telanova Blog

telanova: the outsourced IT team that feels like your own

Providing advice, consultancy, helpdesk, monitoring and maintenance, updates, upgrades, security: all the things your in-house team would do, but better and at a fraction of the cost and hassle.

Understanding the benefits of email signature software

Almost every business recognises the importance of a professional looking brand and this is reflected in logos, websites and sales collateral. However, the brand image ‘ball’ seems to be dropped when it comes to email signatures.

Just how do you manage multiple employee email signatures? Can you control the look and feel of the emails your staff send daily to customers and suppliers? Are they cutting and pasting your company logo into Outlook manually? Does every employee use the same font and style in their email signature or are there multiple versions in circulation? Do they even use an email signature when using a mobile device? And what would happen if your company address or telephone number changed? Would everyone remember to update this?

To complicate matters further, have you given any consideration to how your employees email signature looks when viewed on a mobile phone or tablet? Other businesses judge you (and your company) not just by the content of your emails, but also by the look of your email and the signature you use to sign off. With clients and suppliers viewing your emails on multiple mobile devices and email clients it’s possible that your email signature could contain distorted images, fonts and uneven spacing - rendering it amateurish at best.

Taking control of the email signature situation

The good news is you don’t need to employ an army of IT consultants to address the email signature conundrum. We work with market-leading companies such as Clearformat and Exclaimer to create world-class email signatures to address the issues outlined above.

Read more ...

Wifi for staff and visitors

Customers and staff expect access to wifi at your premises, for very good reasons. If you simply give them the wireless code for your network, you'll expose your servers to attack from devices you don't control. You may have confidence in your guests' integrity, that they wouldn't deliberately hack into your servers, but malware could be running on their devices without their knowledge. So how can you provide guest wifi whilst also protecting your network?

Read more ...

Windows XP - how bad will it be when Microsoft ends support on 8 April?

Quite a few customers ask whether it's safe to run Windows XP after 8 April when Microsoft ends support and ceases issuing security updates. They point out they'll still have antivirus, firewalls and server passwords to protect them. Is it really the cliff edge that it's made out to be? Our advice is yes, it really is that big a risk.

Read more ...

First steps for securing mobile device access: iPhone, iPad, Android etc

Smartphones are fantastic. I can respond to emails from clients, suppliers and partners wherever I am. Using apps like Drive, Dropbox etc we can share important information. But what if I lose that phone - how do I stop people using it, getting access to client information, or otherwise harming my business?

Read more ...

Email Facebook Google LinkedIn Twitter

We use cookies to provide you with the best possible experience in your interactions on our website

You agree to our use of cookies on your device by continuing to use our website

I understand