Latest Post

Blog

Mobile devices in the field

Field workers. You see them every day. And you notice that they, too, use mobile devices, as now more than ever do they need to stay connected with their organizations to stay in business. This is where mobile performance management, a critical factor for any field worker to perform and finish tasks on time, comes in. Here’s how to ensure connectivity for these workers.

The ability to manage the workforce out in the field requires a modern support infrastructure called mobile performance management. It includes the top five tips to keep field workers connected: optimizing traffic, applying control, measuring performance analytics, simplifying data security, and identifying the root cause of connectivity issues.

Optimize

Although the latest apps on the market can maximize productivity for the mobile workforce, these apps come with a certain risks: stability issues that could lead to the apps crashing while out in the field. If you are your company’s IT decision-maker, be cautious of untested apps, and consider blocking heavy bandwidth apps to streamline data flow when signal strength is weak.

Control

Another thing you can do with mobile performance management solutions is blocking personal apps and unsafe WiFi networks. Both of these create serious security risks that could lead to costly data theft or loss.

Analyzing performance

Field workers mostly rely on GPS location data for more efficient scheduling, route-planning, and effective control of fuel consumption. This is possible only if there are reporting tools that confirm that the GPS capability is working. Performance analytics show you what mobile workers are experiencing, gaining access to robust data, network and app usage reports, inventory analysis, coverage maps and device maps as needed.

Simplify security

IT should tightly restrict access without making security complicated for mobile workers. IT administrators need to create a highly flexible and programmable secure mobile strategy. You must be able to restrict which apps can access company data and remotely wipe data from the device if it is lost or stolen.

Identifying the root cause of connection issues

Obviously, field workers are not IT experts, so organizations need to be fully prepared for connectivity issues involving their mobile devices. Organizations of all sizes should be able to afford remote diagnostics to gather complete troubleshooting information to allow IT to identify the root cause of the problem quickly, without relying on workers, who have no idea about how to run tests and answer questions regarding these issues.

For any organization with workers in the field, the ability to implement performance management structures and policies is a must. For other tips on how to keep your employees connected, engaged, and efficient, give us a call and we’ll be happy to advise.

Published with permission from TechAdvisory.org. Source.

Office 365: New security updates

Microsoft recently rolled out security updates to Office 365 for business and home users. These enhancements aim to increase safety when sending or receiving an email in Outlook, sharing links in OneDrive, and alerting users of possible malware infection.

Files Restore in OneDrive

Previously available only to Office 365 business users, Files Restore allows users to conveniently recover files in OneDrive within the last 30 days. Home and personal users can now easily retrieve and restore all their files at a specific point in time, which is useful in instances where files are accidentally deleted, corrupted, or compromised by ransomware or other malware.

Ransomware detection notification for Office 365

You receive notifications and alerts for a variety of things on your PC or mobile devices, but rarely for something as immensely important as a ransomware attack. Office 365’s ransomware detection and recovery feature sends desktop notifications, email alerts, and mobile alerts in case of any possible ransomware attack on your system so you can act fast.

Aside from being notified about a detected ransomware, you’ll also be guided on how to recover your files before they were infected, based on the timestamp recorded by Files Restore.

Password-protected link sharing in OneDrive

Whenever you share a link — whether to a file or folder — in OneDrive, there’s no guarantee that it won’t be shared to unauthorized users. A password-protected feature solves this dilemma by giving you an option to set and require a password for every file or folder you share.

Email encryption in Outlook

Intercepting email has become many cybercriminals’ preferred method of stealing critical information, so it’s more crucial than ever to ensure email safety. With Outlook’s end-to-end encryption, users can rest easy knowing that the email they send won’t be easily intercepted after all.

Email encryption works by requiring non-Outlook email recipients to choose between receiving a single-use passcode or re-authentication to open an email from an Outlook email sender. On the other hand, an Outlook-to-Outlook email exchange — whether Outlook on desktop, mobile (iOS and Android), or Windows Mail app — doesn’t require any further action for the email to be opened.

Prevent Forwarding

This function restricts email recipients (both Outlook and non-Outlook users) from forwarding or copying email. It also provides an option to prevent certain recipients from opening an attachment from a forwarded email, which will come in handy when a person needs to send an email to more than one recipient, but wants to restrict access to an attachment to just a few recipients.

These new capabilities greatly reduce the effort to secure your files and communications, and Microsoft is sure to roll out a few more soon. If you want to optimize these Office 365 security features or explore other productivity tools’ security features, call us today.

Published with permission from TechAdvisory.org. Source.

The top 4 new features in the Windows 10 update

Microsoft has claimed that Windows 10 will be the final version of the world’s most popular operating system. Instead of bundling new features into a new Windows release, Microsoft has been issuing free updates to the current version since 2015. The latest update is almost here, and it comes with some exciting improvements.

Timeline

Replacing the Task Viewer icon that sits along the Windows taskbar, Timeline lets users view their desktop’s activity history. When users click the icon to the right of the search icon located on the taskbar, they will see all the applications that are currently open. Scroll down and Windows will display documents, photos, videos, and folders that are organized by when they were last used.

Can’t find the file you were working on last Wednesday? Scrolling to that date in Timeline will be the quickest way to track it down.

Nearby Sharing

This simple feature makes it much easier to transfer files between Windows devices. After enabling Nearby Sharing from the Control Panel, click the Share button in the Edge browser or Photos app and select the computer you want to receive the file. Users can also right-click any file and select Share. The computer receiving a file will display a notification for users to accept or decline the transfer. This means file transfers can finally take place without empty email messages, unreliable network folders, or beat-up USB drives.

Swift Pair

Want to make a call from your desktop with a pair of wireless headphones or test out a wireless keyboard? Just turn on a Bluetooth device within range of your desktop, and Windows 10 will automatically detect and notify you of the connection opportunity — all you need to do is click Connect.

Privacy

If you’re concerned about information being collected from your business’s computers, the brand new Windows Diagnostic Data Viewer will tell you everything you need to know. Users can now view what information Microsoft receives from their computer and fine-tune privacy settings related to browser history, connected devices, application usage, and webcam permissions.

Scheduling your update

It’s hard to know exactly when your Spring Creators Update will be ready to install, so it’s a good idea to brief your staff on how to minimize business interruptions that the update might cause. Windows 10 updates can be installed immediately, “Snoozed,” or rescheduled, so start thinking about which would be best for your office.

Beyond these impressive new features, Microsoft’s updates come with invaluable security protections. If you’re having trouble keeping your Windows devices secure and running smoothly, give us a call today.

Published with permission from TechAdvisory.org. Source.

Beware of watering hole attacks!

Hackers have plenty of ways to breach your systems. They can use complex programs to exploit software bugs, send emails to dupe you into downloading malware, or insert a malware-infected USB drive directly into your computer. However, another increasingly popular hacking method is a watering hole attack.

What are watering hole attacks?
Much like phishing, a watering hole attack is used to distribute malware onto victims’ computers. Cybercriminals infect popular websites with malware. If anyone visits the site, their computers will automatically be loaded with malware.

The malware used in these attacks usually collects the target’s personal information and sends it back to the hacker’s server. Sometimes the malware can even give hackers full access to their victims’ computers.

But how does a hacker choose which websites to hack? With internet tracking tools, hackers find out which websites companies and individual users visit the most. They then attempt to find vulnerabilities in those websites and embed them with malicious software.

Any website can fall victim to a watering hole attack. In fact, even high-profile websites like Twitter, Microsoft, Facebook, and Apple were compromised in 2013.

You can protect yourself by following these tips.

Update your software
Watering hole attacks often exploit bugs and vulnerabilities to infiltrate your computer, so by updating your software and browsers regularly, you can significantly reduce the risk of an attack. Make it a habit to check the software developer’s website for any security patches. Or better yet, hire a managed IT services provider to keep your system up to date.

Watch your network closely
To detect watering hole attacks, you must use network security tools. For example, intrusion prevention systems allow you to detect suspicious and malicious network activities. Meanwhile, bandwidth management software will enable you to observe user behavior and detect abnormalities that could indicate an attack, such as large transfers of information or a high number of downloads.

Hide your online activities
Cybercriminals can create more effective watering hole attacks if they compromise websites only you and your employees frequent. As such, you should hide your online activities with a VPN and your browser’s private browsing feature.

At the end of the day, the best protection is staying informed. As cyberthreats continue to evolve, you must always be vigilant and aware of the newest threats. Tune in to our blog to find out about the latest developments in security and to get more tips on how to keep your business safe.

Published with permission from TechAdvisory.org. Source.

Back up your files with Apple Time Machine

There’s a popular belief that Macs are the most reliable computer brand because they are less likely to get viruses or crash often – but they do. And like any other computer, Macs aren’t invulnerable to coffee spills, theft, and crashes. When these happen, the Time Machine is your friend to restore your data.

What is Time Machine and why should you use it?

Time Machine is a backup system software for Macs that run on Mac OS X Leopard or later. It makes regular periodic backups in the following intervals:

  • Hourly backups for the past 24 hours
  • Daily backups for the past month
  • Weekly backups for previous months

If you’re concerned about storage space running out fast because of the frequent backups, don’t worry. These scheduled backups don’t replace previously saved files; rather, they only save the changes you’ve made to a file.

Let’s say you’ve been working on a file for five days: Time Machine has periodically created backups of the changes you made every day. So if you need to retrieve a version of a file with changes made on Day 2, you can do so even after you’ve made several changes on the file from Days 3-5 because Time Machine stores multiple copies of the file from Days 1-5.

In case you’re replacing a Mac, you can easily copy all your files from your old computer to the new one, with your settings, files, and folders intact. And if you’re backing up data from several Mac computers, there’s no need to use a separate device for each Mac, provided it has enough space for all files.

How to use Time Machine

To use Time Machine, you only need an external storage drive such as a USB, an SSD card, or any storage device that can be plugged into your Mac. Then follow these steps:

  • Connect an external storage device (or macOS server) to your Mac
  • Go to System Preferences > Time Machine
  • Click ‘Use as Backup Disk’ (It’s recommended that you click Encrypt Backup Disk before you do so, in order to set up a password for accessing your backup)
  • If Time Machine doesn’t automatically pop up when you connect an external storage disk, go to Time Machine via System Preferences or click the Apple icon on the upper left corner of the menu bar, click System Preferences > Time Machine
  • Select the storage disk you’ve just connected, then click ‘Use Disk’

Other backup options

Although there are various other backup systems for Mac, Time Machine is one of the more practical options for users who value simplicity, convenience, and reliability. What’s more, it’s free.

That said, similar backup systems like ChronoSync offer slightly more comprehensive backups. And since Time Machine only backs up data instead of the entire hard drive, restoring an entire system is relatively slower.

Despite this minor shortcoming, Time Machine is a reliable, user-friendly, and economical way to back up your files. Whether you’re backing up a device for personal or business use, using Time Machine ensures all your files are safe and can be recovered. If you need more comprehensive backup solutions, our experts are ready to help — call us today.

Published with permission from TechAdvisory.org. Source.

4 ways to speed up mobile charging

Whether you use an iPhone or a Xiaomi, your mobile will sooner or later run out of battery. When this happens, you want it to be charged to 100% quickly, but not everyone knows how to do it. Read on to learn four ways about how you can charge your mobile faster.

#1. Optimize your phone accessories

One reason why your phone charges slowly is because of poor-quality accessories — such as cables, adapters, and weak sources of electricity.

Cables and adapters

Unless you were careful to take great care of your phone cable and adapter, they might be the reason why your phone is charging so slowly. If you think this could be the problem, we recommend that you change them immediately. After doing so, make sure to use and store your new cable and adapter properly to keep them in tip-top shape.

Charging Source

Did you know that your phone will charge faster if you connect it to a higher amperage charging source? Although mobile phones charge at only 5 volts, depending on the charger you use, you can get amperage from as low as 500mA (milliamps) to as high as 2,100mA. Therefore, it is recommended to forgo charging your mobile device through a computer port (uses 500mA or 900mA) and use a wall charger (ranges from 500-2,100mA) instead.

#2. Clean your phone’s charging port

Another reason why you may experience slower charging time is because of a corroded or obstructed port. If the problem is because of obstruction, get a flashlight, magnifying glass, toothpick, and small brush to completely remove any debris. However, you should be very careful when doing this because the port is very fragile.

We recommend you enlist a professional’s help to clean your port if you’re worried about damaging it or if the problem is due to corrosion.

#3. Background apps

When was the last time you sorted out your phone’s background apps? If you don’t remember, then it’s time to do it! Apps that are opened and left running in the background not only drain your phone’s battery, but also affect your phone’s charging speed. Select “Battery” in your phone’s Settings to find out which apps are using up your phone’s power, and delete them if necessary.

#4. Using your phone while charging

Do you browse the internet while your phone is charging? If yes, then you should stop doing it. Feature-rich apps like WhatsApp and Facebook have been listed as two of the top ten battery draining apps by AVG, which means you may be slowing down your phone’s charging speed when you use them while it charges.

Every successful business needs high-performance mobile phones, but this is only possible if their batteries are juiced. If you want more information about how to speed up charging your phone, contact our experts today.

Published with permission from TechAdvisory.org. Source.

3 Surprising applications of blockchain

Most people associate blockchain technology with Bitcoin, the infamous digital currency that rose to fame in 2017. But blockchain technology is not tied to financial transactions, and it’s creating all sorts of exciting opportunities for faster, more secure information exchange — see for yourself!

What is blockchain?

Blockchain, like the cloud, is more of a concept than a specific piece of software or hardware. It’s the idea that if you store a spreadsheet or ledger on a hundred different computers — each of which receive automatic and encrypted updates — it’s nearly impossible to create a fraudulent entry. If someone adds a line of false information to one spreadsheet, 99 others can confirm it is not in their copy and is therefore inaccurate.

In the Bitcoin ledger, each line represents the transfer of funds from one account to another. So if John wants to transfer money to Jane, he sends a request to Bitcoin’s blockchain and thousands of computers confirm his account information is correct and he has sufficient funds. The money is transferred, both account balances are updated, and the whole process takes less than an hour with almost no human interaction. Much faster than the 5-7 business days of most banks.

There are countless applications for decentralized, real-time record keeping beyond financial transactions, though. And very soon, blockchain won’t be synonymous with Bitcoin.

Blockchain’s potential

Although this technology has been around since the ’90s, it lacked the popularity and computing power necessary to become a mainstream solution…until now. With the rise of cryptocurrencies in 2017, blockchain started seeping into other industries, such as:

  • Law – “Smart contracts” create agreements that automatically execute when their terms are met. For example, an attorney could agree to pay a courier $100 after the delivery of documents to the defendant in a case. The contract and the payment sit in the blockchain until the courier uploads a GPS-tagged photo of services rendered, at which point the money is transferred and the contract archived.
  • Agriculture – Supply chain blockchains can track every ingredient throughout the production process. If several people get sick from the same food item, ingredients could be traced back to their source and products that share the same ingredients could be recalled preemptively.
  • Real estate – Blockchain is being used to automate escrow account transactions, property title transfers, and insurance claims, so they aren’t reliant on slow and error-prone humans. Buying a home could eventually be as easy as finding the one you want, signing a contract, transferring your down payment, and receiving the title — no middleman necessary.

Most blockchain-based solutions are too new to trust with sensitive information. But you can do a few things to get out in front of your competitors. You can work with us to invest in business intelligence software that helps you collect more data, and start experimenting with risk-free blockchain solutions.

As long as you have certified technicians like ours at your disposal, you’ll be sure to see gains in no time — give us a call today!

Published with permission from TechAdvisory.org. Source.

Microsoft announces new features for Teams

Microsoft has recently announced new features for Microsoft Teams. These features are expected to bring users greater convenience and improved communication, and ultimately increase its appeal to a wider market.

Cortana Integration

One new feature that Microsoft will bring to Teams is Cortana, Microsoft’s virtual assistant. By integrating Cortana with Teams, users can use voice commands to make calls, join an ongoing meeting, or add other users to the meeting. This feature will also work with IP phones and conference room devices.

Inline Message Translation

While most people can communicate well in English, not everyone is comfortable using the language. Inline message translation allows these people to chat in their native language and then translate their messages into English. This will not only help them verbalize their thoughts better and faster, but you’ll also be able to understand exactly what you have to do to meet their demands.

Cloud Recording and Automatic Transcripts

Have you ever forgotten or overlooked important meeting details? This new feature will allow you to record meetings, store it in the cloud, and create a transcript of it. The ability to save the entire meeting also allows users to review everything or segments of it in the future at their convenience. This is particularly useful for meetings that are highly detailed or very long.

Facial recognition, which will allow statements to be matched with the corresponding speaker, is expected to be included in the future.

Background Blur Option for Video Calls

Most people get easily distracted. But you want to minimize these distractions and have them focus on you when you have an important meeting like a business pitch. Teams’ latest feature allows you to blur your background during video calls so other people in the meeting can fully concentrate on you.

Proximity Detection for Teams Meetings

A feature that can make your meetings simpler is proximity detection. When you enter a room equipped with a Teams meeting room device, Proximity Detection will automatically detect your Teams-enabled meeting room laptop and prompt connection for you to join the Teams meeting room. This helps you save time finding an available room so you can immediately connect with other users.

Mobile Sharing in Meetings

Have you ever needed to join a sudden meeting but couldn’t perform as well as usual because you were on the go with only a mobile device? Mobile Sharing in Meetings solve this by allowing you to share a live video stream, photos, or your phone screen with other attendees immediately.

If you’re interested in improving your company-wide communication and would like to learn more about Microsoft Teams, contact us today.

Published with permission from TechAdvisory.org. Source.

Windows 10: New accessibility features

Microsoft is working on improvements for Windows 10’s accessibility features, which will be introduced later in the year. Some of these are already available to preview through the Insider Program, but everyone else will have to wait. Here’s what’s coming:

Better Ease of Access settings

Some users rarely tinker with their computer’s accessibility settings because they’re difficult to locate and adjust. Luckily, in the upcoming Windows 10, this won’t be the case. Microsoft will soon launch Ease of Access settings that’s easier to discover, learn, and use. The enhancements are categorized into Vision, Hearing, and Interaction (speech and eye control) groups.

Those who want bigger characters can adjust settings under “Make everything bigger,” which lets you enlarge apps and text. You can also “Make everything brighter” by increasing the brightness of your built-in display, and “Simplify and personalize Windows” by turning on or off animations, transparency, and automatically hiding scrollbars in Windows on the Display page. You can also ask Cortana to find a specific setting for quicker access.

Narrator enhancements

Narrator is Windows 10’s screen-reading app that reads text on a PC screen and ‘narrates’ to users their notifications, calendar reminders, and other events. In the latest update, Narrator’s audio performance will provide faster, more responsive, and more accurate narration.

Previously, it reads bolded, italicized, or underlined statements by using statements like “start/end bold.” But in the new version, the narrator will change reading pitch, speed, and tone to emphasize certain texts.

Other improvements include a capability to run on Safe Mode and an enhanced Microsoft Edge browsing, which now announces various processes such as when users are opening or closing tabs, or loading or refreshing pages.

Eye Control adjustments

Windows 10’s eye control feature lets users control the mouse, type using an on-screen keyboard, and use text-to-speech with eye-control technology found in eye-tracking devices.

Soon to be introduced in Windows 10 is the capability for users to scroll and click directly from left to right, and quickly access Windows Start, Timeline, and other common tasks. And with the ability to pause eye control, users can hide the launchpad to enjoy undisrupted reading or streaming.

Other upcoming upgrades

Microsoft Learning Tools (advanced tools to enhance reading and writing skills) will soon include more intuitive text suggestions when using a keyboard, and language support for touch keyboards. Microsoft will also continue to work on improving its assistive technology partnerships.

Microsoft listened to users’ feedback and made several improvements in its accessibility features and apps so that people with poor vision, hearing loss, limited dexterity, and other disabilities will have a much better experience. If you need further help with Windows 10 features, don’t hesitate to get in touch with us.

Published with permission from TechAdvisory.org. Source.

Ready for tax season phishing scams?

As tax season looms, so do phishing scams. For cybercriminals, this is the ideal time of year to deceive unsuspecting individuals into releasing sensitive private or company information. Businesses must therefore take extra precautions between now and April 17th to avoid hackers from selling your confidential data in the dark web.

Phishing baits to watch out for

Phishing attacks often consist of fabricated or compromised emails sent to finance/payroll or human resources employees that are made to look like they’re from an executive in your company. The message might contain a request to forward employee records, including their W-2 forms, but that’s not all…

Another common scheme, which doesn’t only happen during tax season, involves getting a call from a person declaring to be an IRS employee. And no, caller IDs won’t save you because they can forge that, too. The phisher will inform you that you owe them cash from back taxes and they will threaten legal action if you don’t pay via credit card at that instant.

Always remember, the IRS will never contact you on the phone to let you know that you owe them money. And they certainly won’t threaten you or demand payment over the phone. If they really need to notify you of such matters, they’ll use the postal service and will give you a chance to discuss payment terms.

Standard protection protocols

Don’t worry, the usual security measures against these phishing scams are pretty easy to integrate into your business. Begin by developing a policy that bans the request of private details through email. If an employee ever requires such info, they should get in touch with the person directly, follow your established protocols for the transfer of sensitive information, and minimize the number of people involved in the transaction.

Taking security a step further

Data loss prevention (DLP) systems are also valuable weapons against these types of phishing attacks. They evaluate traffic going in and out of your company, such as web usage, emails and instant messages, and virtually anything sent on your network. DLP systems can filter out private details, including Social Security numbers, and stop them from being sent out.

But beware, DLP systems come with a minor drawback, as they can also block legitimate traffic, like when your accounting department sends tax info to your CPA. Fortunately, an MSP like us can properly segregate the good and the bad traffic to avoid confusing and/or frustrating your employees.

Phishing schemes may be a normal occurrence during tax season, but that doesn’t mean you can’t do anything about it. Don’t let the vulnerabilities in your business, particularly the human element, fall prey to cybercriminals. Send us a message right away and we’ll conduct an assessment of the security of your business, as well as design a risk management plan to help counter future complications.

Published with permission from TechAdvisory.org. Source.