Premise-based or cloud-hosted VoIP?

Business owners are turning to the cloud because of its numerous advantages. However, others prefer premise-based infrastructures. When it comes to VoIP phone systems, which is better for your business? Installation and maintenance On-premises VoIP phone systems are installed in your office and typically managed and maintained by your own personnel. While you can hire a third party to do this, you can’t avoid the hardware costs of setting up your VoIP phones. Cloud-based VoIP, on the other hand, means all the software and hardware are hosted and maintained by a VoIP provider. Other than the physical phones, everything else is provided virtually, which means you won’t be bothered with expensive hardware costs nor will you need an in-house staff to manage the system. But since all support requests must be addressed by your VoIP provider, service responsiveness and flexibility are crucial, as they can directly impact your daily operations. Security You might think having on-premises VoIP is the obvious choice when it comes to security, and in one specific case, that’s true. If you have vast IT resources, deploying VoIP on premises gives you better security control since you will know your system’s capabilities. But for small to medium-sized businesses, cloud-hosted VoIP remains a favorable option because every aspect of security is taken care of by a provider whose reputation rests on maintaining the most stringent security measures. That entity is well-versed in identifying vulnerabilities, reducing the area of attacks, and protecting all entry points. Control On-premises solutions give you better control of your VoIP phones since you can design systems suited to your needs without relying on a third party. This makes it a popular choice for larger enterprises with dedicated IT technicians who are needed to customize and manage the system. With cloud-hosted VoIP, you relinquish a certain amount of control to your service provider, which is the price you pay for the convenience of professional deployment and maintenance. This, however, doesn’t give your provider the right to monitor your calls or conduct any activity that breaches your business’s confidentiality. Scalability With on-premises VoIP systems, you rely on your in-house personnel to add or remove features to accommodate your changing needs. There are various backend processes involved and every expansion often increases the complexity you have to manage yourself. With a cloud-hosted solution, you’ll have an entire team of technicians at your beck and call, so features can be added or removed as needed. If you’re anticipating future changes, cloud-hosted VoIP will be more effective in the long run. Whether you’re looking to host your VoIP phone systems on-premises or in the cloud, we can help make the process quick and painless. Give us a call today, and we’ll help you decide. Published with permission from TechAdvisory.org. Source.
Groups, Yammer, and Teams: What are they?

While most Office 365 apps serve a unique purpose, tools like Outlook Groups, Yammer, and Microsoft Teams can all be used for office communication and collaboration. However, there are small differences in the way they can be used. Let us break it down for you. Outlook Groups With Outlook Groups, every member gets a shared inbox, calendar, project planner, notebook, and document library. You also get the ability to connect to third-party apps such as Twitter, Trello, and Mailchimp, so notifications are sent directly to your shared inbox. This means all relevant messages and information are contained in one place, so if a majority of your conversations occur via email, Outlook Groups is ideal. What’s more, HR and sales departments that communicate with external parties will also find plenty of uses for its email features. A big drawback with Outlook Groups, however, is email overload. Because all messages and notifications are sent to one inbox, users may become overwhelmed by the number of emails they have to sort through every day. Microsoft Teams Microsoft Teams, a chat-based collaboration platform similar to Slack, works with Skype for Business so you can text, call, video chat, and share files with colleagues. Thanks to its seamless integrations with other Office 365 programs, you can even work on shared files without having to leave the app. Unlike Groups, Microsoft Teams is designed for high-velocity collaboration, making it the best of the three for completing projects with tight deadlines or other tasks where employees need immediate feedback. Yammer Much like Groups and Teams, Yammer works well with other Office 365 tools like Outlook and OneDrive. However, Yammer is a professional social media app designed to foster open communication and break down barriers between teams. With Yammer, important files and announcements can be shared with the entire company like an office bulletin board. Users can see the most popular post on their feeds, follow it, and even provide their input by leaving a comment. Yammer also takes design elements and features from popular social media apps like Facebook, making it a popular choice for companies with millennials in their workforce. Although we’ve discussed the fundamental differences between Groups, Teams, and Yammer, we’ve barely scratched the surface of what each app can do. To figure out which apps you need, you must understand how your employees work, how they prefer to collaborate, and what you want to achieve. But there’s another way to find the right app for your business. Contact us today for an IT assessment! Published with permission from TechAdvisory.org. Source.
Recover your privacy in Windows 10

Advertisers are able to target their consumers more effectively thanks to social media. But did you know that your operating system might also be giving away information about your online searches to advertising agencies? Learn more about Windows 10’s not-so-private settings and how these can be fixed. Turn personalized advertising off For those unaware, Windows 10 assigns each user an “advertising ID” to personalize your ad experience based on your recent browser history. If you’re okay with seeing generic ads targeted to you based on demographics rather than your ID, we recommend turning this feature off. First, click on the magnifying glass symbol next to the Windows logo, at the bottom left of your screen. Next, type in Privacy; click on it, and select General. Check your computer’s privacy settings for any changes. Lastly, open your web browser and go to this link. Once there, select Off for :Personalized ads wherever I use my Microsoft account” and “Personalized ads in this browser.” This resets your ad ID, allowing you to experience the joys of web surfing without the creepy targeted advertisements. Disable Cortana Voice-controlled digital assistants have become big business. Microsoft capitalizes on this market with Cortana, an incredibly resourceful, built-in assistant that allows you to quickly set reminders, schedule events, and send email, among many other intuitive features. It uses the information it collects similarly to how Google’s Android-based assistant does it. However, Cortana can become overbearing at times. To turn it off, click on the Cortana icon in the taskbar, followed by the notebook icon on the left hand side of the pop-up panel. Click on Settings; this should present you with the first option that says, “Cortana can give you suggestions, ideas, reminders, alerts and more”. Slide that to Off. Once disabled, the Cortana option disappears, and you’re now presented with a search bar that you can use to search for things online or on your desktop. Stop peer-to-peer file sharing With peer-to-peer (P2P) file sharing enabled, Windows 10 shares downloaded updates to your PC with other Windows 10 users by default. This helps other users update their systems faster, and speeds up your upgrade downloads, as well. However, if you are unhappy with your files being utilized by other users, you can turn it off. Head over to Settings once again. Click on Update and Security > Windows Update > Advanced Options, and finally select Choose how updates are delivered. By default, the “Updates from more than one place” setting is on, followed by two options: distribute updates only to PCs on local network, and shut off P2P updates entirely. If you want to disable this feature entirely without worrying about specifics, then move the slider to Off. If you want to share your files with PCs on your in-house network only, leave the slider in the On position and select PCs on my local network. For more detailed instructions on how to stop P2P updates, click here. Blunt Microsoft’s Edge Remember Internet Explorer? Think of Microsoft Edge as the same, just on steroids. The tech giant’s fancy new browser is chock-full of features — such as Cortana Integration and typing prediction — which may make you uncomfortable, since all the features send data back to Microsoft. To turn off these intrusive functionalities, open Edge and click on the menu icon in the far right corner (three horizontal dots). Once in, click on View Advanced Settings. There you have the option to disable Adobe Flash — which stops those Flash cookies from going anywhere. You’ll also encounter a bunch of settings you might want to disable under the Privacy and Services section. These simple security tips will stop Microsoft from tracking your online movements for good! In case you’re interested in protecting your privacy, don’t hesitate to contact us today for all matters security related. Published with permission from TechAdvisory.org. Source.
Fileless malware: Are you at risk?

Over the past few years, the security industry has been witnessing a rapid evolution in attack techniques, including fileless malware, which uses legitimate tools and services such as existing software, applications, and authorized protocols to carry out malicious activities such as unauthorized data retrieval or data damage. It therefore pays to stay abreast of such threats. What is fileless malware? Fileless malware is stored in random access memory (RAM) instead of on the hard drive. In a typical fileless infection, payloads can be injected into the memory of existing software or applications by running scripts within whitelisted or authenticated applications such as PowerShell, which is designed to automate system administration tasks such as view all USB devices, drives, and services installed in the system, schedule a series of demands, or terminate processes (i.e., Task Manager). Because there are no files to trace, fileless malware escapes detection from most antimalware programs, especially those that use databases of precedents. Furthermore, most automated sensors cannot recognize illicit scripts, and cybersecurity analysts who are trained to identify them usually have a difficult time establishing where to start looking. Fileless malware isn’t as visible compared to traditional malware. They employ a variety of techniques to stay persistent, and can adversely affect the integrity of a business’s process and the infrastructures that run them. Fileless malware by the numbers Cybersecurity firm Kaspersky Lab first discovered a type of fileless malware on its very own network a couple of years ago. The final verdict was that it originated from the Stuxnet strain of state-sponsored cyber warfare. The high level of sophistication and government funding meant fileless malware was virtually nonexistent until the beginning of 2017. In November 2016, attacks using fileless malware saw an uptick of 13% according to a report. In the same quarter, attacks surged 33% compared to the first quarter. During the first quarter of 2017, more PowerShell-related attacks were reported on more than 12,000 unique machines. Kaspersky Lab uncovered over 140 infections across 40 different countries. Almost every instance of the fileless malware was found in financial institutions and worked towards obtaining login credentials. In the worst cases, infections had already gleaned enough information to allow cyberattackers to withdraw undisclosed sums of cash from ATMs. In 2018, cybersecurity firm Trend Micro detected a rising trend of fileless threats throughout the first half of the year. Is your business at risk? It is unlikely your business would have been targeted in the earliest stages of this particular strain of malware, but it’s better to be safe than sorry. Businesses should practice defense in depth, where multilayered safeguards are implemented to reduce exposure and mitigate damage. But apart from cultivating a security-aware workforce, what actionable countermeasures can organizations do? While your business might not be in immediate danger, you should employ solutions that analyze trends in behavior. It is also wise to invest in a managed service provider that offers 24/7 network monitoring, proper patches, and software updates. Call today to get started. Published with permission from TechAdvisory.org. Source.
Monitor your business with Google Alerts

You can keep tabs on your business online and in real time using Google Alerts, a free and easy- to-use content change detection and notification service. You can even use this tool to monitor your competitors. Read on to learn how it can help you. What is Google Alerts? Google Alerts allows you to monitor the web for interesting new content on topics of interest to your business. It can also be used to alert you whenever your business is mentioned anywhere online, whether on Facebook, Instagram, Twitter, or wherever. How do You Sign Up For Google Alerts? Signing up and using this service is easy peasy! Just visit the Google Alert website, log in to your preferred Google account (if you have multiple accounts), and type in the words and phrases for which you want to receive alerts. How does Google Alerts Work? Just type your business’s name into your Google Alerts account, and whenever Google encounters relevant posts that mention your company, it will send you an email alert. This is an easy way to get notifications about articles featuring you or your business as soon as the posts go live. Modify how often you want to be alerted An avalanche of notifications can be overwhelming, especially if they’re cluttering your email. The great thing about Google Alerts is that it’s completely customizable. If you find that a keyword isn’t relevant to you anymore, you can change or delete it. You can even choose how frequent you want to receive emails and tweak the settings so you can receive the same alert across multiple email accounts in just a few clicks. The benefits With Google Alerts, you can easily keep track of your business without having to filter through irrelevant pieces of information that you come across when scrolling through your feed. With this tool, you can record all reviews about your business, competitors, clients, and suppliers in real time, allowing you to stay prepared and one step ahead of the competition. Explore the myriad tools and services built to make your life easier. Call us today! Published with permission from TechAdvisory.org. Source.
Lock down iOS 12 devices with these features

iOS 12, Apple’s latest mobile software offering, is finally available, and it promises to be better at keeping your data locked down. Here are some tweaks that you can make to boost iOS 12’s security and privacy settings. Set a stronger passcode iOS 12 now requires six-digit passcodes, and this means hackers will have a harder time cracking your passcode through a brute force attack. That’s because you can now go above and beyond that by setting a passcode with 8, 12, or more digits, or even a combination of numbers and letters. To do this, go to Settings > Touch ID & Passcode (or Face ID & Passcode on iPhones and iPads with Face ID) and enter your current passcode. Next, tap on Change Passcode and from Passcode Options, choose between Custom Numeric Code and Custom Alphanumeric Code. Enable two-factor authentication (2FA) With 2FA, you’re required to input both your password and a unique code sent to your device as an extra layer of security. The latter is considered by many as the most annoying thing about 2FA. But iOS 12’s built-in 2FA feature eliminates this step by sending the code to your device’s keypad, where it should appear as an Autofill option. Simply tap on the code to auto-fill the security field. To set up 2FA on your iPhone or iPad, go to Settings > Password & Security > Two-Factor Authentication, and follow the prompts. Keep track of and change your reused passwords You don’t need to be told what a security nightmare using the same passwords for multiple websites, apps, and devices is. Luckily, your iOS 12 device has a feature that will check for password reuse so you can finally kick this dangerous habit. To use this feature, go to Settings > Passwords & Accounts > Website & App Passwords and enter your passcode or authenticate with Face ID. You’ll see a list of all the passwords that you’ve used, and iOS will tell you whether you’ve used certain passwords before for various sites and apps. A small warning symbol will appear next to each account with a reused password. Change the password by tapping on Change Password on Website, and keep your device protected from password reuse attacks called “credential stuffing.” Turn on USB Restricted Mode This feature makes hacking into your iOS device through USB cables next to impossible. It’s not an entirely new feature, though, as you first saw it in iOS 11. Essentially, USB Restricted Mode locks down the charging port into power-only mode to prevent attempts to breach your iPhone’s or iPad’s security while it’s connected to a computer. However, the iOS 12 version does this after just one hour of being locked — far shorter than the seven days it takes the iOS 11 version to do so. To enjoy this feature, go to Settings > Touch ID (or Face ID) & Passcode, and turn off the USB Accessories setting. Enable automatic iOS updates You probably don’t think about updating your device unless Apple releases a major one. But by not updating regularly, you may be exposing yourself to a raft of security risks. You may also be missing out on cool and exciting new features, just like iOS 12’s auto-update feature. Go to Settings > General > Software Update and turn on automatic updates to get patches as soon as they’re released. With iOS 12, Apple has made massive improvements in the way you can keep your device and the data it holds safe and secure. For more tips on securing your iOS device and personal data, call us today. Published with permission from TechAdvisory.org. Source.
Expect CPU shortages until late 2019

Consumers and businesses increasingly rely on powerful computers to run high-tech applications. But in the coming months, they may have issues obtaining the PCs they need. Since 2018, Intel has reported a processor shortage, which some experts believe may not be resolved until the latter half of 2019. Read on to learn more. Reasons for the shortage There are many contributors to Intel’s long-running chip production problems. For starters, demand for Intel computer chips has been higher than expected as more businesses depend on resource-intensive applications, cloud computing, and state-of-the-art machines to gain a competitive edge. Additionally, there are major delays in the production of Intel’s next-gen 10-nanometer processors, largely because the company is short on capacity. This means businesses will not have access to PCs featuring these processors until much later in 2019. Intel also appears to be prioritizing development of server CPUs, as they make up a huge portion of the company’s revenue. Focusing on server chips, however, has resulted in slower production rates of consumer-grade CPUs. Desktop CPU revenues, in particular, lagged significantly behind notebook and server CPUs, which resulted in the shortage of chips for desktop PCs. What’s being done Experts predict that customers will have had enough server CPUs so production for these productions will slow down by the second half of 2019, freeing up enough capacity to meet the demands for desktop and notebook CPUs. In fact, according to Intel’s interim chief executive Bob Swan, “We are working closely with our customers to align demand with available supply while we add capacity and we expect supply-demand balance to improve by mid-year.” Intel also promises that PC shortage issues will be completely resolved by the third quarter of 2019. In the meantime, computer hardware manufacturers like Lenovo and Asus have their work cut out for them. To make up for the Intel chip shortage, PC manufacturers are strongly considering switching to AMD processors for desktops and laptops. What does the shortage mean for businesses? Businesses who are unable to acquire the newest Core, Celeron, and Pentium series processors for desktops and laptops may have to look for alternatives compatible with non-Intel chips. But if your company is running on a tight budget, it may make more sense to wait until late 2019 to upgrade to computers equipped with next-gen Intel processors. Sticking with older hardware does leave your business exposed to security and downtime risks, so it’s important to stay on top of the latest updates and regular maintenance. Fortunately, a top-notch managed services provider can proactively manage your hardware for a reasonable monthly fee. If you want to hear more about the latest hardware news and developments, stay tuned to our blog. We also provide services for all things IT, so contact us today! Published with permission from TechAdvisory.org. Source.
The dangers of the web and how to stay safe

You probably go to great lengths to keep yourself safe, whether at home or in public. But what happens when you get online? Learn more about how you could be exposing yourself and your personal information over the internet so you can stay safe. With the headlines about data breaches and cyberattacks greeting you every time you go online, it seems impossible to have a surefire, foolproof way to keep your information secure. Sometimes cyber predators are relatively harmless, but oftentimes, their goal is to steal identities and financial information. Virus scanners and firewalls can definitely help, but here’s an added layer of protection when you go online. What is private browsing? Your web browser — whether it be Chrome, Edge, Firefox, Safari, or Opera — stores the addresses of the sites you visit, cookies that track your activity, passwords you’ve used, and temporary files you’ve downloaded.This can be convenient if you frequently visit certain pages, can’t remember your login details, or if you’re trying to recall a website you visited a few days ago. But if someone else uses or gains access to your computer, your most private (and embarrassing) internet activities are exposed for anyone to see. With private browsing — also called Incognito Mode in Chrome and InPrivate Browsing in Edge — all the information listed above does not get recorded. In fact, all the websites and information you accessed during a private browsing session is discarded without a trace as soon as you close the browser. This can come in handy when you’re using a public computer because you’re instantly logged out of all the accounts after closing the window. Private browsing also prevents cookies from being stored on your computer. In a normal browsing session, sites like Facebook will inundate you with highly targeted ads based on the sites and pages you’ve visited. But in private browsing mode, your internet activity won’t be used against you by marketing companies. Another benefit of private browsing is you can use it to log in to several accounts on the same site, which is useful if you need to log in to two different Google accounts at the same time. Limitations of private browsing Although private browsing does prevent your web browser from storing your data, it doesn’t keep your online activities 100% private. If your computer is connected to the company network, system administrators can still keep track of what you’re browsing, even if you’re in Incognito Mode. Also, if spyware or keylogger malware is installed on your computer, hackers will still be able to see what you’re doing online. A keylogger malware records every key you punched in and may send this information to a predefined email address without you knowing. This means passwords, answers to verification questions, account numbers, credit card details, or even the words you type in a chat can be emailed to someone spying on your online activities. Even though private browsing has quite a few benefits, you shouldn’t solely depend on it for online privacy. Your computers and mobile devices must be equipped with Virtual Private Networks that encrypt your internet connection and prevent anyone from intercepting your data. And don’t forget to scan your computer for viruses with a strong anti-malware program to keep spyware and other malicious web monitoring software at bay. If you want to know where you can get these solutions or learn more about web browser security, call us today. We have the tools and expert advice you need to prevent anyone from snooping on your internet browsing. Published with permission from TechAdvisory.org. Source.
Tidy IT: emails, chats, and files in one app

It can be overwhelming to have several windows pulled up to manage your email, company chats, and any cloud storage that isn’t compatible with your inbox. Microsoft Teams helps streamline the basic necessities of office work to help you overcome the tedium of multitasking. The convenience of chat apps has enabled workers to cut down on time spent away from their workspace to quickly exchange information with colleagues. And work-related software isn’t just becoming more mobile, it’s also getting more user-friendly, with apps like Microsoft Teams bringing together several different platforms. Here’s how you can use that to your advantage: Use SharePoint to store and share files You might already be using SharePoint to store files and collaborate with your teammates. But did you know that in every Teams channel, you can click the Files tab to share files from SharePoint with team members? You can also access SharePoint files that are already shared in the channel and use Office Online or Office Desktop to collaborate on those files. Forward emails into a channel You get countless emails every day, many of which might be lost in your inboxes. Fortunately, Microsoft makes it easy to forward any email message from Outlook to a channel in Teams so they show up in both platforms. Just click the ellipsis next to any channel name and select Get email address. This generates an email address for the channel, which you can copy and use to forward files, documents, and messages. Stick with a few groups While you can create as many groups within your organization as you like, going overboard can result in a cluttered messaging interface that overwhelms team members. We recommend you create groups based on the number of projects and team members involved; you can always add more if necessary. Set up audio conferencing Teams lets you host voice meetings with groups or with just one team member. This is particularly useful when communicating with remote workers or clients, in which case you can give them guest access to your Teams channel. Guest access ensures they’re able to communicate, but unable to view private information. Test communication strategies Just because some of the features in Teams overlap with other Microsoft platforms, such as Yammer and Skype for Business, doesn’t mean they’re all redundant. Think of it as a chance to test different communication strategies to find out what works best for you. For instance, if most of your clients have a Skype ID, you can use Skype for client calls and Teams for internal calls. Share conversations with new team members Teams makes onboarding new hires easy. Rather than forwarding numerous emails and documents to new employees, you can use Teams to share past conversations and projects with them. This enables everyone to catch up without having to deal with cumbersome documents. Microsoft Teams and other Office solutions are equipped with plenty of useful features that can take some time to master. But by taking advantage of these tools, you’ll be able to save time and maximize efficiency, all without having to spend a dime. If you have any questions about Microsoft Office and how it can benefit your business, don’t hesitate to give us a call. Published with permission from TechAdvisory.org. Source.
Which social media platform is best for you?

Finding the right channel to promote one’s business is a growing challenge in the digital age, with social media acting as an indispensable business tool. The question is, what else can you do aside from updating your status? Here are five ways to help you enhance your social media marketing. Social media has helped businesses not only to cut down on customer service costs, but also to cut corners in their marketing efforts. For you to get the most out of social media, you need to evaluate which tools work best in our industry, how much of your time a social media project is worth, and how to apply common best practices. 1. Choose the right platform Since the internet offers a buffet of free, easy-to-use platforms, it’s tempting to sign up for all of them. Without due prudence, however, you might find yourself managing more accounts than you have time for. Ask yourself these questions before choosing which platform to use: Who is my target customer and what channels do they use? What do I hope to gain by opening a social media account? What kind of content do I want to share and create? How much time can I devote to social media management? Investing more time in fewer platforms helps you monitor the more important areas of your business. 2. Know when to update Are most of your customers online at 8:00 am or 8:00 pm? With a better understanding of your target users’ habits, you can schedule your posts so they create more traffic, increase brand engagement and, eventually, generate new leads and customers. Although the best time to post content changes based on your industry, location, and other factors, these are the most successful times on average: Facebook: 1:00 pm-3:00 pm on Thursday and Friday Twitter: 3:00 pm-8:00 pm, Monday to Friday for B2B and Wednesday, Saturday, and Sunday for B2C organizations YouTube: 12:00 pm-3:00 pm, Thursday to Sunday LinkedIn: 8:00 am-5:00 pm, Monday to Friday 3. Use attractive, professional-looking visuals One of the simplest ways to get followers to share your posts is by uploading high-quality photos, videos, and infographics along with your messages. Studies have shown that Facebook posts with images result in 39% more engagement, while tweets with images or videos create 200% more engagement. 4. Engage with your followers It’s important for businesses to maintain a healthy back-and-forth on social media. This means beyond sharing useful content, you should also respond to their comments and private messages as quickly as possible. You can build stronger relationships with customers by writing thank you comments to anyone who shared positive experiences with your business and by addressing negative comments with personalized and helpful responses. 5. Pump the brakes on promotional materials Although social media is a valuable tool, it’s important not to muddy the water with too many promotional posts. A rule of thumb for social media promotions is that 80% of your posts should be shareable and interactive content, while the remaining 20% should be about your business. This will result in more engagement, a more consistent brand image, and a healthier bottom line. Social media can help your business succeed, but only if it’s used correctly and effectively. If you’re interested in adopting the right social media platform to increase engagement and create a stronger brand reputation, contact us today and we’ll help you get started. Published with permission from TechAdvisory.org. Source.