If you find yourself on a quest or in a race to get your printed, documents, then you could benefit from follow me printing.
You start out by selecting the printer believed to be the most efficient for your business. Then, after you hit print and you walk to the printer you realize your printed material is missing. You begin to ask everybody in the office “Did you pick up my report on project X.” After a few trips around the office, still empty-handed, you decide it would be faster to simply print it again.
I will print it and sprint to the printer to ensure that I get my print job, you think to yourself. So you go back to your computer, hit print, lace up your running shoes and take off in a sprint to the printer.
Your phone rings as you get to edge of your office. It stops you in your tracks because you have been playing phone tag with a big prospect for days now. You whirl around and grab the call. Congratulations, you won at phone tag. However, while you were celebrating victory connecting with your big prospect, your printed documents were left unattended.
It’s ok. Everybody knows you were just looking for a print job. Everyone, except Betty. Betty just printed her church bulletin on the same office printer, and you guessed it, your freshly printed documents found their way in the middle of Betty’s good deed.
Freshly off your phone tag celebration with the best prospect in the world, you realize you still have on your running shoes. Oh yea, I was running to the printer to pick up my report on project X. So you head over to the printer to pick up your second victory, your document. Aaargh! It is not there for the second time in 30 minutes. Before you pull out the remaining hair on your head, take a deep breath, there are ways to avoid participating in the document scavenger hunt.
The first solution is simple. Place a table beside your printer and train every one of your employees to place abandoned print jobs on it. Easy as pie, right? Yes, as long as everyone participates and your job does not come out in the middle of Betty’s church bulletin prints again. If the content of your print job is sensitive the table is not going to remedy the issue of curious eyes in your organization, leaving your documents unsecure.
The second solution is what we refer to as follow me printing. Following me printing requires authentication for your printed documents to be released at the print device, protecting your documents from being lost or unsecured. This is how it works. After you have printed your document a printer server holds your print jobs in a queue. The queue in the print server knows who you are and what you are printing. Now when you walk up to the printer, you need to authenticate yourself to retrieve your personal and secure print queue. Once you have authenticated yourself at the print device, your queue is available. This allows you to print your job and take the important prospect phone call without worrying if Betty is going to get your print job.
We do take your print efficiency, productivity and security seriously. We want to help you secure printed content no matter if you are printing project x report, patient records, employee information or top secret content, while at the same time ensure you are not spending time and dollars on lost documents. Your productivity is our mission. And, we can design a printing environment that is secure and efficient – saving your running shoes for the weekends.
Software Sales Specialist
Ben is a software specialist with RJ Young and works with businesses to design solutions to realize efficiencies while boosting productivity. Prior to joining RJ Young he worked in information technology support and account management for business-to-business companies. Ben is originally from Fort Worth, TX and works out of our Memphis, TN office. In his spare time he volunteers for his church, the Bartlett Basketball Club and can be found cheering on one of his many favorite sports teams.
Most people look at the computer on their desk and think “it’s a computer” and “it does this stuff.” If you pin said person down and ask them what that “stuff” is, you would probably get an answer along the lines of, “well, you know email, and Internet Explorer and Microsoft Office.” If you asked CAD engineers they would say Pro-E or Solidworks, accountants would list QuickBooks, Excel or a tax package, medical workers would reference an EMR or practice management package such as eClinical Works, Allscripts or Athena.
The more you asked the worker about their day, the more you would wonder why you’ve been buying so many pens and pencils because you realized EVERYTHING your workers do is on their computer. The “stuff” your workers’ computers do for them, and for you are called “network services.” We keep those services running with a high-level of availability by managing them, thus the term Managed Network Services (MNS)– much like the janitorial department transitioned to the name of “Environmental Services,” the geeks have come up with a fancy name to say we keep your “stuff” working.
It’s not just Managed Service Providers (MSPs) that build MNS programs – every IT department and computer firm in the world provides MNS. But just like any department in your company – you need a good manager. You need a person to manage your services that can comprehend how important they are to your company’s existence, that can see the big picture of your company’s growth and that doesn’t try and run a budget like the US Government. So whether or not they claim the title, if you hire an IT firm to help your company, you are hiring a MSP.
So then, if you were hiring a Quarterback would you pick up a guy who loves to play wide receiver, or the guy who has spent his life preparing to be a franchise QB? Just remember, when it comes to contracting an IT firm, you should hire a company who has been structured entirely to be an MSP.
Regional Director of Managed IT Services.
James oversees the Chattanooga, Nashville and Huntsville markets of our managed IT Services department. In his role he manages service delivery and support of engineers in all regions, does security and compliance auditing, and works with businesses in network design, implementation and troubleshooting. He has been in the technology industry for over 24 years. James is originally from Boston, MA and works out of our Chattanooga office. He joined RJ Young in January 2013 through the acquisition of his previous company, Preferred Computers, Inc.
Hardly a week goes by that we are not made aware of a cyber security breach. It is a continual problem and affects everyone. These breaches can occur in two ways: 1) a company’s risk from exterior and interior sources and 2) the risk a company takes if it accesses data at a customer’s site.
On the internal side a company needs to be protected by computer security. The goal of IT security is to protect both the data that is transmitted within or outside of the network, as well as the data at rest. Some of the many considerations are access controls, awareness controls, training, risk assessment, and constant monitoring. Internally, your company needs to be protected by computer security.
The protective management of the vulnerabilities include the following: user access controls firewalls that are properly configured, intrusion detection systems, up-to-date software and patch management, current antivirus and endpoint security for software & hardware, backup systems and off-site storage, data encryption, intrusion detection processes, and a proven disaster recovery / business continuity plan.
With the advent of BYOD (bring your own device) there is a greater increased risk, especially since many of the users are utilizing cloud-based systems. Many of these cloud-based systems may or may not be authorized or install software that can protect against cyber attacks. The mobility of BYOB is very critical but it also opens additional threats to networks.
In a recent study by Spector Soft, 47% of companies reported that a former employee took information with them when they left the company, 49% have discovered that employees routinely copy corporate data to USB storage devices, 33% of their end-users reported they transfer work information via personal accounts such as Gmail, and another 23% of those end-users send information to cloud services such as Dropbox. This same report indicated that 44% of inside breaches include intellectual property such as business plans and technology designs.
The flip side is when you access your customer’s data. Most people did not realize that Target’s disaster and security breach was actually transferred to the Target network by a vendor. So if you have access to your clients’ networks then make sure your people are trained to understand the risks and liabilities of an accidental or malicious breach of a clients’ data.
Nearly all US states have data protection laws in place that include legal protection for such things such as Social Security numbers, credit card information and banking records. It is estimated that the average cost of a data breach is $7.2 million and that correlates to about $210 per compromised record. According to McDonald Hopkins, about 90% of cyber-attacks are avoidable through simple or intermediate controls. Now would be a good time to have a cyber check-up on the internal and external controls and protections.
Chief Operating Officer
See bio here https://www.rjyoung.com/leadership