Month: July 2016

5 reasons why you should switch to HaaS

Hardware-as-a-Service (HaaS) is not a new concept, it’s an old wine in a new bottle. Similar to Software-as-a-Service (SaaS), where you pay a monthly fee to a service provider in order to use a piece of software, HaaS lets you do the same and saves you from the nuisance of all the hardware upgrades, maintenance, and management. Here are 5 reasons why you should switch to a HaaS solution for hardware optimization.

1. Save money

The first reason is simple: money. For SMBs, cash flow is a crucial matter. By shifting to HaaS you can say goodbye to the tedious and costly process of having to buy all the hardware outright. By paying a monthly fee to a Managed Services Providers (MSPs), you can turn a big capital investment into a small, manageable operational expense that leaves you money for other urgent matters.

2. Kiss out-of-date tech goodbye

Given limited financial resource, it’s not easy for SMEs to catch up with the latest technology. In a highly competitive business arena, you cannot win the game with your century old CPU while your competitors benefit from the latest technology. By using HaaS, your MSP has a responsibility to ensure that all of your hardware is capable of handling tasks efficiently, and they will achieve that through hardware upgrades and replacements.

3. Better maintenance

Buying new hardware isn’t the end of everything. Like most things in life, hardware needs to be taken care of. And most of the time, SMEs lack the proper expertise, knowledge, or even time to maintain it. HaaS solves this problem by letting your MSP do all the hardware management for you.

4. Better scalability for your business

As time progresses, your organization grows and changes, which means the needs for IT equipment changes too. HaaS solutions allow you to scale up or down as your business needs change so you don’t have to stick with unnecessary tools you no longer use.

5. Improve security

When it comes to security, software isn’t the only thing that needs to be up to date — your hardware does too. HaaS makes it easy to update to newer hardware, which is crucial to ensure adequate security. For instance, if you need a more powerful backup and recovery solution, your MSP will help you obtain new equipment as needed.

Thinking about switching to Haas but not sure where to start? Why not contact us today? We provide a variety of HaaS solutions tailored to suit any business’s needs. Tell us your IT requirements and let’s see what we can do.

Published with permission from TechAdvisory.org. Source.

5 tips for cashing in on tech trends

More money on less investment, that’s the dream, right? Well, counterintuitive as it may seem, flash-in-the-pan tech fads and trends may be just the way to achieve that. With the right tools, you can associate your SMB with popular new technologies without much investment. These are our five tips on how to cash in on things as silly and childish as Pokémon GO and as technical and trendy as the internet of things.

Get in early

One of the biggest indicators of how successful your SMB will be in making big gains off of a new trend is how early you get in. Fads, especially in the tech world, can come and go in no time. Be careful not to invest in resources with a long-term commitment like new logos or graphics, but instead in low-cost workarounds like special promotions and social media campaigns that put you front and center immediately. Once the popular kids have moved onto a fresh fixation, you’ll be ready to move forward without skipping a beat.

Use existing tools

How can you get up to speed quickly without investing too much in permanent resources? The trick is to hijack existing opportunities and strategies for your own message. For example, John Deere has been selling farming equipment for over 150 years, with no signs of slowing down. But with a creative combination of existing GPS technology and mobile devices, they quickly jumped to the forefront of the “Internet of Things” craze by connecting their vehicles to crop planning practices.

Participate in the narrative

So you’ve identified a trend you want to cash in on and you’ve commandeered existing tools to help sell your product. How else can you gain momentum? Social media is everywhere nowadays, and it doesn’t seem to be a dying trend. However, it’s no panacea; simply posting “We’ve got a promotion on all seasonal products #inserttechfadhere” won’t bring obsessed customers to your doorstep. Take a minute to understand the mechanics of what pulls everyone away from work, friends, and family, and show participants you’re one of them. Is it competitive? Polarizing? Take a stand or pick a team and invite customers who are “on your side” to get a discount.

Merge the fad with your business model

With a little creative brainstorming, most business models can actually integrate their product or service with a passing trend. Chatbots have been shoring up the “deep learning” revolution, and clothing retailers have come up with a really creative way to employ them to drive sales. By simply providing their chatbots with a fashion tree, the bots can ask basic questions which whittle down clothing recommendations to those that align with customers’ tastes.

Address difficulties presented by the fad

What if you can’t find a way for your products or services to directly interact with the blazing new trend? The next best thing is to provide solutions to problems presented by it. Does interacting with the popular app or activity eat up a lot of mobile device battery? Remind passersby your outlets are available for customers, or that you sell mobile battery packs. Does it require driving all over town? Remind customers of your latest car rental promotion. Sometimes just associating yourself with the trend is enough.

Not sure how to integrate your business with the latest fads? We’re the experts on all things technology related, from the most recent to the ancient. As a small- to medium-sized business owner, getting the most value out of your technology investments is crucial to getting your foot in the door and working your way toward bigger profits. From machine learning to Pokémon GO, no question is too trivial — ask us today!

Published with permission from TechAdvisory.org. Source.

Salesforce-Outlook add-on announced

According to Salesforce, an average sales rep spends more than 70 percent of their time each week in their email inbox. Despite this fact, email and customer relationship management (CRM) software has remained separate, forcing sales reps to toggle between them. Fortunately, we have some good news for small and medium-sized businesses: Salesforce will finally be integrated into Microsoft Outlook.

Salesforce and Microsoft have been working together for more than two years, and it has definitely been a win-win situation for everyone. In the latest development between these two tech giants, they’ve released a brand new product that promises to make the lives of sales representatives much easier. Lightning for Outlook, a flashy new add-on allows your sales team to access customer relationship management (CRM) software right from their Microsoft Outlook inbox without switching back and forth between the two applications.

The add-on accomplishes new levels of integration with Lightning Components, which allows for dragging and dropping of fields and elements from Salesforce directly into Outlook. For example, sales reps will be able to update a price quote with Salesforce’s SteelBrick — a Quote-to-Cash software — from within Outlook. This has been termed ‘snapping’. Just ‘snap’ the code you want to migrate into the appropriate Outlook account.

One of the most exciting new features, called Lightning Sync, enables users to automatically sync contacts and calendars across Salesforce and Outlook. “When you update a contact in Outlook, it’s reflected in Salesforce and on your mobile device,” said Greg Gsell, Salesforce’s director of Sales Cloud. “All devices and teams are immediately kept up to date.”

Both Lightning for Outlook and Lightning Sync are available now; the former is free for all Salesforce Cloud users, and the latter is free for users of Salesforce Cloud Lightning Enterprise Edition or higher. Lightning Components Framework — a UI framework for developing dynamic web apps, which gets integrated into Outlook, will be released later this year with pricing to be announced at a later date.

However, this doesn’t mean Lightning for Outlook will solve everything. This plugin simply makes it easier for the two programs to work together. Still, there is a maze of security, database and account management issues to navigate through to make this new feature work properly. At Ki Consultants, our experts are well-versed in email and CRM systems, so why not give us a call today and work smarter, not harder.

Published with permission from TechAdvisory.org. Source.

Do you speak “Data”?

Quick, what’s the most important thing about your business’s precious data? Besides knowing how to back it up properly and protect it from catastrophic loss, how about understanding all the lingo used to describe it? The term “big data” – in reference to large, complex data sets – is a well-known buzzword these days, but a slew of new “data” terms are in style now, too.

Data is the lifeblood of the information age. It gets observed, collected, organized, and analyzed, and it allows businesses to compete for profit and prosperity. And it takes many forms, each one unique and often vividly-named by the addition of a simple descriptive word.

As such, we thought a short glossary was in order to help keep you current on a handful of new data buzzwords and how they might impact your business.

Small Data

If “big data” is about powerful machines, huge databases, and sophisticated analytics, its little brother “small data” is about people. Small data takes a scaled-down approach to data mining that relies on things like social media to acquire important information. Archiving it is also simpler since a complex central data warehouse isn’t necessary.

Slow Data

The notion of “slow data” may seem a bit counterintuitive since processing ones and zeroes means things are happening fast. Some information, however, is actually acquired more slowly. Take, for example, the polar ice caps, where things literally move at a glacial pace. Since this kind of data doesn’t require frequent analysis it is suitable for back-up in its native format in a secure data lake.

Fast Data

We’re guessing you knew this buzzword was coming next, and it’s probably exactly what you thought it would be. “Fast data” refers to data events that happen fast – as in thousands of times per second – such as financial tickers or electrical sensors. Being able to act on it without delay is critical, so storing it immediately in a stable, easy to access location is a must.

Dark Data

Put simply, “dark data” is nothing more than day-to-day operational data that’s not getting used. It often refers to unanalyzed information in the form of customer call records, competitors’ price fluctuations, or website visitor trends. It can also include data that’s no longer accessible, such as when a storage device becomes obsolete. Your business can bring some of this redundant, out-of-date, or hidden data into the light with software designed to tidy things up.

Dirty Data

And speaking of tidying, here we finally have “dirty data.” While not quite as provocative as, say, dirty dancing or a dirty martini, it does have a tendency to arouse anxiety. But it’s actually not harmful to your data warehouse; it merely refers to a data set prior to its being “cleaned,” such as a leads list that contains duplicates, spelling mistakes, or formatting errors. The key is ensuring it gets spruced up before moving it into production.

If this index of buzzwords has left you wondering about the ways that different types of information affect your specific business, we’ve got answers. Setting up and managing your databases, super-secure backup strategies, and a thorough understanding of information technology are what we provide, so call or message us today.

Published with permission from TechAdvisory.org. Source.

7 things every Windows 10 user should know

Windows 10 stands tall as Microsoft’s best operating system release to date, hands down. But having undergone serious revamping, the OS is ready to rock and scroll. Boasting a myriad of new features, the updated Windows 10 is both efficient and effortless — fully capable of redefining your computing experience for good. Become a Windows 10 power user in no time with these seven tips:

Master virtual desktops

Virtual desktops allow for better utilization of screen space. You can span your applications and windows across multiple “virtual” desktops. Create one by clicking on the “Task View” icon (located at the right of the Cortana bar) on the taskbar, then click “+ New Desktop” in the lower right corner and add as many desktops as you wish. To move an application to a new desktop, merely drag it into the virtual desktop on the bottom.

Next-level screenshotting

The original screenshotting methods on Windows include Windows + Prt Scn, which captures the screen and saves it into the Screenshots folder; and Alt + Prt Scn, which captures the screen and copies it to your clipboard.

Introducing the new built-in Snipping Tool. On top of capturing a full screen screenshot, other capturing options range from a free-form rectangle to a specific aspect ratio or even an entire window as well. You can also set the capture to delay a screenshot by a set interval — this comes in handy when you want to screenshot a YouTube video minus the playback controls.

Shake and minimize

For users who aren’t aware of this trick, you can grab a window by its bar and literally shake your mouse. This causes all the other windows to automatically minimize.

Professional Windows snapping

Snapping windows to certain parts of the screen is ideal for multitasking. You can now organize and monitor different applications more seamlessly. Make the most of your screen space with the following tips:

Drag a window to the right or left to split it in half.
Drag a window to a corner to reduce it to a fourth of its size.
Drag a window to the top to maximize its size.

Record your screen with the Xbox app

After launching the Xbox app, go to the app you wish to record and press Windows + G. You’ll be prompted with a window that asks: “Do you want to open the Game bar?” Click on the “Yes, this is a game” box and let the recording begin!

Talk to Cortana like a person

Aside from typing your requests, you can also use natural language to ask Cortana to locate your vacation photos, or provide directions to your friend’s house. No date needed, just specific words and she’s all set. Cortana is also synced with your calendar, so if you’re ever unsure when your meetings are, Cortana will gladly double-check.

Automatic Battery Saver mode

When activating battery saver in Windows 10, you can limit your portable devices’ background activity and push notifications to prolong battery life. Battery saver also kicks in automatically once your battery life is lower than 20%. To customize your own power threshold as well as which applications you allow to run in the background, go to Settings > System > Battery saver — voilà!

Make the most of Windows 10 with these tips and upgrade your user status from regular to power. Regardless of what you’re using it for — arranging your meetings or planning your vacation — make each computing experience a memorable one. Want to hear more of the latest Windows 10 news and updates? Contact us today.

Published with permission from TechAdvisory.org. Source.

5 simple but manageable security measures

Don’t be put off by the tech jargon of security experts you find in forums and self-help books. A managed service provider is what you need to break down complex security ideas into easy-to-understand language. However, they generally focus on installing and managing protection software that’s often far too complicated to operate without their help. And when that’s the case, what can you do to improve the safety of your business and its data? Keep reading for 5 effective, down-to-earth cybersecurity measures that you not only need to know, but need to put into action

1. Two-Factor Authentication

Did an attacker get your password? With two-factor authentication they’ll still need your mobile device to do any damage. Here’s how it works: every time you log into a service that requires a password, the service will send a code to your mobile device for another layer of authentication. Nowadays, most internet services have this option: Google, Facebook, Twitter, Instagram, Skype, Slack, etc. Check a full list here to see if you could be using two-factor authentication on any of your online accounts.

2. Password Manager

Say goodbye to the bygone era of memorizing a long list of different passwords for the various websites and services you use. Password manager software may have been around for a long time, but it’s still a viable solution for improving your login integrity. After installing it, all you need to do is create one secure master password and let the software do the rest. It will store and encrypt all of your passwords in one place for future reference and help generate random, more secure passwords for any new logins.

3. Keep All Software Up to Date

Update all of your software and your operating system as often as possible — it’s that simple. New versions come with better protection and fix any newly discovered loopholes. If you are too busy or can’t find the time to do it, check for an automatic update option. Any excuse for postponing updates will feel a lot less valid when it means a security breach or system crash.

4. Disable Flash Player

Adobe Flash Player may be what allows you to play Candy Crush during your work breaks, but it has boasted such a poor security record that most experts recommend that users block the plugin entirely. Most internet browsers have the option to block Flash by default, while allowing you to enable blocked content you deem acceptable by simply right-clicking and selecting Run this Plugin.

5. HTTPS Everywhere

When dealing with technology, long acronyms tend to scare off novice users before they even make it to step two. But don’t panic, there’s only one step to this trick. ‘HTTPS Everywhere’ is a browser extension that forces your browser to automatically navigate to sites using a secured encryption, if the site allows it. The thing is, a significant percentage of websites offer HTTPS connections but don’t present them as the default. When that’s the case, ‘HTTPS Everywhere’ gives your browser a gentle nudge in the right direction.

While in-depth security measures need to be implemented and managed by experts, little steps like the ones listed here can be just as important. Check back often for more helpful cybersecurity tips, but if you have more urgent security needs for yourself and your business, our experts are ready and waiting to offer a helping hand — why not reach out to us today?

Published with permission from TechAdvisory.org. Source.

Benefits of using dual monitors

Have you ever witnessed your coworkers crazily straddle two computer monitors like madmen? Many find that working multiple monitors in this way is either intimidating or just plain weird. So it’s no surprise that such a set-up is unpopular. But even if you look like you’re preparing to launch rockets into outer space, that shouldn’t dissuade you from working with dual monitors altogether. Here are six reasons why working with two is better than one:

Enhanced productivity

Published studies conclude that by working with dual monitors, overall productivity increases by 20-50%. Computer programmers, for example, can use one screen for source coding and the other for programming; by using dual monitors, they no longer need to toggle back and forth between tabs. This reduces error and frees up time to complete more projects.

Better multitasking

Efficient multitasking requires adequate screen space to keep multiple applications simultaneously visible — a view that single monitors alone simply cannot accommodate. Workers who require computers, like customer service reps and web designers, would no longer waste time switching between tabs and resizing windows to fit the limited space; they could now focus on completing their tasks accurately and efficiently. .

Easier cutting and pasting

This reason resonates with jobs that call for creating newsletters or PowerPoint presentations. Dual monitors would eliminate the need for alternating between tabs and scrolling up and down as you work. Also, the enhanced visibility reduces chances of making mistakes and thus losing more time fixing them.

Image and video editing

With dual monitors, the days of stacking numerous editing tools on top of the image or video you’re working on are long gone. Instead of your screen looking like a game of Mahjong, you can put the editing tools on one screen and leave the image on the other. With better visibility, you’re less likely to commit errors and more likely to be finessed, and you’re not sacrificing valuable working time in the process.

Product comparison

You want to buy a camera, and you have two models in mind. It’s time to make a decision, so you have to compare their specs. If you had only one monitor, you’d need to go back and forth from one tab to another. But if you had two monitors, you could view the models side-by-side to help you clearly see their differences and make an informed purchase.

New gaming experience

Working hard means you get to play hard — what’s better than a gaming session? The answer is a relaxing gaming session on dual monitors! With more screen space, you can see enemies from afar, anticipate their actions, plan your retaliation, and attack!

Dual monitors benefits almost every industry because of the enhanced visibility, larger screen space, and how you can briefly nap behind them without getting caught Using dual monitors can enhance even your leisure time activities as well.

Broaden your horizons by getting in touch with us. We’ll answer any questions you have.

Published with permission from TechAdvisory.org. Source.

WordPress 4.5.3 fixes several security bugs

WordPress is one of the most popular and reliable content management systems on the market, and for this reason it is also one of the most frequently targeted platform for hackers. Websites that are running older versions of WordPress are often vulnerable to security breaches and data leaks. Seeking to correct a number of bugs, WordPress recently updated to version 4.5.3, a release that doesn’t provide much additional functionality but is highly recommended by the WordPress security team. Here’s what you need to know about their latest security update.

What’s new in WordPress 4.5.3?

The latest WordPress version includes fixes for more than two dozen critical vulnerabilities, including:

  • Redirect bypass in the WordPress customizer API
  • Two separate cross-scripting problems via attachment names
  • Information disclosure bug in revision history
  • Denial-of-service vulnerability in the oEmbed protocol
  • Unauthorized category removal from a post
  • Password change by stolen cookies
  • Some less secure sanitize_file_name edge cases

All vulnerabilities were found by members of the WordPress community. In addition to the security issues listed above, WordPress 4.5.3 fixes 17 maintenance issues from its predecessors 4.5, 4.5.1 and 4.5.2 (See full list).

WordPress update process

Many sites have an automatic background update, meaning that website admins will receive an email, confirming the update. If your website doesn’t support this feature, you can trigger manual updates by logging in to your WordPress dashboard and click on the ‘Please update now’ link, which is clearly visible on the top of the page.

Before you perform the update, however, we highly advise you to make a backup of your website. This is so that you can quickly restore your site in the event that something goes wrong. Once you have your backup ready, you can go ahead and update your site with the push of a button. Alternatively you can download WordPress 4.5.3 here and install it via File Transfer Protocol (FTP).

It’s important to update to the newest versions of WordPress to ensure that you have access to all of its functionalities and to keep your data and website visitors safe from potential security threats. Google will also demote websites that are running old versions of WordPress in its search results pages – all the more reason why you should regularly check for WordPress updates. If you have any questions about WordPress security, feel free to get in touch with our experts today.

Published with permission from TechAdvisory.org. Source.

Microsoft Office 365 ravaged by ransomware

The Internet is a powerful platform that brings people together on a global level while giving them access to a wealth of information anytime they please. With the good, comes the bad – some utilize their skills in committing cyber crimes from the comfort of their own homes. Case in point, the recent Cerber ransomware attacked that ravaged millions of Microsoft Office 365 users worldwide. Here’s what a security expert and Microsoft had to say about the matter:

Steven Toole, a researcher for the cloud-security firm Avanan, detailed that his company experienced the first attack at 6:44 a.m. on June 22nd. Another interesting fact is that at least 57 percent of all Microsoft Office 365 customers on Avanan’s platform received at least one phishing attempt that contained the infected attachment. While Avanan did extrapolate the number of Office 365 users involved, the exact number has yet to be revealed.

This is particularly interesting since according to Microsoft’s first quarter reports in 2016, there are over 18.2 million Office 365 subscribers worldwide. On top of the global scale in which the attacks took place, it took Microsoft over 24 hours for the attack to be detected and for any attempts to block the attachment to be made.

Microsoft’s side of the story shares many similarities with slight differences on the detection and actions made about the ransomware attack. In an email to SCMagazine.com, the spokesperson wrote:

“Office 365 malware protection identified the attack and was updated to block it within hours of its origination on June 22. Our investigations have found that this attack is not specific to Office 365 and only a small percentage of Office 365 customers were targeted, all of which have been protected.”

The point is Office 365 was compromised, regardless of how quickly it was detected – many people were asked for a ransom and were told that their files have already been encrypted. Still wanting to come across as polite, the ransom came with an audio recording that detailed what the attack was and what measures must be taken in order to regain access to the files. The unknown attacker asked for a ransom of 1.4 bitcoins or an equivalent of $500 in exchange for the decryption key.

Toole noted that “This attack seems to be a variation of a virus originally detected on network mail servers back in early March of this year,” He also added that “As it respawned into a second life, this time Cerber was widely distributed after its originator was apparently able to easily confirm that the virus was able to bypass the Office 365 built-in security tools through a private Office 365 mail account.”

This proves that cyber criminals go to great lengths to not only use their tools but to improve on them and eliminate flaws. So no matter how many firewalls, passwords or fire-breathing dragons you have to guard your servers and networks, without the right network security measures in place, chances are they’ll manage to find a way to overcome the hurdles and wreak whatever havoc they can.

Network security isn’t something to be taken lightly, if you are unsure about how safe or how capable your systems are in fending off cyber threats – get in touch with us. Our experienced and friendly staff will help you with any ransomware or security-related issue you have.

Published with permission from TechAdvisory.org. Source.

Windows puts bloatware in the crosshairs

Even an IT novice can recognize the scourge of ‘bloatware’ on new hardware. It doesn’t matter what type of new gadget you’ve purchased, it’s bound to come loaded with unnecessary apps and software that the manufacturer believes will drive you to purchase more of their products. And while they aren’t impossible to remove, those pesky programs can take a lot of time to get rid of. With Microsoft’s new ‘Refresh Windows’ tool you can send all of them back from whence they came in just two easy steps.

If this software isn’t trying to drive you back to the manufacturer’s sales stream, it’s paid a hefty chunk of change to be included on off-the-shelf hardware. Regardless of which it is, it’s not there to help you — it’s there solely to increase the manufacturer’s bottom line. So if you think bloatware just isn’t enough of a concern to waste time refreshing your Windows install, consider that PCs without it start up 104% faster, shutdown 35% faster and have approximately 30 more minutes of battery life.

Because this isn’t a new problem, we’ve seen similar removal tools in the past, but they didn’t offer the same level of usability. When using Windows 8’s ‘Refresh and Rest’ the bloatware either wasn’t removed, or if it was, Windows required the reentry of a license key and a lengthy install completely from scratch. ‘Refresh’ Windows swiftly replaces everything on your hard drive with a fresh version of the OS as if it came straight from Microsoft.

Although this tool is best suited for clearing unwanted programs off of your machine right after you’ve purchased it, there’s no reason that you can’t use it further down the road. You might be thinking, “No way, I’ve got way too much important information to sacrifice it all just for a clean install.” Well depending on the extent of your data, that isn’t a problem.

When you open the ‘Refresh Windows’ client there’s only one option you need to select before moving forward, ‘Keep personal files only’ or ‘(Keep) Nothing’. Selecting the former will keep everything stored in your ‘Music’, ‘Pictures’, ‘Videos’ and ‘Documents’ folders. Remember that documents (in these folders) created or edited using Microsoft Office will be kept but the Office suite itself will be removed. Make sure you still have the licenses and installation disks for every piece of software you plan to use after the refresh.

This new feature will accompany next month’s Windows update, but users who just can’t wait to squash annoying ‘crapware’ can find the tool here. Simply download, open, and choose if you want to keep any personal files — one, two, done.

You may be able to adequately navigate your way around a Windows machine, but there are often shortcuts that insiders use to speed up otherwise mundane management tasks. For any Windows projects or problems you have, drop us a line, we’ll have them fixed faster than you can uninstall that CD-burner utility that you never asked for.

Published with permission from TechAdvisory.org. Source.