Blog

April 28th, 2016

2016Apr28_Security_BHackers come in all shapes and sizes. From kids trying to gain notoriety on the Internet to political groups trying to send a message, the motives for a cyber attack vary widely. So how can you protect yourself? It all starts with getting to know your enemy a little better. Here’s a profile of four different types of hackers.

Script Kiddies

When it comes to skill level, Script Kiddies are at the bottom of the totem pole and often use scripts or other automated tools they did not write themselves - hence the name. With only an elementary level of technical knowhow, Script Kiddies usually don’t cause much damage...usually. The Script Kiddy virus known as the Love Bug which sent out an email with the subject-line “I LOVE YOU” fooled millions of people, including some in the Pentagon, in the early 2000’s. The virus reportedly caused around 10 billion in lost productivity and digital damage.

So who is a Script Kiddie? Most of the time they’re simply bored youth looking for a thrill or notoriety. Many never evolve into a full-time hacker, and instead just use their skills as a hobby. Oddly enough, many Script Kiddies find a career later on working in the security industry.

Hacktivist

If you’ve heard of Anonymous, LulzSec or AntiSec, then you’re familiar with Hacktivists. These groups are made up of members of varying skill levels, all the way from Script Kiddies to some of the most talented hackers in the world. Their mission is largely politically motivated as they aim to embarrass their targets or disrupt their operations, whether that be a business or government body. Two of the most common ways they attack their target are by stealing sensitive information and exposing it or denial of service (DDoS) where a server is overloaded till it finally crashes.

As a small or medium-sized business owner you are not necessarily immune to Hacktivist disruption. If your business or a company you’re associated/partnered with participates or provides services that can be seen as unethical, such as Ashley Madison (who fell victim of a major Hacktivist attack last year), then you too may be targeted by Hacktivists.

Cyber Criminals

Often talked about in the media and well-known by most SMBs, cyber criminals are after one thing: money. Their targets run the gamut, including everyone from individuals to small businesses to large enterprises and banks. But what do these targets usually have in common? They either have a very valuable resource to steal or their security is easy to exploit...or a combination of both of these. Cyber criminals can attack in a number of ways including using social engineering to trick users into providing sensitive information, infecting an organization/individual with ransomware or another form or malware, or exploiting weaknesses in a network.

Insiders

Perhaps the scariest type of hackers are the ones that lurk within your own organization. Insiders are made up of disgruntled employees, whistleblowers or contractors. Oftentimes their mission is payback; they want to right a wrong they believe a company has perpetrated toward them, so they’ll steal sensitive documents or try to disrupt the organization somehow. Edward Snowden is a prime example of an insider who hacked his own organization - the US government.

Now that you know what motivates your enemy, you’ll hopefully have a bit of an idea as to whether or not you’re a target. To learn more about how to secure your business from these types of hackers, get in touch with our experts today.

Published with permission from TechAdvisory.org. Source.

Topic Security
April 27th, 2016

2016Apr27_Healthcare_ARansomware is becoming a growing problem for the healthcare industry. And with around a dozen attacks on hospitals being reported since the beginning of the year, you may be wondering just how severe the problem is. Should you be alarmed? How can you protect your practice? Here’s an inside look at how the ransomware epidemic is affecting the US and Canadian healthcare systems.

The ransomware strike on Hollywood Presbyterian Medical Center on February, 5 was one of the first major attacks this year. The hospital lost control of its computer system to hackers and was forced to pay them $17,000 to regain control.

“The quickest and most efficient way to restore our systems and administrative functions was to pay the ransom and obtain the decryption key. In the best interest of restoring normal operations, we did this,” stated Allen Stefanek, president of the medical center.

Thankfully, access to Hollywood Presbyterian’s EMR system was restored on Monday February, 15, over a week after the initial attack. So what can be learned from this story? Well, it raises a very important question…

Should you pay a hacker who’s infected your system with ransomware?

It’s a vexing question, and unfortunately the consensus on the answer is split. The problem is that the ransomware is very intelligently designed. And while it may sound absurd to pay so much money to a hacker, especially when there’s no guarantee your systems will be restored, oftentimes there’s not much choice.

“The ransomware is that good. To be honest, we often advise people just to pay the ransom.” said Joseph Bonavolonta, an Assistant Special Agent of the FBI’s CYBER and Counterintelligence Program.

While Bonavolonta and other law enforcement officials have advised to pay the ransom, the US government has oddly enough said the opposite. In a release made public late last month, they noted, “Individuals or organizations are discouraged from paying the ransom, as this does not guarantee files will be released. Report instances of fraud to the FBI at the Internet Crime Complaint Center.”

The reasoning behind this argument is that by paying the ransom, you’re encouraging hackers to attack more practices.

How deep does the ransomware epidemic go?

According to Symantec’s 2015 Internet Security Breach Report, the healthcare industry had the highest number of data breaches for four years in a row and suffers 37% of all breaches that occur. In fact, last year alone there were more than 250 separate incidents of data breaches in healthcare totaling over 112 million records. And the problem doesn’t look to be getting any better as many experts believe that attacks are likely to grow in number and scale.

Why healthcare?

Hackers know that most healthcare facilities haven’t installed proper security measures to protect themselves. Hospitals have tight budgets, often emphasize convenience over security and have multiple entry points into their system, all of which makes them easy prey for cyber criminals. Of course hackers don’t breach a system just because it’s easy. They do it because there is valuable information stored inside, and healthcare facilities are ripe with info that can fetch a high price on the black market and help criminals steal a patient’s identity. The fact that the system is easier to breach just makes healthcare facilities a more alluring target

What can you do?

It all starts with paying more attention to security in general. But some tips to help any practice secure their system should include staff training that allows employees to better identify phishing emails, restriction of access to sensitive information, encryption and two factor authentication. While these are a few basic tactics you can use to get started, consulting an IT provider that specializes in healthcare security can be a wise decision that provides peace of mind and safety for your valuable data. We are happy to help your practice gain the highest level of security possible. Give us a call today to learn more.
Published with permission from TechAdvisory.org. Source.

Topic Healthcare
April 25th, 2016

2016Apr25_InternetSocialNetworkingAndReputationManagement_B500+ LinkedIn connections can seem like a lofty goal. You have a business to run, and probably don’t have much time to dedicate to the platform. However, carving out the time to grow your LinkedIn network can prove invaluable as it will provide social proof to yourself or organization and presents the opportunity to connect with new clients. So how can you get to 500+? Here are some ideas to get started.

Network every day

If you’re struggling to grow your LinkedIn network, you may not be spending enough time on the platform. If you want to become a power player, you need to use the social network often. So dedicate 15-30 minutes a day to network on LinkedIn, and make it a goal to reach 500+ connections.

Join and participate in groups

Utilizing LinkedIn groups presents an opportunity to meet other professionals (and eventually add them as connections) as well as learn and share valuable advice. The point is not to just join a group, but actively participate in them. This requires a degree of focus and smart selection.

How many groups should you join? Shoot for around ten. This will ensure you have time to participate in each group and connect with its members. As for the groups you join, you’ll obviously want to join those in your industry, but you should also diversify. So choose five within your industry and five that relate to your other interests or provide you an opportunity to learn from its group members. Some suggestions to consider are an alumni group for your university, groups that represent causes/charities you care about, and groups that relate to a new skill you’re hoping to learn. Obviously, all the groups you join need to be active. If members only post in a group once a week, this is a red flag to avoid joining.

Once you’ve joined, you should spend some time each day contributing in at least five of your ten groups. You can ask questions, provide advice, or share valuable articles or original content you’ve created. Once you’ve developed a rapport with group members, you’ll have an easy, non-awkward way to connect with them.

Personalize your “Connect” request

The less you know a person, the less likely they are to connect with you if you send a generic connection request. You know the one: “I'd like to add you to my professional network on LinkedIn.”

Many people will simply ignore requests like this. This is why it’s important to include a quick note that either refreshes that person’s memory of you, mentions a common interest or connection you might share, or simply introduces yourself and your reason for connecting. The more personal your note the better.

Use keywords in your profile

Just like Google, Bing and the other search engines, keywords help you get found on LinkedIn. Plant these keywords in your professional headline, profile summary, and skill endorsement section. How do you know what keywords to use? Think about what you want yourself or your business to be endorsed for. What skills do you have to offer your clients? For example, if your business specializes in web solutions, some keywords you may think about using would include SEO or “web content”. As for your skills, be careful not to choose keywords that are too narrow. For example if your business is in the financial services and tax preparation industry, don’t use the names of niche tax solutions you specialize in like “estate taxes” or “small business taxes” as your endorsed skills. Instead, choose more general words like “tax preparation”. By doing this, your connections will be more likely to endorse you as it’s a broader category.

By following these tips and spending at least 15 minutes a day on LinkedIn, you’re sure to see the number of connections you have grow. And the more connections you make, the less work you’ll have to do to grow your network as more and more people will send you connection requests instead. This will provide more business opportunities and chances for you to meet new clients. If you’d like more ideas how to improve your social media efforts, feel free to email or give us a call.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
April 21st, 2016

2016Apr21_Office365_BMost of us like to think we’d never click on a suspicious link in an email. But the fact of the matter is this is one of the most common ways a business is hacked. We’re all human of course, and we make mistakes. Yet now Microsoft is trying to prevent this. Here’s an inside look at a new Outlook security feature that aims to protect the email of Office 365 users.

Aptly called “Safety Tips”, Microsoft Office 365’s new security feature is designed to help make your employees (and yourself) more aware of which emails may contain harmful content. By analyzing the data patterns of millions of emails, the feature uses a color-coded bar at the top of an email to help you determine what emails are safe, suspicious, or fraudulent.

How it works

Safety Tips uses a simple system to help you identify the safety level of an email quickly. The system consists of four colors that categorizes an email as suspicious, trusted, safe or unknown. The details of each of these categories are outlined below.

Suspicious email Color label: Red Description: This has either failed sender authentication or is a known phishing email. These messages should be deleted.

Unknown email Color label: Yellow Description: Exchange Online Protection marks this type of email as spam. However, you can move this item to your inbox by clicking it’s not spam in the yellow bar.

Trusted email Color label: Green Description: If this email comes from a domain Microsoft deems safe, then it falls into this category.

Safe email Color label: Gray Description: This type of email has either been marked safe by the user’s organization, has been moved from the junk folder into their inbox by the user, or the email is from a contact on the user’s safe sender list.

Color coding will look different between the Outlook app and Outlook for the Web. In the Outlook application, only suspicious emails will be flagged, whereas in Outlook for the Web all four types of emails will be color-coded. However, it should be noted that most emails won’t have any color code as they’re only added when Microsoft thinks they’re relevant.

With hackers getting smarter by the day, and human error a roadblock to a secure business, this new feature will hopefully add an extra layer of security to your organization. If you’d like to learn more about Office 365 or other security services we offer, get in touch today. A more secure business awaits.

Published with permission from TechAdvisory.org. Source.

Topic office
April 18th, 2016

2016Apr18_Productivity_BThere’s a lot of talk about BYOD policies these days. While most companies are more concerned with the security risks that go along with bringing your own device, far fewer business owners forget the productivity risks. Believe it or not, a poor BYOD policy (or lack thereof) can actually hurt your staff’s productivity. Here are some ideas to avoid this pitfall when utilizing mobile devices in the workplace.

Use the right tool

Some work tasks just aren’t cut out for mobile use. While using a mobile phone or tablet to send emails is an effective way to work on the go, trying to write long form reports on these same devices is a bad idea. As a general guideline, small tasks such as email, viewing documents, using search engines and project management apps are good for mobile work. Anything that is too detailed is probably better suited for a computer or laptop. Lastly, only train your employees to use and learn the mobile devices and programs that make sense for their role. If you want them to be most efficient, you don’t want to overwhelm them with every mobile tool your business uses.

Communicate face-to-face

Email is undoubtedly a valuable communication tool. But it’s also become the bane of existence for many of today’s employees and business owners. Too many emails kills your employees productivity, overwhelming them. And unfortunately, many times email is simply unnecessary. Instead of sending that email about a question concerning an upcoming meeting, simply go and ask in-person. You’ll likely get a response much quicker and you avoid adding yet another message to the email overflow.

Consider adding a face-first policy in your office. This means that every time your employees consider writing an email, they should question if it’s easier to just go talk with that person directly. If that person is located a quick walk away, then the conversation should take place in-person. This especially makes sense if your employee needs an answer within a few hours, as sometimes emails go unanswered for much longer than this. By enforcing an email policy, your employees’ inboxes are less likely to be overflowing and your communication will take place in a more timely manner.

Set boundaries

There’s no question that mobile tech can help productivity, but it can also hinder it. The problem is that many employees who utilize it have difficulty “switching off”. The lines between work and personal life begin to blur as completing work tasks is always right at their fingertips. While on the surface more work output from your employees may sound like a good thing, in reality it’s far from it. Being “always on” can quickly lead to burnout. And even if it doesn’t, if your employees don’t take time to break and recharge, their productivity will suffer. To demonstrate just how many employees fall into this trap of overworking, the 2015 Staples Business Advantage Workplace Index surveyed 2,602 employees and found that a quarter of them regularly worked after standard business hours, and four out of ten worked on at least one weekend a month.

So how can you resolve this issue as an employer? Simply set boundaries. Create time frames for when work platforms and applications can be utilized and for when emails can be sent and responded to. Also, don’t encourage employees to work on off-hours by sending emails during the weekend. If your concern isn’t urgent, then by all means wait till Monday to send it out.

Be flexible

While it may sound a bit contradictory to the last point, being flexible in your work policy can be a smart decision to boost productivity. By being flexible, we mean the ability for your employees to work at hours and locations of their choosing. Most people work better and quicker at certain hours as they are more focused at specific times of the day. And some people will work better remotely than they do at an office space as there can be less distractions. The Staples survey supported this fact as 59% of the employees surveyed said that flexible schedules had a positive effect on productivity.

Cloud tools like Office 365 and Google Apps can help encourage a flexible workplace. But regardless of how flexible your office becomes, be conscious that parameters on work, mentioned in the last section, should still be in place to prevent employee burnout.

Mobile devices in the workplace can go a long way towards making your business more efficient and employees happy. If you’d like to learn more about utilizing mobile devices in the workplace or how you can leverage technology to make your business more productive, call us today.

Published with permission from TechAdvisory.org. Source.

Topic business
April 14th, 2016

2016Apr14_Virtualization_BWhen most people think of Disaster Recovery, the idea of Virtualization is likely far from mind. However, these two IT services are more closely related than the average business owner thinks. Virtualization can actually serve as Disaster Recovery Solution. Here’s a breakdown of how it does just that, and a few pointers to keep in mind if you decide to use Virtualization to backup your systems.

As opposed to tape backups, Virtualization reduces recovery time in the event of a disaster. While tape backups can be reliable, using them to fully restore your system after a backup can be an excruciatingly long process. In fact, it can take up to two days to do just that. Think of all the business you could lose in those two days. Think of all the lost money in salaries you’ll pay out out to employees who aren’t working. Simply put, Virtualization is much quicker than tape backups when it comes to Disaster Recovery. Your entire system can be restored in four hours or less. How does this happen? Well, instead of rebuilding your servers, operating systems and applications separately, they exist safely off-site and can be brought back online via your virtual backup.

While the speed of virtualized backups might sound alluring, there are a few key points you should be aware of before moving forward. Here’s what you need to think about:

  • Critical data - where do you want your critical data to be stored? Do you want it stored on tapes? Disk technologies? Or on your virtualized servers? Perhaps it’s best to spread your risk by backing up your critical data to multiple sources because, frankly, your business depends on this data. Regardless, find out what critical data you need to operate your organization and devise a plan to back it up as you see fit.
  • Data to be backed up - Whether or not you decide to store your critical data on your virtual machines, figure out what data and assets you do want stored on them. Then designate specific virtualized servers to store these assets. In case a disaster does happen, you’ll know immediately where your backups live, and can retrieve your data quickly and get your business up and running again fast.
  • Systems to be virtualized - Just as your business has critical data, you also have critical applications. Some of these may include email, Microsoft Office, and applications or software developed in house. Whether or not these applications qualify as critical for your business, identify the ones that do and focus your disaster recovery efforts on them. Like your data and servers, applications can all be virtualized and then safely stored off-site.
If you choose Virtualization as part of your Disaster Recovery solution, make sure your backups are monitored regularly so they’re up-to-date in the event of a disaster. And besides Disaster Recovery, there are many other benefits to Virtualization. Your business can reduce the amount of servers and other hardware in your office, lower your electricity costs, and save money in the process. Consider Disaster Recovery as a nice bonus that’s included with these benefits.

Curious to learn how else Virtualization can benefit your business? Interested in a dedicated Disaster Recovery solution? Call us today and discover how our experts can protect your organization and save you money.

Published with permission from TechAdvisory.org. Source.

April 13th, 2016

2016Apr13_Security_BTaking work home, or practically anywhere else, has never been easier. With personal mobile devices, your employees can access company files wherever they are. Bringing your own device (BYOD) has become a popular strategy for many businesses to conduct work more efficiently and flexibly. But this strategy is not without its problems. BYOD, if not implemented correctly, can make your system susceptible to a number of risks. So what security risks do you have to account for? Here are a few security implications you should keep a close eye on.

Data leakage

The biggest reason why businesses are weary of implementing a BYOD strategy is because it can potentially leave the company’s system vulnerable to data breaches. Personal devices are not part of your business’s IT infrastructure, which means that these devices are not protected by company firewalls and systems. There is also a chance that an employee will take work with them, where they are not using the same encrypted servers that your company is using, leaving your system vulnerable to inherent security risks.

Lost devices

Another risk your company has to deal with, is the possibility of your employees losing their personal devices. When devices with sensitive business information are lost, there is a chance that this could end up falling into the wrong hands. Additionally, if an employee forgets to use a four digit PIN code to lock their smartphone or tablet, anyone can gain unauthorized access to valuable company data stored on that particular device. Therefore, your company should consider countermeasures for lost devices like completely wiping the device of information as soon as an employee reports a missing or stolen phone.

Hackers can infiltrate your system

Personal devices tend to lack adequate data encryption to keep people from snooping. This along with the fact that your employees might not have updated their devices can allow hackers to infiltrate your IT infrastructure.

Connecting to open Wifi spots makes your company more susceptible to hackers. Open wireless points in public places can put device owners at risk because there is a chance that hackers may have created that hotspot to trick people into connecting. Once the device owner has connected, attackers can simply surveil web activity and gain access to your company’s accounts.

Vulnerable to malware

Viruses are also a big problem when implementing BYOD strategies into your business. Using personal devices means your employees can access whatever sites or download any mobile apps that your business would normally restrict to protect your system.

Jailbreaking or rooting a device also puts your systems at risk because it removes limitations imposed by the manufacturer to keep the mobile software updated and protected against external threats. It’s best to understand that as your employees have the freedom to choose whatever device they want to work with, the process of keeping track of vulnerabilities and updates is considerably harder. So if you’re thinking about implementing BYOD strategies to your business, prepare your IT department for an array of potential malware attacks on different devices.

So you might be thinking that it would probably be best to just avoid implementing a BYOD strategy in the first place. However, BYOD will help your business grow and adapt to the modern workplace, and should not be dismissed as a legitimate IT solution. It’s just important to educate your company about these risks so that problems won’t occur for your business down the line.

If you need some help implementing IT security solutions for your company, or if you have any concerns regarding IT, give us a call.

Published with permission from TechAdvisory.org. Source.

Topic Security
April 11th, 2016

2016Apr11_HealthcareArticles_AMake no mistake, healthcare costs are rising. For business owners who are generous enough to offer their employees insurance, this is undoubtedly a cause for concern. And you may wonder, is there any way to protect your employees and not go bankrupt in the process? Wearable technologies may be the answer. Here’s what you need to know about utilizing them in the workplace.

Last year the retail giant Target offered both free and discounted versions of the activity tracker, Fitbit, to their staff of over 300,000. To incentivize employees to use the device, they grouped staff into teams and held a month long competition to see which team logged the most steps. The winning team was then given a million dollars to donate to their favorite charity. This is just one example of the growing number of businesses using wearable technologies to encourage employee fitness.

The CEO of Fitbit, James Park, is well aware of wearable technologies potential in the business sector. In an interview he said, “The cost of a Fitbit device and the associated services is very small compared to the savings from a healthier employee population.”

This practice of offering incentives to exercise is known as gamification, and retail providers are not the only type of businesses to get in on the action. Two US health insurance providers are now offering customers discounts on their premiums if they wear an activity tracker to monitor their progress on accomplishing health goals. So how does it work? If an employee takes 10,000 steps a day, for example, they could earn $1.25 towards their health insurance. If they perform even more activity or exercise, they could reduce their premiums to $1,400 a year.

Incentives to exercise aren’t the only way wearables can help employees improve their health. Depending on the type of wearable worn, everything from blood sugar levels, to heart rate and sleep patterns can be tracked. So if your employee visits a clinic because their symptoms are flaring up again, a doctor can use the info tracked on the wearable to explain why. This can make it easier for both doctor and patient to resolve the health problem.

Controversy

While it may sound like utilizing wearable technology in the workplace is a no brainer, this matter is not without controversy: tracking employee activity raises the question of privacy.

As more and more businesses discover the value of big data, it’s more likely that information tracked by wearables can be exploited. One technology consultant, Barbara Duck, notes that tracking health information can lead to insurers assigning a score to your physical activity and health, and selling that information. Insurers could then use this information to charge consumers outrageous fees.

While this is just the beginning of wearable technology being used in the workplace, it’s too early to tell how privacy will be affected in the long run. As of right now it looks like wearables will be a growing trend in the future. And they’re certainly worth considering as they can reduce the costs of employee insurance and create a healthier, more productive staff. If you’d like to learn more about wearable or other healthcare related technology, get in touch. We’re happy to share our expertise.

Published with permission from TechAdvisory.org. Source.

Topic Healthcare
April 7th, 2016

2016Apr7_MicrosoftWindowsNewsAndTips_BRecently, Microsoft announced a new feature in Office 365 Groups called Connectors. As part of their new openness mantra, Office 365 Connectors allows you to connect with popular third party services without ever having to leave your Outlook client. This means relevant content and updates that you want are sent immediately to your group feed, making workflow more seamless. Here is a bit more detail on what Office 365 Connectors has in store for you.

What can it do?

Office 365 Connectors enable users to access third party apps and services within their Outlook groups, rather than having to scour through dozens of windows to access a specific application. This new feature allows you to keep your company’s discussion in one place, and enables your employees to stay up-to-date regardless of the service used to broadcast an event. For example, your team members can be informed about a particular hashtag that your company is following on Twitter without having to explicitly open the page. Groups aren’t limited to one particular service either. With connectors you can use Twitter, Trello, Mailchimp, Bing, UserVoice and over 50 other services.

Small organizations can also take advantage of connectors. Office 365 lets you develop your own connectors by embedding the Connect to Office 365 button on your site. This allows users to connect to your service and get updates on your company, as they would with other third party services. Basically, with connectors, your Office 365 client becomes a hub for third party that keeps your company in sync to get more work done.

Connector card

Connector cards offer a user friendly way to interact with external applications. If a particular connector is added to a group, connector cards are generated within the group’s activity feed. While most cards will display events in plain text, some applications like Twitter and Trello provide formatted actions to interact with the card. Trello, for example, allows you to Assign or Comment on an event card.

Who can create a connector?

Office 365 group members can configure and use an array of connectors. Once you configure a connector for a specific group, that app will be also be available for other members. However, the person who added a connector to the group is the only one capable of modifying that app.

How do you access Office 365 Connectors?

With its public release, any Office 365 Mail user can use Office 365 Connectors for Groups. Simply navigate to a Group from your Outlook page and click on the Connectors tab at the top of the page. From here, you can connect the available third party services on offer to any of your Outlook groups. You can even configure the settings of your apps without ever having to leave Office 365. However you should probably only consider pulling in the applications that you think your group will be using the most.

As your business grows, you’re going to need more services to be more productive in the workplace. By aggregating them all in one place, you save time shifting around dozens of apps to find the information that you need. So the next time you create an Office 365 Group, help your team members work more efficiently by setting up some connectors.

If you’re interested in learning about the latest Office 365 updates, contact us today.

Published with permission from TechAdvisory.org. Source.

Topic office
April 5th, 2016

2016Apr5_Facebook_BLove, Haha, Wow, Sad or Angry. If you’ve been on Facebook recently, you’ve probably noticed that Facebook has finally added five more ways for you to react to a particular post. Many businesses will find this feature important since these new emoticons now provide a way for you to know what users feel about your service instantly. Here are some more ways your social media page can make the most out of Facebook reactions.

Ask your audience for reactions

Sometimes, audiences won’t know how to react to your posts. You can point them in the right direction by giving call to ‘reaction’ phrases like “Did you learn something new? Give us a ‘wow’ by hovering over that like button”.

As Facebook reactions are a relatively new feature, you can increase the total engagement of your posts by simply asking your fans to use one of the six available expressions on your post. This will not only increase your overall engagement and reach but will also give your fans the opportunity to learn about the new Facebook reactions.

Soften the blow of negative reviews

If your service ever experiences any technical difficulties, reactions can be a lifesaver. Back when there were no Facebook expressions, people would often resort to negative comments or trolling when they are unhappy with a particular post. This could lead to a toxic page environment and may encourage others to do the same or even unfollow your page entirely. With Facebook reactions, you can minimize the effect of negative reviews with a more innocent ‘angered’ or ‘saddened’ emoji. Overall, this looks better on your page rather than lines of nonsensical text in all caps.

Gain more visibility with your page

Commenting and reacting to other local pages on your business’s Facebook account increases your chances of being discovered by potential customers. And, as an added benefit, engaging with other local pages can encourage them to return the favor.

Use reactions as constructive feedback

Facebook reactions add an extra level of depth to measuring how well your posts are doing. Before, more likes would mean more engagement. But now, reactions show that people are invested in your content.

What’s more, you can now measure what people feel about your content. This allows you to tailor your next post so that it gets the most engagement. For instance, if you notice that people are leaving more ‘Haha’ reactions to your posts, then this could suggest that your audience engages with your posts if they see more humor included in your content.

Check out your competition

You should note that page posts are public and can be see by anyone, even those who haven’t liked your page yet. This also means you can review your competitor’s posts and find out how people are reacting to their posts. This is valuable information to gauge what type of content, announcements, or status updates work for your target audience. Or if you find that your competitor is only getting likes rather than reactions, you can try experimenting with creative posts to get people to engage with your content instead.

Facebook reactions create a new and exciting way for people to express how they feel about certain posts. While some social media marketers would not pay too much attention to this feature, focusing on reactions can give you an edge when it comes to measuring how your target audience feels about your service. So the next time you’re going to make a new post, consider some or all of these tips to make the most out of those Facebook emojis.

Need more advice on managing your Facebook page? Contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Social Media