Beware of watering hole attacks!

Hackers have plenty of ways to breach your systems. They can use complex programs to exploit software bugs, send emails to dupe you into downloading malware, or insert a malware-infected USB drive directly into your computer. However, another increasingly popular hacking method is a watering hole attack. What are watering hole attacks? Much like phishing, a watering hole attack is used to distribute malware onto victims’ computers. Cybercriminals infect popular websites with malware. If anyone visits the site, their computers will automatically be loaded with malware. The malware used in these attacks usually collects the target’s personal information and sends it back to the hacker’s server. Sometimes the malware can even give hackers full access to their victims’ computers. But how does a hacker choose which websites to hack? With internet tracking tools, hackers find out which websites companies and individual users visit the most. They then attempt to find vulnerabilities in those websites and embed them with malicious software. Any website can fall victim to a watering hole attack. In fact, even high-profile websites like Twitter, Microsoft, Facebook, and Apple were compromised in 2013. You can protect yourself by following these tips. Update your software Watering hole attacks often exploit bugs and vulnerabilities to infiltrate your computer, so by updating your software and browsers regularly, you can significantly reduce the risk of an attack. Make it a habit to check the software developer’s website for any security patches. Or better yet, hire a managed IT services provider to keep your system up to date. Watch your network closely To detect watering hole attacks, you must use network security tools. For example, intrusion prevention systems allow you to detect suspicious and malicious network activities. Meanwhile, bandwidth management software will enable you to observe user behavior and detect abnormalities that could indicate an attack, such as large transfers of information or a high number of downloads. Hide your online activities Cybercriminals can create more effective watering hole attacks if they compromise websites only you and your employees frequent. As such, you should hide your online activities with a VPN and your browser’s private browsing feature. At the end of the day, the best protection is staying informed. As cyberthreats continue to evolve, you must always be vigilant and aware of the newest threats. Tune in to our blog to find out about the latest developments in security and to get more tips on how to keep your business safe. Published with permission from TechAdvisory.org. Source.
Setting up your G Suite activity dashboard

G Suite users can finally see which of their colleagues viewed a document on the new activity dashboard, along with a time and date. It functions as an added collaboration tool in Google Slides, Docs, and Sheets showing every file comment, change, or suggested edit. Here are two ways to properly configure it. Allow display views inside and outside your business Your activity dashboard typically allows only internal collaboration without any access to other details. As long as your G Suite administrator enabled view history, you can determine which of your teammates has read your shared Google documents. The tech giant takes this feature a step further by allowing you to view when people outside the office opened your files. For this to work, you have to… Open Google Slides, Docs, or Sheets Select Share Type in the email address of the person outside your business To ensure security, you can only see the view history for people outside your business with whom you explicitly shared the file. This means you don’t have access to external viewers if you chose to share files via Public on the web or Anyone with the link. Do keep in mind that view history is available only once you received an initial notice from your administrator and had the chance to edit privacy settings. Limit activity dashboard view monitoring If you’re using the most updated version of G Suite with the activity dashboard, your administrator can change the settings by: Logging in to in the Admin console where you’ll be redirected to the Apps section In the Apps section, press G Suite option In the G Suite option, select Drive and Docs Once there, click on Activity dashboard settings Within the settings, you can adjust the Access to Activity dashboard to determine whether or not users can see the activity dashboard. You can also modify Users’ view history if you want to monitor only files and accounts in your business, all user views, or none at all. If you’re unable to decide, we suggest allowing people to have access to the activity dashboard and enabling view tracking for all users. Google constantly adds new features to their G Suite platform, so stay in touch with us to know how you can use them to boost business operations and productivity. Give us a call today and we’ll introduce you to a suite of Google tools that can take you another step toward achieving your business goals. Published with permission from TechAdvisory.org. Source.
Back up your files with Apple Time Machine

There’s a popular belief that Macs are the most reliable computer brand because they are less likely to get viruses or crash often – but they do. And like any other computer, Macs aren’t invulnerable to coffee spills, theft, and crashes. When these happen, the Time Machine is your friend to restore your data. What is Time Machine and why should you use it? Time Machine is a backup system software for Macs that run on Mac OS X Leopard or later. It makes regular periodic backups in the following intervals: Hourly backups for the past 24 hours Daily backups for the past month Weekly backups for previous months If you’re concerned about storage space running out fast because of the frequent backups, don’t worry. These scheduled backups don’t replace previously saved files; rather, they only save the changes you’ve made to a file. Let’s say you’ve been working on a file for five days: Time Machine has periodically created backups of the changes you made every day. So if you need to retrieve a version of a file with changes made on Day 2, you can do so even after you’ve made several changes on the file from Days 3-5 because Time Machine stores multiple copies of the file from Days 1-5. In case you’re replacing a Mac, you can easily copy all your files from your old computer to the new one, with your settings, files, and folders intact. And if you’re backing up data from several Mac computers, there’s no need to use a separate device for each Mac, provided it has enough space for all files. How to use Time Machine To use Time Machine, you only need an external storage drive such as a USB, an SSD card, or any storage device that can be plugged into your Mac. Then follow these steps: Connect an external storage device (or macOS server) to your Mac Go to System Preferences > Time Machine Click ‘Use as Backup Disk’ (It’s recommended that you click Encrypt Backup Disk before you do so, in order to set up a password for accessing your backup) If Time Machine doesn’t automatically pop up when you connect an external storage disk, go to Time Machine via System Preferences or click the Apple icon on the upper left corner of the menu bar, click System Preferences > Time Machine Select the storage disk you’ve just connected, then click ‘Use Disk’ Other backup options Although there are various other backup systems for Mac, Time Machine is one of the more practical options for users who value simplicity, convenience, and reliability. What’s more, it’s free. That said, similar backup systems like ChronoSync offer slightly more comprehensive backups. And since Time Machine only backs up data instead of the entire hard drive, restoring an entire system is relatively slower. Despite this minor shortcoming, Time Machine is a reliable, user-friendly, and economical way to back up your files. Whether you’re backing up a device for personal or business use, using Time Machine ensures all your files are safe and can be recovered. If you need more comprehensive backup solutions, our experts are ready to help — call us today. Published with permission from TechAdvisory.org. Source.
How to enjoy real cloud cost-savings

If you want to increase collaboration, productivity, and security all while keeping costs down, the cloud is the perfect solution. But if you’re not careful, hidden charges can creep up on your monthly bill, preventing you from truly reaping the benefits of the cloud. Fortunately, there are some things you can do to bring these costs down. Don’t go for standalone services Standalone services are the biggest price trap in the cloud. Spending on a standalone cloud software may seem harmless now, but if you decide to purchase similar services, the costs can quickly pile up. Then, there’s the issue of integrating these systems together, which costs even more time and money. The best way around this is to find a service provider that offers a suite of products that work seamlessly together. Platforms like Office 365 or G Suite are great examples, and offer you differently priced packages based on the size and requirements of your business. Team up with integration experts If you do need to subscribe to a standalone service, you’ll want to integrate it with the rest of your cloud platform. But if you have limited experience with integrations, mistakes are likely to happen and cause downtime, which will inevitably cost you time and money. The more economical option is to partner with a cloud integration expert, as they can quickly configure and deploy your systems with zero mistakes. Understand cloud backup costs While cloud backups are great for keeping your data secure, you must know how much you’re paying for them. If you plan on storing your data for a long time, you may be charged more. At the same time, if you store more versions of your data, it will cost you more. One way you can keep costs down is to ask yourself whether certain files even need to be stored in the cloud. Mission-critical files like customer information, legal document, and business plans should be stored in the cloud so you can retrieve them right away after a disaster, but routine documents like timesheets can probably be stored in less expensive data centers. Remove unnecessary accounts Most cloud service providers charge you based on the number of users per month, so if you’re not diligent about removing accounts when employees have left your company, you could be throwing your money down the drain. To avoid this, you need to have deprovisioning procedures in place for when an employee’s contract is terminated. Create a spreadsheet of each employee in your payroll and note down their cloud subscriptions. When an employee leaves your company, you must delete all their business accounts and give the relevant manager access to all their documents. It’s also a good idea to schedule regular audits to make sure you’re not paying for people who’ve already left your company. Work with a trustworthy provider Last but not least, you’ll want to partner with a cloud services provider that not only gives you the best deals on cloud solutions, but also proactively monitors your account and warns you about any issues regarding the computing resources and storage space you’re using. If you’re looking to keep cloud costs under control, talk to us today. We’re certified and experienced with all aspects of cloud technology, and we can show you how you can truly benefit from it. Published with permission from TechAdvisory.org. Source.
4 ways to speed up mobile charging

Whether you use an iPhone or a Xiaomi, your mobile will sooner or later run out of battery. When this happens, you want it to be charged to 100% quickly, but not everyone knows how to do it. Read on to learn four ways about how you can charge your mobile faster. #1. Optimize your phone accessories One reason why your phone charges slowly is because of poor-quality accessories — such as cables, adapters, and weak sources of electricity. Cables and adapters Unless you were careful to take great care of your phone cable and adapter, they might be the reason why your phone is charging so slowly. If you think this could be the problem, we recommend that you change them immediately. After doing so, make sure to use and store your new cable and adapter properly to keep them in tip-top shape. Charging Source Did you know that your phone will charge faster if you connect it to a higher amperage charging source? Although mobile phones charge at only 5 volts, depending on the charger you use, you can get amperage from as low as 500mA (milliamps) to as high as 2,100mA. Therefore, it is recommended to forgo charging your mobile device through a computer port (uses 500mA or 900mA) and use a wall charger (ranges from 500-2,100mA) instead. #2. Clean your phone’s charging port Another reason why you may experience slower charging time is because of a corroded or obstructed port. If the problem is because of obstruction, get a flashlight, magnifying glass, toothpick, and small brush to completely remove any debris. However, you should be very careful when doing this because the port is very fragile. We recommend you enlist a professional’s help to clean your port if you’re worried about damaging it or if the problem is due to corrosion. #3. Background apps When was the last time you sorted out your phone’s background apps? If you don’t remember, then it’s time to do it! Apps that are opened and left running in the background not only drain your phone’s battery, but also affect your phone’s charging speed. Select “Battery” in your phone’s Settings to find out which apps are using up your phone’s power, and delete them if necessary. #4. Using your phone while charging Do you browse the internet while your phone is charging? If yes, then you should stop doing it. Feature-rich apps like WhatsApp and Facebook have been listed as two of the top ten battery draining apps by AVG, which means you may be slowing down your phone’s charging speed when you use them while it charges. Every successful business needs high-performance mobile phones, but this is only possible if their batteries are juiced. If you want more information about how to speed up charging your phone, contact our experts today. Published with permission from TechAdvisory.org. Source.
3 Surprising applications of blockchain

Most people associate blockchain technology with Bitcoin, the infamous digital currency that rose to fame in 2017. But blockchain technology is not tied to financial transactions, and it’s creating all sorts of exciting opportunities for faster, more secure information exchange — see for yourself! What is blockchain? Blockchain, like the cloud, is more of a concept than a specific piece of software or hardware. It’s the idea that if you store a spreadsheet or ledger on a hundred different computers — each of which receive automatic and encrypted updates — it’s nearly impossible to create a fraudulent entry. If someone adds a line of false information to one spreadsheet, 99 others can confirm it is not in their copy and is therefore inaccurate. In the Bitcoin ledger, each line represents the transfer of funds from one account to another. So if John wants to transfer money to Jane, he sends a request to Bitcoin’s blockchain and thousands of computers confirm his account information is correct and he has sufficient funds. The money is transferred, both account balances are updated, and the whole process takes less than an hour with almost no human interaction. Much faster than the 5-7 business days of most banks. There are countless applications for decentralized, real-time record keeping beyond financial transactions, though. And very soon, blockchain won’t be synonymous with Bitcoin. Blockchain’s potential Although this technology has been around since the ’90s, it lacked the popularity and computing power necessary to become a mainstream solution…until now. With the rise of cryptocurrencies in 2017, blockchain started seeping into other industries, such as: Law – “Smart contracts” create agreements that automatically execute when their terms are met. For example, an attorney could agree to pay a courier $100 after the delivery of documents to the defendant in a case. The contract and the payment sit in the blockchain until the courier uploads a GPS-tagged photo of services rendered, at which point the money is transferred and the contract archived. Agriculture – Supply chain blockchains can track every ingredient throughout the production process. If several people get sick from the same food item, ingredients could be traced back to their source and products that share the same ingredients could be recalled preemptively. Real estate – Blockchain is being used to automate escrow account transactions, property title transfers, and insurance claims, so they aren’t reliant on slow and error-prone humans. Buying a home could eventually be as easy as finding the one you want, signing a contract, transferring your down payment, and receiving the title — no middleman necessary. Most blockchain-based solutions are too new to trust with sensitive information. But you can do a few things to get out in front of your competitors. You can work with us to invest in business intelligence software that helps you collect more data, and start experimenting with risk-free blockchain solutions. As long as you have certified technicians like ours at your disposal, you’ll be sure to see gains in no time — give us a call today! Published with permission from TechAdvisory.org. Source.
3 ways to ensure your FB data is private

The public went into a frenzy when reports surfaced that Cambridge Analytica, a UK-based data analytics firm, retrieved millions of Facebook users’ private information without their knowledge. But that doesn’t mean you can’t do anything about it, and here are 3 ways to guarantee your data remains private. Download your Facebook data The thought of a complete stranger going through your account is pretty disturbing. Yet, you’re probably curious about the amount of information you uploaded to your social media sites over the years. Fortunately, Facebook allows you to download a copy of all your data. You simply have to log in to its web version and… On the site’s main navigation, click on the down button right next to the Quick Help icon A menu will pop up and you’ll find Settings right above the Log Out option Click on Settings and you’ll automatically be redirected to General Within the General page, press Download a copy of your Facebook Data It will redirect you to a different page where you’ll need to press Start My Archive button to proceed with the download process Once that’s done, you’ll be able to see an archive of all your Facebook activity, such as the statuses you’ve posted, messages you’ve sent, and ads you’ve clicked on. Change your privacy settings After going through all your data, you might realize that everything you shared is harmless. But, that doesn’t mean it won’t end up in the hands of cybercriminals who can use it against you. We suggest going back to the Settings page and clicking on Privacy. That’s where you can modify whether you want your posts to be seen by the public or only by your friends. You can even control who’s allowed to send you friend requests, view your friends list, and most importantly, decide whether search engines are allowed to link to your profile. Check or delete apps You know those personality quizzes that you and your friends always had a ball answering? Apparently, Cambridge Analytica gathered all the responses from one of those app developers. Luckily, you can stop them from further accessing your profile. In Settings, click on Apps to see all the apps linked to your profile. Beside each one, you can choose Edit Settings to review its authorizations or click Remove to completely get rid of it. Your recent love-hate relationship with Facebook has you second-guessing. If you want to take data security up a notch, we can always provide more tips and tools, and even assess your current level of security. Just give us a call and we’ll take care of your privacy so you don’t wind up breaking up with your favorite social media site. Published with permission from TechAdvisory.org. Source.
Did Facebook secretly collect Android data?

It was recently exposed that Facebook has been collecting Android phone users’ call history and SMS data for years. This may be alarming to many users, but Facebook has assured us that it was collected with consent. Here’s everything you need to know. How Facebook’s data-collecting activities were discovered Software developer Dylan McKay realized Facebook had been collecting his call records and SMS metadata when he downloaded his Facebook account data from his Android device (to do this, go to General > Settings). When he tweeted about it, several users responded that the same thing happened to them, while others revealed that only call histories with close contacts such as parents, partners, and other family members were collected. Facebook has already clarified that they did not collect anything without users’ previous knowledge, and that granting access to call logs and SMS data is an opt-in feature that users of Messenger or Facebook Lite on Android agree to use when they installed the app. Facebook’s response According to Facebook, requests for access to one’s contacts, phone calls, and SMS history is a widely used practice that helps apps distinguish between personal and professional contacts to improve the way it recommends friends and contacts. They also noted that in new versions of Messenger or Facebook Lite on Android, users can see more clearly which permissions they’re granting to apps, specifically where apps ask for access to their call and SMS data. Despite this, users who granted permission before they updated to Android Jelly Bean (version 4.1) are still supplying their contacts data to Facebook. But from the “Marshmallow” version onwards, users are asked separate permissions to access their call and message logs. With Android’s new permission structure, users who download the app will be asked to grant two separate permissions: for their call history data and their message data. Is there anything you need to do? While there are users who are aware that Facebook has access to their contacts data, millions of others are still unwittingly granting access to their data — either because their device is running on an old version of Android, or because they’re simply unaware of what type of information they allowed access to when they initially downloaded and installed the app. Since a vast majority of iOS apps are not allowed to access call history and SMS data, iOS device users were unaffected. Android users, on the other hand, have an option to delete contact data from their profiles. But it’s unclear whether previously collected data can be completely purged even after deleting Facebook contacts on their device. For businesses that have employees using Android devices, managing data privacy settings can be tedious. Lucky for you, we have certified experts who can deal with all your mobile device data management needs. Call us if you need help securing your devices. Published with permission from TechAdvisory.org. Source.
Windows Server 2019 announced

If Microsoft’s latest server software is any indication, the virtualization trend shows no signs of slowing down. The first preview of Windows Server 2019 was released in March and includes a number of features focused on IT efficiency. Let’s take a look at the most valuable updates for small businesses. Windows Server 2019 In March, Microsoft released a preview of Windows Server 2019 and announced that it will be generally available before the year is over. This will be the eighth iteration of the Windows Server operating system and will include new features to help businesses manage their network security, data storage, and administrative controls. Virtualization improvements One of the biggest changes coming to Windows Server is how application containers are created and managed. Containers make it possible to package everything an app needs to run and deliver it to desktops, regardless of a desktop’s hardware and software specifications. So if you’re using an Apple computer with almost no free hard drive space, you could run a Windows application stored in a container without any problem. Microsoft claims it can reduce the storage requirements of containers to one third of their current size with Server 2019. Additionally, the operating system will introduce new compatibilities with an open-source virtualization standard known as Kubernetes, opening up countless new possibilities for customization. Security enhancements A virtual machine is similar to a container, but instead of packaging just one application, virtual machines contain entire desktop environments that are powered by server hardware and accessible from remote workstations. Windows Server 2019 will make virtual machines even harder to penetrate, meaning that even if a cyberattacker compromised your server, the virtual machines stored on it would be protected by an additional layer of security. Microsoft is also incorporating its Advanced Threat Protection (ATP) protocols into its newest operating system. ATP has been incredibly successful at intelligently detecting and preventing cyberattacks on previous versions of Windows, and adding it to Server 2019 is a welcome addition. Virtualization is a perfect example of how IT support models are evolving. A decade ago, virtual machines and containers would have been reserved for all but the largest organizations, but today these cutting-edge technologies are both affordable and flexible enough for small businesses. The only thing SMBs need is qualified IT support. Give us a call today about upgrading your technology infrastructure. Published with permission from TechAdvisory.org. Source.
How to calculate the TCO of VoIP

Choosing whether or not to deploy VoIP phone systems is an easy decision. But choosing a system that works for your business can be difficult, with all the products, vendors, features, and data plans available. Oftentimes, however, selecting a VoIP system comes down to calculating the total cost of ownership (TCO). What is TCO? The TCO is the overall sum of procuring, deploying, and operating a VoIP system has over its life cycle, which is typically five years. Naturally, some of the costs (like operating costs) can be predicted only before the implementation, but an experienced VoIP expert should be able to give you an informed approximation. Upfront costs When selecting a VoIP system, make sure to check the features offered and the quality of the system — by looking at reviews — so you get the best bang for your buck. While full-featured, high-quality phone systems will come at much higher price points, they do tend to be more reliable and require less maintenance than a cheap phone system. Beyond the price of the VoIP package, there are also additional costs like headsets, webcams, and a stronger network connection to ensure crystal-clear calls. You also have to consider the payment options. You could either buy it outright or rent it from a reputable third party. Although the former carries a steep upfront cost, payment will not continue indefinitely. This makes sense for large, fully staffed corporations with massive budgets. Meanwhile, the latter option is better for small- and medium-sized businesses that prefer to pay a monthly subscription for the phone features they need rather than make a huge investment. Implementation costs In addition to upfront costs, you’ll have to pay a consultant or managed services provider (MSP) to design, deploy, and configure your VoIP system. Then, there’s onboarding. Since you’re installing a completely new phone system, you’ll need to hire experts who can teach employees how to use the VoIP system effectively and securely. Operational costs This covers monthly recurring costs of voice and data plans. For example, some service providers charge local and long distance calls per minute, while others offer unlimited local calls for a fixed monthly cost. If you’re managing your VoIP system yourself, you’ll also have to take into account the monthly power, cooling, and maintenance fees. If you opt for hosted VoIP services, however, you’ll be billed only for the maintenance. Upgrade costs You should also set aside some room in your budget for VoIP upgrades. For instance, to improve customer service, you may need to integrate customer relationship management software with VoIP, but that requires a certified CRM expert to facilitate the entire integration process. Evaluating all the costs that apply to your business will give you a clear idea of how much you can expect to pay for your VoIP system. You can also compare VoIP TCO with traditional phone system TCO to make a business case for VoIP. If you’re having difficulty calculating the real costs of VoIP, call our experts today. We’ll help you figure out which VoIP solution is most ideal for your business and budget. Published with permission from TechAdvisory.org. Source.