Clients Information Technology News & Information Services Tech Tips

Protecting Your Online Identity

The most recent breach of Facebook, resulting in 50 million accounts hacked, has the corporation in the spotlight once again and for the wrong reasons. To help those who fear they may have been hacked, the Fox 45 Morning News team asked our Owner and CEO, Charles Hammett, to come on and provide his expert knowledge concerning cyber security and help explain to viewers what they can do in order to prevent these attacks from happening. Watch the video below to find out more! At Hammett Technologies the security of our client is our number one concern. With help from our certified team, you can have faith that your company’s users and data are kept safe and secure.

Information Technology News & Information

Google Shutting Down Google+

Google+ Social Media App Will Soon Move Off Into The Sunset Google+ has never really been a popular social media network. In fact, most people say they’ve never used it and don’t know how it works. So it’s not too surprising to hear that Google has finally decided to pull the plug. Google just announced a ten-month sunsetting period, which begins now and will end in August of 2019. Besides the site simply not being popular, Google has had serious security issues. Project Strobe discovered a bug in Google+ that may have leaked the personal information of thousands of users. Though Google says the vulnerability was not discovered by hackers and that no profiles were compromised, their senior executives felt that rumors of a breach would likely trigger “immediate regulatory interest.” So they simply didn’t tell anyone. Other Social Media Data Breaches For several years, Facebook has been under scrutiny for allowing the data firm Cambridge Analytica to access their user information. This data was in turn used to create targeted social media ads that eventually swayed the presidential election of 2016. Since that incident, Americans have become much more aware of the effects and dangers of data breaches and social media manipulation. Given the fact that almost no one was using the Google+ app and the high risk for potential data leaks, Google execs said they simply felt that it was best to discontinue Google+. Users will have 10 months to migrate their data before the platform is officially dissolved in August of next year. However, the company has decided to continue supporting the Enterprise version of Google+ so businesses using that app will not be affected. More About the Google+ Security Breach Last March, Google discovered a privacy breach, which allowed third-party apps using their programming interface to access the personal data of users. This data includes usernames, addresses, email addresses, birth dates and other bits of personal information. The Wall Street Journal reported some details about the security breach and said that Google executives had been informed about the breach soon after it occurred. These executives made the decision not to disclose the breach to its users for fear of tarnishing their reputation. Reporting Security Breaches In a blog post, Google said that it decides when and if the organization should notify users of data breaches. They take into consideration the type of data that was leaked, whether there’s evidence of misuse and whether there’s anything that users can do about it. According to security breach laws, any organization that experiences a data breach must inform those affected. And they only have a specific amount of time to do so. This varies by state but there are severe penalties for not correctly reporting a security breach. Executives at Google say that the gap has been fixed and that users do not need to worry about any further data leaks. However, there is ample evidence that Google did not follow the law once they learned of the data breach. This can result not only in penalties from the federal government but also users can file individual lawsuits if they believe their personal info has been compromised. How Data Breach Laws Are Changing With the new European Union GDPR (General Data Protection Regulation), more countries and organizations are implementing stronger security measures. The GDPR affects anyone who does business with an entity that resides within the European Union. This has caused many business owners to revamp the way they collect and store personal information from their users. Once a company has collected an individual’s personal information, they have a legal responsibility to keep that data as secure as possible. In spite of these advances in data security regulations, hackers seem to be one step ahead. Their tactics change, improve and evolve making it necessary for all organizations to be more cautious. Senate and House Committees Get Involved This past year, many social media and technology companies have come under scrutiny due to their data and privacy practices. Executives from Twitter, Facebook and Google have testified before various Senate and House committees. Under fire are their security measures, but also their political biases. The government is considering types of regulations that would prevent these companies from meddling in important things like the elections. Now that everyone is fully aware of how easy it is to sway voters in one direction or the other, there is a very real fear that future elections may be manipulated by these companies. They not only have the knowledge, but they have the resources to influence the way people vote. And this ability holds within it a great deal of potential power to change our society in ways that can only be speculated about at the moment. What Should Google+ Users Do? In the meantime, if you are a Google+ user, it’s best to go ahead and make copies of any content you have on the site, then delete your account. Once it has been deleted, you’ll no longer have to worry about losing it to hackers who have found yet another weakness in the site’s security protocols.

Information Technology News & Information

How To Ensure A Secure Home Network

Most homeowners and renters understand the importance of home security. In fact, in today’s world, it’s not uncommon for homeowners to spend hundreds or even thousands of dollars on home protection. But while securing your belongings is considered good common sense, homeowners don’t as often consider the concept of data security. This is understandable, but in reality, it’s just as important to ensure that your data is protected as well. Unbeknownst to many, your home’s security system and its surrounding technology may even leave you susceptible to a data breach. These have the potential to wreak havoc from a personal data standpoint. Paying close attention to the technology you are using to protect your home can help you avoid the ever-growing risk of a cyber breach. Here are a few things homeowners can do to keep their networks protected. Strengthen Your Wireless Security Securing your wireless router is paramount to effective data security. Your wireless networking security will depend heavily on the health of your router. One useful tip? Don’t leave your Wi-Fi on unless it’s necessary. This means that if you and your family are planning a long trip, don’t forget to turn your network off. Other precautions include disabling your Wi-Fi Protected Setup, or WPS. The WPS is intended to make it easier for those within your household to join the central Wi-Fi network. However, it can also be used by hackers to gain unauthorized access. Configuring your Wi-Fi’s signal strength is also important. Casting too wide of a net can leave you susceptible to outside hackers. As a security measure, configure it so Wi-Fi is only accessible to those within your home’s area. You can also disable your network’s remote management, and be on the lookout for any unknown devices or connections showing up on your network. Update Your Software Keeping your security systems up-to-date is important in ensuring nothing falls through the cracks. Applying updates and patches ensure you are running the most recent technology available for your device. Your work doesn’t stop at updates, though. Installing an anti-virus solution built to detect, prevent and clear your system of viruses ensures a strong line of defense against hacking. While antivirus solutions won’t protect your system from, say, zero-day exploits, they can be helpful in preventing malware from entering your devices. Install A Network Firewall Firewalls are extremely useful in maintaining the security of your systems. This type of solution blocks unauthorized users from acquiring access to your private data. Installing a firewall is a solid step toward keeping your data safe. These can be installed via software, hardware or a unique combination of both. Back Up Your Data Computer users understand the frustration that comes with a hardware failure. In the event that this happens to you, it’s best to be prepared. Keeping a solid backup solution will give you peace of mind in the event of an accident. Test your backups thoroughly and regularly by creating dummy files and deleting them, or scheduling a day to unplug and determine how long it takes to get your system up and running. All this can help you form a legit plan of action to help you recover from a hardware failure. Maintain Strong Encryption Configuring your router improperly can pave the way for a data breach. You should use the strongest possible encryption methods for your device. Some of these protocols may include Wi-Fi Protected Access 2 (WPA2), Temporary Key Integrity Protocol (TKIP), and Personal Advanced Encryption Standard (AES). Here are some tips to help you create a strong line of defense against a breach. Update Your Router Password It can be tempting to begin using a new router fresh out of the box, but be cautious. While your router has a set password, it may be easy to guess, or worse, printed right on the router itself. Changing your router’s password to something safe and known only by you is necessary if you’re hoping for optimal protection. The same goes for your Network name. While these typically come standard, you’ll want to change yours, though be careful not to include personal information such as your last name or address. There are some things you can do to ensure a strong password. First, avoid using the same one for all of your accounts. If your password is stolen from one site, all other accounts for which you use it may be put at risk. You also shouldn’t share passwords with anyone or divulge them to anyone. Approach Email With Caution You may have taken all the necessary precautions to keep your home network secure from hackers, but often it’s not the technology that’s to blame for a breach. While it’s true that cyber criminals take advantage of unencrypted data, an inadequate firewall or out-of-date software, they also frequently target individual users. E-mail, for instance, is one of the most frequently used platforms by hackers. And while these attacks can hit suddenly and without warning, there are still things you can do to protect yourself. If you receive an e-mail from someone you don’t know, don’t answer right away. Always first verify the person’s identity before responding. If you suspect an email from an organization may contain malware, first contact the company directly before replying. One giveaway is a misspelling in the URL of a malicious website. Also be sure to never share personal or financial information via e-mail or telephone. Don’t leave your data security up to chance. All of these steps combined can help you form a solid plan for preventing a cyber breach.  

Information Technology News & Information

Apple iOS 12: Top Features You Need to Know About

Apple iOS 12 has so many different new features available it’s almost overwhelming. From better password management options to the introduction of the Memoji, users will appreciate some of these more than others. This article will highlight some of the most interesting and useful features and improvements, starting with one everyone can agree is probably overdue: better performance and battery life. Performance and Battery Life With iOS 12, all iPhone models since the 5S will see significant improvements in performance – including longer battery life and speed boosts. This is due to several improvements and changes that, combined, enable your phone to last longer and run faster. You can also access much more detailed information on your battery life and performance, even comparing its current performance to what it was capable of when it was brand new. Password Management Methods Apple’s iOS 12 allows you to use third-party password management apps instead of, or in addition to, its own password management method (iCloud keychain). This also includes autofill support for these third-party password managers. In addition, iOS 12 will fill in any six-digit codes you receive through SMS for two-factor authentication. To better support online security and privacy, iOS 12 will remind you if you are reusing a password when setting up a new password. It can also create a very powerful password for you and store it on your iCloud keychain. Secure Emergency Location Data Another awesome feature in iOS 12 is that it will provide secure location data to first responders if you call 911. This feature makes use of a new Apple technology called HELO that can estimate your location based on a variety of parameters, including GPS, Wi-Fi access points, and cell towers. This will make it much easier for iPhone users to be quickly located by first responders in case of an emergency. More Emojis, Animojis, and Memojis For those of you who love to express yourself with emojis, good news: 70 new emojis are being added. And not only that, but Apple is working on more inclusive disability-themed emojis that will be released next year. To access all these new emojis, you’ll need to update to iOS 12.1 when it is released. Apple has also added more Animojis in iOS 12. Now you can access a T. rex, tiger, ghost, and koala, in addition to those that were already available. For those not content with Animojis, Apple has introduced Memojis. These are basically augmented reality characters that you can customize to look like you. Better Maps With iOS 12, the Maps app has been redesigned to provide more detail. This includes more public landmarks, more greenery, and the ability to see the layout of stores in malls. Currently, this only applies to the San Francisco Bay region, but it will be added to maps for the entire United States over the next year and a half. Group Facetime Group Facetime, now integrated into iMessage, will allow you to simultaneously FaceTime chat with up to 32 people. These calls are very easy to set up via the group chat window in iMessage, and are available through the iPad, iPhone, and the Mac. Screen Time Report Have you ever wondered exactly how much time you spend on your Apple devices? Or what apps you really use the most? Well, iOS 12 has added a weekly activity summary that provides plenty of detail. The new App Limits feature does just what it says: it will provide you notifications reminding you of when you are nearing or have reached any limits you set. And for those with children or teenagers, the Downtime feature allows you to control their usage, setting specific limits for apps or even unplug their access completely. Greatly Improved QR Reader iOS 12 users will have a much easier time reading QR codes. In the past, a stand-alone app was needed to read QR codes. Now, once you turn on the QR code feature in the settings for your camera, you’ll be able to read QR codes using your Camera app. iOS 12 will highlight the code for you so you will know it has been detected, and you can add a tile to more easily launch QR reader capabilities. New Developments for Notifications On iOS 12, you can now decide which apps will deliver silent notifications to your phone (e.g., no sounds, no vibrations), and Siri can advise you on which apps you don’t use often and thus should turn off notifications for. Notifications can also be grouped by app, topic, and even thread. You can also enact a Do Not Disturb feature that will hide your notifications until you turn it off, and you can set it up to automatically turn off when a certain event ends or at a particular time. Conclusion No matter how much you use Apple devices, you’ll find some features and improvements in iOS 12 that will make your user experience much more productive and fun. And remember that this was just a sampling of what is now available! There’s a lot more so be sure and check it out.

Information Technology News & Information

What You Need to Know About Secure Messaging Apps

You probably use messaging for communications every day, but how secure are your messages? Messaging apps are as susceptible to hackers as any other type of electronic communication, and if you are concerned about privacy then it’s time to learn the basics about secure messaging apps. Why You Need a Secure Messaging App We use messaging more and more to communicate, but we don’t always realize how many eavesdroppers there may be. Those eavesdroppers may include internet service providers, government agencies, and hackers. If your messaging involves your company, it might be the target of industrial espionage. These are all good reasons to consider using a secure messaging app. What Makes a Messaging App Secure? We probably all remember playing around with coded messages as a kid, but never dreamed that coded messages might become important in our day-to-day communications. As it turns out, one of the key aspects of a messaging app is end-to-end encryption. When your messages are encrypted, that means they are encoded in such a way as to make it extremely difficult for someone to eavesdrop on the information being transferred. The messages are basically scrambled, and in order to unscramble them, you must have the correct key. In the case of an end-to-end encrypted message app, only the sender and the receiver have the decryption keys. There are messaging apps that offer encryption, but encryption is not the default setting. That means that you would have to navigate to the settings for your messaging app and turn on encryption – if it even offers that feature. Metadata can still be an issue even with encryption. Metadata includes things like who you talk to based on your contact list, how much time you spend talking to them, your phone number, your IP address, and more. You should avoid messaging apps that collect metadata. Believe it or not, one of the signs of a secure messaging app’s integrity is making its source code available to the public. Open source code is actually better than proprietary code because it provides experts access to the code for review. Experts who did not develop the code will be far more likely to notice vulnerabilities and bugs that could be exploited. The result is a highly robust source code and a bulletproof app. Secure Message Apps There are several messaging apps on the market that qualify as secure messaging apps. What follows are five of the top options that are available for Android and iOS operating systems. Dust: If you want messages that don’t hang around, then Dust is your app! Messages disappear within 100 seconds of being read or within 24 hours – your choice. You’ll also be notified if any screenshots are taken. It includes end-to-end encryption, no permanent storage, and you can even erase your message off someone else’s phone. The major drawback of Dust is that its source code has never been released. Signal: The Signal messaging platform uses end-to-end encryption and its source code has been released. There is an option that makes messages disappear after a certain amount of time has passed and it can be password protected. It only stores the metadata it needs to function properly on your device. As far as drawbacks go, there are virtually none associated with Signal. Telegram: The Telegram app was banned in Russia because they refused to hand over the encryption keys. It offers end-to-end encryption through a feature called “Secret Chat” that must be turned on. It can be locked by a passcode and has a Self-Destruct timer option for Secret Chat messages. The drawback of Telegram is that it lacks transparency about the protocol that it uses. WhatsApp: With WhatsApp, end-to-end encryption is the default and provides an option for you to verify that encryption is in place. Messages are not stored on your phone, and it makes available a two-step verification feature. WhatsApp’s major drawback is that it does keep track of metadata and backups of messages are not encrypted for Android users. Wickr : Unlike most messaging apps, Wickr offers both a personal (Wickr Me) and an enterprise edition. It provides end-to-end encryption and a host of additional features that make it one of the best options for businesses that are looking to keep their messages secure. It recently released its cryptographic protocol. And when Wickr deletes things, it “shreds” them so that they cannot be recovered. Wickr doesn’t really have any drawbacks from a security perspective. Conclusion Not all secure messaging apps are equally as effective. When selecting one, you should look for end-to-end encryption (and by default is even better) and the storage of little to no metadata. Also, keep in mind that companies that have released the source code behind their app are considered more reliable and their apps more robust. If privacy is important to you, then it’s time to check out secure messaging apps. Before installing or investing in any messaging app…always consult with your technical support provider.

Information Technology News & Information

October’s Featured Training: The ABCs Of Cyber Security

October Is Cyber Security Awareness Month Tune In At Any Time To Watch Our 15 Minute On-Demand Training Cyber Criminals Have A 6 Month Head Start. Is Your Business Protected? Find Out. Tune Into Our October Free Online Training By Clicking Here. Every 39 seconds, a hacker is attacking someone.  Are you next on the list? You can’t afford to miss October’s free online training.  Why? {company} takes cybersecurity seriously. This is why we have put together this free online training for everyone.  During this online training, our cybersecurity trainers will share how your business can defend itself from becoming another statistic. During this 15-minute on-demand training we’ll show you many quick and very important tips you and your team must know in order to protect your business from cyber threats and how employees can keep all your confidential and critical information secure.

Information Technology News & Information

New Gift Card Scam Hits Just In Time For The Holidays

There’s a new Gift Card scam going around that has already cost consumers lots of money, frustration, and headaches. Here’s how it works. You’ll get an email from a friend or relative asking you to go buy them a gift card. The email will say that your friend or relative has been busy or sick and unable to get to the store. Once you get the card for them, they’ll ask you to take a quick photo of the gift card code on the back and send it to them. Once you do this, they can cash out the gift card and you lose your money. It happens just that quickly. Can You Help Out a Friend? This scam has been working well for several reasons. Usually, the email comes from someone you know, maybe a sibling, parent, or aunt. Of course, you want to help them out, right? But one thing many consumers don’t realize is just how simple it is to hijack an email account. This is easy work for any hacker worth his salt. For some reason, people just believe that the email is legit and never take that extra step of calling their friend or relative and just asking them, “Hey, did you send me an email about buying you a gift card?” That’s all it would take to avoid being a victim here. Instead, most people will run down to Walmart or Target, buy the gift card, take the photo of the code on the back and think they’re doing a great favor for someone. After you send the pic of the code back to the hacker, they will move very quickly to cash out the gift card and you’ll lose all your money. Later, of course, you’ll learn that your friend did not make such a request and now you feel silly for not double checking. After all, we should we savvier than that as consumers, right? New Apps Make Scamming Much Easier Unfortunately, these types of scams have been working well for many years. Plus, new apps like Raise make it easy to turn unused gift card balances into money. Though victims do sometimes reach out to local police for help, this is actually not a crime. I know that most people are stunned by that news, but it’s true. Because you were a willing participant and you initiated the action with intent, no fraud was committed. So now you’re out the cost of the gift card and there’s really nothing you can do about it. Just In Time For the Holidays Authorities are warning consumers that this scam will be prolific all throughout the holidays. That’s why it’s so important to spread the word. Let your friends and family know that if they get a request like this from you or anyone, be sure to stop and call the person. Ask them if they really sent the email asking for a gift card. It only takes a couple of minutes to do this and it can save you $50 or $100 bucks. Other Scams to Watch Out for During the Holidays Hackers infamously took over the Rio Summer Olympics a few years back using social engineering to exploit the event. Though some were shocked, social engineering has been around awhile and is used every day to trick business owners. This scam costs Americans millions of dollars each year and hackers find new ways to make their tricks even more effective. Phishing Scams Used more frequently than any other, phishing scams have become so widespread that it’s difficult to get accurate results of the losses incurred. PhishMe is reporting that these scams are growing by at least 65% per year. Kaspersky Labs claims that during the first quarter of 2018, its anti-phishing system prevented more than 107 million attempts to connect users to malicious websites. A Barkly reports shows that 85% of companies have fallen victim to this scheme. How It Works Phishing scams work relatively easily. It’s not rocket science, as they say. You get a legitimate sounding email that seems to be from your bank or credit card company. These emails often use fear and urgency to make victims take action before double checking the legitimacy of the email. Below is an example. This scammer claims to be contacting you from Apple. If you check out the “From” address, you can quickly see that it’s not a legitimate Apple email account. Another big clue is that words are misspelled and the grammar is very poor. You can tell that this email was written by someone (probably from Eastern Europe) who has very bad English skills. NEVER click the link in a suspicious email like this one. Once you do, the cyber thieves can download malware or ransomware to your computer. They may also redirect you to a site where they steal your banking and credit card information. At the very least, they will steal your log-in information for your Apple account and then hijack it. Final Tips In order for consumers to avoid being a victim during the holidays, it’s important to watch out for these types of fraudulent activities. Never click a link in a suspicious email. Instead, open a new browser page and navigate to the website the way you ordinarily would. If there’s something wrong with your Apple account, a bank account or a credit card account, you’ll have a letter in your Inbox explaining what happened and what you need to do. By using a little common sense and double checking when something feels suspicious to you, we can all avoid being victims this holiday season.  

Information Technology News & Information

What’s New in the September Update of Office 365?

The September update of Office 365 includes some major additions and changes to tools such as Microsoft Teams, PowerPoint, and Excel, just to name a few. It is important to keep up with these developments, so here is a list of the major advancements of which you need to be aware. Microsoft Teams: Skype, Selective Do Not Disturb, Wiki App Many users have been looking forward to the day when Skype is integrated into Microsoft Teams, and that day has finally come. You can now use Microsoft Teams for cloud-based meetings that can have up to 250 participants, powerful messaging features, and some awesome calling features. One of the most practical additions to Microsoft Teams is to set up a selective Do Not Disturb status so that some people can still feel free to reach you (e.g., your supervisor or manager). It’s simple to setup: Click on your avatar, Settings, Privacy, and then select the individuals who you still want to receive notifications from. Another one of the new updates in Microsoft Teams is the Wiki app, which can be accessed through the left-hand navigation panel using the More Apps ellipsis. This app allows you to see the wiki pages you are a part of, keep track of your own private notes, and see the notes you’ve most recently been editing. PowerPoint: Embedded Fonts Have you ever prepared a presentation on one computer and had it looking just perfect, only to open it up on another computer and the fonts looked totally different? There is a way to keep this from happening: embedding the fonts in the PowerPoint deck when you save it. Go to Save As > Browse > and then go to the Tools drop-down box in the bottom corner of the dialog box. In the Tools drop-down, click on Save options. Toward the bottom of the box that pops up, you will see an option to “Embed fonts in the file.” Check that box, then click OK and save as you normally would. This option used to be only available on Windows devices, but the new update of Office 365 also makes it available on Office for Mac for Office Insiders. To access it on a Mac, go to the PowerPoint menu and click on Preferences, then Save. The Font Embedding option will be in the dialog box that appears. Excel: Flow Integration Microsoft Flow has been integrated with Excel, and is accessible via an Excel add-in. This will allow you to connect your data to services like Microsoft Teams, Twitter, SharePoint, Dynamics 365, Office 365, and more. You will be able to create and trigger on-demand flows for selected rows in spreadsheets that are hosted on OneDrive for Business or in SharePoint. With this integration that uses the ‘For a selected row trigger’ and the Flow launch panel, you can create and trigger on-demand flows for selected rows in any Excel table on spreadsheets hosted in SharePoint or OneDrive for Business. Access: Improved Visualization Tools Users have been requesting more visualization tools for their data contained in Access, and that is exactly what Microsoft has provided. Not only have charts been made easier and more intuitive to create, but additional chart types have also been added. For power users who developed their own Active-X solutions to the challenge of creating charts for forms and reports, their solutions will continue to work. Power BI: Export to PDF This is another update that came about as a result of user feedback: the ability to export Power BI reports in PDF format where they can be shared with others. This will only be available in the desktop version of Power BI for right now. Microsoft has also added an “Ask A Question” to the Power BI Desktop which will be globally available in the client. What this means is that you can use natural language queries to explore your data and allow report users to ask their own questions. SharePoint: More Granular Control for IT Admins In previous releases, if a group of users was not allowed to create Office 365 groups, they would be limited to creating Classic SharePoint sites. They could not create modern SharePoint sites. The new release has changed this: the IT administrator determines who can create classic SharePoint sites, who can create modern SharePoint sites, and who can create Office 365 groups. Security Microsoft Cloud App Security is a powerful tool that evaluates every app used in terms of industry-specific standards, compliance, and regulatory certifications. The goal of this is to make sure that your company can make informed decisions on the type of apps that are most appropriate for not only your needs, but your security. This new release also checks for GDPR compliance and can generate a C-level report on critical findings. Conclusion While this isn’t an exhaustive list of all the new features and changes available in the September update of Office 365, it does present the ones that are going to have the greatest impact. However, it’s always a good idea to be cognizant of new developments even if they don’t directly impact your daily work.

Information Technology News & Information

Important News: Potential Facebook Data Breach

Facebook Was Breached Were You Or A Facebook Friend Affected? Facebook has confirmed that more than 50 million user accounts have been breached. They made the announcement today, Friday, September 28th.  However, their engineering team discovered the security breach back on Tuesday, September 25th, 2018. They tell us that the vulnerability has been fixed and the breach was reported to the appropriate authorities. How Did This Happen? Hackers stole users’ access tokens through Facebook’s “view as.” This is a feature that lets you view what your profile looks like to other Facebook users. The flaw in this feature allowed hackers to take over 50 million user accounts. If you’re like me, you may have received notices from some of your Facebook friends this week that someone took control of their accounts.  Perhaps they were affected by this breach. What Are Access Tokens? These are the digital keys that keep us logged in so we don’t need to re-enter our password every time we use Facebook. With this information, hackers can take over our account. Here’s how Facebook explains what happened: “Attackers exploited a vulnerability in Facebook’s code that impacted ‘View As,’ a feature that lets people see what their own profile looks like to someone else. This allowed them to steal Facebook access tokens which they could then use to take over people’s accounts.” What Now? Facebook reset the tokens of all those affected. They also logged off 40 million additional users as a precaution. If you are one of these people, you’ll need to log back in the next time you use Facebook. According to Facebook, their investigators are in the early stages of their investigation. They are temporarily turning off the “View As” feature while they conduct a thorough security review What Should You Do? If you have trouble logging back into Facebook, or you forgot your password, visit Facebook’s Help Center. If you’re like me, you take extra precautions when you hear about breaches like this.  If you want, you can visit the “Security and Login” section in Facebook settings. It lists the places where you’re logged into Facebook with a one-click option. If you choose, you can log out of them all.

Information Technology News & Information

Using OneNote on a Tablet: Surface Pro vs the iPad Pro

OneNote is a free application from Microsoft that allows you to collect notes in a variety of formats – handwritten text, typed text, digital drawings, photographs, links, screenshots, videos, and audio files – and organize them, share them, and use them to create other documents. OneNote is an excellent app whether you take notes in a classroom, convention hall, or business meeting. However, the usefulness of OneNote is greatly increased when you use a tablet with it. The two top competitors on the market today are the Surface Pro and the iPad Pro, and both are compatible with OneNote. OneNote on a Surface Pro Because the Microsoft Surface Pro is a Windows device, there are many more apps available that are compatible with OneNote. It works like a Windows PC, which means you can run the basic OneNote App available in the Microsoft Store. This is also true for the Surface Pro. One of the benefits of the app is the ability to easily add pictures to your notes using the Surface Pro’s camera. Just keep in mind that the photo quality may not be very good, especially in conditions with little light. The iPad Pro offers a much better picture-taking (and editing) experience compared to the Surface Pro. On a Surface Pro, the typical battery life is about 7 hours, which could leave someone looking for an outlet near the end of the workday even if they charged it the night before. However, the battery life is considered an improvement over the previous versions of the Surface tablet. One of the key benefits of the Surface Pro is its physical, tactile keyboard a part of the cover. The Surface Pro does need to be docked in order to use the keyboard, but it is an option that isn’t available with an iPad Pro. Note that the keyboard can be tilted at a slight angle when used. These features would be very important to someone who plans to type their notes into OneNote rather than write them. The ability to lay the Surface Pro screen almost flat while it is still attached to the keyboard works extremely well for adding handwritten notations to something you are working on in OneNote. Of course, the screen can be completely detached from the keyboard when needed. Note that one of the commands available on the Surface Pro tablet that isn’t available on the iPad Pro is the Add/Remove Space command located on the Insert tab. This makes the process of rearranging the content in your notes very easy. OneNote on an iPad Pro Compared to the Surface Pro, the iPad Pro is both lighter and thinner, making it easier to carry around, more mobile, and easier to hold for notetaking. This can be a major benefit for those who have to spend extended time taking notes without the convenience of a desk or table. The battery life of an iPad Pro averages about 15 hours, almost twice that of the Surface Pro. This is great for users who often struggle to find an outlet to charge their device. One of the outstanding features of the iPad Pro is the Apple Pencil. The Apple Pencil glides very smoothly and is better at capturing handwriting when compared to the Microsoft Surface Stylus, which is a great bonus for OneNote users that depend on handwritten notes. It also has a solid tip, unlike the soft tip of the Surface Stylus. The size of the tip is also slightly larger on the Pencil. Another plus of the Apple Pencil is that you don’t have to switch tabs to erase something. Rather, you can simply flip the Pencil over and use its eraser. The lasso tool can also be turned on instantly by using the magnetic button on the Pencil. Unlike the Surface Pro, the iPad Pro allows you to take very high-quality photos even in low-light conditions. You can then easily add them to your OneNote document, as well as zoom, crop, and focus them. This is very useful for capturing content-heavy slides during a presentation or extensive notes someone has written on a whiteboard. Also remember that the Add/Remove Space command is not available for the iPad Pro, and this can make it difficult to rearrange content you have added to your notes. Conclusion Both the Surface Pro and the iPad Pro work extremely well with the OneNote app, but only the Surface Pro can be used with the full-fledged desktop version of OneNote (aka, OneNote 2016). The Surface Pro offers the Add/Remove space command, a tactile keyboard, and the ability to easily switch between typing in notes and writing notes. The iPad Pro, on the other hand, offers a much better writing experience when the Apple Pencil is used and the Pencil offers more functionality for things like erasing text and lassoing content. Both tablets, however, are ideal for notetaking.