Best uses for virtual desktops

In the world of IT, there is a continuous quest to build systems with less time, funds, and effort. This is why virtualization has become so popular. One type of virtualization, virtual desktop infrastructure (VDI), provides a consistent desktop experience from any device. It is most helpful in the following scenarios: Healthcare In an industry where every file is sensitive, the importance of confidentiality can’t be overstated. With VDI, rules and permissions can be customized based on the individual virtual desktop. As such, every medical professional can only view patient records relevant to them. It also allows them to log into their virtualized desktop while working across a variety of locations and devices. Academic institutions By leveraging VDI, a school’s IT team can create a virtual desktop — with the necessary restrictions implemented — for each student. If each classroom has a set of workstations, students’ desktop experiences will be consistent throughout their day. Even though they’ll be using different hardware every hour or two, they’ll always see the same desktop. Companies with shift workers In most cases, shift employees don’t really need one designated computer to fulfill their task because one computer is shared by multiple users. VDI makes it easy for companies to manage several desktop accounts on fewer devices. Workers can log into any devices, access their own virtual desktop, work as they do every day, and log off at the end of their shift. Users with multiple computers Depending on the nature of work, some positions require working with several computers on a regular basis. With VDI, they can integrate desktops and maintain it across two or more devices. Field or remote staff Employees that work remotely or in the field need access to tools and applications when on the job. A secure and reliable way to do it is through VDI. A complete VDI solution makes access to a consistent desktop experience possible anytime, anywhere, and using any device. It allows your remote or field workforce to operate effectively, no matter the circumstances. Of course, these are just a few situations where VDI is helpful. Any business can enjoy security and productivity enhancements with a team of virtualization experts on call. Contact us today to find out how we can help. Published with permission from TechAdvisory.org. Source.
How to ensure collaboration tools adoption

Businesses continue to install tools like Skype, Slack, Yammer, HipChat, Google Hangouts, and Microsoft Teams, but many struggle to get users to adopt them. Adoption, however is not something that comes overnight; it requires in-depth strategies. Here are ways to ensure people make use of your collaboration tools. #1 Conduct an audit and have your use cases ready – The first thing you need to do is run an internal audit to figure out which collaboration tools are in your environment and why. Then, make sure you have a handful of clear, real-life use cases ready to share on how the tool can be used and what benefits they can help achieve. For example, a project-oriented team may be more open to using Microsoft Teams if they see the built-in project management and workflow features the software provides. #2 Select the right tool and approach for the job – Understand that collaboration tools have to work the way your people do, not the other way around. This means if you purchase a VoIP system with a glut of call features you’re never going to use — like voicemail to mail or whisper and barge features — adoption rates will suffer. And if you are unsure about how your company will react to the new collaboration tool, sign people up for a free demo and ask for their honest feedback. #3 Do proper testing and train users – Before encouraging widespread use of new collaboration tools, you’ve got to ensure that you’ve optimized your IT infrastructure to cope with the added demands — and that means properly testing your network ahead of deployment. Then, train your employees how to conduct calls and communicate through the software. Once they understand how to use the collaboration tool, they’re more inclined to use it for their day-to-day tasks. #4 Plan a phased deployment – For higher chances of success, go with a phased deployment. Start by piloting your chosen tools with a group of early adopters, learn from them, and make adjustments. Next, extend that pilot from a small group of users to a department. Repeat the same process before deploying the tools to more departments, then eventually, to the entire organization. #5 Regular monitoring – Finally, you should monitor the quality and performance of your employees using the software. This will allow you to spot and fix user-experience issues early on. Overall, a good introduction can ease employees into using the new VoIP and collaboration tools. And with proper usage, these tools can enhance productivity and promote well-coordinated teams. Call us today to accelerate your enterprise’s adoption of collaboration tools. Published with permission from TechAdvisory.org. Source.
Top 7 Office 365 Productivity Add-Ons

Microsoft’s cloud-based Office 365 has successfully made day-to-day business operations more efficient with popular apps like Word, PowerPoint, Excel, OneNote, and Outlook. What’s more, it also offers productivity-boosting add-ons that streamline users’ workflow. #1. StaffHub You can now easily keep track of your employees’ work hours, allow employees to swap shifts, and make changes where appropriate with Microsoft’s StaffHub app. What’s more, employees can also communicate with team members through its internal community spaces, check out new company updates, and add important internal resources like employee handbooks or training manuals through the app. The app is available on any mobile device, making it a very convenient tool for employees who need to manage their schedule and stay up to date. #2. Office Tabs Office Tabs allow you to open multiple files in one window, which saves you time from having to go through each opened document until you find the right one. As such, you can close or save all or everything but the current active document in a single click. You can also directly rename files by clicking Rename, instead of going through the tedious process of clicking Save As and then changing its name. #3. Grammarly The last thing you want to send to your clients is a confusing, poorly written email or document. Grammarly solves this by having your text go through rigorous grammar, spelling, and plagiarism checks. It then provides vocabulary suggestions and recommends writing style changes to polish your writing. This add-on is available in Word and Outlook, and its Premium counterpart is priced at $11.66 per month (annual plan). #4. Pexels Professional documents and presentations require high-resolution, blemish-free images, and Pexels helps you get them easily. Its free stock images are under a Creative Commons Zero license, meaning you can search high-quality images and use them in all your documents for any purpose with no legal repercussions. #5. DocuSign DocuSign for Outlook and Word lets you or the recipient securely sign the document electronically and send it through email, save it in the app, or store it in your company’s server. DocuSign complies with eSignature legal standards and is secured with an end-to-end Digital Transaction Management, ensuring your files will never be leaked or breached. #6. FindTime Setting up a meeting time is tedious and difficult, especially if your employees have different schedules. FindTime automatically scours every attendee’s personal schedule to locate open slots, and creates possible meeting time options for everyone to vote on. A meeting will then be scheduled according to whichever slot gets the highest vote within a specified amount of time. #7. Translator Businesses that deal with foreign companies will find communication much easier with Translator. This add-on recognizes and translates more than 50 different languages, including English, French, Spanish, and Chinese. Not only will you now spend less time understanding foreign-language documents, but you’ll also be able to work with clients from various parts of the world. Start improving work productivity and make the most out of your Office 365 with Microsoft productivity add-ons. To get started or learn more about Office 365, Microsoft add-ons, or anything Microsoft Office related, contact us today. Published with permission from TechAdvisory.org. Source.
The new features in Windows 10 Redstone 5

Hot on the heels of the Windows 10 April 2018 Update, also known as Redstone 4, is the highly anticipated release of Redstone 5. While no official launch date has been announced, word is that it will drop around the final quarter of 2018. What can we expect from this latest major update? 1. Windows Sets Sets takes the concept of tabs in your browsers and applies it to the whole Windows operating system (OS). It allows users to open a window with tabs for apps, files, web pages, programs, basically anything and everything. For example: You’re working on a Word document and need to go online for research. Sets will open the web page in a tab beside your Word file. Then when you create a Powerpoint presentation for your report, it appears in a third tab. Everything connected to your Word document is neatly organized in a Set. So the next time you open your Word file, a prompt will remind you of the online article, PowerPoint presentation, and all other tabs related to your document. Microsoft explained it as “content that belongs together should stay together.” 2. Cloud Clipboard Cloud Clipboard is shared across all your Windows 10 devices, so you can copy-paste between different devices. Cloud Clipboard also logs the things you copy, so you can refer back to them later. 3. Snipping Tool + Screen Sketch app The current Snipping Tool in Windows is a bit cumbersome and inconvenient for quick screenshots. Now you can press ALT + Shift + S to open the Snipping Tool from any screen. There are also new types of snips you can make: Rectangular snip — Form a rectangle (or square) around an object. Window snip — Select a window or dialogue box that you want to snip. Free-form snip — Draw a freeform shape around an object. Full-screen snip — Take a snip of the whole screen. Snipping Tool also allows you to launch the Screen Sketch app with one click, so you can immediately edit your image. 4. Dark theme for File Explorer Microsoft finally added a dark theme to its File Explorer, so you won’t be blinded when you browse in the middle of the night. 5. Improved search experience Searching for files and apps from the Windows taskbar will have a wider display window to show more content and information. It also allows you to open related documents and perform related actions. 6. Improved Your Phone app This app makes it a lot easier for iOS and Android smartphones to interact with your PC. You can send and receive SMS; and drag and drop files, photos, and more from phone to PC and vice versa. These are just some of the reasons why there’s much ado about the upcoming release of Windows 10 Redstone 5. Get ready for more updates and new features when it launches this September or October. If you need help with anything Windows-related before then, we’re always available. Give us a call today! Published with permission from TechAdvisory.org. Source.
Router malware worse than experts realize

In May, security experts discovered one of the most widespread malware infections in history. Now, they’re warning businesses and consumers that it’s even worse than their first assessment. The VPNFilter malware poses a threat to small businesses and requires immediate attention from anyone who hasn’t taken action against it. VPNFilter recap A team of security researchers from Cisco released a report that a strain of malware had been discovered on hundreds of thousands of routers and network devices. Originally, researchers believed it affected only Linksys, MikroTik, Netgear, and TP-Link devices. Like many malware strains, VPNFilter infects devices that use default login credentials. But it’s worse than the average cyberattack because it can destroy router hardware and cannot be removed by resetting infected devices. As if destroying 500,000 routers wasn’t bad enough, VPNFilter lets its creators spy on networks and intercept passwords, usernames, and financial information. What’s new Just two weeks after VPNFilter was discovered, security experts announced that it targets 200,000 additional routers manufactured by ASUS, D-Link, Huawei, Ubiquiti, UPVEL, and ZTE. Worse yet, VPNFilter can alter data passing through infected routers. That means when you enter a username and password into a banking website, hackers could steal that information and show you an incorrect account balance to hide fraudulent deductions. How to stop VPNFilter Rebooting a router won’t remove the malware, you need to factory-reset the device. Usually, all this requires is holding down the Reset button on the back of the device for 10-30 seconds. If your router has no reset button or you’re unsure whether pressing it did the trick, contact a local IT provider immediately. Cybersecurity threats have become so prevalent that even large enterprises struggle to keep their digital assets safe. Outsourcing IT support to a managed services provider like us will give you enough capacity to deal with issues like VPNFilter as soon as they arise. Call us today to learn more. Published with permission from TechAdvisory.org. Source.
What’s new at the 2018 Apple WWDC?

San Jose, California, recently hosted WWDC 2018. Apple’s engineers interacted with the developers in attendance, while everyone at the event got a sneak preview at the computer manufacturer’s upcoming products and software. Check out the highlights from the event right here! A more personal, faster iOS 12 Apple has focused on improving the operating system’s performance so that iPads and iPhones become more responsive and work faster. The good news is that older devices that can still run iOS 11 will be compatible with iOS 12. Developers tweaked the software to make apps launch quicker, especially the keyboard and camera. The latest version of iOS is designed to optimize its system when it is under load, so that Apple products run faster when the user demands higher performance. Fresh features aimed at impressing consumers include the Memoji, an Animoji that users can customize to their preferences. Group Facetime supports video conferences of up to 32 individuals, and these fun tweaks can be used in both Facetime via the Effects camera and in Messages. A smarter Siri Apple’s signature digital assistant can now answer queries about motorsports, food, and famous people. There is a new Shortcuts feature integrated in the Workflow app, which allows users to automate various tasks in first- and third-party apps, to be triggered through Siri voice commands. Both Shortcuts and suggestions by Siri appear on the Lock screen, and third-party Shortcuts integration will let Siri do more when the user pulls the Lock screen down to search. A dedicated Shortcuts app will be available later this year to give users a quick way to build Shortcuts from dozens of preset options. An alternative to Google Photos The iOS Photos app may be useful to Apple product users, but it may seem too basic for some. Once iOS 12 is released however, a clever Photos app will showcase most of the features that Google Photos has. The Search feature has been improved – users can look for images based on general terms such as “park” or even business names, and multiple terms can be searched (such as images from Africa during a particular month). All pictures will be arranged by place and time in case the user wants to perform searches with those variables. A new tab labeled “For you” will contain the auto-generated albums which Photos makes, and is sorted with any shared albums. Speaking of sharing, the enhanced Photos app will proactively advise users on what images to share according to who is in the pictures. A refined WatchOS Apple’s upcoming WatchOS 5 will introduce users to new ways of connecting to the world while staying active. It may not be a radical revision for the wearable device, but the apps and features it provides will be more helpful and fun for the user. The highlight of WatchOS 5 is the Walkie-Talkie app, an innovative method of communicating by combining the natural flow of messaging with real-time voice discussions. Just like the conventional product that the app is based on, users simply press and hold down a virtual Talk button to converse with friends and family. Hiking and Yoga have been added to the list of workout types, while users can keep track of their Outdoor Runs more effectively with support for cadence, the custom pace alert, and the rolling mile pace. Automatic workout detection will make sure that the Apple Watch will always stop or start recording user activity while exercising. This feature works with Open Water Swim, Pool Swim, Rower, Elliptical, Indoor Walk, Outdoor Walk, Indoor Run, and Outdoor Run. To get users motivated to work up a sweat, WatchOS 5 has a Competition feature that allows friends and family to challenge each other in a contest to see who can get the most activity points within a week. The watches will post regular progress reports to let contestants know how they are doing, and the winner will get a special award. These updates can change at any time, and will be released by Fall this year. If you need more information on making use of Apple devices and software, or if you have other computer-related concerns, feel free to contact us today! Published with permission from TechAdvisory.org. Source.
Google Pixel 3 rumor roundup

New Google smartphones are expected to be released in late 2018. So far, details of the new device — which will most likely be dubbed Google Pixel 3 — have been scarce, but we’ve rounded up all the latest leaks. Read on to find out more. Design What we’re hearing through the grapevine is that the Pixel 3 will look a lot like its predecessor, featuring its classic backside shade, a USB-C port, and speakers in the bottom bezel. However, the larger Pixel 3 XL model could have a notch for the front-facing camera just like the iPhone X. The Pixel 3 will be around 5.3 inches, while the 3 XL version will be around 6.2 inches. Google also hinted that there might be a third model released this year that could be a more compact, mid-range model for consumers on a budget. Wireless charging Leaked images show that the Pixel 3 has a glass back like the iPhone X and Samsung Galaxy S9 series. Although nothing is set in stone, this could be an indication that the Pixel 3 will have wireless charging features. Improved camera While several other companies’ smartphones come with two rear cameras, it looks like Google is sticking with one. However, the single-lens rear camera will probably be powered by Google’s AI camera technology to take higher-quality photos with more background blur. Faster hardware Experts anticipate that the Pixel 3 will have significant improvements in its internal components. One leak has revealed that the Pixel 3 model will have at least 4GB of RAM and a modern, 2.8 GHz smartphone processor. That’s as fast as some mid-range laptops today, making the Pixel 3 an attractive option for executives who need a bit more power in their mobile devices. Release date Google has typically unveiled Pixel phones in early October, so look for the Pixel 3 and Pixel 3 XL sometime this autumn. It’s also expected to be the first device to come with the highly anticipated Android P operating system, so think of it as an early Christmas present. But remember, Google is still working on the Pixel 3 and Pixel 3 XL, so there’s plenty of time for more changes and more updates. To follow all the updates about the Pixel 3 and be the first to hear about the release date, stay tuned to our blog. We stay on top of the latest tech trends to help you sharpen your competitive edge. Published with permission from TechAdvisory.org. Source.
Hide & Seek: New IoT malware to watch out for

You probably think your Internet of Things (IoT) devices don’t need as much protection as your PCs or laptops. Newsflash: They’re actually even more vulnerable to hacking. In fact, researchers have discovered a terrifying strain of IoT malware that can infect your devices. What is the Hide And Seek malware? The Hide and Seek (HNS) malware has created a “botnet” by quietly infecting thousands of devices using advanced communication methods. Without getting too technical, a botnet adds or “recruits” computers to their network to carry out malicious acts, such as overloading a network by telling every infected device in the botnet to try and connect at the same time. The new HNS can’t be removed by resetting the infected device, which is the solution for most IoT malware strains. The new strain can also exploit a greater variety of devices and in less time than its predecessors. Experts believe it has already compromised more than 90,000 IPTC cameras and other devices. IoT devices are easily hacked if they connect to the internet, which is home to opportunistic cybercriminals. And because businesses and consumers are expected to acquire and use more IoT devices (the market is expected to reach $1.7 trillion by 2020), it’s imperative to take cybersecurity precautions. How can I protect my IoT devices? Luckily, there are steps you can take to keep your devices — and ultimately your network and data — safe from HNS and other forms of malware. Turn off your IoT devices when not in use to reduce their exposure to fast-spreading malware. Take simple precautions to keep your WiFi networks safe, like changing your network’s default settings (including your network’s name), and using complex passwords that are changed from time to time. For those who use a large number and variety of devices, install a threat management system that will block intruders and secure common threat entry points. With HNS and other malware strains expected to increase in number and complexity, it’s more important than ever to take a multi-layered approach to security. Call us today to learn more about which cybersecurity solutions are right for your business. Published with permission from TechAdvisory.org. Source.
Chrome to mark HTTP as ‘not secure’

Google Chrome currently marks HTTPS-encrypted sites with a green lock icon and “Secure” sign. And starting in July, Chrome will mark all HTTP sites as “not secure.” Google hopes this move will nudge users away from the unencrypted web. Read on to learn more about the forthcoming changes. For several years, Google has moved toward a more secure web by strongly advocating that sites adopt the Secure HyperText Transfer Protocol (HTTPS) encryption. And last year, Google began marking some HyperText Transfer Protocol (HTTP) pages as “not secure” to help users comprehend risks of unencrypted websites. Beginning in July 2018 with the release of a Chrome update, Google’s browser will mark all HTTP sites as “not secure.” Chrome’s move was mostly brought on by increased HTTPS adoption. Eighty-one of the top 100 sites on the web default to HTTPS, and the majority of Chrome traffic is already encrypted. Here’s how the transition to security has progressed, so far: Over 68% of Chrome traffic on both Android and Windows is now protected Over 78% of Chrome traffic on both Chrome OS and Mac is now protected 81 of the top 100 sites on the web use HTTPS by default HTTPS: The benefits and difference What’s the difference between HTTP and HTTPS? With HTTP, information you type into a website is transmitted to the site’s owner with almost zero protection along the journey. Essentially, HTTP can establish basic web connections, but not much else. When security is a must, HTTPS sends and receives encrypted internet data. This means that it uses a mathematical algorithm to make data unreadable to unauthorized parties. #1 HTTPS protects a site’s integrity HTTPS encryption protects the channel between your browser and the website you’re visiting, ensuring no one can tamper with the traffic or spy on what you’re doing. Without encryption, someone with access to your router or internet service provider (ISP) could intercept (or hack) information sent to websites or inject malware into otherwise legitimate pages. #2 HTTPS protects the privacy of your users HTTPS prevents intruders from eavesdropping on communications between websites and their visitors. One common misconception about HTTPS is that only websites that handle sensitive communications need it. In reality, every unprotected HTTP request can reveal information about the behaviors and identities of users. #3 HTTPS is the future of the web HTTPS has become much easier to implement thanks to services that automate the conversion process, such as Let’s Encrypt and Google’s Lighthouse program. These tools make it easier for website owners to adopt HTTPS. Chrome’s new notifications will help users understand that HTTP sites are less secure, and move the web toward a secure HTTPS web by default. HTTPS is easier to adopt than ever before, and it unlocks both performance improvements and powerful new features that aren’t possible with HTTP. How can small-business owners implement and take advantage of this new interface? Call today for a quick chat with one of our experts to get started. Published with permission from TechAdvisory.org. Source.
The dangers of app overload in businesses

Businesses today rely on countless apps and software for day-to-day operations. However, too many of these programs can do more harm than good. App overload brings confusion among employees, and a recent study shows that this costs more than companies realize. How app confusion occurs A new study conducted by CITE Research shows that a surplus of apps is causing a great deal of confusion in the workplace. Among the 2,000 workers from the US, UK, and Australia surveyed, 69% wasted as much as 32 days a year navigating between apps — that’s an hour of productivity lost every single day. The same research — entitled From Work Chaos to Zen: How Application Overload Redefines the Digital Workplace — reveals the biggest problem is with communication apps and channels. On average, a single worker juggles four communication apps every day, which is pretty much like holding four conversations at one time. It’s even worse for 20% of the respondents who said they use six or more. Furthermore, the average worker flips between apps as frequently as 10 times per hour, which means more time wasted. 56% of respondents felt that searching for information stored across different apps was disruptive while 31% said it caused them to lose their line of reasoning. It’s tempting to see each individual app as a problem-solver, but when looking at the bigger picture, it could be causing problems. Coming up with a solution Clearly, app overload has an immense effect on productivity, and the gap between executive perception and employee perception doesn’t help. Before signing up for yet another app, give your workflow a second look and consider the impacts of disruptive activities and employee preferences. In the CITE Research study, workers agree that having only one communication app would clear up all the confusion. Regardless of what the best solution is, it’s probably more affordable than most small business owners realize. A managed IT services provider like us can provide guidance that puts you on track for long-term success. Give us a call today for more info. Published with permission from TechAdvisory.org. Source.