Information Technology News & Information

How To Get Your Groove On This Christmas

There are many apps you can use to find the holiday music that will complete your holiday events. Microsoft Groove is one of those apps and now learn how you can use it during the holidays. Microsoft Groove is a great way to find music that you love all year long. During the holiday season though, you can find a Christmas list that will keep you in the mood. Finding the ideal holiday playlist is very easy on Microsoft Groove and there are a few ways you can do it. The music you can find on the app ranges from classic music and holiday favorites like “Baby, It’s Cold Outside” and “All I Want for Christmas is You.” The lists you will find are hand selected making them the perfect personalized holiday music list. The Groove Music Pass In order to get the most out of Microsoft Groove and take advantage of the tips we will provide you with, you have to be a Groove Music Pass Subscriber. If you are already a subscriber, you can go ahead and start finding the personalized playlists that you want for the season. However, if you are not already a subscriber, you can get a free 30 day trial so you can use Microsoft Groove during the holiday season on your Windows 10 devices. 31 Days of Holiday Playlists With Microsoft Groove, listening to holiday music has never been easier. If you do not have time to create your own playlists, you can listen to one of the playlists that they provide for you. Every day for 31 days, they will provide a new holiday playlist for you to listen to. All you have to do to gain access to the playlists is launch the Groove app and click on the explore tab. On this tab, you will see the “31 Days of Playlists” option at the top. Holiday Album Compilations If you want to look for holiday music another way, you can also look at the collection of popular holiday album compilations. To find these lists, you can look at the Explore tab in the Groove player. On this tab, you can type in the word holiday or Christmas to find all of the compilations for the holiday season. You can even narrow your search by including terms such as jazz, party, or other words. Search by Artist The last way you can find the perfect holiday playlist through Microsoft Groove is by searching for holiday music by artists. You can search for your favorite artists plus the word holiday to find new classics from your favorites. There is no better way to find holiday music that was released by some of your favorite artists. No matter what kind of music you are looking for this holiday season, you can find it through Microsoft Groove. If you are not a subscriber, you can even listen to the app for free during the trial this holiday season. You can find all of the music that you and your family loves. Plus, you can create different playlists for different activities all holiday season long. For more information about Microsoft Groove, be sure to contact {company} in {city} via {phone} or {email}.

Information Technology News & Information

Who Hacks the Hackers?

A discussion of a recent ransomware attack at the San Francisco Municipal Transportation Agency and the curious events that unfolded afterwards. These days, it is not uncommon to read about yet another business or organization falling victim to the devastating effects of a cyber attack. Case in point: in November, the San Francisco Municipal Transportation Agency was the victim of a ransomware attack that caused fare station terminals to all display an ominous message. What happened next, though, makes this one of the more unique cyber events in recent memory. What Happened? In late November, SFMTA was hit by a ransomware attack that caused all fare terminals to display the same message: “You are Hacked. ALL Data Encrypted.” This is nothing new, but what makes this situation so unique is that the person behind the initial ransomware attack was hacked himself. In the process, it revealed details about not only other victims, but also about who he really is and where he is located. Problems for this would-be hacker began when he left an email address for SFMTA to use to make contact with him. The address, cryptom27@yandex.com, could be used to pay the approximately $73,000 ransom and obtain the keys necessary to decrypt all of the station’s files. However, a few days later security researchers were contacted by someone who claimed to have hacked that cryptom27 email address after reading a news article about the San Francisco Rail System situation. The original hacker’s inbox was breached by simply guessing the answers to his security questions. His email password was then reset, giving the second hacker complete access. The information obtained during this second breach is very valuable for those who wish to avoid falling victim to similar attacks in the future. It was learned that the average extortion attempt for this person ranged between $45,000 and $70,000 or more and that he had even recently breached a manufacturing firm based in the United States. He was also in the habit of switching Bitcoin wallets every few days, rarely going more than a week or two without making the change. Security is Important For Hackers, Too All told, this person was smart enough to extort approximately $140,000 from victims over the years. Yet at the same time, he fell prey to something that is one of the most common blunders in the world of cyber security: using password or security question information that is too easy to guess. In the end, the curious case of the San Francisco Rail System hack should serve as a valuable lesson about the current state of cyber security. Regardless of how you may try or how many precautions you may take, NOBODY out there is safe from hackers – even people who may be doing a little hacking themselves. This is one lesson that the SFMTA attacker likely won’t soon forget. As of December 2016, the original hacker has yet to be brought to justice. However, with the amount of personal information that is now known about him, he’s no doubt having trouble sleeping at night. {company} is incredibly proud to be your go-to source for all of the important news, tips, tricks and best practices that you need to leverage the power of modern technology to your advantage. If you’re in {city} and would like to find out more about these or any other related topics, please don’t delay – contact us today by phone at {phone} or by sending us an email at {email}.

Information Technology News & Information

Will Your Business Make The Section 179 Deadline For 2016?

The Section 179 tax deduction allows your business to write off the full cost of technology purchases, up to a maximum of $500,000. This deduction is only available to businesses whose total technology purchases for the year are less than $2 million, which means that Section 179 is geared perfectly towards small and mid-sized businesses. A wide range of items fall under Section 179 eligibility, from laptops, printers, and off-the-shelf software, to office furniture, specialty equipment, and even vehicles. However, Section 179 has a very firm December 31st, 2016 deadline, and only items purchased, shipped, and installed at your physical location by midnight on December 31st are eligible for this deduction. Any qualifying items need to be in use at your office in order to count towards the Section 179 deduction for this year. This deadline is approaching fast, which may put a lot of larger purchases out of your reach for this year. But that doesn’t mean you are out of options. Something like Microsoft Office 365 falls under the off-the-shelf software category, and can be purchased and installed quickly and easily with help from your IT provider. Items like laptops or printers that have already been purchased this year but not set up can still be put into use in time to qualify. If your intended purchases will take time, research, and planning, now is the perfect time to talk to your IT provider about making those changes happen in 2017. The Section 179 deduction as it stands now will be an annual opportunity for your business, meaning that you’ll have this same amazing chance to save your business thousands of dollars on technology investments year after year. A consultation with the {company} team can help your business figure out which technology purchases will provide the most benefit to you in the long run. Finally, please keep in mind that {company} is an IT provider. While we can offer you our advice, you should direct any questions about the finer points of Section 179 to your CPA or tax attorney. Want to find out more about how you can take advantage of Section 179 for your business before time runs out? Contact us at {email} or {phone}. You can also visit the official Section 179 website for more information.

Information Technology News & Information

The Rise of Ransomware Attacks and How You Can Protect Yourself

Cyber attacks are on the rise and cyber security is becoming more and more difficult to grasp. With ransomware attacks steadily increasing, these tips can help you better protect yourself. Ransomware attacks are becoming more and more common. Since they are on the rise, you should be doing everything possible to protect yourself. You may not be able to completely avoid them even with the best protection but you can take other steps to ensure you are not a victim. Ransomware Attacks on the Rise No one wants to be the victim of a ransomware attack but according to data recently released from Kaspersky Lab, the number of people who have been attacked have more than doubled in the last quarter. In Q3 of 2016 alone, there were 821,865 victims of ransomware. This does not include other types of cyber attacks. Not only that, but the number of people who have been attacked has been steadily rising during 2016 and does not show any sign of slowing down. Ransomware attacks occur when a cyber attacker hacks your system and takes hold of your files. They will not allow you access your files in any way unless you pay them a “ransom” that will allow them to release the files back to you. This is not only inconvenient, but also can be very dangerous. With attacks happening more frequently, it is best to take steps to better protect yourself. What You Can Do to Protect Yourself Even though it is scary how many attacks are happening these days, that does not mean you do not have a way to better protect yourself from them. One of the best ways to protect yourself is by having software installed that will prevent attacks from ransomware and malware while also notifying you of potential threats. You can purchase packages that are monthly and yearly. If you have protection on your devices, it is much more difficult for someone to target you. Other things you can do to protect yourself include: Backing up your devices so you can have access to them no matter what Updating software whenever available so you have the best protection Practicing safety when communicating with people you do not know Ignoring emails that are spam and not clicking the links within them. If you want some help protecting your computer from ransomware attacks, be sure to contact {company} by {email} or {phone}. They can help you find the ideal solutions and protections in {city} so you can be safer on the internet.

Information Technology News & Information

Time is up for Office 2007 Updates

After 10 years, Microsoft is phasing out support for many of their 2007 products, including Office and Exchange — are you prepared for the switch? Still using Microsoft Office 2007? Microsoft will cease offering support for this and related products in fall 2017; this phase out includes extended custom support agreements as well. What does this coming change mean for you, your business and your clients? What Does the Coming Change Mean for your Business? 2017 will see the end of support for some of their most visible and used products, from Office 2007 to Microsoft Exchange Server 2007. Microsoft has shared a detailed list of the products being eliminated for your reference; upgrading to another operating system now or switching to a more recent version of Office can help you avoid complications from the phase-out. Computers, networks and workstations still running Office 2007 may be reaching the end of their useful lifespans; the new phase-out makes the coming year an ideal time to reevaluate your needs and equipment. Making plans now for upgrading or moving away from these older systems can help you avoid trouble later. This round of phase outs will likely not be the last; Office and Exchange 2010 will likely be phasing out support in the coming years as well. Making 2017 a time of upgrading and reevaluating, including technology replacement and system upgrades. Even larger customers who have custom support agreements will see support come to an end by October 2017; in the past, Microsoft has allowed enterprise customers to pay a significant fee to continue receiving custom updates after support for a legacy product has ended. What’s so Bad About Outdated Software and Technology? When you use obsolete software or technology for your business, you waste time and money, and potentially put your business at risk. When your software or operating system is outdated and no longer supported, you won’t be able to find the help you need for even simple problems. A lack of security patches and updates could put you at risk for malware and ransomware as well. Keeping your technology up to date ensures you don’t run into downtime or end up losing your valuable data. If you are still using Microsoft products with “2007” in the name for your {city} business, we can help. Taking a proactive stance and upgrading now allows you to sidestep the problem and ensures your business continues to operate worry free. Contact {company} at {email} or {phone} to learn more about upgrading your outdated software and obsolete technology and to find out how we can help your business save time and money in 2017 and beyond.

Information Technology News & Information

Microsoft is Adding 3D Paint to Windows 10

Microsoft has introduced a preview of 3D Paint and the results are amazing. The entire way people interact with Paint is going to change in a positive way. If you have ever enjoyed the Paint app provided by Windows, your experience is about to get a lot better. Microsoft has just introduced a small preview of a 3D Paint app that will be part of the Windows 10 operating system bundle. When Can You Expect to Have Access? Since the new app is only part of a preview, it is not available to every just yet. The expected release with the bundle is set for March 2017. The addition of this new app is designed to attract more creator types and will be a standard component of the system. If you are a Microsoft insider, you may already have access to the preview and can begin testing it out for yourself. What Have People Discovered with the Preview? The preview is only available in English but three have already been some leaked features that people are enjoying. First, the move from 2D to 3D is impressive. You can change a 2D object into a 3D one with the app and even create one from scratch. The app makes it very easy to complete the task and you can use all kinds of new tools such as oil brushes, watercolors, and even smudge the paint. The app is also connected to Remix3D.com so you can pull inspiration from there. On the website you can even showcase your own artwork. Paint Isn’t What it Used to Be Paint has come a long way in recent years and you can now create very realistic looking graphics Your design can come to life in no time at all with these updated textures and materials. You can even create your own MEME’s with 3D stickers that will appropriately fit around objects. Once you have access to the app, you will want to go crazy creating emojis and other items with pictures of your friends. When you doodle, like you probably did for many years with the original app, those doodles can come to life. They will become 3D and you can really do anything with them. 3D Paint is changing the face of the creative comoponent of Windows. You may have to wait until March 2017 to enjoy it but it will be worth it. For more information, be sure t contact {company} in {city} via {phone} or {email}.

Information Technology News & Information

The Importance of Protecting Your Phone Number

A cell phone number is a powerful thing and can lead to potential security breaches. Your cell phone number is connected to a lot of things. If you are like most Americans, you have it connected to your social media accounts, bank accounts, and more as added protection. If you are using your cell phone this way, you need to think twice before you give your number to anyone. It may seem harmless but in today’s world, it can be just as dangerous as giving someone your bank account number. Unlike a social security number, a cell phone number is not a protected piece of information. This means that while companies are legally required to protect your social security number, they are not required to do the same thing with your cell phone number. About ten years ago, people had home phones more than they had cell phones. The opposite is true today. More people today will have the same cell phone numbers and social security numbers for their entire lives. This poses a huge security threat. Some investigators argue that a cell phone number, when combined with a name, is even more powerful than a social security number. This is due to the fact that it is connected to many different kinds of databases and it is connected to a device you have with you at all times. Because of these facts, it is important to change the way you protect your cell phone number. You should never provide it to a database unless it is required. Be careful of who you give it to because you do not know what they will do with it. Protect your cell phone number just like you would your social security number. If you would like more information about how this can affect you in {city} contact {company} via {phone} or {email} today.

Information Technology News & Information

Has Office Depot Been Diagnosing Computers with Fake Problems?

Office Depot has provided free PC checks for years but new light is being shed on the program as accusations of false diagnoses have surfaced. Office Depot has recently been accused to taking advantage of unsuspecting customers by selling computer repair services for problems that do not exist. Office Depot is known to have free PC health checks at its locations but until recently, nothing has come to the surface about false diagnosing. This came to light because a former employee came forward saying that he believed the company was fraudulently diagnosing computers with customers who may not be aware. A CBS affiliate went undercover as a result an found that an Office Depot was in fact diagnosing issues that did not exist. One of the most common issues presented to customers was malware. In turn, the company said they could fix it for a large price. During the undercover operation, they presented new computers that had not been used and had just come out of the box. For the computers, a computer security firm IOActive, guarantees a clean bill of health. The firms VP of Technology, Will Longman, said himself that there was no evidence of malware when they used the computers as part of their process. During the undercover operation, the CBS affiliate even bought computers from Office Depot and took them to a different store to get them checked out. The other store said they found malware on this device as well. The diagnosing of the computers varied from store to store as well. Where some would recommend anti-virus software, others would say ignore the test results. On the opposite end, you get the serious diagnosis of malware. This shows that Office Depot does not have a set way of handing these free PC checkups and the diagnosis is completely left up to the employee or individual store. For now, a spokesperson for the company is saying they do not take these accusations lightly and will be investigating throughout the company. However, what about the people that have already spent good money on a service that they did not really need. Office Depot should take a look at the program and really fine tune it if they wish to continue. If you want quality and trustworthy examinations of your computers in {city}, be sure to call {company} by {phone}, email us at {email}. If you are having computer problems, right now is a good time to stay away from Office Depot.

Information Technology News & Information

Intelligent Business Applications To Accelerate Your Business’ Digital Transformation

Transform Your Small Business With Intelligent Business Applications To Make Life Easier Is your business halted by precious time filling out invoices? Are you struggling with organizing your workflow outside of the office? Or do you need smarter ways to handle your databases? Intelligent business applications may hold the key to unlocking technology solutions that will make your business stronger and run better. From expense trackers, to conferencing scheduling services, mobile desktop operation or workflow assignments, it’s easier to accelerate your business through digital transformations. Cloud services offer tailored apps that allow you to target individual business needs such as operations, sales automation, reporting and customer interaction. With a grounding in advanced analytics and more intelligent computing, utilizing business applications will allow you to push forward through the stumbling blocks of traditional brick and mortar business operations. Microsoft has spent years and billions of dollars of investment on artificial intelligence research focused on individual and organizational achievement. This has been embodied in products like Office 365, Bing Predicts, Skype Translator and Dynamics 365 that help to improve office function, accelerate supply chain management, streamline operations and move more goods and services through the selling process. Built-in intelligence capabilities in Dynamics 365 in particular, allows this application to highlight consumer behaviors, predict services and responses, gather relationship insights, score leads and opportunities and promote cross selling. Microsoft has also branched out to offer intelligent business applications geared towards specific fields or industries, such as its Dynamics 365 for Customer Insights offering which provides more customer focused analytics abilities across CRM, ERP, web social and other digital sources allowing you to enhance your engagement and performance. A further development to Dynamics 365 focuses on a common data model which allows users to build their own custom apps via a professional developer system. The same common data model is used in partner solutions, allowing your business the easy opportunity of extending your capabilities further within your industry to the function of specific apps in its AppSource. Implementing intelligent business applications into your organization puts you on a more competitive technological field. Using these solutions in your business can do away with many of the clunky processes that can severely slow down transactions and workflow and cost you precious time and money. The administration of more intelligent business applications offer both physical and economical benefits that can help to ensure your company’s long term success in a vast digital world.

Information Technology News & Information

Sizeable HIPAA Settlement Highlights Importance of Security Risk Management

Yet another data breach of sensitive information involving a healthcare organization has highlighted the extreme need for security risk management amongst those at-risk facilities and organizations with the most liabilities to mitigate. An October18, 2016 press release from HHS.gov (Dept. of Health and Human Services) related the details of the incident, which has cost St. Joseph Health $2.14 million in HIPAA fines due to lack of appropriate data security measures and failing to meet HIPAA compliance standards. The HIPAA Violation Details from HHS On February 14, 2012, St. Joseph Health (SJH) of Irvine, CA, reported to the U.S. Department of Health and Human Services, Office for Civil Rights (OCR) that certain files it created for its participation in the Meaningful Use Program, which contained electronic protected health information (ePHI), were publicly accessible on the internet from February 2011 until February 2012, via Google and possibly other internet search engines. The server purchased by SJH to store the files included a file sharing application with default settings that allowed anyone with an internet connection to access them. Upon implementation of this server and the file sharing application, SJH failed to examine or modify it. Consequently, the public had unrestricted access to PDF files containing the ePHI of 31,800 individuals, including patient names, health statuses, diagnoses, and demographic information. St. Joseph Health has agreed to settle potential violations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy and Security Rules following the report that files containing ePHI were publicly accessible through internet search engines from 2011 until 2012. SJH, a nonprofit integrated Catholic health care delivery system sponsored by the St. Joseph Health Ministry, will pay a settlement amount of $2,140,500 and adopt a comprehensive corrective action plan. SJH’s range of services includes 14 acute care hospitals, home health agencies, hospice care, outpatient services, skilled nursing facilities, community clinics and physician organizations throughout California and in parts of Texas and New Mexico. “Entities must not only conduct a comprehensive risk analysis, but must also evaluate and address potential security risks when implementing enterprise changes impacting ePHI,” said OCR Director Jocelyn Samuels. “The HIPAA Security Rule’s specific requirements to address environmental and operational changes are critical for the protection of patient information.” In addition to the $2,140,500 settlement levied against it, SJH has agreed to a corrective action plan that requires the organization to: Conduct an enterprise-wide risk analysis Develop and implement a risk management plan Revise its information security policies and procedures, and Adequately train its staff on these policies and procedures. The Resolution Agreement and Corrective Action Plan may be found on the OCR website at http://www.hhs.gov/hipaa/for-professionals/compliance-enforcement/agreements/sjh. Get Better Information Security Management Now If you require a consultation on getting better IT and data security risk management tools and policies in place for your organization, then you’ll want to speak to an IT consultant at {company}, which is a leader in IT security and services. Call us at {phone}, or email us at {email} today for more information.