Which web browser is the safest?

Enterprise cybersecurity is a holistic system that involves employing security practices at every level of use. This includes picking out the most secure application for web browsing. Consider the security features of these popular web browsers when picking yours. Microsoft Edge Microsoft Edge, Windows’ current default browser, is an improvement over its predecessor Internet Explorer (IE). Edge was developed with Windows 10 integration and IE end-of-life in mind, resulting in a powerful and more efficient browser that has Cortana (Windows’ answer to Alexa and Siri) integration and Microsoft Store extensions. Edge’s main advantage is that it is Windows 10 computers’ native browser, which means it should integrate more seamlessly with the Windows OS ecosystem in terms of power usage and data security. Its built-in security features, called the Code Integrity Guard (CIG) and the Arbitrary Code Guard (ACG), prevent malicious codes from loading into a computer’s memory. Safari Safari is a graphical web browser developed by Apple for its iOS, iPad OS, and macOS. The current iteration is Safari 13, which was released alongside macOS Mojave and macOS High Sierra in September 2019. Safari 13 is highly secure, as it utilizes Safari 12’s baseline security features such as Automatic Strong Passwords and Intelligent Tracking Prevention 2.0. These features are augmented by a built-in password strength analyzer, FIDO02 USB security key authentication support, “Sign in with Apple” support, Apple Pay capabilities, and increased speed and encryption. Its main drawback, however, is that it is only available on Apple devices, with full capabilities found only on MacBooks and Macs. Mozilla Firefox Mozilla Firefox is a free and open-source web browser developed by the Mozilla Foundation. It is widely available across platforms, even on Unix and Unix-like operating systems such as FreeBSD, OpenBSD, illuminos, and Solaris Unix. Because of Firefox’s open-source development platform, it can be quite unsecure to use on publicly accessible computers. For personal and single-user business devices, however, Firefox is relatively safe, especially once all security features are activated and tweaked to your needs. Some key features are its “Do not track” privacy feature, phishing and malware blocking features, the Noscript Anti-XSS add-on (so you can determine which sites are allowed to execute scripts), the Noscript Anti-Clickjacking add-on (a detector that reveals invisible, malicious links and buttons), and its renowned pop-up ad blocker. Firefox is also unique in that Mozilla has a bug bounty program, which offers a financial reward to anyone who can identify gaps and holes in Firefox code, so that it can be patched and improved as urgently as possible. Mozilla also promises no legal action against anyone who complies in good faith under its Bug Bounty program, including any claim under the DMCA for circumventing technological measures. Google Chrome Google Chrome is a cross-platform web browser developed by Google. It is the default browser for Google’s line of laptops and Google Chromebooks. Chrome utilizes a process allocation model to sandbox tabs. “Sandboxing” is a security mechanism for separating running programs to keep software vulnerabilities from spreading. Chrome also regularly updates two sets of blacklists, one for phishing and one for malware, which it uses to warn users of potentially harmful sites. It also touts site isolation and predictive phishing protection features that receive regular and critical updates every six weeks and within 24 hours of a known threat, respectively. Being aware of how your web browser stacks up against its competitors is only half the battle. WannaCry spread to uninfected systems through a gap in the Windows security framework, and most other ransomware infections prey on human error. What your business needs is a comprehensive security audit. For more information, call us today. Published with permission from TechAdvisory.org. Source.
Tips and tricks for collecting customer data

Businesses have more access to customer data than ever before, and that trend will likely continue in the future. The insights you get from all that data are valuable. However, a lot of data is unnecessary or possibly even problematic. To ensure your insights are relevant and useful, you must have a well-defined data collection system in place. Before we jump into our tips for data collection, we have to address the elephant in the room: customer privacy. Despite all the recent regulatory frameworks for protecting people’s private information, there are still a number of opportunities for you to collect data without running afoul of the law. However, honesty is the best business policy. Never ask for a customer’s personal information unless you are absolutely sure that they are aware of the exchange. With that out of the way, let’s get to it! 1. Collect identifiers Whether you’re creating an online survey or a signup form, collecting identifying information (i.e. names, date of birth, age, gender, address, etc.) is crucial. This information will form the foundation for future analysis and segmentation. 2. Track customer interactions Next is to define important customer interactions. For example, if you own an online store, you need to know how your customers arrived at your site, the items they clicked on, items they added to their cart, and what they eventually purchased. Tracking each step of their journey — from learning about your business to becoming a customer — will give you insights into what your customers need and want. 3. Gather behavior-related data Don’t focus solely on customers who made a purchase. Think about what other indicators produce meaningful data. In our online store example, you might want to track how many receive your email newsletter, how many pages they visited on your site, or how much time they spent on each page. Analyzing this information will help you determine which aspects of your efforts are most effective. 4. Automate data collection When gathering customer data, you must minimize the risk of human error. The most effective strategy is to automate as much of the collection process as possible. Apps and tools such as online forms and optical character recognition systems feed information directly into your database and eliminate paper-centric processes that often lead to mistakes. 5. Integrate your systems Redundancies and errors are also common when there are multiple databases managing the same information. You can prevent these issues by working with an IT provider to integrate all your apps, databases, and software solutions. This way, data collected in one database will be synced and consistent across other platforms, reducing manual data entry. 6. Consider who will view the reports Inevitably, you’ll need to turn data into business intelligence reports. It’s a good idea to identify who will read your reports and highlight the most relevant insights. For instance, sales managers want to see quarterly sales figures, and human resources teams want to see labor costs compared to revenue. Using the right tools to generate these reports will save your team several hours of work. 7. Update data in real-time It’s difficult to imagine any company in operation today that doesn’t need up-to-the-minute data accuracy. Business intelligence dashboards collect, organize, and filter data at the click of a button. This way, you’ll never have to wait a day or more to receive information that’s critical for a company decision. Looking for technologies that can help you optimize data collection? Call our IT consultants today. We’ll recommend best-of-breed technologies that track the information you need to grow your business. Published with permission from TechAdvisory.org. Source.
Windows 10 makes backing up files easy

To any business, ransomware means trouble. From operational disruption and revenue loss to total shutdown, it spares no part of the company. That’s why it’s wise to regularly back up your business data in multiple locations, including the cloud. If your computer is running on Windows 10, you’re in luck because the operating system makes backing up and restoring your files as easy as pie. File History is back in Windows 10 Users will be glad to know that Windows brought the same functionality of File History from Windows 8 (and 8.1) to Windows 10. Apart from the slight design changes, there really isn’t much difference. Serving as the main backup utility, File History enables users to regularly schedule backing up of files on their PC and store them on an external drive. That means you can connect your PC to a network or USB drive and make backups as needed. However, be sure to regularly connect the external drive if you intend to use File History for backups. Otherwise, Windows will prompt you that your files have not been backed up every day. You can ignore this warning at your own risk. If you back up to a mapped network that is unavailable, File History will commence backup in the local disk until the network drive becomes available. Setting up File History Anyone can set up File History. After all, it was designed to make data backup and recovery easy for users. By default, File History backs up the main file folders, but you may also pick which folders you want to back up and bring in folders from other parts of the PC to do this. From the Start menu, click on Settings > Update & Security > Backup. Once in Backup, it’s time to connect an external drive. Click on Add a drive to see a list of external hard drives hooked up to your PC and choose one. When you return to the Backup section, you will see that the Add a drive option has changed to Automatically back up my files (by default). This allows backups to be created at periodic intervals, which you can set to anywhere from every 10 minutes to once a day (the default option is once every hour). You may also set how long to keep the backups (the default option is forever). Restoring files that have already been backed up is just as easy as setting up backups. Simply type “File History” in the search bar. Then, you will see the “Restore your files with File History” folder. When you select it, a new window showing the folders backed up onto your external drives will appear. Setting up OneDrive backup option If you have access to a network drive or the cloud, back up to it instead of locally. One such cloud option is OneDrive. You can prompt OneDrive to automatically back up your files. Just click on the cloud icon in the Windows notification area, then select More > Settings > Backup > Manage backup. Not only will selected folders sync in OneDrive, new and existing files will also be backed up to OneDrive, so they can be accessed on other devices in case something happens to your PC. Making system image backups A system image is an exact replica of your entire operating system, along with all the programs, settings, and files. If you created a system image backup using the Windows 7 Backup and Restore tool in Windows 7, it will still work in Windows 10. To use this feature, access the Backup and Restore (Windows 7) option from the Control Panel. Click on Create a system image, choose where to store the backup (external hard drive, network drive, or DVD), and which drives or files to back up. You will then be asked to make a system repair disc, which you can use to start a PC and restore the image backup. Never worry about losing files in Windows 10. For more tips on how to successfully backup and restore data, contact us today. Published with permission from TechAdvisory.org. Source.
5 Security issues to look out for

The security of your systems and technology is a constant battle, and one you will likely never completely win. There are significant steps you can take to secure your systems, but having knowledge about your systems is one of the most effective tools. If you know how your systems can be breached, you can ensure a higher level of caution and security. Here are five common ways business systems are breached. #1. You are tricked into installing malicious software One of the most common ways a system’s security is breached is through downloaded malware. In almost every case where malware is installed, the user was tricked into downloading it. A common trick used by hackers is planting malware in software hosted on warez and torrent websites. When users visit the site, they are informed that they need to download the software in order for the site to load properly. Once downloaded, the malware infects the system. In other cases, hackers send emails with a malware-infected attachment. There is a nearly limitless number of ways you can be tricked into downloading and installing malware. Luckily, there are steps you can take to avoid this: Never download files from an untrusted location. If you are looking at a website that is asking you to download something, make sure it’s from a company you know and trust. If you are unsure, it’s best to avoid downloading and installing the software. Always look at the name of the file before downloading. A lot of malware is often disguised with names that are similar to legitimate files, with only a slight spelling mistake or some weird wording. If you are unsure about the file, then don’t download it. Instead, contact us so we can verify its authenticity. Stay away from torrents, sites with adult content, and video streaming sites. These sites often contain malware, so avoid them altogether. Always scan a file before installing it. Use your antivirus scanner to check downloaded apps before opening them. Most scanners are equipped to do this by right-clicking the file and selecting Scan. #2. Hackers are able to modify the operating system (OS) settings Many users are logged into their computers as admins. Being an administrator allows you to change all settings, install programs, and manage other accounts. If a hacker manages to access your computer with you as the admin, they will have full access to your computer. This means they could install other malicious software, change settings, or even completely hijack the machine. The biggest worry about this, however, is if a hacker gets access to a computer used to manage the overall network. Should this happen, they could gain control of the entire network and do as they please. To avoid this, limit the administrator role only to users who need to install applications or change settings on the computer. Beyond this, installing security software like antivirus scanners and keeping them up to date, as well as conducting regular scans, will help reduce the chances of being infected, or seeing infections spread. #3. Someone physically accesses your computer These days, it seems like almost every security threat is trying to infect your IT infrastructure from the outside. However, there are many times when malware is introduced into systems, or data is stolen, because someone has physically accessed your systems. Let’s say you leave your computer unlocked when you go for lunch and someone walks up to it, plugs in a malware-infected USB drive, and physically infects your system. They could also access your system and manually reset the password, thereby locking you out and giving them access. Secure yourself by setting up a password to control access to your computer. You should also lock, turn off, or log off from your computer whenever you step away from it. Beyond that, disable drives like CD/DVD and connections like USB if you don’t use them. This will limit the chances of anyone using these removable media to infect your computer. #4. Someone from within the company infects the system We’ve seen a number of infections and security breaches that were carried out by a disgruntled employee. They could delete essential data, or remove it from the system completely. Some have even gone so far as to introduce highly destructive malware. The most effective way to prevent this, aside from ensuring your employees are happy, is to limit access to systems. Your employees don’t need access to everything, so reexamine what your employees have access to and make the necessary adjustments. For example, you may find that people in marketing have access to finance files or even admin panels. Revoke unnecessary access rights and ensure that employees only have access to the files they need. #5. Your password is compromised Your password is the main way you can verify and access your accounts and systems. The issue is, many people have weak passwords. And with the steady increase in the number of stolen user account data, it could only be a matter of time before they can crack your password and compromise your account. To add insult to injury, many people use the same password for multiple accounts, which could lead to a massive breach. Therefore, you should use strong and different passwords for your accounts. To further enhance your password security, utilize multifactor authentication (MFA), which uses more than one method of verifying a user’s identity, such as a fingerprint or a one-time code. If you are looking to learn more about securing your systems, contact us today to learn how our services can help. Published with permission from TechAdvisory.org. Source.
Verifying Android apps

Android tablets are among the most popular devices on the market today. With a wide variety of sizes and designs, users are spoiled for choice. Not only that, there are a lot of apps available on Google Play Store. Unfortunately, cybercriminals also create fake apps with malicious code — and these apps can be hard to spot. So, how can people protect themselves and make sure that their tablet is running only safe applications? Downloading from a trusted source Downloading an app from well-known and legitimate sources like Google Play Store, Samsung, or Amazon used to be a good security measure since these sites are routinely monitored and scanned for fraudulent apps. But reports of fake apps plaguing these sites have led users to reevaluate their downloading habits. Recently, Android fans were warned about six malware-filled apps on Google Play Store that have been downloaded 90 million times. One of those apps is “Followkade,” a fake Instagram likes-and-followers-boosting app, which had over 50,000 installs and a 4.0 rating from almost 7,000 reviewers. Taking more vigilant measures There are several effective ways you can take to make sure your tablet is not vulnerable to fake applications: Before downloading from a trusted source, read the small print and reviews about the application. This will help protect yourself from security risks. Enable or disable the security settings of your tablet as you see fit. The Android operating system (OS) comes with built-in features that will help detect or prevent any threats. If activated or configured properly, the OS will alert users when there is abnormal behavior from the apps installed on the device. Update your software. Some users may find this an inconvenience and forego updates when they come in. But patches from these updates can fix bugs or vulnerabilities, which can thwart cyberattacks. Use third-party antivirus software Because the market for tablets is growing, more and more companies are offering antivirus solutions. Although there are free but effective legitimate antivirus software programs, the better option is to purchase from well-established companies to get maximum protection. Third-party antivirus software may come with monthly or yearly subscriptions, as well as different premium rates for different types of security measures. But do consider the benefits versus the cost before you make any purchase. If you are looking to learn more about protecting your Android tablet, contact us today to see how we can help. Published with permission from TechAdvisory.org. Source.
3 Things to consider with virtualization

Virtualization can help boost operational efficiencies like never before, but there are a few concerns you need to address before implementing it.
Introducing macOS Catalina

With its big launch just a few days away, macOS Catalina is creating quite a buzz in the world of computing. Many Mac users can’t wait to upgrade their devices to the next-gen operating system and enjoy its exciting new features. Here are some of the things you can expect from Catalina. Before you download macOS Catalina, make sure your device meets the system requirements. Apple has said that Macs and MacBooks that could upgrade to macOS Mojave can be updated to Catalina, including: 12-inch MacBook (2015 and later) MacBook Air (2012 and later) MacBook Pro (2012 and later) Mac mini (2012 and later) iMac (2012 and later) iMac Pro (2017) Mac Pro (2013 and later) New apps for music, audio, and video One of the most conspicuous changes to Catalina is the absence of iTunes — in its place is Apple Music. It has the same interface as its predecessor and gives you access to more than 50 million songs that can be streamed or downloaded. For your podcasts and videos, there’s Apple Podcasts and Apple TV, respectively. Podcasts enables you to listen to over 750,000 free podcasts, browse episodes easily by guest or topic, and download for offline listening. Meanwhile, Apple TV offers thousands of movies to buy or rent, ranging from the latest films and TV shows to those you previously bought from iTunes. And starting November 1, you can stream or download all-original movies and series from video subscription service Apple TV+, which you can access through the Apple TV app. All-new Reminders, Notes, and Search The Reminders app has been overhauled not just for macOS but for all Apple platforms too. You can now add attachments to reminders and draft smart lists that integrate information from other lists, and tag people in reminders — and be reminded that you tagged them the next time you speak to them using the Messages app. Meanwhile, Notes lets you collaborate on a single note or several folders with your team or family members. To do this, launch Notes from your dock and open the note you’d like to share with others. In the toolbar, click Add People > Note name or Folder name. Next, choose how you’d like to share the note or folder with them (Mail, Message, etc.). Finally, the Search function now has the ability to recognize objects and text within images. Additionally, suggested searches that you can click to view make looking for items on your Mac quicker. A second monitor with Sidecar Sidecar allows you to mirror your Mac’s desktop on your iPad, effectively turning it into a second screen. This is useful when you’re working on one app but need to reference another — no more switching from tab to tab! And if you’re working on a presentation, you can preview it on your iPad while you edit on your Mac. Manage your email better Block specific senders and move their emails straight to the trash with the improved Mail app on macOS Catalina. You can also unsubscribe from email lists and mute thread notifications, allowing you to keep distractions at bay. Also, Mail’s new layout and interface gives you the option to preview a message below or to the right of the message list. Get usage reports First introduced in iOS 12, Screen Time’s real-time usage reports give you insight into how you use your Mac. iCloud keeps track of data on how long you use your Mac, what apps you use, what websites you visit most, and even what notifications you receive most often. With these data, you can monitor and block apps and websites that distract you from work and other tasks. Enhanced security Keep your Mac and its contents protected from cyber risks with the improved Gatekeeper. macOS’s security feature verifies downloaded apps before you run them, reducing the likelihood of executing malware. Another valuable security feature is Activation Lock, which ensures that only you can reactivate or wipe your device if it’s ever lost or stolen. Easy login and app installation Lastly, with macOS Catalina, you can log into accounts that need your Mac password by just double-clicking on the side button of your Apple Watch. You can also use your Apple watch to approve app installation, unlock settings, and more. These features barely scratch the surface of all that macOS Catalina has to offer. Want to learn more about how the latest OS can help improve your productivity in and out of the office? Reach out to our Mac experts today. Published with permission from TechAdvisory.org. Source.
A brief guide to keeping computers clean

A clean work PC not only encourages employees to work harder, but it also prevents glitches and downtime linked to poorly maintained hardware. Clean PCs contribute to immaculate workspaces, which can positively affect employee morale and company reputation. Here’s how to clean your computers. Cleaning desktop monitors Employees spend many hours looking at their computer monitors, and a clean monitor makes it easier for them to do their tasks. The best way to clean your monitor is to turn it off first and gently wipe the screen with a microfiber cloth. If there are still spots, try dipping the cloth in a tiny bit of water — make sure you don’t spray water onto the screen. Don’t press too hard on the screen, as this could damage your monitor’s pixels. Also, it is not a good idea to use paper products like paper towels or tissues, as they will not only leave a residue, but may also slightly scratch the monitor. Cleaning mobile screens Mobile and other touch screen devices will usually get your fingerprints all over them. The best way to clean these screens is also with a microfiber cloth. For tougher spots, dip the cloth in a small amount of water and then gently wipe the screen. Don’t splash water onto the device itself, as water could get inside, ruin internal components, and void the warranty. Some people suggest rubbing alcohol to remove fingerprints and disinfect the device. While this will be okay for some screens, many manufacturers recommend against it because the alcohol can eat away at the protective film on some devices. If you notice that there is a lot of dust or gunk on the edges of your screen, or even in cracks, you may need to take the device to a mobile shop for more thorough cleaning. Do not open the device yourself, as this could void the warranty. Cleaning your keyboard Because we use keyboards almost every day, they may get a bit grungy, with debris and dirt accumulating between the keys. Before you start cleaning, be sure to unplug the keyboard, or turn it off if it is wireless. To clean the upper parts of the keys — where your fingers strike the keys — try dipping cotton swabs into rubbing alcohol and then cleaning the keys with a gentle rub. To clean between keys, you will need compressed air, which can be purchased at most office supply and computer stores. Spraying in between keys should be enough to get rid of most of the dust and grit. Cleaning your mouse Like the keyboard, the mouse can get quite dirty with grime from your fingers and dust. To clean a mouse, unplug it first then use cotton swabs dipped in rubbing alcohol to gently clean it. There’s no need to open your mouse, as most models are designed to not be opened by users. Cleaning your laptop’s body To clean your laptop’s body, turn it off, unplug it, and clean it with cotton swabs dipped in rubbing alcohol, or Mr. Clean Magic Eraser or a similar cleaning agent. Be careful not to scratch the sensitive components of the body. Cleaning your computer tower You may also clean the desktop computer’s tower by taking a slightly damp microfiber cloth and wiping down the front and sides of the tower. However, we strongly recommend avoiding the back and certain areas of the front, as there are ports and components that could be easily damaged. As always, be sure to disconnect the power source and all wires before cleaning, as any water damage could ruin your computer. Cleaning the inside of your computer Dust will eventually get inside your computer and clog up cooling fans, causing them to stop working properly. This can potentially lead to other components overheating. The internal components of your computer are extremely fragile and need to be handled with great care. Do not take the case off of your computer, as this usually voids your warranty. For all of your computer needs, our technicians are here to help. Published with permission from TechAdvisory.org. Source.
Mobilize your VoIP

VoIP solutions are a great way to save costs and increase productivity, especially when it comes to remote and mobile workers. With business trends like Bring Your Own Device (BYOD) policies, companies using VoIP in their offices needed to expand their remote communication capabilities in order to hold their own against competitors. But they may still struggle to extend VoIP to offsite or mobile employees. To cater to your out-of-office workers, there are a variety of ways you can expand the mobility of your VoIP services. 1. Look into Unified Communications (UC) If your employees are able to bring their own personal devices to work, your IT administrators will insist that all of them comply with your company’s policies. You will need to establish good security and compliance measures in order to meet the needs of both your customers and employees. A solid solution is to look into UC, which integrates real-time communication services such as instant messaging, telephony, data sharing, and video conferencing. UC bridges the gap between VoIP and other computer-related communication technologies. It makes communication more convenient and manageable by providing a single number to reach as well as a status indicator that conveys whether employees are available or if they don’t want to be disturbed. 2. Employ easy to use apps Most top-rated business apps began as user-focused tools to help people find data more independently. Some of these apps have transformed into more customized tools focusing on specific business needs. The problem with this is that satisfying these needs often sacrifices overall usability. If your employees are struggling to use the mobile version of your VoIP solution, then they likely will dump it. This can lead to employees using unauthorized apps, which also increases security risks. To avoid this, try implementing an app or tool that is easy to use, easy to navigate, and easy to manage. Ask VoIP providers for a free demo to evaluate the intuitiveness of the software yourself. 3. Work with an experienced solution manager It can be tough to manage your VoIP solutions as you’re expanding them. That’s why it’s best to work with an IT partner like us; we have the expertise and experience to pull it off. When you outsource the management of your solution to us, we can get your apps and solution up and running, then administer them for you. 4. Cloud support Having on-premise equipment and support for your VoIP solution is a good idea. However, your existing IT team may not be ready for the challenges of providing a cloud-based mobile app or voice support. We recommend you go for a hosted VoIP solution, which delivers the same cost-effective, network-based service, but the equipment is based at a provider’s site rather than in your data center. This eliminates the cost of on-premise gear, maintenance costs, and overall management, while increasing the overall effectiveness of your mobile solution. If you need to expand your VoIP mobile capabilities to enhance your efficiency and productivity, or if you’re interested to learn more about VoIP solutions, don’t hesitate to contact us today. Published with permission from TechAdvisory.org. Source.
Site engagement: Why you should measure it

Is your site getting a large amount of traffic, but you’re not seeing a product or service sales boost? Many small business owners face this dilemma at one time or another. The fact is that a large number of visitors doesn’t necessarily translate into engaged customers. A crucial metric that you should look into is engagement. Here’s how Google Analytics can help. How do you measure engagement? Just because a page receives a large amount of traffic doesn’t mean it has quality content. Half of the visitors to your most trafficked blog post or service page can easily bounce within seconds. Find out which pages your customers like by measuring engagement. And the easiest way to do that is by looking at the amount of time a visitor spends on a page. Generally speaking, if a visitor is on a page for five minutes or more, they’re likely reading, watching, or listening to some form of content you posted. Of course, it’s also possible that they took a bathroom break after landing on your page or forgot to close it and continued surfing the web in another window. But if a consistent number of visitors are spending several minutes on a given page, it’s likely that most of them are engaging with the content. Why does engagement matter? Simple: The more your visitors engage with your content, the more likely they’ll visit your website again or — even better — become a loyal customer. You can measure engagement by following these four steps in Google Analytics: 1. Track engagement over a long period of time We’re not just talking a month or two, but years. This will show you which pages are performing best in the long run. To do this, open Google Analytics. In the top right corner of the screen, input your date range then click Apply. 2. Measure all pages You need to look at time spent on all your pages to see what’s performing best. In the navigation bar to the left of your screen, click on Behavior > Site Content > All Pages. 3. Compare the average time visitors spend on a page To do this, click on Behavior > Site Content > Content Drilldown. Under the main graph that displays visitor numbers to your site, you’ll see a search box with the word “advanced” next to it. To its right, you’ll see five buttons. Click on the second button from the right — the Comparison button. To be sure you’re clicking on the correct one, hover your mouse over it to see if the word “comparison” will pop up. Slightly below the Comparison button and to the left, choose “Average time on page” as your secondary metric. 4. Mind the green bars After you’ve followed the above steps, green bars will appear to the right of some of the pages displayed. The higher the bar, the greater amount of time a visitor is spending on a page. With this data at your disposal, you can now understand what content your customers find valuable — and then focus on enhancing or creating more of it. Want to know more about how to gain valuable insights from your business data? Give us a call today. Published with permission from TechAdvisory.org. Source.