508-909-5961 [email protected]

It’s undeniable that we hide skeletons in our closets, your search engine history included. Users might not know this, but Google keeps a full record on EVERY search you have ever made, removed searches as well. If you thought you deleted all your secret searches, think again. Luckily there are things you can do to […]

2016september22_google_bIt’s undeniable that we hide skeletons in our closets, your search engine history included. Users might not know this, but Google keeps a full record on EVERY search you have ever made, removed searches as well. If you thought you deleted all your secret searches, think again. Luckily there are things you can do to prohibit Google from collecting more data, ensuring that your most private, My Little Pony-related inquiries aren’t ever brought to light.

It’s estimated that Google currently processes over 40,000 search queries every second on average, which translates to over 3.5 billion searches per day and 1.2 trillion searches per year worldwide. It begs this question: How does Google manage to keep tabs on such a jaw-dropping amount?

It’s not like Google is a superior being capable of seeing and hearing all. It’s only when you log into your Gmail or Google account that Google will be able to record it all -- removed items included. See your very own search history by using the link: history.google.com/history. In that history page, Google even has its own specific audio page as well as meticulous records of every single place you’ve been to on the Internet.

You can even analyze the information with the handy “search my searches” tool. Image searches and watched YouTube videos are also recorded. Previous Google Maps searches can also be reviewed, and if you feel like it, you can download your entire history and browse through it in your spare time.

For those wishing to delete certain files or certain search records, the Independent advises you on exactly how to do it: “To delete particular files, you can click the checkbox on the left and then move back to the top of the page and select ‘delete.’ To get rid of everything, you can press the ‘More’ button, select ‘Delete options’ and then ‘Advanced’ and click through. The easiest way to stop Google recording everything is to turn off the virtual assistant and never to use voice search. But that solution also gets at the central problem of much privacy and data use today – doing so cuts off one of the most useful things about having an Android phone or using Google search.”

Another method would be to head over to the top left of the screen where you’ll find a drop-down menu that includes the option “Activity Controls.” Select this and then switch off the slider marked “Web & App Activity.”

Keeping records might come in handy when you want to look back for something, but for those who enjoy their privacy, there are ways to prevent Google from going through your search history. For more information, please give us a call or send us an email. We are more than happy to help in any way we can.

Published with permission from TechAdvisory.org. Source.

Read More

Everyone hates jargon. It’s ostracizing and off-putting, but somehow we just keep creating more and more of it. For those who have adopted an “if you can’t beat ‘em, join ‘em” philosophy, we have just the list for you. Let’s take a look at some of the most relevant cybersecurity terms making the rounds today. […]

2016september21_security_bEveryone hates jargon. It’s ostracizing and off-putting, but somehow we just keep creating more and more of it. For those who have adopted an “if you can’t beat ‘em, join ‘em” philosophy, we have just the list for you. Let’s take a look at some of the most relevant cybersecurity terms making the rounds today.

Malware

For a long time, the phrase ‘computer virus’ was misappropriated as a term to define every type of attack that intended to harm or hurt your computers and networks. A virus is actually a specific type of attack, or malware. Whereas a virus is designed to replicate itself, any software created for the purpose of destroying or unfairly accessing networks and data should be referred to as a type of malware.

Ransomware

Don’t let all the other words ending in ‘ware’ confuse you; they are all just subcategories of malware. Currently, one of the most popular of these is ‘ransomware,’ which encrypts valuable data until a ransom is paid for its return.

Intrusion Protection System

There are several ways to safeguard your network from malware, but intrusion protection systems (IPSs) are quickly becoming one of the non-negotiables. IPSs sit inside of your company’s firewall and look for suspicious and malicious activity that can be halted before it can deploy an exploit or take advantage of a known vulnerability.

Social Engineering

Not all types of malware rely solely on fancy computer programming. While the exact statistics are quite difficult to pin down, experts agree that the majority of attacks require some form of what is called ‘social engineering’ to be successful. Social engineering is the act of tricking people, rather than computers, into revealing sensitive or guarded information. Complicated software is totally unnecessary if you can just convince potential victims that you’re a security professional who needs their password to secure their account.

Phishing

Despite often relying on face-to-face interactions, social engineering does occasionally employ more technical methods. Phishing is the act of creating an application or website that impersonates a trustworthy, and often well-known business in an attempt to elicit confidential information. Just because you received an email that says it’s from the IRS doesn’t mean it should be taken at face value -- always verify the source of any service requesting your sensitive data.

Anti-virus

Anti-virus software is often misunderstood as a way to comprehensively secure your computers and workstations. These applications are just one piece of the cybersecurity puzzle and can only scan the drives on which they are installed for signs of well known malware variants.

Zero-day attacks

Malware is most dangerous when it has been released but not yet discovered by cybersecurity experts. When a vulnerability is found within a piece of software, vendors will release an update to amend the gap in security. However, if cyber attackers release a piece of malware that has never been seen before, and if that malware exploits one of these holes before the vulnerability is addressed, it is called a zero-day attack.

Patch

When software developers discover a security vulnerability in their programming, they usually release a small file to update and ‘patch’ this gap. Patches are essential to keeping your network secure from the vultures lurking on the internet. By checking for and installing patches as often as possible, you keep your software protected from the latest advances in malware.

Redundant data

When anti-virus software, patches, and intrusion detection fail to keep your information secure, there’s only one thing that will: quarantined off-site storage. Duplicating your data offline and storing it somewhere other than your business’s workspace ensures that if there is a malware infection, you’re equipped with backups.

We aren’t just creating a glossary of cyber security terms; every day, we’re writing a new chapter to the history of this ever-evolving industry. And no matter what you might think, we are available to impart that knowledge on anyone who comes knocking. Get in touch with us today and find out for yourself.

Published with permission from TechAdvisory.org. Source.

Read More

The term ‘hard’ in hard drive shouldn’t refer to the difficulty many experience when they set out looking for a new one. It’s hard to deny the importance that hard drives still have to computers of all shapes, sizes, and operating systems -- but like the elusive concept of soulmates, how do we know which […]

2016september20_hardware_bThe term ‘hard’ in hard drive shouldn’t refer to the difficulty many experience when they set out looking for a new one. It’s hard to deny the importance that hard drives still have to computers of all shapes, sizes, and operating systems -- but like the elusive concept of soulmates, how do we know which one is right for us? We’ve put together a list of five things you should take into consideration prior to buying new hardware.

Hard Disk Drive VS. Solid State Drive

Firstly, you have to know which type of data storage you plan to use: Hard Disk Drive (HDD) or Solid State Drive (SSD).Capabilities of HDDs are on par with SSDs -- but that doesn’t mean there aren’t any pros and cons. An SSD is a type of drive that uses flash memory for storing data, as opposed to spinning metal disks found in the traditional HDD -- think of it like an extra large USB thumb drive.

On the upside, SSDs are faster at reading and writing data. They require less energy, are silent, and generally have longer lifespans. Downsides include small data capacities and a heftier price tag. It all boils down to what you're going to your needs. Go for HDDs if you have budget restrictions or are looking for a backup/external drive; go for SSDs if the drive will run frequently-accessed files and programs.

Physical size and interface

After deciding between an HDD or SSD, you now have to choose a form factor. Luckily there are only two choices: the 3.5-inch drive and the 2.5-inch drive. The right one will likely depend on your current setup. With traditional HDDS, data is stored on spinning metal disks, meaning that more disks will be needed to expand data capacity. Because of this, desktop HDDs tend to be 3.5 inches with a maximum capacity of 4 TB, whereas laptops are 2.5 inches with a maximum capacity of 2 TB. SSDs are made smaller since they don’t require any removable parts, meaning they’ll fit easily into the 2.5-inch form factor. Adapters are available if you need to use the SSD in a 3.5-inch connector.

Specifications and performance

Now that you know what kind of drive to buy, it’s time to narrow down the candidates and find the best one that suits your needs. Here are some factors you need to consider:
  • Storage capacity - HDDs come in various sizes, but due to physical limitations, they cap off at 4 TB. Whereas SSDs are much smaller and doesn’t exceed the 1 TB mark - some consumer-level SSDs rarely exceed 512GB.
  • Transfer speed - Performance of consumer-level HDDs are determined by multiple factors, and revolutions per minute (RPM) is an important one. Higher RPM means faster data transfer between drives.
  • Cache space - If a hard disk needs to transfer data from one section to another, a special area of embedded memory known as the cache is utilized. Larger cache enables data to be transferred faster (because more information can be stored at one time). Modern HDDs have cache sizes ranging from 8-12 MB.
  • Access times - HDDs have a couple of factors that impact their performance. One is the time it takes for the reader to start reading or writing data from the drive. For SSDs, you want to look for sequential read and write speeds (also known as sustained reading and writing speeds). Just as long as the speeds are within the SATA connector’s max speed, you'll be fine.
  • Failure rate - Though all things mechanical gradually wear and tear over time, not all HDDs are the same. Some models last six months where others make it past six years. You must do adequate research on a per-model basis before making a purchase.

External VS. Internal

The final step is to decide whether you want the hard drive to reside within of if it will get its own compartment outside. External drives are ideal for storage and backup purposes; they generally connect with a USB 2.0 that caps out at 480Mb/s -- newer models that support USB 3.0 boasts a max of 5.0Gb/s. Unless the model you get is USB 3.0 compatible, the speed will likely be insufficient when it comes to running an operating system.

Speed issues aside, they’re portable and can be shared with multiple computers. They can even be plugged into TVs and media centers for direct playback. If portability falls second to speed, or if your current system lacks a working data drive, internal is the best choice.

Now that you’re armed with the necessary information, buying your next hardware should be a pleasant experience, like a walk in the park. If you have further questions or would like to know more, feel free to contact us by phone or email; we’re more than happy to help.

Published with permission from TechAdvisory.org. Source.

Read More

Recently, a story circulated amongst industry insiders of an official in a hospital’s records room who couldn’t customize her legacy phone system’s hold messages. The upshot was this particular platform restarted the hold message each time a caller was placed back on hold. Her provider - a reseller with little control over the system’s functionality […]

2016september19_voip_bRecently, a story circulated amongst industry insiders of an official in a hospital’s records room who couldn’t customize her legacy phone system’s hold messages. The upshot was this particular platform restarted the hold message each time a caller was placed back on hold. Her provider - a reseller with little control over the system’s functionality - was unable to help, and the “on-hold caller” hang-up rate increased 35% over a 3-month period.

When an operator asks a client for permission to put them on hold, what they’re really saying is “Can you wait there a short time not talking to anybody?” It’s a small window of speech-free standing-by that occurs at different times throughout a call, and for different durations.

And, it can result in two distinctly different outcomes: an untroubled customer who will stick around to finish their business, or a disgruntled one who will most likely quit the call and come back another time. With a VoIP phone system, a mix of engaging music, constructive messages, and interesting information can put the kibosh on finicky fleeing clients.

Music

We’d all agree there’s no accounting for taste when it comes to music, but there are some things you definitely DON’T want playing while a potentially agitated or impatient customer is on hold. So how do you choose the best sounds for them to hear whilst waiting?

With a VoIP system’s easy-to-navigate dashboard, you simply click a tab called “Hold Music” or something similar, and then upload your audio. Focus on trendy, easily recognizable music that suits your brand, and takes your clientele’s demographics into account.

You can also enter through your VoIP user interface freely to schedule how frequently a particular track plays and for how long, and to configure whether it restarts or continues where it left off when a caller is placed back on hold.

Marketing Messages

Your VoIP system’s audio files aren’t restricted to music, of course. There is a world of opportunity there to keep your on-hold customers not only engaged by sound, but marketed to, too. Remember, your goal isn’t just to eliminate silence, it’s to do so with a purpose.

“Hold message” scripts that riff on your company’s TV and radio ads might elicit an “I think I’ve heard this somewhere” response. Conversely, you could put a totally new spin on the usual tone and style of your marketing messages and really get creative with humorous mini-commercials that make your customers chuckle (and a little bit of levity never hurt nobody!).

You could also create files that catalogue your company’s services in unconventional ways, such as in alphabetical order; highlight seasonal promotions or other new specials; and announce upcoming product launches -- or simply hint at them to coax your customer into a bit of standby sleuthing. Whatever the case may be, your VoIP system’s interface makes it easy to have multiple messages at the ready.

Facts & Figures

Why is your customer doing business with you in the first place? Try to remind them while they wait, perhaps by telling them about your company’s founding fathers’ esteemed histories or about some of the innovations you’ve brought to your industry’s marketplace.

New information and intriguing anecdotes will take their minds off of the fact that they aren’t being served, so you could also pose a playful trivia or “Did you know?” kind of contest where providing a correct answer once the call resumes wins them a prize.

Or, tailor-make announcements that make it clear you’re doing your best to solve the customer’s issues: whether they went through the “internet service” IVR menu or they’re there to “renew membership,” program your VoIP system to play an upbeat, service-appropriate message that makes them feel like they’re getting personalized care.

VoIP functionality actually gives you an opportunity to turn the on-hold experience into a positive customer service experience. So if you’re looking for a way to make sure the window of speech-free standing-by doesn’t slam shut, get in touch with us today and we’ll help you increase the odds that your clients hold the line happily.

Published with permission from TechAdvisory.org. Source.

Read More