Blog

July 23rd, 2014

BCP_July21_BWhile there are many different and important tasks a business needs to do, one of the most important is to back up data. Your data is important, and it really is a matter of when, not if, you will face a crisis where data will be lost. Most business owners realize this and do back up their data, but it can be a challenge to find a complete solution. In order to help, we have come up with eight data backup tips.

1. Pick the backup solution that works best for your business

When it comes to backing up the data on your company's computers and systems, most companies consider five main options:
  • Internal hard drives - You can either use another hard drive installed in your computer or partition an existing hard drive so that it functions as a separate drive on which you back your data up. This is a quick option, however should your computer or the hard drive fail - two of the most common computer failures - then you will lose this data.
  • External hard drives - These drives are essentially separate hard drives that you connect to your computer via a USB or other connection. Many of these drives allow for one touch backup and can be configured to back up data at certain times. While these can be useful, especially if you want to keep data backups easily accessible, they are prone to the same potential failure as internal drives.
  • Removable drives or media - For example, USB flash drives, DVDs, etc. These are great for backing up work you are doing at the moment or for transferring small files from one machine to another. These options are limited by smaller storage sizes however, so backing up even one computer will likely require multiple disks or drives.
  • Cloud-based backup - This is the act of backing up your files to a backup provider over the Internet. Your files are stored off-site and can be restored as long as you have an Internet connection. For many businesses, this has become the main form of backup employed, largely due to cost and convenience - files can be backed up in the background. The biggest downside of this backup option however is that you do need an Internet connection for it to work and you will see more bandwidth being used, which could result in slower overall Internet speeds when files are being backed up.
  • NAS - Network Attached Storage, is a physical device that has slots for multiple hard drives. You connect this to your network and the storage space on the hard drives is pooled together and delivered to users. This solution is like a mix of cloud-based and external backup, only the device is usually in your office. While it is a good backup solution, it can get expensive, especially if you have a large number of systems to back up.
There are a wide variety of backup solutions available, so it is a good idea to sit down and figure out which are best for your business. The vast majority of companies integrate multiple solutions in order to maximize the effectiveness of their backups and spread the risk of losing data around a bit.

2. Split your backup locations

Despite all of the backup options available, you can narrow these down to two categories, the fact that the backups are kept in two locations:
  • On-site - Data backup solutions that are kept in your office. This could include internal hard drives, or NAS, and more. The idea here is that the data backup is kept in your office. Some like USB drives may leave the office, but the main idea is that they are used primarily in the office.
  • Off-site - Data backup solutions are stored off-site, or out of the office. The best example of this is cloud-based backup where your data is stored in a data center, most likely in another city. Another example is backing up to hard drives and storing them in a secure location outside of the office.
In order to ensure that your data backups are available should you need them you could split up the locations where they are kept. Should you keep all of your backups on hard drives in the office and there is damage to the premises, you could see your data disappear. One of the most effective strategies is to have one set of backups on-site, and another off-site which will ensure that should there be a disaster in one location, the other will likely be safe and you will still be able to access your data.

3. Establish a standard naming and filing system

Have you ever seen how people organize their hard drives? Some like to use folders and subfolders that are organized neatly, while others tend to throw files into one general folder. The same can be said for they way files are named - there's just so many differences.

Because of these differences, it can be difficult to back up and recover files properly. We recommend that you pick a naming and file system that every file and folder will follow across all systems. This means backups will be quicker, you will be able to see what is new, and you will spend less time organizing files.

Beyond this, an efficient naming and organization structure goes a long way toward making it easier to find files and recover them should your systems go down.

4. Determine which files need to be preserved

While it may be tempting to back every file and folder up, in an effort to maximize efficiency of your solution, it is better to not back everything up. We aren't saying don't back anything up, but you should take time to identify what files and folders are to be backed up. For example, screenshots that have been uploaded to the Web may not need to be kept.

The same can be said for non-work related files. While these may be important to your personal life, they likely aren't to the business so should not be backed up onto your business backups.

Look at each file and folder and see if it has something to do with business decisions, or is in anyway tied to your business. If it is then it is probably a good idea to keep it.

Stay tuned for the next four tips coming soon. If you would like to learn more about data backups in the mean time however, please contact us today.

Published with permission from TechAdvisory.org. Source.

July 23rd, 2014

iPhone_July21_BWhile it is easy to simply type a message and send it, iPhone's messaging app - Messages - is capable of doing much more than that. And since businesses today rely on effective communication processes to help with workflow and productivity, it’s worth taking a look at some iPhone messaging tips which could help make your communication experience faster and easier.

1. Create Shortcuts

Have you ever typed phrases that you often use on the iPhone messaging app only to correct the typos that often come from typing on the touchscreen? To do away with this annoyance, you can create shortcuts for phrases by going to Settings>General>Keyboard>Shortcut and clicking on Add new shortcut. Now, whenever you type in a particular word that matches the shortcut you’ve entered, you won’t have to type out that entire phrase again.

2. Voice Messages

While voice messages have been ignored by many people, they’re actually a fast and effective way to communicate in the iOS messaging app. Simply record any message through the Voice Memo that is available in the Utility folder and tap on the arrow symbol in your recording page to share them on your messaging app. Now you won’t have to worry about typing your message or there being any sort of miscommunication again.

3. Share Contacts

Sharing contacts is handy for business operators. And while you’d usually go into your contact page and type in a contact’s phone number, there is a quicker way to get the job done. Simply tap into contact information and then scroll down and hit the Share Contact option. Not only will you eliminate having to type that contact’s phone number, but other information from that contact such as their email or work address will also be shared without you having to copy and paste it.

4. Share Messages

Sharing of information is a basic task in any business, and if you want to share a message but don’t want to type it out or even copy and paste it, the iPhone messaging app features another alternative. All you have to do is tap and hold down the message, tap on More and then on the blue arrow on the bottom right corner of the prompt command. By doing this, your message will be placed in a new message screen and you can simply choose your recipient.

5. Hide Message

We all need some privacy, especially where work is concerned, and the messaging app on the iPhone allows you to keep your messages to yourself by stopping the message preview from showing in the Notification Center. Go to Settings>Notification Center >Messages, then tap Show Preview to turn the message preview off. Now, when you receive a message, your iPhone will only display who sent that message without compromising its content.

Familiarizing yourself with iPhone’s messaging capabilities will save you time and frustration - and in chaotic business environments that can be a huge advantage. Looking to learn more about iPhone and its capabilities? Contact us today and see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic iPhone
July 22nd, 2014

Facebook_July21_BFacebook is the largest social media network out there and has so much clout that many different apps now connect with the platform. Most of these apps or sites even allow you to use your Facebook account and password to access them. While this is convenient, some users do have an issue over this, especially when an app requests private information. To help increase the overall privacy of your Facebook account, the company has recently introduced two new app login features.

Anonymous login

What is interesting about apps on Facebook is the way people use them. For the most part, they add an app because their friends are talking about it and they want to check it out too. Most of the time however, we don't really stick with apps and instead quickly move onto another app. The problem with this is that all of these apps are asking for access to at least some information on your profile.

Most people who want to try an app usually would rather not have to share their profile information for privacy reasons. In an effort to increase account privacy, Facebook has announced the anonymous login feature. This will let you log into different apps using your Facebook username and password without sharing your personal information.

For example, if you want to use your Facebook account to access Flipboard you can login anonymously and link your account to Flipboard, but your personal information like name, email address, contact number, etc. will not be shared. This feature will also make it so the app cannot post on your News Feed. In other words, say goodbye to those annoying game invites!

This feature has been released on Facebook's side, but the company is still working with app developers to get the feature integrated into their apps. Over the next year or so we should see more and more apps integrate this great privacy feature.

Line by line control for Facebook login

An increasing number of apps are allowing users to log in using their Facebook account and password. Think of any app or even some sites you have recently used, or visited, and chances are you've seen the 'Log in with Facebook' button. Pressing this will link your Facebook account to the app, and then bring up a window asking you to allow the app to access certain information on your Facebook profile.

This information can include your username, email, friend list, birthday, Likes, etc. It also often includes another option to allow the app to post to Facebook on your behalf. While app developers certainly have the right to ask for this information, some users feel that apps often ask for too much private information. So, in an effort to tighten up privacy, the company has updated their Facebook app login. Now, when you go to log into an app using your Facebook account you can select what information is shared.

Click Log in with Facebook on many apps and you should see the usual permission window open, only now you should see a link that says 'Edit the info you provide'. Clicking this will bring up a list of permissions the app is requesting.

You will see check marks beside each line of permission. Many of these are actually optional, and you can now uncheck them to prevent that specific information from being shared. Also, by default, apps will no longer be able to post to Facebook on your behalf. You will need to approve this when you first connect to the app.

These two features are a great boost to account privacy. If you are looking to learn more about using them effectively contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

July 17th, 2014

BCP_July14_BThere is a good chance that you would like to see your business survive any future disaster, and any problems that follow as well. While it is nearly impossible to predict what the next disaster will be, it's easy to prepare for, especially if you have an effective business continuity plan. When it comes to these plans, there are many key metrics you need to be aware of and the most important two are RTO and RPO.

While both RTO and RPO are important elements of continuity plans, and they both sound fairly similar, they are actually quite different. In this article we define RTO and RPO and take a look at what the difference is between the two concepts.

RTO defined

RTO, or Recovery Time Objective, is the target time you set for the recovery of your IT and business activities after a disaster has struck. The goal here is to calculate how quickly you need to recover, which can then dictate the type or preparations you need to implement and the overall budget you should assign to business continuity.

If, for example, you find that your RTO is five hours, meaning your business can survive with systems down for this amount of time, then you will need to ensure a high level of preparation and a higher budget to ensure that systems can be recovered quickly. On the other hand, if the RTO is two weeks, then you can probably budget less and invest in less advanced solutions.

RPO defined

RPO, or Recovery Point Objective, is focused on data and your company's loss tolerance in relation to your data. RPO is determined by looking at the time between data backups and the amount of data that could be lost in between backups.

As part of business continuity planning, you need to figure out how long you can afford to operate without that data before the business suffers. A good example of setting an RPO is to imaging that you are writing an important, yet lengthy, report. Think to yourself that eventually your computer will crash and the content written after your last save will be lost. How much time can you tolerate having to try to recover, or rewrite that missing content?

That time becomes your RPO, and should become the indicator of how often you back your data up, or in this case save your work. If you find that your business can survive three to four days in between backups, then the RPO would be three days (the shortest time between backups).

What's the main difference between RTO and RPO?

The major difference between these two metrics is their purpose. The RTO is usually large scale, and looks at your whole business and systems involved. RPO focuses just on data and your company's overall resilience to the loss of it.

While they may be different, you should consider both metrics when looking to develop an effective BCP. If you are looking to improve or even set your RTO and RPO, contact us today to see how our business continuity systems and solutions can help.

Published with permission from TechAdvisory.org. Source.

July 17th, 2014

iPad_July14_BMobile devices and the apps we use on them have drastically changed the way we communicate. With platforms like Facebook, many people are simply not calling each other anymore, instead relying on Facebook's messaging feature. In an effort to make this easier to use on mobile devices, especially the iPad, the app has recently been updated.

Facebook Messenger on the iPad

Over the past few months, Facebook has been set on separating the two main functions of their platform - at least for mobile users. What this had led to is two separate Facebook apps, with the main Facebook app being just for social media functions, and a stand-alone app for its popular messenger service.

Up until now, there has been one version of the Facebook Messenger app for iOS, and it was optimized to smaller iPhone screens, meaning if you used it on iPad, it looked a little weird. In early July 2014, Facebook set about fixing this by releasing a new update to the app, which brought full support for the iPad's bigger screen.

When you download this app onto your iPad, you will have the same functionality as the other versions, including the ability to call people, send group chats, share photos, and best of all message people.

Where to get the app

It may seem a bit odd to have a separate app just for messaging on Facebook, but it can be useful for businesses who use this form of communication. Essentially, the app makes it easier to use just the messaging features without having to deal with the full social media aspect of the platform.

If this sounds like a useful app, you can download it from the iTunes Store for free.

Using the app

If you have not used the app before, it may take a bit of time to get used to it and to set it up. When you first download and open the app you should be asked to log in using your Facebook account. You should then see your contacts pop up with recent messages at the top.

Tapping on a chat will open the window with your message history and standard messaging abilities. You can scroll through your different chats on the left and view these by tapping on them.

At the bottom of the main chat history window you should see a number of buttons:

  • Recent - The default view, showing recent chats or messages in chronological order with the newest being at the top.
  • Group - Shows only your Group chats, again with the most recent messages at the top.
  • People - Brings up your contacts so you can start new messages. Simply search for a contact and tap on their name to start chatting.
  • Settings - Opens the Settings panel, allowing you to change various features including the alerts that are shown when you have a new message.
One potentially useful feature the app offers is the ability to call people directly from the chat window. If you open a chat, you should see a phone icon at the top-right of the screen. Tapping this will allow you to call the person you are chatting with, and if they also have the Messenger app installed, the call will be free. If the other person doesn't have the app installed then you will get a message saying that carrier rates may apply.

Looking to learn more about using Facebook on the iPad? Contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic iPad
July 16th, 2014

AndroidTablet_July14_BThe tablet is easily one of the most indispensable devices for many business managers and owners. These highly mobile devices allow you to stay in touch with the office and also work without having to lug around a heavy or bulky laptop. Because of this, many businesses are looking to integrate tablets, especially Android tablets. In order to help make things easier, here are some dos and don'ts when using Android in the office.

Do:

  • Use separate profiles - Tablets that use newer versions of Android (4.3 and newer) have a unique feature that is incredibly useful for business users: You can set up more than one account on the device. This means you can have a personal account and a work account on the same device without the two crossing over. Each account has their own apps and layout, which makes it perfect for the BYOD crowd.
  • Pick responsibly - Android tablets come in all shapes and sizes, and with different versions of the operating system. It is therefore a good idea to do some research before you buy one for your business. Take the time to try and identify what you will be using the device for, what features you would like, and most importantly, if the device is compatible with your existing systems. We strongly recommend going with one of the big name brands like Samsung, LG or Acer, or the Nexus line.
  • Develop a usage and management plan - Before you implement the device into your office, be sure to develop a plan on how the device is to be used and managed. Will each employee be in charge of managing their own device, or will your IT partner manage them for you? Be sure to also develop a list of approved apps, including important ones like email and messaging; and that users are familiar with how to use them.
  • Look into accessories - One common factor many businesses forget to look into when implementing Android devices is the numerous accessories available for tablets. In order to extend the life of the devices it is a good idea to get protective cases and screen covers. Also, look and see if the device you have chosen has a removable battery or SD card. If it does, you may want to invest in extra batteries and cards.

Don't

  • Skimp on security - As Android tablets become more popular, the devices are seeing an increase in malicious attacks. It would therefore a good idea to implement mandatory security measures on all devices. This includes an antivirus scanner and daily check for app updates. Also be sure to educate the staff who will be using the device on common security issues, such as how to spot fake apps, use an antivirus scanner, and how to enable secure browsing on the Web.
  • Allow third party app stores - Because of the openness of Android, you can install apps from almost any location. This has resulted in many third-party app stores (stores not run by Google) popping up. Some of these stores host any kind of app, including ones that contain malware. So, it is a good idea to just outright ban these stores; only allowing apps from Google Play to be installed on devices.
  • Force the tablet on users - Some employees won't want a tablet, preferring instead to stick with their laptop or desktop. Don't force your employees to adopt the device if you know they won't use it. This will just lead to you wasting your tech budget and to unused devices.
  • Worry about fragmentation - Yes, Android is very fragmented - devices are running different versions of Android. While this may seem like a big deal, it doesn't have to be. We recommend that when selecting tablets, pick a newer version of Android and purchase tablets using the same version. Once you get used to the tablet, the issue of fragmentation will usually disappear, especially if everyone is on the same version.
If you are looking for help selecting and managing an Android device for your office, contact us today to learn about how our services can help.
Published with permission from TechAdvisory.org. Source.

July 16th, 2014

Office_July14_BOne of the most important elements to any superhero is a great alias that protects their true identity. From Clark Kent to Bruce Wayne, almost every comic book hero has one. When it comes to businesses however, it would seem like an alias is less important. That being said, there is a useful alias feature on Outlook.com that you may want to find out about.

Outlook.com's alias management feature

If you are using Outlook.com, chances are high that you aren't a spy or superhero and in need of a top-secret alias. There is a good chance however that you may have need for more than one email address.

Maybe you attend a lot of conferences or events and would like a way to keep your main email inbox from being flooded with the usual "nice to meet you" emails and follow ups; or perhaps you are launching a new product associated with your name and would like a way to easily track communication directly related to this one product.

If this sounds like your situation then Outlook.com has a great feature that allows you to create up to 10 new email addresses, or aliases, and manage them from your main account's inbox. The main idea of an alias email is that you get a different email address that is tied to your main account. Your aliases share the same contacts, calendar and even account settings with your primary account.

What's more is you can actually sign into your account using any alias, because the same password is used for every address you create. When sending an email, you also get to pick which alias the message will come from, which is undoubtedly a really useful feature.

How to create an Outlook.com alias

To create an alias email address:
  1. Log into Outlook.com with the account you would like to set as your main or primary account.
  2. Press the Settings icon which is the cog located at the top-right of the screen.
  3. Select Options followed by Create an Outlook.com alias in the window that opens.
  4. Type in the email address that you want.
  5. Click Create an alias.
  6. Untick the box in the pop-up. If you don't, the alias you set up will be set as the primary email address.
  7. Click Done.
When you are sending an email, you should now be able to click your name at the top of the email window which will drop down a menu with your aliases. Click on the alias you would like to send the email from, and you should see the name change. Any responses to that message will be made to the alias email address as well.

If you are looking to learn more about Outlook.com or any other Office program contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

July 11th, 2014

Hardware_July07_BWe’ve explored how Mac and PC differ in terms of specifications, operating system and software; and in this article we continue to dig into other differences between the two rivals. Buying a computer is more than looking into design and specs, but also about models, availability, security, customer satisfaction and of course price.

Models

Apple offers five computer lines comprising of the Macbook Air, Macbook Pro, Mac Mini, iMac and Mac Pro. This limited selection is not a sign of weakness but a part of the company’s 'less is more' approach to marketing.

PCs have a larger variety to choose from, with industry giants such as Acer, Asus, Dell, HP, and Lenovo, who offer numerous configurations of both desktop and laptop models. This can be beneficial in helping you find a specific computer that meets your needs.

Availability

When it comes to third party retail stores, Apple is more selective than PC manufacturers about where it sell its products. As of April 2014, Apple has 424 retail stores in 16 countries and an online store available in 39 countries. However, Macs are still not available at many stores that sell PCs.

PCs are the most numerous and popular computers out there, and can be found at every store that sells computers, except for Apple stores. This makes it easier to find PCs, especially if you don't live near an Apple store.

Security

With the vast majority of computers running on Windows, most attacks focus on PCs. Malware like Trojans, which trick users into installing the software by pretending to be a useful program, or botnets, are common to PCs, but rarely harm Macs.

This doesn’t mean that Macs are 100% secure. As Macs become more popular, threats are increasing. Nonetheless, a Mac user is still less likely to be a victim of successful attack than a PC user.

Customer satisfaction

Recent surveys conducted by PCWorld and PCMag revealed that personal users choose Mac over every single brand of PC available. Businesses on the other hand still prefer to stick with PCs.

While Apple does score high on many surveys, especially because of the value placed on face-to-face service, there are a number of PC manufacturers that offer a comparable service. Also, there are more smaller repair shops that offer unrivalled customer service.

Price

One of the most cited differences between a Mac and a PC is price. Generally speaking, Macs are more expensive than PCs due to their preference of building products around higher-end computers with more costly components. The cheapest Mac computer is the Macbook Air which starts from USD$899, while various models of PCs can be found at a much lower price.

Mac and PC both have strong and weak points. It’s best to try both and see which is the better tool for you and which will cover your business needs. If you are looking for a new system, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Hardware
July 10th, 2014

Security_July07_BAs technology continues to expand and improve, many people have come to prefer to use their own systems over their office's tech offerings. This is largely because many of us have newer personal devices that allow us to do so much more than the computers we use at our office. As a result, the issue of BYOD (Bring Your Own Device) has become far more important, especially due to the fact that if left unchecked, BYOD could pose a security risk to your organization.

What should I do about BYOD?

The first reaction of many office managers and business owners, worried about security threats that could stem from BYOD, is to impose an outright ban of devices. While telling your staff they are not to use their devices for work may seem like a quick and easy solution, you can be 100% sure that there will be employees who ignore this policy and use their personal devices for work regardless.

This could put your business at a higher security risk if the rule is ignored, especially if you don't implement any security measures to protect your networks and data. In order to minimize the potential threats BYOD can expose your business to, we suggest you do the following:

1. Consider embracing BYOD

Instead of simply banning personal devices in the workplace take a step back and look to see if there are any benefits BYOD can offer. For example, if you operate on razor thin margins and have not replaced hardware in years, there is a good chance your employees will have better systems at hand. This could help you reduce your overall tech costs.

The same goes for phones for your employees. Why not offer to pay for the plan and allow employees to use their own devices? Of course, you are going to want to implement security measures and usage rules, but if this is easily achieved then it may help reduce your overall operating costs. Before you do implement a system like this however, we strongly recommend you read the rest of this article and follow the steps below.

2. Set up separate networks for employee devices

Oftentimes, the main reason employees bring their devices to the office and use them for work purposes, especially when it comes to mobile phones, is because they can happily connect to Wi-Fi for free without using their data plans throughout the day.

Chances are high that because they use the work Wi-Fi on their device for non-work tasks, they simply keep using the device when they are doing work related activities. This could pose a security risk, especially if you run business-critical operations on the same network. You could nip this potential problem in the bud and simply install another Wi-Fi network for mobile devices and non-critical business processes.

It is usually quite affordable to simply purchase another line and the networking equipment to support this, not to mention the fact that it will keep business-critical processes secure from errant malware. As an added bonus, you will likely see increased productivity because the bandwidth demand will be limited, so important data will move quicker.

3. Educate your staff about security

In our experience, the vast majority of BYOD related security risks are exposed by mistake. An employee may have a virus on a personal phone and be unaware of it. When they connect to the network it can then be unintentionally spread to other computers resulting in a potentially massive security breach.

One of the simplest ways to prevent this is to educate your employees about proper mobile safety. This includes how to spot apps that could contain malware, sharing security threat updates, and teaching your employees how to secure their devices. You really need to stress just how important security is to them.

On top of this, contact an IT expert like us for a recommended anti-virus and spyware scanner for mobile devices that users can easily install. Encourage employees to not just install this but to keep it up to date too. Many of these mobile specific scanners are free and just as powerful as desktop versions.

4. Work with an IT partner to establish a solution that works for you

Beyond education and simple network establishment, it is a great idea to work with an IT partner like us. As experts, we keep tabs on the trends and solutions related to BYOD and will work with you to establish a program that works for your company.

It may be that you don't actually need to integrate BYOD but to update hardware or software to newer versions instead. It could be that there is a simple solution to employees feeling frustrated with slow performance of existing systems at work.

If you do implement BYOD, we can help establish security measures and policies that will ensure your networks and employee devices are secure. The best advice we can give however, is to do this before you start allowing BYOD, as it can be far more challenging to implement and enforce changes when employees are already using their devices at work.

Looking to learn more? Contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
July 9th, 2014

Web_July07_BFiles and folders on any device are among the most essential parts of the overall operating system. Many business owners and managers go to great lengths to keep these organized and easy to find. This is easy to do on desktop and laptop computers, but on mobile devices, such as the Windows Phone, it's somewhat more challenging. In an effort to make this easier, Microsoft has recently released a new app for Windows Phone users.

About the Files app for Windows Phone 8.1

In late May, Microsoft posted an article on their Windows Mobile blog announcing that the Files app had been launched. The idea behind this app is that it allows easier viewing and managing of files and folders on your Windows Phone.

With this app you can:

  • Browse for installed files
  • Arrange files into folders
  • Move files or folders from one location to another
  • Open or search for files
  • Change the name of existing files
  • Share individual or multiple files with other users
While this app is a welcome development, there is one feature that makes it great: It allows you to also access and manage files on your device's SD card - if it has one. This means you no longer have to connect your Windows Phone to your computer in order to manage your files. You can do so directly from your phone.

Where can I get the app?

If you use your device for work we strongly recommend that you install this app, especially if you store files on your device. Find the app on the Windows Phone Store for free. Simply click the Install button in the left-hand ribbon of the page and select your device. You need to be signed into the Microsoft account you use on your phone. You can verify this by looking at the top-right of the page and hovering your mouse over Explore. If you are not signed in hover over Explore and click Sign-in. Enter the username and password of the Microsoft account you use on your phone and you should be able to install the app directly from your browser.

Alternatively, you can install the app directly to your device by:

  1. Going to the Windows Phone Store app on your device.
  2. Searching for Files.
  3. Tapping on the Files app icon (blue square with a white document icon).
  4. Pressing Install.
The app should start to download automatically and install a new tile on your home screen.

Using the Files app

To manage or view the files and folders on your device, simply open the app. You should see a screen open with the option to either look at the files on your Phone or SD card - if your device has an SD card installed.

When you tap on either Phone or SD card, you should see the file structure pop up. Scrolling up or down and tapping on files or folders will open them. If you tap on the square box beside each file you will see a number of options pop up at the bottom of the screen. Pressing the related icon will allow you to interact with that file. For example, if you select a file and press the Trash Can icon, the file will be deleted. You can select multiple files at the same time by simply tapping on the white boxes before hitting any of the action buttons.

If you are looking for a specific file, make sure you don't have any files or folders selected and press the magnifying glass icon at the bottom of the screen. Enter the name of the file or folder you would like to find and it should pop up below the search bar.

Looking to learn more about using Windows Phone in the office? Contact us today to see how our services can help.

Published with permission from TechAdvisory.org. Source.