We had the opportunity to attend to the the Legislative Committee meeting hosted by the Naperville Area Chamber of Commerce and the topic was "US Department of Labor Overtime Changes"
The Rahje Woodward Law Office presented key interesting data about the final rule:
All above simply translates for the employer into new strong obligations in favor of employees that suddenly are entitled to get paid for overtime; this situation will force employees to opt for options like
From the legal and labor prospective, employers are urged to take action by
While the laws are intrinsically issued in lieu of better work conditions (which we welcome), if left unattended could pose serious burden to employers and companies and ultimately affect any work environment negatively.
So how can iEple help businesses embrace the new laws and use them as an opportunity to reassess the company, maintain (or even improve) profitability without affecting employee engagement? Here are iEple's 3 bullets of tech support:
2. Control "Off the clock" activities:
2.1 Implement automated reports based on employee computer usage: Affordable enterprise reporting solutions can read Active Directory logs and translate them into easy to read automatic reports you can review every week; investing 2 minutes a week you could spot behaviors that could be affecting productivity or generating unnecessary overtime. Your employees will not feel like being micromanaged as reporting occurs privately.
2.2 Assessment and implementation of group policies to prevent or track employee access to company data or email after hours.
3. Centralize off the clock data access with implementation of terminal services or virtual desktop environments when remote or "off the clock" work is strictly required, it is recommendable to have mechanisms that will help employees be more efficient and accurate with their time despite not physically being under management radar. A company managed remotely accessible desktop environment can help employees perform more efficiently and employers have peace of mind company data is safe and company policies fulfilled in an effective way.
Talk to an iEple representative and discover more technologies that can help you take the reins of your business and overcome new challenges from regulations while also empowering your employees with the right tools to perform their work and enjoy what they do.
Phishing is the most effective way hackers have nowadays to seed viruses and malware to corporate networks for the following reasons:
Can we avoid phishing emails?
In theory yes; spam filters are constantly looking for signs of phishing at the binary and heuristic level, however a good percentage of messages can still go through.
Another risk is the ability for users to review their spam folder; then phishing messages that may look "legit" can lead us to think it was sent to spam by mistake.
So here are our quick 4 things you and your employees should be trained to watch on every single email that comes across:
1. ALWAYS check full details of the sender:
The example above shows "Paypal" on the list of senders; just click on the details of the sender to reveal the real email address. In the example you can see it's not coming from Paypal at all.
2. DONT CLICK ON LINKS before you verify them:
If you are prompted to click on a link to "Verify" or "login" STOP and check that link. Simply hover the mouse on the text or button to reveal where they are trying to take you. In the example above notice how the link would take you to "service-infos.com" which is completely unrelated to Paypal.
3. DO SOME READING
Spammers take advantage of our global inability to pay attention to detail; we unconsciously validate information when we look familiar logos.
Honor your junior high grammar teacher's dream and notice language that you wouldn't expect from a professional. See the example above and watch for simple mistakes that simple don't look good with the context.
4. MIND ATTACHMENTS, scan them first
We receive attachments every day and technology give us the comfort to open them right from our email client or webmail page. Before opening the attachment ask yourself:
The most common attachment extensions are
The most common file extensions used for malicious software sent by email are:
Whether is a common file and coming from a trusted sender, always download the file, rather than opening them; then right click on it and select the option to scan with your default antivirus.
Again, any company should have a solution in place for Spam filtering and threat detection. If you don't it is time to get one. Call us to find out how easy is to implement and the many benefits your company will gain.
Thanks for staying with us so far, we hope this information is valuable. If you'd like to learn more about security for your business computers, managed antivirus and other ways we can help to prevent threats on your network, please contact us and we'll be ready to assist and provide guidance.
If you run a business with 25+ employees and your computers are over 4 years old, you are loosing productivity! and you know it when you hear things like this every day:
I had to reboot my system again
Your first thoughts circle around laziness, but deeply inside you know you are the one at fault; you need good computers for your employees and a 5+ year old pc is just not going to work; so, what can you do to improve your employees work environment without braking the bank?
As you know, replacing the entire computer fleet appears to be the only choice, specially when the market now offers high quality business workstations from the low $400's (like ieple's business computers) but if this option is still over budget, that question asked by your employee "Can I bring my own computer" may not be a bad idea at all.
Introducing iEple's BYOD equipment:
BYOD, according to Wikipedia, refers to the policy of permitting employees to bring personally owned mobile devices (laptops, tablets, and smart phones) to their workplace, and to use those devices to access privileged company information and applications.
But what about security of my data? you may ask.
Part of the success of this program, besides the immediate relief of minimizing costs, is the implementation of security; creating isolated, yet accessible virtual work spaces for employees to access their work tools and files through any device but keeping them from being able to copy company data back and forward to their own gadgets. Just like the image below but way less uncomfortable!
How do I get Started?
BYOD will work for any company that has or is willing to implement:
Hardware/Software alternatives and average costs:
In simple terms, A central computer will have a fully functional operating system that more than one user can access concurrently; all the processing power is provided by the central server so the employee devices become just an instrument to get into the system.
Once inside the system, all work is done within, No data leaks, no data exchange between the device and the office system. Even if the employee computer was infected, the enclosed work environment cannot suffer the effects of the threats.
What to do with the old computers?
You can order a recycling services provider to pick them up or they can be converted into thin-stations, a small safe piece of software gets installed on them so they can be used to access the powerful remote desktop server.
Which things won't work on BYOD
As you can see, BYOD is a great solution for your small and medium business; iEple can assist with your successful implementation, not only providing savings but actually increasing your profitability by regaining productivity and keeping your employees happier.
Visit our Store for pre-configured BYOD Servers at http://ieple.com/store
After turning on your USG Pro 4 for the first time, you navigate into it's default LAN ip address https://192.168.1.1, and under "Setup my Unifi Gateway" you clicked on "set inform URL" then added the address http://[your server]:8080/inform and then clicked OK.
You looked into your controller server and your new USG Pro 4 is not showing up on your devices to be adpoted so you go back and refresh your USG Pro configuration site https://192.168.1.1 to realize your settings didn't take.
This is a bug that as of today, even the most updated version 188.8.131.5243895 of USG Pro has not fixed yet.
Solution is quite simple, DO NOT waste your time trying to upgrade/downgrade java or your controller. You will find plenty of forums advising that. Here is the real solution:
1. Install Putty (get it quickly from https://ninite.com/putty
2. Open Putty and establish an SSH connection to your USG at https://192.168.1.1 (default user/password is ubnt/ubnt)
3. At the command line, type: set-inform http://[your server]:8080/inform and then hit enter
4. Go to your Controller and Adopt the device, then wait until the adoption process is finished. You will see the device does not come back online after adoption because the bug makes it loose the inform url again even after the adoption process, therefore, continue the guide as follows:
5. Verify the device is back up by navigating to https://192.168.1.1
6. Go back to your Putty Session and run the same command again: set-inform http://[your server]:8080/inform
7. Check on your controller to see if the device comes back online.
We hope this bug gets fixed in future firmware releases, but in the meantime, keep this guide saved to your bookmarks, you will need it each time your power-cycle your USG.
Please leave your comments, let us know how this guide is working for you but most importantly call us if you need assistance or support with other networking needs.
Here are the most common WiFi problems on small business that rely on their Internet Provider modem as the center of their network:
1. Devices not getting an IP Address
2. WiFi Connected but no internet access
3. Internet connects but takes long time to load
4. Weak signal bars in certain areas of the office
5. WiFi disconnects very often:
As more and more business implement BYOD "Bring your own device" they come to realize that in lack of a solid network infrastructure, it feels more like BYID "bring your internet down". So why does this happen?
As said before, most small businesses rely only on the modem installed by the Internet Service Provider. Which could work for 1 or 2 employees but once you connect several devices (wired and wireless) the so called "business class" modem just can't handle it.
Each modem has a complex combination of different services that are normally handled by a server:
Now that we have identified the problem, let's talk about the solution: at iEple, we focus on providing small and medium business with solutions that are designed to sustain large corporations but keeping the pricing affordable.
At iEple Business Computer Services
Our standard network deployment for small and medium business includes:
Sounds like a lot of hardware but in reality some times it only requires two devices and believe it or not there are options that start in the lower $100's yet capable of fulfilling the job when professionally installed and configured.
Call us or reach out in any way you prefer and discover the benefits of having professionals with corporate and enterprise background setup your business with the latest technology at affordable prices.
Deploy dozens of computers in minutes with iEple's BioGreenPC
Enterprise I.T. Support for ALL