Tag: windows

Office 365: New security updates

Microsoft recently rolled out security updates to Office 365 for business and home users. These enhancements aim to increase safety when sending or receiving an email in Outlook, sharing links in OneDrive, and alerting users of possible malware infection.

Files Restore in OneDrive

Previously available only to Office 365 business users, Files Restore allows users to conveniently recover files in OneDrive within the last 30 days. Home and personal users can now easily retrieve and restore all their files at a specific point in time, which is useful in instances where files are accidentally deleted, corrupted, or compromised by ransomware or other malware.

Ransomware detection notification for Office 365

You receive notifications and alerts for a variety of things on your PC or mobile devices, but rarely for something as immensely important as a ransomware attack. Office 365’s ransomware detection and recovery feature sends desktop notifications, email alerts, and mobile alerts in case of any possible ransomware attack on your system so you can act fast.

Aside from being notified about a detected ransomware, you’ll also be guided on how to recover your files before they were infected, based on the timestamp recorded by Files Restore.

Password-protected link sharing in OneDrive

Whenever you share a link — whether to a file or folder — in OneDrive, there’s no guarantee that it won’t be shared to unauthorized users. A password-protected feature solves this dilemma by giving you an option to set and require a password for every file or folder you share.

Email encryption in Outlook

Intercepting email has become many cybercriminals’ preferred method of stealing critical information, so it’s more crucial than ever to ensure email safety. With Outlook’s end-to-end encryption, users can rest easy knowing that the email they send won’t be easily intercepted after all.

Email encryption works by requiring non-Outlook email recipients to choose between receiving a single-use passcode or re-authentication to open an email from an Outlook email sender. On the other hand, an Outlook-to-Outlook email exchange — whether Outlook on desktop, mobile (iOS and Android), or Windows Mail app — doesn’t require any further action for the email to be opened.

Prevent Forwarding

This function restricts email recipients (both Outlook and non-Outlook users) from forwarding or copying email. It also provides an option to prevent certain recipients from opening an attachment from a forwarded email, which will come in handy when a person needs to send an email to more than one recipient, but wants to restrict access to an attachment to just a few recipients.

These new capabilities greatly reduce the effort to secure your files and communications, and Microsoft is sure to roll out a few more soon. If you want to optimize these Office 365 security features or explore other productivity tools’ security features, call us today.

Published with permission from TechAdvisory.org. Source.

The top 4 new features in the Windows 10 update

Microsoft has claimed that Windows 10 will be the final version of the world’s most popular operating system. Instead of bundling new features into a new Windows release, Microsoft has been issuing free updates to the current version since 2015. The latest update is almost here, and it comes with some exciting improvements.

Timeline

Replacing the Task Viewer icon that sits along the Windows taskbar, Timeline lets users view their desktop’s activity history. When users click the icon to the right of the search icon located on the taskbar, they will see all the applications that are currently open. Scroll down and Windows will display documents, photos, videos, and folders that are organized by when they were last used.

Can’t find the file you were working on last Wednesday? Scrolling to that date in Timeline will be the quickest way to track it down.

Nearby Sharing

This simple feature makes it much easier to transfer files between Windows devices. After enabling Nearby Sharing from the Control Panel, click the Share button in the Edge browser or Photos app and select the computer you want to receive the file. Users can also right-click any file and select Share. The computer receiving a file will display a notification for users to accept or decline the transfer. This means file transfers can finally take place without empty email messages, unreliable network folders, or beat-up USB drives.

Swift Pair

Want to make a call from your desktop with a pair of wireless headphones or test out a wireless keyboard? Just turn on a Bluetooth device within range of your desktop, and Windows 10 will automatically detect and notify you of the connection opportunity — all you need to do is click Connect.

Privacy

If you’re concerned about information being collected from your business’s computers, the brand new Windows Diagnostic Data Viewer will tell you everything you need to know. Users can now view what information Microsoft receives from their computer and fine-tune privacy settings related to browser history, connected devices, application usage, and webcam permissions.

Scheduling your update

It’s hard to know exactly when your Spring Creators Update will be ready to install, so it’s a good idea to brief your staff on how to minimize business interruptions that the update might cause. Windows 10 updates can be installed immediately, “Snoozed,” or rescheduled, so start thinking about which would be best for your office.

Beyond these impressive new features, Microsoft’s updates come with invaluable security protections. If you’re having trouble keeping your Windows devices secure and running smoothly, give us a call today.

Published with permission from TechAdvisory.org. Source.

Tech support scam alarms Chrome users

With evolving technology comes evolving threats. Recently, a researcher revealed that a new type of scam freezes Google Chrome and tricks users into believing that their network security has been compromised. Little did they know that following instructions listed on the screen will lead to an actual security breach.

The End Game

The scam works by displaying an error message indicating a bogus security breach incident that renders a browser unusable. These scammers capitalize on the fact that a serious crash can’t be solved by simply closing the site, thereby sending the users into a panic. This encourages them to dial the number listed on the warning message.

On the other end of the line, the scammers would pose as Microsoft or Apple representatives to convince users into surrendering their credit card details to repair a non-existing security issue. The scams are generally carried out through legitimate sites or malicious ads that have been hacked.

The Ingenious Process

This new scam operates against Chrome by corrupting the window.navigator.msSaveOrOpenBlob programming interface, which basically uses it as a form of distraction. The hackers manipulate the browser and forces it to save a random document on a disk repeatedly at super fast intervals that are impossible to notice. After five to 10 seconds, Chrome will be completely unresponsive.

The Easy Fix

To recover, Windows users simply have to open Windows Task Manager (press ctrl + shift + esc keys) and stop the process there. On the other hand, macOS users just need to wait until a system message prompts them to close the unresponsive Chrome tab. Typically, the latter is a more appealing option since users would have the freedom to close only the corrupted page. Manually closing the whole browser means possibly losing unsaved files in any open Windows.

When faced with IT-related issues, you need to determine how you can approach them calmly. The threats in the digital world may be terrifying and intimidating, but causing a panic in your workplace isn’t the answer. Call us as soon as any problems arise, and we’ll help you as soon as we can. We can even hook you up with other security measures to beef up your network security.

Published with permission from TechAdvisory.org. Source.

5 things to do to your new laptop

Getting a new laptop can be very exciting. It guarantees a more seamless user experience with faster speed, more memory, and better battery life. But it’s all for naught if you don’t take certain preventive steps before using your new machine. Discover five things you should do before you start exploring your new toy.

1. Update your laptop’s operating system

One of the first things you should do before using your laptop is upgrade its operating system. Assuming you did not purchase the laptop right when it was released, your laptop will still be running an older operating system. With important patches and fixes released in each new update, it is recommended that you install the latest one to ensure your laptop is free of any vulnerabilities.

2. Remove bloatware

Opening your laptop for the first time, you might notice that there are already several preloaded software in the system — some of which you will probably never use. These are known as bloatware.

These apps take up a lot of your valuable drive space, so consider getting rid of them. The easiest way to do this is by downloading a bulk uninstaller, which allows you to check all the bloatware apps you don’t want and remove them in one fell swoop.

3. Install protection software

It’s no secret that the world we live in is unsafe. And with so much confidential information nowadays becoming digitalized, it is necessary to protect yourself against losing important data from your computer. The solution to this is very simple. By installing antivirus software that can automatically — or manually — scan your computer at a scheduled time, potential attacks can be thwarted before they become more serious.

Not only is your laptop’s data vulnerable to cyberattacks, there is always a chance your laptop can get lost or stolen. While there are preventive steps you can take — such as being mindful while using your laptop in public places — another solution would be to install anti-theft software. Security features such as “Find My Device” for Windows 10 and “Prey” for other operating systems can help you locate your device if it’s ever stolen or misplaced.

4. Optimize your power settings

One of the most frequent problems that laptop users have is that their batteries run out of juice too fast. However, you can actually extend the battery life by making a few tweaks to your power settings.

Reduce your display brightness, but not so much that it causes eye and mental fatigue
Use the Sleep or Hibernate mode for your operating system

5. Set up a backup plan

Imagine spending months working on an important project and suddenly finding it nonexistent the next day just because your laptop crashed. Deadlines will be missed. Profit margins will decrease. Customers will leave unhappy. And if worse comes to worst, you’ll be out of business.

Why add more unnecessary stress if you can prevent it from happening in the first place? By setting up an automatic backup system, you can regularly save all your important files; that way, you’d still have access to the data anytime were anything to happen to the original file.

You can also store all your important documents in the cloud, which ensures access whenever you need, even if your laptop crashed or got stolen.

Getting a new laptop can be fun, but the joy might be short-lived if you don’t set up any preventive measures from the start. Call us for information on how we can help you secure your company’s laptop today.

Published with permission from TechAdvisory.org. Source.

New Windows update for PC vulnerabilities

Two newly discovered Windows vulnerabilities, known as Meltdown and Spectre, make it possible for hackers to steal all sorts of confidential information. To resolve this issue, Microsoft has released an update. Continue reading to stay protected.

Issues with Microsoft’s Spectre and Meltdown patches

After the January 3rd announcement of unprecedented security vulnerabilities, Microsoft has been rushing to release security updates for its Windows operating system. At their most basic, these complex vulnerabilities, named Spectre and Meltdown, make it possible for a program installed on your computer to access any information stored on your hard drive, even if it is protected.

These flaws mean that anything you’ve typed into your computer is at risk: credit card numbers, passwords — all of it. But don’t rush off to install fixes just yet. There are a few speed bumps you’ll have to navigate on your road to safety.

Incompatibility issues

According to reports, Microsoft’s patches have caused several problems to some users’ computers. For some, installing the new patches has resulted in computers with older processors to crash more often than usual. Users with newer processors have found their computers struggling to boot up, with some never getting past the Windows loading screen.

As a result, on more than one occasion, hardware and software vendors have recommended that its customers postpone installing the new patches.

Spectre and Meltdown can cause serious damage, but that doesn’t mean anyone should run off to haphazardly attempt computer repair above their ability. Until the process for installing patches has been ironed out, we recommend enlisting help.

Hire a professional

Given the issues on patches, IT novices shouldn’t update their computers on their own. Without adequate experience, you might install the wrong patch and cause even more problems to your computer. Or worse, install one of the pieces of malware masquerading as Spectre patches. Instead, why not call a professional to update your computer and protect your system from Meltdown and Spectre?

Data and network security is no easy task. We offer advanced, multi-layer protection to keep your data safe and sound. Give us a call and we’ll explain how we can help.

Published with permission from TechAdvisory.org. Source.

Meltdown and Spectre fixes cause problems

It’s been three weeks since one of the worst IT security vulnerabilities in history was announced, and consumers are still receiving mixed messages about how to protect themselves. We usually encourage users to install software updates as often as possible, but when it comes to Meltdown and Spectre, that advice comes with an asterisk.

Unsecured data storage

Spectre and Meltdown are the names given to two hardware flaws that allow hackers to see any piece of information stored on your computer. Although slightly different in execution, both take advantage of a hardware feature that computer chips use to access and store private information. For the last 20 years, security experts believed this information could not be stolen or spied on by malicious software, but that assumption was proven false on January 3, 2018.

Now that the Spectre and Meltdown vulnerabilities are public information, hackers can use them to create programs that steal passwords, social security numbers, credit card numbers, and anything else you type into your computer.

Because these problems are hardware-based, none of the updates will be able to secure the vulnerable storage; they’ll simply prevent your computer from storing anything in it. Currently, there are patches for:

  • Operating systems (Windows, macOS, and Linux)
  • Web browsers (Chrome, Firefox, Safari, Edge, and IE)
  • Chip firmware (low-level programs installed on the processor itself)

If you’re using an Apple computer, these updates are relatively easy to install. If you’re using a Windows or Linux-based computer, these patches may cause your machine to freeze, reboot unexpectedly, or significantly slow down.

Why should I wait to install the updates?

Intel, one of the chipmakers responsible for the Spectre and Meltdown flaws, has provided contradictory recommendations on more than one occasion. As recently as January 18, Intel recommended waiting for an updated patch, but in the same announcement also recommended “consumers to keep systems up-to-date.”

Experts believe detecting an attack that is based on one of these flaws will be relatively easy and represent an alternative to installing updates that could render your computer unusable.

What should I do?

IT support experts will be able to quickly and easily assess what is the best option for your computers. For example, our team can determine whether or not your hardware will conflict with the current patches, and either install them or set up a detection strategy that will help you mitigate the risks without ruining your computer.

If you need expert IT support for quick responses and ironclad security — give us a call today.

Published with permission from TechAdvisory.org. Source.