508-909-5961 [email protected]

Underutilized Windows 10 tips and tricksAre you using all of Windows 10’s awesome productivity features? From adjusting system and battery performance to silencing notifications, you could be missing out on powerful features and productivity enhancements — check out our four favorites. Night Light This feature lets you reduce the amount of blue light emitted from your screen, which reduces eye […]

The post Underutilized Windows 10 tips and tricks appeared first on Complete Technology Resources, Inc..

Underutilized Windows 10 tips and tricks

Are you using all of Windows 10’s awesome productivity features? From adjusting system and battery performance to silencing notifications, you could be missing out on powerful features and productivity enhancements — check out our four favorites.

Night Light

This feature lets you reduce the amount of blue light emitted from your screen, which reduces eye strain and boosts sleep efficiency. Night Light is disabled by default, so you need to enable it by following these steps:

  • Click the Start Menu
  • Open the Settings app (or press the Windows key + I to quickly open Settings)
  • Select the System icon followed by the Display option in the left-hand pane
  • Set Night light to “On” or “Off”

Taskbar pin

It takes only a few seconds to open a browser and enter a web address or choose a saved page from the bookmarks menu. However, Windows 10 makes the process even quicker with Edge browser’s “Pin this page to the taskbar” feature. This is an essential shortcut for anyone who relies on web-based apps such as email or company intranets.

Pin your open windows

Do you struggle to organize a screen cluttered with open windows? Holding the Windows key and pressing an arrow should solve most of your problems:

  • Windows key + Left – Resize the current window’s width to half the size of the screen and align it to the left
  • Windows key + Right – Resize the current window’s width to half the size of the screen and align it to the right
  • Windows key + Up – Maximize the current window to fit the entire screen
  • Windows key + Down – Downsize the current window

When none of those keys are enough to set you straight, holding the Windows key and pressing the Tab button will show you all the apps you currently have open.

Focus Assist

Notifications are frustratingly distracting. Windows 10’s Focus Assist feature helps you tackle this issue by customizing which contacts and applications can interrupt you during predetermined periods of time. Try it out by:

  • Opening the Settings window
  • Clicking the System icon
  • Selecting Focus Assist from the left-hand pane
  • Adjusting the notifications settings based on your preference

If you wish to disable it and receive all notifications, click “Off.”

These are just a few of our favorites. For more software and productivity recommendations, give our experts a call today.

Published with permission from TechAdvisory.org. Source.

The post Underutilized Windows 10 tips and tricks appeared first on Complete Technology Resources, Inc..

Read More

Improve internet security with these easy tipsIt pays to take extra precautions when surfing the web. We’ve compiled these three easy tips that can amp up your online security.

The post Improve internet security with these easy tips appeared first on Complete Technology Resources, Inc..

Improve internet security with these easy tips

With over three billion internet users around the globe totaling roughly 40% of the population, the internet is rife with opportunities for hackers to steal users’ information. And with technology constantly evolving and the internet growing, it’s not likely to get safer anytime soon. It therefore pays to take extra precautions when surfing the web. We’ve compiled these three easy tips that can amp up your online security.

Tip #1: Use HTTPS

Short for Hypertext Transfer Protocol Secure, HTTPS indicates that a website has an extra layer of security for its users. This layer encrypts data exchanged between a user’s browser and the web server that delivers the data that the user requests. To use a simpler comparison, imagine someone tapping your landline, but instead of getting to listen in on your conversations, they’ll hear people speaking in tongues instead.

In August 2014, Google Chrome, the world’s most popular browser, announced that having HTTPS makes your website rank higher in its search algorithm. And since October 2017, the browser began flagging non-HTTPS websites as not secure whenever users try to fill out something as simple as a contact form on it. In July 2018, Chrome started showing a “not secure” warning on any website that does not implement HTTPS, whether or not users are filling out a form there.

Because of Google’s measures, the security protocol has been widely adopted. Even if your website does not contain or ask for sensitive information, implementing HTTPS on it engenders trust and a sense of security among internet users, while staying left behind security-wise will make web visitors abandon or avoid you sooner or later.

Tip #2: Embrace multifactor authentication (MFA)

Since account credentials can be easily stolen via phishing attacks, username and password combos are no longer enough to keep bad actors at bay. To ensure that the one accessing an account is truly that account’s owner, additional identity authentication steps must be implemented.

These steps can involve the use of the account holder’s device — the one logging in must first verify their phone number, receive a one-time password on their smartphone, then enter that code in the access portal before the validity of the code lapses. Alternatively, MFA may ask for a face, retina, voice, or fingerprint scan for authentication. MFA can be a bit of a hassle for your internal and external users, but a little inconvenience is a small price to pay for immensely effective cybersecurity.

Tip #3: Update browsers and devices

Did you know that dated versions of browsers, operating systems (OSs), and even other software packages can create an easy entry point for hackers? Often, new updates are created specifically to fix security holes. And hackers are ever aware that people can be lazy, saving that update for another day that never seems to come. They’ll often try to take advantage of this, searching for outdated devices to infiltrate while their victims watch YouTube on last year’s version of Firefox.

Yes, installing an update might take 15 minutes of your time. But it can pay dividends in preventing a security breach that could cost you or your business thousands.

Looking for more tips to boost your internet security? Get in touch to find out how we can help.

Published with permission from TechAdvisory.org. Source.

The post Improve internet security with these easy tips appeared first on Complete Technology Resources, Inc..

Read More

Sneaky Android adware apps to watch out forA recent report by Sophos uncovered 15 adware apps in Google Play. These apps run unwanted ads on your device and collect marketing-type data about you. What’s more alarming is that 1.3 million Android users have downloaded at least one of these apps. Here’s a list of the adware apps that have been identified, and […]

The post Sneaky Android adware apps to watch out for appeared first on Complete Technology Resources, Inc..

Sneaky Android adware apps to watch out for

A recent report by Sophos uncovered 15 adware apps in Google Play. These apps run unwanted ads on your device and collect marketing-type data about you. What’s more alarming is that 1.3 million Android users have downloaded at least one of these apps. Here’s a list of the adware apps that have been identified, and how you can avoid downloading such malicious apps in the future.

The adware apps that Sophos identified are disguised as system or utility apps. They include image editors, QR code readers, and even an app for erasing confidential data from your device. Their names even resemble those of legitimate system apps, chosen for the express purpose of tricking Android users into installing them onto their devices. These apps are:

  • Flash On Calls & Messages
  • Read QR Code
  • Image Magic
  • Generate Elves
  • Savexpense
  • QR Artifact
  • Find Your Phone
  • Scavenger — speed guard
  • Auto Cut Out Pro
  • Background Cut Out Pro
  • Photo Background Editor 2019
  • ImageProcessing for Android
  • Background Cut Out New
  • Auto Cut Out
  • Auto Cut Out 2019

These apps are also hard to detect because they display two different sets of names and icons — one on your device’s Settings app and another when they’re actually running. This makes it more difficult to identify and uninstall the adware apps on your device, which is exactly what the developers want.

If you install one of these apps, it will appear on your app tray, but launching it triggers a message that the app is incompatible with your device. You will then be redirected to the Google Maps page on Google Play. When you return to your app tray, you’ll find that the app’s icon has disappeared.

If there’s no icon then, how can you uninstall the app? Andrew Brandt, a researcher at Sophos, says deleting adware apps will require a little bit of digging on your part, as there’s no icon that you can click and drag to the top of the screen and into the trash.

First, identify the adware apps. Go to Settings > Apps & Notifications. This will direct you to a page that displays the most recently opened apps on your device. Next, check if any of those apps have the generic greenish-blue Android icon and/or have generic-sounding names such as Back Up, Update, etc. If they do, they’re likely adware. Finally, tap the icon and then tap Force Stop > Uninstall. Note that a legit system or utility app will have a “Disable” instead of an “Uninstall” option.

Sophos warns that there may be similar apps that are yet to be identified and more are likely to be made available on Google Play in the future. The key takeaway here is to be mindful of what you download, even if it’s from Google Play or other official platforms. Check out the reviews — the reported adware apps got poor reviews from users who complained about getting a lot of pop-up ads. Remember that malware can be hiding in even the most innocuous apps, and downloading them gives bad actors the chance to access any confidential information on your device.

For advice on how to keep your Android devices safe from adware and other malicious malware, give us a call today.

Published with permission from TechAdvisory.org. Source.

The post Sneaky Android adware apps to watch out for appeared first on Complete Technology Resources, Inc..

Read More

Difficulties when backing up a virtual serverMany small businesses have embraced data virtualization over the past few years. And as with any kind of business data, virtualized data needs to be protected from disaster, cybercrime, and human error and, therefore, needs backup. When backing up your virtualized data, there are some most common difficulties you need to prepare for. Data virtualization […]

The post Difficulties when backing up a virtual server appeared first on Complete Technology Resources, Inc..

Difficulties when backing up a virtual server

Many small businesses have embraced data virtualization over the past few years. And as with any kind of business data, virtualized data needs to be protected from disaster, cybercrime, and human error and, therefore, needs backup. When backing up your virtualized data, there are some most common difficulties you need to prepare for.

Data virtualization involves taking all enterprise data stored in different local computers or systems, and moving them to a virtual server for centralized management and for on-demand delivery to business users. This provides multiple long-term benefits, including integration of various data types, centralized governance and security, minimized data replication, reduced movement of data across different locations, and real-time data delivery to consumers. But data backup can be a bit tougher with virtualized data, because of these hurdles.

Overwhelming rapid file growth

Before, businesses had to worry about managing servers containing millions of files. Now, they have to manage billions of files. For this reason, it has become almost impossible to back up servers of such immensity through traditional means using legacy systems.

You should take steps to ensure that your backup solution can handle immense volumes of data. While a virtual solution may be working now, it is a good idea to check that your IT partner can easily scale to handle all your data.

Rapid server growth

The advent of virtualization has led to the development of an “app mentality” among many users and business owners. There’s an application for every function, with many being delivered through a virtual machine.

For businesses, this means an increasing number of virtual servers needed to host your virtual solutions. It is crucial to protect these virtual machines and the servers that host them because they are quickly becoming the most essential tools for your business. If your business is growing, your current virtual machines are likely backed up, but you will need to ensure that these are also backed up as you add more servers.

Very high user expectations

Needless to say, users have high expectations caused by misunderstandings about technology, and virtualization in particular. Users expect their IT partners to have emerging issues resolved in an instant or as quickly as possible.

While backup speeds are increasing year on year, it still takes time to copy data files from backup servers, especially when there are over a billion files to be copied. It is worthwhile talking with your IT partner about backup and recovery times to know what you can expect when you need to recover virtual systems.

If you have questions about data virtualization or virtualization in general, don’t hesitate to contact us.

Published with permission from TechAdvisory.org. Source.

The post Difficulties when backing up a virtual server appeared first on Complete Technology Resources, Inc..

Read More