Online security is something that should get everyone’s attention. Threats exist all around us: ransomware, viruses, spyware, social engineering attacks and more. There’s so much you need to know to keep your personal and business information safe. But… where do you start? As trusted cybersecurity professionals, we want to help you get educated and stay informed. That’s why during National Cybersecurity Awareness Month our goal is to give you all the information you need to stay secure. How can we help? We’ll be sharing valuable and timely information on cybersecurity in blogs, in our newsletter, and on all of your favorite social media sites. What should you do? You can also give us a call for personalized solutions by subscribing to our exclusive mailing list. Being cybersecurity aware means that you understand what the threats are and take precautions to prevent them. Here are some important reminders: Never give out your password. Don’t share it over the phone either. You never know who’s listening. Don’t click on links that are sent to you via unsolicited emails or from someone you don’t know. Use complex passwords that are difficult to guess and use different ones for different programs and computer devices. Don’t reveal your personal, business or financial information in emails. Don’t respond to email solicitations. Keep software, browsers and operating systems up to date, so they stay free of vulnerabilities. Encrypt your files to ensure unauthorized people can’t access them. Be careful when using public Wi-Fi networks – don’t conduct sensitive activities like banking or shopping with credit cards on public Wi-Fi. Remember your physical surroundings and don’t leave your computer devices unattended in public or easy-to-access areas. Only use websites that begin with “https://” when visiting online shopping, banking or other sites where you will be entering your private information. Keep your online presence private. Don’t publish your email address online in social network sites. What else should you watch out for? Malicious Emails – These typically come in the form of a request from a trustworthy organization like a financial institution. The email may urge you to act quickly, saying that your account has been compromised or a request can’t be fulfilled. The purpose of the email is to get you to provide confidential information to rob you of your money or identity credentials. Take precautions and contact the company directly to see if the email is legitimate. When you search for the company, don’t use any information in the message. Perform your own search online. Ransomware – This is a type of malware that accesses your files and locks (encrypts) then demands payment to unlock them. It’s not suggested that you pay the ransom as this is not a guarantee that you’ll get your files back. Hopefully, you have a secure, offsite copy of all your files so you can recover your data. Viruses – These are harmful computer programs that can be transmitted from device to device. Viruses operate in different ways but they are all designed to create havoc, and some provide criminals access to data on infected devices. If your computer acts irregularly, report this to your supervisor right away. This could be caused by a virus. Spyware – Spyware downloads onto your devices without your permission when you visit an unsafe website or click on a malicious attachment. It can make your computer do things like open advertisements or even track your online movements. Botnets – These are networks of computers that get infected by malware. The criminals can remotely control these botnets to gain confidential or financial information or launch an attack on your network. Spam – This is like getting junk mail but by email. These are unsolicited and unwanted. Phishing – This is where a criminal sends an email that contains a malicious link to collect personal or financial data or to infect your computer with malware and viruses. Spear phishing is where the criminal uses attacks against specific targets to collect information to gain access to IT systems or a list of customers. Spam and phishing messages aren’t limited to email. They also appear on social media sites and in text messages. Think before you act and adopt the motto: “When in doubt, throw it out!” What to do if you become a victim of cybercrime? Report it to the appropriate people in your organization, including your network administrator. If you think your financial account was compromised, contact your financial institution immediately and close your account. Watch for any unauthorized charges in your bank or credit card accounts. Need more help? We’re here for you. These are just some of the protections and service we can offer: Vulnerability Scanning & Assessments Data Loss Prevention 24/7 Remote Monitoring & Mitigation For Cyber Threats A Managed Secure Firewall Multi-Factor Authentication A Security Operations Centers with Network and Endpoint Security Monitoring Log Correlation and Monitoring Endpoint Encryption Identification and Reconfiguration of Improperly Configured Security Solutions Secure Wireless Configurations Quarterly Vulnerability Remediation Efforts IT Security Planning and Milestones Strategic Planning for IT Security Incident Response Management Breach Notification Alerts Backup Solutions to ensure you’ll always have access to your data Security Awareness Training for your employees, so they don’t accidentally expose your organization to cybercrime We hope this helps. Remember, we’ll be posting timely cybersecurity information for you in our Blogs, newsletters and more.
17 Product Groups Named-Their Production Halted and Update Support Ended After Irrefutable Evidence Uncovered Flaw in Intel Chips. The information about the Spectre attacks came to light back in January 2018. Intel and other technology firms and vendors were made aware of research findings by Paul Kocher from Spectreattack.com and Jann Horn from Google Project Zero. Paul’s collaboration team regarding the chip flaw and the notorious Spectre Attacks were: Daniel Genkin (the University of Pennsylvania and University of Maryland) Mike Hamburg (Rambus) Moritz Lipp (Graz University of Technology) Yuval Yarom (University of Adelaide and Data61) The research findings from Paul Kocher’s team and Jann Horn supported what the U.S. Department of Commerce’s agency, NIST (National Institute of Standards and Technology) found. At NIST’s, National Vulnerability Database website is the research published on January 4, 2018. Take note of these excerpts, the indirect branch prediction and branch prediction in both announcements: CVE-2017-5715 Current Description: “Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.” CVE-2017-5753 Current Description: “Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.” After the findings arrived, on January 3, 2018, Intel responds to Paul and Jann’s security research findings with this disbelieving statement: “Intel believes these exploits do not have the potential to corrupt, modify or delete data.” With the proof in front of them, Intel believed the research reports were flawed and incorrect. The idea of these acts caused by a “bug”, or a “flaw” was not possible. Their explanation was, “there are many types of computing devices, using different vendor’s operating systems and processors. All are at risk of being exploited.” But Paul’s team exploited speculative execution and had solid proof. They experimented on multiple x86 processor architectures. They used the Intel Ivy Bridge (i7-3630QM). The Intel Haswell (i7-4650U). The Intel Skylake (unspecified Xeon on Google Cloud) and finally an AMD Ryzen processor. In every test, the team observed the Spectre vulnerability across all of these CPUs. Similar results on both 32- and 64-bit modes, and both Linux and Windows. Some ARM processors also support speculative execution, and the initial testing confirmed, ARM processors could not pass the test. When they attacked using native code, they were able to read the entire victim’s memory address space, including the secrets stored within it, with ease. When they attacked using Java code, they successfully read data from the address space of the browser process running it, with zero effort. The research evidence was irrefutable. Their results showed there was a flaw in Intel chips. A day later, January 4, 2018, Intel issues updates to protect systems from security exploits. They released this statement: “Intel has developed and is rapidly issuing updates for all types of Intel-based computer systems — including personal computers and servers — that render those systems immune from both exploits (referred to as “Spectre” and “Meltdown”) reported by Google Project Zero.” Three months later on April 2, 2018, Intel’s Microcode Revision Guidance is released and what’s inside exposed the truth. In this 19-page pdf document, you will find 17 product groups listed, (color-coded in red), productions halted, and update support has ended. Looking through the guide, you will find the columns listed by Product Names, Public Name, CPUID, Platform ID, Production Status, Pre-Mitigation Production MCU, STOP deploying these MCU revs, and New Production MCU Rev. The pages with the discontinued products are below: Page 4: Bloomfield and Bloomfield Xeon Page 7: Clarksfield Page 8: Gulftown and Harpertown Xeon CO & EO Page 11: Jasper Forest Page 12: Penryn/QC Page 15: SoFIA 3GR Page 16: Wolfdale CO, MO, EO & RO, Wolfdale Xeon CO & EO Page 17: Yorkfield & Yorkfield Xeon When you review the columns, you will see one labeled STOP deploying these MCU revs. Intel’s definition for this column is as follows: Intel recommends discontinuing using these select versions of MCU that were previously released with mitigations for Variant 2 (Spectre) due to system stability issues. Intel also states in their Microcode Revision Guidance Legend: “After a comprehensive investigation of the microarchitectures and microcode capabilities for these products, Intel has determined to not release” “Microcode updates for these products for one or more reasons including, but not limited to the following:” “Micro-architectural characteristics that preclude a practical implementation of features mitigating Variant 2 (CVE-2017-5715)” “Limited Commercially Available System Software support.” “Based on customer inputs, most of these products are implemented as “closed systems” and therefore are expected to have a lower likelihood of exposure to these vulnerabilities.” As you can see, Intel’s exhaustive investigation could not discredit Paul, Jann and NIST’s research and proof. Intel decided, due to microarchitectures and microcode capabilities, for the specific products listed, not to move forward and release microcode updates for these products. If you own a PC, Mac, or Cell phone, a Spectre attack can affect your device. If you use Cloud Services, your provider’s infrastructure may be vulnerable to a Spectre attack and theft of customer’s data. If your device uses any of Intel’s older microprocessors, you may be shopping around for a new machine.
As of May 25th, 2018, if local businesses aren’t ensuring the highest possible level of data privacy, they’re risking serious financial consequences. The General Data Protection Regulation (GDPR) is coming into effect. What does this mean? All local businesses MUST be ready to take security more seriously than ever before. The EU Parliament approved GDPR in April of 2016 with enforcement set to start in a couple of weeks on May 25th, 2018. Who Must Comply with GDPR? All businesses storing or processing data of people living in the European Union must comply, regardless of where you’re located in the world. The EU is very consumer-focused and always has been. As data travels beyond the borders of the EU, GDPR is designed to help protect citizens as any company, anywhere in the world, is bound by its rules as long as they’re holding data on citizens. Businesses of all types and sizes – from small one or two person shops to multi-national corporations – must comply. There are no exceptions. For those businesses already complying with the Data Protection Act (DPA), they’re one step closer to being in compliance with GDPR. What’s the Risk of Non-Compliance? Local companies who fail to comply with face fines – up to $24 million OR 4% of annual global turnover, depending on which number is higher. In addition to fines, local companies who fail to comply will also face the devastating impact of reputational damage as most consumers won’t feel comfortable working with a company that doesn’t prioritize data privacy. What Do Local Companies Need to Know About GDPR? First and foremost, local companies need to know that compliance is not optional. Every organization should become familiar with the provisions of GDPR so they’re aware of the requirements. Here are a few key facts to know about GDPR: Strict parameters must be followed to receive consent for the use and/or storage of data. These parameters require an easily accessible form and withdrawing consent must be simple. The right to be forgotten enables consumers to request their personal data be deleted and/or erased immediately with all third-parties halting any processing of said data. In the event of a breach, notification must be done within 72 hours of becoming aware of the breach. This means all affected parties must be notified and offered information on the incident. Consumers may request to receive their personal data, in order to transmit said data to another data controller as needed. Companies must ensure data is easily accessible to provide upon request. Data protection must always be considered when designing any system or solution, which means it cannot be an afterthought or addition done after the system or solution is designed. Specific protection is in place for children as they are generally more vulnerable. When storing data relating to or involving children, parental consent must be received for children up to age 16. Essentially, local businesses will have to review their marketing processes in terms of data mining and remarketing. However, those who have already prioritized data privacy will have less work to do to ensure compliance. What Steps Must Be Taken to Ensure Compliance? Assess what needs to be done: Review all requirements of GDPR to understand how the provisions impact your company and/or which departments will be affected. Perform a complete audit: Audit what personal data is collected and stored, where the data came from, and who the data is shared with, then record your processing activities. Update all privacy notices: Privacy notices must be updated to communicate how personal data will be used and collected, as well as explaining the lawful basis for processing personal data. Verify data accessibility and portability: Verify that access requests can be accommodated in 30 days and data can be received in a commonly used, machine-readable format. Review instructions for receiving consent: These instructions will help you properly seek, record, and manage consent for the use and/or storage of data. Work with all third-party providers: You can be held responsible for breaches resulting from non-compliance on a third-party providers part, so work with email service providers, CRM providers, and more. Educate every single staff member: ALL staff members must be educated in case they come into contact with information relating to customers. Lastly, make sure you’re working with a trusted team of technology experts who can help you put all of the tips above into action. You almost certainly WILL require some changes to your information technology environment in terms of how data is stored and processed. A good {city} IT support company will help with this. You need a technology services company {city} businesses trust to help them comply with GDPR. {company} is that technology services company. Call us now at {phone} or email us at {email} to get started.
Where Did They Go? In 2017, Microsoft planned to release a lightweight version of Windows 10. This was their effort to provide a Windows solution that delivered a predictable performance by using only Microsoft-verified applications via the Microsoft Store. Microsoft also wanted to compete with the Google Chromebook and promote Windows 10 S for use in the K-12 education market. Windows 10 S was initially offered as part of the Surface Laptop which is a premium, and quite expensive product. So, this addition to the education market was quite a leap. Windows 10 S was going to be offered at a reduced price with the option to pay more to “unlock” the full Windows 10 Operating System. But Microsoft changed their minds. They realized that we don’t want to pay extra for something that should have been included, to begin with. On March 7, 2018, they said: Based on customer feedback we are simplifying the experience for our customers. Starting with the next update to Windows 10, coming soon, customers can choose to buy a new Windows 10 Home or Windows 10 Pro PC with S mode enabled, and commercial customers will be able to deploy Windows 10 Enterprise with S mode enabled. What this means is that the Windows 10 S computer has been retired. Instead, Microsoft has decided to incorporate Windows 10 S as a “mode” for all Windows 10 Operating Systems. Microsoft hopes this new approach will make it possible for their customers to start using the S mode. They say that it provides a streamlined computing experience that enhances security and performance across all editions. So, for the foreseeable future, Windows 10 S is now a configuration in the Windows 10 Pro and Windows Home computers. The S Mode will lock down Windows 10, so it can only run applications from the Microsoft Store–essentially, exactly what the dedicated Windows 10 S operating system was intended to do. Microsoft is letting Windows 10 Home users disable the S Mode free of charge. However, Windows 10 Pro customers with S Mode enabled on their device will have to pay $49 to get access to the full version of Windows 10 Pro. Should You Consider Using the S Mode? The “S” in Windows 10 S was supposed to stand for “simplicity.” Its intent was to provide a productive and secure Windows experience. Microsoft says that it’s designed for superior performance. Starting up, streaming HD video and switching across applications is much faster than with Windows 10. Windows 10 S only uses apps from the Microsoft Store and provides a safer browsing capability via Microsoft Edge. Because the applications for Windows 10 S only come from the Microsoft Store, the folks at Microsoft say that it ensures security and integrity. And they say that Microsoft Edge is more secure than using Chrome or Firefox browsers. The Windows Defender Antivirus and other security features in Windows are also included in Windows 10 S. Windows 10 S comes with built-in apps and new features like Cortana, Windows Ink and Windows Hello so you can sign on without a password. It integrates with OneDrive, so you can easily save your files to the cloud and sync them across your other devices. If you decide you want to run applications that aren’t in the Microsoft Store, you can easily switch to Windows 10 Pro (except you’ll have to pay $49 to do so). What Do Others Think About Windows 10 S? Microsoft says that 60% of their users stay with Windows 10 S when using third-party devices. And those who do switch, do so within 24 hours of setting up their device. Those who keep using Windows 10 S for a week or so, end up keeping their device in S mode (83 %). These statistics are for low-end PCs as the only high-end computer running Windows 10 S is the Surface Laptop. These users weren’t included in their survey. It looks like the Windows S Mode is here to stay. But some experts predict that it poses problems for Microsoft down the line. They believe that it’s going to confuse people. While the Home versions offer a free switch path, the charge for the Pro versions could bother users who want more premium devices. Here is another issue with this change— Microsoft says that AV/Security apps will come in the Windows 10 S mode. But what about the AV software from third-party providers? Will these applications run in the S mode? If so, this defeats the purpose of what the S mode is supposed to do. Does this mean that using these apps will hamper the promised performance in Windows 10 S? We’ll have to wait to see how Microsoft deals with this. But for now, it seems like a contradiction. Windows 10 S devices span a price range from $189 to $2,199 (for the top Surface Laptop). It’s not impossible to provide solutions for both low-end and high-end device users, but some feel this will be difficult for people to get their minds around. Windows 10 Spring Creators Update will probably be released with a different name: Windows 10 April Update. However, it’s been delayed while Microsoft rushes to fix a newly-discovered bug. Between the changes with Windows 10 S and now the next Windows 10 update, it seems there’s a lot of “plate-spinning” going on at Microsoft right now.
As you may be aware, the FBI issued a warning last week about a malware botnet called VPNFilter. This malware originated in Russia and attacks “consumer-grade” routers typically purchased from retailers such as Best Buy andor installed in homes by Internet Service Providers such as Spectrum, Time Warner, and Charter. The malware has not been found to infect commercial grade routers typically installed in your business, such as those from Cisco, Fortinet, SonicWALL or others. If you or any of your staff has one of the following routers installed at home, we recommend the Internet Service Provider be contacted for guidance. At a minimum, the router should be rebooted – and the router password should be changed to one with a fair amount of complexity. (ISP technicians have a reputation for often not changing the simple “factory default” password when they install a router.) In some cases, a router firmware upgrade may be required. The affected routers identified so far are: Linksys (Models E1200, E2500 & WRVS4400N) Mikrotik Cloud Core Routers (versions 1016, 1036 & 1072) Netgear (Models DGN2200, R6400, R7000, R8000, WNR1000 & WNR2000) QNAP (Models TS251 & TS439 Pro) QNAP NAS devices running QTS software TP-Link R600VPN While we are unable to manage the consumer-grade routers targeted in this attack, We can offer you a powerful network security appliance (router/firewall/wireless access point) that can provide commercial-grade protection at your home or office. If you have teleworkers or executives who access your network by working from home, you should be concerned about business risks created by consumer-grade routers. A relatively inexpensive corporate or business-grade firewall is likely an appropriate solution. Please let us know if you would like more information.
What Is It? What Do We Need To Know? What Should We Do? If you don’t know what the GDPR is, and if you’re not ready for it, you’re going to get caught short because this is a legal deadline and it’s coming up fast. The General Data Protection Regulation goes into effect May 25, 2018. It’s a privacy law that the European Union is enforcing to protect the personal data businesses collect. Even if your business is outside of the EU, you must comply. What is the GDPR? The GDPR affects all internet business worldwide. It’s a very complex law, so we can’t explain everything here. We’ve provided some resources below that you should check out. Keep in mind that there are many gray areas where this law is concerned. So, you should do some research to determine how the law affects your organization’s unique situation. The GDPR is an internet privacy law. All businesses, small or large, and even entrepreneurs who do business on the Internet with consumers located in the European Union need to be aware of how the law affects them. It doesn’t matter if your company is inside the EU, or anywhere else in the world– If you do business with anyone in the following countries, you must comply with this new law by May 25th: Austria Belgium Bulgaria Croatia Cyprus Czech Republic Denmark Estonia Finland France Germany Greece Hungary Ireland Italy Latvia Lithuania Luxembourg Malta Netherlands Poland Portugal Romania Slovakia Slovenia Spain Sweden United Kingdom The GDPR is a consumer data protection law. It ensures that individuals can: Access their personal data. Export their personal data. Correct errors to their personal data. Object to the processing of their personal data. Erase their personal data. The GDPR applies to the acquisition, processing, and storage of personal data – from initial gathering to final deletion of this data and every point in between. It applies specifically to personal data and anything that pertains to identifiable data such as: Names Email Addresses Physical Addresses Phone Numbers Birthdate Age Sex Race ID Numbers Nationality Citizenship Marital Status Family Data Health Data Physical Characteristics Profile Pictures Occupation Employment History Income IP Addresses Cookies (and more) This could be information you collect automatically from Google, an opt-in, or other collection method online – anything that would identify an individual. How Will The GDPR Affect My Business? If your business has a website or an email list, you may be affected. The GDPR affects any business relationship or transaction whether commercial or free where one or more of the entities are in the European Union. It’s not based on citizenship, rather location. Any business within the EU must comply with the GDPR across its entire audience. If your business is in any of the 28 European Union Member States, you must comply with the law if you conduct a transaction with anyone located anywhere. If your business is located in the U.S. and you collect data about any business or person in the EU, you must comply with the GDPR. How Should We Prepare For The GDPR? There are three requirements you must meet before May 25th. Controls and Notifications Protect personal data using appropriate security. Notify authorities of personal data breaches. Obtain appropriate consents for processing data. Keep records detailing data processing. Transparent Policies Provide clear notice of data collection. Outline processing purposes and use cases. Define data retention and deletion policies. IT and Training Train privacy personnel and employees. Audit and update data policies. Employ a Data Protection Officer (if required). Create and manage compliant vendor contracts. Some Examples Before the GDPR: Let’s say you offer a whitepaper or free video to people online. Before the GDPR, your prospect provided their information, you gave them the freebie, and the consent was assumed because they accepted your gift. Pretty easy, right? After the GDPR: You can no longer assume that their consent is given if they accept your gift. Now you must specifically obtain their consent. It must be given freely, specifically, and be unambiguous. Nor can you require them to give their consent to receive the gift. Note: This new standard applies to all of your existing lists. Beginning May 25th, you can no longer send marketing emails to anyone who hasn’t given their precise consent for you to keep their personal information. Plus, you cannot go back and ask them for their consent. You’ll need a stand-alone system to do this. What Can We Do To Comply With These Strict Rules? This is important. You must do this BEFORE May 25, 2018. Compliance/Preservation Step 1. Segment your email mailing lists into two parts. Non-EU subscribers EU-based subscribers and any unknowns You want to continue to build goodwill with your Non-EU contacts so reach out to them as you would have before. The EU-based and unknowns you’ll need to re-engage with. Here’s what we mean: Step 2. Reengage EU-based and Unknowns. Before emailing them, add additional value and content to your website. Then send them a link to your website and request their specific consent to keep their personal information. Set up a system to migrate those who give consent over to it. On May 24, 2018, you must delete anyone in this group who hasn’t consented. Remember, storing and deleting their information is considered processing. That’s why you must do this BEFORE May 25th. Breach Notification Requirements The 2018 GDPR replaces the old Data Protection Directive of 1995. The most recent GDPR breach notification requirement was enacted in April 2016. It set a higher compliance standard for data inventory, and a defined risk management process and mandatory notification to data protection authorities. Breach notification is a huge endeavor and requires involvement from everyone inside an organization. In-house tech support and outsourced Technology Service Providers should have acquired a good understanding of the consequences a data breach causes and the data breach notification requirements for their organization. They must be prepared in advance to respond to security incidents.
Experts in the tech world are giving their input on what is planned by state and local Chief Information Officers (CIOs) in terms of security for all of today’s technology. For so long, technology has existed and yet the public has taken its security for granted. But, sometime last year, giants of industry like Cisco Systems, have revealed that plans are underway to bring new and better levels of security to the cyber world. According to Britt Norwood, the head of Cisco Systems’ state, local and education sales for the western U.S., it’s time that technology had some real-life applications.[1] According to Mr. Norwood, the state and local government of the future will rely heavily on technology for its management. From Smart Cities to cloud computing, innovative breakthroughs will change life as we know it. Life will become easier while access to public services will become cheaper and more readily available. A great example is the Internet of Things. All of our medical devices and appliances are now connected via the IoT. However, these devices are extremely easy to hack and that puts consumers at risk. This reveals our ongoing need to implement stronger cybersecurity measures to protect ourselves. The government, along with the private sector now understands the importance of keeping hackers out of our systems, networks, and databases. To address these issues, a host of new and radical changes will take place over the next few years. These include four major areas as cited below. Adoption of the Internet of Things at Community Level There is no doubt that IoT has had the attention of the public sector for a few years now. Informal discussions on the implementation of IoT applications by the government in delivering services to citizens have been underway. Imagine a situation where parking meters are connected and pricing on parking are determined by the time of day. Or even an application that is able to track buses in real time to give accurate information on wait-times to patrons at bus stops. This would most definitely improve the quality of services delivered to the public. Each town and city has its own set of unique problems with delivering affordable, reliable city services. Each jurisdiction may adopt its own unique applications according to what suits them best. These applications will definitely make a positive change in the way cities and states are run. But they must include the best security to protect consumers. Cyber Security Still a Top Priority for Governments With technological advancement comes increased risk and vulnerability in terms of security. It is very important that the government stays on top of it. It would be of no use to continue investing in digitalization and increasing connectivity without having in place measures to address the issue of data breaches. That is why for the last four years the National Association of State Chief Information Officers (NASCIO) in their ‘State CIO Ten Priorities for 2017’ report, ranked security and risk concern as a top priority. According to Yejin Cooke, who is the director of government affairs for NASCIO, security and risk management are not going to lose their importance any time soon. In fact, the public is only now becoming aware of all the threats across the globe that can endanger everything from air flights to ground transportation or satellites. A society cannot operate without knowing for sure that hackers will not have access to our most important sectors. It is vital to have well-organized and comprehensive cybersecurity plans in order to counter major attacks. Some states like California and Michigan have made milestones in terms of well-laid security plans. They are setting the pace for other states. Uploading data to Cloud Priority According to Chip George, NetApp’s senior director of state and local government and education for the U.S. public sector, moving data to the cloud has proven to be a way in which governments are able to deal with financial constraints and legacy technologies. A recent survey by MeriTalk found that 76% of state and local agencies are planning to increase spending on Cloud computing.[2] State and local governments must also consider their environment so as to adopt a model that best suits them. The Cloud has three models: public, private, and hybrid. Data management can complicate issues if governments resort to relying on multiple cloud management providers. In addition, George pointed out that, “Agencies must adopt a data fabric, so that data across all cloud environments is seamlessly integrated and managed with the same set of tools, no matter the cloud provider.” In the future, when governments are trying to evaluate which model suits their needs, they will have to consider these and many other factors dealing with the proper implementation. Collaboration Tools Another mechanism that has become highly prioritized across governments is collaboration tools where centralized resources are optimized. By optimizing and centralizing technology, costs are lowered and a more streamlined cyber security platform is installed. Good collaboration tools make sense. They reduce costs. They put everyone on the same page. Conclusion Technology is here to stay, but it evolves at a rapid rate. Though this is good on some levels, when it comes to cyber security, the experts have not been able to keep up with the hackers. Cyber thieves must be stopped in order for businesses and governments to improve efficiency in service delivery, cut their costs, and protect consumers from cyber criminals. [1] https://statetechmagazine.com/article/2017/02/5-priorities-state-and-local-government-technology-year-ahead [2] https://www.meritalk.com/study/destinationcloud/
Communication is definitely made more accessible as a result of technology. Unlike previous years where people placed heavy reliance on letters and messengers, currently, people can communicate at the tap of a button. Communication is essential in any business. For people to know what is required of them in the business environment, for suppliers to know the exact quantity of products that they are required to supply, and when the supply is necessary, people need to communicate. The most successful businesses place considerable reliance on communication. Small businesses and especially, those that have just begun, often feel the need to use more affordable means of communication. With the availability of the internet, this is no longer a problem. The number of computers that a business purchases is directly influenced by the size and the income of the business. In this regard, therefore, small businesses may find themselves unable to purchase as many computers as they need. This is where smartphones come in. Currently, almost everyone in the world owns a smartphone. Smartphones have made life more comfortable. They allow people to access information everywhere and at any time due to their portability. These devices are a gem to small businesses. First of all, almost every owner and employee in small companies own smartphones. People can access their emails when traveling or out working on a job. For successful and efficient use of smartphones to access emails, small businesses must depend on reliable, practical, and affordable email applications. There are numerous applications which allow people to access their emails through mobile phones. The functionality of these applications is similar though they may provide different features. Depending on the smartphone used and the needs of the small business, smartphone users, and especially those who use iPhones, often develop preferences to specific apps over others. Google This is definitely one of the most used applications. Google provides a range of services that small businesses may find attractive. The google app allowing for access to emails called Gmail. Firstly, this app is easy to use. Gmail can be used by even novices without much training. Secondly, it is fast, compared to other apps. A particularly helpful feature of the Google email service is that if you send an email by mistake, you have the option of undoing send. This definitely saves businesses embarrassment if an incorrect email is sent by mistake. The Google application is available online at the Apple store and can be downloaded free of charge. Microsoft Outlook This application is particularly loved by iOS users. While allowing the user to access email at his or her convenience, this app enables immediate access to emails from frequent contacts without subjecting the user to looking through other unimportant emails. It sorts out these emails for you. The app allows users access to their calendar, enabling them to mark essential days and reminders. You can set up meetings right from your phone or even attend a meeting. Like the Google app, this app is available in the Apple App store. Airmail Though initially meant for Mac, this app is available for iPhone and iPad users. It integrates with Gmail, MS Exchange, IMAP, Yahoo!, AOL, Live.com, and Outlook. This app has exciting features including full inbox sync, interactive push notification, and snooze. It is an Apple Design Award winner. Spark Though not as popular as Google, Spark is a great email app for small businesses. This app group emails automatically thus enabling the user to identify the urgent emails immediately. The app is easy to use and faster than most email apps. This app may be downloaded from the App Store. Edison Mail This is one of the fastest email apps. It supports most email accounts including Yahoo and Hotmail and is available free in the App Store. Triage The primary purpose of this app is to clean up email clutter thus simplifying the process of emailing. You can download this vital app from the App Store. Inky Unlike other email apps, this app uses hashtags to organize emails and sort out the important ones from the less important ones. Basically, it applies hashtags as labels to messages. It also signs emails automatically. Get this efficient app from the App Store. Zero This app works similarly as Tinder. It allows you to sort out your emails easily by merely swiping right to keep them and left to delete them. It also sorts emails such as newsletters for you. This app is available for free in the App Store. Newton This app is available in the App Store. Unlike other services, it is not free but is subscription based. Its main feature is the send later which allows you to draft emails and send them to the recipient later on. It costs $50. Astro Controlled by an AI assistant, this app provides both email and calendar services. The Astro assistant can be asked questions and responds to numerous commands. If your business uses Slack, you can integrate with that program to send and share Slack messages. It is available free from App Store.
For many business owners, Google’s announcement to switch over to mobile-first indexing comes as a real shocker. It’s a revolutionary thing to do in a world of disruptive technology. Since the beginning of the World Wide Web, a company’s desktop website was their first and foremost consideration when developing a marketing plan. With the new changes announced by Google, all that changes. Now, a company’s mobile website is what must be in prime condition. For some business owners, this change will just be a bump in the road. For others, it’s a huge sinkhole where their profits could fall in and never be seen again. Many business owners still struggle to get their mobile website in excellent working order. One business owner commented recently, “My mobile website comes up with these huge, looming images and you can’t really read much of the text.” If this is you, then it’s time to get serious about fixing those issues. The top 5 problems that business owners face with their mobile website are: Being denied access- Users hate getting those little messages that the mobile site they’re searching for isn’t viewable on their device. Or, some say, “Mobile support coming soon.” Performance- Why can’t a mobile website just work the same as a regular one? That’s a big question with lots of answers. Sometimes the mobile device is at blame. Sometimes it’s the load speeds/internet connection. Design- Many users have landed on mobile sites where the images overlay the text, so you can’t really read anything. It’s frustrating and it usually ends with the user going someplace else to shop. URL redirects- This confounded message has been the scourge of surfing the web for many years. There are several reasons why you might get a redirect message. It could be that you typed the wrong thing in your browser. Sometimes links are broken. Other times, the website owner simply has several pages that refer to the same site and they need to do some maintenance. It can also be the result of phishing attempts. Confusing apps- There’s no excuse for this but many business owners have attempted to save money by doing it themselves or hiring a non-professional to design their app. Why is Google Doing This? Back in November 2016, Google announced their initial mobile-first indexing effort. They called it “an experiment” and it seemed like a good idea on the face of it. However, no business owners could foresee that the Tech Giant might eventually decide that mobile sites were more valuable than desktop sites. The reasons they give seem pretty concrete. Almost 60 percent of all searches are performed from a mobile device now. A report from 2015, verified that 56 percent of global search queries originate from a mobile phone. Mobile traffic was responsible for about 49 percent of all website traffic according to this report.[1] These numbers are expected to rise significantly over the next ten years. Google has a long reputation of knowing where the next big trends will take place so you can trust their word when it comes to topics like this. The only thing left to do is make sure your mobile website is amazing! The Good News Google has repeatedly said that they will transition into this new phase slowly. That’s the good news. All this will not take place overnight. Instead, Google will give business owners time to fix whatever they need to so their mobile site will be first-class. The other piece of good news is that Google has assured business owners that if they do not have a mobile site, the google bots will still continue to crawl the desktop version of the site. That means your revenue stream should not decline for lack of a high-performing mobile site. The Google announcement says, “If you only have desktop content, you will continue to be represented in our index.” Further Clarity Needed Google also made it clear that mobile-first indexing does not mean that there will now be two separate indexes performed. There will still be only one and it will focus on mobile sites, not desktop sites. The reason they cite for this is: “…To better help our primarily mobile users find what they’re looking for.” For those who don’t know, mobile-friendliness has always been a major factor in determining how a site is ranked. Of course, it’s not the only factor, but it is still a component of ranking your website. Google is quick to point out that if a non-mobile-friendly page has the best (most relevant) information, it will still rank higher than a mobile site with similar content. The Bottom Line All business owners should begin to see more traffic in their logs from Googlebot Smartphone. Google search results will contain snippets that have been generated from the content on the mobile version. Though Google has historically used the desktop version of your site for its indexing purposes, times they are a’changin’. We can either get on board with the changes or be left out in the cold. Most business owners are already hard at work making sure their mobile website is the best it can be. For those who are willing to go the extra mile, this could be a great time of increases in traffic and sales. The sites that are ready to go are the ones that consumers will flock to for all their buying needs. [1] https://searchengineland.com/report-nearly-60-percent-searches-now-mobile-devices-255025
Have you ever been in a position where you are supposed to work on an assignment or important document but you forgot your laptop or cannot access your desktop? That can be frustrating, but thanks to Microsoft, as long as you can access the internet on your phone or even tablet, you can easily resume working on your assignment. Microsoft 365 is an excellent business tool that provides you with lots of options when trying to access a saved document on another device. A closer look at Microsoft Office 365 Office 365 is Microsoft’s global offering designed to provide users with access to the company’s top-of-the-line cloud-based tools for collaboration and productivity. The service is complete with web conferencing and high definition (HD) video, calendars, business-class email, online Microsoft office suite, as well as file storage and sharing. When you stay connected to the Microsoft Cloud, you can be sure that all programs are up-to-date and available for users on a 24/7 basis. Below is a simple outline of just a few of the Microsoft 365 apps that enable us to work from any location or device. Using Outlook App on your phone to work on the go When you open your Outlook Application, you will see a calendar function, a file function, and a mail function. When you tap on the calendar function, you can see how similar it is to the one that is on the desktop, which means it will be easy for you to use. The files function will help you view all recently accessed documents on OneDrive and even some of the recently shared files—very convenient! When accessing the mail function, this is where you are able to see all files, documents, and links shared with you. You can also share a file via OneDrive. Accessing information shared via a link Simply click on the link and it will open into SharePoint, which will allow you to view the file. If you need to edit the file, open it in the word App and as soon as you start editing, anyone who has access to the file will see your edits right away. Such an incredible feature! This is great because, after editing, you don’t have to keep sending final copies of the same document to everyone on your team. Documents are updated in real time, which is a real time saver! Accessing the same information on different devices It’s frustrating to lose devices such as phones, tablets, and even your laptop. If you travel a lot, you may even damage your laptop or phone. Though this can be expensive, it’s also devastating to lose important documents. Retrieving data from a damaged phone or computer usually requires an IT expert. Data retrieval used to be such an expensive ordeal and sometimes unsuccessful. The good news is that on Microsoft 365 you don’t have to worry if you find yourself in any of the above predicaments. Here is a simple outline of how you can access your information from any device. Open any browser and type the words office.com, then log in. A page will come up with various Microsoft 365 Applications such as Word, Excel, Outlook, and services such as OneDrive. Click on the OneDrive service, which will immediately take you to all files located on OneDrive. You will then be able to access all files that have been saved to OneDrive. These files are all live so this means that any changes made, such as editing by anyone on your team, will be there. You can view, share, or edit these files. Let’s say you wish to edit a file that you recently shared with someone. Just open that file and you will see an editing option on the top right. You can do all your editing in the browser. This works with all files including Word, Excel, PowerPoint, and other Microsoft applications. All updates will immediately show up on any shared documents. There are so many other noteworthy features in Microsoft 365 that can help make your work easier. If you want to learn more about these helpful features, just visit this page: www.Microsoft.ca/GetItDone Wrap Up Losing or damaging your phone or laptop is always stressful, but you don’t have to lose any of your important documents when you work with Microsoft 365. You may be home sick for a few days, but you don’t necessarily have to get behind on your projects. It’s possible to work from anywhere using any device with Microsoft’s helpful range of products. Remember that you can work from home and even share updates in real-time with your colleagues. As long as documents are stored to Microsoft’s OneDrive, they’ll always be right at your fingertips. That’s the epitome of convenience!