508-909-5961 [email protected]

Backup and Sync: Google’s new business tool

Businesses that store and process large volumes of data need a highly organized storage and backup system. Although there are various ways to do this -- like keeping them on multiple devices or putting them on external hard drives and memory cards -- these are not very efficient and can also be misplaced.

The post Backup and Sync: Google’s new business tool appeared first on Complete Technology Resources, Inc..

Backup and Sync: Google’s new business tool

Businesses that store and process large volumes of data need a highly organized storage and backup system. Although there are various ways to do this -- like keeping them on multiple devices or putting them on external hard drives and memory cards -- these are not very efficient and can also be misplaced. Google’s new application solves this dilemma.

Seamless backups and syncing

Google’s new application, Backup and Sync, allows both PC and Mac users to seamlessly back up files, photos, and video files from various devices, SD cards, and USB drives in Google Drive or Google Photos.

To use the app, download and install it on your Mac or your Windows computer, sign in with your Google account, select your sync settings, and choose the folders you wish to back up. If you’re uploading photos or videos, you can choose between High or Original quality upload size. And if you want to upload photos only, you have the option to upload to Google Photos.

Once you’re done setting up, a folder will be created on your computer where files can be saved and accessible anywhere via the cloud. Any file dropped into this folder will automatically sync to Google Drive.

Benefits and downside

Although Backup and Sync is free, you can store only up to 15 GB of data. But if you want to exceed the limit, simply upgrade your Google Drive storage. That said, this new tool is valuable because it simplifies the backup process.

The app is especially beneficial to businesses because it’s easy to set up and requires minimal effort from users. It’s also useful to companies with remote work policies; employees can simply drag and drop files into their computer’s folder and access them anywhere from any device.

Backup and Sync not only gives your business greater flexibility by providing anytime-anywhere access to your files, but it also helps keep them safe and sound in the cloud. If you want to explore other productivity tools for your business, get in touch with us today.

Published with permission from TechAdvisory.org. Source.

The post Backup and Sync: Google’s new business tool appeared first on Complete Technology Resources, Inc..

Read More

Have you used these 6 Gmail tips yet?

Time is of the essence, especially for small- or medium-sized businesses. To keep up with your competitors, spending most of your day rummaging through your inbox won’t help. Use these Gmail tips and tricks and spend less time in front of the monitor and more time enhancing your bottom line.

The post Have you used these 6 Gmail tips yet? appeared first on Complete Technology Resources, Inc..

Have you used these 6 Gmail tips yet?

Time is of the essence, especially for small- or medium-sized businesses. To keep up with your competitors, spending most of your day rummaging through your inbox won’t help. Use these Gmail tips and tricks and spend less time in front of the monitor and more time enhancing your bottom line.

Undo Send
We've all had an email or two we wish we could take back. Gmail has a neat feature that gives you a short period of time to recall a mistakenly sent message. After activating Undo Send, quickly retrieve the email and it's as if nothing ever happened.

Canned Responses
Dubbed as ‘email for the truly lazy,’ Canned Responses is a Gmail Labs feature that allows you to save time and reuse an email that you designate as a Canned Response. Working like an email template, it saves copious amounts of time since you won’t have to retype the same responses over and over again. It comes in handy for businesses that send plenty of routine emails.

Send large attachments with Google Drive
With Gmail, users can easily send attachments reaching 25 MB. But say you have a huge zip file for a photo shoot that the clients want to review -- you’re going to need more space. If you use Google Drive with your Google account, you can send larger files on Gmail. Copy the large file to your Google Drive, then click Compose in Gmail and type your message. When you’re ready to attach the large file, click the Google Drive icon (next to the Attachment icon that looks like a paper clip). Insert the files you want to attach and send your message.

Turn on Priority Inbox
As hinted in the name, Priority Inbox will organize your messages by their importance. You’ll be able to divide your inbox into five sections, where the messages will be displayed in the following order: 1. important and unread messages, 2. starred messages, 3. [customizable section], 4. [customizable section], 5. everything else. To enable it, go to Settings > Inbox > Inbox Type and choose Priority Inbox.

Back up your messages
If you ever need to back up or migrate your Gmail messages, Gmvault can help. It is an open source solution that can back up your entire Gmail directory or just a handful of messages. The email data is then available whenever you need to restore or recreate your Gmail folders. You can also use it to migrate messages from one account to another.

Gmail Labs
To get the latest Gmail features, you should sign up for Gmail Labs. This is where Google tests up-and-coming features before making them part of Gmail. Access Gmail Labs by heading over to Settings.

Spending the right amount of time with emails while managing other crucial business areas is a balancing act many business owners find difficult. If you have questions or need further assistance regarding Gmail or IT in general, feel free to contact us.

Published with permission from TechAdvisory.org. Source.

The post Have you used these 6 Gmail tips yet? appeared first on Complete Technology Resources, Inc..

Read More

Tips and tricks for avoiding IoT threats

Internet of Things (IoT) devices have become more popular with businesses in recent years. This is largely because they can keep track of large amounts of information, analyze data patterns, and streamline business processes. But as you introduce more internet-connected devices into the office space, you may be exposing your business to attacks.

The post Tips and tricks for avoiding IoT threats appeared first on Complete Technology Resources, Inc..

Tips and tricks for avoiding IoT threats

Internet of Things (IoT) devices have become more popular with businesses in recent years. This is largely because they can keep track of large amounts of information, analyze data patterns, and streamline business processes. But as you introduce more internet-connected devices into the office space, you may be exposing your business to attacks.

Set passwords
Many often forget they can set passwords for IoT devices. When this happens, they tend to leave their gadgets with default passwords, essentially leaving the door open for hackers. Make sure to set new and strong passwords -- preferably with a combination of upper and lower case letters, numbers, and symbols -- for each device connected to your network. Then, use a password manager to securely keep track of all your passwords.

Disable Universal Plug and Play (UPnP)
UPnP is designed to help IoT gadgets discover other network devices. However, hackers can also exploit this feature to find and connect to your IoT devices. To prevent them from getting to your network, it’s best to disable this feature completely.

Create a separate network
When you’re dealing with IoT devices, it’s wise to quarantine them in a separate network unconnected to your main office network. By doing this, user gadgets will still have access to the internet but won’t be able to access mission-critical files.

You should also consider investing in device access management tools. These allow you to control which devices can access what data, and prevent unauthorized access.

Update your firmware
If you want to keep your devices secure against the latest attacks, then you need to keep your IoT software up to date. Security researchers are always releasing security patches for the most recent vulnerabilities, so make it a habit to regularly check for and install IoT firmware updates. If you have several gadgets to secure, use patch management software to automate patch distribution and set a schedule to check for updates monthly.

Unplug it
Disconnecting your IoT devices from the internet (or turning them off completely) whenever you don’t need them significantly reduces how vulnerable you are to an attack. Think about it, if there’s nothing to target, hackers won’t be able to make their move. Turning your IoT devices on and off again may not seem like the most convenient strategy, but it does deny unauthorized access to your router.

Unfortunately, as IoT devices become more commonplace in homes and offices, more hackers will develop more cunning ways to exploit them. Getting into the above mentioned security habits can protect you from a wide variety of IoT attacks, but if you really need to beef up your security, then contact us today. We have robust security solutions that keep your hardware safe.

Published with permission from TechAdvisory.org. Source.

The post Tips and tricks for avoiding IoT threats appeared first on Complete Technology Resources, Inc..

Read More

Steer your Android clear of CopyCat

The number of new malware being developed each day is alarming. If you think hundreds or thousands are a lot, try nearly one million. One that is extremely cunning goes by the name of CopyCat, which emerged in 2015 and has already infected millions of Android devices.

The post Steer your Android clear of CopyCat appeared first on Complete Technology Resources, Inc..

Steer your Android clear of CopyCat

The number of new malware being developed each day is alarming. If you think hundreds or thousands are a lot, try nearly one million. One that is extremely cunning goes by the name of CopyCat, which emerged in 2015 and has already infected millions of Android devices. That said, here’s everything you need to know to steer clear of its attacks.

What is it?

CopyCat is a strain of malware that pretends to be a popular app on third-party app stores. Alarmingly, it has already infected more than 14 million Android devices around the world, with the majority of victims in Asia. However, users in the U.S. aren’t in the clear as 280,000 Android devices have been hit since 2015.

Why is it dangerous?

Once downloaded, CopyCat collects data from the infected device and downloads rootkits that cut off the device’s security system. From there, it can download fake apps and hijack your device’s Zygote, the launcher for every app on your phone.

With control over your Zygote, CopyCat will know about every new app you’ve downloaded and opened. This allows it to replace the Referrer ID on your apps with its own and send revenues for every ad that pops up on the app to hackers instead of the app’s creators. Sometimes it even throws in its own ads to increase fraudulent ad revenues, too. So far, there have been nearly 4.9 million fake apps installed on infected devices, estimated to make CopyCat hackers more than $1.5 million.

And while it’s mainly after ad revenues, it could easily compromise confidential data collected from your Android device.

How to protect your Android device?

The malware spreads through five exploits that hit devices running Android 5.0 and earlier versions. Luckily, Google was able to track down this malware to update Google Play so all exploits have been discovered and patched.

However, Android users on older devices should avoid downloading apps from third-party vendors just to be safe. And even if you’re using newer versions of the Android OS, we recommend you ensure your Play Protect function -- Google’s security system which consists of application scanning, browser protection, and anti-theft measures -- is activated. It should be on by default on your Android device, but you can check its status by opening Google Play Store app > Tap Menu > Play Protect.

In an ideal world, you’ll no longer have to worry about cyber attacks and all the damage they can cause. But for now, staying knowledgeable and informed is the best way to protect yourself. If you’d like to learn more about how to keep your Android devices safe, just give us a call. We’ll be happy to help.

Published with permission from Why SMBs should use Google Posts. Source.

The post Steer your Android clear of CopyCat appeared first on Complete Technology Resources, Inc..

Read More