No, It’s Not a Horror Movie, It is Just Taxes….

The worst horror movie for small businesses might start something like this…

It was a late night on April 14th, the entrepreneur sits hunched over the glow from their computer screen, sweat beads begin pouring from their forehead as they frantically search for all the 941 forms from the entire year. Where are they?

Why doesn’t this bank register add up? How do they fix this? A journal entry? Recategorize all these expenses? What is that noise coming up the walk outside? Is that an IRS agent? The tick of the clock becomes deafening…..

One, two, tax man’s coming for you;

three, four gonna knock on your door;

five, six gonna audit your fix;

seven, eight gonna fine you if it’s late;

nine, ten gonna penalize you again…..

How do you avoid these nightmares?

Let QuickBooks Online and QuickBooks Payroll help out!

QB payroll makes it so easy and stress free and works seamlessly with QuickBooks Online. The payroll service automatically calculates, files and pays all the taxes due for each employee’s payroll. It files all your quarterly tax forms automatically and archives all the forms in the software so you don’t even have to keep track of them.

The online version allows you to give your accountant direct access to the software that can be accessed though any browser. No longer having to put files on thumb drives or in shared folder through Dropbox. The accountant can then review your books, make any necessary adjustments and file your taxes.

All you have to do is tell your accountant you are ready.

No report preparation, no sweating over journal entries, no pulling tax forms and the accountant can get the entire picture of all the finances and make any adjustments.

Wake up from your nightmare! Give us a call and let us help you get set up with QuickBooks Online.

-Sara Sulzman

Navigating the Need for Custom Apps in Organizational Growth

When should you consider a custom app? Most organizations big or small will encounter a bottleneck in their workflow at some point in their growth. This usually happens when out of the box software becomes cumbersome and tangled with workarounds. For smaller organizations this can often manifest itself early. This is usually because there is a product or service that is unique and valuable to their clients and there are people wearing many hats trying to accomplish the necessary tasks.Here are a few common areas where this becomes apparent:

  • Accounting and billing software that doesn’t handle special inventory tracking or custom invoicing that is unique to the organization.

  • Contract administration that has special requirements and term.

  • Proprietary multi-step processes that require coordination of people and assets.

  • Outside data that is ingested and then utilized for the organization.

These things and many more make up the ingredients used in the “special sauce” that makes an organization unique and gives it a competitive edge.Here are some signals that you may need a custom app:

  • Spreadsheets that become critical to operation. These often contain static data (snapshots), and require manual work.

  • Word processing documents and emails that require manual input or formatting that feel repetitive.

  • QuickBooks workarounds that require dual entry.

  • Static reporting to help track moving processes.

  • You feel the need to add staff merely to reduce clerical workload.

There are single use specialty apps that can gather and send information in an efficient manner. Think of these as simple robots that help make certain repetitive tasks simple and accurate. This type of app could go to your webstore, pull sales and generate order forms, emails updates, reports and even send updates back to the store. Another example might be survey data that is downloaded from a webform and then assembled into reports and charts for internal use or as an email to outside parties.Other apps can be much more complex. Sometimes they start with a simple app that retrieves data and starts an entire process that tracks the job from start to finish. This could involve multiple inputs and even finish with a deliverable like an invoice or a report and quite possibly create entries for your accounting system.Most workgroups and/or small organizations don’t have the resources to retain staff to write custom apps and if they do, these people often become backlogged very quickly with projects that may conflict with an internal process mission.
SideKick Solutions has been providing Custom Apps for our clients for over 20 years and our developers have been doing it even longer. Chances are good we’ve helped someone with unique needs that are similar yours. We also have the practical experience to help you decide which things to prioritize and even what may be most practical. We create solutions that can be flexible as your needs change.

-Dwayne Schwartz

Apple Silicon vs. Intel Chips in Apple Products

The tech world has witnessed a tremendous shift as Apple transitioned from relying on Intel chips to designing its own custom silicon. The introduction of Apple Silicon, including the M1 chip, has sparked debates among tech enthusiasts. In this blog post, we'll delve into the pros and cons of Apple Silicon versus Intel chips, exploring the implications for performance, compatibility, and the overall user experience.

The Pros of Apple Silicon

Optimized Performance:

Apple Silicon is designed in-house, allowing for optimized hardware and software integration. This synergy results in enhanced performance, faster speeds, and improved energy efficiency, contributing to a more responsive user experience.

Unified Ecosystem:

Apple's move to custom silicon fosters a more unified ecosystem. Whether it's a Mac, iPad, or iPhone, the underlying architecture remains consistent. This unity streamlines cross-device collaboration and integration within the Apple ecosystem.

Advanced Security Features:

Apple Silicon incorporates custom-designed security features, contributing to a more robust defense against potential threats. This heightened security is a key selling point for organizations prioritizing data protection and privacy.

Future-Forward Innovation:

Apple Silicon represents a commitment to innovation and future advancements. Apple has more control over its roadmap, allowing for tailored solutions and potential breakthroughs that align with its long-term vision.

The Cons of Apple Silicon

Compatibility Challenges:

The transition to Apple Silicon may pose compatibility challenges with legacy software. While Apple encourages developers to update their applications, some older or niche software may experience delays in optimization.

Transition Period Uncertainties:

During the transition period, users may face uncertainties as software developers adapt to the new architecture. Some applications may not perform optimally until they are fully optimized for Apple Silicon.

Limited Upgrade Options:

Users with existing Intel-based Macs may find limited upgrade options in the short term. The availability of certain models with Intel chips might decrease as Apple fully embraces its custom silicon.

With Apple's transition to Silicon, those currently using Intel chips may find it beneficial to seek advice. The choice ultimately hinges on individual preferences, specific use cases, and the willingness to adapt to the evolving technological landscape. If you're unsure about the right direction for your company or personal needs, feel free to reach out to us via email at support@sidekicksolutions.com for personalized guidance.

-Cecelia Schwartz

FileMaker 2023

Have you heard of Claris FileMaker 2023? No, not FileMaker Pro 20, but a whole new name and logo that begins a new path.


Remember the company changing its name back to Claris in August 2020? Significant changes have been going on since then. So FileMaker 2023 is an update of FileMaker 19, but it’s also one of three Claris apps that together embrace web technology.

Claris Changes
For more than 20 years, the FileMaker company built a large use-base of organizations (business, government, education, non-profit), some of them with thousands of users. But software moved to the web, and when the company name changed to Claris, it signaled a new focus on becoming a complete web solution with three products working together. The result announced last August is:

  • Claris FileMaker 2023

  • Claris Connect

  • Claris Studio

FileMaker solutions can continue to be used as they have been for years. But the three apps together make for a completely online approach. FileMaker data can be integrated with other online apps (Claris Connect) and web-based custom forms, dashboards, and other cloud-native, no-code Views (Claris Studio). Until August, we had worked with FileMaker Pro 19 for over three years. The version on your computer was 19.0.1 or higher. Over time, it went to 19.1.x and up to 19.6.x. The yearly number of changes was left behind. Claris FileMaker 2023 may have a new logo with the new name, but the version number counts. It is now 20. x.x. The latest version is 20.2.1. FileMaker 2023 is not compatible with versions older than 19. It’s only compatible back to 19.4.2 when connecting to older versions. We have been busy upgrading users to FileMaker 19 or FileMaker 2023 in recent months. Claris no longer supports versions earlier than 19, but upgrading older users is not a problem. We recommend that all FileMaker users upgrade soon.

-Randy Seba

One Size Does NOT Fit All

One of the biggest lessons I've learned over my ahem "seasoned" years is this: My way isn’t the best way; it's simply the best way for me. No universal blueprint, software, or system fits every individual or business like a little black dress. True expertise comes from honest, in-depth conversations to identify the real issues and develop practical solutions to work together like a well-tuned orchestra.

A lesson I learned in a salesmanship course I undertook in college a “few" years ago still remains relevant. Identify the client’s needs (or, as the modern jargon goes, "pain points”) and then show them ways to solve them. At the heart of this symphony is communication.

Everyone has their signature rhythm for handling tasks. How can we elevate that tune without rewriting the entire song? If there's a discord, how do we refine the melody?

Equally vital is our flexibility to pivot, adapt, and grow as the landscape of businesses evolves. Sometimes, we might not have the immediate solution in our repertoire, but we might know the maestro who does. We might not always hit the immediate high note, but we're committed to finding it or directing you to those who can.

Do you need a company that has your best interest at heart? Let's sit down and share a cup of coffee...

-Sara Sulzman

Dodging Digital Germs on Apple & PC (Because Computers Get Sick Too!)

Hey there, digital adventurer! Ever wondered if your computer can catch a cold? In the tech world, we call these ‘colds’ malware, and just like when you sneezed on your colleague's sandwich (oops!), computers can spread them too. But don't worry! At SideKick Solutions, we've whipped up a magical potion (okay, it's software) to chase those computer bugs away, whether you're Team Apple or Team PC!

Malware in Layman's Terms:

So, what's malware? Imagine an uninvited party crasher who eats all the snacks, spills drinks on your carpet, and then karaoke screams off-key. That's malware for your computer – uninvited, destructive, and downright annoying.

The Art of Quarantining Malware (or, "Go to Your Room, Mister Computer Virus!")

  1. Spotting the Crashers: Our software plays the role of that eagle-eyed bouncer, spotting party crashers from a mile away.

  2. Time-Out Zone: Found a troublemaker? They're swiftly given a time-out (quarantined), away from the main party (your computer).

  3. Interrogation Room: Here, we figure out if they're misunderstood or genuine villains.

  4. Exit or Encore: Nasty villains are shown the door. Misunderstood files? They get to rejoin the party.

Apple vs. PC: Party Scenes and Their Uninvited Guests:

Apple:

- Apple's party scene? It’s exclusive. Think swanky, invite-only events.

- But as these parties become the talk of the town, some crashers try their luck.

- Still, compared to PC, Apple's bouncers are pretty tight.

PC (Mostly Windows):

- PC’s bash? Think epic block party!

- With more people and open gates, some sneaky crashers have a higher chance.

- But hey, with our potion (software), even this massive party can stay fun and crasher-free!

Our Magical Potion (Totally Not Made in Hogwarts):

Our potion (all right, it's a tool, but stick with us here) at SideKick Solutions is like that perfect party playlist:

- Non-Stop Vigilance: It's always on the lookout, ensuring no bad vibes enter the party.

- The Detective Mode: Mix of intuition and Sherlock-level deduction to spot the baddies.

- Easy Peasy Lemon Squeezy: Even if you think "URL" is a fancy name for a drink, you can easily use our tool.

- Fresh Beats: Regular updates keep the party (and protection) going!

Want the Inside Scoop?

Curious to know more? Want to protect your digital assets? Drop us a line, call us, or send a pigeon (just kidding on that last one)! Contact us at support@sidekicksolutions.com or dial 913-228-1840.

Party on safely with SideKick Solutions. After all, digital life's a party, and you're the star! 🎉

-Cecelia Schwartz

Data Backup Strategies: A Guide to Ensuring Data Security

Are you backed up?

This seems like a simple question, but it is helpful to understand the strategies involved and make sure your goals are being met. At a minimum, data must be stored separately from the device you are using. Appropriately done, this backup is stored in a safe location to protect from a disaster that wipes out the original and the backup. Think fire, flood, theft, sabotage, and other disasters. Your insurance company will likely ask you about your security and backup policy. There are many questions to consider when crafting a solution:

  • What is the type of data? Word processing and spreadsheets can be pretty straightforward, while graphic design files, email, and cloud data present many different challenges.

  • Is the data shared? Server and cloud storage have additional challenges because many users may be editing.

  • How much data? Local backups and cloud backups must be able to hold the current files and provide historical snapshots. Internet bandwidth can play a significant role.

  • How much history is needed? It may be important to track changes to a file for a month, a year, or forever. Files that are deleted either accidentally or maliciously need to be retrievable.

  • Is there a data retention policy? Some companies are required to purge data beyond a pre-set age.

  • How sensitive is the data? Accounting, medical and legal records have different needs than other data types.

  • Is there a need to archive data? While similar to a backup, an archive is often structured differently for security and cost-effectiveness.

  • How fast do you need to retrieve a backup? While backup cloud storage can be inexpensive and convenient, recovering a server’s data can take weeks.

  • How could you monitor and test these solutions? Plans should be tested for speed, accuracy, and real-time reports if there are backup errors.

The question “Are you backed up?” can be answered much more confidently when these and more questions are answered. We have seen almost every situation, from theft, sabotage, fires, hackers, etc. SideKick Solutions offers custom backup consulting and services for small businesses and organizations to provide that confidence.

-Dwayne Schwartz

Unveiling the Dark Web: Exploring the Hidden Realm of the Internet

The internet, my friends, is an expansive and interconnected network that grants us unparalleled access to information, communication with others, and a wide range of activities. However, lurking beneath the surface of the visible web lies a realm that has captivated our curiosity—the Dark Web. Today we aim to illuminate the Dark Web, unravel its enigmatic nature, and explore some captivating statistics that underscore its existence and activities.

The Dark Web encompasses a segment of the internet that purposefully conceals itself from standard search engines, rendering it inaccessible to the casual user. It operates through overlay networks like Tor (The Onion Router), which safeguard users' identities and complicate the tracking of their online endeavors. While the Dark Web often finds association with unlawful undertakings, it simultaneously serves as a platform for privacy-conscious individuals, journalists, and impassioned political activists seeking refuge.

Undeniably, the Dark Web has earned notoriety for its status as a haven for illicit activities, spanning the sale of narcotics, firearms, stolen data, and counterfeit merchandise. The veil of anonymity the Dark Web provides entices malefactors who exploit its encryption and concealment mechanisms to conduct their unlawful operations. Data breaches loom as a pressing concern in this era, and the Dark Web assumes a pivotal role in the subterranean trade of pilfered data. Research carried out by Privacy Affairs has unveiled that nearly 30% of all known data breaches find their way onto the Dark Web. This stolen information encompasses personal identifiable details, login credentials, financial records, and more, thus posing a substantial threat to individuals and organizations alike.

The Dark Web persists as a captivating and cryptic corner of the internet, shrouded in secrecy, harboring both illicit activities and legitimate purposes. While statistics afford us glimpses into the vastness, scale, and prevalence of unlawful conduct, it is crucial to approach this topic with discretion and acknowledge that not everything within the Dark Web is inherently nefarious.

SideKick Solutions provides comprehensive domain monitoring services to address any concerns you may have about the potential presence of your business credentials on the dark web. We understand the significance of safeguarding your sensitive information and are here to assist you. Please do not hesitate to contact us for further details and assistance.

-Cecelia Schwartz

Spring Cleaning

I recently moved. Not just a move but a major downsize, as well. As I was sorting through personal items, furniture, family history, and cabinets of food, I kept thinking to myself, “Why do I still have this? When did I use it last? Huh, I wonder where this came from? College newspapers from 1986 – really?!”

I forced myself to really look at every item that was taking up space and causing clutter. Items that no longer served a purpose or evoked a feeling. By donating, trashing, and selling a vast number of things, I was able to keep those that were necessary and/or truly wanted. As a result, I feel like I’m more efficient now because I don’t have as much to sort through when trying to locate something.

This same mindset holds true for your computer. When was the last time you took a good, serious look at your computer and its contents? Do you find yourself struggling to locate a document? Is your system slow and bogged down? Almost full to the brim? Add your computer to your list of routine cleaning. Sinks and toilets shouldn’t get all the attention.

Start with the low-hanging fruit. Do you have programs on your computer that are either unused or outdated and incompatible with the current operating system? If so, remove them. This frees up additional space on your system. Next, take a look at your Downloads and Documents folders. How many versions of the same file do you really need? Still hoarding screenshots that haven’t seen the light of day since the Summer of 2019? Trash them!

Now let’s dig a little deeper. Open your browser and review all those saved bookmarks. How many do you still frequent? How many of the sites are now defunct? It’s time to streamline your bookmarks and delete any that you haven’t visited. Think of it as clearing out the pantry to make access to that Malt-O-Meal (chocolate) box easier.

Photos. So. Many. Photos. Are you like me, where you take 72 snaps of the same subject to ensure you get that perfect shot? Not really an issue if you do. It becomes an issue when you keep the 71 bad images and allow them to clutter your computer further. Routinely go through your photos and delete the “undesirables.” I make it a habit to move all images from my phone to my computer once a quarter. I then review the pictures and delete the obviously bad ones. Think blurry, out of frame, the same subject repeated, and screenshots added to your library. Those are all taking up unnecessary space. Delete them.

Once you have reviewed your Applications, Downloads, Documents, Bookmarks, and Photos, be sure to empty your Trash. You really haven’t saved much space if the full dumpster (or five) is still sitting in your driveway. Lastly, take a look at your remaining content and place the items in an area of your computer that makes the most sense to you for easy access and recovery. Which closet gets to hold those items?

While we are cleaning, we might as well take a stab at emails. Though they don’t always directly take up space on your computer, they definitely can. They also tend to accumulate at lightning speed. A full email account, whether work or personal, will ultimately affect your performance. As you creep closer to your provider’s capacity limit, you might notice slowdowns in email performance, struggles to search for older messages in the vast pile of cyber clutter, and possibly even be unable to save/add attachments. Get in the habit of reviewing the emails saved on your accounts. Do you really need all of those Sent messages taking up space? Once you have saved an attachment from a sender, delete the original message; having the same file in multiple places is no use. Unless your cousin sent you Grandma’s Ginger Snap recipe in 1999, do you really need the messages from the last millennium? I’m not saying you need to dump everything but do make an effort to review your emails and really think about why you still have them hanging around.

Make a computer content review part of your home cleaning routine. Set it to a schedule based on your needs and how quickly you tend to fill up your system. Once you set your schedule, stick to it. It’s far easier to clean here and there as you go rather than being forced to when your system fills up, crashes, or needs items pulled from it. Locating a file or photo should be as easy as knowing that Clue is in the hallway closet and the checkbook is in the top left desk drawer (yes, I still write the occasional check). Now, I need to go finish emptying far too many cardboard boxes.

-Granville Loar

FileMaker Update

Gone are the days when new software came on a disc. We expect to go to the web and start working immediately in an app. So how does 35-year-old FileMaker Pro with over a million users fit that expectation? That was the question in August 2019 when FileMaker changed the company name to Claris. FileMaker has famously made work groups of 1 - hundred more efficient, centralizing data and using it to manage businesses. It can quickly be customized to each work group. FileMaker software was located mainly at the user locations but only a little on the web.

As Claris, their new main focus was WEB. FM 19 came in May 2020 with a more mature FileMaker Cloud service. Then COVID changed many things, but FileMaker stayed at version 19, though it continually updated over time. Claris recently emerged with new Claris-named web apps and a FileMaker upgraded to version 2023. Claris no longer support versions older than FileMaker 19. As usual, we don’t recommend upgrading to the latest version immediately. FileMaker 19 is compatible with FileMaker 2023, so version 19 is an excellent place to be. We often see upgrades happen because of new hardware or new security concerns. COVID caused many security upgrades; FileMaker 19 and 2023 meet those concerns. We will be talking will all our FileMaker customers in the coming months to ensure that each is at a FileMaker version that makes the most sense for their organization.

-Randy Seba

QuickBooks and MailChimp – A One Step Recipe?

At a quick glance, connecting QuickBooks Online and Mailchimp is just one little clickety-click, and all is right with the world. I like to be optimistic, but even my desire for an Easy Bake shortcut isn't the right path. A one button push will leave you with an underdone cupcake. It takes a professional baker to create that treat.

So is the bite worth the calories? Most definitely!

Mailchimp has become a great tool to manage email campaigns to your contacts. It is a very powerful tool with a great deal of flexibility to segment your audiences and add eye catching graphics, links and information. The tracking of audience response is a wonderful way to help fine tune your marketing campaigns. However, continuing to update all your contacts into Mailchimp can be a continuous and daunting task. This is where QuickBooks Online connection can be the perfect dessert.

Intuit, the company that owns QuickBooks Online, recently purchased Mailchimp and has now developed a connection between the two online subscriptions. Contacts can now be entered in one place and shared between the two services. This can be a real time saving and helpful tool, but it does have some limitations and takes a master chef to set it up.

Once connected, QuickBooks Online will send over invoice and purchasing information into Mailchimp. Why is this important? It allows you to now track past invoice information to help target any audience with very specific marketing information. For example, if you want to follow-up with a thank you email with the customers that have purchased in the last 30 days, it is possible to filter out those customers. Finding those who have not purchased in while is also useful to hit them to encourage re-orders. Need to keep your customers sugared up and happy!

The benefits can give you a perfectly decorated treat with a very advanced flavor profile. However, setting up the crossover connections has its challenges and the recipe needs to be cleaned up and fine-tuned in QuickBooks and in Mailchimp.

Hungry to get the professional fancy iced cupcake with all the flavor options? Don’t get a flat flavorless treat. Let us bake it for you for the tastiest result.

-Sara Sulzman

Two Factor Authentication

The term sounds very technical. Two Factor Authentication, often called 2FA for short. Also known as Multi Factor Authentication (or MFA), it is very simply adding another tool to prove that you are who you say you are. You can think of it kind of like using a safe deposit box at a bank. The bank employee must authenticate your signature and unlock the box with their own key before they let you use your key to open your box.

In the past, you have probably had a code sent to your phone to log in to certain services. This is a form of two factor authentication. In this case, the service was using your SMS (which simply stands for "Short Message Service") text feature on your cell phone to send you a second code.

SMS text messages are not very secure. They add a layer of security but they are vulnerable to hackers through several well known vulnerabilities.

So what is the solution? Authentication applications come to the rescue. An authentication applications links your identity to the service you are trying to use. Once configured, you must respond to an encrypted challenge each time a device tries to log in to your service.

The application on your phone communicates through sophisticated algorithms with the servers at the service provider. It proves that you are really you.

Most cloud services are slowly moving to make everyone use some type of secure token identity proof. Many banking and credit card services are making the shift way from SMS to Authenticator apps now and most business insurance companies are requiring their insured customer employees to use them.

There are two Authentication tools that are fairly well tested. One is Microsoft's Authenticator and the other is Google's Authenticator. Both tools work with many different services. As an example, you can use the Google Authenticator tool to authenticate a Microsoft Office 365 login.

To find your Authentication Application, do a search for Microsoft Authenticator or Google Authenticator from the Apple App Store or Google Play stores. There are many other third party tools available but you should do your own research before trusting them.

If you need help setting up one of these services, let us know. We would love to help you out.

-Bradley Boots

Tech Security

As we dive into 2023, it is an excellent time to look at some of the identified trends for tech security and frame them in our small business world. Everyone is trying to reduce their risk exposure. Many of you receive security surveys from your business insurance providers and clients. The challenge quickly becomes filling out these forms that are often filled with jargon and have a “one size fits all” tone. We work hard to identify best practices for our team and our clients that are both beneficial and practical. Password management, email phishing, and physical network devices help keep you aware and secure.

This article from 1Password (our password solution vendor) identifies four trends for 2023. The article goes more in-depth and has many other blog posts that you may find helpful. Here are some of our comments on that article and how these apply to your organization:

1. Passkeys are going to achieve critical mass in 2023

This will be relevant as you interact with your vendors and web commerce sites. We like the trend toward a no-password world, but the challenge will be that it is one more thing to deal with until it becomes universal. Even Apple with Touch ID requires a typed-in password occasionally for software installation and iCloud services.

2. Cybercrime is going to mature in remote working organizations

It is incredible how quickly this is hitting even the most minor organizations. This is an ominous thing that requires ongoing attention. We’ve been working with our clients all along and will continue.

3. It’s time to create a post-quantum cryptography strategy

This is a bit more abstract for small organizations. It applies to the choices you will make for data storage etc. We advise sticking with known and reliable services such as Google, Microsoft, AWS, and the more extensive cloud services like Dropbox, Box, Egnyte, etc. because they will be adopting and implementing this. Implementing anything beyond this isn’t yet practical for your small organization.

4. People will expect and demand data privacy by default

The trend is moving toward this while, at the same time, companies are getting more sophisticated in how to use your data. A clean opt-in-opt-out option is essential if you have a commercial website. Same with email lists.

Overall, we are excited to help you navigate your tech security. It is nice to have some new tools to help protect your organization. This is an ongoing process, and we are here to help.

-Dwayne Schwartz

New You, New Tech to Keep Up with Your Resolutions

It is that time again - 2023 is now at our doorstep, and we all have the best intentions of keeping up with our New Year’s resolutions. Here are some top-notch tech gadgets to keep you on track.

The Apple Watch SE is a great way to keep up with your day’s activities and heart rate and offers sleep tracking. If you enjoy outdoor workouts, it tracks dozens of different exercises. You can also send and receive text messages and control music playback.

If the Peloton isn’t your speed, Apple Fitness+ is an excellent alternative. Anyone with an iPhone can subscribe and take a variety of classes. Better yet, it tracks directly to your Apple Watch as well.

Have you ever wanted to organize and step up your security game? This is the year to start tidying up all those Post-It Notes into a mind-blowing password manager. 1Password is one of the best options out there. 1Password gives you various vaults and has browser extensions for Chrome, Edge, and Safari. 1Password also has a ‘Password Generator’ feature that helps create a new and secure password. You will never have to worry about someone hacking your accounts with this simple and accessible tool.

Let us start 2023 on a solid and caring note. We got this!

Happy New Year from SideKick Solutions!

-Cecelia Schwartz

Apple to Release New macOS, Ventura

Apple is preparing to release its newest and biggest macOS to date, Ventura. The release is scheduled for Monday, October 24. In this update, Apple has redesigned, or enhanced, its core apps, such as Mail, Notes, Safari, and Messages. Additionally, users will find new content and upgrades to Gaming, System Settings, Air Pod controls, security settings, and Spotlight.

We are excited to work with this new operating system, but we want to give it a bit of time to see how it performs in a real-world environment before putting it into production on your systems. We advise waiting to install this upgrade until we can test it and prove it can work with your workflow.

For our managed service clients, we will be implementing an upgrade block on your Macs. Once we feel like the macOS is safe to install, we will reach out to you to coordinate upgrades.

If you have any questions, please reach out to us and we will assist during this macOS transition.

10.21.22