Information Technology News & Information

Better Get Ready – The GDPR Goes Into Effect Today!

What Is It?  What Do We Need To Know?  What Should We Do? If you don’t know what the GDPR is, and if you’re not ready for it, you’re going to get caught short because this is a legal deadline and it’s coming up fast. The General Data Protection Regulation goes into effect May 25, 2018.  It’s a privacy law that the European Union is enforcing to protect the personal data businesses collect. Even if your business is outside of the EU, you must comply. What is the GDPR? The GDPR affects all internet business worldwide. It’s a very complex law, so we can’t explain everything here. We’ve provided some resources below that you should check out.  Keep in mind that there are many gray areas where this law is concerned. So, you should do some research to determine how the law affects your organization’s unique situation. The GDPR is an internet privacy law. All businesses, small or large, and even entrepreneurs who do business on the Internet with consumers located in the European Union need to be aware of how the law affects them. It doesn’t matter if your company is inside the EU, or anywhere else in the world– If you do business with anyone in the following countries, you must comply with this new law by May 25th: Austria Belgium Bulgaria Croatia Cyprus Czech Republic Denmark Estonia Finland France Germany Greece Hungary Ireland Italy Latvia Lithuania Luxembourg Malta Netherlands Poland Portugal Romania Slovakia Slovenia Spain Sweden United Kingdom The GDPR is a consumer data protection law. It ensures that individuals can: Access their personal data. Export their personal data. Correct errors to their personal data. Object to the processing of their personal data. Erase their personal data. The GDPR applies to the acquisition, processing, and storage of personal data – from initial gathering to final deletion of this data and every point in between. It applies specifically to personal data and anything that pertains to identifiable data such as: Names Email Addresses Physical Addresses Phone Numbers Birthdate Age Sex Race ID Numbers Nationality Citizenship Marital Status Family Data Health Data Physical Characteristics Profile Pictures Occupation Employment History Income IP Addresses Cookies (and more) This could be information you collect automatically from Google, an opt-in, or other collection method online – anything that would identify an individual. How Will The GDPR Affect My Business? If your business has a website or an email list, you may be affected. The GDPR affects any business relationship or transaction whether commercial or free where one or more of the entities are in the European Union. It’s not based on citizenship, rather location.  Any business within the EU must comply with the GDPR across its entire audience. If your business is in any of the 28 European Union Member States, you must comply with the law if you conduct a transaction with anyone located anywhere. If your business is located in the U.S. and you collect data about any business or person in the EU, you must comply with the GDPR. How Should We Prepare For The GDPR? There are three requirements you must meet before May 25th. Controls and Notifications Protect personal data using appropriate security. Notify authorities of personal data breaches. Obtain appropriate consents for processing data. Keep records detailing data processing. Transparent Policies Provide clear notice of data collection. Outline processing purposes and use cases. Define data retention and deletion policies. IT and Training Train privacy personnel and employees. Audit and update data policies. Employ a Data Protection Officer (if required). Create and manage compliant vendor contracts. Some Examples Before the GDPR: Let’s say you offer a whitepaper or free video to people online. Before the GDPR, your prospect provided their information, you gave them the freebie, and the consent was assumed because they accepted your gift.  Pretty easy, right? After the GDPR: You can no longer assume that their consent is given if they accept your gift. Now you must specifically obtain their consent. It must be given freely, specifically, and be unambiguous. Nor can you require them to give their consent to receive the gift. Note: This new standard applies to all of your existing lists. Beginning May 25th, you can no longer send marketing emails to anyone who hasn’t given their precise consent for you to keep their personal information.  Plus, you cannot go back and ask them for their consent. You’ll need a stand-alone system to do this. What Can We Do To Comply With These Strict Rules? This is important. You must do this BEFORE May 25, 2018. Compliance/Preservation Step 1. Segment your email mailing lists into two parts. Non-EU subscribers EU-based subscribers and any unknowns You want to continue to build goodwill with your Non-EU contacts so reach out to them as you would have before.  The EU-based and unknowns you’ll need to re-engage with. Here’s what we mean: Step 2. Reengage EU-based and Unknowns. Before emailing them, add additional value and content to your website. Then send them a link to your website and request their specific consent to keep their personal information. Set up a system to migrate those who give consent over to it. On May 24, 2018, you must delete anyone in this group who hasn’t consented. Remember, storing and deleting their information is considered processing. That’s why you must do this BEFORE May 25th. Breach Notification Requirements The 2018 GDPR replaces the old Data Protection Directive of 1995. The most recent GDPR breach notification requirement was enacted in April 2016.  It set a higher compliance standard for data inventory, and a defined risk management process and mandatory notification to data protection authorities. Breach notification is a huge endeavor and requires involvement from everyone inside an organization. In-house tech support and outsourced Technology Service Providers should have acquired a good understanding of the consequences a data breach causes and the data breach notification requirements for their organization.  They must be prepared in advance to respond to security incidents.

Information Technology News & Information

Work from Anywhere Using Microsoft Office 365 Apps

Have you ever been in a position where you are supposed to work on an assignment or important document but you forgot your laptop or cannot access your desktop? That can be frustrating, but thanks to Microsoft, as long as you can access the internet on your phone or even tablet, you can easily resume working on your assignment. Microsoft 365 is an excellent business tool that provides you with lots of options when trying to access a saved document on another device. A closer look at Microsoft Office 365 Office 365 is Microsoft’s global offering designed to provide users with access to the company’s top-of-the-line cloud-based tools for collaboration and productivity. The service is complete with web conferencing and high definition (HD) video, calendars, business-class email, online Microsoft office suite, as well as file storage and sharing. When you stay connected to the Microsoft Cloud, you can be sure that all programs are up-to-date and available for users on a 24/7 basis. Below is a simple outline of just a few of the Microsoft 365 apps that enable us to work from any location or device. Using Outlook App on your phone to work on the go When you open your Outlook Application, you will see a calendar function, a file function, and a mail function. When you tap on the calendar function, you can see how similar it is to the one that is on the desktop, which means it will be easy for you to use. The files function will help you view all recently accessed documents on OneDrive and even some of the recently shared files—very convenient! When accessing the mail function, this is where you are able to see all files, documents, and links shared with you. You can also share a file via OneDrive. Accessing information shared via a link Simply click on the link and it will open into SharePoint, which will allow you to view the file. If you need to edit the file, open it in the word App and as soon as you start editing, anyone who has access to the file will see your edits right away. Such an incredible feature! This is great because, after editing, you don’t have to keep sending final copies of the same document to everyone on your team. Documents are updated in real time, which is a real time saver! Accessing the same information on different devices It’s frustrating to lose devices such as phones, tablets, and even your laptop. If you travel a lot, you may even damage your laptop or phone. Though this can be expensive, it’s also devastating to lose important documents. Retrieving data from a damaged phone or computer usually requires an IT expert. Data retrieval used to be such an expensive ordeal and sometimes unsuccessful. The good news is that on Microsoft 365 you don’t have to worry if you find yourself in any of the above predicaments. Here is a simple outline of how you can access your information from any device. Open any browser and type the words office.com, then log in. A page will come up with various Microsoft 365 Applications such as Word, Excel, Outlook, and services such as OneDrive. Click on the OneDrive service, which will immediately take you to all files located on OneDrive. You will then be able to access all files that have been saved to OneDrive. These files are all live so this means that any changes made, such as editing by anyone on your team, will be there. You can view, share, or edit these files. Let’s say you wish to edit a file that you recently shared with someone. Just open that file and you will see an editing option on the top right. You can do all your editing in the browser. This works with all files including Word, Excel, PowerPoint, and other Microsoft applications. All updates will immediately show up on any shared documents. There are so many other noteworthy features in Microsoft 365 that can help make your work easier. If you want to learn more about these helpful features, just visit this page: www.Microsoft.ca/GetItDone Wrap Up Losing or damaging your phone or laptop is always stressful, but you don’t have to lose any of your important documents when you work with Microsoft 365. You may be home sick for a few days, but you don’t necessarily have to get behind on your projects. It’s possible to work from anywhere using any device with Microsoft’s helpful range of products. Remember that you can work from home and even share updates in real-time with your colleagues. As long as documents are stored to Microsoft’s OneDrive, they’ll always be right at your fingertips. That’s the epitome of convenience!  

Information Technology News & Information

Google Ready to Roll Out Mobile-First Indexing

For many business owners, Google’s announcement to switch over to mobile-first indexing comes as a real shocker. It’s a revolutionary thing to do in a world of disruptive technology. Since the beginning of the World Wide Web, a company’s desktop website was their first and foremost consideration when developing a marketing plan. With the new changes announced by Google, all that changes. Now, a company’s mobile website is what must be in prime condition. For some business owners, this change will just be a bump in the road. For others, it’s a huge sinkhole where their profits could fall in and never be seen again. Many business owners still struggle to get their mobile website in excellent working order. One business owner commented recently, “My mobile website comes up with these huge, looming images and you can’t really read much of the text.” If this is you, then it’s time to get serious about fixing those issues. The top 5 problems that business owners face with their mobile website are: Being denied access- Users hate getting those little messages that the mobile site they’re searching for isn’t viewable on their device. Or, some say, “Mobile support coming soon.” Performance- Why can’t a mobile website just work the same as a regular one? That’s a big question with lots of answers. Sometimes the mobile device is at blame. Sometimes it’s the load speeds/internet connection. Design- Many users have landed on mobile sites where the images overlay the text, so you can’t really read anything. It’s frustrating and it usually ends with the user going someplace else to shop. URL redirects- This confounded message has been the scourge of surfing the web for many years. There are several reasons why you might get a redirect message. It could be that you typed the wrong thing in your browser. Sometimes links are broken. Other times, the website owner simply has several pages that refer to the same site and they need to do some maintenance. It can also be the result of phishing attempts. Confusing apps- There’s no excuse for this but many business owners have attempted to save money by doing it themselves or hiring a non-professional to design their app. Why is Google Doing This? Back in November 2016, Google announced their initial mobile-first indexing effort. They called it “an experiment” and it seemed like a good idea on the face of it. However, no business owners could foresee that the Tech Giant might eventually decide that mobile sites were more valuable than desktop sites. The reasons they give seem pretty concrete. Almost 60 percent of all searches are performed from a mobile device now. A report from 2015, verified that 56 percent of global search queries originate from a mobile phone. Mobile traffic was responsible for about 49 percent of all website traffic according to this report.[1] These numbers are expected to rise significantly over the next ten years. Google has a long reputation of knowing where the next big trends will take place so you can trust their word when it comes to topics like this. The only thing left to do is make sure your mobile website is amazing! The Good News Google has repeatedly said that they will transition into this new phase slowly. That’s the good news. All this will not take place overnight. Instead, Google will give business owners time to fix whatever they need to so their mobile site will be first-class. The other piece of good news is that Google has assured business owners that if they do not have a mobile site, the google bots will still continue to crawl the desktop version of the site. That means your revenue stream should not decline for lack of a high-performing mobile site. The Google announcement says, “If you only have desktop content, you will continue to be represented in our index.” Further Clarity Needed Google also made it clear that mobile-first indexing does not mean that there will now be two separate indexes performed. There will still be only one and it will focus on mobile sites, not desktop sites. The reason they cite for this is: “…To better help our primarily mobile users find what they’re looking for.” For those who don’t know, mobile-friendliness has always been a major factor in determining how a site is ranked. Of course, it’s not the only factor, but it is still a component of ranking your website. Google is quick to point out that if a non-mobile-friendly page has the best (most relevant) information, it will still rank higher than a mobile site with similar content. The Bottom Line All business owners should begin to see more traffic in their logs from Googlebot Smartphone. Google search results will contain snippets that have been generated from the content on the mobile version. Though Google has historically used the desktop version of your site for its indexing purposes, times they are a’changin’. We can either get on board with the changes or be left out in the cold. Most business owners are already hard at work making sure their mobile website is the best it can be. For those who are willing to go the extra mile, this could be a great time of increases in traffic and sales. The sites that are ready to go are the ones that consumers will flock to for all their buying needs. [1] https://searchengineland.com/report-nearly-60-percent-searches-now-mobile-devices-255025

Information Technology News & Information

Best Email Apps For Small Business Owners Who Use iPhone

Communication is definitely made more accessible as a result of technology. Unlike previous years where people placed heavy reliance on letters and messengers, currently, people can communicate at the tap of a button. Communication is essential in any business. For people to know what is required of them in the business environment, for suppliers to know the exact quantity of products that they are required to supply, and when the supply is necessary, people need to communicate. The most successful businesses place considerable reliance on communication. Small businesses and especially, those that have just begun, often feel the need to use more affordable means of communication. With the availability of the internet, this is no longer a problem. The number of computers that a business purchases is directly influenced by the size and the income of the business. In this regard, therefore, small businesses may find themselves unable to purchase as many computers as they need. This is where smartphones come in. Currently, almost everyone in the world owns a smartphone. Smartphones have made life more comfortable. They allow people to access information everywhere and at any time due to their portability. These devices are a gem to small businesses. First of all, almost every owner and employee in small companies own smartphones. People can access their emails when traveling or out working on a job. For successful and efficient use of smartphones to access emails, small businesses must depend on reliable, practical, and affordable email applications. There are numerous applications which allow people to access their emails through mobile phones. The functionality of these applications is similar though they may provide different features. Depending on the smartphone used and the needs of the small business, smartphone users, and especially those who use iPhones, often develop preferences to specific apps over others. Google This is definitely one of the most used applications. Google provides a range of services that small businesses may find attractive. The google app allowing for access to emails called Gmail. Firstly, this app is easy to use. Gmail can be used by even novices without much training. Secondly, it is fast, compared to other apps. A particularly helpful feature of the Google email service is that if you send an email by mistake, you have the option of undoing send. This definitely saves businesses embarrassment if an incorrect email is sent by mistake. The Google application is available online at the Apple store and can be downloaded free of charge. Microsoft Outlook This application is particularly loved by iOS users. While allowing the user to access email at his or her convenience, this app enables immediate access to emails from frequent contacts without subjecting the user to looking through other unimportant emails. It sorts out these emails for you. The app allows users access to their calendar, enabling them to mark essential days and reminders. You can set up meetings right from your phone or even attend a meeting. Like the Google app, this app is available in the Apple App store. Airmail Though initially meant for Mac, this app is available for iPhone and iPad users. It integrates with Gmail, MS Exchange, IMAP, Yahoo!, AOL, Live.com, and Outlook. This app has exciting features including full inbox sync, interactive push notification, and snooze. It is an Apple Design Award winner. Spark Though not as popular as Google, Spark is a great email app for small businesses. This app group emails automatically thus enabling the user to identify the urgent emails immediately. The app is easy to use and faster than most email apps. This app may be downloaded from the App Store. Edison Mail This is one of the fastest email apps. It supports most email accounts including Yahoo and Hotmail and is available free in the App Store. Triage The primary purpose of this app is to clean up email clutter thus simplifying the process of emailing. You can download this vital app from the App Store. Inky Unlike other email apps, this app uses hashtags to organize emails and sort out the important ones from the less important ones. Basically, it applies hashtags as labels to messages. It also signs emails automatically. Get this efficient app from the App Store. Zero This app works similarly as Tinder. It allows you to sort out your emails easily by merely swiping right to keep them and left to delete them. It also sorts emails such as newsletters for you. This app is available for free in the App Store. Newton This app is available in the App Store. Unlike other services, it is not free but is subscription based. Its main feature is the send later which allows you to draft emails and send them to the recipient later on. It costs $50. Astro Controlled by an AI assistant, this app provides both email and calendar services. The Astro assistant can be asked questions and responds to numerous commands. If your business uses Slack, you can integrate with that program to send and share Slack messages. It is available free from App Store.

Information Technology News & Information

iPhone Users: Don’t Run 11.4.1 Update

Are you using an iPhone or iPad?  It may be worth it to hold off a few days before hitting that update button. Why? Reports are surfacing that after updating to #IOS 11.4.1 there are issues with app updates. The App store shows many apps that need to be updated, but when you press ‘update‘ or ‘update all’ the apps updates are failing. Click Here To Learn More We recommended holding off until Apple fixes these update issues. Have any questions regarding the recent iPhone/iPad update?  We welcome you to reach out to us at {phone} or {email}.

Information Technology News & Information

How to Download a Facebook Live Video

There are many reasons why you would want to download a live video from Facebook, whether it is yours or someone else’s. Sometimes a video is shared into a very active group and finding it later would be a bit tasking. Another reason why someone may want to download their own live videos is to keep a copy for future reference, or even upload it to another social media platform like Instagram. For whatever reason you may have, here is a step-by-step explanation on how to do it. First, this article will outline the process of downloading your very own live video from Facebook, then explain how to download someone else’s live video from your wall, or a group where the video was shared. Previously, Facebook didn’t have this feature and it was difficult to download a live video but now it is available and very easy to use. Downloading your own live video from Facebook Step 1 Locate the video on your Facebook account page profile or on your feed. On the left side bar you will see under “Explore”, a button for Live Videos. When you click on that button, it will generate all the live videos you have shared or the ones that have been shared on your wall. Find the one you would like to download, then click on it to open it. Depending on the method you choose to access the video, say through your feed, you will also be required to click on the time stamp. Once you click on the time stamp, it will open the video. On the right side of the screen, you can also view all the comments about the video. Step 2 On the upper right side, there are three dots. Click on them and you will get a number of prompts including one allowing you to download your video. Click on this and you will start downloading the video automatically. It will be saved to your device as an MP4 video. Now you have the video downloaded to your hard drive. You can share the video to your other social media platforms, email it to someone, or use it for whatever purpose you like. Downloading someone else’s Live Video Downloading someone else’s live video from Facebook is totally different from downloading your own. This is because of the strict privacy measures put in place by Facebook. The steps are a bit complicated and you may need to use a third party site in order to download the video and save it directly to your device as opposed to saving it on your Facebook page as a feed. There are other strategies of course, such as switching to the mobile version of Facebook. The bad news is that this is no longer supported by most web browsers. So for now, we will discuss the other option of using third-party software to download someone else’s live videos. One of these programs is called SaveFrom.net. Step 1 Find the live video, open the time stamp, and play it. Locate your browser’s address bar, which is always at the top of the page. This displays the URL to the video. Highlight and copy the link. Alternatively, just right click on the video and then choose the option, Show Video URL. This is another method of copying the link. Step 2 Go to the SaveFrom.net site and paste the web link there. Step 3 Click the download button and you will have a drop-down menu with two options: download your video as an MP4 or in High Definition (HD). Choose a suitable format to save the video to your device. Browser Extensions Some browsers, such as Chrome, do have download extensions that you can use to download a Facebook Live Video. These extensions include Fbdownloader and Social Video Downloader, just to mention a few of them. The trick to choosing the most suitable method to use when downloading a live video is the time it takes to do this and also the quality of the video saved. Choose a method that is best for your situation. Wrap Up Live Videos on Facebook are becoming a common trend lately and they are preferred because they have a larger social media following compared to YouTube. It’s common to see everything from funny cat videos to breaking news stories. Millions of people all over the world use Facebook today and everyone enjoys viewing the many videos found there. In addition, more people are using Facebook as compared to any other social media platform. The important thing to consider is time and quality of the video. Depending on the device that you are using, you may have a number of options to choose from when downloading your video as discussed above.

Information Technology News & Information

What The Sunset Of Windows 7 Means To Its Users

Windows 7 is being “put out to pasture” by Microsoft at the beginning of 2020.  Not all Windows 7 users are aware of precisely what this means and how it can affect their day-to-day business.  Because of impending issues, such as steadily degrading usability and increasing security vulnerabilities, Windows 7 users need to know what to expect and what their options are.  Quick Background On Windows 7 Windows 7 was released in October of 2009.  Its purpose was to serve as an incremental upgrade to the not-so-well-received Windows Vista operating system. Windows 7 included some much-needed improvements to Windows Aero, the new user interface that Microsoft introduced with Vista, and with improved performance.  Users responded far more positively to Windows 7 than they did Vista, primarily because it addressed so many of Vista’s deficiencies.  The Windows 7 Service Pack 1 came out in 2011, and a platform update was released a few years later in 2013. By 2014, however, Microsoft began preparations for the retirement of Windows 7 as they began stopping its retail sales.  Next, mainstream support for the operating system came to a halt.  In 2016, PCs were no longer shipped with Windows 7 pre-installed.  Microsoft then announced that on January 14, 2020, extended support for Windows 7 would end.  That was the official sunset announcement. What Sunset Means Sunset begins with Microsoft no longer offering extended support for Windows 7.  It also means no more security updates, bug fixes, or service packs.  That, in turn, means the usability, security, and performance of Windows 7 will begin to degrade with time.  On the surface, applications and the operating system will generally perform all right, but there will always be exceptions.  Over time, however, there will be a definite trend toward more issues, steadily poorer performance, and serious security vulnerabilities. Why This Important to Windows 7 Users Here is what a Windows 7 user can expect to see after sunset begins: Software, utilities, and features may become incompatible Applications no longer receive updates that apply to Windows 7 New devices (g., printers or webcams) may not be able to connect with Windows 7 Antivirus will not be updated, and third-party virus protection software will eventually stop supporting Windows 7 Software bug fixes are no longer patched, leaving the system open to exploitation Online banking transaction systems may expire if their authentication and encryption methods cannot be supported by Windows 7 Also, incompatibility can quickly become a problem for companies whose customers or partners need them to use or interface with software that simply will not run correctly on Windows 7.  Running a sunset operating system can also cause problems when attempts are made to add devices or install new software. The most serious issues with sunsetting are those involving security.  Hackers will know that Windows 7 has become vulnerable and will seek out ways to exploit those weaknesses.  This leaves a system susceptible to malware, ransomware, and viruses.  The probability of suffering from an attack that renders your computers unusable will continue to increase with time. Options Available to Windows 7 Users If you are running Windows 7, then now is the time to start migrating to a new operating system.  The most straightforward upgrade path would be Windows 10, which still has some of the look and feel of Windows 7 with a plethora of new features and even better usability. The other option for most businesses is switching to Mac OS.  This means an entirely new work environment for traditional Microsoft users. This option can involve a steep learning curve.  While some Microsoft packages, such as Office, are available for Mac OS, they work a bit differently and it will take some time for new users to become proficient. Macs can also be more expensive than a Windows-based computer system, but have a reputation for being more reliable. Unless a business is heavily involved in video production or graphic design, Windows 10 is probably the best option. Getting Ready to Migrate Before migrating, perform an inventory of software and group each application into one of three groups: unwanted, optional, or required.  Some software may require an upgrade to run on a newer operating system.  Next, prepare a similar inventory of hardware.  As with the software, some hardware may need to be updated or replaced to remain compatible with the new operating system. Also, check the requirements of the replacement operating system, paying special attention to available hard drive space, physical memory, and processor or CPU needs. Please note that if a machine is already getting a bit outdated (e.g., 7 or more years old), it might make sense to purchase a new machine with Windows 10 pre-installed. The Trump tariffs will cause an increase in the price of computers, scanners, printers, servers and even their components. So now is definitely the best time to buy! Conclusion With the sunset of Windows 7 impending, now is the time to start the process of migrating to a new operating system, whether it be Windows 10 or Mac OS.  Failure to upgrade will not only lead to issues with compatibility and performance, but will involve serious security risks.

Information Technology News & Information

URGENT! Google Chrome “HTTPS By Default D-Day” Is Today! (July 24, 2018)

Why the big hubbub over HTTPS?… Because from now on, users who visit HTTP sites will be hit with a BIG WARNING from Google. This will happen to anyone using Google Chrome version 68. Google warns that you should have been protecting your websites with HTTPS for a while now. And this isn’t just for confidential communications. You need HTTPS on all your sites. Why?… HTTPS Prevents Intruders And Security Vulnerabilities You certainly don’t want people (criminals or otherwise) tampering with the communications between your site and your users’ browsers. These intruders can be hackers or legitimate companies like Internet Service Providers (ISPs) that inject ads into your web pages. Did you know that some of these advertisements can block the user and create security vulnerabilities on your site? HTTPS Protects Your Users’ Privacy Every unprotected HTTP request to your website can potentially reveal your visitors’ private information, such as their browsing behaviors and even their identities. Some intruders gather bits of information and compile it into user “profiles” to steal their identities. HTTPS also keeps intruders from listening to communications between your website and your visitors. This means if you don’t use HTTPS and you have an online help desk service with VoIP, someone else other than your rep and your client may be listening. Intruders can trick your visitors into providing their confidential information or installing malware into your website.  They can access and exploit unprotected images, cookies, scripts, HTML … and they can do this at any point along the network. This means that your users’ machines, a clients’ Wi-Fi hotspot, etc., could be exploited and you’ll be to blame. HTTPS Is Required For Progressive Web Applications (PWAs) What are PWAs?  They use modern website capabilities to deliver app-like experiences to your users. Google likes PWAs because they:  Load instantly, even when your visitors use uncertain network conditions. This is because they “live” on the user’s home screen. They don’t need to go to an app store for them. PWAs can also re-engage your users with push notifications. You can control how the app is launched and appear on your site. Respond fast and smoothly. Did you know that 53% of users leave a site if it takes longer than 3 seconds to load? Are engaging and provide an immersive user experience. You can pre-cache resources so you’re not so dependent upon the network.  It gives your users a more reliable experience when browsing your site. Google Says That HTTPS Is The Future In addition to the security benefits of using HTTPS, there are commercial benefits as well.  Browsers and search bots prefer HTTPS sites. Your site will be easier for visitors to find. Today’s new web platform features allow things like taking pictures, recording audio and new geolocation APIs (Application Program Interfaces). They essentially provide offline app experiences. HTTPS is a key component to the permission workflows for both new features and updating APIs. And take note! Watch for HTTPS warnings from Microsoft, Apple and Mozilla. They’ll be coming soon. Keep Google happy and your users safe. It’s not expensive to switch to HTTPS and it’s certainly worth doing!  

Information Technology News & Information

Check Out The 10 Best Tablets of 2018 (Ratings/Reviews)

They are the next best thing to hauling your laptop around to school and on flights, and they’ve become the weapon of choice for parents with fussy toddlers in public spaces. But while tablets have earned their accolades in recent years, that’s not to say choosing one to take home is an easy task. With endless options to select from, it will take some time and research to determine which tablet is best for your unique needs. What constitutes a great tablet depends on several factors. Aside from function, things like versatility, user-friendliness, and affordability all play a role in how well a tablet is received by the masses. Versatility carries so much weight, in fact, that many of today’s top tablets come with keyboards to offer an experience similar to that of a desktop. These 2-in-1s are all the rage, and if you’re hoping to pick up a new one, you’ve got your fair share of picks. Here are some of our favorite tablets to help you navigate your options. Apple iPad The Apple iPad is one of the most revered tablets to date, and the newest version spares no expense when it comes to cool features. Compatible with the new Apple Pencil, the tablet is easy on the eyes with a 9.7-inch Retina display and a small, but mighty A10 Fusion processor for all the power you could want in a tablet. Plus, Apple now carries plenty of options for immersive AR experiences, and at its most affordable price point yet, you can be sure this tablet is one to covet for business and entertainment alike. HP Envy x2 HP’s Envy x2 model, hot off the heels of the debut of the Snapdragon 835 processor, allows for stronger performance and a load of other features. Fast-charging capabilities, optional LTE connectivity, and a 15-hour battery life are just a few things users have to look forward to in this tablet. From a digital pen to a sleek backlit keyboard, the Envy x2 is versatile and durable, and definitely not one to be looked over if a solid tablet is on your wish list. Acer Chromebook Tab 10 Created in collaboration between Acer and Google, the Acer Chromebook Tab 10 is a 9.7-inch slate tablet perfectly fitting of its target K-12 education market. The first tablet to be powered by Chrome OS, it features a 2,048 x 1,536 resolution display, and a textured design for easy handling on-the-go. It also comes complete with an EMR stylus, which fits conveniently in its own slot. This tablet was definitely built for convenience. Samsung Galaxy Tab S3 With a 2048 x 1536 resolution AMOLED display, the Samsung Galaxy Tab S3 is primed for immersive entertainment. Inside you’ll find a powerful quad-core Snapdragon 820 CPU and a sufficient 4GB of RAM. Its 600mAh battery is good for up to 12 hours of power, whether you’re hoping for gaming or Netflixing. It also comes with a bundle featuring the new S-Pen, which is ideal for creatives hoping to use this tablet for work. All in all, between its power and its potential, the Galaxy Tab S3 is among the best money can buy. HP Chromebook x2 The HP Chromebook is heavy on both looks and performance. This 12.3-inch tablet is touted as the first detachable Chromebook and comes complete with a base hinge for keyboard attachment. It runs on Google’s Chrome OS and can download apps from Google’s Play Store. Aside from an impressive QHD display, it offers both front and rear facing cameras and includes the new HP Active Pen to make tasks like sketching that much easier. Dell Latitude 5290 2-in-1 This 2-in-1 is pricey, to be sure, but that’s not to say it isn’t worth the money if power is what you’re after. Weighing in at just 2.64 pounds, the tablet boasts an eighth-gen Intel Core i7 processor and a crisp, clear screen ideal for work or play. Gorilla Glass 4 for durability and an adjustable kickstand are just a couple of the perks you’ll find on this hybrid, and that’s not all. There is also an optional keyboard to make typing a breeze. Lenovo Miix 630 The Lenovo Miix 630 has a unique advantage over its competitors. It can stay connected all day via LTE, which is enabled by a Qualcomm Snapdragon 835 processor. It’s a fresh option for Windows devices, courtesy of a partnership between Qualcomm and Microsoft. And with this Snapdragon processor also comes an extended battery life, upwards of 20 hours. So if you happen to be looking for a tablet to replace your laptop for business, the Lenovo Miix 630 is a suitable option, indeed. Surface Pro 4 Equal parts tablet and laptop, the Surface Pro 4 gets right a lot of what the original Surface Pro got wrong. Its 12.3-inch screen offers more than enough space for clear, crisp pictures, and its configuration capabilities are nothing to scoff at. From its dual cameras to its loudspeakers and extraordinary picture quality, the Surface Pro 4 is the best of both worlds. Xplore XBOOK L10 One thing’s for sure: durability isn’t an issue with the Xplore XBOOK L10. Waterproof, dustproof, and drop proof for up to six feet, this tablet is one with plenty going on. It’s got a plethora of ports, including USB-C, USB-A, and Ethernet, with its powerful performance courtesy of an eighth-gen Intel Core i5/i7 processor. And with an ultra-bright display, there isn’t much this tablet can’t do. Google Pixel C The Google Pixel C, which many call a solid alternative to the Apple iPad, has a unique design that sees its optional Bluetooth keyboard double as the tablet’s cover. Its made from durable compact aluminum, and boasts a lightning fast performance plus a bold, bright screen bound to make your favorite games that much more enjoyable. If Android is what you’re after, this is simply one of the best.

Information Technology News & Information

August 2018 Ransomware Update

The Newest Forms Of Ransomware & How To Protect Your Business From Them The Situation Ransomware is now one of the top security concerns for businesses and organizations of all sizes. The City of Atlanta was hit with a ransomware attack called SamSam in March, crippling some important departments like their court system, sewer infrastructure requests, and water billing department. The attackers who deploy SamSam are known for clever, high-yield approaches. This, combined with the City’s lack of preparedness, explains why the infection was so debilitating. Experts are telling us that SamSam will strike again. Unlike many forms of ransomware that spread via phishing attacks where individuals inadvertently invite the attack, SamSam exploits IT system vulnerabilities and cracks weak passwords. These ransomware attackers have made $1 million in less than six months. Keeping all your systems patched, storing data in enterprise-based cloud backups, and having a ransomware preparedness plan can offer real protections against SamSam and other ransomware infections. Unfortunately, ransomware attacks are on the rise, and as hackers use more sophisticated encryption technology, the threat is constantly evolving. According to malware security firm Barkly, a company is hit with a ransomware attack every 40 seconds. They also identified ransomware as the most prevalent form of malware, with “4.3x new ransomware variants in Q1 2017 than in Q1 2016.” This eBook details how dangerous ransomware is, how it could harm your business, and what you should do to protect your data. Part 1 What is Ransomware? Ransomware is a type of malicious software (malware) that blocks access to a computer that infects, locks or takes control of a system and demands a ransom to unlock it. It’s also referred to as a crypto-virus, crypto-Trojan or crypto-worm. It then threatens that your data will be gone forever if you don’t pay using a form of anonymous online currency such as Bitcoin. Most forms of ransomware are spread via spam using unsolicited phishing email or an attachment. Phishing attacks use emails disguised to look like they’re from someone you know and are more likely to trust. Some ransomware-based applications disguise themselves as police or a government agency, claiming that your system is being locked down for security reasons and that a fine or fee is required to reactivate it. Then it typically asks you to click on a link or attachment to perform a routine task such as updating records or account details. If you do this, a worm or malware is downloaded, infects your system and locks it by encrypting your files. Ransomware, like SamSam, can also infect your IT system using vulnerabilities in your computer’s browser. It does this when you click on a malicious code hidden in online ads or free software. Ransomware targets small to medium-sized businesses because they are particularly vulnerable due to limited IT resources. They are also more likely to pay the ransom in the hopes that they’ll get access to their data, although the FBI warns that this isn’t necessarily so. “Paying a ransom doesn’t guarantee an organization that it will get its data back—we’ve seen cases where organizations never got a decryption key after having paid the ransom. Paying a ransom not only emboldens current cybercriminals to target more organizations, but it also offers an incentive for other criminals to get involved in this type of illegal activity. And finally, by paying a ransom, an organization might inadvertently be funding other illicit activity associated with criminals.” Paying the ransom only guarantees that the malicious actors receive your money, and possibly even banking information. Also, decrypting files does not mean the malware infection itself has been removed. No one is immune. Temporary or permanent loss of sensitive or proprietary information, Disruption to regular operations, Financial losses to restore systems and files, and Potential harm to your organization’s reputation. The lack of awareness and cybersecurity training is a leading cause of ransomware. Part 2 Ransomware Comes in Many Forms. Ransomware comes in many different forms, but essentially, it’s a type of malware that denies access to your computer devices unless you pay a ransom. The ransomware malware encrypts your data. Once it does this, it can travel throughout your network and encrypt other mapped and unmapped network drives. Because of this, it can bring your organization to a halt. The ever-evolving nature of these threats makes ransomware very difficult to keep track of. Ransomware-as-a-Service (RaaS) makes it easy for cybercriminals to set up a lucrative hacking scheme. It is provided as a vendor platform on the Dark Web. Unlawful vendors offer hackers and criminals a tool to use to lock down computer files, information or systems and hold them hostage. Ransom32 is a type of “Ransomware-as-a-Service” that provides any cybercriminal, even those without technical knowledge, the ability to create their own form of ransomware. What makes Ransom32 so dangerous is that it uses JavaScript, and can be used on computers that run Windows, Mac OS X, and Linux. Over 2,900 types of ransomware have been reported, and they’re growing. Here are just a few: Bad Rabbit  Bad Rabbit has infected organizations in Russia and Eastern Europe and is spreading throughout the world. It does this via a fake Adobe Flash update on compromised websites. When the ransomware infects a machine, users are directed to a payment page demanding .05 bitcoin (about $285). Cerber This ransomware encrypts your files using AES encryption and demands a ransom of 1.24 bitcoins (worth $500). It communicates via a text-to-speech voice message, a recording, a web page, or a plain text document. There’s no way to decrypt files that are encrypted by Cerber unless you pay the ransom. Cryptolocker CryptoLocker infects computers that run Microsoft Windows. Like other forms of ransomware, you must pay the hackers to decrypt and recover your files. CryptoLocker spreads via fake emails (phishing) designed to mimic legitimate businesses. CryptoWall This form of ransomware has been around since 2014, but new variants are still circulating, including CryptoBit, CryptoDefense, CryptoWall 2.0, and CryptoWall 3.0. Like CryptoLocker,