508-909-5961 [email protected]

Ensure your privacy in Windows 10Windows 10 helps users by giving useful suggestions as they type and by displaying ads based on their online searches. But these can feel invasive after a while. To ensure your privacy and keep Microsoft’s watchful eye off your computer activity, follow these tips. Turn off personalized advertising Windows 10 assigns each user an advertising […]

The post Ensure your privacy in Windows 10 appeared first on Complete Technology Resources, Inc..

Ensure your privacy in Windows 10

Windows 10 helps users by giving useful suggestions as they type and by displaying ads based on their online searches. But these can feel invasive after a while. To ensure your privacy and keep Microsoft’s watchful eye off your computer activity, follow these tips.

Turn off personalized advertising

Windows 10 assigns each user an advertising ID to personalize their ad experience based on their recent browser history. You can turn off the advertising ID feature by doing the following:

  1. Click Start > Settings > Privacy > General.
  2. Toggle off the option “Let apps use my advertising ID for experiences across apps.” This will reset your advertising ID.
  3. If you don’t want to receive locally relevant content from websites, toggle off the option “Let websites provide locally relevant content by accessing my language list.”

Disable Cortana

Microsoft has ventured into the market of voice-controlled virtual assistants with Cortana. This personal assistant allows users to set reminders, schedule events, and send emails, among other tasks. Every time you use Cortana, it collects information about your computer activity — “learning” it, so to speak — to improve user experience. But if you find this feature intrusive, you can disable Cortana completely with these steps:

  1. Search for the Windows Registry editor in the Windows search bar, or press Windows + R, type “regedit,” and click OK.
  2. Copy and paste HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows into the address bar at the top.
  3. Look for the Windows Search folder. If it doesn’t exist, create it by right-clicking the right-hand pane, then choose New > Key. Rename the folder “Windows Search”.
  4. Select the Windows Search folder, then right-click the right-hand pane and select New > DWORD (32-bit) Value.
  5. Name it “Allow Cortana,” and make sure the Value Data is set to zero.
  6. Restart your computer.

Stop peer-to-peer (P2P) file sharing

Windows 10’s P2P file sharing feature enables your PC to share downloaded updates with other Windows 10 users by default. This helps other users update their systems faster and speeds up your upgrade downloads. To turn it off, do the following:

  1. Go to Settings > Update and Security > Windows Update > Advanced Options > Choose how updates are delivered.
  2. Note that the default setting is “Updates from more than one place.” If you want to disable this feature entirely, toggle off this option. If you want to share your files with PCs on your home network, leave this feature on and select PCs on my local network.

Change Microsoft’s Edge settings

Microsoft’s relaunched browser is chock-full of features, such as web experience personalization and typing prediction. Such features may make you uncomfortable since they all send back data to Microsoft. Here’s how to turn them off:

  1. Open Edge and click on the menu icon (three dots) in the upper right corner.
  2. Next, click on Settings > Privacy and services. Scroll down and switch on the “Send ‘Do Not Track’ requests” option.

There’s also a bunch of privacy and services settings that you may want to disable, such as tracking services, navigation error resolution, block potentially unwanted apps, and more.

For more tips on keeping Microsoft from tracking your online activity and more information about how to safeguard your security and privacy, drop us a line today. Our experts will be more than happy to help!

Published with permission from TechAdvisory.org. Source.

The post Ensure your privacy in Windows 10 appeared first on Complete Technology Resources, Inc..

Read More

Guidelines on monitoring your employees’ online activitiesThere are advantages and disadvantages to monitoring your employees’ online behavior. Below is an honest and transparent list of arguments for and against such a practice. However, should you decide to monitor your employees, we have some guidelines for you to follow for a smooth implementation process. The case for monitoring Here are several reasons […]

The post Guidelines on monitoring your employees’ online activities appeared first on Complete Technology Resources, Inc..

Guidelines on monitoring your employees’ online activities

There are advantages and disadvantages to monitoring your employees’ online behavior. Below is an honest and transparent list of arguments for and against such a practice. However, should you decide to monitor your employees, we have some guidelines for you to follow for a smooth implementation process.

The case for monitoring

Here are several reasons why monitoring your employees’ activities on company devices is a good idea. It can help you:

  • Protect your organization from data theft or harm – because careless or disgruntled employees may leak or steal your data.
  • Ensure you have a harassment-free workplace – because cyberharassment (sexual or otherwise) happens among employees.
  • Ensure members of your staff comply with policies – such as not downloading illegal programs or spending time on websites with illegal or hostile content.
  • Provide evidence in case of a lawsuit – should an employee participate in illegal activities using your business’s computers (heaven forbid!), monitoring their device can provide evidence of their involvement.

Sadly, many business owners who monitor their employees often discover that their staff members aren’t focused solely on the company’s success.

Arguments against employee monitoring

Of course, you should also be aware of the potential downsides to monitoring. These include:

  • Productivity loss – monitoring can put a damper on employee morale, and you may see the distrust leading to productivity losses.
  • Lost privacy and lawsuits – you’ll likely learn personal details about your employees that you would’ve never known about had you not monitored them. You may discover their political or religious views, sexual orientation, or medical problems. This subjects your business to potential privacy or discrimination issues if you or your management team acts negatively based on any of this information.

Monitoring guidelines to follow

If you decide to monitor your employees, here are a few tips you should follow.

1. Create written policies
When you monitor your employees, ask yourself: “Am I doing this for security purposes? Is it to ensure my employees aren’t wasting time on games or social media?” If your monitoring policies are too strict, you could create an atmosphere of distrust.

Set guidelines for acceptable use of email and social media, web browsing, instant messaging, and downloading software and apps. Also, make sure to include how monitoring will be carried out and how data will be used, secured, and destroyed.

2. Tell your employees
It’s important to inform your employees about the scope of your monitoring policies. If they find out you’re doing it secretly, you could face legal issues. By being transparent, you may actually see a boost in productivity by deterring employees from wasting time on the web.

When you tell your employees, explain why you’re doing it and the risks your business faces from misuse of digital assets. Reassure them you’re not doing it to spy on their personal life, but to create a compliant and law-abiding workplace. Because their activities will now be less private, encourage your staff to use their smartphones for personal matters. Also, provide your employees a copy of your written policy for them to read and sign.

3. Get the right technology tools
You don’t need to know each and every employee activity, so look for apps and software that alert you of the most relevant problems, so you can focus on more important tasks.

If implemented correctly, employee monitoring makes your business more secure and productive. For more information about security and other IT support tools, get in touch with us today.

Published with permission from TechAdvisory.org. Source.

The post Guidelines on monitoring your employees’ online activities appeared first on Complete Technology Resources, Inc..

Read More

Researchers uncover new strain of Android malwareThe Android operating system (OS) relies on an open-source code that allows users and manufacturers to modify their phones’ or tablets’ OSs. The problem is, Android’s open-sourced nature also makes it susceptible to cyberthreats. Recently, security experts found DEFENSOR ID — a new type of Android malware exploiting the system's Accessibility Services. What is DEFENSOR […]

The post Researchers uncover new strain of Android malware appeared first on Complete Technology Resources, Inc..

Researchers uncover new strain of Android malware

The Android operating system (OS) relies on an open-source code that allows users and manufacturers to modify their phones’ or tablets’ OSs. The problem is, Android’s open-sourced nature also makes it susceptible to cyberthreats. Recently, security experts found DEFENSOR ID — a new type of Android malware exploiting the system's Accessibility Services.

What is DEFENSOR ID?

DEFENSOR ID is a banking Trojan that minimizes its malicious capabilities to sneak past security checks and infiltrate the Google Play Store. The malware’s primary function is to request access to an Android device’s Accessibility Service, which would allow hackers to execute a variety of commands.

For starters, if unwitting users grant access to DEFENSOR ID, the malware can observe any launched apps and send sensitive information back to hackers. This means hackers can steal anything from passwords and private emails to banking information and one-time SMS activation codes for two-step verification processes.

DEFENSOR ID also allows hackers to remotely uninstall apps, launch programs, and perform gestures (e.g., tap, swipe, click) within the launched program. In theory, this feature can enable hackers to empty a victim’s bank account with minimal effort.

What’s more, the Trojan extends the lock screen timeout to 10 minutes so that cybercriminals have enough time to perform their malicious operations.

Beware of apps leveraging Accessibility Services

According to researchers, DEFENSOR ID targeted Brazilian users and was downloaded over a dozen times. But despite its small success rate, it’s possible that more malware will leverage these techniques to steal sensitive information and control user devices. In fact, earlier in 2020, McAfee researchers discovered Android/LeifAccess malware that exploited Accessibility Services to leave fake reviews on the Google Play Store.

Plus, a common Android issue is that many independent software developers can upload their apps to the Google Play Store and easily circumvent security checks. So, if users aren’t thoroughly vetting the apps they download onto their devices, attacks similar to DEFENSOR ID will become more widespread.

Malware that can abuse Accessibility Services may even give rise to more deceptive online scams or massive-scale data breaches that can shut down businesses.

How to defend against DEFENSOR ID

Developing a healthy skepticism of apps in the Google Play Store is the best way to prevent malware attacks like DEFENSOR ID. This involves training your staff to get in the habit of evaluating an app before downloading it. More specifically, they should be verifying whether user reviews seem authentic, checking the total ratings and downloads, and consulting with security experts whether an app is safe.

Businesses should also use endpoint security software to control what apps users can install on their company-registered devices. By limiting downloads to a few, fully verified apps, you can minimize your company’s exposure to mobile malware.

If you want to keep your business safe from malware and other cyberthreats, it’s in your best interest to call cybersecurity experts like us. Not only do we provide top-notch security solutions, but we also offer proactive maintenance services to protect your IT at all times.

Published with permission from TechAdvisory.org. Source.

The post Researchers uncover new strain of Android malware appeared first on Complete Technology Resources, Inc..

Read More

The latest Windows 10 updates you need to knowMicrosoft will roll out the latest Windows 10 update for free before the end of May 2020. Expect improvements to the operating system’s overall look and feel, thanks to some design refreshes and functionality enhancements. The Windows 10 update will roll out on May 26–28, 2020 and will bring about a fresher look for the […]

The post The latest Windows 10 updates you need to know appeared first on Complete Technology Resources, Inc..

The latest Windows 10 updates you need to know

Microsoft will roll out the latest Windows 10 update for free before the end of May 2020. Expect improvements to the operating system’s overall look and feel, thanks to some design refreshes and functionality enhancements.
The Windows 10 update will roll out on May 26–28, 2020 and will bring about a fresher look for the world’s most popular operating system. Aside from updates to Windows 10’s interface, here are some functionality improvements you can expect.

The update — named Windows 10 20H1/Windows 10 version 2004 — will feature some performance-enhancing upgrades and an initial rollout of new designs. These are aimed to unify Windows applications with those used on mobile devices and the like.

Fluent Design

Fluent Design is an open-source, cross-platform design system that developers can use to craft multiple-device software and applications. Basically, it helps developers keep their application designs unified across several platforms while enhancing overall aesthetic and user experience.

In the upcoming OS update, users will experience some of the first native releases of Fluent Design-optimized applications, specifically Microsoft Office applications, Microsoft Store, Paint, and more. Expect to see refreshed icons and interfaces of your favorite Microsoft apps. Users will also notice that the new designs will stay uniform from platform to platform, whether they use it on a PC, Mac, or other operating systems.

Cortana migration

Users will also notice changes to the Start Menu — Cortana will no longer be docked to the start button, and the new design will feature new ways to interact with Microsoft’s digital assistant. Text-based chat interaction will now be available as well.

Microsoft is in the process of making Cortana into a personal productivity assistant for Microsoft 365 applications, so most of its new processing powers will revolve around improving the 365 experience for users. The update also brings about improved smart prompts that let the virtual assistant type out and send emails, adjust computer settings, open apps, and schedule events via voice commands.

Windows Search

Microsoft is constantly finding ways to improve its Search tool for Windows 10. In this update, users will experience improved indexing and search speeds, as well as a smart indexing feature that limits activity to off-peak hours so that it doesn’t disrupt daily use. This will result in faster performance for laptops of all levels, especially those that still utilize HDD storage.

Where to download

Users can download the feature update via Windows Update, a built-in tool in existing Windows 10 systems. You can access this by clicking Start > Settings > Windows Update. You can also type Windows Update on the search bar (beside the Windows button on the lower-left corner of the screen) and follow the easy instructions.

If you opted for automatic updates, all you’ll have to do is sit back and wait. For manual updates, you’ll need to click on Check for Updates. Users can also get it through the Windows Insider Program. Simply go to Settings > Update & Security > Windows Insider Program and click on Get Started.

Call us today for all your Office 365 needs. We’ll help you get set up in no time.

Published with permission from TechAdvisory.org. Source.

The post The latest Windows 10 updates you need to know appeared first on Complete Technology Resources, Inc..

Read More