508-909-5961 [email protected]

Improvements on the new Outlook webmail

Organizing email is an important but time-consuming task. An email system that lets employees spend less time sorting messages and adjusting settings and more time working is an easy way to improve your business. If your company uses Outlook.com, here are some new features that help.

The post Improvements on the new Outlook webmail appeared first on Complete Technology Resources, Inc..

Improvements on the new Outlook webmail

Organizing email is an important but time-consuming task. An email system that lets employees spend less time sorting messages and adjusting settings and more time working is an easy way to improve your business. If your company uses Outlook.com, here are some new features that help.

Easy elimination of unwanted emails

Employees spend an excessive amount of time poring through both important and junk emails. In the redesigned Outlook.com, it takes only three clicks to block unwanted emails, helping you to organize your mailbox better and faster. Simply click on the Sweep function to configure inbox preferences like blocking incoming emails from specific senders or automatically deleting 10-day-old messages.

In case you accidentally delete important messages, you can use the “undelete” function to retrieve them without the assistance of IT staff.

New security features

When you log in to your Outlook account on a public device or on your laptop using public WiFi, Microsoft will send you a one-time password via SMS. Once you’ve logged out of your account, further attempts by intruders to log in to your account in the same public place will be foiled by this additional safety procedure.

Another security feature is the stealth email address features, which allows you to create a temporary email address. This is particularly useful in situations where you have to provide your email to sign up for a service, e.g., eCommerce or file sharing websites, and you’re not sure whether or not these sites are secure. Using your temporary email address, you can filter incoming emails from suspicious senders or delete them if you suspect that they’re spam.

Social media contacts integration

For users whose business connections extend to their social media contacts, this feature lets you easily sync and consolidate Outlook contacts with contacts from Facebook, Twitter, LinkedIn, and Google Plus. Note that you can choose to sync just one platform, e.g., LinkedIn, to ensure that only professional contacts get synced to your Outlook account.

Minimal advertising

If you spend an inordinate amount of time in your email, a busy interface can be distracting. The new Outlook.com reduces the number of intrusive ads on your screen, unlike in Gmail where ads appear right on top of your most recent email. Although there are ads, they are not prominently placed within your mailbox, and you have some control over the ads that do get shown.

Other enhancements

Other minor but useful enhancements include a bigger reply window, HTML and CSS formatting functionality, folders and category labeling features, increased storage capacity via SkyDrive integration, an improved photo gallery viewer, and more. These are just some of the more useful enhancements on Outlook.com, and Microsoft is expected to add even more in the future.

If you need more productivity-enhancing email features, or if you want to make the most of your existing email functions, call us today for tips and recommendations.

Published with permission from TechAdvisory.org. Source.

The post Improvements on the new Outlook webmail appeared first on Complete Technology Resources, Inc..

Read More

Social engineering exploits Facebook

You’ve received a message from one of your Facebook friends. You click on the link not knowing what you’ve gotten yourself into. This describes one of the latest social media adware schemes, which has wreaked havoc on Facebook users worldwide.

What is it?

Little is known about the adware itself or those behind it, but it was uncovered by David Jacoby, senior security researcher at Kaspersky Lab, when he received a Facebook message from one of his friends, only to find out that wasn’t the case.

The post Social engineering exploits Facebook appeared first on Complete Technology Resources, Inc..

Social engineering exploits Facebook

You’ve received a message from one of your Facebook friends. You click on the link not knowing what you’ve gotten yourself into. This describes one of the latest social media adware schemes, which has wreaked havoc on Facebook users worldwide.

What is it?

Little is known about the adware itself or those behind it, but it was uncovered by David Jacoby, senior security researcher at Kaspersky Lab, when he received a Facebook message from one of his friends, only to find out that wasn’t the case.

Basically, the adware uses Facebook Messenger to track your browser activity and pushes you to click on malicious ads or give out personal information.

How does it work?

By clickjacking and hijacking credentials of Facebook users, the adware is able to send messages to people in the victim’s contact list. If you’re one of those people, you’ll receive a phony message from your friend’s compromised Facebook account.

The message includes your friend’s name followed by the word “Video,” a shocked face emoji, and a shortened URL. Once clicked, the URL will redirect you to a Google Doc with a blurred photo taken from your friend’s Facebook page, disguised as a video. If you click on the “video”, you’ll be redirected to one of a number of targeted websites based on your browser, operating system, and location.

For instance, if you use Google Chrome, you’ll be sent to a website that looks exactly like YouTube, complete with the official logo. The hoax website will show you a fake error message to trick you into downloading a malicious Chrome extension.

If you’re on Firefox, you’ll be sent to a site with a false Flash Player update notice and a Windows adware executable; the same goes with OS X except the adware is hidden in a .dmg file.

The goal here is to move your browser through a set of websites so tracking cookies can monitor your activity and display malicious ads or you can be “social engineered” to give up confidential information.

How do you avoid falling victim?

Facebook has rolled out a number of automated systems to stop harmful links and files. What’s more, they will provide you with a free antivirus scan if they suspect that your account has been compromised by adware.

Still, you should be very skeptical about any shortened URL links sent to you by your Facebook friends, no matter how long you’ve been friends.

Due to their low key nature as potential security endpoints, cyber criminals are turning to social media platforms as their new medium of choice. To keep your business safe, you need to stay up-to-date and educate your employees. If you have any other questions about social media and how it can impact your business, just give us a call.

Published with permission from TechAdvisory.org. Source.

The post Social engineering exploits Facebook appeared first on Complete Technology Resources, Inc..

Read More

Reduce your printing costs with these 5 tips

Outdated printers, the lack of a printing workflow, and an over-reliance on hard copies may be contributing to your ballooning printing expenditures. With some creative problem-solving and fresh ideas, you could drastically reduce your printing budget.

The post Reduce your printing costs with these 5 tips appeared first on Complete Technology Resources, Inc..

Reduce your printing costs with these 5 tips

Outdated printers, the lack of a printing workflow, and an over-reliance on hard copies may be contributing to your ballooning printing expenditures. With some creative problem-solving and fresh ideas, you could drastically reduce your printing budget. Start by following these five tips.

Replace outdated printers

Outdated and cheap printers may be functional, but they are putting a huge dent in your IT budget.

Any piece of equipment that is seven years old (or older) requires frequent repairs and causes more trouble than it's worth. Because old printers are no longer under warranty, fixing them is more costly and challenging. It’s also difficult to replace parts for old printers because manufacturers have stopped carrying them for models that have been phased out.

When you replace outdated equipment with newer, multi-functional printers, you’re investing in hardware that will pay for itself with increases in productivity and efficiency.

Avoid purchasing unnecessary supplies

A poorly managed printer environment could result in a stockpile of cartridges, toners, and reams of paper. This happens when, for example, an employee uses a printer that’s about to run out of ink and makes an unnecessary request for a new ink or toner. This is more common than you may think, and definitely more expensive.

In the absence of a dedicated printer manager, you can avoid this situation by automating supply replacement. Assign a point person to proactively place orders when supplies are about to run out, so your company can avoid needless purchases.

Impose strict process workflows

Submitting expense reports, filing reimbursements, and other administrative tasks require a proper document workflow. Without a guideline, employees and administrative staff tend to print an unnecessary amount of documents.

Automate your company’s document-driven processes to reduce or prevent redundant print jobs that result in stacks of abandoned documents. Not only is it wasteful, it’s also a security and privacy concern.

Go paperless

Designing a document management solution that reduces paper consumption is the best way to save money. It may not be possible in every department, but those who can do their jobs without printing should be encouraged to do so by management. Printing lengthy email chains that can be discussed in a meeting is just one example of a wasteful practice that should be avoided.

Reduce IT support calls for printing issues

Calling your company’s IT guys to assist with problems like paper jams, printer Wi-Fi issues, and other concerns reduces employee frustration. You and your IT personnel could avoid dealing with these productivity killers by identifying the problem areas of your print environment. Then, you can work on solutions specific to your office, such as drafting a printing workflow, or getting help from document management experts who can recommend time- and budget-saving solutions.

Having a group of experts manage your IT workflow can make your day-to-day operations more efficient and help you save on printing costs. Our experts will gladly recommend best practices and tips on document management. Call us today.

Published with permission from TechAdvisory.org. Source.

The post Reduce your printing costs with these 5 tips appeared first on Complete Technology Resources, Inc..

Read More

Ransomware targets Android devices

By now, most people know what ransomware is: malicious software that threatens to publish or erase its victims' data unless they pay a ransom. But with the surge in mobile device computing, it was inevitable that ransomware would adapt to find new victims.

The post Ransomware targets Android devices appeared first on Complete Technology Resources, Inc..

Ransomware targets Android devices

By now, most people know what ransomware is: malicious software that threatens to publish or erase its victims' data unless they pay a ransom. But with the surge in mobile device computing, it was inevitable that ransomware would adapt to find new victims. Let’s discuss how it works and what you can do to prevent it.

How does ransomware make it onto your Android device?

Like its desktop equivalent, mobile ransomware needs to be installed on your device before it can do damage. For Android devices, this means mobile apps that hide their true intent. There are two ways to install programs on your mobile device: downloading them from app stores like Google Play and Amazon Appstore, or downloading them directly from websites and email links.

Surprisingly, both come with risks. Unverified sources often advertise free apps that hide malware, and the best of these can occasionally avoid detection and be allowed into monitored app stores.

What does mobile ransomware look like?

Similar to ransomware on personal computers, mobile ransomware holds data stored on your device hostage and demands ransom. For example, in the case of a ransomware that came with the "OK" app, a popular Russian social network platform that was infected earlier this year, a user is prompted to change device settings. There is no option to close the prompt and tapping Accept locks everything down and leaves you with nothing but a ransom note.

How to protect yourself from mobile ransomware

First and foremost, avoid downloading apps directly from websites or third-party app stores. Additionally, make sure you turn on Google’s security system -- Verify Apps -- which scans all the apps about to be installed on your device for potential threats. You can do so by opening your Android's settings, choosing Security, tapping on Verify Apps, and activating ‘Scan device for security threats’.

Second, install antivirus software on your device and keep it up to date.

Third, back up important files from your device to either a USB disk, a computer, or any cloud-based services. This way, you won’t lose your valuable data if you are forced to factory-reset your device.

Last, if ransomware made its way into your device, don’t pay. According to IT security company ESET, mobile ransomware very rarely includes programming to reverse the damage it has done.

Losing any type of data is an enormous inconvenience, but businesses need to be especially careful about careless employees. Data loss could result in lawsuits or regulatory fines, so it’s important that you know how to safeguard your Android against ransomware.

For more in-depth advice on how to protect yourself and your business from this threat, get in touch with our experts today.

Published with permission from TechAdvisory.org. Source.

The post Ransomware targets Android devices appeared first on Complete Technology Resources, Inc..

Read More