508-909-5961 [email protected]

Windows 10 is back again with more features for you to play with. With the Windows 10 Anniversary Update, changes to Cortana, Microsoft Edge, and many more are coming your way. What are these changes? How will they be useful to you? While we are uncertain if Windows users will be foaming at the mouth […]

2016Apr15_Windows_BWindows 10 is back again with more features for you to play with. With the Windows 10 Anniversary Update, changes to Cortana, Microsoft Edge, and many more are coming your way. What are these changes? How will they be useful to you? While we are uncertain if Windows users will be foaming at the mouth at all of these new features, we can expect that these updates will make your devices easier to manage. Here are a few Windows 10 updates you should keep track of.

Cortana updates

One of Microsoft’s biggest announcements are the changes made to Cortana. Basically, cross-platform support for Cortana allows Android users to receive notifications on any Windows 10 devices and interact with them too. This means alerts from your phone can immediately be transmitted to your Windows 10 tablet or PC and you can send a quick text back, saving you the hassle of having to frequently pull out your phone at work. Even if you have low battery on your mobile devices, with Cortana installed, she’ll warn you on any device.

The update will also enable you to share directions across all devices. If you search up directions on your computer, Cortana will send those same directions to your phone. Additionally, if you ever lose your phone, you can locate it from your PC as long as Cortana is enabled on your phone.

Action center updates

Tired of getting notifications from unimportant applications? With the new Microsoft update, you can now prioritize the levels of notifications you want to see in your Action Center. Simply go to Settings > System > Notifications & Actions then click on a specific app and prioritize its alerts. You can set three levels of priority for each application: Normal, High, or Priority. Now you’ll only receive notifications that are important to you.

Microsoft Edge extensions

Microsoft’s web browsers have always lagged behind more popular browsers like Chrome or Firefox. However, Microsoft is hoping to entice people to use their web browsers by giving Windows users new and updated web extensions like OneNote Clipper and Pin It Button. Add-ons like Microsoft Translator and Mouse Gestures also received new upgrades for you to try out. To access these features, click on the dotted icon on the top right of the screen and select Extensions to find out how you can customize your Microsoft Edge browser.

Pin windows to virtual desktops

A small change for those who have grown accustomed to using virtual desktops at work. Virtual desktops allow you to separate how your windows are organized by creating an entirely new desktop to work with. Many people use this feature to separate their work files from their personal desktop to avoid confusion. The updates made it so that you can pin a window across all your virtual desktops by clicking Show this window on all desktops. What can this feature be used for? Suppose you wanted to have your favorite news website open at work and at home for personal use. With the new update, you avoid having to open another web browser just to access the same site on a different desktop.

Detailed battery use

Detailed battery use will temporarily stop high powered apps from running if your battery power is low. You can have your laptop immediately go to battery saver once it’s reached a certain percentage. Just go to Settings > Battery and slide what battery percentage you consider appropriate to automatically go on battery saver mode.

Customized update settings

Automatic Windows updates can be a real pain during inconvenient times. You’ll be glad to hear that you can now change that by going to Settings > Update & Security > Windows Update. From here you can prevent Windows from automatically updating during business hours.

These are just a few of the exciting changes that are coming for Windows 10 users. We don’t know how many people will utilize these changes but, if we can expect one thing from the Windows 10 Anniversary Update, it definitely aims to make our lives a bit easier. Want to hear more of the latest Windows 10 news and updates? Contact us today.

Published with permission from TechAdvisory.org. Source.

Read More

When most people think of Disaster Recovery, the idea of Virtualization is likely far from mind. However, these two IT services are more closely related than the average business owner thinks. Virtualization can actually serve as Disaster Recovery Solution. Here’s a breakdown of how it does just that, and a few pointers to keep in […]

2016Apr14_Virtualization_BWhen most people think of Disaster Recovery, the idea of Virtualization is likely far from mind. However, these two IT services are more closely related than the average business owner thinks. Virtualization can actually serve as Disaster Recovery Solution. Here’s a breakdown of how it does just that, and a few pointers to keep in mind if you decide to use Virtualization to backup your systems.

As opposed to tape backups, Virtualization reduces recovery time in the event of a disaster. While tape backups can be reliable, using them to fully restore your system after a backup can be an excruciatingly long process. In fact, it can take up to two days to do just that. Think of all the business you could lose in those two days. Think of all the lost money in salaries you’ll pay out out to employees who aren’t working. Simply put, Virtualization is much quicker than tape backups when it comes to Disaster Recovery. Your entire system can be restored in four hours or less. How does this happen? Well, instead of rebuilding your servers, operating systems and applications separately, they exist safely off-site and can be brought back online via your virtual backup.

While the speed of virtualized backups might sound alluring, there are a few key points you should be aware of before moving forward. Here’s what you need to think about:

  • Critical data - where do you want your critical data to be stored? Do you want it stored on tapes? Disk technologies? Or on your virtualized servers? Perhaps it’s best to spread your risk by backing up your critical data to multiple sources because, frankly, your business depends on this data. Regardless, find out what critical data you need to operate your organization and devise a plan to back it up as you see fit.
  • Data to be backed up - Whether or not you decide to store your critical data on your virtual machines, figure out what data and assets you do want stored on them. Then designate specific virtualized servers to store these assets. In case a disaster does happen, you’ll know immediately where your backups live, and can retrieve your data quickly and get your business up and running again fast.
  • Systems to be virtualized - Just as your business has critical data, you also have critical applications. Some of these may include email, Microsoft Office, and applications or software developed in house. Whether or not these applications qualify as critical for your business, identify the ones that do and focus your disaster recovery efforts on them. Like your data and servers, applications can all be virtualized and then safely stored off-site.
If you choose Virtualization as part of your Disaster Recovery solution, make sure your backups are monitored regularly so they’re up-to-date in the event of a disaster. And besides Disaster Recovery, there are many other benefits to Virtualization. Your business can reduce the amount of servers and other hardware in your office, lower your electricity costs, and save money in the process. Consider Disaster Recovery as a nice bonus that’s included with these benefits.

Curious to learn how else Virtualization can benefit your business? Interested in a dedicated Disaster Recovery solution? Call us today and discover how our experts can protect your organization and save you money.

Published with permission from TechAdvisory.org. Source.

Read More

Taking work home, or practically anywhere else, has never been easier. With personal mobile devices, your employees can access company files wherever they are. Bringing your own device (BYOD) has become a popular strategy for many businesses to conduct work more efficiently and flexibly. But this strategy is not without its problems. BYOD, if not […]

2016Apr13_Security_BTaking work home, or practically anywhere else, has never been easier. With personal mobile devices, your employees can access company files wherever they are. Bringing your own device (BYOD) has become a popular strategy for many businesses to conduct work more efficiently and flexibly. But this strategy is not without its problems. BYOD, if not implemented correctly, can make your system susceptible to a number of risks. So what security risks do you have to account for? Here are a few security implications you should keep a close eye on.

Data leakage

The biggest reason why businesses are weary of implementing a BYOD strategy is because it can potentially leave the company’s system vulnerable to data breaches. Personal devices are not part of your business’s IT infrastructure, which means that these devices are not protected by company firewalls and systems. There is also a chance that an employee will take work with them, where they are not using the same encrypted servers that your company is using, leaving your system vulnerable to inherent security risks.

Lost devices

Another risk your company has to deal with, is the possibility of your employees losing their personal devices. When devices with sensitive business information are lost, there is a chance that this could end up falling into the wrong hands. Additionally, if an employee forgets to use a four digit PIN code to lock their smartphone or tablet, anyone can gain unauthorized access to valuable company data stored on that particular device. Therefore, your company should consider countermeasures for lost devices like completely wiping the device of information as soon as an employee reports a missing or stolen phone.

Hackers can infiltrate your system

Personal devices tend to lack adequate data encryption to keep people from snooping. This along with the fact that your employees might not have updated their devices can allow hackers to infiltrate your IT infrastructure.

Connecting to open Wifi spots makes your company more susceptible to hackers. Open wireless points in public places can put device owners at risk because there is a chance that hackers may have created that hotspot to trick people into connecting. Once the device owner has connected, attackers can simply surveil web activity and gain access to your company’s accounts.

Vulnerable to malware

Viruses are also a big problem when implementing BYOD strategies into your business. Using personal devices means your employees can access whatever sites or download any mobile apps that your business would normally restrict to protect your system.

Jailbreaking or rooting a device also puts your systems at risk because it removes limitations imposed by the manufacturer to keep the mobile software updated and protected against external threats. It’s best to understand that as your employees have the freedom to choose whatever device they want to work with, the process of keeping track of vulnerabilities and updates is considerably harder. So if you’re thinking about implementing BYOD strategies to your business, prepare your IT department for an array of potential malware attacks on different devices.

So you might be thinking that it would probably be best to just avoid implementing a BYOD strategy in the first place. However, BYOD will help your business grow and adapt to the modern workplace, and should not be dismissed as a legitimate IT solution. It’s just important to educate your company about these risks so that problems won’t occur for your business down the line.

If you need some help implementing IT security solutions for your company, or if you have any concerns regarding IT, give us a call.

Published with permission from TechAdvisory.org. Source.

Read More

When a new iOS update is released for iPhone, it’s exciting. In fact, you may be so amped that your trigger finger gets the best of you, and the next thing you know you’re saddled with a new iOS that is causing you headache after headache. To avoid this fate, it pays to think wisely […]

2016Apr12_iPhone_BWhen a new iOS update is released for iPhone, it’s exciting. In fact, you may be so amped that your trigger finger gets the best of you, and the next thing you know you’re saddled with a new iOS that is causing you headache after headache. To avoid this fate, it pays to think wisely before updating your iOS and prepare for it accordingly. Here are a few guidelines to follow to ensure your next iOS update goes smoothly.

Decide whether or not to update now

Just because a new iOS update is released doesn’t mean you must install it. In fact, users who do install early are sometimes faced with big headaches as the new iOS goes through technology growing pains. For example in the release of iOS 9.3, many users encountered a bug that caused Safari to lock up when hyperlinks were used to open web pages. Issues like this can cause business owners and general users alike to take a productivity hit. So if you’re heavily reliant on certain iPhone features, it makes sense to do your research before updating to a new iOS and get feedback from users who’ve already upgraded. Apple forums, YouTube and of course a simple Google search can help with this. Oh, and as for that iOS 9.3 Safari bug issue, it’s since been fixed with the release of iOS 9.3.1.

Know your login credentials

When downloading an iOS update, you may be asked for your Apple ID. If and when that time comes, you can avoid scrambling by being prepared with your password beforehand. You should also keep your passwords handy for your favorite applications and services, as sometimes you’re automatically logged out of these when updating your iOS.

Backup your phone

Updating your iOS can be a precarious task. While not something that happens incredibly often, there’ve been cases where users have lost important files or photos. And if you store important business information on your device, you certainly don’t want to lose it during an update. To avoid this, backup your phone beforehand either through iTunes or iCloud.

Power your battery & connect to Wi-Fi

Many users will choose to install new iOS updates Over-the-Air (OTA). This means you’re updating it over Wi-Fi on the settings in your phone rather than via iTunes. If you go this route, there are two things you should be aware of. Your battery must be charged to at least 50% (or be plugged into an outlet) and you can’t start the update through a cellular connection - it must be done through Wi-Fi. The point is, make sure to charge your phone and find a reliable Wi-Fi connection before starting the update process.

If problems occur after update, don’t panic…

After an iOS update, sometimes some very unusual problems occur. While most users will face no issues, others will encounter shorter battery life, unresponsive touch-screens, Wi-Fi problems, and more. If it happens to you, take a deep breath and don’t panic. Know they’re likely answers to your problems already out there on the web. Whatever your unique issue, a quick Google search should turn up multiple resolutions. You can also search the various Apple forums on the web.

Know you can always downgrade...most of the time

If you absolutely hate the upgrade, there’s good news. You can downgrade for a short period of time after an update is released. There is one catch though. You can only downgrade to a select number of previous versions. For example if you recently updated to iOS 9.3.1, you’ll be able to downgrade to iOS 9.2.1 or iOS 9.3. That means iOS 9.1 and earlier users are out of luck and must think carefully before choosing whether or not to upgrade.

While these 6 tips can be useful for the current iOS 9.3.1 update, you can also return to them for future iOS updates as general guidelines that apply. If you’re searching for more iPhone tips or need assistance with any Mac products, drop us a line today.

Published with permission from TechAdvisory.org. Source.

Read More