Latest Post

Blog

Here come crapware-free PCs

Bloatware, trialware, crapware — the unnecessary software usually pre-installed by the manufacturer on your brand new PC. Besides being annoying, this type of software also slows down your machine and can tamper with security. Microsoft is fed up with it too, which is why they’ve come up with Windows 10 Signature Edition PCs. Read on to find out more.

What are Windows 10 Signature Edition PCs?

Microsoft Windows 10 Signature Edition is a new generation of specially configured PCs that are clear of junkware, which is unnecessary software pre-installed by PC manufacturers on new PCs. Microsoft is aiming to provide users with cleaner, more optimized PCs.

What’s tempting about them?

They are cleaner. It’s undeniable that PCs devoid of aggressive attempts to lure you to pay for upgrades is a more pleasant user experience. No more annoyances, no more need to spend time manually uninstalling unnecessary programs yourself.

They are faster. Once PCs are clear of third-party junkware, they’ll load quicker, whether you need to boot, shutdown, sleep, or resume working.

They are more secure, according to Microsoft. The Signature Edition PCs boast a built-in firewall and anti-virus and anti-phishing tools that come with ongoing security support and updates throughout their useful lives. What’s more, ridding your PC of bloatware means reducing the chances of you clicking on suspicious ads that will make your PC prone to attack.

You can find Signature Edition PCs in Microsoft’s brick-and-mortar stores and online, manufactured by leading PC makers such as Dell, Acer, HP, and Lenovo.

Is there any downside?

Possibly, yes. Signature Edition PCs usually cost more than similar machines containing bloatware. This is because bloatware is a source of extra income, and many vendors end up increasing the PC price to make up for the loss.

Another thing to note is that even though the Signature Edition PCs have less third-party software, much of Microsoft’s own crapware remains. That includes Candy Crush Soda Saga, Bubble Witch 3 Saga, and Drawboard PDF. The good news is Microsoft bloatware generally doesn’t affect a PC’s performance unless it is running.

Interested in switching to a cleaner version of Windows, but unsure whether it would be worth it? Before spending your hard-earned money on a piece of hardware, you need to make sure you understand the pros and cons, so why not consult our experts today? They know about computers and can advise you on how to make the right IT investments.

Published with permission from TechAdvisory.org. Source.

Cybersecurity Essentials: VPN

Whether it’s because of government surveillance or cyberattacks, internet users are more concerned than ever about the privacy of their online activities. Unfortunately, security measures like firewalls and antivirus software can’t help you in this case, but there’s one that can: Virtual Private Network (VPN).

What is VPN?

Simply put, a VPN is a group of servers you connect to via the internet. Once you’ve established a connection, your computer acts as if it’s on the same local connection as the VPN, making it seem like you moved to a different location.

When you surf the web through a VPN, all the data transmitted and received is also encrypted, preventing anyone — from hackers to government agencies — from monitoring your online activities.

Why should you have one?

Of course, security and privacy are major reasons why you would want a VPN. For example, if you’re connected to a public WiFi network — like the ones you typically see in local cafes and airports — using a VPN encrypts the information you’re sending or accessing online. This means things like credit card details, login credentials, private conversations, or other sensitive documents can’t be intercepted by a third party.

VPNs are also useful for accessing geo-restricted websites. If you’re traveling abroad and certain US websites are blocked in that region, you can simply connect to a VPN located in the US to access the sites you need.

Which VPN should you choose?

Given the increasing demand for secure online privacy, VPNs are surging in popularity. The following considerations can help you find the right one.

1. Cost
While free VPNs are available, we strongly suggest you avoid them. These keep logs of your internet activity, and in some cases sell them to the highest bidder. Maintaining a VPN service is also expensive, which means the free ones will likely plaster ads on your browser to make a quick buck.

Paid VPNs like SurfEasy and StrongVPN often come with more robust features and configurations that keep you secure. What’s more, they don’t keep a record of the sites you visit and hound you with pop-ups that lead to dangerous websites.

2. Location
The physical location of VPN servers is important if you want to access region-blocked websites. So if you’re planning on accessing a UK-based service, your VPN provider must at least have servers installed in London.

3. Capacity
Read through a VPN provider’s terms of service to determine how much data you’re allowed to use. If possible, find out how many servers a VPN provider has. If they have plenty of servers online, you can rest assured that they have the capacity to support your internet browsing.

4. Device compatibility
Another important factor to consider is whether the VPN can be used across multiple devices. Nowadays, employees work on laptops, tablets, and smartphones, so you’ll want a VPN that’s compatible with all these.

5. IP leaking
Finally, a great way to evaluate a VPN service is to sign up for their free trial service and visit https://ipleak.net/, which will allow you to check whether your real IP address is actually being leaked. If it manages to track your physical location, you need to opt for a more reliable VPN service.

VPNs are now a vital component of cybersecurity, and if you need help selecting the right one for your business, consult with our security experts today. We also offer comprehensive cybersecurity services so no hacker or third party can get their hands on your data.

Published with permission from TechAdvisory.org. Source.

Useful keyboard shortcuts for Mac users

Did you recently switch from Windows to Mac? If so, you’re probably still getting used to the Apple keyboard. The good news is it’s only slightly different from a non-Apple keyboard. The bad news is you’ll have to learn a whole new set of shortcuts. Although some basic shortcuts are the same in both Apple and Windows computers, there’s plenty more that you ought to use.

Minimizing (or ‘Docking’) the front app window: Command M

Use this combination when you have several apps, browsers, or Finder windows open and want to minimize the active one. To minimize all open windows at once, press Command + Option + M.

Closing an active window: Command + W

This shortcut lets you close active apps or programs like browsers, Finder, Thesaurus, or any app that allows multiple tabs to be open simultaneously. To close all tabs without quitting the program entirely, press Command + Option + W.

Quitting a program: Command + Q

Clicking the red X button in most Mac apps and programs, like Mail, only puts them in the dock. This shortcut lets you fully quit an application.

Force quitting a program: Command + Option + Escape

If an app becomes unresponsive, you can shut it down by using the force-quit shortcut, which displays all your open applications. Select the one you want to quit and hit ‘Force Quit.’ In some instances, you might need to press Command + Tab to switch to another app, then press Command + Shift + Option + Escape to quit an active app.

Hiding apps: Command + H

With this trick you can hide an active window, which is particularly useful when you want to quickly conceal what’s on your screen. It’s also great for decluttering your screen by keeping only one app active. Simply press Command + Option + H.

Opening folders in Finder: Command + Shift + A/U/D/H/I

These combinations offer faster ways to view your Applications (A), Utilities (U), Desktop (D), Home (H), and iCloud (I) folders without having to click several apps.

Shutting down a Mac: Command-Alt-Control-Eject

In a hurry and need to power off quick? This shortcut shuts down everything — apps, operating system, and power.

Taking a screenshot:

  • Command + Shift + 3 – Use this to take a snapshot of your entire screen.
  • Command + Shift + 4 – This combination will turn your cursor into a set of crosshairs that will let you select a specific area of your screen.
  • Command + Shift + 4 + Spacebar – Hit these keys to screenshot only your current window (browser window, Notes app, etc.) without altering its dimensions.

Other little-known shortcuts:

  • Command + Spacebar – Press these keys and the Spotlight Search bar will appear in the upper center of your screen, which you can use to search for files or programs.
  • Command + Option + D – Use this to hide the Dock.
  • Command + Shift + [ or ] – Cycle through tabs in Safari by pressing [ when moving right or ] when moving left.
  • Command + Shift – See all your open tabs in an active browser.
  • Command + , (comma) – Open the active app’s settings.
  • Command + Shift T – Opens the last closed tab in the active browser.

Everyone uses hotkeys to work faster and more efficiently. If you need more usability and productivity tips and tricks on MacBook, iMac, MacBook Pro, or any of your business devices, call our experts today!

Published with permission from TechAdvisory.org. Source.

How to extend your laptop battery life

These days, we get a lot of our work done on laptops, which means battery life is a huge priority for any laptop user. Wouldn’t it be good, then, to learn how to prolong the life of your laptop battery? Here are a few useful tips to do just that.

Some truths about your laptop battery

Batteries in many devices nowadays are lithium-based — either lithium-ion or lithium-polymer — so users must take note of the following guidelines for their proper maintenance:

  • They can’t be overcharged, even though you leave your battery plugged in for a long period of time. When the battery hits 100%, it’ll stop charging.
  • Leaving your battery completely drained will damage it.
  • Batteries have limited lifespans. So no matter what you do, yours will age from the very first time you charge it. This is because as time passes, the ions will no longer be able to flow efficiently from the anode to the cathode, thereby reducing its capacity.

What else can degrade your battery

Besides its being naturally prone to deterioration, your battery can degrade due to higher-than-normal voltages, which happens when you keep your battery fully charged at all times. Even though a modern laptop battery cannot be overcharged, doing so will add a stress factor that’ll harm your battery.

Both extremely high temperatures (above 70°F) and low temperatures (between 32-41°F) can also reduce battery capacity and damage its components. The same goes for storing a battery for long periods of time, which can lead to the state of extreme discharge. Another factor is physical damage. Remember that batteries are made up of sensitive materials, and physical collision can damage them.

How to prolong your battery life

Now that you know some facts about your laptop battery, it’s time to learn how to delay its demise:

  • Never leave your battery completely drained.
  • Don’t expose your battery to extremely high or low temperatures.
  • If possible, charge your battery at a lower voltage.
  • If you need to use your laptop for a long period of time while plugged into a power source, it’s better to remove the battery. This is because a plugged-in laptop generates more heat which will damage your battery.
  • When you need to store your battery for a few weeks, you should recharge your battery to 40% and remove it from your laptop for storage.

These are just a few tips on extending the life of your hardware. There are many more ways you can maximize your hardware efficiency and extend its longevity. Call our experts today to find out more!

Published with permission from TechAdvisory.org. Source.

Microsoft’s new productivity apps are live

In July 2017, Microsoft announced three brand new apps for Office 365: Connections, Listings, and Invoicing. They were designed for businesses with fewer than 300 employees and after a few months of beta testing, they’re finally available to Business Premium users. Take a minute to learn about what they can do for your team!

Microsoft Invoicing

Word and Excel have hundreds of templates for generating company invoices, but this new app does much more than just create documents. Invoicing allows you to store the names, descriptions, and prices of your products and services in a connected database. You can also store your tax information, company logo, and a click-to-pay PayPal badge, which means half of the necessary information is automatically filled out the moment you click Create.

In addition to clean and professional looking documents, Invoicing also makes it easy to organize, store, and search past invoices thanks to a built-in QuickBooks integration. Last but not least, all of this is easily accessible from Microsoft’s mobile app.

Microsoft Listings

With its centralized dashboard, Listings allows you to manage and update company details displayed by Google, Facebook, Bing, and Yelp. It also helps you monitor your company’s online reputation by tracking page-views, company reviews, and Likes.

Microsoft Connections

Connections is the perfect app for small business email marketing. Similar to the Invoicing platform, Connections stores your company information and uses it to create personalized email marketing campaigns with the click of a button.

For example, templates for newsletters, referrals, and promotions include customizable discounts and offers that trigger pre-written follow-up campaigns. Connections tracks and analyzes the performance of all your email-based campaigns to make refining and improving your content a breeze, whether it’s from your desktop or the mobile app.

How to enable Invoicing, Listings, and Connections

As long as you have an Office 365 Business Premium subscription, accessing these apps requires only a global admin login. From the Admin Center, click the Settings tab on the left-hand side of the screen, followed by Services & add-ins and then Business apps. In this menu, you can grant specific users permission to use Microsoft’s newest programs.

Setting up these apps is fairly easy. However, it’s even easier to have your Office 365 account managed by us. We could have remotely installed Invoicing, Listings, and Connections for you almost a month ago, and with our information security expertise and unlimited IT support requests, there’s no limit to the value we can add to your Office 365 subscription. Give us a call to get started!

Published with permission from TechAdvisory.org. Source.

Outlook on Mac and Windows gets redesigned

Microsoft is redesigning Outlook for Mac and Windows to reduce clutter and improve user experience. The design changes will be patterned after the iOS version of the app, which is much easier to use and more modern-looking than its desktop counterpart. If you use Outlook on a desktop, check out these new changes.

How Outlook will be simplified

The most notable feature of the new Outlook will be a simplified navigation bar along the top of the screen, which means less of the screen will be reserved for formatting and organizational options. However, you can still add more buttons to accommodate your common tasks and preferences. With a smaller number of commands, you can benefit from an uncluttered interface that lets you use email more efficiently.

Changes will also be made to the left panel to provide users with quicker access to folders across multiple accounts. Moreover, a slide-to-delete function using Apple’s trackpad — like in the iOS version — will be integrated into the redesigned app.

Other design changes for Outlook in Mac

Mac users can also expect faster and more reliable search and calendar features in the enhanced Outlook. The search function will get a performance boost and will be moved to the top right corner of the app for easier access. The calendar function’s interface, on the other hand, will be reworked to eliminate tedious steps currently required to manage appointments.

These and other upcoming changes are aimed at increasing users’ satisfaction ‘by providing a cleaner, more modern way to email.’ The design changes will also benefit those who access their account on different devices because, in the updated desktop version, they will be able to enjoy the same uncluttered app that they use on their mobile devices.

Although the changes are for Windows and Mac, Microsoft is implementing most of the design changes primarily for Mac. Microsoft recognizes Outlook’s popularity among “key influencers and decision makers,” whom it wishes to win over before a wider release. The new version will most likely become available to Office 365 subscribers first and eventually roll out with Office 2019, which is expected to arrive in mid-2018.

An easy-to-use email interface is a boon to your business’s productivity. And with Outlook’s new look and improved functionality, you can read, send, and organize emails more conveniently and with minimal distraction. Our experts are on-hand to answer all your questions about Outlook and other Microsoft Office apps — get in touch with us today.

Published with permission from TechAdvisory.org. Source.

Google studies effects of leaked logins

Passwords are your first line of defense against hackers. But over the years, they have developed plenty of methods to steal them. To gain a deeper understanding of how cybercriminals operate, Google analyzed the causes of leaked login credentials. Here are the results.

The results
From March 2016 to March 2017, Google and UC Berkeley researchers examined three main ways hackers hijack accounts:

  • Keylogging software – a malicious program that records computer users’ keystrokes
  • Phishing emails – to lead people into dangerous websites
  • Stolen passwords – available to the highest bidder

In just one year, Google found 788,000 successful keylogging attacks, 12.4 million victims of phishing attacks, and 1.9 billion accounts exposed via login credentials sold on the black market.

Researchers suggest the reason so many accounts are hacked is because people tend to reuse their passwords, which means if one set of login credentials is exposed, other accounts could be compromised.

Phishing is also a big threat because it targets users — the weakest links in your cybersecurity. The strongest password or security system won’t mean anything if your employees constantly fall for online scams.

Protecting your accounts
There are several things you can do thwart account hijacking. For starters, you should set strong and unique passwords for each account to minimize data breaches.

While the general rule in the past was to set a complex password — a mix of letters, numbers, and symbols — recent studies suggest that longer, 20-character “passphrases” are much tougher to crack. If you find it difficult to remember several passwords, consider using a password manager, which not only stores all your passwords, but can generate strong passwords, too.

To deal with phishing attacks, you should activate multi-factor authentication on your accounts. This adds an extra layer of identity verification to your password (e.g., a fingerprint scan or a temporary security key sent to your phone), making your login details ‘unphishable.’

Security training is also crucial. This includes teaching your employees about what phishing attacks look like and instructing them on password protection best practices so they never fall victim to account hijacking.

The bottom line is not only that strong password security requires strong defense mechanisms; you and your employees must be vigilant, too.

Need more advice on keeping your business safe? Call us today! We provide critical security updates and comprehensive support services to help you stay well ahead of cybercriminals.

Published with permission from TechAdvisory.org. Source.

Windows Hello makes logging in simple

In another example of sci-fi technology becoming reality, Microsoft’s biometric logins can now recognize your face, fingerprint, or eyes when you attempt to access your device. It’s exciting as well as convenient and we’ve got everything you need to get started, right here.

Say hello to fingerprint, iris, and facial scans

Windows Hello is an advanced biometric identity and access control feature in Windows 10. With it, there’s no need to enter a password; all it needs is your fingerprint, eye scan, or just your face.

For those who are worried about privacy, the feature stores your biometric data only on your device, never on Microsoft’s servers. Microsoft has also made it clear that third parties cannot access your biometric data, although, as with every new technology, it’s best to treat this with caution.

How to set up Windows Hello

All you need to get started is a laptop or desktop with Windows 10 and a compatible webcam (there is a full list here).

First, go to Settings > Account > Sign-in options. Then, under the Windows Hello section, you’ll see setup options for face, iris, or fingerprint scans. Select which method you want to set up and follow the prompts to create a login profile.

You can also save your biometric data or scan more than once to boost accuracy. Each time you scan, the system collects more data, so it’s worth completing a few scans before enabling the login feature.

However, passwords are still an option when using Windows Hello and should always be configured in case your camera isn’t operational. Once one account is set up, you can start adding family members who share the same device. Each of them can set up their own biometric profile in a separate account.

There are many features in Windows that can make your life easier. Our IT experts can help you get more out of your Windows devices. Contact us today!

Published with permission from TechAdvisory.org. Source.

Essential macOS High Sierra updates

The macOS 10.13.1 High Sierra update “improves the security, stability, and reliability of your Mac and is recommended for all users.” This is a standard message in most operating system updates, but users seldom pay heed. This time, however, Apple’s latest Mac OS includes a security update that’s essential to keeping your devices safe from KRACK.

Why you should update now

Foremost on Apple’s list of macOS updates is the addition of 70 new emojis. Although this is exciting to some, the most compelling reason to update to the latest OS is the security patch for the KRACK WiFi security flaw.

For those who are unfamiliar, KRACK or “Key Reinstallation AttaCK” was discovered in October by researchers who found a serious vulnerability in almost any device that can connect to WiFi (not just Macs). It compromises WPA2, a standard security protocol that protects most WiFi networks, and intercepts data that passes between a wireless device and the router. This exposes private messages, login credentials, and other sensitive data to attackers.

Aside from compromising your data, a successful KRACK attack could also infect your systems with ransomware and other malware. Updating to the latest OS ensures your device gets the latest security patch needed to shield it from KRACK.

Other relevant macOS updates

Aside from important security updates, the new macOS also fixes a bug that makes Bluetooth unavailable when performing Apple Pay transactions, improves the syncing of Microsoft Exchange messages in the Mail app, solves a keyboard bug with the search feature Spotlight, and improves Touch ID accessibility settings.

The macOS 10.13.1 High Sierra update coincides with updates for Apple’s other line of products, including iPhones (iOS 11.1), Apple watch (watchOS 4.1), and Apple TV (tvOS 11.1), all of which get security and performance improvements in their latest operating systems.

To install the update, launch the App Store, then click the Updates tab. Available updates will appear in the topmost section of the app.

Updating to the latest operating system as soon as it becomes available lets you enjoy a better-performing system and stay safe from the exploits of emerging vulnerabilities like KRACK.

Whether you need assistance with automating your devices’ updates or improving your systems’ overall security, our technicians can provide professional advice. Get in touch with us.

Published with permission from TechAdvisory.org. Source.

Google My Business now accepts appointments

There are countless platforms that showcase, review and link to small businesses, but few have as much impact as Google does. Although business owners can’t choose where their site ranks in the search results, they can edit information that is displayed and insert some flashy new features.

How to edit your business’s Google listing

When someone types your business’s name and location into Google.com, a “Knowledge Panel” is displayed on the righthand side of the search results with information about your office. If your business doesn’t have a Knowledge Panel, you can change that by opening a free Google My Business (GMB) account.

The GMB platform lets you link to your website, update office information (address, hours, phone number, etc.) and choose which photos Google associates with your company. GMB also gives you data about how many people:

  • Saw your business’s Knowledge Panel in search results
  • Visited your website by clicking somewhere in the Knowledge Panel
  • Asked for directions via the Knowledge Panel

What’s new with GMB?

In the summer of 2017, Google announced that business owners could customize “Posts” in their Knowledge Panel. Posts are made up of a 100-300 word caption, an image and a call-to-action button, such as Learn More, Sign Up, Buy, etc. Posts automatically expire after seven days, which makes them perfect for sales, events and content marketing.

More recently, Google added another exciting feature: the ability to schedule appointments from inside the Knowledge Panel. If your website uses one of the 22 accepted plugins, you can connect it with GMB to make it easier for searchers to book a reservation at your location. Google is in the process of rolling out this feature to gyms, beauty salons and restaurants, but a wider release is on the way.

How do I enable Bookings?

Adding this feature to your GMB page is an easy four-step process:

  1. Log in to Google My Business
  2. Click on the Sign Up For Bookings icon below your business’s profile
  3. Choose your booking provider from the list of approved vendors and sign up on its site
  4. Check back in a few days and start tracking your appointments with GMB!

If your business accepts reservations, this feature will be an indispensable tool for improving your customers’ experiences. For more information on low-cost technology solutions that add value to your business — give us a call today.

Published with permission from TechAdvisory.org. Source.