508-909-5961 [email protected]

Disaster recovery during hurricane seasonThere’s no telling when natural disasters will occur. When they do, certain regions in the country often bear the brunt of their impact, like when Hurricanes Harvey and Irma hit certain states in 2017. With a well-designed disaster recovery (DR) plan, your business can be spared from total devastation. Determine recovery hierarchy Certain parts of […]

The post Disaster recovery during hurricane season appeared first on Complete Technology Resources, Inc..

Disaster recovery during hurricane season

There’s no telling when natural disasters will occur. When they do, certain regions in the country often bear the brunt of their impact, like when Hurricanes Harvey and Irma hit certain states in 2017. With a well-designed disaster recovery (DR) plan, your business can be spared from total devastation.

Determine recovery hierarchy

Certain parts of your IT are more mission-critical than others. Ask yourself which systems or data must be recovered in minutes, hours, or days to get your business back to running efficiently.

For example, you may find that recovering sensitive customer information and eCommerce systems take priority over recovering your email server. Whatever the case may be, prioritizing your systems ensures that the right ones are recovered quickly after a disaster.

Pay attention to location

First and foremost, your backup site should be in a hurricane-free zone. Ideally, your off-site facility should be located at least 100 miles away from your main location. If this isn’t possible, make sure it is built to withstand wind speeds of 160 mph (as fast as Category 5 storms), and is supported by backup generators and uninterruptible power supplies.

You should also request an upper floor installation or, at the very least, keep critical IT equipment 18 inches off the ground to prevent water damage.

Use image-based backups

Unlike fragile tape backups, image-based backups take “snapshots” of your systems, creating a copy of the OS, software, and data stored in it. From there, you can easily boot the virtual image on any device, allowing you to back up and restore critical business systems in seconds.

Take advantage of the cloud

The cloud allows you to host applications and store data in high-availability, geo-redundant servers. This means your backups can be accessed via the internet, allowing authorized users to access critical files from any device. Expert technicians will also watch over and secure your backups, allowing you to enjoy the benefits of enterprise-level backup facilities and IT support.

Back up your data frequently

Back up your data often, especially during disaster season. If your latest backups were created on the 15th of September and the next storm makes landfall on the 28th, you could lose nearly two weeks of data.

Get in the habit of replicating your files at the end of each day, which should be easy if you’ve opted for image-based backups.

Test your DR plan

After setting up your backups, check whether they are restoring your files accurately and on time. Your employees should be drilled on the recovery procedures and their responsibilities during and after disaster strikes. Your DR team should also be trained on how to failover to the backup site before the storm hits. Finally, providers, contractors, and customers need to be notified about how the hurricane will affect your operations.

As cell towers and internet connections may be affected during this time, make sure your company forums are online and have your employees register with the Red Cross Safe and Well website so you can check their statuses.

It’s nearly impossible to experience little-to-no disruptions during disasters like Harvey or Irma, but with the right support, you can minimize downtime. If you’re concerned about any natural disasters putting you out of business, call us today. We offer comprehensive business continuity services that every company should have.

Published with permission from TechAdvisory.org. Source.

The post Disaster recovery during hurricane season appeared first on Complete Technology Resources, Inc..

Read More

Turn off Windows 10’s intrusive settingsThe popularity of social media has allowed advertisers to target their consumers more efficiently. But did you know that your operating system might also be helping agencies post personalized ads according to your search history? Learn how to fix some of Windows 10’s faulty privacy settings. Turn personalized advertising off For those unaware, Windows 10 […]

The post Turn off Windows 10’s intrusive settings appeared first on Complete Technology Resources, Inc..

Turn off Windows 10’s intrusive settings

The popularity of social media has allowed advertisers to target their consumers more efficiently. But did you know that your operating system might also be helping agencies post personalized ads according to your search history? Learn how to fix some of Windows 10’s faulty privacy settings.

Turn personalized advertising off

For those unaware, Windows 10 assigns each user an “advertising ID” that it uses to personalize your ad experience based on your recent browsing history. If you’re okay with seeing generic ads targeted to you based on demographics rather than your ID, we recommend turning this feature off. Here's how to do it:

  1. Click on the magnifying glass symbol next to the Windows logo, at the bottom left of your screen.
  2. Next, type in “Privacy” — click on Privacy Settings, and select General.
  3. Turn off the option that states “Let apps use my advertising ID for experience across apps”.
  4. Lastly, open your web browser and go to this link. Once there, turn off the “Personalized ads wherever I use my Microsoft account” and “Personalized ads in this browser” options.

This resets your ad ID, letting you surf the web without the targeted advertisements.

Disable Cortana

Voice-controlled digital assistants have become big business. Microsoft aims to capitalize on this market with Cortana, an incredibly resourceful built-in assistant that allows to you quickly set reminders, schedule events and send email, among many other intuitive features. It uses the information it collects similar to how Google’s Android-based assistant does it. However, it can become overbearing at times.

  1. To turn it off, click on the Cortana icon on the taskbar, followed by the notebook icon on the left-hand side of the pop-up panel.
  2. Click on Settings, which should present you with the option that says, “Cortana can give you suggestions, ideas, reminders, alerts and more”; you can actually just click the On/Off toggle, too.

Once disabled, the Cortana option disappears and you’re now presented with a search bar, which you can use to search for things online or on your desktop.

Stop peer-to-peer file sharing

With P2P file sharing enabled, Windows 10 shares downloaded updates to your PC with other Windows 10 users by default. This helps other users update their systems faster, and speeds up your upgrade downloads, as well. However, if you are unhappy with your files being utilized by other users, you can turn it off.

  1. Head over to Settings once again.
  2. Click on Update and Security > Windows Update > Advanced Options > Choose how updates are delivered.
  3. By default, the option “Updates from more than one place” is on, followed by two options: “Distribute updates only to PCs on local network,” and “Shut off P2P updates entirely”.
  4. If you want to disable this feature entirely without worrying about specifics, then move the toggle to Off.

If you want to share your files with PCs on your in-house network only, leave this option on and select the option that says “PCs on my local network.” For more detailed instructions on how to stop P2P updates, click here.

Blunt Microsoft’s Edge

Microsoft Edge is chock-full of features — such as Cortana Integration and typing prediction — which may make you uncomfortable, since all the features send data back to Microsoft. To turn off these intrusive functionalities, open Edge and click on the menu icon in the far right corner (three dots).

Once in, click on View Advanced Settings. There you have the option to disable Adobe Flash — which stops those Flash cookies from going anywhere. You’ll also encounter a bunch of settings you might want to disable under the “Privacy and Services” section.

These simple security tips will stop Microsoft from tracking your online activities for good! Don't hesitate to contact us today for all matters security-related.

Published with permission from TechAdvisory.org. Source.

The post Turn off Windows 10’s intrusive settings appeared first on Complete Technology Resources, Inc..

Read More

IT terms you need to knowJargon can be intimidating if you’re dealing with IT issues and you’re anything but techy. Running an anti-malware scan can generate auto pop-ups that leave you clueless with IT terms that sound Greek. Learning the basic concepts listed here will help you move on and not be surprised the next time that happens. Malware For […]

The post IT terms you need to know appeared first on Complete Technology Resources, Inc..

IT terms you need to know

Jargon can be intimidating if you’re dealing with IT issues and you’re anything but techy. Running an anti-malware scan can generate auto pop-ups that leave you clueless with IT terms that sound Greek. Learning the basic concepts listed here will help you move on and not be surprised the next time that happens.

Malware

For a long time, the phrase “computer virus” was misappropriated as a term to define every type of attack that intended to harm or hurt your computers and networks. A virus is actually a specific type of attack, or malware. Whereas a virus is designed to replicate itself, any software created for the purpose of destroying or unfairly accessing networks and data should be referred to as malware.

Ransomware

Don’t let all the other words ending in “ware” confuse you; they are all just subcategories of malware. Currently, one of the most popular of these is “ransomware,” which is malware that encrypts valuable data until a ransom is paid for its return.

Intrusion protection system(IPS)

There are several ways to safeguard your network from malware, but IPSs are quickly becoming one of the non-negotiables. IPSs sit inside of your company’s firewall and look for suspicious and malicious activity that can be halted before it can exploit or take advantage of a known vulnerability.

Social engineering

Not all types of malware rely solely on fancy computer programming. Experts agree that the majority of attacks require some form of what is called “social engineering” to be successful. Social engineering is the act of tricking people, rather than computers, into revealing sensitive or guarded information. Complicated software is totally unnecessary if you can just convince potential victims that you’re a security professional who needs their password to secure their account.

Phishing

Despite often relying on face-to-face interactions, social engineering does occasionally employ more technical methods. Phishing is the act of creating an application or website that impersonates a trustworthy and often well-known business in an attempt to elicit confidential information. Just because you received an email that says it’s from the IRS doesn’t mean it should be taken at face value — always verify the source of any service requesting your sensitive data.

Antivirus

Antivirus software is often misunderstood as a way to comprehensively secure your computers and workstations. These applications are just one piece of the cybersecurity puzzle and can only scan the drives on which they are installed for signs of well-known malware variants.

Zero-day attacks

Malware is most dangerous when it has been released but not yet discovered by cybersecurity experts. When a vulnerability is found within a piece of software, vendors will release an update to amend the gap in security. However, if cyberattackers release a piece of malware that has never been seen before, and if that malware exploits one of these holes before the vulnerability is addressed, it is called a zero-day attack.

Patch

When software developers discover a security vulnerability in their programming, they usually release a small file to update and “patch” this gap. Patches are essential to keeping your network secure from the vultures lurking on the internet. By checking for and installing patches as often as possible, you keep your software protected from the latest malware.

Redundant data

When antivirus software, patches, and intrusion detection fail to keep your information secure, there’s only one thing that will: quarantined off-site storage. Duplicating your data offline and storing it somewhere other than your business’s workspace ensures that if there is a malware infection, you’re equipped with backups.
We aren’t just creating a glossary of cybersecurity terms; every day, we’re writing a new chapter to the history of this ever-evolving industry. And no matter what you might think, we are available to impart that knowledge on anyone who comes knocking. Get in touch with us today and find out just how we can help you with your IT woes.

Published with permission from TechAdvisory.org. Source.

The post IT terms you need to know appeared first on Complete Technology Resources, Inc..

Read More

How to make your Android apps more organizedFinding it hard to find the app you want on your Android device? If so, it’s time to organize your apps into folders. Here’s how. Creating and naming folders On most devices, when you install a new app, the icon will be automatically added to your home screen, or to a screen where there is […]

The post How to make your Android apps more organized appeared first on Complete Technology Resources, Inc..

How to make your Android apps more organized

Finding it hard to find the app you want on your Android device? If so, it’s time to organize your apps into folders. Here’s how.

Creating and naming folders

On most devices, when you install a new app, the icon will be automatically added to your home screen, or to a screen where there is space. While this is useful, it can be a bit of a chore to find a specific app if you have dozens installed on your device.

The easiest solution is to group icons together into a folder. This just takes three steps:

  1. Long-press an app you want to move into a folder (i.e., tap the app for a few seconds until you enter edit mode).
  2. Drag it over another app you want to group it with, and let go. You should see both of the icons appear inside a box.
  3. Tap Enter folder name and type the label for your folder.

If you are going to use different folders, it is a good idea to pick names related to the apps they contain. For example, if you put all of your email apps in one folder, call the folder “Email.” This will make your apps easier to find.

Adding/Removing apps from folders

At the bottom of the box, you’ll see the “Add Apps” option. Press it, then tick the app or apps you want to include in your folder. Once you’ve made your pick, tap Add at the top-right corner of your screen.

You can also add apps to your folder when you’re on your home screen. For every app you want to move, just long-press it, then drag and drop it into the folder of your choice.

Lastly, to remove apps from folders, open the folder where the app is, long-press the app you want to take out, then press the “Remove from home” option.

Moving folders

You can move a folder’s location the same way you do so with an app: Tap and hold on the folder until the screen changes slightly and drag it to where you would like it to be. On newer versions of Android, the apps should all move to make room for the folder.

Deleting folders

Finally, you can delete a folder by either dragging all of the apps out of the folder, or pressing and holding on the folder until the screen changes and dragging it up to Remove. This will remove the folder and all the stored app icons, but it won’t delete the apps.

If you have any questions about using an Android device, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

The post How to make your Android apps more organized appeared first on Complete Technology Resources, Inc..

Read More