Month: February 2018

Tips for using Outlook more efficiently

Outlook is arguably the best tool that businesses use to manage their email, set up meetings, and coordinate projects. It’s much more than a basic email program and includes features that help you organize your work, contacts, and business communications. Let’s take a look at a few tips you may have missed.

Clean Up your inbox
No matter inbox how meticulously organized your Outlook inbox is, there’s always room for improvement. For a little computer-assisted help, try the ‘Clean Up’ feature.

  • From your Inbox, click the Home tab and choose from Outlook’s three Clean Up options:
    • Clean Up Conversation – Reviews an email thread or a conversation and deletes redundant messages.
    • Clean Up Folder – Reviews conversations in a selected folder and deletes redundant messages.
    • Clean Up Folder & Subfolders – Reviews all messages in a selected folder and its subfolder, and deletes redundant messages in all of them.

Ignore (unnecessary) conversations
An overstuffed inbox is often caused by group conversations that aren’t relevant to you. The Ignore button helps you organize your inbox and focus on relevant emails.

  • Select a message, then click Home > Ignore > Ignore Conversation. You can also do this by opening a message in a new window and clicking Ignore under the Delete function. To recover an ignored message, go to the Deleted Items folder, and click Ignore > Stop Ignoring Conversation.

Send links instead of a file copy
Help your colleagues save storage by sending a link to a cloud version of a file instead of the file itself. This is particularly useful when sending massive files. You can also set permissions to allow recipients to edit and collaborate on linked files in real time.

  • Upload the file you wish to send on OneDrive and send it to your recipients. From the message box, click Attach File > Browse web locations > OneDrive.

Improve meetings with Skype and OneNote
Outlook allows you to combine Skype’s HD video and screen-sharing features with OneNote’s organizational and project planning functions. It’s easy:

  • Go to the Meeting tab in Outlook, then click Skype meeting and send the link to participants. After the meeting has started, select Meeting Notes (under the Meeting tab) and choose whether you want to Take notes on your own or Share notes with the meeting.

Tag contacts
To get the attention of a specific person in a group email message, use the @Mention function. This works particularly well for mails to multiple recipients or for if you simply want to convey the urgency of your message.

  • In the email body or meeting request, type the ‘@’ symbol followed by the first and last name of the person you wish to tag (e.g., @firstnamelastname).
  • To search for emails you’re tagged in, select Filter Email from the Home tab and choose Mentioned, then choose Mentioned.

These are just a few strategies for getting more out of Microsoft’s email platform. To unlock Outlook’s true potential, you need the support of certified IT professionals. Give us a call today.

Published with permission from TechAdvisory.org. Source.

Windows 10 Home, Pro, or 10 S?

When buying new hardware, you have to choose which operating system (OS) to install. And if you go with Windows, you’ll have to make even more decisions, as there’re Windows 10 Home, Pro, and 10 S. Although they contain many similar features, there are significant differences between them. Here’s a quick rundown of each OS version.

Windows 10 Home
This version, as you may have guessed, is designed for home and personal use. It comes bundled with key Windows 10 features, including Microsoft Edge, Office 2016, smart pen support, and the Cortana voice assistant. Since Microsoft is pushing their cloud services, Home also provides 5GB of cloud storage in OneDrive for individual users.

In terms of security, Home has fairly basic protections. It has Windows Defender Antivirus software, Windows Hello biometric logins that use face or fingerprint authentication, and rudimentary device encryption to minimize data breaches. Those with multiple Windows devices will also love the mobile device management app, which allows them to track and control app usage for connected smartphones and tablets.

To explore new apps, Home users can sign up for the Windows Insider program, but since this version is light on features, there is usually a limited selection of early release apps to play with.

Windows 10 Pro
If you plan to use your computer for work, the Pro version is the right OS for you. One of its most notable features is Hyper-V, which allows you to create virtual machines (VMs) on Windows 10. These VMs can be used to deliver computing resources from a powerful computer to other machines connected to the network, making resource provisioning a breeze.

Considering that businesses are usually targeted by cybercriminals, Pro offers more robust security than Home. In addition to Windows Defender, this version comes with whole disk encryption, Enterprise Data Protection, and Azure Active Directory — an identity management service used to set up and enforce access policies for apps and devices.

Rolling out updates for all computers is also incredibly easy with Pro’s Windows Update for Business service. From a central console, you can manage how and when Windows 10 devices are updated while making sure that the bandwidth used doesn’t disrupt day-to-day operations.

Windows 10 S
Released in 2017, Windows 10 S is focused on simplicity, security, and speed. Feature-wise, it’s about the same as Home, offering Office productivity apps and Cortana. But it comes with Pro functions such as virtual machines and increased security, too.

While it doesn’t possess as many features as Pro, Microsoft reported that 10 S-powered computers boot 15 seconds faster than Pro machines. Its relatively low hardware requirements also make it perfect for startups and schools that tend to purchase low-cost PCs. And if you want more features, 10 S allows you to upgrade to Pro at an affordable price.

The big difference between 10 S and the other Windows 10 versions is that it can only run applications available on the Windows Store. Although this restriction means you don’t get to enjoy third-party apps, it actually protects users from downloading dangerous apps and helps Microsoft easily root out malware.

So far, only a few devices — including the Surface Laptop, Lenovo V330, and HP Stream 14 Pro — are capable of running 10 S, but it’s only a matter of time before other devices are compatible.

Still not sure about which Windows 10 version you should purchase? Contact our experts today to get more advice. We’ll even install and maintain Windows for you so you can focus on being productive!

Published with permission from TechAdvisory.org. Source.

Tech support scam alarms Chrome users

With evolving technology comes evolving threats. Recently, a researcher revealed that a new type of scam freezes Google Chrome and tricks users into believing that their network security has been compromised. Little did they know that following instructions listed on the screen will lead to an actual security breach.

The End Game

The scam works by displaying an error message indicating a bogus security breach incident that renders a browser unusable. These scammers capitalize on the fact that a serious crash can’t be solved by simply closing the site, thereby sending the users into a panic. This encourages them to dial the number listed on the warning message.

On the other end of the line, the scammers would pose as Microsoft or Apple representatives to convince users into surrendering their credit card details to repair a non-existing security issue. The scams are generally carried out through legitimate sites or malicious ads that have been hacked.

The Ingenious Process

This new scam operates against Chrome by corrupting the window.navigator.msSaveOrOpenBlob programming interface, which basically uses it as a form of distraction. The hackers manipulate the browser and forces it to save a random document on a disk repeatedly at super fast intervals that are impossible to notice. After five to 10 seconds, Chrome will be completely unresponsive.

The Easy Fix

To recover, Windows users simply have to open Windows Task Manager (press ctrl + shift + esc keys) and stop the process there. On the other hand, macOS users just need to wait until a system message prompts them to close the unresponsive Chrome tab. Typically, the latter is a more appealing option since users would have the freedom to close only the corrupted page. Manually closing the whole browser means possibly losing unsaved files in any open Windows.

When faced with IT-related issues, you need to determine how you can approach them calmly. The threats in the digital world may be terrifying and intimidating, but causing a panic in your workplace isn’t the answer. Call us as soon as any problems arise, and we’ll help you as soon as we can. We can even hook you up with other security measures to beef up your network security.

Published with permission from TechAdvisory.org. Source.

Protect your Mac from security threats

Mac users follow certain steps to maintain privacy and protect company data. But if you’re too busy or short on resources, you might place security lower on your to-do list. Whatever your reason, the threat is real and you need to take steps to protect yourself.

Check your Privacy Settings

Begin by making sure that your Mac settings are set up properly to keep your information safe. Click System Preferences (the gear icon along the bottom of your screen), then open the Security & Privacy pane, which contains four tabs that allow you to manage different security features. You should do this with an administrator account so the changes affect everyone who uses this computer.

Take Advantage of the Firewall

One of the biggest steps you can take to protect your computer is to enable macOS’s built-in firewall to block unwelcome network connections. Just go to the Firewall tab in the Security & Privacy settings, click on the padlock at the bottom of the screen, and key in your username and password. Then enable firewall by clicking on Turn On Firewall.

To modify its settings, click on Firewall Options just below the Turn Off Firewall button. A dialog box will pop up and you can click on Enable Stealth Mode. Turning on Stealth Mode will make your Mac invisible on public networks (like an unsecured coffeeshop WiFi).

In the Firewall Options, you will also find a list of services and apps that are allowed to receive inbound connections. If you want to add an app or service to the list, just click the ‘+’ button below the list itself. However, we recommend keeping this list as short as possible because any app connected to the list can be exploited.

Set Up a Firmware Password

Nowadays, macOS/Mac OS X automatically turns on FileVault encryption. This means that it encrypts the hard drive by default, and the only way it can be accessed is by logging in. Keep in mind, though, that this feature won’t necessarily save your account in case someone reinstalls macOS/OS X, or when they use a USB memory stick to boot the Mac and possibly remove all data from your hard disk.

To increase protection, set up a firmware password. To do so, restart your computer, and then press and hold down Cmd+R before the Apple logo shows up on screen. You can let go of the keys once the progress bar pops up.

Choose your location and language when asked, then click on the Utilities>Firmware Password Utility menu. Simply follow the instructions here, and make sure to never forget or misplace your password. Forgetting your firmware password can be quite a hassle because only Apple technicians can recover it.

Ensure that your confidential data remains confidential simply by performing minor tweaks on the system settings. It takes only a few minutes of your time to ensure lasting online protection. If setting up a firewall or firmware password sounds a little too advanced for you, don’t hesitate to get in touch with our experts.

Published with permission from TechAdvisory.org. Source.

Are hackers using your PC to mine Bitcoin?

Cryptocurrencies like Bitcoin and Monero are so popular because they’re secure and potentially worth thousands of dollars. But investors and consumers aren’t the only ones interested in them. Hackers are using malicious tactics to steal cryptocurrency, and they’re doing it with something called cryptojacking.

Hijacked hardware
Cryptojacking secretly uses your computer to calculate complex mathematical problems to generate cryptocurrency. They get inside by using phishing emails to lure victims into clicking on a link, which then runs malicious cryptomining programs on the computer. Any cryptocurrency produced then gets delivered to the hacker’s private server.

But hackers have developed an even more insidious tactic. By infecting websites with ads and plugins that run cryptojacking code, any visitor who loads the web page instantly gets infected with the malware, sending their computer’s processor into overdrive trying to generate cryptocurrency.

Unlike most malware, cryptojacking software won’t compromise your data. But it will hijack your hardware’s processing power, decreasing performance while increasing your power and cooling bills. So instead of paying for the computing power themselves, hackers can simply use thousands of compromised computers.

Surge in cryptojacking
It’s difficult to tell how much hackers are making with cryptojacking, but there’s a good chance that this type of attack will be as popular as ransomware was in 2017. In fact, for as little as $30, anyone can purchase a cryptojacking kit from the dark web to force other computers to generate Bitcoin or Monero for them.

According to several reports, even sites like The Pirate Bay, Openload, and OnlineVideoConverter are allegedly using cryptojacking exploits to diversify their revenue streams.

The biggest reason why this is becoming so popular is because it’s a low-risk, high-reward scheme. Instead of extorting money directly from the victim, hackers can secretly generate digital currencies without the victim knowing.

If it is detected, it’s also very hard to track down who initiated the attack. And since nothing was actually “stolen” (other than a portion of computing power), victims have little incentive to apprehend the culprit.

Prevention and response
To avoid cryptojacking, you need to incorporate it into your monthly security training sessions. Teach your employees to practice extra caution with unsolicited emails and suspicious links. Using ad-blocker or anti-cryptomining extensions on web browsers is also a great way to stay protected.

Beyond prevention, use network monitoring solutions to detect any unusual behavior with your computers. For example, if you notice a significant number of PCs running slower than usual, you should assume that cryptojacking is taking place.

If you’ve confirmed that it is, advise your staff to close browser tabs and update browser extensions as soon as possible.

Cryptojacking may seem less threatening than some malware we’ve discussed in the past, but it can incur real power, cooling, and performance costs to your business when several systems are compromised. To make sure you don’t end up enriching any hackers, call us today. We offer hardware solutions and cybersecurity tips to keep your business safe and sound.

Published with permission from TechAdvisory.org. Source.

Improve Business Productivity with Cortana

As an entrepreneur, you understand how essential time is. There is always a need to come up with new processes or search for new technology to keep your office organized. If you use Windows 10, you already have an underutilized tool right in front of you.

To take advantage of Cortana, you should enable it on your desktop first. The process is easy: Just press the Windows Key, type “cortana” and click on “Cortana settings.” From there, you can change whether it responds to your voice or get activated by a keyboard shortcut, and you can set other personal preferences.

Voice Reminders, Notes and Alarms

As soon as you enable “Hey, Cortana” on all your gadgets, you can begin using it to dictate notes, set alarms, and create reminders. Thanks to advancements in AI, Cortana should be able to recognize most natural-language requests, like “Wake me up at 9am tomorrow,” or “Remind me to pick up my dry cleaning tomorrow.”

Meanwhile, you can use it as a voice recorder during meetings instead of writing down notes. Just say, “Hey Cortana, make a new note in OneNote,” and whatever is recorded will automatically be saved to OneNote!

AI-Scheduled Meetings

With Microsoft’s new Calendar.help feature, you can issue commands to a group email chain by saying things like, “Hey Cortana, can you help us book a 30-minute call next week?”

Calendar.help will work with Cortana to contact each attendee individually, find out what times they are available, and pick the best option for the group. You would only need to email the details, including duration, agenda and location, before you cc Cortana and forward it to the people involved. At that point, Cortana will send invites and handle all email exchanges. For now the project is still in preview/beta, so you will need to sign up.

Quick Conversions and Calculations

There are times when you need to make some calculations, but Googling or using your phone’s calculator just takes too much time. Cortana can answer complicated math problems, even if they are stated in plain language. What’s more, Cortana is able to convert temperature, time zone, weight, and volume.

Cortana will not only improve your business processes, but also help create a more relaxed workplace. And when employees are less stressed, everyone experiences more rewarding workdays.

We’re experts in traditional office IT, but we’re also pretty savvy with exciting new tools like Cortana. Send us a message today to learn more tips on improving productivity in your workplace.

Published with permission from TechAdvisory.org. Source.

Microsoft updates Office 365 apps for Apple

Microsoft recently updated Office 365 for iOS and Mac to enhance user experience. Office apps are now better integrated into the Apple ecosystem, which means iPhone, iPad, and Mac users can expect a more seamless experience when creating, accessing, or storing Office documents.

Co-authoring in Word, Excel, PowerPoint

Apple users can now co-edit documents in Word, Excel, PowerPoint, and Outlook. This new feature for Apple products allows several users to work, edit, or view changes in a document at once, whether from a PC, Mac, or mobile device. This feature also allows co-authors to track and identify other users who are making changes in real time.

Autosave documents in the cloud

The latest updates also come with an autosave feature for Apple users. This functionality not only automatically saves files, but also lets users view and restore previous versions of their content, similar to the autosave function in Google Docs, Sheets, and Slides.

OneDrive support for iOS’s Files app

iOS’s Files app, which was introduced in the iOS 11 update, made searching and organizing documents more convenient for iPhone and iPad users. However, it’s only now that Microsoft has integrated its own cloud storage platform with the Apple app. OneDrive for iOS now supports the Files app, which means users can access and edit all their files in OneDrive or Sharepoint, and easily classify them via a new tagging feature.

File type preview enhancements

The improved list view in OneDrive for iOS makes viewing file names and relevant details and sorting files much easier. This view option includes thumbnails on file previews and support for 130 file types that can be opened, viewed, or shared within OneDrive.

Drag-and-drop functionality

A drag-and-drop capability is nothing new in iOS, but it was previously limited to moving around files from non-Office sources and apps. With the latest update, Apple users can drag and drop files from various sources that now includes OneDrive, Office, and other Microsoft sources. This capability saves users’ time when adding photos, graphs, and other files into documents or presentations on their iPad, iPhone or Mac.

Better search function in Outlook

Microsoft has also improved searching in Outlook for iOS because the search function now has its own tab in the navigation bar. The search feature is now more intuitive; tapping on the tab gives you instant access to top contacts, upcoming travel itineraries and deliveries, and recently accessed attachments.

These recent updates to Microsoft’s productivity tools aim to make users’ life much easier regardless of the device they use. But there’s way more Office 365 apps and programs to help you work more efficiently, and we have Microsoft consultants who can help you maximize all of them. Just give us a call.

Published with permission from TechAdvisory.org. Source.

Disable Windows 10’s intrusive settings

Windows 10 is undoubtedly Microsoft’s most accepted operating system since Windows XP. But that doesn’t make it faultless, many users have been complaining about the intrusive privacy settings the operating system enables by default. To reclaim your privacy, follow these tips on turning off its intrusive settings

Turn personalized advertising off

For those unaware, Windows 10 assigns each user an ‘advertising ID’ which it uses to personalize your ad experience based on your recent browser history. If you’re someone who is okay with seeing generic ads targeted to you based on demographics rather than your ID, we recommend turning this feature off.

  1. To do so, head into your settings by clicking on the magnifying glass symbol next to the Windows logo, at the bottom left of your screen.
  2. Next, type in Privacy — click on it, and select General.
  3. Then, slide the option which states ‘let apps use my advertising ID for experience across apps’ to Off.
  4. Lastly, open your web browser and go to this link. Once there, select Off for ‘Personalized ads wherever I use my Microsoft account’ and ‘Personalized ads in this browser.’

This resets your ad ID, allowing you to experience the joys of web surfing without the creepy targeted advertisements.

Disable Cortana

Voice-controlled digital assistants have become big business. Microsoft aims to capitalize on this market with Cortana, an incredibly resourceful, built-in assistant that allows to you quickly set reminders, schedule events and send email, among many other intuitive features. It uses the information it collects similar to how Google’s Android-based assistant does it. However, it can become overbearing at times.

  1. To turn it off, click on the Cortana icon in the taskbar, followed by the notebook icon on the left hand side of the pop-up panel.
  2. Click on Settings, this should present you with the first option which says, ‘Cortana can give you suggestions, ideas, reminders, alerts and more’, you can slide that to Off.

Once disabled, the Cortana option disappears and you’re now presented with a search bar which you can use to search for things online or on your desktop.

Stop peer-to-peer file-sharing

With P2P file-sharing enabled, Windows 10 shares downloaded updates to your PC with other Windows 10 users by default. This helps other users update their systems faster, and speeds up your upgrade downloads, as well. However, if you are unhappy with your files being utilized by other users, you can turn it off.

  1. Head over to Settings once again.
  2. Click on ‘Update and Security’, followed by ‘Windows Update’, then ‘Advanced Options’ and finally select ‘Choose how updates are delivered.’
  3. By default, the ‘Updates from more than one place’ is on, followed by two options: distribute updates only to PCs on local network, and shut off P2P updates entirely.
  4. If you want to disable this feature entirely without worrying about specifics, then move the slider to Off.

If you want to share your files with PCs on your in-house network only, leave the the slider in the On position and select the button which says ‘PCs on my local network.’ For more detailed instructions on how to stop P2P updates, click here.

Blunt Microsoft’s Edge

Remember Internet Explorer? Think of Microsoft Edge as the same, just on steroids. The tech giant’s fancy new browser is chock full of features — such as Cortana Integration and typing prediction — which may make you uncomfortable, since all the features send data back to Microsoft. To turn off these intrusive functionalities, open Edge and click on the menu icon in the far right corner (three horizontal dots).

Once in, click on ‘View Advanced Settings’. There you have the option to disable Adobe Flash — which stops those Flash cookies from going anywhere. You’ll also encounter a bunch of settings you might want to disable under the ‘Privacy and Services’ section.

These simple security tips will stop Microsoft from tracking your online movements for good! In case you’re interested in protecting your privacy, don’t hesitate to contact us today for all matters security related.

Published with permission from TechAdvisory.org. Source.

The dangers of distributed spam distraction

Users get around 200 emails in their inbox a day, including work messages, automated payment slips, and everyone’s least favorite email, spam. Spam messages are mostly harmless, but when you get more than 10,000 of them flooding your inbox, you’re probably the victim of a special type of spam attack.

Understanding DSD
Distributed Spam Distraction (DSD) is designed to inundate your inbox with thousands of nonsense emails. There are no dangerous links, ads, or attachments involved, just random excerpts of text stolen from books and websites. What’s more, the email and IP addresses used are all different so victims can’t simply block a specific sender.

These attacks last anywhere from 12 to 24 hours and can flood inboxes with as many as 60,000 messages. While they may seem like harmless annoyances, the true purpose of DSD is to draw victims’ attention away from what hackers are doing behind the scenes.

And what they’re doing is exploiting your personally identifiable information (PII) to make unauthorized purchases or pilfer cash directly from your accounts. The DSD acts as a sort of smokescreen to hide payment confirmation messages behind a deluge of spam messages.

New tactics
Over the years, hackers have developed new tactics involving DSD. Several reports have shown that, instead of nonsensical emails, hackers are using automated software to have their targets sign up for thousands of free accounts and newsletters to distract them with authentic messages. This allows DSD blasts to slip past spam filters that have been designed to weed out malicious code and gibberish text used by traditional DSD attacks.

What’s even more worrying is that any ill-intentioned individual can go to the dark web and pay for DSD services. They just have to provide a hacker with their target’s name, email address, and credit card numbers — all of which can also be purchased in the dark web — and pay as little as $40 to send 20,000 spam messages.

How to stop it
DSD is a clear sign that one of your accounts has been hijacked, so whenever you receive dozens of emails in quick succession, contact your financial institutions to cancel any unfamiliar transactions and change your login credentials as soon as possible. It’s also important to update your anti-spam software (or get one if you don’t have one already) to protect your inbox from future DSD attacks.

Hackers only initiate DSD attacks after they’ve obtained their target’s email address and personal information, so make sure your accounts and identity are well protected. This means you should regularly change your passwords and pins, enable multi-factor authentication, set up text alerts for whenever online purchases are made in your name, and be careful about sharing personal information.

For more tips on how to deal with DSDs or other cyberattacks, call us today. We offer powerful tools and expert advice that will ensure your business’s safety.

Published with permission from TechAdvisory.org. Source.

Useful business features in Apple’s iOS 11.3

A new iOS release usually means system performance updates, a redesigned interface, and some application enhancements. However, not all major updates are well-received, and such is the case with iOS 11, which came with a feature that drained battery life fast. Fortunately, Apple is offering a remedy along with other features in the upcoming iOS 11.3.

Battery management features

You might recall the infamous iOS software update in 2016 that deliberately slowed down iPhones. Apple claims that this update was meant to prevent devices from an unexpected shutdown in case of low battery charge, old batteries, or extremely cold temperatures. Unsurprisingly, many users were unhappy about this, which is why Apple is including another battery management capability in its latest iOS update.

When you update to iOS 11.3, your devices’ battery life wouldn’t necessarily be longer; rather, you’ll have an option to disable the feature that slows down the phone. That means you can keep your phone running at peak or have your phone running slow with an extended battery life.

Business chat

With the Business chat feature, a user can ping a company’s customer service representative via the iMessage app to make an inquiry or purchase a product using Apple Pay. This could offer great convenience to customers, as they no longer have to call a company’s hotline or search for their contact details online.

But there’s a catch: This functionality is available only in selected business apps, including Wells Fargo, Lowe’s, Discover, and a few other brands.

Read and delete iMessages

Another iMessage update is the syncing of read and deleted messages. In the new OS, messages will more seamlessly sync across all devices, including iPhone, iPad and Mac. This makes it easier for you to organize your messages, ensures you’re all caught up on new messages, and keeps deleted messages deleted on all synced devices.

Augmented reality enhancements

ARKit, Apple’s augmented reality (AR) platform, allows developers to create AR applications for iPhones and iPads running on iOS 11 or higher. However, apps developed on this platform were limited to recognizing horizontal surfaces and regular-shaped objects. That means AR-capable apps will work only when used to capture a virtual object horizontally.

In iOS 11.3, the AR capability extends to vertical surfaces and irregularly shaped objects like spherical or other multi-dimensional items, and recognize flat-surface objects like signs and posters. This gives AR developers greater capability to build more complex apps.

Other key updates

The Health app also gets a new feature called Health Records, which consolidates your medical records from hospitals and clinics that allow patient records integration with the Apple app. Users can also expect key updates on Apple Music, Apple News, mobile location functionality, and other usability improvements.

As with any OS releases, iOS 11.3 will come with security updates and other enhancements that can be highly relevant to businesses using Apple devices. Our technology consultants can help you make the most of these updates and features. Call us for mobile productivity tips and tricks.

Published with permission from TechAdvisory.org. Source.