• Skip to content
  • Skip to primary sidebar

Header Right

  • Home
  • About
  • Contact

Best Business Practices

Beware the Social Media Swamp – Learn How to Deal with Unhappy Customers

August 18, 2020 by Admin

Business team analyzing market researchThe reach of social media goes beyond sharing family photos. Shoppers are reading product reviews online before deciding what to purchase. And disgruntled customers are sharing their displeasure with anyone who will read their rants.

A New Risk

The benefit of social media to small businesses is considerable. It has leveled the playing field in many ways. But it has also introduced new risks. One of the most critical is that bad reviews or negative comments could ruin your business’s reputation — or worse.

A Proactive Approach

How can you protect your business from online attacks? Here are some suggestions:

Join the conversation. If you’ve been visible on social media, you’ll have more credibility if something erupts. But that’s not the only reason to have a social media presence. Even if your business is never involved in an online dustup, social media offers an opportunity to market and promote your business and engage with your customers. Smartphones and tablets have made it even easier for people to go online.

Pay attention. Monitor the Internet for news about your brand. Routinely check online review sites (if appropriate) and social networking sites for references to your company, and run your company’s name through a search engine.

Be prepared. You can’t draft specific responses ahead of time, but you can identify your vulnerabilities and draft a response strategy. You’ll be well ahead of the game if you do this before a crisis hits rather than during one. You’ll also be able to dial down your emotions and respond more objectively. There’s another upside to identifying your vulnerabilities ahead of time: You have an opportunity to eliminate them.

Respond. Make sure you have the facts straight before you do anything. However, things can escalate rapidly online. So if you’re going to respond, do so quickly and publicly. That said, not every attack warrants a public response. The complaint may not be legitimate or the person complaining may be a troublemaker, in which case responding may be a waste of time.

Half Full

Any time your business is under attack — online or off — try looking at it as an opportunity to change some minds and bolster your reputation.

Request a free consultation through our website now and we’ll contact you set up an appointment.

Filed Under: Best Business Practices

4 Areas to Consider When Transitioning Employees to Working From Home

April 15, 2020 by Admin

women working from homeFor businesses that haven’t traditionally embraced remote employees, it may be difficult to get up to full speed with the current turn of events.  To make the inevitable transition less overwhelming, we assembled a handy checklist of actions to consider while adjusting to the new workplace reality.

Organization

  • Access your staff members and/or roles that are able to work remotely, those that can’t work remotely, and those where remote work may be possible with some modifications.
  • Conduct an employee survey to determine the availability of computers that can be used for working remotely, as well as availability to high-speed internet access.
  • Create company guidelines covering remote employees, including inappropriate use of company assets and security guidelines.
  • Develop and conduct work-at-home- training for using remote access, remote tools, and best practices.
  • Select a video-conferencing platform for services, such as Zoom, Cisco WebEx, or Go To Meeting.
  • Develop a communications plan to involve remote employees in the daily activities of the organization.

 Security

  • Create and implement a company security policy that applies to remote employees, including actions such as locking computers when not in use.
  • Implement two-factor authentication for highly-sensitive portals.
  • If needed, confirm all remote employees have access to and can use a business-grade VPN, and that you have enough licenses for all employees working remotely.

Staff

  • Institute a transparency policy with your staff and communicate frequently.
  • Check in on your staff, daily if possible, to confirm they are comfortable with working from home. Find and address any problems they may be experiencing.
  • Make certain each staff member has reliable voice communications, even if this results in adding a business-quality voice over IP service.
  • Don’t attempt to micro-manage your staff. Remember their working conditions at home won’t be ideal, and they will need to work out their own work patterns and schedules.
  • Create a phone number and email address where staff members can communicate their concerns about the firm, working at home, or even the status of COVID-19.

Infrastructure

  • Ensure that you have ample bandwidth coming in to your company to handle all of the new remote traffic.
  • Make sure you have backups of your services so your staff is able to keep working in the event extra traffic causes your primary service to go down.

You may need to adjust or expand this list to match the specific needs of your firm and the conditions affecting your organization.  Use this list to get you started and to help guide you through the process.

Call us at 631-474-2500 to learn more about our services. Whether you’re just starting out or have been in business for years, we can help you plan the best strategies to minimize your tax liability, provide a full array of accounting and bookkeeping services, and much more.

Filed Under: Best Business Practices

Protect Your Business Data from Hackers

March 18, 2020 by Admin

Newton Samkey & Co. -  Protect Your Business from HackersDo you know where your company’s data is? Without strong security controls in place, your data could be anywhere — and you could be dealing with a privacy breach. As technology grows more complex and the flow of information accelerates, opportunities for the misuse and abuse of data are bound to increase.

Flow Chart of Data

It’s imperative that you know exactly what data your business collects. Pay particular attention to the personally identifiable information (PII) you have for both customers and employees. Create a detailed flow chart showing what information is gathered, how it is captured, how it is used, where it is stored, how it is shared, and how it is ultimately disposed of.

Risk and Regulations

An effective data management plan helps ensure compliance and manage risk by establishing policies and procedures that control the flow and use of information. In addition to federal privacy legislation, the vast majority of states have laws to prevent security breaches, and some industries have developed their own privacy guidelines. Note that each phase of the information “life cycle” may require a unique set of controls.

Privacy Policies

Privacy policies are the “public” face of your data management plan. Best practices include:

  • Notify customers about your privacy policies. Explain why information is collected, how it is used, why it is retained, and why it is disclosed (if it is).
  • Obtain customers’ consent to use the information as outlined in your policies.
  • Collect only the information you need and only for the purposes outlined.
  • Keep personal information secure.
  • Allow customers to review and update their PII.
  • Do not retain information any longer than needed to fulfill your stated purpose or as required (by law or regulation).
  • If you disclose information to a third party, do so only with consent and only for the purposes outlined.
  • Monitor your compliance efforts on an ongoing basis.

For more tips on how to keep business best practices front and center for your company, give us a call at 631-474-2500 for a free, confidential consultation. We look forward to working with you.

Filed Under: Best Business Practices

How to Keep Your Company’s Email Safe

December 18, 2019 by Admin

data security conceptWhether you use a desktop computer, a laptop, or a smartphone, you have probably come to rely on e-mail to communicate with vendors, customers, and business associates. It’s just as likely that many of your e-mails have attached files that contain confidential information or some other highly private data. Unfortunately, private, important data can be stolen, accidentally forwarded, or leaked through malicious software programs. That’s why you need to focus on enhancing your security measures. Here are some enhancements to consider.

Encryption. Encryption scrambles the data in e-mail messages so that they cannot be read if they are intercepted. Many off-the-shelf and downloadable products use a variation of public-key cryptography (which uses one key for data encryption and another for decryption). Businesses can also access secure e-mail services online.

E-mail gateways. Some businesses secure external e-mails and leave internal e-mails unsecured. Businesses that take this route use e-mail gateway security products that capture outgoing e-mails and ensure that they are sent securely.

Access and usage privileges. Another layer of security involves e-mail users setting access privileges by specifying that a confidential e-mail is accessible only to a particular recipient.

Expiration dates. E-mail users can set expiration dates on their e-mails and other documents so that documents are deleted from a recipient’s inbox on a specified date.

Firewalls. Firewalls are designed to separate one network from another and are often used to separate an internal network from the Internet. Firewalls can also identify and filter out potentially damaging data entering or leaving the network.

Antivirus protection. Installing antivirus software on all company computers protects against viruses that attempt to slip through firewalls by posing as legitimate e-mails or programs.

Give Newton Sankey & Co. a call at 631-474-2500 to discuss a package of accounting services for your business. We offer a free initial consultation.

Filed Under: Best Business Practices

Get Your Business Costs Under Control Today

May 31, 2019 by Admin

Newton Sankey & Co. Best Business PracticesIncreasing your profits requires selling more and/or spending less. While building up your sales may require an extended effort, business costs are often very ripe for a quick trimming. Here are some possibilities.

Supplies and Other Purchases

Usually, in any business, relatively few items represent a very large share of all outlays. The first step in cutting expenses is, therefore, to identify your highest costs. You may be able to trim many of these costs by making sure you always bid out significant purchases or by more actively seeking less expensive alternatives.

For many companies, inventory carrying costs are a very significant expense. Focusing on matching your inventory quantities more closely to your short-term needs could result in significant savings.

Telecommunications and Other Services

The ongoing services you buy may also offer the potential for cost savings. Revisit your choice of telecommunications vendor and your usage.

Look carefully at your costs for financial services. If you borrow or maintain a line of credit, always compare the rates from more than one financing source before you commit. Make sure you are not paying higher-than-necessary fees for your company’s checking and deposit services.

Cash Management

To control cash outlays, take advantage of discounts for early payment whenever possible. And look to delay payments for as long as you can without giving up discounts.

On the receiving side, deposit all receipts daily. And always actively pursue collection of any invoices that are past due. To help control your working capital needs and, therefore, your credit costs, try to match any new liabilities to your anticipated cash flow.

Fixed Expenses

One other category worth examining is fixed expenses that are long-term commitments. While you usually can’t change these quickly, be aware of when a window for change will open and prepare well in advance by considering lower cost alternatives.

To learn more ways to control your business costs give us a call today. Our trained staff of professionals is always available to answer any questions you may have.

Give us a call at 631-474-2500 to discuss a package of accounting services for your business. We offer a free initial consultation.

Filed Under: Best Business Practices

  • « Previous Page
  • Page 1
  • …
  • Page 3
  • Page 4
  • Page 5

Primary Sidebar

Search

Archive

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019

Category

  • Best Business Practices
  • Estate and Trusts
  • Individual Tax
  • Investment
  • Payroll Tax
  • QuickBooks
  • Real Estate
  • Retirement
  • Tax Articles
  • Uncategorized

Copyright © 2019 · https://www.newtonsankey.com/blog