508-909-5961 [email protected]

Smartphones aren’t even ten years old, and they’re already one of the most essential pieces of our daily routines.In many ways they’ve actually surpassed desktop computers in their ability to keep us connected 24 hours a day. But they’re still a separate device, and that means awkward transitions when you get notifications while working on […]

2016August19__MicrosoftWindowsNewsAndTips_BSmartphones aren’t even ten years old, and they’re already one of the most essential pieces of our daily routines.In many ways they’ve actually surpassed desktop computers in their ability to keep us connected 24 hours a day. But they’re still a separate device, and that means awkward transitions when you get notifications while working on your PC. Those annoying interruptions were the impetus for Microsoft to introduce a new method for syncing Android notifications to your Windows 10 machine. Sound interesting? Here is how to make it happen.

The first thing you need to do is to wirelessly pair your Android phone with your Microsoft desktop. From the Google Play store, download and install the Cortana app and sign into the Microsoft account you use on your computer. Once you’ve signed in, select the Menu button in the upper-left-hand corner and select Settings. After that, select the option for ‘sync notifications’ and toggle which you would like to see on your desktop.

Notifications are broken down into four categories: calls, texts, battery alerts, and third-party apps. Although an option to answer the phone from your computer hasn’t been added yet, you can read and respond to text messages. When deciding on third-party app settings, remember the goal is to manage your interactions, not create more. Make sure to disable any notifications that will create annoying redundancies like doubled-up Facebook alerts between your Android pairing and previously-enabled desktop notifications.

And just like that, you’re all set. As long as you have Cortana enabled on your desktop, all your Android alerts will automatically display in your Windows 10 Action Center. There is no need to interact with the app on your mobile device, and we recommend removing the shortcuts from the clutter of your homescreen. Gone are the days of needlessly checking your phone every time it vibrates, just to find out it’s another telemarketer or unimportant Instagram notification.

As technology reaches the hands of more and more people, and hardware and software options increase exponentially, there are few problems that can’t be fixed with a little ingenuity. Our staff has that ingenuity, and they’re waiting to impart it on you and your business. Call us from your phone or text us from your desktop. Regardless of how you reach us, don’t wait for more problems to sneak up on you.

Published with permission from TechAdvisory.org. Source.

Read More

As the spectacle and competitive atmosphere of the Rio Olympic Games have drawn the world’s attention, hackers who use social engineering are inching closer to our private information. Although our systems may be prepared for the likes of malware and worms, social engineering is a different beast of its own. If used effectively, hackers can […]

2016August18_Security_BAs the spectacle and competitive atmosphere of the Rio Olympic Games have drawn the world’s attention, hackers who use social engineering are inching closer to our private information. Although our systems may be prepared for the likes of malware and worms, social engineering is a different beast of its own. If used effectively, hackers can manipulate people into disclosing personal information, rendering security systems useless. So how exactly do they go about doing this? Below are five of the most utilized social engineering tactics you should be aware of.

Phishing Phishing scams are perhaps the most common type of social engineering attack. Usually seen as links embedded in email messages, these scams lead potential victims into seemingly trustworthy web pages, where they are prompted to fill in their name, address, login information, social security number, and credit card number.

Phishing emails often appear to come from reputable sources, which makes the embedded link even more compelling to click on. Sometimes phishing emails masquerade as government agencies urging you to fill up a personal survey, and other times phishing scams pose as false banking sites. In fact earlier this year, fraudulent Olympics-themed emails redirected potential victims to fake ticketing services, where they would eventually input their personal and financial information. This led to several cases of stolen identities.

Tailgating

What’s the best way to infiltrate your business? Through your office’s front door, of course! Scam artists can simply befriend an employee near the entrance of the building and ask them to hold the door, thereby gaining access into a restricted area. From here, they can steal valuable company secrets and wreak havoc on your IT infrastructure. Though larger enterprises with sophisticated surveillance systems are prepared for these attacks, small- to mid-sized companies are less so.

Quid pro quo

Similar to phishing, quid pro quo attacks offer appealing services or goods in exchange for highly sensitive information. For example, an attacker may offer potential targets free tickets to attend the Olympic games in exchange for their login credentials. Chances are if the offer sounds too good to be true, it probably is.

Pretexting

Pretexting is another form of social engineering whereby an attacker fabricates a scenario to convince a potential victim into providing access to sensitive data and systems. These types of attacks involve scammers who request personal information from their targets in order to verify their identity. Attackers will usually impersonate co-workers, police, tax authorities, or IT auditors in order to gain their targets’ trust and trick them into divulging company secrets.

The unfortunate reality is that fraudsters and their social engineering tactics are becoming more sophisticated. And with the Olympics underway, individuals and businesses alike should prepare for the oncoming wave of social engineering attacks that threaten our sensitive information. Nevertheless, the best way to avoid these scams is knowing what they are and being critical of every email, pop-up ad, and embedded link that you encounter in the internet.

To find out how you can further protect your business from social engineering attacks, contact us today.

Published with permission from TechAdvisory.org. Source.

Read More

What part of your computer can be more hands-on than the keyboard? No pun intended. A keyboards is like a lover; you spend time with it, you caress it, and you fight with it. After kissing and making up time and again, it still types at a snail’s pace, and executing simple keyboard commands becomes […]

2016August17_Hardware_BWhat part of your computer can be more hands-on than the keyboard? No pun intended. A keyboards is like a lover; you spend time with it, you caress it, and you fight with it. After kissing and making up time and again, it still types at a snail’s pace, and executing simple keyboard commands becomes virtually impossible. If the greatest act of loving someone else is to let go, then love yourself by letting go of your old keyboard and factoring in these four considerations when looking for a new one.

Connectivity

If the internet and computer mouse possess wireless capabilities, why should your keyboard be any different? This is debatable, depending on what exactly you use the keyboard for. Keyboards are normally plug-and-play devices that don’t require additional software installation (excluding certain gaming models); wired models draw power from the USB,eliminating the use of batteries altogether. Gamers tend to prefer wired over wireless because they won’t have to deal with lag and interference issues.

Looking to declutter? Wireless is the way to go. With wireless keyboards, data is transmitted to your PC via one of two primary means: either through an RF connection to a USB receiver or via Bluetooth. They might have their pros and cons, but they significantly reduce the number of cables on your desk while allowing you more flexibility to work -- lie down on the couch and type from across the room. Also, most wireless keyboards connect to the PC via a 2.4-GHz wireless dongle that are also used for cordless phones and Wi-Fi internet. Providing connectivity to multiple devices at once.

Type of Key Switches

This aspect of keyboard design is widely mentioned in reviews, yet many people overlook the importance of the type of switches used for individual keys. Although the intricate mechanisms that hide beneath the keys might not excite you, the difference you feel from each type will. The three main types of key switches include silicone dome, scissor switches, and mechanical switches. For example, keyboards that come with a new desktop PC generally use silicone-dome switches, whereby two dimpled layers of silicone membrane form a grid of rubber bubbles that acts as the switch for each key. This type also requires you to press the key right to the bottom in order for a letter to be typed, gradually diminishing its springiness and responsiveness over time.

Why have the newer laptops and ultrabooks ditched silicone domes for scissor switches instead? Scissor switches add a mechanical stabilizer that provides uniformity. Moreover, under each keycap is a plunger that allows for shorter key travel. This causes scissor-switch keyboards to have a shallow typing feel with enhanced durability when compared with silicone dome switches.

What keyboard enthusiasts can’t get enough of are the mechanical switch keyboards. Their intricacy lies in the spring-loaded sliding keypost beneath each key. Several variations are available, and each provides slightly different sensations or sounds. Mechanical switches generally provide enhanced tactile feedback, having more of the “clickety-clack” sound. Thanks to the sturdy switch mechanisms and durable springs, they last longer and are also easily repairable. Furthermore, each keystroke registers shorter travel, making them ideal for touch typists.

Ergonomics

In order to keep carpal tunnel syndrome and repetitive stress injury at bay, keyboards are designed to allow your hands to remain in a neutral position while typing. Not only do ergonomic keyboards provide greater comfort, they also reduce joint and tendon stress, sparing you from relentless inflammation as well as pricey surgical procedures. Ergonomic features range from simple padded wrist-rests to elaborate curved and sloped keyboards.

Standard vs. Gaming Usage

Keyboard usage isn’t limited only to typing. That’s why gaming keyboards are designed for competitive usage, which allows for maximum specialization and control. Some are even customized to fit specific styles of game play, considering exact standards of durability as well as responsiveness. Others may also incorporate pulsing backlight and vibrant color schemes that cater to the gamer aesthetic. Certain premium models utilize high-grade mechanical key switches, sculpted keycaps, and numerous customizable features such as programmable macro commands and tweakable backlight intensity. Gaming keyboards are also equipped with the anti-ghosting feature that allows multiple keystrokes to be registered simultaneously -- something regular keyboards can’t do. Other goodies range from pass-through USB ports to audio connections on the keyboard. This simplifies the process of connecting peripherals to a desktop PC.

It won’t hurt to take some time to see if your current keyboard is delivering. Do not settle for anything but the best. If you need any help or have questions regarding the intricacies of finding the right keyboard, don’t hesitate to mail us or drop us a line. We’re more than happy to help.

Published with permission from TechAdvisory.org. Source.

Read More

The odds of locating a needle in a haystack is almost zero, whereas the odds of finding the right match on Google Search are slightly better. We live in a world that encourages us to work at the speed of light, but we have so much information at our fingertips. With the help of these […]

2016August16_GoogleApps_BThe odds of locating a needle in a haystack is almost zero, whereas the odds of finding the right match on Google Search are slightly better. We live in a world that encourages us to work at the speed of light, but we have so much information at our fingertips. With the help of these 12 tips, you’ll no longer waste time having to comb through the hundreds of irrelevant results that come up on each and every search.

Get Olympic updates

Get into the spirit of the games by keeping up with the latest medal tally and other interesting news about the 2016 Rio Olympics. Simply type in “rio olympics” and you’ll be greeted with two options:

  1. Above the search results, you’ll see a temporary suggestion offering a shortcut on your home screen to quickly look up the latest Olympic news. Ideal if you want to check every now and then.
  2. If you prefer immediate notification, simply scroll down a little and click on “Get Olympics updates.” By doing so, notifications will be sent straight to your phone anytime a major event occurs.

    Search for exact phrases with quotes

    This tip is ideal if you're looking to locate results that contain a specific phrase. Searching for a phrase in quotes will bring up results that have only the exact words in the same order.

    Specify unknown words within quotes

    Look up variations of a certain phrase with ease. Simply replace a certain word with an asterisk. It’ll help you determine a song from its lyrics or find the missing words in an incomplete expression.

    Utilize the minus sign

    Refine search results even further by using the minus sign. That will help filter out results that aren’t of any interest. Figure out what terms you don’t want to see (e.g., Jaguar -car) and refresh your search.

    Website keywords

    This is similar to the “site:” function that initiates a Google search that sifts through one particular website. For example, if you want to see every time TIME.com is mentioned in Google, use Google site:TIME.com

    Go through archives dating back to the mid-1880s

    If nostalgia pays you a visit, Google won’t leave you hanging since there’s an option that allows you to search through newspapers from around the world archived centuries ago.

    Use “vs” to compare foods

    With the myriad of food options available these days, sometimes we just need help deciding. Not sure what to have for dinner? Try typing in “rice vs. quinoa” for a side-by-side nutritional comparison.

    Filter search results for recipes

    Don’t let dietary restrictions rain on your parade. After looking up your favorite dish, click on Search Tools under the search bar to filter recipes based on ingredients, cook time, and even calories.

    DEFINE: the definition

    Instead of flicking through dictionaries, save time by entering DEFINE: before any word (slang included). You’ll also see its etymology as well as a graph depicting its linguistic usage over time.

    Where is the love?

    For those looking to add a little romance into their lives, simply press the mic icon on Google’s search bar and say something sweet like “I love you.” This recently-released love quote generator does all the searching for you. If that doesn’t the stir enough butterflies in your stomach, simply click Try Again below the results bar.

With the right tips, you can save time and locate the needle in today’s virtual haystack with ease. If you still have any questions regarding any of the Google search engine tips mentioned above, don’t hesitate to mail us or give us a call. We are more than happy to accommodate your requests.

Published with permission from TechAdvisory.org. Source.

Read More