SMART Blog

Smart Services has been providing independent agents with proactive, fast, and expert technology services since 1991.

A Social Media Strategy Helps Businesses Start the Conversation

A Social Media Strategy Helps Businesses Start the Conversation

Building a social media strategy can be somewhat troublesome for the modern business. Not only do you not know how it can affect your organization, you also know that your competitors are likely using it. To this end, we’ll go over how your organization’s social media practices can influence success.

0 Comments
Continue reading

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Have you ever received Facebook requests from people you don’t know? While it might be tempting to give them the benefit of the doubt -- after all, maybe they know a friend of yours -- it’s best to keep strangers off of your page when you can. In order to give your page the flexibility to accept friend requests from people you may know and protect it from strangers, you can implement a “follow” feature, and limit who can send you friend requests.

0 Comments
Continue reading

Tip of the Week: 4 Ways to Get a Handle on Social Media in the Workplace

Tip of the Week: 4 Ways to Get a Handle on Social Media in the Workplace

Social media may be a great way to connect with other professionals and communicate with your friends, but it can be dangerous if you have poor posting habits. Before you share something, think twice about whether it contains any sensitive information that could be risky to yourself and your business.

0 Comments
Continue reading

Twitter Can Be a Valuable Business Asset

b2ap3_thumbnail_twittastic_400.jpgDespite the fact that 255 million people use Twitter, some businesses want nothing to do with it. They see it as little more than a waste of time. However, these anti-Twitter activists fail to realize that the social media outlet has an unmistakably large influence in the marketing industry. Unlike Facebook, Twitter gives you the opportunity to customize your audience to suit the precise needs of your business, and the best part of this is that it’s completely free.

Continue reading

Quit Avoiding Proven Technologies!

b2ap3_thumbnail_solutions_for_business_400.jpgIt's the nature of technology to take a while for the market to fully appreciate it. After it's released, there's an implementation phase where the benefits are weighed against the risks. This phase is usually a slow one, but if the technology is good, then its acceptance will be widespread and businesses will have to give excuses on why they're not using it.

Recent comment in this post
Spencer Barkly
Technology is need of our time and without them to work is impossible. We should use them for our benefit and should not negate th... Read More
Wednesday, 23 November 2016 18:44
1 Comment
Continue reading

Are You or Your Team a Security Threat to Your Business?

b2ap3_thumbnail_manage_your_risk_400.jpgData security should be a top priority for every business. Having good security means identifying risks. Surprisingly, some of the biggest data risks come from within. If employees aren't following your organization's data management policies, then they're your biggest threats.

0 Comments
Continue reading

4,238,983 Records Compromised So Far in 2014… and Counting

b2ap3_thumbnail_tally_it_400.jpg2014 has been a year of technological advancement, but with any kind of advances such as these, there will always be those who want to steal the work of others. According to the Identity Theft Resource Center and , as of March this year, there have been 204 instances of data breaches this year alone. These affected companies are perfect examples of why web protection is important. SMART Services can provide you with this protection and peace of mind. Here are a few of the more unbelievable breaches, most of which could have been easily avoided.

0 Comments
Continue reading

Gearing Up for the MAIA's 19th Annual Convention


The Michigan Association of Insurance Agents' 19th Annual Convention is right around the corner and will take place February 23-25, 2010 at the Amway Grand Plaza in Grand Rapids. This conference is the largest annual gathering of insurance professionals in Michigan.

Jerry Fetty (SMART I.T. Services) and Wayne Joubert (MAIA) will be presenting The Benefits and Pitfalls of Using Social Media at Your Agency on Tuesday, February 23rd at 1:30 pm. You will see examples of how some agencies are using social media to extend customer service and build relationships. The session will also explore some of the pitfalls and how to make sure social media tools are used appropriately.

You can view all of the other great convention topics and get more information here.

Be sure to drop by our booth #41 and find out about our technology services and solutions that can save your agency money, increase employee productivity, and reduce risk.
 
0 Comments
Continue reading

GLAD 2009 Recap


0 Comments
Continue reading

Great Lakes Automation Day (GLAD) 2009


The Michigan Association of Insurance Agents will be holding its annual Great Lakes Automation Day (GLAD) event on November 6, 2009 at the Kellogg Center in East Lansing, Michigan. The theme for this year's event is "Agencies in the Age of Social Media."

Do you think social media is just a fad? Come find out what the experts think about its potential benefits and the best practices to utilizing it at your insurance agency.

Speakers for GLAD 2009 include Bryant Caudill of SMART I.T. Services, Steve Anderson, and Angelyn Treautel of the IIABA's Agents Council for Technology.

Don't miss out on this great event! Visit http://www.michagent.org/more information and to register.

 
0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Mobile Office Phishing Gmail IT Technicians HaaS Virus Testing Windows Mobility Health Compliance Data Loss CrashOverride Telephony FAQ Charger Text Messaging Kleinschmidt Insurance Net Neutrality Uninterrupted Power Supply Operating System Excel Ciminal iOS Administrator iPad Networking Saving Money Flexibility Co-managed IT User Error Programming Jerry Fetty Office Customer Service VoIP Backup Hard Disk Drive malware Wasting Money Inbound Marketing HIPAA Scott White Intranet Scam MySalesResults Google Assistant Router Avoiding Downtime Cybercrime Save Time Innovation Computer Forensics Training Vulnerability Redundancy Office Tips Automobile Twitter Domains IT consulting MAIA BDR Mircrosoft Windows Ink Unsupported Software IT Support Employer-Employee Relationship Laptop Legislation Retail IT Budget Microsoft Windows 7 Buisness Marketing Regulation Encryption Office 365 Keyboard Shortcuts Wayne Joubert ebay agency automation Android Humor WannaCry Websites Workers Work Station Reliable Computing Blogging Media Consumption Monitoring Microsoft Office Audit Gamification Employee-Employer Relationship Personal Information IT Management Network Trending Remote Monitoring Near Field Communication GLAD Taxes Cybersecurity Meetings Transportation Managed IT Service Cost Management Evernote Unified Communications Government DocStar Analytics Students Electronic Medical Records Apple Mobile Computing Memory Alert Remote Workers Printer Settings Smartphone Security Cameras Mobile Devices Save Money WPA3 Data Identity Advertising Customer Relationship Management Cloud E-Commerce Disaster PowerPoint Internet webinar Display Employees Mouse Search Presentation Data Security Microsoft Office 2010 Technology Patch Management Black Market ISP Running Cable Co-Managed Services Chevy HHR Amazon Identity Theft Google Maps Lithium-ion battery Politics Workplace Tips IT Solutions Quick Tips Nanotechnology Peripheral Sports Licensing Users Operating Sysytem Collaboration Supercomputer Consultant App Access Budget Productivity Tablets Financial Managed Service Provider Debate Smart Technology Solid State Drive Ransomware Business Management Help Desk Keyboard Backup and Disaster Recovery Files Hard Drives Payroll Device Security Microsoft Excel Hosted Solutions BYOD Wearable Technology Phishing Scam Touchpad Law Enforcement Bring Your Own Device Distributed Denial of Service Google Instant Messaging Firewall Business Continuity Chrome Hiring/Firing Best Practices Password Teamwork Business Computing Wasting Time Vendor Management Hosted Solution How To Saving Time Virtualization Conferencing Word Fun DDoS Mobile Security Applications Email Remote Computing Unified Threat Management Chromecast Work/Life Balance Doug Vanni Proactive website Biometrics File Sharing Applied TAM Wi-Fi Chromebook Managed IT Services automation Security Phone System IoT Take Your Agency to the Next Level End of Support SharePoint eWaste iPhone Data Privacy Risk Management Jessica Stevenson Television Root Cause Analysis Internet Exlporer Mobile Device Telephone Going Green Spyware SMARTweb Defense Scalability Upgrade Information Social Networking Sales Back Up PDF Paperless Office lunch and learn Emergency Regulations Managed IT Services Computing Internet of Things SaaS Surge Protector Bloatware WIndows Server 2008 Network Security Recovery Wireless Reputation Wireless Technology Specifications Facebook data backups e-waste Hardware Data Protection Video Games Data Theft Smart Tech Printing The Internet of Things Language Computers Social Engineering Windows 10 Bryant Caudill Wireless Internet Cast VPN App store HITECH Act Cleaning Camera Alexa for Business Hybrid Cloud Wireless Charging Comparison Upgrades Steve Anderson Branding IIAI Benefits Windows 10s Fax Server Ubuntu Best Available Web Design OneNote Network Congestion Printers USB Hacking Nokia Private Cloud History Gifts Data Breach Administration Shortcut Wiring social media communications Bluetooth Travel Webinar Current Events IT Support Employer Employee Relationship Apps Data Storage Break/Fix Video Surveillance Social Tech Term Virtual Private Network IT Service Antivirus Data Backup Passwords WiFi Music Downtime Computer Fan Virtual Reality SMB Outlook Managed IT Analysis Maintenance Books Best Practice Tutorial Server Financial Technology Artificial Intelligence Update Small Business Smartphones Storage Entertainment Employee Hyperlink Telephone Systems Medical IT Software Windows 8 Content Filtering Identities Samsung Managed Service Extreme Technology Makeover robot Holiday Admin Business Intelligence Gadgets Windows 7 Microsoft Outlook Computer IT solutions Tablet Adobe User Tips Education Devices Microblogging Sync Colocation Windows 10 Money IT Services Project Management Lifestyle Edge Prodcutivity Science Experience 5G Mobile 3D Printing HBO Cloud Computing Tip of the Week Access Control Dark Web Voice over Internet Protocol Efficiency Payment Cards Cortana Projects Microsoft Word NFL Battery Data Recovery Screen Mirroring Backkup hacker Computer Accessories Utility Computing User Blockchain Outsourced IT video MSP Professional Services hackers Worker Commute Management Document Management Bandwidth Hetrick and Associates Tech Tip Credit Cards Microsoft Outlook 2007 Computer repair Big Data SMART Services Congratulations Virtual Assistant Shadow IT OneDrive Commerce Google Drive Gift Giving Safety Printer Server Hard Drive Legal Point of Sale File Storage Updates Business Technology email encryption Disaster Recovery Emails Information Technology Streaming Media Microsoft Human Resources Cameras Connectivity IT Consultant insurance Communication Content Filter Browser spam Miscellaneous Youtube Productivity Fraud Two-factor Authentication Thank You Managing Stress Company Culture Business Vendor Application Google Docs Proactive IT Data Management WIndows 7 Tech Support press release holidays Touchscreen Value Avoid Downtime Computer Care Software as a Service Accessory Online Currency Machine Learning In the News Images Privacy Virtual Desktop Mobile Device Management Augmented Reality

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *