Month: January 2017

The countdown begins for Windows 7 users

As the saying goes: Out with the old, in with the new. That’s exactly what Microsoft is encouraging Windows 7 users to do as soon as possible. It’s been reported that Windows 7 in 2017 is so outdated that patches are unable to secure it anymore. Maybe it’s the nostalgic qualities that make it hard for users to take the leap. But sentiments aside, Windows 10 is the way to go.

Windows 7 was given extended support in 2015. And with that, Microsoft warned its users that this outdated version would drive up operating costs due to remediating software attacks that Windows 10 systems could otherwise avoid. The three-year countdown toward Windows 7’s twilight officially kicks off with a warning to enterprises that they could face hefty fines for sticking with the platform’s outdated security.

According to Markus Nitschke, head of Windows at Microsoft Germany: Windows 7 does not meet the requirements of modern technology, nor the high security requirements of IT departments. How would this make current Windows 7 users feel? Why are users choosing to remain faithful to the platform’s outdated security? Users can delay upgrades until January 13, 2020, after which extended support for the 2009 OS will end and it will no longer receive patches — unless the customer is paying for a pricey Microsoft Custom Support Agreement.

Markus also added that “As early as in Windows XP, we saw that companies should take early steps to avoid future risks or costs.” The message came as Microsoft published studies that showed Windows 10 Anniversary Update’s built-in security managed to neutralize zero-day exploits, even without patches needed to protect earlier versions of Windows.

Failing to upgrade to Windows 10 means that you and your networks will miss out on noteworthy security features such as the Windows Hello biometric login, the AppContainer sandboxing technology, and Windows Defender Advanced Threat Protection, which will gain new features after upcoming Creators Update.

On top of missing out on all the security features that Windows 10 has to offer, enterprise organizations on Windows 7 soon won’t have the additional zero-day protection that EMET, or the Enhanced Mitigation Experience Toolkit, offered since 2009. Last November, EMET’s expiration date was extended from January 2017 to July 31, 2018.

With the help of newer tools, migrating from Windows 7 to Windows 10 is considerably easier when compared with migrations from XP. Microsoft is still urging corporate users to make the shift before Microsoft permanently terminates support for Windows 7, stating that their business could be looking at real trouble if they fail to comply.

Business owners always do their best to ensure the future of their organization. That includes knowing which tech resources to rely on and which ones to avoid. If you still have questions about Windows 7, feel free to give us a call.

Published with permission from TechAdvisory.org. Source.

Browsers leak sensitive info to hackers

The Autofill feature fills a void in the web browsing habits of many. It eliminates the need to enter all your details when logging on your social media accounts or when checking out your basket after e-shopping. On Chrome and Safari browsers, however, danger lurks when you rely too much on autofill. Without knowing it, you may be exposing personal information to hackers who have found a way to steal your credit card info and shop at your expense.

How do they do it?

By concealing other fields in a sign-up form, users are tricked into thinking they only have to fill out a few fields. The trickery at work is that upon auto-sign up, other fields, which could include your billing address, phone number, credit card number, cvv (the 3-digit code used to validate credit card transactions), and other sensitive information, are auto-filled with the user none the wiser.

This sinister trick is nothing new, but since there hasn’t been any countermeasure since it was first discovered, the threat it poses is worth emphasizing. Finnish whitehat hacker Viljami Kuosmanen recently brought to light how users of Chrome and Safari are particularly vulnerable, and he even came up with a demonstration of how this phishing technique is perpetrated. The technique is so sneaky, it’s enough to make one give up online shopping forever.

Using plugins and programs such as password managers is also fraught with the security risk, as having access to such a utility empowers cyberthieves to do more than just obtain your credit card info; it opens them up to a great amount of personal details.

Preventing an autofill-related theft

So what can you do to avoid falling prey?

Using Mozilla Firefox is one of the easiest available solutions. As of today, Mozilla hasn’t devised a mechanism that affords its users the same convenience that Chrome and Safari users enjoy with autofill. When filling web forms on Firefox, users still have to manually pre-fill each data field due to a lack of a multi-box autofill functionality – a blessing in disguise, given the potential for victimization in autofill-enabled browsers.

Another quick fix is disabling the autofill feature on your Chrome, Safari and Opera (for Apple mobile devices) browsers. This would mean that when filling out web forms, you’d have to manually type responses for every field again, but at least you’d be more secure.

It’s not exactly the most sophisticated form of online data and identity theft, but complacency can result in being victimized by cyber swindlers. Take the first step in ensuring your systems’ safety by getting in touch with our security experts today.

Published with permission from TechAdvisory.org. Source.

Why your business needs CRM

The right technology investment can lead to business success. With customer relationship management (CRM) software at the helm of your sales and marketing efforts, you can nurture long-lasting business relationships and improve your bottom line. If you need a little bit more convincing, we’ve compiled five more reasons why your business needs CRM.

Grows with your business
The ol’ Rolodex may have been useful for managing a few clients, but you’re going to need a better solution if you plan to maintain relationships with hundreds, possibly thousands, more. CRM scales with your business, meaning it can handle larger data sets and more clients as you expand your sales operation.

Organizes your data
CRM software acts as a central database for all your sales records and transactions. This means important customer information can be retrieved in just a few clicks rather than rifling through thousands of documents, sticky-notes, and disorganized cabinets. And since CRM is hosted in the cloud, sales data, customer interactions, and other actionable information are available for the entire company.

Improves customer service
Your sales team could be the most persuasive individuals in the world, but this means nothing if they can’t recall anything about their clients and their preferences. When your sales staff follows up on leads or existing customers, CRM will automatically retrieve contact history, past purchases, and customer preferences from your client database and display them on a single page during the call.

From here, sales representatives, armed with detailed customer information, will be able to recommend products and services that meet the client’s needs. So instead of struggling through a sales call, marketing employees can focus on delivering a professional sales pitch.

Streamlines your sales funnel
CRM comes equipped with workflow management functions, supporting your sales pipeline in a number of ways. For example, you can configure your CRM to send instant follow-up emails when a lead visits a particular product page. You can even use automation to track where certain leads are in the sales pipeline and delegate the task to one of your closers.

Analyzes sales data
With real-time sales information, business managers can track marketing campaigns and adjust their strategy accordingly. For instance, you might notice that click-through-rates for promotional emails and company newsletters are higher during Tuesday afternoon rather than Friday night. Having this information can help you focus your marketing efforts and message to generate more leads.

In addition, you can use CRM to analyze customer calling activity, market demographics, lead conversion rates, and key performance indicators to help inform future business decisions.

Understanding your customers can put you several steps ahead of the competition. If you need to manage contacts, eliminate time-consuming procedures, and improve your sales performance, CRM is the perfect business solution.

Contact us today to find out whether CRM is the right fit for your business.

Published with permission from TechAdvisory.org. Source.

Fruitfly: the latest Apple malware

For decades, Apple has enjoyed a reputation of being nearly invulnerable to threats of malware. That may be an exaggeration, but there is a bit of truth to it. However, if you’re using Apple devices in your organization, you can’t afford to take this exaggeration for granted. We’re only just easing into 2017 and we’ve already seen the first Apple malware of the year. Read on to find out more.

Where did it come from?

Dubbed ‘Fruitfly’ by the powers that be at Apple, it looks as though this relatively harmless malware has been hiding inside of OS X for several years. Fruitfly contains code that indicates it was adapted to move from a previous build of OS X to ‘Yosemite,’ which makes it at least three years old.

In fact, there are some lines of code from a library that hasn’t been used since 1998. It’s possible these were included to help hide Fruitfly, but experts have no idea how long it has been holed up inside the infected machines, or who created it.

What does it do?

So far, most of the instances of Fruitfly have been at biomedical research institutions. The administrators who discovered the malware explained that it seems to be written to grab screenshots and gain access to a computer’s webcam.

Considering the specific nature of its victims, and what it can accomplish, Fruitfly seems to be a targeted attack that won’t affect the majority of Mac users. However, Apple has yet to release a patch, and dealing with malware is not something to be put off for another day.

How should I proceed?

We’re always harping on the importance of network monitoring, and now we finally have proof that we are right. Fruitfly was first discovered by an administrator that noticed abnormal outbound network traffic from an individual workstation. Until Apple releases a patch, a better-safe-than-sorry solution is to contact your IT provider about any possible irregularities in your network traffic.

If you don’t have a managed IT services provider, this is the time to start considering one. Despite misconceptions, Apple devices need just as much care and attention as Microsoft and Linux PCs. And it’s not just security; if you want to optimize workstation performance, create a disaster recovery plan, or upgrade your database. Message today to get started.

Published with permission from TechAdvisory.org. Source.

Utilizing Google’s Cloud Print service

When you picture cloud computing and printing devices, you might think of endless copies of clouds flying out of the printer. But that analogy wouldn’t quite apply for Google’s Cloud Print service, though. This cloud-computing hybrid allows you to access both regular and internet-enabled printers through the Internet. What are the benefits? Are they worth looking into? Read on for additional insight.

First things first, the printer needs to be connected to your primary computer (the one you’ll use to access the printer in the future). Once connected, the computer can be added to Cloud Print. If it isn’t already installed, you need to install Chrome for Windows or Mac. From there, type chrome://devices into the address bar to bring up devices Chrome can work with. Click “Add printer” and make sure the printer you want to link is ticked.

From the same screen, you’ll be able to configure printer settings. Click Manage next to any of the listed printers to upload new print jobs, rename or remove printers, or share a printer with someone else. This allows you to give certain people access to your printer.

If you need to print something off your mobile device, you can do so with the Cloud Print app on Android, where a print option should appear in the Sharing menu. It’s slightly trickier on iOS, but you can still cloud print from Google’s iOS apps using the Google-recommended file management, transfer and printing application PrintCentral Pro to bridge the gap. And as expected, Cloud Print works seamlessly with Chromebooks as well. Just choose Print from the main menu and voila!

If you’re interested in hearing more news on Google’s Cloud Print function or staying up-to-date on the IT world, feel free to let us know.

Published with permission from TechAdvisory.org. Source.

Simplify calendar sharing with Office 365

Knowing your friend’s schedules comes in handy when you’re trying to arrange a reunion, and the same can be said for businesses. Through calendar sharing, employees can simultaneously arrange meetings, prioritize projects and set schedules for contacting customers. Unfortunately, it isn’t as easy as it sounds. Recently, Microsoft made changes to its calendar sharing function that might make things a little simpler. Here are some of them:

Simplicity
Users’ first impression of the new model is that it’s much simpler. To share your calendar, simply click the Share option in the calendar menu bar and then enter the names of people with whom you wish to share. With a few clicks, you can decide who gets to see your schedule and how much of it they can view. On top of that, you’ll be able to nominate users who create appointments or accept meeting requests on your behalf – when the update rolls out in early 2017.

What sharers get to see
Once a user accepts a sharing invitation, the calendar is then added to the set they open. The invitation needs to be accepted using an updated client in order for the embedded instructions to be properly processed. Depending on how much you’re willing to share, the calendar allows you to either show full details of your schedule or just certain parts of it.

Mobile devices included
Besides the new sharing interface, this model extends into mobile devices where Outlook for iOS, Android, and Windows 10 Mobile will be able to view and edit shared calendars for the first time. And because calendar events are time-sensitive, changes will be executed and synced immediately, ensuring that your calendar is always accurate.

Immediate synchronization is available for OWA and mobile clients. For Mac users, Outlook continues to use periodic synchronization. This is used to share calendar information with users outside of your Office 365 tenant.

Updates: Outlook for Mac
Known as the black sheep of the Outlook family, implementation features of Outlook for Mac generally differs from the way things are done in other clients. Fortunately, Outlook for Mac’s calendar sharing function is being upgraded, with changes that include:

  • Intuitive UI to match other Outlook clients, including the addition of an Accept button to simplify calendar sharing invitations.
  • Shifting away from the Mac-specific local linked calendars, roaming shared calendars reads data from Exchange Online to ensure the same set of shared calendars are visible across all devices.
  • Immediate synchronization will replace periodic synchronization.

Even the tiniest details — calendar sharing included — have the potential to greatly impact the outcome of your business. If you have questions or concerns about managing various aspects of Office 365, feel free to get in touch today.

Published with permission from TechAdvisory.org. Source.

Window 10’s biggest flaws addressed

In the past year, Microsoft was heavily criticized for forcing the Windows 10 OS update on PC users. After thousands of customer complaints, the tech giant vowed to make changes and appease disgruntled end users. With the new year are signs that the firm is finally tending to these problems. Here are some of them:

A patch and a glitch away
Users couldn’t escape the glitches in the frequent Windows 10 updates, which caused an array of problems such as frozen systems, broken webcams, and even PCs being unable to secure an Internet connection. In light of the patching dilemma, Microsoft is offering more options to defer updates. In fact, a leaked preview shows a new option to pause updates for up to 35 days via a switch in the Settings menu.

OneDrive placeholders
Since the launch of Windows 10, many users have eagerly awaited Microsoft to re-introduce this beloved feature to the operating system’s built-in OneDrive cloud storage service. In Windows 8.1, placeholders (aka Smart files) allowed users to see all their OneDrive files, whether or not they were stored on the device. Making its return in Windows 10 File Explorer when using OneDrive, the feature shows user files stored locally as well as on the cloud.

Owning up to the update fiasco
Not only is Microsoft addressing the various complaints it received, but it’s also owning up to some of them. Just before Christmas, Microsoft’s chief marketing officer, Chris Capossela, admitted that the company had gone too far when it tried to get Windows 7 and 8 users to upgrade to Windows 10. This referred to Microsoft’s decision in early 2016 to change the design for the user prompt for its Get Windows 10 app, the software responsible for scheduling upgrades. The user prompt was altered so that clicking X to close the window causes the user to unknowingly agree to a Windows 10 upgrade. This change puts Microsoft in direct violation of its own user experience guidelines for developers on dialog box design.

“Within a couple of hours of that hitting the world, we knew we had gone too far,” recalled Capossela. “Those two weeks were pretty painful and clearly a lowlight for us.” It was then that Microsoft reversed its decision on tweaking the pop-up, so clicking on X would dismiss the upgrade.

It seems that 2017 is the year that Microsoft will start listening more to its users and addressing their complaints. Maybe: Hopefully this renewed strategy will benefit users sooner rather than frustrate them later. Contact us and we’ll keep you up-to-date with the latest Microsoft updates.

Published with permission from TechAdvisory.org. Source.

Cyber security and managed services

Cyber security is something you hear about a lot these days. Sometimes it’s thrown around to scare business owners, other times it has proven to be a cautionary tale, one that small businesses can learn from to fend themselves from online threats that can leave devastating impact. What’s certain is statistics don’t lie, and as much as you’d like to believe your business is safe, the worst could happen at any time. Because antivirus software alone can only do so much to protect your business, managed services has become the solution. To make our case, here are several statistics that prove you need managed services from a technology provider.

The numbers

Small businesses are not at risk of being attacked, but worse, they’ve already fallen victim to cyber threats. According to Small Business Trends, 55 percent of survey respondents say their companies have experienced cyber attack sometime between 2015 and 2016. Not only that, 50 percent reported they have experienced data breaches with customer and employee information during that time, too. The aftermath of these incidents? These companies spent an average of $879,582 to fix the damages done to their IT assets and recover their data. To make matters worse, disruption to their daily operations cost an average of $955,429.

The attacks

So what types of attack did these businesses experience? The order from most to least common are as follows: Web-based attacks, phishing, general malware, SQL injection, stolen devices, denial of services, advanced malware, malicious insider, cross-site scripting, ransomware and others.

Why managed services?

Managed services is the most effective prevention and protection from these malicious threats. They include a full range of proactive IT support that focuses on advanced security such as around the clock monitoring, data encryption and backup, real-time threat prevention and elimination, network and firewall protection and more.

Not only that, but because managed services are designed to identify weak spots in your IT infrastructure and fix them, you’ll enjoy other benefits including faster network performance, business continuity and disaster recovery as well as minimal downtime. One of the best things about managed services is the fact that you get a dedicated team of IT professionals ready to assist with any technology problems you might have. This is much more effective and budget-friendly than having an in-house personnel handling all your IT issues.

Being proactive when it comes to cyber security is the only way to protect what you’ve worked hard to built. If you’d like to know more about how managed services can benefit your business, just give us a call, we’re sure we can help.

Published with permission from TechAdvisory.org. Source.

Why consider disaster recovery for 2017

The new year is well upon us, and with it comes an equally new IT budget. Judging by the advancements in computing technology, many 2017 business wish lists probably include powerful onsite servers, workstations, and the Internet of Things. But as tempting as these purchases may be, it’s important that you don’t dismiss an old yet essential IT resolution: disaster recovery.

DR isn’t a huge investment
A common misconception about disaster recovery is that it’s a large, bank-breaking investment. Expensive secondary data centers, networks, and server maintenance usually come into mind when a business owner is confronted with the idea of business continuity. And while that may have been true in the past, establishing a strong disaster recovery plan today is as simple — and as cheap — as going to a cloud-based disaster recovery provider and paying for the data and services that your business needs. Subscription pricing models are actually incredibly low, meaning you can have minimal downtime while still having enough to invest in new tech.

Onsite backups just won’t cut it
Although you might feel secure with a manual backup server down the hall, it is still susceptible to local disasters and, ultimately, does very little in minimizing company downtime. When disaster recovery solutions are hosted in the cloud or in a virtualized server, restoring critical data and applications only take a few minutes.

Business disasters can be man-made, too
Even if your workplace is nowhere near frequent disaster zones, cyber attacks and negligent employees can leave the same impact on your business as any natural disaster can. Setting a weak password, clicking on a suspicious link, or connecting to unsecured channels is enough to shut down a 5-, 10-, or even 50-year-old business in mere minutes.

Sure, installing adequate network security is a critical strategy against malicious actors, but last year’s barrage of data breaches suggests that having a Plan B is a must. A suitable disaster recovery plan ensures that your data’s integrity is intact and your business can keep going, no matter the malware, worm, or denial-of-service attack.

Downtime will cost you
A business without a DR plan might come out unscathed after a brief power outage, but why risk the potential damages? Either way, downtime will cost your business. First, there’s the general loss of productivity. Every time your employees aren’t connected to the network, money goes down the drain. Then there’s the cost of corrupted company data, damaged hardware, and the inevitable customer backlash. Add all those variables together, and you end up with a business-crippling fee.

So, if you want 2017 to be the best year for your business, make the smart choice and proactively take part in creating your company’s business continuity plan. Your business will be in a better position financially with it than without it.

Keep your business safe, recover from any disaster, and contact us today.

Published with permission from TechAdvisory.org. Source.

Flaw allows thieves to open locked iPads

Have you ever worried about your tablet’s security? If not, you should. Networked gadgets are becoming increasingly interconnected every day, and just one social media account saved on a compromised iPad could lead to breaches on any number of other, more sensitive devices. If you own one of Apple’s popular tablets, you need to know about a newly discovered flaw that allows thieves to bypass security measures and access your device.

iPad owners who find themselves in the unfortunate situation of having their device stolen have the option to activate Apple’s Find My iPhone feature from icloud.com. If an iPad has this setting turned on, its GPS can be activated from any web browser to inform the owner where it is located.

Furthermore, if a user is concerned that the tablet may have been stolen, he or she can remotely lock the device. From the moment it is locked, the device can only be accessed by logging into the corresponding icloud.com account.

It’s a wonderfully intuitive feature, and tens of thousands of iPad owners have prevented data theft since it was first introduced by Apple in 2010. Unfortunately, security researchers recently announced a critical flaw that allows common thieves to totally bypass the remote lock feature simply by flooding login data fields with too many characters.

Apple is aware of the issue and has taken steps to address it with an operating system update. The latest version of iOS has fixed the issue for iPhones, but not for iPads.

Although we anticipate a patch to fix this flaw in the near future, the best way to avoid this predicament is to keep valuable data backed up separately from your iPad. One of the Find My iPhone options is to remotely wipe the device, which means as long as you aren’t permanently losing valuable data, the worst case scenario is losing nothing more than the tablet itself.

The more mobile our technology becomes, the more susceptible it is to physical security threats. It’s important to secure your devices not only from networked threats, but also from everyday ones, like someone nabbing your iPad while you step away from the table to order a coffee. For across-the-board security solutions and consulting, get in touch with us today.

Published with permission from TechAdvisory.org. Source.