Xtrii
  • Solutions
    • Strategy & Transformation
    • Rapidly Improve Your IT
    • Technology Leadership
    • Address Risks
    • Cloud Services
    • Integrate & Optimize
  • Insights
    • Thought Leadership
    • Press Room
    • Subscribe
  • About
    • About Xtrii
    • The Xtrii Difference
    • The Results
    • Global Clients
    • Client Access
    • Careers at Xtrii
  • Contact
    • Contact Us
    • Social Connections

​Thought Leadership

The Best Personal Technologies of 2017: Categories 5-8

12/26/2017

0 Comments

 
In addition to providing business technology guidance to companies, I’m often asked which personal technologies are the best.   As we wrap up 2017, I'm sharing my best of 2017 recommendations in this series of articles.  

For this best of 2017 review, I will cover the most requested personal technologies in a series of weekly articles.  This week’s article will cover the best:
​
5.  
To-do list App
6.  Printer (personal/small business) 
7.   Home Security Cameras

8.  Data storage (Cloud service, personal NAS… the best way to store your data) 
​

The Best To-Do-List App:  Todoist

Picture
Start your new year getting better organized with the best to-do-list app, Todoist (www.todoist.com).   This category recommendation changed from last year. For many years the best to-do-list app was Wunderlist.  But unfortunately, Microsoft purchased Wunderlist, and frankly, they ruined it.  This year Microsoft announced that they are ending support for Wunderlist, and attempted to move the Wunderlist functionality into their own new Microsoft To-Do app.  So far, those plans are a failure.  Microsoft To-Do lacks some key features that were in Wunderlist, and Todoist has added new features, which makes Todoist the new top pick for a to-do-list app. 

I have tried many different to-do-list apps, and while each can provide a basic list, the easy of use, intuitive user interface, ability to reliably sync your to-do-list between all your devices, and integrations with other apps (such as Amazon Echo/Alexa) sets Todoist apart from the others.  The base version of Todoist is FREE, and even the base version will satisfy most user's to-do-list needs. 

​   

The Best Printer: Epson WF-4720

Picture
Printers come in many varieties, and the best option depends on your particular needs.  For an individual or a small business, I recommend an all-in-one color printer with an automatic document feeder.  For a negligible price difference versus a printer-only device, the all-in-one also provides you a scanner, a copy machine and a fax.     

The best all-in-one printer is the Epson WF-4720.  This one device provides a great color scanner with a high-capacity document feeder, a color copier, a color printer, and a fax,  and it's the fastest printer we have ever tested.  Typically ink jet printers are very slow, but Epson upgraded this model with their new print technology, and it is shockingly FAST.    Who wants to wait on your pages to print?.... nobody.  So, when you buy a printer, purchase one that has the right functionality, great print quality AND great print speed.  

​

The Best Home Security Camera:  Nest Cam

Picture
Nest Cam OUTDOOR
Picture
Nest Cam INDOOR
Many people are looking to upgrade their home security.  The home security market has greatly expanded this year, and the market is now flooded with options.   One consideration is whether you want just security cameras, or do you want a full home automation system that controls your lights, door locks, thermostat, appliances, and other home functions.   In either case, the Nest products are a great place to start. The Nest Cam is very easy to setup, has very solid build-quality, and the video quality is excellent.  The Nest app is excellent, and provides a hub to manage all your Nest products.  Nest also integrates well with other popular home automation products and hubs, such as Amazon Echo/Alexa and Nexia. 

Nest offers the ability to capture the video in the Nest Cloud, which provides you convenient way to access your camera videos from anywhere, and the security of having a copy of the videos at a secure, offsite location....if a thief steals your valuables and your cameras, you will still have a copy of the videos to provide to the police.  The Nest Cam can also be configured to send an alert to your phone whenever a person is detected in a designated area (such as your front door or back door), which is another great security feature.  And once you receive the alert, the Nest App allows you to have two-way conversation with the person through the microphone and speaker that is built into the Nest Cam.   Overall great features and the Nest ecosystem make the Nest Cam the best. 

​   

The Best Data Storage:  Dropbox

Picture
Picture

​One of the most frequently asked technology question is "What is the best way to store all my files/data"?   Over the years, cloud data storage options have changed the way we store and share our files.   One of the first providers of cloud data storage was Dropbox, and now even many years later, they are still the best. 

This recommendation is for individual use, not a large business/enterprise. The needs are different for a large business/enterprise, and that recommendation will be covered in another article.  Today, there are many options for storing your data, with an ever-growing list of cloud data storage providers and new "private-cloud"/NAS options. 

Let's review the cloud storage options.  Google Drive continues to improve and offer new interesting features.  Microsoft OneDrive is becoming more compelling  with their bundling of 1TB of OneDrive storage with an Office365 plan.  I have used all of them extensively, and frequently compare notes with my fellow technology professionals, and the one that everyone keeps coming back to is Dropbox.  It's convenient, reliable, and has the best user-interface.    

Private Cloud/NAS: Some people ask about setting up their own "private cloud", by purchasing and configuring a NAS (Network Attached Storage). While the privacy of your own NAS may sound compelling, when you consider the cost and hassles, your private cloud typically isn't worth it.  We recently  setup our own NAS for an evaluation.  We spent thousands of dollars to purchase all the components, many hours configuring it, and it will continue to require maintenance.  For the total cost of this NAS, we could have purchased 10+ years of a Dropbox subscription.  And the NAS will most likely require even more costly hardware replacements within the next 5 years (or sooner).  With your own NAS, you will still need an offsite, backup copy of your data, which will is another additional cost.  Overall the cost comparison and hassles of having your own private cloud hardware just doesn't make sense.   

Please note:  I recommend that you do NOT keep confidential and/or sensitive data in any Cloud service.  Instead, keep confidential and highly sensitive data on your own, private encrypted drive and back it up frequently with another, encrypted USB drive(s).  Once the backup is complete, keep the backup drive disconnected from your PC and in a separate, secure location. 

A case can be made for each of the options, but overall I recommend Dropbox for your primary data storage.   With pricing continuing to change and new features being added, this recommendation may eventually change.  We will continue to test all of them and monitor the progress, so stay tuned.  


To see the other best of 2017 technologies (categories 1-4), click here.  
  1. Smartphone
  2. Smartwatch
  3. Laptop
  4. Home Technology



0 Comments

The Best Personal Technologies of 2017: Categories 1-4

12/20/2017

0 Comments

 
​In addition to providing business technology guidance to companies, I’m often asked which personal technologies are the best.   As we wrap up 2017, I'm sharing my best of 2017 recommendations in this series of articles.   While many technology magazines provide their recommendations for the best technology, their opinions are typically formed in their lab and can be biased based on their advertisers and alliances.  

The Advantages:  My recommendations are not influenced by advertising, corporate sponsors or other relationships that can impact magazine recommendations .... I simple recommend the best technology.   My recommendations are based on a much larger testing environment that includes extensive hands-on experience, feedback from a very wide variety of customers and environments, 30+ years as a technology leader and global technology advisor, and leveraging feedback from a large resource pool of other global technology experts and their experiences.  
​

For this best of 2017 review, I will cover the most requested personal technologies in a series of weekly articles.  This week’s article will cover the best: 
  1. Smartphone
  2. Smartwatch
  3. Laptop
  4. Home Technology

​The Best Smartphone:  Apple iPhone X

Picture
Picture
Over the years I have used both Android and Apple phones.   I used an iPhone for many years, and three years ago I switched over to Android.  Until recently, my primary phone was an Android phone, the Samsung S7 Edge.   Experts point out that the both Android and Apple have the strengths, and I agree.   Like many technology professionals I have historically tried to avoid being on the Apple bandwagon, and liked the flexibility of Android.  I reviewed the latest offerings, including the Samsung Note 8, the Samsung Galaxy 8, LG V30, Google Pixel 2, and many others.  

But, the iPhone X just look Apple to another level, and after using the iPhone X for several months, it is without a doubt the best phone I have ever used.   The form-factor of the iPhone X feels really nice in your hand, and is well-balanced.  The Note 8, iPhone 8 and other smartphones with comparable screens feel top-heavy and awkward in your hand, and lack the “just-right” feel of the iPhone X.   The iPhone X’s Face ID works great, there is never a screen lag (like you see on Android phones), it has amazing battery life, and the best overall user experience.   Sorry Android fans, Apple created a winner, and overall the iPhone X is the best.    
​

The Best Smartwatch:  Apple Watch Series 3

Picture
I have used many different smartwatches, including Android Wear, Samsung Gear, FitBit and Apple.  For the past two years my preference has been the Samsung Gear S3 Classic Watch. The Samsung Gear looks great, but the battery life was terrible (it often couldn’t last a full day) and the lack of apps was very disappointing.   By far, Apple has the best selection of apps for a smartwatch, and with the Apple Watch Series 3, they finally got the hardware right.   With the Apple Series 3, I typically have more than 80% battery life available at the end of the day, and I’ve gone 3 days on a single charge.   The Series 3 also adds the cellular capability and phone number mirroring with your iPhone, which gives you the ability to leave you phone at home and still send/receive your calls and messages.  The apps, the user interface, the heart rate monitoring, and the overall experience is better on the Apple Watch.  Smartwatches will continue to evolve, but currently the Apple Series 3 is the best smartwatch. ​


​

The Best Laptop:  Dell XPS 13

Picture
Picture
The form factor, The Dell XPS 13 fits a 13” screen in a 11” form factor.  The amazing display is a stunning, edge-to-edge (nearly borderless, infinity display.  The size, weight, case material, aesthetics, included ports, and performance are all superior and all make the Dell XPS 13 the best overall laptop.  For those that want a 15.6” display and even more horsepower (most people don’t really need it), my recommendation is the larger Dell XPS 15.   HP has made improvements, but their awkward trackpad, and overall configuration can’t match the Dell XPS.   Lenovo, Samsung and others have too many quirks and quality issues to be a contender.  Apple has their following, but the current line of Apple laptops are disappointing, and their core components and overall value can’t match the Dell XPS. ​


​

The Best Home Technology: 
​Amazon Echo Dot (2nd Generation)

Picture
​There are sooooo many home gadgets to consider these days.   From robots, home automation, tools, gadgets, and on and on.   But if you have to select the one that does the most for your dollar, it’s the Amazon Echo Dot.   The list price is $49.99, and right now it is on sale for just $29.99.    For that small price, you get an amazing amount of helpful functionality.   With just your voice it can do everything from play your favorite music, add items to your shopping list, order products from Amazon, turn on/off your lights, read you the weather, the news, and your calendar for the day, and many other extremely helpful tasks.   It has an ever-growing ecosystem of apps and capabilities.    Even with loud music playing, the Echo Dot can hear your voice command and is always ready to respond.   Yes, Google has a similar product, but it lags Amazon in the list of apps, integrations, and overall capabilities, and the overall experience is not yet caught up with Amazon.   Amazon also has other variations of the Echo Dot (Echo, Echo Plus, Echo Show) that have larger speakers and a larger form factor, but also a much larger price (2x to 4x higher price).   If you are looking to start building your home automation, and/or want the most bang for your buck in a useful home technology, the Amazon Echo Dot is your best purchase.   

​ 

Check back next week, for the best:
5.  Printer (personal/small business)
6. To-do list/Time Management App
7.  Home Security Camera
8.  Data storage (Cloud service, personal NAS… the best way to store your data)  
0 Comments

Selecting The Right Technology Guidance For Your Business

12/6/2017

0 Comments

 
Picture

​Technology plays a key role in all businesses today.    The right technology can provide a competitive advantage and be a valuable asset for your business, and conversely, the wrong technology and/or an unsuccessful technology implementation can be devastating.   So, before you make that key technology decision, consider these key points in selecting the right technology guidance:
  1. Hands-on experience with proven results:  the source of real knowledge is experience.  Avoid a career-consultant that only has theories and generic consulting templates.  Only take advice from someone that has been there, done it, and has had to live with the results. 
  2. Ability to initiate a mental shift: to fully leverage technology and achieve better outcomes, often it requires a mental shift.  The organization has to change their old ways, rethink processes, and be willing to change.  The right consultant is a change catalyst to help you and the entire organization with the mental shift.
  3. Unbiased:  make sure your internal advisor isn’t biased with internal agendas or personal relationship.  For external advisors, make sure they aren’t also reselling or representing the products/services you are considering, or have other incentives that can influence or bias their opinions.  
  4. Uncomfortable truths and unpopular decisions: the advisor must have the courage to call a bad idea, a bad idea.   Even experienced business leaders can be prone to ignoring uncomfortable truths about your business, but the realities exist and must be addressed. 
  5. Timelines:  The right advisor will help you determine the right pace and time frame.  If you drag out a technology initiative too long, the organization tends to get project fatigue and loose focus.  If you rush the process or skip vital steps, it could produce unsuccessful results.   True innovation has a “window of opportunity”… don’t miss it.      
  6. Unique: Don’t follow a “generalist” that is just reusing the same generic templates from their national firm… if you follow the same generic plan that everyone else if following, where’s your differentiator or competitive advantage?  Insist on tailored guidance and unique expertise.   Your technology advisor must have the depth of understanding and applicable, extensive experience to provide the right insight and unique guidance tailored to your specific needs.  
  7. Provide a real solution and overcome challenges:  While many consultants can motivate you and tell you inspiring, interesting stories, do they have the right experience, insight and leadership to help you overcome challenges and achieve the goals?  The right advisor will help you navigate challenges, and implement timely solutions that work. 
  8. Clear, written roles and expectations:   Make sure their role, the deliverables and the expected outcome is clear at the outset. and spelled out in a written statement of work.  
0 Comments

10 Common Cybersecurity Issues Businesses Face

12/6/2017

0 Comments

 
Picture
We see the headlines too often — another company's information systems have been breached and sensitive data has been stolen.  Sony, Anthem, Home Depot, Yahoo, Target, and  others are recent examples that come to mind.  If these massive companies with their full scale technology teams can be exploited, it can make a business owner wonder: “How secure is my businesses?”

Cybersecurity: A Growing Challenge
Industry experts are predicting that the challenge of cybersecurity is likely to get worse, and that the damages will become even more devastating.  When this happens, the company image and credibility is damaged, loss of customers, huge financial impact, and typically the CEO and CIO are fired.  In the case of a small business, most can’t endure the damage and are ruined.  

So, why does this serious problem continue? How can it be avoided?  


Most companies are not taking the right approach to cybersecurity.

Addressing Your Company's Cybersecurity
To address your cybersecurity the right way, you need to properly assess your vulnerabilities and capabilities.  Here are 10 common cybersecurity issues businesses face:
  1. Inadequate Assessments: Too many businesses conduct assessments that are not comprehensive, and don’t address the most pressing threats.
  2. Inadequate employee training:   Your employees are the front line of your cybersecurity and are often the most vulnerable point.  Cybersecurity experts agree that the best cybersecurity investment you can make is better employee cybersecurity training.
  3. Putting too much faith in Paper Accreditation: Paper Accreditation doesn't equal real-world security:   Most of them grossly miss the mark and give a false sense of security.
  4. Misinformed decision-makers:   To find the issues, decision-makers need guidance from an unbiased, credible, cybersecurity expert.
  5. Forgetting hackers don't play fair:   Today, hackers are constantly coming up with new techniques to trick employees into unknowingly provide the hacker access.
  6. Hackers have a major advantage:  Hackers only have to find ONE vulnerability in order to gain access to your systems and data.  You have to protect the entire environment against all potential vulnerabilities.
  7. Hiring a cybersecurity company without research:  It’s important for companies to do heavy research and hire the right cybersecurity expert with hands-on, real-world experience that's prepared them to know the right questions and the right follow-up questions to ask specifically for your company.
  8. Being held up by cost concerns:  A comprehensive cybersecurity assessment can be very affordable, if you select the right firm.  When you consider the staggering cost of being hacked, the cost of a cybersecurity assessment is a very wise investment.
  9. Thinking cybersecurity is only an IT problem: Cybersecurity is a company-wide responsibility.  The Board of Directors, the CEO, and everyone in the organization must be properly educated, prepared, responsible, and focused on cybersecurity.
  10. Not putting in the time: Take time to craft the right, comprehensive plan, and sustain your cybersecurity focus:  Your organization is counting on it!

Cybersecurity is vital for your future, and doing it the right way makes all the difference.   ​
0 Comments

7 Ways to Protect Your Email from Hackers

12/6/2017

0 Comments

 
Picture
Technology protection has improved over the years and hackers have shifted their focus from technical vulnerabilities to individual vulnerabilities.  Tricking one person into giving up computer access is the easiest path to sensitive information, and hackers have developed some clever strategies for doing so through email.
​Below are some of the top email threats, and how you can protect against them.
  1. Beware of intriguing/funny emails:  That funny joke or animated dancing elf picture your friend just sent you isn’t so funny when it ruins your PC and steals sensitive information.  Hackers often publish these pictures/jokes and hide their viruses/malware in the attachment.  When someone emails the files, they are unknowingly distributing the Hacker’s malware. Be smart. If your friend sends an email that looks spammy, it’s best to be on the safe side. Don’t open it, and delete it  immediately.  
  2. Look out for emails from an unknown source/random emails:  If you don’t know the sender or you are not expecting an email from the sender, call by phone to verify before opening the email.
  3. Guard against email “spoofing”:  Hackers can make their email address look like it came from the CEO of your company, another VIP, or an important entity asking you to do something unusual or suspicious (such as transferring money or providing your sensitive, personal information). If you’re surprised to be receiving an email from someone, there’s chance it’s a fake account. Don’t be fooled. Contact the sender to verify before opening the message or proceeding with the request.
  4. Disregard emails with threats:  Don’t be fooled by emails containing threats or that attempt to scare you into taking action — even if the email contains the logo of a prominent entity and appears to look official on the surface.  Hackers often use the logo of the FBI, IRS, your financial institution, or other organizations along with a spoofed (see #3 above) email address to trick people. These emails often contain language such as “Failure to follow the instructions in this email within 24 hours will result in serious consequences for you….”.  Don’t fall for this. Credible organizations don’t send these types of emails.  Don’t open the email or click on any links in the email.  Instead, directly contact the organization via phone or the organization’s official website.   
  5. Don't click email links:  Don’t click on any links in an email.   Links can deceptively re-direct you to the Hacker’s website that is used to attack your computer.  Instead, open a new browser window and go directly to the proper company website.      
  6. Don't open email attachments:  Don’t open any email attachment from someone outside your company, unless are specifically expecting it and the source is trusted.   If in doubt, contact the sender by phone before opening.   
  7. Don’t use email for sensitive information:  Never provide your password, social security number or any sensitive information via email.  
0 Comments

5 Hidden Cybersecurity Threats and How to Defend Against Them

12/6/2017

0 Comments

 
Picture
​Cybersecurity threats have evolved over the years. And for business owners to be prepared, it’s important that your protection and knowledge evolve accordingly. In the past, the right technology safeguards, such as firewalls and anti-virus/malware protection were adequate.
But now, hackers have responded by shifting their target from technical vulnerabilities to PEOPLE vulnerabilities. It’s much easier for a hacker to trick you into unknowingly giving up access to your computer and sensitive information.   Hackers often utilize our everyday habits and familiar tools for their exploits.  Below are 5 of these hidden threats, and how you can protect against them.

1. Portable drives
People often use USB portable drives for storing and transferring files.   Hackers know that they are a commonly used technology, so they’ll often load their viruses/malware on a USB portable drive and drop it near the entrance of a building.  They’ll even add a label titled “Confidential”, “Company Salary Information”, or other intriguing labels to entice you into picking it up and plugging it into your computer.  As soon as you plug it in your computer, the malware is immediately transferred to your computer and spreads to other computers on your network.  So, make sure you never plug in drives from unknown sources.  

2. Beware of “FREE”
Free apps and free social media services are frequently used to collect and sell your sensitive personal data. Your contacts, pictures, messages, and other very sensitive information are gathered by the app, and — unknown to you — are often uploaded to the provider to be sold to others. Your privacy and personal information is valuable. So, be careful with “free” apps and always look over the privacy policies for the social media websites you use.

3. Don’t use public or free WiFi  
While the free WiFi at the coffee shop, airport, or other public location may be convenient, it is also dangerous and best avoided if possible. Hackers can use free WiFi to gain access to your PC and steal information. Instead, try using the tethering option on your cell phone to setup your own private, secure internet connection (be sure to check your cellular data plan usage), or wait until you are back to your office or home to use a private, secured connection. 
   

4. Secure your paper documents
Don’t leave confidential/sensitive documents lying around on your desk unattended. Hackers can walk around an office environment looking for unattended documents they can use to gain access.  Before you leave your office, put away and protect those sensitive documents. Implement a “Clean Desk Policy” at your company.

5. Report suspicious activity 
If you see an unknown person walking around the office, or your computer system has changed in some way with no notice from your IT team, communicate it to management. Communication is vital to address these issues as you can work with your team to minimize the threat.
0 Comments

    Author

    ​Mark Johnson is the Chief Executive Officer at Xtrii. He is a 10x CIO, global technology advisor and business leader.  He has received global awards and recognition for excellence in technology and innovation. 
    ​For more than 30 years he has helped some of the world's best organizations optimize their technology and achieve extraordinary success.
    For more details visit his LinkedIn profile or follow him on Twitter @johnsonme.​

    Picture

    Archives

    April 2020
    March 2020
    December 2019
    November 2019
    October 2019
    June 2019
    March 2019
    February 2019
    January 2019
    August 2018
    July 2018
    June 2018
    April 2018
    February 2018
    January 2018
    December 2017
    December 2014
    November 2014
    June 2014
    April 2014
    March 2014
    February 2014

    Categories

    All
    CyberSecurity
    Excellence
    Healthcare
    Improving Performance
    Leadership
    Presentations
    Videos

    RSS Feed

© Xtrii, LLC, All Rights Reserved 
Austin  |  Dallas  |  Houston  |  San Antonio

Service Marks | Terms of Use | Contact
  • Solutions
    • Strategy & Transformation
    • Rapidly Improve Your IT
    • Technology Leadership
    • Address Risks
    • Cloud Services
    • Integrate & Optimize
  • Insights
    • Thought Leadership
    • Press Room
    • Subscribe
  • About
    • About Xtrii
    • The Xtrii Difference
    • The Results
    • Global Clients
    • Client Access
    • Careers at Xtrii
  • Contact
    • Contact Us
    • Social Connections