508-909-5961 [email protected]

Although Windows 10 comes with many exciting new features, accompanying them are complaints from the users: from shrinking storage space to the absence of the System Restore function. But fret not, we have listed the solutions for the most frequent Windows 10 problems. 1. Decreased storage space You might not be aware that after the […]

2016August3__MicrosoftWindowsNewsAndTips_BAlthough Windows 10 comes with many exciting new features, accompanying them are complaints from the users: from shrinking storage space to the absence of the System Restore function. But fret not, we have listed the solutions for the most frequent Windows 10 problems.

1. Decreased storage space

You might not be aware that after the upgrade to Windows 10, the old version of Windows isn’t deleted but is kept in the C:/ drive by the name of windows.old, which eats up a huge chunk of your disk space. Microsoft makes it this way just in case you change your mind and want to go back to your previous version. However, if you’re sure you want to permanently delete it, just follow these steps:

Click the Windows Start button and search for the Disk Cleanup app by typing cleanup. The drive selection box will appear, choose the drive your OS is installed on (the default drive is C:/drive), then wait for Windows to scan your system. Afterward, a box will pop up.

At this point, the system might present you with a list of files to delete, but if that’s not visible, select the Clean up system files option on the bottom left of the window. Windows will then present you with another box with the option to delete Previous Windows Installation(s). Tick the option and click OK, then click Delete Files to confirm your decision.

2. Updates that don’t work

First off, check if you’ve upgraded to the Windows 10 Fall update. If the problems still occur, download and run the Windows Update Troubleshooter, then restart the system and try to update again.

If that still doesn’t work, check that System Restore is configured (see number 3 below) and create a restore point. Type Window+X and select Command Prompt (Admin), type net stop wuauserv and hit Enter, then type net stop bits and Enter. Then open Explorer, go to C:\Windows\SoftwareDistribution and delete its contents including any sub-folders. Restart your PC, open Windows Update and click Check for updates.

3. System Restore isn’t enabled

In Windows 10, the System Restore isn't enabled by default. To turn it on, go to the Start Menu and search for Create a restore point. The System Properties box will appear. From there, choose the system drive and click the Configure button, then select Turn on system protection. Use the slider to set an appropriate amount of maximum disk space (about 5GB should be enough). Note that the update to Windows 10 version 10586 turns this off again so make sure to turn it back on after you update.

4. Privacy violations

Windows 10 faces a lot of criticism over its data-sharing defaults. We recommend you review them from time to time. To change the privacy settings, go to the Start Menu and go to Settings, open the app and select Privacy. At this point, you’ll see on the left-hand side a list of data such as your computer's camera, microphone, account information and so on. Turn off the ones that you don’t want Windows to have access to.

If you use Windows Defender, click the back arrow, select Update & Security, then select Windows Defender, see if you’re ok with the default setting that enables Cloud-based detection and Automatic sample submission.

Another privacy issue is Window Wi-Fi Sense, which is initially designed to get you connected to wireless networks more quickly. But if you’re not comfortable with the idea of sharing your network's wireless credentials among devices you can’t control, you can go to Start > Settings > Network & Internet, then click Manage Wi-Fi settings in the right of the window, tick all of the boxes under For networks I select, share them with my to disable Wi-Fi sense.

5. Windows 10 uses up all the 4G data

Windows 10 uses your internet bandwidth in the background. Follow these steps to stop it from consuming all your cellular data without you knowing: go to Settings and then Network & Internet, select Wi-Fi and then Advanced Options, turn on Set as metered connection. Note that this tip won’t work if your PC connects to the internet via Ethernet.

6. There’s no DVD player app

Strangely, Windows 10 was launched without a DVD player app, which means you can’t watch films on your PC. However, if you upgrade to Windows 10 from Windows 7 Home Premium, Windows 7 Professional, Windows 7 Ultimate, Windows 8 with Windows Media Center or Windows 8.1 with Windows Media Center, you’ll find a late released DVD app from Microsoft in Window Store for free download. But if you’re not one of the lucky users mentioned above, we recommend you to download VLC Media Player instead. It’s free!

We hope these 6 fixes will help smoothen your experience with Windows 10. But while there are some issues you can cover by yourself, others are more complicated and would better be handled by IT experts. Why not call us today? Our staff is here to eliminate your Windows 10 headaches.

Published with permission from TechAdvisory.org. Source.

Read More

Small- and medium-sized businesses are famous for creating innovative solutions that allow them to compete with much larger, better funded competitors. One of the most useful tools to accomplish this is the immensely popular iPad, which with its widespread developer community, has limitless possibilities for SMBs. If you feel like you could be getting more […]

2016August2_iPad_BSmall- and medium-sized businesses are famous for creating innovative solutions that allow them to compete with much larger, better funded competitors. One of the most useful tools to accomplish this is the immensely popular iPad, which with its widespread developer community, has limitless possibilities for SMBs. If you feel like you could be getting more out of your Apple mobile device’s business potential, we’ve created a list of the five best solutions -- let’s take a look.

Point of sale apps

One of the most popular uses for iPads in SMBs is as a means of ringing up customer purchases. The checkout aisle has slowly been giving way to automation, and with apps like Vend and Revel you can save a great deal of money on expensive point of sale hardware and wasted employee time. From customer relationship management to loyalty programs and gift cards, these apps give your business a polished, professional front end.

Presentation apps

Business presentations are a staple of the white-collar world, and being ill-prepared for one can sabotage your profitability. Although in the past users were generally averse to creating presentations on ‘restrictive’ touchscreens, Apple’s continued dedication to making it possible is evidenced by their Keynote app. Before writing it off, check out the extremely intuitive creation and delivery functions.

Social media management

For better or worse, the number of social media avenues to promote your business are growing every day. Updating and managing each of them individually is tedious, and ultimately a waste of valuable time. Social media managers like HootSuite allow you to manage multiple accounts, schedule posts, and reply to messages -- all from one place. HootSuite even has analytics and campaign plans directed toward small businesses looking to engage new customers.

Remote Access

Mobility is one of the most sought-after traits of any modern business. If you find yourself constantly away from your desk, a remote access app may be your golden ticket to staying productive on the road. Apps like LogMeIn and GoToMyPc give you unfettered access to your designated desktops. This way you can keep working from the cab, home, or airplane, like you never left the office.

Invoicing/Payment tracking

A desktop computer might seem like the ideal place to track invoices, expenses and employee hours, but mobile accounting apps are freeing up business owners to take their company on the road. SMBs with multiple locations or remote workers will love the cloud access afforded to them by the likes of FreshBooks and Outright. CEOs can push data to these apps from their iPad while their accountants review it from the other side of the country.

When it comes to small- and medium-sized businesses and technology, we’re the experts. And whether it’s security or usability that has kept you from utilizing mobile devices in your business processes, we have a solution for you. Don’t risk exposing your business to unnecessary risks. Contact us today to set up a consultation.

Published with permission from TechAdvisory.org. Source.

Read More

A simple Google search of “ransomware” returns just over 9 million results. So, too, does a search for “Three Mile Island,” the location of the late-70’s Pennsylvania nuclear meltdown. And while we don’t mean to equate the near catastrophe of the latter to having your company’s data hijacked by computer hackers, ransomware can in many […]

2016August1_Security_BA simple Google search of “ransomware” returns just over 9 million results. So, too, does a search for “Three Mile Island,” the location of the late-70’s Pennsylvania nuclear meltdown. And while we don’t mean to equate the near catastrophe of the latter to having your company’s data hijacked by computer hackers, ransomware can in many cases end in disaster for your business.

The way in which these nefarious operators commandeer your information and deny you access usually involves some fairly sophisticated stuff. The ransomware they install on your system is essentially a virus that “locks up” your data, and it can’t be unlocked unless you pay them for the keys.

Some of these data-encrypting viruses are strong, such as the CryptXXX strain. It has been infecting businesses for the past few months, and its latest mutation can’t be quelled by decryption programs found for free on the internet.

Two relatively new types of ransomware aren’t quite as virulent as CryptXXX, but we’d like to bring you up-to-date on them nonetheless. Here’s a look at what they’re called, what they do, and how you can defeat them should your business be impacted.

PowerWare

The first of these recent ransomware varieties is called PowerWare, which also goes by the name PoshCoder. It imitates a more complex ransomware program called Locky, although with less effectiveness.

This spring, PowerWare was discovered attacking healthcare organizations through Windows PowerShell, a scripting application used for systems administration. Fortunately, programmers at hi-tech security firm Palo Alto Researchers were able to quickly create a decryption tool named “powerware_decrypt.py” that unlocks ransomed data with relative ease.

Implementing the fix, however, does call for a bit of technical know-how, so if your IT department is experienced in this area it shouldn’t be a problem. The code that can cure you from PowerWare is published online and is free.

BART

The second new ransomware breed that we should address is called BART. Instead of employing intricate information-encrypting algorithms to take command of your data, BART will stash away your files inside password-protected ZIP folders… and you have to pay for the password.

These infections aren’t hard to identify as the imprisoned files will appear with “.bart.zip” added to their original name (for example, “spreadsheet.xlsx.bart.zip”). Thankfully, not only are they easy to detect, but for antivirus firm AVG, they are easy to decode.

Applying the remedy that AVG has produced requires an unaffected copy of one of the files that’s been locked up. And if you can’t locate one somewhere on your network, a good IT services firm will be able to. The BART decryption tool is also available online at no cost.

The fact is, there are some shady, technologically savvy characters out there who are willing to do us harm. Keeping them at bay takes vigilance. So if your business doesn’t have the resources to stay safe and secure from threats like ransomware - or, in the event that you’ve been hit, you’re not sure how to recover your data without paying the ransom - call us today to talk things over.

Published with permission from TechAdvisory.org. Source.

Read More

Looking for an important file or message among endless emails in your inbox is no fun, especially if you need it right before a meeting starts. You’ve tried using the basic search box at the top of Gmail and found out that it didn’t help either. Don’t worry, we’ve rounded up 6 search operators that […]

2016July29_GoogleApps_BLooking for an important file or message among endless emails in your inbox is no fun, especially if you need it right before a meeting starts. You’ve tried using the basic search box at the top of Gmail and found out that it didn’t help either. Don’t worry, we’ve rounded up 6 search operators that will help you sort through your inbox to get what you need in a jiffy.

1. Where did I put that file?

Looking for a file your colleagues sent you ages ago? Don't remember the file’s specific name but you do recall some keywords? That’s a good start. Simply type a keyword after filename: to search for a particular file. For example, you can type filename: minutes to search for a file named meeting minutes. Don’t even remember a part of the name but know what type of file it is? Then you can also use the same search operator to search for a file type. For example, type filename: doc to search for document files.

2. CC or BCC

There are times when you want to narrow down the recipients: whether they are direct, carbon copy (cc), or blind carbon copy (bcc) receivers. The basic “To” search boxes are proven to be useless in this case. What you can do to be more specific is to type cc: or bcc: followed by the recipients’ names or email addresses. For example, instead of typing “anna” in the “To” search box, you can type cc: anna to look for email sent to Anna as a carbon copy (cc) only. Note that you won’t be able to find messages that you received on bcc.

3. Search by time period

You don’t have to remember the exact dates to be able to search for a specific email. With the search operators before: or after:, you can just type the period when the email is sent or received. Don’t forget to use the date format yyyy/mm/dd, otherwise, Gmail wouldn’t get it. By typing after: 2016/07/01 before: 2016/07/15, Gmail will look for emails sent or received between July 1, 2016 and July 15, 2016.

4. Search for read, unread, or starred messages

You can search for messages that are read, unread, or starred by using is:read, is:unread, is:starred. By typing is:read is:starred from:Anna you are searching for messages from Anna that have been read and marked with a star. If you have more than one type of stars (or if you don’t, we suggest you learn how to manage your emails with Gmail’s stars option), you can type has:green-star to search for messages marked with that color.

5. Don’t ignore Spam or Trash

Whether using the simple search box or search operators suggested above, both ignore emails that are in Spam or Trash box. And from time to time, important emails can mistakably be thrown into Trash box for some unknown reasons. Use in:anywhere to look everywhere in your inbox, including those two places, to make sure that no important email has slipped through.

6. Look in the chat box too

We all hate it when our colleagues send important files or message via a chat box. That makes it difficult when searching for them later. But by typing is:chat followed by keywords or name of the person you’re communicating with, you can actually search for messages or files in the chat log. Next time you can tell your colleagues to send vital files or information via proper email instead. But if that still doesn’t work, now you know how to help yourself.

When it comes to managing and sorting through confidential emails in your inbox, no one can do it besides you. Yet there are still the matters of database management and security to take into consideration. Why not outsource those issues to us and enjoy a more carefree communication with your colleagues and customers? Call us today to see what our experts can do for you.

Published with permission from TechAdvisory.org. Source.

Read More