contact us

Use the form on the right to contact us.

 


Naperville, IL 60565
USA

630-639-7372

iPhone-XS-photo.jpg

Blog

Five Best Practices for Organizing and Naming Computer Files

Rowena

Five Best Practices for Organizing and Naming Computer Files

We’ve had decades to get used to organizing computer files, but it’s still hard for many people. Part of the problem is imagining how you—or your colleagues, if you’re in a workgroup—will need to find the files in the future. Another part of the problem is mustering enthusiasm for renaming and reorganizing existing files to match an improved approach. Let’s see if we can help!

#1: Start Now and Catch Up Later

Don’t let your old files prevent you from starting a new organizational approach. The best time to begin is now; you can reorganize old files later.

An easy way to avoid being bogged down by old stuff is to move all your existing files and folders into a folder called “Unorganized” at the top level of wherever you store documents. Make sure to retain any hierarchy that those old files might have. If you’re still working with those files, they remain just as accessible as they were before.

One type of cleanup is often worth doing right away: If you have a lot of temporary or duplicate files from past projects that you can instantly identify as unnecessary, delete those now while they’re still familiar. That saves you or someone else the work of thinking about them again in the future.

#2: Pick an Organizational Structure

The most important question to ask yourself or your colleagues is what sort of organizational structure matches how you think about your data. There are four common approaches:

Project name:It’s hard to go wrong with using a project name as your primary organizational structure. For instance, an ad agency might have a top-level folder for each client, or a book publisher might have one for each title. A nonprofit that organizes five annual events could have a folder for each event. Within each project folder, additional folders can separate files by category. You may also add some date-based structure to keep older files from getting in the way of current work. For instance, here’s how an ad agency might organize email marketing files for a hotel.

Date: Groups with many files that revolve around time periods may find it easiest to organize everything by year, month, and day. Date-based organization is a special case—you’ll know if it makes sense for your data and usage patterns. For instance, if a distributor creates different inventory reports for every supplier every day, a hierarchy like this might make working with files from the same time period easy. However, finding all the files for a particular supplier would be more difficult, although a file naming convention could help resolve that problem.

Project type: Large organizations with a lot of cross-departmental collaboration across numerous projects might find it easier to separate files by category first and name second. That way, everyone in the marketing and production departments working with scripts and audio files for radio spots, for instance, can find those files without having to see files related to social media ads. The downside is that finding related client projects is tricky unless you add that information into a file naming structure.

Department: For large organizations with siloed departments that seldom interact, each department can have its own hierarchy. That keeps the marketing department’s files separate from the accounting department’s, for instance, but can result in confusion when departments do collaborate. Plus, it can be difficult to bring data about a single project together, although again, a good file naming structure can help.

We often get questions about how best to organize images. If they’re tightly related to particular projects, the easiest approach is usually to store them alongside other files in that project. For example, photos for a cookbook might live with the layout files within a folder for each chapter.

For graphically intensive fields with a very large number of images to track across multiple projects, particularly when any given image might be used in multiple contexts, consider moving to a digital asset management app that stores all your images, providing access through hierarchical categories and keywords or tags. Digital asset management apps are essentially databases for images and other media, enabling you to search and sort far more flexibly than with a simple folder hierarchy.

#3: Decide on a Consistent File Naming Convention

Although an organizational structure is important to help you find files quickly and work with related files, your file naming convention is even more important. You should be able to identify a file merely by glancing at its file name, even if it was moved outside its folder hierarchy. That’s especially true if files are shared outside your organization, where the recipient won’t see the folder hierarchy above the file. You can see this problem illustrated below: you can tell exactly what this Mailchimp.pdf file is from the folder structure, but would someone else have any way of knowing it’s a Belvedere Hotel-related invoice from 2022?

File names should be as specific and detailed as necessary for quick identification, preferably starting with a date or project name and including essential aspects of the organizational structure. Dates work well for any file that’s created on a regular basis—instead of the vague MailChimp.pdf, try 2022-09-29-Belvedere-invoice-MailChimp.pdf. Project names are better for one-offs, so instead of Chapter3.docx, use something like Second-Breakfasts-Ch03-recipes.docx. Note how both of those names integrate key aspects of organizational structure.

Three pieces of advice:

●     When you name files starting with the date, use the YYYY-MM or YYYY-MM-DD format to ensure that they sort well and can’t be confused with older or newer files.

●     Consistency is key. Stick to the conventions you decide to use and require that everyone else do so as well. Having one file name start with “Second-Breakfasts” and another with “2nd breakfasts” will cause confusion and annoyance.

●     When separating words, use a space, a hyphen (-), or an underscore (_). Spaces are the easiest to use but should be avoided for files destined for a website. We prefer hyphens because macOS interprets two words separated by an underscore as a single word when selecting, which can be irritating while editing file names.

#4: Identify Versions Clearly

Many files go back and forth between multiple people in a collaborative workflow. Building a versioning scheme into your file naming convention is essential to ensure that everyone knows which version is the most recent and who worked on which version. It’s tempting to use a single file, with each person renaming it as necessary, but we recommend archiving each version until the completion of the project to make it easy to see who did what and to recover from any file corruption or accidental deletion of data. When using a file server or shared folder, it’s best to make it clear when someone is actually working on the file to avoid collisions. Let’s assume in these steps that you and your editor are taking turns working on a Word file.

1.    Alongside the file in question, create a folder called CHECKED OUT and another called OLD.

2.    Move the file you’re working on into CHECKED OUT. Name the file however you like, but end it with your initials and the number 1, as in Second-Breakfasts-Ch03-layout-rte1.docx.

3.    After you make your changes, move the file back into the main folder and alert your editor that it’s available.

4.    When your editor wants to work on the file, they first make a copy of it in OLD to archive a version. Then they move the working copy into CHECKED OUT and rename it with their initials, incrementing the version number, as in Second-Breakfasts-Ch03-layout-afp2.docx.

5.    They edit the file, moving it back to the main folder when done and alerting you.

6.    You each then repeat Steps 4 and 5 as necessary, storing an archive copy in OLD, putting the working file in CHECKED OUT, renaming it with initials and the next version number, and then putting it back in the main folder when done.

7.    On the final revision, rename the file one last time, replacing the initials and version number with “final,” as in Second-Breakfasts-Ch03-layout-final.docx.

If you’re instead sending files back and forth via email, there’s no need for the CHECKED OUT folder, but you should both keep a copy of each version in OLD, just in case.

#5: Know When to Browse and When to Search

If you have a solid organizational structure, you should be able to jump right to the files you need by navigating the folder hierarchy, and if you’ve designed your structure well, you’ll browse for files most of the time. However, if a consistent file naming convention enables you to fall back on searching in certain situations:

●     You need to find files across multiple folders. For instance, if you store files by client but want to see all the invoices for all clients, a search on “invoice” is more effective than looking in each client folder separately.

●     There are too many files to work with fluidly. Imagine that you have an automated system that generates dated reports for multiple suppliers in a particular folder. If they’re sorted first by date and then by supplier, a search could help you filter the folder’s contents to a single supplier.

●     You don’t entirely understand the organizational structure or trust that others have followed it. This scenario is most likely when you weren’t the person to set things up. Hopefully, you at least have consistent file names to look for with your searches.

Apart from these situations, if you find yourself regularly resorting to a search, that may be a hint that you should revisit the organizational structure and make sure it works the way you need.

As you can see, there are numerous approaches for organizing and naming your files, and what makes sense for one group may not for another. If you’re having trouble deciding on the best approach, feel free to ask us for suggestions.

(Featured image by iStock.com/everythingpossible)


Social Media: Having trouble finding files because they have vague names and are scattered across multiple folders? Read on for concrete advice on how to organize and name files for easy access.


Are You Paying Too Much for Internet or Cellular Connectivity

Rowena

Are You Paying Too Much for Internet or Cellular Connectivity?

We’ve recently worked with a few clients who were paying too much for their Internet or cellular service. Internet service providers (ISPs) and cellular carriers occasionally adjust their service plans to account for new technologies, economies of scale, changing competitive landscapes, and marketing efforts. Sometimes they’ll increase speeds or capabilities across the board, but more often, when they debut new plans, current customers are grandfathered into their existing plans, often without notification. Upgrading to a new, better plan is usually simple—first, check the plan details on your ISP’s or cellular carrier’s website. Then, if they look better or cheaper—or if you don’t remember what service levels you should be getting—call the company’s support line and ask if switching plans would be beneficial. Beware that they may try to upsell you on a more expensive plan, so agree to switch only if you’ll end up paying less or getting significantly more. Remember, more speed isn’t necessarily worthwhile—most people won’t notice the difference between 250 Mbps and 1 Gbps, for instance.

(Featured image by Adam Engst)

Security Questions Your Organization Should Be Asking Itself

Rowena

Security Questions Your Organization Should Be Asking Itself

We’re increasingly hearing from organizations that need to establish that they have sufficient security policies in place, either to meet the requirements of a larger client or to qualify for cyber insurance that insures against breaches and similar losses. Details vary, and we’re happy to work with you on the specifics, but here are some of the kinds of questions you may be asked. Of course, if you don’t have to prove that you’re doing the right thing to some other company, answering these questions for yourself can only improve your security readiness.

Do you enroll all organizational devices in a device management solution?

With device management, an IT department or managed services provider (MSP) maintains oversight and control over all organizational devices. That’s helpful for automating configuration and deployment, providing secure access to organizational resources, ensuring consistent security policies, managing app and operating system updates, tracking device inventory and status, and much more.

Do you have an organization-wide backup strategy with offsite backups?

Regular backups—with some being stored offsite—are essential if you need to recover from lost or stolen hardware, a natural disaster, or a ransomware attack. Even though ransomware isn’t currently a major problem in the Mac world, it wouldn’t hurt to start creating immutable backups using “write once, read many” tape or something like Retrospect’s Cloud Object Lock, a technology that ensures that cloud-based backups can’t be corrupted. Finally, have you tested restoration and recovery of key systems from your backup data? Backup is important, but only if you can restore.

Do you have a policy for updates?

It’s essential to install security-related updates to operating systems and major apps, but how quickly that happens has to be weighed against problems that version changes can cause for important workflows. There’s no right answer here, but you want to make sure that you aren’t leaving your organization’s apps and devices vulnerable to known security exploits for longer than necessary.

Do you have a strong password management policy?

Short, easily guessed, or cracked passwords are one of the primary ways attackers breach corporate networks and systems. At minimum, your password management policy should require that all passwords be stored in a password manager, new passwords be generated by the password manager and meet minimum requirements for strength, and two-factor authentication be used when available.

Do you use an endpoint protection platform?

Endpoint protection is essentially software aimed at preventing and detecting malware on employee workstations, often with an organizational dashboard and management capabilities. Although the Mac doesn’t have nearly the exposure to malware that Windows does, it’s still important to keep computers free of malware that could hurt performance, exfiltrate data, or provide an entry point for future attacks. Endpoint protection is usually part of a larger managed systems approach that can also ensure that devices adhere to security policies like full disk encryption, run only approved software, stay up to date with security updates, and more. 

Do you have a list of sensitive data on your network?

Exactly what counts as sensitive data will vary by organization, but anything related to network and corporate security qualifies, as does any personally identifiable information you may hold about or for clients. It’s not uncommon to store information about people that includes names, email addresses, phone numbers, and postal addresses, but you should be even more careful if you store Social Security numbers, credit card numbers, driver’s licenses, passports, financial records, or medical records. Knowing what you have is the first step; after that, consider what additional precautions you should take to protect such information.

Do you provide periodic anti-fraud and security training to employees?

Social engineering is another common way attackers gain access to corporate networks and systems. Does your organization require that all employees take regular training to learn how to identify phishing attacks, require appropriate approvals for unusual transactions or access requests, and report suspected incidents to the necessary people? If an administrative aide in the accounting department gets an email request from the CEO to pay an urgent invoice to a new vendor, will that person know how to respond?

Do you allow access to organizational email and systems from personal devices?

It’s tempting to allow users to access their email from personal devices or to have contractors use their personal email addresses for work communications. We recommend keeping as clear a line as possible between work and personal devices and accounts to reduce the security implications of such mixing. Particularly when there’s sensitive information in play, personal email addresses should never be used for work communications, and if personal devices are being used, they should be set up with two-factor authentication for organizational logins.

Do you have incident and disaster response plans?

Bad things happen, and it’s important to consider how you would respond to different types of security incidents and natural disasters. How will your organization maintain crucial business operations, communicate with employees, coordinate with partners (insurance, legal, PR, and clients), and more? Is your plan written down and updated regularly? Have you tested key aspects of your plan?

We know there’s a lot to think about regarding security in today’s world, and we’re always available to help if you’d like assistance answering any of the above questions.

(Featured image by iStock.com/Bulat Silvia)


Social Media: Securing an organization’s digital assets requires ongoing attention. This article poses questions your organization should be able to answer—and that will likely come up when purchasing cyber insurance or doing work for other, larger organizations.