Our Blog

December 2nd, 2016

2016december2_apple_bAlthough iPhone bugs and malware are typically unheard of, there’s one circulating the web that you should be aware of right now. The bug, which was discovered in Reddit, is a brief, five-second video that when played causes your iPhone to freeze and ultimately crash. So far the malicious video’s intentions are still unknown, but this trap can be easily avoided.

What is the video? As mentioned, the MP4 video initially seems innocuous enough. It portrays a man standing by a bed with the word "honey" across the screen. After one or two minutes of viewing the video, the affected iPhone becomes sluggish. It then freezes and becomes unresponsive, ultimately requiring a reset.

It appears that the bug takes advantage of a flaw within iOS memory management. The corrupted video generates a loop that causes the affected Apple device to use more memory, leading to a temporary crash.

Reports have shown that the MP4 is hosted on a video-sharing site, Miaopai. Since then, the video has been distributed in other social media platforms, online forums, and, more commonly, as a link via iMessage.

Tests have also found that the video effects the latest iOS version (iOS 10.1 and 10.2) all the way to iOS 5. So far, the bug doesn’t seem to affect other non iOS products. But regardless, all users should be careful of the video.

Although this video’s effects may seem worrying, there is a fix to the problems caused by the corrupt clip.

How to perform a hard restart The only way to recover from the crash is to do perform a hard restart. To do this, you simply have to hold down the power button and home button for a few seconds.

As for the iPhone 7, all you need to do is hold the power button and volume decrease buttons simultaneously to force a reset. In both cases, just hold the buttons until the Apple logo appears, and your device should restart normally.

Always be careful Even though it’s easy enough to fix, it’s probably best to avoid the crash bug altogether. Soon, Apple will introduce a new security patch for this vulnerability, but until the update is released, you should avoid clicking on suspicious MP4 video links no matter what platform you use.

And this is the same for other videos, URLs, photos, emails, and websites you encounter on the web. When it comes to traversing online worlds, it’s imperative to develop a critical mindset for everything you see in the internet. While this particular bug only slows down your Apple device, you might not be so lucky the next time you unwittingly click on an unknown iMessage link or email attachment.

If there’s any lesson we can learn here, it’s that you can’t be complacent no matter how secure Apple platforms may be. Want to protect your Apple device from future security incidents like these? Contact us today, and we’ll provide you with sound advice and security solutions to nip these problems in the bud.

Published with permission from TechAdvisory.org. Source.

Topic Apple
December 1st, 2016

2016december_virtualization_bVMWorld 2016 just wrapped up and developers are rolling out the new version of vSphere 6.5, complete with plenty of upgraded features to make your business life easier. The updated version includes new security and installation features as well as a simplified user experience. Find out about the new updates and how they can help you.

More simplified experience A program that is easier for the non-technical business owner to use is a definite plus. Developers changed the user interface to highlight options in a more logical way. Workspaces are wider and allow instant feedback options for teams working on important projects. It is also easier to install and run programs, since the majority of vSphere 6.5 versions use HTML5 instead of the cumbersome Flash-run interface.

Built-in security Security is a high-ticket concern for any virtual collaboration, and vSphere 6.5 offers a number of safety-conscious features to keep your business safe. First is the Secure Boot, which allows you to keep unauthorized programs from being loaded into your virtual space. It is particularly helpful because it keeps guest users from loading harmful programs that could affect your business. In addition to the secure booting capabilities, the vSphere 6.5 also ensures that virtual machines are encrypted at rest and as data travels between systems.

Universal app platform The new vSphere 6.5 features a universality that many older versions just couldn't handle. Not only can you use this program with the major operating systems (Linux, Mac, Windows), you can back up and update your system on the same server instead of moving it to a third-party server that may or may not be trustworthy. You can also create a workload and deploy it across one platform so it is easy to access and modify if necessary.

The new features contained within vSphere 6.5 will change the way you see the virtualization experience all around. As long as the program continues to be updated for easier use by "common" employees and business owners, vSphere's popularity and that of other hypervisor programs will continue to climb. Call us to learn more about how you can use vSphere 6.5 within your business.

Published with permission from TechAdvisory.org. Source.

November 28th, 2016

2016november28_windows_bUpdates to the Microsoft Paint program have been a long time coming, and finally, Microsoft has delivered. Recently, the company announced major innovations to this longstanding entry-level image editing program, and it renamed the application to Microsoft Paint 3D. If you find yourself wondering how the new Microsoft Paint 3D can benefit your business computing and IT work, here are some changes to Microsoft Paint that you might find useful.

With the new Microsoft Paint 3D, users will have the opportunity to create both 2D and 3D graphics and images. It is just as easy as it always was to use pen and paintbrush features to draw a 2D image, but now these images can be converted into 3D. There is also a stamp feature that allows a user to add stickers to their 2D creations to make them 3D.

Additionally, just like in the world outside of the computer, the 3D objects in Microsoft Paint 3D can be written on with pencils, pens, or paintbrushes, adding 2D imagery to 3D creations. One of the additional benefits of Microsoft Paint 3D is that the creations that users make on the app can easily be shared on social media. This makes it easier than ever before to put Microsoft Paint creations to use.

With Microsoft Paint 3D, users are also able to take images from their smart phone and transform them to 3D images in Microsoft Paint 3D. Even further, if you have a 3D printer, you can actually bring the 3D creations from your app to life.

All these new innovations make Microsoft Paint 3D an exciting development in the Microsoft product offerings. This new version of Microsoft Paint will be made available with the latest updated version of Windows 10 Creator's Studio and should be released early in 2017. If you are ready to get started with this program or want more information about what else the Microsoft Creator’s update has in store for you, contact us as soon as possible.

Published with permission from TechAdvisory.org. Source.

Topic Windows
November 25th, 2016

2016november25_security_bAs long as businesses host valuable data, cyber criminals will continue to bypass the security protocols meant to protect this data. The causes of security breaches range from device theft or loss, weak and stolen credentials, malware, and outdated systems that use ineffective security measures. And with these five tips, you can take the first step toward making sure a security breach never strikes at your precious business data.

Limitation of lateral data transfers

Employees not being educated on data sharing and security is one of the biggest reasons for internal data breaches. It’s a good idea to limit access to important data and information by restricting access privileges to only a small number of individuals. Also, you can decide to use network segmentation to cut unnecessary communication from your own network to others.

Keeping your machines and devices updated

Internal breaches might also occur when employees work with unguarded or unprotected machines. They might unknowingly download malware, which normally wouldn’t be a problem if machines were properly managed. Updating your operating systems, antivirus software, business software, and firewalls as often as possible will go a long way toward solidifying your defense systems.

Use monitoring and machine learning to sniff out abnormalities

It’s not all on your employees, however. Network administrators should employ monitoring software to prevent breaches by analyzing what is “normal” behavior and comparing that to what appears to be suspicious behavior. Cyber criminals often hide in networks to exploit them over a long period of time. Even if you miss them the first time, you should monitor suspicious activity so you can recognize impropriety and amend security policies before it goes any further.

Creating strong security passwords and credentials

No matter how often we say it, there’s always room for improvement when it comes to your passwords and login procedures. In addition to text-based credentials, you should require other methods whenever possible. Great for fortifying your network, fingerprints and smart cards, for example, are much harder for cyber criminals to fake. Regardless of which factors are used, they must be frequently updated to prevent breaches, accidental or otherwise.

Security Insurance

In the end, no system is perfect. Zero-day attacks exploit unknown gaps in security, and human error, accidental or otherwise, can never be totally prevented. And for this reason, small businesses need to start embracing cyber insurance policies. These policies help cover the damages that might occur even under a top-of-the-line security infrastructure. Considerations for selecting a policy include legal fees, first and third-party coverage, and coverage for reputation rehabilitation.

The field of cyber security is overwhelming -- even for seasoned IT professionals. But not for us. We spend our days researching and experimenting to craft the best security solutions on the market. If you're interested in one of our cutting-edge cyber-security plans, call us today.

Published with permission from TechAdvisory.org. Source.

Topic Security
November 22nd, 2016

2016november22_webandcloud_bOne of the hottest topics in tech and in business is artificial intelligence (more accurately “machine learning” or AI). Many business owners are currently looking to this technology for its potential to improve customer communications, and it is predicted that by the year 2020, 85 percent of all interactions will originate from machine learning “bots.” If you’re an e-commerce business owner who’s wondering how you can benefit from these advancements, you’re in luck. We’ve compiled a few of the most important reasons to adopt machine learning services right here in this article.

Predicting what your customers want

There are numerous ways for AI to be used in e-commerce to the benefit of both businesses and the consumer. Machine learning algorithms can, for example, identify customer habits and their interests based on search histories (both inside and outside of a specific business's site).

With the proper configuration, this service can analyze shopping behaviors to customize and tailor the online shopping experience to that specific user. Product recommendations, pairings, and promotions can target individuals, improving the customer experience, and in turn, your bottom line.

“I’m looking for something a little more…”

Machine learning is also great for cataloging products. In the past, businesses would send out dense and cumbersome product catalogs that made it difficult for customers to find what they were looking for. In the near future, customers will be able to upload photographs of an article of clothing that’s similar to what they want to purchase or pair with another. Through AI, a website will be able to analyze the photographs and create a catalog of suggestions based on data from the image for a true machine-learning solution.

Customers can still talk to a “representative”

With advances in “plain language” systems, more and more users will rely on e-commerce over face-to-face sales interactions. Machine learning is getting better at interpreting conversations, and answering with natural-sounding responses.

If the choice is either searching “Blue summer dress,” or “I’m looking for something relaxed and in a warm blue color,” which do you think would make customers’ shopping experience better?

By replicating the in-person shopping experience over the internet, businesses can shift away from brick and mortar overheads to an e-commerce-centered structure. Significant savings can be realized in the areas of capital expenditures and human resources, all while reducing the opportunity for costly human error as well.

Given all of these factors, you can see how AI could improve your e-commerce business’s potential. Believe it or not, if you’re ready to begin integrating more “machine learning” into your business model, we already have the means to make that happen. Contact us as soon as you’re ready to transform your e-commerce business into a money-making powerhouse!

Published with permission from TechAdvisory.org. Source.

Topic Web & Cloud
November 21st, 2016

2016november21_businesscontinuity_bThe astounding amount of data that businesses create on a daily, monthly, and yearly basis is totally unprecedented. And that number doesn’t show any signs of slowing, most likely reaching 1.7 terabytes per person by the year 2020. For businesses harnessing that data, this creates a major challenge: Current data storage limitations make it nearly impossible for businesses to backup all their information in a timely fashion. However, with a little creative thinking and implementation, you can ensure that you always protect the most critical information.

Too much data may sound like a good thing, but depending on your organization, backing up everything à la minute may be out of your price range or just flat out impossible with the amount of information you create. The problem then becomes: How do I structure my backup plan to prioritize the critical files? We believe the answer is analytics.

In order to avoid backing up unneeded data, you’ll require a “smarter” backup solution. This is where an experienced MSP (managed services provider) really earns its keep. We’ve spent years becoming experts in backup solutions and designing systems that keep your mission-critical data healthy, and we can offer something few others can’t: a backup solution that learns.

The first step in ensuring all of your customer information is safely duplicated and quarantined is to install sophisticated analytics engines that help determine what is most essential to your business's day-to-day operations. These ever-evolving engines will prioritize data in order of importance and translate that to a backup structure that ensures the right data is safe and sound should disaster strike.

Using analytics maintains your existing data-backup solution, but provides it with a map of what to save first, and what to leave for later. What does that mean? Drastically reduced recovery times in the event of untimely outages or disruptions. And, the use of analytics also helps increase efficiency and decrease overall backup costs by providing a better picture of what is unimportant or unnecessary.

Small- and medium-sized businesses have been the drivers of innovation for decades because, as they say, “necessity is the mother of invention.” And we’re here to deliver some good news: Whether you’re interested in implementing a cutting-edge analytics engine or simply want to start with a more straightforward solution, we’re ready to create a new system that prioritizes backups, just for you. Take a second to analyze that, then give us a call.

Published with permission from TechAdvisory.org. Source.

Topic Business
November 18th, 2016

2016november18_apple_bContrary to everyone's expectations, the new iPad Mini 5 will not be launched like other Apple products in September. People expect it to be launched in March 2017. The previous iPad Mini 4 is like the first iPad but slimmer and with additional features. iPad Mini 5 is expected to be an improved version of its predecessors. Here are the rumors circling the new product.

Among the top rumors and speculations concerning iPad Mini 5 are:

Thinner design - There are speculations that the new iPad Mini 5 will be thinner than other models. Current iPads are already 6.1mm thin, but Apple plans to set a new record with a 5mm-thick tablet. Whether or not it will do away with the headphone jack like it did for the iPhone 7 is still unclear.

New aluminum chassis - The iPad Mini 5 will have a different chassis from the previous models. The new chassis will be made from 7000-series aluminum that has been used on iPhone 6s and iPhone 6s Plus. Because the iPad will be thinner, the new chassis will ensure it is durable and will prevent the tablet from any form of bending.

Smart Connector - It is rumored that the iPad Mini 5 will use smart connectors like the iPad Pro. The tablet will have a smart keyboard and other possibilities for connecting with other accessories.

Pricing - When it comes to pricing for the tablet, Apple is expected to keep the price of the iPad Mini 5 in line with that of its predecessors. Based on the pricing of the Mini 4, the price for the Mini 5 is not expected to be the same, but there is a possibility of a slight price increase on the new product. As always, the prices are expected to be higher for larger storage capacities.

Battery - Since the new iPad Mini 5 will be slim, the battery will be small in size and capacity. The battery will be made using improved technology, ensuring it does not affect the running of the iPad.

The iPad Mini 5 is a featured product expected to be launched in 2017. Users are eagerly waiting to see whether this iteration of the iPad will change the somewhat static smart tablet market. For additional information on Apple products and other tech-related topics, go to our website, where we can answer all your questions.

Published with permission from TechAdvisory.org. Source.

Topic Apple
November 15th, 2016

2016november15_virtualization_bBusiness owners always look for ways to integrate and streamline business operations to make them cost-effective, efficient, and easy to follow. This includes computing and technology use. vSpace Pro 10 has been introduced as a way to simplify the virtual desktop infrastructure that so many businesses rely upon. If you are a business owner wondering whether vSpace Pro 10 is right for you, learn more about vSpace Pro 10 and how it works so that you can better choose the right virtual desktop platform for you and your business.

The traditional way companies make it possible for multiple employees to use company and business systems is to provide all users with their own copy of Windows so they can install the program separately on their machines. However, this can be quite cumbersome. If a patch is required for Windows, each account will need to be individually accessed and updated. This can also be expensive for businesses, as they will need to purchase individual copies of Windows and other software.

The idea behind vSpace Pro 10 is to do away with this expensive and sometimes inefficient type of virtual desktop system. vSpace Pro 10 requires a company to purchase only one copy of Windows, which is housed on what is known as a host server. Only the virtual desktop will then be customized for an individual user.

There are many reasons this can benefit a business. First of all, the maintenance costs, time, and effort will be significantly reduced because you will deal only with one copy of Windows rather than several. The initial system costs will also be much lower than alternative options.

You could also potentially save on your energy bills, as you would need to operate fewer machines at once by hosting the core operating system and multiple virtual desktops in a single central location. The best thing about vSpace Pro 10 is how simple and easy it is to use and to operate once installed, and the initial costs and installation process are simple as well. The streamlined nature and efficiency of vSpace Pro 10 make it one of the best virtual desktop platforms available for businesses today. If you would like to know more or want to get started, contact us as soon as possible.

Published with permission from TechAdvisory.org. Source.

November 11th, 2016

2016november11_windows_bWindows 10 is the newest version of Windows that aims to make the user experience more streamlined and enjoyable. However, as wonderful as the new features are, you may know nothing of them because they’ve been revealed somewhat sneakily. If you are curious about the latest Windows 10 features and how they can improve your experience, continue reading to learn more.

Groove Music Maker

One of the biggest Windows 10 features that Microsoft sneakily revealed for is a new program known as Groove Music Maker. Presumably designed to compete with Apple's Garageband application, this program allows users to create computer-generated music by using the program’s own digital instruments or by recording their own voice or instrumental work and adding sound effects. Sure, that may not be particularly earth-shattering for most SMBs, but maybe you want to experiment with a new jingle for your local ads?

Windows Store

The Windows Store will also be greatly improved with the ability to make in-app purchases directly from the Windows Store homescreen. This streamlines the experience for users who wish to purchase apps, movies, or music quickly and easily. Make sure that if you have any Windows store apps, they’re optimized for this development.

Microsoft Edge Browser

The Microsoft Edge browser will also have major improvements as well. The tab viewing and browsing process will be made easier by allowing users to set browser tiles aside for later access and use. On top of this feature, Microsoft Edge users will also be able to use scrollable tab previews that let the user get a look at what page is on each tab before they toggle back to that tab. Both these features make the web browsing process easier and help to make Microsoft Edge competitive with the features of other popular web browsers.

Windows Defender

Windows Defender, the built-in security system for Windows 10, will also be improved in these new features and updates. The software will be more user-friendly and include virus protection, firewall, computer performance features, and much more.

Windows 10 Basics

The entire base of the Windows 10 platform will be enhanced as well. Users will be able to pick up where they stopped working from other devices linked to the computer. This streamlines the user experience and can prevent information and data loss. The quick actions menu will also be adjusted so that users can more easily perform necessary actions. The accent color scheme will also be made customizable, and live tiles will be introduced to the Start Menu feature, making it easier to access your latest photos, documents, and recently used apps.

Knowing these are some of the upcoming features that Microsoft plans to add to Windows 10, you can now see how these changes will benefit you and your user experience with Windows 10. For more information about Windows 10 as it is now or will be in the future, contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Windows
November 10th, 2016

2016november10_security_bAs long as there have been salesmen, there have been scammers trying to sell useless products. Traditionally the elderly have fallen prey to cold-call fraud, but now scam artists are getting tech-smart, and it's the younger generation of computer users who are falling for scams. Let's find out just what's going on with this new trend, and why the tech-savvy are more vulnerable to it.

Results Conclude Youth is more Gullible

Microsoft recently conducted a survey of 1000 computer users of all ages and from many of the largest countries in the world to find out how many of them had been scammed by phony "technicians" claiming to be employees of Microsoft or other major computer conglomerates. The results were startling when studied demographically. Researchers discovered that seniors, who were traditionally viewed as the major victims of such fraudulent schemes, were not the most likely group to fall for the scam.

Research indicated that although seniors were most likely to buy into a telephone scam, they still did not fall for the act as much as younger age groups. The study found, in fact, that between the ages of 18 and 24, people were 2.5 times more likely to fall for the scam than seniors. Those between the ages of 25 and 34 were three times more likely than seniors to be tricked.

The scam that the Microsoft company recently studied involved the following scenario: Either a person calls claiming to be a technical support technician, or an email or pop-up alerts you that your computer is locked or otherwise compromised. In order to fix the problem, you need to call someone and pay for a program or provide access to your computer so some purported technician can solve the problem "remotely."

If you fall for this scam, you are giving them funds for a false program or access to your computer -- which also allows them access to your personal data and the ability to install malware onto your system. The study revealed that two-thirds of those surveyed (around 660 people) had experienced the scam first-hand. One in five had listened long enough to hear the story, and 1 in 10 actually gave the scammer money.

Why the Younger Demographic Became Easy Victims

While older adults often respond more to phone calls, younger people have learned to ignore phone calls, saving them from being phone victims. However, because younger adults spend the majority of their time online and often remain acutely aware of the status of their computer and online presence, they are more prone to react to a pop-up or email claiming that their computer is in danger. Nearly 60% of the adults aged 18-24 in the study say they were exposed to the scam through pop-up ads or online correspondence.

The takeaway here is simple: Cybersecurity is about more than just firewalls and antivirus software. You need to shore up the human side of your protection protocols. The best way to start is by doing some quick research on social engineering in our previous blogs, but ultimately you’ll need something a little more thorough. Contact us today for more tips and to ask about scheduling a cybersecurity training for your employees.

Published with permission from TechAdvisory.org. Source.

Topic Security