Technology should be reliable, increase productivity, un-complicate work and evolve with your business. At BCA we provide the services to make that happen! Contact us today!

Business Computer Associates, Inc provides TOTALCare IT Managed Services and is an Enterprise Resource Planning (ERP) Solutions Provider for businesses throughout South Florida.

Since 1990, we have worked with progressive companies and organizations that know the value of technology and want to get the most out of their IT Services and Enterprise Resource Planning (ERP) investments. BCA currently provides services to thousands of users and hundreds of small and medium sized business throughout South Florida.

Enterprise Resource Planning (ERP) – BCA is a Sage Software Gold Development Partner and a Top Sage Reseller / Select Business Partner. As one of the top Sage resellers in the Southeast, with over 300 implementations, BCA has the expertise to help you with the installation, training, and support of Sage products. BCA is your partner in achieving greater success through advanced scalable, integrated accounting and business management solutions from Dade County to Broward County.

IT Services – Business Computer Associates provides the specialized Computer Support that can help you achieve your business goals. Our flexible Network Services can allow you to focus on your business, instead of the technology you need to keep it running. As a trusted partner in technology, we are dedicated to providing a range of Computer Support, Network Services and IT Consulting in Miami, Doral, Broward, Coral Gables, Coconut Grove, Miami Lakes, Medley, Miami Springs, Miami Gardens, Pinecrest, Aventura, Hialeah, North Miami, Fort Lauderdale.

Local experts who can visit on-site: Miami Computer Support, Doral Backup and Data Recovery, Broward IT Consulting, Coconut Grove Cloud Computing, Miami Lakes Network Services, Medley Email and Spam Protection, Doral Computer Support, Broward Network Services, Miami IT Consulting, and Coconut Grove Vendor Management.

“Turn Your Technology Into a
Powerful Business Advantage”

BCA is Committed to the success of its clients!

Contact Us Today for FREE Consultation

October 31st, 2014

Security_Oct27_AOne of the biggest business technology trends of the past half decade or more is the increasing amount of business that is conducted online. These days, many businesses have integrated online solutions into daily operations and have reaped the benefits. The downside to this is the on-going threat to online security. With an ever-increasing number of online attacks, it is important that you take steps to ensure that you remain secure. Here are five tips on how to maintain security while working on, or browsing, the net.

1. Use two-factor authentication whenever possible

Two-factor authentication, or two-step authentication as it is also known, is the idea of using two pieces of information to log into accounts: Your usual password and a code that is usually sent to a mobile device or generated by a code generator.

By utilizing this safety feature, you can further increase the security of your accounts, largely because the chances of someone getting their hands on both the generated code and your password are slim.

Some sites don’t use a code and instead ask a question that needs to be answered every time you log in. If this is the case, make the question something that is difficult for a hacker to guess. For example, use your address from 10 years ago instead of your current address.

2. Audit who has access to what data

Between all of your online accounts and social media profiles you will likely be surprised at just how much information about you can be found online. There are a multitude of scare stories online, where someone has had their accounts hacked and identity stolen, largely because they had left pertinent information online without even thinking about it.

It is a good idea to audit what information you have online. This includes looking at the contact and personal information you have on social media profiles, account information, etc. Ideally, if it is not necessary information, then it shouldn’t be shared. As for social media profiles, make sure only the absolute basic personal information is online and limit who can see this information.

3. Watch what is posted on social media

Because of the nature of social media, we often feel the need to share our whole lives online. This can often lead to oversharing, and even sometimes oversharing of personal information. There are stories online of thieves monitoring social media for businesses posting about how they are going to be closed for a holiday, with all staff gone. Once a thief finds this information, they then break into the business without worrying about people being there.

If you are going to share information online, be sure to limit the potentially sensitive information that you post, especially if the content is shared with the public.

4. Change your passwords regularly

It seems like almost every week news breaks of a password or account information breach. What this translates to is the fact that your accounts are always facing a potential risk. Therefore, you should make it a habit to change your passwords on a regular basis.

Most experts recommend at least once every three months, but if there is a breach where your account information may have been leaked then naturally change your passwords straightaway.

To ensure maximum security, you should use a different password for each account, and keep these as separate as possible.

5. Work with an IT partner who can offer enhanced Internet security

Ensuring that your business is secure online can be an on-going battle that you will likely not win easily. One of the best steps to take is to work with an IT partner like us. We offer a variety of Internet security solutions that can help stop malware intrusions before they infect your systems, block access to potentially harmful sites, and even scan Internet-based email solutions. In other words, we can help improve your overall online security.

If you are looking to learn more about how we can help your business be secure online, contact us today.

Published with permission from TechAdvisory.org. Source.

October 30th, 2014

Hardware_Oct27_BComputers, servers, mobile devices, and more, are constantly seeing hardware and component upgrades being released. From faster processors to new screens, it feels like there are new elements being released on a daily basis. This can make many business owners feel like they must upgrade. The problem is though that this is a costly endeavour. If you are wondering whether to upgrade or not, here are five signs that you should.

  1. Replacement parts are difficult to find
  2. Computers, servers, and even mobile devices are made up of a number of different parts of hardware that rely on other parts in order to operate properly. If one breaks down, there is a good chance that the whole system will stop working.

    Luckily, for many newer pieces of hardware and systems, replacements are easy to come by. But, if something breaks and you are having trouble finding replacement parts then it might be a good idea to consider upgrading. The reason for this is because parts that are more difficult to find are usually going to cost more when you can actually find them. While this may be ok for one system, if you have more than one system using the same components there is a good chance that these will also need to be replaced, leading to increased costs.

  3. Repair costs outweigh replacement costs
  4. Some hardware components can only be repaired by experts with highly specialized skills. What this means is that should this hardware break, you will likely be facing a fairly high repair bill. What we recommend is to always get a quote on how much it will cost to repair your broken hardware first.

    When you have this quote, look at the price of replacement components. If it’s more affordable to replace, then this is usually a better option. Of course, you are going to want to ensure that any replacement parts are actually compatible with your system, so before you go purchasing be sure to ask check with your IT partner.

  5. You are running ‘legacy’ systems
  6. Legacy systems are computers and technology deemed to be old by experts. For example, computers running Windows XP, or computers purchased before the release of Windows 7 would be considered legacy systems.

    While these may be working like a charm now, they will eventually break. When this happens, you will see higher repair costs when compared with new technology. Beyond replacement costs is the fact that many manufacturers and software developers have stopped supporting older systems. This means that should an error occur, you will not necessarily be able to get support from the company who made the hardware. This can lead to repair delays and lost productivity.

    Now, not every “old” system will need to be replaced right away. What we recommend is talking to an IT partner like us. We can help you determine if your older systems do actually need to be replaced, and suggest affordable alternatives.

  7. Hardware is impeding productivity
  8. If you or your employees are struggling to complete work because of constant computer crashes, or slow systems, productivity will be lower than it could be. Should you notice this in your office, it is a good idea to look into upgrading your systems in order to enable employees to do their jobs properly.

  9. Your systems don’t meet minimum requirements
  10. If you are going to install new software or systems that require other hardware components, be sure to look at the minimum requirements. Almost every piece of software indicates which requirements must be met in order for the software to work.

If your systems don’t meet these minimum requirements, then the software won’t work. Should they meet them, but just barely, the software will work but there is a good chance that it won’t work as well as it could do. Should you not meet the requirements, you will need to upgrade your hardware.

Looking to upgrade, or for some advice on how you can keep your systems working? Contact us today to learn more about our services and how we can help.

October 29th, 2014

BCP_Oct27_AWhen it comes to business continuity plans, many companies need technology in order to support their plan and systems such as backups and recovery. While this technology may be in place to support current continuity needs, there will come a time when this needs to be upgraded. The issue is how to know when an upgrade is really necessary? Here are five tips that can help you determine this.

1. New technology and systems offer increased resilience

When it comes to continuity and the systems supporting it, businesses need to ensure that they are resilient. This means implementing hardened systems that will remain working in adverse environments; systems like UPS (uninterruptible power supplies), etc., so that should a disaster occur services will still be available.

Beyond this, it is a good idea to implement systems that can be switched from one location to another quickly and easily. A good example of this is implementing cloud storage and backup which can be recovered to other systems with minimal fuss.

Technology that increases the resilience of your systems and continuity plans is worth implementing.

2. Enhanced data protection and availability

During and after a disaster, it is vital that businesses have access to their data. If your data is not protected in an efficient manner, or easily accessible once it has been backed up, you could see a decrease in business effectiveness and delays in fully recovering.

Technology or systems that enhance data protection and availability over your existing systems are worth including in an upgrade, so that you can benefit from data being available when you need it most.

3. Systems offering increased communication

Communication during and after a disaster is crucially important if your business is to survive and recover full operations. When a company faces disaster, communication networks need to be strong and available at any time. So, if you can find systems that enhance the ease and effectiveness of your communications then these could be worthwhile upgrading to.

4. New technology is available to simplify plan development and auditing

If you have developed a continuity plan in the past, you know that it can be a time consuming task. While essential, many business owners do not have the necessary time to commit to this. This is where systems and technology can help.

A system that makes the auditing and development of plans easier may be worth including in an update.

5. Technology that decreases costs

With businesses operating on narrower margins, many business owners want systems to keep costs low or at the very least ensure costs don’t rise. If the systems you are looking at have been proven to reduce operating costs, then it may be a good idea to consider them.

It is important however to not integrate technology simply to save money. You should aim for solutions that are affordable, but that will also offer these worthwhile benefits and more.

We recommend talking to us to find out how we can help you find the services and technology your business needs to ensure your business continuity is not only working but will also deliver when you need it.

Published with permission from TechAdvisory.org. Source.

October 29th, 2014

OSX_Oct27_BIn mid-October, Apple launched their much-awaited update to their popular desktop operating system, OS X. This new version, named Yosemite after one of the most beautiful National Parks in the US, brings about a number of new changes and features that business users can benefit from. Here is an overview of the most useful developments.

Upgrading to Yosemite

The good news about Yosemite is that Apple has made this a free upgrade for users with compatible Macs. You can get it by going to the Apple Store on your Mac, and logging in using your Apple account. For businesses, we strongly recommend contacting us before you do this as we can help back up your systems and install the update so that your systems will work perfectly.

A new look for OS X

Last year Apple released a drastic redesign of their popular mobile operating system – iOS. This redesign brought about a modern look to the system with translucent menus and a clean, semi-transparent design. Apple has brought this style of design to Yosemite.

When you first start up Yosemite you will notice that bars like the launch bar at the bottom are translucent. Many icons have also been updated with clean and consistent design and menus have been somewhat flattened, making them easier to read.

Overall, the new look makes systems running this version of OS X easier to look at, while modernizing them and bringing them more in line with other Apple systems.

Enhanced continuity between devices

Apple has noted before that they are striving to bring their desktop OS and mobile OS closer together, eventually reaching a point where they are more or less one and the same. With Yosemite, they make a big jump forward by introducing a number of mobile and desktop features. One of the most useful being Handoff which allows users to start a task on their iPad or iPhone and continue this on their laptop, or vice versa.

Instant Hotspot is another feature that allows users to instantly share their iPhone’s data connection with their desktop – no need to enter a password as the system uses iCloud to ensure that the connection is secure.

If you have an iPhone that is running iOS 8 and a laptop or desktop with Yosemite installed, and connected to the same Wi-Fi network, you will be able to answer calls to your iPhone from your computer, or even send and answer text messages via the Messages app on any device.

Improved AirDrop

AirDrop is a feature that Apple has been trying to get working properly for a number of years now. When it works, it works really well, but with the last update to iOS 7 and OS X Mavericks, it simply didn’t work when you needed to transfer files from your phone to your computer.

Yosemite fixes this, as this version of AirDrop now has the same protocols as the mobile versions, so you can swap files between devices on the same Wi-Fi network.

Notifications Center

This feature has been updated to make it much more useful, mainly due to the introduction of the Today view. Similar to the view introduced in iOS 8, this shows you, at a quick glance, useful information for the day. By default you can see your calendar, stocks, weather, etc.

There is also support for widgets. Because Apple has enabled this, software developers can now create widgets that can be placed in the Today view of the Notifications Center. This is similar to the new feature that was introduced with iOS 8, and can be accessed by swiping four fingers from the left of the track-pad to the right on your laptop, or pressing the bulleted icon at the top-left of your menu bar.

Improved Spotlight

While Spotlight has long been a feature of OS X, it has been updated in Yosemite. Now, instead of just searching for files on your computer it can also search for applications. You can also use it to search the Web, so when you enter a term you see results from pages like Wikipedia, the Apple Store, iTunes, and more.

As in other versions of OS X, you can access Spotlight by hitting Command + Spacebar. You then see a search bar pop up in the middle of your screen. Simply type what you are looking for and a window will drop down with results.

These are just a few of the new features that business users will benefit from when they upgrade to Yosemite. If you would like to learn more, please contact us today.

October 28th, 2014

Web_Oct27_AFor many businesses the cloud has become a driving factor that supports numerous technical systems. These systems have been proven to reduce costs, increase productivity, and ensure security of vital data. However, there are still a large number of cloud related terms that can confuse. To help, here is an overview of 10 commonly used cloud terms.

1. Cloud app

A cloud app, or cloud application, is any application that is supported by a cloud service, or is accessed over the Internet. The key difference from other apps is that the vast majority of cloud apps are not installed on a device, rather they are accessed via a Web browser.

Some mobile apps are cloud-based, whereby an app is installed on the device and allows you to access data that is stored in the cloud.

2. Cloud burst

Cloud burst is a term used to reference a specific setup that many companies employ. Essentially, this is the idea of implementing a private cloud solution that provides for most usage requirements. When demand exceeds capacity, the company can integrate a public solution to cover the excess demand thereby “bursting” into another cloud.

A good example of this is when a company uses a private cloud solution to store data. When the threshold for maximum data storage is reached, they can implement a public cloud solution to increase overall storage. All essential information stays in a private cloud, while non-essential information is moved to the public cloud.

3. Cloud

The cloud is any service or solution that is delivered to a user via their Internet or network connection. To many, this term has come to be associated with the Internet.

4. Cloud management

Cloud management is often used to refer to a set of software or administrative panels that are specifically designed to allow business managers, owners, and IT teams to monitor and manage their cloud-based solutions. This often includes data, applications, and cloud services.

These tools are of strategic importance because they help to ensure that your cloud resources are functioning optimally and that users are able to interact with them properly. They also allow you to audit who has access to what and even add new accounts when needed.

5. Cloud provisioning

Cloud provisioning is the actual deployment of a cloud strategy. This often includes the selection of solutions and then which data and solutions will reside on either public or private clouds. Services are then deployed and data is migrated, usually with the help of an IT partner.

During the provisioning process, IT partners will also take the time to develop processes regarding how you will interface with the cloud solutions you will be implementing and set who has access to solutions.

6. Cloud storming

Cloud storming is the act of connecting multiple cloud services into a useable platform for your business. Some companies also use this term to refer to the idea of brainstorming about the cloud and how to use, or implement, it in daily operations.

A good example of cloud storming is where a company implements a cloud-based CRM solution from one provider, a cloud-based productivity suite, and cloud-based email at roughly the same time in order to better support operations while reducing operating costs.

8. Public cloud

Public cloud services and solutions are just that: public. They are available for any person or company to purchase or subscribe to and implement. With these services, all data or apps are hosted outside of the company and accessed over the usual Internet connections.

Public cloud services are usually the most common type of cloud implemented by companies who are first moving over to the cloud.

8. Private cloud

A private cloud is any cloud solution that is hosted by a company’s own resources. This could be on servers kept on-site, or rented servers that are then configured so that the solution is only available to the company, not the public.

While mainly large companies will employ private clouds, smaller companies looking for a niche cloud solution are starting to implement these as well.

9. Hybrid cloud

A hybrid cloud is a solution implemented by companies that has elements of both public and private cloud solutions. Essential data or business processes are hosted or delivered by a company’s own cloud service, while less essential services are delivered by public clouds.

Many larger companies employ this model of cloud computing for data storage as it allows them greater control over where their data is being stored, while ensuring that essential or highly regulated data can be stored in a secure manner; managed by the company.

10. Cloud portability

This is the level at which data maintained or stored in one cloud service can be moved to another. It is also used by experts when moving whole systems, such as apps, from one provider to another. If the overall portability is low, then it will be difficult for the user to move either apps or data from that provider.

Another similar term used by experts is ‘Vendor lock-in’, which is used to describe a dependency on a certain cloud provider and the general difficulty of moving away from this provider due to lack of other solutions or mechanisms that enable transfer. For many companies, it is a good idea to look for a provider that won’t lock you into their cloud, or at the very least offers some portability options.

If you want to know more about how the cloud can benefit your business then connect with us today.

Published with permission from TechAdvisory.org. Source.

October 28th, 2014

GoogleApps_Oct27_AWhen working with cloud-based services like Google Apps, there are a number of important features that business users require. One being the all-important Spell Check. While this has been a feature of Google Docs, it has been largely missing in newer versions of other apps like Sheets; until now that is.

Spell Check in Google Sheets

When Google introduced their new version of Google Sheets they brought back a much requested feature – Spell Check. In Google Sheets, Spell Check works much the same as it does in other apps like Docs; you can select whether to check the entire sheet, worksheets, columns, and even individual cells.

In order for this feature to work best you need to ensure that the spreadsheets you are using are created using the new version of Google Sheets. You can check this by looking for a green checkmark on the lower-right of the file you would like to check for spelling.

This checkmark indicates that the sheet is running the latest version of Google Sheets. You can then run Spell Check on the whole sheet by:

  1. Opening the sheet you would like to check for spelling.
  2. Clicking Tools followed by Spelling.

The Spell Check should highlight any errors, along with replacement suggestions. If there are errors you should see a drop-down window open with options to:

  • Change - Will change the error to the selected word.
  • Ignore - Will ignore the error.
  • Add to dictionary - Will add the word that is highlighted to the dictionary.

If you would like to check either a column, row, or number of cells, you can do so by selecting this area first and then pressing Tools followed by Spelling. Interestingly enough, this feature is also available in sheets that were created in the older version of Google Sheets and then updated to the new version.

Looking to learn more about Google Sheets, or other Google Apps? Contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

October 24th, 2014

On 10/8/14, the U.S. Supreme Court heard oral arguments on a case that involved time that may or may not be compensable under the Fair Labor Standards Act (FLSA). In this case, the Supreme Court reviewed a decision in which the Ninth Circuit court ruled that employers, under the Fair Labor Standards Act (FLSA) and Portal-to-Portal Act, must compensate employees for the time spent in security screenings at the end of their shifts.

I won’t get into all of the details of the case, but this case proves that it is evident. Compliance with the FLSA continues to remain a top challenge for HR/payroll professionals. In a recent article, the Society for Human Resources (SHRM) reported that inquiries related to the FLSA exceed those of all other federal employment statues other than the Family and Medical Leave Act (FMLA). Until some of the rules of these acts are rewritten to make them clearer and easier to understand for everyone who has a stake in the process, it would be in any employer’s best interest to institute an automated time and attendance solution to properly capture and report time.

A time and attendance system allows you to collect, analyze, and take immediate control of your employees’ attendance and labor data. They are invaluable for ensuring compliance with labor regulations regarding proof of attendance. Plus, there are auditing functions contained within them to guarantee accuracy and compliance for payroll information.

While the outcome of this case is still pending, securing a great time and attendance system, instituting best practices, and keeping an eye on pending legislation should be at the top of every HR and payroll professional’s list.

Check out Sage HRMS today to gain control over time and labor data.

October 22nd, 2014

Windows_Oct20_AAt the end of September, Microsoft held their now annual Windows event, where they announced the next big version of Windows – Windows 10. While it seems a little odd that they are skipping 9 completely, from what we can see, 10 is shaping up to be the best version of Windows to date. Here is a brief overview of what you can expect from the latest version of Windows.

Why Windows 10?

When first announced, many eyebrows were raised regarding Windows 9 being skipped. In the tech world, missing out a number with a sequence is not the norm, yet Microsoft stated that they believe that the next version of Windows will be such a drastic improvement over Windows 8 that calling it Windows 9 would not do it justice. From what we can see of the new system, there really are some drastic improvements, including:

One operating system (OS), many systems

When Windows 8 was released, a slightly modified version of the OS was also released for mobile devices. While this was good news, especially for mobile users, the systems were still largely separate, with different apps, app stores, and more.

With Windows 10, Microsoft has noted that the OS has been designed to run across all systems. This means that different devices will likely have slightly different interaction experiences but the underlying system will be the same. For example, there will be one way to write programs for all devices, one app store, and updates will be applied to all versions of the same app, on all devices, at the same time.

A new, yet familiar, Start menu

Windows 8 was a drastic departure from the familiar Windows desktop layout. For the most part, it was despised by business users, who instead have largely bypassed this layout for the traditional Desktop mode. Windows 8.1 allowed users to boot directly into the Desktop, but one large feature has been lacking: a Start menu.

Windows 10 welcomes it back! As with older versions of Windows, the Start menu will be at the bottom-left of the screen, and pressing it will bring up the familiar menu of programs and options. Only now, the old Tile-based layout has also been merged into this section. Think of the traditional Start menu bar, but with a mini-tile based section to the right that will be customizable.

Everything opens in a window

If you’ve ever downloaded an app from the Windows App store, you likely have noticed that they automatically run in fullscreen mode. With Windows 10, any Windows Store apps will open in window-format, similar to any desktop app.

When apps open you will see the familiar taskbar, along with the maximize, minimize and close buttons. This will make it much easier to work in multiple programs at the same time.

Multiple Desktops

Microsoft Virtual Desktops is a feature that will allow users to create different desktops for different purposes and switch between them quickly and easily. While you will only need to install Windows 10 once, you can have a different desktop setup for say home, personal, and business use all under one user.

Each desktop can display different icons and layouts, but all desktops will have access to the programs installed for that user. Essentially, this will make it easier for business users who also use their devices for personal use or those who need to switch roles at work.

An enhanced File Explorer

File Explorer has been a part of Windows for a while now, and its main function is that it helps you to find your files and folders. In Windows 10, this feature will be upgraded to now search for not only your files and folders, but also to scan the Internet as well. You will also be able to quickly see recent and most popular files and folders, meaning you’ll be more likely to be able to find what you are looking for in less time.

When will it be available?

Microsoft has already released what they call a Technical Preview of Windows 10. Anyone can sign up to download Windows 10 and install it on their computers. We would advise against this however, as this version is incomplete and there will be bugs and compatibility issues.

The company has noted that this current version is really for tech experts to install on secondary computers and test, so business users will have to wait! At the time of this article there has been no actual release date set for Windows 10, but you can probably expect it sometime in early 2015. Microsoft has also been quiet about the price, but rumors are circulating that it will either be free or affordable for users to upgrade to if they already have an older version of Windows installed.

Get ahead of the curve and find out what benefits Windows 10 can bring to your business, by dropping us a line first.

Published with permission from TechAdvisory.org. Source.

October 22nd, 2014

SocialMedia_Oct20_ASocial media has come to play an important part of an overall marketing strategy for many small to medium businesses. An essential component to any social media plan, regardless of the platforms you use, is the creation of content to post onto these networks. When it comes to content, many businesses tend to rely on 2-3 different types, which can get a little boring. To help, here are five types of content you should be sharing on social media.

1. Selfies

The 2013 “word of the year”, according to the Oxford English Dictionary, has become so popular it’s no mean feat to avoid it these days. Truth be told, the selfie is popular for a reason: It is a quick way to get people to engage with your content.

The key here is to know when to take a selfie for your social media sites. What you want are selfies that make your company look more human, for example a group lunch meeting or after-work game night that shows people having fun. When done in the right way, selfie posts can increase interaction. Just be sure to limit the number you post, as too many could lead to you being perceived as being too focused on your company and not your customers.

2. Inside looks

When we find a product or service we like, we are often curious to learn more about it. This includes learning more about the company that makes the products or services and how it operates.

If you have a growing fan base, why not create content that provides customers with an inside look at some aspect of your business. Take pictures of your office, videos about how your products are made, or perhaps write content about how certain services are created and delivered. Basically, try to come up with content that gives people an inside view of the company.

The reason this type of content works is because it often gives customers a deeper understanding about a business, and creates a closer connection to the products and services. If you can increase overall attachment, you can increase the chances that customers will interact with content, stay loyal to your brand, and even share information about your company or recommend you.

3. Quotes

Famous quotes can be a great way to get a message across in a strong way. If for example you are hosting a Thanksgiving party, or Halloween party, adding a themed quote to your post could be a great way to encourage social media users to interact with it.

Also, if you can find quotes that are relevant to your industry, you could post these whilst asking for opinions or to further a point you’re trying to make.

4. Fill in the blanks

While this may sound a little simple, posts that ask your audience to fill in a blank can be a great way to drive engagement while giving your customers a chance to tell their own story. For example, if you are a bakery who produces well-known donuts, asking a question like: “The first time I had this donut was _.” could be a good way to inspire customers to interact with you.

5. Videos

One of the more drastic changes many social media sites like Facebook have implemented in the past couple of years is a feature that automatically plays a video when someone pauses on it while scrolling. While not fully welcomed by all users, this move has actually led to the number of video views increasing by as much as two times.

While creating a video because everyone else is, is a bad idea, if you have content that you know can be turned into a useful video e.g., a how-to video, then this could be a great way to reach your target market in an interesting way.

If you are looking to learn more about how you can leverage social media in your business, contact us today.

Published with permission from TechAdvisory.org. Source.

October 22nd, 2014

Many employees begin saving for retirement through a 401(k) account, hoping it will generate enough money over time that they can stop working at a reasonable point in their careers. At the same time, a large number of workers invest in a Roth IRA for the same reasons. Employers often handle these accounts for their staff using payroll management software, but it’s not always an easy task, especially if an employee has both types of retirement accounts.

However, recent changes to the way employees can deal with after-tax money in their 401(k) account in relation to their Roth IRA may alter the way employers help manage workers’ retirement savings.

Making it easier to transfer funds

The IRS is the government body that writes the rules for retirement accounts, and it has recently made several alterations that will provide employees a bit more freedom. Forbes wrote that IRS Notice 2014-54 gives employees the ability to transfer after-tax money from their 401(k) account to their Roth IRA without having to pay taxes on the transaction. Beginning January 1, 2015, employees will be able to take advantage of this opportunity to roll over funds between the two accounts.

Why is it advantageous for employees?

A 401(k) account is essentially a contributor-based savings plan that has limits in terms of how much workers can contribute. At the same time, money is taxed in this kind of account, while a Roth IRA is tax free. With regard to the latter, workers fund their retirement savings using after-tax money, which grows in the account until it’s withdrawn at retirement.

Before the IRS made this change, employees could technically still do the same thing, but it was a convoluted process. In fact, many tax experts felt that the IRS was against the practice, which makes the recent announcement a welcome surprise.

Still, it doesn’t give employees a blank check in transferring after-tax money from their 401(k) to a Roth IRA. The first caveat is whether a worker actually has after-tax money in his or her 401(k) account.

What’s expected of employers?

Many employees who meet the criteria for transferring money between accounts will likely want to take advantage of the opportunity. Employers should facilitate the process. Human resources managers will need to clearly communicate the changes in the IRS’s treatment of retirement savings to employees. This may even involve bringing in a financial advisor who can explain any aspects of the changes that may cause confusion. 

Employer Solutions Blog | Sage HRMS