Month: November 2017

Microsoft’s new productivity apps are live

In July 2017, Microsoft announced three brand new apps for Office 365: Connections, Listings, and Invoicing. They were designed for businesses with fewer than 300 employees and after a few months of beta testing, they’re finally available to Business Premium users. Take a minute to learn about what they can do for your team!

Microsoft Invoicing

Word and Excel have hundreds of templates for generating company invoices, but this new app does much more than just create documents. Invoicing allows you to store the names, descriptions, and prices of your products and services in a connected database. You can also store your tax information, company logo, and a click-to-pay PayPal badge, which means half of the necessary information is automatically filled out the moment you click Create.

In addition to clean and professional looking documents, Invoicing also makes it easy to organize, store, and search past invoices thanks to a built-in QuickBooks integration. Last but not least, all of this is easily accessible from Microsoft’s mobile app.

Microsoft Listings

With its centralized dashboard, Listings allows you to manage and update company details displayed by Google, Facebook, Bing, and Yelp. It also helps you monitor your company’s online reputation by tracking page-views, company reviews, and Likes.

Microsoft Connections

Connections is the perfect app for small business email marketing. Similar to the Invoicing platform, Connections stores your company information and uses it to create personalized email marketing campaigns with the click of a button.

For example, templates for newsletters, referrals, and promotions include customizable discounts and offers that trigger pre-written follow-up campaigns. Connections tracks and analyzes the performance of all your email-based campaigns to make refining and improving your content a breeze, whether it’s from your desktop or the mobile app.

How to enable Invoicing, Listings, and Connections

As long as you have an Office 365 Business Premium subscription, accessing these apps requires only a global admin login. From the Admin Center, click the Settings tab on the left-hand side of the screen, followed by Services & add-ins and then Business apps. In this menu, you can grant specific users permission to use Microsoft’s newest programs.

Setting up these apps is fairly easy. However, it’s even easier to have your Office 365 account managed by us. We could have remotely installed Invoicing, Listings, and Connections for you almost a month ago, and with our information security expertise and unlimited IT support requests, there’s no limit to the value we can add to your Office 365 subscription. Give us a call to get started!

Published with permission from TechAdvisory.org. Source.

Outlook on Mac and Windows gets redesigned

Microsoft is redesigning Outlook for Mac and Windows to reduce clutter and improve user experience. The design changes will be patterned after the iOS version of the app, which is much easier to use and more modern-looking than its desktop counterpart. If you use Outlook on a desktop, check out these new changes.

How Outlook will be simplified

The most notable feature of the new Outlook will be a simplified navigation bar along the top of the screen, which means less of the screen will be reserved for formatting and organizational options. However, you can still add more buttons to accommodate your common tasks and preferences. With a smaller number of commands, you can benefit from an uncluttered interface that lets you use email more efficiently.

Changes will also be made to the left panel to provide users with quicker access to folders across multiple accounts. Moreover, a slide-to-delete function using Apple’s trackpad — like in the iOS version — will be integrated into the redesigned app.

Other design changes for Outlook in Mac

Mac users can also expect faster and more reliable search and calendar features in the enhanced Outlook. The search function will get a performance boost and will be moved to the top right corner of the app for easier access. The calendar function’s interface, on the other hand, will be reworked to eliminate tedious steps currently required to manage appointments.

These and other upcoming changes are aimed at increasing users’ satisfaction ‘by providing a cleaner, more modern way to email.’ The design changes will also benefit those who access their account on different devices because, in the updated desktop version, they will be able to enjoy the same uncluttered app that they use on their mobile devices.

Although the changes are for Windows and Mac, Microsoft is implementing most of the design changes primarily for Mac. Microsoft recognizes Outlook’s popularity among “key influencers and decision makers,” whom it wishes to win over before a wider release. The new version will most likely become available to Office 365 subscribers first and eventually roll out with Office 2019, which is expected to arrive in mid-2018.

An easy-to-use email interface is a boon to your business’s productivity. And with Outlook’s new look and improved functionality, you can read, send, and organize emails more conveniently and with minimal distraction. Our experts are on-hand to answer all your questions about Outlook and other Microsoft Office apps — get in touch with us today.

Published with permission from TechAdvisory.org. Source.

Google studies effects of leaked logins

Passwords are your first line of defense against hackers. But over the years, they have developed plenty of methods to steal them. To gain a deeper understanding of how cybercriminals operate, Google analyzed the causes of leaked login credentials. Here are the results.

The results
From March 2016 to March 2017, Google and UC Berkeley researchers examined three main ways hackers hijack accounts:

  • Keylogging software – a malicious program that records computer users’ keystrokes
  • Phishing emails – to lead people into dangerous websites
  • Stolen passwords – available to the highest bidder

In just one year, Google found 788,000 successful keylogging attacks, 12.4 million victims of phishing attacks, and 1.9 billion accounts exposed via login credentials sold on the black market.

Researchers suggest the reason so many accounts are hacked is because people tend to reuse their passwords, which means if one set of login credentials is exposed, other accounts could be compromised.

Phishing is also a big threat because it targets users — the weakest links in your cybersecurity. The strongest password or security system won’t mean anything if your employees constantly fall for online scams.

Protecting your accounts
There are several things you can do thwart account hijacking. For starters, you should set strong and unique passwords for each account to minimize data breaches.

While the general rule in the past was to set a complex password — a mix of letters, numbers, and symbols — recent studies suggest that longer, 20-character “passphrases” are much tougher to crack. If you find it difficult to remember several passwords, consider using a password manager, which not only stores all your passwords, but can generate strong passwords, too.

To deal with phishing attacks, you should activate multi-factor authentication on your accounts. This adds an extra layer of identity verification to your password (e.g., a fingerprint scan or a temporary security key sent to your phone), making your login details ‘unphishable.’

Security training is also crucial. This includes teaching your employees about what phishing attacks look like and instructing them on password protection best practices so they never fall victim to account hijacking.

The bottom line is not only that strong password security requires strong defense mechanisms; you and your employees must be vigilant, too.

Need more advice on keeping your business safe? Call us today! We provide critical security updates and comprehensive support services to help you stay well ahead of cybercriminals.

Published with permission from TechAdvisory.org. Source.

Windows Hello makes logging in simple

In another example of sci-fi technology becoming reality, Microsoft’s biometric logins can now recognize your face, fingerprint, or eyes when you attempt to access your device. It’s exciting as well as convenient and we’ve got everything you need to get started, right here.

Say hello to fingerprint, iris, and facial scans

Windows Hello is an advanced biometric identity and access control feature in Windows 10. With it, there’s no need to enter a password; all it needs is your fingerprint, eye scan, or just your face.

For those who are worried about privacy, the feature stores your biometric data only on your device, never on Microsoft’s servers. Microsoft has also made it clear that third parties cannot access your biometric data, although, as with every new technology, it’s best to treat this with caution.

How to set up Windows Hello

All you need to get started is a laptop or desktop with Windows 10 and a compatible webcam (there is a full list here).

First, go to Settings > Account > Sign-in options. Then, under the Windows Hello section, you’ll see setup options for face, iris, or fingerprint scans. Select which method you want to set up and follow the prompts to create a login profile.

You can also save your biometric data or scan more than once to boost accuracy. Each time you scan, the system collects more data, so it’s worth completing a few scans before enabling the login feature.

However, passwords are still an option when using Windows Hello and should always be configured in case your camera isn’t operational. Once one account is set up, you can start adding family members who share the same device. Each of them can set up their own biometric profile in a separate account.

There are many features in Windows that can make your life easier. Our IT experts can help you get more out of your Windows devices. Contact us today!

Published with permission from TechAdvisory.org. Source.

Essential macOS High Sierra updates

The macOS 10.13.1 High Sierra update “improves the security, stability, and reliability of your Mac and is recommended for all users.” This is a standard message in most operating system updates, but users seldom pay heed. This time, however, Apple’s latest Mac OS includes a security update that’s essential to keeping your devices safe from KRACK.

Why you should update now

Foremost on Apple’s list of macOS updates is the addition of 70 new emojis. Although this is exciting to some, the most compelling reason to update to the latest OS is the security patch for the KRACK WiFi security flaw.

For those who are unfamiliar, KRACK or “Key Reinstallation AttaCK” was discovered in October by researchers who found a serious vulnerability in almost any device that can connect to WiFi (not just Macs). It compromises WPA2, a standard security protocol that protects most WiFi networks, and intercepts data that passes between a wireless device and the router. This exposes private messages, login credentials, and other sensitive data to attackers.

Aside from compromising your data, a successful KRACK attack could also infect your systems with ransomware and other malware. Updating to the latest OS ensures your device gets the latest security patch needed to shield it from KRACK.

Other relevant macOS updates

Aside from important security updates, the new macOS also fixes a bug that makes Bluetooth unavailable when performing Apple Pay transactions, improves the syncing of Microsoft Exchange messages in the Mail app, solves a keyboard bug with the search feature Spotlight, and improves Touch ID accessibility settings.

The macOS 10.13.1 High Sierra update coincides with updates for Apple’s other line of products, including iPhones (iOS 11.1), Apple watch (watchOS 4.1), and Apple TV (tvOS 11.1), all of which get security and performance improvements in their latest operating systems.

To install the update, launch the App Store, then click the Updates tab. Available updates will appear in the topmost section of the app.

Updating to the latest operating system as soon as it becomes available lets you enjoy a better-performing system and stay safe from the exploits of emerging vulnerabilities like KRACK.

Whether you need assistance with automating your devices’ updates or improving your systems’ overall security, our technicians can provide professional advice. Get in touch with us.

Published with permission from TechAdvisory.org. Source.

Google My Business now accepts appointments

There are countless platforms that showcase, review and link to small businesses, but few have as much impact as Google does. Although business owners can’t choose where their site ranks in the search results, they can edit information that is displayed and insert some flashy new features.

How to edit your business’s Google listing

When someone types your business’s name and location into Google.com, a “Knowledge Panel” is displayed on the righthand side of the search results with information about your office. If your business doesn’t have a Knowledge Panel, you can change that by opening a free Google My Business (GMB) account.

The GMB platform lets you link to your website, update office information (address, hours, phone number, etc.) and choose which photos Google associates with your company. GMB also gives you data about how many people:

  • Saw your business’s Knowledge Panel in search results
  • Visited your website by clicking somewhere in the Knowledge Panel
  • Asked for directions via the Knowledge Panel

What’s new with GMB?

In the summer of 2017, Google announced that business owners could customize “Posts” in their Knowledge Panel. Posts are made up of a 100-300 word caption, an image and a call-to-action button, such as Learn More, Sign Up, Buy, etc. Posts automatically expire after seven days, which makes them perfect for sales, events and content marketing.

More recently, Google added another exciting feature: the ability to schedule appointments from inside the Knowledge Panel. If your website uses one of the 22 accepted plugins, you can connect it with GMB to make it easier for searchers to book a reservation at your location. Google is in the process of rolling out this feature to gyms, beauty salons and restaurants, but a wider release is on the way.

How do I enable Bookings?

Adding this feature to your GMB page is an easy four-step process:

  1. Log in to Google My Business
  2. Click on the Sign Up For Bookings icon below your business’s profile
  3. Choose your booking provider from the list of approved vendors and sign up on its site
  4. Check back in a few days and start tracking your appointments with GMB!

If your business accepts reservations, this feature will be an indispensable tool for improving your customers’ experiences. For more information on low-cost technology solutions that add value to your business — give us a call today.

Published with permission from TechAdvisory.org. Source.

Android introduces Fast Pair

As seen with Apple’s AirPods, people today are quickly growing accustomed to wireless pairing between their smartphones and headphones. Of course, Google has been working on a solution of its own, and it has just made it to the market.

What is Fast Pair?

Fast Pair is Android’s new connectivity solution which uses Bluetooth technology and the smartphone’s proximity to let you connect to Fast Pair-enabled Bluetooth devices with just a single tap.

How does it work?

When a Fast Pair-enabled device is nearby, your Android smartphone will automatically retrieve the device’s product image and name from Google’s servers and display it on the screen. After tapping the image, a confirmation message will appear to let you know a pairing has been made successfully.

Fast Pair also comes with useful companion apps. An example would be the equalizer app that comes with certain Bluetooth headphones. It lets users optimize their sound experience whenever using Fast Pair to connect to Bluetooth devices.

Note that Fast Pair only works with Google Play Services version 11.7. And while Google may not have introduced a completely new technology, you can expect a broader range of wireless coverage and faster connectivity as more wireless devices get Bluetooth 5 features.

Does it support all existing Bluetooth gadgets?

Not for the time being; Bluetooth device manufacturers will need to adopt Fast Pair by registering with Android first. Currently, the following headphones are Fast Pair compatible: Google’s Pixel Buds, Libratone’s Q Adapt On-Ear, and Plantronics Voyager 8200-series wireless headsets.

Support for Fast Pair extends back to Android Marshmallow. And as more Android phones are losing the headphone jack, Google has made the right move to support the change in demand.

As the world of technology moves forward, you can expect even more hardware designed to make life easier. And as always, you can count on us to keep you up to date about all of it. If you have any other questions, just give us a call.

Published with permission from TechAdvisory.org. Source.

Hackers exploit vulnerable Office feature

As the world’s most popular productivity suite, Microsoft Office tends to receive much attention from cybercriminals. Generally, hackers embed malware in authentic Office files to trick users into unleashing it onto their machines. However, the most recent exploit proves to be much more dangerous than any Office hack we’ve seen.

What’s the new Office threat?
The Office exploit takes advantage of Microsoft’s Dynamic Data Exchange (DDE), a protocol that sends messages and data between applications. For example, DDE can be used to automatically update a table in a Word document with data collected in an Excel spreadsheet.

The problem with this is hackers can create DDE-enabled documents that link to malicious sources rather than to other Office apps. Theoretically, this allows hackers to launch scripts that download Trojan viruses from the internet and execute it before the user is even aware of the attack.

And unlike most malware-embedded Office files, which are usually blocked by security protocols from Microsoft, DDE exploits are instant. Once a compromised Word file is opened, it automatically executes the hack.

Outlook at risk
What’s even more alarming are the DDE vulnerabilities in Outlook. Recent reports found that hackers can embed malicious code in the body of an email or calendar invite, allowing them to perform phishing scams without a file attachment.

Fortunately, Outlook DDE attacks are not as automated as Word or Excel DDE attacks. Two dialog boxes will usually appear when you open the email asking if you want to update a document with data from linked files and start a specific application. Simply clicking ‘No’ on either of these boxes will stop the attack from executing.

Defending against DDE attacks
Beyond saying no, you can protect yourself by following these security best practices:

  • Evaluate the authenticity of unsolicited emails before interacting with them and don’t open attachments from unfamiliar contacts.
  • View emails in plain text format to completely stop DDE attacks embedded directly in emails from running. Note that this will also disable all original formatting, colors, images, and buttons.
  • Use a strong email security system that prevents phishing emails, spam, and other unwanted messages from reaching your inbox.
  • Get in the habit of checking for Microsoft updates, as they’re usually quick to release patches after vulnerabilities have been discovered.

Last but not least, consider working with our team. We’re Microsoft Office experts who can keep you safe from the latest threats. Call us today to get started!

Published with permission from TechAdvisory.org. Source.

Navigate Windows 10 easily with ‘Follow Me’

According to a Microsoft tipster, a proposed new feature in Windows 10 will allow users to navigate the system with the help of its virtual assistant (VA), Cortana. ‘Follow Me’ is an enhancement that will make navigating the operating system much easier, which will be particularly useful to those who find it a bit challenging.

Possible new Cortana features

Cortana can perform several tasks, including answering basic questions, sending reminders, and adjusting your music player’s volume. With the introduction of ‘Follow Me,’ it will provide an audiovisual-guided navigation within your Windows computer.

Currently, Cortana is capable of providing voice prompts when providing search results. Based on this short video clip, the improved version will perform more complicated tasks such as providing users with visual prompts for pairing a Bluetooth device with their PC.

The new feature looks easy to activate and deactivate, too. To quit, users can simply press the escape key.

Follow Me for businesses

Many business users haven’t fully embraced VA technology. In fact, those who work in corporate environments don’t find them particularly useful, as they’re often seen as an unnecessary add-on that doesn’t do much beyond performing voice-prompted searches, taking notes, placing or answering Skype calls, and doing other negligible tasks.

However, VAs are becoming standard features in modern operating systems, which means they’re likely to see substantial improvements in the future.

Moreover, assistants like Cortana are useful to some business users that require quick assistance in finding information on their computers. And although they perform mostly small tasks, they also help speed up things like calculating and setting schedules.

What’s in store for the MS assistant

In early 2017, Microsoft demonstrated that Cortana was capable of performing complex tasks when it introduced the ability for users to set up their PCs with the help of its digital assistant. When “Follow Me’ is launched, it will be a logical next step to this recently introduced functionality.

Since the Fall Creators Update was recently launched, ‘Follow Me’ will likely be featured in upcoming Windows 10 updates. As of now, Microsoft tipsters continue to speculate about the digital assistant’s new capabilities as they wait for an official announcement from the software company.

If you wish to explore time-saving and productivity-enhancing tools for your company’s Windows computers, contact us today.

Published with permission from TechAdvisory.org. Source.

KRACK hacks: What you need to know

You’ve heard of ransomware, denial-of-service attacks, and even phishing, but one hacking technique you may not have heard of is the KRACK exploit. This attack takes advantage of a vulnerability in WiFi networks, which puts any device with a wireless connection at risk. Here’s everything you need to know about KRACK.

What is KRACK?
Simply put, KRACK, short for ‘key reinstallation attack,’ allows hackers to bypass WPA2 — a security protocol used by routers and devices to encrypt activity — and intercepts sensitive data passing between the mobile device and the wireless router, including login details, credit card numbers, private emails, and photos.

In extreme cases, KRACKed devices can be remotely controlled. For example, hackers can log in to your surveillance systems and shut them down.

What’s worse, Internet of Things devices — like smart thermostats and IP cameras — rarely receive security fixes, and even if some are available, applying patches are difficult, as these devices tend to have complex user interfaces.

The good news, however, is you can do several things to mitigate the risks.

Download patches immediately
According to recent reports, security patches have already been released for major platforms, including iOS, Windows, and Android. Router manufacturers such as Ubiquiti, Mikrotik, Meraki, and FortiNet have also issued firmware updates, so make sure to install them as soon as possible.

Although IoT patches are rare, consider getting your smart devices from reputable vendors that push out updates regularly. It’s also a good idea to contact a managed services provider to install the updates for you.

Use Ethernet connections
Some wireless routers don’t yet have a security patch, so while you’re waiting, use an Ethernet cable and disable your router’s wireless setting. Turn off the WiFi on your devices as well to make sure you’re not connecting to networks susceptible to KRACK.

Stay off public networks
Free public WiFi networks — even ones that are password-protected — in your local cafe should also be avoided because they usually don’t have holistic security measures in place, making them easy targets for cybercriminals.

Connect to HTTPS websites
If you do need to connect to a public WiFi hotspot, visit websites that start with “HTTPS,” and stay away from ones that are prefaced with “HTTP.” This is because HTTPS websites encrypt all traffic between your browser and the website, regardless of whether the connection is vulnerable to KRACK

Hop on a Virtual Private Network (VPN)
You can also use a VPN service to hide all network activity. Simply put, VPNs encrypt your internet connection so that all the data you’re transmitting is safe from prying eyes.

Although the potential impact of a KRACK hack is devastating, security awareness and top-notch support are the best ways to stay safe online. Want more security tips? Contact us today.

Published with permission from TechAdvisory.org. Source.