508-909-5961 [email protected]

Move Android data to a new phone in minutes

Getting a new Android phone is an exciting affair. There are new hardware specs, feature upgrades, and fresh apps, but if you can’t migrate the data from your old phone, it’s all for naught. Thankfully, Google’s operating system makes it incredibly simple.

The post Move Android data to a new phone in minutes appeared first on Complete Technology Resources, Inc..

Move Android data to a new phone in minutes

Getting a new Android phone is an exciting affair. There are new hardware specs, feature upgrades, and fresh apps, but if you can’t migrate the data from your old phone, it’s all for naught. Thankfully, Google’s operating system makes it incredibly simple. There are three ways to go about it and we cover each in detail here.

Backing up to Google

Google’s free services are so tightly integrated with the Android operating system that it would be crazy not to sign up for a Google account. If you do have one, it’s usually the easiest way to migrate your contacts between phones.

  1. Open the Settings application on your phone.
  2. Scroll down and select Accounts (depending on the phone manufacturer it may be labeled something slightly different).
  3. Tap Google.
  4. Select your preferred Gmail address.
  5. Enable Sync Contacts and select Sync Now at the bottom of the screen.
  6. Visit google.com/contacts and confirm that everyone is there.

Good, from this moment on contacts from that phone will automatically be synced to your preferred Google account. Then all you need to do is add that account to your new phone.

  1. Return to the Account window in your settings app (step #2 above).
  2. Scroll to the bottom and select Add account.
  3. Choose Google and enter your account login information.
  4. Open the settings window for that account (step #4 above).
  5. Select Sync Contacts.

That’s it! The first set of instructions exports contacts from your old phone to Google.com, and the second set downloads them to your new phone.

Backing up to your SIM card

SIM cards are how your cellular provider keeps track of your phone number and who you are. If you’re lucky, you can just pop your existing SIM into your new phone and the majority your data will move with it. Double-check that’ll happen with these steps:

  1. Open your Contacts application (sometimes named People).
  2. Tap the More option (sometimes this is three dots stacked vertically).
  3. Select Import/Export.
  4. Choose Export to SIM and pick which information you want to store on the SIM card.

Once that’s finished, everything should be downloaded to the new phone as soon as you plug in the SIM card!

Using a third-party app

Verified apps, downloaded from the Google Play store, further simplify this process if you’re willing to go through the hassle of choosing one of the dozens of options. If you pick this approach, most apps are no more complicated than a checklist of which contacts you want to transfer with a Send button at the bottom. As long as you’ve installed the app on your new phone as well, and linked the two with a password, that’s all it takes.

Contact migration sounds easy enough, but it’s no simple task if you’ve got an entire fleet of company phones to migrate. Our fully-managed solutions cover all your Android needs, and if you’d rather we take care of some menial task, we can do it in no time. Just drop us a line to find out more!

Published with permission from TechAdvisory.org. Source.

The post Move Android data to a new phone in minutes appeared first on Complete Technology Resources, Inc..

Read More

Hands-on virtualization with a 1990s Mac

Even if virtualization has been explained to you before, it's entirely possible that the definition didn’t stick. There are so many variations of this technology that we take it upon ourselves to periodically review its most basic functions. And because these variations aren't concrete enough to easily understand them, this time we’re including a virtualized desktop for you to play with!

What is virtualization?

The simplest definition is this: It’s the act of creating a virtual (rather than physical) version of something, including hardware platforms, storage devices, and computer network resources.

The post Hands-on virtualization with a 1990s Mac appeared first on Complete Technology Resources, Inc..

Hands-on virtualization with a 1990s Mac

Even if virtualization has been explained to you before, it's entirely possible that the definition didn’t stick. There are so many variations of this technology that we take it upon ourselves to periodically review its most basic functions. And because these variations aren't concrete enough to easily understand them, this time we’re including a virtualized desktop for you to play with!

What is virtualization?

The simplest definition is this: It’s the act of creating a virtual (rather than physical) version of something, including hardware platforms, storage devices, and computer network resources. But that doesn’t do much for those outside of the IT industry.

We could paint a colorful analogy to try to better explain it, or we could let you paint with your very own virtualized demo. Follow these steps so you can see how virtualization works:

  1. Visit this website.
  2. Wait while your virtualized 1991 Macintosh boots up.
  3. Double-click the ‘Kid Pix’ desktop icon.
  4. Write “This is virtualization” on the blank canvas.
  5. Click (and hold) File, and select Save As.
  6. Click the Save button in the new window.
  7. Quit ‘Kid Pix’.

Voilà! Your picture was saved to that old-school Mac's virtual hard drive. That’s because everything -- from the operating system to the processor -- is running on a server located somewhere else on the internet. And it’s not just some remote desktop viewing trick, this ’90s-era Mac and its hardware have been created by software installed on a server that is concurrently processing a million other tasks.

It’s a fun demonstration, but modern-day virtualization can accomplish much more.

Divide up hardware resources

The dated nature of that machine actually helps us better illustrate the biggest benefit of virtualization. The software that lets us create virtual machines also allows us to define exactly how much hardware each workstation gets.

For example, this Mac has only 3.8 MB of hard drive space, but if your virtualization server has 10,000 GB of space, you can create 100 virtual desktops with 100 GB of storage space. It’s a bit of an oversimplification, but that’s essentially how it works with storage hardware, CPUs, RAM, and other hardware.

Reduce on-site costs

The bulk of your workstation and server hardware is usually hosted off-site, which means lower utility bills, computer equipment requirements, and maintenance overhead. Instead of patching and upgrading each workstation’s software and hardware individually, virtualization allows you to apply changes to all your machines at once.

Disaster recovery

If your virtualization server is hosted off-site, what happens when natural disasters, power outages, theft, or vandalism strikes your office? Or, as a simpler example, where did you store your Kid Pix masterpiece? Certainly not on the machine you’re reading this blog from.

Virtualization allows you to keep mission-critical data stored safely away from the office so your team can get back to work as soon as your IT provider gets them access to the server again. And with a single point of management (i.e., your off-site server), that can take place in virtually no time at all.

Ending your dependence on individual machines and their hardware is just one of the many ways to utilize the power of virtualization. You can define network hardware and configurations with software, run applications on any operating system, and so much more. To find out which solution is best for your business, call us today!

Published with permission from TechAdvisory.org. Source.

The post Hands-on virtualization with a 1990s Mac appeared first on Complete Technology Resources, Inc..

Read More

Fake Skype ads lead to ransomware attacks

Hackers have used Skype to conduct various phone scams; but this month, they have found a new way to exploit the popular video calling app. Ransomware, which has predominantly been distributed via email attachments and URL links, is now being delivered through fake Skype ads.

The post Fake Skype ads lead to ransomware attacks appeared first on Complete Technology Resources, Inc..

Fake Skype ads lead to ransomware attacks

Hackers have used Skype to conduct various phone scams; but this month, they have found a new way to exploit the popular video calling app. Ransomware, which has predominantly been distributed via email attachments and URL links, is now being delivered through fake Skype ads. The details below will help you avoid business-crippling ransomware.

Initial reports found that the fake Skype ad was disguised as a critical Flash update. Clicking on the ad triggers a download of a seemingly innocuous HTML application named “FlashPlayer.hta”. If opened, the app would download malicious code that encrypts the victim’s files and holds them hostage until a ransom is paid.

According to security experts, hackers were obfuscating malicious code in the fake ads, which helped the ransomware evade detection from common antivirus tools. Many other users in the past have encountered similar Skype ads, but this is one of the first few scams that delivers ransomware.

To protect yourself against this ransomware you need to do the following:

  • Be critical - you must be careful of opening suspicious ads and links from Skype -- or any content off the internet for that matter. Before you click on a link, hover over it to see where it leads. Unsolicited emails with links and downloadable files should also be avoided unless you’re certain it’s coming from a credible source.
  • Download only from trusted sources - just like the tip mentioned above, make sure the software you download are from trustworthy app stores. In this case, Adobe Flash plugins should be downloaded directly from the official site, not from random ads.
  • Install security software - strong antivirus, intrusion prevention systems, and other cybersecurity solutions can detect and block ransomware before it makes your entire system unusable.
  • Invest in backups - storing your data in multiple cloud-hosted data centers will help you recover critical files should ransomware manage to infect your local computers.

When it comes to ransomware, hackers don't always return your files and we never recommend giving in to their demands. Staying informed and being prepared is the best solution to any malware.

Skype is the last place you’d expect a hacker to turn up, but if you don’t account for all possible vulnerabilities -- including security flaws in your VoIP solution -- your business has a bleak future. Contact us to protect your VoIP, your cloud, and your business today.

Published with permission from TechAdvisory.org. Source.

The post Fake Skype ads lead to ransomware attacks appeared first on Complete Technology Resources, Inc..

Read More

Microsoft’s docs.com: possible data breach

It was recently revealed that docs.com, Microsoft’s free document-sharing platform, was posting private documents to the public. Although there are Office 365 users who are perfectly aware of how the program works and have no qualms about publicly sharing their documents, hundreds of other users are not.

The post Microsoft’s docs.com: possible data breach appeared first on Complete Technology Resources, Inc..

Microsoft’s docs.com: possible data breach

It was recently revealed that docs.com, Microsoft’s free document-sharing platform, was posting private documents to the public. Although there are Office 365 users who are perfectly aware of how the program works and have no qualms about publicly sharing their documents, hundreds of other users are not. Since docs.com is essentially a document-sharing website, can Microsoft be held liable?

What’s the damage?

Usernames and passwords for various devices and applications; personal information such as home and email addresses, bank account details, social security numbers, and phone numbers; and medical info comprising patient treatment data and health insurance numbers -- all these were some of the supposedly leaked documents, which were clearly meant to be private. But, a security researcher discovered that these sensitive files were accessible using docs.com’s search function.

After being alerted to the ‘leak,’ Microsoft responded by removing the search bar. However, most of the documents were already indexed by search engines, Google and Bing, which is how these docs remained available to the public despite disabling the search function.

Recent updates

To alleviate the damage, Microsoft launched an update that limited what users can do to uploaded files, such as restricting files to a read-only status. Although buttons to ‘like,’ download, add to collections, and share in social media are enabled, only users who enter an email address, phone number, or sign in using their Office or Microsoft account can perform any of these functions. Since anyone can easily create a Microsoft account, docs.com users may not feel at ease.

Microsoft’s final word

Docs.com is easy-to-use and is valuable to those eager to publish their documents. The site’s user-friendliness also makes it a popular choice for Office 365 users who wish to ‘spread their work to the world.’ Office 365 users can easily upload from their own computer, OneDrive, or Sway account, and share away. Being a free service also adds a lot of incentive for users to upload their Word, Excel, or any other file onto the site.

In an effort to solve glaring privacy issues, Microsoft has issued some key updates, such as a warning message reminding users that the document to be uploaded will be publicly available on the web. While it may seem like Microsoft committed a blunder, a stricter privacy setting and a few stronger, more visible warnings to users can help make docs.com a useful productivity tool rather than a hacker’s hunting ground.

Discerning Office 365 users can make the most out of docs.com, but they should use the service with caution. If you’ve uploaded documents with sensitive information on docs.com, now is the best time to remove them from the site, or review your privacy settings here and in other document-sharing services.

If you’re not sure how to proceed, or want to learn more about this and other Microsoft products and services, call us now for advice.

Published with permission from TechAdvisory.org. Source.

The post Microsoft’s docs.com: possible data breach appeared first on Complete Technology Resources, Inc..

Read More