03 Apr

Yesware – Email Tracking for Sales Productivity

yesware Email Tracking for Sales Productivity
yesware Email Tracking for Sales Productivity

It may be useful to know what happens after sending an email. Does it has been read ?, how many times has he been read ?, who read it exactly?

Whether you are a professional who is prospecting a new client, a student who send their work session or a person seeking employment, monitoring the emails we sent can give us an idea more specific of a possible or not answer.

 

YESWARE Email Tracking

Yesware meets all these expectations and gives you even more! Their free plan offers 100 emails per month with tracking. Let’s say for the individual or self-employed, it is more than enough to enjoy all these services!

Yesware is available for mail accounts under GMAIL and under OUTLOOK 2010 or 2013.

You can schedule feedbacks on emails sent or schedule an email to be sent to the desired hour. There is also a free application for IOS devices

 

It’s so easy!

1. Go to their website

2. Download the extensions

3. Enable them

4. Send your emails and get the desired monitoring service.

 

Yesware Email Tracking really worth it, especially since everything is free unless you want to do it on a large scale where there is anyway great packages at good prices.

Share this
02 Apr

Have you made a data backup on the 31st of March?

data backup Have you made a data backup on the 31st of March?

World Backup Day

Every day now seems to be devoted to a cause or an important event. March 31st (Two days ago) was the world backup day and there is even a website for it, view it here.

Have you done a data backup of your computers, mobile phones and tablets? If so, Well Done! Unless, it is not too late!
Actually backups should be done fairly regularly according to your habits ( installations of new softwares, updates of your documents).

We can no longer ignore the fact that hackers are constantly looking for ways to spread viruses and other malware. Moreover, over 30% of companies in a recent survey would even be willing to pay a ransom to recover critical data due to theft.

In addition, there are inherent risks due to the material itself who can fail. A hard drive has a real life period of 3 to 5 years depending on its use and the conditions of its environment.

Doing a backup on another disk or other media and even online on a Cloud Data Storage is strongly advised.

 

How to check a hard drive and predict a failure?

The best software to perform this type of audit is Crystal Disk Info, and I suggest you to download it on Source Forge. It will the ideal software if you buy a second hand hard drive on a classifieds site, giving you the possibility to check its condition.

 

Make an image of your disk

If you want to make an image copy of your drive, on LINUX, there is an excellent utility: Clonezilla. On Windows, this option is already provided by the operating system, but if you prefer an external solution to Microsoft, Acronis True Image is the perfect solution.

Pin on your calendar the next copy of your data and mobile devices, nothing beats the peace of mind!

Share this
01 Apr

Mobile Phone : Lost, Stolen or buy an used one

mobile phone buy used one or lost stolen

It is not difficult to find used mobile phones on site ads like KIJIJI or Craigslist or other such sites. The society is always pushing new models and features.

On the other hand, the loss, theft or just the interest of a bargain can make someone buy a second hand mobile device.

A wide crime area turns around the mobile phones and so for a while. Fortunately, manufacturers have taken decisions that greatly help to counter the theft of mobile phones.

So we will see what are the steps to do or to avoid in the loss, theft or purchase of a used mobile device.

 

Buying a used phone

You should not have blind trust in the person who sells you a used phone on a classifieds site or in the newspaper. Many people are fooled by simple subterfuge to avoid the buyer conducting normal verifications.

If the sale must be done quickly, blindly or a crazy story binds the purchase of your device, it’s probably a scam! Quit without hesitation, the adage says: “When it’s too good to be true …”

 

Tips:

– If the person says that the device is in its original packaging, unopened, it  do not guarantee a”SAFE” sale. It is easy to laminate a box in order to give the illusion that the phone has not been used or the box opened.

In these cases, unpack the product with the seller and make sure that the product is what you want to buy.

– Do not send money by mail or by transferring funds with Western Union or other.

– Meet the seller at his place of residence or work.

– Sign a paper , even if it is handwritten and simple for the conclusion of the sale.

– Tell the seller that you will conduct verifications to determine the status of the device you are about to buy. If he refuses, it is a clear sign of scam.

 

Steps to do

Turn on the device and grab the unique identification code (IMEI) by performing:

* # 06 # on the keypad of the unit. Write down this sequence of digits.

Check the status of the device in Canada by going to this website.

By entering the IMEI you will know if the device has been reported stolen or if there are restrictions or if the IMEI has been hacked.

** Do not be fooled by an IMEI that the seller will give you by email or phone prior to verification purposes. Recheck it and verify that every digits correspond to what he told you.

 

IPHONE

If the device you buy is an iPhone, go to ICLOUD.COM and check the lock status of the device. If you notice that the phone is locked with a ICLOUD ID, ask the seller to disable the protection.

Before going to the rendezvous, visit the Apple page that provides information on the ICLOUD protection, by clicking here.

 

THEFT or LOSS of a mobile phone

Prior to the occurrence of loss or theft of your favorite mobile phone, take the following measures for prevention and to facilitate the management of this unfortunate but possible situation :

– Turn on the device and grab the unique identification code (IMEI) by doing: * # 06 # on the keypad of the unit. Write down this sequence of digits.

– Set the protection “find my iphone” and lock the device with your iCloud ID if it is a IPhone.

– Activate a complex lock code on your mobile device. Avoid 1234 or 0000. sequences. If your machine is equipped with a fingerprint detection, you’re all done with this step!

– Activate the CLOUD services to backup your data and protect them. Make sure that backups are done on a regularly basis.

– Engrave the device in its back with your license number. If your device woth $ 900, I doubt that you will sell it tomorrow. Go to the nearest police station and rent the equipment, it’s a free service, or ask for the service to your favorite jeweler who will be happy to do it for a few bucks.

 

THEFT OR LOSS IN PROGRESS

Follow these steps:

– Locate your device remotely and lock it, wipe all the data.

– Inform the police department by following these links.

– Call your mobile service provider and stop the SIM card or disable the mobile package if the unit does not contain one (unlikely these days but …)
If you find back your device, make sure you still destroy all data by performing a restore. Who said they have not intentionally mishandled your device to hack your personal infos…

Share this

© 2018-2023 Internet Cloud Canada.Tous droits réservés. (Sitemap).