Information Technology News & Information

Google’s New Feature: “Your Timeline” Remembers Everything You Don’t!

Google is rolling out “Your Timeline”, a new feature available on desktop and Androids that, with data from your devices’ Google account sign-ons, will help you recall great celebrations, retrace your forgotten steps and revisit your routines. You can use Google Maps to remember where you have been and if you use Google Photos your snaps will be included as a visual support to your memories. Record and Keep Great Memories We all have great memories of those times out with friends and family that we never want to forget. Thanks to “Your Timeline” along with a selection of great selfies and photos that you and your friends took during your adventure can create a record of the event that would rival a scrap book project. You can add a few notes to remember specific locations, including the exact time you were there and the details of any event are yours for a lifetime. What if you want to recall the name of that great restaurant where you had lunch with your family the last time you visited this resort town. Or maybe you misplaced your car in a busy shopping centre at the end of a busy afternoon, you can use “Your Timeline” to retrace your steps and recall specific location from your past. How to use “Your Timeline”  “Your Timeline” is available on devices running on the Android 5.0 Lollipop or higher platform and all iOS devices. You can access “Your Timeline” if you have chosen to store your Location History with Google. When enabled, this setting allows you to use other features such as Now notifications for local traffic updates or current weather conditions. The recent launch of “My Account” allows users to easily manage all your Google settings in one place. You control what you keep This private feature is visible only to you and you control what you do and do not want to keep. You can easily delete one event or your complete history whenever you choose. Or if you don’t want to publish a private location you can name it a pseudonym like “my favorite haunt” or “my best guys place” and the location will be available to you in Google Maps when you’re logged in. Interested in the latest technology advancements? Contact {company} at {phone} or send us an email: {email}.

Information Technology News & Information

Increase incoming business opportunities and revenue growth through IT.

Although information systems are vital for innovation, many businesses find themselves caught up in trying to simply maintain those systems – from servers to storage devices to applications; it quickly becomes an endless cycle of integration, configuration, and maintenance. As the modern business environment becomes more technology-driven, companies need to reduce the amount of time and money spent keeping IT up and running – and focus their efforts on achieving goals and objectives instead. Did you know the average company spends almost 10% of their annual revenue on technology? If you’re ready to leverage IT for increasing business opportunities and revenue growth, here’s a few tips: Start Using Social Media: Social media platforms, such as Twitter, Facebook or LinkedIn, allow you to reach more potential clients, develop a trusting relationship with potential clients, and of course, market your products and/or services in a cost-efficient manner. Plus, you’re able to manage client expectations and learn more about what those you serve are looking for. Move to the Cloud: When you simplify the way you use information technology and move to the cloud, you’re able to free up valuable time and resources – leaving you much more able to focus on innovation as opposed to simply keeping IT up and running. This lets you continue operations seamlessly while focusing on what’s important: staying competitive. Find New Ways to Communicate: In today’s day and age, communication is everything – it’s absolutely vital to have the right communication methods in place, in order to stay responsive to those you serve – thus resulting in more ‘word of mouth’ referrals that lead to business opportunities. Smart phones, VoIP systems, hosted email, video conferencing, and more allow you to stay in constant contact. {company} is here to help you increase business opportunities and revenue growth through information technology. Call {phone} or send us an email: {email}.

Information Technology News & Information

What is Microsoft’s Single Sign-On?

Microsoft is constantly pushing the envelope when it comes to advancements in technology. We know that your IT needs to be solving problems, not creating new ones – you need smart, effective solutions that are designed to make your life easier and help maintain security; that’s why we know c is a great option for businesses. Microsoft Single Sign-On provides unparalleled convenience – it simplifies access to all of your applications and databases, providing a great deal of benefit for your operations. Get in touch with {company} at {email} or {phone}. Our skilled and reliable team of experts is eager to help you improve your business by working with the best and most effective IT solutions.   Microsoft’s Single Sign-On service is built into Azure Active Directory. You and your employees gain the ability to sign in to all of your most important Internet applications in one place and with the same credentials, including SharePoint, Salesforce, Google Apps, Drop Box, Hotels.com and thousands more. Passwords are constantly forgotten or stolen, compromising business data and leaving your applications insecure – Single Sign-On allows you to easily change all of your passwords quickly and conveniently, so you’re never shut out of accounts and access is never given to unwanted parties. When an employee leaves the company, you’re able to change their password for just one account and ensure that all of their other passwords are also altered. Advanced authorization options are configured to meet your unique needs, along with options for multi-factor authentication to ensure further protection. Microsoft’s Single Sign-On is designed with your convenience in mind; you’re able to decrease disruption to workflow or potential downtime by easily signing into all of your most important business applications. Get in touch with {company} to talk more about how Single Sign-On will be a valuable asset to your business. Contact us at {email} or {phone}.

Information Technology News & Information

Windows 10 Fake Email Threat Warning

Emails Linking to a “Windows 10 Upgrade” Actually Encrypts Your Files and Forces You to Pay a Ransom to Get Them Back Windows 10 was recently released, exciting the many Microsoft users who were eager to wash out the bad taste that Windows 8 left in their mouths… but this much-anticipated release has attracted some attention from cybercriminals as well. You may receive an email, as many people already have, that contains a link that supposedly directs you to free upgrade to Windows 10. Don’t follow that link. That link will actually end up infecting your computer with CTB-Locker, yet another one of the many ransomware programs that have made ransomware one of the fastest growing trends in the cybercrime threat landscape. So, what is ransomware? What does CTB-Locker do, exactly? First, CTB-Locker will encrypt your important files. Documents, photos, videos, databases: the works. Then, your screen will display a message that explains why you can’t access your files, shows you all of the files that have been encrypted, and tells you that if you don’t send over a ransom (usually somewhere between a few hundred and a couple thousands dollars) in the next 96 hours (4 days), all those files will be lost forever. Microsoft actually does offer free upgrades to Windows 10, on the condition that you already have Windows 7 or 8. But they’re not going to send you an email about it. For that free upgrade, follow these instructions from Microsoft (and we assure you, that link is actually safe). This recent scam highlights a much larger issue: to keep your network secure and avoid ransomware (as well as the class-action lawsuits and regulatory fines that often result from an online security breach), don’t follow any links or download any attachments from any source you’re not 100% sure is legitimate. Give us a call at {phone} or send a message over to {email} for more information about our IT services.

Information Technology News & Information

It’s Crucial to Check with Your IT Team Before Moving to Windows 10

Windows 10 Is Now Available…It is crucial that you check with your IT experts before you make the move to this new version of Windows. In our years of providing IT services and support for a wide range of industries, {company} has learned many valuable lessons. One of those lessons is that the newest or most expensive technology isn’t always the best; technology should never be blindly trusted or chosen. It’s likely that Windows 10 will offer a great deal of benefits to many businesses – but with software so new, it’s impossible to really know. {company} knows our clients can’t risk working with software that is full of vulnerabilities or glitches. We value your time and pride ourselves on providing you with the best services and support for your unique needs. That’s why we believe Windows 10 needs to be tested before you decide to migrate your business. Get in touch with {company} at {email} or {phone} to discuss Windows 10 and any other IT concerns you may have. {company} recommends that our clients do NOT move to Windows 10 until we’ve had a chance to really understand how it operates. We’re eager to gain feedback from the IT world and then discuss the benefits, and perhaps downsides, of Windows 10. From there, we’ll strategically plan whether or not your business should make the migration. At the end of the day, we want your business to thrive. {company} aims to ensure you’re working with the right technology to meet and exceed goals – that’s why we want to make sure that Windows 10 is really the best option for your business before making the switch. {company} isn’t just your IT provider, we’re your IT partner. We’re here to help ensure your operations are always running smoothly and effectively, and that’s why we think it’s best to wait until we have a complete picture of Windows 10 to make the movie. To discuss the migration to Windows 10 and any other IT issues or concerns, contact {company} at {email} or {phone}.

Information Technology News & Information

Did You Know This About Windows 10?

Upgrading to Windows 10? Be Aware: Your Wi-Fi Password Will Be Shared with Contacts! Microsoft has officially released Windows 10 for those interested in upgrading – and many of us are excited about the release; however, before you take the leap towards the latest OS, there’s a security threat you need to know about: Windows 10, by default, shares an encrypted version of your Wi-Fi network password with your contacts– leaving your network open for your contacts to use, including those listed in Skype, Outlook, and if you opt-in, Facebook. The feature, known as Wi-Fi Sense, enables your contacts to access your wireless network using the password (sent over an encrypted connection) when they’re within a specified range of your home. According to Microsoft, your contacts will be able to access your network – without accessing file shares and other devices. Would You Trust All of Your Social Media Contacts with Access to Your Wi-Fi Network? The biggest issue with the feature is simple: we live in an age where we’ve got tons of social media contacts – and we don’t personally know each and every one of them. If someone access your network, they key is likely to remain on their system, which means if they’re hacked, your network is essentially able to be hacked, as well. While the feature is convenient for those who are looking to share their password with good friends, it’s simply too risky. There’s a few ways you can mitigate the risks and protect your network: Disable Wi-Fi Sense Immediately: To disable the feature immediately, start by going to the Start Menu, clicking Settings, and going to Wi-Fi under Network & Security, then select Manage Wi-Fi Settings and disable all options of sharing. Opt Out of Letting Wi-Fi Sense Use Your Network: You can opt out, but it’s slightly more complicated than simply disabling the ability to share your network. Change your SSID (network name) to include “_optout” in the name. For example, “network” should be changed to “network_optout.” Use Additional Measures to Stay Secure: This is one of many security threats facing your wireless network. You need to implement additional security measures, such as anti-virus software, web-content filtering, and firewalls, in order to stay secure. {company} is here to help you safeguard your network against threats associated with Windows 10’s new feature: Wi-Fi Sense. Call {phone} or send us an email: {email} for more information.

Information Technology News & Information

5 Security Tips You MUST Follow to Protect Yourself Against Swarming Internet Threats

As more and more of our daily lives — whether professional or personal — become at least partly digitized, hackers and malicious parties work harder and harder to access our sensitive information. The methods they employ vary in style and intent, and are constantly updated to factor in new security measures. In light of the constant danger that hacking represents, the top data security experts were polled in a recent Google research paper as to the top five best ways to keep your information safe. Implement these 5 practices into your online activity to ensure digital security at all times: Stay up to date. While some users remain skeptical of new updates to their software, the fact is that these patches help to protect your information from known vulnerabilities. By refusing an update, you risk maintaining a weakness in the system that is publicly recognized at that point as a method that hackers may use to compromise your info, so be sure to regularly check for updates. Use a wide variety of passwords. Even though you may have over a dozen different logins for the services you make use of on the web, the fact is that unique passwords are an important part of online security. If you were to use the same password for your email, online banking and social media, the vulnerability of your information is greatly increased because a successful hack of just one account opens up every other one with the same password. Be sure to vary your password from one account to the next. Enable two-factor verification. Many services these days, including Gmail, Facebook, and PayPal, offer a secondary step for verification to ensure that hackers would need more than just your password to gain access to your accounts. While the methods may vary, a popular form of two-factor verification today is to have a confirmation code sent to your mobile device that you then use with your password to login. While it may take more time, it only adds to the security of your information. Use password management services. To help you manage a long list of unique and strong passwords, services now exist that will log and save all your different login information for you. By remembering just the login info for that one service, you can have the service auto-fill any added account info when you need access, securing all your info in one place and reducing the number of passwords you need to keep memorized. Remain vigilant! Maintain a healthy skepticism while surfing the web. If something looks too good to be true, it almost certainly is, so ignore anything that is free or illogically enticing as it is likely a scam. Even clicking on the wrong link can be dangerous, so avoid click-bait and fake emails by enabling spam filters, ad blockers, and working only with websites that are large and trust- worthy. Online security is a crucial part of the digital age! To learn more about staying secure online, call {company} at {phone} or email us at {email} for more information.

Information Technology News & Information

Protect Your Business Against Threats to Confidential Data Stored on Mobile Devices

As business apps and the use of mobile devices become more of a standard in the workplace today, companies need to be aware of the inherent risks involved. Hacker-made fake apps and compromised personal mobile devices can be detrimental to the security of corporate and private information, so to keep safe, the risks need to be understood. There are more apps made by businesses for their services than ever before, but the fact is that less than 50% of them are tested before reaching the market, and less than 33% are tested for security. More than half of the companies that require work to be done on mobile devices allow employees to bring their personal devices to the workplace, and of those that provide devices for employees, more than half allow the download of insecure apps. Given those startling figures, keep in mind the following information about malware apps and device security: Devices provided by the company need to be prepared for suspicious apps. To keep employees from accidentally downloading a disguised malware app intended to steal sensitive information, companies need to install security measures that scan source code and executables for any suspicious material. Companies that allow work to be done on personal devices need to prepare for “device risk”. The app is only as safe as the device it is downloaded on to. If your employees are doing professional work on their own devices, be aware that any compromise in their mobile device’s security can affect the safety of the information involved in that work. Users need to be wary of app permissions and jail-broken tech. Both in personal and professional capacities, be aware that apps which ask for excessive permission to different facets of the mobile device may be suspect, so always be wary of what you’re allowing when an app is downloaded to a device. In the ever-changing age of mobile technology, keep your business safe from new threats by preparing for every possible vulnerability. For more information on mobile device security, contact {company} at {phone} or email: {email}.

Information Technology News & Information

Is Beta Testing Apple’s New iOS 9 Safe for Your Device?

Last week, the newest operating system for Apple devices, iOS 9, was released to the general public for download. In June at the Worldwide Developer Conference, Apple had announced that for the first time they would make the beta version of their upcoming OS available not just to software developers, but to everyone with an Apple device. This is well ahead of the launch of the next iPhone coming this fall, when the OS will presumably have made it past the beta testing phase. With any new OS on any device, there’s always the chance of bugs and other small errors, so especially with an unfinished beta version, some users may be wary of downloading iOS 9 right away. Consider the following before updating your system to make sure your Apple device can still perform to your expectations: The benefits of updating. The newest OS is intended to improve Siri and Maps, as well as search functions within the device, a battery saving mode, and the ability to switch between apps more fluidly. Many reviewers have given the changes introduced in iOS 9 high marks. Obsolescence and device age. The older the version of your device is — for example, an iPhone 5s or iPad 2 — the more likely the new OS will have difficulty working perfectly once downloaded. As with the upcoming iPhone, the OS will be primarily designed to support the newest devices, with each generation out of date adding to the possibility that it may malfunction. The reality of beta testing. Beta tests are used to test unfinished software with as many participants as possible to discover any remaining bugs. In some ways, the point of this release is to figure out what could be wrong with the OS before launching officially with the new iPhone this fall. As with iOS 7’s launch, sometimes even finished operating systems can introduce major bugs into the system, so waiting for reviews and feedback on a new OS is always wise. To stay up to date on the new operating system and how it fares in beta testing, be sure to contact {company} at {phone} or email: {email} for more information.

Information Technology News & Information

Urgent Notice: Hackers Could Hijack Your Vehicle Right Off the Road!

Driving a Chrysler Vehicle? Install This Patch Immediately! Chrysler is striving to turn the traditional automobile into a smart, connected device – and although it’s an innovative, exciting concept, there’s a significant downfall. Chrysler’s UConnect system, which has been installed into cars since the end of 2013, is an Internet-connected feature that controls entertainment and navigation capabilities while offering a Wi-Fi hot spot. Sounds great, doesn’t it? Not so fast… UConnect actually has a major vulnerability – allowing anyone who’s aware of the car’s IP address to gain access, even if they’re in a far away location. This means an attacker could take complete control of your car – taking you right off the road in an instant. The Software Bug That Puts Lives at Risk… Charlie Miller, a researcher looking into the vulnerability, explained, “this might be the kind of software bug most likely to kill someone.” In fact, in a live demo, the vulnerability was exploited to cut off the transmission and brakes in a Jeep Cherokee. As you can imagine, this is extremely dangerous, especially considering the attacker doesn’t need physical access to the vehicle. The attacker doesn’t even need to be in a nearby region! At the moment, researchers are withholding various details on the bug, in order to prevent the bug from being exploited. If you’re currently driving an impacted vehicle, get to the dealership or install the patch manually using a USB immediately. Don’t wait. The patch can be downloaded here. Need more information? Looking to stay up-to-date on the latest security threats? Contact {company} at {phone} or send us an email: {email}.