508-909-5961 [email protected]

Windows 10 is getting a new update schedule

If you’ve ever had a problem with how Microsoft Windows updates are rolled out, we have some good news. In a recent announcement, the team behind the world’s most popular operating system promised to make updates more consistent and user friendly.

The post Windows 10 is getting a new update schedule appeared first on Complete Technology Resources, Inc..

Windows 10 is getting a new update schedule

If you’ve ever had a problem with how Microsoft Windows updates are rolled out, we have some good news. In a recent announcement, the team behind the world’s most popular operating system promised to make updates more consistent and user friendly. Read on to find out what that means for your business.

Windows 10 updates in 2017

In the summer of 2016, Microsoft announced that Windows would receive two large-scale feature updates in 2017. The first of these was released in April and is referred to as the Creators Update. Although many of the new features are far too advanced for the average user, the Creators Update included huge boosts to data security, user administration, and mobile device management integrations.

The next big update is due in September, and is rumored to come with several consumer-level features such as the People integration that was originally slated for the Creators Update. People would allow you to pin contact icons to your start bar to consolidate shared cloud storage, messaging platforms and calendars for individuals in one convenient location.

The future of Windows OS updates

From 2017 onward, Microsoft has committed to sticking to this “predictable twice-per-year” schedule. Along with more reliable releases, the Windows team is also committing to a more reliable support lifecycle. As long as you are running a version of Windows 10 that has been released sometime within the last 18 months, you can be sure that Microsoft engineers are keeping it current and secure.

This is great news for businesses that struggle to keep their servers and workstations updated. Out-of-date operating systems are one of the biggest risks to data security for small businesses, and promising this level of reliability makes it much easier for IT teams to plan ahead.

As trivial as it may seem, keeping all your software and hardware updated is a huge benefit of outsourced IT management. From productivity improvements to security patches, most businesses are missing out on vital features in a number of their services and platforms. To ensure that every solution you’ve invested in is working at its peak, call us today.

Published with permission from TechAdvisory.org. Source.

The post Windows 10 is getting a new update schedule appeared first on Complete Technology Resources, Inc..

Read More

Warning: Do not install “Google Defender”

With as much as we write about sophisticated malware and security breaches, sometimes the most effective attacks are the ones that prey on human error. In the most recent case, all it took was an email with a perfect imitation of one of Google’s security screens.

The post Warning: Do not install “Google Defender” appeared first on Complete Technology Resources, Inc..

Warning: Do not install “Google Defender”

With as much as we write about sophisticated malware and security breaches, sometimes the most effective attacks are the ones that prey on human error. In the most recent case, all it took was an email with a perfect imitation of one of Google’s security screens. If you use Gmail, you need to know how to avoid this.

Broadly defined, “phishing” is any form of fraud in which an attacker tries to learn information such as login credentials or account information by masquerading as a reputable entity or person in email, IM or other communication channels.

These messages prey on users who click links, images and buttons without thoroughly investigating where they lead to. Sometimes the scam is as simple as an image with a government emblem on it that links to a website containing malware. Just hovering your mouse over the image would be enough to see through it. But some phishing schemes are far more difficult to recognize.

The Google Defender scam

Recently, an email spread to millions of Gmail accounts that almost perfectly imitated a message from Google. The text read:

“Our security system detected several unexpected sign-in attempts on your account. To improve your account safety use our new official application “Google Defender”.

Below that was a button to “Install Google Defender”. What made this scheme so hard to detect is that the button actually links to a totally legitimate site...within Google’s own framework. When third-party app developers create Gmail integrations, Google directs users to an in-house security page that essentially says, “By clicking this you are giving Google Defender access to your entire inbox. Are you sure you want to do this?”

Even to wary users, the original message looks like it came from Google. And the link took them to a legitimate Google security page -- anyone could have fallen for it. The Gmail team immediately began assuring users that they were aware of the scam and working on eradicating it and any potential copycats.

There’s no happy ending to this story. Although vendors and cybersecurity experts were able to respond to the crisis on the same day it was released, millions of accounts were still affected. The best way to prepare your business is with thorough employee training and disaster recovery plans that are prepared to respond to a breach. To find out how we can protect your business, call today.

Published with permission from TechAdvisory.org. Source.

The post Warning: Do not install “Google Defender” appeared first on Complete Technology Resources, Inc..

Read More

Dropbox raises prices, limits file retention

Dropbox raises prices, limits file retention

A few weeks ago, Dropbox® announced two new features for its file sync and share service: Paper, a document collaboration tool; and Smart Sync, a file access service. At the same time, they updated their plans and pricing, moving several features designed to help businesses administer file sharing to more costly plans. Companies using or considering Dropbox should take note that these changes will make it more expensive to manage and control their employees’ sharing activities and will limit the ability to preserve critical business data stored on the service.

Key Dropbox management features moved to higher-end plans

The Dropbox for Business plan has been renamed the Standard plan and is priced the same ($15 per user per month for a month-to-month contract). However, key administrative management features were moved out of the Standard plan to a new and more costly Advanced plan. Features now only available in the Advanced $25 per user per month plan include:

  • Tiered Administrator Roles – multiple administrator roles with different permissions
  • Sign In As User – allows administrators to sign in to an end user’s Dropbox account
  • Audit Log
  • HIPAA compliance

Another important change is the introduction of limits on how long files versions are retained. Whereas Dropbox used to offer unlimited file version history, they’ve now throttled it to 120 days across all plans (although current customers can opt in to retain unlimited version history). This means that companies using Dropbox as their primary file storage will only be able to restore files that were deleted or overwritten within the last 4 months.

Dropbox, alone, may not fully preserve critical business data

These changes are interesting. It appears that Dropbox is betting that businesses will be willing to pay an additional $10 per user per month (a total of $25 per user per month) to get access to advanced management and control features. This may present a difficult tradeoff between full control over data and users and paying a much higher price point.

On the other hand, the introduction of file history limits across all plans severely curtails the file preservation functionality of Dropbox, so companies concerned about data preservation will need to add a separate file backup service to ensure full protection.

For MSPs and VARs, who typically would manage such data on behalf of their customers, these tradeoffs may be amplified, especially for those partners who are trying to convince customers to move from the consumer-grade free Dropbox service.

Even for businesses that opt for the higher-end Advanced or Enterprise plans, there is no ability to easily and quickly restore a large number of Dropbox files. So, in case of a ransomware attack or other type of large data loss event, someone – a user, an administrator, or partner – will have to restore affected data on a file by file basis.

ShareSync: One secure solution for file management

Businesses looking to provide employees with mobile file access and collaboration without having to sacrifice control or limit data preservation should consider ShareSync® backup and file sharing. ShareSync starts at $4.99 per user and includes unlimited file version history across all plans, the ability to roll back a large number of files to any point in time with just one click, and many more management and control features.  See how ShareSync compares to the new Dropbox Standard Plan:

 

ShareSync Unlimited Dropbox Standard
Price – retail $14.99 $15
Storage Unlimited 2 TB/account
User minimum 0 5
Version history Unlimited 120 days
Admin file mgmt. Inc. N/A
HIPAA compliance Inc. N/A
Audit Log Inc. N/A
Phone support Inc. N/A
Mass restore Inc. N/A

 

ShareSync is either a trademark or registered trademark of Intermedia.net, Inc. in the United States and/or other countries.  Dropbox is a trademark of Dropbox, Inc.

This article was re-published with permission from Intermedia, Inc.

Read More

Mac Malware finds a new way to attack

MacOS has a reputation for being one of the most secure operating systems. But in 2016, its susceptibility to malware grew by an astounding 744% according to one security report. Recently, a new strain of malware was found to infiltrate Macs by bypassing all of its security features.

The post Mac Malware finds a new way to attack appeared first on Complete Technology Resources, Inc..

Mac Malware finds a new way to attack

MacOS has a reputation for being one of the most secure operating systems. But in 2016, its susceptibility to malware grew by an astounding 744% according to one security report. Recently, a new strain of malware was found to infiltrate Macs by bypassing all of its security features. Despite having one of the highest price points in the market, Macs’ reputation for being the safest computers remains untarnished, but will the new malware change that?

How the new malware attacks Macs

The new strain of malware targeted at Macs is called OSX/Dok, which was first discovered in April 2017. OSX/Dok infiltrates Macs through phishing attacks, whereby users receive a suspicious email with a zip file attachment. Like all phishing attacks, it contains a message that tricks the recipient into opening the attachment purportedly about tax returns.

Mayhem ensues once the malware is in the system, gains administrator privileges, takes over encrypted communications, changes network settings, and performs other system tweaks that put the users at its mercy.

What the malware does

The malware targets mostly European networks, but it’s expected to spread into other regions. Even more alarming is its ability to bypass Gatekeeper, a security feature in the MacOS designed to fend off malware. This is because its developers were able to obtain a valid Apple developer certificate, which makes the attachment appear totally legitimate. Although Apple has addressed the issue by revoking the developer’s certificate of the earliest versions of the malware, the attackers remain persistent and now use a new developer ID.

How to avoid the mayhem

The Mac-targeted OSX/Dok malware is easy to avoid if you keep your wits about you when receiving zip files from unknown senders -- these files should be treated as high-risk and be reported to your IT team, quarantined, or junked. Whether you’re using a Mac or a Windows computer, clicking on suspicious ads can download and install apps from third-party sources that put your system at risk.

Mac users are not completely safe, and complacency with security could only result in compromised and irreparable systems, ruined reputation, and lost profits for businesses. For this particular malware, a simple act of vigilance may be all it takes to avoid having your Apple computer bitten by bugs. If you want to double the layer of protection for your business’s Mac computers, call us for robust security solutions.

Published with permission from TechAdvisory.org. Source.

The post Mac Malware finds a new way to attack appeared first on Complete Technology Resources, Inc..

Read More