How to Keep Your Employees Engaged This Summer

How to Keep Your Employees Engaged This Summer

Hot summer days and vacations, is your staff disengaging this summer? Disconnected employees are 37% more absent, 18% less productive and 15% less profitable. Don’t let this hurt your company’s culture and bottom line.  Here’s a few things you can do to keep employees engaged this summer: #1: Host a company picnic with a “thank […]

How to Secure Your Data When Using Subcontractors

For today’s tech tip, I want to talk about ways that you can share data and keep it under control whenever you’re using an outsourced third party. For example, a broker who has multiple number of real estate agents that work underneath him. Stay tuned.
Specifically, I want to talk about how you secure files in two different industries. It’s really going to have a much broader application, but if I say to these two industries I think you’ll get the point.
So first off, I met with a person that does private investigations. They outsource certain parts of the private investigation, such as the videoing. Let’s just say that this is for a company and they’re looking for fraud in workers compensation. So this person gets a job with a particular insurance company, and then they’re outsource the work to a third party investigator who goes out to film and maybe even kind of follow the person around to try to catch them doing something. You know, they say they have a bad back but are caught throwing a cast net or something. The second is in the real estate industry where a broker is using real estate agents in order to sell property. Both of these categories have very sensitive data that’s being exchanged. And what you don’t want to do is you don’t want them using their personal email accounts. You don’t want the subcontractor using their personal Dropbox accounts. You don’t want them passing this information on their equipment with no backup and no way to log where these files are.
It’s almost like you’re just taking these very sensitive files that are ultimately these business owners, this broker and the head of this investigation firm, they’re responsible for these files and they’re just letting them be cast wherever with no tracking or anything.
So what you do want to do and this is the part I really want you to hear me say. You can use something as easy as Microsoft 365 configured in the proper way. Set up a domain and allow the Microsoft 365 platform to put the security parameters around there for you. First of all, use a corporate email address for all of those transactions that has that Personal Identifiable Information or private information in it.
You need to have that filtered so that the links are being checked, the attachments are being checked, and the spam is being blocked, as well as the ability to send secure email. Because if you don’t give your people away to do that, they will never do it. Or if they do, they’ll do it in a very dangerous fashion. And then secondly, you want to make sure that is backed up so that if you got sideways with that employee, they couldn’t delete everything and you not know what’s going on. So you need that Office 365 tenancy backed up. You can also share documents and communication by using Microsoft Teams. So you’ve got a secure channel that will work on a computer. It’ll work on a mobile phone or a tablet. So you can securely share and track the files that are in play there. And really, when you look at how teams work, it is basically going into the person’s one drive that is ultimately on SharePoint so that you could have access to these files even via the web.
So there’s some really great ways that you can do this that will actually enhance the overall performance of the organization and keep you legal. If you got more questions, I’d be happy to help, but don’t let a challenge like this put your company at risk. Thank you for watching.

What Is A Technical Business Review?

For today’s Tech Tip Tuesday, we’re going to be talking about a Technical Business Review. What it consists of and why you should be doing it on a systematic basis in your business, to keep you working most effectively.  What is a Technical Business Review why should your company even be concerned with those things? […]

Attrition Planning 2022

https://youtu.be/mAM3aXmY7Ho For this Tuesday Tech Tip, I want to help you with your 2022 planning for employee attrition this is something that is affecting every business owner that I know. And I’ve got some ideas that I think can help you. As you probably already heard, one of the biggest stories of 2021 has been […]

What Are File Permissions?

https://youtu.be/9d75lm62BXM Today I want to talk to you about file permissions and the need to review those on a periodic basis. These are ultimately just files that you create on your computer. Many times, the files are on what we call a network share. The files are under the Q drive or the Z drive. […]

4 Reasons To Use Microsoft 365

https://youtu.be/4owOrcyMRAA Hi. Philip Long, CEO of Business Information Solutions today I want to talk to you about four reasons why you should consider Microsoft 365 for your organization.  Here are the four reasons why you should consider adding Microsoft 365 to your business and how it can benefit you. Reason number one is Microsoft Exchange. […]

6 Productivity Tips for Microsoft To-Do

6 Productivity Hacks for Microsoft To-Do

If you’re looking to improve your productivity, sometimes it’s best to get back to the basics. A simple to-do list is a highly effective way to plan and prioritize your daily tasks to determine what’s most important – and what can wait until later. As a pioneer in productivity, it’s no surprise that Microsoft has […]

The Theory of Constraints

This blog is designed to further explain The Theory of Constraints and define some of the processes and applications for discovering and solving the constraints in a business setting.

5 Keys to Building a Better Team at Work

One of the biggest challenges for any entrepreneur or business person is what Gino Wickman; author of the book Traction, calls “Letting go of the vine.” This simply means to trust those around you more and put responsibilities on others. There is a very important step before this is prudent, and that is to surround […]

9 Steps to an Effective Cyber Security Plan

There is not a day that goes by that you do not read in the paper or hear on television that some company has been the victim of Cyber Crime. The alarming thing is that for every incident that you hear about there are probably six more that have happened that you don’t hear about. […]