Do Macs Get Viruses?

Many Apple owners believe their Macintosh computers are immune to viruses. Apple itself has run ad campaigns promising its computers “don’t get viruses”. And those who have owned a Mac for years, decades even, are particularly prone to believing. After all, nothing’s happened to them yet. Regrettably, Macs do get viruses, and the threat is growing.

For a long time the argument was that cybercriminals didn’t bother to develop Mac viruses. There weren’t enough users to justify the effort. Instead, they’d focus on the lower hanging fruit – PCs running Windows.

Yet Apple’s market share is on the rise, and it’s increasingly common to see Macs in the workplace, especially in creative industries. Plus, there’s a widespread assumption that Mac users are a smart target as they are likely to be better off. So, while Macs remain harder to infect (installing most software requires a password), there’s often a greater payoff.

The research reflects the reality. In 2017, for instance, the iPhone OS and Mac OS X placed #3 and #6 in CVE Details’ top 50 ranked by total number of distinct vulnerabilities. Apple TV and Safari also made the list at #17 and #18, respectively. In 2017, Malwarebytes also reported it “saw more Mac malware in 2017 than in any previous year”. By the end of 2017, the cybersecurity firm had counted 270% more unique threats on the Mac platform than in 2016.

Finding Apple’s Weak Spots

It’s obvious then that bad actors are no longer steering clear. They are actively looking for ways to exploit Macs.

A common approach is to use Trojans. Named after a gift wooden horse that hid an army, Trojans look like something you would want to install. So, Mac users happily enter their passwords to download that application and open the gates to the cybercriminal.

In 2011, for instance, a Trojan called “Mac Defender” took advantage of people’s desire to protect their computers. The fake program appeared to be anti-virus software. Once the users installed it, they’d get an onslaught of pop-up ads encouraging them to buy more fake software.

Trojans get through the gates because you let your guard down. You are taken in by that supposed note from a long-lost friend. You think you want to see that pic of that famous celebrity. All it takes to stop this type of attack is suspicion of everything you might install or download.

A business would want to educate its employees about the importance of:

  • clicking on emails with care;
  • validating the source of any files they plan to open;
  • checking a website’s URL (being especially wary of those with less common endings such as .cc or .co);
  • questioning any promises of Ray-Ban sunglasses for 90% off or the latest iPhone for $29.99.

A new threat comes from within the Mac App Store, according to Thomas Reed, a Mac security researcher. When a user tries to install an app on a Mac, a Mac OS program called Gatekeeper checks the file’s code signature. The signature helps certify the app is valid. However, Reed found that cybercriminals could buy a legitimate certificate from Apple, or steal one and trick users. Users would install masked malware that could infect legitimate programs and evade detection.

Key Takeaway

Apple is always working to protect its users from malware. It has measures in place, and user caution can make a big difference, too. Still, it’s not true that Macs are completely safe.

Find out what you can do to protect your Macs and guard against threats. Partner with a managed services provider to gauge your security levels.

Call us today at (416) 645-2469, (905) 667-0441 or email us.   

Want to be notified when our next blog is posted, sign up here.

Island Hopping: Not Always a Good Thing

The phrase “island hopping” conjures up positive images. You might think of cruising beautiful sandy beaches on a tour of tropical islands. Too bad cybercriminals have given the term a new, less pleasant spin.

Island hopping is an increasingly popular method of attacking businesses. In this approach, the cybercriminal targets a business indirectly. The bad actors first go after the target’s smaller strategic partners. So, vendors or affiliates, who might not have the same level of cybersecurity, become stepping stones to hop.

Attackers might hack into smaller businesses handling the target’s HR, payroll, accounting, healthcare, or marketing. Then, they take advantage of the pre-existing relationship to access the final destination.

Humans are trusting. Cybercriminals exploit that. With island hopping, attackers leverage the trust established between strategic partners.

It’s quite simple: attackers gain access to Company A and send a counterfeit business communication to Company B. Company B, knowing the sender, is less likely to question a download link or opening an attachment.

After all, it’s not coming from a stranger; it’s a message from perfectly pleasant Jenny at Company A. You may have in the past already shared logins to various sites/portals, or passwords to unlock zip files.

The Rise of Island Hopping

This is not a brand-new form of attack. In fact, it’s named after a military strategy which the United States used in World War II to establish a stronghold in the Pacific Islands.

Perhaps the best-known island-hopping cyberattack was seen in the United States in 2013. Retail giant Target was the aptly named target of a point-of-sale system breach. Hackers stole payment information from 40 million customers. The first “island” in the planned attack was Fazio Mechanical Services. The heating and refrigeration firm suffered a malware attack shortly before Target’s breach. Fazio’s hackers stole email credentials needed to access the retailer’s networks.

As enterprises continue to strengthen their cybersecurity, it’s predicted that island hopping will gain momentum. According to Accenture’s Technology Vision 2019 report, less than a third of businesses globally know how strategic partners secure their networks. A majority (56%) rely on trust that business partners would uphold security standards.

Preventing Island Hopping

You may be one of the islands to hop or the attackers’ final destination. It depends on your business size and industry. Either way, your business is vulnerable to malware attack, infected systems, or a data breach. Plus, if you’re the stepping stone, you’re likely to lose the target company’s business, too.

How do you prevent island hopping? First, secure your own networks and systems:

  • Follow best practices to detect and identify vulnerabilities and reduce risk.
  • Educate your employees about the dangers of business communication scams.
  • Raise awareness of phishing schemes and social engineering.
  • Require two-factor user authentication.
  • Change all default, generic, or predictable passwords.
  • Keep security up to date (patching and system upgrades are mandatory).
  • Control who can access your networks and servers.
  • Protect all endpoints (including employee devices in a Bring Your Own Device workplace).

When it comes to cyber island hopping, your business doesn’t want to be a layover or the final destination. Keep your cybersecurity borders tight to avoid unwanted visitors.

Want to make your business inhospitable to island hoppers? Work with a managed service provider. They can help assess cybersecurity, provide a plan to reduce risk, and upgrade technology. Let us support your efforts to fend off unwanted tourists.

Give us a call on (416) 645-2469, (905) 667-0441 or email us.   

Want to be notified when our next blog is posted, sign up here.

3 Top Reasons for Onsite or Remote Computer Repair

No one wants to experience computer problems. Whether it’s used for personal or business use, your computer is likely indispensable. Essential customer files are on there! All your downloaded music! The family photos! Vendor contracts and employee payroll information! Compounding the crisis is the hassle of going to get the computer fixed. That’s why we offer On-Demand onsite or remote repair services.

When You Need Computer Repair

Regrettably, there are common computer problems you might encounter at home or work:

A blue computer screen with some white text, aka the “Blue Screen of Death,” or a STOP error. This one’s scary. It could indicate failing hardware, damaged software, driver problems and more. Don’t know what any of that sentence meant? That’s OK. We do!

  • Having trouble installing new applications.
  • The computer is running so slow a turtle would beat it in a foot race.
  • Your applications are acting possessed and are unpredictable.
  • The keyboard, mouse, or printer are not working properly.
  • Your computer keeps restarting on you.
  • Downloads are taking forever.
  • You can’t open that attachment from your boss.
  • The computer freezes or shuts off suddenly.
  • The graphics on the computer screen look wonky.
  • Your computer is making noises mimicking an old clunker car.

Troubleshooting these problems to diagnose what is really going on can be challenging. It depends on how much you know about computers to begin with. Since you rely on your computer for so much, it’™s a good idea to consult with computer repair experts.

Why Onsite or Remote Computer Repair

#1 Convenience.

You don’t need to worry about doing more damage when you unplug everything and drive the computer to a repair shop. You also avoid the commute across town, headache of finding parking, and annoyance of waiting in line. Whether a business office or home, our computer repair experts can come to you.

This is more convenient for you. You don’t have to lug the computer to a store and back only to have to set it up all over again. Your computer stays right where you typically use it. When we’re done, you can just push the power button and get going as if nothing happened.

#2 Context.

Seeing your computer in its natural habitat helps our experts too. Sometimes the issue isn’t internal to the computer. So, we wouldn’t be able to properly diagnose the problem if you brought the computer in to us.

For example, the hiccup could be caused by a faulty power board or misbehaving printer. Unless you thought to bring those into the computer store too, the problem wouldn’t be replicable. And nothing’s worse than going to the trouble of getting help only to say “well, it doesn’t seem to be that annoying thing right now.” That’s when the expert looks at us like we’re crazy and says “next time, just try turning it on and off again.”

#3 Cut Downtime.

When the computer repair service comes to your door, you can also reduce downtime. Whether the computer is essential for homework at home or business services, you probably can’t imagine being without it for a few days. It’s like losing a limb! Onsite computer repair aims to fix the problem in just a few hours, without taking the computer away.

We can handle most repairs onsite. Sometimes we can fix minor issues remotely. In some cases, it’s more cost-effective to bring the computer back to base. We still save you hassle by dropping the computer back off to you. We’ll also set everything back up again when we return your computer. That way you don’t have to worry about which cord goes where!

We hope you never need computer repairs. But, if you’re ever facing an error message you don’t understand or your computer has ground to a halt, give us a call at (416) 645-2469, (905) 667-0441 or email us. Our computer repair service experts will be happy to schedule a time to come to you!

Want to be notified when our next blog is posted, sign up here.

Why is My Brand New Laptop So Slow?

Your old computer is beginning to slow down. So, you invest in a shiny new laptop. The clouds part and the sun shines down on this bright and lovely new device. Everything will be faster and easier. Only, from the first day, the new laptop is lagging. Why is it running so slow? One of these might be the reason.

#1 Not enough computing power.

In many cases, the laptop doesn’t have enough RAM (Random Access Memory). RAM is the computer’s main memory. This helps your computer do more at once. Information from the operating system, application programs and data are kept here, when in use, for quicker processing.

RAM is like the computer’s short-term memory, while the hard drive is the long-term memory. Just as the human brain can’t hold everything in short-term memory, RAM can get overloaded too. When this happens on your laptop, the computer processor needs to go to the hard drive. This slows things down.

Resolution: You might see 4GB, 8GB, 16GB or more of RAM available. How much you need is going to depend on what you plan on doing with the computer. For a laptop with Windows 10, we recommend at least 8GB of RAM, but 16GB is more comfortable for a better experience.

Not all laptops will let you access the RAM. When you can, though, upgrading memory can be quick and affordable.

#2 Mechanical hard drive.

Often a single part is letting you down. With a less expensive computer, manufacturers skimp. While it’s less common these days, some laptops will come with a mechanical hard drive. You might think of this like a record player with a needle reading the vinyl album. Since something is moving to find data, the laptop runs slower than it would with a Solid State Drive (SSD), which has no moving parts.

Resolution: In many cases, a mechanical hard drive can be easily upgraded to an SSD. However, some super slim laptops have limited upgradability.

#3 Bloatware.

Retailers like to tout all the bells and whistles that come with their laptops. So, when you turn on your laptop for the first time, you may notice there’s already a lot of software pre-loaded. Much of it you’ll probably never use. Maybe there are toolbars you don’t need, games you’ll never use, or stock widgets that you couldn’t care less about. These examples of bloatware slow down your computer.

The third-party applications are a revenue source for the manufacturer, but don’t always help you. Microsoft, for instance, sells a line of computers that come without any pre-installed third-party software. Computerworld reported those PCs “start up 104% faster, shut down 35% faster and have 28 minutes more battery life.”

Resolution: When you get a new laptop, check out the pre-installed software before you add your own. Determine what the existing software will do, and uninstall anything that you won’t want.

If your laptop is slow on the first startup, this may be due to system updates. For instance, a Windows 10 automatic update to bolster the security of the computer. You can’t do much about these, but look on the bright side, your laptop security is current!

Improved speed is a main reason to invest in a new laptop. Don’t let a lagging laptop disrupt your productivity. We can help with a slow running laptop.

Instead of wasting valuable time waiting on a slow computer, give us a call at  at (416) 645-2469, (905) 667-0441 or email us.   

Want to be notified when our next blog is posted, sign up here.

Avoiding Growing Pains – Tech Tips for a Thriving Business

Maybe you started your business in a basement or home office. It was just you at the beginning. Then, your service or product gained traction. The number of staff grew, and you moved into an office. It’s amazing how far you’ve come. Better still, your business continues to grow. It may be time to consider some of these tech tips to help your thriving business.

#1 Upgrade to Business-Grade Cloud Services hosted in Canada

Perhaps you’ve been relying on free software from Gmail, Outlook, or Dropbox. Who can argue with free email, calendars, collaboration and file storage right? Well, it may be time to upgrade to the business versions of the software your team relies upon.

Move from Gmail or Outlook to Office 365, or Dropbox to OneDrive for  Business. For a small monthly fee, you gain business-grade features hosted in Canada.

OneDrive for  Business provides added storage space and user activity and sharing auditing. Unlimited file recovery and version history make recovery easier. A remote wipe feature protects files on a stolen device).

#2 Revise your backup strategy

A consumer grade backup setup was enough when you were only dealing with one computer. Now that you have many computers, it’s worth enhancing your backup strategy.

With 3-2-1 backup, your business has a minimum of three backups. Two would be onsite (but separate from one another) and the other offsite. We recommend the cloud. Having your backups in a unified location helps efficient recovery if disaster strikes. With cloud backup, your data is encrypted for storage in the cloud. You can set parameters for how often data is backed up and confirm that it is backing up correctly. Then, if something does go wrong, you can access essential data from anywhere, anytime via the cloud.

#3 Consider Cloud-based Accounting Services

Traditional small business accounting software requires a large database on the desktop computer. As more people need access to the database, the problems start. With multiple people accessing the accounting software:

  • The network can slow when people try to access it remotely
  • Changes can’t be made while someone else is in database
  • Data can get mismatched depending on who has the “newest” version

Cloud-based accounting packages address these challenges. With online accounting software, it’s easy for your business to scale. Business owners can connect to the data from any device with an Internet connection. Plus, in the event of a disaster, productivity won’t suffer as the information is safe and secure on the cloud.

#4 Outsource your IT

Your expanding technology allows you and your staff to do more than ever before. Great. But it also takes extra resources to monitor, manage, and secure it all. By outsourcing IT, your business gains IT expertise. Meanwhile, your in-house IT team can focus its efforts on driving growth.

Outsourcing IT also provides long-term cost savings by reducing downtime, cutting infrastructure costs, and improving security to avoid costly cyber-attacks.

Keep your business growth in check with an eye out for value-adding initiatives.

Want to know more about the benefits of any of these tech tips? Give us a call at (416) 645-2469, (905) 667-0441 or email us.   

Want to be notified when our next blog is posted, sign up here.

Are You Sick of Ongoing IT Issues?

Like a persistent cough or muscle strain that won’t go away, many IT issues prove ongoing. Every time they come back you think about getting an expert’s opinion. Then, the cough fades, you can walk freely again, or your computers are back up and running. You keep on going. Until the next time. If you’re sick of ongoing issues with your IT, look to a Managed Service Provider (MSP) for help.

There are many IT ailments that can negatively impact your ability to do work. Let’s consider some of the particularly common ones, and why an MSP is the right prescription.

#1 Network and Internet issues.

Business is done online these days. Not being able to connect to the network and slow connections are frustrating. Without the Internet, how can you do your job? You can’t even check and send emails! Let alone access team documents or enter data into cloud-based accounting software. A lagging network also slows down application and data loading time. It may only be a few moments of thumb twiddling. But add that up over several times a day and multiple by employees. You’re looking at a decrease in productivity that adds up.

An MSP has the know-how to survey the IT environment for what’s causing these frustrations. When there’s a problem, they’re at the ready to resolve it and help improve reliability.

#2 Repeated malware infections.

This can mean a couple of things. First, you don’t have effective system and application protections in place. These attacks shouldn’t be able to make it through the door in the first place. With the right firewalls, anti-spam, and protections, you should be able to keep your system on lock down. You don’t have to do this yourself. Your internal IT team has a lot to manage and monitor. Gain expert backup with an MSP reviewing your security protocols to keep the bad guys at bay.

Secondly, educate employees about the dangers of social engineering. Don’t let them keep falling for the pretexts and downloading malicious files. Also, ensure passwords are strong enough to avoid adding another point of entry.

#3 Printing problems.

Many businesses are printing less today, but we’re not done with hard copies entirely. So, when a printer starts whirring, spinning endlessly, or can’t connect, efficiency halts. Know that printers sold at big box stores are consumer grade quality. Avoid printer frustrations with solid business-class printers (which your MSP can identify).

#4 Application overload.

Maybe some of your employees prefer Dropbox. Others rely on their free Gmail accounts. This hodgepodge of options can cause chaos. Staff have difficulty remembering the passwords to all of the accounts they need. So, they simplify, and that makes their accounts more hackable.

Upgrading to business-grade versions of important applications is easier with an MSP. They’ll help identify the software that best addresses your business needs.

#5 Aging technology.

You’ve had your current computers for ages. They are slower than you’d like, but you don’t have the time to look for something else. Plus, you can’t imagine having to learn something new. You’re too busy. But aging tech is more likely to fail, which could prove catastrophic if you don’t have the right systems backup.

MSPs know IT. Based on your individual business needs, they can suggest a plan of attack to update the IT and keep it secure. They can also provide backup strategies to prepare for the worst and recover quickly.

Basically, a managed service provider has your back when it comes to IT. Work with experts who focus on technology day in and day out. You’ll typically save money and gain time to spend innovating in your field.

Gain a competitive advantage with the support of an MSP. Give us a call at (416) 645-2469, (905) 667-0441 or email us today!

Want to be notified when our next blog is posted, sign up here.

What Happens to Your Data When You Die?

Death is a morbid topic most of us try to avoid. Making a will and saying we prefer cremation is the extent of our advance planning. Yet, you may want to also think about what’s going to happen to your data.

Consider your digital footprint. You have photos, files, and emails on your computer and your phone. You’re also documenting your life on social media, and sharing on more than one channel.

Your wearable technology (say an Apple Watch or a Fitbit) may be recording information too. If you have a virtual assistant in your home, it’s recording your search history and saving that data on the cloud.

Yet many of us never think “what will happen to my data after I die?” Do you want it deleted? Are there digital assets you want to share? Perhaps there is tangible value attached to some of your digital assets. At the very least, some photos and videos that may have sentimental value for those who survive you. So, let’s explore advance planning you can do to protect your digital legacy.

Personal Files on Computer or Phone

Your personal devices are password protected. While necessary, this makes it more difficult for your survivors.

Now, they could physically pull the computer or phone apart if needed. But, it’s easier to have a copy of your passwords in a secure place for someone to access in the event of your death. Another option is to use a password manager. You can designate someone as your backup contact. They will be able to gain access to your passwords should you die.

Digital Media Collections

Often, when you click the “Buy” button, you’re not really purchasing that movie or music forever. Your contract with iTunes, for instance, was only for your lifetime. Your rights expire at your death.

Cloud Accounts

Consider the personal and private data you have in the cloud, such as Google or Microsoft’s Outlook. This might include calendars, emails, GPS, documents and financial information.

Google’s Inactive Account Manager lets you make plans for your account. You decide:

  • When Google should consider your account inactive
  • What it should do with your data afterwards
  • Whether to share account access with someone (providing email and phone number)
  • When or if your account should be deleted.

Microsoft won’t provide your passwords after death. However, via their Next of Kin process someone could be sent a DVD of the data in your outlook.com account.

Other cloud providers ask for proof of death and of legal right to access. In Dropbox’s case for instance, your survivors will need a court order. Even with all this, there’s no guarantee your personal data is completely removed from the cloud. It may exist in other data sets in system backups.

Social Media Accounts

Social media companies do not provide login credentials. Many require proof of identity and a death certificate to deactivate the account. Facebook and Instagram will “memorialize” your accounts. The public can’t see, but Friends or Followers can still view it and post memories. You can assign a legacy contact to look after the account or have it deleted.

You don’t want someone using your social account to send out spam or inappropriate photos. For instance, a sexy spam bot took over a New York Times media columnist’s Twitter after his 2015 death.

Plan ahead to protect your privacy and provide access where necessary. Think of the pain and heartache you can save your survivors by managing your digital legacy now.

Want to be notified when our next blog is posted, sign up here.

3 Steps to Securing Cloud Data

Businesses are no longer confusing “the cloud” with those puffy white things in the sky. For many, the cloud is a backbone business tool. Yet, some worry about storing their data on the Internet using cloud technologies. Consider these approaches to boost business confidence in cloud data security.

#1 Encrypt Business Data

The cloud is a lucrative potential target for cyber criminals. Many enterprises have turned to this technology. In North America nearly 60% of enterprises now rely on public cloud platforms. That’s a five fold increase over five years, according to Forresters’ Cloud Computing 2019 Predictions.

Some cloud service providers will promise to encrypt your data in transmission. Take this precaution further by encrypting data before it’s sent to the cloud. Encrypting data turns it into another form of code. Only the person with the correct password can decrypt it. If you use a modern encryption standard, it will be extremely challenging for a hacker to break the code.

Plus, encrypting on your end first ensures the cloud storage provider only stores encrypted data. So, if their storage gets hacked, or one of their employees goes rogue, they aren’t able to read your business data. That is unless they have the decryption password. Make sure the password is strong. Don’t be one of those people still using “password” or “123456789”!

#2 Have a Backup

Many businesses store data on the cloud as a precaution to have redundancy. Yet, it’s a good idea to have another backup copy offsite too. Just in case.

In some cases, businesses have migrated almost entirely to the cloud. All their software and files live on the cloud and they have no other copy. Don’t let this happen to you. We recommend the 3-2-1 backup strategy. This means, even for cloud-reliant businesses, having 3 copies of your data. One would be on the cloud. The other two (2) would be on different devices (e.g. on your local computer and on a backup drive).

#3 Know your Responsibilities

The cloud is a shared technology model. Partner with a cloud service provider with stringent security. At the same time, don’t count on the cloud provider to do everything. Clearly identify security roles and responsibilities. The Cloud Security Alliance reminds us that this can depend on the cloud model you’re using:

  • Software as a Service – The provider is largely responsible for security. After all, the user can only access the applications.
  • Platform as a Service – The cloud partner secures the platform. Your business must configure its own security for anything implemented on the platform. This includes securing the database, managing account access, and authentication methods.
  • Infrastructure as a Service – You’re responsible for everything built on the provider’s infrastructure. They will likely monitor their perimeter for attacks, but the rest is your job.

Cloud technology offers several advantages:

  • Enables IT to scale without investing in equipment, software, employee training, or taking up valuable office footprint
  • Offers peace of mind that data will always be available regardless of conditions at a particular business location
  • Provides up-to-date technology users can access from any device, anywhere, anytime – as long as they have an Internet connection

The cloud revolution has come. When you join the ranks of those migrating data to the cloud, do so with these safety suggestions in mind.

Need help securing your data? Whether you’re backing up locally or on the cloud, give us a call at at (416) 645-2469, (905) 667-0441 or email us.   

Want to be notified when our next blog is posted, sign up here.

Good relationships are essential to your business success.

Connections with customers, clients, vendors, suppliers, and service providers impact your bottom line. Here’s how to develop a strong relationship with your Managed Service Provider (MSP).

  • Improve efficiency and flexibility
  • Enhance security and compliance
  • Take a proactive approach to system maintenance
  • Reduce costs and enjoy predictable pricing
  • Gain access to new technologies

Along with overseeing smooth IT operations, the MSP’s experts can advise and consult. The following strategies can help you build a good relationship with your MSP.

Open the Lines of Communication

Transparency in the relationship can make a big difference. With a deeper knowledge of your needs, the MSP can better plan your technology solutions. Communicate goals and the direction you want to take your business. This lets the MSP collaborate to enhance your IT capabilities.

Invest the Time Upfront

As with any relationship that will stand up long-term, you’ll need to invest some time upfront. Taking a “pay and be done with it” approach will reduce the relationship’s value.

You don’t want a “one size fits all” IT solution from your MSP. To solve IT problems with a tailored solution, the MSP needs to understand your needs. They need to survey and access existing technology and understand your IT strategy.

This can seem counter intuitive. Why am I spending more time now talking about IT when the goal is to think about it less? Because this “getting to know you” phase is critical to a successful setup. Your MSP wants to provide a superior service. To leverage available tech, they need to know how to setup a solution that satisfies your needs. The good news is that once it’s up and running, your time spent managing and monitoring IT is dramatically reduced.

Review the Relationship

No, you don’t need to go to couples counseling together. Still, it will help your relationship with the MSP if you check-in regularly. Someone at your business should have scheduled updates with the MSP account manager. This is an opportunity for you both to explore what’s working and what’s not and discuss future plans. If you currently are using our MSP service and want to schedule an in person update, please call us at (416) 645-2469, (905) 667-0441 or email us and let us know.

Relationships grow and evolve. Laying the groundwork from the outset for a good relationship with your MSP. You’ll be glad you did. The better the relationship, the bigger the benefits to your bottom line.

Looking for a new MSP relationship to support your IT needs? Give us a call at (416) 645-2469, (905) 667-0441 or email us.   

Want to be notified when our next blog is posted, sign up here.

Stop the Inbox Insanity: Tips for Better Email Management

A staggering 269 billion emails are sent every day. Your business is receiving only a small fraction of those emails. Yet your staff likely feel as if at least 269 of those are coming their way daily. In fact, the typical employee in 2018 received 90 emails, and sent out 40.

Email is a powerful tool. But its help with doing business ever faster creates added business pressure. Consider these five strategies for better email management.

  1. Don’t start your day with email. Many people do. It’s how they set up for the day. However, beginning the day with a cup of coffee and clicking through your inbox, can backfire. Many of those emails become items on your to-do list. You put off important tasks from your day responding to other people’s requests. Plan your day around your business needs first. Even knock off some of the more important tasks, before diving into that inbox!
  1. Think twice about checking email constantly. It’s tempting to open emails as soon as they arrive. But, you only want to tackle your inbox when you have the time to take action. If you open an email planning to get back to it later, you’ll likely forget. When you have to revisit an email to remind yourself what it’s about, you’re doubling the time you spend on that message. Avoid interrupting your momentum by turning off email alert notifications and phone badges. Instead, set regular times to read and respond to accumulated emails.
  1. Write clear, concise emails. Avoid contributing to a colleague’s inbox chaos. Provide as much relevant information as possible. Now, that doesn’t mean writing a War and Peace-length email. Focus your message for your audience, anticipate questions, and answer in that email. Starting the message with an informative subject line can make a big difference too.
  1. Save time with reusable messages. You often end up answering the same questions over and again. Create templated emails that you can have at the ready to provide relevant details. Depending on your email software, this capability may be built in or you may need to add a plug-in.
  1. Use filters and folders to sort email. Learn how to use automatically filter your messages into the appropriate folders. For example, if the email is from accounting@yourbusiness.com then send it to your “Accounting” folder. This can save hundreds of hours a year. The better your folder system, the less time you’ll spend looking for specific emails the you need them. In Outlook, you can also set up a filter to change the color of email for different senders. Your boss could be red, and you’d know to handle that one first. Also save time by setting up strong filters for junk and spam. Unsubscribe from mailing lists that you don’t need any longer. Cleaning out the clutter can make your inbox much less overwhelming.

Email is an essential tool in business today. Don’t let it become a drain on your energy and attention. Make the most of the time you spend in your inbox with smart strategies for email management.

Need help selecting the right email or setting up useful mailbox management tools? Give us a call at (416) 645-2469, (905) 667-0441 or email us.   

Want to be notified when our next blog is posted, sign up here.