Month: January 2018

Understanding Office collaboration tools

Office 365 is chock full of so many apps that it’s sometimes difficult to keep track of them all. Sure, you have the most popular tools like Word and Skype for Business, but there are three tools in the lineup that seem like they could be used the same way: Outlook Groups, Yammer, and Microsoft Teams. Read on to find out what makes these collaboration tools different from each other and when each of them should be used.

Outlook Groups
With Outlook Groups, every member gets a shared inbox, calendar, project planner, notebook, and document library. You also get the ability to connect to third-party apps — like Twitter, Trello, and Mailchimp — so notifications are sent directly to your shared inbox.

This means all relevant messages and information are contained in one place, so if a majority of your conversations occur via email then, Outlook Groups is the perfect choice. What’s more, HR and Sales departments that communicate with external parties will also find plenty of uses for its email features.

One drawback with Outlook Groups, however, is email overload. Because all messages and notifications are sent to one inbox, users may be overwhelmed by the number of emails they have to sort through every day.

Microsoft Teams
Then there’s Microsoft Teams, a chat-based collaboration platform similar to Slack. It works with Skype for Business so you can text, call, video chat, and share files with colleagues. And thanks to its seamless integrations with other Office 365 programs, you can even work on shared files without having to leave the app.

Unlike Groups, Microsoft Teams is designed for high-velocity collaboration, making it the best of the three for completing projects with tight deadlines or other tasks where employees need immediate feedback.

Yammer
Much like Groups and Teams, Yammer works well with other Office 365 tools like Outlook and OneDrive. But the big difference is Yammer is a social media app designed to foster open communication and break down barriers between teams.

With Yammer, important files and announcements can be shared with the entire company like an office bulletin board. What’s more, users can see the most popular post on their feeds, follow it, and even provide their input by leaving a comment.

Yammer also takes design elements and features from popular social media apps like Facebook, making it a popular choice for companies with a significant number of millennials in their workforce.

Although we’ve discussed the fundamental differences between Groups, Teams, and Yammer, we’ve barely scratched the surface of what each app can do. To figure out which apps you need, you must understand how your employees work, how they prefer to collaborate, and what you want to achieve.

But there’s another way to find the right app for your business. Contact us today for an IT assessment!

Published with permission from TechAdvisory.org. Source.

New Windows update for PC vulnerabilities

Two newly discovered Windows vulnerabilities, known as Meltdown and Spectre, make it possible for hackers to steal all sorts of confidential information. To resolve this issue, Microsoft has released an update. Continue reading to stay protected.

Issues with Microsoft’s Spectre and Meltdown patches

After the January 3rd announcement of unprecedented security vulnerabilities, Microsoft has been rushing to release security updates for its Windows operating system. At their most basic, these complex vulnerabilities, named Spectre and Meltdown, make it possible for a program installed on your computer to access any information stored on your hard drive, even if it is protected.

These flaws mean that anything you’ve typed into your computer is at risk: credit card numbers, passwords — all of it. But don’t rush off to install fixes just yet. There are a few speed bumps you’ll have to navigate on your road to safety.

Incompatibility issues

According to reports, Microsoft’s patches have caused several problems to some users’ computers. For some, installing the new patches has resulted in computers with older processors to crash more often than usual. Users with newer processors have found their computers struggling to boot up, with some never getting past the Windows loading screen.

As a result, on more than one occasion, hardware and software vendors have recommended that its customers postpone installing the new patches.

Spectre and Meltdown can cause serious damage, but that doesn’t mean anyone should run off to haphazardly attempt computer repair above their ability. Until the process for installing patches has been ironed out, we recommend enlisting help.

Hire a professional

Given the issues on patches, IT novices shouldn’t update their computers on their own. Without adequate experience, you might install the wrong patch and cause even more problems to your computer. Or worse, install one of the pieces of malware masquerading as Spectre patches. Instead, why not call a professional to update your computer and protect your system from Meltdown and Spectre?

Data and network security is no easy task. We offer advanced, multi-layer protection to keep your data safe and sound. Give us a call and we’ll explain how we can help.

Published with permission from TechAdvisory.org. Source.

Meltdown and Spectre fixes cause problems

It’s been three weeks since one of the worst IT security vulnerabilities in history was announced, and consumers are still receiving mixed messages about how to protect themselves. We usually encourage users to install software updates as often as possible, but when it comes to Meltdown and Spectre, that advice comes with an asterisk.

Unsecured data storage

Spectre and Meltdown are the names given to two hardware flaws that allow hackers to see any piece of information stored on your computer. Although slightly different in execution, both take advantage of a hardware feature that computer chips use to access and store private information. For the last 20 years, security experts believed this information could not be stolen or spied on by malicious software, but that assumption was proven false on January 3, 2018.

Now that the Spectre and Meltdown vulnerabilities are public information, hackers can use them to create programs that steal passwords, social security numbers, credit card numbers, and anything else you type into your computer.

Because these problems are hardware-based, none of the updates will be able to secure the vulnerable storage; they’ll simply prevent your computer from storing anything in it. Currently, there are patches for:

  • Operating systems (Windows, macOS, and Linux)
  • Web browsers (Chrome, Firefox, Safari, Edge, and IE)
  • Chip firmware (low-level programs installed on the processor itself)

If you’re using an Apple computer, these updates are relatively easy to install. If you’re using a Windows or Linux-based computer, these patches may cause your machine to freeze, reboot unexpectedly, or significantly slow down.

Why should I wait to install the updates?

Intel, one of the chipmakers responsible for the Spectre and Meltdown flaws, has provided contradictory recommendations on more than one occasion. As recently as January 18, Intel recommended waiting for an updated patch, but in the same announcement also recommended “consumers to keep systems up-to-date.”

Experts believe detecting an attack that is based on one of these flaws will be relatively easy and represent an alternative to installing updates that could render your computer unusable.

What should I do?

IT support experts will be able to quickly and easily assess what is the best option for your computers. For example, our team can determine whether or not your hardware will conflict with the current patches, and either install them or set up a detection strategy that will help you mitigate the risks without ruining your computer.

If you need expert IT support for quick responses and ironclad security — give us a call today.

Published with permission from TechAdvisory.org. Source.

Spectre & Meltdown: how to protect yourself

Spectre and Meltdown are critical security flaws that affect a majority of computers today, including the one you’re using to read this. They can leak your passwords and other sensitive data, which is why software companies are working on security patches. The good news for Apple users is that fixes are now available to keep their devices temporarily safe.

Download and install security patches ASAP

Apple has already released software updates for all affected devices, and you need to install them now. Here’s how:

  • macOS – Click the Apple icon on the topmost part of your screen and check whether your system has been updated to macOS 10.13.2. If not, click the ‘Software Update…’ button to go directly to the App Store, then click the ‘Update’ button for macOS High Sierra.
  • iOS – To update to iOS 11.2, go to Settings > General > Software Update and download and install the new software.
  • tvOS – To update to tvOS 11.2, go to Settings > System > Software Updates and follow Apple’s step-by-step instructions to update your software.

The company hasn’t confirmed whether they would release patches for devices running on outdated software, so if your business still uses previous versions of Macs, iPhones, or iPads, make sure they do not have critical company data stored on them. Better yet, upgrade to new devices so that they’re better protected against legacy system vulnerabilities.

Practice browser safety

The Spectre bug could also exploit vulnerabilities in browsers, so make sure you update Safari too. Apple is set to release Safari updates for Macs and iOS devices soon, and it’s highly recommended to download and install them as soon as they become available.

You should also avoid using non-Apple browsers like Chrome, Microsoft Edge, or Firefox, as they have yet to release security patches against the bugs.

Download applications only from the App Store

Downloading apps from the App Store is one of the best ways to ensure you install only secure apps. Third-party stores are prone to malicious apps that could be disguised as legitimate and harmless — or worse, an exact copy of a well-known app.

The App Store has had incidents of malicious applications targeting iPhones, but these cases are rare. It is also much better at vetting suspicious apps and is relatively safer than other open-source platforms.

Moreover, avoid jailbreaking your devices, as this just makes them and your systems more prone to malware. And regardless of where you’ve downloaded an app, practice extreme caution when running new, unfamiliar apps, whether on Macs or iPhones.

Because of the sheer scale of Spectre and Meltdown, there’s a greater need for businesses to consult with IT professionals who can install powerful security software and other protections. Our cyber security team is ready to answer your questions about these and other system bugs. Call us today for professional advice.

Published with permission from TechAdvisory.org. Source.

Data safety: The non-technical way

Keeping up with advancements in technology as a business owner is tough, especially when those advancements relate to information security. However, it doesn’t have to be. Here are a few physical security tips you can implement to protect your data before calling us!

Cover up your webcam

There must be some credibility to doing this if Facebook founder, Mark Zuckerberg, former FBI director, James Comey, and NSA whistleblower Edward Snowden all believe their webcams could be compromised. This is not just another paranoid celebrity reaction to ruthless paparazzi, there’s a genuine reason behind it. Kindly take a moment to consider the following scenario: hackers using your webcam to spy on you.

Though it might sound unrealistic, this actually happened on several occasions. Sometimes for purely voyeuristic reasons and sometimes what appeared to be espionage. This is a very real threat with disturbing repercussions. Hackers aim to gain personal information based on your surroundings, deduce your location, as well as spy on the people you’re with, ultimately using this information to hold you ransom, threatening to broadcast your most intimate and vulnerable moments if you don’t pay up.

Fortunately, guarding yourself against such danger is really easy and some painter’s tape over your webcam should do the trick. If you’re not confident about regular tape, you can purchase a cheap webcam cover online or at any hardware store.

Purchase a privacy shield

Think of privacy guards as those iPhone scratch protectors, but with an anti-snooping feature. These are thin covers you put on your computer, laptop or smartphone screen to limit viewing angles. Once installed, anyone trying to look at your screen from anywhere — except straight-on — sees nothing. Privacy filters are commonly used to protect work devices, particularly which display or contain critical files with sensitive data or confidential information. However, less sensitive, personal devices are still vulnerable to ‘shoulder surfing’ — the act of peeking at someone else’s screen, with or without ill intent, which is why we recommend using these protectors on all your devices.

Use a physical authentication key

Requiring more than one set of credentials to access sensitive resources is common sense, and has become standard practice for established online services. With something called two-factor authentication in place, you gain access to your account only after you’ve entered the authentication code, which the website sends to your smartphone once you’ve entered your account credentials. Until recently, two-factor authentication relied mostly on text messages that were sent to mobile phones. But professionals have now realised that phones can be hijacked to redirect text messages.

Moreover, authentication codes can be stolen, or users can be tricked into entering these codes via a convincing phishing website. If you’re looking for authentication services that cannot be hijacked, stolen or lost, your best bet is a USB or Bluetooth key you can carry on your keychain. This means nobody — not even you — will be able to access your account without the physical key. Ultimate security at your fingertips.

If you need help setting up two-factor authentication, or any IT security services, contact our experts and experience true peace of mind as we fortify your data to no end.

Published with permission from TechAdvisory.org. Source.

Why UPS is necessary for network equipment

Fire, flood, storm, and other disasters can lead to power failure and productivity loss. Using uninterruptible power supply (UPS) for computers ensures you never lose unsaved work, but without internet, you’re practically crippled. To avoid that dilemma, we highly recommend using UPSs for your networking equipment, including cable modems, wireless access points, and routers.

UPS for network equipment

UPS systems provide backup power in case of outages and protect against power surges, which don’t just damage computers but also make you lose unsaved work. Deploying them for Wi-Fi routers and modems allows you to stay connected to the internet in what is typically a chaotic time.

Moreover, it makes sense to not just keep your PCs powered up, but to also have internet access during a disaster. This strategy works relatively well if your staff are predominantly laptop users, as that means you only need to juice up your Wi-Fi gear.

Better than generators

Although generators are indispensable for certain businesses, they also require greater upkeep. Small- and mid-sized businesses may not have enough capacity to maintain them because they typically require a utility crew who can manage high-maintenance equipment.

What’s more, extreme mishaps when misused or mishandled could result in generator-related fatalities. On the other hand, misusing a UPS unit could result in the loss of a day’s work, but it’s unlikely to lead to anything as extreme.

Why internet access is important during a disaster

UPS-supported modems or routers help you stay online for as much as 90 minutes, which should be enough time to get your bearings before power finally runs out. Internet service providers are usually prepared for catastrophes and would normally have an emergency power source to stay operational. And if you can stay online via Wi-Fi during an emergency, you get the following benefits:

  • Internet speed that’s faster than cellular access
  • No extra telecom costs resulting from overreliance on cellular data
  • All devices stay online using a stable Wi-Fi connection
  • Devices don’t have to rely on cellular data-equipped phones for internet connection

Plug in your network gear now

Businesses that aren’t located in disaster-prone areas probably don’t give much thought to installing UPSs for their computers, let alone their modems. But accidents and emergencies are inevitable. And when they happen, you’ll find that having internet access is one of the most important things you need to ensure business continuity.

Think of an emergency power supply source like a UPS as an investment that not just protects your systems from data loss but also keeps your Wi-Fi equipment functioning in emergency scenarios. Call us today for productivity-saving tips and other hardware hacks for your business.

Published with permission from TechAdvisory.org. Source.

Office 365 Update: New Tools You Need To Know

Yet again, Microsoft has released new AI-based features for Microsoft Excel, Word, Outlook, and more — a continuing trend since 2016’s launch of the Microsoft AI and Research Group. If your business is subscribed to Office 365, this article will acquaint you with the newest features!

Automatically Uncover Trends in Excel Data

Finding useful information lurking in massive tables of jumbled numbers and data can be quite a headache. Not with Insights Preview! This feature uses machine learning to analyze Excel data, highlight patterns, and create visualizations to make information easier to locate and digest.

Search Text Within Images

Thanks to Office 365’s Intelligent Search feature, any printed words in images uploaded to SharePoint and OneDrive are now automatically detected, extracted, and made searchable. This makes it possible to find screenshots, receipts, and business cards based on the text they contain.

Understand Company Jargon with Acronyms

Microsoft Word’s new Acronyms feature will help users understand workplace-specific acronyms. This feature uses machine learning to analyze your employees’ vernacular and automatically create a useful glossary of terms.

Improve collaboration with the Whiteboard Preview App

This real-time digital canvas makes interactions between team members easier, whether they’re working on a conference room screen or across different devices and locations. The app is equipped with freehand drawing tools, geometry recognition, data illustration tools, and more to improve both business and creative projects.

As Microsoft gears itself toward making AI accessible to every user and organization, we are excited to see more smart features rolling out in Office 365 products in the near future.

But how can these upgrades transform your business? Can it save time and cut costs? There’s no better way to understand these updates than to chat with our team of IT professionals. Give us a call to learn more or to set up the new Office 365 in your workplace today!

Published with permission from TechAdvisory.org. Source.

Think before saving logins to your browser

There are a number of reasons you should be wary of saving your password to a digital platform. Just look at Yahoo’s data breach in 2013, which leaked passwords for three billion people. Even when your password isn’t compromised, saving it to a browser could have serious implications for your privacy.

Why auto-fill passwords are so dangerous

In 2015, the average internet user had 90 online accounts, a number that has undoubtedly grown since then. This has forced users to create dozens of passwords, sometimes because they want to practice healthy security habits and other times because the platforms they’re using have different password requirements.

Web browsers and password manager applications addressed this account overload by allowing usernames and passwords to be automatically entered into a web form, eliminating the need for users to hunt down the right credentials before logging in.

The process of tricking a browser or password manager into giving up this saved information is incredibly simple. All it takes is an invisible form placed on a compromised webpage to collect users’ login information without them knowing.

Using auto-fill to track users

Stealing passwords with this strategy has been a tug-of-war between hackers and security professionals for over a decade. However, it has recently come to light that digital marketers are also using this tactic to track users.

Two groups, AdThink and OnAudience, have been placing these invisible login forms on websites as a way to track which sites users visit. These marketers made no attempts to steal passwords, but security professionals said it wouldn’t have been hard to accomplish. AdThink and OnAudience simply tracked people based on the usernames in hidden auto-fill forms and sold that information to advertisers.

One simple security tip for today

Turn off auto-fill in your web browser. It’s quick, easy, and will go to great lengths to improve your account security.

  • If you use Chrome – Open the Settings window, click Advanced, and select the appropriate settings under Manage Passwords
  • If you use Firefox – Open the Options window, click Privacy, and under the History heading select “Firefox will: Use custom settings for history.” In the new window, disable “Remember search and form history.”
  • If you use Safari – Open the Preferences window, select the Auto-fill tab, and turn off all the features related to usernames and passwords.

This is just one small thing you can do to keep your accounts and the information they contain safe. For managed, 24×7 cybersecurity assistance that goes far beyond protecting your privacy, call us today.

Published with permission from TechAdvisory.org. Source.

Huge Apple developments in 2018

Apple is most famous for releasing a new iPhone every year, but that’s not all users should be excited about. Many experts predict that in the coming year the tech powerhouse will introduce some incredible new products. Here are some of the most exciting announcement Apple could make in 2018.

Three new iPhones
Just like every year, Apple will likely launch new iPhone models in September. Reports suggest there will be three iPhone models in 2018, and since Apple disrupted naming conventions by introducing iPhone X, it’s anyone’s guess what these models will be called.

However, experts predict the new iPhones will look like the current X model, but in sizes that match the 8, 8 Plus, and a supersized X model. They’ll all be equipped with faster hardware and a TrueDepth camera system that allows users to protect their phones with facial recognition.

HomePod
One device that’s certain to be released early in the year is the HomePod, a smart speaker in the same vein as Google Home and Amazon Echo. The Siri-powered speaker will likely feature automatic tuning, a fast A8 processor, and a six-microphone array to easily pick up commands. Other than playing music, HomePods will answer general questions and communicate with nearby smart devices.

Considering that Amazon and Google currently dominate the smart speaker market, Apple has its work cut out.

AirPods and wireless charging
There’s also talk of updated versions of AirPods, Apple’s wireless headphones. Rumors are far from substantiated, but experts are saying that the headphones may receive a design change and a case that can charge them wirelessly.

Speaking of wireless charging, more Apple devices will likely rely on this technology in the future. In September 2017, Apple unveiled a wireless charging pad that can charge multiple iPhones and Apple Watches. This year, we might get to see larger devices like iPads taking advantage of this technology.

Wearables in healthcare
Those in healthcare predict Apple Watches will become a key piece of technology for the industry. More health-monitoring addons for Apple Watches like EKG readers are now FDA-approved, so we may see more doctors using them to give accurate diagnoses and treatments.

Augmented reality devices
Over the past few months, Apple has also expressed an interest in researching augmented reality (AR) technologies. In fact, leaks from manufacturing facilities indicate that Apple is working on smart glasses that overlay digital information on the physical world. Although it’s still unclear what they will be using it for or if Apple will follow through with their plans, there are plenty of business possibilities with AR.

For instance, it can be used to display line-of-sight prices and details about a product without having to check the price tag or ask a salesperson.

All in all, Apple users have much to be excited about, and if you want to be the first to find out when or if these products will be released in 2018, call us today. Our experts are always tuned into the latest Apple developments to give you an edge over the competition.

Published with permission from TechAdvisory.org. Source.