Posts in the Category: CHR News
Shawn, better known as the “mistress of managing” at CHR, joined our team recently after working with us for more than five years as a client, in her work as a legal and executive assistant. With her great sense of humor, she’s already brought a new level of fun to the office. Here are a few fun facts about the woman who steers the ship at CHR:
Q: What’s your favorite thing about working at CHR?
A: “The people! They are so accepting and very helpful. They’re just awesome in general.”
Q: What’s your favorite thing about Portland?
A: “It’s not bad for a city! I grew up in central Montana, so I appreciate how clean it is here compared to other cities. I like Portland, it’s got everything you need.”
Q: What’s something surprising about you?
A: “I play a good game of pool! Back in the day, I even won a city wide competition.”
Q: What have you been reading recently?
A: “Inferno, by Dan Brown.”
Q: What do you like to do in your spare time?
A: “I love spending time in my garden, ceramics and summertime croquet games with my friends.”
Information technology is a broad and sometimes daunting industry. There are multiple facets to IT, such as information security, information communications, data storage, telephony and much more. Below are five best practices for your business, and whether you are part of a multi-national corporation or a local, specialized company, they can help ensure your IT success.
Create a plan
Before diving into your IT problems and practices headfirst, we recommend taking a step back to analyze what you hope to accomplish. Revisit your company mission and core values, then apply those goals to your IT strategic plan. Set goals for how you want to spend your IT budget and long-term and short-term objectives. The business objectives for your company should closely match those of your IT strategic plan. Ensure that your plan is results-driven—the more specific, the better.
Streamline the process
Voice and data convergence is allowing all networks to be combined into one stream that can save time, money and headaches for your company’s IT department. Converged data streams allow for problems and delays to be pinpointed quickly, as opposed to a model where multiple streams are being juggled and problems are harder to identify.
The cloud is now
The cloud has fundamentally shifted the way businesses save information. Cloud storage allows for greater flexibility and easier access to information for employees. Cloud allows for service providers to manage computing so businesses can focus on other things. The size of your company may determine whether SaaS (Software-as-a-Service) or IaaS (Infrastructure-as-a-Service) is the best option. Cloud computing can deliver additional flexibility in providing IT services and free up staff to work on other projects.
Keep security as a top priority
Information security is a must-do for every company, no matter the size. Investing in high-quality security is more cost-effective than paying to cover losses. Also develop an incident response plan in case a breach occurs (see No. 1—planning is key!). As information shifts to cloud storage and the IoT (Internet of Things) expands, there are more avenues than ever before for hackers to access sensitive information. Do your research, enlist the help of IT consultants, and find a solution that works best for your company needs.
Manage collaborative communications
Effective communication is crucial to any high-functioning business. New technology programs are making communication easier than ever. How much will you restrict or accept new technologies into your organization? Collaborative communication systems can combine different segments of business communications under one roof (i.e., email, file sharing, web conferences and calling). What will work best for your team, and how are you going to manage these systems? Will they all be cloud-based, or does everyone need to use the same system? Additionally, making sure communication solutions are mobile-friendly gives workers flexibility. These systems come in varying sizes and with different tools, making it easy to find one that works best for your business, no matter the size.
CHR can help you evaluate all of the above, either from the beginning or any step along the way. Having worked with companies of all sizes with varying IT and technology needs, we have the experience to help your business.
Starting a new job is stressful, and even the most eager new hires can become frustrated during onboarding. Providing a positive experience those first few days lays the foundation for a productive employee relationship – and can improve the bottom line.
Smooth onboarding processes offer substantial financial and operational benefits. Computer-based onboarding reduces errors and the amount of time HR and other staff members would otherwise spend directing new hires. Just as importantly, the sooner employees knows their way around a new position, the sooner they can get to work. Organizations that take advantage of computer-based resources can customize the process to their individual needs and improve the experience for both the employee and the organization. Here are some guidelines you should keep in mind when onboarding an employee into your system.
Make a digital checklist. A to-do list seems like the most obvious of onboarding principles, but many small businesses lack any sort of organized procedure at all. Online lists can notify supervisors or HR as a new hire progresses.
Remember the little things. Do you have a login and password ready before your new staff member walks in the door? Does your team use a standard email signature? Have printers, scanners and other hardware been linked to the new account? There’s nothing more embarrassing than being late to your first meeting because you couldn’t figure out how to operate the printer.
When in doubt, write it out. Step–by-step instructions or manuals for setting up voicemail and phone systems, changing passwords and using other basic resources will help your new employee settle in.
Minimize the paperwork. Much of the standard new hire paperwork, including I-9s, W-4s, direct deposit information and insurance forms can all be handled digitally. Digital forms can be stored in a centralized location and also limit opportunity for human error and skipped boxes that require unnecessary follow up.
Go social. Add your new hire to organization or team Facebook groups, LinkedIn accounts, email lists and employee discussion portals. If you have rules regarding social media usage, make sure they are clear from the get-go.
Be ready to teach. If employees will be using software – whether it be Microsoft Word or a customized CRM – make sure they have the training and preparation to use it effectively. Outline a procedure for online courses, training videos or in-person coaching sessions. Remember that even experienced pros need to be informed about your organization’s standards and best practices.
Streamline the cultural training. Consider digitizing cultural and HR onboarding needs by offering online videos, exercises and quizzes on company culture, sexual harassment rules, technology usage agreements and other expectations.
Shop it out. Specialized software and cloud-based solutions can centralize the onboarding process and sync with hiring and talent management platforms. Consult with your IT experts to determine which option will work best for you.
Above all, be patient. We were all new at some point. And of course, if CHR Creative can help in any way, please let us know.
You probably remember painfully well how many days (or weeks) it took to do your last computer system upgrade or security update, even your phone system. Not only is it time consuming to implement it all, it takes weeks – if not months – to plan for such an upgrade due to the sheer volume of knowledge necessary to learn what needs to be done, and then how it will physically get accomplished.
This is where an external IT consulting company can help your organization navigate and get through a transition most effectively, and probably more economically in both the short- and the long-term than only in-house expertise. Here’s what you can expect from an outside IT company or consultant:
1. Broad-based expertise
Experienced consultants have a broad depth of IT knowledge, and they are trained to know many different systems and software. This is what they do for a living and it’s their livelihoods. As a general course of action, a consulting company will come in and analyze what you’re currently using and provide you with recommendations. They can advise on a variety of tools and systems that will work best in your environment, whether it’s a large company or a small office, a non-profit or a governmental agency, or anything in between. They’ve tested many products and have a good idea of what works and what doesn’t.
2. Depth of experience
Professionals bring real experience in implementing projects for a significant number and variety of different organizations. There’s a good chance they’ve seen it all. That makes problem solving and overcoming any hurdles even easier. They are used to developing a wide range of project scopes and change management plans. They’ve worked with a variety of different management structures and can help overcome resistance within the internal teams.
3. Quicker deployment
A successful IT consulting company will come in and analyze the unique needs for your organization, keep the important internal resources where they belong and not try to reinvent the wheel with every project. This in turn will save you time and money. A good IT consulting team knows how to go about the process of putting a procedure plan or template in place, one that has already proven effective. Letting the experts help not only gives peace of mind, but it can mean quicker deployment. You can scale as needed to get the job done.
4. Independent objectivity
An external IT team can bring an independent, objective point of view and push what needs to really get done. Often change (even if it’s positive) is met with resistance, especially in the planning stages and immediately upon deployment with any project. An IT consulting team can help facilitate discussion with company stakeholders, outline goals and answer questions, concerns and objections to drive the project towards a positive outcome. While internal staff may fret over making certain people happy, an independent consulting company can be more objective through the whole process.
5. HR flexibility and money savings
You still get the specialized expertise that your company needs, but you’ll have a much smaller outlay compared to what you would pay internally. You can work with IT consultants on an on-going basis, or as needed on a project, and have the flexibility to scale up and down. While you may pay a higher hourly wage for a consulting service, in the long run you will save money by saving on salaries, perks, employee benefits and tax contributions. This overall provides you with a more efficient and cost-effective solution to your IT needs.
In summary, IT consultants can provide you with specific expertise, help you complete projects on time and save you money while meeting your organization’s goals. Always ask for references and customer testimonials when selecting a consultant. As always, we’re happy to help answer any questions.
We are pleased to announce that CHR Creative was once again named as one of the Portland Business Journal’s Fastest Growing Companies in Oregon and SW Washington. We found out that we were listed #55 this year while celebrating at a fun-filled, Hawaiian-themed event last night at the Oregon Convention Center, moving up from last year’s #76 out of 100.
The Portland Business Journal’s annual PBJ100 award examines privately held companies in the region, ranking them by percentage revenue growth over a three-year period. We continued to grow over the past year adding 3 additional staff members and increasing efficiencies and technology expertise.
We are most proud of how we’ve been able to successfully maintain our very first relationships while continuing to grow year after year. It never ceases to amaze me how high the integrity is of Portland-area companies and nonprofits that we work with, and we are proud to have such wonderful clients in both the nonprofit and commercial sector.
Thank you to all of you who have trusted us with your IT and communications systems.
Email scams are on the rise, and getting more difficult to identify
There is a type of malicious email referred to as phishing that we’ve been seeing in increasing numbers over the past year, so we wanted to provide you some basic tips on general email safeguards.
Definition of phishing
Phishing refers to an email scam technique that is generally used to gain access to sensitive, personal information, to ultimately commit fraud and/or identity theft.
The essential pattern of most phishing emails
Phishing emails seldom contain viruses, so they’re difficult to filter out with technical means. Instead, we must rely on the user’s best judgement. Keep a keen eye out for emails that contain these red flags:
Many of the people who create these emails do not speak English as their native language, so if you notice spelling and grammatical errors within the subject line or body copy, be wary.
May have links
Sometimes, but not always, phishing emails will contain links. A recent phishing email many people received claimed to be from the IRS, which contained a link that appeared to go to the IRS website. If you hover your pointer over the link, however, you will sometimes see that it doesn’t match the actual organization’s web domain.
Have a call to action; often for sensitive information
Phishing emails often have a call to action – such as “You must click on the link below and sign in to keep your account active.” This type of message often appears in phishing messages sent out claiming to be from large banks, retailers, and social media sites. Be very cautious here – when you click on that link and sign in, you may be unknowingly giving your username and password away to thieves – even if the site appears to look like the real thing.
Can appear to be from someone you know
Even more alarming is that recently, criminals have gotten very good at making emails appear to originate from people you actually know. Called spear phishing, these emails may even look like they’re coming from your boss or co-worker.
Example of an email received from one of our clients:
Hi [real employee name]
Please send me the list of W-2 copy of all employees’ wage and tax statement for 2015,
Kindly prepare the report in PDF and send via email.
[Real CEO’s name]
Because the recipient was cautious, and suspected the email was fraudulent, the request was rejected.
Basic tips to help protect you in your email endeavors
Always be skeptical when people ask you to provide sensitive information. If in doubt, call (don’t email) the person or organization in question and get confirmation that the information contained in the message is valid.
Always delete email sent from unfamiliar sources that contain attachments. If you’re not sure what the attachment is, do not open it. If you recognize the source, but weren’t expecting anything – call to ask if they sent it and what it is.
Never enter your username and password on a website you’re unfamiliar with OR that does not contain a valid security certificate – even if it looks legitimate. You can confirm the site is using encryption by looking for the lock icon in your browser. Every browser is slightly different, but here’s what they generally look like:
This is an encrypted website – note the lock icon next to the site address. When you click on the lock, you can get more details on the certificate, including this one, which shows that the security certificate is valid.
Never open attachments from unknown sources. Even if you get an attachment from a co-worker, family member or friend, do not open it without confirming that they sent it. Viruses sometimes send email from the computers of people who have been infected, frequently without their knowledge.
Never follow links in emails that do not appear to go to the correct location. Hover your pointer over the link and read the address to see if it looks legitimate.
When emailing, always use your common sense, and ask CHR Creative’s IT help desk to help you evaluate any suspicious emails if you’re unsure. You can email us at email@example.com, or call us at 503.427.1808. We’re open Monday – Friday from 8AM – 5PM PST.
May these tips help keep you safe both at work and at home.
With several leading nonprofits among our client base, we’re well-versed in the challenges these organizations often face in managing their technology needs. Compared to your for-profit counterparts, nonprofits are less likely to have resources available to invest in IT in a systematic manner, and you are less likely to have the in-house resources available to manage those technology systems.
The reality is that nonprofits are focused on the causes they were founded to support, not on IT infrastructure. According to the 9th Annual Nonprofit Technology Staffing & Investments Report, nonprofits on average have 4.6 technology-responsible staff – each of whom supports about 28 organizational staff members. At CHR, we’re often able to find economies for our nonprofit clients that your time-strapped internal IT teams have been unable to identify – freeing up more funding to accomplish key missions.
By focusing on what we do best – keeping your IT systems updated and secure – you can focus on what you do best – moving your cause forward. Each nonprofit’s needs are unique, but there are some universal actions to consider to help your organization – and its donors – feel confident that systems and data are safe.
1. Have a backup plan. Where is your data stored, and how often is it saved? A number of backup options are available, including saving your information to the cloud, to ensure that you don’t lose your lifeblood of donor information and funding history – not to mention the time required to rebuild this database if your data or systems are compromised. We also recommend redundancy: More than one location is best. Some data needs to be backed up daily, while weekly is adequate for other data.
2. Keep your staff informed of what’s safe. It’s important to give guidance to your staff about what they can and cannot do while at work or via remote access, or even on their own devices. Make sure they know how to create and maintain safe passwords, and know not to carry flash drives around with your most critical data. We also recommend regular training sessions to keep everyone up–to-date on current threats like phishing emails, malicious links, dangerous websites and ransomware.
3. Keep your software and operating systems current. Staying on top of security patches and support will help limit your system vulnerabilities and keep your systems safe.
4. Secure your wireless network. It’s a basic security precaution, but many people overlook the necessity of changing the default settings when installing a wireless router. This provides an easy route into your network for hackers. Use a strong password and don’t forget to enable encryption.
5. Restrict access to your most important data. Even with a small organization, you should evaluate who needs the ability to log in remotely. We recommend that only a select few people have access and that passwords are changed regularly.
Above all, it’s important to have a plan. CHR can help you ensure that your nonprofit’s unique IT needs are met, allowing you to focus on your core mission.
As we settle into 2016, we are seeing many of the forecasted trends unfold, along with some unexpected twists. From increased adoption of the Internet of Things (IoT) and smart devices to advances in cybersecurity, technology is evolving at a rapid pace. But with any advancement comes an element of risk. If you own a business, it’s imperative that you keep your finger on the pulse of these changes to ensure that you maximize the opportunities they can present for your company, while also minimizing any potential security threats. At CHR, we believe strongly in helping our clients stay abreast of the changing technology landscape.
Here are a few of the most prominent developments we are seeing this year, along with some important security considerations:
Counterfeit Software and Websites
Forbes reports that cybercriminals are using increasingly sophisticated methods—including fake software and websites—to mimic new software and websites, as well as to hack into networks via new mobile and open source systems. More than ever, it’s important to exercise caution when downloading new apps or entering personal information into new software or an unfamiliar website. In addition, every business should have comprehensive IT security measures in place to help protect their company’s data in the event of a breach.
Data and Smart Devices
With the explosion of smart devices, our daily habits amass immeasurable amounts of data about our lifestyles, habits, preferences and personal metrics. This brings great debate about how to secure, utilize and leverage this data while balancing the benefit between individuals and businesses. But one thing is for sure: Data and smart devices will have a permanent and growing role in informing decisions and insights in the enterprise, as well blurring the lines between our personal and professional lives. This underscores the importance of tuning up your company’s security infrastructure—including your employee BYOD policy—to make sure that your company’s valuable data remains protected.
The Cloud’s Increasing Popularity Among Businesses
While use of the cloud to host business software and data is not a new thing, it has become substantially more utilized over the past few years. Offering benefits ranging from file backup to the facilitation of data analytics and increased mobility, it’s easy to see why 93 percent of businesses now use the cloud in some capacity, according to TheNextWeb. Not only does the cloud serve as a great resource for helping businesses achieve their goals, but it has also become remarkably affordable. Despite all of the benefits of using the cloud, it is important to consult with an IT professional to ensure that your business is taking all of the necessary steps to make sure your information is safe and secure.
New Technology Makes Top-Notch Security a Must-Have
In recent years, business have made the mistake of putting security in the back seat in the race to adopt the latest technology—but this is changing. Since 2005, nearly 5,000 company data breaches have compromised more than 896 million records—including information about medical histories, Social Security numbers and bank data— reports The Privacy Rights Clearinghouse. As cybercriminals adopt more sophisticated tactics, and as new legislation requires business to notify their customers when their personal information has been breached, the stakes are higher than ever to implement a solid IT infrastructure that puts security at the forefront. And, in the event of a security compromise, it’s essential to have a team of IT experts to contain the breach and to identify how it occurred so improved security measures can be put into place.
How do you plan to keep your business secure while also remaining ahead of the technology curve this year? Contact us to learn about how we can develop a tailored IT strategy that suits your company’s needs and keeps you at the front of the technology race.
We are pleased to welcome Corey Kennedy to our team. Corey is an onsite technician who services clients’ needs across both corporate and field locations. With more than five years of experience in IT and operations management, he can quickly and skillfully resolve a diverse range of customer issues.
Corey holds a B.A. in Communications from the Thomas Edison State College. His professional background includes working for Amazon.com, Target, NFI Industries and owning his own consulting business.
Often just as intrigued by the root cause of the issues as he is in resolving them, Corey thrives on diving deeply into a new problem and building his clients’ trust through consistency and effectiveness.
Growing up, Corey’s father gave him the advice, “The only person you cheat is yourself”. That piece of advice—for which he credits much of his quick career advancement—has always spurred him to give 100 percent in everything he does. Having three brothers also pushed him to strive toward his personal best, as well as to refine his personal definition of excellence. To him, this includes offering his clients the service he would hope to receive.
Corey enjoys spending time with his 6-year-old son, playing rugby, photography, going to the gym and exploring new restaurants.
We hope your 2016 is off to a good start. As you settle into each new year, it’s a good idea to evaluate new ways of streamlining your company’s operations—including how you handle your IT solutions. Is hiring an IT consulting firm the right decision for your business this year? If so, is it best for you to transition all of your IT solutions to a firm, or just a portion of them, leaving you with some in-house support?
There are a number of benefits to hiring outside support. You might find that as you weigh your decision, these factors come strongly into play when aiming to increase efficiency and lower overhead costs:
Good value: For the same cost as one in-house professional, you can often hire the support of a professional team – and having a team of people handling your IT support means that your tech operations won’t be affected by vacations or illnesses. In today’s fast-paced business climate, outages and network/security breaches need to be addressed immediately—making it helpful to have a dedicated outside team on your side.
Lower logistical costs: You don’t have to worry about providing equipment, professional development or training. When you hire an outside consulting firm, the costs of keeping their employees’ knowledge base current fall on them.
More extensive support: You have a dedicated, service-oriented team of professionals available (often around the clock or during off hours) to tap in the event that you have an IT glitch. If you run into a network or server problem during off hours, you will often receive quick client service from a team of professionals who are specifically dedicated to meeting your needs.
Scalability: You can scale your engagement to meet your company’s needs. Still want to keep some in-house IT employees? Your in-house employees can collaborate closely with an outside consulting firm to achieve your desired results.
At CHR, we integrate our team members’ expertise to create unique, custom IT solutions for our clients. Our service offerings include enhanced technical and business advising services in addition to IT server and infrastructure support—meaning that when you hire us, you’re reaping the benefits of a wide array of talents and skills. Since 2007, we have partnered with CFOs, senior managers and company principals to understand and embrace advancements in IT solutions.
If you are considering hiring an outside IT services consulting firm, contact us for a personalized recommendation about how we can get your IT infrastructure running more smoothly than ever before.