RSS Feed
Latest Updates
Labor Day Holiday
Posted by Marnie Ochs-Raleigh on 29 August 2014 02:16 PM

In observance of Labor Day, Evolve Systems corporate office will be closed

Monday, September 1st, 2014.

Business will resume on Tuesday at 8:00 a.m. CST.  Should you have any questions, contact your sales representative or email:  [email protected]


Tickets submitted in the helpdesk will be reviewed for any emergencies over the long weekend.


We wish you a safe and happy holiday!

Read more »

Independance Day
Posted by Marnie Ochs-Raleigh on 02 July 2014 03:51 PM


In observance of Independence Day, Evolve Systems corporate office will be closed 
Friday, July 4, 2014.

Business will resume on Monday, July 7 at 8:00 a.m. Central as normal. Should you have any questions, contact your sales representative or email [email protected].  Tickets submitted in the helpdesk will be reviewed for an emergencies over the long weekend.

We wish you a safe and happy holiday!



Read more »


Keeping these activities separate will help to keep your focus, perspective and save time.

The posting part is relatively easy

Create goals that include the platforms you are using, the minimum number of posts per week and content you are going to post.

Where things can quickly get to be a big time suck is when you try to post, monitor and assess everytime you are in an account.  We recommend that you post 3 days per week one week and 2 days the next.  Use a tool like HootSuite to schedule posts to made during the days you are not scheduled to be posting activity.

Use the opposite days of the week to do only monitoring and maintenance activity and leave assessment for one day at month's end.

1-2 hours per day for 4 social media platforms should keep you connected to your audience and followers.

Here are the activities we recommend for the monitoring/maintenance days:

6 Steps to Monitor your Social Media Daily

1) Check Twitter for mentions, hashtags about your company ( 10 minutes ): Use tools like TweetDeckor Twitter Searchto monitor conversations about your company in real-time.  Make a tweet and schedule 2-4 more on Hootsuite.  Follow 3 new accounts, engage with 3 accounts and consider dumping 3 inactive posters.

2) Scan Google Alerts ( 1.5 minutes ): Check Google Alertsfor your company name, products, executives or brand terms. To set this up, enter your search terms in a Google Alert and select to receive updates as they happen or once daily.   

3) Check Google+ ( 10 minutes ): Check out your posts or new discussions. Make a post and create one for the company page too.

4) Check Facebook stats ( 10 minutes ): Visit your Company Page'sFacebook Insights. This can be found under the page's main photo if you are an admin for your page. Scan your active users and interaction stats. Check out your wall posts or new discussions. Make a post and schedule 2-4 more for the day.

5) Answer Industry-related LinkedIn questions ( 5 minutes ): Search for questionson LinkedIn that you or members of your company can answer. You can set up an RSS feed for specific question categories to go to your Google Reader as well. When you find a relevant question, respond and include a link to your website or a relevant blog post that might be helpful to your audience.   Create a post for your company LinkedIn page.

6 Use a RSS Reader to check feeds that are relevant ( 2.5 minutes ): Feedly, NewsBlur and Digg are just some examples.  Also set up RSS feeds for searches on your company name and industry terms in other social media sites. Similar to monitoring LinkedIn and Twitter, your Reader will serve as a great place to centralize your other searches too!

Tools that will help:  Message Matrix, Content Matrix, Blog Tag and Category Matrix, Master Credential List for Passwords.


Oh, there is one more thing, a big mistake can be to ignore social media.  Social media is an important tool for encouraging engagement, building trust and creating lasting relationships with prospects and customers.

Are you following us on social media?  We have lots of tips, news and important information.  We would like to follow you - please Link, Like and Follow and we will do the same.





Evolve Blog:




Read more »

Internet Explorer Browser Vulnerability
Posted by Cheri Marchio on 30 April 2014 10:26 AM

Avoid Using IE as a Browser Until Patch is Available

Microsoft recently announced a vulnerability affecting nearly all versions of Internet Explorer (IE).  The vulnerability permits plugins such as Flash to unexpectedly run commands on your local machine when it visits a malicious site.  This kind of vulnerability could lead to the takeover of affected computer systems.  Exploits have already been observed by researchers on the public Internet.

Microsoft has acknowledged the issue, but has not yet released a security update to IE for this vulnerability. When Microsoft makes an update available, Atomic Data engineers will review the details and update you with relevant remediation steps.  Adobe has released an update for Flash, which should be installed as soon as possible.  However, many plugins besides Flash are capable of exploiting the IE vulnerability.

Until Microsoft completely resolves the issue with Internet Explorer, it is recommended:

       1.Practice safe browsing:
               only visit sites you trust
               do not click on links in e-mails
       2.Use Chrome or Firefox instead of IE as your preferred or default browser.
       3.Disable Flash, if possible, if your Flash cannot be updated on your system.
For assistance with implementing any configuration changes, contact your IT staff.  


Microsoft’s Security Advisory on this issue is available here:


Read more »

Homeland Security: Don't use Internet Explorer
Posted by Marnie Ochs-Raleigh on 29 April 2014 08:16 AM

A branch of the US Department of Homeland Security is telling Americans to stop using Internet Explorer due to a vulnerability that allows hackers to remotely execute codes on victim's computers as they surf the web.

The United States Computer Emergency Readiness Team (CERT) warns that all versions of Internet Explorer -- from 6 to 10 -- can be affected, although those responsible appear to be currently targeting IE9 and IE10, according to FireEye Research Labs, the California-based Internet security software company that first exposed the vulnerability.

Computer security experts warn that no fix has been found, and they urge people to avoid using Internet Explorer until the security is sound.


Over the weekend, Microsoft acknowledged "limited, targeted attacks" that exploited a vulnerability in the browser in order to remotely run code through a user's browser, forcing the user to view a website crafted by the attacker instead.

FROM MICROSOFT: Vulnerability in Internet Explorer could allow remote code execution

Rather than targeting a specific victim one by one, the hackers inject code into a website a victim may visit. That code then infects the victim's computer.

According to FireEye, the exploit takes advantage of a previously unknown "use-after-free" vulnerability and a well-known Adobe Flash exploitation technique to circumvent Windows security protections.


No practical solution has been identified yet, but the Microsoft Enhanced Mitigation Experience Toolkit can help prevent the vulnerability from being exploited; however, older versions of Windows -- including Windows XP and Windows Server 2003 -- won't be protected in the same way more modern versions will.

Although the bug does not compromise the security of Adobe Flash, FireEye said the attack cannot work without it and said users can disable the Flash plug-in within IE to protect themselves; however, that will render many popular websites unusable.

Read more »

Help Desk Software by Kayako Fusion