Feature-loaded: Android 9 Pie is here!

Android 9 Pie is the most recent version of Google’s mobile operating system. Officially released on August 6, 2018, it is more powerful and secure than the Oreo version. Here are some new features that will make you want to have a piece of the pie. Enhanced security features In Android 9 Pie, apps won’t be able to access your microphone, camera, and SensorManager sensors while running in the background. This prevents apps from abusing legitimate permissions they have been granted. Another security enhancement is the lockdown mode. In case of an emergency, it lets you disable face- and fingerprint-based unlock, or any smart unlock options you have set up. You can enable this through Settings > Security & location > Lock screen preferences > Show lockdown option. To activate it, you just need to hold down the power button whereupon a new option will appear above the screenshot icon. When you tap the lockdown icon, your phone will immediately lock and hide all lock screen notifications. To unlock it, you’ll need to enter your PIN, pattern, or password. New accessibility menu Android Pie 9 offers a new menu with easier-to-reach shortcuts for common functions, which are especially helpful for users who need assistance and those having difficulty using Android’s gestures. To enable this menu, go to Settings > Accessibility > Accessibility Menu and turn on the Use service slider. Confirm the prompt, and a new icon to the right of the navigation bar will appear. Tapping it will bring up a large menu with shortcuts to your most commonly used functions such as volume, recent apps, and quick settings. New gesture navigation If you want a break from the usual Back, Home, and Recent buttons, you may want to try the new gesture-based system. It lets you navigate through the interface more fluidly and intuitively. To enable this, go to Settings > System > Gestures > Swipe up on Home. Here’s how the gesture system works: 1. Tap the new elongated Home button to go home. 2. The Back button will appear in its usual position. 3. Open the Recents view by swiping up on the Home button. Move left and right to view the list. Swiping up will clear a recent app, while pressing and holding an app’s icon will let you see the Split screen option. In this view, you can interact with apps to select and copy text. 4. Swipe up on the Home button twice to open your app drawer. 5. Swipe right and then hold down Home to slowly scroll between apps. Release to open the center app. 6. To switch to the previous app, swipe right quickly and release. 7. Pressing and holding the Home button will open Google Assistant as usual. Adaptive battery and brightness Adaptive Battery improved upon the Doze feature, which was introduced in Android 6 Marshmallow. Doze puts idle apps into a “deep sleep,” preventing them from draining the battery. Android 9 Pie goes a step further by learning about the user’s most utilized apps and services and adjusting rarely used apps to consume less battery. App actions App Actions predict what you want to do so you can quickly start tasks the next time you use your phone. So if you chat with coworkers on Hangouts regularly, you might see an App Action that will direct you to Hangouts. These are just five of the many new features of the Android 9 Pie. Talk to us and learn why this OS is right for you. Published with permission from TechAdvisory.org. Source.
Why too many VMs is a bad thing

Desktop virtualization allows you to deliver computing resources to workstations in your network. Those resources are packed into virtual machines (VMs), which can be deployed as easily as any file. However, there are risks associated with trying to manage an overwhelming number of VMs. The problem with VM sprawl VM sprawl is a phenomenon that occurs when there are too many virtual machines on a network. Keep in mind that VMs have the same licensing, security, and compliance requirements as your other computers and servers. So when administrators are given free rein to create as many virtual instances as they want, issues concerning the security and management of VMs begin to appear. Having too many virtual instances running at the same time exhausts server resources. In fact, a majority of virtual servers are idle, which means companies are paying for licenses they’re not using. Unused VMs are also not patched and maintained properly, enabling attackers to infiltrate a network. However, there are some things you can do to prevent VM sprawl. VM creation policies Businesses should have policies in place for limiting the creation of unnecessary VMs. For instance, you can have a policy that forbids users from deploying a new VM unless they specify a good reason. This way, they’re more likely to think twice before requesting resources they may not need. You should also place limits on how many VMs each department can create to keep your virtualized environment small and manageable. VM inventory Documenting every VM in your network should be standard protocol in your company. They should be organized by their purpose (e.g., backups, app testing, resource-intensive software usage), who they are assigned to, and when their software was last updated. This will make it easier to review which VMs are necessary to your operations and decommission the ones that no longer serve a purpose. Life cycle management For businesses with large-scale VM deployments, life cycle management tools can give you total visibility into how many VMs are running on the network, how they’re being utilized, and who created them. Such tools allow you to set time-based policies that remove VMs that were needed for only a short time (e.g., those used for app testing). This ensures you’re not wasting resources on idle VMs. Although virtualization is a powerful solution, it must be carefully managed if you want to realize its cost-cutting and efficiency-boosting benefits. If you want to truly benefit from virtualization, call us today. Published with permission from TechAdvisory.org. Source.
Scammers deriving new ways to scam via VoIP

VoIP (Voice over Internet Protocol) makes business communications simple and inexpensive. However, scammers are still finding ways to exploit VoIP, such as through “vishing scams, a new type of phishing wherein fraudsters make phone calls, pose as a business or financial partner, and request private details. The best way to prevent yourself from being scammed is by understanding how the scam works. VoIP makes it easy to create fake numbers One of the main reasons vishing scams are increasing in frequency is the ease by which cybercriminals can hide their tracks and escape with minimal risk of detection. Using a fake number, scammers can contact your employees, pretend to be a representative of a bank or government agency, ask for sensitive information — such as salary information, account numbers, and company intellectual property — and get away with it. Scammers can also manipulate local numbers to emulate multinational banks, which they will then use for various VoIP scams. VoIP is easy to set up and difficult to track It isn’t very difficult to configure a VoIP system, and this makes fraudulent phone calls or messages an easy thing to accomplish. Scammers only need to know the basics of a VoIP setup. VoIP hardware such as IP-PBXs, IP phones, and routers are also inexpensive and quite easy to access. Hackers can conveniently connect these equipment to PCs for the purposes of recording phone calls and stealing information from conversations. Also, fake numbers are difficult to track because they can be ditched at any time. And with advanced voice-changing software widely available nowadays, a vishing scam is much easier to pull off. Caller ID can be tampered with In some vishing scams, attackers don’t even have to destroy a number to cover their tracks. Instead, they can trick users into thinking that they’re talking to a legitimate Microsoft technical support staff, a PayPal representative, or a fraud investigator, simply by tampering with the caller ID. VoIP scamming is cost-efficient Traditional phones are still used for phishing scams, but they don’t compare to the efficiency VoIP affords, which allows attackers to target victims all over the globe at a fraction of the cost. Cybercriminals resort to VoIP scamming because the price per call is much lower. Vishing scammers are sneaky and resourceful, and they will exhaust all possible means to attack your systems for profit — and that includes your VoIP channels. Protecting yourself is simple To protect against VoIP-based scams, set stringent policies on information-sharing and impose strict security processes for all business communications. Informed and aware employees are key to making sure that scammers are held at bay. Protect your company against all types of scams by getting in touch with our experts today. Published with permission from TechAdvisory.org. Source.
Tips on how to best use G Suite

G Suite is Google’s powerful productivity and collaboration platform. The suite includes popular Google apps like Gmail, Docs, Sheets, chat and video-conferencing apps, and so on. Many people are already familiar with these apps, but even those who use it every day may benefit from learning a trick or two on how to further maximize G Suite apps. Monitor past activities in Google Docs Google Docs makes collaboration so easy and convenient, with members of your team able to comment, revise, suggest, and chat in real time on the same document. With the Activity feature, you can check when people last worked on a document. The Activity feature applies not just to Docs but also to Sheets and Slides. Get valuable work insights on the new business dashboard The Work Insights dashboard can provide valuable information that helps you manage your work processes better. Reports and charts can show how people use Gmail, Google Docs, Calendar, and other apps. And you can use Work Insights to see how everyone in your company uses the entire suite. You’ll get insights on how different teams are collaborating across your company. Combining data is now possible in Sheets Even those who are already quite adept at using Google Sheets may be glad to know that you can pull up data from another spreadsheet using the IMPORTRANGE function. Importing data is more useful than just copy-paste. Should you revise any data from the original spreadsheet, that will automatically update in the new spreadsheet. Close caption function in Google Slides Here’s a nifty feature when you’re presenting using Google Slides. To enable the “closed captioning” feature, click the Present option, then click on Closed Captioning. This enables Slides to transcribe whatever you’re saying on the slide. Smart Compose is on G Suite Smart Compose is a predictive writing suggestion feature that allows Gmail to intelligently autocomplete your email as you compose it. It fills in common or frequently used phrases, relevant addresses, and perhaps in the future, even your favorite greetings. It learns as you compose more emails. You can enable or disable this option in your Gmail general settings. Jamboard goes beyond the digital whiteboard Jamboard is an interactive 55-inch digital whiteboard designed to be used in conference rooms and with mobile devices. Anyone using G Suite has the Jamboard app; it’s integrated with other Google services, so you can add Docs, Sheets, and Slides to a jam. And Jamboard is designed to interact with tablets and smartphones. Anyone with a stable internet connection can collaborate, even if they’re not physically present. A quick and easy shortcut to create new files Creating a new file usually begins with going to your Drive, pressing New, then choosing the file type. Now here’s an even faster way, using your browser’s search bar. First, make sure you’re logged in to your Google account on your browser. Then in the search bar, type the G Suite file you need, followed by a period, then the word “new”. For example: For a new Google Doc, type “doc.new” in the search bar For a new Google Sheet, type “sheet.new” in the search bar For a new Google Slide, type “slide.new” in the search bar Want to know more about the latest updates on G Suite and other Google products? Get in touch with our experts who can help you become more productive. Published with permission from TechAdvisory.org. Source.
Safeguard your iPhone from phishing

Phishing scams have been around for years, and they’ve gotten smarter with time. Recently, criminals have been targeting iPhone users through a voice phishing scam that makes the call appear like it’s coming from Apple Support. Fortunately, there are simple but effective tips so you don’t fall prey to this notorious scheme. If you receive a call from a person who claims that he or she is from Apple Support and asks you to contact a certain number because Apple has supposedly suffered a security breach, do not panic, and do not call the number. Remember that customer support isn’t proactive: the company waits for your call before it addresses your issues. That Apple would reach out first is already suspicious. To verify your suspicion, you can reach out to Apple Support and ask whether the call you received was indeed from their headquarters. Unless confirmed by official sources, never follow instructions from an unverified caller or email sender. And if the sender asks you for sensitive information like your User ID or password, that should be a big red flag. Do not reveal confidential or financial information via SMS, phone call, or email. If you don’t know the person on the other line, block the number. The same goes for email: block the sender and report the message as spam. To further protect your iPhone and other devices, never click on the URLs in emails or messages from unknown senders. Doing so can open compromised web pages, or force download infected files. Only trust URLs that bear https in their addresses. The s stands for secure, and any webpage that only reads as http may be susceptible to data interception because information exchanged over these sites aren’t encrypted. It’s also a good practice to always update your email and other messaging apps because developers regularly include anti-phishing security patches when they roll out new features or versions of their software. Secure your iOS devices and your personal data. Learn more about data phishing and how to avoid them. Call us today! Published with permission from TechAdvisory.org. Source.
Single Sign-On: The key to user management

Making passwords can be tedious. From complexity requirements to minimum lengths, creating a password for each new account brings its own set of headaches. If this problem is reaching a boiling point, Single Sign-On (SSO) solutions can help. These techniques are secure, easy-to-manage, and do away with the need to manage a long list of usernames and passwords. What is SSO? Single Sign-On solutions allow you to create one username and one password that thousands of websites will recognize. If you’ve ever clicked “Login with Google” on a non-Google website, you’ve already enjoyed the benefits of SSO. It’s faster, simpler, and more secure. Now, small businesses can accomplish the same level of efficiency between their employees and cloud platforms. Instead of asking everyone in the office to track separate accounts for Office 365, Slack, Quickbooks, and whatever other cloud apps your company relies on, you can give them one set of credentials and manage what they have access to remotely. Employees come to work, enter their designated username and password, and they’re all set for the day. Why is SSO more secure? There are a number of ways to set up a small business SSO solution, but most of them focus on removing login information from your servers. Usually, you’ll provide your employees’ logins to an SSO provider (sometimes referred to as an Identity-as-a-Service provider) and each employee will receive a single login paired with a secondary authentication — like a fingerprint or an SMS to a personal device. Every time one of your employees visits a cloud platform, such as Office 365 or Google Apps, the SSO provider will verify the user’s identity and the security of the connection. If anything goes out of place, your IT provider will be notified. Should your network or any of its devices be compromised, hackers would find nothing but logins to your SSO accounts, which are meaningless without fingerprints or mobile devices. How to get started with SSO The first step when setting up a Single Sign-On solution is making sure you have a healthy and responsive IT support system in place. You need a team that is constantly available to review suspicious alerts and troubleshoot employee issues. If you don’t currently have that capacity, contact us today and we’ll help you out! Published with permission from TechAdvisory.org. Source.
Great uses for an old computer

It’s inevitable. Sooner or later, you’re going to have to replace your computer. But while it may not be as fast as when you first got it or as sleek as your new computer, your old desktop or laptop might still have a lot to offer— after upgrading it a little, that is. Here are some great uses for your old computer. As mentioned, you have to make a few upgrades on your old PC. You may want to try a lighter OS, for example. Keep in mind that the latest version of Windows or MacOS won’t work optimally without a fast processor, so a Linux-based OS, which comes in a variety of options called “distros,” would be a better option. It will make your computer feel brand new without exhausting its hardware. Popular distros options such as Ubuntu, elementary OS, and PinguyOS can be easily installed. Plus, they have similar interfaces to Windows and come with a boatload of software packages. The best part is they require a minimum of 4GB of RAM, so you won’t have to invest much at all. Once you’ve upgraded your old PC, you can start using it as a NAS server, a dedicated privacy computer, or a digital media hosting platform. Make a NAS server Network-attached storage (NAS) is a server for your home or small business network that lets you store files that need to be shared with all the computers on the network. If your old PC has at least 8GB of RAM, you can use it as your own NAS. Simply download FreeNAS, a software accessible on Windows, MacOS, or Linux, that enables you to create a shared backup of your computers. FreeNAS has access permissions and allows you to stream media to a mobile OS, like iOS and Android. But if you’d rather convert your PC into a private cloud for remote access and data backup, Tonido is a great alternative. Compatible with Mac, Windows, and Linux, this free private cloud server turns your computer into a storage website, letting you access files from anywhere on any device. Tonido offers up to 2GB of file syncing across computers, and there are even Tonido apps for iOS and Android. Secure your online privacy Install The Amnesic Incognito Live System (TAILS) on your old computer and enjoy your very own dedicated privacy PC. TAILS routes all your internet traffic and requests through TOR Project, a software that makes it difficult for anyone to track you online. All of this Linux-based software’s integrated applications like web browser, Office suite, and email software are pre-configured for robust security and privacy protection. Kick your media up a notch Looking for a way to listen to music and podcasts or watch videos on other PCs or mobile devices? Server software like Kodi can help. Kodi brings all your digital media together into one user-friendly package so you can use your old PC as an audio and video hosting platform. From there, you can play files on other devices via the internet. There are remote control apps for both iOS and Android, and even an app for Kodi playback on Amazon Fire TV. Kodi works on any Windows, MacOS, and Linux computer, and even on even rooted Android and jailbroken iOS devices. We’re always on the lookout for ways to help our clients make the most out of their technology investments. Want to know more about how to utilize hardware to your business’s advantage? Give us a call. Published with permission from TechAdvisory.org. Source.
Know all about Windows 10 build 18305 for PC

Microsoft is releasing Windows 10 build 18305 with a number of major features and improvements for the Start menu, Windows Security, Task Manager, File Explorer, and the Settings app. Start menu This now has a new single-column layout with reduced top-level tiles. This layout appears when you’re creating a new account, setting up a new device, or after performing an installation. Windows Sandbox Using hardware virtualization and Microsoft Hypervisor tech, this feature lets you build a lightweight environment to safely install and run untrusted applications without adversely affecting your installation. There’s no need to create a virtual machine, and when you’re done testing the app, the environment and app will automatically be deleted. Clipboard Build 18305 updates the Clipboard interface (Windows key + V). Every item on the clipboard is now smaller, which allows more entries to be displayed. Accounts You can now use an SMS code to sign in and continue setting up your Windows 10 account if your account is connected to your phone number. Windows Hello Instead of creating a password that is complex and easy to forget, Windows Hello lets you use a look or a touch to sign in to your Windows 10 devices. Build 18305 improves the PIN reset experience by giving the interface design for web and mobile the same look and feel. You’ll also come across the same interface design when performing actions that requires authentication, such as creating a new user account or verifying your account. Settings The Settings app has a new homepage that shows user information and provides quick access to frequently used settings. Troubleshoot Windows 10 will be able to automatically restore default settings for some services. Depending on your hardware configuration, it will adjust feature settings and apply changes to keep your device running smoothly. It will also recommend troubleshooting suggestions for non-critical issues. For example, it may recommend that you disable a setting that causes an application to crash mysteriously, until the next update becomes available. Windows Security Starting with build 18305, the Protection history page (found in Windows Security > Virus & threat protection > Threat history) will continue to list antivirus detections, but now you’ll see more details that are easier to grasp. In addition, any pending recommendation will have a red or yellow state throughout the experience in the history list. Tamper protection In Windows Security > Virus & threat protection > Virus & threat protection, you’ll find new Tamper protection settings that prevent unauthorized changes to your security settings. Final thoughts Enjoy the latest enhancements that Windows 10 build 18305 has to offer, but do be wary of installation problems, sign-in difficulties, and app crashes. To maximize the benefits while minimizing the risks, consult with us. Our experts know how to pick and implement the latest tech advancements that will further your business goals. Published with permission from TechAdvisory.org. Source.
How to manage Google reviews

Google is shaking things up yet again. Reviews from sites like Facebook and Yelp will now be displayed in search results with well-placed keywords and link-worthy content. Here’s how you can efficiently manage your business’s reviews How Google changed search results Google now automatically aggregates and includes online reviews to display in the Knowledge Panel found on the right side of the search results. This useful panel displays information like address, hours, web address, and more. Which review sites does Google include? Relevant sites vary between industries, so if, for instance, you manage a restaurant, reviews from Yelp or Zagat will likely be displayed next to your online listings. If your business is a bit more niche, however, there are a few steps you can take to determine which review sites affect you. To determine these sites, go to Google and type the following: “[your company name] reviews” – to locate sites that already have reviews on your business “[industry] reviews” – to determine industry reviews sites you should be listed on “[industry + location] reviews” – to find review boards where you can boost your local presence Then, list the review sites you found on the first page of each search query and categorize them based on their search ranking and your company’s current rating on them. After creating the list, write down an objective for each review site. This can range from getting listed on the site to improving your rating. To narrow down your choices, focus your review-generating efforts on the five most popular websites on your list, especially those that include negative reviews of your business. Getting reviews Regardless of your objectives for managing reviews, the most important thing is for people to write reviews about your products and services. With that in mind, here are a few strategies to encourage people to rave about your business. Send follow-up emails You could send a short message thanking them for purchasing your product or service, with a request for a review. Simplify the review process Many customers skip writing reviews due to the complex steps and instructions involved. You need to simplify this process by having a review site widget that customers can easily access, asking them to comment on your service before they leave your website. Offer rewards for reviews Another way to encourage people to rate your business is by presenting them with a chance to win free goods or services if they submit a review. There are a lot of steps involved in managing your online reputation, but starting early is the key to enhancing your SEO, attracting new customers, and improving your bottom line. Contact us today if you need more advice on climbing up Google’s search rankings or tips on social media management. Published with permission from TechAdvisory.org. Source.
Get your network gear ready with UPS

Clever business owners utilize an uninterruptible power supply (UPS) during disasters like fires, storms, and other emergency situations. A UPS is usually set up for desktop computers to give users enough time to save their work and progress. Another useful power-saving plan for emergency situations would be to use a UPS for networking gear. UPS for network equipment UPS systems provide backup power in case of outages and protection against power surges, which don’t just damage computers but also make you lose unsaved work. Deploying them for Wi-Fi routers and modems allows you to stay connected to the internet during these typically chaotic instances. Moreover, it makes sense to not just keep your PCs powered up, but to also have internet access during a disaster. This strategy works relatively well if your staff are predominantly laptop users, as that means you only need to juice up your Wi-Fi gear. Better than generators Although generators are indispensable for certain businesses, they also require greater upkeep. Small- and mid-sized businesses may not have enough capacity to maintain them because they typically require a utility crew who can manage high-maintenance equipment. What’s more, misusing or mishandling generators could result in generator-related fatalities. On the other hand, misusing a UPS unit could result in the loss of a day’s work, but it’s unlikely to lead to anything as extreme. Why internet access is important during a disaster UPS-supported modems or routers help you stay online for as much as 90 minutes, which should be enough time to get your bearings before power finally runs out. Internet service providers are usually prepared for catastrophes and would normally have an emergency power source to stay operational. And if you can stay online via Wi-Fi during an emergency, you get the following benefits: Internet speed that’s faster than cellular access No extra telecom costs resulting from overreliance on cellular data All devices stay online using a stable Wi-Fi connection Devices don’t have to rely on cellular data-equipped phones for internet connection Plug in your network gear now Businesses that aren’t located in disaster-prone areas probably don’t give much thought to installing UPSs for their computers, let alone their modems. But accidents and emergencies are inevitable. And when they happen, you’ll find that having internet access is one of the most important things you need to ensure business continuity. Think of an emergency power supply source like a UPS as an investment that not only protects your systems from data loss but also keeps your Wi-Fi equipment functioning in emergency scenarios. Call us today for productivity-saving tips and other hardware hacks for your business. Published with permission from TechAdvisory.org. Source.