Selecting Cloud Software

“The Cloud.” It isn’t always the easiest concept for people to understand. Where is it? What is it? Is it safe?

Even the most seasoned businessperson may be flummoxed by just how data can be secure when it’s just out there, somewhere. But they shouldn’t be. Business leaders need to be armed with questions when working with an IT consultant and walk away with the facts they need to make an informed decision about cloud software.

Great cloud software can allow a business to be more secure, efficient and effective. When weighing the decision of how to use it, business leaders can drop these questions on vendors to gain more information.

  1. How will you secure our data? Just as the security of your physical location is important, your data storage should be protected vigilantly. Be sure to ask any potential cloud storage vendors what measures they have in place to secure your information. Essential security measures include: Anti-virus detection, data encryption, firewalls, multistep user verification and regular security audits.
  1. Are your data centers protected from theft and natural disasters? Let’s face it, unplanned calamities can happen at anywhere and at any time. A quality cloud storage vendor should not only be prepared to withstand unforeseen events, but also meet industry standards, such as the Statement Standards for Attestation Engagements 16 (SSAE16). To earn SSAE16 approval, a cloud company’s system and data must meet a higher criteria of customer privacy, data center physical security and data redundancy (i.e. data that is stored in several areas).
  1. How easy is the cloud software to use? For smaller businesses without IT staff, it’s important to remember that your chosen cloud system will be installed and used by people at all levels – from novice to professional. If the program is difficult to access or it takes too many steps to store and retrieve information, there can be a negative impact on your staff’s willingness to adopt the new system and overall organizational productivity.
  1. What customer services are offered? Technical problems can arise at any time, even when using the best cloud systems. For this reason, your vendor should have assistance available online or by phone 24 hours a day, every day. The level of assistance is also important, as there are times you may need to interact with a knowledgeable engineer, not a customer service representative following a script.
  1. Are there frequent downtimes in the cloud system? One of the most important benefits to cloud storage is that it enables you and your employees access to needed files from any internet connected device. If your chosen vendor experiences frequent downtimes, it can make it difficult for you to access information when you need it most. Some cloud storage providers will post their downtime history online. However, if yours does not, be sure to ask.

For businesses that need to do more with less, the cloud is a game changer. Understanding the cloud on a basic level allows leaders to make informed decisions about the role it can play in their business. If you’re looking for better insight, more engaged clients, faster innovation, consider exploring cloud solutions to move ahead of your competition.

These are just some highlights on what the cloud offers. Luckily, you don’t have to navigate it alone – at Amshot, we help our clients vet software providers to make sure they’re choosing the right option for their business. We also support software and train users. We look forward to discussing the specific areas where technology will add value to your business. Contact us here to start the conversation.Selecting Cloud Software

Business Leaders’ Guide to Avoiding Hacks

It seems these days that hacker is a job title with a bright future. Take a few extra clicks through the web and you’re bound to read either a story about hacking or the actual information that has been hacked – emails, business financials, personal info, or even your grandma’s secret fruitcake recipe.

In 2017, businesses must go on the defensive to protect their intellectual property, customer data and revenue in an online world which has more and more troublemakers squeezing through the cracks.

And let’s be clear it’s not just governments and corporate giants which are the targets. Businesses on Main Street are too. Small and medium sized businesses, often with not a lot of IT or security resources are becoming juicy targets for the hacking bad guys. According to new data from Symantec’s 2016 Internet Security Threat Report: “Last year, phishing campaigns targeted small businesses (PDF) 43 percent of the time. That’s up 9 percent over 2014 and a stark contrast to the mere 18 percent of attacks that focused on small businesses in 2011 … Symantec’s report reveals a 55 percent increase from 2014 to 2015 in the amount of spear-phishing campaigns that target employees of a business of any size.” (Source) In 2014, Russian hackers (those guys are popular) grabbed customer information from more than 400,000 business websites, getting away with more than 2 billion passwords. And they haven’t slowed down. (Source)

Here are some steps that any business can take in order to make themselves a little less vulnerable against anyone prowling around the web. Remember, the best offense is a good defense.

  1. Define the boundaries for your employees: A few bad clicks on phishing emails or strange web downloads are dangerous moves which could turn your company’s online security into swiss cheese. Educating your employees and creating acceptable use policies for what they should and shouldn’t do on the internet can make a big difference in whether a company network becomes a secret home to malware. Keeping them up with the latest threats will raise everyone’s radar.
  2.  Control the admin keys: Even a small organization can create a hierarchy for who has administrative access to the company’s server, email dashboard and enterprise software. Allowing all employees admin access can create a stew of changes, which can often be traced back to employee making something work for them on their device. “Security policies and mechanisms must be put in place for company data access from personal devices,” said P.J. Gupta, a mobile security expert and the founder and CEO of iPlum to “Tight control on who has the privileges to run which enterprise apps from which devices helps minimize the risk of data loss or corruption.” (source)
  3.  Treat email differently: Many of the most notorious hacks of the past few years came from people sharing a lot of information in the body of unsecured and non-encrypted emails. If a business is worried about what is being sent over the email transom internally, then training can come first, but an encrypted email service might be next. Services are available which will warn an employee if they are sharing sensitive information like a credit card number or an attachment of client contact information.
  4. Double-check Who’s Logging In: If you are worried someone is going to break down your door, sometimes the best solution is to just have two locks instead of one. Adding an extra step can frustrate and dissuade a bad guy just enough to make them give up and find an easier victim. On the digital side of a business, that more and more often means the addition of Two Factor Authentication. You are seeing this on everything from your bank to your favorite social media platform. Two Factor Authentication means that a password isn’t enough to get you to your data. These extra steps can include a secret piece of knowledge – i.e., “Mother’s maiden name” – or a fingerprint, voice password or PIN.
  5. Verify unusual requests with a real person: Bad guys have begun impersonating employees e-mail addresses to request that co-workers transfer funds to external accounts. This can result in losses of tens of thousands of dollars. If a request for external payment seems unusual, verify with your co-worker via phone or face-to-face.

Those are just a few simple steps a business can take to keep their cybersecurity guard up going into 2017. For more information or assistance contact Amshot at 405-896-8152 or

Amshot Protecting Against Hackes

A Different Way of Introducing Ourselves

If you follow amshot (and you do, or you wouldn’t be reading this), you may have noticed something new amid our technology- and IT-related posts. To commemorate amshot’s tremendous growth over the last four years, Oklahoma City-based artist Sam Washburn is developing 40-60 sketches for an amshot-themed art project whose overall connectivity will be revealed upon completion of the last piece. Each week we’ll reveal another way amshot helps its clients. Each drawing will stand on its own while contributing to the larger image, just as each of amshot’s services contributes to the company as a whole. We want to show what makes us unique.

Sam Washburn art

If this sounds a bit unusual, it is. amshot isn’t your typical managed services company, and the way we celebrate our anniversary shouldn’t be typical, either. Although we have been around since 2004, when our founder, Michael Thomas, began installing wifi hotspots around Norman, we have turned a corner over the last year. We are young as a development company, but we’re growing up quickly. We continue to add developers to our team and are equipped to handle anything we encounter, from a ground-up software project to embedding our developers in clients’ companies to save them the expense and headache of staffing an IT department.

Sam Washburn art

As anyone who has tried to do so knows, recruiting developers and IT professionals is hugely challenging and the market for them is always hypercompetitive. A company first has to find qualified developers and then assess their skills — skills that often difficult for non-developers to assess — or hire a recruiter to find candidates instead. Companies must provide attractive compensation and benefit plans. They must know what they need from these highly technical staffers. And they must do all of this when the unemployment rate for them is less than 1 percent. Let us worry about IT and software development so you can focus on your business’ core activities.

Through this project, Sam sought to add some levity to the serious business of improving and protecting clients precious IT resources. Each piece of his collage will illustrate a small part of amshot — culturally, professionally and personally. The result will be equal parts Wes Anderson and Where’s Waldo. We’re anxious and excited to see what our highly talented collaborator comes up with.

Sam’s first three installments focus on understanding clients’ businesses and helping to improve them; protecting clients from threats and helping clients make correct decisions in today’s difficult and confusing environment.

At amshot, our employees aren’t cogs, and our clients aren’t, either. We hope Sam’s work demonstrates this.

Sam Washburn art

Why You Should Outsource Your IT

Growing businesses face certain universal milestones: seeking outside investment, professionalizing human resources, and, perhaps to the greatest chagrin of business owners, figuring out what the heck to do about information technology.

Does a business bite the bullet and hire an IT manager? Can it afford to hire a good one? How does it even find a qualified person with the shortage in the workforce?

Does a business hire somebody’s brother-in-law who “knows about computers” or that guy who built a website for a friend?

Does a business seek bids on a freelancer website?

If this sounds familiar, you’ve probably started a business. Figuring out what to do about your computing needs seems daunting, but it doesn’t have to be. Rather than gambling with your company’s valuable data or hiring a technical staffer you may not need, consider managed IT services.

Managed services close the gap between setting up a single workstation and having an entire department on call. Many can set up a PC or laptop and configuring email or WiFi access. A much greater skill level, however, is required to network machines securely; set up virtual protected networks for secure, remote access; connect mobile devices securely to the network, both at the office and everywhere else; and troubleshoot when something goes wrong.

Business owners typically don’t think much about IT until something goes wrong — and something always goes wrong. Employees download viruses that compromise the system, or the company grows enough that it taxes the IT resources in place. Something will always happen.

We call this the “break-it-fix-it” model of IT management. Rather than plan for security, growth and future IT needs from the beginning, businesses wait for a fire and then call an IT professional to put it out. This is not only costly, as anyone who has had to hire a consultant to respond to an IT-related emergency can attest, but also very inefficient. Just like it makes more sense to keep a room clean rather than wait until it’s filthy, designing your network with future needs in mind will save many headaches years later.

When a business uses managed services, it hands off IT responsibility to firms like ours. When we do our job, our clients not only won’t have to worry about putting out IT-related fires; these emergencies are few and far between because the system will have been set up correctly and meticulously planned.

Outsourcing IT makes sense for many businesses, but there are several things to consider. Typically, businesses outsource tasks that are time-consuming and don’t relate to their core competencies. Potential outsourcing clients should consider what they want, with specific, agreed-upon metrics, and whether the partner is a good fit. Businesses often overlook the need to have a designated person to manage the relationship. To really make outsourcing shine, it’s not enough to hand over the work and forget about it.

Managed IT services have the potential to save money and free up personnel to grow the business. It makes sense for many small to medium-sized businesses. Does it make sense for yours?

Quick tip – HTML signatures for iOS6

iOS6Before iOS6, email signatures on your iPhone/iPad have been limited to just plain text, and one signature for all accounts.

In iOS6 you can add logos, links, and styled text to you email signature. You can also specify different signatures per account.

If you already have an HTML signature that you’d like to use, here is what you need to do:


  1. Start by sending yourself an email with the HTML signature in it.
  2. Next, go to your iPhone (or iPad) and open that message.
  3. Tap and hold the signature text.
  4. Select all the text and images of your signature.
  5. Copy the selected block of content.
  6. Go to Settings > Mail, Contacts, Calendars, Signature
  7. In the text field, tap, hold, and paste your signature.

[box type=”info”] Note: This will copy only plain or styled(bold, italic, or underlined) text, plus images and links. It won’t copy text colors and font sizes.[/box]

If you have multiple accounts on your iPhone be sure to select the “Per Account” field at the top of “Signature”.

[jcolumns]Plain text signatures on 3 email accounts:iOS6 Signature area

[jcol/]For business, something a little more jazzy:20130206-132623.jpg [/jcolumns]


I.T. Solutions for the Tush

I.T. problems? We like to solve them, but we have an I.T. issue of our own.

Idle on the Tush

The problem is – Office work is hard on the body!

If you don’t sit at a desk for hours every day, you’re probably scratching your head and saying to yourself, “How can office work and sitting be so bad for you?” Well, it’s not just bad, it’s a serious health issue. Here are a few reasons why.


James A. Levine, M.D., Ph.D.  Answers the question: What are the risks of sitting too much?

“Researchers have linked sitting for long periods of time with a number of health concerns, including:”


  • obesity
  • metabolic syndrome
  • increased blood pressure


  • high blood sugar
  • excess body fat around the waist
  • abnormal cholesterol levels.


Those of us whose jobs require 6 to 8 hours a day sitting at a desk need to perk up your ears and listen to your body. It’s probably telling you that something isn’t right. Are you’re knees stiff when you stand up? Does your backside feel numb? Are your shoulders aching and full of knots? How about your eyes, are they tired of staring at a computer screen? Then it’s time to get UP!


 Amshot found a really great solution – tech stlye: It’s called “UP” by Jawbone

“UP is a wristband and app that tracks how you sleep, move and eat—then helps you use that information to feel your best.”

up-by-jawbone-lowres-002One of the features of the wristband is that it lets you know when you have been idle too long. It will vibrate on your wrist, letting you know that you haven’t moved in an hour. So get up, stretch your legs, take a walk, go get some fresh air, MOVE!

All features include:


  • Sleep and nap tracking
  • 24/7 activity tracking
  • Food and drink tracking
  • Mood tracking


  • Insight engine
  • Idle alert
  • Smart alarm
  • 10 day battery


  • Water resistant design
  • Day and night form tracker
  • Power nap
  • Simple Sync


Amshot Solutions is already using UP and committed to becoming more aware of sitting too long in our office. We think that every desk sitting, computer pounding employee should do the same.

Information found at & Jawbone

Break out the Blue Beanies, let’s celebrate web standards.

Today is the 6th Annual International  Blue Beanie Day! Let’s celebrate Web Standards, Best Practices, HTML, CSS, and all the other languages and technologies that make up the fantabulous “WWW” – the Internet!

Web standards guru, Jeffrey Zeldman, wore a blue fuzzy fez on the cover of his book, Designing With Web StandardsWorn on this day, it symbolizes that you support the Web Standards Project and the ongoing effort to wrangle every one else to comply with these standards as well. It also makes a statement that you agree and are willing to design websites using best practices.

“Standards keep the web from fragmenting into tiny fiefdoms best viewed with a particular browser or plug-in only. Web standards keep our content portable and accessible across platforms, devices and operating systems. Each November 30, we celebrate. You wonderful people can help spread the word.”

-Jeffrey Zeldman

I won’t bore you with all the boring, nerdy details of what web standards and best practices are exactly. All you need to know is that it’s all good, but if you really want to find out, have a look at Zeldman’s page. There are a lot of good links to check out.

If you really want to show off your support for web standards,  Take a self-portrait wearing a blue beanie (toque, tuque, cap) and upload it to the Sixth International Blue Beanie Day 2012 – flickr pool! on Flickr.

And maybe Jeffrey will favorite you’re  photo like he did me last year!

janell gets a zeldman favorite

You can also upload your photo to Instagram, and announce it on Twitter using the hashtag #bbd12. For extra fun, add a blue beanie to your social network avatar on Twitter, Facebook, Google+, Flickr, etc.

Thanks for supporting web standards!


Awesome Video on Oklahoma During 1960-1970

All new iPhone, MacBook Pro and Airport Express

Just yesterday Apple released a whole new line of products. Including the all new iOS6 iPhone with control over which calls you receive. The new features include….

Rejection at its finest – Just because we can be reached on the moon or in the jungle doesn’t mean its the right time or place to pick up. Now you can reject a call with a reminder to call someone back or even with a pre-programmed text letting them know you will get back to them. The hardest part about this new feature will be coming up with your crazy excuses as to why you didn’t pick up.

Facetime over 3G – Tested over AT&T it reportedly worked great! Although it will hurt your wallet unless you have a unlimited data package.

Siri – With a new and improved Siri that provides movie times, sports scores, restaurant ratings and table reservations its defiantly received a face lift.

Facebook – You can directly post photos from your photo album to Facebook, update your status from the notification center, and sync your contact list with each person’s corresponding Facebook account.

Maps – Apple gave Goolge the boot and created its own Map. Were not quite sure how everyone feels about it just yet.

Music App – Nothing to jump for joy about, its works the same with an updated look.

iOS6 won’t be here for a few months, but if you want to try and jack some of the features before they hit check out this cool article iOS6 NOW


MacBook Pro

with Retina display

Next to the iPhone we are freaking out about the new line of MacBook Pro’s. This thing is crazy, I could go on and on about the new retina display, but what’s the point. Basically all you just need to know is that it has a 2800 x 1800 resolution on a 15.4-inch screen—that’s well over 5 million pixels, smashing your HDTV. If I were a photographer editing photo’s this would be a must have for me.

Did I mention they are about at thin as your iPhone4S weighing in at 4.5 pounds, and consists of Intel’s fastest new Ivy Bridge processors—Quad-Core 2.7 GHz of processing. Including Nvidia’s Kepler GeForce GT 650M. A gamers dream for someone that is on the go.

Capable of packing 768GB of flash storage. With two Thunderbolt ports, HDMI, an SD card, USB 3.0, and “MagSafe 2.” No ethernet port or optical drive, but who cares that’s old anyway. Starting at $2200 with a 2.3 GHz Ivy Bridge processor, 8 GB of RAM, and a 256 SSD. Ships today!

 The new AirPort Express supports simultaneous dual-band 802.11n Wi-Fi. That means it transmits at both the 2.4GHz and 5GHz frequencies at the same time. So no matter which band your wireless devices use, they’ll automatically connect to the best available band for the fastest possible performance.

To learn more about the new airport express and all of its features refere to Apple site. 



iTunes Missing Movies

Recently we had a client purchase a new Apple TV. Anxious to curl up on the couch to watch one of their previously purchased movies they were confused when it was no where to be found. Through researching the issue amshot discovered that not all movies were available from iTunes in the cloud. Although, there were no articles to support the issue we did come across a movie within iTunes letting us know that there are in fact movies that cannot be accessed via iTunes cloud. Take a look at the lovely message in the image below $14.99 Buy Movie.



Google Drive

What Is Google Drive?

Google Drive is another option for storing your stuff in the cloud. But what is it, exactly?

The Dropbox-dominated cloud storage space has become increasingly crowded. Microsoft’s SkyDrive, Apple’s iCloud, Evernote, and Box are all contending for your content. But Google Drive might just stand out from the pack.

Google Drive is a cloud storage service…

Essentially, it’s a beefed-up version of Google Docs. You can store your documents, photos, music, videos, etc. all in one place. It syncs with your mobile devices and your computer, so if you make a change from one gadget, it will automatically show up if you were to access it elsewhere.

It tracks your changes too, so if you make an edit to the document and hit save, you can still look back at all your revisions from the past 30 days. Of course it relies heavily on Google search, with image recognition for browsing your photos and some OCR capabilities for sniffing out text in pictures.

Like its competitors you can get up to 5GB of space for free, after which you can upgrade. It’s $2.49/month for 25GB, $4.99/month for 100GB, and $49.99 a month for a whopping 1TB. If you move to a premium account it also automatically expands your Gmail storage to 25GB.

Google Drive Site