Month: March 2018

Windows 10: New accessibility features

Microsoft is working on improvements for Windows 10’s accessibility features, which will be introduced later in the year. Some of these are already available to preview through the Insider Program, but everyone else will have to wait. Here’s what’s coming:

Better Ease of Access settings

Some users rarely tinker with their computer’s accessibility settings because they’re difficult to locate and adjust. Luckily, in the upcoming Windows 10, this won’t be the case. Microsoft will soon launch Ease of Access settings that’s easier to discover, learn, and use. The enhancements are categorized into Vision, Hearing, and Interaction (speech and eye control) groups.

Those who want bigger characters can adjust settings under “Make everything bigger,” which lets you enlarge apps and text. You can also “Make everything brighter” by increasing the brightness of your built-in display, and “Simplify and personalize Windows” by turning on or off animations, transparency, and automatically hiding scrollbars in Windows on the Display page. You can also ask Cortana to find a specific setting for quicker access.

Narrator enhancements

Narrator is Windows 10’s screen-reading app that reads text on a PC screen and ‘narrates’ to users their notifications, calendar reminders, and other events. In the latest update, Narrator’s audio performance will provide faster, more responsive, and more accurate narration.

Previously, it reads bolded, italicized, or underlined statements by using statements like “start/end bold.” But in the new version, the narrator will change reading pitch, speed, and tone to emphasize certain texts.

Other improvements include a capability to run on Safe Mode and an enhanced Microsoft Edge browsing, which now announces various processes such as when users are opening or closing tabs, or loading or refreshing pages.

Eye Control adjustments

Windows 10’s eye control feature lets users control the mouse, type using an on-screen keyboard, and use text-to-speech with eye-control technology found in eye-tracking devices.

Soon to be introduced in Windows 10 is the capability for users to scroll and click directly from left to right, and quickly access Windows Start, Timeline, and other common tasks. And with the ability to pause eye control, users can hide the launchpad to enjoy undisrupted reading or streaming.

Other upcoming upgrades

Microsoft Learning Tools (advanced tools to enhance reading and writing skills) will soon include more intuitive text suggestions when using a keyboard, and language support for touch keyboards. Microsoft will also continue to work on improving its assistive technology partnerships.

Microsoft listened to users’ feedback and made several improvements in its accessibility features and apps so that people with poor vision, hearing loss, limited dexterity, and other disabilities will have a much better experience. If you need further help with Windows 10 features, don’t hesitate to get in touch with us.

Published with permission from TechAdvisory.org. Source.

Ready for tax season phishing scams?

As tax season looms, so do phishing scams. For cybercriminals, this is the ideal time of year to deceive unsuspecting individuals into releasing sensitive private or company information. Businesses must therefore take extra precautions between now and April 17th to avoid hackers from selling your confidential data in the dark web.

Phishing baits to watch out for

Phishing attacks often consist of fabricated or compromised emails sent to finance/payroll or human resources employees that are made to look like they’re from an executive in your company. The message might contain a request to forward employee records, including their W-2 forms, but that’s not all…

Another common scheme, which doesn’t only happen during tax season, involves getting a call from a person declaring to be an IRS employee. And no, caller IDs won’t save you because they can forge that, too. The phisher will inform you that you owe them cash from back taxes and they will threaten legal action if you don’t pay via credit card at that instant.

Always remember, the IRS will never contact you on the phone to let you know that you owe them money. And they certainly won’t threaten you or demand payment over the phone. If they really need to notify you of such matters, they’ll use the postal service and will give you a chance to discuss payment terms.

Standard protection protocols

Don’t worry, the usual security measures against these phishing scams are pretty easy to integrate into your business. Begin by developing a policy that bans the request of private details through email. If an employee ever requires such info, they should get in touch with the person directly, follow your established protocols for the transfer of sensitive information, and minimize the number of people involved in the transaction.

Taking security a step further

Data loss prevention (DLP) systems are also valuable weapons against these types of phishing attacks. They evaluate traffic going in and out of your company, such as web usage, emails and instant messages, and virtually anything sent on your network. DLP systems can filter out private details, including Social Security numbers, and stop them from being sent out.

But beware, DLP systems come with a minor drawback, as they can also block legitimate traffic, like when your accounting department sends tax info to your CPA. Fortunately, an MSP like us can properly segregate the good and the bad traffic to avoid confusing and/or frustrating your employees.

Phishing schemes may be a normal occurrence during tax season, but that doesn’t mean you can’t do anything about it. Don’t let the vulnerabilities in your business, particularly the human element, fall prey to cybercriminals. Send us a message right away and we’ll conduct an assessment of the security of your business, as well as design a risk management plan to help counter future complications.

Published with permission from TechAdvisory.org. Source.

How to protect data on iOS 11

Many iPhone users are aware that Apple apps access their device’s data. But this can mean increased security risk, especially if your phone is used for both personal and business reasons. Fortunately, iOS 11 includes privacy controls to limit data access.

Location Services controls

Apple and other third-party apps and websites gather user location data to make Location Services work better. Apple Maps, Google Maps, and other mapping apps need location data to make recommendations, notify friends of your whereabouts, and more. But some users might not like every app on their phone having full access to their precise location.

To limit your phone’s location-data gathering, follow these steps:

  • Go to Settings > Privacy > Location Services (lists all the apps that obtain location info on your device)
  • Review the location access privilege of each app:
    • While Using – the app obtains location data only when it’s in use
    • Always – the app obtains data whether or not it’s in use, as in the case of Google Maps and the Weather app
    • Never – for apps that aren’t set up to obtain location data
  • Uncheck the apps set to Always that you don’t want to have full-time access to your location info
  • Deactivate access by swiping the button from right to left

Location sharing and device controls

Share My Location lets your contacts see your location via apps like Messages and Find My Friends, as well as location-based features like Siri and the Home apps. It’s often convenient to leave this activated, but users can deactivate it by swiping the button from right to left.

You can also share your location from other Apple devices connected to your Apple ID account. For example, if you own an iPhone and an iPad, you can share your location information from your iPad using your iPhone.

Here’s how to do it:

  • Go to Settings > Privacy > Location Services > Share My Location
  • On the Share My Location page, tap From and choose the device from which you wish to share your location. From this page, you can also delete devices you no longer use. Just swipe the device name and tap Delete

Application-based privacy

You can also limit third-party apps from accessing your iPhone hardware and apps. For instance, if you don’t want Facebook Messenger, WhatsApp or any other app to have access to your contacts, here’s what you need to do:

  • Go to Settings > Privacy
  • Go to the individual app (e.g., Contacts)
  • Deactivate access to an app (e.g., Facebook Messenger) by swiping the button from right to left

System Services

You can also adjust your iPhone or iPad’s location-data access on a system-wide basis. There is an option to allow your device to remember the places significant to you, which is aimed at improving location-based services in Maps, Photos, and other apps that need location data.

How to do it:

  • Go to Settings > Privacy > Location Services > System Services
  • Activate or deactivate individual system-wide settings (e.g., Find My iPhone, Sharing Time Zone, Significant Location, etc.)

Given the large number of apps you use on a daily basis, the amount of data you’re sharing with third-party websites and apps could be alarmingly high. If you need expert help ensuring your business’s Apple devices are not unnecessarily sharing data, call our hotline today.

Published with permission from TechAdvisory.org. Source.

4 reasons for slow mobile internet speeds

Have you ever gotten frustrated with your phone because the browser took more than five minutes to load? Before you start blaming your old phone, check out these four reasons that might be the cause of sluggish internet connection.

Router location

One simple yet overlooked reason why your WiFi-connected phone may be experiencing internet lag is because of your router’s location. Although WiFi has a range of up to 230 feet, the farther away you are from the router, the weaker the WiFi signal. Large objects like doors and walls situated in between you and the router can also weaken the WiFi signal.

It is recommended to place your router in a central location, preferably away from concrete and masonry walls or other big objects like a chimney. As the router signal radiates from all four sides, blocking any side with big objects will impact your WiFi’s signal quality and as a result your phone’s internet speed.

WiFi Noise

Did you know that home electronic appliances emit wireless signals at a frequency similar to your router’s (2.4 GHz)? So before deciding on your router’s location, determine whether there are any wireless devices nearby, as they emit signals that can interfere with your router’s signal. For example, even if the ideal location for your router is at the center of your house, you shouldn’t place it there if there’s a cordless phone nearby.

You can also set your router on a 5.0-GHz band, as this frequency is less prone to interference from other appliances. But before you start tuning it, make sure your phone supports 5.0 GHz; otherwise, it won’t be able to connect to the router.

Slow Network

Another reason for your phone’s slow internet is because of fluctuating network speed. Ask yourself these two questions to know the exact cause of this problem:
How many people are connecting to the router?
What are they doing over the internet?

You should increase your router’s internet bandwidth speed if you discover you have many users and all of them are either streaming movies, or downloading computer games or software updates. This will allow every phone to enjoy faster internet speed.

If you’re outdoors, and you’re connected to a public WiFi, consider using your mobile data instead. You won’t have to share your internet when you use mobile data, enabling you to experience faster connectivity at all times as long as you have a high-speed data plan.

Too much cache

Last, you should check your phone’s cache if fixing your router, network, and positioning doesn’t improve your phone’s internet speed. Cache is a component in your phone that saves data from earlier searches in order to increase the speed of similar searches in the future. Although your phone becomes more efficient for that particular search, it also makes your phone much slower when you do other things that require the internet.

You can clear out your cache manually or use a cache cleaner app to thoroughly get rid of useless cache and optimize your phone’s internet speed. If you decide to download a cache cleaner app, make sure that it is reputable and trustworthy so you don’t accidentally download a malware-infiltrated app instead.

There are more reasons to your phone’s lagging internet speed. If your business relies heavily on fast mobile internet speed and you’re unable to fix the sluggish connection, call our experts today. We’re always ready to help you.

Published with permission from TechAdvisory.org. Source.

Endure tech disasters with external support

Three decades ago, the notion of hiring specialists in information technology was virtually unheard of. Nowadays, the majority of businesses are digitally operated, which means technology specialists are a must, especially given the huge increase in different types of security breaches. Determine how external support can back you up in times of technical distress.

Access to new technologies and industry experts

Managed Services Providers (MSPs) are equipped with resources most small businesses can’t afford. They employ teams of experts in fields ranging from cybersecurity to data management to networking — all available for you on an outsourced basis. For example, an MSP provides advanced security software and applications that can help your business avoid the risks of cyberthreat.

They also work with industry tech leaders who provide insights into upcoming hardware and software products in the market. This ensures you receive updated recommendations on the latest technologies so you can use them in your business, and they often come with deals and discounts that you wouldn’t normally have access to.

Knowledge from past breaches

External IT support providers have been helping businesses recover from all kinds of tech disasters since the dawn of hackers. They now have enough knowledge to prepare Data Backup and Disaster Recovery plans for you. This way, you and your team would still be up and running after suffering from an IT emergency without disrupting much of your business operations.

External support providers’ experience with data protection will ensure your systems are monitored around the clock so your security systems are always functioning properly to keep cybercriminals at bay.

Run your business with ease

You don’t specialize in technology, so you don’t have the skill or the experience in dealing with digital felons. You also know how vulnerable your business is online and won’t dare do anything to jeopardize it. That’s why external support is such a great asset — you’ll be able to manage your business without any worries because your external IT provider will keep it protected.

In the end, you also have to be cautious in your search for an external support provider. Conduct your research thoroughly, read through all their testimonial pages, and verify whether their business objectives coincide with yours. To put your mind at ease and to make sure that your business’s technology is in good hands, you can always send us a message and we’ll provide you all the references you need.

Published with permission from TechAdvisory.org. Source.

Make the most of Office 365

Maximizing your Office 365 investment is easier said than done. Sure, you use Outlook and SharePoint all the time, but there are loads of features you’re probably not using. If you’re looking for ways to make the most out of your Office 365 subscription, you’re in luck because that’s what we’re discussing today.

SharePoint

SharePoint is the “communication sites” platform for building an intranet where you can upload and manage content. It’s customizable, feature-rich, and ideal for organizations that need an online library of information.

It’s a relatively new feature that allows you to add vibrant templates and visually appealing layouts to your company’s intranet, turning it into a highly dynamic and interactive page that staff will enjoy accessing for company announcements, to share updates, and more.

Teams

Microsoft Teams is an interactive workspace that lets users chat about specific projects. It’s a collaboration tool integrated with Office applications like Word, Excel, and PowerPoint, so it’s an ideal alternative to SharePoint for employees who don’t need the latter’s more robust capabilities.

Yammer

Yammer is an easy-to-use social networking platform for companies where users can post status updates, create polls, and make announcements.

It’s also useful for sharing and co-authoring documents and discussing content from SharePoint and Skype for Business. Much like Facebook, it allows users to join interest groups where they can interact with members similar to how Facebook Groups works.

Planner

Planner is Office 365’s work management application that lets you create, organize, and assign tasks, share files, and chat about ongoing projects. While its functions seem similar to Teams’, Planner’s main purpose is to organize tasks and provide users with a visible and transparent platform for coordinating work. It’s primarily a business tool whereas Teams is more of a communication tool.

PowerApps

PowerApps lets you build custom applications with a minimum amount of coding involved. Although there are similar app-building tools on the market, PowerApps is especially useful for Office 365 users because it seamlessly integrates with O365 apps, including SharePoint, for easy access to your data already stored in the Office environment.

Flow

Flow is an intuitive tool that has built-in templates you can use to automate various tasks. Things like tracking hours worked, saving files from one SharePoint account to another, and creating calendar events are streamlined by Flow. And like all the aforementioned apps, Flow allows you to create workflows using files from OneDrive or SharePoint.

Whether you’re a new or a long-time Office 365 user, these programs and features are hiding in plain sight, and we’re here to help you explore and maximize them for your business. Call us today if you need expert recommendations for office productivity.

Published with permission from TechAdvisory.org. Source.

How to speed up Windows 10 updates

Keeping up with Windows 10 updates is absolutely critical if you want the latest features and security fixes on your computers. However, the updates can take hours, especially when a major new feature is being released. Fortunately, there are a few things you can do to speed things up.

Why do updates take so long to install?
Windows 10 updates take a while to complete because Microsoft is constantly adding larger files and features to them. For instance, the latest Fall Creators update, which made plenty of adjustments to Cortana, Photos, and Edge, can take upwards of four hours to install. And it takes even longer if you have a fragmented or nearly filled hard drive.

In addition to the large files and numerous features included in Windows 10 updates, internet speed can significantly affect installation times. This is especially true if your network is being overburdened by multiple people downloading the update at the same time.

If multiple downloads aren’t being attempted and you still experience slowness, then either some broken software components are preventing the installation from running smoothly, or apps and drivers that run upon startup are likely to blame.

When you experience any of these issues, try the following:

Free up storage space and defragment your hard drive
Because many Windows 10 updates take up a lot of space in your hard drive, you need to leave enough room for them. This means deleting files and uninstalling software you no longer need.

You’ll also want to defragment your hard drive, a process that organizes data on your hard drive so it can read and write files faster. While this may sound complicated, it’s actually as easy as pressing the Windows button and typing Defragment and Optimize Drives. From there, just select the hard drive, click Analyze, and if the drive is more than 10% fragmented, press Optimize.

Run Windows Update Troubleshooter
If broken software components are causing installation problems, this tool might be able to fix the issue and decrease download and install times.

Disable startup software
Before your update begins, you should also disable third-party applications that can potentially cause disruptions. To do this, press the Windows button again and type msconfig. In the System Configuration Window, go to Services, click Hide all Microsoft services, then click Disable all. Afterwards, access Task Manager (press Ctrl + Alt + Delete) and disable any startup program that might interfere with updates like an Adobe app or printer software.

Optimize your network
Sometimes a faster connection is all you need. Consider switching to fiber optic cables or purchasing more bandwidth from your internet service provider. It’s also a good idea to use bandwidth management tools to make sure enough network resources are reserved for things like Windows 10 updates, not bandwidth hogs like Skype or YouTube.

Schedule updates for low-traffic periods
In some cases, however, you may have to accept the fact that certain updates do take a long time. So instead of installing them during the day, schedule them for after hours when you’re not using your computers. Simply go to Settings and specify when you prefer updates to be installed.

If you need help with any of the tips above, we’re always here to help. Call us today to meet with our Windows specialists!

Published with permission from TechAdvisory.org. Source.

More leaks from Equifax breach

The Equifax breach in 2017 exposed the personal information of 145.5 million people in the US and some parts of the UK and Canada, but the number of victims keeps increasing. In the beginning of March, the credit-reporting company revealed that more personal information was leaked. Read on to find out more about this latest development.

What happened?
On March 1, Equifax reported that the names and driver’s license numbers of approximately 2.4 million Americans were stolen. According to the company, sensitive information like home addresses, home states, or the license issue and expiration dates were not leaked. Equifax said these breaches were discovered only recently because their forensic investigations primarily focused on stolen Social Security numbers.

In response, the company said that anyone affected would be notified directly. They’re also now offering a security program designed to prevent identity theft and credit tampering. However, given the company’s poor track record, not many are willing to enroll.

When the company first announced the breach in September last year, the tool used to check whether an account had been hacked didn’t work and came up with false positives. Fortunately, there are other things you can do to protect yourself.

Monitor your credit
Consider looking through your credit reports for any suspicious spending. If you spot any new accounts, loans, and other payments you don’t recognize, contact your credit card company to report fraudulent transactions.

Check the dark web
Compromised data is often sold to the highest bidder on the dark web, so most Equifax data can probably be found there. To see whether your personal information has indeed been compromised, sign up for dark web monitoring services. Then consult with a security professional to discuss your options.

Place a credit freeze
One way you can prevent hackers from opening credit cards and making payments in your name is to freeze your credit. When you implement this, anyone masquerading as you will be required to provide a PIN to unfreeze your account. Contact the credit bureaus (Equifax, Experian, TransUnion) to activate this service.

Set fraud alerts
When you set a fraud alert, credit card companies and businesses must verify your identity before opening an account or making any payments. Together with a credit freeze, alerts will make it extremely difficult for hackers to steal your identity.

Learn to identify phishing scams
Because Equifax is notifying data breach victims directly through email, hackers could take this opportunity to send fake messages that direct users to dangerous websites. As such, knowing how to identify phishing scams (suspicious URL links, attachments, and spelling errors) is vital.

Dealing with data breaches is a long and frustrating process, especially for businesses that just want to focus on growing their operations. So if you have any security concerns, call us today. We have the cybersecurity expertise to protect you.

Published with permission from TechAdvisory.org. Source.

Government agency finds way to unlock iPhones

Cellebrite, an Israel-based vendor that works with the U.S. government, has revealed that they’ve found a way to unlock practically every iPhone available on the market. It appears to be a significant milestone for law enforcement and forensic specialists, yet it’s also a potential privacy issue for Apple customers.

iPhone vulnerabilities leaked, is it true?

A couple years ago, Apple had a showdown with the FBI regarding data privacy, and this prompted them to develop exceptionally secure mobile devices. But Cellebrite has crashed the party, developing several methods to access iPhone operating systems, including the most recent version.

The engineers are now promoting their methods to private forensics and law enforcement professionals around the world who would benefit from this new service. In fact, in November 2017, the Department of Homeland Security successfully raided data from the iPhone X, most likely through the use of Cellebrite technology.

Secure your business at all costs

To protect you from this potential security issue, here are a couple suggestions from tech experts:

  1. Patching mobile devices is a crucial step for both businesses and consumers. For devices that cannot be patched, you must retire it to prevent risks.
  2. Adopting a disaster recovery plan is vital. This way, you can limit how much damage a breached gadget can cause.

Only time will tell whether Apple’s reputation and the iPhone’s security really has been weakened. Still, it doesn’t mean that you should hold off on protecting your business. Use this news to give your technology an overhaul, improve your business processes, and update your employees’ security training.

Even with all the ingenious ways to hack into systems nowadays, you felt you could count on Apple to be one step ahead of everyone — but that might not be the case anymore. Ensure that your privacy is secure and your files are still safe by strengthening your usual security practices. But if that’s too technical for you, just give us a call and we’ll take care of it!

Published with permission from TechAdvisory.org. Source.

How to make Alexa your office assistant

Amazon’s Alexa has come a long way from performing basic functions like setting alarms, streaming music, and providing weather updates, to an all-around office assistant superstar. As Amazon continues to develop Alexa, businesses can expect to see her become more relevant in an office setting.

Create and manage to-do and shopping lists
You have meetings to attend and deadlines to meet. Alexa has a straightforward To-do List feature that helps you stay on top of all your tasks. It’s ideal for busy professionals who prefer a no-frills checklist that allows them to simply view completed items, or to edit or delete items on the list.

You can also seamlessly sync third-party applications like Any.do and Todoist, which offer more features for organizing tasks, adding subtasks and folders, creating reminders, setting due dates, attaching files, and prioritizing items.

To connect to a third-party app:

  • Go to alexa.amazon.com or access the Alexa app
  • Go to Settings > List, click Get Skill
  • Click Enable
  • Log in to authorize the app

Alexa also has a default Shopping List that works exactly like the To-do List. It lets you add or delete items that can be browsed in the Amazon store and searched for in Bing.

Reorder office supplies

Ordering supplies on an Amazon smart home device is especially convenient because you would have already set up an Amazon account. When voice shopping with Alexa, you can either add items to your Amazon cart (“Alexa, add toner to my cart”) or directly order a single item (“Alexa, reorder toner”) without having to lift a finger.

When you place an order, Alexa checks product availability, walks you through Amazon search results, and asks you to confirm or cancel the order. Voice shopping is enabled by default, but it can be disabled in Settings > Voice Purchasing in the Alexa app.

Sync your calendars
One of the best ways to maximize Alexa in the office is to sync it up with your calendars. You can view scheduled appointments, set meetings, or have Alexa read the day’s entries with simple commands like “Alexa, what time is my next meeting?” or “Alexa, when is the company barbecue?”.

To add a calendar:

  • Go to alexa.amazon.com or access the Alexa app
  • Click Settings > Calendar
  • Select a calendar from the available platforms: Google (Gmail and G Suite), Apple (iCloud), or Microsoft (Office 365 or Outlook)
  • Log in to your account

Set a timer
A Pomodoro timer is a productivity enhancement tool that works by prescribing ideal work intervals and breaks. For example, you can set a timer that reminds you to take a 15-minute break for every hour worked, and setting this up in Alexa is easy.

To set a single timer:

  • Say “Alexa, set a work timer for 60 minutes.”
  • After the work timer finishes, say “Alexa, set a break time for 15 minutes.”

To set several timers at once, say:

  • “Alexa, create a work timer for 60 minutes.”
  • “Alexa, create a break timer for 15 minutes.”

The commands we’ve included here work for simple instructions, but you can modify them and use tons of other Alexa commands to suit your purpose. If you need recommendations on how you can work smarter with AI and other productivity tools, get in touch with us today.

Published with permission from TechAdvisory.org. Source.