Blog

July 18th, 2014

Virtualization_July14_BVirtualization is the act of moving a physical component or bit of software from a physical environment to a digital one that is normally delivered over a network. This concept has become one of the most sought after tech improvements of the past decade, especially among small to medium businesses. The only problem is, virtualization is complex and carries with it some confusing terminology. To make things easier, we have created a glossary of ten common virtualization terms.

1. Virtual Machine (VM)

You will often hear virtualization experts bandy about the term VM. What they are talking about when they say this is the Virtual Machine. The VM is essentially a virtual representation of the computer on your desk. It can do everything a physical machine does, only everything is virtual and usually delivered over a network connection.

Because VMs are software based, you can often run more than one VM on the same physical machine. This could equate to having say two separate versions of Windows running at the same time, or even running a different operating system, say Windows on your MacBook.

2. Virtual server

A specific type of VM, in this case a server, that is running in a virtual environment. A common setup many offices employ is to have one physical server on premise. This server then hosts separate virtual servers that in turn host different services like email, networking, storage, etc.

Other businesses choose to rely completely on virtual servers. This is where another company hosts the servers which are delivered to you over the Internet. To the computers and users it appears the servers are there on your network, and can be interacted with normally when in truth, the servers are actually virtual.

3. Virtual desktop

Much like the virtual server, the virtual desktop is a specific type of VM. In this case, it is a virtually delivered version of an operating system like Windows, Linux or even OS X.

Since the advent of virtual desktops, the idea that companies have to stick with one type of operating system has started to become irrelevant. For example, if you own a Mac and need to access a Windows only program, one solution is to use a virtual version of Windows. If you have access to one, you will be able to run Windows from your Mac without having to physically install it on your computer.

4. Hypervisor

The hypervisor is essentially a small operating system that enables virtualization. Its job is to take physical hardware resources and combine them into a platform that is then delivered virtually to one, or many different users.

5. Host system

The host system, also referred to as the parent, is where the physical hardware and software is installed. These physical components are then copied by the hypervisor and delivered in a virtual state to the user. If you are creating a virtual desktop environment, then the host system will have the desktop's OS installed on it, along with the necessary software.

6. Guest system

The guest system, also referred to as the child, is where the VM is accessed. To carry the example on from above, the OS that is installed on the host machine is replicated by the hypervisor and the copy is then delivered to the user.

The user can interact with the OS just as they would with the physical host machine, because the guest system is an exact copy of the host. The only difference is, the guest machine is virtual instead of physical.

7. Virtual Infrastructure

When you combine a bunch of different types of VMs together into one solution, including hardware, storage, desktops, and servers you create a virtual infrastructure.

This can then be deployed to businesses who are looking for a completely virtualized solution. The easiest way to think of this is that your whole IT infrastructure is combined into one solution and virtualized. Many companies look for a solution like this because it reduces the need for on-premise hardware, while making it easier for an IT partner to manage.

8. P2V

P2V, or Physical to Virtual, is a term used by IT experts to refer to the act of migrating a physical system to a virtual one. The most common example of P2V is the merging of physical servers into a virtual environment that is hosted on one server.

9. Snapshot

A snapshot is an image of the state of the virtual machine at a specific point of time. This includes all of the data, configurations, and even windows or programs open at that time. Snapshots are used kind of like the Save button on video games - it saves your progress. When you next load up the VM, you will get all of your data, programs, and configurations back.

Snapshots are also kept in case something goes wrong with the VM. You can easily revert back to an older snapshot, one that was taken before the problem.

10. Clone

The action of taking one VM and creating an exact copy that can then be used by another computer or user.

If you are looking to learn more about virtualization, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

July 17th, 2014

BCP_July14_BThere is a good chance that you would like to see your business survive any future disaster, and any problems that follow as well. While it is nearly impossible to predict what the next disaster will be, it's easy to prepare for, especially if you have an effective business continuity plan. When it comes to these plans, there are many key metrics you need to be aware of and the most important two are RTO and RPO.

While both RTO and RPO are important elements of continuity plans, and they both sound fairly similar, they are actually quite different. In this article we define RTO and RPO and take a look at what the difference is between the two concepts.

RTO defined

RTO, or Recovery Time Objective, is the target time you set for the recovery of your IT and business activities after a disaster has struck. The goal here is to calculate how quickly you need to recover, which can then dictate the type or preparations you need to implement and the overall budget you should assign to business continuity.

If, for example, you find that your RTO is five hours, meaning your business can survive with systems down for this amount of time, then you will need to ensure a high level of preparation and a higher budget to ensure that systems can be recovered quickly. On the other hand, if the RTO is two weeks, then you can probably budget less and invest in less advanced solutions.

RPO defined

RPO, or Recovery Point Objective, is focused on data and your company's loss tolerance in relation to your data. RPO is determined by looking at the time between data backups and the amount of data that could be lost in between backups.

As part of business continuity planning, you need to figure out how long you can afford to operate without that data before the business suffers. A good example of setting an RPO is to imaging that you are writing an important, yet lengthy, report. Think to yourself that eventually your computer will crash and the content written after your last save will be lost. How much time can you tolerate having to try to recover, or rewrite that missing content?

That time becomes your RPO, and should become the indicator of how often you back your data up, or in this case save your work. If you find that your business can survive three to four days in between backups, then the RPO would be three days (the shortest time between backups).

What's the main difference between RTO and RPO?

The major difference between these two metrics is their purpose. The RTO is usually large scale, and looks at your whole business and systems involved. RPO focuses just on data and your company's overall resilience to the loss of it.

While they may be different, you should consider both metrics when looking to develop an effective BCP. If you are looking to improve or even set your RTO and RPO, contact us today to see how our business continuity systems and solutions can help.

Published with permission from TechAdvisory.org. Source.

July 17th, 2014

iPad_July14_BMobile devices and the apps we use on them have drastically changed the way we communicate. With platforms like Facebook, many people are simply not calling each other anymore, instead relying on Facebook's messaging feature. In an effort to make this easier to use on mobile devices, especially the iPad, the app has recently been updated.

Facebook Messenger on the iPad

Over the past few months, Facebook has been set on separating the two main functions of their platform - at least for mobile users. What this had led to is two separate Facebook apps, with the main Facebook app being just for social media functions, and a stand-alone app for its popular messenger service.

Up until now, there has been one version of the Facebook Messenger app for iOS, and it was optimized to smaller iPhone screens, meaning if you used it on iPad, it looked a little weird. In early July 2014, Facebook set about fixing this by releasing a new update to the app, which brought full support for the iPad's bigger screen.

When you download this app onto your iPad, you will have the same functionality as the other versions, including the ability to call people, send group chats, share photos, and best of all message people.

Where to get the app

It may seem a bit odd to have a separate app just for messaging on Facebook, but it can be useful for businesses who use this form of communication. Essentially, the app makes it easier to use just the messaging features without having to deal with the full social media aspect of the platform.

If this sounds like a useful app, you can download it from the iTunes Store for free.

Using the app

If you have not used the app before, it may take a bit of time to get used to it and to set it up. When you first download and open the app you should be asked to log in using your Facebook account. You should then see your contacts pop up with recent messages at the top.

Tapping on a chat will open the window with your message history and standard messaging abilities. You can scroll through your different chats on the left and view these by tapping on them.

At the bottom of the main chat history window you should see a number of buttons:

  • Recent - The default view, showing recent chats or messages in chronological order with the newest being at the top.
  • Group - Shows only your Group chats, again with the most recent messages at the top.
  • People - Brings up your contacts so you can start new messages. Simply search for a contact and tap on their name to start chatting.
  • Settings - Opens the Settings panel, allowing you to change various features including the alerts that are shown when you have a new message.
One potentially useful feature the app offers is the ability to call people directly from the chat window. If you open a chat, you should see a phone icon at the top-right of the screen. Tapping this will allow you to call the person you are chatting with, and if they also have the Messenger app installed, the call will be free. If the other person doesn't have the app installed then you will get a message saying that carrier rates may apply.

Looking to learn more about using Facebook on the iPad? Contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic iPad
July 16th, 2014

AndroidTablet_July14_BThe tablet is easily one of the most indispensable devices for many business managers and owners. These highly mobile devices allow you to stay in touch with the office and also work without having to lug around a heavy or bulky laptop. Because of this, many businesses are looking to integrate tablets, especially Android tablets. In order to help make things easier, here are some dos and don'ts when using Android in the office.

Do:

  • Use separate profiles - Tablets that use newer versions of Android (4.3 and newer) have a unique feature that is incredibly useful for business users: You can set up more than one account on the device. This means you can have a personal account and a work account on the same device without the two crossing over. Each account has their own apps and layout, which makes it perfect for the BYOD crowd.
  • Pick responsibly - Android tablets come in all shapes and sizes, and with different versions of the operating system. It is therefore a good idea to do some research before you buy one for your business. Take the time to try and identify what you will be using the device for, what features you would like, and most importantly, if the device is compatible with your existing systems. We strongly recommend going with one of the big name brands like Samsung, LG or Acer, or the Nexus line.
  • Develop a usage and management plan - Before you implement the device into your office, be sure to develop a plan on how the device is to be used and managed. Will each employee be in charge of managing their own device, or will your IT partner manage them for you? Be sure to also develop a list of approved apps, including important ones like email and messaging; and that users are familiar with how to use them.
  • Look into accessories - One common factor many businesses forget to look into when implementing Android devices is the numerous accessories available for tablets. In order to extend the life of the devices it is a good idea to get protective cases and screen covers. Also, look and see if the device you have chosen has a removable battery or SD card. If it does, you may want to invest in extra batteries and cards.

Don't

  • Skimp on security - As Android tablets become more popular, the devices are seeing an increase in malicious attacks. It would therefore a good idea to implement mandatory security measures on all devices. This includes an antivirus scanner and daily check for app updates. Also be sure to educate the staff who will be using the device on common security issues, such as how to spot fake apps, use an antivirus scanner, and how to enable secure browsing on the Web.
  • Allow third party app stores - Because of the openness of Android, you can install apps from almost any location. This has resulted in many third-party app stores (stores not run by Google) popping up. Some of these stores host any kind of app, including ones that contain malware. So, it is a good idea to just outright ban these stores; only allowing apps from Google Play to be installed on devices.
  • Force the tablet on users - Some employees won't want a tablet, preferring instead to stick with their laptop or desktop. Don't force your employees to adopt the device if you know they won't use it. This will just lead to you wasting your tech budget and to unused devices.
  • Worry about fragmentation - Yes, Android is very fragmented - devices are running different versions of Android. While this may seem like a big deal, it doesn't have to be. We recommend that when selecting tablets, pick a newer version of Android and purchase tablets using the same version. Once you get used to the tablet, the issue of fragmentation will usually disappear, especially if everyone is on the same version.
If you are looking for help selecting and managing an Android device for your office, contact us today to learn about how our services can help.
Published with permission from TechAdvisory.org. Source.

July 16th, 2014

Office_July14_BOne of the most important elements to any superhero is a great alias that protects their true identity. From Clark Kent to Bruce Wayne, almost every comic book hero has one. When it comes to businesses however, it would seem like an alias is less important. That being said, there is a useful alias feature on Outlook.com that you may want to find out about.

Outlook.com's alias management feature

If you are using Outlook.com, chances are high that you aren't a spy or superhero and in need of a top-secret alias. There is a good chance however that you may have need for more than one email address.

Maybe you attend a lot of conferences or events and would like a way to keep your main email inbox from being flooded with the usual "nice to meet you" emails and follow ups; or perhaps you are launching a new product associated with your name and would like a way to easily track communication directly related to this one product.

If this sounds like your situation then Outlook.com has a great feature that allows you to create up to 10 new email addresses, or aliases, and manage them from your main account's inbox. The main idea of an alias email is that you get a different email address that is tied to your main account. Your aliases share the same contacts, calendar and even account settings with your primary account.

What's more is you can actually sign into your account using any alias, because the same password is used for every address you create. When sending an email, you also get to pick which alias the message will come from, which is undoubtedly a really useful feature.

How to create an Outlook.com alias

To create an alias email address:
  1. Log into Outlook.com with the account you would like to set as your main or primary account.
  2. Press the Settings icon which is the cog located at the top-right of the screen.
  3. Select Options followed by Create an Outlook.com alias in the window that opens.
  4. Type in the email address that you want.
  5. Click Create an alias.
  6. Untick the box in the pop-up. If you don't, the alias you set up will be set as the primary email address.
  7. Click Done.
When you are sending an email, you should now be able to click your name at the top of the email window which will drop down a menu with your aliases. Click on the alias you would like to send the email from, and you should see the name change. Any responses to that message will be made to the alias email address as well.

If you are looking to learn more about Outlook.com or any other Office program contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

July 15th, 2014

Office365_July14_BWhen people send files as attachments, they’re often looking to collaborate with others for feedback and improved work quality. This, however, has been a time consuming process up until now. For example, when you send an email to your colleague, they must download the file, make their edits, re-attach the file to a new email and then send it back to you. All that ends now, for Outlook Web App has just introduced new features that will help simplify your email tasks while enhancing collaboration.

Side-by-side view of documents and email

When your colleague sends you a document to review, you’ll see the document attached in an email in your Inbox. When you open the attachment, you can now see the contents of that document within the email itself. No more flipping back and forth between windows to get the information you need.

Files supported for viewing in this new feature include Microsoft Word, Excel, PowerPoint files, most types of image files and PDF files. You can perform all of the standard messaging actions right from within this unified view making it easy to review information in the email alongside the attachment itself.

Easy document editing and reply

What do you do when you want to edit the attachment in your email? You download the attachment, make your changes, re-attach the file and send your reply. Now you can say goodbye to all that hassle. With the new side-by-side view, all you have to do is simply click Edit a Copy right above the attachment and message.

When you do this, a draft reply-all message is created for you to store this new edited version of the attachment. Then, a new editable copy of the attachment you received is created and renamed with your name at the end of the filename. This way you can differentiate the new copy of the file from the original one. The new copy of the attachment is live, meaning any changes made are automatically saved. Once you're done editing, simply type a response in the email and click Send. Types of files supported for editing include Word, Excel and PowerPoint files created in Microsoft Office 2007 and above.

Additional enhancements

In addition to the side-by-side view and edit-and-reply enhancements, the attachment user interface has also been updated. Now when you attach files, the overview is bigger and better looking. You can also now download multiple attachments at once in the form of a single zip file, making life a tad easier.

While Outlook Web App's added features might not be a total game changer, you can be sure that the next time you’re looking to collaborate, you’re able to do so faster and easier. Want to learn more about Office 365 and its apps? Contact us today.

Published with permission from TechAdvisory.org. Source.

July 11th, 2014

Hardware_July07_BWe’ve explored how Mac and PC differ in terms of specifications, operating system and software; and in this article we continue to dig into other differences between the two rivals. Buying a computer is more than looking into design and specs, but also about models, availability, security, customer satisfaction and of course price.

Models

Apple offers five computer lines comprising of the Macbook Air, Macbook Pro, Mac Mini, iMac and Mac Pro. This limited selection is not a sign of weakness but a part of the company’s 'less is more' approach to marketing.

PCs have a larger variety to choose from, with industry giants such as Acer, Asus, Dell, HP, and Lenovo, who offer numerous configurations of both desktop and laptop models. This can be beneficial in helping you find a specific computer that meets your needs.

Availability

When it comes to third party retail stores, Apple is more selective than PC manufacturers about where it sell its products. As of April 2014, Apple has 424 retail stores in 16 countries and an online store available in 39 countries. However, Macs are still not available at many stores that sell PCs.

PCs are the most numerous and popular computers out there, and can be found at every store that sells computers, except for Apple stores. This makes it easier to find PCs, especially if you don't live near an Apple store.

Security

With the vast majority of computers running on Windows, most attacks focus on PCs. Malware like Trojans, which trick users into installing the software by pretending to be a useful program, or botnets, are common to PCs, but rarely harm Macs.

This doesn’t mean that Macs are 100% secure. As Macs become more popular, threats are increasing. Nonetheless, a Mac user is still less likely to be a victim of successful attack than a PC user.

Customer satisfaction

Recent surveys conducted by PCWorld and PCMag revealed that personal users choose Mac over every single brand of PC available. Businesses on the other hand still prefer to stick with PCs.

While Apple does score high on many surveys, especially because of the value placed on face-to-face service, there are a number of PC manufacturers that offer a comparable service. Also, there are more smaller repair shops that offer unrivalled customer service.

Price

One of the most cited differences between a Mac and a PC is price. Generally speaking, Macs are more expensive than PCs due to their preference of building products around higher-end computers with more costly components. The cheapest Mac computer is the Macbook Air which starts from USD$899, while various models of PCs can be found at a much lower price.

Mac and PC both have strong and weak points. It’s best to try both and see which is the better tool for you and which will cover your business needs. If you are looking for a new system, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Hardware
July 10th, 2014

Security_July07_BAs technology continues to expand and improve, many people have come to prefer to use their own systems over their office's tech offerings. This is largely because many of us have newer personal devices that allow us to do so much more than the computers we use at our office. As a result, the issue of BYOD (Bring Your Own Device) has become far more important, especially due to the fact that if left unchecked, BYOD could pose a security risk to your organization.

What should I do about BYOD?

The first reaction of many office managers and business owners, worried about security threats that could stem from BYOD, is to impose an outright ban of devices. While telling your staff they are not to use their devices for work may seem like a quick and easy solution, you can be 100% sure that there will be employees who ignore this policy and use their personal devices for work regardless.

This could put your business at a higher security risk if the rule is ignored, especially if you don't implement any security measures to protect your networks and data. In order to minimize the potential threats BYOD can expose your business to, we suggest you do the following:

1. Consider embracing BYOD

Instead of simply banning personal devices in the workplace take a step back and look to see if there are any benefits BYOD can offer. For example, if you operate on razor thin margins and have not replaced hardware in years, there is a good chance your employees will have better systems at hand. This could help you reduce your overall tech costs.

The same goes for phones for your employees. Why not offer to pay for the plan and allow employees to use their own devices? Of course, you are going to want to implement security measures and usage rules, but if this is easily achieved then it may help reduce your overall operating costs. Before you do implement a system like this however, we strongly recommend you read the rest of this article and follow the steps below.

2. Set up separate networks for employee devices

Oftentimes, the main reason employees bring their devices to the office and use them for work purposes, especially when it comes to mobile phones, is because they can happily connect to Wi-Fi for free without using their data plans throughout the day.

Chances are high that because they use the work Wi-Fi on their device for non-work tasks, they simply keep using the device when they are doing work related activities. This could pose a security risk, especially if you run business-critical operations on the same network. You could nip this potential problem in the bud and simply install another Wi-Fi network for mobile devices and non-critical business processes.

It is usually quite affordable to simply purchase another line and the networking equipment to support this, not to mention the fact that it will keep business-critical processes secure from errant malware. As an added bonus, you will likely see increased productivity because the bandwidth demand will be limited, so important data will move quicker.

3. Educate your staff about security

In our experience, the vast majority of BYOD related security risks are exposed by mistake. An employee may have a virus on a personal phone and be unaware of it. When they connect to the network it can then be unintentionally spread to other computers resulting in a potentially massive security breach.

One of the simplest ways to prevent this is to educate your employees about proper mobile safety. This includes how to spot apps that could contain malware, sharing security threat updates, and teaching your employees how to secure their devices. You really need to stress just how important security is to them.

On top of this, contact an IT expert like us for a recommended anti-virus and spyware scanner for mobile devices that users can easily install. Encourage employees to not just install this but to keep it up to date too. Many of these mobile specific scanners are free and just as powerful as desktop versions.

4. Work with an IT partner to establish a solution that works for you

Beyond education and simple network establishment, it is a great idea to work with an IT partner like us. As experts, we keep tabs on the trends and solutions related to BYOD and will work with you to establish a program that works for your company.

It may be that you don't actually need to integrate BYOD but to update hardware or software to newer versions instead. It could be that there is a simple solution to employees feeling frustrated with slow performance of existing systems at work.

If you do implement BYOD, we can help establish security measures and policies that will ensure your networks and employee devices are secure. The best advice we can give however, is to do this before you start allowing BYOD, as it can be far more challenging to implement and enforce changes when employees are already using their devices at work.

Looking to learn more? Contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
July 9th, 2014

Web_July07_BFiles and folders on any device are among the most essential parts of the overall operating system. Many business owners and managers go to great lengths to keep these organized and easy to find. This is easy to do on desktop and laptop computers, but on mobile devices, such as the Windows Phone, it's somewhat more challenging. In an effort to make this easier, Microsoft has recently released a new app for Windows Phone users.

About the Files app for Windows Phone 8.1

In late May, Microsoft posted an article on their Windows Mobile blog announcing that the Files app had been launched. The idea behind this app is that it allows easier viewing and managing of files and folders on your Windows Phone.

With this app you can:

  • Browse for installed files
  • Arrange files into folders
  • Move files or folders from one location to another
  • Open or search for files
  • Change the name of existing files
  • Share individual or multiple files with other users
While this app is a welcome development, there is one feature that makes it great: It allows you to also access and manage files on your device's SD card - if it has one. This means you no longer have to connect your Windows Phone to your computer in order to manage your files. You can do so directly from your phone.

Where can I get the app?

If you use your device for work we strongly recommend that you install this app, especially if you store files on your device. Find the app on the Windows Phone Store for free. Simply click the Install button in the left-hand ribbon of the page and select your device. You need to be signed into the Microsoft account you use on your phone. You can verify this by looking at the top-right of the page and hovering your mouse over Explore. If you are not signed in hover over Explore and click Sign-in. Enter the username and password of the Microsoft account you use on your phone and you should be able to install the app directly from your browser.

Alternatively, you can install the app directly to your device by:

  1. Going to the Windows Phone Store app on your device.
  2. Searching for Files.
  3. Tapping on the Files app icon (blue square with a white document icon).
  4. Pressing Install.
The app should start to download automatically and install a new tile on your home screen.

Using the Files app

To manage or view the files and folders on your device, simply open the app. You should see a screen open with the option to either look at the files on your Phone or SD card - if your device has an SD card installed.

When you tap on either Phone or SD card, you should see the file structure pop up. Scrolling up or down and tapping on files or folders will open them. If you tap on the square box beside each file you will see a number of options pop up at the bottom of the screen. Pressing the related icon will allow you to interact with that file. For example, if you select a file and press the Trash Can icon, the file will be deleted. You can select multiple files at the same time by simply tapping on the white boxes before hitting any of the action buttons.

If you are looking for a specific file, make sure you don't have any files or folders selected and press the magnifying glass icon at the bottom of the screen. Enter the name of the file or folder you would like to find and it should pop up below the search bar.

Looking to learn more about using Windows Phone in the office? Contact us today to see how our services can help.

Published with permission from TechAdvisory.org. Source.

July 4th, 2014

BusinessValue_June30_BIn the first part of this article, last month, we began to take a look at the content companies create for social media and how they can go about not only getting it shared but also increasing the overall shareability of the content they create. From creating longer blog articles, to using images, and playing on certain emotions, we shared five useful content sharing tips. In this month's article, we look at five more tips that can help ensure your blog articles and content are more likely to be shared via social media.

6. Lists of 10 items are great

One of the most popular forms of blog article written these days is the list article. These articles usually cover three to more than 20 items or tips related to one central topic. Articles of this type are popular because they are not only quick to write, but are also quick to digest as they can be broken up into easy-to-read sections - perfect for those who scan articles on their mobile devices.

With so many lists out there, it can be tricky to nail just how long your list of tips, ideas, etc. should be. From social data pulled by social media experts over at BuzzSumo, it appears that articles with 10 list items get the most shares. It is therefore a good idea to strive to reach 10 points when creating this style of list article.

Some articles however can get quite lengthy, even with 10 items. One strategy might be to separate the list, like we have with this article. Of course, shorter lists can work well too, especially if these include powerful tips. We suggest trying to aim for 5-10 items when you are writing your list articles.

7. People share what they trust

This has been an age-old truth: people go with companies they trust. It has been proven time and again that users will often follow what their friends and people they trust recommend. What this translates to when it comes to the shareability of your articles is that the source of the content needs to be trustworthy.

This can be difficult to establish, especially if you are a new business or new to social media, One of the best ways to achieve this is to include bylines and author bios on your articles. Putting the name of the author (byline) at the top of an article and a brief bio at the bottom will help increase the legitimacy of the article in the eyes of the reader, increasing their trust levels over time,

Another quick way to increase legitimacy is to share an article on specific social networks. Your first thought is likely to be to share away on Facebook, but think about how Facebook is used - people generally share everything, even if it's not trustworthy. Instead, look to the more professional networks like LinkedIn and Google+. Generally, people on these platforms build more professionally oriented networks, often built on trust.

By sharing an article with a byline and bio with your groups in LinkedIn you can quickly build trust, especially if you are active within your network. Once people start to trust your content, there is a higher chance they will read it and consequently share it too.

8. What's old can be new

Have you ever followed a post on Facebook, or any other social media? If you have, you likely know how short of a lifespan content has - when it comes to shares at least. Almost all content posted on social media sites has a lifespan of about three days to a week at most. What do we mean by this? Well, normally after three days you will see the number of interactions - shares, likes, etc - drop by as much as 98%. Go beyond three days and you will usually see another huge drop in the number of shares from the three day mark.

Essentially after three days to a week, your content will likely not be shared or even seen. Most of us know this, and are often quick enough to produce more content and posts in order to keep followers engaged. However, some content can actually be re-shared to keep up or to further interest.

Not all content - articles included - can, or should, be reposted, such as time relevant content like an announcement. Reposting these three weeks after the fact likely does not provide any value to the reader. Content that is written to be always viable however e.g., tip articles, how-tos, etc. are great potential content for resharing.

Some information never really gets old and can be useful to a new audience. Resharing previously posted content like this ensures more people will see and interact with it. For best results, try promoting an article you think was useful about one week after you first posted. Also, be sure to look at season or holiday relevant content - there is a good chance this can be reposted at the relevant time.

9. Know when to share your content

Often, the most important key to increasing the shareability of your content is actually posting it when your desired audience is online. By posting at, or just before, these key times, you increase the chance of the content being seen and interacted with. While there is no set timeframe, you can figure out when best to post through trial and error.

Before you start however, look at your previous content and see when it was interacted with most. Take a look at the days and times, and track this for a few weeks. You should start to see a trend emerge, with the most interactions happening at a certain time and date. Also, apply a little common knowledge. For example, if your target audience is other business owners or managers, posting midday will likely mean content will be missed. However, posting after normal business hours could improve your chances.

From here, try posting content at different times to see what works, and adjust your schedule accordingly.

10. Realize this will all take time

When looking to improve the reach of your content, you need to realize this will take time. Even if you follow these tips, you won't see immediate results. Chances are high this will take months to pay dividends. The key here is to stick with it and to experiment. Try a few different strategies at a time to see what works and doesn't, then go back to the drawing board and improve your plans.

If you are looking to learn more about leveraging social media in your business, we may be able to help. Contact us today for a chat.

Published with permission from TechAdvisory.org. Source.