Blog

January 22nd, 2015

Web_Oct27_CAs a business owner you likely don’t have time to sit down and learn all the terminology associated with the cloud when you are looking for a new solution. Because this is a rather complex topic, with experts often throwing around confusing terms, it is easy to be overwhelmed. To help, here are some simple definitions for 10 common cloud terms.

1. Cloud app

A cloud app, or cloud application, is any application that is supported by a cloud service, or is accessed over the Internet. The key difference from other apps is that the vast majority of cloud apps are not installed on a device, rather they are accessed via a Web browser.

Some mobile apps are cloud-based, whereby an app is installed on the device and allows you to access data that is stored in the cloud.

2. Cloud burst

Cloud burst is a term used to reference a specific setup that many companies employ. Essentially, this is the idea of implementing a private cloud solution that provides for most usage requirements. When demand exceeds capacity, the company can integrate a public solution to cover the excess demand thereby “bursting” into another cloud.

A good example of this is when a company uses a private cloud solution to store data. When the threshold for maximum data storage is reached, they can implement a public cloud solution to increase overall storage. All essential information stays in a private cloud, while non-essential information is moved to the public cloud.

3. Cloud

The cloud is any service or solution that is delivered to a user via their Internet or network connection. To many, this term has come to be associated with the Internet.

4. Cloud management

Cloud management is often used to refer to a set of software or administrative panels that are specifically designed to allow business managers, owners, and IT teams to monitor and manage their cloud-based solutions. This often includes data, applications, and cloud services.

These tools are of strategic importance because they help to ensure that your cloud resources are functioning optimally and that users are able to interact with them properly. They also allow you to audit who has access to what and even add new accounts when needed.

5. Cloud provisioning

Cloud provisioning is the actual deployment of a cloud strategy. This often includes the selection of solutions and then which data and solutions will reside on either public or private clouds. Services are then deployed and data is migrated, usually with the help of an IT partner.

During the provisioning process, IT partners will also take the time to develop processes regarding how you will interface with the cloud solutions you will be implementing and set who has access to solutions.

6. Cloud storming

Cloud storming is the act of connecting multiple cloud services into a useable platform for your business. Some companies also use this term to refer to the idea of brainstorming about the cloud and how to use, or implement, it in daily operations.

A good example of cloud storming is where a company implements a cloud-based CRM solution from one provider, a cloud-based productivity suite, and cloud-based email at roughly the same time in order to better support operations while reducing operating costs.

8. Public cloud

Public cloud services and solutions are just that: public. They are available for any person or company to purchase or subscribe to and implement. With these services, all data or apps are hosted outside of the company and accessed over the usual Internet connections.

Public cloud services are usually the most common type of cloud implemented by companies who are first moving over to the cloud.

8. Private cloud

A private cloud is any cloud solution that is hosted by a company’s own resources. This could be on servers kept on-site, or rented servers that are then configured so that the solution is only available to the company, not the public.

While mainly large companies will employ private clouds, smaller companies looking for a niche cloud solution are starting to implement these as well.

9. Hybrid cloud

A hybrid cloud is a solution implemented by companies that has elements of both public and private cloud solutions. Essential data or business processes are hosted or delivered by a company’s own cloud service, while less essential services are delivered by public clouds.

Many larger companies employ this model of cloud computing for data storage as it allows them greater control over where their data is being stored, while ensuring that essential or highly regulated data can be stored in a secure manner; managed by the company.

10. Cloud portability

This is the level at which data maintained or stored in one cloud service can be moved to another. It is also used by experts when moving whole systems, such as apps, from one provider to another. If the overall portability is low, then it will be difficult for the user to move either apps or data from that provider.

Another similar term used by experts is ‘Vendor lock-in’, which is used to describe a dependency on a certain cloud provider and the general difficulty of moving away from this provider due to lack of other solutions or mechanisms that enable transfer. For many companies, it is a good idea to look for a provider that won’t lock you into their cloud, or at the very least offers some portability options.

If you want to know more about how the cloud can benefit your business then connect with us today.

Topic General
January 19th, 2015

Security_Jan12_CThe scale of the recent security breaches at Sony, which led to the cancellation of The Interview’s theatrical release, can make the company’s problems seem beyond the realm of the average small business. But the security mishaps that created the circumstances for the hack are as applicable to modest local and regional companies as they are to multimillion dollar corporations. These three tips will take you back to security basics and help avert your own big-screen drama.

Don’t let basic security habits slip

Our modern-day instinct tells us that the answer to potential security breaches is to install new layers of antivirus software, firewalls and further encryption systems. While these are all worthy additions to your company’s armor of security shields, they will do little to help if good old-fashioned protective habits are allowed to slide.

Instill a disciplined, security-conscious mentality in your organization, and keep the messages simple so that staff remember and follow them. Focus on regularly changing passwords and keeping them secret, being vigilant about avoiding unexpected links in email messages, and limiting network access for the likes of external contractors to that which is absolutely necessary.

One of the ways hackers made their way into the Sony network was by tricking administrators into thinking they had a legitimate need for access: teach your staff to be careful, and praise cautiousness even if it turns out access is warranted. Encourage staff to flag up potential security lapses, and make sure they know that reports will be followed up and loopholes closed.

Take a flexible and agile approach to IT

IT changes, and so do the ways best suited to keeping it safe. This means it is vitally important to keep your IT systems up to date, and where necessary to do away with outdated practices that could leave your business technology exposed. This involves more than just ensuring that your network is running updated antivirus software to catch the latest bugs and worms – it means staying abreast of emerging methods to mitigate potential threats from hackers worldwide.

All of this uses staff and resources that your small business might not have – which is where outsourced managed services come in. Using a managed service provider as an add-on to your own IT team can give you extra flexibility and the ability to keep abreast of industry security developments, even when you lack the time to do so yourself.

Equally, know when it is time to ditch data – think of emerging social networks like Snapchat, which set messages to self-destruct after a set time, as your cue to make your data retention policy less permanent, particularly in relation to email. If you no longer have a business need or a regulatory requirement to retain information, then delete it – in the process you can limit the possible damage even if the worst should occur and you fall victim to an external attack.

Backup, backup, backup

The last thing you want in the event of a security breach is for it to hit your day-to-day operations – the potential damage caused by the hack itself is likely to give you enough to worry about. But that is exactly the situation Sony found itself in after its latest hack, with its email system down and staff forced to return to the days of pen, paper and even the fax machine.

As well as ensuring alternative means of communication remain open to your business in the aftermath of a possible attack, it is also vital to make sure that you retain access to the information most critical to your work. Regular, secured backups help ensure that, whatever happens, the show is able to go on and your firm’s productivity and revenue are not unduly hit. Engaging professionals to undertake your backups on a managed service basis also means this can happen routinely and without fail, while you stay focused on running your business.

Want to learn more about how to reduce your IT network’s vulnerability to attack? Get in touch with us today.

Topic Security
January 14th, 2015

Microsoft is set to roll out security even further for Office 365 users to reflect the growing use of data collaborative business apps. This extended reach will provide tools to protect crucial data shared using SharePoint Online, OneDrive for Business, Windows File Share and Office apps. The security plans promises more control of data in real-time.

Beyond email security

There has long been an awareness of security when it comes to email content and Office 365 incorporated data loss prevention in Exchange and Outlook, as well as Outlook Web App. It is understandable that when you write an email you don’t want the information within it to be seen by anyone else, and while Google maintains its email scanning policies, data loss prevention tools can help stop hackers from getting a glimpse of your private data. This is all good and well, but sharing critical data via email is not the only way and Microsoft’s latest data loss prevention strategy recognizes these changes.

Collaboration needs to be safe

Microsoft has enhanced collaboration capabilities with Office 365 but along with these new ways of sharing data, there needs to be solid security measures in place too. Documents in Word and spreadsheets in Excel are created using applications and then shared via various collaboration tools. To ensure this data is safe access restrictions and permissions need to be activated.

Data loss prevention in SharePoint and OneDrive for Business

Recently eDiscovery has allowed users of SharePoint and OneDrive for Business to identify sensitive information within collaborative content. This security is set to expand to policies on restricting and blocking access, user education and to include email notifications.

Data loss prevention in Windows File Share

Windows File Server already have file classification infrastructure in place, whereby the server scans files to identify sensitive data. This data is then tagged and classified according to the definitions users set, with an ability to initiate action on this identified or classified files. The latest security, or data loss prevention, measures involve this content classification being extended to Office files in Exchange, SharePoint and OneDrive for Business. In time, this will continue to grow to include centrally managed policies and allow for greater user education within companies.

Data loss prevention in Office applications

This protection is being expanded to Microsoft applications so that when content is created users will be able to set up policies with regard to sharing permissions at the same time. Tips connected to the policies that have been established will then be offered as well. Initially, Excel will benefit from this expansion, with Word and PowerPoint being included later in the year.

The importance of data loss prevention

With so many different ways to create and share content, it is essential that business leaders can take advantage of a stable strategy for preventing data loss. If sensitive and crucial information is allowed to leak out this could be potentially incredibly damaging to a business and put productivity and profitability in jeopardy. With greater collaborative tools comes greater risk and the latest plans for Office 365 data loss prevention are a welcome layer of security to protect against data dangers.

Find out more about how Office 365 can benefit your business. Get in touch with Direct Tec today.

January 12th, 2015

Web_Sep29_CFor businesses looking to integrate new systems, one of the most intriguing options is a cloud solution. It seems as if there is a solution for almost every business system. One of the increasingly popular cloud solutions being adopted by an increasing number of small to medium size businesses is cloud-based ERP. Read on to learn more about what this is, and some interesting benefits it can offer businesses.

Define: Cloud-based ERP

Enterprise Resource Planning (ERP) is management software, usually offered as a bundle of applications, that aims to help businesses automate data collection, storage, management, and interpretation from various business sources like accounting, inventory, marketing, service delivery, etc.

Using this automation, business owners and managers can get an integrated real-time view of business processes, resources, and commitments. Beyond this, ERP facilitates the flow of information between departments while integrating systems used into one overall platform, thus reducing the chances of disparate data between departments.

Cloud-based ERP solutions are simply a suite of ERP apps that are delivered to users over their Internet connection, usually accessed via a browser. The software usually does not need to be installed on computers and is offered on a per-user, per-month, flat-rate fee.

Companies that have integrated cloud-based ERP solutions have experienced many benefits, five of the most common being:

Increased ERP performance

One issue many businesses come across when they implement an in-house ERP solution is that it can often require a fair amount of computer power in order to function with the highest efficiency. For small businesses this will likely mean investing in separate servers which will need to be set up and maintained. If this is executed poorly, and you could see performance drop.

Cloud-based solutions however only require a steady Internet connection, which many small to medium size businesses already have. The resources to host the solution are taken care of by the provider, which means that the systems should perform better than most in-house offerings, regardless of the systems you currently have.

Decreased operating costs

An in-house ERP solution will require hardware to support it, along with knowledgeable staff to install and maintain it. For small to medium size businesses, this will likely entail new hires which won’t come at a low cost.

Combine this with the fact that you will also need to actually purchase the ERP solution, and the related licenses, and it could add up to a large percentage increase in your overall IT budget.

When you choose a cloud-based ERP, you normally only have to pay a flat-rate monthly fee, which means total cost of implementation will likely be far lower. Beyond this, many providers can also manage the solution, taking care of installing and maintaining the systems. This in turn, will even out your operating costs, and if implemented correctly could even result in an overall decrease in expenses.

Enhanced access to information

Companies that don’t have any ERP will likely find that they struggle to find the information they need, when they need it. ERPs can help bring together the relevant information in a more effective manner than say spreadsheets.

Combine this with the fact that cloud-based ERP solutions are accessible via the Internet, and this means you will have access to your information from anywhere you have an Internet connection. This could in-turn increase overall business operations and make accessing information outside of the office far easier.

Increased security

Because of the nature of the information that ERP systems deal with, you are going to want to keep this secure from both outside sources and those in the company who you don’t want to have access to it.

When it comes to keeping your data safe from outside sources, most cloud-ERP solutions offer enhanced security measures which makes sure the data is secure moving from your systems to the host servers and when it is at rest.

For internal matters, data security is ensured because of how the system is accessed. You will need to access your ERP systems using an account, with each user usually being assigned their own account. Access can be controlled via central admin panels, and for people who don’t need to access, you can simply not give them an account.

Generally speaking, cloud-based ERP systems can offer enhanced security over other options, with many providers taking enhanced measures to ensure that data on their solutions is safe.

Continued support

Like other cloud solutions, cloud-based ERP solutions often offer 24/7 support. Should there be an issue, it can usually be solved quickly. Beyond this, the provider will work to keep all solutions updated. So important updates with security fixes and new features get pushed to all users immediately.

This can increase overall security as hackers have been known to attack systems using older, outdated versions of popular in-house ERP programs. It can also help make your employees more productive because if there is an issue they will be able to contact a provider who will likely be able to fix the problem far faster.

If you are looking to learn more about ERP, or Cloud-based ERP, contact us today to learn more about our solutions and how we can help.

Topic General
January 6th, 2015

It has become pretty much essential that most businesses now have an online presence. While a simple website used to be suffice, the new requirement is that you need to be easily found by existing and potential customers. One of the easiest ways to ensure this is to “Get on Google”. The question however is: How do you do this? To help make things easier, why not use Google’s Google My Business?

What is Google My Business?

If you have used Google for even a short while you will know that there are numerous ways you can find and search for a business. From Google Maps, to Search, to Google+, and even mobile apps, businesses need to ensure that they have a presence on all of these services if they want to maximize the chances of being found.

To help make this as easy as possible, Google launched a new service earlier this year called Google My Business. This is a suite of tools that small to medium business owners can use to “get onto Google”. By going to one website, and filling in the relevant information, Google will help you to:

  • Add your business to Google+.
  • Add business information to Google Search.
  • Add your business information to Google Maps.

Essentially, this tool ensures that your business and relevant company information will be more easily found by users on Google, regardless of the device they are using. For businesses that have been using Google’s older tools, like Google+ dashboard and Google Places, Google My Business is now the main suite where you can manage your Google presence.

What can I do with Google My Business?

From this suite you can:

  • Maintain business information.
  • Manage and maintain your Google+ page. Including creating posts directly from this page.
  • Track and respond to business reviews.
  • Track engagement with your Google+ pages.
  • View relevant information pulled from Google Analytics.
  • Create and maintain Google AdWords Express campaigns.

Is this service useful?

Aside from simply getting your business on to Google, this service has some great tools that will provide some valuable insight into your online presence. For example, by pulling information from Google AdWords Express and Google Analytics you can quickly see how people are finding your business, what they are clicking on, where they are coming from, and where they are going.

Possibly one of the most interesting features of this service is that when Google Maps is used to get directions to your business, this is logged and you can see where users are coming from. Therefore, if you see that a number of people are getting directions from one neighborhood or area, you can then use this data to create targeted ad campaigns and more.

In short, Google My Business has been designed to give your business better insight into trends and greater access to valuable information.

There is also a mobile app that allows you to manage your presence from an Android and iOS device. With this app you can set it so that you get real-time updates when you receive reviews or other relevant information. This makes it an ideal app to install on your device if you want to keep track while you are away from the office or your business.

How do I access Google My Business?

If you have not set up a Google Places Page before, then you can go to https://business.google.com/ and follow the directions on the page to set up a presence for your business on Google. Business owners with a Place Page, can log into any Google service with this account and then click on the link above. This should take you straight to your main page. You can also find the Android and iOS apps on Google Play and the Apple App Store.

Great IT solutions and support with business-oriented apps can really transform how you do business and the success of your business too. If you would like to really highlight what you are about to customers then make contact with us too.

Topic Google Apps
January 5th, 2015

hardware_Dec25_CAn antivirus scanner is one of the most essential parts of any security plan. These useful programs scan computers and systems for potential infections and get rid of them, ensuring your files and systems are safe. Because many of these protection programs are subscription based however, it can be easy to let the validity expire. If this does happen, is it really such a big deal though?

What happens when an antivirus subscription expires?

While each program will treat an expired subscription slightly different, generally speaking, most will still function in some way. You will normally be able to run a scan, but you likely won’t be able to deal with any malware or security threats. Features like automated scanning will also be turned off.

Other programs will stop updating the essential virus and malware databases that are used by the program to identify and clean new malware. This means that while you will be secure from known viruses and security flaws up to the date of the last database update, you will not be secure against newly discovered viruses.

Some popular programs like Kaspersky offer an antivirus scanner trial version or a program that comes with a newly purchased computer. With programs like these, they will normally stop functioning once the trial period is over. Yes, they will still open, but you won’t be able to scan or perform any tasks.

In short, when your subscription expires, your systems will no longer be secure, or as protected as they should be. Interestingly enough, in mid-November 2014, Microsoft released its Security Intelligence Report 17. This report found that computers and systems with expired malware were only slightly less likely to be infected than systems without any malware scanners installed.

What do I do if my subscription is about to expire?

Before your subscription expires you should take steps to back up all of your systems and data. The reason for this is that should something happen you have a clean backup to revert to. Once this is carried out, then consider renewing your subscription. Most programs allow you to do this directly from the scanner itself, so it is often fairly straightforward.

As a business owner however, you are going to need to keep track of your systems and licenses. What we recommend is creating a spreadsheet with information on the subscription applied to all systems. Take account of when the scanner was installed on each system, how long the subscription period is for, and when it will expire.

What if my subscriptions are about to expire, but I don’t like my current program?

There may come a time when the scanner you have selected simply isn’t living up to your expectations. Maybe it takes too long to scan, uses too many resources, or simply isn’t able to protect all of your systems. Regardless of the reason, switching scanners is always an option.

If you are thinking of moving to another scanner, we strongly recommend that before you do anything, you back up your systems. You can then start looking for other systems. We strongly recommend that you contact us, as we can help identify a solution that will work for your business and systems. We can then help ensure that the transition is carried out in a way that will not leave your systems open to attack.

We may have a managed antivirus solution that will work for your business. By using a system like this, we can help protect your systems, keeping them secure and always up to date, all without you having to get involved. All you need to do is get in touch to find our more.

Published with permission from TechAdvisory.org. Source.
Topic Security
January 2nd, 2015

security_dec24_CWhen looking into the ways companies are hacked, you quickly realize that there are so many different tactics out there that it is mind-boggling. One of the more effective methods used recently is spear phishing, and in early December 2014, a new spear phishing attack was uncovered. This threat, while directed at larger organizations, could be turned against smaller businesses as well, and is therefore worth knowing about.

What is spear phishing?

Spear phishing is an advanced form of phishing where attackers troll the Internet for relevant information about you and then create a personalized email that is sent to you. This email is usually developed so that it appears to be coming from a friend or trusted partner and contains links to a site or program that can initiate an attack or steal information.

More often than not, these links are to websites where you enter account information, passwords, and even bank account details, or any other personal information which can be used to break into computers and even steal your identity.

What is this latest spear phishing attack?

This new form of spear phishing, being carried out by an organization who calls themselves FIN4, has actually been around since as early as mid 2013. When they attack Wall Street listed companies they are doing so to steal valuable plans and insider information.

What we know is that they send highly savvy and targeted emails to people at a company, trying to harvest Microsoft Outlook account information. Once they have this crucial data they then target others inside, or connected to, the organization, with the same email, while also injecting the code into ongoing messages. This method can spread the attack quickly, leading to a potentially massive security breach.

In the email examples of this phishing threat, the attackers write mainly about mergers and other highly valuable information. They also include a link to a forum to discuss the issues raised further. These emails come from people the recipient already knows, and the link is to a site that asks them to enter their Outlook account and password before gaining access. When this information is entered, it is captured by the attacker and used to launch more attacks.

What can we do to protect our systems?

From what we know, this attack is being carried out largely against law firms, finance companies, and other large organizations. While this discounts many small businesses, there is a good chance that the attackers will turn to small businesses operating with larger companies at some point.

Because this is an email-based attack, you need to be extra vigilant when opening all emails. Be sure to look at the sender’s address, and read the body of the email carefully. While hackers generally have good English skills, they aren’t fully fluent, which means you will notice small mistakes. Also, keep in mind previous emails sent by the recipient. If the tone and style is off, then the email may be fake.

It is important to always look carefully at all links in email messages. If a link looks suspicious, then ask the recipient for more information or to tell you where the link goes. If you come across any site asking you to enter account information, be extra careful. Look at the URL address in your browser, if it doesn’t have HTTPS:// before the address, then it may be a good idea to avoid this.

If you have any questions on spear phishing and how you can prevent it, contact us today to see how we can protect your business.

Published with permission from TechAdvisory.org. Source.
Topic Security
December 31st, 2014

BCP_Dec23_BWith a Disaster Recovery Plan and Business Continuity Plan, businesses need to ensure that a proper data and system backup solution is in place. There are many different ways to implement a backup solution, with one of the most common being online or cloud-based backup. While these systems are popular, there is still confusion over what exactly it is.

What exactly is online backup?

In a wide sense, online backup is a backup system where your files, folders, and even systems, are backed up to an offsite storage server over your Internet connection. Tech experts also refer to this service as remote or cloud-based backup.

When you back up your files and systems to an online solution, your files are stored off site, usually in redundant data centers. This means that should something happen to your files you can access the system via another computer and restore your backups onto that computer, as long as you have an Internet connection.

For many companies, this is arguably the most efficient form of backup, not because of the backup method itself, but because of the fact that your backups are stored remotely. The chance your data will be accessible if your business faces disaster increase, as data can be recovered quicker than most other systems.

How do online backups work?

Like most other technical systems out there, there are numerous varieties of online backups. Some of the most effective are image-based, which take a snapshot of a computer or server at a specific time and then uploads this to the remote backup servers. This snapshot contains the whole system as it is and can be easily recovered.

Other solutions can be automated to back up specific files and folders, and run through a Web-based interface that can execute a backup from almost anywhere. Beyond this, many systems can be managed by a company like us. We can implement a system that works best for your company and your data, and then manage it so that your data will always be available when you need it. Should something go wrong, we can even help you recover your systems.

4 Benefits of online backup

Companies that implement an online-based backup have been able to realize the following benefits:

  1. Decreased recovery time - Because your data is stored online, as long as you have an Internet connection you can begin recovery at the click of a button; there is no having to go find your backup, then figure out how to recover it. Most companies see a generally reduced backup recovery time when they implement an online system.
  2. Increased backup reliability - Over time, physical systems break and need to be replaced, and this can happen at any time. Because online systems are managed by other companies, whose main job is to ensure backups are always available, you see increased reliability with these systems.
  3. Decreased costs - Physical backup systems can be costly, especially if you have a large number of systems or a large amount of data to back up. Many online providers charge a flat monthly fee that often works out to be less costly than other solutions. Beyond this, you don’t need to invest in physical backup solutions and the storage space to house and maintain these. As a result you should see lower costs.
  4. Increased data availability - As long as you have an Internet connection, your data will be available. This means you don’t have to worry about your offsite physical data being okay, if you have a problem or disaster strikes on your premises. With online services data is available when you need it.

If you would like to learn more about online backup, contact us today and let us reveal just how dynamic and effective our solutions can be. Don’t wait until you have to face a backup issue to back up your vital data!

December 29th, 2014

Finding Your Apps on the Start ScreenWith the update to Windows 8.1 offering users the ability to boot directly into Desktop mode, the Start Screen has gone largely unused by many business users. However, you will still have to use it eventually, and some users have found that the tile-based layout of the Start Screen does offer some benefits. One issue is that it can be tricky to actually find your apps via the Start Screen.

How to find all of your installed apps from the Start Screen

When you install a new app on your computer, regardless of whether it is a Metro style app, or a traditional desktop style app, you are going to need to be able to find and open it. Because we often install a large number of programs on our computers, it can be a challenge to actually locate these apps via the file explorer used in Windows.

The easiest way to find your apps is to:

  1. Switch to the Start Screen if you are currently in Desktop mode. This can be done by tapping on the Windows key.
  2. Hover your mouse at the lower-left of your screen.
  3. Click the arrow that is pointing down.

You can also access the apps screen by hitting: Control + Tab from anywhere in the Start Screen. Once open, you should see a list of all the apps you have installed. Apps that have been recently installed will have a NEW tag beside the name.

If you would like to sort your apps differently, such as by name or date installed, click the drop-down arrow beside APPS at the top of your screen and select the sorting option you prefer. Should you have a large number of apps installed and want to quickly find an app, click on the magnifying glass at the top-right of your screen and enter the name of the app you are looking for.

Adding apps to the Taskbar or the Start Screen

When 8.1 was introduced, Microsoft removed the feature where tiles were automatically created in the Start Screen and apps were automatically pinned to the taskbar. If you would like to either pin an app to the Start Screen or the taskbar you can do so by:

  1. Opening the Apps menu via the Start Screen.
  2. Searching for the app you would like to pin, either by scrolling through the list, or clicking the magnifying glass and entering the name.
  3. Right-clicking on the app.
  4. Selecting either: Pin to Start or Pin to taskbar.

This will subsequently pin the app to the taskbar on the Desktop, or create a new tile on the Start Screen.

If you are looking to learn more about Windows 8.1, and how it can be used in your business effectively, contact us today.

December 29th, 2014

windowsphone_Dec18_BThe Windows Phone, while certainly less popular than other systems, is a viable solution for many businesses, especially those using Microsoft solutions. Like many other systems however, new devices all have the same name which can make it difficult to distinguish between them and manage. One way around this is to rename each device, and here’s how.

How to see the name of your Windows Phone

Before we look into changing the name of your Windows Phone, you might want to know how to locate the present name of your phone. To do this:

  1. Open the Settings app on your device.
  2. Tap on System.
  3. Select About.

In the screen that opens you should see useful device information like the name of your phone, model, version number, etc. By default, your device’s name will be Windows Phone.

Changing the name of your Windows Phone

To change the name of your phone plug it into your computer, which needs to have the Windows Phone app for desktops installed. This app can be found here. If you have already synced your phone with your computer, then you should have this app installed already. To change the name of your device:

  1. Plug your phone into your computer using a USB cord.
  2. Open the Windows Phone app via your desktop. With some systems this will open automatically.
  3. Click on Settings followed by Preferences.
  4. Scroll down to the section that says Name Your Phone and click.
  5. Input the new name of your phone.

When you plug the device into your computer from now on, the name should be different. The same goes for when you turn on BlueTooth – the phone’s name will become the name of the network.

Another way to change your phone’s name

There is another way to change the name of your device, if for example you don’t have the Windows Phone app installed on your computer. To do this:

  1. Plug your phone into your computer via a USB cable.
  2. Open File Explorer on your computer. The easiest way to do this is to open any folder on your desktop.
  3. Click on Computer which should be in the left-hand vertical bar.
  4. Right-click on your phone. It should show a phone icon and the name of your phone (Windows Phone by default).
  5. Select Rename.
  6. Type in a new name for your device.

If you would like to learn more about using the Windows Phone in your office, contact us today to see how we can help.

Topic Hardware