Is Bing the right search engine for you?

Have you ever tried asking your search engine something to no avail? With many of us facing this problem, Bing has been updated with four new features that give users more thorough answers and enable it to respond to broader search terms. Validating answers using many websites Before the recent update, Bing would answer questions based on what it found on a single website. Now, it scours several sites and aggregates results before replying to your query. For questions that have two different perspectives, answers from both sides will be compiled and displayed at the top of the search page. A compilation of answers will also be given for questions with numerous answers. Analogies Have you ever gotten an answer you couldn’t comprehend? Search engines have a relatively easy time finding answers, but they don’t always display the simplest ones. For example, knowing that Syria is 71,498 square miles isn’t the same as learning that Syria is approximately as big as Florida, but depending on where you live one is much better than the other. With Bing now providing relevant analogies and comparisons, information has become easier to understand. Answers are based on things search engine users are familiar with, making the search experience far more user-friendly and empathetic. Clarifying questions Bing is now able to provide a more specific answer when being asked broad or conversational questions. To accomplish this, the search engine will ask the user follow-up questions to refine search results. Microsoft has also an advanced image search, which allows users to search based on specific objects within images. For example, if you wish to purchase a shirt you saw in a picture, Bing’s advanced image search allows you to select it and locate a store that sells it. Partnering with Reddit Bing has also partnered with Reddit to display information from its threads to Bing’s search page. What this means for users is that certain topics in Reddit or subreddits can be searched through Bing search. Answers found in the site will also be displayed on the search page. With these four new features in Bing, searching for your answers has never been easier. To find out more about other web and cloud services, give us a call today. Published with permission from TechAdvisory.org. Source.
Alexa voice control has arrived on Android!

Alexa, how’s the weather outside? “Alexa, can you order me a pizza from Dominos?” “Alexa, do you know Siri?” These are just some of the questions you might enjoy asking Alexa on your smartphone now that Amazon has brought the voice control feature to the Android version of the app. But before you start geeking out, here’s the rundown of the most recent update: Until recently, the Amazon Alexa app could only be used to control settings for the Echo, Dot, and other supported devices. Considering what the AI-powered assistant is actually capable of, this is nothing to get excited about. But now all that has changed as Amazon brings voice control to the Android version of the app, making Alexa a full-fledge digital assistant on Android handsets. The update was initially available to the US, UK, Germany, and Austria, and is expected to roll out to more countries via the Amazon Appstore and Google Play over the course of the coming days. Activating Alexa on your newly downloaded or updated app The first thing you need to do is grant it permission to use your device’s microphone and then your location. With the new voice feature, you can use Alexa to play music, get weather forecasts, and easily enable Alexa Skills. You can also make calls and send messages to your home Echo device. The update is on the way to the iOS App Store, although it is not known when the update is set to reach Apple devices. Unfortunately, Alexa app for Android currently does not support the wake word function, so you will need to press the Blue button whenever you want to activate Alexa. The hands-free experience is still exclusive to Alexa-integrated smartphones such as HTC U11, Huawei Mate 9, and Motorola Moto X4. Alexa for everyday use With more than 25,000 skills available on the Alexa Skills store, you might be wondering where to get started. We’ve highlighted some ways Alexa can help with your daily activities: Ride services – enabling ride-hailing apps like Uber and Lyft is a breeze. Simply say “Alexa, enable Lyft (or Uber)”, plug in your account and payment details and your smartphone now has the ability to order you a ride. News – Alexa can keep you updated on current events. For example, the NPR Hourly News Summary skill can be prompted by saying “Alexa, what’s my Flash Briefing?” or “Alexa, what’s in the news?” This will give you a 5-minute briefing of the day’s headlines. Other news channels such as Bloomberg, CNN, the Associated Press, WSJ, The Economist, and BBC are also available. Organization – whether you are super organized or can’t seem to keep anything together, Alexa is there to help. It is capable of managing your Google calendar, making restaurant reservations, reminding you about important events, updating grocery lists, ordering items from Amazon Prime, and tracking Amazon packages, just to name a few. Media – besides streaming music directly from Spotify, Pandora, and iHeartRadio, you can also listen to audiobooks and podcasts or stay updated with your favorite sports teams with skills such as NFL, NBA, MLS, MLB, and many more. Health – the AI assistant might be the closest thing you can get to having a personal trainer with a collection of skills available to help you stay on track of your health and fitness goals. Some popular skills include the activity tracker Fitbit, 7-Minute Workout, and relaxation-inducing skills such as Ambient Noise, Stop, Breathe & Think, and Meditation Timer. With Amazon clearly flexing its muscles in the voice assistant category, along with Apple’s HomePod set to release in the near future, 2018 is shaping up to be an exciting year for tech. As AI assistants like Amazon Alexa, Google Assistant, Apple’s Siri, Microsoft Cortana, and Samsung’s Bixby continue to make appearances in our homes, cars, and personal devices, we are excited to see them pave their way to the workplace. That said, may the best AI assistant win. If you’d like to stay updated on the latest AI trends or need help with anything AI-related — like Alexa for Business or Microsoft Cortana integration for your business — give us a call today. Published with permission from TechAdvisory.org. Source.
Azure virtual machines get a free upgrade

Virtualization is difficult to understand. The technology itself is complex, and the industry is dominated by vendors that the average business owner has never heard of. Almost everyone knows Microsoft though, and its virtualization platform just got a big speed boost that won’t cost users a thing — if they know how to take advantage of it. Azure: Microsoft’s virtualization platform As a full-service cloud solution, Azure is a secure and flexible data center that businesses of all sizes can benefit from. Azure services include cloud storage, web hosting, and even some customizable AI features. With the help of a trained professional, Microsoft’s platform can provide access to virtual machines, which are fully-furnished desktops users can log into and work from via the internet. One of the reasons Azure is such a flexible cloud solution is because it can easily integrate with solutions businesses maintain on premises to become a hybrid platform. Faster virtualization options Microsoft has been testing a new feature — referred to as Accelerated Networking — for a year and a half, and it’s finally available for all users. Without getting too technical, this upgrade allows Azure to remove enormous computing workloads from its service delivery process. Any business that uses Microsoft’s cloud service for virtualization solutions can now access up to 30 gigabits per second of network throughput, which means Azure-based virtual machines and applications will be even faster than before. Do SMBs really need this much speed? Although the Accelerated Networking feature is free, enabling it requires quite a bit of IT expertise, so don’t expect it to be set up overnight. In fact, for small businesses that pay for tech support per project or by the hour, this upgrade may not be worth it. However, if you’re on an unlimited support plan from a managed IT services provider, you might as well — it won’t cost you anything extra! With our team as your 24/7 technology resource, you don’t need to understand the intricacies of virtualization. Whether it’s speed enhancements or security optimizations, our team will make sure your solution always gives you the best return on your investment. Call us today to learn more about our virtualization services. Published with permission from TechAdvisory.org. Source.
Why is Skype’s new feature so important

With more targeted attacks on social networking services than ever, private conversations with your business partners can become public information. To prevent this, Skype has released a new feature that ensures complete privacy by encrypting all types of communication. Here are some of the features. Benefits of using Private Conversations Named ‘Private Conversations’ by Microsoft, this new feature allows all audio calls, text messages, and multimedia messages to be encrypted. This means that when the feature is enabled, only the sender and receiver will be able to view or hear the transmissions. Even if they were to be intercepted, their contents would be totally garbled. Although Skype has already been providing basic encryption to its service, elevating this feature to something called “end-to-end encryption” prevents unintended parties — such as cybercriminals or even the government — from tapping into private conversations, ensuring peace of mind to more than 300 million users. Beta stage of testing Currently still in its testing stage, end-to-end encryption is available only in the beta version of Skype Insider. To activate it, select “new private conversation” from another user’s profile or Skype’s “compose” menu. Currently, Private Conversations do not support video chat. And although conversation contents are encrypted, conversation details — such as the call duration and when it occurred — can still be accessed by Skype. Other end-to-end encrypted VoIP services From free consumer communication apps like WhatsApp to business solutions like RingCentral, and many other VoIP services, end-to-end encryption is becoming more prevalent every day. Skype for Business sells it as a simple, DIY telecom solution. But with cyber attacks getting more sophisticated every day and the increasing number of data security regulations, a lot can go wrong. If you’re interested in switching to a VoIP service, or want us to assess the security of your current solution, give us a call. Published with permission from TechAdvisory.org. Source.
Understanding Office collaboration tools

Office 365 is chock full of so many apps that it’s sometimes difficult to keep track of them all. Sure, you have the most popular tools like Word and Skype for Business, but there are three tools in the lineup that seem like they could be used the same way: Outlook Groups, Yammer, and Microsoft Teams. Read on to find out what makes these collaboration tools different from each other and when each of them should be used. Outlook Groups With Outlook Groups, every member gets a shared inbox, calendar, project planner, notebook, and document library. You also get the ability to connect to third-party apps — like Twitter, Trello, and Mailchimp — so notifications are sent directly to your shared inbox. This means all relevant messages and information are contained in one place, so if a majority of your conversations occur via email then, Outlook Groups is the perfect choice. What’s more, HR and Sales departments that communicate with external parties will also find plenty of uses for its email features. One drawback with Outlook Groups, however, is email overload. Because all messages and notifications are sent to one inbox, users may be overwhelmed by the number of emails they have to sort through every day. Microsoft Teams Then there’s Microsoft Teams, a chat-based collaboration platform similar to Slack. It works with Skype for Business so you can text, call, video chat, and share files with colleagues. And thanks to its seamless integrations with other Office 365 programs, you can even work on shared files without having to leave the app. Unlike Groups, Microsoft Teams is designed for high-velocity collaboration, making it the best of the three for completing projects with tight deadlines or other tasks where employees need immediate feedback. Yammer Much like Groups and Teams, Yammer works well with other Office 365 tools like Outlook and OneDrive. But the big difference is Yammer is a social media app designed to foster open communication and break down barriers between teams. With Yammer, important files and announcements can be shared with the entire company like an office bulletin board. What’s more, users can see the most popular post on their feeds, follow it, and even provide their input by leaving a comment. Yammer also takes design elements and features from popular social media apps like Facebook, making it a popular choice for companies with a significant number of millennials in their workforce. Although we’ve discussed the fundamental differences between Groups, Teams, and Yammer, we’ve barely scratched the surface of what each app can do. To figure out which apps you need, you must understand how your employees work, how they prefer to collaborate, and what you want to achieve. But there’s another way to find the right app for your business. Contact us today for an IT assessment! Published with permission from TechAdvisory.org. Source.
New Windows update for PC vulnerabilities

Two newly discovered Windows vulnerabilities, known as Meltdown and Spectre, make it possible for hackers to steal all sorts of confidential information. To resolve this issue, Microsoft has released an update. Continue reading to stay protected. Issues with Microsoft’s Spectre and Meltdown patches After the January 3rd announcement of unprecedented security vulnerabilities, Microsoft has been rushing to release security updates for its Windows operating system. At their most basic, these complex vulnerabilities, named Spectre and Meltdown, make it possible for a program installed on your computer to access any information stored on your hard drive, even if it is protected. These flaws mean that anything you’ve typed into your computer is at risk: credit card numbers, passwords — all of it. But don’t rush off to install fixes just yet. There are a few speed bumps you’ll have to navigate on your road to safety. Incompatibility issues According to reports, Microsoft’s patches have caused several problems to some users’ computers. For some, installing the new patches has resulted in computers with older processors to crash more often than usual. Users with newer processors have found their computers struggling to boot up, with some never getting past the Windows loading screen. As a result, on more than one occasion, hardware and software vendors have recommended that its customers postpone installing the new patches. Spectre and Meltdown can cause serious damage, but that doesn’t mean anyone should run off to haphazardly attempt computer repair above their ability. Until the process for installing patches has been ironed out, we recommend enlisting help. Hire a professional Given the issues on patches, IT novices shouldn’t update their computers on their own. Without adequate experience, you might install the wrong patch and cause even more problems to your computer. Or worse, install one of the pieces of malware masquerading as Spectre patches. Instead, why not call a professional to update your computer and protect your system from Meltdown and Spectre? Data and network security is no easy task. We offer advanced, multi-layer protection to keep your data safe and sound. Give us a call and we’ll explain how we can help. Published with permission from TechAdvisory.org. Source.
Meltdown and Spectre fixes cause problems

It’s been three weeks since one of the worst IT security vulnerabilities in history was announced, and consumers are still receiving mixed messages about how to protect themselves. We usually encourage users to install software updates as often as possible, but when it comes to Meltdown and Spectre, that advice comes with an asterisk. Unsecured data storage Spectre and Meltdown are the names given to two hardware flaws that allow hackers to see any piece of information stored on your computer. Although slightly different in execution, both take advantage of a hardware feature that computer chips use to access and store private information. For the last 20 years, security experts believed this information could not be stolen or spied on by malicious software, but that assumption was proven false on January 3, 2018. Now that the Spectre and Meltdown vulnerabilities are public information, hackers can use them to create programs that steal passwords, social security numbers, credit card numbers, and anything else you type into your computer. Because these problems are hardware-based, none of the updates will be able to secure the vulnerable storage; they’ll simply prevent your computer from storing anything in it. Currently, there are patches for: Operating systems (Windows, macOS, and Linux) Web browsers (Chrome, Firefox, Safari, Edge, and IE) Chip firmware (low-level programs installed on the processor itself) If you’re using an Apple computer, these updates are relatively easy to install. If you’re using a Windows or Linux-based computer, these patches may cause your machine to freeze, reboot unexpectedly, or significantly slow down. Why should I wait to install the updates? Intel, one of the chipmakers responsible for the Spectre and Meltdown flaws, has provided contradictory recommendations on more than one occasion. As recently as January 18, Intel recommended waiting for an updated patch, but in the same announcement also recommended “consumers to keep systems up-to-date.” Experts believe detecting an attack that is based on one of these flaws will be relatively easy and represent an alternative to installing updates that could render your computer unusable. What should I do? IT support experts will be able to quickly and easily assess what is the best option for your computers. For example, our team can determine whether or not your hardware will conflict with the current patches, and either install them or set up a detection strategy that will help you mitigate the risks without ruining your computer. If you need expert IT support for quick responses and ironclad security — give us a call today. Published with permission from TechAdvisory.org. Source.
Spectre & Meltdown: how to protect yourself

Spectre and Meltdown are critical security flaws that affect a majority of computers today, including the one you’re using to read this. They can leak your passwords and other sensitive data, which is why software companies are working on security patches. The good news for Apple users is that fixes are now available to keep their devices temporarily safe. Download and install security patches ASAP Apple has already released software updates for all affected devices, and you need to install them now. Here’s how: macOS – Click the Apple icon on the topmost part of your screen and check whether your system has been updated to macOS 10.13.2. If not, click the ‘Software Update…’ button to go directly to the App Store, then click the ‘Update’ button for macOS High Sierra. iOS – To update to iOS 11.2, go to Settings > General > Software Update and download and install the new software. tvOS – To update to tvOS 11.2, go to Settings > System > Software Updates and follow Apple’s step-by-step instructions to update your software. The company hasn’t confirmed whether they would release patches for devices running on outdated software, so if your business still uses previous versions of Macs, iPhones, or iPads, make sure they do not have critical company data stored on them. Better yet, upgrade to new devices so that they’re better protected against legacy system vulnerabilities. Practice browser safety The Spectre bug could also exploit vulnerabilities in browsers, so make sure you update Safari too. Apple is set to release Safari updates for Macs and iOS devices soon, and it’s highly recommended to download and install them as soon as they become available. You should also avoid using non-Apple browsers like Chrome, Microsoft Edge, or Firefox, as they have yet to release security patches against the bugs. Download applications only from the App Store Downloading apps from the App Store is one of the best ways to ensure you install only secure apps. Third-party stores are prone to malicious apps that could be disguised as legitimate and harmless — or worse, an exact copy of a well-known app. The App Store has had incidents of malicious applications targeting iPhones, but these cases are rare. It is also much better at vetting suspicious apps and is relatively safer than other open-source platforms. Moreover, avoid jailbreaking your devices, as this just makes them and your systems more prone to malware. And regardless of where you’ve downloaded an app, practice extreme caution when running new, unfamiliar apps, whether on Macs or iPhones. Because of the sheer scale of Spectre and Meltdown, there’s a greater need for businesses to consult with IT professionals who can install powerful security software and other protections. Our cyber security team is ready to answer your questions about these and other system bugs. Call us today for professional advice. Published with permission from TechAdvisory.org. Source.
Data safety: The non-technical way

Keeping up with advancements in technology as a business owner is tough, especially when those advancements relate to information security. However, it doesn’t have to be. Here are a few physical security tips you can implement to protect your data before calling us! Cover up your webcam There must be some credibility to doing this if Facebook founder, Mark Zuckerberg, former FBI director, James Comey, and NSA whistleblower Edward Snowden all believe their webcams could be compromised. This is not just another paranoid celebrity reaction to ruthless paparazzi, there’s a genuine reason behind it. Kindly take a moment to consider the following scenario: hackers using your webcam to spy on you. Though it might sound unrealistic, this actually happened on several occasions. Sometimes for purely voyeuristic reasons and sometimes what appeared to be espionage. This is a very real threat with disturbing repercussions. Hackers aim to gain personal information based on your surroundings, deduce your location, as well as spy on the people you’re with, ultimately using this information to hold you ransom, threatening to broadcast your most intimate and vulnerable moments if you don’t pay up. Fortunately, guarding yourself against such danger is really easy and some painter’s tape over your webcam should do the trick. If you’re not confident about regular tape, you can purchase a cheap webcam cover online or at any hardware store. Purchase a privacy shield Think of privacy guards as those iPhone scratch protectors, but with an anti-snooping feature. These are thin covers you put on your computer, laptop or smartphone screen to limit viewing angles. Once installed, anyone trying to look at your screen from anywhere — except straight-on — sees nothing. Privacy filters are commonly used to protect work devices, particularly which display or contain critical files with sensitive data or confidential information. However, less sensitive, personal devices are still vulnerable to ‘shoulder surfing’ — the act of peeking at someone else’s screen, with or without ill intent, which is why we recommend using these protectors on all your devices. Use a physical authentication key Requiring more than one set of credentials to access sensitive resources is common sense, and has become standard practice for established online services. With something called two-factor authentication in place, you gain access to your account only after you’ve entered the authentication code, which the website sends to your smartphone once you’ve entered your account credentials. Until recently, two-factor authentication relied mostly on text messages that were sent to mobile phones. But professionals have now realised that phones can be hijacked to redirect text messages. Moreover, authentication codes can be stolen, or users can be tricked into entering these codes via a convincing phishing website. If you’re looking for authentication services that cannot be hijacked, stolen or lost, your best bet is a USB or Bluetooth key you can carry on your keychain. This means nobody — not even you — will be able to access your account without the physical key. Ultimate security at your fingertips. If you need help setting up two-factor authentication, or any IT security services, contact our experts and experience true peace of mind as we fortify your data to no end. Published with permission from TechAdvisory.org. Source.
Is your browser safe from Spectre?

The Chrome, Safari, Microsoft Edge, and Firefox browsers may not be as safe as you think. Security researchers recently discovered that computer chips manufactured in the past two decades contain major security vulnerabilities. One can be used by hackers to gain access to sensitive data. Read on to learn more. What is Spectre? To understand this unprecedented vulnerability, you need to know some computer chip basics. Modern chips try to speed up their work by storing information related to predictable and repetitive processes. Whenever CPUs perform calculations ahead of time that end up being unnecessary, the data is thrown away into a supposedly secure storage cache. Hackers can gain access to the discarded data by using malware to create digital backdoors. From there, they can simply sneak in, sift through the private information, and even trick the processor into throwing away even more sensitive information. This is known as a Spectre attack. Though the exploit is highly technical and difficult to execute, researchers said Spectre affects all modern processors, including those developed by Intel, AMD, and ARM. How does it affect browsers? As mentioned, hackers would need to install malware on a device to perform a Spectre attack. One tactic experts found effective is if hackers build a malicious program and embed it on a website. Should anyone visit the rogue website, their browser will automatically run the malicious program. Once inside, the attacker can use Spectre to gain full access to keystrokes, encryption keys, and login credentials. So far, there is no evidence of Spectre attacks actively being used to steal data from web browsers, but they are difficult to detect. Experts also predict hackers will likely develop specialized malware now that this information is available to the public. Is there a way to protect myself? Fortunately, major browser developers were quick to release updates as soon as the Spectre attack was discovered. Mozilla also has security features to prevent some Spectre attacks, but announced a full-blown solution is in the works. As for Chrome, users can expect an update as early as January 23. But for the time being Google recommends enabling the Site Isolation feature, which limits how much access browser plugins have to your computer. This feature can be enabled by going to your address bar and entering: chrome://flags/#enable-site-per-process. Even though the updates may affect browser performance, it’s a small price to pay compared with having your credit card or social security number stolen. Like it or not, Spectre is just one of the many threats targeting your web browsers. That’s why you should call us today. We offer expert advice and cutting-edge solutions to make sure your browsing experience is a pleasant and safe one. Published with permission from TechAdvisory.org. Source.