Month: June 2018

How to minimize risks after a data breach

Despite efforts to protect your data, some breaches are beyond your control. When an online company with your personal details gets hacked, you have no choice but to manage your risks on your own. These practical tips can help you reduce risks of identity theft and other threats.

Determine what was breached

Whether its names, addresses, email addresses, or social security numbers, it’s critical to know exactly what type of information was stolen before determining what steps to take. For example, if your email address were compromised, you’d take every precaution to strengthen your email security, which includes updating all your login credentials.

Change affected passwords immediately

Speaking of passwords, change yours immediately after any breach, even for seemingly safe accounts. Create a strong password comprised of alphanumeric and special characters, and make sure you never reuse passwords from your other accounts.

Once you’ve changed all your passwords, use a password manager to help you keep track of all your online account credentials.

If the website that breached your information offers two-factor authentication (2FA), enable it right away. 2FA requires two steps to verify security: usually a password and a verification code sent to a user’s registered mobile number.

Contact financial institutions

In cases where financial information was leaked, call your bank and credit card issuers to change your details, cancel your card, and notify them of a possible fraud risk. That way, banks can prevent fraud and monitor your account for suspicious activity.

Note that there are different rules for fraudulent transactions on debit cards and credit cards. Credit card transactions are a bit easier to dispute because they have longer grace periods. Debit card fraud, on the other hand, is more difficult to dispute, especially if the fraudulent transactions happened after you’ve notified the bank.

Place a fraud alert on your name

Hackers who have your personal information can easily commit identity fraud. To avoid becoming a victim, contact credit reporting bureaus like Equifax, Experian, or Innovis and request that a fraud alert (also called credit alert) be added to your name. This will block any attempt to open a credit account under your name and prevent unauthorized third parties from running a credit report on you.

Putting a credit freeze on your name might result in minor inconveniences, especially if you have an ongoing loan or credit card application. Still, doing so will greatly reduce your risks of getting defrauded.

These steps will ensure you don’t fall victim to identity theft in the event of a large-scale data breach. If you want to take a more proactive approach to protect your sensitive information against breaches, contact our cybersecurity experts today.

Published with permission from TechAdvisory.org. Source.

Top 7 Office 365 Productivity Add-Ons

Microsoft’s cloud-based Office 365 has successfully made day-to-day business operations more efficient with popular apps like Word, PowerPoint, Excel, OneNote, and Outlook. What’s more, it also offers productivity-boosting add-ons that streamline users’ workflow.

#1. StaffHub

You can now easily keep track of your employees’ work hours, allow employees to swap shifts, and make changes where appropriate with Microsoft’s StaffHub app. What’s more, employees can also communicate with team members through its internal community spaces, check out new company updates, and add important internal resources like employee handbooks or training manuals through the app. The app is available on any mobile device, making it a very convenient tool for employees who need to manage their schedule and stay up to date.

#2. Office Tabs

Office Tabs allow you to open multiple files in one window, which saves you time from having to go through each opened document until you find the right one. As such, you can close or save all or everything but the current active document in a single click. You can also directly rename files by clicking Rename, instead of going through the tedious process of clicking Save As and then changing its name.

#3. Grammarly

The last thing you want to send to your clients is a confusing, poorly written email or document. Grammarly solves this by having your text go through rigorous grammar, spelling, and plagiarism checks. It then provides vocabulary suggestions and recommends writing style changes to polish your writing. This add-on is available in Word and Outlook, and its Premium counterpart is priced at $11.66 per month (annual plan).

#4. Pexels

Professional documents and presentations require high-resolution, blemish-free images, and Pexels helps you get them easily. Its free stock images are under a Creative Commons Zero license, meaning you can search high-quality images and use them in all your documents for any purpose with no legal repercussions.

#5. DocuSign

DocuSign for Outlook and Word lets you or the recipient securely sign the document electronically and send it through email, save it in the app, or store it in your company’s server. DocuSign complies with eSignature legal standards and is secured with an end-to-end Digital Transaction Management, ensuring your files will never be leaked or breached.

#6. FindTime

Setting up a meeting time is tedious and difficult, especially if your employees have different schedules. FindTime automatically scours every attendee’s personal schedule to locate open slots, and creates possible meeting time options for everyone to vote on. A meeting will then be scheduled according to whichever slot gets the highest vote within a specified amount of time.

#7. Translator

Businesses that deal with foreign companies will find communication much easier with Translator. This add-on recognizes and translates more than 50 different languages, including English, French, Spanish, and Chinese. Not only will you now spend less time understanding foreign-language documents, but you’ll also be able to work with clients from various parts of the world.

Start improving work productivity and make the most out of your Office 365 with Microsoft productivity add-ons. To get started or learn more about Office 365, Microsoft add-ons, or anything Microsoft Office related, contact us today.

Published with permission from TechAdvisory.org. Source.

The new features in Windows 10 Redstone 5

Hot on the heels of the Windows 10 April 2018 Update, also known as Redstone 4, is the highly anticipated release of Redstone 5. While no official launch date has been announced, word is that it will drop around the final quarter of 2018. What can we expect from this latest major update?

1. Windows Sets

Sets takes the concept of tabs in your browsers and applies it to the whole Windows operating system (OS). It allows users to open a window with tabs for apps, files, web pages, programs, basically anything and everything.

For example: You’re working on a Word document and need to go online for research. Sets will open the web page in a tab beside your Word file. Then when you create a Powerpoint presentation for your report, it appears in a third tab. Everything connected to your Word document is neatly organized in a Set. So the next time you open your Word file, a prompt will remind you of the online article, PowerPoint presentation, and all other tabs related to your document. Microsoft explained it as “content that belongs together should stay together.”

2. Cloud Clipboard

Cloud Clipboard is shared across all your Windows 10 devices, so you can copy-paste between different devices. Cloud Clipboard also logs the things you copy, so you can refer back to them later.

3. Snipping Tool + Screen Sketch app

The current Snipping Tool in Windows is a bit cumbersome and inconvenient for quick screenshots. Now you can press ALT + Shift + S to open the Snipping Tool from any screen. There are also new types of snips you can make:

  • Rectangular snip — Form a rectangle (or square) around an object.
  • Window snip — Select a window or dialogue box that you want to snip.
  • Free-form snip — Draw a freeform shape around an object.
  • Full-screen snip — Take a snip of the whole screen.

Snipping Tool also allows you to launch the Screen Sketch app with one click, so you can immediately edit your image.

4. Dark theme for File Explorer

Microsoft finally added a dark theme to its File Explorer, so you won’t be blinded when you browse in the middle of the night.

5. Improved search experience

Searching for files and apps from the Windows taskbar will have a wider display window to show more content and information. It also allows you to open related documents and perform related actions.

6. Improved Your Phone app

This app makes it a lot easier for iOS and Android smartphones to interact with your PC. You can send and receive SMS; and drag and drop files, photos, and more from phone to PC and vice versa.

These are just some of the reasons why there’s much ado about the upcoming release of Windows 10 Redstone 5. Get ready for more updates and new features when it launches this September or October. If you need help with anything Windows-related before then, we’re always available. Give us a call today!

Published with permission from TechAdvisory.org. Source.

Router malware worse than experts realize

In May, security experts discovered one of the most widespread malware infections in history. Now, they’re warning businesses and consumers that it’s even worse than their first assessment. The VPNFilter malware poses a threat to small businesses and requires immediate attention from anyone who hasn’t taken action against it.

VPNFilter recap

A team of security researchers from Cisco released a report that a strain of malware had been discovered on hundreds of thousands of routers and network devices. Originally, researchers believed it affected only Linksys, MikroTik, Netgear, and TP-Link devices.

Like many malware strains, VPNFilter infects devices that use default login credentials. But it’s worse than the average cyberattack because it can destroy router hardware and cannot be removed by resetting infected devices.

As if destroying 500,000 routers wasn’t bad enough, VPNFilter lets its creators spy on networks and intercept passwords, usernames, and financial information.

What’s new

Just two weeks after VPNFilter was discovered, security experts announced that it targets 200,000 additional routers manufactured by ASUS, D-Link, Huawei, Ubiquiti, UPVEL, and ZTE. Worse yet, VPNFilter can alter data passing through infected routers. That means when you enter a username and password into a banking website, hackers could steal that information and show you an incorrect account balance to hide fraudulent deductions.

How to stop VPNFilter

Rebooting a router won’t remove the malware, you need to factory-reset the device. Usually, all this requires is holding down the Reset button on the back of the device for 10-30 seconds. If your router has no reset button or you’re unsure whether pressing it did the trick, contact a local IT provider immediately.

Cybersecurity threats have become so prevalent that even large enterprises struggle to keep their digital assets safe. Outsourcing IT support to a managed services provider like us will give you enough capacity to deal with issues like VPNFilter as soon as they arise. Call us today to learn more.

Published with permission from TechAdvisory.org. Source.

What’s new at the 2018 Apple WWDC?

San Jose, California, recently hosted WWDC 2018. Apple’s engineers interacted with the developers in attendance, while everyone at the event got a sneak preview at the computer manufacturer’s upcoming products and software. Check out the highlights from the event right here!

A more personal, faster iOS 12

Apple has focused on improving the operating system’s performance so that iPads and iPhones become more responsive and work faster. The good news is that older devices that can still run iOS 11 will be compatible with iOS 12.

Developers tweaked the software to make apps launch quicker, especially the keyboard and camera. The latest version of iOS is designed to optimize its system when it is under load, so that Apple products run faster when the user demands higher performance.

Fresh features aimed at impressing consumers include the Memoji, an Animoji that users can customize to their preferences. Group Facetime supports video conferences of up to 32 individuals, and these fun tweaks can be used in both Facetime via the Effects camera and in Messages.

A smarter Siri

Apple’s signature digital assistant can now answer queries about motorsports, food, and famous people. There is a new Shortcuts feature integrated in the Workflow app, which allows users to automate various tasks in first- and third-party apps, to be triggered through Siri voice commands.

Both Shortcuts and suggestions by Siri appear on the Lock screen, and third-party Shortcuts integration will let Siri do more when the user pulls the Lock screen down to search. A dedicated Shortcuts app will be available later this year to give users a quick way to build Shortcuts from dozens of preset options.

An alternative to Google Photos

The iOS Photos app may be useful to Apple product users, but it may seem too basic for some. Once iOS 12 is released however, a clever Photos app will showcase most of the features that Google Photos has.

The Search feature has been improved – users can look for images based on general terms such as “park” or even business names, and multiple terms can be searched (such as images from Africa during a particular month). All pictures will be arranged by place and time in case the user wants to perform searches with those variables.

A new tab labeled “For you” will contain the auto-generated albums which Photos makes, and is sorted with any shared albums. Speaking of sharing, the enhanced Photos app will proactively advise users on what images to share according to who is in the pictures.

A refined WatchOS

Apple’s upcoming WatchOS 5 will introduce users to new ways of connecting to the world while staying active. It may not be a radical revision for the wearable device, but the apps and features it provides will be more helpful and fun for the user.

The highlight of WatchOS 5 is the Walkie-Talkie app, an innovative method of communicating by combining the natural flow of messaging with real-time voice discussions. Just like the conventional product that the app is based on, users simply press and hold down a virtual Talk button to converse with friends and family.

Hiking and Yoga have been added to the list of workout types, while users can keep track of their Outdoor Runs more effectively with support for cadence, the custom pace alert, and the rolling mile pace. Automatic workout detection will make sure that the Apple Watch will always stop or start recording user activity while exercising. This feature works with Open Water Swim, Pool Swim, Rower, Elliptical, Indoor Walk, Outdoor Walk, Indoor Run, and Outdoor Run.

To get users motivated to work up a sweat, WatchOS 5 has a Competition feature that allows friends and family to challenge each other in a contest to see who can get the most activity points within a week. The watches will post regular progress reports to let contestants know how they are doing, and the winner will get a special award.

These updates can change at any time, and will be released by Fall this year. If you need more information on making use of Apple devices and software, or if you have other computer-related concerns, feel free to contact us today!

Published with permission from TechAdvisory.org. Source.

Hide & Seek: New IoT malware to watch out for

You probably think your Internet of Things (IoT) devices don’t need as much protection as your PCs or laptops. Newsflash: They’re actually even more vulnerable to hacking. In fact, researchers have discovered a terrifying strain of IoT malware that can infect your devices.

What is the Hide And Seek malware?

The Hide and Seek (HNS) malware has created a “botnet” by quietly infecting thousands of devices using advanced communication methods. Without getting too technical, a botnet adds or “recruits” computers to their network to carry out malicious acts, such as overloading a network by telling every infected device in the botnet to try and connect at the same time.

The new HNS can’t be removed by resetting the infected device, which is the solution for most IoT malware strains. The new strain can also exploit a greater variety of devices and in less time than its predecessors. Experts believe it has already compromised more than 90,000 IPTC cameras and other devices.

IoT devices are easily hacked if they connect to the internet, which is home to opportunistic cybercriminals. And because businesses and consumers are expected to acquire and use more IoT devices (the market is expected to reach $1.7 trillion by 2020), it’s imperative to take cybersecurity precautions.

How can I protect my IoT devices?

Luckily, there are steps you can take to keep your devices — and ultimately your network and data — safe from HNS and other forms of malware.

  • Turn off your IoT devices when not in use to reduce their exposure to fast-spreading malware.
  • Take simple precautions to keep your WiFi networks safe, like changing your network’s default settings (including your network’s name), and using complex passwords that are changed from time to time.
  • For those who use a large number and variety of devices, install a threat management system that will block intruders and secure common threat entry points.

With HNS and other malware strains expected to increase in number and complexity, it’s more important than ever to take a multi-layered approach to security. Call us today to learn more about which cybersecurity solutions are right for your business.

Published with permission from TechAdvisory.org. Source.

Chrome to mark HTTP as ‘not secure’

Google Chrome currently marks HTTPS-encrypted sites with a green lock icon and “Secure” sign. And starting in July, Chrome will mark all HTTP sites as “not secure.” Google hopes this move will nudge users away from the unencrypted web. Read on to learn more about the forthcoming changes.

For several years, Google has moved toward a more secure web by strongly advocating that sites adopt the Secure HyperText Transfer Protocol (HTTPS) encryption. And last year, Google began marking some HyperText Transfer Protocol (HTTP) pages as “not secure” to help users comprehend risks of unencrypted websites. Beginning in July 2018 with the release of a Chrome update, Google’s browser will mark all HTTP sites as “not secure.”

Chrome’s move was mostly brought on by increased HTTPS adoption. Eighty-one of the top 100 sites on the web default to HTTPS, and the majority of Chrome traffic is already encrypted.

Here’s how the transition to security has progressed, so far:

  • Over 68% of Chrome traffic on both Android and Windows is now protected
  • Over 78% of Chrome traffic on both Chrome OS and Mac is now protected
  • 81 of the top 100 sites on the web use HTTPS by default

HTTPS: The benefits and difference

What’s the difference between HTTP and HTTPS? With HTTP, information you type into a website is transmitted to the site’s owner with almost zero protection along the journey. Essentially, HTTP can establish basic web connections, but not much else.

When security is a must, HTTPS sends and receives encrypted internet data. This means that it uses a mathematical algorithm to make data unreadable to unauthorized parties.

#1 HTTPS protects a site’s integrity

HTTPS encryption protects the channel between your browser and the website you’re visiting, ensuring no one can tamper with the traffic or spy on what you’re doing.

Without encryption, someone with access to your router or internet service provider (ISP) could intercept (or hack) information sent to websites or inject malware into otherwise legitimate pages.

#2 HTTPS protects the privacy of your users

HTTPS prevents intruders from eavesdropping on communications between websites and their visitors. One common misconception about HTTPS is that only websites that handle sensitive communications need it. In reality, every unprotected HTTP request can reveal information about the behaviors and identities of users.

#3 HTTPS is the future of the web

HTTPS has become much easier to implement thanks to services that automate the conversion process, such as Let’s Encrypt and Google’s Lighthouse program. These tools make it easier for website owners to adopt HTTPS.

Chrome’s new notifications will help users understand that HTTP sites are less secure, and move the web toward a secure HTTPS web by default. HTTPS is easier to adopt than ever before, and it unlocks both performance improvements and powerful new features that aren’t possible with HTTP.

How can small-business owners implement and take advantage of this new interface? Call today for a quick chat with one of our experts to get started.

Published with permission from TechAdvisory.org. Source.

The dangers of app overload in businesses

Businesses today rely on countless apps and software for day-to-day operations. However, too many of these programs can do more harm than good. App overload brings confusion among employees, and a recent study shows that this costs more than companies realize.

How app confusion occurs
A new study conducted by CITE Research shows that a surplus of apps is causing a great deal of confusion in the workplace. Among the 2,000 workers from the US, UK, and Australia surveyed, 69% wasted as much as 32 days a year navigating between apps — that’s an hour of productivity lost every single day.

The same research — entitled From Work Chaos to Zen: How Application Overload Redefines the Digital Workplace — reveals the biggest problem is with communication apps and channels. On average, a single worker juggles four communication apps every day, which is pretty much like holding four conversations at one time. It’s even worse for 20% of the respondents who said they use six or more.

Furthermore, the average worker flips between apps as frequently as 10 times per hour, which means more time wasted. 56% of respondents felt that searching for information stored across different apps was disruptive while 31% said it caused them to lose their line of reasoning. It’s tempting to see each individual app as a problem-solver, but when looking at the bigger picture, it could be causing problems.

Coming up with a solution
Clearly, app overload has an immense effect on productivity, and the gap between executive perception and employee perception doesn’t help. Before signing up for yet another app, give your workflow a second look and consider the impacts of disruptive activities and employee preferences.

In the CITE Research study, workers agree that having only one communication app would clear up all the confusion. Regardless of what the best solution is, it’s probably more affordable than most small business owners realize. A managed IT services provider like us can provide guidance that puts you on track for long-term success. Give us a call today for more info.

Published with permission from TechAdvisory.org. Source.

Flash to be stopped in Office 365

If you are one of the few Office 365 users who embeds Silverlight, Shockwave, or Flash content in your documents, your pastime will soon be a thing of the past. Over a week ago, Microsoft announced that Office 365 would completely block said media by January 2019.

Microsoft recently announced plans to eventually stop the activation of Silverlight, Shockwave, and Flash content in Office 365. This is not just the developers disabling bugs with an option to click a link or button to look at content. Within a few months’ time, Flash will be gone from Office 365 for good.

What media will be affected once this is implemented?

Microsoft Silverlight and Adobe Flash or Shockwave content that uses Microsoft’s OLE (Object Linking and Embedding) platform and the “Insert Object” feature will be blocked. However, media that uses the “Insert Online Video” control via an Internet Explorer browser frame will not be affected by this change.

The following timeline shows the various changes that will take full effect by January 2019:

  • Controls in the Office 365 Monthly Channel will be blocked beginning June 2018.
  • Controls in the Office 365 Semi-Annual Targeted (SAT) Channel will be blocked beginning September 2018.
  • Controls in the Office 365 Semi-Annual Channel will be blocked beginning January 2019.

Why did the developers choose to take out the embedded content?

Microsoft pointed out various reasons for making their decision. It cited that malware authors have been exploiting systems through Word, Excel, and PowerPoint files with embedded content, and that most Office 365 users did not use or rarely use the controls anyway.

Aside from this, the developers at Microsoft decided to take action after Adobe announced that Flash would reach its end-of-life cycle by 2020. Silverlight was discontinued in 2016, where enterprise customers would have support for the medium until 2021.

For businesses that still need to look at or embed Silverlight- or Flash-based content in an Office 365 document, Microsoft has provided a support page to guide users on re-activating the controls.

As more websites are transitioning away from Flash in favor of HTML5, Microsoft’s once-popular platform has experienced a steady decline over the years. According to Google, Chrome users who loaded a single web page per day that has Flash media had gone down from an estimated 80% during 2014 to below 8% in early 2018.

For more information about utilizing Office 365 features and other IT related concerns, feel free to get in touch with us today!

Published with permission from TechAdvisory.org. Source.

Little-known Windows 10 tips and tricks

Are you making the most out of your Windows 10 computer? If you haven’t tried adjusting system and battery performance, silenced notifications, or used the night light function, then you’re missing out on minor but useful features.

Performance/Power slider

There are two kinds of computer users: those who value battery longevity and those who prefer optimized system performance. The Performance/Power slider in Windows 10 lets you easily toggle between the ‘Best battery life’ (when you’re trying to save battery) and the ‘Best performance’ (when you need your system to perform optimally), or set a balanced battery and system performance setting.

Just click the battery icon in the taskbar and adjust the slider based on your preference.

Night Light

Those who use computers late at night can turn on Night Light to reduce the amount of blue light emitted from the screen. This feature substitutes the blue light with warmer colors, which reduces eye strain and helps you sleep easily.

Night Light is disabled by default, so you need to enable it by following these steps:

  • Click the Start Menu
  • Click the Settings app (or press WIN + I to quickly open Settings)
  • Click the System icon>Display
  • Set Night light to ‘On’ or ‘Off’

Taskbar pin

It takes only a few seconds to open a browser and type a website’s address or click Bookmarks and choose from a list of websites you frequently visit. But Windows 10 offers an even quicker way to access your go-to sites by allowing you to pin websites on the Windows 10 taskbar.

Simply click “Pin this page to the taskbar” on the Microsoft Edge menu, and the site’s icon will appear on the taskbar for easy perusal.

Drag to pin windows

Need to organize your screen but can’t help having many open windows? Reduce screen clutter by dragging any window to a corner so it can take a quarter of the screen. For multiple screens, drag a window to any border and wait for the prompt that tells you to put the window in the selected corner.

Focus Assist

Notifications can be distracting, but Windows 10’s Focus Assist feature can manage the notifications you receive from contacts and applications. This function also lets you customize the list of notifications you wish to prioritize.

To enable Focus Assist, go to:

  • Settings
  • System
  • Focus Assist
  • Adjust the notifications settings based on your preference

If you wish to disable it and receive all notifications, click ‘Off.’

The features we’ve included here are just some of the many Windows 10 functions that save time and add value to business-users’ lives. For more software and productivity recommendations, give our IT consultants a call today.

Published with permission from TechAdvisory.org. Source.