Skip to main content
All Posts By

Jason

Trucell Announced as Preferred Reseller of LG Diagnostic Displays in Australia

By Diagnostic Monitors, Healthcare & Medical No Comments

Trucell Pty Ltd, a leading provider of medical imaging solutions in Australia, is proud to announce that it has been selected by LG Electronics as one of its two preferred resellers for LG Diagnostic Displays in Australia. This partnership underscores Trucell’s commitment to providing the highest quality medical imaging technology to healthcare providers across the country.

LG Electronics, a global leader in electronics and technology, has recognised Trucell’s dedication to excellence and customer service in the medical imaging sector. This partnership will allow Trucell to offer LG’s state-of-the-art diagnostic displays, known for their exceptional clarity, precision, and reliability, to a wider range of healthcare providers.

LG Diagnostic Displays are designed to meet the demanding needs of today’s healthcare industry. They offer superior image quality, ensuring accurate diagnoses and patient treatment. With this partnership, Trucell will be able to provide these cutting-edge displays to hospitals, clinics, and medical centres across Australia.

About Trucell Pty Ltd

Trucell is a leading provider of medical imaging solutions in Australia. With a focus on innovation and customer service, Trucell offers a wide range of products and services designed to meet the needs of healthcare providers. Trucell is committed to providing the highest quality technology to help healthcare providers deliver the best possible patient care.

About LG Electronics, Inc.

LG Electronics, Inc. is a global leader in technology and consumer electronics. LG’s vision is to deliver innovative digital products and services that make life better, easier and more comfortable for consumers. The company is known for its high-quality products, innovative technology, and commitment to social responsibility.

View our range of monitors.

For more information, please visit www.trucell.com.au and select contact us.

Trucell Joins HP Amplify Program to Drive Partner Growth and Deliver Exceptional Customer Experiences

By HP No Comments
HP Amplify Membership Certificate

We are pleased to announce that Trucell has joined the HP Amplify Program as a member, part of a unique global channel partner program designed to foster dynamic partner growth and deliver a consistent end-customer experience. . HP Amplify provides partners like Trucell with the insight, skills and collaboration tools to drive growth and thrive in today’s competitive marketplace.


At Trucell, we strive to provide superior services and solutions to our customers, and your membership in HP Amplify is a testament to that goal. By joining the program, you will enjoy many benefits and connect with your customers on a deeper level.

One of the key benefits of being a member of HP Amplify is access to HP’s extensive resources and expertise. This program provides insights and analysis that enable us to better understand our clients’ needs and preferences and provide customized solutions that meet their evolving requirements. HP Amplify’s collaboration tools also allow you to connect with others, share best practices, and collaborate on innovative ideas that drive business growth.

In addition to these benefits, HP Amplify also offers a strong go-to-market, making it easier for you to connect with your customers and deliver the solutions they need. This means we can be more flexible to meet our customers’ needs and offer superior service that sets us apart from our competitors.
We are excited about this new partnership with HP Amplify and believe it will bring even greater value to our customers. As we continue to reinvent the way we do business, we strive to provide innovative solutions that meet our customers’ evolving needs.

In summary, Trucell joining her HP Amplify program is an exciting development that reflects our commitment to driving partner growth and delivering a superior customer experience. We are delighted to be part of this innovative program and look forward to working with others to drive business growth and success.

Ensuring Accurate Medical Image Representation And Patient Safety

By Diagnostic Monitors, Radiology No Comments

DICOM Compliance: Monitoring the Monitors

DICOM compliance for diagnostic monitors is often overlooked until something goes wrong. Regular DICOM compliance testing is of utmost importance to ensure that medical imaging displays deliver high-quality results with accurate diagnoses.

Displaying a compliance check for a recent DICOM Compliance Check.

Diagnostic imaging technologies are built to provide accurate and detailed images of the human body. The images created by this technology must be displayed accurately on a monitor in order to properly diagnose a patient. This is where DICOM comes into play. It stands for Digital Imaging and Communication in Medicine, and it is an international standard used by medical professionals to ensure that digital imaging equipment is compliant with the necessary quality controls.

Unfortunately, many healthcare facilities overlook the need to test their monitors for DICOM compliance regularly. Without routine tests, any display errors or inaccuracies can lead to misdiagnoses, incorrect treatments, and even wrongfully administered drugs or surgery. Moreover, these problems may not become apparent until it’s too late; if a monitor has been displaying inaccurate images without anyone noticing, then there could be serious consequences for patients’ health down the line.

As such, all healthcare facilities should take proactive steps to ensure their diagnostic monitors are in compliance with DICOM standards. A professional should be consulted to carry out regular inspections of hardware and software components as well as comprehensive testing of the viewing environment itself: lighting levels, seating position relative to the screen brightness, monitor calibration parameters etc.. All these elements can have an effect on how accurately images are displayed on the monitor — so they must be checked frequently!

At the end of the day, ensuring your diagnostic monitors are compliant with DICOM standards is essential for guaranteeing patient safety and protecting against malpractice claims — not just now but long into the future as well. Don’t let negligence catch up with you; make sure you’re taking every step necessary to keep your patients safe!

Non-Diagnostic Quality Monitors

Non-diagnostic quality monitors are not suitable for viewing radiology exams for a number of reasons. The most important factor is that these displays lack the design features necessary to accurately display medical images. Non-diagnostic quality monitors may have lower resolution, slower refresh rates, and poorer colour accuracy than those designed specifically for medical imaging. They also lack features such as backlight uniformity and gamma correction, which are essential to ensure accurate image representation and reliable diagnoses.

The accuracy of the displayed image is not the only factor to consider — non-diagnostic quality monitors may also have less robust construction, low-reliability ratings, or short lifespans. In addition, many diagnostic radiologists prefer higher-end displays with more advanced features such as automatic calibration, adjustable white point settings, and multiple preset modes. These more specialized screens can provide an enhanced experience for both healthcare professionals and patients alike.

Moreover, non-diagnostic quality monitors are not designed to be used in a medical setting and cannot stand up to the rigours of a clinical environment. For example, they may not be made from materials that can withstand regular exposure to cleaning agents or disinfectants; this means that any dirt or debris that accumulates on the monitor’s surface may not be easily removed without damaging it further. Furthermore, non-diagnostic quality monitors tend to have shorter warranties than those designed specifically for medical use — meaning any failure could leave users high and dry when they need it most!

Finally, using non-diagnostic quality monitors in a clinical setting is strongly discouraged by professional organizations such as the American College of Radiology (ACR) and or The Royal Australian and New Zealand College of Radiology (RANZCR). This is because these types of displays do not meet the requirements necessary to ensure patient safety — leading to potential misdiagnoses and other mistakes due to inaccurate representations of medical images.

In summary, it’s clear that non-diagnostic quality monitors should never be used for viewing radiology exams — due to their inability to accurately display medical images with sufficient fidelity; their lack of features necessary for reliable diagnoses; their potentially weaker construction; shorter lifespans; and lower warranty coverage compared with professional-grade medical imaging displays.

Browse our range of Diagnostic Displays.

At Trucell, we understand that patient safety and quality of care should be a top priority for any healthcare provider. That’s why we offer a comprehensive DICOM compliance check for diagnostic monitors — to ensure patients are receiving the highest quality imaging available. Our team of experienced technicians can provide professional inspections, tests, and assessments of hardware.

Trucell Customer Portal – Track Existing Tickets

By Uncategorized No Comments

There are a few things that end users can do to help ensure that their tickets are resolved in a timely manner. First and foremost, they should review the status and notes of their ticket on a regular basis. Additionally, following up with customer service via the portal can help keep everyone on track. By keeping tabs on their tickets, end users can help ensure that their problems are resolved as quickly as possible.

To gain access to your existing tickets please

  1. Open web browser and navigate to https://psa.trucell.com.au/portal
  2. Sign in to the customer portal.
  3. On the Dashboard please select My Tickets.
    My Tickets
  4. You will now be presented with My Tickets
    My Open Tickets

To view Closed Tickets, Awaiting Input

  1. Navigate to My Tickets from the Portal Dashboard.
  2. In the top left corner of the My Tickets page there is drop down.
  3. Select the desired dropdown option
    Select the Desired Dropdown

 

Trucell Customer Portal – Open New Ticket Request

By Trucell Research No Comments

Please see the following for instructions on how to open a ticket

If you are having trouble with your account or need technical support, please open a ticket by visiting the Trucell Customer Portal or emailing us at [email protected]. Be sure to include as much detail as possible, including your name, company name, and contact information. We will respond to your request as soon as possible.

For billing inquiries, please open a ticket by emailing us at [email protected]. Include your name, company name, and contact information in the email, and we will get back to you as soon as possible.

How to open a ticket via the Trucell Customer Portal.

If you need to open a service ticket, the easiest way is to visit our customer portal at https://psa.trucell.com.au/portal/. You will need to sign in to access the portal. Once you are signed in, you will have the option to open a new ticket.

There are several types of tickets that can be opened on the customer portal. To open a new ticket, click on the “New Ticket” button and fill out the required fields. The first field is the ticket type, which will determine what kind of issue you are having. We explain the issues below.

Incident

An incident is defined as any unplanned interruption or reduction in the quality of an IT Service. The incident management process is responsible for managing the lifecycle of all incidents. This includes ensuring that all incidents are recorded, monitored, and escalated through to resolution/restoration.

Example:

  • A user cannot login to their account
  • An application is not responding
  • A server is down

Problem

A problem is defined as the root cause of one or more incidents. The problem management process is responsible for managing the lifecycle of all problems. This includes ensuring that all problems are recorded, monitored, and resolved in a timely manner.

Examples of problems:

  • A user cannot login to their account because the password is incorrect
  • An application is not responding because the server it is hosted on is down
  • A server is down because the power supply is not working

Change Request

A Change Request is a formal proposal to modify or improve some aspect of the system. The Change Control Board (CCB) must review and approve all change requests before they can be implemented.

Examples of change requests:

  • Change the password policy for all users
  • Add a new user to the system
  • Install a new application on the server

Project

A Project is a ticket that represents a body of work to be completed. Projects can be large or small and may have sub-tasks associated with them. Projects are typically assigned to a project manager who is responsible for seeing the project through to completion.

Examples of project tickets:

  • Design and deploy a new network
  • Implement a new CRM system
  • Migrate the website to a new server

Task

A task is a ticket that represents a smaller body of work that is part of a larger project. Tasks are typically assigned to an individual who is responsible for completing the task.

Examples of task tickets:

  • Configure the new server for the website migration
  • Install the new CRM software on the server
  • Setup routing and firewall rules for the new network

Ticket Fields

The remaining fields, summary, details, urgency and impact are required fields and detail should be provided to the best of your knowledge. The more information you can provide, the easier it will be for our engineers to resolve your issue.

Once you have submitted the ticket, you will receive a confirmation email with your ticket number. You can use this ticket number to track the status of your ticket and add additional comments.

If you need help with your ticket or would like to join one of our support packages, please visit our customer portal at https://psa.trucell.com.au/portal/.

person using laptop

5 Things You Should Never Do on a Work Computer

By Cybersecurity No Comments

Whether you work remotely or in an office, the line between personal and work tasks can become blurred when working on your company computer. If you’re in front of a computer for most of your time during work, then it’s not unusual to get attached to your desktop PC.

Over time, this can lead to doing personal things on a work computer. At first, it might just be checking personal email while on a lunch break. But as the line continues to get crossed, it can end up with someone using their work computer just as much for personal reasons as work tasks.

In a survey of over 900 employees, it was found that only 30% said they never used their work PC for personal activities. The other 70% admitted to using their work computer for various personal reasons.

Some of the non-work-related things that people do on a work computer include:

  • Reading and sending personal email
  • Scanning news headlines
  • Shopping online
  • Online banking
  • Checking social media
  • Streaming music
  • Streaming videos/movies

It’s a bad idea to mix work and personal, no matter how much more convenient it is to use your work PC for a personal task during the day. You can end up getting reprimanded, causing a data breach at your company, or possibly losing your job.

Here are several things you should never do on your work PC.

1. Save Your Personal Passwords in the Browser

Many people manage their passwords by allowing their browser to save and then auto-fill them. This can be convenient, but it’s not very secure should you lose access to that PC.

When the computer you use isn’t yours, it can be taken away at any time for a number of reasons, such as an upgrade, repair, or during an unexpected termination.

If someone else accesses that device and you never signed out of the browser, that means they can leverage your passwords to access your cloud accounts.

Not all older PCs are stored in a storeroom somewhere or destroyed. Some companies will donate them to worthy causes, which could leave your passwords in the hands of a stranger if the PC hasn’t been wiped properly.

2. Store Personal Data

It’s easy to get in the habit of storing personal data on your work computer, especially if your home PC doesn’t have a lot of storage space. But this is a bad habit and leaves you wide open to a couple of major problems:

  • Loss of your files: If you lose access to the PC for any reason, your files can be lost forever
  • Your personal files being company-accessible: Many companies have backups of employee devices to protect against data loss. So, those beach photos stored on your work PC that you’d rather not have anyone else see could be accessible company-wide because they’re captured in a backup process.

3. Visit Sketchy Websites

You should assume that any activity you are doing on a work device is being monitored and is accessible by your boss. Companies often have cybersecurity measures in place like DNS filtering that is designed to protect against phishing websites.

This same type of software can also send an alert should an employee be frequenting a sketchy website deemed dangerous to security (which many sketchy websites are).

You should never visit any website on your work computer that you wouldn’t be comfortable visiting with your boss looking over your shoulder.

4. Allow Friends or Family to Use It

When you work remotely and your work computer is a permanent fixture in your home, it can be tempting to allow a friend or family member to use it if asked. Often, work PCs are more powerful than a typical home computer and may even have company-supplied software that someone wouldn’t purchase on their own.

But allowing anyone else to use your work computer could constitute a compliance breach of data protection regulations that your company needs to adhere to.

Just the fact that the personal data of your customers or other employees could be accessed by someone not authorized to do so, can mean a stiff penalty.

Additionally, a child or friend not well-versed in cybersecurity could end up visiting a phishing site and infecting your work device, which in turn infects your company cloud storage, leaving you responsible for a breach.

At least 20% of companies have experienced a data breach during the pandemic due to a remote worker.

5. Turn off Company-Installed Apps like Backups and Antivirus

If you’re trying to get work done and a backup kicks in and slows your PC down to a crawl, it can be tempting to turn off the backup process. But this can leave the data on your computer unprotected and unrecoverable in the case of a hard drive crash or ransomware infection.

Company-installed apps are there for a reason and it’s usually for cybersecurity and business continuity. These should not be turned off unless given express permission by your supervisor or company’s IT team

How Secure Is the Device You Use to Work from Home?

Whether you’re working remotely and worried about causing a data breach or are a business owner with multiple remote team members to secure, device protection is important. Schedule a device security checkup today.


Featured Image Credit

This Article has been Republished with Permission from The Technology Press.

Hacking, Data Theft, Online Fraud, Cyber Crime, Hacker

Alarming Phishing Attack Trends to Beware of in 2022

By Cybersecurity No Comments

In 2020, 75% of companies around the world experienced a phishing attack. Phishing remains one of the biggest dangers to your business’s health and wellbeing because it’s the main delivery method for all types of cyberattacks.

One phishing email can be responsible for a company succumbing to ransomware and having to face costly downtime. It can also lead a user to unknowingly hand over the credentials to a company email account that the hacker then uses to send targeted attacks to customers.

Phishing takes advantage of human error, and some phishing emails use sophisticated tactics to fool the recipient into divulging information or infecting a network with malware.

Mobile phishing threats skyrocketed by 161% in 2021.

Your best safeguards against the continuous onslaught of phishing include:

  • Email filtering
  • DNS filtering
  • Next-gen antivirus/anti-malware
  • Ongoing employee cybersecurity awareness training

To properly train your employees and ensure your IT security is being upgraded to meet the newest threats you need to know what new phishing dangers are headed your way.

Here are some of the latest phishing trends that you need to watch out for in 2022.

Phishing Is Increasingly Being Sent via Text Message

Fewer people are suspicious of text messages than they are of unexpected email messages. Most phishing training is usually focused on the email form of phishing because it’s always been the most prevalent.

But cybercrime entities are now taking advantage of the easy availability of mobile phone numbers and using text messaging to deploy phishing attacks. This type of phishing (called “smishing”) is growing in volume.

People are receiving more text messages now than they did in the past, due in large part to retailers and service businesses pushing their text updates for sales and delivery notices.

This makes it even easier for phishing via SMS to fake being a shipment notice and get a user to click on a shortened URL.

Business Email Compromise Is on the Rise

Ransomware has been a growing threat over the last few years largely because it’s been a big money-maker for the criminal groups that launch cyberattacks. A new up-and-coming form of attack is beginning to be quite lucrative and thus is also growing.

Business email compromise (BEC) is on the rise and being exploited by attackers to make money off things like gift card scams and fake wire transfer requests.

What makes BEC so dangerous (and lucrative) is that when a criminal gains access to a business email account, they can send very convincing phishing messages to employees, customers, and vendors of that company. The recipients will immediately trust the familiar email address, making these emails potent weapons for cybercriminals.

Small Businesses Are Being Targeted More Frequently With Spear Phishing

There is no such thing as being too small to be attacked by a hacker. Small businesses are targeted frequently in cyberattacks because they tend to have less IT security than larger companies.

43% of all data breaches target small and mid-sized companies, and 40% of small businesses that become victims of an attack experience at least eight hours of downtime as a result.

Spear phishing is a more dangerous form of phishing because it’s targeted and not generic. It’s the type deployed in an attack using BEC.

It used to be that spear-phishing was used for larger companies because it takes more time to set up a targeted and tailored attack. However, as large criminal groups and state-sponsored hackers make their attacks more efficient, they’re able to more easily target anyone.

A result is small businesses receiving more tailored phishing attacks that are harder for their users to identify as a scam.

The Use of Initial Access Brokers to Make Attacks More Effective

We just discussed the fact that large criminal groups are continually optimizing their attacks to make them more effective. They treat cyberattacks like a business and work to make them more profitable all the time.

One way they are doing this is by using outside specialists called Initial Access Brokers. This is a specific type of hacker that only focuses on getting the initial breach into a network or company account.

The increasing use of these experts in their field makes phishing attacks even more dangerous and difficult for users to detect.

Business Impersonation Is Being Used More Often

As users have gotten savvier about being careful of emails from unknown senders, phishing attackers have increasingly used business impersonation. This is where a phishing email will come in looking like a legitimate email from a company that the user may know or even do business with.

Amazon is a common target of business impersonation, but it also happens with smaller companies as well. For example, there have been instances where website hosting companies have had client lists breached and those companies sent emails impersonating the hosting company and asking the users to log in to an account to fix an urgent problem.

More business impersonation being used in phishing attacks mean users have to be suspicious of all emails, not just those from unknown senders.

Is Your Company Adequately Protected from Phishing Attacks?

It’s important to use a multi-layered strategy when it comes to defending against one of the biggest dangers to your business’s wellbeing. Get started with a cybersecurity audit to review your current security posture and identify ways to improve.


Featured Image Credit

This Article has been Republished with Permission from The Technology Press.

From above view of faceless person holding mobile phone with white screen and green recycle logo above marble surface

Important Steps to Take Before You Recycle a Mobile Phone Number 

By Cybersecurity No Comments

It’s not unusual to change a mobile number from time to time. For example, when you move, you may want a number that is local to the area you just moved to. Companies also may end up recycling mobile numbers throughout their staff as people come and go.

If you don’t properly detach your mobile phone number from all the accounts it’s used with, you can leave yourself open to identity theft, credit card fraud, and other crimes.

In a 2021 Princeton University study, it was found that 66% of mobile numbers listed as available by major mobile service providers were still connected to accounts on popular sites (Amazon, PayPal, etc.). 

So, after the former owners had turned in the number, it was available for someone else to use when signing up for mobile service. And that number was still being used on the former owner’s cloud accounts, allowing those accounts to easily be breached.

Because our mobile numbers are connected to much of our online and offline life, it’s important to take certain steps to ensure that you don’t leave yourself at risk when recycling your phone number.

Change Your Phone Number for Online Accounts

We all generally have more online accounts than we immediately remember. The average person must juggle 100 passwords, and most of those passwords will be to a website or cloud app service of some kind.

The first thing you want to do is begin visiting your online accounts and cloud applications to update your mobile phone number. Many of these apps now use a text message to your number as a form of verification if you’ve lost your password.

You want to ensure any password reset messages go to you and not someone that has requested your old number for the express purpose of identity theft or account compromise.

Change Your Number for Social Media Accounts

Technically, a social media account is also an online account, but many people think of them as a separate entity. When a Facebook or LinkedIn account is compromised, the hacker often will send social phishing messages out to your friend connections to try to gain access to sensitive data or scam them out of money.

Make sure to change the phone number listed in your social media accounts. If you are using WhatsApp, which is tied directly to your mobile number, make sure to follow their instructions on changing your number so your communications will remain secure.

Change Your Phone Number for Service Providers That Send You Texts

Text messaging is beginning to replace email for many types of communications. This includes things like shipping notices, confirmations of payments from utility companies, appointment reminders, and sale notices from retailers.

This puts you more at risk if you change your mobile number because the texts you receive from various service providers can be used for identity theft.

Make sure to connect with any services you use that contact you by calling or texting your mobile number to update your information. These offline services could be a:

  • Plumbing or HVAC company
  • Dentist or doctor’s office
  • Pharmacy
  • Local retailer
  • Utility company

Double Check All Your Multi-Factor Authentication Prompts

One of the big dangers of having a stranger able to receive your text messages is that they could have access to your codes for multi-factor authentication (MFA).

MFA is designed as a safeguard to help prevent an account breach, even if the perpetrator has your username and password. But if the criminal gets the MFA codes sent to your old number, they can easily get in and change your password, locking you out of your own account.

As you go through the process to update your mobile number in your online accounts, double-check the MFA prompt for any that use this form of authentication security. You want to make sure it’s been properly changed to send a message to your new number.

Review Your Text Message History for Anything You’ve Missed

Inevitably, there will be online accounts or service providers that you’ve missed. For example, that place you always order flowers for on a loved one’s birthday every year but never visit at other times.

Scroll through your text message history to find any other accounts that you may have forgotten to update.

Text Friends, Family & Colleagues from the New Number

Once your online security is taken care of, you want to stop friends, family, and colleagues from accidentally texting your old number. This can happen in both one-on-one and group SMS chats.

Send a text message from your new number asking them to immediately update your contact with that number when they receive it. Then go the additional step by asking them to delete any messages that used your old phone number. This can help prevent them from accidentally grabbing that message instead of your new one when texting you in the future.

How Secure Is Your Mobile Device?

Mobile devices are increasingly being attacked by malware and phishing. Is your device properly secured? Don’t leave yourself at risk, request a mobile security check to protect your personal data and identity.


Featured Image Credit

This Article has been Republished with Permission from The Technology Press.

person using black laptop computer

These Google Search Tips Will Save You Tons of Time!

By Productivity No Comments

Over 2.4 million searches happen every minute on Google. It’s often the first stop people make when they go online.

We search daily for both personal and work needs, and often searching out the right information can take a lot of time if you have to sift through several irrelevant results.

One study by consulting firm, McKinsey, found that employees spend an average of 1.8 hours daily, or 9.3 hours each week, searching and gathering information. This can be a productivity sinkhole as more web results keep getting added to the internet every day.

One way you can save time on your personal and work-related searches is to learn some “secret” Google search tips. These help you narrow down your search results and improve productivity by helping you find the information you need faster.

Search a Specific Website Using “site:”

Sometimes you need to find information on a specific website. For example, you might need to locate a government statistic that you know is out there but can’t seem to bring up on a general search.

You can use Google to search keywords on a specific website by using the “site” function.

In the search bar use the following:  site:(site url) (keyword)

This will bring up search results only for that one specific URL.

Find Flight Information Without Leaving Google

When you need to access flight information, you’re often on the go. Either getting ready to head to the airport or waiting for someone to arrive. Having to load multiple site pages in your browser can take valuable time. Instead, get your flight results directly from Google.

Just type in the flight number and the name of the airlines, and you’ll get a listing of flight information without having to click to another page. You can even tab to choose flight info for that same flight on different days.

Look for Document Types Using “filetype:”

If you’ve just been tasked with coming up with a presentation on sustainable energy, it can be helpful to see what other people have done on the same subject.

Searching websites can give you a lot of details to sift through but searching for another PowerPoint presentation can provide you with even more insight into how others have distilled that information down into a presentation.

Google has a search function that allows you to search on a file type, so instead of webpages showing up in your results, files of the file type you searched will appear.

To use this function, type in the following: filetype:(type) (keyword)

In the case of wanting to find a PowerPoint on sustainable energy, you could use the following in the search bar: filetype:ppt sustainable energy.

All the results will be PPT presentations.

You can also use this function for other file types, such as:

  • DOC
  • PDF
  • XLS or XLSX
  • SVG
  • and more

Narrow Down Timeframe Using the “Tools” Link

One frustration is when you’re looking up something like a population or cybersecurity statistic and you end up with results that are too old to be relevant. You can spend valuable time paging through the search results, or you can tell Google what time frame you’d like to search.

To narrow your search results by a specific timeframe, do the following:

  • Enter your keyword and click to search.
  • Under the search bar, click the “Tools” link.
  • Click the “Any time” link.
  • Choose your timeframe.

You can choose from preset timeframes, like past hour or past year, or you can set a custom date range for your results.

Locate Similar Sites Using “related:”

When you’re researching a topic online, it’s often helpful to find similar websites to the one you are viewing. Seeing related sites can also be used if you’re trying to find a specific product or service online and want to do some comparison shopping.

Google can provide you with a list of related websites when you use the “related” function.

In your search bar, type the following: related:https://website.com

One more way that you can leverage this search tip is to look for competitors by entering your own website URL in the search.

Get Rid of Results You Don’t Want Using “-(keyword)”

Non-relevant results are one of the main timewasters of online searching. You have to page through results that have nothing to do with what you really want to find, just because they use a related keyword.

For example, say you were searching the Ruby Slipper Cafe in New Orleans. But in your search results, you keep getting pages related to the movie the Wizard of Oz. You could eliminate those irrelevant results by using the negative keyword function.

Just type: (keyword) -(keyword)

Basically, you are just putting a minus sign in front of a keyword that you want to exclude from your search. In the example above, you would type: ruby slippers -oz.

Looking for More Ways to Boost Productivity & Save Time?

IT consultants aren’t just for large projects, we can also help you boost productivity in your everyday workflow to make your life easier.


Featured Image Credit

This Article has been Republished with Permission from The Technology Press.