Blog

July 24th, 2015

164_iPhone_BIt’s Friday night, and you’re getting ready to go out for the evening. You’ve got your wallet, keys, and extra cash - you’re good to go. You quickly glance at your iPhone to check the time, and that’s when you notice the problem all iOS users dread. You have 20% battery! While you do have access to the power supply in your car for the next 15 minutes or so, after that you’re on your own. So what can you do to get the most out of your charge in a limited amount of time? Here are four steps below that can help.

Put your iPhone in Airplane mode

The key ingredient to supercharging your iPhone in the shortest amount of time is to switch it to Airplane mode. By doing this, you essentially shut your phone off from the outside world so it’s unable to receive calls, texts, push notifications or other information. Additionally, your iPhone will be unable to search for a wireless network or better signal while in this mode. And because it’s not wasting power with any of these processes, that electricity is instead directed to your iPhone’s battery which in turn allows it to charge faster.

Take off your iPhone case

Funny as it may sound, your iPhone case may actually be slowing down the speed of your battery charge. Apple’s consumer website notes that their products don’t do well in the heat. And when it comes to iPhone, certain cases can create excess heat - which can have an effect on your battery capacity. What does this mean for you? If you have a case on your iPhone, take it off when you’re charging it.

Use an iPad adaptor

An iPad adaptor, which is about twice the size of the small adaptor that’s included with your iPhone, reportedly charges an iPhone 40% faster than its native counterpart. Therefore, if you have an iPad charger, use it.

Turn off your display, and don’t use your iPhone

As already mentioned with Airplane mode, the more your iPhone is in use the less power it will have leftover to store in your battery. While Airplane mode prevents outside forces from sucking up power, you too can also not use your phone during this time to maximize the rate at which the battery charges. To do this, make sure you turn off your display, and then simply set your iPhone aside and leave it alone.

Want more tips to get the most out of your iPhone? Curious to learn about the latest iPhone news and updates? Get in touch now.

Published with permission from TechAdvisory.org. Source.

Topic iPhone
July 22nd, 2015

164_Sec_BSince many of us out there have been using the internet for decades, it’s likely that most of us have had our systems infected by malware at one point or another. But how many of us actually know what the differences are between malware, viruses, trojans, and other online threats? For those without a clue, here’s a description of four of the most common ones and the security measures you can take to keep your business protected.

Malware

Malware is the short version of the word malicious software. And this is a general term that encompasses many types of online threats including spyware, viruses, worms, trojans, adware, ransomware and more. Though you likely already know this, the purpose of malware is to specifically infect and harm your computer and potentially steal your information.

But how do the different types of malware differ from one another? How can you protect your business from them? Let’s take a look at four of the most common forms of malware below.

Virus - like a virus that can infect a person, a computer virus is a contagious piece of code that infects software and then spreads from file to file on a system. When infected software or files are shared between computers, the virus then spreads to the new host.

The best way to protect yourself from viruses is with a reliable antivirus program that is kept updated. Additionally, you should be wary of any executable files you receive because viruses often come packaged in this form. For example, if you’re sent a video file, be aware that if the name includes an “exe” extension like .mov.exe, you’re almost certainly dealing with a virus.

Spyware - just like a spy, a hacker uses spyware to track your internet activities and steal your information without you being aware of it. What kind of information is likely to be stolen by Spyware? Credit card numbers and passwords are two common targets.

And if stealing your information isn’t bad enough, Spyware is also known to cause PC slowdown, especially when there is more than one program running on your system - which is usually the case with a system that’s infected.

A common mistake many people make is they assume their antivirus software automatically protects them from Spyware. This is not always true as some antivirus isn’t designed to catch spyware. If you’re unsure if your antivirus prevents Spyware, get verification from your vendor. And for those that are already suffering from Spyware infestation, two programs that work wonders to clean it out are Malwarebytes and SuperAntiSpyware.

Worms - similar to viruses, worms also replicate themselves and spread when they infect a computer. The difference, however, between a worm and a virus is that a worm doesn’t require the help of a human or host program to spread. Instead, they self-replicate and spread across networks without the guidance of a hacker or a file/program to latch onto.

In addition to a reliable antivirus software, to prevent worms from infecting your system you should ensure your firewall is activated and working properly.

Trojan - like the trojan horse from ancient greek mythology, this type of malware is disguised as a safe program designed to fool users, so that they unwittingly install it on their own system, and later are sabotaged by it. Generally, the hacker uses a trojan to steal both financial and personal information. It can do this by creating a “backdoor” to your computer that allows the hacker to remotely control it.

Similar to the other malware mentioned above, antivirus software is a dependable way to protect yourself against trojans. For further safety, it’s wise to not open up suspicious attachments, and also ensure that your staff members aren't downloading any programs or applications illegally at the office - as this is a favorite place hackers like to hide trojans.

Curious to learn about other common malware that can cause trouble for business owners? Want to upgrade your existing network security system? Give us a call today, we’re sure we can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
July 15th, 2015

164_Prod_BPeople like to speculate about what the most disruptive productivity killers are in offices around the country, but do they really have a clue? It’s easy to point fingers at email, social media, or lack of discipline as sources of common distractions, but what are the real issues? In a survey of 2,175 hiring and human resource managers released by CareerBuilder last month, the true sources of lost productivity on the job are revealed.

Here are the top 10 productivity busters according to CareerBuilder’s June 2015 survey.

  1. 52% - Cellphones & texting
  2. 44% - Internet
  3. 37% - Gossip
  4. 36% - Social media
  5. 31% - Email
  6. 27% - Coworkers chatting
  7. 26% - Meetings
  8. 27% - Snack and/or smoke breaks
  9. 17% - Loud coworkers
  10. 10% - Sitting in a cubicle

Why are these findings a big deal?

According to the managers who took the survey, the consequences of these distractions can be pretty severe. A few examples they gave were lower quality of work, dissatisfied employees who have to pick up the slack of lower performers, missed deadlines, and even loss of revenue.

So how do you prevent these productivity killers from disrupting your business?

The chief human resources officer at CareerBuilder mentioned that one of the most effective ways to increase productivity is to simply take a break, which may come as quite a surprise since “Snack and/or smoke breaks” is listed as number 8 for productivity killers.

However, it should be noted that not all breaks are created equal. Listening to loud music or getting caught up in gossip on social media may not actually give employees the sense of rejuvenation they need when they return to work. They key is for staff members to take a break that will re-energize and give them a fresh focus. Some suggestions are to simply take a walk or perform some form of light exercise or stretching.

On a more humorous note, the survey also revealed some of the more unusual non-work activities employees partook in while on the clock. Employers reportedly found their staff doing everything from taking a nap on the CEO’s couch, searching for a mail order bride, and even taking a sponge bath in the restroom sink.

Want more tips on how to boost employee productivity. Curious to see how technology can help? Send us a message today.

Published with permission from TechAdvisory.org. Source.

Topic Productivity
July 8th, 2015

164_Sec_BA picture is worth a thousand words - and now a selfie may even be worth more. Later this year, MasterCard plans to jump into the facial recognition-based trend of online security with an app that allows users to verify online purchases with a selfie. But is this technology secure? Will it replace traditional passwords for good? Here’s what you need to know.

At the beginning of this autumn, MasterCard will acquire the help of 500 customers to test out a new application that enables people to verify their identity and authenticate online transactions with a facial scan. What does this mean? Instead of using a traditional password at the online checkout, MasterCard wants to give you the option to snap a selfie instead. According to the credit card giant, they’ve partnered with every smartphone company in the business to make this mode of identity verification possible.

Why is this happening?

A quote from Ajay Bhalla, security expert at MasterCard, suggests this is an attempt by the credit card giant to appeal to a younger crowd of digital natives. "The new generation, which is into selfies...I think they'll find it cool. They'll embrace it," Bhalla recently said.

That said, the “cool” appeal to youth is likely not the only reason for this change. The firm is likely attempting to make online purchases both more secure and more convenient.

How it works

To use this technology, users will have to download a dedicated app, which they can then use to take a photo of themselves at checkout. But how does MasterCard prevent a thief from using a photo of you to fake your verification? Simple - the app requires you to blink to prove that you’re a living, breathing human being.

However, it’s been noted by critics that, in today’s technological world, even a blink can be animated on a static photo. This leaves those of us with security concerns wondering whether MasterCard will make this app more secure before it’s released.

Note as well, though, that MasterCard is not getting rid of traditional passwords completely. Users will still have the option of the more conventional method of verification, as well as the choice of fingerprint scanning to check your identity.

Is this where the future of online security is headed?

With the release due later this year of a similar Windows 10 security application to identify users using biometrics, it appears that this is where the future of online security is headed. And with ever more applications and online services requiring a password, it is becoming increasingly difficult for the average web user to create one that is both unique and secure for each individual service. So whether it’s facial recognition, a fingerprint scan or some other technology that’s yet to be perfected, it seems as though some sort of more advanced security solution is inevitable.

Want more of the latest security news? Looking to implement new security to protect your IT infrastructure from cyber threats? Get in touch today.

Published with permission from TechAdvisory.org. Source.

Topic Security
July 6th, 2015

HealthcareIT_Jun22_AWe’ve been hearing about nanotechnology for a while now, but it still seems a long way off. However, recent advancements in nanotechnology could revolutionize the healthcare and medical device industry, and change the landscape of healthcare delivery forever. Nanotechnology, the science of extremely small materials, holds the key to improving healthcare, from delivering drugs more effectively to providing better patient care and much more. You’re truly missing out if you’re not taking advantage of this groundbreaking innovation. Here’s how nanotechnology could change healthcare for the better.

Nanotechnology and cancer

The traditional method for curing cancer is chemotherapy, whereby patients take certain drugs to kill cancer cells before they spread. The powerful medication circulates in the bloodstream and directly damages the cancer cells that are growing and multiplying. But chemotherapy has the unfortunate side effect of also killing regular cells, which makes patients extremely sick and susceptible to other ailments.

Through the use of magnetic nanoparticles in a miniature resonance sensor, doctors are able to detect cancer early, increasing the patient’s chance of survival. Scientists have started using nanotechnology to devise a highly specific method of killing cancer cells. The process involves inserting nanotubes into cancer cells and exposing the tissue to laser light, heating up the nanotubes and killing the cancer cells while leaving the healthy cells unharmed.

Nanotechnology and brain disorders

Nanotechnology has made it possible for researchers to collect in-depth data on the human brain. By using nano-scale diamond particles, the brain’s activities are converted into frequencies of light that can be registered by external sensors, allowing researchers to study the brain in much greater detail.

With a microscopic size of just a billionth of a millimeter, nanoparticles are able to cross the blood brain barrier and access the brain’s remote areas. They have also shown tremendous potential in being a useful alternative to diagnosing and treating neurodegenerative diseases.

Nanotechnology and diagnostics

Nanotechnology has the potential to revolutionize the way we collect medical data. Doctors are able to distribute nano-scale diagnostic devices throughout the body in order to detect chemical changes on the spot. This allows for real-time tracking of a patient’s health status.

Diagnosis techniques based on nanotechnology also provide several advantages, including complete diagnosis and treatment with just one visit to the doctor, rather than needing multiple follow-up visits. Another benefit is the accurate and early detection of diseases, which allows doctors to potentially stop diseases before they can cause more damage to the patient.

Want to learn how you can implement nanotechnology into your medical practices? Drop us a line today and get advice from our experts.

Published with permission from TechAdvisory.org. Source.

July 1st, 2015

BusinessValue_Jun16_BCompanies need to effectively advertise their products and services if they are to stay competitive in today’s market. But choosing the right marketing approach for your business is not easy, and you could end up spending more money on advertising that you actually make from it. This is where a well thought-out marketing strategy can help. Let’s take a look at some online marketing tips to help you plan, execute, and monitor your advertising campaigns.

Prioritize blogging

Blogging is an excellent marketing tool for businesses. Unfortunately most companies don’t spend much time or effort developing their blogs, which is a huge mistake. To get the most out of your blog, you will need to write quality content that adds value for your website visitors. The benefits of having a blog increase tenfold if you publish regularly, since potential customers will see you as an expert in your field, and are more likely to purchase what you have to offer.

Advertise in the right places

There are a number of online advertising channels out there, among them Facebook Ads, Google AdWords and Youtube Ads. The question is whether you know which one is the right fit for your business. You need to spend your marketing budget on the right advertising method to gain the highest return on investment. Do some research about your potential customers and determine who they are, and what they read, watch and listen to. This way you can pinpoint the best advertising platform to ensure that you reach your target market.

Start using videos

Videos offer an excellent way to market your business. Studies show that customers are more likely to buy if they see a video about your product or service on your landing pages, so make sure you include one if you can. Be creative when you’re making videos to promote your business; you could start building an online reputation by creating instructional videos that help your potential customers solve common problems. Commenting on videos relevant to your niche is also an effective way to increase your brand visibility.

Be active on social media

Prudent businesses are aware of the importance of establishing a social media presence through the main social networks like Facebook and Twitter. But simply posting articles or links is not going to offer many marketing benefits for your business. You’ll need to go the extra mile to maximize the benefits of social media. Some tips include taking the time to respond to your followers’ comments, keeping your profile updated and fresh with new information, and following and sharing content from other users.

Make sure your website is responsive

More and more of us are using mobile devices to browse the Internet and look for local products and services. Make the effort to ensure your website is mobile-friendly and automatically scales to fit all screen sizes, so that it is accessible and functional for mobile users. Major search engines now penalize non-responsive websites by lowering their search rankings when viewed on mobile devices, so you’ll need to adapt accordingly to avoid their wrath.

Contact us today and learn how our IT services can help you gain more customers and add value to your business.

Published with permission from TechAdvisory.org. Source.

June 30th, 2015

Productivity_Jun17_BStaying productive is crucial to keep up in today’s competitive business environment. But while it’s one thing to acknowledge the idea, actually keeping productivity high is another story entirely. And while you might seek expert advice, the truth is that a lot of it doesn’t in fact work. To that end, let’s take a look at some false productivity tips and how to fix them.

Don’t check email first thing in the morning

What’s wrong with this when it sounds like such a good tip? Well, reading and responding to email can derail your entire morning. Your ten minutes spent reviewing emails turns into half an hour, and suddenly you’re late for work. And in many industries you simply won’t have the time in the morning to go through every single email and find out what has been happening overnight.

The fix

You should check your email first thing in the morning but make sure not to respond unless it will take you less than a minute. Something that requires a simple “yes” or “no”, or that can be forwarded to someone who can take care of it for you, is fine. But for anything else that requires research or a longer response, mark the email as “unread” and go back to it later when you have more time. You can also add it to your to-do list so you’ll be sure to check it later. Skimming emails in the morning is a particularly good use of commuting time even if you can’t respond right away, plus it can help you prepare for your day by giving you an idea of what lies ahead.

Tackle the hardest task first

While this sounds reasonable, in most cases your hardest task can really set you back time-wise. Plus, without proper planning in terms of the time, resources and energy you need for it, tackling the hardest job first might end up deflating your hopes of a productive day.

The fix

Instead of starting the day with your most difficult task, build your confidence by starting with something smaller and easier. Simpler tasks will help get your momentum going and ease you into a productive mode. You could also cut that difficult project into smaller bite-sized to-dos, so you can tackle them individually without burning out.

Make one to-do list for everything

While it’s a good idea to get everything out of your head and down onto paper, having just one go-to list for all the things you need to get done is a huge mistake. Why? It can be quite the headache to pick tasks off a never-ending list. Once you see that long list, you’re more likely to be demotivated before you even get started on a task.

The fix

Write everything you need to do onto a list, then rewrite your list into specific, actionable tasks. Break your lists up into a work list, home list, side project list and so on. Having multiple lists that detail the specifics of what you need to do makes it easier for your brain to digest all this information, instead of having to wade through numerous things that you can’t possibly do all at the same time. Keeping your lists separate will help you stay focused on what really needs to get done first.

Stop multitasking

You’re already really busy doing just one thing, so it’s a bad idea to risk compromising the quality of your work by multitasking, right? Wrong! In today’s fast-paced world, you multitask without even knowing, whether it’s by listening to music while working, or when you’re reading an advertizing billboard while walking along the street.

The fix

Be selective with what you choose to juggle! For instance, walking and listening are two tasks that complement each other, whereas it can be too hard for the brain to split itself between simultaneously typing and listening.

It’s important to keep in mind that just because something is named “the best advice” doesn’t mean it’s best for you. Looking to find out more about how to boost productivity in your business? Give us a call; we’re sure we can help.

Published with permission from TechAdvisory.org. Source.

Topic Productivity
June 30th, 2015

164_Mic_BAre you the type of person who uses one master password for all your web logins, or do you have dozens of individual ones named after your favorite sport teams or muscle cars? Whichever you are, either scenario comes with drawbacks. Have only one password and you’re left feeling anxious it might get stolen. Have several and you may constantly forget them and be unable to login. Wouldn’t it be great if all these passwords just went away! Well, they actually just might. Windows 10 is working on making it possible.

The problem with passwords

The problem with passwords is simple - they can be stolen. And from Facebook to iTunes to Flickr and thousands more, nearly every major website and thousands of niche ones require a password to use. And because we Internet users are logging onto dozens of these sites and services everyday, it’s virtually impossible for us to create a unique, complex password for each one. So people resort to using only a handful of passwords, or even just one master password, since it’s easier. But of course, this poses a security risk. So what’s an Internet user to do?

Microsoft Windows 10 is pioneering a new technology that is ready to flip this dated system on its head and eliminate the password problem for good.

Login to your devices with biometrics

Passwords can be stolen easily, but how easy is it to steal a person’s physicality? Microsoft’s new technology, named Hello, uses biometrics - such as your fingerprint, or face or iris scan - to log into your computer, laptop or other device. This ensures that no one can login to your device but you.

Well, what about using a photograph to login instead, you might ask? It won’t work. Using technology that takes a detailed map of your face in 3D, Hello is trained to reject the token photograph or selfie on login attempt. This makes it virtually impossible for anyone, besides you, to login to your device.

Use biometrics to login on the web

Logging into your computer with biometrics is great, but what most users really want is a more secure solution to login to websites while not having to remember a bazillion passwords. This is where Microsoft’s Passport comes in. Passport allows you to login into applications and online content without the need for a password. For example, instead of using your typical password to sign into your Microsoft Windows Account, you can now use Windows 10 facial recognition (or other biometrics) to log you in instead. That means you can access Skype, Xbox Live, Office 365 and more without a standard password. In addition to your Microsoft Windows Account, you’ll be able to use the biometric capabilities of Passport to access thousands of enterprise Azure Active Directory online services. Bear in mind, though, that it will be quite some time before you can use Passport to replace all your standard logins, since not every website has implemented this technology yet.

Want to hear more exciting Windows 10 news, or need assistance with your Windows device? Get in touch with one of our technology experts today.

Published with permission from TechAdvisory.org. Source.

June 29th, 2015

Windows_Jun18_BFollowing the let-down that was Windows 8, Microsoft is keen to impress - so much so that it’s skipped number 9 and jumped right to Windows 10. Now the new operating system’s release has been confirmed for July 29, and Windows-based small businesses are clamoring to try out its impressive new features. Here is the rundown of the things you need to know before you spend your summer upping the ante with Windows 10.

You can get it for free

They say the best things in life are free, and that might just be the case with Windows 10. Microsoft has kept its word about making its newest operating system free to access - at least if you’re currently running an authentic version of Windows 7 or 8.1, its two most recent releases. You’ll enjoy a free lifetime upgrade to Windows 10 provided you make the move within the next year and, better still, it’s an automatic upgrade directly from your existing Windows 7 or 8.1 interface. If you’re running an older version of Windows, you’ll need to make a fresh install and you’ll also need to pay - the various available versions of Windows 10 are expected to retail starting at $119.

It’s being launched in phases

Although the official release date is July 29, in reality Microsoft is expected to undertake a phased launch. This means that you might not end up using the brand new Windows 10 on July 29 itself - instead, Microsoft is likely to make the new operating system available to desktop and laptop users first, and only later to mobile and other devices. What’s more, the firm already has its next move in the pipeline. Upgrade and update plans for Windows 10 are anticipated to be on the way in two phases, in June and October 2016. But we are expecting these changes, codenamed Redstone, to come in the form of more minor tweaks to the Windows 10 infrastructure rather than a full overhaul.

It’s the last you’ll see of Windows

Microsoft has made no secret of the fact that it sees Windows 10 as the operating system’s final release. But that’s not quite as ultimate as it sounds - this is not really the end of Windows. Instead, what we’re seeing is the transition of Windows from a product to a service. Microsoft envisions a future where, instead of major new versions of Windows emerging every few years, there are regular improvements and updates - far beyond the WIndows Updates that we know at the moment.

It’s likely that version numbers will come to play far less of a role in system updates in the future - in much the same way as mobile apps operate, we’ll instead settle into enjoying a frequently updated service that incorporates the latest features Microsoft has developed. And while some have expressed fears that this could lead to home and business users being tied into a subscription model in order to stay up to date, Microsoft appears committed to ensuring that ongoing upgrades are free.

Ready to make the leap to Windows 10? Want to find out how best to make the transition with minimal disruption to your business? Give us a call and let us walk you through it.

Published with permission from TechAdvisory.org. Source.

June 29th, 2015

BusinessContinuity_Jun25_BData is essential for running an organization, and it is certainly the central component of any business continuity plan. Without immediate and constant access to data, your business will come to a grinding halt. Worse still, in the event of a disaster you could risk losing valuable data if you don’t have a backup strategy in place. Backing up data should be at the top of your list of priorities, so here are some devices you can use to protect your data.

There’s no one-size-fits-all solution when it comes to data backups. You’ll want to consider the pros and cons of each of the backup devices below before making a purchase.

USB stick

USB flash drives are basically miniature hard drives that you connect to your computer using a USB port. The drives are extremely cheap, with prices depending on their capacity. They’re also portable, and can be used to backup information from several computers to the same drive.

Although USB sticks are highly convenient, they’re still not a complete backup solution, and are best suited for intermediate backups, such as storing file recovery programs or critical business documents.

External hard drive

An external hard drive is perfect when used as backup storage media. It has the lowest cost per gigabyte when compared to the other backup devices out there. External hard drives use the same plug-and-play functionality as USB sticks, so you can plug the drive into your computer and immediately start selecting the files you want to backup. The transfer rate is also very fast, and you can backup a large amount of data within seconds.

One of the evident drawbacks of using an external hard drive is that you’ll need to update your backups on a regular basis, or else new files won’t be included. There’s also the risk of the device being stolen or misused. For instance, a colleague may take your drive when you’re away from your desk, or a disgruntled employee may copy all of your important business files and take it with them when quitting.

Network attached storage

Network attached storage, or NAS for short, is a dedicated device with its own IP address. It can be used as a multimedia server, and can function as an email or lightweight database server. NAS offers data redundancy, meaning it will generate a backup of your backups, so you can ensure your files are fully protected.

The main downside of NAS is its inability to scale beyond the limits of the system; you have to purchase additional hard drive bays when you need more capacity. You also have to take full responsibility for data security if you’re implementing NAS.

Cloud storage

Cloud storage is becoming more and more popular among businesses of all sizes, due to its many benefits such as allowing users to access data anywhere on smartphone devices, as well as enabling you to work with the most current hardware and up-to-date software. It is also affordable, since you’ll only have to pay for what you use. What’s more, cloud computing is very convenient, because your service provider will take care of the installation, management, and maintenance processes.

On the downside, some cloud service providers don’t employ sufficient security measures on their systems, so your data could be exposed to potential cybersecurity threats. This means that it is not always the ideal solution for companies dealing with very sensitive data - medical practices and law firms, for example. Predicting costs can also be hard; if your business is growing rapidly, then you might find you have not adequately planned for incremental costs.

Choosing the best system for backup is a critical decision that will impact your business on a daily basis. There are trade-offs among backup devices, which is why you need to choose the solution - or solutions - best suited to your business. Contact us today and our experts will assess your company’s needs and provide the best backup solutions for you.

Published with permission from TechAdvisory.org. Source.