How to protect your network from watering hole attacks

Cybercriminals are getting more creative in infecting computers with malware, and users must step up in order to protect their devices. To stay one step ahead of cybercriminals, you should learn more about their more insidious tricks such as watering hole attacks. Here’s what you need to know about these attacks and how you can protect yourself from becoming a victim of one. The term “watering hole” colloquially refers to a social gathering place where a particular group of people often go to. As internet users, we all have unique “watering holes” or websites that we visit frequently. A financial analyst, for example, is likely to visit websites related to financial investments and market trends. In a watering hole attack, cybercriminals observe the watering holes of a specific demographic and infect their most visited websites with malware. Any user who has the misfortune of visiting any of these compromised sites will then have their computers automatically loaded with malware. The malware used in these attacks usually collects the victim’s personal information and sends it back to the hacker’s server. In extreme cases, the hacker will actively take control of the infected computer. But how does a cybercriminal choose which websites to hack? With internet tracking tools, hackers find out which websites companies and individual users visit the most. They then attempt to find vulnerabilities in those websites and embed them with malicious software. Hackers these days are so highly skilled that they can exploit any website using a watering hole attack. In fact, even high-profile organizations like Facebook, Forbes, and the US Department of Labor have fallen prey to this scheme in recent years. Protect yourself from watering hole attacks by doing the following: Update your software Watering hole attacks often exploit security gaps and vulnerabilities to infiltrate computers and networks. By updating all your software and browsers regularly, you can significantly reduce the risk of an attack. Make it a habit to check the software developer’s website for any security patches. Or better yet, hire a managed IT services provider to keep your system up to date. Watch your network closely Regularly conduct security checks using your network security tools to detect watering hole attacks. Use tools like intrusion prevention systems that allow you to detect and contain suspicious or malicious network activities before they can cause problems. Meanwhile, bandwidth management software will enable you to observe user behavior and detect abnormalities that could indicate an attack, such as large transfers of information or a high number of downloads. Hide your online activities Cybercriminals can create more effective watering hole attacks if they compromise websites only you and your employees frequent. As such, you should hide your online activities with a VPN and your browser’s private browsing feature. Also, block social media sites from your office network, as these are often used as share points of links to infected sites. Staying informed is one of the best ways to stay protected. As cyberthreats continue to evolve, it pays to be vigilant and aware of the newest threats. Tune in to our blog to find out about the latest developments in security and to get more tips on how to keep your business safe. Published with permission from TechAdvisory.org. Source.

3 Simple ways to keep your business safe from hackers

Like most business owners, you may be too busy managing your organization to be concerned about optimized security measures and other technical matters. However, failing to protect your business puts it at risk of data theft and other cyberattacks. Let’s take a look at some ways you can keep your organization safe. Cover your webcam If Facebook founder Mark Zuckerberg, former FBI Director James Comey, and National Security Agency whistleblower Edward Snowden all believe their webcams could be compromised, there’s no reason you should feel safe. This is because cybercriminals can use your webcam to spy on you. They can examine your surroundings, determine your location, and spy on the people you’re with. The attackers can record intimate and vulnerable moments and use these to blackmail you. Fortunately, guarding yourself against this danger is easy. Covering your webcam should do the trick. You can use regular tape or you can purchase a cheap webcam cover online. Check as well if your webcam has a dedicated kill switch, as this disables the hardware, making it impossible for cybercriminals to spy on you. Use a privacy shield Also known as a privacy guard, screen, and filter, a privacy shield is a thin transparent sheet you apply on your computer, laptop, or smartphone screen to limit viewing angles. Once installed, anyone trying to look at your screen from anywhere — except straight on — will see nothing. Privacy filters are commonly used to protect work devices that display or contain critical files with sensitive data or confidential information. However, work and personal devices are both vulnerable to “shoulder surfing,” the act of peeking at someone else’s screen, with or without ill intent. This is why it’s ideal to use protectors on all the devices you and your staff use. Get a physical/biometric authentication key Requiring more than one set of credentials to access sensitive resources has become the standard practice for established websites and applications. With multifactor authentication (MFA) in place, you can gain access to your account only after you’ve entered an authentication code. Before, two-factor authentication relied mostly on text messages sent to mobile phones. But IT experts now discourage the use of SMS authentication because of the following reasons: Text messages aren’t encrypted (i.e., these can be seen in plain text), and can be intercepted in man-in-the-middle attacks. Text message notifications may display one-time pins (OTPs) that can be seen by unintended viewers. Cybercriminals may redirect text messages to their own devices. OTPs can be stolen via SIM swapping. Users can be tricked into entering OTPs in a fraudulent login page. If you’re looking for authentication services that can’t be easily neutralized, try a hardware key like a USB or Bluetooth key that you can always carry around. You can also use biometrics such as a fingerprint, retina, or facial scan. It’s difficult to copy a person’s fingerprint or facial features, making it a secure authentication method. If you need help setting up two-factor authentication or IT security services, contact our experts. We’ll help you get peace of mind from knowing that your business IT is in good hands. Published with permission from TechAdvisory.org. Source.

Empower your mobile workforce with VoIP

Remote work policies require companies to expand their communication capabilities. Many businesses aim to increase productivity and improve customer service by turning to a VoIP solution. There are several factors that will make your VoIP more mobile while ensuring both your customers and employees remain satisfied and can communicate hassle-free. To cater to your out-of-office workers, there are a variety of ways by which you can expand the mobility of your VoIP services. 1. Look into unified communications (UC) If your employees are able to bring their personal devices to work, your IT administrators will insist that all of them comply with your company’s policies. You will need to establish good security and compliance measures to meet the needs of both your customers and employees. A solid solution is UC, which integrates real-time communication services, such as instant messaging, telephony, data sharing, and video conferencing. UC bridges the gap between VoIP and other computer-related communication technologies. It makes communication more convenient and manageable by providing a single number to reach as well as a status indicator that conveys whether employees are available or if they don’t want to be disturbed. 2. Employ easy-to-use apps Most top-rated business apps began as user-focused tools to help people find data more independently. Some of these apps have transformed into more customized tools focusing on specific business needs. The problem with this is that satisfying these needs often sacrifices overall usability. If your employees are struggling to use the mobile version of your VoIP solution, then they likely will dump it. This can lead to employees using unauthorized apps, which increases security risks. To avoid this, implement an app or a tool that is easy to use, navigate, and manage. Ask VoIP providers for a free demo to evaluate how user-friendly the software is. 3. Cloud support Having on-premises equipment and support for your VoIP solution is a good idea. However, your existing IT team may not be ready for the challenges of providing a cloud-based mobile app or voice support. We recommend you go for a hosted VoIP solution, which delivers the same cost-effective, network-based service, but the equipment is housed based at a provider’s site rather than in your data center. This eliminates the cost of on-premises gear, maintenance costs, and overall management while increasing the overall effectiveness of your mobile solution. 4. Work with an experienced solution manager It can be tough to manage your VoIP solutions as you’re expanding them. That’s why it’s best to work with an IT partner like us; we have the expertise and experience to pull it off. When you outsource the management of your solution to us, we can get your apps and solution up and running, then administer them for you. If you need to expand your VoIP mobile capabilities to enhance your efficiency and productivity, or if you’re interested to learn more about VoIP solutions, don’t hesitate to contact us today. Published with permission from TechAdvisory.org. Source.

PowerPoint Presenter Coach: Expanded availability & feedback

In 2019, Microsoft introduced the Presenter Coach feature in PowerPoint to help users give better presentations, be these in person or virtually. Using artificial intelligence, this feature gives you pointers on how to improve your pitch, pacing, word choice, and much more. It was initially available only in PowerPoint for the web, but this year, Microsoft expanded its availability and the types of feedback it provides. Availability on all platforms Presenter Coach is now accessible on all platforms: web, Windows, Mac, iOS, and Android. This means you can utilize this feature whenever you need it and wherever you are — at home, in the office, or even on the go. Three new types of feedbacks Aside from expanding the availability of Presenter Coach, Microsoft also added three new kinds of feedback: 1. Body language Great presenters rehearse not only what they say, but also their gestures, stance, and facial expressions to ensure that these support their message. For example, they can use hand gestures to emphasize a point, instead of keeping their hands in their pockets or behind their back. They also utilize their eyes, mouth, and facial muscles to convey emotion. By projecting the right body language, they can establish their credibility and connect with the audience. This is why Microsoft introduced a new capability that uses your video camera to provide feedback on your body language. After your rehearsal, the Presenter Coach will give you a summary report using the following metrics: Clear view – Evaluates how well your audience will be able to see you Eye contact – Tells you whether you are able to maintain your gaze toward the camera Distance – Analyzes whether you are too close or too far away from the camera 2. Repetitive language During presentations, repeating certain words and phrases can help you emphasize particular points and ensure that your audience recalls them. However, if this technique is done incorrectly, your listeners may find it distracting. On other occasions, you may not even realize that you are using the same words and phrases over and over again, but your audience will most likely catch on. To help prevent you from overusing the same words and phrases, Presenter Coach will identify them after listening to your rehearsal. Not only that, but it will also give you a list of synonyms that you can use instead so you can switch it up and keep your audience more engaged throughout your presentation. 3. Pronunciation Presenter Coach can help ensure that you correctly pronounce all of the words that you will say during your presentation. It will display the words you mispronounced during rehearsal and offer a recorded pronunciation guide of that word. You can listen to the correct pronunciation as many times as you want while practicing your presentation. Currently, Presenter Coach is optimized for the General American English pronunciation, but it can take into account variations in accent. In case you don’t agree with the suggestions provided or you don’t find them useful, you can disable the pronunciation feedback. Note on privacy concerns While Presenter Coach uses your camera and microphone to be able to evaluate your rehearsal, it will only do so when you click on Rehearse with Coach and then Start Rehearsing. It does not save any video or audio when you rehearse. It was purposely designed to respect your privacy while still being able to provide clear and actionable feedback that will help you improve your presentation skills. Want to learn more powerful features in PowerPoint and other Microsoft 365 apps? Contact us today and we’ll help you make the most out of your M365 subscription. Published with permission from TechAdvisory.org. Source.

What are the top 5 benefits of a cloud ERP?

As more and more solutions are made available in the cloud, more and more small- and medium-sized businesses (SMBs) are flocking to use them. One increasingly popular solution is cloud-based enterprise resource planning (ERP). If you want to integrate your systems using an ERP program, then you should seriously consider a cloud-based ERP solution. Define: Cloud-based ERP ERP is management software, usually offered as a bundle of applications, that aims to help businesses automate the collection, storage, management, and interpretation of data from disparate sources like accounting, inventory, marketing, service delivery, etc. With ERP, business owners and managers can get an integrated real-time view of business processes, resources, and commitments. Cloud-based ERP solutions are simply a suite of ERP apps delivered to users over the internet, usually accessed via a browser. The software usually does not need to be installed on computers and is offered on a per-user, per-month, flat-rate fee. Companies using a cloud-based integrated ERP solution have experienced the following five benefits: 1. Decreased operating costs An in-house ERP solution requires purchasing software and hardware to support it. Once you’ve built the solution’s infrastructure, you need to hire staff to install and maintain it. All of these will drive up the overall IT budget, something most SMBs cannot immediately afford. But with a cloud-based ERP system, you normally only have to pay a flat-rate monthly fee, so the total cost of implementation will likely be far lower. Many providers can also manage the solution for you (i.e., they’ll take care of maintenance, upgrades, etc.). This will even out your operating costs, and if implemented correctly, will result in an overall decrease in expenses. 2. Increased ERP performance over in-house solutions In-house ERP solutions require correctly configured hosting and proper maintenance to function at their most efficient. Your IT staff will be responsible for both, but if these are done poorly, then performance suffers. With cloud-based solutions, the provider takes care of hosting the solution. You know that system maintenance is being done by experts, so you’re assured that your ERP software will be at peak performance. 3. Enhanced access to information Companies that don’t have any ERP system will likely struggle to find the information they need, when they need it. ERP programs can help consolidate the relevant information in a more effective manner than, say, spreadsheets. And since cloud-based ERP solutions are accessible via the internet, you now have access to the information you need from anywhere with an internet connection. 4. Continued support Providers of cloud-based ERP solutions offer 24/7 support and can fix problems faster than if you leave them to your employees. They also make sure to keep their solutions updated. Hackers have been known to attack businesses that use outdated versions of popular ERP programs. 5. Increased security ERP systems process critical business information, so you will want to keep your data secure from outside sources and unauthorized users within your organization. In this regard, cloud-based ERP solutions have enhanced security measures that protect your data in storage and when it moves from your systems to the host servers. And for internal data security, users will need an assigned account to access your ERP system. This gives you control over who is given an account or not. Furthermore, you can also limit who can access your system via central admin panels. All of these features make cloud-based ERP solutions more secure than in-house ones. If you want to learn more about cloud-based ERP solutions, contact us. We’ll be glad to assist you. Published with permission from TechAdvisory.org. Source.

Cloud-based OMS: 5 Benefits to eCommerce businesses

A cloud-based order management system (OMS) is a powerful and intuitive tool for tracking orders, sales, and inventory as well as streamlining the processes involved in order fulfillment. Learn more about this essential tool and its many benefits to eCommerce businesses. First off, we need to clarify that an inventory management system is not the same as an order management system. The former is a solution for analyzing sales history and forecasting demand for product and raw materials. On the other hand, the latter is all about the here and now, as it tackles transactions as they happen. What does an OMS do? A cloud-based OMS enables eCommerce businesses to track orders for goods and services via a centralized dashboard, which your staff can access anytime, anywhere, on any internet-connected device. In general, it can help you organize orders into a coherent and manageable workflow by: Updating your website to reflect when certain items are out of stock Automating payment authorizations and integrating these with your shipping services Providing reports to customers about their order’s shipping status Automatically restocking products and materials once they dip below a certain level Automatically processing refunds and returns Monitoring your business on mobile/on the go Storing data in a more efficient and less costly manner Ensuring your data is protected in the event of a disaster There are dozens of OMS platforms with niche functionalities that may be better for specific business models regardless of the industry. The important thing is that you find a solution that reduces the most tedious organizational tasks for tracking your store’s orders. What are the benefits of an OMS? Below are five key advantages of using an OMS: Fewer errors Since an OMS allows you to automate various stages of order processing, it eliminates the need to manually enter and update order details. This reduces the risk of error, increasing your eCommerce business’s operational efficiency. Lower costs With fewer errors, you can avoid having to rework inaccurate order information, saving you time and effort. This means your business also saves on labor. And because a cloud-based OMS requires virtually no hardware, you can eliminate installation, maintenance, repair, and other associated costs as well. Better visibility A cloud-based OMS offers a consolidated view of your orders and inventory in real time, which allows you to stay on top of the entire fulfillment process so you never miss a sale. This also enables you to optimize inventory levels while minimizing surplus. Not only that, but an OMS gives you better visibility into your business’s processes, so you can easily identify issues and make the necessary adjustments to achieve operational efficiency. Faster delivery When a customer places an order, your OMS will choose the warehouse or fulfillment center closest to them as well as the method of fulfillment. A fulfillment request will then be sent automatically to the warehouse so the item can be prepared and shipped out immediately. Enhanced decision-making With an OMS, you have all the information you need to make smarter business decisions at the tip of your fingers, from consumer behavior to market trends to product performance. Improve your eCommerce business’s workflows and profitability with an OMS. If you need help choosing the right OMS platform for your company, give our experts a call today. Published with permission from TechAdvisory.org. Source.

Here’s how to get rid of ads in File Explorer

Getting a slew of ads on your computer screen while you’re working can be both distracting and annoying. If you’re using Windows 10 on your PC, laptop, or Surface Pro, you might have seen ads pop up in File Explorer and are not happy about it. Fortunately, there’s an easy way to get rid of these ads. Why are users getting these ads? Ads are being displayed in different parts of Windows 10 and not just on File Explorer — the Start menu, on the lock screen, from the taskbar, and in other Microsoft apps. Microsoft has been displaying ads that promote Office 365 and OneDrive since the Creators Update. Overwhelming negative reactions to this practice have been popping up online as a result. However, the company doesn’t consider them ads but “suggestions.” These suggestions promote Microsoft products and services and third-party apps in the Windows Store. The tech giant may be doing users a favor by reminding them they can easily grab apps in the store that can benefit them. But to many, ads are more of a nuisance than a favor. How do I turn off ads? Fortunately, there’s a simple way to turn ads off. You could disable them right now by doing the following: Open File Explorer. Select View from the ribbon along the top of any File Explorer window. Click Options on the far right-hand side. From the drop down arrow below Options, select Change folder and search options. Once in the Folder options window, go to the View tab. In the Advanced Settings window pane, scroll down and deselect “Show sync provider notifications”. Click Apply and close the Folder Options window. That’s all it takes! Keep in mind that we highly recommend the services Microsoft suggests. Office 365, OneDrive, and others are all great cloud platforms for easily and securely working and collaborating from any device in any location — but we understand that some don’t want to see these ads when they’re hunting down sales records. If you’re looking for Windows tips and tricks, this is the best blog on the web. If you’re looking for something a little more advanced, however, our managed services are second to none. Get in touch with us today to learn more! Published with permission from TechAdvisory.org. Source.

The 5 types of hackers who want to harm your business

You’ve probably heard it said that not all hackers are dangerous. That’s true, of course. For instance, white hat hackers hack into a system to uncover vulnerabilities and boost its protection against cyberthreats. However, we won’t be talking about white hat hackers in this blog. Instead, we’ll take a close look at five types of malicious hackers and the motives behind their activities. Script kiddies In terms of skill, script kiddies (or skids, for short) are at the bottom of the hacker totem pole. Their name comes from the fact that they use scripts or other automated tools written by others. They are often young people on a quest for internet notoriety or who are simply bored and in search of a thrill. Script kiddies shouldn’t be dismissed so easily, however. The ILOVEYOU virus, considered one of the worst malware on the planet, was developed by skids. Hacktivists Hacktivists often hack into businesses and government systems to promote a particular political agenda or to effect social change. These so-called “hackers with a cause” steal confidential information to expose or disrupt their target’s operations. Even if you’re a small- or medium-sized business (SMB) owner, you’re not immune to hacktivist attacks. This is especially true if your company is associated or partnered with organizations that are prime hacktivist targets. Cybercriminals Cybercriminals break into digital systems or networks with the intent to steal, destroy, taint, and/or lock away data. They usually target individuals, SMBs, and large companies that have exploitable weaknesses in their cybersecurity. Cybercriminals attack using a number of methods, including social engineering tactics to trick users into volunteering sensitive personal or company data. This information is then used for identity theft, sold on the dark web, or leveraged to launch attacks against other businesses. Cybercriminals can also infect computers with ransomware and other types of malware. State-sponsored hackers True to their name, these hackers are backed by governments. The hackers’ goal is to promote their backer’s interests within their own country or abroad. In most cases, this involves taking down websites that criticize the state, swaying public opinion, cyber-terrorism, and leaking top-secret information, among others. As they are, state-sponsored hackers are already dangerous to business owners, but even more so when they make it their goal to cripple an entire country’s financial system or disrupt commodity supply lines. This could involve interfering with the economy or disrupting business operations. Tech and pharmaceutical companies are a frequent target, but businesses in other industries aren’t safe from state-sponsored hackers either. Insiders The scariest type of hacker is the one that lurks within your own organization. An insider can be your company’s current and former employees, contractors, or business associates. Oftentimes their mission is payback. They’ll steal sensitive documents or try to disrupt the organization’s operations to right a wrong they believe a company has done to them. Edward Snowden is a prime example of an insider who hacked the organization he worked for — the US government. Malicious hackers are always changing their tactics to meet their goals, making them an ever-present threat to any organization, including yours. It’s crucial that you stay one step ahead by working with cybersecurity experts who can help protect your company from dangerous hackers and other cyberthreats. Contact our team today to get started. Published with permission from TechAdvisory.org. Source.

How to protect your Mac from cyberthreats

There’s a myth that Macs are virtually immune to malware and viruses. But it’s exactly that: a myth. While Macs may face fewer threats than Windows computers, they are still vulnerable to a wide array of cyber risks. Fortunately, protecting your Mac is fairly simple. Start with these security tips Check your privacy settings Make sure that your Mac settings are set up properly to keep your data safe. Manage the information your Mac makes available across the internet or on a network by going to Apple menu > System Preferences > Security & Privacy > Privacy. From there, you can choose which information to share and with whom. For example, you can specify which apps are allowed to see personal information, such as your location, contacts, photos, or music. Take advantage of the firewall A firewall protects your Mac from unwanted contact initiated by other computers on a network or the internet. It protects your computer by allowing only authorized services and apps to communicate with your Mac, so be sure to enable macOS’s built-in firewall. To do so, just go to Apple menu > System Preferences > Security & Privacy > Privacy Then, click Firewall. If the padlock icon at the bottom left is locked, click it and key in your username and password. Enable the firewall by clicking Turn On Firewall. To modify Firewall settings, click on Firewall Options… just below the “Turn Off Firewall” button. You will find a list of services and apps that are allowed to receive inbound connections. If you want to add an app or service to the list, just click the “+” button below the list itself. However, we recommend keeping this list as short as possible, as the apps listed can be exploited by cybercriminals. Another useful feature to enable is stealth mode. This option will make your Mac more difficult to find, thus keeping hackers and malware at bay. For instance, if you are in a coffee shop and connected to its unsecured Wi-Fi, enabling stealth mode will make your Mac invisible on that public network. To turn on this feature, just tick the box next to “Enable stealth mode” in Firewall Options. A dialog box will pop up, and you can click on the “Enable Stealth Mode” button. Set up a firmware password Every new Mac today has the FileVault encryption automatically enabled. This means that your device already encrypts the hard drive by default, and the only way your data can be accessed is by logging in. Keep in mind, though, that this feature won’t necessarily save your account in case someone reinstalls the operating system or uses a memory stick to boot the Mac and remove all data from your hard disk. To increase protection, set up a firmware password. Do this by restarting your computer, then pressing and holding down Cmd+R before the Apple logo shows up on the screen. You can let go of the keys once the progress bar pops up. When the utilities window appears, click on Utilities in the menu bar, then choose Startup Security Utility or Firmware Password Utility. Click on Turn On Firmware Password… and simply follow the succeeding instructions. Finally, quit the utilities window, then choose Apple menu > Restart. Make sure to never forget or misplace your firmware password, because only Apple technicians can recover it. Ensure that your confidential data remains private by performing minor tweaks on your Mac’s system settings. It takes only a few minutes to ensure lasting online protection. If setting up a firewall or firmware password sounds a little too advanced for you, or if you need to set up more advanced defenses, don’t hesitate to get in touch with our experts. Published with permission from TechAdvisory.org. Source.

Factors to consider when buying a business projector

A business projector can help make presentations more engaging, immersive, and enjoyable. It’s an especially useful tool for meetings, so it’s important that you have the right projector for your needs. If you’re looking for the best business projector to make your presentations truly stand out, here are some important factors you need to consider. Brightness and light output A projector cannot display bright images without enough light output. Even if you dim the lights in the room to compensate, images will appear muddy and blurred if the light output is too low. To find out if a projector’s lamp has the correct brightness for your needs, look for its ANSI (American National Standards Institute) Lumen rating. It will tell you how much light that particular projector can put out. Projectors that have 1,000 ANSI lumens or more are relatively suitable for the job, but other factors like ambient light, the distance or size of the screen, and the size of the room will also impact the need for fewer or more lumens. Connectivity options Some projectors in the market are more affordable because they’re equipped with only VGA and USB ports to connect to a TV or computer. You may have to spend more money on a projector that has multiple connectivity options, such as Wi-Fi, Bluetooth, and HDMI inputs. If you want more flexibility, buy a projector that is compatible with various audio and video formats as well. Front or rear projection Many projectors can now be set up to project images from either the rear or the front of the screen, and can be mounted on the ceiling instead of just stationed on a table or flat surface. Front projection is the easiest to configure, and the most common setup for projectors. Contrast ratio This setting determines the variance between the darkest black and the brightest white, so the higher the contrast ratio, the clearer the images. Projectors with good contrast ratio figures will allow you to enhance the quality of text on screen and the depth of displayed images. For typical meeting rooms, the contrast ratio can range from 3000:1 to 20000:1. Any contrast higher than 20000:1 will intensify the presentation quality but bump up the price of the projector as well. Resolution Because high-resolution images and videos are so readily available these days, you may want your projector to have 1080p or full HD as a native resolution. But if you can afford the 4K models, you will have the capacity to show off a comprehensive data image on screen. The caveat here is that your resolution will depend on the specs of your source media player. Our customers often forget to utilize one of our most useful service options: hardware consulting. If your organization is ever in the market for new equipment, or needs advice on how to get the most of what you currently have, don’t hesitate to ask. We’re an office full of gadget geeks who love the opportunity to talk about the latest and best that the industry has to offer. Contact us today! Published with permission from TechAdvisory.org. Source.