508-909-5961 [email protected]

Expect better accessibility in Windows 10

If you feel like Windows 10 should improve its accessibility features, you’re in luck. Microsoft is introducing major upgrades on its OS’s display and audio features with significant tweaks on its Ease of Access, Narrator, and related settings.

Better Ease of Access settings

Some users rarely tinker with their computer’s accessibility settings because they’re difficult to locate and adjust.

The post Expect better accessibility in Windows 10 appeared first on Complete Technology Resources, Inc..

Expect better accessibility in Windows 10

If you feel like Windows 10 should improve its accessibility features, you’re in luck. Microsoft is introducing major upgrades on its OS’s display and audio features with significant tweaks on its Ease of Access, Narrator, and related settings.

Better Ease of Access settings

Some users rarely tinker with their computer’s accessibility settings because they’re difficult to locate and adjust. Luckily, in the upcoming Windows 10, this won’t be the case. Microsoft will soon launch Ease of Access settings that’s easier to discover, learn, and use. The enhancements are categorized into Vision, Hearing, and Interaction (speech and eye control) groups.

Those who want bigger characters can adjust settings under “Make everything bigger,” which lets you enlarge apps and text. You can also “Make everything brighter” by increasing the brightness of your built-in display, and “Simplify and personalize Windows” by turning on or off animations, transparency, and automatically hiding scrollbars in Windows on the Display page. You can also ask Cortana to find a specific setting for quicker access.

Narrator enhancements

Narrator is Windows 10’s screen-reading app that reads text on a PC screen and ‘narrates’ to users their notifications, calendar reminders, and other events. In the latest update, Narrator’s audio performance will provide faster, more responsive, and more accurate narration.

Previously, it reads bolded, italicized, or underlined statements by using statements like “start/end bold.” But in the new version, the narrator will change reading pitch, speed, and tone to emphasize certain texts.

Other improvements include a capability to run on Safe Mode and an enhanced Microsoft Edge browsing, which now announces various processes such as when users are opening or closing tabs, or loading or refreshing pages.

Eye Control adjustments

Windows 10’s eye control feature lets users control the mouse, type using an on-screen keyboard, and use text-to-speech with eye-control technology found in eye-tracking devices.

Soon to be introduced in Windows 10 is the capability for users to scroll and click directly from left to right, and quickly access Windows Start, Timeline, and other common tasks. And with the ability to pause eye control, users can hide the launchpad to enjoy undisrupted reading or streaming.

Other upcoming upgrades

Microsoft Learning Tools (advanced tools to enhance reading and writing skills) will soon include more intuitive text suggestions when using a keyboard, and language support for touch keyboards. Microsoft will also continue to work on improving its assistive technology partnerships.

Microsoft listened to users’ feedback and made several improvements in its accessibility features and apps so that people with poor vision, hearing loss, limited dexterity, and other disabilities will have a much better experience. If you need further help with Windows 10 features, don’t hesitate to get in touch with us.

Published with permission from TechAdvisory.org. Source.

The post Expect better accessibility in Windows 10 appeared first on Complete Technology Resources, Inc..

Read More

Phishing hits businesses at tax time

Phishing schemes abound every season, and tax season is no exception. It's an important time of year in the corporate world and cybercriminals are looking to take advantage of it, which is why your business must ensure that your confidential data is kept under lock and key.

The post Phishing hits businesses at tax time appeared first on Complete Technology Resources, Inc..

Phishing hits businesses at tax time

Phishing schemes abound every season, and tax season is no exception. It's an important time of year in the corporate world and cybercriminals are looking to take advantage of it, which is why your business must ensure that your confidential data is kept under lock and key.

Phishing baits to watch out for

Phishing attacks often consist of fabricated or compromised emails sent to finance/payroll or human resources employees that are made to look like they're from an executive in your company. The message might contain a request to forward employee records, including their W-2 forms, but that’s not all...

Another common scheme, which doesn’t only happen during tax season, involves getting a call from a person declaring to be an IRS employee. And no, caller IDs won’t save you because they can forge that, too. The phisher will inform you that you owe them cash from back taxes and they will threaten legal action if you don’t pay via credit card at that instant.

Always remember, the IRS will never contact you on the phone to let you know that you owe them money. And they certainly won’t threaten you or demand payment over the phone. If they really need to notify you of such matters, they’ll use the postal service and will give you a chance to discuss payment terms.

Standard protection protocols

Don’t worry, the usual security measures against these phishing scams are pretty easy to integrate into your business. Begin by developing a policy that bans the request of private details through email. If an employee ever requires such info, they should get in touch with the person directly, follow your established protocols for the transfer of sensitive information, and minimize the number of people involved in the transaction.

Taking security a step further

Data loss prevention (DLP) systems are also valuable weapons against these types of phishing attacks. They evaluate traffic going in and out of your company, such as web usage, emails and instant messages, and virtually anything sent on your network. DLP systems can filter out private details, including Social Security numbers, and stop them from being sent out.

But beware, DLP systems come with a minor drawback, as they can also block legitimate traffic, like when your accounting department sends tax info to your CPA. Fortunately, an MSP like us can properly segregate the good and the bad traffic to avoid confusing and/or frustrating your employees.

Phishing schemes may be a normal occurrence during tax season, but that doesn’t mean you can’t do anything about it. Don’t let the vulnerabilities in your business, particularly the human element, fall prey to cybercriminals. Send us a message right away and we’ll conduct an assessment of the security of your business, as well as design a risk management plan to help counter future complications.

Published with permission from TechAdvisory.org. Source.

The post Phishing hits businesses at tax time appeared first on Complete Technology Resources, Inc..

Read More

Phishing hits businesses at tax time

Phishing schemes abound every season, and tax season is no exception. It's an important time of year in the corporate world and cybercriminals are looking to take advantage of it, which is why your business must ensure that your confidential data is kept under lock and key.

The post Phishing hits businesses at tax time appeared first on Complete Technology Resources, Inc..

Phishing hits businesses at tax time

Phishing schemes abound every season, and tax season is no exception. It's an important time of year in the corporate world and cybercriminals are looking to take advantage of it, which is why your business must ensure that your confidential data is kept under lock and key.

Phishing baits to watch out for

Phishing attacks often consist of fabricated or compromised emails sent to finance/payroll or human resources employees that are made to look like they're from an executive in your company. The message might contain a request to forward employee records, including their W-2 forms, but that’s not all...

Another common scheme, which doesn’t only happen during tax season, involves getting a call from a person declaring to be an IRS employee. And no, caller IDs won’t save you because they can forge that, too. The phisher will inform you that you owe them cash from back taxes and they will threaten legal action if you don’t pay via credit card at that instant.

Always remember, the IRS will never contact you on the phone to let you know that you owe them money. And they certainly won’t threaten you or demand payment over the phone. If they really need to notify you of such matters, they’ll use the postal service and will give you a chance to discuss payment terms.

Standard protection protocols

Don’t worry, the usual security measures against these phishing scams are pretty easy to integrate into your business. Begin by developing a policy that bans the request of private details through email. If an employee ever requires such info, they should get in touch with the person directly, follow your established protocols for the transfer of sensitive information, and minimize the number of people involved in the transaction.

Taking security a step further

Data loss prevention (DLP) systems are also valuable weapons against these types of phishing attacks. They evaluate traffic going in and out of your company, such as web usage, emails and instant messages, and virtually anything sent on your network. DLP systems can filter out private details, including Social Security numbers, and stop them from being sent out.

But beware, DLP systems come with a minor drawback, as they can also block legitimate traffic, like when your accounting department sends tax info to your CPA. Fortunately, an MSP like us can properly segregate the good and the bad traffic to avoid confusing and/or frustrating your employees.

Phishing schemes may be a normal occurrence during tax season, but that doesn’t mean you can’t do anything about it. Don’t let the vulnerabilities in your business, particularly the human element, fall prey to cybercriminals. Send us a message right away and we’ll conduct an assessment of the security of your business, as well as design a risk management plan to help counter future complications.

Published with permission from TechAdvisory.org. Source.

The post Phishing hits businesses at tax time appeared first on Complete Technology Resources, Inc..

Read More

iOS 11 controls to protect your data

Gathering data such as user location is crucial for companies like Apple to provide personalized experiences through their mobile apps. Understandably, many users are not happy about this minor invasion of privacy, so here’s a guide for how to set privacy controls on your iOS 11 device.

The post iOS 11 controls to protect your data appeared first on Complete Technology Resources, Inc..

iOS 11 controls to protect your data

Gathering data such as user location is crucial for companies like Apple to provide personalized experiences through their mobile apps. Understandably, many users are not happy about this minor invasion of privacy, so here’s a guide for how to set privacy controls on your iOS 11 device.

Location Services controls

Apple and other third-party apps and websites gather user location data to make Location Services work better. Apple Maps, Google Maps, and other mapping apps need location data to make recommendations, notify friends of your whereabouts, and more. But some users might not like every app on their phone having full access to their precise location.

To limit your phone’s location-data gathering, follow these steps:

  • Go to Settings > Privacy > Location Services (lists all the apps that obtain location info on your device)
  • Review the location access privilege of each app:
    • While Using - the app obtains location data only when it’s in use
    • Always - the app obtains data whether or not it’s in use, as in the case of Google Maps and the Weather app
    • Never - for apps that aren’t set up to obtain location data
  • Uncheck the apps set to Always that you don’t want to have full-time access to your location info
  • Deactivate access by swiping the button from right to left

Location sharing and device controls

Share My Location lets your contacts see your location via apps like Messages and Find My Friends, as well as location-based features like Siri and the Home apps. It’s often convenient to leave this activated, but users can deactivate it by swiping the button from right to left.

You can also share your location from other Apple devices connected to your Apple ID account. For example, if you own an iPhone and an iPad, you can share your location information from your iPad using your iPhone.

Here’s how to do it:

  • Go to Settings > Privacy > Location Services > Share My Location
  • On the Share My Location page, tap From and choose the device from which you wish to share your location. From this page, you can also delete devices you no longer use. Just swipe the device name and tap Delete

Application-based privacy

You can also limit third-party apps from accessing your iPhone hardware and apps. For instance, if you don’t want Facebook Messenger, WhatsApp or any other app to have access to your contacts, here’s what you need to do:

  • Go to Settings > Privacy
  • Go to the individual app (e.g., Contacts)
  • Deactivate access to an app (e.g., Facebook Messenger) by swiping the button from right to left

System Services

You can also adjust your iPhone or iPad’s location-data access on a system-wide basis. There is an option to allow your device to remember the places significant to you, which is aimed at improving location-based services in Maps, Photos, and other apps that need location data.

How to do it:

  • Go to Settings > Privacy > Location Services > System Services
  • Activate or deactivate individual system-wide settings (e.g., Find My iPhone, Sharing Time Zone, Significant Location, etc.)

Given the large number of apps you use on a daily basis, the amount of data you’re sharing with third-party websites and apps could be alarmingly high. If you need expert help ensuring your business’s Apple devices are not unnecessarily sharing data, call our hotline today.

Published with permission from TechAdvisory.org. Source.

The post iOS 11 controls to protect your data appeared first on Complete Technology Resources, Inc..

Read More