Microsoft announces new features for Teams

Microsoft has recently announced new features for Microsoft Teams. These features are expected to bring users greater convenience and improved communication, and ultimately increase its appeal to a wider market. Cortana Integration One new feature that Microsoft will bring to Teams is Cortana, Microsoft’s virtual assistant. By integrating Cortana with Teams, users can use voice commands to make calls, join an ongoing meeting, or add other users to the meeting. This feature will also work with IP phones and conference room devices. Inline Message Translation While most people can communicate well in English, not everyone is comfortable using the language. Inline message translation allows these people to chat in their native language and then translate their messages into English. This will not only help them verbalize their thoughts better and faster, but you’ll also be able to understand exactly what you have to do to meet their demands. Cloud Recording and Automatic Transcripts Have you ever forgotten or overlooked important meeting details? This new feature will allow you to record meetings, store it in the cloud, and create a transcript of it. The ability to save the entire meeting also allows users to review everything or segments of it in the future at their convenience. This is particularly useful for meetings that are highly detailed or very long. Facial recognition, which will allow statements to be matched with the corresponding speaker, is expected to be included in the future. Background Blur Option for Video Calls Most people get easily distracted. But you want to minimize these distractions and have them focus on you when you have an important meeting like a business pitch. Teams’ latest feature allows you to blur your background during video calls so other people in the meeting can fully concentrate on you. Proximity Detection for Teams Meetings A feature that can make your meetings simpler is proximity detection. When you enter a room equipped with a Teams meeting room device, Proximity Detection will automatically detect your Teams-enabled meeting room laptop and prompt connection for you to join the Teams meeting room. This helps you save time finding an available room so you can immediately connect with other users. Mobile Sharing in Meetings Have you ever needed to join a sudden meeting but couldn’t perform as well as usual because you were on the go with only a mobile device? Mobile Sharing in Meetings solve this by allowing you to share a live video stream, photos, or your phone screen with other attendees immediately. If you’re interested in improving your company-wide communication and would like to learn more about Microsoft Teams, contact us today. Published with permission from TechAdvisory.org. Source.

Windows 10: New accessibility features

Microsoft is working on improvements for Windows 10’s accessibility features, which will be introduced later in the year. Some of these are already available to preview through the Insider Program, but everyone else will have to wait. Here’s what’s coming: Better Ease of Access settings Some users rarely tinker with their computer’s accessibility settings because they’re difficult to locate and adjust. Luckily, in the upcoming Windows 10, this won’t be the case. Microsoft will soon launch Ease of Access settings that’s easier to discover, learn, and use. The enhancements are categorized into Vision, Hearing, and Interaction (speech and eye control) groups. Those who want bigger characters can adjust settings under “Make everything bigger,” which lets you enlarge apps and text. You can also “Make everything brighter” by increasing the brightness of your built-in display, and “Simplify and personalize Windows” by turning on or off animations, transparency, and automatically hiding scrollbars in Windows on the Display page. You can also ask Cortana to find a specific setting for quicker access. Narrator enhancements Narrator is Windows 10’s screen-reading app that reads text on a PC screen and ‘narrates’ to users their notifications, calendar reminders, and other events. In the latest update, Narrator’s audio performance will provide faster, more responsive, and more accurate narration. Previously, it reads bolded, italicized, or underlined statements by using statements like “start/end bold.” But in the new version, the narrator will change reading pitch, speed, and tone to emphasize certain texts. Other improvements include a capability to run on Safe Mode and an enhanced Microsoft Edge browsing, which now announces various processes such as when users are opening or closing tabs, or loading or refreshing pages. Eye Control adjustments Windows 10’s eye control feature lets users control the mouse, type using an on-screen keyboard, and use text-to-speech with eye-control technology found in eye-tracking devices. Soon to be introduced in Windows 10 is the capability for users to scroll and click directly from left to right, and quickly access Windows Start, Timeline, and other common tasks. And with the ability to pause eye control, users can hide the launchpad to enjoy undisrupted reading or streaming. Other upcoming upgrades Microsoft Learning Tools (advanced tools to enhance reading and writing skills) will soon include more intuitive text suggestions when using a keyboard, and language support for touch keyboards. Microsoft will also continue to work on improving its assistive technology partnerships. Microsoft listened to users’ feedback and made several improvements in its accessibility features and apps so that people with poor vision, hearing loss, limited dexterity, and other disabilities will have a much better experience. If you need further help with Windows 10 features, don’t hesitate to get in touch with us. Published with permission from TechAdvisory.org. Source.

Ready for tax season phishing scams?

As tax season looms, so do phishing scams. For cybercriminals, this is the ideal time of year to deceive unsuspecting individuals into releasing sensitive private or company information. Businesses must therefore take extra precautions between now and April 17th to avoid hackers from selling your confidential data in the dark web. Phishing baits to watch out for Phishing attacks often consist of fabricated or compromised emails sent to finance/payroll or human resources employees that are made to look like they’re from an executive in your company. The message might contain a request to forward employee records, including their W-2 forms, but that’s not all… Another common scheme, which doesn’t only happen during tax season, involves getting a call from a person declaring to be an IRS employee. And no, caller IDs won’t save you because they can forge that, too. The phisher will inform you that you owe them cash from back taxes and they will threaten legal action if you don’t pay via credit card at that instant. Always remember, the IRS will never contact you on the phone to let you know that you owe them money. And they certainly won’t threaten you or demand payment over the phone. If they really need to notify you of such matters, they’ll use the postal service and will give you a chance to discuss payment terms. Standard protection protocols Don’t worry, the usual security measures against these phishing scams are pretty easy to integrate into your business. Begin by developing a policy that bans the request of private details through email. If an employee ever requires such info, they should get in touch with the person directly, follow your established protocols for the transfer of sensitive information, and minimize the number of people involved in the transaction. Taking security a step further Data loss prevention (DLP) systems are also valuable weapons against these types of phishing attacks. They evaluate traffic going in and out of your company, such as web usage, emails and instant messages, and virtually anything sent on your network. DLP systems can filter out private details, including Social Security numbers, and stop them from being sent out. But beware, DLP systems come with a minor drawback, as they can also block legitimate traffic, like when your accounting department sends tax info to your CPA. Fortunately, an MSP like us can properly segregate the good and the bad traffic to avoid confusing and/or frustrating your employees. Phishing schemes may be a normal occurrence during tax season, but that doesn’t mean you can’t do anything about it. Don’t let the vulnerabilities in your business, particularly the human element, fall prey to cybercriminals. Send us a message right away and we’ll conduct an assessment of the security of your business, as well as design a risk management plan to help counter future complications. Published with permission from TechAdvisory.org. Source.

How to protect data on iOS 11

Many iPhone users are aware that Apple apps access their device’s data. But this can mean increased security risk, especially if your phone is used for both personal and business reasons. Fortunately, iOS 11 includes privacy controls to limit data access. Location Services controls Apple and other third-party apps and websites gather user location data to make Location Services work better. Apple Maps, Google Maps, and other mapping apps need location data to make recommendations, notify friends of your whereabouts, and more. But some users might not like every app on their phone having full access to their precise location. To limit your phone’s location-data gathering, follow these steps: Go to Settings > Privacy > Location Services (lists all the apps that obtain location info on your device) Review the location access privilege of each app: While Using – the app obtains location data only when it’s in use Always – the app obtains data whether or not it’s in use, as in the case of Google Maps and the Weather app Never – for apps that aren’t set up to obtain location data Uncheck the apps set to Always that you don’t want to have full-time access to your location info Deactivate access by swiping the button from right to left Location sharing and device controls Share My Location lets your contacts see your location via apps like Messages and Find My Friends, as well as location-based features like Siri and the Home apps. It’s often convenient to leave this activated, but users can deactivate it by swiping the button from right to left. You can also share your location from other Apple devices connected to your Apple ID account. For example, if you own an iPhone and an iPad, you can share your location information from your iPad using your iPhone. Here’s how to do it: Go to Settings > Privacy > Location Services > Share My Location On the Share My Location page, tap From and choose the device from which you wish to share your location. From this page, you can also delete devices you no longer use. Just swipe the device name and tap Delete Application-based privacy You can also limit third-party apps from accessing your iPhone hardware and apps. For instance, if you don’t want Facebook Messenger, WhatsApp or any other app to have access to your contacts, here’s what you need to do: Go to Settings > Privacy Go to the individual app (e.g., Contacts) Deactivate access to an app (e.g., Facebook Messenger) by swiping the button from right to left System Services You can also adjust your iPhone or iPad’s location-data access on a system-wide basis. There is an option to allow your device to remember the places significant to you, which is aimed at improving location-based services in Maps, Photos, and other apps that need location data. How to do it: Go to Settings > Privacy > Location Services > System Services Activate or deactivate individual system-wide settings (e.g., Find My iPhone, Sharing Time Zone, Significant Location, etc.) Given the large number of apps you use on a daily basis, the amount of data you’re sharing with third-party websites and apps could be alarmingly high. If you need expert help ensuring your business’s Apple devices are not unnecessarily sharing data, call our hotline today. Published with permission from TechAdvisory.org. Source.

Can private browsing keep you safe?

Privacy is a precious commodity in this era. Every website you visit or app you download leaves a digital footprint that can be tracked by anyone. Fortunately, major web browsers all offer private browsing features to keep your internet activity somewhat safe from prying eyes. What is private browsing? Your web browser — whether it be Chrome, Edge, Firefox, Safari, or Opera — remembers the URLs of the sites you visit, cookies that track your activity, passwords you’ve used, and temporary files you’ve downloaded. This can be convenient if you frequently visit certain pages, can’t remember your login details, or if you’re trying to recall a website you visited a few days ago. But if someone else uses or gains access to your computer, your most private (and embarrassing) internet activities are exposed for anyone to see. With private browsing — also called Incognito Mode in Chrome and InPrivate Browsing in Edge — all the information listed above does not get recorded. In fact, all the websites and information you accessed in the private browsing session is immediately discarded without a trace as soon as you close the browser. This can come in handy when you’re using a public computer because you’re instantly logged out of all the accounts after closing the window. Your cookies also won’t be tracked. In a normal browsing session, sites like Facebook will inundate you with highly targeted ads based on the sites and pages you’ve visited. But in private browsing mode, your internet activity won’t be used against you by marketing companies. Another benefit of private browsing is you can use it to log in to several accounts on the same site, which is useful if you need to log into two different Google accounts at the same time. Limitations of private browsing Although private browsing does prevent your web browser from storing your data, it doesn’t stop anyone from snooping on your current activities. If your computer is connected to the company network, system administrators can still keep track of what you’re browsing even if you’re in Incognito Mode. Also, if spyware or keylogger malware is installed on your computer, hackers will still be able to see what you’re doing online. Even though private browsing has quite a few benefits, you shouldn’t solely depend on it for online privacy. Your computers must be equipped with Virtual Private Networks that encrypt your internet connection and prevent anyone from intercepting your data. And don’t forget to scan your computer for viruses with a strong anti-malware program to keep spyware and other malicious web monitoring software at bay. If you want to know where you can get these solutions or learn more about web browser security, call us today. We have the tools and expert advice you need to prevent anyone from snooping on your internet browsing. Published with permission from TechAdvisory.org. Source.

4 reasons for slow mobile internet speeds

Have you ever gotten frustrated with your phone because the browser took more than five minutes to load? Before you start blaming your old phone, check out these four reasons that might be the cause of sluggish internet connection. Router location One simple yet overlooked reason why your WiFi-connected phone may be experiencing internet lag is because of your router’s location. Although WiFi has a range of up to 230 feet, the farther away you are from the router, the weaker the WiFi signal. Large objects like doors and walls situated in between you and the router can also weaken the WiFi signal. It is recommended to place your router in a central location, preferably away from concrete and masonry walls or other big objects like a chimney. As the router signal radiates from all four sides, blocking any side with big objects will impact your WiFi’s signal quality and as a result your phone’s internet speed. WiFi Noise Did you know that home electronic appliances emit wireless signals at a frequency similar to your router’s (2.4 GHz)? So before deciding on your router’s location, determine whether there are any wireless devices nearby, as they emit signals that can interfere with your router’s signal. For example, even if the ideal location for your router is at the center of your house, you shouldn’t place it there if there’s a cordless phone nearby. You can also set your router on a 5.0-GHz band, as this frequency is less prone to interference from other appliances. But before you start tuning it, make sure your phone supports 5.0 GHz; otherwise, it won’t be able to connect to the router. Slow Network Another reason for your phone’s slow internet is because of fluctuating network speed. Ask yourself these two questions to know the exact cause of this problem: How many people are connecting to the router? What are they doing over the internet? You should increase your router’s internet bandwidth speed if you discover you have many users and all of them are either streaming movies, or downloading computer games or software updates. This will allow every phone to enjoy faster internet speed. If you’re outdoors, and you’re connected to a public WiFi, consider using your mobile data instead. You won’t have to share your internet when you use mobile data, enabling you to experience faster connectivity at all times as long as you have a high-speed data plan. Too much cache Last, you should check your phone’s cache if fixing your router, network, and positioning doesn’t improve your phone’s internet speed. Cache is a component in your phone that saves data from earlier searches in order to increase the speed of similar searches in the future. Although your phone becomes more efficient for that particular search, it also makes your phone much slower when you do other things that require the internet. You can clear out your cache manually or use a cache cleaner app to thoroughly get rid of useless cache and optimize your phone’s internet speed. If you decide to download a cache cleaner app, make sure that it is reputable and trustworthy so you don’t accidentally download a malware-infiltrated app instead. There are more reasons to your phone’s lagging internet speed. If your business relies heavily on fast mobile internet speed and you’re unable to fix the sluggish connection, call our experts today. We’re always ready to help you. Published with permission from TechAdvisory.org. Source.

Endure tech disasters with external support

Three decades ago, the notion of hiring specialists in information technology was virtually unheard of. Nowadays, the majority of businesses are digitally operated, which means technology specialists are a must, especially given the huge increase in different types of security breaches. Determine how external support can back you up in times of technical distress. Access to new technologies and industry experts Managed Services Providers (MSPs) are equipped with resources most small businesses can’t afford. They employ teams of experts in fields ranging from cybersecurity to data management to networking — all available for you on an outsourced basis. For example, an MSP provides advanced security software and applications that can help your business avoid the risks of cyberthreat. They also work with industry tech leaders who provide insights into upcoming hardware and software products in the market. This ensures you receive updated recommendations on the latest technologies so you can use them in your business, and they often come with deals and discounts that you wouldn’t normally have access to. Knowledge from past breaches External IT support providers have been helping businesses recover from all kinds of tech disasters since the dawn of hackers. They now have enough knowledge to prepare Data Backup and Disaster Recovery plans for you. This way, you and your team would still be up and running after suffering from an IT emergency without disrupting much of your business operations. External support providers’ experience with data protection will ensure your systems are monitored around the clock so your security systems are always functioning properly to keep cybercriminals at bay. Run your business with ease You don’t specialize in technology, so you don’t have the skill or the experience in dealing with digital felons. You also know how vulnerable your business is online and won’t dare do anything to jeopardize it. That’s why external support is such a great asset — you’ll be able to manage your business without any worries because your external IT provider will keep it protected. In the end, you also have to be cautious in your search for an external support provider. Conduct your research thoroughly, read through all their testimonial pages, and verify whether their business objectives coincide with yours. To put your mind at ease and to make sure that your business’s technology is in good hands, you can always send us a message and we’ll provide you all the references you need. Published with permission from TechAdvisory.org. Source.

5 Android changes to look forward to

Google has recently released an early preview of Android P, the next major release after Android Oreo. While we still don’t know what sweet treat the update will be named after, software developers have already had the chance to play with some of the features. Here are five changes you can look forward to later this year. Indoor positioning If you’re having trouble finding your way around a huge complex like a mall or factory, Android P can help with a feature called WiFi Round-Trip-Time, which triangulates your device’s position in relation to the building’s WiFi access points. Developers can use this feature to create GPS apps that give users a full layout of the building and how to get to certain stores or areas. Improved notifications Android P will also be adding more ways to interact with notifications directly. For instance, instead of an alert saying “[person] has sent an attachment,” image attachments will now appear on the notification window, eliminating the need to unlock your phone and open the app to see the attachment. You’ll also be able to make use of smart replies, a machine learning feature that scans the text of an incoming message and suggests three basic responses. So if someone asks whether you’re free to attend a meeting in the afternoon, Android will produce replies like “Yes”, “No”, or “I’ll check.” Better security To protect users from the onslaught of cyberattacks and data leaks, Google is fortifying Android P’s security and privacy settings. Apps will no longer have access to your device’s sensors, cameras, and microphones when they’re not being used. This means users won’t have to worry about apps tracking and recording their conversations, facial features, and other types of personal information without their permission. What’s more, apps will easily access Android’s fingerprint system. This will make authentication consistent across different apps so users know their fingerprints are being processed by a trusted source and not some uncertified third party. Enhanced volume slider The volume slider is getting some improvements, too. Other than being moved from the top of the display to the side, the volume slider will get a button that allows you to toggle between different ring settings (e.g., mute, vibrate, and ring). There’s also the “media output” setting that enables you to connect (or disconnect) Bluetooth-enabled audio devices to your phone. Neural network processing With this feature, machine learning processes are carried out on the device itself instead of sending it to the cloud for analysis, which means fewer privacy leaks. This also means Android P can quickly learn and adapt to the user’s behavior, allowing for a more customized user experience. These aren’t the only set of features you can expect later this year. As it’s just an early build reserved for those subscribed to the developer preview, Google is probably going to add more functionality and design changes to Android P, so make sure to tune in to this blog to find out about future updates! Published with permission from TechAdvisory.org. Source.

Hypervisor security vulnerabilities

Regardless of how complex the technology, hackers always find a way to exploit it. In the past, virtualization was thought to be an extremely secure solution businesses could rely on to improve IT management and save money. But it does have exploitable vulnerabilities. Hackers can attack the hypervisor to access your systems. What is a hypervisor and what are its risks? For those who don’t know, the hypervisor is a software application that distributes computing resources (e.g., processing power, RAM, storage) into virtual machines (VMs), which can then be delivered to other computers in the network. This gives people the resources they need to run resource-intensive applications without having to rely on powerful and expensive desktop computers. System administrators can also use the hypervisor to monitor and manage VMs. This means if hackers manage to compromise hypervisor software, they’ll have unfettered access to every VM and the data stored on them. While hypervisors are generally well-protected and robust, security experts say that hackers will eventually find a bug in the software. So far, there have been limited reports of hypervisor hacks; but in theory, cybercriminals could run a program that can break out of a VM and interact directly with the hypervisor. From there, they can control everything, from access privileges to computing resources. Another point of vulnerability is the network. Since hypervisors distribute VMs via the company network, they can be susceptible to remove intrusions and denial-of-service attacks if you don’t have the right protections in place. If those attack methods aren’t possible, hackers can always break into server rooms and compromise the hypervisor directly. So what can you do to protect against these threats? Create separate VM and management networks Keeping your VM network away from your management network is a great way to keep your virtualized environment secure. If your VMs are compromised by malware, it won’t be able to affect your hypervisor. Set access privileges Ideally, only you, your system administrator, or virtualization provider should have access to your hypervisor console. This means you need to set strict access restrictions on the software to prevent unauthorized users from messing with VM settings and viewing your most sensitive data. Disable unnecessary services Off-the-shelf operating systems will have many unnecessary services and apps that increase the attack surface of your VMs. If you can’t tell which ones to disable, consult with a virtualization specialist. Pay attention to physical security Breaking in to a server room is the easiest way to compromise hypervisors, so make sure your physical servers are behind locked doors and watched over by staff at all times. Install top-notch network security tools Due to network intrusions affecting hypervisor security, installing cutting-edge firewalls and intrusion prevention systems is highly recommended. These security tools monitor network traffic for abnormal behavior to protect you from the newest exploits. Stay on top of hypervisor updates Hypervisors must be patched to defend against the latest threats. But if you’d rather spend your time on more important projects, you can always entrust the security of your hypervisors to a highly experienced and certified managed services provider, like us. Contact us today to see how we can protect your virtualized environment. Published with permission from TechAdvisory.org. Source.

4 reasons to record your calls

Call recording is not a new feature in VoIP but rather one that is underutilized especially in businesses with less focus on customer communication. When used correctly, it can boost customer satisfaction and strengthen business reputation. #1. Improve customer service One of the most important reasons why businesses should always record their calls, no matter the significance of the call, is to ensure high-quality customer service. By reviewing calls, managers can understand how their agents have been dealing with customers, whether or not they’ve followed company protocol, and pinpoint any aspects that can be improved on. Without call recordings, managers would have to listen to each call in real time, which is a time-consuming process. By recording each call, not only will your managers save time, but your employees will also be motivated to perform at their best every time they’re on the phone because they won’t know which calls are being monitored. #2. Upgrade employee performance According to Edgar Dale’s Cone of Learning, people only remember 10% of what they’ve read, 50% of what they’ve seen and heard, and 90% of what they’ve done. By providing your agents with actual recordings of good and bad calling examples during training sessions, and have them simulate calls afterwards, they’ll be able to learn and provide high-quality customer service faster. This is possible thanks to VoIP’s call recording feature, which allows every single call to be automatically recorded; that way, you can easily keep all audio files for future usage if necessary. #3. Retrieve missed details and prevent litigation With hundreds of phone calls daily, it’s understandable if your employees don’t catch every single detail. And for companies that require their agents to manually input information during the calls, there’s always a possibility that they’ll forget or miss certain information. Needless to say, this could lead to disgruntled customers who can harm business reputation, lower work opportunities, and if things escalate, proceed to litigation. VoIP’s call recording feature lets you replay saved audio files to make sure you haven’t missed any details, ensuring that all customer demands are met. And if you ever get into a dispute with your clients regarding who said what, you can always retrieve the exact audio file and have both sides listen to it, saving you thousands of dollars spent for lawsuits. #4. Understand customer preferences Have you ever received an inquiry about a product or service that’s not included as one of your offerings? While your agents will usually jot down this piece of information and pass it on to the relevant personnel, if numerous calls are being made that day, more often than not, they’ll forget about noting it down. Tiny issues like this can lead to huge losses in potential profit. Again, issues such as this could’ve easily been avoided with call recording. With the option to review all your calls at the end of the day, you’ll have a better picture about what certain customers are looking for and what you can do to address them. VoIP allows businesses to make on-demand calls affordably, and its call recording feature helps companies improve their customer service and prevent litigation. If you think business VoIP is right for you, or if you have any questions, give us a call today. Published with permission from TechAdvisory.org. Source.