Month: June 2017

Important Office 365 Upgrade

If you wished Microsoft would streamline its Office 365 ProPlus update schedule, your prayers have been answered. The cloud solution, which includes the Enterprise E3 and E5 plans, will be updated twice a year, rather than three times a year. Here’s everything you need to know about the new ProPlus update schedule.

Why the new schedule?

Feedback has almost always been Microsoft’s impetus to make changes of any kind, and this is no exception. The software giant wanted to simplify the update process and improve coordination between Office 365 and Windows, and the new schedule should handle both of those aims.

This is particularly helpful for those using Secure Productive Enterprise (SPE). SPE was bundled with Windows 10 and Office 365 ProPlus, meaning subscribers had to deal with two separate upgrades prior to the new schedule. Moving forward, things will be simplified as a single update twice a year will suffice.

What else changed?

Microsoft is extending support for ProPlus from 12 months per update to 18 months. This means you can technically update once or twice a year, which we’ll discuss in more detail below.

They’ve also changed the following terminology used in their updates:

  • Current Channel → Monthly Channel
  • First Release for Deferred Channel → Semi-annual Channel (Pilot)
  • Deferred Channel → Semi-annual Channel (Broad)

The Semi-annual Channel (Pilot) and Semi-annual Channel (Broad) describe the twice-a-year feature updates and how they will be deployed: the former to be used as deployment testing and the latter for actual deployment to an organization’s users.

When will the first ProPlus upgrade be released under the new schedule?

The first Pilot channel will be available on September 12, 2017, the same day as that month’s Patch Tuesday. The first Broad channel will be available four months later on January 9, 2018, also on a Patch Tuesday.

The second release will bring a new Pilot on March 13, 2018 and a new Broad on July 10, 2018.

Can you skip a ProPlus features upgrade?

While you can in fact choose only to upgrade once a year, you will eventually have to conduct a second upgrade to get the most up-to-date support. Microsoft is giving you two months of overlap in the next update to do this.

So, say your firm deploys the Broad channel in January 2018, but skips the July 2018 upgrade, you would have to upgrade within the two-month span between January 2019 and March 2019 to be eligible for the latest support.

What happened to the ProPlus upgrade for June 2017?

Microsoft released new Deferred Channel and First Release for Deferred Channel upgrades on June 13, 2017. You will have three months to conduct enterprise pilots and validate applications with this upgrade before the final Deferred Channel release on September 12, 2017. The last Deferred Channel will be supported until July 10, 2018.

Changes to the support life cycle of Office 365 ProPlus will ultimately save you time and reduce the hassles of conducting upgrades. That said, it might take some time getting used to the new schedule and nomenclature, so if you have any questions about Office 365 or the new schedule, just give us a call.

Published with permission from TechAdvisory.org. Source.

Why is Windows XP getting updates?

Microsoft products usually have an end-of-support date, where no more feature updates and security patches will be offered. However, earlier this month, Microsoft has released a security update for Windows XP, an operating system that has been unsupported since 2014. Although releasing a patch for an old system seems unusual, Microsoft does have its reasons.

More WannaCry copycats
The primary reason why Microsoft reassessed their update policy for Windows XP was due to the success of WannaCry, a ransomware worm that encrypted hundreds of thousands of computers worldwide. Even though the attack did not affect XP computers, Microsoft anticipates increased risk of similar attacks for the outdated OS being developed in the near future.

According to Microsoft’s Head of Cyber Defense Operations Center Adrienne Hall, cyberattacks by government organizations and copycat hacking groups are imminent; and this time, they’ll improve upon WannaCry’s shortcomings. In fact, shortly after WannaCry was stopped on May 12th, other strains with more sophisticated code popped up seeking to exploit the same weaknesses.

NSA leaks
Many security experts also suspect that Microsoft is releasing security fixes for outdated systems because of leaked NSA hacking tools. Over the years, the NSA’s ‘hacking’ department, Equation Group, has been storing cyber exploits in its arsenal. But a group known as the Shadow Brokers found these exploits and publicly disclosed them, which led to the WannaCry outbreak.

Right now, the Shadow Brokers are promising to leak more NSA exploit tools to hackers in the Dark Web who are willing to pay $10,000.

The update
Since a significant portion of businesses are still working with XP, Microsoft believes that their recent security update is the best way to protect all Windows users. The new patch fixes 16 critical vulnerabilities, many of which seem to defend against the exploits leaked by the Shadow Brokers.

Windows 10 users can find the critical update in the Microsoft Download Center. Alternatively, they can simply check for updates in Windows Update, which can be found in the Settings menu. But to install the update for unsupported operating systems, users should visit Microsoft’s security advisory page for tips and download links.

Although Microsoft has extended support for Windows XP, don’t expect regular fixes for outdated systems. As always, the best protection is to use an up-to-date system that’s equipped with the latest security patches.

“Older systems, even if fully updated, lack the latest security features,” said Hall.

If you’re unsure about your Windows security, what operating system you’re running, or how to protect your company workstations, give us a call. Our certified and experienced experts will help keep your business safe from WannaCry and future malware attacks.

Published with permission from TechAdvisory.org. Source.

Wikileaks details router vulnerabilities

When we write about how antivirus software isn’t enough to keep you safe from malware, it’s not just scare tactics. There are so many ways hackers can break into your system that antivirus solutions will never catch. For a real-world example, look no further than the router exploit kit recently leaked from the CIA.

The Wikileaks CIA documents

For several months, the notorious website famous for leaking government data has been rolling out information it obtained from the Central Intelligence Agency. The documents detail top-secret surveillance projects from 2013 to 2016 and mainly cover cyber espionage.

In the most recent release, documents describe government-sponsored methods and programs used to exploit home, office, and public wireless routers for both tracking internet browsing habits and remotely accessing files stored on devices that connect to compromised networks.

Is my router one of them?

According to the documents, 25 models of wireless routers from 10 different manufacturers were being exploited by the CIA. They weren’t off-brand budget devices either; the list includes devices from some of the biggest names in wireless networking:

  • Netgear
  • Linksys
  • Belkin
  • D-Link
  • Asus

Those brands account for over a third of wireless routers on the market, which means there’s a good chance you’re at risk.

After WannaCry used a previous CIA leak to fuel its global spread, you need to worry about more than just being a target of government espionage too. Over the past few years, almost all of these leaks have quickly made their way into criminal hands.

Patching vulnerabilities

Fixing security gaps in hardware is tricky business, especially when they’re mainly used to monitor rather than corrupt. In most cases, there will be no visual cues or performance problems to indicate your hardware has been infected. As such, you should plan on regularly updating the software on your hardware devices whenever possible.

Accessing your router’s software interface isn’t a user-friendly experience for non-IT folks. Usually, to access it, you need to visit the manufacturer’s website and log in with the administrator username and password. If these are still set to the default “admin” and “password” make sure to change them.

Once logged in, navigate through the settings menus until you find the Firmware Update page. Follow the instructions and confirm that the firmware has been properly installed.

The CIA’s router leaks were vague, so we’re not even sure how recent they are. We are fairly certain, however, that all of the manufacturers have since patched the vulnerabilities. Regardless, updating your router’s firmware will protect from a number of cyber security risks. If you’re unable to finish the task on your own, one of our technicians can fix it, as well as any other firmware vulnerabilities, in a matter hours. All you need to do is call!

Published with permission from TechAdvisory.org. Source.

Apple iOS 11: Focus on enterprise users

The iPad was originally created for individual consumers even though it was later adopted as a viable productivity tool. After several functionality and style changes, Apple has finally released an iPad that could rival the PC: the iPad Pro. The latest update in Apple’s lineup of tablet computers is a vast departure from previous iPad devices, and with the recently announced changes in the upcoming iOS 11, the company looks poised to shift its focus from individual to enterprise users.

From mobile to desktop

Apple’s iOS platform was originally designed for mobile devices, but the company is making its mobile operating system more desktop-friendly. In the upcoming iOS 11, users can expect a user interface (UI) that’s very similar to a Mac desktop UI with substantial capabilities like multi-tasking, which will allow users to view programs in a split/slide view.

The Files app for iOS will be particularly useful for businesses that use various cloud storage platforms such as Box, Dropbox, Google Drive, and OneDrive. With this handy new app in iOS 11, all files can be accessed, downloaded, and shared within one single platform using your iPad. This app will be very similar to the Finder folder in Mac.

Other notable features

Aside from the multi-tasking capability and the Files app, the new enterprise user-friendly OS will provide users with Drag and Drop capability — previously unavailable to iPad. Instead of having all apps displayed on the screen, users can now enjoy a docking system that Mac users will find familiar. Existing Apple enterprise users will find the new iOS more in-tune with their needs, as switching from one device to another will be more seamless.

What businesses can expect

Whether Apple’s major redesign will be enough to convince non-iOS device users to switch is yet to be determined. It’s also uncertain whether more enterprise tools can be expected from later versions. What’s certain is that Apple has introduced enhancements to the iPad Pro that are significant enough to make it a formidable choice as a standalone enterprise computer.

Many businesses already use an iPad in the workplace, and with these enhancements, integration of mobile and desktop functionality will be more seamless across all Apple devices. This may also prove to be a significant shift for the iPad from being a secondary computing device that displays content to being a primary computer that’s used for creating content.

Apple has always been focused on individual preferences rather than an entire market segment. But with the iOS 11, it is enterprise users who have the most to look forward to. If you need intelligent recommendations on device and usability features on both mobile and desktop devices, call us today.

Published with permission from TechAdvisory.org. Source.

Microsoft Power BI and Office 365 analytics

As machine learning, digital storage, and analytics software get more advanced, data is becoming more valuable than ever. Even businesses that don’t rely on data to operate are starting to find ways to get more value out of their information. Microsoft’s newest platform is an excellent example of that — and it’s free!

What is Power BI?

Released in the spring of 2016, Power BI is Microsoft’s business analytics platform. Regardless of whether or not data is stored within a Microsoft platform, connecting Power BI to a database allows you to create detailed graphs, charts, maps, and more. For example, if you upload sales records, dragging and dropping two columns is all it takes to map out where your product sees the most demand.

Recently, Microsoft announced a brand new feature for business owners who want to get more value out of their software subscriptions. The Office 365 adoption content pack collects information about how your employees use Microsoft productivity software, and feeds it directly into Power BI’s analytics. There are four types of insights you can work with:

Adoption

These metrics give you visibility into how much each O365 platform is being used. You may be paying for OneDrive accounts for the entire organization, only for Power BI to reveal that less than a quarter of your team is using it. Compare enabled users and active users to get a clearer picture of your investments.

Communication

You can also see exactly how employees are using communication solutions. If nearly everyone on the team is accessing Skype for Business from a mobile data connection, it might be time to reduce your investments in cellular-based minutes.

Collaboration

Microsoft has several collaboration platforms, and without proper guidance, employees are likely to use the easiest one rather than the best one. Power BI shows you how much time users spend time in their own Word, PowerPoint, and SharePoint documents compared to the time they spend in documents from colleagues. This shows you which platforms encourage the most collaboration and which ones are struggling.

Activation

– The activation insights give you under-the-hood visibility into which versions of O365 users are running, and what devices they use to access them. That may seem like trivial information, but it can have huge impacts on cyber security.

Power BI comes in three different plans: Desktop, Pro, and Premium. Best of all, both the Desktop plan and the Office 365 adoption content pack are totally free. If you like what you see, consider enlisting us to set up and optimize either a Pro or Premium Power BI deployment — we’re only a phone call away!

Published with permission from TechAdvisory.org. Source.

Why businesses need a UPS

Power outages caused by utility failure, accidents, and natural disasters such as storms, flooding, or earthquakes are inevitable. There’s very little you can do to prevent any of these from happening, but you can avoid the consequences to your business by using an Uninterruptible Power Supply (UPS).

What is an uninterruptible power supply?

An uninterruptible power supply is an essential piece of hardware that protects both your computer and your data. It provides a backup power source in case of main power failures caused by electrical current problems such as blackouts, brownouts, and power spikes.

Smaller UPS units can protect individual computers while larger models can power multiple devices or an entire office. Small businesses can opt for individual UPS units, which should be enough to back up critical computers and other devices that are key to business continuity.

Benefits of having UPS

It’s a known fact that power outages can damage or completely destroy electronic equipment, especially computers. Unexpected computer shutdown can cause great damage to your computer hardware and make you lose unsaved data. A UPS ensures you never experience such a scenario.

Here are other ways that a UPS benefits your systems:

  • Uninterrupted power flow during power surges

When you have UPS, the voltage that passes from the main electrical lines to your devices is consistently stabilized. This protects your computers from power surges, which happen when the voltage in other equipment suddenly rises.

  • Refined and filtered power supply

It normalizes power levels so that your computers are protected against dips and spikes caused by lightning or an abnormal power supply that usually comes from restored power after a blackout.

  • Instant power during brownouts

An uninterruptible power supply guarantees your operations’ continuity. In the event of short-term interruptions, it gives you enough time to switch to a larger, more stable power supply such as a generator. But unlike a generator, it provides instant power to your equipment at the exact moment the power goes out.

Does your business need a UPS?

If you’re purchasing new computers for your small business, a UPS is an invaluable add-on. Businesses that require constant power to function such as hospitals, banks, academic institutions, manufacturing companies, and any business for which storing and processing data are critical tasks can benefit from uninterrupted power.

Determining the type of UPS for your business as well as installing and maintaining it may require the expertise of professionals. We have experts who could provide you with information on properly operating a UPS, replacing its battery, identifying devices that should never be connected to it, and other safety tips. Call us today for advice.

Published with permission from TechAdvisory.org. Source.

New keyboard shortcuts in Windows 10

It’s undeniable that keyboard shortcuts can activate computer commands faster than dragging a touchpad or a mouse. To that end, if you’re using Windows 10, there are a couple new keyboard shortcuts worth trying.

Windows Snapping

If you’ve never used Windows Snapping, you’re missing out on one of Windows 10’s key features. Previously known as Aero Snap on Windows 7, the snapping feature allows you to snap windows vertically on top of each other. You can even snap windows to a 2×2 grid for better multi-tasking. Simply use these keyboard shortcuts:

  • Windows Key + Left – Snap current window to the left side of the screen.
  • Windows Key + Right – Snap current window to the right side of the screen.
  • Windows Key + Up – Snap current window to the top of the screen.
  • Windows Key + Down – Snap current window to the bottom of the screen.

You can also combine these shortcuts to snap your current window into a corner like top left, top right and more.

Task Views

This window management feature allows you to see all your opened windows so you can quickly return to a specific program or document. This is particularly useful if you have multiple windows opened at once. In addition to clicking the “Task View” button on the taskbar to open it, these keyboard shortcuts will do the trick:

  • Windows Key + Tab – Open a new Task View interface with windows from your current virtual desktop appearing in the Task View list. To switch between virtual desktops, simply use the virtual desktop switcher at the bottom of the screen.
  • Alt + Tab – While not a new keyboard shortcut per se, it now allows you to switch between open windows on all virtual desktops.

Virtual Desktop

A great way to stay organized, this nifty feature lets you use unlimited number of virtual desktops so you can dedicate each of them for certain functions. For instance, one could be used solely for work with all your business software and the other for entertainment. Some keyboard shortcuts to help you quickly manage your virtual desktops include:

  • Windows Key + Ctrl + D – Create a new virtual desktop and switch to it.
  • Windows Key + Ctrl + F4 – Close current virtual desktop.
  • Windows Key + Ctrl + Left / Right – Switch to virtual desktop on the left or right.

If you’re looking for ways to boost productivity, or have any questions about how Microsoft Windows can help streamline your operations, just give us a call. Our IT experts are more than happy to help.

Published with permission from TechAdvisory.org. Source.

6 more Office 365 productivity tricks

By now, you’re probably familiar with popular Office 365 productivity features like Skype for Business, and real-time collaboration in Word, Excel, and PowerPoint. You might even remember a few time-saving keyboard shortcuts that will make your Office 365 experience a lot smoother. But even after all that, there’s still much to learn about Office 365. Here are some more tricks that can boost your productivity.

Declutter your inbox
If you’re having trouble managing the overwhelming amount of emails in your inbox, then using Office 365’s “Clutter” feature can clear up some space. To enable this feature go to Settings > Options > Mail > Automatic processing > Clutter then select Separate items identified as Clutter. Once activated, you need to mark any unwanted messages as “clutter” to teach Office 365. After learning your email preferences, Office 365 will automatically move low-priority messages into your “Clutter” folder, helping you focus on more important emails.

Ignore group emails
Are you copied on a long email thread you don’t want to be part of? If so, simply go to the message and find the Ignore setting. Doing this will automatically move future reply-alls to the trash so they never bother you again. Of course, if you ever changed your mind, you could un-ignore the message: Just find the email in your trash folder and click Stop ignoring.

Unsend emails
In case you sent a message to the wrong recipient or attached the wrong file, Office 365 has a message recall function. To use this, open your sent message, click Actions, and select Recall this message. From here, you can either “Delete unread copies of this message” or “Delete unread copies and replace with a new message.” Bear in mind that this applies only to unread messages and for Outlook users within the same company domain.

Work offline
Whenever you’re working outside the office or in an area with unstable internet, it’s a good idea to enable Offline Access. Found under the Settings menu, this feature allows you to continue working on documents offline and syncs any changes made when you have an internet connection. Offline access is also available in your SharePoint Online document libraries.

Use Outlook plugins
Aside from sending and receiving emails, Outlook also has some awesome third-party plugins. Some of our favorite integrations include PayPal, which allows you to send money securely via email; and Uber, which lets you set up an Uber ride reminder for any calendar event. Find more of productivity-boosting plugins in the Office Store.

Tell Office applications what to do
If you’re not a fan of sifting through menus and options, you can always take advantage of the Tell Me function in your Office 2016 apps. When you press Alt + Q, you bring up a search bar that allows you to look for the functions you need. Suppose you need to put a wall of text into columns on Word but can’t find where it is specifically. Just type ‘column’ and Microsoft will help you with the rest.

These tricks and features themselves will definitely increase productivity. And fortunately, there’s, there’s more coming. Microsoft continues to expand Office 365’s capabilities, and if you truly want to make the most out of the software, don’t be afraid to explore its newly released features.

For more Office 365 tips and updates, get in touch with us today.

Published with permission from TechAdvisory.org. Source.

Basic PC fixes are costing you money

When your employees seek your IT security staff’s help to fix their personal computer (PC) problems, it’s often perceived as a productive use of everyone’s time. After all, employees must have working computers and IT professionals are expected to resolve any technology issues. What doesn’t get acknowledged, however, is that instead of troubleshooting technical problems, your technology support staff could be spending their time on more productive tasks.

Cost of fixes

According to a survey of technology professionals, companies waste as much as $88,660 of their yearly IT budget as a result of having security staff spend an hour or more per work week fixing colleagues’ personal computers. The ‘wasted amount’ was based on an average hourly salary of IT staff multiplied by 52 weeks a year. Other than knowing how much time is wasted, what makes things worse is that IT security staff are among the highest paid employees in most companies.

The fixes have mostly to do with individual rather than department- or company-wide computer problems that don’t necessarily benefit the entire company. The resulting amount is especially staggering for small- and medium-sized businesses (SMBs) whose limited resources are better off spent on business intelligence tools and other network security upgrades.

Other costs

All those hours spent on fixing personal computers often means neglecting security improvements. The recent WannaCry ransomware attacks, which successfully infected 300,000 computers in 150 countries, demonstrate the dangers of failing to update operating system security patches on time. It should be a routine network security task that, if ignored, can leave your business helpless in the face of a cyber attack as formidable as WannaCry. It didn’t make much money, but had it been executed better, its effects would have been more devastating to businesses, regardless of size.

Profitable projects could also be set aside because of employees’ PC issues. For SMBs with one or two IT staff, this is especially detrimental to productivity and growth. They can easily increase their IT budgets, but if employees’ negligible computer issues keep occurring and systems keep crashing, hiring extra IT personnel won’t do much good.

What businesses should do

The key takeaway in all this is: Proactive IT management eliminates the expenditure required to fix problematic computers. Bolstering your entire IT infrastructure against disruptive crashes is the first step in avoiding the wasteful use of your staff’s time and your company’s money.

Even if your small business has the resources to hire extra staff, the general shortage of cyber security skills also poses a problem. Ultimately, the solution shouldn’t always have to be increasing manpower, but rather maximizing existing resources.

Having experts proactively maintain your IT eliminates the need to solve recurring small issues and lets your staff find a better use for technology resources. If you need non-disruptive technology, call us today for advice.

Published with permission from TechAdvisory.org. Source.

6 Mac security tips and tricks

Although well aware of its importance, users still overlook Mac security. This might be excusable if you’re using your device just to watch cooking shows or to experiment with PhotoBooth, but not if it’s being used in day-to-day business operations. Deter internal and external threats from compromising your device with these tips:

The basics
Let’s start with the basics and head over to the Security & Privacy pane in System Preferences. Here, you’ll find four tabs — General, FileVault, Firewall, and Privacy — that control various aspects of security. To change your security settings, click on the padlock on the bottom of the screen and type in your username and password.

Firewall
Enabling the firewall will block unwanted incoming network connections. Many think it is enabled by default, but often it’s not. All you need to do is click the Firewall tab in the System Preferences > Security & Privacy pane, click the padlock icon on the bottom left, enter your username and password, and click the ‘Turn On Firewall’ button. Don’t forget to enable Stealth Mode by clicking the Firewall Options button and then clicking Enable Stealth Mode in the dialog box — this makes your computer invisible on public networks.

Passwords
Make sure to set strong passwords for your user accounts if you don’t already have one. To do this, go back to the ‘General’ section of the Security & Privacy settings. In this section, you should also consider setting the Require Password field to ‘immediately.’ This makes it so that you’ll need to re-enter your login credentials to unlock your Mac when it goes to sleep or when a screen saver begins.

Automatic login
It’s best to disable this function, especially if you are using a mobile Mac. If your Mac gets stolen, you don’t want to give thieves a free pass to your private data.

Applications
At the bottom of the General Settings tab, there are three options that authorize which apps can run on your Mac. The safest option is to allow only apps from the App Store to run, and the least secure option is to allow apps from anywhere. Get the best of both worlds by choosing the option of running apps from the App Store and from developers known to Apple.

FileVault
The FileVault tab enables you to encrypt all the files in your user account. To decrypt them, you must enter either your account password or the recovery key you created when you switched FileVault on. It might be tedious to type in a password every time to access a file, but it helps keep your vital data under lock and key.

In this digital age, ensuring the protection of all your devices is crucial to your business’s success. Because all it takes is a tiny leak to sink your ship. Feel free to give us a call and we’ll help prepare your business for choppy waters.

Published with permission from TechAdvisory.org. Source.