508-909-5961 [email protected]

Take better notes with Microsoft’s OneNote

Microsoft Word, PowerPoint and Excel form the foundation of most Office experiences. But there’s another application that doesn’t get its fair share of attention: OneNote. It’s severely underutilized considering how helpful it is, so we’re going to explain some of the basics.

The post Take better notes with Microsoft’s OneNote appeared first on Complete Technology Resources, Inc..

Take better notes with Microsoft’s OneNote

Microsoft Word, PowerPoint and Excel form the foundation of most Office experiences. But there’s another application that doesn’t get its fair share of attention: OneNote. It’s severely underutilized considering how helpful it is, so we’re going to explain some of the basics.

OneNote is a digital notebook

Despite the visual similarities, the thing that sets OneNote apart from Word is the way it stores and displays saved information. In OneNote, one window displays all your Notebooks, which can contain several pages and separate documents.

To create a Notebook, click File and then New. From there, you’ll be given the option to create a new Notebook, which can be saved locally to OneDrive or to SharePoint.

A Notebook will help you organize several types of information in one space, so let’s imagine we’ve named a SharePoint Notebook “New Product Ideas” and clicked Create New.

Next, you’ll be looking at a blank screen with “New Product Ideas” in the upper left-hand corner. To get the most out of OneNote, we need to start organizing our Notebook.

Separate your Notebook into Sections

Every Notebook is organized into Sections, similar to what dividers do in a physical notebook. For example, our New Product Ideas Notebook might be divided into Sections based on things like design, price and materials.

Sections are shown as color-coded tabs along the top of the screen, next to the name of your Notebook. You simply click the ‘+’ button to create a new section.

Start filling your Sections with useful Pages

Up until this point, OneNote seems like little more than a Word document with improved organization. But Pages in OneNote are built so that different types of media can be dropped into your pages with the click of a button.

So let’s say you’ve bookmarked a number of websites with reference images you want to add to your Design Section. Open up Design and select Add New Page on the right-hand side of the screen. Right-click it and name the page, and in our example this could be Ideas from online.

One way to insert the images from your bookmarked webpages is to save them to your computer and then drag each icon onto your OneNote Page where the image will automatically appear.

However, with Microsoft’s OneNote Web Clipper this can be done much more easily. After installing the browser extension, open it and select what you want to save from the web page with your cursor. The Web Clipper will ask which OneNote Page you want to save the selection to and it will automatically be added.

Start experimenting!

Now that you understand how to organize your information, you can experiment with linking Pages from different notebooks, adding category tags to Pages, and inserting online videos into your notes.

If you’re worried about a Notebook becoming overly complicated, don’t worry. Above the Pages pane is a search bar that you can use to find keywords from Notebook titles, Section titles and Pages content.

You could spend an entire year learning the ins and outs of every Microsoft Office application, but a faster way would be to let us help you cut through the clutter with practical recommendations and assistance. Call us today!

Published with permission from TechAdvisory.org. Source.

The post Take better notes with Microsoft’s OneNote appeared first on Complete Technology Resources, Inc..

Read More

Microsoft released security updates for all versions of Windows

Windows is the most widely used operating system in the world, and for this reason it is also the most frequently targeted platform for hackers. In an attempt to shut down cyber criminals before they can exploit vulnerabilities, Microsoft recently rolled out a new security patch that fixes several known bugs for all versions of Windows.

The post Microsoft released security updates for all versions of Windows appeared first on Complete Technology Resources, Inc..

Microsoft released security updates for all versions of Windows

Windows is the most widely used operating system in the world, and for this reason it is also the most frequently targeted platform for hackers. In an attempt to shut down cyber criminals before they can exploit vulnerabilities, Microsoft recently rolled out a new security patch that fixes several known bugs for all versions of Windows. Read on to find out more about the update.

Windows Search

Microsoft discovered a flaw that hackers could remotely exploit to take full control over an affected computer. The hacker could then install programs, view, change or delete data, and create new accounts with full user rights. The August security updates address the vulnerability by fixing how your computer's memory interacts with Windows Search objects.

Windows Hyper-V

Another critical vulnerability is tied to Windows Hyper-V, a virtualization program. This flaw can be exploited when a server fails to properly verify an authenticated user from a virtual desktop.

For example, cyber criminals could exploit the vulnerability by running a malicious application on a guest operating system and cause the server to malfunction. The latest patch plugs the hole by correcting how Hyper-V validates guest operating system user input.

Microsoft Edge

Microsoft security specialists revealed that the Edge browser is exposed to a remote memory-corruption vulnerability. Hackers can exploit this by luring an unsuspecting user to open a fake website that contains malicious programs. The new security update addresses the issue by modifying how Microsoft Edge handles objects in memory.

These are just a few examples of the critical vulnerabilities addressed in the August updates. In total, Microsoft patched 48 vulnerabilities in six of its main product categories, including Windows, Internet Explorer, Edge, SharePoint, Adobe Flash Player, and SQL Server. If you're interested in all the security updates, check out Microsoft's official Security Update Guide.

As a Windows user, you’re probably used to seeing pop-up messages that implore you to install a new Windows update. Take heed: These patches and updates cost you nothing and can be installed in a matter of minutes. All you need to do is give your consent with a couple of mouse clicks, so there really is no excuse for not updating.

It’s important to update to the latest Windows version to ensure your computer and data are safe from security threats. If you have any questions about Windows updates or need help scheduling them, get in touch with our experts today.

Published with permission from TechAdvisory.org. Source.

The post Microsoft released security updates for all versions of Windows appeared first on Complete Technology Resources, Inc..

Read More

Beware of a new Locky-type ransomware

Disguising itself as an invoice proved to be an effective approach for the original Locky ransomware, which infected millions of users in 2016. Although it was mostly defeated, hackers are currently using a similar approach to spreading a new type of malware.

The post Beware of a new Locky-type ransomware appeared first on Complete Technology Resources, Inc..

Beware of a new Locky-type ransomware

Disguising itself as an invoice proved to be an effective approach for the original Locky ransomware, which infected millions of users in 2016. Although it was mostly defeated, hackers are currently using a similar approach to spreading a new type of malware. In 2017, a new Locky ransomware is poised to duplicate the success of its predecessor.

Quick facts

According to a threat intelligence report, the email-based ransomware attacks started on August 9 and were detected through 62,000 phishing emails in 133 countries in just three days. It also revealed that 11,625 IP addresses were used to carry out the attacks, with the IP range owners consisting mostly of internet service providers and telecom companies.

How it works

The malicious email contains an attachment named “E 2017-08-09 (580).vbs” and just one line of text. Like the original Locky authors, attackers responsible for the new variant deploy social engineering tactics to scam recipients into opening the attached .doc, zip, pdf, .jpg or tiff file, which installs the ransomware into their systems.

When an unsuspecting user downloads the file, the macros run a file that provides the encryption Trojan with an entry point into the system. The Trojan then encrypts the infected computer’s files.

Once encryption is completed, the user receives instructions to download the Tor browser so they can access the "dark web" for details on how to pay the ransom. To retrieve their encrypted files, users will be asked to pay from 0.5-1 Bitcoin.

What you need to do

This ransomware variant builds on the strengths of previous Trojans. In fact, the original Locky strain made it easy for cyber criminals to develop a formidable ransomware that could evade existing cyber security solutions. This is why adopting a "deny all" security stance, whereby all files are considered unsafe until proven otherwise, is the best way to avoid infection.

Here are other tips to avoid infection:

  • Don’t open unsolicited attachments in suspicious emails. Alert your IT staff, and most importantly disallow macros in Microsoft Office unless they’ve been verified by your IT team.
  • Performing regular backups guarantees you never have to pay cyber criminals a ransom. If all other security measures fail, you can always rely on your backups, which protect your business not just from cyber crime-related disasters, but also from natural and other unforeseen system failures.
  • Train your staff to identify online scams like phishing. This and other similar ransomware strains take advantage of users’ lack of cyber security training.
  • Update your operating systems as soon as updates become available to reduce, or eliminate, the chances of your system’s vulnerabilities being exploited.

Even with a trained staff and the latest protections installed, your IT infrastructure may still have unidentified security holes. Cyber security experts can better evaluate your entire infrastructure and recommend the necessary patches for your business’s specific threats. To secure your systems, get in touch with our experts now.

Published with permission from TechAdvisory.org. Source.

The post Beware of a new Locky-type ransomware appeared first on Complete Technology Resources, Inc..

Read More

Fruitfly spyware targets Mac computers

Contrary to popular belief, Macs do get hacked. Although it doesn’t happen as frequently as it does on Windows PCs, Macs have been infected by worms, Trojan horses, and other forms of malware in the past decade. Recently, security researchers discovered a new spyware that has flown under the radar for several years.

The post Fruitfly spyware targets Mac computers appeared first on Complete Technology Resources, Inc..

Fruitfly spyware targets Mac computers

Contrary to popular belief, Macs do get hacked. Although it doesn’t happen as frequently as it does on Windows PCs, Macs have been infected by worms, Trojan horses, and other forms of malware in the past decade. Recently, security researchers discovered a new spyware that has flown under the radar for several years.

Fruitfly spyware
The spyware, known as Fruitfly, was first discovered in January 2017, but Synack chief security expert, Patrick Wardle, discovered a more cunning variant last month.

Along with being able to track the victims’ names and locations, the spyware reportedly gives the hacker control over webcams, mice, microphones, keyboards, and notifies hackers any time the computer is in use. This enables hackers to take non-consensual photos, capture screenshots, track keystrokes, and record audio.

What’s surprising is this type of spyware is not built for financial gain or designed to steal government secrets. It’s used to spy on regular people. According to experts, the hacker developed the spyware for voyeuristic reasons. Collecting private data from users also suggests that hackers planned to set up more targeted social engineering scams.

So far, there have been only 400 confirmed Fruitfly infections, but considering how it has remained hidden for nearly decade, that number could be much larger.

While experts are still not sure who created the malware and how it is delivered, it’s best to follow security best practices like avoiding pop-up ads, banners and suspicious file attachments, using extreme caution when downloading free software, and update applications frequently.

Users should also install anti-malware software with spyware detection capabilities and perform full system scans as often as possible. New security patches have been released to detect and block Fruitfly variants, so you should keep your security software up to date at all times, too.

Surge in Mac Malware
Windows PCs are targeted more frequently, but a recent threat intelligence report by McAfee found that the Mac malware incidents have grown by 53% over the first quarter of 2017.

Hackers will likely uncover new vulnerabilities in the future, which means Mac users can no longer afford to think that their device doesn’t need strong security software and support from managed services providers.

If you’re worried about the security of your Mac, talk to us today. We offer comprehensive solutions that can defend against the new Fruitfly strain and a host of other cyberattacks.

Published with permission from TechAdvisory.org. Source.

The post Fruitfly spyware targets Mac computers appeared first on Complete Technology Resources, Inc..

Read More