Turn off invasive Windows 10 settings in four steps

Windows 10 has become the operating system (OS) of choice among business and personal users. Despite the many improvements to the OS that Microsoft has rolled out, Windows 10 isn’t perfect. In fact, many users have complained about its intrusive default privacy settings. Luckily, you can easily turn these settings off to ensure your privacy. Turn off personalized advertising Windows 10 assigns each user an advertising ID to personalize their ad experience based on their recent browser history. You can turn off the advertising ID feature by doing the following: Click Start > Settings > Privacy > General. Toggle off the option “Let apps use my advertising ID for experiences across apps.” This will reset your advertising ID. If you don’t want to receive locally relevant content from websites, toggle off the option “Let websites provide locally relevant content by accessing my language list.” Disable Cortana Microsoft has ventured into the market of voice-controlled virtual assistants with Cortana. This personal assistant allows users to set reminders, schedule events, and send emails, among other tasks. Every time you use Cortana, it collects information about your computer activity — “learning” it, so to speak — to improve user experience. But if you find this feature intrusive, you can disable Cortana completely with these steps: Search for the Windows Registry editor in the Windows search bar, or press Windows + R, type “regedit,” and click OK. Copy and paste HKEY_LOCAL_MACHINESOFTWAREPoliciesMicrosoftWindows into the address bar at the top. Look for the Windows Search folder. If it doesn’t exist, create it by right-clicking the right-hand pane, then choose New > Key. Rename the folder “Windows Search”. Select the Windows Search folder, then right-click the right-hand pane and select New > DWORD (32-bit) Value. Name it “Allow Cortana,” and make sure the Value Data is set to zero. Restart your computer. Stop peer-to-peer (P2P) file sharing Windows 10’s P2P file sharing feature enables your PC to share downloaded updates with other Windows 10 users by default. This helps other users update their systems faster and speeds up your upgrade downloads. To turn it off, do the following: Go to Settings > Update and Security > Windows Update > Advanced Options > Choose how updates are delivered. Note that the default setting is “Updates from more than one place.” If you want to disable this feature entirely, toggle off this option. If you want to share your files with PCs on your home network, leave this feature on and select PCs on my local network. Change Microsoft’s Edge settings Microsoft’s relaunched browser is chock-full of features, such as web experience personalization and typing prediction. Such features may make you uncomfortable since they all send back data to Microsoft. Here’s how to turn them off: Open Edge and click on the menu icon (three dots) in the upper right corner. Next, click on Settings > Privacy and services. Scroll down and switch on the “Send ‘Do Not Track’ requests” option. There’s also a bunch of privacy and services settings that you may want to disable, such as tracking services, navigation error resolution, block potentially unwanted apps, and more. For more tips on keeping Microsoft from tracking your online activity and more information about how to safeguard your security and privacy, drop us a line today. Our experts will be more than happy to help! Published with permission from TechAdvisory.org. Source.
Should you monitor your employees’ online activities?

To monitor or not to monitor — that is the question. Employee monitoring is a touchy subject. If you’ve ever considered it, then you may ask yourself if it is a good idea for an employer to check on their staff’s online activities. Below are the pros and cons of employee monitoring, and some helpful tips should you push through with it. The case for monitoring Here are several reasons why monitoring your employees’ activities on company devices is a good idea. It can help you: Protect your organization from data theft or harm – because careless or disgruntled employees may leak or steal your data. Ensure you have a harassment-free workplace – because cyberharassment (sexual or otherwise) happens among employees. Ensure members of your staff comply with policies – such as not downloading illegal programs or spending time on websites with illegal or hostile content. Provide evidence in case of a lawsuit – should an employee participate in illegal activities using your business’s computers (heaven forbid!), monitoring their device can provide evidence of their involvement. Sadly, many business owners who monitor their employees often discover that their staff members aren’t focused solely on the company’s success. Arguments against employee monitoring Of course, you should also be aware of the potential downsides to monitoring. These include: Productivity loss – monitoring can put a damper on employee morale, and you may see the distrust leading to productivity losses. Lost privacy and lawsuits – you’ll likely learn personal details about your employees that you would’ve never known about had you not monitored them. You may discover their political or religious views, sexual orientation, or medical problems. This subjects your business to potential privacy or discrimination issues if you or your management team acts negatively based on any of this information. Monitoring guidelines to follow If you decide to monitor your employees, here are a few tips you should follow. 1. Create written policies When you monitor your employees, ask yourself: “Am I doing this for security purposes? Is it to ensure my employees aren’t wasting time on games or social media?” If your monitoring policies are too strict, you could create an atmosphere of distrust. Set guidelines for acceptable use of email and social media, web browsing, instant messaging, and downloading software and apps. Also, make sure to include how monitoring will be carried out and how data will be used, secured, and destroyed. 2. Tell your employees It’s important to inform your employees about the scope of your monitoring policies. If they find out you’re doing it secretly, you could face legal issues. By being transparent, you may actually see a boost in productivity by deterring employees from wasting time on the web. When you tell your employees, explain why you’re doing it and the risks your business faces from misuse of digital assets. Reassure them you’re not doing it to spy on their personal life, but to create a compliant and law-abiding workplace. Because their activities will now be less private, encourage your staff to use their smartphones for personal matters. Also, provide your employees a copy of your written policy for them to read and sign. 3. Get the right technology tools You don’t need to know each and every employee activity, so look for apps and software that alert you of the most relevant problems, so you can focus on more important tasks. If implemented correctly, employee monitoring makes your business more secure and productive. For more information about security and other IT support tools, get in touch with us today. Published with permission from TechAdvisory.org. Source.
Cutting IT hardware costs with thin and zero clients

If you want to cut costs on IT hardware, don’t settle for cheap but old or low-quality machines. They’ll likely offer subpar performance, which will hurt your team’s productivity. What’s worse, they’ll likely break down often, too, which means the money you initially saved will go to repairs and upgrades. Instead of buying low-end machines, you should consider buying thin or zero clients. What are thin and zero clients? Thin clients are stripped-down computers with minimum processing power and memory. They rely on a basic operating system (OS) and a network connection to access a more powerful system where almost all computing processes take place. Zero clients work the same way. The only difference is that there’s no local storage or OS installed on the device; all the software, storage, and processing power sits on a server until you need it. This setup makes a zero client ideal for cutting costs. What are the benefits of using thin and zero clients? Reduced hardware costs If you want computers with low upfront costs, choose thin and zero clients. Conventional desktops start at $600 per user, while thin clients can go as low as $250 per user. And since they have no hard drive or other moving parts, lean devices tend to be more durable and have a longer life span than their traditional counterparts. Simplified IT management Another benefit of thin and zero clients is that they can be managed from a server. Suppose a new software update is released. Instead of manually downloading the patch on each computer, you can simply install the update on your server and roll it out to all thin and zero clients. Apart from installing updates, you can also make backups, security configurations, and application deployments in the data center. This quickens setup, reduces downtime, and increases employee productivity. Minimized security risks Thin and zero clients also help you prevent costly malware attacks and data breach incidents. Your employees and poorly managed endpoints are the biggest vulnerabilities with traditional desktops. Thin and zero clients reduce these problems by limiting direct access to the OS. This prevents employees from copying sensitive data to removable media and installing software, malicious or otherwise. If your thin or zero client is damaged or corrupted, you don’t have to worry about your data, as it’s originally stored in an impenetrable server. Decreased energy consumption Because processing is done locally, traditional desktops generate a lot of heat and require more power, resulting in huge power and cooling bills. In contrast, thin and zero clients consume only 4 to 6.5 watts of power, almost 1/50th of thick client requirements. What’s more, they require little to no cooling, allowing you to enjoy significant cost savings. Do not overlook thin and zero clients if you’re searching for ways to cut costs without compromising outcomes. The reduced hardware costs, power bills, and security risks are just too good to pass up. If you’re still unsure about this technology, give us a call. We’ll assess your tech needs and determine whether or not thin or zero clients can help you succeed. Published with permission from TechAdvisory.org. Source.
Why your business should record calls

Voice over Internet Protocol (VoIP) provides small- and medium-sized businesses (SMBs) with the convenience of making and receiving calls from anywhere with an active internet connection. VoIP enables your staff to meet the demands of your clients, which boosts customer satisfaction. VoIP also has another feature that can take your customer service to the next level: call recording. #1. Improve customer service One of the most important reasons why businesses should always record their calls, no matter its significance, is to ensure high-quality customer service. By reviewing calls, managers can understand how their agents have been dealing with customers, find out whether or not they’ve followed company protocol, and pinpoint any aspects that can be improved on. Without call recording, managers would have to listen to each call in real time, which is a time-consuming process. By recording each call, not only will your managers save time, but your employees will also be motivated to perform at their best every time they’re on the phone because they know their calls can always be reviewed. #2. Upgrade employee performance According to Edgar Dale’s Cone of Learning, people only remember 10% of what they’ve read, 50% of what they’ve seen and heard, and 90% of what they’ve done. By providing your agents with actual recordings of good and bad calling examples during training sessions, and have them simulate calls afterwards, they’ll be able to learn better and provide high-quality customer service faster. #3. Retrieve missed details and prevent litigation With hundreds of phone calls daily, it’s understandable if your employees don’t catch every single detail. And for companies that require their agents to manually input information during calls, there’s always a possibility that they’ll forget or miss certain information. Needless to say, this could lead to disgruntled customers. If not properly handled, this can harm your reputation, reduce work opportunities, and if things escalate, proceed to litigation. VoIP’s call recording feature lets you replay saved audio files to make sure you haven’t missed any details, ensuring that all customer demands are met. And if you ever get into a dispute with your clients regarding who said what, you can always retrieve the exact audio file and have both sides listen to it, saving you thousands of dollars in legal fees. #4. Understand customer preferences Have you ever received an inquiry about a product or service that’s not included in your offerings? While your agents usually jot these requests down and pass them on to the relevant personnel, they may end up forgetting some if numerous calls are being made that day. Tiny issues like this can lead to potentially huge losses. With call recording, you can review all your calls at the end of the day. You’ll have a better picture of what certain customers are looking for so you can address them better. VoIP allows businesses to make on-demand calls affordably, and its call recording feature helps companies improve their customer service and prevent litigation. If you think business VoIP is right for you, or if you have any questions, give us a call today. Published with permission from TechAdvisory.org. Source.
Microsoft 365 signals a new era of productivity for SMBs

In April 2020, Microsoft launched Microsoft 365, the successor to its popular Office 365. But it’s not a mere name change. The tech giant is also introducing improvements to its productivity software that will enhance how your business deals with cyberthreats every day. Name change Microsoft has time and again shown that they are willing to make drastic changes to their products and services in the name of development. Their Windows 10 operating system (OS), for instance, is a far cry from its predecessor Windows 8. Microsoft made the jump from what they thought would be a revolutionary tile-based design in Windows 8 to a classic, ergonomically designed Windows 10. The tech giant has once again made drastic changes, this time to their award-winning line of productivity apps Microsoft Office 365. O365, as it was lovingly referred to for nearly a decade, is now the sleeker, more powerful, Microsoft 365 Business. Microsoft 365 Business is available to small- to mid-sized businesses (SMBs) on three different subscription plans: Business Basic, Business Standard, and Business Premium. Available plans Microsoft 365 Business Basic Microsoft 365 Business Basic comes with many standard features, including web and mobile app access, full email and calendaring tools, secure file storage, collaboration tools, and support. Rest easy knowing that you have a powerful enterprise-grade software for a fraction of the cost such as: Web and mobile app versions of Office apps Real-time coauthoring Email hosting with 50 GB capacity 1 TB of OneDrive storage Automatic syncs regardless of work platform choice (between OneDrive and SharePoint). Teleconferencing and unified communications via Microsoft Teams for up to 250 users Automatic threat defense via Exchange Online Protection A complete array of cybersecurity tools and protocols, such as automated password policy tools Microsoft 365 Business Standard With the Microsoft 365 Business Standard plan, you’ll get everything Business Basic offers plus: Desktop versions of Office apps for up to five PCs or Macs per user Easy and smart appointments management with Microsoft Bookings Real-time mileage tracking and reporting with MileIQ Microsoft 365 Business Premium Microsoft 365 Business Premium is the brand’s flagship plan, a great tool for businesses ready to take their operations to the next level. It comes with everything Business Standard offers plus: Advanced security tools to protect from zero-day threats and ransomware, via Office 365 Advanced Threat Protection Remote wiping tools for stolen or lost devices, via Selective Wipe from Intune Restricted copying or saving options for unauthorized apps and locations Complete control of company data, via Information Rights Management Pre-breach threat resistance policy options, via Windows Defender Exploit Guard Malware protection, via Windows Defender Unlimited cloud archiving of emails, via Exchange Online Archiving Setup wizards for Windows 10, iOS, and Android Total security policy deployment — even for mobile apps — via Mobile Device Management from Intune Microsoft 365 Business will change the way your staff powers your business. Contact us today to discuss how you can avail of a subscription. Published with permission from TechAdvisory.org. Source.
Why does HTTPS matter?

Almost everyone in the world browses the internet every day. People look up information, shop, chat with friends, or just pass the time by surfing the web. Internet browsing has become second nature to us that we often forget one thing: checking our address bar for an “S” after the “HTTP” prefix. HTTPS encryption The “s” in HTTPS stands for “secured”. It was introduced in 1995, so older websites that have been left on its own without regular maintenance usually don’t have it. But even to this day, unsecure websites exist, and fraudsters can easily take advantage of them. When you visit a site with an HTTP connection, everything you type or click on that website is sent without encryption. This means that anyone who intercepts the data transferred between the website and your computer can readily view them. Cybercriminals can exploit this fact to gain access to your personal data, Social Security number, credit card information, and the like. This puts you at risk of identity theft and other fraudulent activities. HTTPS certificates When you visit a website, your computer uses an online directory to translate its alphanumeric name into a numerical address. It then saves that information on your computer, so that it doesn’t have to check the online directory every time you visit the same website. In the event that your computer gets compromised, it could be tricked into directing a perfectly safe web address like www.google.com to a malicious website. Most of the time, users are sent to sites that look exactly like the legitimate site, but are actually fake copies designed to trick them into divulging their credentials. To prevent such things from happening, the online directories mentioned earlier issue an ecosystem of certificates that turn HTTP into HTTPS, making it impossible for anyone to be redirected to a fraudulent website. How does this affect our daily browsing habits? We often visit a multitude of websites in a short period of time without checking each one for padlocks and certificates. Unfortunately, we can’t ignore the importance of HTTPS, so here are a few things to consider the next time you browse the internet: If your browser marks a website as “unsafe,” think twice about clicking “Proceed anyway.” Only click the prompt if you are absolutely certain nothing will be transmitted. Add web browser extensions such as HTTPS Everywhere that create encrypted connections to unencrypted websites. These extensions encrypt your communication with websites, and are compatible with Chrome, Firefox, and Edge browsers. Always be vigilant. Some sites may have HTTPS but it doesn’t mean they’re safe. For example, goog1e.com (with the “l” replaced with a one) could have a certificate, but the misspelling indicates it to be an untrustworthy site. Cybercriminals use similar spellings of authentic websites to fool people into thinking that they’re in a secure site. This is called typosquatting or URL hijacking. And perhaps, just follow the easiest step of all: avoid sites that don’t use the HTTPS protocol. If you want to learn more about safer browsing habits and endpoint security, give our office a call. Published with permission from TechAdvisory.org. Source.
How MSPs are supporting clients during the COVID-19 pandemic

The COVID-19 pandemic and the sweeping shutdowns to contain the spread of the virus brought about significant impacts on businesses. Many small companies realized they lacked the resources to rapidly adopt a remote work setup and tapped their IT partners to help address their technology demands. Here’s how managed IT services providers (MSPs) are rising to the challenge. Providing infrastructure and service desk capabilities In today’s digital work landscape, MSPs are keeping their noses to the grindstone to fulfill customer demands and help keep businesses running. While many small companies have taken the first step of transitioning to remote work, they still need help managing the logistics. Right now, MSPs are providing customers with IT infrastructures and taking on a host of network tasks, including configuring hardware, establishing remote connections, and managing backup and storage options, among other activities. These all help to ensure that company networks are reliable enough to facilitate a remote workforce. MSPs are also offering service desk capabilities, providing companies with a centralized resource for employees, customers, and business partners to answer questions, troubleshoot problems, and facilitate solutions. Appropriate and timely support is crucial, especially in times of great uncertainty. Simplifying cloud adoption Cloud solutions are ideal if IT environments must be quickly modified to meet changing demands or difficulties, which is why MSPs are now helping businesses leverage a variety of cloud technologies and even move their data and applications online. And because cloud migration can get complex, many MSPs are also offering managed migration plans that help companies transition key workflows and processes to the cloud safely and efficiently. Offering remote support where possible The current travel restrictions and social distancing measures make work-related travel difficult and risky. And with highly distributed workforces, many companies would rather source local service technicians for break/fix assistance, cabling, and other IT solutions. Partnering with MSPs ensures that systems and networks are protected all the time and critical support is provided within 24 hours. What’s even better is that some providers have technicians in different locations, making it easy to provide tools, resources, and support even in hard-to-reach areas. Delivering flexible solutions As business needs continue to shift, MSPs must move in lockstep and provide support wherever they can. Here are some other ways MSPs are helping their clients navigate these trying times: Assisting with IT projects Because of how broad and challenging IT projects can be, it’s not uncommon for companies to lack the right skills and resources to handle them. MSPs are helping them by providing the expertise and technologies needed to pursue these projects, allowing companies to keep moving forward. Foregoing long-term contracts Some companies need IT support and services but can’t afford to commit to long-term contracts. Similarly, some want to augment their IT only for the duration of the COVID-19 pandemic. What’s great is many MSPs are providing flexible IT solutions, giving customers all the services and support they need, when they need them. Offering faster response times Especially now that downtime could likely spell the end of a business, companies seek quick turnaround times. Since MSPs typically offer 24/7 support and tout specialists with a wide range of experience and knowledge, they can proactively address issues and ensure that IT infrastructures are working as efficiently as possible. Providing better customer service As many businesses are still adjusting to the new normal, providing positive customer experiences will go a long way to earning trust and ensuring customer loyalty post-crisis. By being compassionate and empathetic to the situations of their customers, MSPs are showing companies that they’re navigating these trying times together. Call our IT experts today to help configure the perfect remote work setup for your business. Published with permission from TechAdvisory.org. Source.
Why the latest Windows 10 update is blocked on some PCs

Last week, Microsoft unveiled the May 2020 Update, which is the latest version of Windows 10. While some users are able to update their systems, some PCs are prevented from installing it. Here’s what’s causing the update block, and how you can bypass it. Known issues The update block is present on devices such as the Surface Pro X and 7, Surface Laptop 3, and Surface Book 3, according to a test by The Verge. The block is also present on other devices with the following configurations: PCs with games using GameInput Redistributable. Installing the Windows 10 May 2020 Update on these systems may result in mouse input loss. Always On, Always Connected PCs. Devices with more than one Always On, Always Connected network adapter may experience unexpected restarts. PCs with integrated Intel graphics. Systems may encounter substandard variable refresh rates after installing the update. Systems with Conexant or Synaptics audio drivers. PCs may display a blue screen of death (BSOD) error message if the May 2020 Update is installed. PCs with older drivers for Nvidia display adapters. Devices with GPU drivers with a version below 358.00 may encounter some performance issues. Devices using Thunderbolt docks. PCs may display a BSOD error message if the May 2020 Update is installed. PCs with certain Realtek drivers. These Windows 10 devices may be unable to connect to more than one Bluetooth device. Microsoft has also identified issues with the Deployment Image Servicing and Management (DISM) service and Input Method Editors (IME) with the Windows 10 May 2020 Update. If your PC has not yet received any update notification, or if you’ve checked for updates on Windows Update without any luck, it’s likely that your device is encountering issues with the May 2020 Update. As a result, Microsoft is only offering the update to compatible devices and currently resolving issues on other PCs. How to bypass the update block If your device is currently blocked but you still want to install the May 2020 Update, you can get it through the Windows 10 Update Assistant. Here’s how to do it: Go to the Windows 10 download page. Under the header “Windows 10 May 2020 Update,” click on the Update now button and wait for a file to download. Open the file. This will bring up the Windows 10 Update Assistant program. The program will check for updates. Click on the Update now button once done. The tool will check if your system meets the update requirements. Click Next. Wait for the program to download and install the Windows 10 May 2020 Update. You can also download Windows 10 through Microsoft’s Media Creation tool to use on another PC, burn to a DVD, or save to an external hard disk or thumb drive. We advise you take extra precautions, however, especially if Windows found potential compatibility problems with your system. If you want to learn more about the latest Windows 10 update and how to deploy it on your business PCs, give us a call today. Published with permission from TechAdvisory.org. Source.
Watch out for this Android malware

Security researchers have discovered a new Android malware called DEFENSOR ID that snuck its way into the Google Play Store. Forensic analysis shows that the malware takes advantage of an Android device’s Accessibility Services to infiltrate the system and cause damage without being detected. To help you avoid this dangerous strain of malware, we’ve compiled everything you need to know in this blog entry. What is DEFENSOR ID? DEFENSOR ID is a banking Trojan that minimizes its malicious capabilities to sneak past security checks and infiltrate the Google Play Store. The malware’s primary function is to request access to an Android device’s Accessibility Service, which would allow hackers to execute a variety of commands. For starters, if unwitting users grant access to DEFENSOR ID, the malware can observe any launched apps and send sensitive information back to hackers. This means hackers can steal anything from passwords and private emails to banking information and one-time SMS activation codes for two-step verification processes. DEFENSOR ID also allows hackers to remotely uninstall apps, launch programs, and perform gestures (e.g., tap, swipe, click) within the launched program. In theory, this feature can enable hackers to empty a victim’s bank account with minimal effort. What’s more, the Trojan extends the lock screen timeout to 10 minutes so that cybercriminals have enough time to perform their malicious operations. Beware of apps leveraging Accessibility Services According to researchers, DEFENSOR ID targeted Brazilian users and was downloaded over a dozen times. But despite its small success rate, it’s possible that more malware will leverage these techniques to steal sensitive information and control user devices. In fact, earlier in 2020, McAfee researchers discovered Android/LeifAccess malware that exploited Accessibility Services to leave fake reviews on the Google Play Store. Plus, a common Android issue is that many independent software developers can upload their apps to the Google Play Store and easily circumvent security checks. So, if users aren’t thoroughly vetting the apps they download onto their devices, attacks similar to DEFENSOR ID will become more widespread. Malware that can abuse Accessibility Services may even give rise to more deceptive online scams or massive-scale data breaches that can shut down businesses. How to defend against DEFENSOR ID Developing a healthy skepticism of apps in the Google Play Store is the best way to prevent malware attacks like DEFENSOR ID. This involves training your staff to get in the habit of evaluating an app before downloading it. More specifically, they should be verifying whether user reviews seem authentic, checking the total ratings and downloads, and consulting with security experts whether an app is safe. Businesses should also use endpoint security software to control what apps users can install on their company-registered devices. By limiting downloads to a few, fully verified apps, you can minimize your company’s exposure to mobile malware. If you want to keep your business safe from malware and other cyberthreats, it’s in your best interest to call cybersecurity experts like us. Not only do we provide top-notch security solutions, but we also offer proactive maintenance services to protect your IT at all times. Published with permission from TechAdvisory.org. Source.
Android tip: Track your data use

Android devices are most effective when they have a stable network connection. The problem is that many mobile networks limit how much data you can use during a subscription cycle. Instead of upgrading to a more expensive plan, consider paying closer attention to how and when you use data and scaling back. It’s easier than you think. Here are three things you can do to track and subsequently optimize the amount of data you are using on your Android device. Tip #1: Turn off or limit your mobile data consumption Using Wi-Fi is one of the easiest ways to reduce data consumption. These networks are everywhere nowadays, even malls and shopping centers often offer free Wi-Fi. In fact, Android devices can automatically switch between Wi-Fi and cellular connections. There is a chance, though, that your phone may lose a Wi-Fi connection and switch to a data network without your knowledge. Preempt this issue by disabling mobile data entirely. You can often accomplish this by pressing your finger along the top of the screen and dragging downward to reveal important phone settings, including enabling or disabling mobile data. Another option is to open your Android’s Settings app and search for the menu that contains your mobile data configurations. From there, you can turn off data entirely or set data limitations based on your service plan’s allowance. Tip #2: Limit background data Even if you don’t realize it, many of your apps use data while your Android device is locked. They keep running in the background and their data usage can take significant chunks out of your monthly allowance. To limit the use of background data, follow these steps: Open your Android’s Settings app. Select the Apps menu (the name varies based on the device manufacturer; look for the menu that lists all your apps). Tap on an app that you don’t want to use background data. Select Restrict app background data. The Apps menu provides plenty of information about how much data various apps are using, both in the foreground and background. Even if you don’t use this menu to configure background data allowances, it’s a great place to learn about data hogs. Tip #3: Use Chrome’s data compression All Android devices have the Google Chrome web browser installed right out of the box. Before you consider trying another browser, keep in mind that Chrome has some of the best data-saving features. For example, when data compression is enabled, the websites you visit are sent to Google’s servers to ensure they are optimized for mobile devices and unnecessary information is removed. To turn this feature on, take these steps: Open the Chrome app. Tap the button with three dots in the upper right corner. Select Settings > Data Saver. Toggle the On switch. Google claims this can save up to 60% of data usage in the browser and that it detects malicious websites and harmful content. There are dozens of other ways you can protect yourself and save data when using your Android device. If you’d like additional assistance, contact us today. Published with permission from TechAdvisory.org. Source.