salaries;
  • invoicing and tracking payables, receivables.

These can all be done with pen and paper, sticky notes, and forms in triplicate, but technology cuts the time spent and lets you focus instead on increasing your bottom line.

The Difference Technology Tools Make

Most of us carry small, powerful computers around in our pockets every day, whether it’s a smartphone or a tablet. Internet-connected devices give tradespeople access to tools to enhance productivity.

Let’s start with scheduling apps, as tradespeople are often on the move throughout the day. Signing up for a scheduling tool (e.g. Doodle) makes it easier to set appointments, and you aren’t involved in the booking process. Customers simply go to your website or link to the app and choose an available time that works best for them. You can even set it up to ensure you have buffers between appointments or prevent someone from scheduling a new, big project to start at the end of your day.

Integrating the scheduling app with your website helps customers reach you. Also, connecting also to a shared cloud calendar can help your team work together better. Everyone invited into the calendar can see who is out on a call, and where.

You can make changes to a cloud-based calendar on any connected device. Others will see the alterations in real-time. This helps you avoid scheduling conflicts. You can set a follow-up meeting with an inspector while you’re out in the field. The office secretary sees your availability in real-time to set up a new customer visit.

Your Trade Office On the Move

With cloud-based office software also available online, you can get more done out of the office. You don’t have to make a trip back to the office to enter your invoice slips and make photocopies of receipts. Instead, take pictures on your phone or tablet, and attach them to the project file in the cloud, or invoice directly from a secure cloud-based processing site. You won’t have to worry about any paperwork getting lost in the back of a truck or bottom of a toolbox.

The Microsoft Office suite, Google Docs, and cloud storage are available from iOS and Android devices. This lets you monitor project timelines, view budgets, and track invoices and payments in the field. Cloud-based accounting packages let you see cashflow or outstanding balances, and pay contractors or suppliers on the spot.

Cloud-based software also gives every employee access to business tools in the office. With a virtual desktop, they can collaborate easily (out on a job or in the office) and make changes in real-time. For instance, a contractor could access software to edit a building plan, then actually see the new design in 3D modelling software.

The great news is that technology is ever more accessible and easy to use. Embracing modern digital tools can improve customer service and trade business efficiency.

Your skill set may not extend to technology, but that’s where we come in. We can help you find the right technology for your business needs. Contact us at  (416) 645-2469, (905) 667-0441 or email us.   

Want to be notified when our next blog is posted, sign up here.

Computer Cleaning for the New Year

The new year can mean resolutions and promises for a “new you.” One way to start this year feeling more in control is to clean up your computer. Follow these simple steps!

Tackle the inbox

We do a lot of shopping at the end of the year. Whether you shop online or in stores, you’re asked to provide your email address when you buy, which multiplies the number of mailing lists you’re on. Don’t start the new year deluged by unwanted newsletters and advertising emails.

The extra messages in your inbox distract you from the messages that matter. Instead of deleting every new unread message from “Let’s Make Cookies,” click on one and unsubscribe. Usually, there’s a link that lets you do this at the bottom of the email. If you’re a Gmail user, start your effort to cut down on unwanted mail in your Promotions tab. Google’s algorithm sends sales pitches here, so cut messages from this section first.

Clear bookmarks

The internet is built for browsing. We’ve all lost hours to clicking and linking in this vortex of information. “Wait. How did I end up here looking at kittens eating cupcakes?!” To make things easier, we’ll bookmark sites we visit often or put a page we want to return to on a reading list.

By the end of the year, we have marked many sites that we don’t even remember favoriting in the first place. “When was I interested in this?” Getting rid of any bookmarks for passing interests can help you navigate the Web better this year.

In Google Chrome, click on the three dots in the upper-right of your browser window (to the left of your profile icon). The drop-down menu will have a Bookmarks option. Click on this to see another drop-down menu with Bookmark Manager on it. On the next screen every one of your bookmarks will have three dots beside it. Click on this to select the delete option, and get rid of the ones you don’t need any longer.

Safari users can click on Bookmarks on the top menu or the sidebar icon on the tool bar (to the right of the arrows on the left). Then edit your bookmarks by clicking on sites you no longer want and hitting your delete button.

Sort through downloads

We also download a lot of stuff in a year. Sometimes, because we’re impatient or don’t realize we’ve already hit download, we get multiple copies of the same file! A full download folder takes up storage space on your computer and can slow your computer down.

On a Mac, go to the Finder and click on Downloads on the “Go” drop-down menu. You’ll find a folder filled with .pdfs, .docs, and .jpegs you long forgot about. Click on those you don’t need any more and drag them to your trash can.

On Windows, you can usually go to the “This PC” icon and then the “Downloads” Folder. Right-click on the files you don’t want, and choose “Delete.”

Empty trash/recycling bins

Items you put in the trash or recycling bins at home take up space until you take those bins to the curb or the dump, and the same is true of your computer trash or recycling. Empty these bins by selecting “empty trash” on your Mac Finder menu, or “empty recycle bin” after clicking on the bin icon in Windows 10.

Remove unused programs/apps – If you’re not using a program or app, don’t give it computer space. On a Mac, you can click on the icon for that program and drag it to the Trash. With Windows, you’ll open the Start menu, click on Settings, then System, then Apps and Features from the left pane to select what you want to uninstall. Click the uninstall button, and you’ve decluttered your computer that little bit more for the new year. If you need help with any of these streamlining measures, let us know. We can help! Call us at (416) 645-2469, (905) 667-0441 or email us.   

Want to be notified when our next blog is posted, sign up here.

equipment-failure

Your Equipment Fails – What’s Next?

equipment-failureYou invest heavily in information technology. You depend on your equipment to support your business. Then, the equipment fails. It’s inevitable. Only cockroaches survive forever. You’re left scrambling to find a replacement solution for essential tech. It’s a tough place to be, but it can also be an opportunity.

When you hear the news that a piece of equipment has failed, the headache starts soon after. It can mean costly downtime. You’re going to need to budget for a replacement. You have to spend time and effort determining the next, best solution. Users, and potentially customers, get frustrated, too.

If the equipment that’s conked out is a hard drive or server, don’t even reach for that headache remedy. Stop everything, and call for expert help. Anything you do can result in more data loss. This includes the age-old IT self-help remedy of turning it off and on again!

When anything carrying data fails, the next question is whether you have a recent backup. Can you restore data from that backup? We recommend you have as many as three data backups for safekeeping, with at least one of them kept off-site.

OK, it’s dead. Now what?

After the initial panic, once you’ve determined that technology is kaput, take some time to reassess.

Your decision-makers can start out by considering whether that equipment needs replacing. Don’t just do a knee-jerk rip and replace it. There may be better technology options or improved ways of doing what you were doing.

An on-site equipment failure is an opportunity to examine cloud technologies. The cloud is more than Software as a Service solutions giving users access to applications online. Infrastructure as a Service offerings quickly get up and running with new technology, and you gain access to enterprise-level infrastructure. Replacing hardware is no longer your problem. Plus, you’ll only pay for what you use and be able to scale up or down as needed.

There’s also less chance of data loss when working in the cloud. Cloud computing takes away the single-point-of-failure problem. Now, your data is available anywhere you have an internet connection. So, even if your desktop computer dies, you can still get into the same virtual desktop from another device. Cloud service providers build in redundancies, so data is not stored on a single server. This supports business continuity even after equipment failure or natural disasters.

Partnering with an MSP

Save yourself the stress of dealing with technology failures alone by partnering with a managed services provider (MSP). There are many advantages. First, we make sure you have a working data backup that’s tested for reliability and secure.

MSP experts also aim to detect potential failures before they happen. If a device needs replacing, we want to know before the last gasp of life. That helps ensure a smooth transition and helps level out the budget impact.

Further, MSPs know what’s involved in migrating technology to the cloud. We can help you weigh up the pros and cons, assessing what’s best for your individual business. Plus, we develop your migration strategy and provide ongoing support.

MSPs identify the best providers for your needs. We tailor our services to your business workload, regardless of company size. We make sure every business accesses the best technological tools. Unlike a software salesperson, we don’t enjoy selling you more than you need. We want you to have the best technology at all times and to help prevent issues before they happen.

Don’t wait for the death knell of your valuable IT equipment to sound. Partner with an MSP for peace of mind. Contact us at (416) 645-2469, (905) 667-0441 or email us.   

Want to be notified when our next blog is posted, sign up here.

back-up

A New Year’s Data Resolution To Stick To

back-upMany of us set goals, tasks, and challenges to tackle in the new year. Cleaning out the spare room, shopping around for the best energy deals, or exercising more than we did last year. We set these goals to improve our lives and build on productivity, health, and organization in the future.

Resolutions to improve for the coming year are great ideas to aspire towards; whether organizing your office, tidying your house, or taking control of your digital footprint. The problem for many is motivation can quickly fall away by the time February rolls around. If you manage to achieve only one of your new year goals for this year, make it to put a good backup in place for your digital files.

Storage failure, theft, accident, or natural disaster can impact at any time. Many of us put these possibilities to the back of our minds. We plan to organize our files ‘eventually’ and then never get around to it. It’s easy to think ‘it won’t happen to me’ or make creating a backup something that is always to be done tomorrow.

Replacing Old Valuables

Almost anything you own can be replaced one way or another. A broken laptop, tablet, or phone can easily be replaced with another model. Even credit card or financial details, if stolen or lost, can be cancelled and replaced by the bank in under a week.

Losing data, however, is far tougher to face. Without a safe backup, there’s no way to recover it once it is gone. Backups provide a service which could be described as the world’s best insurance policy.

While an insurer will often give you some, even most, of the value of the previous goods lost; data backup provides you with your exact data, precisely how you left it. It does this instantly, repeatedly, and without any additional charges or excess. In some instances, it is even automatic and done behind the scenes.

Recovering Irreplaceable Data

There are almost certainly old essays, browser bookmarks, and notes that you can comfortably live without. Equally, there are likely to be photographs, videos, and important documents that you couldn’t or should not part with.

For many, these files can be as valuable as the memories themselves: photographs of loved ones, long ago vacations, or milestone events in life. We commonly take critical data for granted; Assuming that because we can access it today, it will still be there tomorrow. This is unfortunately not always true.

These irreplaceable files are too important to keep in just a single place. Retaining only a single copy leaves your data vulnerable to luck and chance as to how long and if it survives.

Losing Data In An Instant

Data storage is liable to develop faults or failures at any time. Often a storage failure isn’t made apparent until the device fails to turn on or dies suddenly. These types of hardware failure become more and more likely as devices age.

Similarly, modern devices are more and more vulnerable to loss or theft as they get smaller and lighter. While criminals are not likely to be interested in your irreplaceable photographs and documents, they are vulnerable to being stolen along with the device they plan to sell. Whether lost through natural disaster such as flood or fire, misplaced by accident, or stolen by criminals; important files are truly painful to lose.

If you were to lose these files in an instant today, how much would you pay to end that stress and get them back again? Setting up a good backup is only a tiny fraction of the cost without any of the pain.

Backup For You

With the right backup solution, it doesn’t matter how many devices are lost or stolen. Even without a device or away from home, the data important to you can be kept safe and sound to be returned to you when you’re ready again.

Regular, consistent backups can even be made for you, automatic and in the background. Documents you create, photographs and video you take can be backed up and kept safe from the second they are captured or saved.

If you have travelled too long on borrowed luck, without putting a backup in place, give us a call at (416) 645-2469, (905) 667-0441 or email us to get set up with a robust and dependable backup solution for your data.

Want to be notified when our next blog is posted, sign up here.

bcc-nightmare-email

Do You Copy? What Can Go Wrong with BCC

bcc-nightmare-emailTry to find someone who has not “replied all” when meaning to send to only one individual. It’s embarrassing and can aggravate those people with more emails flooding their box. Another common email gaffe is misusing the CC and BCC fields in outgoing messages. This mistake can prove costly for business.

You’ll have noticed those extra fields below the “To” field in your email client. CC stands for carbon copy, and BCC for blind carbon copy.

When you use CC, it’s like you’ve imprinted your message on an old blue sheet of carbon paper. The email copy sends to your To recipients as well as anyone you have CC’d. All recipients can see who else you sent your message to. This is a great way to encourage collaboration and accountability.

When you use BCC, your To recipient and anyone else you BCC’d gets the email, but you’re not showing where you sent the message. This is for when you’re addressing a large group of contacts that may not know each other, or when you are sending a group message but you want to respect the privacy of all your recipients.

The Blind Carbon Copy Nightmare

A big problem is using To or CC when meaning to use BCC. You inadvertently expose all your contacts’ email addresses. Personal contact information needs protection, and people’s privacy demands respect. You don’t want to make this mistake with a single or a few emails, or worse still hundreds or thousands of emails.

There are many examples of BCC blunders. West Ham United Football Club faces the UK’s Information Commissioner’s Office fines for confirming all season ticket holders with email addresses in the CC field. In another example, the Independent Inquiry into Child Sexual Abuse was fined US$260,000 for exposing possible victims of child abuse in the same way.

Scotland’s National Health Service messaged transgender patients with their addresses in the To field. Instead of using BCC, the sender used an open distribution list. This shared 86 Glasgow patient email addresses and, perhaps, patient names and dates of birth when the addresses incorporated those details. You can bet there were some heated replies to that message, although the reports didn’t share whether they were “reply all” or not.

Also, the Sydney Morning Herald reported on a real estate company employee mistakenly CC’ing 300 customer emails. A customer complained. The error resulted in a six-figure aftermath. Lawyers, a consulting firm, and eight full-time employees worked on a data breach response plan for weeks.

What’s Better Than BCC

Any CC or BCC blunder could be a data breach. Take care. Don’t risk the loss of customer trust and possible compliance issues.

When you need to send out an email to a large group of people when you’re not necessarily expecting a response, use mailing software such as Mailchimp. Email marketing platforms send an individual copy of your message to every person on your mailing list, so there’s no risk of your contact list being exposed.

Need help setting up your email client or getting up to speed on an email marketing platform? We can help. Contact us today at (416) 645-2469, (905) 667-0441 or email us.   

Want to be notified when our next blog is posted, sign up here.