Blog

November 18th, 2014

Office365_Nov17_CAn increasingly large number of businesses are integrating Office 365 and Macs into their offices. One issue with this however is that Office for Mac usually lags behind, version wise, when it comes to Office. This is starting to change though, as Microsoft has recently introduced a new version of Outlook for Mac and a roadmap as to when we will see new versions of other Office for Mac programs introduced.

New Outlook for Mac

Historically, when a new version of Office has been released, Mac users have had to wait six or more months for Mac versions to be introduced. With Office 365, users have had to wait even longer, as the company decided to focus on developing mobile apps first. This has now changed, and a new version of an Office app for Mac users - Outlook - has been released.

There are a number of improvements being implemented with the new version of Outlook for Mac, including:

  • A more modern user interface - Throughout the past year, Microsoft has been steadily updating the look of Outlook across all devices and versions, to create a more modern style. The new version for Mac introduces this updated design, which brings it more in line with the other newer versions of Outlook. Beyond this, scrolling has been made smoother which makes the program feel as if it runs much better.
  • Increased performance and reliability - Because email is an integral part of any business, Microsoft has re-tooled the database that supports Outlook for Mac and the way the program uses resources. This relates to increased reliability, less crashes, and generally faster performance.
  • Office 365 push email support - If you enable this for your business's Office 365 accounts, emails will be pushed automatically to users. This means messages will be delivered faster; in real-time for many.
  • Enhanced online support for searching Exchange archives - If your business employs either an onsite or hosted Exchange server, the new version of Outlook for Mac will enable online searching for message archives stored on Exchange.
  • Faster first-run and email downloads - When you first open Outlook to check your email, you will now see your emails far quicker, with email downloads faster too thanks to better syncing with Exchange servers.
There are a number of new features included in the latest version of Outlook for Mac. Overall, it looks much better and many users will notice that it is not only easier to use but also faster. If you would like to update to the newest version you can do so by:
  1. Logging into Office 365 via your browser.
  2. Pressing the Gear icon followed by Office 365 Settings.
  3. Selecting Software followed by Outlook for Mac.
  4. Downloading the program and installing it.
Before you do this however, we strongly recommend contacting us. We can help ensure that all of your files are backed up and ready for an update. Beyond that, we can work with you to ensure that the program is installed and set up so that you can simply open the program and go.

New versions of Office for Mac coming soon

Upon announcing the new version of Outlook for Mac users, the company also introduced their roadmap for the release of new versions of Office programs for Mac users. The company has noted that in the first half of 2015 they will release beta versions of the next versions of Word for Mac, Excel for Mac, PowerPoint for Mac, and OneNote for Mac. Final releases will be made available in the second half of 2015.

From what we know, businesses with Office 365 subscriptions will be able to update to the new versions for free, while other users will likely have to wait, as a price list has not been made available at this time.

If you are looking to learn more about Office 365 for Mac, or any other system, contact us today to see how we can help ensure tech developments work for your business.

Published with permission from TechAdvisory.org. Source.

November 18th, 2014

GoogleApps_Nov17_COne of the biggest weaknesses of browser-based cloud systems like Google Drive, is that you generally are not able to open files using apps installed on your computer directly from the browser. Many of us who use Drive agree that being able to do so would probably help increase overall adoption of the system, and in fact, Google has recently integrated the ability to do this in Drive.

Looking at the new Google Drive feature

As stated above, the main idea behind this new Drive feature is being able to open files stored in Drive using applications installed on your computer. With previous versions of Drive you usually had to first download the file from Drive, then open it with the program on your computer. If you wanted to update the file, you would then have to upload it back to Drive.

This is hardly ideal for companies, especially those who want to use Drive as their main file storage system. Google has now updated Drive, thereby enabling you to open files in Drive using apps on your computer.

For example, say you have a Google Sheet you use to track sales data and want to export this to your tax program. With the new update you will be able to right-click on the file in Drive and open it in the tax program without having to download and open it on your computer first. When you save the edits you make, the changes will be made to the file directly in Drive.

How do I enable this?

If you would like to use this feature, you first need to ensure that you are using the latest version of Drive. You can enable this - if this hasn't already been done - by opening Drive in Chrome, pressing the cog, and selecting Turn on the new Drive.

Once you have enabled the new Drive, you need to download the Drive app to your computer. This can be found on the main Drive website. Once installed on your computer, go ahead and sync it up with the account you use for work or the account you use for Drive.

When you want to open a file using an app, open Drive in Google Chrome and right-click on a file. Select Open with and you should see relevant apps installed on your computer in the drop-down menu that opens.

We should note here that not every file type will be compatible with this feature and it only works with Google Chrome. For example, if executable files (.exe and .dmg) will not work as they need to be physically present on your computer. Some file types that will work however include:

  • Any Microsoft Office file (.PPTX, .DOCX, .XLSX) can be opened using the related Office program.
  • Images like .JPEG, .TIFF, .PSD, .PNG, etc. can be opened by either your computer's default image viewer or Adobe Photoshop if this is installed.
  • Video files like .MOV, .AVI, .MP4, etc. can be opened using certain video apps on your computer.
  • Audio files like .MP3, .MPEG, and .WAV, can be opened using some apps like Quicktime.
Please note that you do need to have relevant apps installed on your computer, and you need to be using the latest version of Google Chrome for this to work.

If you would like to learn more about this feature, and using Drive in your business, contact us today.

Published with permission from TechAdvisory.org. Source.

November 13th, 2014

Security_Nov10_CLast year saw a number of highly publicized security threats that many companies struggled to deal with. One of those was some nasty malware called Cryptolocker, which held your files for ransom. While this has now largely been dealt with, news is surfacing of a second version - called CryptoWall - that has begun to infect users.

What is Crypto malware?

Crypto malware is a type of trojan horse that when installed onto computers or devices, holds the data and system hostage. This is done by locking valuable or important files with a strong encryption. You then see a pop-up open informing you that you have a set amount of time to pay for a key which will unlock the encryption. If you don't pay before the deadline, your files are deleted.

When this malware surfaced last year, many users were understandably more than a little worried and took strong precautions to ensure they did not get infected. Despite these efforts, it really didn't go away until earlier this year, when security experts introduced a number of online portals that can un-encrypt files affected by Cryptolocker, essentially neutralizing the threat, until now that is. A recently updated version is threatening users once again.

Cryptolocker 2.0, aka. CryptoWall

Possibly because of efforts by security firms to neutralize the Cryptolocker threat, the various developers of the malware have come back with an improved version, CryptoWall and it is a threat that all businesses should be aware of.

With CryptoWall, the transmission and infection methods remain the same as they did with the first version: It is most commonly found in zipped folders and PDF files sent over email. Most emails with the malware are disguised as invoices, bills, complaints, and other business messages that we are likely to open.

The developers did however make some "improvements" to the malware that make it more difficult to deal with for most users. These changes include:

  • Unique IDs are used for payment: These are addresses used to verify that the payment is unique and from one person only. If the address is used by another user, payment will now be rejected. This is different from the first version where one person who paid could share the unlock code with other infected users.
  • CryptoWall can securely delete files: In the older version of this threat, files were deleted if the ransom wasn't paid, but they could be recovered easily. In the new version the encryption has increased security which ensures the file is deleted. This leaves you with either the option of paying the ransom or retrieving the file from a backup.
  • Payment servers can't be blocked: With CryptoLocker, when authorities and security experts found the addresses of the servers that accepted payments they were able to add these to blacklists, thus ensuring no traffic would come from, or go to, these servers again. Essentially, this made it impossible for the malware to actually work. Now, it has been found that the developers are using their own servers and gateways which essentially makes them much, much more difficult to find and ban.

How do I prevent my systems and devices from being infected?

Unlike other viruses and malware, CryptoWall doesn't go after passwords or account names, so the usual changing of your passwords won't really help. The best ways to prevent this from getting onto your systems is:
  • Don't open any suspicious attachments - Look at each and every email attachment that comes into your inbox. If you spot anything that looks odd, such as say a spelling mistake in the name, or a long string of characters together, then it is best to avoid opening it.
  • Don't open emails from unknown sources - Be extra careful about emails from unknown sources, especially ones that say they provide business oriented information e.g., bank statements from banks you don't have an account with or bills from a utilities company you don't use. Chances are high that they contain some form of malware.
Should your files be attacked and encrypted by this malware, then the first thing you should do is to contact us. We can work with you to help find a solution that will not end up in you having to pay the ransom to recover your files.

If you are looking to learn more about CryptoWall malware and how to boost your security and protect your data and systems, then we could you your first line of tech defence.

Published with permission from TechAdvisory.org. Source.

Topic Security
November 11th, 2014

GoogleApps_Nov10_CWithout a doubt, email is one of the most essential business tools. Many people find it quicker and easier to simply email someone instead of calling and as such, businesses have integrated platforms like Gmail which have fast become indispensable tools. The problem with this is that it is a challenge to manage emails and this can create problems when it comes to finding important information. Recently, Google launched a new app called Inbox, which could help combat this problem.

What is Inbox?

Inbox is an Android, iOS and Web service that helps us get things done and work with our email messages in a new way. Your emails still go to your gmail account; just think of this as an app or service that helps you reduce overall inbox clutter while being able to quickly access the info you need. It achieves this by:

Bundling useful messages together

With Inbox, all similar messages are brought together into one category or bundle. Think of the categories feature introduced for Gmail last year, but on a grander scale. If for example, you travel a lot for work, travel related emails like flights, hotel bookings, and messages related to meetings will be grouped together.

The great thing about this is that you can teach Inbox to group emails in a way that suits you. This allows more control over categories and message bundles, while making it easier to find related messages. For example, if you use your work account to pay bills and to receive receipts for online payments, you can manually filter these together and Inbox will 'bundle' these together in the future.

Highlighting important information

Inbox highlights important information in emails, including: Flight information, event information, and even documents attached to messages. This not only makes it easier to see the most relevant information, it can even help reveal information you may have missed.

Beyond this, Inbox also displays real-time information from the Web. For example, if you have a flight and it is going to be delayed, this information will be shown in the email as a highlighted update.

Adding reminders

With Inbox you can automatically create reminders that notify you at a set time of a task you need to complete. This is an interesting feature because it really centralizes our to-do list into a place where we are already looking at important messages and information.

There is also a sub-feature of the reminders built into Inbox called Assist. This feature provides you with relevant information for your reminders. For example, if you set a reminder to meet a client for lunch at a restaurant, you will see the restaurant's name and number displayed in the reminder. Google has noted that this will work for flights as well - so, if you receive an email with flight information and booking numbers, you will get a link via Inbox to check-in directly.

How do I get Inbox?

For now, you can download the Inbox app for iOS and Android, but in order to use it you will need an invite. If a friend or colleague has one, they can invite other users to join, or you can email inbox@google.com and request an invite. Google sends these out on a fairly regular basis, so you should receive one in the near future.

If you are looking to learn more about Inbox, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

November 11th, 2014

Facebook_Nov10_CChange is a constant process with Facebook and most of the time it's for the better. Earlier this year, the social media company announced some pretty big changes to the Graph algorithm that powers search results. One of the more important changes companies with Facebook Pages need to know about centers around the way Likes can be used. In short: forcing people to Like your Page to gain access to content - a practice called Like-gating - is no longer tolerated.

Like-gates to be left open

In the past, it was a fairly common trend for businesses with Facebook Pages to limit the access followers had to their Pages or other information and campaigns. One of the most popular examples of this is if having to Like a company to enter a contest with them.

Facebook considered this an unfair practice, largely because it essentially defeats the purpose of a Facebook Page - which is to provide all Facebook users with equal access to business information and content. So, in August of this year, they announced that Like-gating would no longer be allowed as of November 5, 2014. This is being enforced through Facebook's recent update to the Graph algorithm which ranks Facebook Pages and other content in search results.

Companies that have been using this method to limit access to content and campaigns on Facebook will now likely see a negative drop in overall Page ranking - where you show up in search results. If this applies to you and you want to avoid this there are three things you should do as soon as possible:

1. Remove all existing Like-gates

This is important, because all Like-gate related content or campaigns are now likely going to hurt your overall Page ranking. You should audit your company's Facebook Page and look for any content or tabs that you have set a Like-gate restriction on. This includes campaigns or tabs that you have enabled using third-party apps (i.e. apps not designed by Facebook).

Essentially, you want to ensure that all content on your Facebook Page, and all marketing campaigns that use Facebook, are open to all users, not just the ones who have clicked Like on your Page.

2. Change your access gates

What is interesting about this change is that Facebook has not outright eliminated the right to limit access to your campaigns. For now, they are just focusing on ensuring that you don't need to Like something to gain access to it.

The reason for this is largely because of the way many business use Facebook - to run campaigns that gather information while offering a benefit to followers. Think of contests that give something away. Before, some businesses required that users Liked the content in order to gain entry to the campaign. Now that this is not possible you could try implementing gates such as a form that needs to be filled out in order to enter.

This method, often referred to as action-gating (requiring someone to take an action before being allowed to access content) is still fine to use, largely because it doesn't force users into taking an action, it is up to them whether they want to say fill out a form to enter a contest or not. Beyond that, the idea of filling out a form to enter a contest to gain access to information has been a standard business practice since long before Facebook.

By action-gating some content and contests or promotions, you should also be able to limit spammers, and increase the overall quality of data you gather, and of your followers.

3. Ask for Likes

Facebook has been quite clear that the new Graph algorithm will punish Facebook Pages that require users to click Like to gain access to content. So, instead of forcing people to Like something, why not just ask them to Like it instead?

Companies that have been following this method of gaining Likes have found that simply asking people for a Like won't necessarily work. Instead, you should try to include some benefits or reasons as to why users should click Like. For example, creating a badge that goes onto Facebook campaigns that says "Like us for updates, new contests, great freebies, etc." will likely see more interaction.

Similarly, putting a suggestion at the end of emails and forms on your website has also proven to work well. The key here is if you provide your followers with value and a reason to Like your page, they generally will. With some creative thinking and a different strategy you may find that overall interaction with your Page increases beyond what it would have done with a Like-gate approach.

If you are looking to learn more about this change, and how it can affect your company, contact us today.

Published with permission from TechAdvisory.org. Source.

November 4th, 2014

Office365_Nov03_COffice 365 for businesses offers a wide variety of plans with different options. Some include full versions of Office 2013, while others have just browser-based Office Web Apps (OWA). When looking for an Office 365 plan, it can be confusing as to whether OWA will be enough, or whether you will need the full version of Office 2013. To help you decide, here are five questions you can ask yourself.

1. Am I comfortable doing all, or most of my work in a browser?

Because Office Web Apps is browser-based, you will be spending a fair amount of time in your browser. Many of those who have switched to OWA have found that it takes time to get used to working with the system. Because of the way many of us work, you will start to see multiple windows and tabs open with different documents which could lead to increased confusion and more time finding the tab and window you need.

What's more, you will need to ensure that all browsers on all computers in your company are kept up-to-date if you want to use OWA. For example, older versions of Internet Explorer may not support OWA. This means you will need to spend time ensuring that everyone within the business is updating when necessary.

To get around this, you can work with a company like us who can ensure that browser activity is not only secure, but also up-to-date, which basically guarantees OWA will work when you need it to.

If, however, you are not comfortable using your browser for everything, then it may be a good idea to go for an Office 365 plan that includes the full version of Office 2013.

2. Am I going to collaborate on files with users both in and outside of the organization?

Many business tasks are real team efforts, where users need to collaborate on documents. While this is possibly with any Office program, one of the biggest weaknesses of traditional Office installs is version control.

If you have shared one document with a number of different users you will quickly find that the changes they make and send back to you are likely going to need to be manually added back into the original document. This takes time and can lead to confusion, errors, and a lack of productivity.

With OWA, any document you create is stored on your OneDrive account and can be easily shared with other users. When the document is opened, all changes are made directly to the main document in real time. This means each user can see the changes show up as they are being made, which increases the effectiveness of collaboration.

Of course, this is possible with almost all Office 365 plans - especially if you also integrate SharePoint, but OWA offers by far the easiest solution to collaboration. So, if you collaborate a lot, then OWA may be a better version of Office to use. That being said, if you just need a few people to edit documents or offer comments, then Office 365 plans with Office 2013 will usually be the better option.

3. Will I need to format documents, or need advanced features?

The Web-based versions of Office offer many of the key features found in the desktop versions. However, some advanced features, like in-dept formatting, adding charts, etc. are not currently available with OWA.

While many users find OWA is enough to meet their day-to-day document production needs, those who use the advanced features of each Office app will be better off with Office 365 plans that offer full installs of Office 2013.

4. Will I need more Office apps than just the core five?

Currently, OWA apps available to users are: Word, Excel, PowerPoint, OneNote, and Lync. These five major apps cover the majority of document production needs for most users, however, if you require other Office apps, like Access, or Publisher, that aren't included in OWA, then you will be better off going with an Office 365 plan that offers Office 2013.

5. Will I be constantly connected to the Internet?

In order to get the most out of OWA you will need to have a strong and constant Internet connection. While you can create documents offline, you will need to connect in order to save and update them. If you spend a lot of time out of the office, this may be a real inconvenience, especially if you often struggle to find a solid Internet connection.

What we recommend is talking to an Office 365 vendor like us. We can explain the different Office 365 plans in depth and how you can integrate them into your office. Contact us today to learn more.

Published with permission from TechAdvisory.org. Source.

November 4th, 2014

GoogleApps_Nov03_CAnyone who uses cloud-based services like Google Apps should be taking steps to ensure that their account is secure. One of the best ways to do this is to enable two-step verification, which requires users to enter a code and password when they log in. To strengthen security even further, Google has introduced a new method of two-step verification which is carried out via a USB key.

Google and two-step verification

In order to further secure your Google account, beyond a difficult-to-guess password, your main option is two-step verification. The way this works for Google accounts is you need to provide a cellphone number for your account. When you try to log in you are either called or sent an SMS with a code to enter. Alternatively, you can download the Google Code generator which generates a code which you then need to enter when logging into your accounts.

While this works well when you have your mobile device with you, or when you are near the phone number linked to your account, it doesn't work so well when you aren't. In order to make things a little easier, Google has introduced a new two-step verification method that utilizes a special kind of USB key.

Two-step verification via USB key

Take a look around your desk, chances are high that you probably have a USB key or USB storage device within easy reach. While it would be cool to be able to use one of these to log into your account, you can't use just any USB key. Instead, you need to use one that is FIDO Universal 2nd Factor (U2F) compliant.

If you have one of these keys, once configured, you can stick it into one of your computer's USB ports and press a button. The coding on the stick will then talk to Google servers, sending cryptographic code back and forth, thereby unlocking your account.

This guarantees two things: Firstly, that you are logging in using two-factor verification and are therefore you; and secondly, that the Google site you are logging into is actually Google and not a malicious or fake site. Essentially, this further increases your overall account security.

A few caveats

While these security measures are a good idea in practice, there are a few caveats regarding this authentication method:
  1. You have to buy your own key, which costs anywhere from USD 15 and up.
  2. It will only work with Google Chrome and Chrome OS. This means that if you are trying to log into your account on another browser, or a mobile device, it won't work.
If you are worried about account security, then using a USB key like this could be a good idea, and if you are looking to learn more about implementing this method and ensuring all of your accounts are secure, contact us today.
Published with permission from TechAdvisory.org. Source.

October 31st, 2014

Security_Oct27_CAny business with Internet-based systems should be taking the appropriate steps to ensure that their activities and information are secure from the ever-expanding number of online threats. This can be tough, especially for businesses who operate almost exclusively online. To help, here are five tips that can help keep your online activities safe from attacks.

1. Use two-factor authentication whenever possible

Two-factor authentication, or two-step authentication as it is also known, is the idea of using two pieces of information to log into accounts: Your usual password and a code that is usually sent to a mobile device or generated by a code generator.

By utilizing this safety feature, you can further increase the security of your accounts, largely because the chances of someone getting their hands on both the generated code and your password are slim.

Some sites don't use a code and instead ask a question that needs to be answered every time you log in. If this is the case, make the question something that is difficult for a hacker to guess. For example, use your address from 10 years ago instead of your current address.

2. Audit who has access to what data

Between all of your online accounts and social media profiles you will likely be surprised at just how much information about you can be found online. There are a multitude of scare stories online, where someone has had their accounts hacked and identity stolen, largely because they had left pertinent information online without even thinking about it.

It is a good idea to audit what information you have online. This includes looking at the contact and personal information you have on social media profiles, account information, etc. Ideally, if it is not necessary information, then it shouldn't be shared. As for social media profiles, make sure only the absolute basic personal information is online and limit who can see this information.

3. Watch what is posted on social media

Because of the nature of social media, we often feel the need to share our whole lives online. This can often lead to oversharing, and even sometimes oversharing of personal information. There are stories online of thieves monitoring social media for businesses posting about how they are going to be closed for a holiday, with all staff gone. Once a thief finds this information, they then break into the business without worrying about people being there.

If you are going to share information online, be sure to limit the potentially sensitive information that you post, especially if the content is shared with the public.

4. Change your passwords regularly

It seems like almost every week news breaks of a password or account information breach. What this translates to is the fact that your accounts are always facing a potential risk. Therefore, you should make it a habit to change your passwords on a regular basis.

Most experts recommend at least once every three months, but if there is a breach where your account information may have been leaked then naturally change your passwords straightaway.

To ensure maximum security, you should use a different password for each account, and keep these as separate as possible.

5. Work with an IT partner who can offer enhanced Internet security

Ensuring that your business is secure online can be an on-going battle that you will likely not win easily. One of the best steps to take is to work with an IT partner like us. We offer a variety of Internet security solutions that can help stop malware intrusions before they infect your systems, block access to potentially harmful sites, and even scan Internet-based email solutions. In other words, we can help improve your overall online security.

If you are looking to learn more about how we can help your business be secure online, contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Security
October 28th, 2014

GoogleApps_Oct27_CWith Google Apps, such as Google Sheets, businesses have a powerful cloud-based spreadsheet creation tool. While Sheets does offer a wide variety of useful functions and features, there are some that have been missing. One such feature is Spell Check. If you have missed this, don't dismay. In fact, Google has recently implemented Spell Check for Google Sheets?

Spell Check in Google Sheets

When Google introduced their new version of Google Sheets they brought back a much requested feature - Spell Check. In Google Sheets, Spell Check works much the same as it does in other apps like Docs; you can select whether to check the entire sheet, worksheets, columns, and even individual cells.

In order for this feature to work best you need to ensure that the spreadsheets you are using are created using the new version of Google Sheets. You can check this by looking for a green checkmark on the lower-right of the file you would like to check for spelling.

This checkmark indicates that the sheet is running the latest version of Google Sheets. You can then run Spell Check on the whole sheet by:

  1. Opening the sheet you would like to check for spelling.
  2. Clicking Tools followed by Spelling.
The Spell Check should highlight any errors, along with replacement suggestions. If there are errors you should see a drop-down window open with options to:
  • Change - Will change the error to the selected word.
  • Ignore - Will ignore the error.
  • Add to dictionary - Will add the word that is highlighted to the dictionary.
If you would like to check either a column, row, or number of cells, you can do so by selecting this area first and then pressing Tools followed by Spelling. Interestingly enough, this feature is also available in sheets that were created in the older version of Google Sheets and then updated to the new version.

Looking to learn more about Google Sheets, or other Google Apps? Contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

October 22nd, 2014

SocialMedia_Oct20_CSocial media, for many companies, has become an integral part of their overall marketing strategy. In order to be successful with your social marketing initiatives, you need to develop content that users will share. This is easier said than done though, especially when it comes to selecting the type of content to develop. Here are five types of popular content that should be shared.

1. Selfies

The 2013 "word of the year", according to the Oxford English Dictionary, has become so popular it's no mean feat to avoid it these days. Truth be told, the selfie is popular for a reason: It is a quick way to get people to engage with your content.

The key here is to know when to take a selfie for your social media sites. What you want are selfies that make your company look more human, for example a group lunch meeting or after-work game night that shows people having fun. When done in the right way, selfie posts can increase interaction. Just be sure to limit the number you post, as too many could lead to you being perceived as being too focused on your company and not your customers.

2. Inside looks

When we find a product or service we like, we are often curious to learn more about it. This includes learning more about the company that makes the products or services and how it operates.

If you have a growing fan base, why not create content that provides customers with an inside look at some aspect of your business. Take pictures of your office, videos about how your products are made, or perhaps write content about how certain services are created and delivered. Basically, try to come up with content that gives people an inside view of the company.

The reason this type of content works is because it often gives customers a deeper understanding about a business, and creates a closer connection to the products and services. If you can increase overall attachment, you can increase the chances that customers will interact with content, stay loyal to your brand, and even share information about your company or recommend you.

3. Quotes

Famous quotes can be a great way to get a message across in a strong way. If for example you are hosting a Thanksgiving party, or Halloween party, adding a themed quote to your post could be a great way to encourage social media users to interact with it.

Also, if you can find quotes that are relevant to your industry, you could post these whilst asking for opinions or to further a point you're trying to make.

4. Fill in the blanks

While this may sound a little simple, posts that ask your audience to fill in a blank can be a great way to drive engagement while giving your customers a chance to tell their own story. For example, if you are a bakery who produces well-known donuts, asking a question like: "The first time I had this donut was _." could be a good way to inspire customers to interact with you.

5. Videos

One of the more drastic changes many social media sites like Facebook have implemented in the past couple of years is a feature that automatically plays a video when someone pauses on it while scrolling. While not fully welcomed by all users, this move has actually led to the number of video views increasing by as much as two times.

While creating a video because everyone else is, is a bad idea, if you have content that you know can be turned into a useful video e.g., a how-to video, then this could be a great way to reach your target market in an interesting way.

If you are looking to learn more about how you can leverage social media in your business, contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Social Media