Blog

April 29th, 2016

2016Apr29_AndroidPhone_AWhat happens when the data well runs dry? Your 2, 3 or 4 gig plan is out, and then what? While you’d probably rather not think about it, we all know you’re either forced to use a slower connection or connect to the Internet through Wi-Fi. Certainly this is not the worse thing that could happen to you, but for many Android phone users it’s a scenario you want to avoid at all costs. So how can you reduce your data usage while still getting the most out of it? Here are a few tips to consider.

Data Saver for Chrome

We all know surfing the web sucks up data. But did you know there’s a way to reduce the amount of it used while riding the Internet waves? Google Chrome enables you to do just that by compressing Chrome pages, reducing data use by 30-35%. To activate this feature, press the three dots on your Chrome browser > Settings > Data Saver. Switch it on here, and start saving data now.

Video Compression on Opera

Google Chrome isn’t the only browser with a compressing feature that saves data. The Opera mini browser also compresses data, but with video instead. Of course, if you’re trying to save data it’s a good idea to avoid streaming video while not connected to Wi-Fi, but if you must do so, follow these steps on your Opera mini browser to load videos faster while saving data: go to Settings > Data Savings and tick the video compression box.

Eighty-six Facebook and other data-draining apps

This extremely bloated app has caused multiple problems for Android users. Not only has it been linked to causing Android phone slowdown, but it also consumes a ton of data. A few alternative ways to access Facebook sans the application are to use the web app Tinfoil or via your Google Chrome web browser.

And while we’re on the subject of applications, consider deleting other apps that consume high amounts of data. Of course you likely have dozens of apps on your phone, so how do you know what’s consuming the most? Simply go to Settings > Data usage. From here you can see what apps are consuming the most data and delete them if you so choose.

Restrict background data

If there ever was a nemesis to data usage, it would be background data. This pesky feature of Android consumes data when you’re not browsing the web or using an app. To prevent this from happening, click Settings > Data Usage > Restrict Background Data.

Mind your auto-updates

Just because a new version of an app is available doesn’t mean you should update it right now. Doing so when not connected to Wi-Fi eats up a lot of data, which is why it’s important to turn off auto-updates because when switched on your apps will update automatically regardless of whether you’re connected to a Wi-Fi signal or simply using data. So set your Android to only update in the presence of Wi-Fi by going to Google Play Store > Settings > Auto Update Apps > Auto-update Apps over Wi-Fi Only.

Hold-off on streaming music

We know you love streaming music on YouTube, Spotify, and similar sites but, let’s be honest, this is killing your data. There’s nothing wrong with streaming music from these sites in and of itself, simply wait till you can connect to Wi-Fi to do so. In the meantime, listen to music you have stored on your phone to get your tunes in.

Take your apps offline

Many apps provide an option to access them offline without consuming any data. Google Docs is a prime example. You can choose which documents you’d like to access while not connected to the Internet. Make it a habit to check which of your apps have offline access options and enable that setting whenever possible.

Saving data on your Android device is not rocket science. Most of the time you simply need to be a bit more conscious of your online activities, and you can save a tremendous amount of data in the process. Hopefully these tips will help you do just that. If you’d like to learn how else you can improve your Android devices, get in touch with our experts now.

Published with permission from TechAdvisory.org. Source.

Topic android
April 28th, 2016

2016Apr28_Security_AKnow thy enemy. When it comes to hackers, most business owners get hung up on the technical and mechanical details of a cyber attack forgetting another important aspect: motive. Why are they attacking people and organizations in the first place? And who are they targeting? By answering these questions you’ll have a better understanding of what resources need the most protection in your business.

Script Kiddies

When it comes to skill level, Script Kiddies are at the bottom of the totem pole and often use scripts or other automated tools they did not write themselves - hence the name. With only an elementary level of technical knowhow, Script Kiddies usually don’t cause much damage...usually. The Script Kiddy virus known as the Love Bug which sent out an email with the subject-line “I LOVE YOU” fooled millions of people, including some in the Pentagon, in the early 2000’s. The virus reportedly caused around 10 billion in lost productivity and digital damage.

So who is a Script Kiddie? Most of the time they’re simply bored youth looking for a thrill or notoriety. Many never evolve into a full-time hacker, and instead just use their skills as a hobby. Oddly enough, many Script Kiddies find a career later on working in the security industry.

Hacktivist

If you’ve heard of Anonymous, LulzSec or AntiSec, then you’re familiar with Hacktivists. These groups are made up of members of varying skill levels, all the way from Script Kiddies to some of the most talented hackers in the world. Their mission is largely politically motivated as they aim to embarrass their targets or disrupt their operations, whether that be a business or government body. Two of the most common ways they attack their target are by stealing sensitive information and exposing it or denial of service (DDoS) where a server is overloaded till it finally crashes.

As a small or medium-sized business owner you are not necessarily immune to Hacktivist disruption. If your business or a company you’re associated/partnered with participates or provides services that can be seen as unethical, such as Ashley Madison (who fell victim of a major Hacktivist attack last year), then you too may be targeted by Hacktivists.

Cyber Criminals

Often talked about in the media and well-known by most SMBs, cyber criminals are after one thing: money. Their targets run the gamut, including everyone from individuals to small businesses to large enterprises and banks. But what do these targets usually have in common? They either have a very valuable resource to steal or their security is easy to exploit...or a combination of both of these. Cyber criminals can attack in a number of ways including using social engineering to trick users into providing sensitive information, infecting an organization/individual with ransomware or another form or malware, or exploiting weaknesses in a network.

Insiders

Perhaps the scariest type of hackers are the ones that lurk within your own organization. Insiders are made up of disgruntled employees, whistleblowers or contractors. Oftentimes their mission is payback; they want to right a wrong they believe a company has perpetrated toward them, so they’ll steal sensitive documents or try to disrupt the organization somehow. Edward Snowden is a prime example of an insider who hacked his own organization - the US government.

Now that you know what motivates your enemy, you’ll hopefully have a bit of an idea as to whether or not you’re a target. To learn more about how to secure your business from these types of hackers, get in touch with our experts today.

Published with permission from TechAdvisory.org. Source.

Topic Security
April 27th, 2016

2016Apr27_Healthcare_ARansomware is becoming a growing problem for the healthcare industry. And with around a dozen attacks on hospitals being reported since the beginning of the year, you may be wondering just how severe the problem is. Should you be alarmed? How can you protect your practice? Here’s an inside look at how the ransomware epidemic is affecting the US and Canadian healthcare systems.

The ransomware strike on Hollywood Presbyterian Medical Center on February, 5 was one of the first major attacks this year. The hospital lost control of its computer system to hackers and was forced to pay them $17,000 to regain control.

“The quickest and most efficient way to restore our systems and administrative functions was to pay the ransom and obtain the decryption key. In the best interest of restoring normal operations, we did this,” stated Allen Stefanek, president of the medical center.

Thankfully, access to Hollywood Presbyterian’s EMR system was restored on Monday February, 15, over a week after the initial attack. So what can be learned from this story? Well, it raises a very important question…

Should you pay a hacker who’s infected your system with ransomware?

It’s a vexing question, and unfortunately the consensus on the answer is split. The problem is that the ransomware is very intelligently designed. And while it may sound absurd to pay so much money to a hacker, especially when there’s no guarantee your systems will be restored, oftentimes there’s not much choice.

“The ransomware is that good. To be honest, we often advise people just to pay the ransom.” said Joseph Bonavolonta, an Assistant Special Agent of the FBI’s CYBER and Counterintelligence Program.

While Bonavolonta and other law enforcement officials have advised to pay the ransom, the US government has oddly enough said the opposite. In a release made public late last month, they noted, “Individuals or organizations are discouraged from paying the ransom, as this does not guarantee files will be released. Report instances of fraud to the FBI at the Internet Crime Complaint Center.”

The reasoning behind this argument is that by paying the ransom, you’re encouraging hackers to attack more practices.

How deep does the ransomware epidemic go?

According to Symantec’s 2015 Internet Security Breach Report, the healthcare industry had the highest number of data breaches for four years in a row and suffers 37% of all breaches that occur. In fact, last year alone there were more than 250 separate incidents of data breaches in healthcare totaling over 112 million records. And the problem doesn’t look to be getting any better as many experts believe that attacks are likely to grow in number and scale.

Why healthcare?

Hackers know that most healthcare facilities haven’t installed proper security measures to protect themselves. Hospitals have tight budgets, often emphasize convenience over security and have multiple entry points into their system, all of which makes them easy prey for cyber criminals. Of course hackers don’t breach a system just because it’s easy. They do it because there is valuable information stored inside, and healthcare facilities are ripe with info that can fetch a high price on the black market and help criminals steal a patient’s identity. The fact that the system is easier to breach just makes healthcare facilities a more alluring target

What can you do?

It all starts with paying more attention to security in general. But some tips to help any practice secure their system should include staff training that allows employees to better identify phishing emails, restriction of access to sensitive information, encryption and two factor authentication. While these are a few basic tactics you can use to get started, consulting an IT provider that specializes in healthcare security can be a wise decision that provides peace of mind and safety for your valuable data. We are happy to help your practice gain the highest level of security possible. Give us a call today to learn more.
Published with permission from TechAdvisory.org. Source.

Topic Healthcare
April 26th, 2016

2016Apr26_Hardware_AHave you been stuck using the same mouse for several years now? If you’re feeling a bit of pain in your mouse clicking hand, then it’s probably time to consider an upgrade. We don’t always pay attention to it, but a good mouse can make a big difference. The perfect mouse will let you work efficiently, be easy to wield, and is comfortable enough to save your wrists and fingers from injury. So the next time you’re in the market for new mice, keep these these tips in mind.

Cable or wireless?

Choosing between a wired or a wireless mouse is a factor you have to consider if you’re planning on purchasing a new mouse. Wireless mice are generally more comfortable since your range of movement isn’t limited by a cable and they’re usually very travel friendly. However they tend to be less responsive than their wired counterpart, which can be a problem for users requiring more precise mouse control. In some cases, wireless mice can also interfere with other wireless devices nearby. Furthermore, wireless mice require batteries, which can be a drag if you forget to buy some at the store. If you’re planning on using the same mouse for both work and home, you run the risk of losing the tiny USB receiver for your wireless mouse.

On the other hand, wired mice are cheaper and easier to use since you simply plug it in and you’re good to go. The only problem you’ll have to worry about is dealing with tangled wires. So when you’re deciding on a new mouse, think about whether you’re looking for comfort or convenience.

Ergonomics matters

You’re going to be using the new mouse for a while, so it’s important to choose a mouse that feels comfortable in your hands. When deciding on the right mouse, focus on the size and the grip of the device. The size of the mouse usually comes down to the individual’s hand size. For example, someone with smaller hands might find larger mice quite unwieldy. Certain mice can also accommodate for different types of grips:
  • Fingertip grip: With a smaller and flatter body, this mouse allows you to control the entire device with just your fingertips. This type of mouse usually provides you with more precise control of your cursor. However, it doesn’t give any room for your palms to rest on, increasing the risk of carpal tunnel syndrome. Avoid using this grip unless your work requires a lot of photo, video or sound editing.
  • Palm grip: Palm grips are the complete opposite of fingertip grip mice. With a bump at the back end for your palms, this type of mouse reduces the stress on your forearm and wrist. This grip sacrifices precision for comfort so people prone to repeated stress injuries (RSI) should definitely opt for this type of grip instead.
  • Claw grip: This type of mouse is usually the one people are most accustomed to. Named after the shape your hand makes when you hold this type of mouse, claw grip mice give you the best of both the palm grip and the fingertip grip. Like the palm grip, your palms can rest on the mouse but this type of grip also gives you a bit more control. While the palm grip is still the most ergonomical mouse, the claw grip gives a good balance of both comfort and precision.

Do more than right and left clicks

Don’t just assume that extra buttons on a mouse would mean that it’s only meant for gamers. Extra buttons add more functionality to your mouse. For instance, you can assign your spare mouse buttons to Copy and Paste so you’ll no longer have to input keyboard shortcuts. Want to switch between open windows quickly? You can assign the Alt + Tab (for Windows) and Command + Tab (for Mac) to those mouse buttons. While this isn’t a requirement when picking a new mouse, it’s definitely a neat feature that will save you some time.

DPI (dots per inch)

For precise movements, higher sensitivity is a must. Whether you’re editing images, videos or audio files, you’re going to require more precise mouse movements to execute them well. If you ever had to move your mouse around because your cursor was stuck, then a high sensitivity mouse can solve your problems. Try looking for mice with 1200 DPI or greater for finer control.

Mouse specifications could be the last thing on your mind when it comes to buying new hardware. But comfort is important. A good mouse with the right fit, can make you more efficient and reduce the risk of injury. If you need some help setting up the best hardware for your company, give us a call. We’re happy to help.

Published with permission from TechAdvisory.org. Source.

Topic Hardware
April 25th, 2016

2016Apr25_InternetSocialNetworkingAndReputationManagement_A500+ LinkedIn connections can open doors. It can lead to more business, new clients, and provide social proof to yourself or organization. However, getting to 500+ connections can seem like a daunting task, especially if you have a business to run. So how can you break through and become a LinkedIn power networker? Here are a few tips to get you to 500+.

Network every day

If you’re struggling to grow your LinkedIn network, you may not be spending enough time on the platform. If you want to become a power player, you need to use the social network often. So dedicate 15-30 minutes a day to network on LinkedIn, and make it a goal to reach 500+ connections.

Join and participate in groups

Utilizing LinkedIn groups presents an opportunity to meet other professionals (and eventually add them as connections) as well as learn and share valuable advice. The point is not to just join a group, but actively participate in them. This requires a degree of focus and smart selection.

How many groups should you join? Shoot for around ten. This will ensure you have time to participate in each group and connect with its members. As for the groups you join, you’ll obviously want to join those in your industry, but you should also diversify. So choose five within your industry and five that relate to your other interests or provide you an opportunity to learn from its group members. Some suggestions to consider are an alumni group for your university, groups that represent causes/charities you care about, and groups that relate to a new skill you’re hoping to learn. Obviously, all the groups you join need to be active. If members only post in a group once a week, this is a red flag to avoid joining.

Once you’ve joined, you should spend some time each day contributing in at least five of your ten groups. You can ask questions, provide advice, or share valuable articles or original content you’ve created. Once you’ve developed a rapport with group members, you’ll have an easy, non-awkward way to connect with them.

Personalize your “Connect” request

The less you know a person, the less likely they are to connect with you if you send a generic connection request. You know the one: “I'd like to add you to my professional network on LinkedIn.”

Many people will simply ignore requests like this. This is why it’s important to include a quick note that either refreshes that person’s memory of you, mentions a common interest or connection you might share, or simply introduces yourself and your reason for connecting. The more personal your note the better.

Use keywords in your profile

Just like Google, Bing and the other search engines, keywords help you get found on LinkedIn. Plant these keywords in your professional headline, profile summary, and skill endorsement section. How do you know what keywords to use? Think about what you want yourself or your business to be endorsed for. What skills do you have to offer your clients? For example, if your business specializes in web solutions, some keywords you may think about using would include SEO or “web content”. As for your skills, be careful not to choose keywords that are too narrow. For example if your business is in the financial services and tax preparation industry, don’t use the names of niche tax solutions you specialize in like “estate taxes” or “small business taxes” as your endorsed skills. Instead, choose more general words like “tax preparation”. By doing this, your connections will be more likely to endorse you as it’s a broader category.

By following these tips and spending at least 15 minutes a day on LinkedIn, you’re sure to see the number of connections you have grow. And the more connections you make, the less work you’ll have to do to grow your network as more and more people will send you connection requests instead. This will provide more business opportunities and chances for you to meet new clients. If you’d like more ideas how to improve your social media efforts, feel free to email or give us a call.

Published with permission from TechAdvisory.org. Source.

Topic social media
April 21st, 2016

2016Apr21_Office365_AWhile you can take many security precautions to protect your organization, a cyber attack is always possible because of human error. Microsoft, however, is trying to change this. In the coming weeks, the technology giant plans to launch a new security feature for Outlook, but only if you’re an Office 365 user. Here’s how it can help your business.

Aptly called “Safety Tips”, Microsoft Office 365’s new security feature is designed to help make your employees (and yourself) more aware of which emails may contain harmful content. By analyzing the data patterns of millions of emails, the feature uses a color-coded bar at the top of an email to help you determine what emails are safe, suspicious, or fraudulent.

How it works

Safety Tips uses a simple system to help you identify the safety level of an email quickly. The system consists of four colors that categorizes an email as suspicious, trusted, safe or unknown. The details of each of these categories are outlined below.

Suspicious email Color label: Red Description: This has either failed sender authentication or is a known phishing email. These messages should be deleted.

Unknown email Color label: Yellow Description: Exchange Online Protection marks this type of email as spam. However, you can move this item to your inbox by clicking it’s not spam in the yellow bar.

Trusted email Color label: Green Description: If this email comes from a domain Microsoft deems safe, then it falls into this category.

Safe email Color label: Gray Description: This type of email has either been marked safe by the user’s organization, has been moved from the junk folder into their inbox by the user, or the email is from a contact on the user’s safe sender list.

Color coding will look different between the Outlook app and Outlook for the Web. In the Outlook application, only suspicious emails will be flagged, whereas in Outlook for the Web all four types of emails will be color-coded. However, it should be noted that most emails won’t have any color code as they’re only added when Microsoft thinks they’re relevant.

With hackers getting smarter by the day, and human error a roadblock to a secure business, this new feature will hopefully add an extra layer of security to your organization. If you’d like to learn more about Office 365 or other security services we offer, get in touch today. A more secure business awaits.

Published with permission from TechAdvisory.org. Source.

Topic Office
April 20th, 2016

2016Apr20_Web_AA good looking page will determine how many people trust a website. This is especially true for small business owners trying to establish their company’s identity online. But with so many similar businesses to compete with, how can you stand out from the crowd? This is why it’s even more important to stay on top of web design trends to attract more visitors. Consider using some of these web design ideas on your own website to stay ahead of the competition.

Scrolling

Scrolling is a convenient method for traversing a website. Instead of navigating through confusing menus and drop-down tabs, a scrolling one-page site has a cleaner look and is usually more intuitive for the user. This web design style is definitely more important today, now that people have grown more accustomed to mobile web browsing.

You also have to decide how far visitors will have to scroll to get to know your company. While a long scrolling page gives you more white space and content to work with, a short scrolling page can quickly convey your company’s message and encourages call to actions. The next time you revamp your company website, consider the appropriate scrolling element for your page.

Flat design

To achieve an optimal viewing experience for users, many companies adopted a flat design for their websites. The flat design style replaces the elements that gives an illusion of depth, like shadows and textures, with minimalist typography and colors. For example, Google employed this style to get content to viewers more efficiently. The company added flat design colors and used a sans-serif font. This allowed the logo to load faster and made it was easier to read as well.

Animations

One way businesses have been setting themselves apart from others is by including customized animations to their pages. Now this doesn’t mean you should overload your site with flashy effects that take forever to load. If you want to use animations on your site, give it a subtle twist. For instance, Slack’s loading animation features their logo.

Additionally, animations can be used to increase user interaction and engagement. Hover animations will allow your users to mouse over your content and get an immediate response without having to move between pages. Slideshows on your homepage can also showcase what your company is about without throwing too much information at the audience. When deciding to add an animation to your page, figure out how a specific effect can enhance the user experience while showcasing your business.

Full-screen forms

More websites and apps are using full-screen forms to increase user interaction. Rather than being redirected to another page when your visitors decide to register or login to a website, you are welcomed by a full-screen form without leaving the home page. This is also especially useful for mobile users since they are less likely to misclick sections of the form.

Customized photos

The next time you want to use photographs to highlight your company, forget about using stock photos. Businesses who exhibit their own photography on their homepages look more personal and stand out from the competition.

While these trends are popular at the moment, don’t blindly adopt them all because it will end up looking very messy. The best way to approach these web design trends is by making sure that the design fits your target audience. You won’t exactly have mouse over animations for a website that doesn’t have very many images. Use the trends that are best for your company.

If you want to learn more about current web design trends, give us a call.

Published with permission from TechAdvisory.org. Source.

Topic Web & Cloud
April 18th, 2016

2016Apr18_Productivity_ALove it or hate it, mobile technology in the workplace is here to stay. While more and more companies are utilizing it as a way to up their productivity, there is a right and a wrong way to go about it. Here are four tips to help you successfully integrate mobile devices into your organization to create a more efficient and productive business.

Use the right tool

Some work tasks just aren’t cut out for mobile use. While using a mobile phone or tablet to send emails is an effective way to work on the go, trying to write long form reports on these same devices is a bad idea. As a general guideline, small tasks such as email, viewing documents, using search engines and project management apps are good for mobile work. Anything that is too detailed is probably better suited for a computer or laptop. Lastly, only train your employees to use and learn the mobile devices and programs that make sense for their role. If you want them to be most efficient, you don’t want to overwhelm them with every mobile tool your business uses.

Communicate face-to-face

Email is undoubtedly a valuable communication tool. But it’s also become the bane of existence for many of today’s employees and business owners. Too many emails kills your employees productivity, overwhelming them. And unfortunately, many times email is simply unnecessary. Instead of sending that email about a question concerning an upcoming meeting, simply go and ask in-person. You’ll likely get a response much quicker and you avoid adding yet another message to the email overflow.

Consider adding a face-first policy in your office. This means that every time your employees consider writing an email, they should question if it’s easier to just go talk with that person directly. If that person is located a quick walk away, then the conversation should take place in-person. This especially makes sense if your employee needs an answer within a few hours, as sometimes emails go unanswered for much longer than this. By enforcing an email policy, your employees’ inboxes are less likely to be overflowing and your communication will take place in a more timely manner.

Set boundaries

There’s no question that mobile tech can help productivity, but it can also hinder it. The problem is that many employees who utilize it have difficulty “switching off”. The lines between work and personal life begin to blur as completing work tasks is always right at their fingertips. While on the surface more work output from your employees may sound like a good thing, in reality it’s far from it. Being “always on” can quickly lead to burnout. And even if it doesn’t, if your employees don’t take time to break and recharge, their productivity will suffer. To demonstrate just how many employees fall into this trap of overworking, the 2015 Staples Business Advantage Workplace Index surveyed 2,602 employees and found that a quarter of them regularly worked after standard business hours, and four out of ten worked on at least one weekend a month.

So how can you resolve this issue as an employer? Simply set boundaries. Create time frames for when work platforms and applications can be utilized and for when emails can be sent and responded to. Also, don’t encourage employees to work on off-hours by sending emails during the weekend. If your concern isn’t urgent, then by all means wait till Monday to send it out.

Be flexible

While it may sound a bit contradictory to the last point, being flexible in your work policy can be a smart decision to boost productivity. By being flexible, we mean the ability for your employees to work at hours and locations of their choosing. Most people work better and quicker at certain hours as they are more focused at specific times of the day. And some people will work better remotely than they do at an office space as there can be less distractions. The Staples survey supported this fact as 59% of the employees surveyed said that flexible schedules had a positive effect on productivity.

Cloud tools like Office 365 and Google Apps can help encourage a flexible workplace. But regardless of how flexible your office becomes, be conscious that parameters on work, mentioned in the last section, should still be in place to prevent employee burnout.

Mobile devices in the workplace can go a long way towards making your business more efficient and employees happy. If you’d like to learn more about utilizing mobile devices in the workplace or how you can leverage technology to make your business more productive, call us today.

Published with permission from TechAdvisory.org. Source.

Topic business
April 15th, 2016

2016Apr15_Windows_ADuring Microsoft’s Build 2016, new innovations were announced to the public. But what you should really keep your eye on are the changes made with the Windows 10 Anniversary Update. With the new updates many are expecting features that help manage your business and personal life. So what were the most noteworthy updates to Windows 10 and how will they affect you? Listed below are a few important changes that are worth mentioning for you, the small business owner.

Cortana updates

One of Microsoft’s biggest announcements are the changes made to Cortana. Basically, cross-platform support for Cortana allows Android users to receive notifications on any Windows 10 devices and interact with them too. This means alerts from your phone can immediately be transmitted to your Windows 10 tablet or PC and you can send a quick text back, saving you the hassle of having to frequently pull out your phone at work. Even if you have low battery on your mobile devices, with Cortana installed, she’ll warn you on any device.

The update will also enable you to share directions across all devices. If you search up directions on your computer, Cortana will send those same directions to your phone. Additionally, if you ever lose your phone, you can locate it from your PC as long as Cortana is enabled on your phone.

Action center updates

Tired of getting notifications from unimportant applications? With the new Microsoft update, you can now prioritize the levels of notifications you want to see in your Action Center. Simply go to Settings > System > Notifications & Actions then click on a specific app and prioritize its alerts. You can set three levels of priority for each application: Normal, High, or Priority. Now you’ll only receive notifications that are important to you.

Microsoft Edge extensions

Microsoft’s web browsers have always lagged behind more popular browsers like Chrome or Firefox. However, Microsoft is hoping to entice people to use their web browsers by giving Windows users new and updated web extensions like OneNote Clipper and Pin It Button. Add-ons like Microsoft Translator and Mouse Gestures also received new upgrades for you to try out. To access these features, click on the dotted icon on the top right of the screen and select Extensions to find out how you can customize your Microsoft Edge browser.

Pin windows to virtual desktops

A small change for those who have grown accustomed to using virtual desktops at work. Virtual desktops allow you to separate how your windows are organized by creating an entirely new desktop to work with. Many people use this feature to separate their work files from their personal desktop to avoid confusion. The updates made it so that you can pin a window across all your virtual desktops by clicking Show this window on all desktops. What can this feature be used for? Suppose you wanted to have your favorite news website open at work and at home for personal use. With the new update, you avoid having to open another web browser just to access the same site on a different desktop.

Detailed battery use

Detailed battery use will temporarily stop high powered apps from running if your battery power is low. You can have your laptop immediately go to battery saver once it’s reached a certain percentage. Just go to Settings > Battery and slide what battery percentage you consider appropriate to automatically go on battery saver mode.

Customized update settings

Automatic Windows updates can be a real pain during inconvenient times. You’ll be glad to hear that you can now change that by going to Settings > Update & Security > Windows Update. From here you can prevent Windows from automatically updating during business hours.

These are just a few of the exciting changes that are coming for Windows 10 users. We don’t know how many people will utilize these changes but, if we can expect one thing from the Windows 10 Anniversary Update, it definitely aims to make our lives a bit easier. Want to hear more of the latest Windows 10 news and updates? Contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Windows
April 13th, 2016

2016Apr13_Security_ABring your own device (BYOD) strategy is when an employee uses their personal mobile device to work with your company from anywhere. This strategy can bring about many advantages to your business such as increased efficiency and convenience. However, this can also bring a number of security risks for your IT infrastructure and data. If you’re thinking of incorporating BYOD in your office, consider some of the risks involved before making a decision.

Data leakage

The biggest reason why businesses are weary of implementing a BYOD strategy is because it can potentially leave the company’s system vulnerable to data breaches. Personal devices are not part of your business’s IT infrastructure, which means that these devices are not protected by company firewalls and systems. There is also a chance that an employee will take work with them, where they are not using the same encrypted servers that your company is using, leaving your system vulnerable to inherent security risks.

Lost devices

Another risk your company has to deal with, is the possibility of your employees losing their personal devices. When devices with sensitive business information are lost, there is a chance that this could end up falling into the wrong hands. Additionally, if an employee forgets to use a four digit PIN code to lock their smartphone or tablet, anyone can gain unauthorized access to valuable company data stored on that particular device. Therefore, your company should consider countermeasures for lost devices like completely wiping the device of information as soon as an employee reports a missing or stolen phone.

Hackers can infiltrate your system

Personal devices tend to lack adequate data encryption to keep people from snooping. This along with the fact that your employees might not have updated their devices can allow hackers to infiltrate your IT infrastructure.

Connecting to open Wifi spots makes your company more susceptible to hackers. Open wireless points in public places can put device owners at risk because there is a chance that hackers may have created that hotspot to trick people into connecting. Once the device owner has connected, attackers can simply surveil web activity and gain access to your company’s accounts.

Vulnerable to malware

Viruses are also a big problem when implementing BYOD strategies into your business. Using personal devices means your employees can access whatever sites or download any mobile apps that your business would normally restrict to protect your system.

Jailbreaking or rooting a device also puts your systems at risk because it removes limitations imposed by the manufacturer to keep the mobile software updated and protected against external threats. It’s best to understand that as your employees have the freedom to choose whatever device they want to work with, the process of keeping track of vulnerabilities and updates is considerably harder. So if you’re thinking about implementing BYOD strategies to your business, prepare your IT department for an array of potential malware attacks on different devices.

So you might be thinking that it would probably be best to just avoid implementing a BYOD strategy in the first place. However, BYOD will help your business grow and adapt to the modern workplace, and should not be dismissed as a legitimate IT solution. It’s just important to educate your company about these risks so that problems won’t occur for your business down the line.

If you need some help implementing IT security solutions for your company, or if you have any concerns regarding IT, give us a call.

Published with permission from TechAdvisory.org. Source.

Topic Security