22 Nov 2018

Why you should back up your mobile devices

2018-11-29T15:45:22-07:00

Almost every modern mobile device allows you to send and receive emails, download and upload media files, store data, and even close business deals. As mobile devices have become indispensable in everyone’s personal and professional life, the security risks have also increased — and backing them up has become more critical than ever.

Malware on mobile

More than two-thirds of the world’s population use a mobile phone with internet connection, so dangers in these handy devices are to be expected. Scarier than the thought of being offline is being online and exposed to malware.

If you use your mobile devices as extensions of your work computers, backing them up is a must. Mobile phones have become as vulnerable to malware as laptops and desktops are, especially if you consider the fact that many professionals and business owners use them for emailing confidential documents and storing business-critical files.

Device disasters

Malware isn’t the only disaster that can hurt your smartphone. Because you carry it wherever you go, your device can easily be […]

Why you should back up your mobile devices2018-11-29T15:45:22-07:00
21 Nov 2018

Android mobile security threats today

2018-11-29T15:45:15-07:00

As bring your own device (BYOD) policies become common practice for companies today, business owners must keep in mind the possible cybersecurity implications of connecting more devices to the company network. If your employees are using Android devices, here are the top five security threats they need to be aware of as well as how to steer clear from them.

Unsafe devices

Sometimes, the device itself might not be safe due to faulty production or configuration. In fact, Avast recently found hundreds of Android devices that were infected out of the box.This means that the infection was not caused by users, but the malware was installed via apps somewhere along the sales and delivery process.

Malicious apps

Although Google employs strict security measures when it comes to allowing apps into the Play Store, some developers find a way to hide malicious code in their programs and still have them approved.

Simple Call Recorder, for example, tricked users into downloading an additional app, which purported to be an Adobe Flash Player […]

Android mobile security threats today2018-11-29T15:45:15-07:00
20 Nov 2018

Cloud computing or virtualization?

2018-11-29T15:45:08-07:00

Should you migrate to the cloud or virtualize your server? Both approaches have benefits, but figuring out which one is right for your organization is another story. If you’re having trouble deciding which technology is the best choice for the future of your business, this article will help you figure it out.

Differences between cloud computing and virtualization

Virtualization lets you reallocate hardware power using software. For example, many organizations virtualize an in-house server because if only 60% of a server’s computing power is needed to support the company email, it’s hard to make sure the other 40% is used efficiently.

With virtualization, you can create two virtual servers from one set of hardware. Each virtual server can be configured with just the right amount of memory and processing power for the needs of specific services such as email, data storage, and hosted telecommunications. Using IT more efficiently means you can put off buying new server hardware, save space in your office, and lower IT maintenance costs.

Cloud computing, on the […]

Cloud computing or virtualization?2018-11-29T15:45:08-07:00
19 Nov 2018

Warning on upcoming Google Chrome update

2018-11-29T15:45:01-07:00

A new version of Google Chrome will be launched in December featuring a money-saving function that will benefit millions of users. Google Chrome is already the world’s most used browser, and this feature can make it even more popular. Here’s how the new feature will work.

The money-saving warning

The Google Chrome update aims to protect users from websites with “insufficient mobile subscription information.” These are online businesses that offer subscription services, but don’t provide users with enough billing information, either due to poor website design or a deliberate attempt to deceive.

To curb this, Chrome will show a warning page that says “The page ahead may try to charge you money” and offers options to proceed or go back to the previous page. Some users may know that they’ll incur charges when they hit “proceed” but may not be aware whether the charges will be one-time or recurring. The new Chrome warning will serve as a reminder for this.

How will it benefit users?

The Chrome warning’s main benefit will be […]

Warning on upcoming Google Chrome update2018-11-29T15:45:01-07:00
16 Nov 2018

4 Qualities of an ideal VoIP distributor

2018-11-29T15:44:52-07:00

Voice over Internet Protocol (VoIP) is changing the way small- and medium-sized businesses (SMBs) communicate. That’s why many SMBs are now switching to this affordable yet feature-rich phone system. But before you decide to invest, make sure your VoIP distributor is a reputable one.

Highly trained technical support

A good VoIP distributor will provide some technical support before and after the sale. But a great VoIP distributor will offer highly skilled, well-trained, and certified support. Make sure your distributor’s IT team has been trained on the latest advances in VoIP technology, and has obtained the appropriate certifications.

Provisioning capabilities

Provisioning means providing service to the user. This includes configuring the hardware and software so they work properly. Ask your potential distributor how many stations and ports they have available, and whether or not they offer custom provisioning packages.

API services

Check whether your VoIP distributor offers advanced Application Program Interface (API) services. An API is a set of routines, protocols, and tools for building software applications that specify how software components should interact. […]

4 Qualities of an ideal VoIP distributor2018-11-29T15:44:52-07:00
15 Nov 2018

Avoid data loss in Office 365

2018-11-29T15:44:44-07:00

Microsoft understands the value of business data and the costly repercussions of losing it. That’s why they’ve released a slew of security and compliance tools for Office 365 subscribers. But given the increasing sophistication and frequency of data breaches, these cloud security solutions aren’t enough to protect your files. You’ll need to follow these seven security tips to prevent data loss in Office 365.

Take advantage of policy alerts
Establishing policy notifications in Office 365’s Compliance Center can help you meet your company’s data security obligations. For instance, policy tips can warn employees about sending confidential information anytime they’re about to send messages to contacts who aren’t listed in the company network. These preemptive warnings can prevent data leaks and also educate users on safer data sharing practices.

Secure mobile devices
Since personal smartphones and tablets are often used to access work email, calendar, contacts, and documents, securing them should be a critical part of protecting your organization’s data. Installing mobile device management features for Office 365 enables you to manage […]

Avoid data loss in Office 3652018-11-29T15:44:44-07:00
14 Nov 2018

How does end of support affect Windows users?

2018-11-29T15:44:30-07:00

Windows 7 was one of Microsoft’s popular and best-loved operating systems (OS), and most of us are still using it. But like the OSs before it, Windows 7 will eventually reach the end of its lifecycle. Mainstream end of support for Windows came into effect on January 13, 2015, but extended support won’t end until January 14, 2020. Find out what this means for you.

No more security updates

End of support for Windows means Microsoft stops issuing security updates for that operating system (OS). For example, Windows Vista and Windows XP can no longer receive security updates despite the substantial security holes found in them.

On January 14, 2020, the same will be true for Windows 7. From there, you’ll be on your own. You can still use antivirus tools and other security software for protection, but they won’t be enough to defend against bigger threats. Security software will also gradually drop support for older versions of Windows. Large organizations can sign “custom support” contracts to keep getting security […]

How does end of support affect Windows users?2018-11-29T15:44:30-07:00
13 Nov 2018

5 cloud security tips for business owners

2018-11-29T15:44:23-07:00

Cloud computing marketing can be deceiving. When you see an image of the cloud, it’s often a happy, bubbly, white puffball floating delightfully in front of a blue sky background. Its presence is both calming and reassuring, which makes you believe that anything is possible. Security would never be an issue, right? Ask one of the nearly seven million Dropbox users who had their accounts hacked, and they’ll give you a definitive answer. Sure, not every cloud provider has had security breaches, but that doesn’t mean we can take cloud security lightly. Here’s what you can do to protect yourself as a business owner.

Ask your IT provider what cloud security policies they have in place

This is probably the single most important security measure you can take. Find a trusted IT provider and have a candid conversation with them about their cloud security policies.

Ask where the physical cloud servers are located

When you have “the conversation,” don’t forget to ask about this. Believe it or not, some cloud servers […]

5 cloud security tips for business owners2018-11-29T15:44:23-07:00
9 Nov 2018

Apple’s second stash of stocking stuffers

2018-11-29T15:44:13-07:00

Leave it to tech heavyweight Apple to do two product launches within two months of each other. After launching Apple Watch Series 4 and three iPhone variants in September, here’s the additional stocking stuffers they unveiled on October 30.

The redesigned and reengineered MacBook Air

The new model for 2018 is a breath of fresh air. It has 17% less volume, a quarter of a pound lighter, and 10% thinner than its predecessor, but it is by no means a lightweight when it comes to features and capabilities:

  • Faster performance – features the 1.6GHz/3.6GHz Core i5 processor, has up to 16GB of memory, and SSDs with up to 1.5TB of storage
  • 13.3” Retina display – has over 4 million pixels, making text and images are sharper and more detailed
  • Apple T2 Security Chip – enables Touch ID, permits only trusted operating system software to boot at startup, and encrypts stored data
  • Touch ID – allows user to unlock the device, buy items using Apple Pay, or open other apps […]
Apple’s second stash of stocking stuffers2018-11-29T15:44:13-07:00
8 Nov 2018

Outdated firmware: An overlooked threat

2018-11-29T15:44:01-07:00

If most of your company’s computers are obsolete, they double or even triple your chances of experiencing a data breach. This emphasizes how dangerous it is to have outdated applications, operating systems, and even web browsers. Failing to update your firmware could expose your business to major security threats.

What is firmware?

Firmware is a basic type of software that is embedded into every piece of hardware. It cannot be uninstalled or removed, and is only compatible with the make and model of the hardware it is installed on. Think of it like a translator between your stiff and unchanging hardware and your fluid and evolving software.

For example, Windows can be installed on almost any computer, and it helps users surf the internet and watch YouTube videos. But how does Windows know how to communicate and connect with your hardware router to do all that? Firmware on your router allows you to update and modify settings so other, higher-level pieces of […]

Outdated firmware: An overlooked threat2018-11-29T15:44:01-07:00
Go to Top