Latest Post

Blog

Window 10’s biggest flaws addressed

In the past year, Microsoft was heavily criticized for forcing the Windows 10 OS update on PC users. After thousands of customer complaints, the tech giant vowed to make changes and appease disgruntled end users. With the new year are signs that the firm is finally tending to these problems. Here are some of them:

A patch and a glitch away
Users couldn’t escape the glitches in the frequent Windows 10 updates, which caused an array of problems such as frozen systems, broken webcams, and even PCs being unable to secure an Internet connection. In light of the patching dilemma, Microsoft is offering more options to defer updates. In fact, a leaked preview shows a new option to pause updates for up to 35 days via a switch in the Settings menu.

OneDrive placeholders
Since the launch of Windows 10, many users have eagerly awaited Microsoft to re-introduce this beloved feature to the operating system’s built-in OneDrive cloud storage service. In Windows 8.1, placeholders (aka Smart files) allowed users to see all their OneDrive files, whether or not they were stored on the device. Making its return in Windows 10 File Explorer when using OneDrive, the feature shows user files stored locally as well as on the cloud.

Owning up to the update fiasco
Not only is Microsoft addressing the various complaints it received, but it’s also owning up to some of them. Just before Christmas, Microsoft’s chief marketing officer, Chris Capossela, admitted that the company had gone too far when it tried to get Windows 7 and 8 users to upgrade to Windows 10. This referred to Microsoft’s decision in early 2016 to change the design for the user prompt for its Get Windows 10 app, the software responsible for scheduling upgrades. The user prompt was altered so that clicking X to close the window causes the user to unknowingly agree to a Windows 10 upgrade. This change puts Microsoft in direct violation of its own user experience guidelines for developers on dialog box design.

“Within a couple of hours of that hitting the world, we knew we had gone too far,” recalled Capossela. “Those two weeks were pretty painful and clearly a lowlight for us.” It was then that Microsoft reversed its decision on tweaking the pop-up, so clicking on X would dismiss the upgrade.

It seems that 2017 is the year that Microsoft will start listening more to its users and addressing their complaints. Maybe: Hopefully this renewed strategy will benefit users sooner rather than frustrate them later. Contact us and we’ll keep you up-to-date with the latest Microsoft updates.

Published with permission from TechAdvisory.org. Source.

Cyber security and managed services

Cyber security is something you hear about a lot these days. Sometimes it’s thrown around to scare business owners, other times it has proven to be a cautionary tale, one that small businesses can learn from to fend themselves from online threats that can leave devastating impact. What’s certain is statistics don’t lie, and as much as you’d like to believe your business is safe, the worst could happen at any time. Because antivirus software alone can only do so much to protect your business, managed services has become the solution. To make our case, here are several statistics that prove you need managed services from a technology provider.

The numbers

Small businesses are not at risk of being attacked, but worse, they’ve already fallen victim to cyber threats. According to Small Business Trends, 55 percent of survey respondents say their companies have experienced cyber attack sometime between 2015 and 2016. Not only that, 50 percent reported they have experienced data breaches with customer and employee information during that time, too. The aftermath of these incidents? These companies spent an average of $879,582 to fix the damages done to their IT assets and recover their data. To make matters worse, disruption to their daily operations cost an average of $955,429.

The attacks

So what types of attack did these businesses experience? The order from most to least common are as follows: Web-based attacks, phishing, general malware, SQL injection, stolen devices, denial of services, advanced malware, malicious insider, cross-site scripting, ransomware and others.

Why managed services?

Managed services is the most effective prevention and protection from these malicious threats. They include a full range of proactive IT support that focuses on advanced security such as around the clock monitoring, data encryption and backup, real-time threat prevention and elimination, network and firewall protection and more.

Not only that, but because managed services are designed to identify weak spots in your IT infrastructure and fix them, you’ll enjoy other benefits including faster network performance, business continuity and disaster recovery as well as minimal downtime. One of the best things about managed services is the fact that you get a dedicated team of IT professionals ready to assist with any technology problems you might have. This is much more effective and budget-friendly than having an in-house personnel handling all your IT issues.

Being proactive when it comes to cyber security is the only way to protect what you’ve worked hard to built. If you’d like to know more about how managed services can benefit your business, just give us a call, we’re sure we can help.

Published with permission from TechAdvisory.org. Source.

Why consider disaster recovery for 2017

The new year is well upon us, and with it comes an equally new IT budget. Judging by the advancements in computing technology, many 2017 business wish lists probably include powerful onsite servers, workstations, and the Internet of Things. But as tempting as these purchases may be, it’s important that you don’t dismiss an old yet essential IT resolution: disaster recovery.

DR isn’t a huge investment
A common misconception about disaster recovery is that it’s a large, bank-breaking investment. Expensive secondary data centers, networks, and server maintenance usually come into mind when a business owner is confronted with the idea of business continuity. And while that may have been true in the past, establishing a strong disaster recovery plan today is as simple — and as cheap — as going to a cloud-based disaster recovery provider and paying for the data and services that your business needs. Subscription pricing models are actually incredibly low, meaning you can have minimal downtime while still having enough to invest in new tech.

Onsite backups just won’t cut it
Although you might feel secure with a manual backup server down the hall, it is still susceptible to local disasters and, ultimately, does very little in minimizing company downtime. When disaster recovery solutions are hosted in the cloud or in a virtualized server, restoring critical data and applications only take a few minutes.

Business disasters can be man-made, too
Even if your workplace is nowhere near frequent disaster zones, cyber attacks and negligent employees can leave the same impact on your business as any natural disaster can. Setting a weak password, clicking on a suspicious link, or connecting to unsecured channels is enough to shut down a 5-, 10-, or even 50-year-old business in mere minutes.

Sure, installing adequate network security is a critical strategy against malicious actors, but last year’s barrage of data breaches suggests that having a Plan B is a must. A suitable disaster recovery plan ensures that your data’s integrity is intact and your business can keep going, no matter the malware, worm, or denial-of-service attack.

Downtime will cost you
A business without a DR plan might come out unscathed after a brief power outage, but why risk the potential damages? Either way, downtime will cost your business. First, there’s the general loss of productivity. Every time your employees aren’t connected to the network, money goes down the drain. Then there’s the cost of corrupted company data, damaged hardware, and the inevitable customer backlash. Add all those variables together, and you end up with a business-crippling fee.

So, if you want 2017 to be the best year for your business, make the smart choice and proactively take part in creating your company’s business continuity plan. Your business will be in a better position financially with it than without it.

Keep your business safe, recover from any disaster, and contact us today.

Published with permission from TechAdvisory.org. Source.

Flaw allows thieves to open locked iPads

Have you ever worried about your tablet’s security? If not, you should. Networked gadgets are becoming increasingly interconnected every day, and just one social media account saved on a compromised iPad could lead to breaches on any number of other, more sensitive devices. If you own one of Apple’s popular tablets, you need to know about a newly discovered flaw that allows thieves to bypass security measures and access your device.

iPad owners who find themselves in the unfortunate situation of having their device stolen have the option to activate Apple’s Find My iPhone feature from icloud.com. If an iPad has this setting turned on, its GPS can be activated from any web browser to inform the owner where it is located.

Furthermore, if a user is concerned that the tablet may have been stolen, he or she can remotely lock the device. From the moment it is locked, the device can only be accessed by logging into the corresponding icloud.com account.

It’s a wonderfully intuitive feature, and tens of thousands of iPad owners have prevented data theft since it was first introduced by Apple in 2010. Unfortunately, security researchers recently announced a critical flaw that allows common thieves to totally bypass the remote lock feature simply by flooding login data fields with too many characters.

Apple is aware of the issue and has taken steps to address it with an operating system update. The latest version of iOS has fixed the issue for iPhones, but not for iPads.

Although we anticipate a patch to fix this flaw in the near future, the best way to avoid this predicament is to keep valuable data backed up separately from your iPad. One of the Find My iPhone options is to remotely wipe the device, which means as long as you aren’t permanently losing valuable data, the worst case scenario is losing nothing more than the tablet itself.

The more mobile our technology becomes, the more susceptible it is to physical security threats. It’s important to secure your devices not only from networked threats, but also from everyday ones, like someone nabbing your iPad while you step away from the table to order a coffee. For across-the-board security solutions and consulting, get in touch with us today.

Published with permission from TechAdvisory.org. Source.

To License or not to License: Choices for Savvy Business Owners

So you’ve got the next big thing in technology sitting in your office: a program you customized for your business or a hardware you came up with on the side. When is the right time to license your product for outside sale? Read further to learn the ins and outs of licensing and why the best decisions for your business can often be contrary to common sense.

There is a fine line between successful licensing and a failed attempt. You certainly don’t want to risk selling prematurely, when the software doesn’t yet have enough appeal in a large market to succeed. On the other hand, you don’t want to “lose” the market altogether by selling the sale rights to someone else who will “overtake” the product.

Questions to Ask Before you Commit to Licensing Anything

Before you make the decision to take your hard-earned product and send it to the masses through licensing, consider:

The value of your new product and its potential

If you believe you have a truly unique software, it may be best to keep it under wraps and exclusive to your company. However, if it is a product in a highly competitive area wherein technology changes quickly, it may be worth thinking about how best to capitalize on the changing market.

Its fit on your business market

If your software is a time management program and you run an internet security firm, there’s a chance that you may have to spread yourself thin to market the new product and maintain your own business focus. In this case it might be smart to find a company to license your product that is more aligned with the product’s purpose.

The levels of licensing

It is possible to allow a company to license your product on a non-exclusive basis, which will allow you to maintain control of the product in some form. The decision to pursue licensing of a software or hardware should be made carefully.

If you need advice on what to do with a new software or piece of hardware created by your business, give us a call. We can help you maximize the benefits of your design.

Published with permission from TechAdvisory.org. Source.

New Office 365 updates for collaboration

Every now and then we all need a little help, especially in today’s digital era. To keep up with the competition, companies are gearing up, especially in the IT department. With the help of cloud computing technology, Office 365 is a productivity and collaboration-enhancing software that is changing the way small- and medium-sized businesses operate. Here are four of the latest features added to Office 365:

Real-time collaboration in PowerPoint

Users will now be able to share a PowerPoint deck and update documents with others in real time. This means you’ll be able to see edits as your colleagues make them. Microsoft was committed to expanding real-time co-authoring of a company’s native applications, with Microsoft Word already rolling out this feature beforehand. Currently, real-time collaboration is available for PowerPoint on Windows desktops for Office 365 subscribers in the Office Insider program and for PowerPoint Mobile on Windows tablets.

Move attachments to the cloud and share with colleagues in Outlook

According to Kirk Koenigsbauer, corporate vice president for the Office team, this feature allows users to transform a traditional document into a shared cloud document within Outlook. Previously, Outlook users could only attach cloud-based documents to an email, but this new feature makes it easier to send large files and to collaborate on those files with ease.

Users can upload files into their own OneDrive or a document library as part of an Office 365 group and then designate sharing permissions for the email recipients. The new feature is currently available in Outlook on the web as well as Outlook on Windows desktops for Office 365 subscribers.

Mobile notifications for changes to shared documents

With this new update, users will be notified when any cloud documents in Word, Excel and PowerPoint are being shared or edited. These notifications let you know when changes are being made, even if you are away from a particular document, so you’re always connected and know when you have to act. This feature can be integrated with the activity feed on Windows desktops, and help businesses improve user collaboration. Koenigsbauer says that Microsoft will continue working on the notification feature “to provide more detail and transparency around shared document activity in the future.” Sharing and editing notifications are available for Word, Excel, and PowerPoint users on Android and Windows Mobile for Office Insiders. This feature will be available for commercial users in all Office mobile applications in the coming months.

Find, open, and save documents in a Shared with Me and Recent Folders tab

Microsoft’s “Shared with Me” tab in Word, Excel, and PowerPoint makes it easier for enterprise users to find and open shared documents without having to leave the app you’re working in. At the moment, the Shared with Me tab is available on Windows desktops and Macs for all Office 365 subscribers, iOS and Android devices included. And soon, it will be available on Windows Mobile. And the “Recent Folders” tab — used to help quickly locate files as well — is now available in Word, Excel and PowerPoint on Windows desktops for Office 365 subscribers in the Office Insider program.

Technology has become an integral part of modern businesses, and investing in the right IT resources is needed in order to achieve success. With the latest additions to Microsoft Office 365, small- and medium-sized businesses will enjoy enhanced staff collaboration, increased corporate productivity, and an overall competitive advantage.

Published with permission from TechAdvisory.org. Source.

Adobe Flash Blocked by Microsoft Edge

Recently, Microsoft has made new upgrades to their web browser platform. Despite numerous changes, one making the biggest waves for users of all kinds is the lack of instant and easy compatibility with Adobe Flash. Adobe Flash is a web platform and add-on that many business websites have put to extensive use. However, now that Microsoft has made these changes, it can mean big things for business owners and web designers alike. Get to know more about why Microsoft has blocked Adobe Flash and the possible ramifications for those changes.

The primary purpose behind the recent changes made to Microsoft Edge is to make it more competitive with the popular Google Chrome web browser. Among efforts to do just that is the change to how Adobe Flash works on the Edge browser. Now, instead of Adobe Flash plugins playing and loading immediately when a person navigates a website, the application will be blocked.

An alert will come up near the address bar, letting users know that Adobe Flash has been blocked and will give the option to run the add-on or continue blocking it. For businesses that use Adobe Flash throughout their websites, this can be a frustrating change as visitors will need to take an extra step to access the full website.

However, there are numerous legitimate reasons for these changes to the Microsoft Edge browser. The most important of these issues is the fact that Adobe Flash is a security risk and is easily hackable, making it more likely for information and control to be lost to web users. Another issue is the fact that Adobe Flash is a big drain on battery life for computers and other devices.

The theory is that Adobe Flash is on its way out, and that newer, better systems are on their way in. As of now, Windows Insider users are the only ones with access to these updates, but soon the updates will go global and be made available to all users. In fact, Microsoft plans to eventually automatically load HTML5 web information first without loading Adobe Flash content at all.

Because so many sites use Adobe Flash, this can mean major renovations to existing web content. If you worry about the impact this will have on your business, contact us for immediate help and assistance in maximizing your website usability before these changes go live for all Microsoft Edge users.

Published with permission from TechAdvisory.org. Source.

Ransomware demands more victims for freedom

Popcorn Time is taking ransomware to a new level of devilish trickery by asking victims to give up two of their friends for a chance to rid their own computers of the virus. In cyber security this level of diabolical blackmail represents a new and scary trend for hackers. For more information on how Popcorn Time works and what you can do to keep it off your system, keep reading.

Ransomware is nothing new. Cybersecurity miscreants have been taking advantage of online users for years by requiring payment to “unlock” a victim’s computer. What Popcorn Time does differently is give users the option to spread the virus to two other victims in the hopes that they will pay the ransom — a tactic that promises to double their money at the expense of your sense of morality (and at the expense of your friendships as well).

The Cost of Popcorn

When you inadvertently download this ransomware, you will be met with a screen that explains that your files have been hijacked/encrypted, and that to get them back you will need to pay one Bitcoin for a decryption key that they keep stored remotely. The Bitcoin fee is usually more than $700, a hefty price to pay during any season but particularly difficult for those infected during the holiday season.

Spread the “Holiday Cheer” and Hope they Bite

What makes Popcorn Time unique is the option victims have to take their cost away by allowing the ransomware to affect two of their friends for a chance to get a free decryption code. Of course, it works only if both friends pay the ransom, which leaves you looking (and feeling) like the Grinch.

Avoiding Popcorn Time this Season

The easiest way to avoid downloading ransomware is to stay off of sites that might contain questionable files. However, this is nearly impossible for modern users, and many hackers are getting good at making their files look legitimate. Limit your exposure to potential ransomware by keeping your software up-to-date and your computer protected with a security program from a reputable company (for example Norton or Symantec). If you need to learn more about how to avoid running into ransomware while you’re online, give our professional cybersecurity consultants a call. We’ll keep you away from the popcorn this season.

Published with permission from TechAdvisory.org. Source.

AWS to launch “Glue” service

Many businesses and enterprises have long struggled with the drudgery and difficulty that is data analysis — especially data analysis in a cloud-based system. AWS (Amazon Web Services) may have just the solution to that problem. A new app, known as “Glue,” offers the opportunity for businesses to clean up data to help analytics run more smoothly. Learn more about how AWS accomplishes this, right here.

Data analysis can be an extremely profitable arm of your business, if undertaken carefully. Much of what people consider to be data analysis for a business is actually just digital clerical work, which makes the process even more frustrating and time-consuming than it needs to be. At its core, AWS’s Glue is an app that automates this tedium, which is often referred to as ETL (extract-transform-load).

Third-party software already exists to help with this task, but the service from AWS is one of the first cloud-based alternatives to come to market. Glue is designed to work with businesses that have their own on-premises data centers and infrastructures in addition to working with AWS frameworks. In fact, if a business makes changes to on-premises data, Glue can be set up to trigger jobs and update the data in the cloud so users always have access to the most up-to-date information for use and analysis.

Essentially, AWS extracts various types of data from a wide array of sources and analyzes it, ultimately homogenizing the data to fit the business’s existing database. This eliminates a great deal of work because the extremely tedious task of importing data is often done by hand. Handing this burden over to AWS allows businesses to focus on the real analysis work; saving effort, time, and money in the process.

Every day, data becomes more and more integral to building a successful company. And with such a heavy burden placed on this facet of business, falling behind on the technology that makes it possible is an expensive mistake. If you’re hosting large amounts of data on-premises or in an AWS database, contact us today about how you can eliminate costly ETL processes.

Published with permission from TechAdvisory.org. Source.

Solution to eliminate iCloud calendar spam

Over the last month, users have reported spam issues plaguing their iCloud calendar. Fortunately, Apple has come up with a solution. One of its new features allows users to report and remove spam from their calendar. Hopefully this small step takes care of the problem once and for all. From what started the whole mess to how you can help end it, we have all the information you need.

The problem started in late October, and it continues today. iCloud devices continue to receive numerous calendar invites from unsolicited people. These invites typically advertise “junk” products in an attempt to exploit the increase in shopping associated with the holidays. Users who actually do click the links find themselves redirected to sites that have zero connection to what they thought they would find. But worse yet, everyone, regardless of their interest, is being completely inundated by unwanted notifications.

Denying calendar invitations alerts spammers that the email address the rejection came from is still active. This just results in more and more spam in the future. Apple apologized to customers affected by the oversight, but until now users have had no efficient way of deleting the spam from their calendar.

A “Report Junk” button has been added as Apple’s best shot at a long-awaited solution to the calendar spam problem. This reporting mechanism can be found on any calendar invitation sent by someone not listed in your contacts.

Unfortunately, it requires opening each item and selecting “Report Junk” through iCloud.com (the feature has not yet been released for iOS or macOS). However, once you have deleted an event from your calendar, the information will be deleted from all synced calendars, even those that are shown in the iOS apps.

Spam is one of the worst externalities that comes with increased connectivity. Although we’re still waiting for a more thorough solution to this problem, you can rest assured that in the meantime we’re working hard to come up with one of our own. For all the insider tips and tricks on Apple devices, contact us today.

Published with permission from TechAdvisory.org. Source.