February 2013

Hiring salespeople can be one of the toughest endeavors for IT company owners, though a necessary part of growing a business. The process of hiring and the ultimate firing of salespeople can leave owners jaded and hold them back from investing or taking a chance on future salespeople. It is important to look for certain characteristics and demands that will provide red flags as well as look for indicators that speak to a good salesperson investment.

Homegrown Salespeople

The easiest way to hire a salesperson is to promote from within. There are a number of indicators that can speak to a natural talent within your organization. You may notice a person on your team that fits certain characteristics. Sales Team

Customer-Oriented

Commanding Personality

Task Driven 

Less Detail-Oriented

These tend to be good indicators of the type of personality that fits a good salesperson. The best thing about promoting from within is that you tend to have the potential for a longer-term employee. It is important to take the proper steps to verify the chosen candidate is a good fit by utilizing several tests.

The first test is the TTI DISC Behaviors Test. DISC stands for Dominance, Influence, Steadiness and Compliance. This test will show the basic behavior types of the candidates that you choose. These behaviors are important to know as the basic fundamentals of personality come in to play when hiring the right person. An example is a person that is more dominant and influential is a better fit in a sales role than a person that is more steady and compliant.

The second test, also by TTI is the Sales Skills Index. This test, though more advanced, gives an overall indication of how a salesperson stacks up against other top performing salespeople. This should be used in scenarios where you are looking at outside candidates for the position. If you are interviewing candidates and have chosen some to move to the next stage of potential hiring, this test can weed out the ones who are truly performers, and the ones that are just good at performing in an interview.

If you find a good internal candidate, the next step is to get them trained. Start by gathering a couple books for them to read and master. Start with “The Little Red Book of Selling” by Jeffery Gitomer, “Questions Based Selling” by Thomas Freese, and just about anything by Zig Ziglar. These will be good introductions into the ins and outs of selling.

Books only go so far though and generally will not convert someone into a salesperson. For that you will need off or onsite training from a professional group, organization, or consultant. This is where the real investment comes in, but it is an absolute requirement to take an employee to the next level. These groups will help provide the basic fundamentals, deep dive into techniques, and provide role-play scenarios that can help mold a person into a sales role. Most good sales book companies have training workshops and certain IT conferences provide sales-based training at their events. The key is researching each of these, contacting peers to find success stories, and evaluating each to find the best type of training for your budget.

Another one of the tough parts for business owners is structuring a salesperson’s compensation plan. Overcomplicating a commission and compensation plan can mean lots of work for you as the owner or for accounting personnel, as well leaves lots of room for costly mistakes. Obviously each structure is based around your companies product and service set and will reflect your margins and revenues.

Most training organizations can help with compensation plans and this is another area to reach out to your peers. Look for other successful industry business owners and ask if they will share their compensation plan with you. Most non-competing business owners would be happy to share their information.

Hiring a salesperson is a difficult and time consuming endeavor but it is a necessary part of growing your business. Take the time and do it right and you will be building a foundation for a great and profitable team. Know ahead of time that there will be failures and those failures will have costs. Do not let these discourage you as it only takes one great salesperson to help springboard your revenues. Do your best to recognize talent from within your organization. Some of the best salespeople I have seen were plucked out of other roles internally, trained, and found new life long careers. Most of all don’t wait! The longer you wait to grow your business through sales, the more opportunity you are giving competitors to grow their businesses.

Frank Gurnee
VP, Channel Services, ExchangeDefender
(877) 546-0316 x4777
frank@ownwebnow.com

ExchangeDefender SPAM protection is a layered process that includes many components which together determine if a message is SPAM or not. While there are too many layers to list and the combination of what we use changes on an hourly basis, we wanted to share some detail of how our process works so you can understand it and explain it if necessary.

RBL – We use several free, commercial and our proprietary realtime blacklists that contain IP addresses of known spammers. These IP addresses typically belong to dialup, cable and DSL/fiber client addresses that shouldn’t be running a mail server, compromised/infected mail servers, unused IP ranges, compromised workstations and devices. These IP addresses account for a bulk of all SPAM mail and most of them will never even make it inside of the ExchangeDefender network.

Reputation blacklist – We use commercial and our proprietary reputation blacklists that indicate how trustworthy the IP address is – have they sent us a lot of SPAM in the past? Are they suddenly sending us hundreds of thousands of messages if they only accounted for 10 in the past month? Do they have legitimate DNS, reverse DNS.

URL blacklist – We use several commercial and our proprietary URL blacklists that identify web site addresses used in previously confirmed SPAM. If you’ve ever received a SPAM message you know that it had an external image or a link to a web site: we look at all web site links in an email and compare it to a list of known SPAM site targets.

Distributed checksums – We use several commercial and proprietary statistics models (warehouses) to determine the likelyhood of bulk mail. Because the only way spammers can distribute mail efficiently is through massive blasts, nearly all message bodies are identical. Each message has a unique signature (an MD5 checksum) that can be compared with other messages and when identical checksums are found it’s more likely that bulk mail is being sent.

Proprietary header checks – We use proprietary header and message checks to determine if the message is a part of an existing conversation between a third party and our own client. We also check if messages have been spoofed or if they have made their way through several gateways, if the language in the message does not match the language of the machine it was sent from, etc.

SPAM keyword and heuristic checks – We use a wide array of SPAM characteristic checks that take into the account the size of the message, subjects, fonts and images. For example, legitimate email typically doesn’t come without a subject or a subject that contains a lot of special characters, it doesn’t come without a persons name in the From line or other “weird stuff”. The “weird stuff” category is so wide and so contextual that it takes most of the time to process.

Now that you are familiar with some of our processes you’re probably getting the idea that SPAM filtering is very similar to the way virus scanning works – we use patterns from known SPAM messages and existing spammers to build a statistical model that tells us if a message is SPAM or not. It also explains why certain messages are delivered instantly while others may take up to a minute or longer to process (delayed header checks, suspicious web site in the email, conversation thread checks, temporary DNS failures or large attachments that require scanning)

cs_1_big

We build most of our proprietary infrastructure based on your feedback – we look at the pattern of messages that you release which builds a model that adjusts scores along the way specifically for you – if you release a TON of messages with impotency drugs you are more likely to receive a Viagra message than another user that only releases financial newsletters. This is why your feedback through ExchangeDefender Outlook Addin is so valuable to us. When you hit “Report SPAM” that message is dispatched to us and reviewed by a live human being that generates a scan rule to eliminate that specific message in the future.

ExchangeDefender SPAM engine uses third party scanning engines with realtime data feeds and our own proprietary engine is updated hourly.

That may seem excessive but keep in mind that spammers adapt their message content for each batch – adding a different subject, different web site, different spacing and subjects every few thousand messages. In order for us to keep up the need for both the realtime update and constant reengineering of the SPAM engine itself is cruical to eliminating as much of the annoyance as possible.

How come SPAM messages slip through?

There is no such thing as a “slip through” when it comes to SPAM, all mail that is not sent by a sender on an RBL that passes our virus scanning is considered legitimate until proven otherwise. Tens of thousands of checks later (within a split second) calculate a score that identifies if message is SPAM (90% confidence) or SureSPAM (99.9%). There is no person on the gateway reading each message, the score is assigned by the computer based on the statistical model – so even if you looked at the message and could clearly tell it’s SPAM, the artificial intelligence is not quite there yet.

How come legitimate messages end up in SPAM quarantines?

Bad scanning methodology. For example, say you’re receiving a lot of “lotto” SPAM. Someone at ExchangeDefender may adjust your model to get really aggressive when it encounters the word “lotto” in the subject or headers. It works flawlessly, until you are sent a message by your business partner and the message is also copied to Lisa Lotto. This is clearly an oversimplification but it happens.

How come updates happen every hour and why does it take so long sometimes to make changes?

Most of the implied delay is due to the size and the scope of the ExchangeDefender network – to protect millions of people we have a very large network and very sophisticated layered infrastructure. Smaller updates are done very frequently (within an hour) but are staggered (happening at the different minute of the hour) because during engine reloads individual nodes cannot process inbound mail. If we restarted the engine on every node at the exact same time we’d basically shut the network down for a few seconds every hour.

Some large-scale changes (when we add a plugin or change our model analysis or whitelists or blacklists or new detection procedures) can take on the order of weeks or months. Typically we don’t deploy new software across the whole network – it is done in stages to eliminate anomalies in the deployment. Working with large scale distributed systems is different than managing individual servers, clusters or even networks: Changes to a globally distributed network with linked load balancers (while great for redundancy and service availability) is a challenge that requires careful monitoring and rollout procedures to minimize destabilization across the whole network.

We get hack attempts and DDoS attacks thousands of times an hour – the systems have an automated process for dealing with that activity – so when we roll out new software that makes the network overload quickly (and make it think it’s under attack) we have a big mess on our hands. This is why the rollouts are staggered and have a procedure that is at times excruciatingly long (especially if you’re sitting in the NOC watching the queues and your blood pressure goes up with every uptick in the percent utilization)

How come whitelists don’t always work and I have to whitelist the whole domain?

This is an inconsistent behavior that is reported from time to time and it has to do with the senders email address and client software. ExchangeDefender looks at the From line (the same one you see in Outlook) and whitelists only the senders actual address. This works 99.9999% of the time.

Some senders use impersonalization or sending on behalf of a different email address or use specific taglines in the From address that end up being randomly generated for each email. While Outlook may see message from Vlad Mazek <vlad@ownwebnow.com> the message itself may have come From: vlad+2381ekr259@ownwebnow.com with a fingerprint used to track read receipts.

Long story short, if you have a person that is using these systems or CRM to alter the message for tracking/sales/marketing purposes, you can’t trust their From line for a whitelist, you will have to whitelist their whole domain. Good news is, this is typical for smaller domains and you’ll never be whitelisting all of @aol.com or @gmail.com

How come there are delivery delays?

Our support team can help you with that.

Half the time the issue is related to the DNS and the other half is due to the temporary network or Exchange issues on the client side. Almost all of the tests we have done for our clients fall into these two categories and almost all of the things you can do to minimize delays are outlined in our deployment guide.

In the event that the issue is our fault due to network congestion, filter failure, virus scanner malfunction, DDoS, routing issue, misconfiguration, etc – the issue is noted at http://www.exchangedefender.com/noc – please subscribe to the feed or @xdnoc or post your cell phone in our portal – we text, tweet, blog and (everything except email, for obvious reasons) notify you of any ongoing network issue that might impact service.

So much for tech..

Technology is only a piece of the whole puzzle.

This is going to sound cliché but I absolutely mean it 100%: At ExchangeDefender killing SPAM is our passion. Every piece of junk that passes through our network is unwelcome and we have people here around the clock working on eliminating it from making it’s way to your inbox. It’s a human process and it’s a technology process and the very practical implementation of artificial intelligence that learns and adapts in realtime to fight with SPAM. But just like training a dog takes time, training a computer is a challenge that requires consistency and strict implementation of the process, rules, management and monitoring. With millions and millions of messages passing through our gateways, even a slight insignificant modification can impact SPAM statistics models. It’s not something that’s “broken” that could be “fixed”, it’s just a process of continuous training that we take very seriously and enjoy very much.

Thank you for your business.

Sincerly,
Vlad Mazek, MCSE
CEO, Own Web Now Corp
vlad@ownwebnow.com

workflow-1The majority of my job is talking with partners and I do that everyday. Some, I talk with multiple times a week. Suffice to say, I have come to know a lot about your businesses and how they operate. With that said, this may sound familiar to you.

You are not operating your business correctly.

By that, I mean you have no workflow established. Many of you provide your clients with multiple ways of contacting you directly anytime they wish—this includes calling your cell phone and home phone! While I can go into a list of reasons why that is wrong on so many levels, let us just stay on point for a moment.

Let’s talk about your Support Department for a moment. Say as an example, Client A calls you with a email problem in the middle of you working on Client B’s issue. You take the call, confirm that they cannot send or receive email, and tell them you will handle it as soon as possible. After Client B’s issue takes longer than expected, Client C sends you an email stating they need to set up an appointment for you to address BSoD error on their Accountant’s workstation. After reading Client C’s email, you immediately receive a call from Client B stating that the malware you thought you just removed from their workstation has returned and they can not access network resources, including the Internet. I am writing this and I am already confused!

All the while, you are subscribed to the “simplest and most effective IT Management Platform and customer relationship management system—unifying support, services, management, reporting, accounting, and sales activity under a completely free branded experience.” Shameless plug, I know. Smile

What is my point? Create a proper workflow for your support department. In fact, create workflows for all your departments within your business. I don’t care if you are a one-person shop either. If you have not clued in yet, your company (however small or big) still has the same major keystone that every business is comprised of: Marketing, Sales, Service/Support, Accounting, and Human Resources.

Creating workflows allows your departments to run efficiently. More importantly, share these workflows with your clients. After all, you have no right to complain if you have not established a set of rules for them to follow.

Michael D. Alligood
Partner Sales & Support, ExchangeDefender & Shockey Monkey
michael@ownwebnow.com
(877) 546-0316 x707

Happy Valentine’s Day to everyone! Don’t forget to take advantage of our Valentine’s Day promotion this month!

Please take advantage of this promotion because Hosted Exchange pricing will be going up when we make the switch to Exchange 2013. The promotion will be valid on any new account signed up within the promotional period. The promotional period for this promotion will be February 1st – February 28th. So don’t hesitate! Simply use the coupon code that received in the mail or write me an email at stephanie@ownwebnow.com to receive the code. If you have any questions just let us know!

Stephanie Hasenour
VP Marketing, ExchangeDefender
stephanie@ownwebnow.com

629565_timber_and_chiselSometimes IT companies can get caught up in all of the technology on the market. This latest solution, that latest service, this up and coming trend, and that gotta have device. Though diversifying your solution stack and providing many solutions appears to be the wave of the future, it is still in the best interest of IT providers to carve out a specific niche.

A niche or expertise in a specific solution, product, or vertical can help to provide an edge over competition and create demand for your company. True IT generalists may have a harder time finding prospects and clients that just need general work. This is where a niche comes into play.

Finding a niche can be as easy as doing what comes naturally. If you are naturally good at a specific piece of software, device, or service it is easy to transition to an expert status and exploit that expertise.

If there is a vertical that you have gained trust in, utilize that niche to drive more customers to your business. The key is in marketing your specific niche. Find the need, and market to that segment. As you gain customers looking for your specific expertise, ask them where they would advertise or who they would get involved with. It is easiest to find someone in the know and get information from them to formulate a good marketing strategy.

As you build your client base, make sure to get testimonials about the specific expertise you are building. This will add to the trust factor and help you to gain a reputation for your particular niche.

Building a niche can be an easy endeavor if you have a place to start. If you don’t have a specific function that stands out, look at your previous clients and find something that has interested you in the past. Find something that you can become passionate about and build your expertise around that.

Frank Gurnee
VP, Channel Services, ExchangeDefender
(877) 546-0316 x4777
frank@ownwebnow.com

billable_app_icon_128As many of our partners may have noticed, there have been some recent changes to the normal ExchangeDefender billing system. This month was the first month we ran billing through the new system and some things were a little different. For one, you will now receive a receipt confirmation of the charge that has been processed. We did experience some issues with invoices going out, but we have resolved that and everyone will receive their invoice for March as usual on the first. So moving forward, beginning in March, you will receive two emails, one being the invoice and the other, the receipt of a successful charge.

The invoices may always be accessed from the support portal and now you can choose to view the invoice, or print the invoice. We have also changed the way that ExchangeDefender accounts are listed on the invoices. Previously, the domain would be listed and the price per account. We have now changed it so that it lists the domain name, the number of accounts, and the price per user. Lastly, when you click on the Invoice tab in the portal, you will see a status beside the invoice. The status will either be, paid, past due, or processing. If the invoice is listed as processing, please give us a call because there may be an issue with your account.

If you have any questions, please feel free to contact the Billing Department directly at: 877-546-0316 x 739.

-ExchangeDefender Billing Department

There are many industry awards throughout the year for IT Solution Providers to get involved with. Some IT Solution Providers may look at awards as pretentious or self-promoting, but the reality is awards can help to drive a business to the next level.

There are several ways awards help business growth.

Recognition

Awards can help bring a spotlight on an IT company. With recognition comes easier access to vendors, media outlets, and distributors. Recognition can also lead to event participation, speaking engagements, and even lead to being recognized as an industry expert.

Validation

Industry awards can help validate or give credibility to IT companies. By listing industry awards on materials and the company website, potential customers are able to easily see involvement and participation, providing them with more information to make an easier decision.

Promotion

Awards provide an easy outlet for promoting the company. It is easy to get local or national attention through industry awards. Press releases are a good way to promote through the web and many local newspapers and TV stations will jump at the chance to run a local interest story.

Receiving industry awards can easily boost company moral and can spark new interest from customers.

600px- LC CCA LogoAward season is currently underway and there are many awards for IT companies to seek out. One to check out is the Looks Cloudy Channel Choice Awards. Nominations are open until February 28th, 2013 and the award provides a great opportunity for IT industry personnel to get involved.

Most industry awards have an easy nomination process and taking the time to get involved can really pay off in the end…

Frank Gurnee
VP, Channel Services, ExchangeDefender
(877) 546-0316 x4777
frank@ownwebnow.com

tin-can-telephoneI am going to forgo my normal blog post today and talk about an article I read recently. Over the weekend while cleaning up my office, I was thumbing thru last year’s magazines and came across an article titled, “The Importance of Face-to-Face Communication at Work” by Chuck Martin. Mr. Martin cited a survey that shows “67% of senior executives and managers say their organization would be more productive if their superiors communicated more often by personal discussion.” With the advent of technology in the work place, email has proven to be the leader in communication.

However, further reading uncovered that many respondents to the survey stated that, “Personal discussion is the foundation of communication.” While Mr. Martin states that the majority of business leaders say their organization would be more productive with more personal discussion, most slip back into the easy, and sometimes impersonal, technology communication such as email, instant messaging, and texting. The article did then go on to state that technology communication is not all evil – it just has a place. It explained that if personal discussion is not warranted, then electronic forms of communication can be used as a choice. The article closes with stating that in the long-term, face-to-face communication assures a clear and concise message coming across.

While sitting at my desk, reading this article, I personally think this article deals straight to the point of what I believe is lacking in small to medium businesses today: Proper Communication. I also think that it is up to upper management to establish proper forms of communication within their organization and to make sure that their employees know these acceptable forms. Every organization should have an outlet for both managers and employees to engage in open and honest face-to-face communication. And while the article primarily discusses the communication relationship between management and the employees; it is important to expand this further into the role of partner and client.

Technological communication such as email, IMs, and texting all require that the technology is working properly when you press the send button. However, this is not always the case. And many people shirk situations when they have to talk to another person directly. This is because they have lost their basic communication skills. I am not saying we should frown upon using technology as a form of communication. What I am stating, or rather agreeing with, is the premise of this article: Know when to use technological communication and know when to use face-to-face communication to mutually benefit both parties. 

Michael D. Alligood
Partner Sales & Support, ExchangeDefender & Shockey Monkey
michael@ownwebnow.com
(877) 546-0316 x707