Information Technology News & Information Tech Tips

Be On The Lookout!

The internet can be a dangerous place. Therefore, as we traverse the digital landscape we must always stay on high alert! Recently, a new type of phishing email has hit our digital world. Be one the lookout for emails that are from my-sharepointdrive@notification.messages365.org. At first glance, this email appears to come from Share Point, giving oneself a false sense of security, but do not be fooled! This email, if opened, will contaminate your computer. This false sense of security is only further by the header of the message reading “This mail is from a trusted sender.”. If you receive a message that looks like this, do not open the attachment! When you receive a suspicious email, always make sure to carefully go over the sender information. Ask yourself these questions: “Do I know this sender?” and “Does this email pertain to something I am familiar with?”. Even if you can answer “yes” to both questions, you should remain vigilant. Always be on the look out for anything that is out of place or suspicious. By playing it safe and paying attention you will save yourself both time and money! At Hammett Technologies we put your online security as a top priority. Be with a team you can trust, become a Hammett Technologies Partner today!

Information Technology News & Information

Do You Have Good Computer Habits?

We know it’s important to have good habits in many parts of our lives, from our work to our daily hygiene. However, quite a few of us forget that we need to have good computer habits, too. Developing wise practices in connection with our computers and smartphones can make our lives much easier and help us to stay much safer on the internet. Back Up Your Files One thing that many people fail to do is back up their files. All it takes is one catastrophic computer crash and days or even months of work can be lost. Priceless family photos, fun videos with friends, key work files, and important school assignments that were a work in progress can be lost. Backing up your files isn’t that hard nor is it expensive. And, to make things even better and easier, you have many different options from cloud-based backups (such as GoogleDrive, OneDrive, or DropBox), convenient USB thumb drives, portable hard drives, and even specialized backup drives. A good practice is to make sure your files are backed up daily, or at least weekly. Keep Your Software Updated Software updates can be a pain, but they are vital to ensuring that your computer and software runs smoothly. In fact, one of the major reasons that updates are released is to fix bugs and issues that could make your computer vulnerable to cyber threats. Hackers know about these bugs and vulnerabilities. If you don’t allow your system to install the patches and fixes, then you are making yourself a prime target for a cyber attack. Keep in mind that you don’t have to perform updates in the middle of your work anymore. Most software (and smartphones) will give you options for when the update should take place, so you can choose times when you aren’t busy on your computer. Be Smart When Using Public Wi-Fi Public Wi-Fi in places like fast food restaurants and coffee shops can be tempting to use when you need an internet connection, but they can also be dangerous. These public Wi-Fi networks are a common target of hackers, and even hackers with minimal skill can quickly figure out things like your social media credentials and more. If you do have to use public Wi-Fi, take safety precautions such as turning off network discovery, file sharing, and printer sharing and make sure your firewall is turned on. Don’t be an easy target for hackers. Make Use of Antivirus Software and Passwords Would you leave your front door unlocked if you lived in a high-crime neighborhood? Well, the internet is a high-crime neighborhood. Failure to use updated anti-virus software and good passwords is the same as leaving your door unlocked. You can’t afford to make it easy for the wrong people to access your personal and financial information. Your first line of defense lies in the passwords you choose. Don’t use easy to guess passwords, and don’t use the same passwords for everything. Include letters and symbols with your passwords to make them harder to crack, and add some numbers for good measure. Your second line of defense, much like a deadbolt for your front door, is anti-virus and firewall software. They don’t have to be expensive in order to do a good job of protecting your computer. It is also vital that you keep your anti-virus and firewall software updated and don’t ignore alerts they provide. Be Careful with Email Going back to our analogy of living in a high crime area: if your doorbell rang in the middle of the night, would you fling the door open and invite whoever it was inside? You would probably want to make sure who it was, and even check their ID if they claimed to be some kind of official demanding access to your home. Strangely enough, far too often we inadvertently provide access to individuals with malicious intentions when we click on links in emails without making sure where those emails are really from. In short, don’t open an email unless you have a good idea of who it is from, and beware of clicking links in emails even if they seem to be from friends. Be cautious about opening attachments, too. In short, be as careful with your email as you are with your front door. Conclusion You work hard to keep yourself safe from physical dangers such as criminals and disease. It makes sense that you should work just as hard to keep your electronic devices safe, too. Backing up files (including documents, photos, and videos), keeping your software updated, and being smart when on public Wi-Fi is a good start. Add to that antivirus and firewall software, robust passwords, and the careful use of email and you are on the road to developing excellent computer habits that will keep your files, data, and personal information safe.

Information Technology News & Information

Google My Business Reviews: The 3 Critical Things You Need to Know

Google My Business is an excellent tool for establishing and tracking your company’s online presence. Included in Google My Business are tools to help you manage customer reviews. However, in order to get the most out of the review tools, you need to know (1) how to find your reviews, (2) how to encourage customers to share reviews, and (3) how to be alerted when you do receive reviews. 1. How to Find Your Reviews In order to both see and manage your Google My Business reviews, you need to pay a visit to this site: business.google.com. Login, and once you are in, you can see your own My Business page. This allows you to, among other things, see and respond to the feedback your clients have provided through Google reviews. You’ll find a link to Reviews on the left-hand side of the dashboard (it has a star icon beside it). This will open up a dedicated review page that allows you to write and edit constructive responses. Note that this also allows you to select one of three basic views: All, Replied (that would be, of course, reviews you have already replied to), and Haven’t Replied (which would be the reviews that you haven’t posted a reply to yet). If you are still new to Google My Business or just don’t have very many reviews yet, you will want to start requesting reviews from your customers. With more and more people depending on the internet for reviews of everything from cell phone plans to home repair services, it is important that your company have reviews from real customers posted on Google. 2. How to Encourage Customers to Share Reviews Trying to get great reviews can be tricky. Google My Business web pages do not offer a way to directly request a review from a customer. There is a workaround, however. To get a URL to promote to your clients, start by searching for your company from within Google maps (maps.google.com). This reason you need to go to Google maps is simple: at the bottom of your company listing in Google maps, there is a link to post a review of your company. Once you are on your company’s map page, copy that URL. Then open up a URL shortening service such as bitly so that you can shorten that URL. With bitly, just paste in your URL and click on Shorten. You will receive a very short URL that you can copy and paste to your company’s website, emails, invoices, email signatures, business cards, and other materials. This makes it much easier for your customers to respond with feedback without having to search for your business on Google. The easier you make it for people to provide reviews, the more reviews that will begin to come in. 3. How to Be Alerted When You Do Receive Reviews Once you are actively promoting reviews, you need to know when reviews are posted so that you can respond to them. It is important to quickly acknowledge reviews, both the good ones and the bad ones. Poor reviews especially need attention, and your company should try to make contact with the disgruntled customer and, if possible, take the discussion offline. However, you want others looking through your reviews to see that when a customer is dissatisfied, your business will reach out to fix the situation – even when the review is unfair. It is very important that a negative review does not sit out on the internet with no response. Fortunately, there is a way to receive an alert as soon as a review is posted. To receive alerts about reviews, start by returning to the Google My Business homepage where you should still be logged in. Look toward the bottom of the right-hand side where it says Settings (there will be a gear icon next to it). Click on Settings, which will open the Email Notifications page. About halfway down, you will see an option that says Customer reviews. If you click the checkbox on the right-hand side of this option, you will receive email alerts when a customer posts a review. That is all you need to do to be alerted when a customer posts a review. Conclusion Your company’s reputation online is very important, and it is critical that you receive feedback in the way of reviews. Google My Business has the tools you need to manage those reviews, including tracking them, responding to them, and being alerted when they are posted online. There isn’t a direct way to request reviews from your customers, but smart use of a link in the Google Maps listing of your business, combined with a URL shortening service, can help you gather those reviews you need.

Information Technology News & Information

Happy Spreadsheet Day!!!

What Are You Doing for Spreadsheet Day? Spreadsheets: some people love them, some people hate them, and some people are a little afraid of them. No matter which category you may currently fall into, you probably know that spreadsheets are vital to the inner workings of organizations ranging in size from massive Fortune 500 companies to small, locally owned businesses. At this very moment, millions of spreadsheets are probably open all across the world – and it seems fitting that there is a day to celebrate the birth of the modern digital spreadsheet. VisiCalc, the First Spreadsheet Program October was chosen for the month in which Spreadsheet Day would occur for a very simple reason that not many people are aware of: it was October 17 of 1979 when the first spreadsheet program was released. It was called VisiCalc, for those of you who may not have been alive then, and it ran on the Apple II computer. With the release of this software, the often overwhelming task of organizing massive amounts of numerical data not only became streamlined but, for some of us, actually became enjoyable. VisiCalc (whose name means Visible Calculator) was the brainchild of Dan Bricklin of Software Arts. It functioned much like a paper spreadsheet, hence its classification as a spreadsheet program. But unlike a paper spreadsheet, you didn’t need a pencil or an eraser. And the calculations could be performed automatically and with incredible accuracy. By running on the Apple II computer, the power of spreadsheets became accessible not just to corporations and large organizations but too small businesses and homeowners, too. There are other things that set VisiCalc apart from previous attempts to develop electronic spreadsheets, such as the instant recalculation of values when the value in a dependent cell was changed, or it’s interactive WYSIWYG interface that still resembles what we use today. In short, VisiCalc was the starting point for the modern spreadsheet that we know today. The Ubiquity of the Spreadsheet You might be surprised at the multitude of applications there are for spreadsheets. We know spreadsheets are used for tasks such as accounting, sales, business intelligence, and finance. Professors, instructors, and teachers use spreadsheets to track class performance and assign grades. Engineers and scientist alike use them to perform simulations, create complex models, and analyze massive sets of data. Homeowners use them to track expenses and set up budgets. Small business owners use them to keep track of inventory and sales. Large companies use hundreds of different spreadsheets for just about everything imaginable — from simple tasks that require a small portion of a worksheet to massive workbooks with thousands of calculations and complex visualizations. When it comes to data, spreadsheets can model, manipulate, sort, organize, visualize, and process large sets of both numerical and non-numerical data. Spreadsheets can be used to perform what-if analysis, make predictions based on existing data, inform decisions, and perform extremely complex calculations. They can be used for optimization, curve fitting, and solving simultaneous equations. And one of the benefits of spreadsheets, to quote an old professor of the author’s, is that if you can do it once, and do it right, you may never have to do it again. Modern Spreadsheet Packages We aren’t limited to VisiCalc in modern times, however. We’ve got a wide variety of options when it comes to spreadsheet packages, including: Microsoft Office Excel (which is available both as desktop software and online) Google Sheets Corel Quattro Pro LibreOffice Calc OpenOffice.org Calc iWork Numbers There other less well-known options available, too, but Excel is what most people think of when someone says “spreadsheet.” Modern packages offer numerous types of formulas and functions, including those for finance, accounting, mathematics, statistics, probability, and string manipulation, just to name a few. And the visualization capabilities of spreadsheets are constantly evolving to enable users to give even more context and meaning to data. How spreadsheets process massive sets of calculations is also growing, with some packages supporting multi-threaded processing. The types of data that can be processed within a spreadsheet are rapidly expanding beyond floating point numbers and characters, and some packages such as Excel are including aspects of artificial intelligence among new capabilities. How Can You Celebrate Spreadsheet Day? There are quite a few ways to celebrate Spreadsheet Day. One of the best ways is to expand your knowledge of spreadsheets. It’s always a good idea to increase your skill set when it comes to computer applications, but especially so when it comes to spreadsheets. Spreadsheets can make your work much easier if you learn how to make the best use of them. Take our word for it – spreadsheets can do so much more than you realize. That’s why we think the very best way to celebrate the birthday of the modern spreadsheet is to register for free online Excel training at SpreadsheetsTraining.com. Sharpen your existing skills, learn something new, and find out new ways to put spreadsheets to work for you!

Information Technology News & Information

October 16th Is Steve Jobs Day

Steve Jobs Day Sheds Light On Apple Founder’s Legacy In today’s modern world, the name “Apple” has become synonymous with technology. It’s no wonder then that Steve Jobs, the company’s late co-founder, has become such an influential figure in American history. His contributions are well documented in motion pictures, books and an authorized biography. October 16 is known as Steve Jobs Day, which was declared in 2011 by the Governor of California. The day brings forth the opportunity to reflect on the life of the famed innovator and how his contributions have helped advance the human race. From iPhones to iPads and every single app in between, one could argue that humanity would not be as technologically savvy without the work of Steve Jobs. In August of this year, Apple achieved what no other company in history has done. It became the first publicly traded U.S. company to reach $1 trillion. Not only is this historic in terms of branding, but it brings to light the incredible ingenuity the company has displayed throughout the years. Along with his partner Steve Wozniak, Jobs’ innovations have helped solidify an incredible legacy likely to stand the test of time. The Early Years Jobs grew up in the San Francisco bay area in the 1960s. By the age of 10, he had developed a fascination with electronics, likely due largely in part to time spent with his father building crafts. This hobby paved the way for Jobs’ establishment of Apple in 1976, along with his co-founder Steve Wozniak. Jobs sat at the helm of Apple’s operations until 1985, when he broke ties with the company and established NeXT computers. Apple later purchased NeXT and paved the way for Jobs’ return to the company in 1997. Apple Computers While Jobs can’t be credited for inventing the first computer, his founding of Apple paved the way for its widespread use. The computers that came before Apple was expensive and typically used only for business purposes. The introduction of the Apple II, the brainchild of Jobs and Steve Wozniak, changed this concept forever. Marketed as the world’s first mass-market personal computer, the Apple II meant users could now access the technology from the privacy of their own homes. More than two decades later, in 1998, Apple released the iMac, an all-in-one computer. One of Apple’s lesser-known inventions is the iBook, which was introduced in 1999. The laptop came equipped with Wi-Fi technology and a few upgrades to its design. People today may remember it for its tangerine and blueberry color options and clamshell design. The Apple iPad, introduced in 2010, has made the Internet even further accessible. This tablet computer was built more for entertainment than previous devices, making it a staple in many households, utilized by children and adults alike. The product was deemed so successful that Apple sold more than 15 million of these devices in its first year. The iPhone Of all Apple’s products, none is as influential in the tech world as the iPhone. Apple’s introduction of the iPhone marked a paradigm shift for the traditional mobile phone. Apple’s version, like the majority of its most revolutionary products, boasted a sleek, simple design that helped further uncomplicate technology for the masses. Introduced in 2007, the phone has undergone a radical series of redesigns over the years, each year presenting more opportunities for productivity than the last. Prior to the invention of the iPhone, mobile phones’ primary purpose was to access chatting and emailing. Today’s version is utilized for web-surfing, Facetiming, social media and the utilization of an endless stream of apps available for download at users’ fingertips. Frequent updates and new designs ensure Apple users are getting the best product possible, which has helped the brand amass its own population of loyal followers. The iPod One of Apple’s most significant inventions to date remains the iPod. While mp3 players had been on the market for several years, Apple’s version was seen by many as far superior, and so it began to dominate the market. Able to store thousands of songs, the iPod grew in success with the help of other products, such as Apple iTunes, which was released in 2001. The new technology allowed users to organize their digital library on both their personal computer and through their devices. The iTunes Music Store went live in 2003. Not all of Jobs’ best inventions were technological. The innovator is also credited with inventing the world’s first glass staircase. The design, which was awarded a patent in 2002, has been used across some of Apple’s flagship stores and has since been adopted, in some sense, by both commercial and residential properties the world over. Steve Jobs Day is a day designated for honoring the Jobs legacy, but his impact is seen daily, in the hands of millions. While Apple, as a company, has certainly carried on without him, Jobs is one innovator unlikely to ever be forgotten.

Clients Information Technology News & Information Services Tech Tips

Protecting Your Online Identity

The most recent breach of Facebook, resulting in 50 million accounts hacked, has the corporation in the spotlight once again and for the wrong reasons. To help those who fear they may have been hacked, the Fox 45 Morning News team asked our Owner and CEO, Charles Hammett, to come on and provide his expert knowledge concerning cyber security and help explain to viewers what they can do in order to prevent these attacks from happening. Watch the video below to find out more! At Hammett Technologies the security of our client is our number one concern. With help from our certified team, you can have faith that your company’s users and data are kept safe and secure.

Information Technology News & Information

Google Shutting Down Google+

Google+ Social Media App Will Soon Move Off Into The Sunset Google+ has never really been a popular social media network. In fact, most people say they’ve never used it and don’t know how it works. So it’s not too surprising to hear that Google has finally decided to pull the plug. Google just announced a ten-month sunsetting period, which begins now and will end in August of 2019. Besides the site simply not being popular, Google has had serious security issues. Project Strobe discovered a bug in Google+ that may have leaked the personal information of thousands of users. Though Google says the vulnerability was not discovered by hackers and that no profiles were compromised, their senior executives felt that rumors of a breach would likely trigger “immediate regulatory interest.” So they simply didn’t tell anyone. Other Social Media Data Breaches For several years, Facebook has been under scrutiny for allowing the data firm Cambridge Analytica to access their user information. This data was in turn used to create targeted social media ads that eventually swayed the presidential election of 2016. Since that incident, Americans have become much more aware of the effects and dangers of data breaches and social media manipulation. Given the fact that almost no one was using the Google+ app and the high risk for potential data leaks, Google execs said they simply felt that it was best to discontinue Google+. Users will have 10 months to migrate their data before the platform is officially dissolved in August of next year. However, the company has decided to continue supporting the Enterprise version of Google+ so businesses using that app will not be affected. More About the Google+ Security Breach Last March, Google discovered a privacy breach, which allowed third-party apps using their programming interface to access the personal data of users. This data includes usernames, addresses, email addresses, birth dates and other bits of personal information. The Wall Street Journal reported some details about the security breach and said that Google executives had been informed about the breach soon after it occurred. These executives made the decision not to disclose the breach to its users for fear of tarnishing their reputation. Reporting Security Breaches In a blog post, Google said that it decides when and if the organization should notify users of data breaches. They take into consideration the type of data that was leaked, whether there’s evidence of misuse and whether there’s anything that users can do about it. According to security breach laws, any organization that experiences a data breach must inform those affected. And they only have a specific amount of time to do so. This varies by state but there are severe penalties for not correctly reporting a security breach. Executives at Google say that the gap has been fixed and that users do not need to worry about any further data leaks. However, there is ample evidence that Google did not follow the law once they learned of the data breach. This can result not only in penalties from the federal government but also users can file individual lawsuits if they believe their personal info has been compromised. How Data Breach Laws Are Changing With the new European Union GDPR (General Data Protection Regulation), more countries and organizations are implementing stronger security measures. The GDPR affects anyone who does business with an entity that resides within the European Union. This has caused many business owners to revamp the way they collect and store personal information from their users. Once a company has collected an individual’s personal information, they have a legal responsibility to keep that data as secure as possible. In spite of these advances in data security regulations, hackers seem to be one step ahead. Their tactics change, improve and evolve making it necessary for all organizations to be more cautious. Senate and House Committees Get Involved This past year, many social media and technology companies have come under scrutiny due to their data and privacy practices. Executives from Twitter, Facebook and Google have testified before various Senate and House committees. Under fire are their security measures, but also their political biases. The government is considering types of regulations that would prevent these companies from meddling in important things like the elections. Now that everyone is fully aware of how easy it is to sway voters in one direction or the other, there is a very real fear that future elections may be manipulated by these companies. They not only have the knowledge, but they have the resources to influence the way people vote. And this ability holds within it a great deal of potential power to change our society in ways that can only be speculated about at the moment. What Should Google+ Users Do? In the meantime, if you are a Google+ user, it’s best to go ahead and make copies of any content you have on the site, then delete your account. Once it has been deleted, you’ll no longer have to worry about losing it to hackers who have found yet another weakness in the site’s security protocols.

Information Technology News & Information

How To Ensure A Secure Home Network

Most homeowners and renters understand the importance of home security. In fact, in today’s world, it’s not uncommon for homeowners to spend hundreds or even thousands of dollars on home protection. But while securing your belongings is considered good common sense, homeowners don’t as often consider the concept of data security. This is understandable, but in reality, it’s just as important to ensure that your data is protected as well. Unbeknownst to many, your home’s security system and its surrounding technology may even leave you susceptible to a data breach. These have the potential to wreak havoc from a personal data standpoint. Paying close attention to the technology you are using to protect your home can help you avoid the ever-growing risk of a cyber breach. Here are a few things homeowners can do to keep their networks protected. Strengthen Your Wireless Security Securing your wireless router is paramount to effective data security. Your wireless networking security will depend heavily on the health of your router. One useful tip? Don’t leave your Wi-Fi on unless it’s necessary. This means that if you and your family are planning a long trip, don’t forget to turn your network off. Other precautions include disabling your Wi-Fi Protected Setup, or WPS. The WPS is intended to make it easier for those within your household to join the central Wi-Fi network. However, it can also be used by hackers to gain unauthorized access. Configuring your Wi-Fi’s signal strength is also important. Casting too wide of a net can leave you susceptible to outside hackers. As a security measure, configure it so Wi-Fi is only accessible to those within your home’s area. You can also disable your network’s remote management, and be on the lookout for any unknown devices or connections showing up on your network. Update Your Software Keeping your security systems up-to-date is important in ensuring nothing falls through the cracks. Applying updates and patches ensure you are running the most recent technology available for your device. Your work doesn’t stop at updates, though. Installing an anti-virus solution built to detect, prevent and clear your system of viruses ensures a strong line of defense against hacking. While antivirus solutions won’t protect your system from, say, zero-day exploits, they can be helpful in preventing malware from entering your devices. Install A Network Firewall Firewalls are extremely useful in maintaining the security of your systems. This type of solution blocks unauthorized users from acquiring access to your private data. Installing a firewall is a solid step toward keeping your data safe. These can be installed via software, hardware or a unique combination of both. Back Up Your Data Computer users understand the frustration that comes with a hardware failure. In the event that this happens to you, it’s best to be prepared. Keeping a solid backup solution will give you peace of mind in the event of an accident. Test your backups thoroughly and regularly by creating dummy files and deleting them, or scheduling a day to unplug and determine how long it takes to get your system up and running. All this can help you form a legit plan of action to help you recover from a hardware failure. Maintain Strong Encryption Configuring your router improperly can pave the way for a data breach. You should use the strongest possible encryption methods for your device. Some of these protocols may include Wi-Fi Protected Access 2 (WPA2), Temporary Key Integrity Protocol (TKIP), and Personal Advanced Encryption Standard (AES). Here are some tips to help you create a strong line of defense against a breach. Update Your Router Password It can be tempting to begin using a new router fresh out of the box, but be cautious. While your router has a set password, it may be easy to guess, or worse, printed right on the router itself. Changing your router’s password to something safe and known only by you is necessary if you’re hoping for optimal protection. The same goes for your Network name. While these typically come standard, you’ll want to change yours, though be careful not to include personal information such as your last name or address. There are some things you can do to ensure a strong password. First, avoid using the same one for all of your accounts. If your password is stolen from one site, all other accounts for which you use it may be put at risk. You also shouldn’t share passwords with anyone or divulge them to anyone. Approach Email With Caution You may have taken all the necessary precautions to keep your home network secure from hackers, but often it’s not the technology that’s to blame for a breach. While it’s true that cyber criminals take advantage of unencrypted data, an inadequate firewall or out-of-date software, they also frequently target individual users. E-mail, for instance, is one of the most frequently used platforms by hackers. And while these attacks can hit suddenly and without warning, there are still things you can do to protect yourself. If you receive an e-mail from someone you don’t know, don’t answer right away. Always first verify the person’s identity before responding. If you suspect an email from an organization may contain malware, first contact the company directly before replying. One giveaway is a misspelling in the URL of a malicious website. Also be sure to never share personal or financial information via e-mail or telephone. Don’t leave your data security up to chance. All of these steps combined can help you form a solid plan for preventing a cyber breach.  

Information Technology News & Information

Apple iOS 12: Top Features You Need to Know About

Apple iOS 12 has so many different new features available it’s almost overwhelming. From better password management options to the introduction of the Memoji, users will appreciate some of these more than others. This article will highlight some of the most interesting and useful features and improvements, starting with one everyone can agree is probably overdue: better performance and battery life. Performance and Battery Life With iOS 12, all iPhone models since the 5S will see significant improvements in performance – including longer battery life and speed boosts. This is due to several improvements and changes that, combined, enable your phone to last longer and run faster. You can also access much more detailed information on your battery life and performance, even comparing its current performance to what it was capable of when it was brand new. Password Management Methods Apple’s iOS 12 allows you to use third-party password management apps instead of, or in addition to, its own password management method (iCloud keychain). This also includes autofill support for these third-party password managers. In addition, iOS 12 will fill in any six-digit codes you receive through SMS for two-factor authentication. To better support online security and privacy, iOS 12 will remind you if you are reusing a password when setting up a new password. It can also create a very powerful password for you and store it on your iCloud keychain. Secure Emergency Location Data Another awesome feature in iOS 12 is that it will provide secure location data to first responders if you call 911. This feature makes use of a new Apple technology called HELO that can estimate your location based on a variety of parameters, including GPS, Wi-Fi access points, and cell towers. This will make it much easier for iPhone users to be quickly located by first responders in case of an emergency. More Emojis, Animojis, and Memojis For those of you who love to express yourself with emojis, good news: 70 new emojis are being added. And not only that, but Apple is working on more inclusive disability-themed emojis that will be released next year. To access all these new emojis, you’ll need to update to iOS 12.1 when it is released. Apple has also added more Animojis in iOS 12. Now you can access a T. rex, tiger, ghost, and koala, in addition to those that were already available. For those not content with Animojis, Apple has introduced Memojis. These are basically augmented reality characters that you can customize to look like you. Better Maps With iOS 12, the Maps app has been redesigned to provide more detail. This includes more public landmarks, more greenery, and the ability to see the layout of stores in malls. Currently, this only applies to the San Francisco Bay region, but it will be added to maps for the entire United States over the next year and a half. Group Facetime Group Facetime, now integrated into iMessage, will allow you to simultaneously FaceTime chat with up to 32 people. These calls are very easy to set up via the group chat window in iMessage, and are available through the iPad, iPhone, and the Mac. Screen Time Report Have you ever wondered exactly how much time you spend on your Apple devices? Or what apps you really use the most? Well, iOS 12 has added a weekly activity summary that provides plenty of detail. The new App Limits feature does just what it says: it will provide you notifications reminding you of when you are nearing or have reached any limits you set. And for those with children or teenagers, the Downtime feature allows you to control their usage, setting specific limits for apps or even unplug their access completely. Greatly Improved QR Reader iOS 12 users will have a much easier time reading QR codes. In the past, a stand-alone app was needed to read QR codes. Now, once you turn on the QR code feature in the settings for your camera, you’ll be able to read QR codes using your Camera app. iOS 12 will highlight the code for you so you will know it has been detected, and you can add a tile to more easily launch QR reader capabilities. New Developments for Notifications On iOS 12, you can now decide which apps will deliver silent notifications to your phone (e.g., no sounds, no vibrations), and Siri can advise you on which apps you don’t use often and thus should turn off notifications for. Notifications can also be grouped by app, topic, and even thread. You can also enact a Do Not Disturb feature that will hide your notifications until you turn it off, and you can set it up to automatically turn off when a certain event ends or at a particular time. Conclusion No matter how much you use Apple devices, you’ll find some features and improvements in iOS 12 that will make your user experience much more productive and fun. And remember that this was just a sampling of what is now available! There’s a lot more so be sure and check it out.

Information Technology News & Information

What You Need to Know About Secure Messaging Apps

You probably use messaging for communications every day, but how secure are your messages? Messaging apps are as susceptible to hackers as any other type of electronic communication, and if you are concerned about privacy then it’s time to learn the basics about secure messaging apps. Why You Need a Secure Messaging App We use messaging more and more to communicate, but we don’t always realize how many eavesdroppers there may be. Those eavesdroppers may include internet service providers, government agencies, and hackers. If your messaging involves your company, it might be the target of industrial espionage. These are all good reasons to consider using a secure messaging app. What Makes a Messaging App Secure? We probably all remember playing around with coded messages as a kid, but never dreamed that coded messages might become important in our day-to-day communications. As it turns out, one of the key aspects of a messaging app is end-to-end encryption. When your messages are encrypted, that means they are encoded in such a way as to make it extremely difficult for someone to eavesdrop on the information being transferred. The messages are basically scrambled, and in order to unscramble them, you must have the correct key. In the case of an end-to-end encrypted message app, only the sender and the receiver have the decryption keys. There are messaging apps that offer encryption, but encryption is not the default setting. That means that you would have to navigate to the settings for your messaging app and turn on encryption – if it even offers that feature. Metadata can still be an issue even with encryption. Metadata includes things like who you talk to based on your contact list, how much time you spend talking to them, your phone number, your IP address, and more. You should avoid messaging apps that collect metadata. Believe it or not, one of the signs of a secure messaging app’s integrity is making its source code available to the public. Open source code is actually better than proprietary code because it provides experts access to the code for review. Experts who did not develop the code will be far more likely to notice vulnerabilities and bugs that could be exploited. The result is a highly robust source code and a bulletproof app. Secure Message Apps There are several messaging apps on the market that qualify as secure messaging apps. What follows are five of the top options that are available for Android and iOS operating systems. Dust: If you want messages that don’t hang around, then Dust is your app! Messages disappear within 100 seconds of being read or within 24 hours – your choice. You’ll also be notified if any screenshots are taken. It includes end-to-end encryption, no permanent storage, and you can even erase your message off someone else’s phone. The major drawback of Dust is that its source code has never been released. Signal: The Signal messaging platform uses end-to-end encryption and its source code has been released. There is an option that makes messages disappear after a certain amount of time has passed and it can be password protected. It only stores the metadata it needs to function properly on your device. As far as drawbacks go, there are virtually none associated with Signal. Telegram: The Telegram app was banned in Russia because they refused to hand over the encryption keys. It offers end-to-end encryption through a feature called “Secret Chat” that must be turned on. It can be locked by a passcode and has a Self-Destruct timer option for Secret Chat messages. The drawback of Telegram is that it lacks transparency about the protocol that it uses. WhatsApp: With WhatsApp, end-to-end encryption is the default and provides an option for you to verify that encryption is in place. Messages are not stored on your phone, and it makes available a two-step verification feature. WhatsApp’s major drawback is that it does keep track of metadata and backups of messages are not encrypted for Android users. Wickr : Unlike most messaging apps, Wickr offers both a personal (Wickr Me) and an enterprise edition. It provides end-to-end encryption and a host of additional features that make it one of the best options for businesses that are looking to keep their messages secure. It recently released its cryptographic protocol. And when Wickr deletes things, it “shreds” them so that they cannot be recovered. Wickr doesn’t really have any drawbacks from a security perspective. Conclusion Not all secure messaging apps are equally as effective. When selecting one, you should look for end-to-end encryption (and by default is even better) and the storage of little to no metadata. Also, keep in mind that companies that have released the source code behind their app are considered more reliable and their apps more robust. If privacy is important to you, then it’s time to check out secure messaging apps. Before installing or investing in any messaging app…always consult with your technical support provider.