A keylogger found in HP laptops

Are you using an HP laptop? If so, your machine might have a keylogger pre-installed. This means every stroke you hit on your keyboard can be recorded and your passwords and personal details can be exposed. But don’t panic. We’re about to tell you how to remove it while educating you about this sneaky software and how to steer clear from it. What are keyloggers? Keyloggers are hardware devices or software programs that record every key you press on your computer’s keyboard. Most keyloggers can also capture screenshots and send them to a remote computer where someone is waiting to see what you’re up to. And why does this matter? Because hackers can steal your usernames and passwords, keep track of the messages you send via instant messaging apps or emails, and other personal information you disclose on online forms. Imagine what they can do with all that data. A keylogger spotted on hundreds of HP laptops In early December, a security researcher discovered a keylogger pre-installed on an HP laptop. This led to the revelation that more than 460 HP laptop models, including ProBook, Pavilion, EliteBook, and the Envy line include the Synaptics touchpad driver — which can be used as a keylogger. Even though the keylogger on those HP laptops isn’t activated by default, an attacker who gains access to your laptop can enable it without much difficulty. HP themselves said the keylogger code had been added to the software by mistake and they’ve since released patches to fix the issue. What should HP laptop users do? If you own an HP laptop, check whether you’re affected by referring to this full list of affected models. If your laptop model is on the list, click on the link provided on the right side of the model name and download the security patch immediately to remove the keylogger from your computer. How to protect yourself from keyloggers The standard security measures — which you should be taking to heart and keeping up to date — can help protect you from keyloggers. You should avoid suspicious websites and never download files from them, and take extra care when opening attachments, text messages, or social media links from unknown senders since they can be embedded with a keylogger. You should also have antivirus software installed and keep it up to date. Most antivirus software nowadays has already added keyloggers to their databases. It’s also good to be aware of the latest security patches from your hardware manufacturers and software developers since they’re made to fix current vulnerabilities. And to make things even more secure, consider using one-time passwords and two-step verifications when you need to log in to important online services, such as those related to personal finance or services that require sensitive personal data. Need more tips and tricks on how to protect yourself and your business from cyber espionage? Talk to our security experts today. They will be more than happy to explain IT security issues to you in plain English! Published with permission from TechAdvisory.org. Source.

Gmail gets more add-ons!

Add-ons and swim rings share one thing in common — they both can save your life! While it might not be literal in the case of the former, add-ons do heaps to streamline your everyday tasks and literally save you hours of work. If you use Gmail, you can experience it today! Google’s focus is on productivity services that are already connected to email systems one way or another. This is why they have partnered with Asana, Dialpad, DocuSign (coming soon), Hire (by Google), Intuit QuickBooks, ProsperWorks, RingCentral, Smartsheet, Streak, Trello, and Wrike for their first set of native extensions. What are some features can you expect? While each add-on’s capabilities are slightly different, what they have in common is functionality that allows you to track various tasks right from the Gmail interface. For instance, Gmail users will be able to view tasks and track their progress right from their inboxes when they receive emails from other Asana users. The Trello add-on allows you to turn emails into actionable tasks where you’ll be able to comment and move cards without having to switch to Trello itself. And the RingCentral add-on will let you make outbound calls and view and send SMS messages right from your inbox. What’s more, these integrations work in the mobile Gmail app on Android, too. Google is currently working with Apple to bring these add-ons to iOS and they should be available soon. How to install these add-ons Just head over to G Suite Marketplace and download any extension you want. Then, those add-ons will be visible on the right sidepane of your Gmail interface. Unfortunately, they aren’t available in Inbox by Gmail (Google’s other email client) just yet. However, Google has made it easy for developers to create customized add-ons for their company with guidelines you can find here. With the introduction of Gmail add-ons, it’s exciting to see what other integrations are in store for businesses in 2018. But until then, if you have any questions about how you can use the web and cloud technology to your business’s advantage, just give us a call. Published with permission from TechAdvisory.org. Source.

Identity and Access Management 101

Whether it be cloud, mobile, or on-premises, every technology you use stores certain confidential data that are accessed by your employees. So how do you guarantee the safety of said data from cyber threats like identity theft, phishing attacks and more? IAM is the answer. What is IAM? Identity and access management is a system that secures, stores, and manages user identities and access privileges. It ensures that users are who they say they are and will grant access to applications and resources only if they have the permission to use them. Some of the most common IAM solutions include single sign-on (SSO), multi-factor authentication (MFA), and access management, all of which can be deployed on-premises or in the cloud. Why is it so important? Modern technology enables businesses to be more agile and efficient than ever before. For instance, the cloud lets your employees work from anywhere at anytime on any device. However, this means that your workforce has moved beyond the protections of on-premise security. That’s why you need to embrace another security solution, one that focuses on identity rather than physical or network security, which is exactly what IAM was designed for. It makes sure that your employees, customers, and partners are who they say they are and are only able to access the resources they need, nothing more. And that’s just scratching the surface on how IAM can benefit your company. Centralize access control Too much access to certain systems are risky and too little can hamper productivity and frustrate users. IAM strikes the perfect balance by letting you set centralized policies for the right access privileges. For example, you can deny your design team access to the accounting system while granting it to your CFO. Each user’s role and attribute can be used to determine which resources they’re allowed to access and to what extent. This not only offers better security but also more flexibility and ease of management. Lower chances of data breaches With SSO and MFA, your employees will no longer have to remember multiple passwords. Instead, they’ll be able to prove their identity using evidence-based authorization such as answering a personal question that only they would know. IAM also comes equipped with advanced encryption tools to protect sensitive data and so reduces the risk of compromised user credentials. Improve user experience Customers today interact with your company across multiple channels, whether in the cloud or via third-party applications. This is where IAM helps provide a better experience through SSO, self-service capabilities, and unified customer profiles that makes communication processes quick and easy. Your employees, on the other hand, will be able to access the information they need securely and conveniently no matter where they are. This means productivity will no longer be confined to their office table. Achieve regulatory compliance Businesses today must meet the constantly changing regulatory requirements concerning data access governance and privacy management. IAM was designed with just that in mind and provides control over who can access data and how it can be used and shared. Reduce IT costs IAM automates and standardizes many aspects of identity, authentication, and authorization management. This means you’ll be able to minimize significant labor costs associated with keeping your business environment secure. Identity and access management solution equips you with much-needed security without compromising on usability and convenience. To operate in today’s digital business environment, it’s not a matter of “if” but “when” you’ll adopt IAM within your company. If you’re looking to enhance company-wide security, whether with IAM or other solutions, why not give us a call? We’re sure we can help. Published with permission from TechAdvisory.org. Source.

MTD enhances your business’s security

More and more customers are using their smartphones and tablets to browse and purchase products. That is why many businesses are adopting a mobile-first strategy and shifting their focus on improving their websites on mobile platforms. But to stand a better chance of enhancing business security, you need to adopt mobile threat detection (MTD) tactics. How machine learning helps Mobile threat detection is an all-around solution that protects the physical device, its network traffic, and the applications from malware. It is augmented by a machine learning mechanism, which allows devices to recognize usage patterns and identify potentially malicious behavior without additional programming. Not only is it able to identify abnormal behavior, it’s also useful in cases involving multiple mobile devices. For example, you’re monitoring a hundred Android mobile devices running on a specific OS version and one deviates from the rest; machine learning makes it easy to spot that anomaly and detect possible threats. Is MTD effective in detecting malware? It’s no secret that most malware are cleverly disguised as useful programs or apps, making them difficult to detect. The key to finding — and defending against them — is recognizing irregular patterns in user behavior and how individual devices function. For this reason, a simple scan is not enough, especially for cyber crimes like phishing scams directed toward individual recipients. Machine learning integrated into mobile threat detection helps by observing both the app and the user’s behavior. But despite this formidable combination, cyber criminals continue to develop more sophisticated ways to attack computer systems and mobile devices. As such, mobile security needs to cover applications, networks, and devices to be effective. How to adopt MTD solutions MTD is an essential part of mobile security and is widely offered by various vendors. However, implementing one requires a thorough evaluation of important factors, including industry regulations and the level of sensitivity of the data stored and/or exchanged in your mobile devices. Your chosen MTD solution should also be able to inspect mobile devices’ hidden weaknesses that can make individual devices and your entire network vulnerable to malware. Moreover, it should be able to identify suspicious connections and unusual network traffic. Developing strong defenses for mobile devices is fast becoming a critical component in many businesses’ cyber security strategies. And although mobile threat detection remains an imperfect means to detect malware, it is far more powerful than traditional anti-malware solutions. Businesses like yours need comprehensive security solutions to fend off cyber attacks, whether on your PCs, laptops, or smartphones. For expert IT security recommendations, call us today! Published with permission from TechAdvisory.org. Source.

5 Types of virtualization

The age-old proverb “There’s more than one way to skin a cat” is especially relevant when budgeting for IT services. With the right technology consulting and support, any business can afford customized solutions that employ creative methods to achieve its end goals. As just one example, let’s review all the ways you can use virtualization technology! What is the core concept of virtualization? By virtualizing any of the items below, you can trick software into recognizing hardware when none actually exists. The easiest way to explain this is with examples from the most common type of this technology: hardware virtualization. If you had one high-powered computer processor, virtualization would allow you to split it up and run four separate operating systems (Windows, Apple OS, etc.), each seemingly running on a standalone, low-powered processor. Conversely, virtualization could also be used to connect four high-powered processors to create what your operating system would recognize as one ultra-fast piece of hardware. This technology can be applied in a number of ways to create opportunities for more efficient resource utilization and cost savings. Desktop virtualization Sometimes referred to as cloud desktops, this form of virtualization grants you access to a fully functioning computer that you access via a local network or the internet. Somewhere, a server has allocated a portion of its hardware resources for your virtual desktop. With a keyboard, monitor, mouse, and extremely low-end computer, you can connect to this virtual desktop and utilize all the processing power and storage the server has set aside for it. Application virtualization By installing a program on a server hard drive, your employee workstations can use their computing resources to run the program, but restrict data from being stored on their hard drives. The program and the documents it creates will never leave the server hard drive, making it much harder for hackers to compromise them. With more advanced virtualization solutions, your server can also allocate the computing resources necessary to run the program, meaning your workstations are merely a window to your server. Storage virtualization Similar to hardware virtualization, this strategy makes it easy to organize how your data is stored. In addition to combining hard drives across several computers into a massive virtual drive, storage virtualization also stores data based on how important it is. Frequently used documents are saved to your fastest drives and can be automatically backed up to the cloud. Network virtualization If your office has more than 10 workstations, it makes sense to consider network virtualization, which allows you to separate vulnerable devices. For example, if you had one server that handles a lot of web traffic and another that stored sensitive documents, you might want to connect them to different networks to avoid a cross contamination. Network virtualization would allow you to do that without buying any new hardware! Even with our simplified explanations, virtualization is still a complicated subject. Rather than try to figure it out in a few hundred words, give us a call and we’ll show you in person! Published with permission from TechAdvisory.org. Source.

2018 VoIP developments you need to know

According to several experts, Voice over IP (VoIP) phone systems are one of the top investments businesses make, and for good reason. The ability to call anyone from anywhere with an internet connection gives employees lots of flexibility. And with 2018 just around the corner, there will be new VoIP developments to look forward to. Faster networks will improve call quality With more 5G mobile networks expected to go online in 2018, the quality of VoIP calls will get even better. 5G offers wireless speeds ten times faster than 4G, significantly reducing common issues like call jitter, echoes, and packet loss. Faster upload and download speeds also allow for stable, high-quality video streaming from anywhere with a strong 5G signal. All in all, this new mobile network will definitely empower more users to work remotely. Artificial intelligence will enhance telecom systems AI technology has huge implications for VoIP phone systems. Before a call, AI could be used to recognize poor call-quality and fix it immediately — like a self-healing network. This means issues like low bandwidth, improper network configuration, and high latency can be resolved in real time, guaranteeing crystal clear calls and minimizing the need for human intervention. We also anticipate AI-powered unified communications programs that will analyze conversations, email correspondence, and speech patterns also in real time to produce valuable insights into customer behavior and sales performance. With this information, marketing firms will be able to improve their sales tactics and customer service. So far, major developers and telecom providers are still working on prototypes of this technology, but more AI functionality will likely appear in 2018. Voice assistants will get smarter In addition to providing customer-behavior analytics, we predict that AI will also be used to answer calls. Thanks to improvements in language processing, voice assistants like Siri and Alexa are getting better at interpreting simple commands and interacting directly with customers. For example, voice bots can handle simple queries that would normally be found in FAQs, while customer service agents resolve more complicated issues. If implemented correctly, this has the potential to increase resolution rates and reduce time spent on basic tasks. Plain old telephone systems will die out Given the popularity of VoIP phone systems, telecom analysts predict that the demise of traditional landlines is well underway. Of course, support for old-school phone systems will still be available, but the businesses that use them will be a minority. VoIP offers enterprise-level features, hardware, support, and upgrades for a fixed monthly fee, making it a smarter choice for future-proofing business communications. This is why you should consider VoIP migration your goal for 2018. As a professional VoIP provider, we can help you with this process. Simply contact us today to learn about all the benefits of a futuristic phone system. Published with permission from TechAdvisory.org. Source.

Facebook Messenger: What’s New?

Over 330 million consumers connected with small businesses via Facebook Messenger in 2017 alone, so it’s evident that the ‘phone call’ era is coming to a close. Since consumers now want constant, immediate online connectivity with their local car dealership, pizza joint, and other local businesses, it is only fitting that Facebook Messenger’s latest feature grants consumers even more flexibility in how they contact their local business. The How By installing a plug-in called Customer Chat, retailers can integrate Facebook Messenger with their website, letting their customer support representatives carry on conversations with clients just like they would on Facebook. Customer Chat also saves conversation histories, meaning a user can be talking to a customer representative on their website and then continue the conversation once they shift to Facebook — without having to start a new conversation. Customer Chat is now open to any business in the form of an ‘expanded public beta.’ Here’s Facebook’s guide detailing how to install Customer Chat. Facebook’s Grand Plan Like all new services, the success depends on the users. Customer Chat’s primary user base seems to be those who lack the time or confidence involved in sending a formal e-mail for a casual business inquiry. Regardless, Facebook has long been developing its platform with an eye on chat’s broader benefits to tighten its grip on businesses. A recent stat indicates Facebook Messenger has surpassed 1.3 billion monthly active users. So, What Next? As Facebook seems to be monopolizing and clamping down on the communication realm — both private and business — with Facebook Messenger and Whatsapp, the plan is clear: They want to absorb even more of the communications that usually take place over phone calls and e-mail. It is still an uncertainty if the new Messenger feature will have a large impact on Facebook’s grand plan, but it certainly won’t hurt if it ends up working. Customer Chat opens up new avenues of integration, such as sending money, making video calls or even convincing customer service reps to give you a refund. Thus making Facebook the go-to app for anything and everything. Got any questions about Facebook? Let us help you understand the technicalities. Call us today! Published with permission from TechAdvisory.org. Source.

How to master Microsoft Office!

Despite Microsoft Office’s easy-to-use interface, mastering all the features in this suite of productivity tools requires time. But fret not, the following training videos will help you become a Microsoft Office expert fast. Office Basics is a series of free Office training videos from Microsoft which cover different features and functionality. Intro to Office Basics This training video will help you use templates to create professional documents, learn the ins and outs of SmartArt and Charts to express complex data and ideas, and collaborate in shared documents whether you’re working online, offline, or simultaneously with others. What is Office 365? Discover the features and upgrades within Office 365 that aren’t available anywhere else, and learn how cloud versions of applications like Word, Excel, and Outlook differ from their desktop counterparts. Word Training These training videos will show you how to create and edit documents as well as create and format tables in just a few clicks. They also cover document makeovers, how to organize documents, creating mailing lists, and how to translate text instantly. Excel Training Creating, organizing, and analyzing data from charts and tables can be quite complicated, which is why these training videos are perfect for anyone looking to design workbooks, add text and data, format and analyze charts, and create pivot tables and formulas. Other tips include how to slice data and locate them using VLOOKUP. PowerPoint Training There’s more to PowerPoint than adding text to slides. These training videos will show you how to create presentations, add and format text, design presentations, add audio, video, and animations, and format images. You’ll also learn about nifty features such as how to match slide colors using the Eyedropper and how to export slides to videos. Outlook Training Organize your Outlook inbox with ease and learn how to add and format text and images, manage contacts, calendars, meetings, and to-do lists, as well as other tips such as how to spice up your email signature, keep your inbox clean, and hold meetings using Skype and OneNote. Microsoft’s new training videos might not be jaw-dropping, but they will surely help users do more with Office. If you’d like to learn more about the benefits of Microsoft Office for small businesses, just give us a call and we’ll be happy to help. Published with permission from TechAdvisory.org. Source.

Here come crapware-free PCs

Bloatware, trialware, crapware — the unnecessary software usually pre-installed by the manufacturer on your brand new PC. Besides being annoying, this type of software also slows down your machine and can tamper with security. Microsoft is fed up with it too, which is why they’ve come up with Windows 10 Signature Edition PCs. Read on to find out more. What are Windows 10 Signature Edition PCs? Microsoft Windows 10 Signature Edition is a new generation of specially configured PCs that are clear of junkware, which is unnecessary software pre-installed by PC manufacturers on new PCs. Microsoft is aiming to provide users with cleaner, more optimized PCs. What’s tempting about them? They are cleaner. It’s undeniable that PCs devoid of aggressive attempts to lure you to pay for upgrades is a more pleasant user experience. No more annoyances, no more need to spend time manually uninstalling unnecessary programs yourself. They are faster. Once PCs are clear of third-party junkware, they’ll load quicker, whether you need to boot, shutdown, sleep, or resume working. They are more secure, according to Microsoft. The Signature Edition PCs boast a built-in firewall and anti-virus and anti-phishing tools that come with ongoing security support and updates throughout their useful lives. What’s more, ridding your PC of bloatware means reducing the chances of you clicking on suspicious ads that will make your PC prone to attack. You can find Signature Edition PCs in Microsoft’s brick-and-mortar stores and online, manufactured by leading PC makers such as Dell, Acer, HP, and Lenovo. Is there any downside? Possibly, yes. Signature Edition PCs usually cost more than similar machines containing bloatware. This is because bloatware is a source of extra income, and many vendors end up increasing the PC price to make up for the loss. Another thing to note is that even though the Signature Edition PCs have less third-party software, much of Microsoft’s own crapware remains. That includes Candy Crush Soda Saga, Bubble Witch 3 Saga, and Drawboard PDF. The good news is Microsoft bloatware generally doesn’t affect a PC’s performance unless it is running. Interested in switching to a cleaner version of Windows, but unsure whether it would be worth it? Before spending your hard-earned money on a piece of hardware, you need to make sure you understand the pros and cons, so why not consult our experts today? They know about computers and can advise you on how to make the right IT investments. Published with permission from TechAdvisory.org. Source.

Cybersecurity Essentials: VPN

Whether it’s because of government surveillance or cyberattacks, internet users are more concerned than ever about the privacy of their online activities. Unfortunately, security measures like firewalls and antivirus software can’t help you in this case, but there’s one that can: Virtual Private Network (VPN). What is VPN? Simply put, a VPN is a group of servers you connect to via the internet. Once you’ve established a connection, your computer acts as if it’s on the same local connection as the VPN, making it seem like you moved to a different location. When you surf the web through a VPN, all the data transmitted and received is also encrypted, preventing anyone — from hackers to government agencies — from monitoring your online activities. Why should you have one? Of course, security and privacy are major reasons why you would want a VPN. For example, if you’re connected to a public WiFi network — like the ones you typically see in local cafes and airports — using a VPN encrypts the information you’re sending or accessing online. This means things like credit card details, login credentials, private conversations, or other sensitive documents can’t be intercepted by a third party. VPNs are also useful for accessing geo-restricted websites. If you’re traveling abroad and certain US websites are blocked in that region, you can simply connect to a VPN located in the US to access the sites you need. Which VPN should you choose? Given the increasing demand for secure online privacy, VPNs are surging in popularity. The following considerations can help you find the right one. 1. Cost While free VPNs are available, we strongly suggest you avoid them. These keep logs of your internet activity, and in some cases sell them to the highest bidder. Maintaining a VPN service is also expensive, which means the free ones will likely plaster ads on your browser to make a quick buck. Paid VPNs like SurfEasy and StrongVPN often come with more robust features and configurations that keep you secure. What’s more, they don’t keep a record of the sites you visit and hound you with pop-ups that lead to dangerous websites. 2. Location The physical location of VPN servers is important if you want to access region-blocked websites. So if you’re planning on accessing a UK-based service, your VPN provider must at least have servers installed in London. 3. Capacity Read through a VPN provider’s terms of service to determine how much data you’re allowed to use. If possible, find out how many servers a VPN provider has. If they have plenty of servers online, you can rest assured that they have the capacity to support your internet browsing. 4. Device compatibility Another important factor to consider is whether the VPN can be used across multiple devices. Nowadays, employees work on laptops, tablets, and smartphones, so you’ll want a VPN that’s compatible with all these. 5. IP leaking Finally, a great way to evaluate a VPN service is to sign up for their free trial service and visit https://ipleak.net/, which will allow you to check whether your real IP address is actually being leaked. If it manages to track your physical location, you need to opt for a more reliable VPN service. VPNs are now a vital component of cybersecurity, and if you need help selecting the right one for your business, consult with our security experts today. We also offer comprehensive cybersecurity services so no hacker or third party can get their hands on your data. Published with permission from TechAdvisory.org. Source.