IT Support Blog
News and info on IT Services
We know its hard to make sense of all the options available when it comes to IT. We can keep you posted on the latest trends and info with our IT Support Blog.
We know its hard to make sense of all the options available when it comes to IT. We can keep you posted on the latest trends and info with our IT Support Blog.
Here are 7 reasons why your business needs to consider making it easier for your employees to do more of their work in the cloud. Not only will this help boost overall productivity, but making it easier for people to do their jobs is always a way to increase morale.
The reach of the internet continues to expand globally and there are few places left on the planet that do not have internet connectivity. By making your data available on cloud synching services, your employees can access files from most any location via smart phones and tablets.
The ability to quickly and easily access files from any location is very convenient for employees that travel; it is also much appreciated by those that may need to work from home occasionally. It also means that your business does not have to grind to a stop during inclement weather when your staff is unable to commute to the office.
Not that long ago, VPN was the standard means of extending a private network access by way of an internet connection. It worked well for its time but this approach is ancient tech now and not only is it cumbersome and slow to use, it also requires dedicated hardware to maintain and is not mobile-friendly.
It’s time to say goodbye to VPN and make remote access easier for your staff by making the move to the cloud.
With the rise in adoption of tablets and smartphones, the need to be tethered to a desktop – or even laptop, for that matter – has decreased dramatically. Mobile apps have increased in functionality to the point that most data files including MS-Office can now be worked on efficiently though a mobile device.
Younger workers especially are more accepting of mobile devices and they demand the ability to use these devices to do more of their work.
For many businesses, it is still necessary to work with very large files. For those forced in the past to work with VPN connections, the frustration of working with large files is still a painful memory. But working in the cloud is far more efficient and large files can be downloaded and transferred much more quickly.
Cloud service providers have been steadily improving data protection capabilities in their data synching services. New generation cloud-based file services are being developed with enhanced data security features that meet the requirements of even the most demanding corporate compliance policies.
Cloud-based file sharing services excel at distributing files thereby promoting greater collaboration with others. Combine the ease of use of mobile devices and the ability to connect to these web services, and the sharing of information has never been easier.
Like data security, file access controls are also being upgraded and while user and file-level permission-setting weren’t available in earlier versions of some file synching services, this is quickly being addressed.
One last thing to keep in mind as you consider adopting a cloud-based file synching service is to do your homework. Be sure you select the service that offers the best combination of file maintenance and security that is appropriate for your business.
Get this right and not only do you make your data safer and promote collaboration, but you also make it easier for your staff. With the potential for increased productivity and a boost to employee morale, this makes moving your file sharing to the cloud an obvious tactic you must consider.
Have questions about file sharing online? Give us a call today or drop us an email.
A report that was done by PandaLabs found that there were twice as many malware infections in 2014 compared to the year before. What’s even worse? 2015 will likely seen that number increase again.
There were plenty of security stories making headline news in 2014. CryptoLocker was a high-profile example of ransomware, and Trojans are still the most common form of injection. In fact, they account for about 70% of all new malware created. Viruses are typically the most well-known and feared forms of infection, but they actually make up only 12% of new infections.
The Numbers Keep Growing
Companies and home users need to be more aware and protected than ever before. Malware will do serious damage, and many companies that suffer significant downtime due to IT issues end up going under. Businesses need to increase their security and continue to focus on protection and prevention. How will you do this? Locking down point-of-sale systems, seeking out and identifying vulnerable apps and systems that need updating, and informing employees about how to detect and avoid scams.
To talk with an IT company about keeping your business protected from malware and other dangerous security threats, contact us or by phone or email.
An easy way for hackers to gain access to systems and accounts is to ask for it. Social engineering is a time-tested method used by many hackers. In many cases, all it takes is a phone call to a victim posing as an IT professional with a request for the user’s login and password so they can “remove malware” or “fix an issue” that isn’t actually there. Make sure you educate your end-users on this sort of attack and don’t fall for it yourself.
The latest Verizon security breach report shows a large number of breaches result from well-known vulnerabilities. Approximately 97 percent of breaches investigated by Verizon resulted from 10 well-known vulnerabilities that are many years old. Often, users are hacked because their systems are not up-to-date and patched with the latest security patches and updates. Make sure you’re patching for well-known vulnerabilities. It just makes sense.
Researchers with Cylance provided a compelling case regarding why you should use a VPN when using a public WIFI connection. Cylance discovered 277 hotels and convention centers across 29 countries were affected by a vulnerability in a router used to offer Free Wi-Fi to guests. Free Wi-Fi also has the danger to allow for a man in the middle attack. Whenever possible, use a VPN so you’re not leaving your system at risk.
2014 was stained by high-profile data breaches, ending with the bizarre and damaging hack of Sony Pictures. You know your business needs to protect itself, but what exactly should you be looking out for? We’ve broken down the biggest security threats shaping up in 2015.
We don’t just use computers for internet access anymore. There are hundreds, if not thousands, of innovative, connected devices used to track, monitor, and simplify every part of our lives. But when you’re storing and transferring sensitive personal information, hackers will be looking to exploit any vulnerability. TVs, home security systems automation and any other Internet capable devices need to be protected.
Denial-of-service attacks don’t steal your information or cause any overt harm, but they flood a site or service with so much traffic that it becomes overwhelmed and prevent users from connecting. Last year they became much more sophisticated and they can now morph and adapt based on the defenses in place by the targeted network.
Social media is what keeps us all connected – so it’s not surprising that hackers are aiming to use it to spread malware. Attackers continue to develop techniques to exploit social networks by distributing malware and stealing sensitive data from users.
Security experts have been talking about mobile malware for a long time. Mobile devices are more prevalent now than ever, including in business. It seems 2015 may be the year that a major mobile malware attack finally happens – so you need to keep your devices protected.
Remember this – cybercriminals will take the path of least resistance, and they know that contractors and other third-party vendors can offer an opening into generally-secured corporate networks. You always need to screen who has access to your network and systems and ensure they have proper security precautions in place.
Don’t let new threats get the best of you. We know what you’re up against and are ready to help ensure you don’t get crippled by security threats – to get setup with the best protection available contact us by phone or email.
Despite its sleek look and some interesting features, the capabilities don’t seem to really warrant a buy. Even more, there are a few security issues that you should definitely take note of if you’re still considering making the purchase.
For both GPS and wireless connectivity, which includes downloading any apps onto your watch, Apple says the device must be paired with an iPhone: particularly an iPhone 5 or newer, running on at least iOS 8.2. Considering how high profile the watch is, it’s safe to say that hackers will soon be working to find vulnerabilities and weakness in the Wi-Fi and Bluetooth connections. And getting into the watch could mean getting instant access to all of the information stored on your phone.
While we already know of vulnerabilities existing in Wi-Fi and Bluetooth use, we don’t know much at all about the apps that have been created for Apple Watch. Do you really want to be a lab rat when it comes to discovering vulnerabilities in apps?
Between the use of Bluetooth and Wi-Fi, it’s easy to imagine that individual devices could be “fingerprinted”. Data could be used to track individuals in physical spaces, which obviously poses both security and privacy concerns.
It’s generally accepted knowledge that you should disable wireless networking technologies when you’re in untrusted or unknown environments. But since those features are both necessary to leverage most Apple Watch features, users would be required to use them often.
Apple has said that every time the watch is put on after being removed, a code must be entered to unlock the payment function. Still, recent stories of fraud have found thieves loading stolen card data into Apple Pay on iPhones and then making purchases. The issues that occur here likely won’t be unique, but similar to fraud issues with an iPhone.
Due to some of these digital pay issues, Apple users may find less and less merchants and banks willing to accept Apple Pay. Many have received overwhelmingly negative reaction to how Apple handled Apple Pay fraud, stating they need to take more responsibility for fraudulent Apple accounts.
Using Apple Pay with Apple Watch requires “contactless” POS terminals. This is driven by the recent liability shift in which a merchant or issuer that doesn’t support EMV is responsible for all fraudulent transactions. These terminals could potentially reduce payment fraud rates in coming years. But…
The POS terminals include NFC, which means they’re already programmed to accept Apple Pay. Once your Apple Watch is unlocked, a cybercriminal could plausibly use it to make fraudulent purchases. And while POS terminals were created with heightened security in mind, it’s possible that thieves could hack and control NFC terminals to steal unauthorized payments.
For more technology inquires and security tips and tricks, contact us by email or by phone.
In 2014, data breaches hit the headlines on a regular basis, and it’s only going to get worse in the years ahead! Think back: Target, Michaels, Neiman Marcus, and Home Depot – These are all HUGE corporations who’ve likely invested a lot more into cyber security than you.
Don’t Become the Next Victim of Cybercrime. Start Taking Cyber Security Seriously with These 5 Tips for Business!
Ready to start taking cyber security seriously? Here’s the top 5 tips to help you safeguard your technology:
First and foremost, establish basic security policies and train your employees to protect sensitive business information and avoid cyber attacks. Make sure they understand how to use the Internet safely, which means:
Also, make sure you’ve discussed the importance of cyber security and outlined penalties for breaking basic security policies.
If you haven’t already done so, install anti-virus software and firewalls on every computer used within your workplace. Also, set the anti-virus software to automatically check for updates at a scheduled time and run scans for malware and viruses as often as possible.
Cybercrime targets businesses of all types and sizes, and the truth is, you’re a target, whether you know it or not. Many types of malware, including ransomware, steal your data – making it inaccessible for employees. If you’ve backed your important data up, you’ll be prepared to recover any necessary files to keep working.
All mobile devices, whether you’re corporate or employee-owed, must be secured with proper security measures in place, which includes the ability to keep personal and business data separate, and various other measures, such as encryption and remote wipe capabilities, in order to minimize risk if a device is lost or stolen.
If you’re giving admin privileges to those who don’t truly need them, stop and reconsider. Also, manage those who do need admin privileges – limit access to sensitive information and use strong passwords to avoid user accounts being compromised. It’s also a good idea to log all access activities and monitor on a regular basis, in order to detect any unauthorized access attempts.
Looking for more cyber security tips to keep your business safe? Call us today or drop us an email.
Microsoft doesn’t want the Windows market to be split into a variety of versions. At one time Windows XP, Windows 7, Windows 8 and Windows 8.1 were all being supported at once. This caused developers to choose between the best functionality and the most widely compatible version. And many users lost out on the latest features or security updates because they didn’t have the latest Windows.
Most non-corporate Windows users never buy a Windows license – they buy a PC, and the PC’s manufacturer has already paid for it. The majority of people won’t shell out more money when an upgrade is available; they only get the latest Windows when they actually buy a new PC. That leaves old versions of the software out there for years. But Windows 10 is changing that…
Last week Microsoft announced that current users of Windows 7, 8 and 8.1 will receive free upgrades to Windows 10. For now, it’s a limited offer that will last a year after release. Likewise, those new Windows 10 machines will receive upgrades for free for the entire lifetime of the device. Gone are the paid major version upgrades that Windows has offered in the past. New features and capabilities will no longer be held back until the next release of Windows, they’ll be downloadable as soon as they’re ready for the market. Microsoft is hoping that by offering this free upgrade and making it as easy as possible, they can post a stop to the fragmentation of the Windows world.
People will still be buying and building new PCs, and those PCs will still need Windows licenses. Those Windows licenses will, for the time being, still cost. What Microsoft is giving up is not Windows license revenue, but rather upgrade license revenue. But upgrades were never a major money-maker in the first place, so the impact won’t be huge.
One important Windows demographic will be greatly affected by the continuously-updated new Windows: businesses. For the mission critical systems that cannot be adjusted without extensive testing and approval, Microsoft is introducing Long Term Servicing branches. These branches will be the most stable Windows versions that Microsoft has ever release.
Windows’ support is currently split into two five year periods – a Mainstream period where both feature improvements and security fixes are made, and an Extended period where only security fixes are made. The LTS branches will receive only security and critical fixes over the entire ten year support duration. The branches will be created periodically, integrating all the feature updates that have been released in the meantime.
Microsoft argues that most systems don’t need this level of immutability, so for those systems there will be the Current Branch for Business. The CBB will keep pace of consumer Windows, receiving a frequent mix of security updates and brand new features. Administrators will have the power to hold back those feature updates to enable testing without interrupting the deployment of security fixes. Windows 10 systems will have the capability to switch between CBB and LTS.
The licensing complications for corporate users are a little vaster than those for personal users. Companies using regular Windows or Windows Pro will be eligible for the free upgrade. For them hardware will ship with an OEM license, and that will keep them up-to-date for as long as they have the hardware. Any organization with a current Software Assurance agreement will be eligible for the free upgrade – it’s a major advantage of having a current Software Assurance agreement. There are some footnotes, though: if the agreement expires on June 30 and Windows 10 is released on July 1st, there is no right to upgrade.
Clarification on any other situations is still forthcoming from Microsoft. Overall, the changes seem overwhelmingly positive for small businesses and personal users – Software Assurance customers won’t even notice a change. Still, some users will fall between the cracks, and the solutions for their issues remain unclear.
For more of the latest technology news contact us immediately by phone or email.
When you’re using Windows to do work or even for personal pastimes there are number of little tricks you can employ to make work easier, faster, and more effective. Next time you’re using Windows on your PC or laptop, try out these tips.
Launch Taskbar Programs with Your Keyboard
The taskbar is often used as a quick launch bar to easily get to the programs and applications we use every day. Now, there’s an even easier way to open them than a simple click – some quick keyboard combinations. Every program to the right of the Start button is assigned to its own numerical shortcut, starting with “1” and so on. Pressing the Windows key and the number of the program you want to open will launch it immediately.
Discover Hidden Right-Click Options
Using the Shift key when right-clicking reveals some hidden options you can use as shortcuts. For instance, the basic Send To tool that appears as a right-click option on a file or folder is handy, but if you hold down the Shift key as you right click, you’ll be given an expanded list of locations as part of the Send To menu.
Erase a Mistake
When you’re storing a ton of files and constantly shuffling through them, it can be easy to make a wrong move or drop. You may accidentally delete something or create unwanted copies in other locations. Luckily Windows has basically implemented a ‘Get Out of Jail Free’ card – pressing Ctrl + Z is a shortcut that undoes your last action.
When you need to start multitasking this will come in handy. Windows 8 provides the ability to “Snap” multiple open apps side-by-side. Just click on an open window and drag it to either the left or right edge of your screen. It will automatically resize to fill that half of your desktop. If you prefer to use keyboard commands, Windows key + left arrow, Windows key + right arrow, and Windows key + up arrow will also snap the selected window.
A Powerful Search Tool
It’s most common to search Windows using the Start menu, but for better results try the search box that’s provided in the upper-right corner of Windows Explorer. The advanced search tools let you add filters such as date and file type. You can also make a shortcut to a custom search by dragging the magnifying-glass icon in the File Explorer location bar. Clicking on it will always give you the latest results.
Create Your Own Keyboard Shortcuts
There are a ton of shortcuts that are already part of your system, but with Windows you can also create your own to make work faster and easier for you. Right-click on a program icon and select Properties, then select the Shortcut tab, click “Shortcut key” and press the key you want to use to launch that program.
Want to add even more functionality to your taskbar? Right-click on it and select Properties and then open the Toolbars tab. A list of Windows’ available toolbars will appear and you simply check the boxes next to the ones you’d like to add. The Address option adds a URL bar to your taskbar which you can use to browse the web, and the Desktop option adds a drop-down menu that allows you to easily search files or folders or your PC.
For more useful tips and tricks like these and to learn how to get the most out of your technology, contact your Microsoft Office and Microsoft Windows experts today.
LinkedIn sent its users a brief message this week that stated the following:
As an active user of LinkedIn for Microsoft Outlook Social Connector, we wanted to make sure we let you know that on March 9, we will no longer support LinkedIn for Microsoft Outlook Social Connector in Outlook 2003, 2007, and 2010. This means that LinkedIn information about your email contacts will not be visible in those Outlook versions.
What’s This Mean for You?
Many businesses, for example, use Microsoft Office 2010 – that includes Outlook 2010. It’s common to use this connection to look at the LinkedIn status of contacts. When you select a contact that’s connected with LinkedIn, Outlook will show you that contact’s status.
It’s a valuable feature to know a co-worker or client’s LinkedIn status before e-mailing or calling them, so losing the connection between Outlook and LinkedIn can be difficult for some. Don’t worry yet, though, because there are easy ways to get around it and continue on work as usual.
A Simple Upgrade
If this affects you, it’s probably time to upgrade your Microsoft Office. If you’re running a small business you can upgrade to Microsoft Office 2013 for Home, which includes Outlook, for $99.99 a year for up to five computers. Some Microsoft Exchange providers will give you a license and software for Outlook 2013 as well.
With the newest Office or Outlook you can download a new connector at no additional cost so that you can continue staying connected with your clients and contacts through LinkedIn.
For more IT news and to ensure your system and applications are up to date, contact your IT service team on email or by the phone.
Data breaches are increasing at higher rates than ever before. Not only are we being targeted more often, the number of records compromised in each breach is on the rise. When comparing year-to-year numbers, January reports show over a 20% increase in records compromised.
The number of data breaches in 2014 involving more than 100 million records increased by 100% when compared to 2013 statistics. The numbers are alarming, and the effects are being felt by small and large businesses around the world.
Recent research revealed over one billion data records were compromised in over 1,500 data breaches occurring in 2014. This is a 78% increase in compromised data records compared to 2013.
Identity thieves are the main culprit behind the attacks. The BLI states that 54% of all data breaches were identity theft related. Not only is identity theft responsible for over 50% of all breaches, it accounts for one third of the breaches ranked as Severe or Catastrophic in the BLI.
Even more alarming, over two-thirds of the 50 highest ranked breaches occurred in 2014.
Retail and financial services continue to be the prime targets for identity thieves and hackers. Over 55% of data records compromised in 2014 were in the retail sector, and the average amount of records compromised in data breaches within the financial sector increased tenfold.
So how do you ensure YOUR business isn’t the victim of a terrible data breach?
Turn to us for a complete IT security solution you can depend on to protect your valuable data: