5 Reasons to sync your Android device with Google Chrome

Many people use at least two devices for work, usually switching between a computer and a smartphone or tablet. Google Chrome makes it easy for users to jump from one device to another and pick up where they left off using its sync-up feature for Android devices. Learn more about the benefits of syncing Android devices with Chrome. View recently opened tabs on your Android device This is especially useful when you need to bring your work outside of the office. Here’s how to do it: Open the Chrome app on your Android device. Tap the three-dotted menu icon on the upper-right corner. Tap Recent tabs. You’ll see all the tabs you’ve opened recently while logged into your Google account regardless of device. Use your Android device to access your computer For this to work, you need to install the Chrome Remote Desktop app from the Google Play Store on your Android device and the Chrome Remote Desktop extension app on your computer. This will work regardless if your computer runs on Chrome OS, Windows, macOS, or Linux. Each device you want to connect must have Chrome installed, and each Chrome browser must be signed into the same account. With everything in place, you can remotely control a system that’s turned on, such as your desktop, via your phone. You can move around your desktop, open and edit files, and run programs from your mobile. You could also allow one-time access to give or receive remote support. Set reminders via Google Assistant or Google Keep You can use voice commands on your Android phone to set reminders. Simply say “OK Google” or “Hey Google,” or press the mic icon to activate Google Assistant, then say “Remind me to buy milk at the grocery store” or whatever it is you want to be reminded of. Once the “Add a reminder” screen appears, you can edit reminder details, such as when and where you want to be alerted. For instance, you may want your device to remind you of your grocery list when you enter a grocery store. Alternatively, you can install the Google Keep extension app in Chrome or the Google Keep app on your Android. To do this, open the app, click the “Take a note” field, type in your reminder, and click the “Remind me” icon. Then click on either Pick date & time (to set when you want to be reminded) or Pick place (to set where you want to be notified). As long as you have syncing turned on for your Google account, you can use Google Calendar, Google Assistant, or Google Keep on one device to set and get reminders across all your devices. Send directions from your computer to your Android device To send driving, walking, or commuting directions from your PC to your Android phone or tablet, do the following: Click on a specific location on Google Maps, or enter a location in the search field and click on the desired result. Click on the “Send to your phone” button in the pane on the left side of your screen. Choose to have the directions sent to your mobile device via text or email. Find your lost phone As long as the Wi-Fi or data on your smartphone is turned on, you can find the device by entering “find my phone” in the Google search bar, which will then display the phone’s current or last known location. Click on that to bring up the Android Device Manager interface, from which you can lock or wipe your phone. On top of that, you can also use the Device Manager to ring your device for five minutes — even if it’s set to silent — in the hopes that a kind soul answers it and tells you where you can get your phone back. Having access to Google Chrome across all your devices boosts your productivity and efficiency. If you want to learn more about how to get the most out of Chrome and your Android device, contact our experts today. Published with permission from TechAdvisory.org. Source.
How to use external monitors with Mac computers

It’s much more convenient to work when you have two monitors. In case you’re using a Mac computer (a MacBook Pro, MacBook Air, or Mac mini) and want to hook an external monitor to it, we’ve got a few tips for you. First, check which displays your Mac device supports by doing the following: Click the Apple Menu (located on the left-hand side of the screen) then click About This Mac. Then click Support > Specifications (under Mac Resources). You will then be directed to an Apple web page indicating your device’s technical specifications. Under Display and Video Support, you will see some details similar to the following: Display Retina display 13.3-inch (diagonal) LED-backlit display with IPS technology; 2560-by-1600 native resolution at 227 pixels per inch with support for millions of colors Supported scaled resolutions: 1680 by 1050 1440 by 900 1024 by 640 400 nits brightness Wide color (P3) True Tone technology Video Support Simultaneously supports full native resolution on the built-in display at millions of colors and: One external display with up to 6K resolution at 60Hz Thunderbolt 3 digital video output Native DisplayPort output over USB-C VGA, HDMI, DVI, and Thunderbolt 2 output supported using adapters (sold separately) This is for a 13-inch MacBook Air (M1, 2020) model. Extended mode versus mirror mode Connecting to an external display lets you choose between: Extended mode – uses the external display to extend the image displayed on your main Mac device. To activate extended mode: Click Apple menu > System Preferences > Display > Arrangement. Make sure the Mirror Displays checkbox is unticked. Note: This may not work on older Mac devices such as early 2015 models or older. Mirror mode – reflects or “mirrors” the exact same image on your main device onto the external screen. To activate video mirroring: Click Apple menu > System Preferences > Displays > Arrangement. Tick the Mirror Displays checkbox. AirPlay mode Those who have an Apple TV can use AirPlay to use their TV as a second screen. Apple TV is designed for use with TVs, but it can also be used to connect to HDMI-enabled computer monitors. To use AirPlay mode as a second display: Turn on your TV and Apple TV. In the menu bar (the topmost bar on the screen), click the Control Center icon. Click Screen Mirroring then select your Apple TV. To enable AirPlay to mirror your main Mac device: Click the AirPlay icon and select Mirror Built-in Display. To use your TV as a separate display, click the AirPlay icon, then choose Use As Separate Display. To turn off AirPlay: Click the AirPlay icon, then select Turn AirPlay Off. Your MacBook Pro, MacBook Air, Mac mini, and other Apple devices have functionalities you may not have yet explored. To get more productivity hacks and/or hardware support, call our IT experts today. Published with permission from TechAdvisory.org. Source.
Safeguard your mobile devices with these tips

Mobile devices are generally less secure than laptop and desktop computers. While there are available anti-malware applications for smartphones and tablets, they aren’t as comprehensive as those for laptops and desktops. Additionally, some mobile devices aren’t compatible with certain security applications or measures implemented by businesses. That’s why it’s even more important to keep track of and manage all the mobile devices your staff uses to access sensitive company data. Here are a few helpful tips to do so. Ensure mobile OS is up to date The updates to Apple and Android operating systems (OS) improve overall user experience, but their most important function is to fix security vulnerabilities. Reduce your business’s exposure to threats by installing updates for all devices as soon as they become available. Don’t delay updates, as doing so gives cybercriminals ample time to exploit vulnerabilities on devices that run on an outdated OS. Install business applications only Downloading apps seems harmless. However, lenient policies on what should and shouldn’t be downloaded on company mobile devices could lead to staff installing non-business-related apps, many of which are notorious for malicious advertising codes and other threats. It’s imperative that employees download and install only business applications necessary for their work on their company-issued mobile devices. Be careful when connecting to public Wi-Fi networks Emergencies may compel your staff to use password-free Wi-Fi networks in hotels, airports, cafes, and other public places. Connecting to an open network can expose your confidential information and sensitive company data to cybercriminals connected to the same network. You can avoid this by providing a practical internet data plan, preferably one that includes roaming services, for remote workers. And if connecting to a public Wi-Fi network is really necessary, using a reputable virtual private network (VPN) can help protect your sensitive data. A VPN creates a direct, secure connection for data from your end to your intended point on the internet. Enable phone tracking tools Losing a company-issued mobile device is unfortunate. Devices can be misplaced or stolen, but enabling Find My iPhone for iOS devices, GPS Phone Tracker for Android, or any device-tracking app helps users locate lost phones. Some also have the option to delete data on stolen devices. Downloading and setting up such an app takes only a few minutes and it will give you peace of mind knowing that even if your phone is lost or stolen, its contents will not be compromised. Screen SMS carefully SMS phishing can be used to trick you into clicking malicious links. Cybercriminals send messages purporting to be from someone you know, asking you to urgently disclose confidential information. Should you encounter such an SMS, you can either delete it or alert your IT department. You can also block unknown senders without even opening their messages. Mobile devices are becoming more critical to operations. And with more devices open to attacks, businesses must bolster their cybersecurity efforts. Malicious actors will exploit every possible vulnerability and that includes those in unsecured smartphones and tablets. Get in touch with us if you need comprehensive security solutions for your business. Published with permission from TechAdvisory.org. Source.
Computing the ownership cost of a VoIP system

Voice over Internet Protocol (VoIP) systems are tried and tested tools for business agility and continuity, so it’s no wonder that many companies use them. But they also come with ownership costs that you should anticipate. Read on to learn more. Upfront costs Upfront costs are largely determined by the manner in which you acquire your systems, such as whether you buy a VoIP system outright or rent it from a third party. Although the former carries a steep upfront cost, payment does not continue indefinitely. This makes sense for large, fully staffed corporations with massive budgets. Meanwhile, the latter option is better for small- and medium-sized businesses (SMBs) that prefer to pay a small monthly subscription rather than make a huge initial investment. Beyond the price of the VoIP package, upfront costs also include additional costs like headsets, webcams, and a higher-bandwidth network connection to ensure crystal-clear, uninterrupted calls. Implementation costs Implementation costs include the fees of consultants or managed IT services providers that design, deploy, and configure your VoIP system. And if you’re installing a completely new phone system, you also need to factor in costs associated with training employees on how to use the VoIP system effectively and securely. Operational costs This covers monthly recurring costs of voice and data plans. For example, some service providers charge local and long-distance calls per minute, while others offer unlimited local calls for a fixed monthly fee. If you’re managing your VoIP infrastructure yourself, you also have to take into account monthly power, cooling, and maintenance fees. If you opt for hosted VoIP services, however, you are only billed for maintenance. Upgrade costs You should also need to set aside some room in your budget for VoIP upgrades. For instance, you may need to integrate customer relationship management (CRM) software with VoIP to ensure high levels of customer satisfaction. Aside from the cost of the upgrade itself, you should also anticipate spending on consultation, as upgrade integrations have a better chance at success if deployed by experts. Evaluating all the costs that apply to your business will give you a clear idea of how much you can expect to pay for your VoIP system. If you’re having difficulty calculating the actual costs of VoIP implementation, call our experts today. We’ll help you figure out which VoIP solution is most ideal for your business and budget. Published with permission from TechAdvisory.org. Source.
New productivity tools to try in Microsoft 365

Microsoft has unveiled some new and improved Microsoft 365 features. These upgrades, introduced during this year’s Microsoft Inspire conference, are more relevant than ever and were designed with the needs of the hybrid worker in mind. From third-party integrations in Teams to nifty tricks in Outlook, here’s a quick guide on what to expect from the latest version of Microsoft 365. Work seamlessly with Windows 365 Windows 365 is a cloud service that allows users to experience a more powerful and more agile version of Windows 10 or 11. Also called the “Cloud PC”, Windows 365 will enable you to access your entire PC — including personalized apps and settings — from any device. This means Windows 365 users can start working from anywhere right away, which is especially useful when finishing an urgent task or getting the most out of a productivity streak. Windows 365 eliminates logistical complexities and security concerns that often get in the way of efficient hybrid working. With a Cloud PC, you can start working on your office computer, pick up where you left off on your tablet during your commute, and jump right back in on your desktop if you’re working from home the next day. Experience a more powerful Teams app Teams is now loaded with new apps that are sure to make Microsoft’s communication platform even more collaborative. One of the new apps coming to Teams is Confluence Cloud by Atlassian, which allows users to take notes during a Teams meeting. The notes can be formatted as action items, mentions, tables, and the like to make the salient parts of the meeting more digestible. On top of this feature, the notes are also easily shareable in the Teams channel, allowing everyone to immediately access a copy of the minutes of the meeting. Salesforce will also be available for Teams. With the Salesforce for Teams app, you can integrate Salesforce records into different chats, calendar meetings, or channels so you can access and refer to the documents during discussions. There’s also a new Q&A app that will help improve question and answer sessions in meetings or webinars with a large number of participants. Attendees can now ask questions and reply to other participants’ questions throughout the meeting, and organizers can moderate discussions by filtering responses, marking the best answers, and pinning posts. This gives the Q&A more structure and makes it easier for everyone to search for relevant information. Get better organized to improve productivity It’s easy to get disorganized when you have several things on your plate. With Microsoft 365’s new features, it is a lot easier to prioritize tasks, organize events, and take necessary breaks in between. For one, you can now pin emails to the top of your inbox so you can readily find important emails later. Message reminders in Outlook will also help you stay on top of your tasks by nudging you to take action on emails that you might have missed. There’s also no need to sift through thousands of documents to find the right files to attach to your plan in Microsoft Planner. The app can now show you a list of files related to your agenda that you might want to attach, helping you save time and effort. What’s more, a new setting in Outlook lets you schedule meetings early or late so you can carve out essential breaks between back-to-back engagements. Scheduling breaks between meetings gives you and your employees time to breathe and prevents you from feeling overwhelmed or burned out. We’ve only just scratched the surface of Microsoft 365’s newest features. If you want the latest updates on this topic, don’t hesitate to contact us. Our tech experts are always ready to answer your queries. Published with permission from TechAdvisory.org. Source.
Gmail: Manage your emails better with these 5 simple tricks

Security, ease of use, and free service are just some of the main reasons why many businesses use Gmail. But despite the email service’s ubiquity, there are still plenty of ways for users to improve their Gmail experience. Gain better control over your inbox — and your workday — with these tricks. Undo Send In the fast-paced world of business, mistakes happen. And because everybody deserves a second chance at writing that email, Gmail has provided a way to recall sent emails — as long as you do it immediately after hitting Send. To rescind your email, simply click on Undo or View Message > Undo beside the “Message Sent” prompt at the bottom left of your screen. Gmail templates Gmail templates, formerly known as canned responses, are pre-written email formats that you can use as is or as the starting point of a fresh email. These are great for regular messages that follow a specific template. Instead of writing the same lines of text over and over again, you can simply choose any of the customizable templates with a few clicks. Make sure the feature is enabled by clicking on the gear icon at the top-right corner of the screen and then See all settings. Go to the Advanced tab, and select Enable in the Templates section before clicking the Save Changes button at the bottom. Once this feature is enabled, you can access your Gmail templates by composing a new email and clicking Templates > Insert Template. Send large attachments with Google Drive Need to send a high-resolution RAW image to a client but Gmail’s attachment size restrictions won’t let you? You can simply upload your files to Google Drive and click on Share to get a sharing link you can send to your client or your boss. Alternatively, you can click on the Google Drive icon at the bottom of your email composition window and choose the files you wish to send. Turn on Priority Inbox The Priority Inbox feature organizes your messages by importance using machine learning. You’ll be able to divide your inbox into five categories, where the messages will be displayed in the following order: Important and unread messages Starred messages [Customizable category] [Customizable category] Everything else Enable advanced settings Configuring Gmail’s Advanced Settings is an excellent way to increase email efficiency. Some of these features include Multiple Inboxes, Preview Pane, and custom keyboard shortcuts. Access them by going to Settings > See all settings > Advanced. Spending the right amount of time with emails while managing other crucial business areas is a balancing act many business owners find difficult. If you have questions or need further assistance regarding Gmail or IT in general, feel free to contact us. Published with permission from TechAdvisory.org. Source.
Why is it important to have a business continuity plan?

Many small- to medium-sized business (SMB) owners fail to prepare for major crises like flood and ransomware attacks. Disaster events can cause downtime, which can result in lost revenue and lower profits. In addition, SMBs that fail to recover quickly from disruption face the risk of losing their customers to their competitors. To prevent this from happening to you, it’s important to have a business continuity plan (BCP) in place. What is a BCP? A BCP is a predefined set of protocols on how your business should respond in case of an emergency or natural disaster. It contains contingency plans for every aspect of your organization, including human resources, assets, and business processes. Key threats to business continuity Various types of threats can affect SMBs such as: Natural disasters: These are natural phenomena such as floods, storms, earthquakes, and wildfires. Man-made disasters: These include cyberattacks, intentional sabotage, and human negligence. Equipment and utility failures: These include unexpected power failures, internet downtime, and disruption of communication services. How to build an effective BCP If your company does not have a BCP in place, now is a good time to create one. These steps will help you formulate an effective BCP that will ensure your company keeps running even during a major crisis. Perform a risk assessment To create an effective BCP, it’s important to identify the risks to prioritize. Start by identifying potential threats that may impact your daily operations. List down as well industry risks, geographical area, rising trends, and issues that your stakeholders may encounter. Next, categorize the risks based on the level of impact, likelihood of occurrence, or other criteria.Once risks have been identified and a plan has been developed, carefully identify any possible gaps. Collaborate with your team to identify any weak points in the plan, and make changes as necessary. Perform a business impact analysis (BIA) A BIA will help you determine how a disruption can affect your company’s current functions, processes, personnel, equipment, technology, and physical infrastructure. IT will also help you calculate the potential financial and operational loss from each function and process affected. Identify your recovery options Identify key resources for restoring your business to minimum operational levels. Some recovery options you can take include using data backups, allowing employees to work from home or operating from a secondary location. Document the plan Make a record of the BCP and store the document in a secure location, preferably an off-site one to reduce the risks of loss or damage in case of a disaster. Test and train Once your BCP is in place, your continuity team needs to perform tests regularly to identify gaps and make necessary changes to ensure the plan’s effectiveness. They also need to conduct regular employee training so that everyone knows their respective roles should a disaster strike. Having an effective BCP is a great way to ensure your business can quickly recover after a major disaster. If you’re thinking about creating a BCP for your company but don’t know where to start, give us a call today. Published with permission from TechAdvisory.org. Source.
Useful Microsoft Edge features you should know about

Microsoft Edge is a web browser that boasts faster loading times, better support, and stronger security than its predecessor, Internet Explorer. However, these improvements merely scratch the surface of what Microsoft Edge is capable of. Here are a few great features available in the newly updated web browser. 1. Vertical tabs Vertical tabs are a handy feature if you often find yourself opening dozens of tabs at once at any given time. Instead of having to hover over or click on one to see which page it’s on, you can easily find and manage your tabs on the side with a single click. You’ll never have to lose track of or accidentally close tabs again. With the recent Microsoft Edge update, users will now be able to hide the horizontal title bar at the top of the screen so there’s additional vertical space to work with. To enable this feature, go to Settings > Appearance > Customize toolbar and select Hide title bar while in vertical tabs. 2. Tab groups Microsoft Edge allows you to group related tabs so you can better organize your web browser and workspace. For instance, you can have all project-related tabs grouped together and designate another tab group for recreational YouTube video watching. Using tab groups is as easy as right-clicking on an open tab and selecting Add tab to a new group. From there, you’ll be able to create a label and choose a color to identify the tab group. When the tab group is set up, you can add tabs to the group by clicking and dragging. 3. Collections Collections allows you to gather information from different sites, then organize, export, or return to it at a later time. Doing these can be especially difficult if you’re working across several sites and multiple devices. To use this feature, simply click on the Collections button and a pane will open on the right side of your browser window. Here, you can easily drag and drop web pages, text, images, videos, and other elements into a group, which you can then import to a Word document or Excel workbook. 4. Tracking prevention Whenever you visit a site, online trackers can collect information about your internet activity, including pages you visit, links you click on, your search history, and more. Companies then use the data collected to target you with personalized advertisements and experiences. The tracking prevention feature in Microsoft Edge is designed to keep you from being tracked by sites that you aren’t accessing directly. It’s enabled by default, and it gives you control over the types of third-party trackers to be detected and blocked, thereby enhancing your online privacy. 5. Password Monitor Millions of online personal credentials are frequently exposed due to data breaches and sold on the dark web. To keep your online accounts safe from hackers, Microsoft developed the Password Monitor. When enabled, this feature notifies you if the credentials you’ve saved to autofill are on the dark web. It then prompts you to take action, allowing you to view a list of all the leaked credentials and then leading you to the respective site to change your password. 6. Immersive Reader Built into the new Microsoft Edge, Immersive Reader makes reading online easier and more accessible by removing distractions on the page and creating a simplified environment that helps you to focus. This feature also gives you access to a variety of capabilities, including hearing text read aloud or adjusting the text size. 7. Easy switching Microsoft Edge is available to download for Windows, Mac, iOS, and Android. What’s great is that you can easily copy or migrate your bookmarks, form fill information, passwords, and basic settings to the new Microsoft Edge with just a single click. If you want to learn more about the latest features of Microsoft Edge and how to enjoy these benefits on your business computers, give us a call today. Published with permission from TechAdvisory.org. Source.
Think your password is secure? Think again

The National Institute of Standards and Technology (NIST) created many of the password best practices you probably loathe, including using a combination of letters, numbers, and special characters. The NIST now says those guidelines were ill-advised and has changed its stance. Find out why and what this means for you. The problem The issue isn’t that the NIST advised people to create easy-to-crack passwords, but their previous advice inadvertently made people generate weak passwords using predictable capitalization, special characters, and numbers, like “P@ssW0rd1.” Such a password may seem secure, but the string of characters it’s made up of could easily be compromised by hackers using common algorithms. Furthermore, while the NIST also recommended that people change their passwords regularly, they did not specify how and when to change them. Without proper guidance, many people assumed that this meant adding or changing one or two characters every year or so. The NIST essentially forced everyone to use passwords that are hard for humans to remember but easy for a hacker’s algorithm to crack. Eventually, the institution admitted that their recommendation creates more problems than it solves. The NIST has then reversed its stance on organizational password management requirements, and is recommending banishing forced periodic password changes and getting rid of complexity requirements. The solution Security consultant Frank Abagnale and Chief Hacking Officer for KnowBe4 Kevin Mitnick both see a future without passwords. Both security experts advise enterprises to implement multifactor authentication (MFA) in login policies. MFA requires a user to enter one or more valid credentials aside from a password to gain access to an account. This could be a physical security key, a login prompt on a mobile device, or a facial or a fingerprint scan. Without the additional security requirements, hackers’ attempts to crack passwords would be futile. Moreover, Mitnick recommended implementing long passphrases of 25 characters or more, such as “recedemarmaladecrockplacate” or “cavalryfigurineunderdoneexalted.” These are much more difficult to guess and less prone to hacking. Simply put, passwords should be longer and include nonsensical phrases and words that make them almost impossible for an automated system to crack. What’s more, the NIST recommends making screening of new passwords against lists of common or compromised passwords mandatory. This is because a complex, 25-character password is already considered weak the moment it has been compromised. Finally, you should also enforce the following security solutions within your company: Single sign-on – allows users to securely access multiple accounts with one set of credentials Account monitoring tools – recognizes suspicious activity and locks out hackers from the network OR keeps hackers from accessing the network. When it comes to security, ignorance is your business’s kryptonite. If you’d like to learn about what else you can do to remain secure, just give us a call. Published with permission from TechAdvisory.org. Source.
The importance of updating firmware

Businesses today are aware of the importance of regularly updating the different software they use to keep these running optimally and protected against cyberthreats. However, they often overlook the firmware of their computers and other devices. At best, firmware is only updated if there’s an issue with the hardware. But it’s actually a good idea to always keep firmware updated, and here’s why. What is firmware? Firmware is a basic type of software that is embedded into every hardware component in computers, computer peripherals (e.g., keyboards, mice), printers, mobile devices, and Internet of Things devices. It’s also found in some household appliances and gadgets such as TV remote controls, as well as everyday objects like traffic lights. Essentially, firmware controls the device it’s installed on, sending instructions for how the device communicates with its different hardware components. It is only compatible with the make and model of the particular hardware it is installed on, and it cannot be uninstalled or deleted. Why is updating firmware important? According to Microsoft’s 2021 Security Signals report, firmware attacks are on the rise. These attacks involve injecting malware into computer systems to tamper with the firmware on motherboards or hardware drivers. From there, cybercriminals can do any number of things to the infected computers, including remotely controlling the devices, disabling the antivirus software, exfiltrating data, and blocking access to the devices and the data they contain. Experts recommend installing firmware updates as soon as these become available to effectively protect against firmware attacks and other threats to your business’s cybersecurity. Users will also enjoy increased speed and enhanced performance with a firmware update. How to install firmware updates The method for updating firmware differs from device to device. For instance, you can simply download and install firmware updates on both iOS and Android devices. However, for devices such as routers, you will have to apply firmware updates from the manufacturer’s website or administrative console. Keep in mind, however, that updating firmware can be tedious and time-consuming. In some cases, a firmware update can reset your devices and restore factory settings, causing you to lose custom configurations on your computers, routers, and the like. And if you fail to follow the manufacturer’s instructions to the letter, you risk damaging your systems. It’s therefore best to leave the installation of firmware updates to the experts. For more information about firmware security and how to safely install firmware updates, or for any questions related to business IT, give our specialists a call today. Published with permission from TechAdvisory.org. Source.