Updated Messenger

LinkedIn’s Updated Messenger Improves Communication

If you’re a professional, the likelihood is that you’re on LinkedIn. With over 100 million users in the U.S. alone, and that number only representing about 30% of the total user pool, it is by far the most popular, some say essential, social media platform for serious workers. Despite its popularity, LinkedIn has suffered some PR issues with its behind-the-times approach to certain functions. Well, that changed a bit this month with the severe (and overdue) renovation of the message service.


The Problem

Up until now, LinkedIn’s “messaging” has been no-frills to put it mildly. When it began, it made sense that messages were synonymous with emails. Hence LinkedIn’s layout of a pretty bland, and not especially user-friendly, email add-on. Attachments were impossible, the form was, well, too formal, and it became one more inbox filled with clutter and in need of sorting and organization.


The Changes

The real change is that LinkedIn has finally gotten with the times and embraced the message-style layout. More and more people function on a daily basis with messages back and forth. Common sites like Facebook and iPhone messenger are now as natural to younger workers as swimming to a fish.

LinkedIn’s layout is now built around who you’re talking to rather than the message itself, giving you a list of conversations grouped by participants and allowing a bit more control over filters. It also makes communication over different devices easier.


Easier Communication

On the note of ease, not enough can be said. The formality of conversation among professionals has been decreasing as we all become more and more used to being constantly connected. The idea is that one person can easily shoot a quick sentence to someone across the country as if they were in the same building. That is, after all, the driving idea behind social media.

In addition, users are now able to attach photos, documents, and other files to individuals or groups involved. The ability to scroll back on a single thread means you can catch up quickly and your “inbox” is organized for you.


Better Communication

As you can guess, millions are breathing a sigh of relief. It’s not just the frustration with the old way that has them pleased, though. It’s also the idea that LinkedIn’s messenger makes communication more natural. With small additions like being able to add GIFs and personal bits of flair, users will be able to communicate more personality than the stark system of old. What’s more, LinkedIn has even gone so far as to suggest that a new teleconferencing function will be available, too, making LinkedIn a valuable place that lives up to its name.

Cyber Criminals

Why Small Businesses are Susceptible to Cyber Criminals

Among the many hardships that small businesses can generally face, one that is particularly detrimental today is the lack of proper cyber security managing. Recent surveys of small businesses revealed that in 2013, 55% of respondents were victims of security breaches with the year. Moreover, 53% of those that were compromised were actually breached more than once in the same year.

A contributing factor to this issue is that because of their size, many small businesses wrongfully assume that they are not likely to ever be targets of an online security breach or data hack. This assumption often leads to more lax security practices, making these businesses susceptible to the attacks of cyber criminals. Fortunately, there are several ways to help prevent being victim to cyber criminals. Below are some common yet avoidable security mistakes for small businesses to be mindful of.

1. Rushing Projects for Fast Turnaround Time

Most businesses big or small will pride themselves on their efficiency, but the pressure to live up to this claim can actually create risks sometimes. The high demand for IT-related projects tends to create particularly high-pressure situations within businesses, and studies have shown that many businesses have subsequently released projects that were not properly equipped with security features yet. With security often being the last aspect included in a project, many smaller businesses are left prone to cyber attacks. This can be prevented if security is simply made a priority at the beginning of a project, rather than at the end when time is running out.

2. Easy-to-Guess Passwords

If your password is easy to remember, then it is also most likely easy to guess. The mentality of “it’s so obvious that no one would ever bother trying it” is an all-too-dangerous false sense of security that ends up occurring when businesses create passwords for their systems. Statistics have shown that one-third of small business security breaches are caused by poor passwords. IT professionals can help protect against this by including two-tier authentication on systems.

3. Pointing Protection in the Wrong Direction

External threats to security are of course a huge concern or small businesses, but many make the mistake of believing that those on the outside are the only threat. Unfortunately, internal threats to security can be just as prominent. Surveys of small businesses have revealed that nearly half of all respondents considered pressure to protect against internal security threats to be even greater. There is often a family mentality coupled with a great deal of trust within small businesses, which, while understandable, also complicates this issue. Businesses can work against this by educating staff threats that are both intended and unintentional.

data backup solutions

5 Ways CPAs Benefit from Data Backup Solutions

CPAs are the keepers of all things financial. With that in mind, CPAs must establish comprehensive data backup solutions and practice diligence on a daily basis. A CPA needs to be disaster-proof, and a comprehensive backup and disaster recovery plan is essential.

Ways to Protect Yourself, Your Business, and Your Client

Consider comprehensive data backup solutions that are easy to deploy yet effective and affordable.

  • Identify mobile technology that can be carried if disaster strikes
  • Establish both a physical and virtual meeting place for all employees
  • Transition to an automatic backup system
  • Go virtual with the cloud
  • Establish and enforce privacy, disaster, and security protocols
  • Hire an IT company to complete a needs assessment for your CPA firm

5 Benefits of Using Data Backup Solutions

Older data backup solutions are neither effective nor efficient in today’s modern industry. First, discs don’t survive long in disasters and backup schedules are only as effective as the people who remember to do them. When CPAs employ virtual data backup solutions, they reap the benefits of technology and efficiency in five distinct ways.

1. Eliminates technology troubles

CPAs face a number of challenges and threats: weather, fire, theft, human error, security intrusions, compliance, technology crashes, and a number of other issues. When any of these occur, a CPA can lose everything he/she has that allows the firm to operate. Virtual data backup solutions ensure all data collected is encrypted, backup solutions are supported, and the virtualization process reduces downtime.

2. Increases mobility

CPAs can work remotely with backup solutions. Any data collected by a CPA will be collected, encrypted, and saved for easy retrieval back at the office or anywhere else the user has a secure connection. Mobility also aligns with a CPA’s disaster recovery plan to ensure businesses can pick right back up without downtime or missing information, wherever business needs to happen. Think about it: if a colleague leaves, the computer system goes down, you cannot access the office, or you lose a device, how will you retrieve vital client data?

3. Reduces costs

Implementing a virtual data backup solution cuts costs. Not only will a CPA save money on the backup solution, but mobility and efficiency increase profits, less IT hardware saves money on energy costs, and CPAs won’t have to shell out cash or lose profits because of security breaches and IT repairs.

4. Improves relations between CPAs and their clients

One way to ruin the relationship with current clients and future clients is to tell them you lost their information. Mobility and impenetrable security improves the relationship between CPAs and their clients. CPA accessibility, efficient and thorough delivery of services, resilience from security intrusions and personal information hijacking, and swift response to the client all aid in nurturing the relationship between the CPA and the client.

5. Automation and Redundancy Result Better Data

Virtual data backup solutions are automated and redundant, which means everything is saved, retrieving it is easier, and losing it is virtually impossible. Cloud computing for CPAs also ensures data is “clean.” Virtual backup solutions with the cloud provide CPAs with an environment that organizes the work and ensures all data collected is accurate and in real-time.

Nerds Support knows the challenges CPAs face, and they are equipped with the vital tools and plans for IT success that set successful CPAs apart from the rest.

Technology for CPAs

Nerds Support is a proud sponsor of the FICPA 30th Annual Accounting Show

Here at Nerds Support we have made serving our clients’ needs our number one priority, but doing so requires us to invest a lot of time and effort into understanding our clients’ needs.

That’s why we are proud to announce ourselves as a sponsor of the FICPA 30th Annual Accounting Show in Florida and will be in booths 108 and 110. Doing so allows us to continue to engage CPAs and other professionals within this industry to demonstrate just how serious we are about it.

We have been delivering IT Managed Services and cloud solutions in South Florida for over 10 years now. Our specialties include hosting Accounting Programs, Microsoft & 3rd party applications. We deliver simplified user experience with a single user interface via a Webtop Portal and security of our OS33 Platform that is entrusted by Fidelity to also deliver applications to their independent advisors.



Exhibit Hall – Open to the public
Outstanding vendors
Exciting prize giveaways
Easy access to email at the FICPA Internet Café

The 30th Annual Accounting Show Vendor Showcase puts you close to the resources that advance your business. Learn the latest tools, technologies and services available for the industry; discover solutions that increase your productivity and ROI; and cool off with refreshments in the lounge – you won’t want to miss our prize giveaways!


The Vendor Showcase highlights companies from a broad spectrum of important areas, including:

  • Accounting Software
    • Financial Services
    • Office Supplies and Services
    • Outsourcing Services
    • Payroll Providers
    • Professional Employer Organizations
    • Publications
    • State Agencies
    • And much more
Hollywood Technology Security

How Hollywood Manages Technology Security

As we’ve seen in the past year, not even Hollywood is immune to online security breaches. We saw it on a personal level, with stars like Jennifer Lawrence, Kate Upton and Kris Jenner having their clouds hacked into and nude photos being revealed. This was shocking, yet not totally surprising. However, when it happened on a corporate level and Sony Pictures had their system breached, it was alarming. After strong criticisms about not protecting their staff and clients’ privacy, Sony and all of Hollywood realized it better get its act together and implement new measures to secure their confidential data. Here we discuss the issues and some ways that Hollywood technology security is changing and improving.

What Went Wrong With Sony’s Online Security?

At one time, not so long ago, it was simple for Hollywood executives to keep their secrets secure. All one had to do was confiscate a crew member’s computer or cellphone that was issued by the company. Now, employees in Tinsel Town have their own personal smartphones and devices that receive company emails and contain apps with data stored on cloud computers. If your crew isn’t willing to follow the rules, it is difficult for the executives to manage what information is shared. This is why experts believe North Korean hackers were able to expose personal emails and details about Sony last year. Hollywood studios quickly realized they needed to improve how they guard their most sensitive files.

How Hollywood Manages Technology Security Today

Most of Hollywood has turned to the help of managed services for technology security. These companies are able to wrap files individually with passwords, encryption and monitoring systems that keep track of who is accessing and doing what with sensitive files. The service that Sony is using gives the creators of the files the ability to manage who can edit, share, view, scan and print a file and for how long they are able to do these tasks. If hackers swipe the file from someone’s computer, the only thing they can view is a group of encrypted characters. Many Hollywood studios have removed their movie editing software completely off the Internet so hackers have no chance of getting to it.

Updating Old Systems in Hollywood 

Hollywood studios have always had some paranoia about their scripts being stolen. The old way of protecting the scripts was to etch them with watermarks, and print them on colored or mirrored paper so they could not be photocopied. (In some cases, these practices are still used.) At times, plot endings are completely left out and the most precious scripts are locked in briefcases. Unfortunately now watermarks can be lifted and color copiers can duplicate any color script.

In the vain of old-time tricks, the new security companies are developing invisible watermarking to be added to files. There is even a feature that mimics how it looks to hold a bright flashlight over a script in the dark. This feature makes it hard for anyone looking over your shoulder to read the documents, and it will thwart hackers who try to get screen shots of the document or the web browser. While it will take some getting used to, Hollywood is working to embrace these new technology security tactics to protect their most sensitive materials.

Data Backup and Disaster Recovery Plan

The Importance of a Data Backup and Disaster Recovery Plan for Businesses

Have you established a data backup and disaster recovery plan for your business yet? If not, remember this, the Miami area has officially entered hurricane season. When hurricane season hits, businesses frequently experience power outages, flooding, electrical fires and other destruction that leads to loss of data and the prevention of the company from operating at all. Hurricane season is technically June 1 through November 30, but occasionally severe storms will occur outside of these dates. While we prepare our homes and families, we must prepare our company’s crucial data. Putting a Business Disaster Recovery (BDR) plan in place can protect your business from an eminent shutdown.


What is a Business Disaster Recovery Plan?

A BDR is a solution to backup a company’s data so it can be recovered in case of a serious malfunction like a server going down, or a disaster such as a fire or flood. There are different methods of backup. Some companies use a hosted cloud server, while others backup to an external hard drive, USB drive, Network Attached Storage device mirror to another server and more.


Consequences of Not Having a BDR Plan

Without a BDR plan, your company is extremely vulnerable when a disaster strikes. Possible and likely consequences are:

  • Loss of confidential data
  • Cost of downtime, by losing days of work while trying to restore data
  • No way no recover data
  • Loss of clients
  • Loss of reputation

Many companies without a BDR plan never fully recover and the others completely go out of business.

Businesses in Miami and the surrounding Florida areas always have the threat of hurricanes on their minds, and we have seen the devastating destruction they leave behind. Even a tropical storm will significantly leave its mark on land. If you’re not too concerned about weather, there are other possibilities you should remember. Network problems and computer equipment failures can happen to any company. Let’s not forget data breaches by hackers looking to find financial and personal information belonging to clients and employees.


How a BDR Plan Protects Your Company’s Data

With a BDR plan, your business is protected against loss of data, equipment failure or theft. An IT Service like Nerds Support will work with your business to customize a solution that involves planning, prevention and protection in the event of a disaster. Our team works to routinely update the BDR plan if your company expands by adding another branch, new equipment is added or more employees are hired. We will ensure that you can access and fully recover all of your stored data. This will eliminate downtime that hinders your company’s ability to continue working and earn money. The BDR plan will work in conjunction with a Business Continuity plan and the virtualization of your network, so that your business will be up and running again in minutes, as if nothing ever happened.


Contact us if you have questions about establishing a Business Disaster Recovery plan for your company, large or small. Our friendly and knowledgeable staff will be happy to answer all of your inquiries in a timely fashion!

Wearable Tech

How Business Professionals Can Use the Apple SmartWatch

If you haven’t heard about the Apple SmartWatch you must have been living under a rock for the past few months. Apple’s newest gadget had lines around the block, web sites crashing and very long waiting lists. Now that it is becoming more accessible, you might be wondering, what is this gizmo anyway? Sure, we see that you can text, track fitness, e-mail, play music and more, but what if you’re in the professional business world? Let us tell you a little about the Apple Watch and how it is useful for business professionals.


About the Apple Watch

Although it is a smartwatch, it is colloquially known as just, the “Apple Watch”. The device obviously tells time and Apple advertises that it can keep time inside 50 milliseconds of definitive global time standard. The Apple Watch does so much more. It is a wearable computing smartphone-type gizmo that is worm on your wrist, but operates like a smartphone. The watch comes with many choices of band colors and cases and can be upgraded to the “Sport” model or 18-karat gold “Edition” model. The watch connects to other iOS devices such as the iPad or iPhone so you can make calls, access visual voicemail, monitor health and heart rate, get map coordinates, check weather and much, much more. The Apple Watch can be equipped with many apps just like your smartphone can.


How the Apple Watch is Useful to Business Professionals

There are many ways business pros can benefit by using the Apple Watch. It helps users stay mobile by being able to check e-mails, voice mails, texts and make calls as well as check stock updates. The watch is able to handle apps that will be helpful during and after the workday and here are a just a few:


Evernote App

This app has been popular on desktops and mobile devices for awhile now. It allows businesspeople to keep organized, which is key to efficiency. With Evernote you can keep notes, set reminders, share documents and more. You can sync the app across devices and collaborate with colleagues via chat and track your receipts for expenses.


Tempo Smart Calendar

This free app lets you get the information you need before meeting with a client or when you’re going into a meeting. Find e-mails and other documents with a few taps and get driving directions if you’re running late or a flight status. The Apple Watch lets you send messages with a quick tap of preset responses, as well as see your day’s agenda. You can see your upcoming events or when you have free time.



Invoice2Go is a cloud-based service that lets professionals make price estimates, invoices and purchase orders at the same time that it is giving a summary of money owed and paid out. You can track time in the app so you are able to provide the most accurate pricing when it is necessary. Save hours making invoices and get paid faster!

Windows Server 2003 (b)

What You Should Do When Microsoft Server 2003 Ends

July 2015 is quickly approaching and so is the end of the road for Windows Server 2003.The date, July 14 to be exact, is when the Microsoft server will stop extended support. This is serious because it means no more security updates or patches, putting your business and applications at risk for hackers and breaches. Let us break down a few of the side-effects of the end of Windows 2003:

  • End to Compliance: When there is a lack of compliance with a variety of regulations and standards it can be calamitous. This possibly includes several industry and regulatory standards for which compliance will no longer be successful.
  • End to Updates: There will no longer be any more updates for the 37 critical updates that were released for Windows server 2003/R2 in 2013 under extended support. After the end of support, no more updates will be developed.
  • End to Applications Support: Once the operating system they run on is unsupported, many applications will no longer be supported. This will include all Microsoft applications.


Plan for Migrating to Windows 2012

This is a move that should be made sooner than later since it takes on the average 200 days to completely make the changeover. If you do not upgrade your systems you will be vulnerable to data breaches and suffer software compatibility issues on top of the problems we have already mentioned. If you’re worried about the move because of costs, have a plan in place anyway for once it is worked into your budget.

Set a Timeline and Budget

Since it takes 200 days, be sure to set aside time for project scoping. There is much more to migration than copying files. With steps such as implementation, assessment, migration an debugging, you want to find any possible issues early on and not get set back during the migration. When working the move into the budget, consider costs for necessary human resource requirements and possible project risks. Make sure your timeline is realistic because rushing will only create unnecessary issues and cost more money.

Monitor and Restrict Access to 2003 Servers

Once your company is making the move, take into consideration some security measures. Lock down services and place limits to access of the physical server. Be certain that logging on is enabled to monitor for strange activity or access that is unauthorized. Limit user access and permissions as much as possible.

Backup Aggressively

Backup actively and aggressively because of potential compromises, and also because 2003 is not going to be repaired in any way. Therefore an un-patched bug could lead to the loss of data or corruption. Backup regularly and thoroughly.

Whitelist Applications

Whitelist apps for the company. This means you tell the employees what apps can be run. With only trusted software running on the server, malware and zero-day exploits will be locked out.

Cloud Backup

For added security, consider backing up data on the cloud. This does not involve any hardware you have to spend money on. Once you sign up with a provider you can begin uploading in minutes. Shop around for affordable cloud service providers.


If you have any questions about migrating from Microsoft server 2003, please contact us. Our knowledgeable staff can handle all your IT needs.

movie releases

Big Movie Releases for June

If you’re looking to go to the movies in June, you couldn’t have picked a better month! There are several hot new releases coming out that will amaze and entertain you.


Entourage – June 5

This sequel to the seven-season hit series shows us the return of movie star Vincent Chase as well as that of his boys Eric, Turtle and Johnny. They are back in business with Ari Gold, their agent turned studio head and are getting ready to shoot the movie of a lifetime amid a colorful cast of characters playing…themselves.


Spy – June 5

In this comedy, Susan Cooper (Melissa McCarthy, The Heat, Bridesmaids) is an unassuming analyst at the CIA who volunteers for a dangerous mission with global consequences after all “real” agents have failed to complete it.


Jurassic World – June 12

Set ten years after the first Jurassic Park film, Isla Nublar is a popular and successful dinosaur theme park. Visitor rates are declining, however, and executives Vincent D’Onofrio (Run All Night, Mail) and Chris Pratt (Guardians of the Galaxy, Parks and Rec) decide to try something new, which backfires horribly…


Me and Earl and the Dying Girl – June 12

In this independent teen drama, a young aspiring high school filmmaker and his best friend befriend a classmate with leukemia. The story chronicles this tale of hope and sadness in an upbeat tempo that will pluck the audience’s heartstrings.


Inside Out – June 19

This Pixar film tells the story of the emotional journey of a young girl as she moves in to a new house, from the perspective of her emotions! See how Riley copes with her new surroundings in San Francisco as she navigates her home and school life.


Dope – June 19

Narrated by the soothing sounds of Forest Whitaker’s voice, this story tells the tale of Malcolm, a geek living in the rougher part of Inglewood, a rough part of Los Angeles. Through a series of unfortunate events he and two friends are thrust into a strange adventure that, while dangerous, could prove to Malcolm the kind of man he may eventually become.


Manglehorn – June 19

In this drama, Al Pacino (Heat, the Godfather) is Manglehorn, a small-town locksmith who is trying to start his life over. Left heartbroken by a woman decades ago, he makes a new friend and is able to see life differently and in a positive light once again.


Ted 2 – June 26

Mark Wahlberg (The Departed, Pain & Gain) and his foul-mouthed teddy bear are back in this sequel to the 2012 comedy. In this installment, Ted is happily married but will have to prove his fitness to be a father to a judge. Hilarity ensues.

Colocation Services

The Benefits of Colocation Services

What is colocation?

Colocation involves a facility that houses data and customers can use these buildings to store their servers and computing hardware. Normally the colocation service provides companies with the actual building, the systems that will cool and prevent the servers from overheating, electricity/power, bandwidth or Internet access as well as physical security. In return the customers or businesses provide the servers and the software.

Benefits of colocation:

  1. Cost effective. By using a colocation to house servers, a decrease in costs associated with IT management results. You no longer are responsible for the cooling and security needs of your servers, so as time goes on and maintaining power, a stable environment, and building expenses grow, your monetary output does not.
  2. Power capacity increased. Housing your servers privately would leave you susceptible to the increase and fluctuation of electrical costs which result in power capacity issues, especially when attempting to upgrade to newer IT applications. Colocation provides customers with a higher power bank, or a higher availability when it comes to power-per-square foot. This would allow clients to take part in high density computing without having to worry about being limited due to capacity problems.
  3. Network reliability. Having a stable connection is prudent to the development and success of any business, when storing your servers in a colocation network reliability is guaranteed. Most companies that provide this service have multiple different networking options that customers can choose from, which allow for flexibility and opportunities that would be more costly to establish in the private sector.
  4. Durable and affordable bandwidth. The more complicated the applications are that your company runs, the more bandwidth that you will need in order to conduct business. Using a colocation allows you to maintain freedom in respect to your service providers, further allowing you to receive your bandwidth at a volume price and helping you to avoid dealing with multiple contracts.
  5. Security and protection against data breaches. It is becoming more difficult to ensure that your data and information is safe. As time goes on data breaches increase, and the repercussions of allowing this to occur becomes more severe and more expensive. However, colocations are protected against forced entry, access that is unauthorized, and natural disasters. These places work to safeguard your information in a more efficient manner than would be guaranteed in the private sector of data storage.
  6. Disaster recovery. In addition to making sure your information stays safe from day to day, using an offsite location to house your servers will allow you to hold on to important data in the unfortunate event that your business is victim of a natural disaster. Sites of colocation will ensure that all of your servers and data remain viable, operational and fully functional.

Colocation is an innovation to the field of data storage. It provides customers with an economically feasible option that allows for flexibility, customizability, and expansion without having to worry about security, power capacity, or network reliability. In comparison to private data centers, it is easily apparent that colocation has the potential to benefit your business on a larger scale and broaden the way your company is able to compute.

Colocation services from Nerds Support can help your business realize the benefits associated with colocation, and let you focus on what matters to you – running your business.