IT hardware checklist for SMBs

As a business owner, you don’t want to start the new year faced with last year’s hardware problems. And although you can’t leave every issue behind, you can start implementing policies to avoid some of the most common hardware issues you’ve previously encountered. Here’s a checklist to get you started. ✓ Clean up your computer components Wipe your monitor with a clean, static-free fabric; remove excess dirt from your mouse’s exterior; and tidy up your keyboard with compressed air. Don’t forget your computer tower! Dust build-up can block your computer’s air vent and affect its performance. Ensure that your workstation is getting adequate ventilation and isn’t directly exposed to sunlight and other heat sources. ✓ Manage your cables If you’re not giving your computers’ cables the attention they deserve, now’s a good time to do so. Other than wiping the thick coat of dust on computers’ cables, consider using cable management solutions that unclutter and untangle messy wires. These don’t just organize and secure your cables, they also help ensure your PCs run quieter and are less prone to overheating as a result of blocked air vents. Planning to relocate or upgrade in the near future? Organizing your computers’ cables now makes future relocation and upgrading processes much easier. ✓ Review and update your inventory Keeping an inventory of all your hardware helps you manage hardware lifecycles and purchases, identify items that are near their end of life, and ensure you avoid duplicate purchases of items already in-stock. Your inventory list should include all owned and leased devices: PCs and laptops, printers and scanners, tablets and smartphones, and modems and other network hardware. Update all your assets’ serial numbers and keep track of their respective users and location. ✓ Printer maintenance Clean the interiors and exteriors of your printers, including paper trays, which are sure to have accumulated dirt from years of use. You should also repair and/or replace parts and accessories such as printheads and cartridges that are no longer in good condition. Should you decide to do a complete printer maintenance, check for the latest software updates for your printers and install them immediately. ✓ Implement a hardware policy This is also a good time to create a technology guideline that your employees can follow to ensure they work efficiently. These guidelines reduce the need to spend on unnecessary repairs, keeping the succeeding year’s checklist shorter. With clear instructions on the proper use, replacement, and storage of your hardware and devices, you’ll be better able to manage your hardware for years to come. With a more organized IT hardware inventory, you have one less thing to worry about. Want to get more in-depth hardware management recommendations? Call our experts today. Published with permission from TechAdvisory.org. Source.
Hybrid cloud predictions for 2018

When thinking about cloud technology, public cloud tends to be the first type of platform that comes to mind. This is hardly a shock as it’s the most common type of cloud, but that might not hold true in the near future as hybrid cloud continues to grow. That said, here are five hybrid cloud predictions for 2018. Clearer strategies Many infrastructure as a service (IaaS) public cloud vendors have spent 2017 refining their hybrid cloud strategy. Giants like Microsoft, released Azure Stack in conjunction with Amazon Web Services, who released VMware on AWS’ hybrid cloud offering. Oracle and IBM have also entered the market. So what do these new offerings mean for 2018? This year will determine how much traction they’ll gain and will present business owners like yourself with plenty of options. This means you need a managed services provider now more than ever if you intend to migrate to a hybrid cloud environment this year. Private cloud war Private cloud, which was once viewed as an expensive investment, is now the key to ensuring security and control. As such, more companies will find ways to leverage private and hybrid cloud with competition expected to be more intense than ever. The rise of Containers and platform as a service We’ve realized how crucial it is to let app / software developers create new business opportunities in the cloud. However, to ensure those applications can run in any environment requires engagement with both private and public clouds. PaaS and Containers provide the resources and flexibility necessary to optimize the app-dev pipeline. As such, they’re expected to be integrated across various hybrid cloud solutions this year. Optimized connections More companies are now offering managed and colocation services with direct connections to the public cloud. This is no accident as more companies are now using private and public cloud to handle in-house workloads, which is why an optimized network connection is critical to provide better usability and efficiency from two separate platforms. With hybrid cloud set to become the norm in the future, optimizing these connections can make or break your business. More on-premises services In 2015, Amazon introduced Lambda, a serverless platform that uses function as a service (FaaS) to deliver public cloud resources into on-premises data centers. What’s more, Microsoft, Red Hat, and other companies are trying to do something similar by creating serverless functionalities on hybrid cloud environments. The connection here is that tech giants will utilize public cloud to create serverless platforms which will provide organizations with much needed resources on-premises without sacrificing convenience, usability, and costs. Keeping up with the cloud can be quite a headache, which is why we round up every useful IT news and tips in our blog. And if you have any questions about the cloud, just give us a call and we’ll be happy to advise. Published with permission from TechAdvisory.org. Source.
Big gains for small-business IT in 2017

How many new technologies did your business adopt last year? Too many? Too few? You’ve officially made it through 2017 and there’s no better time than now to review which IT fads were worth investing in, and which ones should be left in the past. Look no further than our recap of last year’s most valuable technologies for small businesses. Small businesses love the cloud According to research from IDC, more than 70% of businesses with 10-99 employees took advantage of cloud technology in 2017, and that number is expected to rise this year. This is largely due to IT providers demonstrating that the cloud is just as, if not more, secure than on-premises solutions. The list of possibilities for what can be hosted in the cloud on a small-business budget is getting longer every day — if you’re not devoting resources to this technology, it’s time to jump onboard. Mobile payments earn users’ trust Like the cloud, making credit card purchases using a mobile device suffered from a trust deficit in its early stages. For good reasons, consumers have been conditioned to treat IT security with caution, and storing financial information on a smartphone that could wirelessly transmit that information to cashiers sounded dangerous. However, after two years of availability without any major incidents, the number of users who have used smartphone-based wallets like Apple Pay has doubled. Accepting these payments is relatively simple for small businesses and opens up new business opportunities. Cybersecurity becomes affordable for SMBs Ransomware had yet another year of explosive growth, and small businesses were a primary target. Thankfully, managed IT services providers met the increased demand for cybersecurity services with intelligent data backup and network protection solutions tailored for SMB budgets. There will be even more ransomware attacks in 2018, which means you should be investing in more cybersecurity services than you did last year. The Internet of Things gains popularity Just a couple years ago, Internet of Things (IoT) devices were novelty gadgets for people with money to burn. Everything was being connected to WiFi networks: egg trays, pet-activated video chats, belts, you name it. But due to more useful applications in 2017, nearly a third of US businesses are now taking advantage of IoT gadgets. Connected thermostats, door locks, and AI assistants make it easy to save money, increase security, and boost productivity. “Artificial Intelligence” is widely adopted Although we’re still far from building computers that can truly think for themselves, 2017 was the year that computers got much better at creatively organizing and interpreting data for us. From digital assistants that answer your phones to customer relationship management platforms that intelligently uncover sales opportunities, IT solutions for business are getting significantly cheaper and smarter. Experts predict that more than 30% of businesses will use AI by next year and we recommend you join their ranks. Technology investments are no different from any other investment. There will always be risks and you should always consult with an industry expert first. When you’re ready to get more value out of your IT, give us a call and we’ll get started on your 2018 plan! Published with permission from TechAdvisory.org. Source.
Tips to protect your smartphone

Cyber criminals will always be eyeing your data regardless of where it’s stored. That means even your trusty Android phone or iPhone isn’t safe. In fact, it may be more exposed to security risks than you think. These tips can help increase your mobile’s security. Set a strong password Whether your device requires a 4-set or 6-set numerical PIN, a fingerprint, or a facial scan, set a lock that’s difficult to crack. This is not the strongest security measure by any means, but they provide a necessary initial barrier for intruders. Major manufacturers like Apple and Samsung are innovating their products’ locking mechanisms and you’re doing yourself a favor by using them. To manage your device’s locks, follow these steps: iOS – Go to Settings > Touch ID & Passcode, enter your passcode, and switch on ‘Require Passcode.’ This is also where you can manage your Touch ID settings and adjust access controls (Recent Notifications, Today View, and more). If you’re using an iPhone X, go to ‘Face ID & Passcode.’ Android – Go to the Settings page > Lock Screen and Security to set your passcodes. These feature names may vary per device. Download applications only from official stores For iPhone users, download only from the App Store, and for Android phones, Google Play Store. Downloading apps only from these platforms doesn’t guarantee that your phone will be 100% safe from malware, but doing so greatly reduces the likelihood of you downloading malicious programs disguised as legitimate apps. Even Apple, which used to be the gold standard for software security, is no longer immune to system vulnerabilities. Despite having a strict policy on downloads (iPhone users can download only from the App Store), those with ‘jailbreak apps’ are exposed to a multitude of malicious entities. As a further precaution, download only apps that have high ratings and steer clear of downloads from unknown links. Check your apps’ permissions When you download certain apps, you’ll be asked to grant permission for it to access your data (files, contacts, photos, etc.). What most users don’t know is that some of these permissions also gain access to hardware controls such as those found in the device’s camera and microphone. And if a malicious app happens to slip through the cracks, these permissions can serve as a gateway for hackers. Android and Apple have already improved their respective OS’s mechanisms to control what apps can access, but you can take it up a notch. Follow these steps to manage what apps can access on your phone: iOS – Go to Settings > Privacy to see your apps’ access level. For example, if you tap on Microphone, you’ll see all the apps that have access to your iPhone’s Microphone. If you wish to deny access to it, you can do so by turning privacy off. Android – Go to Settings > Apps, select an app, then tap ‘Permissions.’ From here, you can control every individual app’s access to your devices’ files. Update apps and security software We cannot stress this enough: As soon as they become available, download and update your OS and apps’ software. In exceptional cases where certain versions of an OS are known to have bugs, not patching your device doesn’t make it any less exposed to risk. And here’s why: Most older OS versions have had to be patched because of a software vulnerability, and delaying its update to the latest version doesn’t make it safer. In fact, it’s far riskier to remain unpatched and wait for the next update. These basic yet critical tips will help keep all your gadgets safe and your business data unharmed by cyber criminals. Boost your devices and your business’s defenses with dependable cyber security from our team — call us today! Published with permission from TechAdvisory.org. Source.
Virtualization Containers 101

New technological developments such as cloud computing and virtualization are prying small- and medium-sized businesses away from traditional client-server architecture. In contention now lie Containers, a technology influenced by cloud computing that offers a less complex alternative to virtualization. Discover its benefits and see why they apply to your business. What are containers and why are they so popular? Virtual containers are similar to shipping containers, which have made the transport of bulky goods much easier. Prior to the introduction of containers, virtual workstations and servers granted users access to software and computing power across a local network or the internet. This is what has become known as “cloud computing,” as it created entire desktop experiences over the internet. However, there was room for improvement, as virtual machines are known to take up a lot of system resources.This is because they run a virtual copy of an operating system alongside a virtual copy of all the hardware that the operating system needs to run. Such heavy load on one machine quickly takes up a lot of RAM and CPU cycles, slowing processes down. Containers improve on the inefficiencies of cloud computing by promising developers that their software will run smoothly, regardless of the type of computer their end users are running. How do they improve on virtual desktops? Virtual desktops deliver thousands of applications to meet the needs of your business. These applications also use different languages, databases, and tools. To deploy, configure, manage and deliver these complex machines takes a lot of time and money. Containers are essentially a better way to package these applications and their components. This technology helps organizations become more consistent and agile by extracting the host’s underlying operating system, meaning applications can be packaged with all their dependencies. This in turn, allows developers to choose the right environments and tools that best suit their projects. As of now, only a few types of software create and deliver containers, with the most popular being Docker. Container technology had been around for a while before the introduction of Docker, but it was complex to implement and manage. With the popularity of virtualization services, software vendors gained resources to develop and offer simple, user-friendly container solutions. Although containers have improved enterprise computing as a whole, virtual machines have not been made obsolete, and can still be used under certain circumstances. Regardless, both solutions — containers and virtual machines — can repurpose old hardware to utilize software hosted in the cloud. All you need to get started is an internet connection and an experienced IT professional by your side. Want to maximize your business potential through virtualization and containers but don’t have an IT professional to consult? Call us today. Published with permission from TechAdvisory.org. Source.
Which VoIP service suits me the most?

Gone are the days when you have to spend a large amount of money each month on the telephone bill. Voice over Internet Protocol (VoIP) technology has made it cheaper — and in most cases, free — to place and receive calls. Whether you’re a business owner or an individual user, there is a VoIP option that suits you. VoIP comes in a variety of forms. Do you rarely leave your house and office, or are you usually on the move? If you’re a business owner, what’s the size of your company and what factors matter most to you? Let’s take a look at some of the VoIP services available on the market to help you make a better decision when it comes to choosing your means of voice communication. Residential VoIP Services For this type of VoIP, you use an adapter to connect your landline phone set to a Wi-Fi modem to make and receive calls over the internet. Depending on the plan you choose, you’ll be billed each month for either unlimited services or for minutes you actually use. Examples: VoIP.com, Lingo Device-based VoIP Services This involves purchasing a VoIP device from a service provider and plugging it into your existing phone set so that you can make free calls within the U.S. This means not having to pay a monthly bill, and you need no other devices besides your old landline telephone set. Examples: MagicJack, Ooma Software-based VoIP Services This is the most common type of VoIP, and many of us use it on a daily basis. You either access a web-based application online, or install it as software on your computer. Then you use your computer’s audio input and output device to talk and listen. Examples: Skype Mobile VoIP Services Like the software-based VoIP services, mobile VoIP is also an application. However, it is installed on mobile phones instead of computers, thus enabling you to make and receive calls no matter where you are as long as you have a good internet connection. Examples: Skype, WhatsApp, Google Hangout Business VoIP Services VoIP for business comes in two options: on-premises and cloud-based. Both provide much more cost-effective communication solutions than traditional landlines and have a variety of useful features for businesses. These include video and audio conferencing, screen-sharing, interactive voice response, automated attendants, call queues, and call reports, just to name a few. These features are scalable and you’ll also get complete technical support. For on-premise VoIP systems, businesses need to purchase all the equipment and house it in their office. This requires huge capital costs. Businesses also have to pay a monthly fee for SIP trunking or PRI circuit, as well as dedicate IT staff to maintain, repair, and upgrade the systems on a regular basis. The up side is you’ll have total control of your hardware. With cloud-based VoIP systems, you outsource the phone system to your VoIP provider. This means there’s no need to purchase hardware or invest your resources into maintaining the systems since your provider will take care of everything for a fixed monthly fee. You can also add or remove users easily. The con is that you’re not in total control of the hardware and need to rely on your provider’s expertise to ensure system reliability and security. Want more detailed information about VoIP and how to choose the most suitable VoIP provider? Talk to our professionals today. They have extensive knowledge about this efficient, low-cost communication technology and can explain everything to you in plain English! Published with permission from TechAdvisory.org. Source.
6 Microsoft Teams tips

Despite being late to the group chat scene, Microsoft Teams is equipped with a handful of features and impressive integration that set it apart from its competitors. So if you’re already subscribed to Office 365, here’s how you can take Teams to the next level. Use SharePoint to store and share files You might already be using SharePoint to store files and collaborate with your teammates. But did you know that in every Teams channel, you can click the Files tab to share files from SharePoint with team members? You can also access SharePoint files that are already shared in the channel and use Office Online or Office Desktop to collaborate on those files, too. Forward emails into a channel You get countless emails every day, some of which might be lost in your inboxes. Fortunately, Microsoft makes it easy to forward any email message from Outlook to a channel in Teams so that messages show up in both places. Just click the ellipsis next to any channel name and select “Get email address”. This generates an email address for the channel which you can copy and use to forward files, documents, and messages. Stick with a few groups While you can create as many groups within your organization as you like, going overboard can result in a cluttered messaging interface that overwhelms team members. We recommend you create groups based on the number of projects and each members involved; you can always add more if necessary. Set up audio conferencing Teams lets you host voice meetings in groups or with just one team member. This is particularly useful when communicating with remote workers or clients, in which case you can give them guest access to your Teams channel. This ensures they’re able to communicate with you but not see history of other confidential information. Test communication strategies Just because some of the features in Teams overlap with Yammer and Skype for Business doesn’t mean they’re all redundant. Think of it as a chance to test different communication strategies to find out what works best for you. For instance, if most of your clients have a Skype ID, you can use Skype for client calls and Teams for internal calls. Share conversations with new team members Teams makes onboarding easy. Rather than forwarding numerous emails and documents to new employees, you can use Teams to share conversations from a thread or project with them. This enables everyone to catch up easily without having to deal with cumbersome documents. Microsoft Teams and other Office solutions are equipped with plenty of useful features that can take some time to master. But by taking advantage of these tools, you’ll be able to save time and maximize efficiency, all without having to spend a dime. If you have any questions about Microsoft Office and how it can benefit your business, don’t hesitate to give us a call. Published with permission from TechAdvisory.org. Source.
Microsoft unveils new Windows features

The recent Windows 10 Fall Creators update is just a few weeks old but Microsoft has already released another major update. On December 19, they rolled out a new Windows 10 Insider update to test two new features: Sets and Timeline. Sets Sets takes the tab features from web browsers and adds them to various Microsoft apps, including Word, PowerPoint, OneNote, and Outlook. This reduces how many windows you have to have open. For example, if you are working on a Word document and you need to research a particular topic, you can create a new tab, open Edge, and start surfing. The new tab page also gives you quick access to local files and Office 365 applications provided you have a subscription. This saves you from having to manage multiple windows since all the apps and websites that are relevant to your work are in one place. And when you press save, Sets bundles your apps and research into a single file, allowing you to revisit relevant material. Timeline Speaking of revisiting material, Timeline displays apps and files you were using at a particular time so you can easily resume past activities. What’s more, this feature works across all Cortana-enabled devices, which means you can switch from your desktop to your phone and access the same files you were previously working on. Cortana even suggests activities you might want to resume as you switch between devices. To try Timeline, access Task View by pressing the Task View icon in the taskbar or hitting the Windows logo key + TAB. From there, you’ll be able to see recently accessed apps and websites and reopen them. There’s also a “See all” option that lets you view everything you’ve done in a single day, organized by hour. If you’re looking for a specific app, you can always use the search bar. Windows 10 Insiders Unfortunately, Sets and Timeline are not yet available to the general public. But if you’re interested in trying out these features for yourself, you can sign up for the Windows 10 Insider program. Not only will you get these features, but you’ll also be one of the first to receive the latest updates Microsoft has to offer. You even get the opportunity to give feedback about new features, which helps improve Microsoft’s apps and services. Want to be the first to know what features Microsoft will release? Call us today! As an experienced managed services provider, we’re tuned in to the most recent tech developments, whether they come from Microsoft, Google, or other industry leaders. Published with permission from TechAdvisory.org. Source.
Phishers use encrypted sites to scam

Just when you thought cyber criminals couldn’t get smarter, along comes a new scamming technique. Previously used for safeguarding browsing activity, encryption tools are now used by hackers in carrying out phishing scams. This means some fraudulent sites may have HTTPS on their address, giving users a false sense of security. How hackers use encryption to carry out phishing scams According to recent research, 24% of phishing scams in 2017 use web encryption — an astounding increase from last year’s 3%. This means more HTTPS sites may not be truly safe. Phishing scammers rely on their victims to do what they ask, which is why it’s so effective. And with this new trick, unsuspecting users are more likely to be deceived. What makes this encryption-aided scam even more effective — and dangerous — is that it makes hackers’ phishing email or text that much more authentic-looking. For example, if you receive an email that purports to be from Amazon and includes a link to an encrypted site, there’s now a slightly higher chance you’d believe this email is the real deal. Clearly, if you’ve never purchased anything from Amazon, you’d know that this is a fake. But then again, there are millions of Amazon customers who could be misled into thinking that that email is legitimate. Does encryption mean a safer internet? With organizations like the Internet Security Research Group and Google promoting encryption, the world wide web should be a safer place, but that’s not necessarily the case. In fact, encrypting more legitimate websites could simply result in an increased number of encrypted phishing sites. It may also be useful to know that not all phishing sites use encryption. Many phishing scams are still carried out using websites that may or may not be encrypted. What you can do to ensure safety This isn’t meant to cause panic, and despite this new phishing tactic, encryption is still an essential security tool that every business must implement. Websites with HTTPS are still much safer than unencrypted ones. This is why it’s more important than ever to be vigilant when visiting suspicious sites and clicking on links. If you receive an email from PayPal asking you to verify your bank account details or password to a seemingly secure link, be wary. Some phishing scams are easy to detect, but some are not. Practice extreme caution when responding to requests for sensitive data. Consider the source of the message, think before clicking, and don’t hesitate to seek the advice of an expert in case you have doubts. Phishers succeed only if you do what they ask you to do. Phishing and other cyber scams are constantly getting upgrades, and no single solution can prevent hackers from attacking you. But your business could be much safer with the right cyber security protections in place. If this is exactly what you need, get in touch with our cyber security technicians. Published with permission from TechAdvisory.org. Source.
Update your Mac ASAP

With new vulnerabilities discovered every day, it’s important for users to keep their computers up to date. The problem is many find this process tedious and sometimes ignore it altogether. But if you’re a Mac user, we urge you to install the latest patch as soon as possible. Serious bug On November 28th, security researchers reported a serious bug in macOS High Sierra that allows anyone to easily take control of any Mac computer. Normally, users are asked for their username and password before logging into their Mac, installing a new application, or changing settings. However, this recent bug allows users to simply type “root” as a username, leave the password field blank, and click “unlock” to gain full access. This means if hackers have physical access to a machine, not even passwords can stop them from getting inside. They could, for instance, log in with “root,” reset the username and password, and enjoy future access to the machine at any time. They could also install spyware with ease and monitor your activity 24/7 without being detected. The bug was so alarming that Apple released an emergency patch within a day. But even the fix had problems, and when users installed the next major macOS update, High Sierra 10.13.1, the bug reappeared. Luckily, Apple was quickly made aware of this secondary problem and rolled out a 10.13.2 update on December 6th to completely resolve the issue. Other threats to Apple security This wasn’t the only problem Apple had to deal with recently. In October, Apple released an update for Key Reinstallation Attacks (KRACK) — a type of attack that essentially breaks the encryption protocols between a router and a device, allowing hackers to read private messages and steal other sensitive data. And last week, an iOS 11 update was rolled out to fix glaring weaknesses in Apple’s HomeKit Internet of Things framework, which enables hackers to exploit smart devices like security cameras and door locks. How to protect yourself The importance of checking for updates and installing them as soon as possible cannot be understated. Hackers are more active than ever and will use any means necessary to breach your network. Updating your software is the best way to reduce the number of exploitable entry points into your business. To install updates for Apple devices, open the App Store, and click on Updates. All critical updates should be displayed on the window, but if you don’t see the one you’re looking for, use the Search field to find it. Even though the potentially devastating High Sierra bug has been fixed, you should consider creating a genuine root user password to prevent others from gaining access to your machine just by typing in “root.” To do this, open Directory Utility, which can be found in the Users & Groups tab in System Preferences. From there, click on Edit and select Enable root user, where you will be prompted to set a password. And last but not least, make sure you set a strong password. Protecting your systems is a full-time job, so if you’re not experienced with computers, call us today. We’ll give you the tools and services you need to stay safe from a wide range of cyberattacks. Published with permission from TechAdvisory.org. Source.