508-909-5961 [email protected]

Use Single Sign-On to Tackle Account Sprawl

No matter how valuable your cloud subscriptions are, each new set of login credentials users are forced to create and memorize adds another level of inefficiency. With something called Single Sign-On (SSO), you can create one user profile that logs you into all your online accounts.

The post Use Single Sign-On to Tackle Account Sprawl appeared first on Complete Technology Resources, Inc..

Use Single Sign-On to Tackle Account Sprawl

No matter how valuable your cloud subscriptions are, each new set of login credentials users are forced to create and memorize adds another level of inefficiency. With something called Single Sign-On (SSO), you can create one user profile that logs you into all your online accounts. If you’re overwhelmed by the number of passwords linked to your name, SSO is a dream come true.

What is SSO?

Single Sign-On solutions allow you to create one username and one password that thousands of websites will recognize. If you’ve ever clicked ‘Login with Google’ on a non-Google website, you’ve already enjoyed the benefits of SSO. It’s faster, simpler, and more secure. Now, small businesses can accomplish the same level of efficiency between their employees and cloud platforms.

Instead of asking everyone in the office to track separate accounts for Office 365, Slack, Quickbooks, and whatever other cloud applications your company relies on, you can give them one set of credentials and manage what they have access to remotely. Employees come to work, enter their ACME Inc. username and password, and they’re set for the day.

Why is SSO more secure?

There are a number of ways to set up a small-business SSO solution, but most of them focus on removing login information from your servers or network storage. Usually, you’ll provide your employees’ logins to an SSO provider (sometimes referred to as an Identity-as-a-Service provider) and each employee will receive a single login paired with a secondary authentication -- like a fingerprint or an SMS to a personal device.

Each time one of your employees visits a cloud platform, such as Office 365, the SSO provider will verify the user’s identity and the security of the connection. If anything looks amiss, your IT provider will be notified.

Should your network or any of its devices be compromised, hackers would find nothing but logins to your SSO accounts, which are meaningless without fingerprints or mobile devices.

How to get started with SSO

The first step when setting up a Single Sign-On solution is making sure you have a healthy and responsive IT support system in place. You need a team that is constantly available to review suspicious alerts and troubleshoot employee issues. If you don’t currently have that capacity, contact us today and we’ll help you out!

Published with permission from TechAdvisory.org. Source.

The post Use Single Sign-On to Tackle Account Sprawl appeared first on Complete Technology Resources, Inc..

Read More

Inclusions of Google’s New Chrome Updates

Business owners must stay current with never-ending Google updates to keep their clients happy. For the month of February, Google heard users’ demands and decided to include three new features to Chrome to address users’ problems with ads.

Ad Blocking

Android users will be pleased to hear that the newly updated Google Chrome comes with an ad blocking feature.

The post Inclusions of Google’s New Chrome Updates appeared first on Complete Technology Resources, Inc..

Inclusions of Google’s New Chrome Updates

Business owners must stay current with never-ending Google updates to keep their clients happy. For the month of February, Google heard users’ demands and decided to include three new features to Chrome to address users’ problems with ads.

Ad Blocking

Android users will be pleased to hear that the newly updated Google Chrome comes with an ad blocking feature. Gone are the days when they have to manually close pop-ups, because Chrome will now automatically stop sites from opening new tabs or windows without users’ permission. This won’t necessarily block all ads, but it should improve your internet browsing experience.

Meanwhile, Chrome will begin restricting certain ads: sticky ads (which remain in the same position even as you scroll), and ads that go over a particular size limit. Moreover, they won’t block static inline photo ads that show up in between two paragraphs in an article. All in all, this feature will prevent nine kinds of ads out of 55 potential ones.

Muting Autoplay Videos

In line with the ad blocking feature, Google has also decided to prevent sites from automatically playing video ads whenever a page loads. You can usually find these types of ads in between paragraphs when reading through an article in the site. This time around, Chrome won’t block video ads, but it will keep them on mute. This way, users can still continue reading the article without any unnecessary background noise.

Marking HTTP Sites as Unsecured

This particular feature should get the attention of small- and medium-sized businesses, as it will affect them personally. Google warns all sites without HTTPS protocol that they will be marked as “not secure” come July. They want to emphasize the importance of HTTPS encryption for web security, stating that it keeps the channel safe between your browser and the site you’re visiting. This guarantees that someone in the middle won’t spy on browsing activity or interfere with traffic.

At the moment, these users can already see a “Secure” sign and a green lock icon on HTTPS-encrypted pages. By July, Chrome’s address bar will be notifying those who enter HTTP sites that they are in an unsecured page.

Staying ahead of Google's constant updates can be tiring. In the end, you have to realize that these improvements are often in the best interests of your customers and web users in general. If you need a little help with the IT side of things -- give us a call today!

Published with permission from TechAdvisory.org. Source.

The post Inclusions of Google’s New Chrome Updates appeared first on Complete Technology Resources, Inc..

Read More

How to secure your Android phone

How much are you willing to give to retrieve your stolen smartphone? According to Lookout’s Phone Theft in America, half of theft victims are likely to pay $500 to get their phones back, and about one-third will go as far as paying $1,000 to retrieve their device.

The post How to secure your Android phone appeared first on Complete Technology Resources, Inc..

How to secure your Android phone

How much are you willing to give to retrieve your stolen smartphone? According to Lookout’s Phone Theft in America, half of theft victims are likely to pay $500 to get their phones back, and about one-third will go as far as paying $1,000 to retrieve their device. Although we can never know when we will fall victim to theft, there are tools you can use on your Android phone to protect your personal information and keep that $1,000 for yourself.

Set a strong screen lock

The single most important thing any smartphone owner can do is use a strong, unique passcode or swipe pattern to prevent unwanted access to their device. Avoid using obvious codes such as your birthday or pet’s name; instead, use alphanumeric combinations that are much harder to crack.

To enable a screen lock, simply head over to Settings > Security. Select Screen Lock and pick your preferred password lock type and set Automatic Lock after a certain period of time. From then, you will need to enter your passcode or swipe pattern each time you try to access your phone.

Use alternative unlocking methods

Newer Android devices have advanced security tools for an extra layer of protection. These include features like fingerprint authentication, iris scanning, and facial recognition. To see what features can be enabled on your phone, go to Settings > Security.

In addition, if you are a Google Nexus or Pixel user, your device is equipped with a range of Smart Lock options that when activated, keeps your phone unlocked when it’s detected to be on your body or near a trusted Bluetooth device. These settings can also be found under Security.

Enable Find My Device

Google’s Find My Device is a locator service that lets you track or wipe data from a lost or stolen Android phone, tablet, or wearable. All you need to do is add your Google account to your Android device and turn on the location feature to enable the service.

To locate your device remotely, install the Find My Device app or access it via web browser. Once you’re logged in, a dashboard will show an approximate location of your phone and provide you with four options: locate your device, play sound, lock your device (and add a short note), or erase device that permanently deletes all data stored.

Revisit Your App Permissions

Did that photo-editing app you just downloaded really need access to your Contact list? If you sometimes wonder why some apps need so many permissions or why they request to access data unrelated to their purpose, then you are asking the right questions.

Remember to take control of the features that you allow your apps to access, especially from dubious developers who might stealthily steal your information. If you have Marshmallow or later versions of Android, go to Settings > Apps and then select the app. Click on Permissions and revoke all those permissions you’re uncomfortable with.

Encrypt Your Phone

Device encryption protects your data by converting it into a format that prevents unauthorized individuals from accessing it without the key. This is particularly important if someone manages to find a way around your lock screen and pull data from your device.

Android handsets running on Lollipop or higher has full encryption enabled by default. But if you’re using an older device, encryption options can also be found under Security.

It never hurts to take extra steps to make sure your information is protected. Some of these might take time, but trust us, it’s totally worth the extra minutes. If you need more tips to secure your personal or even your company’s files, email, or data, we’ll be happy to help. Security is what we do best, so give us a call today!

Published with permission from TechAdvisory.org. Source.

The post How to secure your Android phone appeared first on Complete Technology Resources, Inc..

Read More

How to turn off intrusive Windows 10 settings

With Cortana following you around -- from spamming helpful suggestions based on what you’re typing to displaying extremely precise and personalized ads based on your online search -- Windows 10 can often feel intrusive. Here are a few tips you can follow to leave Microsoft’s watchful eye behind.

The post How to turn off intrusive Windows 10 settings appeared first on Complete Technology Resources, Inc..

How to turn off intrusive Windows 10 settings

With Cortana following you around -- from spamming helpful suggestions based on what you’re typing to displaying extremely precise and personalized ads based on your online search -- Windows 10 can often feel intrusive. Here are a few tips you can follow to leave Microsoft’s watchful eye behind.

Turn personalized advertising off

For those unaware, Windows 10 assigns each user an ‘advertising ID’ which it uses to personalize your ad experience based on your recent browser history. If you’re someone who is okay with seeing generic ads targeted to you based on demographics rather than your ID, we recommend turning this feature off.

  1. To do so, head into your settings by clicking on the magnifying glass symbol next to the Windows logo, at the bottom left of your screen.
  2. Next, type in Privacy -- click on it, and select General.
  3. Then, slide the option which states ‘let apps use my advertising ID for experience across apps’ to Off.
  4. Lastly, open your web browser and go to this link. Once there, select Off for ‘Personalized ads wherever I use my Microsoft account’ and ‘Personalized ads in this browser.’

This resets your ad ID, allowing you to experience the joys of web surfing without the creepy targeted advertisements.

Disable Cortana

Voice-controlled digital assistants have become big business. Microsoft aims to capitalize on this market with Cortana, an incredibly resourceful, built-in assistant that allows to you quickly set reminders, schedule events and send email, among many other intuitive features. It uses the information it collects similar to how Google's Android-based assistant does it. However, it can become overbearing at times.

  1. To turn it off, click on the Cortana icon in the taskbar, followed by the notebook icon on the left hand side of the pop-up panel.
  2. Click on Settings, this should present you with the first option which says, ‘Cortana can give you suggestions, ideas, reminders, alerts and more’, you can slide that to Off.

Once disabled, the Cortana option disappears and you’re now presented with a search bar which you can use to search for things online or on your desktop.

Stop peer-to-peer file-sharing

With P2P file-sharing enabled, Windows 10 shares downloaded updates to your PC with other Windows 10 users by default. This helps other users update their systems faster, and speeds up your upgrade downloads, as well. However, if you are unhappy with your files being utilized by other users, you can turn it off.

  1. Head over to Settings once again.
  2. Click on ‘Update and Security’, followed by ‘Windows Update’, then ‘Advanced Options’ and finally select ‘Choose how updates are delivered.’
  3. By default, the ‘Updates from more than one place’ is on, followed by two options: distribute updates only to PCs on local network, and shut off P2P updates entirely.
  4. If you want to disable this feature entirely without worrying about specifics, then move the slider to Off.

If you want to share your files with PCs on your in-house network only, leave the the slider in the On position and select the button which says ‘PCs on my local network.’ For more detailed instructions on how to stop P2P updates, click here.

Blunt Microsoft’s Edge

Remember Internet Explorer? Think of Microsoft Edge as the same, just on steroids. The tech giant’s fancy new browser is chock full of features -- such as Cortana Integration and typing prediction -- which may make you uncomfortable, since all the features send data back to Microsoft. To turn off these intrusive functionalities, open Edge and click on the menu icon in the far right corner (three horizontal dots).

Once in, click on ‘View Advanced Settings’. There you have the option to disable Adobe Flash -- which stops those Flash cookies from going anywhere. You’ll also encounter a bunch of settings you might want to disable under the ‘Privacy and Services’ section.

These simple security tips will stop Microsoft from tracking your online movements for good! In case you’re interested in protecting your privacy, don’t hesitate to contact us today for all matters security related.

Published with permission from TechAdvisory.org. Source.

The post How to turn off intrusive Windows 10 settings appeared first on Complete Technology Resources, Inc..

Read More