Month: April 2018

The importance of strong iPhone passcodes

Now is the right time to shift to a stronger passcode for iPhone users, with police departments, federal agencies, and possible criminals, lining up to buy technology that can bypass your phone’s security. Experts say technology for unlocking iPhones is very much in circulation, so here’s everything you need to know.

The problem

According to reports, at least two companies, Israel-based technology vendor Cellebrite and Atlanta-based Grayshift, have both developed relatively inexpensive technology for unlocking iPhones. Reportedly, local and regional U.S. police departments as well as the federal government have been purchasing the technologies.

Grayshift’s GrayKey box is a de-encrypting device that can unlock an iPhone with a four-digit passcode in about two hours. The entry-level GrayKey box requires an internet connection, works only in certain geographic locations, and can break only 300 passcodes. But an unlimited GrayKey model works even without internet connectivity and offers an unlimited number of device unlocks.

On the other hand, Cellebrite provides a $5,000-iPhone unlocking device to law enforcement agencies.

Both companies claim they sell only to police and government law enforcement agencies, “or so they would have you believe”, according to Nate Cardozo, a senior staff attorney with the Electronic Frontier Foundation.

The solution – more digits, better security

According to Gartner research director Dionisio Zumerle, consumers and businesses must use a six-character alphanumeric passcode or a passphrase at minimum, to address risks associated with personal or enterprise data leaks.

Of course, Apple’s iOS 9 operating system has already boosted the default iPhone passcode from four digits to six; but for an even stronger and more secure option, experts suggest an alphanumeric passcode.

While Apple’s Touch ID and Face ID help with security as well, they always provide the option of unlocking a phone with a passcode.

To sum it up, complex passcodes are always better for security, especially for iPhones. We recommend changing the settings on your iPhone to allow both upper- and lowercase characters, numbers, and uncommon words. And if you feel overwhelmed with anything related to the privacy or security of your iPhone, don’t worry! Just call us today and we’ll help you out.

Published with permission from TechAdvisory.org. Source.

Tips for optimizing your mobile hotspot

Did you know you can keep your laptop connected to the Internet in areas without a Wi-Fi connection? All it takes is a portable, low-cost 4G router to make a private wireless network for their devices. These tiny devices are a great investment for employees working from the road, and we’ve got some tips on how to use them.

A mobile hotspot usually provides faster Internet connection and better security compared with public Wi-Fi. But if this kind of mobile networking is not utilized well, it will accumulate expensive data charges. The following tricks will maximize the efficiency of mobile hotspots while lowering their data usage.

Place the router in a strategic spot
For your equipment to offer optimal coverage, put it in an area where it can best broadcast signals. The goal here is to cover as many devices as possible, so you want to carefully plan where the router is placed. Wireless signals reach only up to 100 feet indoors and 300 feet outdoors. The signals can pass through floors, walls and ceilings, but fewer obstructions will result in better transmission.

Less Wi-Fi range for longer battery life
If your settings allow, tweak your mobile wireless network for low-power, shorter Wi-Fi. Users must move closer to the hotspot for better Internet connection, but the router’s battery will thank you for it.

Check for LTE coverage
It’s a good idea to research the area you will use the portable router in. There are locations that do not support cellular 4G/LTE, which means you will still have Internet, but at slower speeds.

Watch out for background apps!
Laptops, tablets, and smartphones may be running applications in the background that are using up Internet bandwidth. The most common examples of these apps are location-based services, social media and email. Minimize the amount of data you use by disabling background apps you don’t need.

Avoid multimedia usage
Loading an email or text on a webpage with your mobile device will consume minimal amounts of data. Streaming videos or music will require more bandwidth, using up more data. Try to avoid using multimedia so your battery and data plan lasts longer.

Mobile hotspots let users remotely connect to the Internet without being dependent on possibly unsafe public Wi-Fi networks. With the ability to connect multiple devices to a single hotspot, these devices are an easy way to increase productivity.

We specialize in hardware solutions that improve your bottom line. Call us today for advice tailored to your business and its industry.

Published with permission from TechAdvisory.org. Source.

Mobile devices in the field

Field workers. You see them every day. And you notice that they, too, use mobile devices, as now more than ever do they need to stay connected with their organizations to stay in business. This is where mobile performance management, a critical factor for any field worker to perform and finish tasks on time, comes in. Here’s how to ensure connectivity for these workers.

The ability to manage the workforce out in the field requires a modern support infrastructure called mobile performance management. It includes the top five tips to keep field workers connected: optimizing traffic, applying control, measuring performance analytics, simplifying data security, and identifying the root cause of connectivity issues.

Optimize

Although the latest apps on the market can maximize productivity for the mobile workforce, these apps come with a certain risks: stability issues that could lead to the apps crashing while out in the field. If you are your company’s IT decision-maker, be cautious of untested apps, and consider blocking heavy bandwidth apps to streamline data flow when signal strength is weak.

Control

Another thing you can do with mobile performance management solutions is blocking personal apps and unsafe WiFi networks. Both of these create serious security risks that could lead to costly data theft or loss.

Analyzing performance

Field workers mostly rely on GPS location data for more efficient scheduling, route-planning, and effective control of fuel consumption. This is possible only if there are reporting tools that confirm that the GPS capability is working. Performance analytics show you what mobile workers are experiencing, gaining access to robust data, network and app usage reports, inventory analysis, coverage maps and device maps as needed.

Simplify security

IT should tightly restrict access without making security complicated for mobile workers. IT administrators need to create a highly flexible and programmable secure mobile strategy. You must be able to restrict which apps can access company data and remotely wipe data from the device if it is lost or stolen.

Identifying the root cause of connection issues

Obviously, field workers are not IT experts, so organizations need to be fully prepared for connectivity issues involving their mobile devices. Organizations of all sizes should be able to afford remote diagnostics to gather complete troubleshooting information to allow IT to identify the root cause of the problem quickly, without relying on workers, who have no idea about how to run tests and answer questions regarding these issues.

For any organization with workers in the field, the ability to implement performance management structures and policies is a must. For other tips on how to keep your employees connected, engaged, and efficient, give us a call and we’ll be happy to advise.

Published with permission from TechAdvisory.org. Source.

Office 365: New security updates

Microsoft recently rolled out security updates to Office 365 for business and home users. These enhancements aim to increase safety when sending or receiving an email in Outlook, sharing links in OneDrive, and alerting users of possible malware infection.

Files Restore in OneDrive

Previously available only to Office 365 business users, Files Restore allows users to conveniently recover files in OneDrive within the last 30 days. Home and personal users can now easily retrieve and restore all their files at a specific point in time, which is useful in instances where files are accidentally deleted, corrupted, or compromised by ransomware or other malware.

Ransomware detection notification for Office 365

You receive notifications and alerts for a variety of things on your PC or mobile devices, but rarely for something as immensely important as a ransomware attack. Office 365’s ransomware detection and recovery feature sends desktop notifications, email alerts, and mobile alerts in case of any possible ransomware attack on your system so you can act fast.

Aside from being notified about a detected ransomware, you’ll also be guided on how to recover your files before they were infected, based on the timestamp recorded by Files Restore.

Password-protected link sharing in OneDrive

Whenever you share a link — whether to a file or folder — in OneDrive, there’s no guarantee that it won’t be shared to unauthorized users. A password-protected feature solves this dilemma by giving you an option to set and require a password for every file or folder you share.

Email encryption in Outlook

Intercepting email has become many cybercriminals’ preferred method of stealing critical information, so it’s more crucial than ever to ensure email safety. With Outlook’s end-to-end encryption, users can rest easy knowing that the email they send won’t be easily intercepted after all.

Email encryption works by requiring non-Outlook email recipients to choose between receiving a single-use passcode or re-authentication to open an email from an Outlook email sender. On the other hand, an Outlook-to-Outlook email exchange — whether Outlook on desktop, mobile (iOS and Android), or Windows Mail app — doesn’t require any further action for the email to be opened.

Prevent Forwarding

This function restricts email recipients (both Outlook and non-Outlook users) from forwarding or copying email. It also provides an option to prevent certain recipients from opening an attachment from a forwarded email, which will come in handy when a person needs to send an email to more than one recipient, but wants to restrict access to an attachment to just a few recipients.

These new capabilities greatly reduce the effort to secure your files and communications, and Microsoft is sure to roll out a few more soon. If you want to optimize these Office 365 security features or explore other productivity tools’ security features, call us today.

Published with permission from TechAdvisory.org. Source.

The top 4 new features in the Windows 10 update

Microsoft has claimed that Windows 10 will be the final version of the world’s most popular operating system. Instead of bundling new features into a new Windows release, Microsoft has been issuing free updates to the current version since 2015. The latest update is almost here, and it comes with some exciting improvements.

Timeline

Replacing the Task Viewer icon that sits along the Windows taskbar, Timeline lets users view their desktop’s activity history. When users click the icon to the right of the search icon located on the taskbar, they will see all the applications that are currently open. Scroll down and Windows will display documents, photos, videos, and folders that are organized by when they were last used.

Can’t find the file you were working on last Wednesday? Scrolling to that date in Timeline will be the quickest way to track it down.

Nearby Sharing

This simple feature makes it much easier to transfer files between Windows devices. After enabling Nearby Sharing from the Control Panel, click the Share button in the Edge browser or Photos app and select the computer you want to receive the file. Users can also right-click any file and select Share. The computer receiving a file will display a notification for users to accept or decline the transfer. This means file transfers can finally take place without empty email messages, unreliable network folders, or beat-up USB drives.

Swift Pair

Want to make a call from your desktop with a pair of wireless headphones or test out a wireless keyboard? Just turn on a Bluetooth device within range of your desktop, and Windows 10 will automatically detect and notify you of the connection opportunity — all you need to do is click Connect.

Privacy

If you’re concerned about information being collected from your business’s computers, the brand new Windows Diagnostic Data Viewer will tell you everything you need to know. Users can now view what information Microsoft receives from their computer and fine-tune privacy settings related to browser history, connected devices, application usage, and webcam permissions.

Scheduling your update

It’s hard to know exactly when your Spring Creators Update will be ready to install, so it’s a good idea to brief your staff on how to minimize business interruptions that the update might cause. Windows 10 updates can be installed immediately, “Snoozed,” or rescheduled, so start thinking about which would be best for your office.

Beyond these impressive new features, Microsoft’s updates come with invaluable security protections. If you’re having trouble keeping your Windows devices secure and running smoothly, give us a call today.

Published with permission from TechAdvisory.org. Source.

Beware of watering hole attacks!

Hackers have plenty of ways to breach your systems. They can use complex programs to exploit software bugs, send emails to dupe you into downloading malware, or insert a malware-infected USB drive directly into your computer. However, another increasingly popular hacking method is a watering hole attack.

What are watering hole attacks?
Much like phishing, a watering hole attack is used to distribute malware onto victims’ computers. Cybercriminals infect popular websites with malware. If anyone visits the site, their computers will automatically be loaded with malware.

The malware used in these attacks usually collects the target’s personal information and sends it back to the hacker’s server. Sometimes the malware can even give hackers full access to their victims’ computers.

But how does a hacker choose which websites to hack? With internet tracking tools, hackers find out which websites companies and individual users visit the most. They then attempt to find vulnerabilities in those websites and embed them with malicious software.

Any website can fall victim to a watering hole attack. In fact, even high-profile websites like Twitter, Microsoft, Facebook, and Apple were compromised in 2013.

You can protect yourself by following these tips.

Update your software
Watering hole attacks often exploit bugs and vulnerabilities to infiltrate your computer, so by updating your software and browsers regularly, you can significantly reduce the risk of an attack. Make it a habit to check the software developer’s website for any security patches. Or better yet, hire a managed IT services provider to keep your system up to date.

Watch your network closely
To detect watering hole attacks, you must use network security tools. For example, intrusion prevention systems allow you to detect suspicious and malicious network activities. Meanwhile, bandwidth management software will enable you to observe user behavior and detect abnormalities that could indicate an attack, such as large transfers of information or a high number of downloads.

Hide your online activities
Cybercriminals can create more effective watering hole attacks if they compromise websites only you and your employees frequent. As such, you should hide your online activities with a VPN and your browser’s private browsing feature.

At the end of the day, the best protection is staying informed. As cyberthreats continue to evolve, you must always be vigilant and aware of the newest threats. Tune in to our blog to find out about the latest developments in security and to get more tips on how to keep your business safe.

Published with permission from TechAdvisory.org. Source.

Back up your files with Apple Time Machine

There’s a popular belief that Macs are the most reliable computer brand because they are less likely to get viruses or crash often – but they do. And like any other computer, Macs aren’t invulnerable to coffee spills, theft, and crashes. When these happen, the Time Machine is your friend to restore your data.

What is Time Machine and why should you use it?

Time Machine is a backup system software for Macs that run on Mac OS X Leopard or later. It makes regular periodic backups in the following intervals:

  • Hourly backups for the past 24 hours
  • Daily backups for the past month
  • Weekly backups for previous months

If you’re concerned about storage space running out fast because of the frequent backups, don’t worry. These scheduled backups don’t replace previously saved files; rather, they only save the changes you’ve made to a file.

Let’s say you’ve been working on a file for five days: Time Machine has periodically created backups of the changes you made every day. So if you need to retrieve a version of a file with changes made on Day 2, you can do so even after you’ve made several changes on the file from Days 3-5 because Time Machine stores multiple copies of the file from Days 1-5.

In case you’re replacing a Mac, you can easily copy all your files from your old computer to the new one, with your settings, files, and folders intact. And if you’re backing up data from several Mac computers, there’s no need to use a separate device for each Mac, provided it has enough space for all files.

How to use Time Machine

To use Time Machine, you only need an external storage drive such as a USB, an SSD card, or any storage device that can be plugged into your Mac. Then follow these steps:

  • Connect an external storage device (or macOS server) to your Mac
  • Go to System Preferences > Time Machine
  • Click ‘Use as Backup Disk’ (It’s recommended that you click Encrypt Backup Disk before you do so, in order to set up a password for accessing your backup)
  • If Time Machine doesn’t automatically pop up when you connect an external storage disk, go to Time Machine via System Preferences or click the Apple icon on the upper left corner of the menu bar, click System Preferences > Time Machine
  • Select the storage disk you’ve just connected, then click ‘Use Disk’

Other backup options

Although there are various other backup systems for Mac, Time Machine is one of the more practical options for users who value simplicity, convenience, and reliability. What’s more, it’s free.

That said, similar backup systems like ChronoSync offer slightly more comprehensive backups. And since Time Machine only backs up data instead of the entire hard drive, restoring an entire system is relatively slower.

Despite this minor shortcoming, Time Machine is a reliable, user-friendly, and economical way to back up your files. Whether you’re backing up a device for personal or business use, using Time Machine ensures all your files are safe and can be recovered. If you need more comprehensive backup solutions, our experts are ready to help — call us today.

Published with permission from TechAdvisory.org. Source.

4 ways to speed up mobile charging

Whether you use an iPhone or a Xiaomi, your mobile will sooner or later run out of battery. When this happens, you want it to be charged to 100% quickly, but not everyone knows how to do it. Read on to learn four ways about how you can charge your mobile faster.

#1. Optimize your phone accessories

One reason why your phone charges slowly is because of poor-quality accessories — such as cables, adapters, and weak sources of electricity.

Cables and adapters

Unless you were careful to take great care of your phone cable and adapter, they might be the reason why your phone is charging so slowly. If you think this could be the problem, we recommend that you change them immediately. After doing so, make sure to use and store your new cable and adapter properly to keep them in tip-top shape.

Charging Source

Did you know that your phone will charge faster if you connect it to a higher amperage charging source? Although mobile phones charge at only 5 volts, depending on the charger you use, you can get amperage from as low as 500mA (milliamps) to as high as 2,100mA. Therefore, it is recommended to forgo charging your mobile device through a computer port (uses 500mA or 900mA) and use a wall charger (ranges from 500-2,100mA) instead.

#2. Clean your phone’s charging port

Another reason why you may experience slower charging time is because of a corroded or obstructed port. If the problem is because of obstruction, get a flashlight, magnifying glass, toothpick, and small brush to completely remove any debris. However, you should be very careful when doing this because the port is very fragile.

We recommend you enlist a professional’s help to clean your port if you’re worried about damaging it or if the problem is due to corrosion.

#3. Background apps

When was the last time you sorted out your phone’s background apps? If you don’t remember, then it’s time to do it! Apps that are opened and left running in the background not only drain your phone’s battery, but also affect your phone’s charging speed. Select “Battery” in your phone’s Settings to find out which apps are using up your phone’s power, and delete them if necessary.

#4. Using your phone while charging

Do you browse the internet while your phone is charging? If yes, then you should stop doing it. Feature-rich apps like WhatsApp and Facebook have been listed as two of the top ten battery draining apps by AVG, which means you may be slowing down your phone’s charging speed when you use them while it charges.

Every successful business needs high-performance mobile phones, but this is only possible if their batteries are juiced. If you want more information about how to speed up charging your phone, contact our experts today.

Published with permission from TechAdvisory.org. Source.

3 Surprising applications of blockchain

Most people associate blockchain technology with Bitcoin, the infamous digital currency that rose to fame in 2017. But blockchain technology is not tied to financial transactions, and it’s creating all sorts of exciting opportunities for faster, more secure information exchange — see for yourself!

What is blockchain?

Blockchain, like the cloud, is more of a concept than a specific piece of software or hardware. It’s the idea that if you store a spreadsheet or ledger on a hundred different computers — each of which receive automatic and encrypted updates — it’s nearly impossible to create a fraudulent entry. If someone adds a line of false information to one spreadsheet, 99 others can confirm it is not in their copy and is therefore inaccurate.

In the Bitcoin ledger, each line represents the transfer of funds from one account to another. So if John wants to transfer money to Jane, he sends a request to Bitcoin’s blockchain and thousands of computers confirm his account information is correct and he has sufficient funds. The money is transferred, both account balances are updated, and the whole process takes less than an hour with almost no human interaction. Much faster than the 5-7 business days of most banks.

There are countless applications for decentralized, real-time record keeping beyond financial transactions, though. And very soon, blockchain won’t be synonymous with Bitcoin.

Blockchain’s potential

Although this technology has been around since the ’90s, it lacked the popularity and computing power necessary to become a mainstream solution…until now. With the rise of cryptocurrencies in 2017, blockchain started seeping into other industries, such as:

  • Law – “Smart contracts” create agreements that automatically execute when their terms are met. For example, an attorney could agree to pay a courier $100 after the delivery of documents to the defendant in a case. The contract and the payment sit in the blockchain until the courier uploads a GPS-tagged photo of services rendered, at which point the money is transferred and the contract archived.
  • Agriculture – Supply chain blockchains can track every ingredient throughout the production process. If several people get sick from the same food item, ingredients could be traced back to their source and products that share the same ingredients could be recalled preemptively.
  • Real estate – Blockchain is being used to automate escrow account transactions, property title transfers, and insurance claims, so they aren’t reliant on slow and error-prone humans. Buying a home could eventually be as easy as finding the one you want, signing a contract, transferring your down payment, and receiving the title — no middleman necessary.

Most blockchain-based solutions are too new to trust with sensitive information. But you can do a few things to get out in front of your competitors. You can work with us to invest in business intelligence software that helps you collect more data, and start experimenting with risk-free blockchain solutions.

As long as you have certified technicians like ours at your disposal, you’ll be sure to see gains in no time — give us a call today!

Published with permission from TechAdvisory.org. Source.

Microsoft announces new features for Teams

Microsoft has recently announced new features for Microsoft Teams. These features are expected to bring users greater convenience and improved communication, and ultimately increase its appeal to a wider market.

Cortana Integration

One new feature that Microsoft will bring to Teams is Cortana, Microsoft’s virtual assistant. By integrating Cortana with Teams, users can use voice commands to make calls, join an ongoing meeting, or add other users to the meeting. This feature will also work with IP phones and conference room devices.

Inline Message Translation

While most people can communicate well in English, not everyone is comfortable using the language. Inline message translation allows these people to chat in their native language and then translate their messages into English. This will not only help them verbalize their thoughts better and faster, but you’ll also be able to understand exactly what you have to do to meet their demands.

Cloud Recording and Automatic Transcripts

Have you ever forgotten or overlooked important meeting details? This new feature will allow you to record meetings, store it in the cloud, and create a transcript of it. The ability to save the entire meeting also allows users to review everything or segments of it in the future at their convenience. This is particularly useful for meetings that are highly detailed or very long.

Facial recognition, which will allow statements to be matched with the corresponding speaker, is expected to be included in the future.

Background Blur Option for Video Calls

Most people get easily distracted. But you want to minimize these distractions and have them focus on you when you have an important meeting like a business pitch. Teams’ latest feature allows you to blur your background during video calls so other people in the meeting can fully concentrate on you.

Proximity Detection for Teams Meetings

A feature that can make your meetings simpler is proximity detection. When you enter a room equipped with a Teams meeting room device, Proximity Detection will automatically detect your Teams-enabled meeting room laptop and prompt connection for you to join the Teams meeting room. This helps you save time finding an available room so you can immediately connect with other users.

Mobile Sharing in Meetings

Have you ever needed to join a sudden meeting but couldn’t perform as well as usual because you were on the go with only a mobile device? Mobile Sharing in Meetings solve this by allowing you to share a live video stream, photos, or your phone screen with other attendees immediately.

If you’re interested in improving your company-wide communication and would like to learn more about Microsoft Teams, contact us today.

Published with permission from TechAdvisory.org. Source.