New in 2019: DejaOffice PC CRM featured in Forbes

Forbes article highlights DejaOffice multi-user CRM

Author Gene Marks has highlighted our product DejaOffice PC CRM in an article titled On CRM: Is A CRM Necessary?

To answer the title question – Yes, a CRM is absolutely necessary for every small business. The only question a business should have is how much to pay on a one-time, monthly or annual basis.

CRM Stands for Customer Relations Management and it is the primary system a business has to track its prospects and customers. Every time a customer calls, emails, texts or visits a business, the nature of that interaction should be recorded in company records. Later, this information can be used for marketing new products, or renewing agreements, or engaging the core sales cycle of the business.

Without a CRM you are blind. Every customer interaction is done without context, or understanding the past relationship. This leaves your customers open to your competitors, and you lose your niche.

With a CRM you have effective communication. Your customer remembers you, and you can do the courtesy of remembering the customer. If your business can survive on 300 customers, how much better will it be with 600 customers or 900 customers. The purpose of computer automation is to delegate the responsibility for remembering the details to a proper database and not just carry it in your head.

Gene concludes with the question: “Wouldn’t just a simple, inexpensive system that enables your group to share accurate contact, history, notes and calendar information take be sufficient?” and answers with ” For many, it just may. And for $200 (and a few bucks extra for support), it could be worth the try.”

Click Here to try out DejaOffice PC CRM for Free

Thank you Gene Marks and Forbes!

DejaOffice PC CRM Pro
Average User Rating:
Average rating: 4.85 out of 5 based on 39 reviews.
Free 14 day trial. Price $199.95

How To Protect Your Laptop While Traveling

There are multiple aspects to keeping a laptop safe. It does you little good to encrypt your laptop against malware if you conduct actions which leave it wide open to thieves, and vice versa. Here are a few tips to help keep your device safe and your trip relaxed.

Your laptop is probably the most expensive thing on you when you are traveling, and yet it is incredibly fragile. Few things can ruin a vacation faster than losing your laptop to theft, viruses, or other threats, especially if you are in an area on the globe where you may be unable to easily obtain a new one.

Get a New, Padded Laptop Backpack

A good laptop backpack is a major first step towards protecting your laptop from bumps, falls, water, and other damaging things. PC Magazine has a list of good backpacks, though you can check Amazon or any office or electronics store in the area.

When you are selecting a backpack, prioritize checking its padding above anything else. Also look for multiple compartments so that you can store just the laptop in a single compartment instead of squishing it alongside clothes and wires and other things. Go for functionality over style, as the only people you will end up attracting with a cool backpack are thieves. 

Note that you should try to get a backpack instead of a briefcase or messenger bag. A briefcase is a clear sign to unsavory individuals that something valuable is inside, and is easier to rip away from you than a properly secured backpack. It is also easy to carry a backpack on a long hike instead of awkwardly shifting a messenger bag from shoulder to shoulder.

Stay Alert

If you leave your laptop unattended in a public space for a minute or two to use the bathroom, you may as well kiss it goodbye. Laptops are prime candidates for thieves, whether it is for the value of the data in the laptop or for the device itself. And while you can lock your computer or even put a cable lock around it to deter thieves, your best weapon against them is constant vigilance.

 Take your laptop with you wherever you go, instead of leaving it in the hotel. But also keep it out of sight when you can. Keep it in a backpack, or cover it with a jacket. The less people know where your laptop, the less likely anything bad will happen to it.

Backup your Data

You should be regularly backing up your data already, but it is important to do a full backup right before you go on a trip. Store all of your important data on an external hard drive or in the cloud so that you do not lose any critical data on top of losing your computer. Create a log of passwords outside the computer so that anyone who gains access cannot access personal records.

Also consider backing up your data while you are on the trip itself. If you have created any documents or files on the trip, store them on a CD or USB drive in your hotel at the end of the day and put those things in a secure place.

Use a VPN instead of public Wi-Fi

Sitting in a café in some foreign land and connecting to the Internet may seem like the epitome of how globalization brings us together, but doing anything on a public Wi-Fi can be extremely dangerous. The problem is that as CSO Online describes, hackers can easily position themselves between yourself and the connection point. This gives them access to any data you send out, such as your email passwords, business data, and credit card data. Even if you are just logging into some internet forum or checking sports scores, they can use any information to deduce personal information about you. Furthermore, hackers can also send data back and infect your computer with malware.

Consequently, you should be looking to connect online as little as possible. If you are in a situation where you absolutely must connect, use a trustworthy VPN which will encrypt your data. If you are not sure what a VPN is, cooltechzone has an excellent guide on what they are and how to set one up.

Note that a VPN will not make your data completely hackproof. But the hacker will likely not want to make the effort when there are other computers sending unencrypted data. Your company should provide you with a VPN you can use when traveling abroad. Also make sure to turn wi-fi off when not using it, as the computer is still transmitting data when it is on.

Should You Leave Your Laptop at Home?

Your laptop will face numerous threats when traveling that it will never have to deal with if you leave it at home. So maybe you should not take your laptop at all.

This is especially true if you are on vacation. You are traveling to see the world and explore new sights, not stay hooked to the Internet like you are on most days. And even if you want to stay connected to some degree, Trip Savvy points out that a tablet or phone can serve just as well for someone just on vacation. The only major reason to bring a laptop along is if you may have to work when traveling.

If you really, truly, absolutely must bring a computer along, consider bringing in a cheaper laptop. Do you still have that old, slow, dying laptop lying around which you replaced with your brand new device? Take the old one instead. You may be frustrated with longer loading times, but you will not have to be looking over your shoulder all the time out of fear of losing or damaging it.

How Adware Affects Your Computer

While on your Computer or mobile device, you notice an annoying pop-up advertisement, and regardless of how often you close it, it keeps reappearing. Chances are its Adware.

Adware is short for advertisement and Software. It is an advertising-supported Software. It is the name given to programs that are designed to display advertisements on your Computer, redirect your search to advertising websites, and collect data about you. For example, it receives a history of sites the user visits, and this sends this information back to the ad company. The information collected is often used to deliver custom advertisements to you.

Adware is a financially supported Software, and most times, developers bundle them with other files that you’ve downloaded. They might be malicious in nature so you must run a scan using Adware Removal tool. Sometimes they are not harmful, but they have the potential to be, and users see them as an invasion of privacy and distraction.

How Adware is Installed

Are you in a situation where specific advertisements keep showing up on your Computer, whether in any of your browsers or sites you’ve never seen ads before? If you answer ‘yes’ to this question, your system might be affected by Adware that injects ads into websites as you browse.

Aside from getting rid of Adware; a big question you might be asking is how did it get there initially?

Adware overtime has been responsible for many successful and prevalent programs including AOL instant messenger, Endora and many more. A method in which Adware can get into your system is when you download a free program. Other times, producers of software bundler pay for ads to appear when you search for specific Software. These adverts lead you to download a software bundler instead of the free, neat Software you were hoping for, leaving you with many ad injections.

Another method which is as well insidious occurs when you’re visiting a website. It doesn’t matter if it’s a trusted site or a sketchy one. Whichever way, your device can be infected with Adware. This way takes advantage of the vulnerability of your browser. The Adware burrows in, start collecting information, redirects you to malicious sites and pop up more advertisement.

How Adware affects your Computer

Sometimes, adware fall under the category of malicious software ‘malware.’ Adware is often harmless, but are now used in bad manners to exploit your system. Below are ways Adware can affect your Computer.

Slows down your Computer

The first warning of malicious Adware is the deterioration in your Computer’s performance. Adware has a reputation of engaging resources and in turn, hurting performance and speed.  Adware runs continuously in the background without your knowledge and uses valuable resources such as memory processor speed.

Increase Bandwidth Usage

Adware does this by downloading unwanted stuff. When you authorize the download of Software, new Software is downloaded and installed simultaneously. Many adware programs enter into your Computer unknowingly. These programs invade your Computer and run in your Computer’s background, eating up bandwidth. If you notice a constant use of your internet, but you can’t find any program regularly using this bandwidth on your Computer. It is likely Adware.

Make Computing Experience Worse

Adware is an annoyance to most computer users. For the majority of people, the primary problem with Adware is its ability to display advertisements in a pop-up form whenever it wants. These adverts grab your attention, and if you click on them, they install Software on your system without your permission. These installed Software keeps displaying adverts related to whatever you have clicked before. This pop up over a user’s work can plague the user.

Costs Money

Shopping is now a lot easier with the availability of online stores. The idea that one can buy anything from the comfort of their home is soothing. Right products, reasonable prices, and new offers/discounts are some of those things that make online shopping attractive. However, there are dangers associated with online shopping. Adware throws fake advertisements for an online store at a user. These ads are illegitimate, and most times, they offer a ridiculously low price of an item or a service that is hard to pass up on. Once a user clicks on it, a malicious user can steal their info (credit card info, for example).

Invades Privacy

Another negative side is an invasion of privacy. Some adware programs can download and install spyware. These programs can capture user personal information, and they send confidential information to advertisers or criminals. Additionally, they can collect browsing history and send it to ad managers.

How to Get Rid of Adware

Look out for suspicious/unknown name in installed programs and remove it.

As discussed earlier, most pop-up ads install a program on your Computer. Though not as a general rule, you’ll need to check for malicious programs to remove it.

Navigate your way to the programs screen and scroll through the list of currently installed programs. Look for recently installed unknown programs, any other unwanted or unknown program and uninstall from your Computer.

Depending on what application has installed the adware infection, the program may have a different name on your Computer. If you cannot find any unwanted or unknown programs on your Computer, then you can proceed with this next step.

Look out for suspicious/unknown name in installed browser extensions and remove it.

Adware generally bombards web browsers with ads. An important step is to look out for unknown extension and uninstall it.

Besides, you can reset Internet Explorer settings or other browsers to return them to the state they were in on the first installation on your PC. This reset feature fixes many issues while saving essential information like bookmarks, passwords, web form auto-fill information, browsing history, and open tabs.

Install MalwareFox

As easy as the above steps look like, things are not completely easy in most cases. There are situations in which these programs might be hiding deep in system setting and prove challenging to remove.

In cases like this, it is reasonable to scan the system with adware removal tool like MalwareFox. MalwareFox performs deep cleaning, detects, and cleans Adware; removing annoying ads, toolbar, and search in a click.

Additionally, MalwareFox restores performance by deleting adware infections which engages resources. With this method, there’s a gain of lost power of the computer system.

Is Privacy a Luxury Good?

Google CEO Sundar Pichai recently opined that “privacy cannot be a luxury good offered only to people who can afford to buy premium products and services” (NYT – May 7 2019). This bears a look at whether privacy is free, or something to be paid.

Read the comments of the article to see through the statement. Google claims to respect privacy, at the same time as working hard to undermine it. No one is fooled when it comes to Google and Privacy; if you use their free services, you have no right to stop them from monetizing that service by selling your data.

Pay for Cloud, Pay for Privacy

At CompanionLink we offer DejaCloud as a paid service. As a paid service, our sole source of income on DejaCloud is the money that is paid. We also offer Software as a paid service. And our only source of income is what people pay to us.

The has come an expectation from some people that software should be free. Vendors like Google and Facebook push free service as a model. But they would not be corporations if they had no income, so you need to watch carefully where that income is coming from.

Apple and Microsoft are not far removed from the fray. Although Apple charges for their phones, they offer free iCloud service. There are serveral reports that Apple monetizes iCloud service by sharing your data with Google. Microsoft has also spoken clearly about monetizing Windows 10 by tracking your purchases.

At CompanionLink we have a simple love for how software used to work. You buy it, you own it. No one should have ulterior motives in selling your data. We make upgrades available and send marketing to our customers as a way to keep our revenue stream steady and provide needed support to our customers. When they get a new PC or new phone, they may not need to pay at that time for an upgrade. But the average of all upgrades has to be there for our team to be able to provide the needed products and services.

At least with CompanionLink and DejaCloud, your data is secure, and not being sold to the highest bidder. We hope through our basic product revenue to stay that way for the future.

How to Sync Outlook Contacts with Your Brand New Google Pixel 3a/3aXL

DejaOffice App on the Pixel works like Outlook on the PC

To sync Outlook to Pixel 3a, and have Contacts, Calendar, Tasks and Notes all one one spot, you can use the DejaOffice App.

  1. From Google Play Store, install DejaOffice on your Pixel 3a or Pixel 3a XL
  2. On your PC, download CompanionLink for Outlook on your PC.
  3. Configure both for DejaCloud Sync
  4. Watch your Outlook Contacts and Calendar appear on your phone.

DejaOffice is Free.  CompanionLink runs on a two-week trial.

Samsung Pixel 3a is the latest flagship from the world leader of Smartphones. There’s nothing faster or more effective.  Here I have an argument with Apple.  With iPhone there is no Widgets, and Widgets are so useful, you’ll never catch me using a phone without them.

What is a widget?  A widget shows App information on the phone desktop.  A widget allows me to quickly see my day view, and my contact list – without opening an app.  I can quickly tap on the location and get to my next appointment.  No search, no scroll.  Just one tap and I’m in maps.  One tap and I can call or sms.  Automatically updated all day.

Special features of DejaOffice:

  • Time zone management, so when you land your Calendar doesn’t go wonky
  • Calendar Colors that match Outlook
  • Templates that save time entering new Appointments and Tasks
  • Persistent alarms to be sure I don’t miss anything.
  • Recurring tasks compatible with Outlook
  • Optional:  Franklin Covey task priorities  A1, B2, C99
  • Works same on Android and iPhone, Phones and Tablets.

How to Sync Outlook Contacts with Android: Use CompanionLink for easy and secure sync from Outlook to your Pixel 3a phone. This is a better system than Google, who sells your data, or Microsoft who hosts your data on their exchange server. Here are some setup guides for CompanionLink sync:

CompanionLink for Outlook
Average User Rating:
Average rating: 4.87 out of 5 based on 476 reviews.
Free 14 day trial. Price $14.95 3-Mo Subs - $49.95 One-time License.

What Your Remote Employees Can do to Protect Your Network

6 Tips for Remote Employees

Thanks to increased use of technology in work, it has enabled a lot of persons to work less and less from the office. What this means is that we now have more persons working from the comfort of their homes, a coffee shop, hotel or some other remote location of their choosing.

Despite the many advantages of having employees work remotely, these advantages come at a cost, usually, in the form of data security. Normally, having your employees work in a traditional office space means you can monitor what comes in and goes out of your company’s network – the IT team can catch viruses early, password changes can be forced upon employees using auto-reminders, and regular security checks means you catch issues early and deal with them.

This ability to work from anywhere gives employees the needed flexibility, and for the employers, it means they can enjoy the services of talents from around the world without having to worry about the overhead occasioned from staffing.

However, with remote employees, you lose all of this control, and it leaves your network open to virus attacks, cyber leaks and all other forms of cyber threats. When things like this happen, financial, legal and reputational problems may result. Therefore, you need to have a system in place to protect your network when you have employees working remotely. You employees should follow the things below to protect your network.

• PROTECT THEIR DEVICES AT ALL TIMES

Often, most data-stealing malware that affects devices arrive via the web or email and to reduce the chances of a security breach you have to restrict access to personal web browsing and email. However, enforcing this is costly and can be difficult. Therefore, to protect your network, you have to ensure your employees use the latest versions of all applications and install security patches as soon as they are released. You can also manage things from your end by activating automatic updates from software makers.

• LIMIT THE USE OF PUBLIC WI-FI

Internet on public Wi-Fi is provided from unknown servers, and this means security is not guaranteed. This makes the network susceptible to hackers since anyone can access it; therefore, you should have a standing order which forbids your employees from sending or receiving sensitive information over public Wi-Fi. As with public Wi-Fi, so too is cyber café, your employees should not conduct company business with them.

• EMPLOY CLOUD SERVICES

By employing cloud-based applications in your office tasks, it allows your employees to work from any location and transfers the burden of managing data security to the cloud service providers who usually are more equipped to handle it.

The cloud-based service provider gives you safe virtual storage and working space while your employees manage passwords. You should ensure your employees use strong passwords as this helps keep data secure. In fact, you can employ cloud applications to secure employees access to the web, and there are quite a number of companies which offer these services.

• LIMIT THE USE OF EXTERNAL STORAGE DEVICES

External storage devices like USBs can easily be misplaced so your remote employees should restrict their use and if they must be used to house only non-sensitive information.

Beyond this, USB devices can be used by hackers to install malware on your computer so your remote employees should avoid using a friend or stranger’s USB on their laptop.

• GET EDUCATION ON SECURITY TRAINING

Some companies may be tempted to give employees the benefit of the doubt by assuming they know how to manage security. However, this should not be the case as employees should be mandated to take up basic security courses which would teach them how to handle suspicious emails and links and to understand what a secure password should be like. It is important employees understand that work computers are for the company and not for personal use, therefore, should be treated as such.

• INSTALL ENCRYPTION SOFTWARE

Lost and stolen devices can pose a source of danger in the wrong hands, but you can lessen this risk with encryption software which bars unauthorized users from accessing the device.

Also, you can install remote wipes on your devices so data on them can be erased in case they go missing.

In conclusion, although remote workers can save the company money in terms of expenditure on overhead, they can also pose a risk to the firm especially if they use office devices for personal use. Therefore as a company, you have to put measures in place to handle staff remotely while remote workers should do their bit in adhering with safety measures.

The Best Way to Synchronize Samsung Galaxy Note 9 to Outlook without using Exchange

Why does the Outlook App not work like Outlook?

CompanionLink provides an Android App called DejaOffice CRM with PC Sync.  It is better than the Outlook App in many ways.  Click here for a comparison of DejaOffice App vs Outlook App on Android.

To sync Outlook to Galaxy Note9 without needing an Office 365 subscription.

  1. From Google Play Store, install DejaOffice on your Samsung Galaxy S9 or S9+
  2. On your PC, download CompanionLink for Outlook on your PC.
  3. Configure both for DejaCloud Sync
  4. Watch your Outlook Contacts and Calendar appear on your phone.

DejaOffice is Free.  CompanionLink runs on a two-week trial.

Click here for more information on Using Microsoft Office without a Subscription.

Samsung Galaxy Note9 is the latest flagship from the world leader of Smartphones. There’s nothing faster or more effective.  Here I have an argument with Apple.  With iPhone there is no Widgets, and Widgets are so useful, you’ll never catch me using a phone without them.

What is a widget?  A widget shows App information on the phone desktop.  A widget allows me to quickly see my day view, and my contact list – without opening an app.  I can quickly tap on the location and get to my next appointment.  No search, no scroll.  Just one tap and I’m in maps.  One tap and I can call or sms.  Automatically updated all day.

Special features of DejaOffice:

  • Time zone management, so when you land your Calendar doesn’t go wonky
  • Calendar Colors that match Outlook
  • Templates that save time entering new Appointments and Tasks
  • Persistent alarms to be sure I don’t miss anything.
  • Recurring tasks compatible with Outlook
  • Optional:  Franklin Covey task priorities  A1, B2, C99
  • Works same on Android and iPhone, Phones and Tablets.

Check out https://www.dejaoffice.com for more information.

CompanionLink for Outlook
Average User Rating:
Average rating: 4.87 out of 5 based on 476 reviews.
Free 14 day trial. Price $14.95 3-Mo Subs - $49.95 One-time License.

Galaxy Note 9, Outlook, Outlook 2019, Office 365

Secure Contact Sync without Google or Exchange

This week brought us news of a clever phishing scheme using Google Docs. People received a realistic email from a trusted business associate. The email contained a link to a Google Doc. Opening the document required you go through Google OAuth and entering your Email and Password.

Fortunately, Google OAuth is secure, so the password was not stolen. Unfortunately, the phisher obtained a token that allowed them to access your gmail account, allowing them to send an email to all of your professional contacts.

Frustrated with Google

This attack underscores a weak point in data security. When your email and contact information is stored on a public cloud server, the server becomes a target for obtaining your valuable information.  Instead of targeting the billions of computers that are used to store business information locally, phishers target the “big three” who collect the data in complex systems that allow others access to it.

Notwithstanding the phishing attack, Google, Microsoft and Apple reserve the right to farm your data and re-sell it. Google will scan your data and target advertising to you. If you send an email about an Acapulco vacation, you will soon find your browsing full of offers for cheap resorts. Microsoft and Apple are more circumspect about their data scanning. But they still store and mine the data, and work to derive profit from it.

CompanionLink provides a secure alternative to storing your company’s data on a highly public server. If you use our USB, Wi-Fi, or Bluetooth Sync, your data is not stored at all. We offer a secure cloud service called DejaCloud. This service is significantly different from Exchange, iCloud and Google Sync. With DejaCloud, we do not derive income from mining and selling the data. Our source of income is product sales and subscription service, and that’s all. We are not a public company and do not have to split our loyalty between our customers and our shareholders.

I remember years ago how proud I was as my customer list grew from 500 contacts, to 600, and then over one thousand. At that time I was using Goldmine, and we sold Add-On products for Act! and Goldmine. Today we have 1.8 million entries in our various databases, and I’m still proud that this list has never been hacked, and will never be stored in a public database.

How to Sync Outlook Contacts, Calendar, Tasks and Notes with iPhone 6s

There seems no end to sync solutions for iPhone.  The problem is; they all devolve into Apple-like simplicity.

Face it.  We use Outlook because it is fast, effective, and the whole world supports it.  It is forced on us by our business, it runs our mail, it runs our appointments, and the less time we can spend there, the more we can do our jobs.

cl djo hero

With iPhone, the best known solutions are feeble, at best.  With Apple iCloud, you need to create a different Outlook folder and move your data to it.  You need to put up with problems with it, with mail and other things.  And then, when it gets to iPhone, you have no Tasks any more just reminders.

With Office 365 and the Outlook App you have a different set of problems.  It all gets to the phone ok (except for tasks again) but the only thing that is marginally good with the Outlook App from Microsoft is the email.  Hello Microsoft:  Email is NOT a problem on the iPhone.

So that’s what CompanionLink and DejaOffice are here to do. Synchronize Outlook Contacts, and Outlook Calendar, and Outlook Tasks to the iPhone.  Not only to move them, safely and securely, but DejaOffice provides an Outlook-like ecosystem on the iPhone and Android so that you can continue to do Contacts, Calendar, Tasks and Notes just like your PC.  So if you want to schedule an appointment, or make a task for a contact, you can do that in one App on your phone.  If you have Recurring Tasks, CompanionLink and DejaOffice is the only solution available that supports them on all platforms.

CompanionLink also works for Outlook for Mac 2011 and Outlook for Mac 2015.

Here’s how to sync Contacts, Calendar, Tasks and Memos:

  1. On your PC or Mac; Download the CompanionLink for Outlook 14-day trial
  2. On your iPhone or Android phone, download DejaOffice for Outlook
  3. Set up USB, Wi-Fi or DejaCloud sync

That’s it!  You’ll have your data on your phone.  For more information here’s our info page for CompanionLink for Outlook.

How to sync Samsung Galaxy Note 5 and Galaxy S6 Edge+ to Outlook

Galaxy Note 5 and Galaxy S6 Edge+ are the newest additions to the Wide World of Phablets. The Edge+ is the first Phablet phone to feature the curved edges which can show information while the phone is turned.

DejaOffice for Outlook App is made for these large screen phones, giving a maximum of functionality.  Only DejaOffice offers:

* Contacts, Calendar, Tasks and Notes in one app, and you can link them together
* Category colors, use the same categories across all conduits.
* USB, Wi-FI and Cloud synchronization options
* Private records, view them only when you enter a pass code
* Onboard encryption.  Even if your phone is lost, your data is safe

Setup Guide for Samsung Galaxy Outlook sync

  1. Install CompanionLink on your PC. Click here to download it.
  2. On your Galaxy Phone, launch the Google Play Store. Search for DejaOffice and install it.
  3. Configure CompanionLink. Your configuration steps will depend on the sync option listed above that you choose.
    1. Setup guide: Galaxy S6 to Outlook USB sync
    2. Setup guide: Galaxy S6 to Outlook WiFi sync
    3. Recommended: Galaxy S6 to Outlook DejaCloud sync (automatic)
    4. Setup guide: Galaxy S6 to Outlook using a Google account
    5. With DejaCloud sync, the synchronization will begin automatically within a few minutes. If you selected USB, WiFi, or sync to Google, you need to click on the Sync button in CompanionLink on your PC to start the first sync.

Further help for Samsung Galaxy to Outlook sync

Call us at 503-243-3400 if you need further help. Support is free to everyone with a Galaxy S6 phone, regardless of whether you do or do not own a license to CompanionLink . You can also access our setup guides online. If you want an advanced configuration help, we offer a $49 RunStart package where our experts will log in to your PC and Galaxy S6 to configure the sync for you. This gives you the peace of mind that your Galaxy S6 to PC sync is fine-tuned to match your needs.