Avoid Data Loss in Office 365

Microsoft understands the value of business data and the costly repercussions of losing it. That’s why they’ve released a slew of security and compliance tools for Office 365 subscribers. But given the increasing sophistication and frequency of data breaches, these cloud security solutions aren’t enough to protect your files. You’ll need to follow these seven security tips to prevent data loss in Office 365.

Take advantage of policy alerts
Establishing policy notifications in Office 365’s Compliance Center can help you meet your company’s data security obligations. For instance, policy tips can warn employees about sending confidential information anytime they’re about to send messages to contacts who aren’t listed in the company network. These preemptive warnings can prevent data leaks and also educate users on safer data sharing practices.

Secure mobile devices
Since personal smartphones and tablets are often used to access work email, calendar, contacts, and documents, securing them should be a critical part of protecting your organization’s data. Installing mobile device management features for Office 365 enables you to manage security policies and access permissions/restrictions, and remotely wipe sensitive data from mobile devices if they’re lost or stolen.

Use multi-factor authentication
Don’t rely on a single password to safeguard your Office 365 accounts. To reduce the risk of account hijacking, you must enable multi-factor authentication. This feature makes it difficult for hackers to access your account since they not only have to guess user passwords, but also provide a second authentication factor like a temporary SMS code.

Apply session timeouts
Many employees usually forget to log out of their Office 365 accounts and keep their computers or mobile devices unlocked. This could give unauthorized users unfettered access to company accounts, allowing them to steal sensitive data. By applying session timeouts to Office 365, email accounts, and internal networks, the system will automatically log users out after 10 minutes, preventing hackers from opening company workstations and accessing private information.

Avoid public calendar sharing
Office 365’s calendar sharing features allow employees to share and sync their schedules with their colleagues. However, publicly sharing this information is a bad idea because it helps attackers understand how your company works, determine who’s away, and identify vulnerable users. For instance, if security administrators are publicly listed as “Away on vacation,” an attacker may see this as an opportunity to unleash malware on unattended computers.

Employ role-based access controls
Another Office 365 feature that will limit the flow of sensitive data across your company is access management. This lets you determine which user (or users) have access to specific files in your company. For example, front-of-house staff won’t be able to read or edit executive-level documents, minimizing data leaks.

Encrypt emails
Encrypting classified information is your last line of defense to secure your data. If hackers intercept your emails, encryption tools will make files unreadable to unauthorized recipients. This is a must-have for Office 365, where files and emails are shared on a regular basis.

While Office 365 offers users the ability to share data and collaborate, you must be aware of potential data security risks at all times. When you work with us, we will make sure your business keeps up with ever-changing data security and compliance obligations. If you need help securing Office 365, we can assist you, too! Contact us today for details at 800-421-7151.

Browser Security for Business Data

The internet isn’t for the naive. It’s a wild place of dangerous creatures like polymorphic viruses, ransomware, scammers, and malicious hacker organizations. As  any business owner today would know, data is everything. If you or your employees browse the net unprotected, this valuable resource is threatened by cyber criminals on the lookout for easy targets. One way to protect your business’ data is to secure your browsers. It is easy enough for every small- and medium-sized business to do.

Data stored on desktops, servers and in the cloud, doesn’t make it safe. If anything, it makes it available to anyone who has the desire and capabilities to hack into your system and cause mayhem for your business operations.

One thing you should be doing to protect your data – and your company – is to make use of privacy-protecting browser extensions. Depending on the nature of your business, both you and your employees are likely to be online at least some, if not all, of the working day. What are some of the browser extensions that can make the experience more secure?

Prevent browser tracking

If you don’t like the idea of a third party (reputable or otherwise) being able to track your browsing habits, try installing a tool for private browsing. These programs offer protection against tracking by blocking third-party cookies as well as malware. Some extensions also boast secure Wi-Fi and bandwidth optimization and can guard against tracking and data collection from social networking sites such as Twitter, Facebook or Google+.

Blocking adverts

While online ads may seem harmless, the truth is they can contain scripts and widgets that send your data back to a third party. A decent ad blocking program will block banner, rollover and pop-up ads, and also prevent you from inadvertently visiting a site that may contain malware.
Many blockers contain additional features such as the ability to disable cookies and scripts used by third-parties on a site, the option to block specific items, and even options to ‘clean up’ Facebook, and hide YouTube comments. The major blockers work with Google Chrome, Safari, and Firefox and you’ll be able to find everything from user-friendly solutions to more advanced tools that are customizable down to the tiniest degree.

Consider installing a VPN

Unfortunately, browser tracking, malware, and adware are not the only internet nasties that you need to be concerned about. but the good news is that there a number of other extensions that you can download to really get a grip on your online safety. A VPN (Virtual Private Network) is something else to consider. VPNs encrypt your internet traffic, effectively shutting out anyone who may be trying to see what you’re doing.

Commonly used in countries where the internet is heavily censored by the powers that be, a VPN allows for private browsing as well as enabling users to access blocked sites – in China’s case that’s anything from blogs criticizing the government to Facebook and Instagram. There are hundreds of VPNs on the market so do a little research and find one that suits you best.

Finally, it goes without saying that having anti-virus and anti-malware software installed on your PC, tablet, and even your smartphone is crucial if you want to ensure your online safety.

Is browsing at your workplace secure? Would you like a more comprehensive security system for your business? We can tell you all about it and help your business protect itself from online threats. Get in touch with us today at 800-421-7151.

5 Cloud Security Tips for Business Owners

Cloud computing marketing can be deceiving. When you see an image of the cloud, it’s often a happy, bubbly, white puffball floating delightfully in front of a blue sky background. Its presence is both calming and reassuring, which makes you believe that anything is possible. Security would never be an issue, right? Ask one of the nearly seven million Dropbox users who had their accounts hacked, and they’ll give you a definitive answer. Sure, not every cloud provider has had security breaches, but that doesn’t mean we can take cloud security lightly. Here’s what you can do to protect yourself as a business owner.

Ask your IT provider what cloud security policies they have in place

This is probably the single most important security measure you can take. Find a trusted IT provider and have a candid conversation with them about their cloud security policies.

Ask about Security Training

The number one point for anything security related is user training. A Smart user is 90% of the way there to protecting themselves.  You can have all the browser extensions and ad blockers you want but if the plugins are out of date or compromised it might make things worse.   The content of this document, and all the other emails and blog entries you send out are helping to Train the user.  A Smart user will understand why and how to use the technology to help protect themselves and the company.

Ask where the physical cloud servers are located

When you have “the conversation,” don’t forget to ask about this. Believe it or not, some cloud servers may not even be located in your own country. Wherever they are, it’s wise to make sure they’re located in a safe data center with proper security afforded to them. Otherwise depending on your type of business you may be out of compliance with regulations such as Sarbanes-Oxley.Create unique usernames and passwords

Your login credentials represent one of the cloud’s main security vulnerabilities. Think of a better password than “12345” or “football.”

Use industry standard encryption and authentication protocols

AES (Advanced Encryption Standard), IPsec (Internet Protocol Security) and EAP (Extensible Authentication Protocol) are reliable technologies. IPsec is primarily used for a secure VPN connection.

Encrypt data before it’s uploaded to the cloud

Encryption is a must, and can be done by you or your cloud service provider. Should hackers manage to access your data, they’ll find it useless because they can’t make heads or tails of it.

When it comes to trusting the security protocol of a cloud service provider, transparency is key. They should take security seriously, be able to explain their security policies clearly, and be willing to answer any questions. If they can’t do one of these, that’s a red flag telling you to find another vendor.

Are you ready to talk cloud security and transition your business into the cloud? Call us today at 800-421-7151. We’re happy to answer all your questions.

5 Proactive Defenses Against Cyber Attacks

As IT security consultants, we’re stuck between a rock and a hard place. Managed IT services providers (MSPs) such as ours want to provide clients with enterprise-level IT, but that requires that we specialize in overwhelmingly intricate technology. Explaining even the most fundamental aspects of cybersecurity would most likely put you to sleep instead of convince you of our expertise. But if there’s one topic you need to stay awake for, it is proactive security.

Understand the threats you’re facing

Before any small- or medium-sized business (SMB) can work toward preventing cyberattacks, everyone involved needs to know exactly what they’re up against. Whether you’re working with in-house IT staff or an MSP, you should review what types of attacks are most common in your industry. Ideally, your team would do this a few times a year.

Reevaluate what it is you’re protecting

Now that you have a list of the biggest threats to your organization, you need to take stock of how each one threatens the various cogs of your network. Map out every company device that connects to the internet, what services are currently protecting those devices, and what type of data they have access to (regulated, mission-critical, low-importance, etc.). You should never spend more money than the vault of the asset or data that you are protecting.

Create a baseline of protection

By reviewing current trends in the cybersecurity field and auditing your current technology framework, you can begin to get a clearer picture of how you want to prioritize your preventative measures versus your reactive measures.

Before you can start improving your cybersecurity approach, you need to know where your baseline is. Devise a handful of real-life scenarios and simulate them on your network. Network penetration testing from trustworthy IT professionals will help pinpoint weak spots in your current framework.

Finalize a plan

All these pieces will complete the puzzle of what your new strategy needs to be. With an experienced technology consultant on board for the entire process, you can easily synthesize the results of your simulation into a multi-pronged approach to proactive security:

  • Security awareness seminars that coach all internal stakeholders – train everyone from the receptionist to the CEO about effective security practices such as password management, proper mobile device usage, and spam awareness
  • Front-line defenses like intrusion prevention systems and hardware firewalls – scrutinize everything trying to sneak its way in through the borders of your network
  • Routine checkups for software updates, licenses, and patches – minimize the chance of leaving a backdoor to your network open
  • Web-filtering services – blacklist dangerous and inappropriate sites for anyone on your network
  • Updated antivirus software – protect your data and systems against the latest and most menacing malware
  • Physical Access – minimize your risk by restricting physical access to network critical devices such as servers and switches behind a locked server closet.

As soon as you focus on preventing downtime events instead of reacting to them, your IT infrastructure will increase your productivity and efficiency to levels you’ve never dreamed of. Start enhancing your cybersecurity by giving us a call at 800-421-7151 for a demonstration.

Office 365 Stops Billions of Phishing Emails

Sending phishing emails is the most common method hackers use to distribute malware and steal information. In fact, there are billions of phishing emails sent every year, and millions of people keep falling for them. However, if you’re subscribed to Office 365 there’s a good chance that you won’t see harmful messages in your inbox, and here’s why.

Effective anti-phishing solutions must be able to recognize the key elements of a phishing attack, which includes spoofed (or forged) emails, compromised accounts, unsafe links, and harmful attachments. In April 2018, Microsoft upgraded Office 365’s Advanced Threat Protection (ATP) features so it can better detect these elements and prevent a wide variety of phishing scams. These enhancements include:

  • Anti-impersonation measures – ATP will now look for potential phishing indicators in an email, including the sender’s address, name, and links, to identify whether the user is being impersonated. You can specify high-profile targets within your organization, such as managers and C-level executives, so Office 365 can protect these users from email impersonation. Office 365 also utilizes machine learning to analyze a user’s email patterns and flag suspicious contacts that have had no prior correspondence with your company.
  • Anti-spoofing technology – This feature reviews and blocks senders that disguise their true email address. You can even enable safety tips that flag certain email domains that have strange characters. For instance, if your real domain is Acme.com, a spoofed domain could be Acḿe.com.
  • Email link scanning – Office 365 launched Safe Links, which scans emails for fraudulent links and redirects users to a safe page in case it does contain harmful materials. This feature also applies to email attachments, ensuring you’re protected against all types of phishing scams.

Due to these improvements, Office 365 had the lowest phish rate among other well-known email services between May 1 and September 16, 2018. The company has stopped over five billion phishing attempts and protected users against seven billion potentially malicious links. If you’re looking for a secure email platform, Office 365 is the best option for your business.

That said, it’s not a substitute for good security awareness. No matter how secure Office 365 is, employees still need to be adequately trained to recognize a phishing email when they see one. Hackers are constantly changing their tactics to evade Office 365’s detection systems, so it’s important that everyone is alert at all times.

If you need a well-fortified email service, we can implement and manage Office 365 for you, and include Mimecast for extra protection. We even offer practical security advice to make sure your business, employees, and assets are safe and sound. Contact us now at 800-421-7151.

Keep the Cloud Affordable with These Tips

Small and medium sized businesses and firms globally are adopting cloud technologies. However, there are hidden costs that some business owners might not be aware of. They might not seem like much at first, but those costs could eventually snowball. Follow these five tips to keep the cloud from breaking the bank:

No standalones

Cloud services come in various shapes and sizes, many of which are standalone platforms with rates that increase over time. Opt for a service provider that offers a suite of products that all work together. They are often less expensive than a group of standalone products. Another benefit of working with a cloud provider is that you receive a single point of contact to resolve your issues quickly and effectively.

Experience matters

If you plan on integrating a standalone cloud service into your system, make sure you hire an experienced integration consultant to facilitate a smooth transition. Integration mishaps can cause serious downtime and cost a lot of money.

Backups are important

Unnecessary or inefficient backups will waste cloud storage space. Examine your cloud storage data by asking the following questions:

  • How many versions of this data do I need to store long-term? The more versions you store, the more it costs. This is known as Recovery Point Objective or RPO which is determined by looking at the time between data backups and the amount of data that could be lost in between backups.
  • What regulatory demands do I need to meet? Some data may need to be accessible for up to three years, whereas other data can be deleted after 30 days.
  • How quickly do I need to access my backups? If it can wait for a day or two, archive that data to a less expensive service or offline at the provider’s data center. This is known as RTO, or Recovery Time Objective, which is the target time you set for the recovery of your IT and business activities after a disaster has struck.

Remove users

Many cloud service providers charge by the number of users in your system. By neglecting to manage the list of users, you could end up paying for people who no longer work for you. Implement processes that remove users when they are terminated and consider scheduling a regular audit. Ideally, this should be once every six months to a year, to ensure your cloud user list is up-to-date.

Monitor proactively

Ask your cloud provider whether they can proactively monitor your account and notify you of potential issues before they cause problems. This is especially important if you have a pay-as-you-go license that charges based on resource or storage consumption.

Utilizing the right technology resources is vital to your business’s success, and so is knowing how to prevent them from racking up an overwhelming monthly bill. If you wish to enjoy all the benefits of cloud computing without breaking the bank, give us a call at 800-421-7151 and we’ll be happy to help.

Is CRM Software Essential to your Business?

The right technology investment can lead to business success. With customer relationship management (CRM) software at the helm of your sales and marketing efforts, you can nurture long-lasting business relationships and improve your bottom line. If you need more convincing, we’ve compiled five more reasons why your business needs CRM.

Grows with your business

The ol’ Rolodex may have been useful for managing a few clients, but you’ll need a much better solution if you plan to maintain relationships with hundreds, possibly thousands, more. CRM scales with your business, meaning it can handle larger data sets and more clients as you expand your sales operation.

Organizes your data

CRM software acts as a central database for all your sales records and transactions. This means important customer information can be retrieved in just a few clicks rather than by rifling through thousands of documents, sticky notes, and disorganized cabinets. And since CRM is hosted in the cloud, sales data, customer interactions, and other actionable information are available for the entire company.

Improves customer service

Your sales team could be the most persuasive individuals in the world, but this means nothing if they can’t recall anything about their clients and their preferences. When your sales staff follows up on leads or existing customers, CRM will automatically retrieve contact history, past purchases, and customer preferences from your client database and display them on a single page during the call.

Armed with detailed customer information, sales representatives will be able to recommend products and services that meet the client’s needs. So instead of struggling through a sales call, marketing employees can focus on delivering a professional sales pitch.

Streamlines your sales funnel

CRM comes equipped with workflow management functions, supporting your sales pipeline in a number of ways. For example, you can configure your CRM to send instant follow-up emails when a lead visits a particular product page. You can even use automation to track where certain leads are in the sales pipeline and delegate the task to one of your sales closers.

Analyzes sales data

With real-time sales information, business managers can track marketing campaigns and adjust their strategy accordingly. For instance, you might notice that click-through-rates for promotional emails and company newsletters are higher during Tuesday afternoon than Friday night. Having this information can help you focus your marketing efforts and message to generate more leads.

In addition, you can use CRM to analyze customer calling activity, market demographics, lead conversion rates, and key performance indicators to influence future business decisions.

Understanding your customers can put you several steps ahead of the competition. If you need to manage contacts, eliminate time-consuming procedures, and improve your sales performance, CRM is the perfect business solution.

Contact us today to find out whether CRM is the right fit for your business.

 

What is App Virtualization?

Small- or medium-sized business (SMB) owners may be overwhelmed by their company’s IT demands. Fortunately, virtualization services are giving them a fighting chance to stay on top. Some technology vendors even recommend app virtualization services because many SMBs use it. Learn if it’s right for you by understanding the basics.

What are non-virtualized apps?

To understand app virtualization, first you need to understand how non-virtualized apps are installed.

When you install an application like Skype or Slack onto a computer, the installer program puts most of the files required for the app to run on your hard drive’s Program Files folder. This process is usually fine for personal use but may become problematic if you install similar apps on your device.

For instance, if two similar apps are installed on the same file destination, there’s a chance that they might conflict with each other and inevitably crash. Likewise, if you uninstall a program without knowing that it shares important files with another application, you run the risk of breaking the other one.

The solution to this is app virtualization.

What is app virtualization?

App virtualization involves running a program in an environment separate from the physical server, allowing you to run programs that are normally incompatible with a certain operating system (OS). In other words, virtualized apps trick your computer into working as if the application is running on a local machine, but in fact, you’re actually accessing the app from somewhere else.

Advantages of app virtualization

App virtualization offers numerous advantages for SMBs, including:

  • Quick installation times and less money spent on local installation
  • Allowing incompatible applications to run on any local machine. For instance, if your laptop is dated and can’t run the latest apps on its own, you can lighten the load on your CPU by accessing virtualized apps instead.
  • Mac users can run any Windows apps if your company’s local server runs Windows OS.
  • Applications on your computers won’t be in conflict with each other since virtual apps are installed in a separate location.
  • Upgrading is easy because your IT team won’t have to upgrade applications in individual desktops, they just have to upgrade the virtual application within the company’s local server.
  • Applications can be accessed from any machine, allowing your employees to work from home or on the go if they choose to.

Things to consider

Before you start deploying app virtualization solutions, you need to have a stable network connection so users can smoothly stream apps. Note that some apps like antivirus programs are difficult to virtualize since they need to be closely integrated with your local OS.

Virtualizing a workplace is no easy task, and that’s where we come in. If you’re convinced that your company can benefit from app virtualization, get in touch with our IT experts today.

Be Aware of these 4 Types of Hackers

Hackers come in all shapes and sizes. From kids wanting to gain notoriety on the internet to political groups trying to send a message, the motives for a cyberattack vary widely. So how can you protect yourself? It all starts with getting to know your enemy a little better. Here’s a profile of four different types of hackers.

Script Kiddies

Skill-wise, script kiddies (or skids, for short) are at the bottom of the hacker totem pole. Their name comes from the fact that they use scripts or other automated tools written by others. Most of the time, script kiddies are young people on a quest for internet notoriety. Or, more often than not, they’re simply bored and in search of a thrill. Many never become full-time hackers; in fact, many script kiddies end up using their skills for the greater good, working in the security industry.

Though lacking in hacking know-how, script kiddies shouldn’t be dismissed so easily, as they can cause businesses much damage. In May 2000, for instance, a couple of skids sent out an email with the subject line “ILOVEYOU” and ended up causing a reported $10 billion in lost productivity and digital damage.

Hacktivists

Hacktivists are primarily politically motivated, and they often hack into businesses and government systems to promote a particular political agenda or to effect social change. These so-called “hackers with a cause” steal confidential information to expose or simply disrupt their target’s operations.

If you’re a small- or medium-sized (SMB) owner, don’t think for a second that you’re immune to hacktivist attacks. This is especially true if your company is associated or partnered with organizations that are prime hacktivist targets. Or, if your business provides services that can be seen as unethical, you may targeted by hacktivists as well.

Cybercriminals

When a hacker breaks into digital systems or networks with malicious intent, they are considered a cybercriminal. Cybercriminals target everyone from individuals to SMBs to large enterprises and banks that either have a very valuable resource to steal or security that is easy to exploit, or a combination of both.

They can attack in a number of ways, including using social engineering to trick users into volunteering sensitive personal or company data, which they can then sell in underground markets in the dark web. They can also infect computers with ransomware and other malware, or use digital technology to carry out “conventional crimes” like fraud and illegal gambling.

Insiders

Perhaps the scariest type of hacker is the one that lurks within your own organization. An insider can be anyone from current and former employees to contractors to business associates. Oftentimes their mission is payback: to right a wrong they believe a company has done them, they’ll steal sensitive documents or try to disrupt the organization somehow. Edward Snowden is a prime example of an insider who hacked his own organization — the US government.

Now that you know what motivates your enemy, and you think you might be a target, it’s time to secure your business from the different types of hackers out there. Get in touch with our experts today to learn how.

Forget These Disaster Recovery Myths

Disaster recovery (DR) isn’t what it used to be. Long gone are the days when a DR solution cost over a hundred thousand dollars and relied predominantly on tape backups. Cloud computing has dramatically changed the DR landscape. Unfortunately, there are still many misconceptions about DR. Here are a few of the myths that no longer apply.

Tape Backups are the Best DR Solution
Backup tapes are physical objects that deteriorate over time. Don’t believe us? Try listening to a cassette tape from the ‘90s. Over time, tape backups become distorted and stop working. Deterioration is slow and may only affect some files in the early stages, so don’t settle for a mere cursory check. Tape backups are not the best for DR solutions, but they are an excellent price for offline storage. Super DLT Tape II can store up to 600GB of data and has a shelf life of 30 years if stored in the right environment; much longer than any backup medium.

Aside from backups in your office, another set of tape backups needs to be stored outside your premises. In case a natural disaster damages your office, not all your data will be wiped out. But if your storage space isn’t safe from the elements, this could also be a problem.

BUT,  a cloud backup solution is a much better DR solution.  The backups are always available,  online and ready when you need them for the disaster.  The right DR solution can get you back online in minutes, while the tape backups take much longer to restore data.   A Tape backup is not a good DR solution. Unlike tape backups, a cloud-based backup saves you time. Data is automatically backed up online, and you don’t need to spend time managing boxes of tapes. Your time is better spent on your assigned tasks, not IT management.

The RTO you want will be too expensive
Recovery time objectives (RTO) are essential to any DR plan. You need to get everything up and running again as quickly as possible to avoid serious losses. In the days before the cloud, a swift recovery time could cost you well into six figures. Today, cloud and virtualization solutions have made this much more affordable, and faster than ever before.

Most DR providers can back up your critical data in an hour or two. And if you ever need to recover it, most services can do so in less than a day. That’s the power of the cloud. And when it comes to DR, it truly has changed everything.

Disaster recovery is for big business, not SMBs
The cloud has made this valuable service affordable for businesses of all sizes. From dental offices to small retail operations, SMBs can now take advantage of the best DR solutions on the market. Advances in IT and the cloud have eliminated the obstacles of complexity, costs, and insufficient IT resources.

We hope that by dispelling these myths, we’ve demonstrated to you that disaster recovery is more affordable and efficient than ever. If you’d like to learn how our DR solutions can safeguard your business, send us a message at info@wamsinc.com or call us at 800-421-7151 and we’ll gladly fill you in.

Which Business Computers are Best?

We know that IT plays a big role in reaching your small- and medium-sized business (SMB) milestones. When it comes to hardware, you don’t need to be an IT expert to find the best possible solution. Here’s a concise and helpful guide to the best hardware for your firm.

Portability

Laptops allow you to keep working when you don’t have an electrical outlet. However, this ability to take your work anywhere can be counterproductive by creating more stress on employees who think they must work all the time.

Memory/Speed

Desktop computers used to have more memory and faster processors than laptops. And although high-powered laptops have caught up, they are more expensive. If work is limited to word processing and emailing, affordable less-powerful laptops should be enough. Anything more will probably require a desktop machine.

We also recommend SSD hard drives to increase speed. These offer a huge increase in performance and should be considered for desktops and laptops.  Most modern laptops will come with a SSD, but they do cost a bit more.

Security

Data security is necessary not only against data leaks but as protection from litigation, reputation damage, and loss of business. With a network security system and IT staff, vulnerabilities are easier to address for desktop computers within office premises. They’re also less likely to be stolen.

For laptops, however, mobility makes them more vulnerable. Data loss is a real risk as laptops may be connected to unsecured networks and hotspots or be lost or stolen. You should consider hard drive encryption.  This way if the laptop is stolen the thief won’t be able to access anything on the laptop without the encryption password. Given the fact that they are so much smaller and more portable, keep in mind that laptops are also much easier to steal. NEVER and we mean NEVER leave your laptop in your car. Protecting your laptops require special safeguards, and consequently more time and money.

Price

Laptops and desktops come in varying prices according to preferences. On the cheaper end of the price range spectrum, there are notebook-style laptops that are limited to word processing and web browsing capabilities. Desktops have affordable equivalents as well. The deciding factor when it comes to price is your IT service provider or hardware supplier. With the right partner, you should be able to get a good bulk deal on powerful but affordable desktops or laptops.

Longevity

Laptop computers may provide the convenience of mobility, but it’s much harder to upgrade their components as they get older. Laptops are also easier to drop or damage and more expensive to replace or repair. Being in a fixed location, desktops are less prone to this. And unlike laptops, many desktops are not always pre-assembled. Many desktops can be custom built with parts that are easily removed, replaced, or upgraded. You should also consider hard drive encryption.  This way if the laptop is stolen the thief won’t be able to access anything on the laptop without the encryption password.

Final Recommendation

A growing company really needs a combination of both types of computers. However, a desktop computer will be generally more reliable for the fledgling company owner. Laptops should be added as budget permits to provide that extra portability and convenience, especially for managers who work remotely.

If you have other questions regarding enterprise hardware, give us a call at 800-421-7151. We’d be happy to recommend the best solution according to your company’s business needs and objectives.

4 Social Engineering Scams to Watch Out For

Experts are constantly creating new security systems to protect individuals and businesses from hackers. From those who want to attend popular events like the Olympics to avoiding an angry boss, hackers are preying on gullible victims to circumvent network security systems and steal sensitive information. If you don’t want to be the next victim, read about the most common social engineering scams here.

Phishing

This is the most frequently used social engineering attack, especially against small businesses. Check out these frightening statistics:

How is phishing carried out? Criminals make use of emails, phone calls, or text messages to steal money. Victims are directed to phony websites or hotlines and are tricked into giving away sensitive information like names, addresses, login information, social security, and credit card numbers.

To protect yourself, be wary of emails from people you don’t know that offer you a prize, come with attachments you didn’t request, direct you to suspicious sites, or urge you to act quickly. Phishing emails usually appear to come from reliable sources, but they are wolves in sheep’s clothing.

One of the most infamous and widespread examples of phishing was during the 2016 Summer Olympics in Rio, where victims received fraudulent emails for fake ticketing services that stole their personal and financial information.

Be aware of Whaling as well. Whaling and Phishing are both very similar:

Phishing is more automated, hoping you go to their fake website and type a real username/password so they can access your data.

Whaling is the same thing, but a real person is behind the email making it look legitimate and harder for filters to block it. They often ask for bank transfers or something similar. They will also respond quickly if you respond to the email to start a conversation and suck you in.

Tailgating

What’s the fastest and easiest way for criminals to enter a secure office? Through the front door, of course! Tailgating happens when an employee holds the door open for strangers and unauthorized visitors, allowing them to infiltrate an organization. This simple act of kindness enables fraudsters to enter restricted areas, access computers when no one is looking, or leave behind devices for snooping.

Quid pro quo

Here, scam artists offer a free service or a prize in exchange for information. They may lure their victims with a gift, concert tickets, a T-shirt, or early access to a popular game in exchange for login credentials, account details, passwords, and other important information. Or hackers may volunteer to fix their victims’ IT problems to get what they want. In most cases, the gift is a cheap trinket or the tickets are fake, but damages from stolen information are all too real.

Pretexting

Fraudsters pretend to be someone else to steal information. They may pose as a telemarketer, tech support representative, co-worker, or police officer to fish out credit card information, bank account details, usernames, and passwords. The con artist may even convince the unsuspecting victim to apply for a loan over the phone to get more details from the victim. By gaining the person’s trust, the scammer can fool anyone into divulging company secrets.

Also, and we cannot emphasize this enough, be aware of shoulder surfing. Shoulder surfing happens when someone is standing over your shoulder and watching the keystrokes that you enter while typing your password. Often this happens fairly quickly, and you may not even notice it. We all know that if someone obtains your password, they have access to your entire online life; keep an eye out for people nearby when typing in your passwords.

In spite of the many security measures available today, fraudsters and their social engineering schemes continue to haunt and harm many businesses. Thus, it’s best to prepare for the worst. To protect sensitive information, educate yourself and be careful. Remember: If anything is too good to be true, it probably is!

To shield your business from social engineering attacks, don’t take chances! Get in touch with us today by calling 800-421-7151.

4 Questions You Should Ask Any IT “Expert” Before Letting Them Touch Your Network

As businesses have become ever more dependent on technology, IT services providers have been popping up left and right. They’ve all got different strengths, capabilities and price points to consider. Some charge you by the hour and, while available to address any concerns you may have, they are pretty hands-off. Others are working on your network around the clock but charge more in turn. Many may boast an impressive record when working with a broad range of companies, but lack the experience necessary to understand the ins and outs of your specific industry. Some cost way too much month-to-month, while others try the “bargain bin” approach, but as a result, can’t afford to field the staff needed to respond to issues in a timely fashion.

There’s certainly a lot to consider when looking for an IT services provider for your business. And if you’re not particularly knowledgeable about information technology yourself, it can sometimes feel like you’re going into the process blind.

To suss out whether an IT company will mesh with your business’s workflow and industry specific requirements, it’s important to vet them thoroughly. The key is to ask the right questions. Here are four that will allow you to zero in on any IT company’s priorities and strengths, and help you determine whether or not they are a good fit for your organization.

1.DO YOU TAKE A PROACTIVE OR ‘BREAK-FIX’ APPROACH TO IT?

When your car breaks down, you take it to the shop and you get it fixed. The mechanic charges you for the work done and for the parts, and then sends you on your way. Many business owners consider their computer network to be the same kind of deal. Why not just wait until an outage happens and then call up somebody who charges by the hour to fix it? That way, they imagine, they won’t be paying for “extra” services they think they don’t need.

But unfortunately, unlike your car, when your network is out, you’re losing dollars every single minute. The

cost of a network outage is difficult to overstate – not only will it bring your business to its knees while it’s out, but it’ll frustrate customers and employees and result in a cascading set of problems.

Instead of a “break-fix” technician on hand, you need a managed IT services provider. These experts work directly with your company to optimize your network and its security at every turn, and are available nearly any time to address your concerns. And they’re genuinely invested in providing the best service possible, since it’s in their best interest as well.

2. WHAT IS YOUR GUARANTEED RESPONSE TIME?

We’ve all needed something fixed before and had to wait for hours, days or even weeks before anyone bothered to come by and solve the problem. Don’t let that happen to your business. If a company can’t guarantee a response time, it’s probably not a company you want to be working with.

3. WHAT WILL COST ME EXTRA?

This question is particularly important if you’re looking at a managed services provider (which you should be). The last thing you need is for a crisis to strike, only to discover you need to shell out a bunch of surcharges to get your network back up and running. Make sure the costs and services included are crystal clear before you sign anything.

4. HOW MUCH EXPERIENCE DO YOU HAVE?

As scrappy as the “new kid on the block” may be, you don’t want them in charge of one of the most important aspects of your business. Make sure any IT professionals you do business with have extensive experience not only in IT, but in your particular industry as well. That way they’ll know exactly what to do to optimize processes and keep your data under lock and key.

If you feel that your IT company is not transparent about all of this, it may be time to look elsewhere. Call us at 800-421-7151 today with any questions and you will receive only the most honest answers from account managers who are more than happy to help!

A Quick Guide to Choosing a Mouse

The good ol’ two-button mouse just won’t cut it anymore. They’re unresponsive, uncomfortable, and the cord somehow ties itself up every time you put it in your bag. However, buying a new mouse can be confusing, so if you’re having difficulty picking the right one, here are some things you should keep in mind.

Cable or wireless?

Choosing between a wired or a wireless mouse is a factor you have to consider if you’re planning on purchasing a new mouse. Wireless mice are generally more comfortable since your range of movement isn’t limited by a cable and they’re usually travel friendly. However, they tend to be less responsive, which can be frustrating.

In some cases, wireless mice can also interfere with other wireless devices nearby, and most require batteries, which can create problems when they run out of juice. And, if you use the same mouse for both work and home, you run the risk of losing the tiny USB receiver for your wireless mouse when you travel.

On the other hand, wired mice are cheaper and easy to plug-and-play. The only problem you’ll have to worry about is dealing with tangled wires. So when you’re deciding on a new mouse, think about whether you’re looking for comfort or convenience. Always keep in mind that wireless mice tend to be slightly heavier due to the battery that must be included to keep it running. It may not seem like much, but it will affect the way you work with it. If you have sensitive wrists or are prone to carpal tunnel, you may want the lightest mouse possible.

Ergonomics matters

You’re going to be using the new mouse for a while, so it’s important to choose one that feels comfortable in your hands. When deciding on the right mouse, focus on the size and the grip of the device. The size of the mouse usually comes down to hand size. For example, someone with smaller hands might find larger mice quite unwieldy.

Certain mice can also accommodate different types of grips — fingertip grip, palm grip, and claw grip. Users who want high-precision control of their cursor should opt for a mouse with fingertip grip, those needing comfort should get a palm grip mouse, and if you want both control and comfort, the claw grip mouse is the way to go. Another feature to be mindful of is the side scrolling wheel; this may be beneficial if you work frequently with large excel spreadsheets and pivot tables as this makes navigating through them much easier.

DPI (dots per inch)

Higher sensitivity is necessary for precise mouse movements, especially if you’re editing images, videos, or audio files. Mice with 1200 DPI or greater guarantee finer control.

Although mouse specifications like DPI might be the last thing on your mind when it comes to buying new hardware, your comfort is important. A good mouse with the right fit can make you more efficient and reduce the risk of injury.

If you need assistance setting up the best hardware for your company, give us a call at 800-421-7151. We’re happy to help.

Master Microsoft Excel with these 3 Tips

Digital literacy is all about mastering essential computer skills like navigating search engines and word processors. But one of the most crucial you need to learn is Excel. Check out these tips to be an Excel master.

Pie and Sunburst Charts

Everyone knows that bombarding stakeholders with endless numbers and decimal points is the wrong approach. You need to compile data and develop comprehensive pie or sunburst charts to make life easier for clients and investors.

Here’s how to create a pie chart:

  1. Select your data.
  2. Click on the Recommended Charts tool to see different style chart suggestions for your data.
  3. Click on the Chart StylesChart Filters, or Chart Elements button in the upper-right corner of the chart to personalize its overall look or add chart elements, such as data labels or axis titles.

Steps to create a sunburst chart:

  1. Select all your data.
  2. Click Insert > Insert Hierarchy Chart > Sunburst.
  3. Go to the Design and Format tabs to tailor its overall look.

Pivot Tables

Pivot Tables might be one of the most powerful yet intimidating data analysis tools in Excel’s arsenal. It allows you to summarize huge chunks of data in lists or tables without using a formula. All you need to do is to:

  1. Select the data, which must only have a single-row heading without empty columns or rows.
  2. Click Insert > PivotTable.
  3. Under Choose the data that you want to analyze, click Select a table or range.
  4. In the Table/Range box, validate the cell range.
  5. Under Choose where you want the PivotTable report to be placed, click New worksheet, or Existing worksheet and enter the location where you want to place the PivotTable.

Conditional Formatting

This tool highlights essential information within your dataset. For instance, you’re presenting the latest numbers on project efficiency and you use Conditional Formatting to highlight any number lower than 80%. The highlighted data will capture the audience’s attention, allowing them to identify the bottlenecks in your projects. To customize how the data is displayed, simply:

  1. Select the cell.
  2. Click Home > Conditional Formatting.
  3. Click Format.
  4. Change your formatting preference in the Color or Font style box.

Excel is one of the most commonly used business software on the market, yet not everyone knows how to fully utilize it. If you want to learn more about other handy Excel features, give us a call today at 800-421-7151 and we’ll elevate your user status from beginner to pro with some training!

5 Simple but Effective Cybersecurity Tricks

Can you name five cybersecurity best practices? Most people can’t, and few of those who can, actually follow them. Unfortunately, cyberattacks are far too common to be lax about staying safe online. Your identity could be stolen, or even worse, you could expose private information belonging to your company’s clients. There are many ways you can protect yourself, but this list is a great starting point.

1. Multi-factor authentication (MFA)

This tool earns the number one spot on our list because it can keep you safe even after a hacker has stolen one of your passwords. That’s because MFA requires more than one form of identification to grant access to an account.

The most common example is a temporary code that is sent to your mobile device. Only someone with both the password and access to your smartphone will be able to log in. Almost any online account provider offers this service, and some let you require additional types of verification, such as a fingerprint or facial scan.

2. Password managers

Every online account linked to your name should have a unique password with at least 12 characters that doesn’t contain facts about you (avoid anniversary dates, pet names, etc.). Hackers have tools to guess thousands of passwords per second based on your personal details, and the first thing they do after cracking a password is to try it on other accounts.

Password manager apps create random strings of characters and let you save them in an encrypted list. You only need one complex password to log into the manager, and you’ll have easy access to all your credentials. No more memorizing long phrases, or reusing passwords!

3. Software updates

Software developers and hackers are constantly searching for vulnerabilities that can be exploited. Sometimes, a developer will find one before hackers and release a proactive update to fix it. Other times, hackers find the vulnerability first and release malware to exploit it, forcing the developer to issue a reactive update as quickly as possible.

Either way, you must update all your applications as often as possible. If you are too busy, check the software settings for an automatic update option. The inconvenience of updating when you aren’t prepared to is nothing compared to the pain of a data breach.

4. Disable flash player

Adobe Flash Player is one of the most popular ways to stream media on the web, but it has such a poor security record that most experts recommend that users block the plugin on all their devices. Flash Player has been hacked thousands of times, and products from companies like Microsoft, Apple, and Google regularly display reminders to turn it off. Open your web browser’s settings and look for the Plugins or Content Settings menu, then disable Adobe Flash Player.

5. HTTPS Everywhere

Just a few years ago, most websites used unencrypted connections, which meant anything you typed into a form on that site would be sent in plain text and could be intercepted with little effort. HTTPS was created to facilitate safer connections, but many sites were slow to adopt it or didn’t make it the default option.

HTTPS Everywhere is a browser extension that ensures you use an encrypted connection whenever possible and are alerted when one isn’t available on a page that requests sensitive information. It takes less than one minute and a few clicks to install it.

If you run a business with 10 or more employees, these simple tips won’t be enough to keep you safe. You’ll need a team of certified professionals that can install and manage several security solutions that work in unison. If you don’t have access to that level of expertise, our team is available to help. Give us a call today at 800-421-7151 to learn more.

Watch Out for this Persuasive Phishing Email

Anglers catch fish by dangling bait in front of their victims, and hackers use the same strategy to trick your employees. There’s a new phishing scam making the rounds and the digital bait is almost impossible to distinguish from the real thing. Here are the three things to watch out for in Office 365 scams.

Step 1 – Invitation to collaborate email

The first thing victims receive from hackers is a message that looks identical to an email from Microsoft’s file sharing platform SharePoint. It says, “John Doe has sent you a file, to view it click the link below…”

In most cases, the sender will be an unfamiliar name. However, some hackers research your organization to make the email more convincing.

Step 2 – Fake file sharing portal

Clicking the link opens a SharePoint file that looks like another trusted invitation from a Microsoft app, usually OneDrive. This is a big red flag since there’s no reason to send an email containing a link to a page with nothing but another link.

Step 2 allows hackers to evade Outlook’s security scans, which monitor links inside emails for possible phishing scams. But Outlook’s current features cannot scan the text within a file linked in the email. Once you’ve opened the file, SharePoint has almost no way to flag suspicious links.

Step 3 – Fake Office 365 login page

The malicious link in Step 2 leads to an almost perfect replica of an Office 365 login page, managed by whoever sent the email in Step 1. If you enter your username and password on this page, all your Office 365 documents will be compromised.

Microsoft has designed hundreds of cybersecurity features to prevent phishing scams and a solution to this problem is likely on the way. Until then, you can stay safe with these simple rules:

  • Check the sender’s address every time you receive an email. You might not notice the number one in this email at first glance: johndoe@gma1l.com.
  • Confirm with the sender that the links inside the shared document are safe.
  • Open cloud files by typing in the correct address and checking your sharing notifications to avoid fake collaboration invitations.
  • Double check a site’s URL before entering your password. A zero can look very similar to the letter ‘o’ (e.g. 0ffice.com/signin).

Third-party IT solutions exist to prevent these types of scams, but setting them up and keeping them running requires a lot of time and attention. Give us a call today at 800-421-7151 to learn more!

How to Make Sure You Never Fall Victim to Ransomware

Late last March, the infrastructure of Atlanta was brought to its knees. More than a third of 424 programs used nearly every day by city officials of all types, including everyone from police officers to trash collectors to water management employees, were knocked out of commission. What’s worse, close to 30% of these programs were considered “mission critical,” according to Atlanta’s Information Management head, Daphne Rackley.

The culprit wasn’t some horrific natural disaster or mechanical collapse; it was a small package of code called SAMSAM, a virus that managed to penetrate the networks of a $371 billion city economy and wreak havoc on its systems. After the malicious software wormed its way into the network, locking hundreds of city employees out of their computers, hackers demanded a $50,000 Bitcoin ransom to release their grip on the data. While officials remain quiet about the entry point of SAMSAM or their response to the ransom, within two weeks of the attack, total recovery costs already exceeded $2.6 million, and Rackley estimates they’ll climb at least another $9.5 million over the coming year.

It’s a disturbing cautionary tale not only for other city governments, but for organizations of all sizes with assets to protect. Atlanta wasn’t the only entity to buckle under the siege of SAMSAM. According to a report from security software firm Sophos, SAMSAM has snatched almost $6 million since 2015, casting a wide net over more than 233 victims of all types. And, of course, SAMSAM is far from the only ransomware that can bring calamity to an organization.

If you’re a business owner, these numbers should serve as a wake-up call. It’s very simple: in 2018, lax, underfunded cyber security will not cut it. When hackers are ganging up on city governments like villains in an action movie, that’s your cue to batten down the hatches and protect your livelihood.

The question is, how? When ransomware is so abundant and pernicious, what’s the best way to keep it from swallowing your organization whole?

1. BACK UP YOUR STUFF
If you’ve ever talked to anyone with even the slightest bit of IT knowledge, you’ve probably heard how vital it is that you regularly back up everything in your system, but it’s true. If you don’t have a real-time or file-sync backup strategy, one that will actually allow you to roll back everything in your network to before the infection happened, then once ransomware hits and encrypts your files, you’re basically sunk. Preferably, you’ll maintain several different copies of backup files in multiple locations, on different media that malware can’t spread to
from your primary network. Then, if it breaches your defenses, you can pinpoint the malware, delete it, then restore your network to a pre-virus state, drastically minimizing the damage and totally circumventing paying out a hefty ransom.

2. GET EDUCATED
We’ve written before that the biggest security flaw to your business isn’t that free, outdated antivirus you’ve installed, but the hapless employees who sit down at their workstations each day. Ransomware can take on some extremely tricky forms to hoodwink its way into your network, but if your team can easily recognize social engineering strategies, shady clickbait links and the dangers of unvetted attachments, it will be much, much more difficult for ransomware to find a foothold. These are by far the most common ways that malware finds it way in.

3. LOCK IT DOWN
By whitelisting applications, keeping everything updated with the latest patches and restricting administrative privileges for most users, you can drastically reduce the risk and impact of ransomware. But it’s difficult to do this without an entire team on the case day by day. That’s where a managed services provider becomes essential, proactively managing your network to plug up any security holes long before hackers can sniff them out.

The bad news is that ransomware is everywhere. The good news is that with a few fairly simple steps, you can secure your business against the large majority of threats. Give us a call at 800-421-7151 for more information on how we protect you from ransomware.

How Business Continuity Plans Can Fail

Just because your IT provider has a plethora of awards and certifications under its belt doesn’t mean that you can blindly hand over your business’s future to them. Often times, there are some aspects in your business continuity plan that tend to be overlooked by your provider. We have rounded up some of these issues on your business continuity plans.

Over-optimistic testing

The initial testing attempt is usually the most important. It’s when IT service providers can pinpoint possible weak points in the recovery plan. However, what usually happens is that they test the system in full, instead of via a step-by-step process. This results in them missing out specific points, with too many factors overwhelming them all at the same time.

Insufficient remote user licenses

A remote user license is given by service providers to businesses so that when a disaster strikes, employees can log in to a remote desktop software. However, a provider may only have a limited number of licenses. In some cases, more employees will need to have access to the remote desktop software than a provider’s license can allow.

Lost digital IDs

When a disaster strikes, employees will usually need their digital IDs so they can log in to the provider’s remote system while their own system at the office is being restored. However, digital IDs are tied to an employee’s desktop, and when a desktop is being backed up, they are not automatically saved. So when an employee goes back to using their ‘ready and restored’ desktop, they are unable to access the system with their previous digital ID.

Absence of a communications strategy

IT service providers will use email to notify and communicate with business owners and their employees when a disaster happens. However, this form of communication may not always be reliable in certain cases, such as when the Internet is cut off, or there are spam intrusions. Third-party notification systems are available, but they are quite expensive, and some providers sell them as a pricey add-on service.

Backups that require labored validation

After a system has been restored, IT technicians and business owners need to check whether the restoration is thorough and complete. This validation becomes a waste of time and effort when the log reports are not easy to compare. This usually happens when IT service providers utilize backup applications that do not come with their own log modules, and have to be acquired separately.

These are just some reasons why business continuity plans fail. It is important for business owners to be involved with any process that pertains to their IT infrastructure. Just because you believe something works doesn’t necessarily mean that it works correctly or effectively. If you have questions regarding your business continuity plan, get in touch with our experts today at info@wamsinc.com and 800-421-7151.

Upgrading to a Dual Monitor System

Small businesses and firms are always searching for ways for their employees to be more effective computer users. But before you go out and buy bigger hard drives and faster processors, you should consider upgrading your desktops to a dual monitor system. Read on to find out about the advantages of using two monitors per desktop.

Enhanced productivity
Published studies conclude that by working with dual monitors, overall productivity increases by 20-50%. Computer programmers, for example, can use one screen for source coding and the other for programming; by using dual monitors, they no longer need to toggle back and forth between tabs. This reduces error and frees up time to complete more projects.

Better multitasking
Efficient multitasking requires adequate screen space to keep multiple applications simultaneously visible — a view that single monitors alone simply cannot accommodate. Workers who require computers, like customer service reps and web designers, would no longer waste time switching between tabs and resizing windows to fit the limited space; they could now focus on completing their tasks accurately and efficiently.

Easier cutting and pasting
This reason resonates with jobs that call for creating newsletters, complex documents, or PowerPoint presentations. Dual monitors would eliminate the need for alternating between tabs and scrolling up and down as you work. Also, the enhanced visibility reduces chances of making mistakes and thus losing more time fixing them.

Image and video editing
With dual monitors, the days of stacking numerous editing tools on top of the image or video you’re working on are long gone. Instead of your screen looking like a game of Mahjong, you can put the editing tools on one screen and leave the image on the other. With better visibility, you’re less likely to commit errors and more likely to be finessed, and you’re not sacrificing valuable working time in the process.

Dual monitors benefit almost every industry because of the enhanced visibility, larger screen space, and how you can briefly nap behind them without getting caught Using dual monitors can enhance even your leisure time activities as well.

Broaden your horizons by getting in touch with us at 800-421-7151 or info@wamsinc.com. We’ll answer any questions you have.

4 BYOD Security Risks You Should Prepare For

Personal computing is with us wherever we go. Thanks to the rise of the mobile industry, smartphones and tablets allow us to take work home with us. And with the bring your own device (BYOD) strategy, businesses have never been so productive. However, BYOD can pose a number of security risks if you’re not careful. Here are some BYOD security issues you should know before implementing it.

Data leakage

The biggest reason businesses are wary of implementing a BYOD strategy is because it can leave the company’s system vulnerable to data breaches. Personal devices are not part of your business’s IT infrastructure, which means that these devices are not protected by company firewalls and security systems.

Employees might also take work with them to places outside of your company premises that don’t have adequate security settings, thus leaving your system vulnerable to inherent security risks.

Lost devices

Another risk your company has to deal with is the possibility that employees will lose their personal devices. If devices with sensitive business information get lost and fall into the wrong hands, anyone can gain unauthorized access to valuable company data stored in that particular device. Therefore, you should consider countermeasures and protocols for lost devices, like remotely wiping a device of information as soon as an employee reports it missing or stolen.

Possible hacking

Personal devices tend to lack adequate data encryption to keep other people from snooping on private information. On top of this, your employees might not regularly update their devices’ software, rendering their devices and your IT infrastructure susceptible to infiltration.

Connecting to open WiFi spots in public places also makes your company vulnerable and open to hackers, because hackers may have created those hotspots to trick people into connecting. Once the device owner has connected to a malicious hotspot, attackers can see your web activity, usernames, and passwords in plain text

Vulnerability to malware

Viruses are also a big problem when implementing BYOD strategies. If your employees use their personal devices, they can access sites or download mobile apps that your business would normally restrict to protect your system.

As your employees have the freedom to choose whatever device they want to work with, the process of keeping track of vulnerabilities and updates is considerably harder. So if you’re thinking about implementing BYOD strategies, make sure your IT department is prepared for an array of potential malware attacks on different devices.

BYOD will help your business grow, but it comes with IT security risks that you should be prepared to handle.
Need help mitigating these BYOD risks? Call us today at 800-421-7151, and let’s find the best IT security solutions for your company.

Server Administration 101: Temperature

Servers are the heart of many firms and businesses.  And with the strain that most businesses put on their servers, one of the most important maintenance variables is temperature management. Understanding why keeping your servers cool is vitally important and could save you from an expensive crash, troubling data loss, or reduced hardware reliability.

How does temperature affect my servers?

High temperatures in server hardware can result in different types of damage. A server that completely crashes for any reason results in costly data loss and service interruptions, but the unbiased advisory organization Uptime Institute warns that overheating that doesn’t always result in total failure. Every 18 degrees higher than 70 degrees Fahrenheit, hardware reliability decreases by 50%. This decrease in reliability can be just as, if not more, expensive for your hardware budget in the long run.

Cooling methods can’t just be implemented and forgotten; they must be closely monitored to ensure the health of your server hardware in the short and long term. Options for temperature management range from simple low-budget solutions to expensive outsourced alternatives. Determining your server management budget will greatly depend on what types of methods you intend to implement at your SMB.

Cooling methods

Which system you use to cool your server largely depends on how much power your hardware is using. The more watts a computer needs to operate, the harder it’s working. This number will determine the scope of your temperature management needs.

For example, PCWorld says passive temperature control is adequate for any equipment operating at less than 400 watts. This includes simple solutions like positioning your server away from walls, low ceilings, cable clusters, and anything else that can block hot air from dissipating naturally.

For computers using between 400 and 2,000 watts, strategic ventilation becomes a necessity. Adding passive ventilation is viable up to 700 watts, but fan-assisted ventilation will be required above that and up to 2,000 watts. With the increased power consumption, temperatures will rise, and air movement needs to be more closely managed. At this stage, simple vent and oscillating fans will suffice.

Anything higher than 2,000 watts needs dedicated cooling solutions. This means air-cooled units to actively reduce server room temperature. Depending on the size and arrangement of the space, a simple self-contained unit may be enough to reduce temperatures to acceptable ranges. But if you’re not sure, you should schedule a consultation with a vendor to consider more drastic cooling and monitoring methods.

Keeping your servers running at ideal temperatures means smoother data operations, lower hardware budgets, and one less thing to worry about at your firm or business. As your business continues to grow and develop, keep close tabs on increasing server loads — it could save you from devastating data loss. If you need more detailed advice about server management, or have any other questions about your hardware setup, contact us today at 800-421-7151 or info@wamsinc.com.

How to Make the Most of Microsoft Word

Microsoft Word has become the go-to word processor for businesses big and small. It is used by every department and almost every type of personnel, but its constant updates and huge number of features mean there are lots of functions unknown to most users. Here, we uncover some of the most useful tricks with Word to help you get the most from it.

Edit simultaneously
You and your colleagues can now edit the same Word document at the same time. Just save yours in the cloud on OneDrive, click Share, then send the link to your colleagues. You’ll even be able to see them editing in real time.

Continue your work with Word Online
Don’t have the Word app on your computer, tablet, or smartphone? Go to word.office.com, sign in with your Microsoft account, and open Word Online, the browser version of Word. By clicking the blue Share button, your colleagues can access your document using Word Online or the Word app, which means anyone with the link and an internet connection can jump right in

Keep editorial control
With the Track Changes function, Word monitors all the edits that everyone makes to your document so you can go through the changes and accept or reject them accordingly.

To turn on Track Changes, click on the Review tab then select Track Changes. When reviewing a colleague’s edits, you have control to click on Accept or Rejectas you see fit.

Format the easy way: Write first, format later
The Style Gallery in Word makes it easy to format your document, despite the huge number of font types, sizes, colors, and effects to choose from. After finishing writing and editing your document, click the Home tab and you will see the Style Gallery prominently on top. Select the appropriate Headings in the font, size, and color that you like, and change any other text in any way you like — just make sure you don’t make any changes to the actual content that’s already been edited!

Insert photos faster, more conveniently
No need to open your browser to look for photos for your document. Just place the cursor on the area where you intend to insert the photo, click on the Insert tab, select Online pictures (type “clip art” on the search box if that’s what you need), select a photo, then click Insert.

Edit a PDF file
Click on the File menu, select Open, and choose Browse. Highlight the PDF you want to edit, then click Open. Word will convert files to the new format using text recognition, so double-check if the conversion is correct. Make the appropriate changes, then click File, then Save As, then Browse. A “Save as type:” dropdown menu will appear at which point you will choose “PDF” then click Save.

These tips may seem straightforward, but over time they can make a big difference in helping you work faster. Want to learn more Word tricks and tips? Get in touch with our Microsoft Office experts today!

New Spectre-Style Attack Discovered

Security experts are constantly discovering new potential threats, and quite recently, they’ve found a new type of Spectre-style attack more dangerous than the original. Here’s a quick rundown of the new Spectre variant.

Spectre 101
For those who don’t know, Spectre is a vulnerability in modern computer chips like Intel and AMD that allows hackers to steal confidential information stored in an application’s memory, including passwords, instant messages, and emails. Malicious code running on a computer or web browser could be used to exploit this vulnerability, but ever since Spectre was discovered, Microsoft, AMD, Intel, and other tech companies released a series of updates to fix it.

What is NetSpectre?
To perform Spectre attacks, malware would have to run on a targeted machine to extract sensitive data. But in late July, Austrian security researchers found a way to launch Spectre-style attacks remotely without locally installed malware. The new attack is called NetSpectre and it can be conducted over a local area network or via the cloud.

So far, it’s impractical for average hackers to use this method to steal data. In tests, researchers were able to steal data at a rate of between 15 to 60 bits per hour, which means it would take days to gather corporate secrets and passwords. As such, NetSpectre will probably be used by hackers who want to target specific individuals but don’t want to resort to obvious methods like phishing scams or spyware.

Experts also warn that while NetSpectre may be impractical now, hackers may develop faster and more powerful variants in the future.

How should you protect your business?
NetSpectre attacks exploit the same vulnerabilities as the original Spectre so it’s important to install the latest firmware and security updates. You should also secure your networks with advanced firewalls and intrusion prevention systems to detect potential NetSpectre attacks.

Last but not least, working with a reputable managed services provider that offers proactive network monitoring and security consulting services can go a long way in protecting your business from a slew of cyberthreats.

If you’re looking for a leading managed security services provider, talk to WAMS! We provide cutting-edge security software and comprehensive, 24/7 support. Call us today at 800-421-7151 for more information.

Cloud: 4 Common Myths Debunked

Overhyped reports of cloud hacks and server failures can lead some small business owners to be wary of a service that has so much to offer. So what are these common misconceptions about cloud computing? Here are a few myths people believe about the cloud.

#1. Cloud infrastructures are unsecure

Information security is a necessity for every business. And the most prevalent misconception about the cloud is the idea that cloud services lack appropriate security measures to keep data safe from intruders. Most users also think that the data stored in the cloud can be easily accessed by anyone, from anywhere, and at any time.

But the truth is it’s actually more secure for small businesses to use cloud services. Small companies usually can’t afford to hire an IT department let alone train them to deal with online security threats. Cloud providers, on the other hand, offer services such as multi-layered security systems and antivirus protection that not only specialize in keeping infrastructures safe from hackers but are available at a price that is much lower than you would pay for in-house IT staff.

Additionally, large cloud-based services such as G Suite and Office 365 are supported by an infrastructure that constantly installs updates and patches, which helps manage security breaches. This frees you from the burden of installing the updates yourself and managing the overall security of your system.

Users should understand that no company is completely safe from security threats regardless of their IT infrastructure. But data is likely to be more secure in the hands of cloud providers as they are the most prepared and qualified to protect your digital property.

#2. The cloud lacks proper encryption

Most people misunderstand how encryption is implemented to keep your data safe. For example, encryption is generally used for data in transition, where data is protected from anyone seeing it as it travels from one internet address to another. But encryption can also be applied to data at rest, where data is encrypted on a storage drive.

With this in mind, you should understand what types of encryption your business and its data require. When it comes to choosing the right cloud service, it is best to inform yourself about the security measures that a cloud infrastructure implements and look at how it can protect your company’s digital property.

#3. With the cloud you are no longer responsible for data security

While cloud security is important, protecting data ultimately rests on the users who have access to it. Misplacing unlocked mobile devices can leave your data vulnerable and compromise your entire cloud infrastructure. This is why we recommend strong verification mechanisms in place for devices that are used to access the cloud.

#4. The cloud is never faulty

Like many IT services, cloud-based services are not immune to technical difficulties. For example, some cloud businesses have suffered outages and server failures which corrupted files and may have lost data in the process.

Hacking is another reason why some cloud services fail. Using a less than optimal cloud service that is vulnerable to attacks can lead to stolen or deleted data, which would be near impossible to recover if you did not have any offline backups.

Before signing up for any type of cloud service, clarify with its provider what is guaranteed. Most cloud providers make promises about a service’s uptime or its safety from provider-related breaches.

Security is truly one of the biggest barriers to the adoption of cloud computing in a small business. But as cloud services expand and encryption technologies advance, cloud adoption is increasingly becoming the most cost-effective solution to meet the small business owner’s IT demands. Contact us today to learn how your business can take advantage of all the cloud has to offer.

5 Tips for Buying a New Computer

There are so many different types of computers out there, each with varying specifications and capabilities – how do you find the best one for your needs? Whether you’re purchasing a computer for yourself or for your family, here are a few things to keep in mind that will help you make the right decision.

Desktop or Laptop?

This depends on your working style and environment. The rule is quite simple: if you rarely work out of the office, get a desktop PC. If you need to work at home, on the go, or at client meetings, then go for a laptop. It’s worth noting that desktops are generally cheaper than laptops at similar specifications, have a longer usage life, and make for easier changing or upgrading of components. Laptops, on the other hand, are very portable due to their compact size, they consume less energy, and they offer a more flexible user experience.

Processor

If you want a computer that loads programs in a flash, completes tasks almost instantly, and runs smoothly at all times, then we recommend you invest in the strongest processors available. The performance of a processor is determined by its number of cores and speed, so the bigger the number, the better. These days, most users go for the latest octa-core processors, specifically if your tasks involve rendering high-definition images, animations, graphics, and analysis. For optimum results, get a processor with the higher number of cores.

RAM

Random Access Memory (RAM) allows your computer to perform multiple tasks at once without a hitch. Just like processors, the amount of RAM your computer has will determine how fast it will run when you work on several programs simultaneously. Nowadays, standard computers come with at least of 4GB of RAM, with 8GB being ideal for most users — to navigate smoothly between tasks such as email browsing, Internet surfing, and working on word processing documents and spreadsheets.

Hard Drive

The bigger the hard drive, the more space you have to store files. If you plan on using your computer with no peripherals, you’ll want to choose a computer that offers the biggest hard drive. But remember that you can always purchase an external hard drive to transfer or store files if your current hard drive is running out of space. Due to recent price changes making them more affordable, it is also a better option to use an SSD (Solid State Drive) as your main form of storage.

Operating Systems

Picking an operating system is a big decision when it comes to choosing a new computer. You’ll probably want to stick with an operating system you’re already familiar with, since it can take some time to adapt yourself to a new OS. Here are some of the popular options available on the market:

  • Windows 10
  • Mac OS X
  • Linux

Most people will just go for either Windows or Mac OS, because the complexity of Linux mean it is not popular among everyday users and we do not recommend them.

Want more hardware tips and tricks? Get in touch with our technology experts today at info@wamsinc.com.

IT Security Policies your Office Needs

When it comes to Internet security, most small businesses don’t have security policies in place. And considering that employee error is one of the most common causes of a security breach, it makes sense to implement rules your staff needs to follow. Here are four things your IT policies should cover.

Internet

In today’s business world, employees spend a lot of time on the internet. To ensure they’re not putting your business at risk, you need a clear set of web policies. This must limit internet use for business purposes only, prohibit unauthorized downloads, and restrict access to personal emails on company devices. You can also include recommended browsing practices and policies for using business devices on public wifi.

Email

Just like the Internet policy mentioned above, company email accounts should only be utilized for business use. That means your employees should never use it to send personal files, forward links, or perform any type of business-related activities outside their specific job role. Additionally, consider implementing a standard email signature for all employees. This not only creates brand cohesion on all outgoing emails, but also makes it easy to identify messages from other employees, thus preventing spear phishing.

Passwords

We’ve all heard the importance of a strong password time and time again. And this same principle should also apply to your employees. The reason is rather simple. Many employees will create the easiest to crack passwords for their business accounts. After all, if your organization gets hacked, it’s not their money or business at stake. So to encourage employees to create strong passwords, your policy should instruct them to include special characters, uppercase and lowercase letters, and numbers in their passwords.

Data

Whether or not you allow your employees to conduct work on their own devices, such as a smartphone or tablet, it is important to have a bring your own device (BYOD) policy. If your employees aren’t aware of your stance on BYOD, some are sure to assume they can conduct work-related tasks on their personal laptop or tablet. So have a BYOD policy and put it in the employee handbook. In addition to this, make sure to explain that data on any workstation is business property. This means employees aren’t allowed to remove or copy it without your authorization.

We hope these four policies shed some light on the industry’s best security practices. If you’d like more tips or are interested in a security audit of your business, give us a call at 800-421-7151.

Regularly Evaluate Your Cybersecurity

Experts estimate that the global market for cybersecurity products this year will exceed that of last year. At first glance, an increase in spending seems necessary and shows that businesses are becoming more aware of cybersecurity issues. But a closer look may prove otherwise. Learn why your company could be investing in cybersecurity products the wrong way.

Uncover threats and vulnerabilities

Every business should evaluate the current state of its cybersecurity by running a risk assessment. Doing so is one of the easiest ways to identify, correct, and prevent security threats. After discovering potential issues, you should rate them based on probability of occurrence and potential impacts to your business.

Keep in mind that risk assessments are specific to every business and there is no one-size-fits-all approach for small business technology. It all depends on your line of business and operating environment. For instance, manufacturing companies and insurance groups have totally different applications to secure.

After tagging and ranking potential threats, you should identify which vulnerabilities need immediate attention and which ones can be addressed further down the line. For example, a web server running an unpatched operating system is probably a higher priority than a front desk computer that’s running a little slower than normal.

Tailor controls to risks

Instead of spending time and money evenly on all systems, it’s best that you focus on areas with high risk. You should address these issues immediately after an assessment, but also put plans in place to evaluate their risk profiles more often.

Assess existing products

Chances are, your organization has already spent a great deal of money on security products and their maintenance and support. By conducting risk assessments more often, you can improve the strategies you already have in place and uncover wasteful spending. You may discover that one outdated system merely needs to be upgraded and another needs to be ditched. Remember, your existing products were purchased to meet specific needs that may have changed immensely or disappeared altogether.

It’s much harder to overcome cybersecurity obstacles if you’re not regularly evaluating your IT infrastructure. Contact our experts at 800-421-7151 for help conducting a comprehensive assessment today!

The Benefits of Virtualization in 2018

The relationship between computer hardware and software can be frustrating. Both require the other to function properly, but both also require individual attention. Virtualization makes this relationship more flexible, and we’ve got a rundown on a few of the best examples.

More technology uptime
Virtualization vendors use fancy names for the features of their technology, but behind all the technobabble are some revolutionary concepts. Take “fault tolerance” for example. When you use virtualization to pool multiple servers in a way that they can be used as a single supercomputer, you can drastically increase uptime. If one of those servers goes down, the others continue working uninterrupted.

Another example of this is “live migrations,” which is just a fancy way of saying that employee computers can be worked on by technicians while users are still using them. Let’s say you’ve built a bare-bones workstation (as a virtual machine on the server), but you need to upgrade its storage capacity. Virtualization solutions of today can do that without disconnecting the user and restarting their computer.

Better disaster recovery
Data backups are much simpler in a virtualized environment. In a traditional system, you could create an “image” backup of your server — complete with operating system, applications and system settings. But it could be restored to a computer only with the exact same hardware specifications.

With virtualization, images of your servers and workstations are much more uniform and can be restored to a wider array of computer hardware setups. This is far more convenient and much faster to restore compared to more traditional backups.

More secure applications
In an effort to increase security, IT technicians usually advocate isolating software and applications from each other. If malware is able to find a way into your system through a software security gap, you want to do everything in your power to keep it from spreading.

Virtualization can put your applications into quarantined spaces that are allowed to use only minimum system resources and storage, reducing the opportunities they have to wreak havoc on other components of the system.

Longer technology lifespans
The same features that quarantine applications can also create customized virtual spaces for old software. If your business needs a piece of software that won’t work on modern operating systems, virtualization allows you to build a small-scale machine with everything the program needs to run. In that virtual space, the application will be more secure, use fewer resources, and remain quarantined from new programs.

In addition to software, virtualization also encourages longer life spans of old hardware components. With virtualization, the hardware an employee uses is little more than a window to the powerful virtual machine on the server. Employee computers need only the hardware required to run the virtualization window, and the majority of the processing takes place on the server. Hardware requirements are much lower for employees and equipment can be used for several years.

Easier cloud migrations
There are several ways virtualization and cloud technology overlap. Both help users separate processing power from local hardware and software, delivering computing power over a local network or the internet. Because of these similarities, migrating to the cloud from a virtualized environment is a much simpler task.

There is no debate about the benefits of this technology. The only thing standing between your business and more affordable, efficient computing is an IT provider that can manage it for you. For unlimited technology support, virtualization or otherwise, on a flat monthly fee — get in touch with us today at 800-421-7151!

How to Reduce Your PC Power Consumption

Every home or office has a computer. In one year, a typical desktop that’s on 24/7 releases carbon dioxide that’s equal to driving 820 miles in an average car. To save energy, you don’t need drastic changes; you can start with making small adjustments that will ultimately accumulate to significant savings.

1. Disconnect your external devices

Devices that connect to your PC like printers, sound systems, and webcams consume power, too. That’s why you should disconnect or remove these devices from your PC as soon as you’re done using them.

2. Use a smart strip, especially for computers you cannot turn off

A smart strip is a series of several electrical outlets in one strip, with circuits to monitor and maximize your gadgets’ power consumption. By connecting your PC and its peripherals (printer, speakers, scanners, etc.) to the smart strip, you don’t need to unplug your equipment when you’re not using them.

3. Adjust your computer’s energy settings

You can also consume less energy by adjusting your PC’s power settings. For example, you can make sure your hard drive and monitor go into “sleep” mode when they’re left idle for a few minutes. Lowering the screen brightness will also help you save electricity.

4. Shutdown and unplug your computer when not in use

If you are not yet using a smart strip, then it’s best to shut down the computer when you’re not using it. Also, make sure to unplug it, as leaving it plugged consumes standby power.

5. Use a charger only when charging your laptop

When we charge our laptops, it’s easy to just leave them there and forget about them. This results in the eventual degrading of the battery. Leaving the charger plugged on the wall also consumes standby power. So either use a wall outlet with a timer, or plug your charger on a smart strip instead.

6. And should you be in the market for a new PC, choose one that’s Energy Star compliant

Energy Star is the U.S. Environmental Protection Agency (EPA)’s symbol for energy efficiency. Every product that earns the Energy Star symbol is guaranteed to deliver quality performance and energy savings. Studies have shown that a single Energy Star compliant computer and monitor can save from $7 to $52 per year in electricity bills.

Saving energy is a combination of smart choices in hardware plus developing good energy-conservation habits. These tips should help you achieve that. If you need assistance in choosing the best hardware for your needs, call us and we’ll be glad to help you out.

Malware Strain Infects 200k More Devices

Yet another global malware infection has been making headlines and the story just took a turn for the worse. When the news of VPNFilter broke, experts warned that 500,000 devices were already infected, but now they believe that number is much higher. Thankfully, it’s not too late to protect yourself.

VPNFilter recap

A team of security researchers from Cisco released a report that a strain of malware had been discovered on hundreds of thousands of routers and network devices. Originally, researchers believed it affected only Linksys, MikroTik, Netgear, and TP-Link devices.

Like many malware strains, VPNFilter infects devices that use default login credentials. But it’s worse than the average cyberattack because it can destroy router hardware and cannot be removed by resetting infected devices.

As if destroying 500,000 routers wasn’t bad enough, VPNFilter lets its creators spy on networks and intercept passwords, usernames, and financial information.

What’s new

Just two weeks after VPNFilter was discovered, security experts announced that it targets 200,000 additional routers manufactured by ASUS, D-Link, Huawei, Ubiquiti, UPVEL, and ZTE. Worse yet, VPNFilter can alter data passing through infected routers. That means when you enter a username and password into a banking website, hackers could steal that information and show you an incorrect account balance to hide fraudulent deductions.

How to stop VPNFilter

Rebooting a router won’t remove the malware, you need to factory-reset the device. Usually, all this requires is holding down the Reset button on the back of the device for 10-30 seconds. If your router has no reset button or you’re unsure whether pressing it did the trick, contact a local IT provider immediately.

Cybersecurity threats have become so prevalent that even large enterprises struggle to keep their digital assets safe. Outsourcing IT support to a managed services provider like us will give you enough capacity to deal with issues like VPNFilter as soon as they arise. Call us today at 800-421-7151 to learn more.

Industries that Need Virtual Desktops

Apart from the cloud, one of today’s biggest IT trends is virtualization. And why not, it has helped countless businesses in more ways than one. An emerging model of virtualization is virtual desktop infrastructure (VDI), which involves hosting a desktop operating system and making it available on almost any device. It is most effective in the following use cases:

Legal

The legal industry is relying more and more on virtual desktops due to the mobility that they provide. Attorneys work long hours on cases and often have a home office, occasionally work from other offices, or need to access important information at a moment’s notice. With the right virtual desktop, attorneys can access the information that they need safely and under compliance. Virtual desktops are changing the way law firms are able to operate.

Healthcare

In an industry where every file is sensitive, the importance of confidentiality can’t be overstated. With VDI, rules and permissions can be customized based on the individual virtual desktop. As such, every medical professional can only view patient records relevant to them. It also allows them to log into their virtualized desktop while working across a variety of locations and devices.

Academic institutions

By leveraging VDI, a school’s IT team can create a virtual desktop — with the necessary restrictions implemented — for each student. If each classroom has a set of workstations, students’ desktop experiences will be consistent throughout their day. Even though they’ll be using different hardware every hour or two, they’ll always see the same desktop.

Companies with shift workers

In most cases, shift employees don’t really need one designated computer to fulfill their task because one computer is shared by multiple users. VDI makes it easy for companies to manage several desktop accounts on fewer devices. Workers can log into any devices, access their own virtual desktop, work as they do every day, and log off at the end of their shift.

Users with multiple computers

Depending on the nature of work, some positions require working with several computers on a regular basis. With VDI, they can integrate desktops and maintain it across two or more devices.

Field or remote staff

Employees that work remotely or in the field need access to tools and applications when on the job. A secure and reliable way to do it is through VDI. A complete VDI solution makes access to a consistent desktop experience possible anytime, anywhere, and using any device. It allows your remote or field workforce to operate effectively, no matter the circumstances.

Of course, these are just a few situations where VDI is helpful. Any business can enjoy security and productivity enhancements with a team of virtualization experts on call. Contact us today at 800-421-7151 to find out how we can help.

Tips to Reduce Risks After a Security Breach

No company is completely safe from data breaches. For proof, look no further than companies like Yahoo, AOL, and Home Depot, which compromised millions of personal customer information. That said, no business is completely helpless, either. The following steps can minimize the risks to your business in the event of a large-scale data breach.

Determine what was breached

Whether its names, addresses, email addresses, or social security numbers, it’s critical to know exactly what type of information was stolen before determining what steps to take. For example, if your email address were compromised, you’d take every precaution to strengthen your email security, which includes updating all your login credentials.

Change affected passwords immediately

Speaking of passwords, change yours immediately after any breach, even for seemingly safe accounts. Create a strong password comprised of alphanumeric and special characters, and make sure you never reuse passwords from your other accounts.

Once you’ve changed all your passwords, use a password manager to help you keep track of all your online account credentials.

If the website that breached your information offers two-factor authentication (2FA), enable it right away. 2FA requires two steps to verify security: usually a password and a verification code sent to a user’s registered mobile number.

Contact financial institutions

In cases where financial information was leaked, call your bank and credit card issuers to change your details, cancel your card, and notify them of a possible fraud risk. That way, banks can prevent fraud and monitor your account for suspicious activity.

Note that there are different rules for fraudulent transactions on debit cards and credit cards. Credit card transactions are a bit easier to dispute because they have longer grace periods. Debit card fraud, on the other hand, is more difficult to dispute, especially if the fraudulent transactions happened after you’ve notified the bank.

Place a fraud alert on your name

Hackers who have your personal information can easily commit identity fraud. To avoid becoming a victim, contact credit reporting bureaus like EquifaxExperian, or Innovis and request that a fraud alert (also called credit alert) be added to your name. This will block any attempt to open a credit account under your name and prevent unauthorized third parties from running a credit report on you.

Putting a credit freeze on your name might result in minor inconveniences, especially if you have an ongoing loan or credit card application. Still, doing so will greatly reduce your risks of getting defrauded.

These steps will ensure you don’t fall victim to identity theft in the event of a large-scale data breach. If you want to take a more proactive approach to protect your sensitive information against breaches, contact our cybersecurity experts today.

HTTPS Matters More for Chrome

HTTPS usage on the web has taken off as Chrome has evolved its security indicators. HTTPS has now become a requirement for many new browser features, and Chrome is dedicated to making it as easy as possible to set up HTTPS. Let’s take a look at how.

For several years, Google has moved toward a more secure web by strongly advocating that sites adopt the Secure HyperText Transfer Protocol (HTTPS) encryption. And last year, Google began marking some HyperText Transfer Protocol (HTTP) pages as “not secure” to help users comprehend risks of unencrypted websites. Beginning in July 2018 with the release of a Chrome update, Google’s browser will mark all HTTP sites as “not secure.”

Chrome’s move was mostly brought on by increased HTTPS adoption. Eighty-one of the top 100 sites on the web default to HTTPS, and the majority of Chrome traffic is already encrypted.

Here’s how the transition to security has progressed, so far:

  • Over 68% of Chrome traffic on both Android and Windows is now protected
  • Over 78% of Chrome traffic on both Chrome OS and Mac is now protected
  • 81 of the top 100 sites on the web use HTTPS by default

HTTPS: The benefits and difference

What’s the difference between HTTP and HTTPS? With HTTP, information you type into a website is transmitted to the site’s owner with almost zero protection along the journey. Essentially, HTTP can establish basic web connections, but not much else.

When security is a must, HTTPS sends and receives encrypted internet data. This means that it uses a mathematical algorithm to make data unreadable to unauthorized parties.

#1 HTTPS protects a site’s integrity

HTTPS encryption protects the channel between your browser and the website you’re visiting, ensuring no one can tamper with the traffic or spy on what you’re doing.

Without encryption, someone with access to your router or internet service provider (ISP) could intercept (or hack) information sent to websites or inject malware into otherwise legitimate pages.

#2 HTTPS protects the privacy of your users

HTTPS prevents intruders from eavesdropping on communications between websites and their visitors. One common misconception about HTTPS is that only websites that handle sensitive communications need it. In reality, every unprotected HTTP request can reveal information about the behaviors and identities of users.

#3 HTTPS is the future of the web

HTTPS has become much easier to implement thanks to services that automate the conversion process, such as Let’s Encrypt and Google’s Lighthouse program. These tools make it easier for website owners to adopt HTTPS.

Chrome’s new notifications will help users understand that HTTP sites are less secure, and move the web toward a secure HTTPS web by default. HTTPS is easier to adopt than ever before, and it unlocks both performance improvements and powerful new features that aren’t possible with HTTP.

How can small-business owners implement and take advantage of this new interface? Call WAMS today at 800-421-7151 for a quick chat with one of our experts to get started.

Should you Worry About the New IoT Malware?

A malware infection is one of the worst things that could happen to your Internet of Things (IoT) devices. But some users don’t even know there are IoT-targeted attacks that threaten computers, networks, and data. Rebooting an IoT device is a simple way to remove malware, but for those already infected with the latest strain, it’s not that simple.

What is the Hide And Seek malware?

The Hide and Seek (HNS) malware has created a “botnet” by quietly infecting thousands of devices using advanced communication methods. Without getting too technical, a botnet adds or “recruits” computers to their network to carry out malicious acts, such as overloading a network by telling every infected device in the botnet to try and connect at the same time.

The new HNS can’t be removed by resetting the infected device, which is the solution for most IoT malware strains. The new strain can also exploit a greater variety of devices and in less time than its predecessors. Experts believe it has already compromised more than 90,000 IPTC cameras and other devices.

IoT devices are easily hacked if they connect to the internet, which is home to opportunistic cybercriminals. And because businesses and consumers are expected to acquire and use more IoT devices (the market is expected to reach $1.7 trillion by 2020), it’s imperative to take cybersecurity precautions.

How can I protect my IoT devices?

Luckily, there are steps you can take to keep your devices — and ultimately your network and data — safe from HNS and other forms of malware.

  • Turn off your IoT devices when not in use to reduce their exposure to fast-spreading malware.
  • Take simple precautions to keep your WiFi networks safe, like changing your network’s default settings (including your network’s name), and using complex passwords that are changed from time to time.
  • For those who use a large number and variety of devices, install a threat management system that will block intruders and secure common threat entry points.
  • Be sure that your IoT devices are updated with the latest firmware. If the device is old and not supported, or new firmware is not being release, these devices should be replace with more reliable devices.

With HNS and other malware strains expected to increase in number and complexity, it’s more important than ever to take a multi-layered approach to security. Call us today at 800-421-7151 to learn more about which cybersecurity solutions are right for your business.

Debunking the Top 4 Virtualization Myths

Unless you work in IT, you don’t need to understand the intricacies of most business technology. Complicated explanations usually just lead to misunderstandings, which is especially true for virtualization. Many of the things you’ve heard about it are false.

Myth #1 – Virtualization is too expensive for SMBs

Many people assume that the more advanced an IT solution is, the more expensive it is to install and maintain. That’s not the case for virtualization, which is a strategy to boost hardware efficiency and cut costs.

Sure, a virtual server requires more support than a traditional one, but the capacity boost means you won’t need to purchase a second server for a long time – resulting in a net reduction of hardware and IT support expenses. Furthermore, managed virtualization services usually follow a pay-as-you-go model that costs just a few bucks per hour. It is important to also note the savings regarding power and cooling requirements; the lest physical servers you have, the less you are affected by these costs.

Myth #2 – Virtualization adds workplace complexity

Most people feel comfortable with the traditional computing model – one set of hardware equals one computer – but that doesn’t mean a new model has to be more complicated. With virtualization, one “traditional” computer can run as two or more virtual computers. The technical aspects of how that’s accomplished may be confusing, but the good thing is business owners don’t need to bother with those details.

Virtualization actually reduces complexity because it allows business owners to expand their IT systems whenever necessary without having to worry about hardware limitations.

Myth #3 – Support is hard to come by or inconvenient

You may be more familiar with The Cloud than with virtualization, but that doesn’t mean the latter is a niche technology. The value of the virtualization market in 2016 was $5.6 billion and supported by IT providers all over the country. It’s also a technology that works well with remote support, which means technicians can install upgrades or resolve issues without having to travel to your office.

When you choose to invest in the cloud, everything is virtualized. Amazon, Microsoft Azure, and Citrix are the most common vendors; any cloud service provider should steer you toward one of these.

Myth #4 – Software licensing is more difficult

There’s a misconception that if your server is running three virtual Windows 10 computers, you’ll have to jump through extra licensing hoops. In reality, virtualization follows the same licensing rules as traditional computing: one desktop, one license, which means you won’t need to rethink your software budget.

It’s natural for new technologies to cause confusion, and virtualization does require a new way of thinking about IT hardware. But as long as you have certified technicians like ours on hand, everything will run smoothly. Give us a call today at 800-421-7151 to find out how we can lower your hardware costs and simplify your IT support.

AI-Powered Advances in Customer Support

High-quality products and services can make a business successful, but exceptional customer service is what makes customers come back. This is why companies constantly try to innovate their customer service strategy — and some do it by adding artificial intelligence (AI) into the mix.

How AI capabilities enhance customer service

AI has two capabilities that enhance customer service: machine learning and natural language processing.

Machine learning studies historical customer data in your systems and equips your customer service staff with all the information they need to address concerns much faster and provide personalized product suggestions, discounts, and offers. It’s the same mechanism that enables Facebook to suggest friends and brands to add or follow, and allows Amazon to personalize product recommendations.

On the other hand, AI’s natural language processing capabilities make it possible for businesses to deploy computerized customer service systems that don’t require human support staff. AI-enabled systems can ‘talk’ to customers via software similar to that of Apple’s Siri, Google’s Alexa, and Windows’ Cortana.

Automated, accurate, and agile responses

Although well-trained employees can multitask and solve customer problems, humans make mistakes. Automated systems like chatbots provide accurate and quick responses because they can be programmed to respond rapidly and accurately, handle large volumes of queries, and be available 24/7.

For example, a restaurant chain that often receives queries about a branch’s opening hours can use a chatbot to handle questions about store hours, reservations, and other simple concerns. A retail store chatbot can also make online ordering seamless by answering questions about product sizes and/or availability.

Overall, AI-enabled chatbots can reduce or eliminate pain points commonly encountered with human customer service representatives, such as long wait times, inefficient escalation of complex concerns, and negative human emotions from irate customers, all of which affect customer satisfaction levels.

Cost-efficient support

Businesses spend thousands of dollars to hire and train customer service representatives. But based on studies, the high attrition rates in the call center industry cost them a lot of money. Some companies even let operations staff handle customer support, which then affects productivity and reduces profitability.

AI-powered platforms reduce the time and money spent on customer service because you don’t need to hire more support staff in case of business expansion. Instead, you can reprogram customer service software so that queries about new products or new business locations can be easily addressed.

Many customers still prefer to have their problems solved by humans. And for banks, hotels, hospitals, and businesses where complicated concerns require human customer service agents, an AI-powered support system can facilitate seamless issue resolutions.

Fortunately, there are plenty of technology options to make customer service and other functions more efficient. Call us today for innovative business technology solutions.

New Malware Infects SOHO Routers Worldwide

Talos recently warned that at least half a million routers have been endangered by a new form of malware called VPNFilter. After an earlier version targeted devices in Ukraine, VPNFilter has spread rapidly in around 54 countries, affecting home and small business routers.

How VPNFilter Works

Talos cited the vulnerable devices as Linksys, MikroTik, Netgear, and TP-Link networking equipment, as well as network-attached storage (NAS). Upon infecting a small office home office (SOHO) router, VPNFilter deploys in three stages.

In stage 1, the malware imposes its presence by using multiple command-and-control (C2) infrastructure to capture the IP address of the existing stage 2 deployment server. This makes VPNFilter so robust that it can deal with any unpredictable changes in C2. This stage of the malware persists through a reboot, which makes preventing reinfection tough in stage 2.

Stage 2 involves deploying modules capable of command execution, and data collection and exfiltration. According to the United States Department of Justice (DOJ), this can be used for intelligence gathering, information theft, and destructive or disruptive attacks. Moreover, stage 2 malware has a “self-destruct” feature that once activated by the hackers will overwrite a critical area of the device’s firmware so it stops functioning. This can happen on almost every infected device.

In Stage 3, a module with packet-sniffing capabilities is added to enable monitoring of internet traffic and theft of website credentials. And yet another module is installed to deploy communication support for the Tor network, which can make communicating with the C2 infrastructure harder.

Taking Action

According to Talos, the likelihood of the attack being state-sponsored is high, something the DOJ later backed up. The DOJ attributed it to a group of actors called Sofacy (also known as APT28 and Fancy Bear), the Kremlin-linked threat group believed to be responsible for hacking the Democratic National Committee computer network two years ago.

On the night of May 23, the FBI announced that they have seized a domain which is part of VPNFilter’s C2 infrastructure used to escalate the malware’s effects. This forces attackers to utilize more labor-intensive ways of reinfecting devices following a reboot. With the seizure, the government has taken a crucial step in mitigating VPNFilter’s impact.

Stopping the Malware

Researchers agree that VPNfilter is hard to prevent. While vulnerability has been established, patching routers isn’t easy, something average users might not be able to do on their own. But as with any malware, the impact of VPNFilter can be mitigated, which is done by terminating the C2 infrastructure used.

To minimize exposure, the FBI recommends all SOHO routers be rebooted, which, according to a statement from the DOJ, will help the government remediate the infection worldwide. The justice department, along with the FBI and other agencies vowed to intensify efforts in disrupting the threat and expose the perpetrators.

For their part, Talos offers the following recommendations:

  • Users of SOHO routers and/or NAS devices must reset them to factory defaults and reboot them in order to remove the potentially destructive, non-persistent stage 2 and stage 3 malware.
  • Internet service providers that provide SOHO routers to their users should reboot the routers on their customers’ behalf.
  • If you have any of the devices known or suspected to be affected by this threat, it is extremely important that you work with the manufacturer to ensure that your device is up to date with the latest patch versions. If not, you should apply the updated patches immediately.
  • ISPs will work aggressively with their customers to ensure their devices are patched to the most recent firmware/software versions.

Combat the VPNFilter malware by rebooting affected devices. For more tips, contact our team.

What to Tweak when Setting Up Windows 10

There are steps that need to be taken after unboxing a new laptop. After installing Microsoft’s Windows 10, you need to unlock its full potential by tweaking some important settings. The best thing to do is get help from a technician, but there are a few things you can do without assistance.

#1 Check for updates

Your new laptop should check for updates automatically, but you can also check manually. Just click the gear icon above the Start button to go to the Settings, choose Update & Security > Windows Update and then click the Check for updates button. (Or, just type “updates” into the search box and click Check for updates.)

#2 System restore

If something goes wrong with your laptop, you can save a lot of time and hassle if you have a “restore point,” which is like a backup of your entire operating system.To set up a restore point, search for “restore” from the taskbar and click Create a restore point. You’ll be taken to the System Protection tab of the System Properties window.

From there you can choose what you want to be included in the back and then click the Configure button. Select the radio dial to Turn on system protection if it’s not already on. And then you can choose how much disk space to reserve, usually no more than 2 or 3 percent.

#3 Power plan

If you want to prolong your laptop’s battery life, one of the best things you can do is switch the Power Saver, High Performance, and Balanced power plans based on your needs. To choose a plan, right click the battery icon in the lower-right corner of your screen and click Power settings. Next, click Additional power settings to select a power plan.

#4 App installation tolerance level

To restrict which apps can be installed on your laptop, you can disallow anything that isn’t in the Windows Store. Go to Settings Apps Apps & features and you can choose whether to permit installations from only the Windows Store, any app installations (with a warning), or unrestricted app installations.

#5 Remove bloatware

Vendors package new laptops with lots of trial apps, which are mostly unnecessary and unwanted software called bloatware.

Windows 10 offers an easy way to see which apps are installed on your new laptop and a quick way to uninstall those you don’t want. Head to Settings Apps Apps & features and peruse the list. If you don’t want an app and are 100% certain your computer doesn’t need it, click the Uninstall button.

#6 Anti-ransomware

Ransomware is a form of malicious software (or malware) that makes all your data inaccessible until you pay a fee to hackers.

To combat it, type ‘Windows Defender Security Center’ into the search bar at the bottom of your screen, click it and go to Virus & threat protection > Virus & threat protection settings. Here, you’ll be able to enable a new option called Controlled folder access, which protects you against ransomware attacks. By default, the Desktop, Documents, Music, Pictures, and Videos folders are protected, but you can add others too.

Do you know what settings to change and update to optimize your laptop? This article barely scratches the surface of Window 10’s security and efficiency settings. Call us today at 800-421-7151 for a quick chat with one of our Microsoft experts about taking yours to the next level.

Protect your Facebook and Twitter from Hackers

In the wake of Facebook’s worldwide privacy scandal, it’s time to revisit some social media best practices. Your information is incredibly valuable, and you can’t rely on social media platforms to keep it safe from hackers. Heed these tips to make sure your Facebook and Twitter accounts are well secured.

Lockscreens Exist for a Reason

Make sure all your computing devices lock the moment you stop using them. This way, you are safe from the simplest hack of all: someone opening a browser on your computer that has your social media login saved. As long as your password isn’t your birthday or anniversary, you’ll be forcing hackers to work for access to your account.

Strong Passwords are Never Out of Fashion

Unlocking your phone may be limited to a six-digit passcode, but you’ll need something much more complicated for your account password. The first thing you’ll need to do is create a password that isn’t used for any other account. Because data breaches have become such a regular occurrence, hackers probably have a long list of your favorite passwords from other websites and platforms.

In this case, it is best to use a password manager like an app or online service that allows you to generate and retrieve complex passwords.

Another measure that you can take is to enable two-factor authentication, which requires you to type in a secondary code sent to your phone. Even if hackers have your password, they won’t be able to log in without your phone.

Make Use of Social Media Features

Facebook offers functions that help you keep tabs on who’s accessing your account and from where. To use this feature, click the down arrow in the upper right corner of your Newsfeed and select Settings. Then click Security and Login to get more information. If you sense an imposter, click the right-hand icon to give you the option of logging out remotely or reporting the person.

From there, turn on Get alerts about unrecognized logins to be notified via Facebook, Messenger, or email if someone is logged into your account from an unrecognized browser. Unfortunately, Twitter doesn’t have the same option (that makes the two-factor authentication extremely necessary).

While it may be difficult for a hacker to barge into your Facebook or Twitter account through a third-party service that you have given access to your profile, it’s still advisable that you check what you have approved.

  • Facebook: Go to Settings > Apps and Websites to view and manage outside service with access to your account
  • Twitter: Go to Settings and Privacy > Apps to check and edit the list

Last, be sure to check the permissions mobile apps like Facebook and Twitter have on your smartphone or tablet.

  • Android: Go to Settings > Apps > tap the icon in the upper right and then tap App permissions
  • iOS: Go to Settings > Privacy to manage which service can access which parts of your phone

Less Personal Info, Fewer Problems

These steps are just the beginning of the security that you should take advantage of. Next, you should consider limiting the personal data you input into your social media accounts. If you have to put a ton of information, then be sure you read this blog from the top… and then read it again.

With a little practical knowledge, you can prevent Facebook and Twitter hackers from doing what they do. Cybersecurity is a sprawling issue and social media privacy is such a small sliver of your online life that you need to stay on top of. For 24/7 support, call our team of experts today at 800-421-7151.

Overheating Laptop? Here’s How to Prevent It

If you own a laptop, chances are you’ve noticed how hot it can get. You might not know it, but your laptop may already be overheating, which will lead to decreased efficiency and a shorter lifespan. Here’s how to protect your laptop from further damage due to overheating.

Causes of overheating

Laptops create heat during their normal operation. That’s why they’re designed with internal fans that blow out hot air and suck in cooler air. When your laptop keeps shutting down or suffers serious slowdowns, chances are it’s overheating.

One of the most common causes of overheating is when the fan doesn’t operate normally. This may be due to dust and grime clogging up the fan, preventing it from rotating properly. It’s also possible that the air vents are being blocked, preventing air from flowing into the laptop.

Another thing to consider is the age of your laptop’s battery, which relies on lithium to store electricity. This chemical naturally decays over time, no matter how carefully you use it. The older the battery, the less efficient it is and the more heat it generates.

Software use can also contribute to overheating. Too many apps and programs running in the background can overwork your laptop.

What to do if it’s overheating

The first thing you should do is check your hardware. Turn your laptop off and inspect the vents and your fan for any dirt, grime, or other possible causes of blockage. Also check whether the fan itself is not physically dented, which can slow down its rotation.

Sometimes overheating is simply caused by bad habits. Do you use your laptops in bed or on the carpet? Do you use pillows as padding? Uneven or soft surfaces often block the air vents, leading to overheating. Always place your laptop on a hard, even surface.

Aside from the hardware, check your software. Are there a lot of apps and programs that start automatically when you switch on your laptop? If yes, then you may need to limit them.

Keeping it cool

To prevent your laptop from overheating, always make sure that there’s adequate airflow for your laptop. Better yet, invest in a cooling pad. These pads lift your laptop and add more fans to facilitate better airflow.

Limit the number of programs that run when you start your laptop. Change your settings to “power save.” And shut down your laptop whenever you’re not using it.

It’s easy to take laptops for granted because they’re billed as plug-and-play devices. However, with a little extra care and attention, your devices will last much longer. If you have any questions about your hardware, call us today at 800-421-7151.

Be Smart and Back Up Your Valuable Data

Storing copies of your business data in the cloud will help you avoid the risks associated with broken hard drives, lost or stolen devices, and human error. That’s because entrusting your data to an expert service provider means you’ll have trained professionals handling the backup of your business assets online.

How should you go about choosing a cloud backup provider? Let’s take a look:

Learn more about their storage capacity

Before partnering with a cloud backup provider, ask them where they store their data. Many providers use cloud servers over which they have little control, which could be hazardous as it makes it harder to monitor activity and respond to anomalies. To avoid this fate, choose a backup service that operates their own cloud-based servers.

Next, you will have to determine whether your business assets can be backed up, since some cloud storage providers do not have the capacity to save bigger files like videos or other multimedia files. By asking these questions, you can find a cloud backup service that fits your business needs, and more importantly, can take care of all your files.

Get details on their security

It will be important for the cloud backup provider to explain in no uncertain terms how they will store your files. They should be encrypted and stored on multiple servers because redundant storage ensures your data has multiple copies saved online and can be retrieved at will. Even if an uncontrollable disaster befalls your company or the backup provider’s system, you’ll still be safe.

Compare your budget and backup costs

Before considering any cloud backup provider, you need to know how much the service is worth to you. How much money would you lose if your server crashed and all the data it stored was irretrievable? Compare that amount with the cost of a provider’s service, which could be charged by storage tiers, per gigabyte, or on a flat-fee unlimited plan.

When asking about the price of cloud backups, make sure to clarify any service limitations or restrictions. For example, how quickly can your storage capacity be upgraded? Is it possible to run out of storage? These are not things you want to discover in the middle of hurricane season.

Clarify data recovery timelines

Although storage availability is important, how quickly backups can be created and restored is also an essential factor. Ask providers how often backups will be created (e.g., hourly, daily, weekly), and how long it will take to restore them (e.g., hours, days, etc.). If those timelines are too long, it may be time to look for a better provider.

The most important thing is to know your needs before meeting with a potential provider. Let them know your business needs, budget, and recovery timelines. Our solutions and pricing are flexible and customized to your needs so you’re not stuck in a cookie-cutter plan.

Give us a call at 800-421-7151 to find out more about backup services and other dynamic ways to protect your data.

5 Steps to Enabling Virtualization on a Local Computer

Keep in mind that virtualization is one of the most effective ways to significantly reduce IT expenses, while simultaneously increasing efficiency and flexibility. But are issues hindering you from enjoying virtualization on your PC? Here are detailed answers for you to fix these problems.

#1 Enable Virtualization in Your BIOS

In most cases, virtualization won’t work because it’s disabled in your computer’s Basic Input/Output System (BIOS). Though most modern computers support the feature, it’s often disabled by default. Thus, you should take a look to make sure it is enabled on your computer.

#2 If You Don’t See It – Update Your BIOS

If you don’t see an option for virtualization in your BIOS, there’s a chance the manufacturer has provided an update that includes it. This may not be the case for all machines, but it doesn’t hurt to check.

To find a BIOS update, you can use the manufacturer app included with your PC or manually search the internet for it.

#3 Disable Hyper-V

Professional editions of Windows include a Microsoft program called Hyper-V. This is Microsoft’s own virtualization software, like Oracle’s VirtualBox or Dell’s VMware. Unfortunately, Hyper-V can hijack your computer’s virtualization privileges, blocking you from using other virtualization apps.

You don’t need Hyper-V unless you really want to use it, so removing it from your computer will let your virtualization app of choice work properly.

#4 Confirm Your PC Supports Virtualization

If you’ve tried all the above steps and virtualization still won’t work, chances are your machine doesn’t support it. It’s worth confirming this before you give up, though.

If you have an Intel CPU, download the Intel Processor Identification Utility. It’s a handy tool that helps you know features, package, intended frequencies and actual operating frequencies of your Intel processor. Those with AMD processors should download the equivalent AMD tool instead.

#5 I’ve Enabled Virtualization, but…

Maybe you’ve gotten virtualization to work after following the advice above, but still have issues with performance or getting a virtual machine (VM) started. Here are some other things to try:

  1. Make sure you download the right version of the operating system you want to run in a VM to avoid compatibility issues.
  2. Make sure you have enough free disk space, or your host computer could run low on space. This can cause performance problems.
  3. Ensure you have enough RAM to dedicate to the VM.

At WAMS, we offer server virtualization much more to our clients due to the benefits that this strategy offers. These benefits include:

  1. Reduced Hardware Costs
  2. Faster Server Provisioning and Deployment
  3. Greatly Improved Disaster Recovery
  4. Significant Energy Cost Savings
  5. Increased Productivity

Virtualization is important, easy-to-implement technology that companies of any size can take advantage of. And if you feel overwhelmed with anything related to this topic, just call us today at 800-421-7151 for a quick chat with one of our certified virtualization technicians who might help you out.

Browser-Based Biometrics Boosts Security

Earlier this month, the World Wide Web Consortium, announced plans to begin allowing users to log into online accounts with fingerprints, facial scans, and voice recognition. This will not only boost security, but also make account management much simpler.

Authenticate Your Profile on Your Mobile Device

Chrome OS, Windows, and MacOS, Linux, and Android are all adding features to help users safely log in using biometric identification via USB, Bluetooth, and NFC devices connected to smartphones and tablets. With such convenience, users can verify their accounts on the go.

Preventing Cyber Attacks with Browser-based Biometrics

Passwords are notoriously bad at protecting users’ accounts and the information they store. Facial scans, fingerprints and voice recognition would make it exponentially harder for hackers to commit identity theft. That means you’re also less likely to be duped by an email from a hacker pretending to be your boss asking for the company credit card.

Enjoy More Secured Online Transactions

Biometric verification will also retire the need for logging in your information when shopping online, streaming video, using cloud applications, and other internet-based transactions. Windows 10 has already adopted features that offer limited account management with fingerprints and facial scans. But none of the big-name technology vendors have offered solutions to achieve this on mobile devices as of yet.

Browser-based biometrics could revolutionize and streamline the steps of verifying an online account. It promises to add more security and ease in logging in and transacting on the internet. To ensure that you are operating as securely as possible, give us a call at 800-421-7151 now.

Should You Worry About Facebook’s Security Breach?

Facebook is the most popular platform for developing brand awareness because it allows businesses to target users based on what they have posted in the past. But after the recent data breach scandal, is your data still safe? Read on to find out if you need to worry about your privacy.

Last month, news broke that a firm known as Cambridge Analytica collected private data from over 50 million Facebook users. The British company supposedly used this information in 2016 to influence voter behavior during the US presidential election and UK’s Brexit campaign.

How did they harvest the data?
In 2015, a Facebook personality quiz app called “This is Your Digital Life” was created by Cambridge psychology professor Aleksandr Kogan. Around 270,000 Facebook users signed up and gave information about themselves in exchange for humorous results.

What users didn’t know was that Kogan’s firm, Global Science Research, struck a deal with Cambridge Analytica to share the information that was gathered. Aside from collecting information about the Facebook users, the app also mined some data about the users’ friends.

Information collected was based on:

  • Data from other platforms that are also owned by Facebook, including Instagram and WhatsApp
  • Advertisers and other third-party partners
  • Apps and websites which use Facebook services
  • Your location
  • The devices you use for Facebook access
  • Payments handled by Facebook
  • Your Facebook connections and networks
  • Messages, photos and other content that other users send to you
  • The information you disclose to Facebook
  • Your activities on Facebook

What happened to the sourced information?
Cambridge Analytica analyzed the collected data to create psychological profiles and invent better political drives to influence whom people would vote for. Although there is still a huge debate about how effective this plans were, there’s no doubt that tens of thousands of users were manipulated into signing away their data without knowing it.

What can I do to keep my information safe?
Remove third-party apps that use your Facebook account. Visit your “Settings” menu and go to “Apps”. You should see the list of all the services that are using information about your Facebook profile. Check on each app, and if you don’t need it or use it anymore, delete it to revoke its access.

If you need more information on how to keep your data secure, feel free to give us a call today at 800-421-7151!

Safety Tips for Watering Hole Attacks

Bad news, internet users: Cybercriminals have developed more advanced tricks to compromise your systems. While you may be familiar with attacks involving suspicious emails, the new kid on the block known as watering hole attacks are far more nefarious and effective. Fortunately, there are a few things you can do to keep yourself safe.

What are watering hole attacks?
Much like phishing, a watering hole attack is used to distribute malware onto victims’ computers. Cybercriminals infect popular websites with malware. If anyone visits the site, their computers will automatically be loaded with malware.

The malware used in these attacks usually collects the target’s personal information and sends it back to the hacker’s server. Sometimes the malware can even give hackers full access to their victims’ computers.

But how does a hacker choose which websites to hack? With internet tracking tools, hackers find out which websites companies and individual users visit the most. They then attempt to find vulnerabilities in those websites and embed them with malicious software.

Any website can fall victim to a watering hole attack. In fact, even high-profile websites like Twitter, Microsoft, Facebook, and Apple were compromised in 2013.

You can protect yourself by following these tips.

Update your software
Watering hole attacks often exploit bugs and vulnerabilities to infiltrate your computer, so by updating your software and browsers regularly, you can significantly reduce the risk of an attack. Make it a habit to check the software developer’s website for any security patches. Or better yet, you should have a managed IT services provider to keep your system up to date.

Watch your network closely
To detect watering hole attacks, you must use network security tools. For example, intrusion prevention systems allow you to detect suspicious and malicious network activities. Meanwhile, bandwidth management software will enable you to observe user behavior and detect abnormalities that could indicate an attack, such as large transfers of information or a high number of downloads.

Hide your online activities
Cybercriminals can create more effective watering hole attacks if they compromise websites only you and your employees frequent. As such, you should hide your online activities with a VPN and your browser’s private browsing feature.

At the end of the day, the best protection is staying informed. As cyberthreats continue to evolve, you must always be vigilant and aware of the newest threats. Tune in to our blog to find out about the latest developments in security and to get more tips on how to keep your business safe.

New Security Features on Office 365

To bolster users’ safety, Microsoft recently added security features to Office 365. These enhancements give home and business users peace of mind whenever they send an email, share a link, or forward an attachment. There’s no such thing as being too secure, so we recommend staying abreast of them now.

Files Restore in OneDrive

Previously available only to Office 365 business users, Files Restore allows users to conveniently recover files in OneDrive within the last 30 days. Home and personal users can now easily retrieve and restore all their files at a specific point in time, which is useful in instances where files are accidentally deleted, corrupted, or compromised by ransomware or other malware. It is certainly not a replacement for a backup, but it isn’t a bad supplement to have on your side.

Ransomware detection notification for Office 365

You receive notifications and alerts for a variety of things on your PC or mobile devices, but rarely for something as immensely important as a ransomware attack. Office 365’s ransomware detection and recovery feature sends desktop notifications, email alerts, and mobile alerts in case of any possible ransomware attack on your system so you can act fast.

Aside from being notified about a detected ransomware, you’ll also be guided on how to recover your files before they were infected, based on the timestamp recorded by Files Restore. This is also not as strong as a firewall, but a smart supplement being implemented by Microsoft.

Password-protected link sharing in OneDrive

Whenever you share a link — whether to a file or folder — in OneDrive, there’s no guarantee that it won’t be shared to unauthorized users. A password-protected feature solves this dilemma by giving you an option to set and require a password for every file or folder you share.

Email encryption in Outlook

Intercepting email has become many cybercriminals’ preferred method of stealing critical information, so it’s more crucial than ever to ensure email safety. With Outlook’s end-to-end encryption, users can rest easy knowing that the email they send won’t be easily intercepted after all. This is not the same as email security, but a strong secondary form of protection.

Email encryption works by requiring non-Outlook email recipients to choose between receiving a single-use passcode or re-authentication to open an email from an Outlook email sender. On the other hand, an Outlook-to-Outlook email exchange — whether Outlook on desktop, mobile (iOS and Android), or Windows Mail app — doesn’t require any further action for the email to be opened.

Prevent Forwarding

This function restricts email recipients (both Outlook and non-Outlook users) from forwarding or copying email. It also provides an option to prevent certain recipients from opening an attachment from a forwarded email, which will come in handy when a person needs to send an email to more than one recipient, but wants to restrict access to an attachment to just a few recipients.

These new capabilities greatly reduce the effort to secure your files and communications, and Microsoft is sure to roll out a few more soon. If you want to optimize these Office 365 security features or explore other security methods that your business will benefit from, call us today at 800-421-7151.

5 Tips on Keeping Mobile Workers Connected

Due to increasing connectivity and technological advances, mobile workers are increasingly becoming the norm in almost every industry. Business owners need to ensure these workers stay connected, so we’ve got some helpful tips on how to effectively apply mobile performance management.

The ability to manage the workforce out in the field requires a modern support infrastructure called mobile performance management. It includes the top five tips to keep field workers connected: optimizing traffic, applying control, measuring performance analytics, simplifying data security, and identifying the root cause of connectivity issues.

Optimize

Although the latest apps on the market can maximize productivity for the mobile workforce, these apps come with a certain risk: stability issues that could lead to the apps crashing while out in the field. If you are your company’s IT decision-maker, be cautious of untested apps, and consider blocking heavy bandwidth apps to streamline data flow when signal strength is weak. Your IT company will also advise you on which applications should and shouldn’t be trusted.

Control

Another thing you can do with mobile performance management solutions is blocking personal apps and unsafe WiFi networks. Both of these create serious security risks that could lead to costly data theft or loss.

Analyzing performance

Field workers mostly rely on GPS location data for more efficient scheduling, route-planning, and effective control of fuel consumption. This is possible only if there are reporting tools that confirm that the GPS capability is working. Performance analytics show you what mobile workers are experiencing, gaining access to robust data, network and app usage reports, inventory analysis, coverage maps and device maps as needed.

Simplify security

IT should tightly restrict access without making security complicated for mobile workers. IT administrators need to create a highly flexible and programmable secure mobile strategy. You must be able to restrict which apps can access company data and remotely wipe data from the device if it is lost or stolen.

Identifying the root cause of connection issues

Organizations need to be fully prepared for connectivity issues involving their mobile devices. Organizations of all sizes should be able to afford remote diagnostics to gather complete troubleshooting information to allow IT to identify the root cause of the problem quickly, without relying on workers, who have no idea about how to run tests and answer questions regarding these issues.

For any organization with workers in the field, the ability to implement performance management structures and policies is a must. For other tips on how to keep your employees connected, engaged, and efficient, give us a call at 800-421-7151 and we’ll be happy to advise.

Phishing Hits Businesses at Tax Time

Phishing schemes abound every season, and tax season is no exception. It’s an important time of year in the corporate world and cybercriminals are looking to take advantage of it, which is why your business must ensure that your confidential data is kept under lock and key.

Phishing baits to watch out for

Phishing attacks often consist of fabricated or compromised emails sent to finance/payroll or human resources employees that are made to look like they’re from an executive in your company. The message might contain a request to forward employee records, including their W-2 forms, but that’s not all…

Another common scheme, which doesn’t only happen during tax season, involves getting a call from a person declaring to be an IRS employee. And no, caller IDs won’t save you because they can forge that, too. The phisher will inform you that you owe them cash from back taxes and they will threaten legal action if you don’t pay via credit card at that instant.

Always remember, the IRS will never contact you on the phone to let you know that you owe them money. And they certainly won’t threaten you or demand payment over the phone. If they really need to notify you of such matters, they’ll use the postal service and will give you a chance to discuss payment terms.

Standard protection protocols

Don’t worry, the usual security measures against these phishing scams are pretty easy to integrate into your business. Begin by developing a policy that bans the request of private details through email. If an employee ever requires such info, they should get in touch with the person directly, follow your established protocols for the transfer of sensitive information, and minimize the number of people involved in the transaction.

Taking security a step further

Data loss prevention (DLP) systems are also valuable weapons against these types of phishing attacks. They evaluate traffic going in and out of your company, such as web usage, emails and instant messages, and virtually anything sent on your network. DLP systems can filter out private details, including Social Security numbers, and stop them from being sent out.

But beware, DLP systems come with a minor drawback, as they can also block legitimate traffic, like when your accounting department sends tax info to your CPA. Fortunately, an MSP like us can properly segregate the good and the bad traffic to avoid confusing and/or frustrating your employees.

Phishing schemes may be a normal occurrence during tax season, but that doesn’t mean you can’t do anything about it. Don’t let the vulnerabilities in your business, particularly the human element, fall prey to cybercriminals. Call us at 800-421-7151 right away and we’ll conduct an assessment of the security of your business, as well as design a risk management plan to help counter future complications.

3 Tips to Maintain a Secure Facebook Account

In March 2018, disturbing reports circulated on the web that revealed a company named Cambridge Analytica harvested confidential details of 50 million Facebook accounts. If you’re concerned that your private details are being passed around by private companies, consider the following 3 tips to maintain a confidential Facebook profile.

Download your Facebook data

The thought of a complete stranger going through your account is pretty disturbing. Yet, you’re probably curious about the amount of information you uploaded to your social media sites over the years. Fortunately, Facebook allows you to download a copy of all your data. You simply have to log in to its web version and…

  • On the site’s main navigation, click on the down button right next to the Quick Help icon
  • A menu will pop up and you’ll find Settings right above the Log Out option
  • Click on Settings and you’ll automatically be redirected to General
  • Within the General page, press Download a copy of your Facebook Data
  • It will redirect you to a different page where you’ll need to press Start My Archive button to proceed with the download process

Once that’s done, you’ll be able to see an archive of all your Facebook activity, such as the statuses you’ve posted, messages you’ve sent, and ads you’ve clicked on.

Change your privacy settings

After going through all your data, you might realize that everything you shared is harmless. But, that doesn’t mean it won’t end up in the hands of cybercriminals who can use it against you.

We suggest going back to the Settings page and clicking on Privacy. That’s where you can modify whether you want your posts to be seen by the public or only by your friends. You can even control who’s allowed to send you friend requests, view your friends list, and most importantly, decide whether search engines are allowed to link to your profile.

Check or delete apps

You know those personality quizzes that you and your friends always had a ball answering? Apparently, Cambridge Analytica gathered all the responses from one of those app developers. Luckily, you can stop them from further accessing your profile. In Settings, click on Apps to see all the apps linked to your profile. Beside each one, you can choose Edit Settings to review its authorizations or click Remove to completely get rid of it.

Your recent love-hate relationship with Facebook has you second-guessing. If you want to take data security up a notch, we can always provide more tips and tools, and even assess your current level of security. Just give us a call at 800-421-7151 and we’ll take care of your privacy so you don’t wind up breaking up with your favorite social media site.

Keeping Cloud Costs Under Control

One of the most well known benefits of the cloud is it boosts cost efficiency. By moving to the cloud, small- and medium-sized businesses no longer have to worry about purchasing high-end equipment or maintaining full-scale data centers. However, there are quite a few costs associated with the cloud, so it’s important you know how to keep them under control.

Don’t go for standalone services
Standalone services are the biggest price trap in the cloud. Spending on a standalone cloud software may seem harmless now, but if you decide to purchase similar services, the costs can quickly pile up. Then, there’s the issue of integrating these systems together, which costs even more time and money.

The best way around this is to find a service provider that offers a suite of products that work seamlessly together. Platforms like Office 365 or G Suite are great examples, and offer you differently priced packages based on the size and requirements of your business.

Team up with integration experts
If you do need to subscribe to a standalone service, you’ll want to integrate it with the rest of your cloud platform. But if you have limited experience with integrations, mistakes are likely to happen and cause downtime, which will inevitably cost you time and money.

The more economical option is to partner with a cloud integration expert, as they can quickly configure and deploy your systems with zero mistakes.

Understand cloud backup costs
While cloud backups are great for keeping your data secure, you must know how much you’re paying for them. If you plan on storing your data for a long time, you may be charged more. At the same time, if you store more versions of your data, it will cost you more.

One way you can keep costs down is to ask yourself whether certain files even need to be stored in the cloud. Mission-critical files like customer information, legal document, and business plans should be stored in the cloud so you can retrieve them right away after a disaster, but routine documents like timesheets can probably be stored in less expensive data centers.

Remove unnecessary accounts
Most cloud service providers charge you based on the number of users per month, so if you’re not diligent about removing accounts when employees have left your company, you could be throwing your money down the drain.

To avoid this, you need to have deprovisioning procedures in place for when an employee’s contract is terminated. Create a spreadsheet of each employee in your payroll and note down their cloud subscriptions. When an employee leaves your company, you must delete all their business accounts and give the relevant manager access to all their documents.

It’s also a good idea to schedule regular audits to make sure you’re not paying for people who’ve already left your company.

Work with a trustworthy provider
Last but not least, you’ll want to partner with a cloud services provider that not only gives you the best deals on cloud solutions, but also proactively monitors your account and warns you about any issues regarding the computing resources and storage space you’re using.

If you’re looking to keep cloud costs under control, talk to us today at 800-421-7151. We’re certified and experienced with all aspects of cloud technology, and we can show you how you can truly benefit from it.

Don’t Ever Let Your IT Company Do This To Your Computer Network

Today, when companies need to be lean, nimble and brutally efficient to survive in a competitive marketplace,cutting unnecessary costs is paramount. Unfortunately, it can be easy when you’re on a tight budget to accidentally strip away components of your business that may seem gratuitous but are actually essential to your success.

One of the first things that often ends up on the chopping block in the frenzy to save money is IT. Instead of continually investing in managed IT services, where professionals carefully maintain, protect and update your network month to month, some businesses decide that the best way to keep their technology running smoothly is to simply leave it alone, calling up a professional only when something breaks down.

Of course, this approach forgoes monthly costs and shaves off a fair few dollars from your technology budget in the short run. But while this approach may seem cost-effective, it opens up your business to a huge variety of technological crises, from expensive network outages to cyberattacks that may cripple the very future of your company.

The Problem With A ‘Break-Fix’ Strategy

It can be hard to imagine the huge list of problems that might arise within your network. So, it’s an understandable strategy to wait to do something until an issue becomes a serious problem. At that point, they bring in a professional who – charging by the hour – attempts to suss out and repair whatever may be broken.

It seems like a logical approach, but unfortunately, it’s littered with huge hidden costs. If you’re calling an IT expert only when something in your network is broken, only your most urgent technological needs are

addressed. When your technician is being paid an hourly wage to fix a specific issue, there’s no incentive to be proactive with your system. They won’t recommend important, money-saving upgrades or updates, and they will rarely be able to detect a crisis before it happens.

What’s more, the approach “If it ain’t broke, don’t fix it” very likely leaves huge holes in your security and drastically magnifies the costs of an IT meltdown. If they’re only arriving in the midst of crisis, there’s hardly ever an opportunity for the break-fix technician to strengthen the barriers between you and the hordes of hackers clamoring for your data. They’re on the clock, being closely monitored to fix the problem and then go away. Meanwhile, the security landscape is constantly changing, with criminals and security experts in a back-and-forth arms race to stay abreast of the latest developments.

Without someone managing your system on a regular basis, your protective measures are sure to become woefully out of date and essentially useless against attack.

Why Managed IT Services Are The Answer

When you turn your IT needs to a managed services provider (MSP), you’re entrusting the care of your network to a team of experts who have a real interest in your success. MSP engineers regularly monitor the health of your system, proactively preventing disaster before it enters into the equation and hurts your bottom line.

Beyond this preventative care, MSPs do everything they possibly can to maximize the power and efficiency of your equipment, implementing only the best practices and the latest software and updates.

When you invest in an MSP, you may have to invest more funds initially, but likely you’ll save tens of thousands of dollars in the long run by avoiding cyber-attacks, downtime and hourly rates wasted on a technician who doesn’t really care about the future of your business. When you choose an MSP, you’re not just choosing a superior and healthier network – you’re choosing peace of mind. Call us today at 800-421-7151 to learn more about our Managed Services. 

Does Private Browsing Secure Your Data?

If you’re getting targeted with surprisingly relevant ads, there’s a chance your internet activity is being tracked and analyzed by market researchers. While this doesn’t bother most people, private browsing mode can offer you some protection against online marketers and would-be data thieves.

What is private browsing?
Your web browser – whether it be Chrome, Edge, Firefox, Safari, or Opera – remembers the URLs of the sites you visit, cookies that track your activity, passwords you’ve used, and temporary files you’ve downloaded.

This can be convenient if you frequently visit certain pages, can’t remember your login details, or if you’re trying to recall a website you visited a few days ago. But if someone else uses or gains access to your computer, your most private (and embarrassing) internet activities are exposed for anyone to see.

With private browsing – also called Incognito Mode in Chrome and InPrivate Browsing in Edge – all the information listed above does not get recorded. In fact, all the websites and information you accessed in the private browsing session is immediately discarded without a trace as soon as you close the browser. This can come in handy when you’re using a public computer because you’re instantly logged out of all the accounts after closing the window.

Your cookies also won’t be tracked. In a normal browsing session, sites like Facebook will inundate you with highly targeted ads based on the sites and pages you’ve visited. But in private browsing mode, your internet activity won’t be used against you by marketing companies.

Another benefit of private browsing is you can use it to log in to several accounts on the same site, which is useful if you need to log into two different Google accounts at the same time.

Limitations of private browsing
Although private browsing does prevent your web browser from storing your data, it doesn’t stop anyone from snooping on your current activities. If your computer is connected to the company network, system administrators can still keep track of what you’re browsing even if you’re in Incognito Mode.

Also, if spyware or keylogger malware is installed on your computer, hackers will still be able to see what you’re doing online. Even though private browsing has quite a few benefits, you shouldn’t solely depend on it for online privacy.

Your computers must be equipped with Virtual Private Networks that encrypt your internet connection and prevent anyone from intercepting your data. And don’t forget to scan your computer for viruses with a strong anti-malware program to keep spyware and other malicious web monitoring software at bay.

If you want to know where you can get these solutions or learn more about web browser security, call us today at 800-421-7151. We have the tools and expert advice you need to prevent anyone from snooping on your internet browsing.

Prep for IT Incidents with External Support

Regardless of your best office IT strategies, it’s nearly impossible to thwart every type of cyberattack. And when they do happen, most businesses depend primarily on their internal resources and personnel. On the other hand, some organizations have realized the risks and complexities involved and have sought external support from leading industry specialists. Here are reasons why you should, too.

Access to new technologies and industry experts
Managed Services Providers (MSPs) are equipped with resources most small businesses can’t afford. They employ teams of experts in fields ranging from cybersecurity to data management to networking – all available for you on an outsourced basis. For example, an MSP provides advanced security software and applications that can help your business avoid the risks of cyberthreats.

They also work with industry tech leaders who provide insights into upcoming hardware and software products in the market. This ensures you receive updated recommendations on the latest technologies so you can use them in your business, and they often come with deals that you wouldn’t normally have access to.

Knowledge from past breaches
External IT support providers have been helping businesses recover from all kinds of tech disasters since the dawn of hackers. They now have enough knowledge to prepare Data Backup and Disaster Recovery plans for you. This way, you and your team would still be up and running after suffering from an IT emergency without disrupting much of your business operations.

External support providers’ experience with data protection will ensure your systems are monitored around the clock so your security systems are always functioning properly to keep cybercriminals at bay.

Run your business with ease
You don’t specialize in technology, so you don’t have the skill or the experience in dealing with digital felons. You also know how vulnerable your business is online and won’t dare do anything to jeopardize it. That’s why external support is such a great asset – you’ll be able to manage your business without any worries because your external IT provider will keep it protected. Give us a call at 800-421-7151 to see how we can keep your mind at ease.

Best Uses of Alexa in a Business Setting

Individual users find plenty to like about Amazon’s AI technology Alexa. It’s a great way to control smart home devices and perform small tasks like make shopping lists and answer phone calls. But Alexa also gets things done for business users, and here we’ll list some of the most useful.

Create and manage to-do and shopping lists
You have meetings to attend and deadlines to meet. Alexa has a straightforward To-do List feature that helps you stay on top of all your tasks. It’s ideal for busy professionals who prefer a no-frills checklist that allows them to simply view completed items, or to edit or delete items on the list.

You can also seamlessly sync third-party applications like Any.do and Todoist, which offer more features for organizing tasks, adding subtasks and folders, creating reminders, setting due dates, attaching files, and prioritizing items.

To connect to a third-party app:

Go to alexa.amazon.com or access the Alexa app
Go to Settings > List, click Get Skill
Click Enable
Log in to authorize the app
Alexa also has a default Shopping List that works exactly like the To-do List. It lets you add or delete items that can be browsed in the Amazon store and searched for in Bing.

Reorder office supplies
Ordering supplies on an Amazon smart home device is especially convenient because you would have already set up an Amazon account. When voice shopping with Alexa, you can either add items to your Amazon cart (“Alexa, add toner to my cart”) or directly order a single item (“Alexa, reorder toner”) without having to lift a finger.

When you place an order, Alexa checks product availability, walks you through Amazon search results, and asks you to confirm or cancel the order. Voice shopping is enabled by default, but it can be disabled in Settings > Voice Purchasing in the Alexa app.

Sync your calendars
One of the best ways to maximize Alexa in the office is to sync it up with your calendars. You can view scheduled appointments, set meetings, or have Alexa read the day’s entries with simple commands like “Alexa, what time is my next meeting?” or “Alexa, when is the company barbecue?”.

To add a calendar:

Go to alexa.amazon.com or access the Alexa app
Click Settings > Calendar
Select a calendar from the available platforms: Google (Gmail and G Suite), Apple (iCloud), or Microsoft (Office 365 or Outlook)
Log in to your account
Set a timer
A Pomodoro timer is a productivity enhancement tool that works by prescribing ideal work intervals and breaks. For example, you can set a timer that reminds you to take a 15-minute break for every hour worked, and setting this up in Alexa is easy.

To set a single timer:

Say “Alexa, set a work timer for 60 minutes.”
After the work timer finishes, say “Alexa, set a break time for 15 minutes.”
To set several timers at once, say:

“Alexa, create a work timer for 60 minutes.”
“Alexa, create a break timer for 15 minutes.”

But of course, due to the listening technology of Alexa, users should not expect 100% privacy. Here are a few ways that you can protect yourself from Alexa hearing and recording anything you don’t want her to hear:

Always Mute your Echo when Not in Use – The mute/unmute button can be located at the top of the device. Unmute and Alexa is no longer listening.
Don’t connect sensitive accounts to your Echo – This has proven to be a problem for users on multiple occasions.
Erase old recordings – If your Echo is connected to your Amazon account, as it should be to get the most out of it, you can manage recordings. This can be done by logging into Amazon’s website and navigating to “Manage my device.” You can delete both individual queries and/or the entire search history.

The commands we’ve included here work for simple instructions, but you can modify them and use tons of other Alexa commands to suit your purpose. If you need recommendations on how you can work smarter with AI and other productivity tools, get in touch with us today at 800-421-7151.

Outlook Tips to Increase Productivity

Microsoft is constantly updating and improving its Outlook email program, and some users struggle to keep up with all the new and exciting features. Look no further if you wish to catch up on the latest productivity-enhancing tricks.

Clean Up your inbox
No matter inbox how meticulously organized your Outlook inbox is, there’s always room for improvement. For a little computer-assisted help, try the ‘Clean Up’ feature.

From your Inbox, click the Home tab and choose from Outlook’s three Clean Up options:
Clean Up Conversation – Reviews an email thread or a conversation and deletes redundant messages.
Clean Up Folder – Reviews conversations in a selected folder and deletes redundant messages.
Clean Up Folder & Subfolders – Reviews all messages in a selected folder and its subfolder, and deletes redundant messages in all of them.

Ignore (unnecessary) conversations
An overstuffed inbox is often caused by group conversations that aren’t relevant to you. The Ignore button helps you organize your inbox and focus on relevant emails.

Select a message, then click Home > Ignore > Ignore Conversation. You can also do this by opening a message in a new window and clicking Ignore under the Delete function. To recover an ignored message, go to the Deleted Items folder, and click Ignore > Stop Ignoring Conversation.

Send links instead of a file copy
Help your colleagues save storage by sending a link to a cloud version of a file instead of the file itself. This is particularly useful when sending massive files. You can also set permissions to allow recipients to edit and collaborate on linked files in real time.

Upload the file you wish to send on OneDrive and send it to your recipients. From the message box, click Attach File > Browse web locations > OneDrive.

Improve meetings with Skype and OneNote
Outlook allows you to combine Skype’s HD video and screen-sharing features with OneNote’s organizational and project planning functions. It’s easy:

Go to the Meeting tab in Outlook, then click Skype meeting and send the link to participants. After the meeting has started, select Meeting Notes (under the Meeting tab) and choose whether you want to Take notes on your own or Share notes with the meeting.

Tag contacts
To get the attention of a specific person in a group email message, use the @Mention function. This works particularly well for mails to multiple recipients or for if you simply want to convey the urgency of your message.

In the email body or meeting request, type the ‘@’ symbol followed by the first and last name of the person you wish to tag (e.g., @firstnamelastname).
To search for emails you’re tagged in, select Filter Email from the Home tab and choose Mentioned, then choose Mentioned.

These are just a few strategies for getting more out of Microsoft’s email platform. To unlock Outlook’s true potential, you need the support of certified IT professionals. Give us a call today at 800-421-7151.

HTTPS is Something to Care About

For all the time we spend discussing the complexity of internet security, there are a few simple things you can do. Avoiding websites that aren’t secured with the HTTPS protocol is one of them. It’s a habit that can be developed with a better understanding of what the padlock icon in your web browser’s address bar represents.

HTTPS Encryption
Older web protocols lack data encryption. When you visit a website that doesn’t use HTTPS, everything you type or click on that website is sent across the network in plain text. So, if your bank’s website doesn’t use the latest protocols, your login information can be intercepted by anyone with the right tools.

HTTPS Certificates
The second thing outdated web browsing lacks is publisher certificates. When you enter a web address into your browser, your computer uses an online directory to translate that text into numerical addresses (e.g., www.google.com = 8.8.8.8) then saves that information on your computer so it doesn’t need to check the online directory every time you visit a known website.

The problem is, if your computer is hacked it could be tricked into directing www.google.com to 8.8.8.255, even if that’s a malicious website. Oftentimes, this strategy is implemented to send users to sites that look exactly like what they expected, but are actually false-front sites designed to trick you into providing your credentials.

HTTPS created a new ecosystem of certificates that are issued by the online directories mentioned earlier. These certificates make it impossible for you to be redirected to a false-front website.

What this means for daily browsing
Most people hop from site to site too quickly to check each one for padlocks and certificates. Unfortunately, HTTPS is way too important to ignore. Here are a few things to consider when browsing:

If your browser marks a website as “unsafe” do not click “proceed anyway” unless you are absolutely certain nothing private will be transmitted.
There are web browser extensions that create encrypted connections to unencrypted websites (HTTPS Everywhere is great for Chrome and Firefox).
HTTPS certificates don’t mean anything if you don’t recognize the company’s name. For example, goog1e.com (with the ‘l’ replaced with a one) could have a certificate, but that doesn’t mean it’s a trustworthy site.

Avoiding sites that don’t use the HTTPS protocol is just one of many things you need to do to stay safe when browsing the internet. When you’re ready for IT support that handles the finer points of cybersecurity like safe web browsing, give our office a call at 800-421-7151.

New Scam Freezes Browser to Panic Users

New Scam Freezes Browsers to Panic Users

Con artists have created a new method of deceiving users by freezing their browsers and displaying a security notification with bogus tech-support contact details. This adware scam has been found to affect users in both Windows and macOS. Their ultimate goal is to scare potential victims and trick them into dialing the fake hotline number on the screen.

The End Game
The scam works by displaying an error message indicating a bogus security breach incident that renders a browser unusable. It appears to be an important security message. These scammers capitalize on the fact that a serious crash can’t be solved by simply closing the site, thereby sending the users into a panic. This encourages them to dial the number listed on the warning message.

On the other end of the line, the scammers would pose as Microsoft or Apple representatives to convince users into surrendering their credit card details to repair a non-existing security issue. Whatever you do, please do not call the phone number for support because it is not Microsoft’s but rather a group of scammers waiting to rob you of hundreds of dollars under false pretenses. The scams are generally carried out through legitimate sites or malicious ads that have been hacked.

The Ingenious Process
This new scam operates against your browser by corrupting the window.navigator.msSaveOrOpenBlob programming interface, which basically uses it as a form of distraction. The hackers manipulate the browser and forces it to save a random document on a disk repeatedly at super fast intervals that are impossible to notice. After five to 10 seconds, your browser will be completely unresponsive.

The Easy Fix
To recover, Windows users simply have to open Windows Task Manager (press ctrl + shift + esc keys) and stop the process there. On the other hand, macOS users just need to wait until a system message prompts them to close the unresponsive Chrome tab. Typically, the latter is a more appealing option since users would have the freedom to close only the corrupted page. Manually closing the whole browser means possibly losing unsaved files in any open Windows.

When faced with IT-related issues, you need to determine how you can approach them calmly. The threats in the digital world may be terrifying and intimidating, but causing a panic in your workplace isn’t the answer. Call us at 800-421-7151 as soon as any problems arise, and we’ll help you as soon as we can. We can even hook you up with other security measures to beef up your network security.

Top Tips for First-Time Virtualization Users

Unlike most solutions, virtualization technology is not plug and play. It requires you to understand your IT environment and know which aspects could and should be virtualized. This is not something we expect first-time virtualization users to grasp right away, so if you’re planning to implement it, follow these tips.

Conduct an assessment
Evaluating your IT environment is an important step in the implementation process. After all, you can’t just go around virtualizing everything without a plan. An IT assessment performed by an impartial managed services provider (MSP) like us helps you understand what type of virtualization solution you need.

For example, if the report found that computers don’t have enough processing power to run certain apps, desktop virtualization — which consolidates operating systems and apps into a single powerful server — is an ideal solution.

From there, you should be able to estimate costs and set realistic timelines for the implementation.

Don’t forget about hardware
Just because virtualization frees up space in your server room, does not mean hardware is no longer an issue. No matter what type of solution you opt for, the servers you use must be strong enough to support the entire company’s computing demands.

This means you must take stock of your apps and their hardware requirements and make sure your server has all the processing power, RAM, network capacity, and storage necessary to run them.

Underutilized servers are excellent candidates for virtualization, but purchasing new equipment may pay dividends in the long run. If you choose the latter option, ask your provider for recommendations. Chances are they’re partnered with virtualization-optimized hardware vendors that offer top-of-the-line servers.

Prevent VM sprawl
Virtualization allows you to deliver computing resources to workstations in your network via virtual machines (VMs), which can be created on a server in just a few minutes. While this lets you scale and provision resources quickly, there are risks if you don’t have someone regularly reviewing which VMs are worthwhile and which are outdated. You could be losing out on cost savings and efficiency benefits.

When too many VMs are created, they can quickly consume all server resources and complicate licensing and asset management.

To prevent sprawl, you must establish policies and restrictions for VM creation. For instance, users must have a good justification for creating a VM (e.g., testing software or provisioning apps for new users).

Prioritize business continuity
You must also protect the hardware running your virtual servers. Make sure to lock up server rooms and have secondary servers available in case the first one breaks down. While you’re at it, take advantage of automated backup solutions that make copies of your VMs and their files regularly.

Work with experts
Building and maintaining a virtual infrastructure is no simple task. That’s why you’ll want to work with a virtualization specialist who can guarantee a seamless implementation and provide ongoing management services.

For more tips on virtualization, call our experts today!

Cryptojacking: How to Protect Yourself

Over time, your computer will work slower as software requirements become more demanding. But if you have a relatively new computer, and are experiencing performance problems after clicking a link or visiting a website, you might be the victim of a new cyberattack scheme known as cryptojacking.

Hijacked hardware
Cryptojacking secretly uses your computer to calculate complex mathematical problems to generate cryptocurrency. They get inside by using phishing emails to lure victims into clicking on a link, which then runs malicious cryptomining programs on the computer. Any cryptocurrency produced then gets delivered to the hacker’s private server.

But hackers have developed an even more insidious tactic. By infecting websites with ads and plugins that run cryptojacking code, any visitor who loads the web page instantly gets infected with the malware, sending their computer’s processor into overdrive trying to generate cryptocurrency.

Unlike most malware, cryptojacking software won’t compromise your data. But it will hijack your hardware’s processing power, decreasing performance while increasing your power and cooling bills. So instead of paying for the computing power themselves, hackers can simply use thousands of compromised computers.

Surge in cryptojacking
It’s difficult to tell how much hackers are making with cryptojacking, but there’s a good chance that this type of attack will be as popular as ransomware was in 2017. In fact, for as little as $30, anyone can purchase a cryptojacking kit from the dark web to force other computers to generate Bitcoin or Monero for them.

According to several reports, even sites like The Pirate Bay, Openload, and OnlineVideoConverter are allegedly using cryptojacking exploits to diversify their revenue streams.

The biggest reason why this is becoming so popular is because it’s a low-risk, high-reward scheme. Instead of extorting money directly from the victim, hackers can secretly generate digital currencies without the victim knowing.

If it is detected, it’s also very hard to track down who initiated the attack. And since nothing was actually “stolen” (other than a portion of computing power), victims have little incentive to apprehend the culprit.

Prevention and response
To avoid cryptojacking, you need to incorporate it into your monthly security training sessions. Teach your employees to practice extra caution with unsolicited emails and suspicious links. Using ad-blocker or anti-cryptomining extensions on web browsers is also a great way to stay protected.

Beyond prevention, use network monitoring solutions to detect any unusual behavior with your computers. For example, if you notice a significant number of PCs running slower than usual, you should assume that cryptojacking is taking place.

If you’ve confirmed that it is, advise your staff to close browser tabs and update browser extensions as soon as possible.

Cryptojacking may seem less threatening than some malware we’ve discussed in the past, but it can incur real power, cooling, and performance costs to your business when several systems are compromised. To make sure you don’t end up enriching any hackers, call us today at 800-421-7151. We offer hardware solutions and cybersecurity tips to keep your business safe and sound.

5 Ways Your Employees Will Invite Hackers Into Your Network

Whether they’re criminals or heroes, hackers in the movies are always portrayed as a glamorous group. When it comes down to the wire, these are the individuals who crack into the ominous megacorporation or hostile foreign government database, hitting the right key just in the nick of time. They either save the day or bring down regimes, empty the digital vault of the Federal Reserve or disable all the power plants in the country. It’s always a genius up against an impenetrable fortress of digital security, but no matter what, they always come out on top.

In real life, it’s rarely that difficult. Sure, if you look at the news, you might believe hackers are close to their Hollywood counterparts, stealing data from the NSA and nabbing millions of customer records from Equifax. But the majority of hacks aren’t against the big dogs; they’re against small to mid-sized businesses. And usually,this doesn’t involve actually hacking into anything. A lot of the time – approximately 60% according to the Harvard Business Review – an unwitting employee accidentally leaves the digital front door open.

The biggest threats to your company aren’t teams of roaming hackers; they’re your employees. Here’s why.

1 They’ll slip up because they don’t know any better.

With the proliferation of technology has come an exponential rise in digital threats of such variety and complexity that it’d be impossible for the average person to keep track of it all. Each of your employees’ lives are a labyrinth of passwords, interconnected online accounts and precious data. If their vigilance slacks at any point, it not only leaves them vulnerable, but it leaves your company vulnerable as well. For this reason, most cyber-attacks come down to a lack of cyber security education.

2 They’ll let you get hacked on purpose.

It’s a sad fact that a huge portion of digital attacks are the result of company insiders exposing data to malicious groups. Whether it’s info vital for your competitive advantage, passwords they can sell to hacker networks to make a quick buck or sensitive data they can make public simply to spite your organization, it’s difficult to protect against a double agent.

3 They’ll trust the wrong person.

For many hacks, little code is needed whatsoever. Instead, hackers are notorious for posing as a trusted member of your own team. And if you believe that you’d be able to spot an impostor from a mile away, you may want to think again. Not only is it easier than ever to crack individual users’ e-mail passwords and login credentials, personal info is now littered throughout social media. A simple visit to Facebook can give a hacker all they need to know to “social hack” their way into the heart of your business.

4 They’ll miss red flags while surfing the web.

Clickbait is more than a nuisance plaguing your social media feeds. It can be a powerful tool for hackers trolling for easy prey. If an employee doesn’t understand what exactly makes a site or link look dubious, they may open themselves – and your company – to browser exploits or other types of attacks.

5 They’re terrible at passwords.

According to Entreprenuer.com, “3 out of 4 consumers use duplicate passwords, many of which have not been changed in five years or more.” Even more of those passwords are simply weak, inviting easy access for unsavory elements. Many people brush off the importance of strong passwords, but the risks posed by the password “123456” or “password” cannot be overstated.

When it comes to defending your precious assets against digital threats, it can seem impossible to protect yourself at every turn. But there is one way you can make a concrete change that will tighten up your
security more than you realize: educating your people. Through a comprehensive security training program, including specific examples of methods hackers use – particularly phishing – you can drastically
minimize the risk of an employee accidentally opening up a malicious e-mail or posting sensitive info. When you make a concerted effort to make the entire organization vigilant against cyber-attacks, you’re much less likely to be targeted. Email us at info@wamsinc.com to learn more!

How to Enjoy Your New Laptop

Did you just get the newest laptop? New tech toys are always very exciting, but before you start showing off your new purchase, there are five steps you should take to make your laptop experience even more enjoyable and long-lasting.

1. Update your laptop’s operating system
One of the first things you should do before using your laptop is upgrade its operating system. Assuming you did not purchase the laptop right when it was released, your laptop will still be running an older operating system. With important patches and fixes released in each new update, it is recommended that you install the latest one to ensure your laptop is free of any vulnerabilities.

2. Remove bloatware
Opening your laptop for the first time, you might notice that there are already several preloaded software in the system — some of which you will probably never use. These are known as bloatware.

These apps take up a lot of your valuable drive space, so consider getting rid of them. The easiest way to do this is by downloading a bulk uninstaller, which allows you to check all the bloatware apps you don’t want and remove them in one fell swoop.

3. Install protection software
It’s no secret that the world we live in is unsafe. And with so much confidential information nowadays becoming digitalized, it is necessary to protect yourself against losing important data from your computer. The solution to this is very simple. By installing antivirus software that can automatically — or manually — scan your computer at a scheduled time, potential attacks can be thwarted before they become more serious.

Not only is your laptop’s data vulnerable to cyberattacks, there is always a chance your laptop can get lost or stolen. While there are preventive steps you can take — such as being mindful while using your laptop in public places — another solution would be to install anti-theft software. Security features such as “Find My Device” for Windows 10 and “Prey” for other operating systems can help you locate your device if it’s ever stolen or misplaced.

4. Optimize your power settings
One of the most frequent problems that laptop users have is that their batteries run out of juice too fast. However, you can actually extend the battery life by making a few tweaks to your power settings.

Reduce your display brightness, but not so much that it causes eye and mental fatigue
Use the Sleep or Hibernate mode for your operating system

5. Set up a backup plan
Imagine spending months working on an important project and suddenly finding it nonexistent the next day just because your laptop crashed. Deadlines will be missed. Profit margins will decrease. Customers will leave unhappy. And if worse comes to worst, you’ll be out of business.

Why add more unnecessary stress if you can prevent it from happening in the first place? By setting up an automatic backup system, you can regularly save all your important files; that way, you’d still have access to the data anytime were anything to happen to the original file.

Getting a new laptop can be fun, but the joy might be short-lived if you don’t set up any preventive measures from the start. Call us at 800-421-7151 for information on how we can help you secure your company’s laptop today.

Distributed Spam Hides Illegal Activities

Cybercriminals are fairly experienced at avoiding detection. By the time you notice they’ve infected your computer with malware or hijacked your account, serious damage has most likely already been done. To make matters worse, they have another way to hide their illegal activities, and it involves sending thousands of spam emails.

Understanding DSD
Distributed Spam Distraction (DSD) is designed to inundate your inbox with thousands of nonsense emails. There are no dangerous links, ads, or attachments involved, just random excerpts of text stolen from books and websites. What’s more, the email and IP addresses used are all different so victims can’t simply block a specific sender.

These attacks last anywhere from 12 to 24 hours and can flood inboxes with as many as 60,000 messages. While they may seem like harmless annoyances, the true purpose of DSD is to draw victims’ attention away from what hackers are doing behind the scenes.

And what they’re doing is exploiting your personally identifiable information (PII) to make unauthorized purchases or pilfer cash directly from your accounts. The DSD acts as a sort of smokescreen to hide payment confirmation messages behind a deluge of spam messages.

New tactics
Over the years, hackers have developed new tactics involving DSD. Several reports have shown that, instead of nonsensical emails, hackers are using automated software to have their targets sign up for thousands of free accounts and newsletters to distract them with authentic messages. This allows DSD blasts to slip past spam filters that have been designed to weed out malicious code and gibberish text used by traditional DSD attacks.

What’s even more worrying is that any ill-intentioned individual can go to the dark web and pay for DSD services. They just have to provide a hacker with their target’s name, email address, and credit card numbers — all of which can also be purchased in the dark web — and pay as little as $40 to send 20,000 spam messages.

How to stop it
DSD is a clear sign that one of your accounts has been hijacked, so whenever you receive dozens of emails in quick succession, contact your financial institutions to cancel any unfamiliar transactions and change your login credentials as soon as possible. It’s also important to update your anti-spam software (or get one if you don’t have one already) to protect your inbox from future DSD attacks.

Hackers only initiate DSD attacks after they’ve obtained their target’s email address and personal information, so make sure your accounts and identity are well protected. This means you should regularly change your passwords and pins, enable multi-factor authentication, set up text alerts for whenever online purchases are made in your name, and be careful about sharing personal information.

For more tips on how to deal with DSDs or other cyberattacks, call us today at 800-421-7151. We offer powerful tools and expert advice that will ensure your business’s safety.

WARNING: Your Business Is More Likely To Be The Victim Of Cybercrime NOW Than Ever Before…Take These Steps Today So You Don’t Get Hacked!

Though we’re in the midst of an unprecedented rise in high-profile cybercrime incidents, it’s easy to assume that our own much smaller businesses are safe. Sure, we think, hacking into the data stores of J.P. Morgan, the U.S. Government, or Virgin America can net hackers millions and millions of dollars.  Why would they bother with a small business?
But unfortunately for all of us, hackers actually do bother with small businesses across the country — these attacks just don’t make the news. By some estimates, including one reported in Media Planet, more than half of small businesses have had their data compromised. According to StaySafeOnline.org, these attacks, targeting small to midsize companies, now comprise over 70% of all data breaches. What’s worse, this digital onslaught shows no sign of slowing. In fact, ransomware attacks alone have increased 250% since 2016, accompanied by higher rates of malware, phishing, and other forms of cybercrime.
Once you see these numbers, it’s easy to understand why hackers seek the little guy. These days, massive corporations like Google or Citigroup employ incredibly sophisticated digital measures. Their digital vaults, though containing ludicrously attractive sums of potential money to grab, are located at the end of a virtual labyrinth covered in traps, with a final, inches-thick steel door protecting their assets for good measure. In contrast, the digital assets of small businesses are often hidden behind nothing more than a single, often weak,
password. With thousands of business owners going about their day-to-day, utterly oblivious to their paper-thin security, the question turns from “Why would hackers bother with my small business?” to “Why wouldn’t they?”
Though cybercriminals may come away with less than they might have had they targeted a Fortune 500 company, it certainly isn’t going to seem cheap to you. According to one TechRepublic analysis, an average
cyber-attack on a small business can cost as much as $256,000. Is that a sudden cost your company can weather?
Luckily, there is hope. Though small business owners often assume that effective cyber security solutions lie far outside their budget range, robust digital security is now more affordable than ever. By investing in comprehensive protection, small businesses can deflect even the most persistent hackers.
Today, a cyber-attack on your business is almost statistically inevitable. And when that attack comes, you’ll definitely want to be prepared. If you haven’t needed a doctor for the past two years, does that mean you’re
going to abandon your health insurance coverage? Of course not. What about car insurance? Does it become unnecessary in the absence of a crash? No, because even if you’re the best driver in the world, sometimes a collision is out of your control. What’s more, both your body and your car require regular upkeep and maintenance to remain in peak condition. It’s no different with your network security. As technology hurtles forward at an ever-increasing speed, the ways that hackers can infiltrate your network multiply. The best digital security platforms constantly update, enabling them to anticipate these shifts and prevent them from becoming liabilities. This way, you can be proactive prior to a digital crisis, ensuring that no matter what comes, your network is protected.
Even as digital crime climbs at a staggering rate, and hundreds of small businesses are forced to close their doors for good, thousands of owners fail to notice, assuming they’ll somehow be spared from an attack. Don’t be one of them. Invest in regularly maintained, powerful cyber security, and ensure the future of your company. Call us at 800-421-7151 to take the first step.

The “Not Me!” Problem…And Why This Is Almost Guaranteed TO Happen To You

Security this, password that – now they want a password with 14 characters with two symbols? And I have to change it every three months? As difficult as it is to remember 24 different passwords, four PIN numbers and a slew of new cyber security processes, we still manage to instantly recall most of the tangible things in our lives. The code for the company door and alarm system, the passcode to our phones, the garage code, the other garage code – you get the idea.

But these numbers are based upon a time when the most “real” threat seemed to be someone busting in our door and threatening our families in the middle of the night. In 2018, those kinds of physical threats are far less

statistically prevalent than cybercrime. In fact, data breaches and identity theft are occurring at three times the rate that home burglaries occur in the U.S. according to a 2016 study by the University of Kentucky.

Don’t succumb to the “Not me!” approach to the shift in crime. Understand that it can happen to you, and approach all aspects of physical and electronic security with the attention they deserve. Have any questions about your security? Call our experts at 800-421-7151 today!

Fortify Your Data, Physically

Truly optimized security settings and software are beyond the capacity of most business owners. You just don’t have time to tinker with your office IT. Instead, try these quick and easy tips before calling us.

Cover Up Your Webcam

There must be some credibility to doing this if Facebook founder, Mark Zuckerberg, former FBI director, James Comey, and NSA whistleblower Edward Snowden all believe their webcams could be compromised. This is not just another paranoid celebrity reaction to ruthless paparazzi, there’s a genuine reason behind it. Kindly take a moment to consider the following scenario: hackers using your webcam to spy on you.

Though it might sound unrealistic, this actually happened on several occasions. Sometimes for purely voyeuristic reasons and sometimes what appeared to be espionage. This is a very real threat with disturbing repercussions. Hackers aim to gain personal information based on your surroundings, deduce your location, as well as spy on the people you’re with, ultimately using this information to hold you ransom, threatening to broadcast your most intimate and vulnerable moments if you don’t pay up.

Fortunately, guarding yourself against such danger is really easy and some painter’s tape over your webcam should do the trick. If you’re not confident about regular tape, you can purchase a cheap webcam cover online or at any hardware store.

Purchase a Privacy Shield

Think of privacy guards as those iPhone scratch protectors, but with an anti-snooping feature. These are thin covers you put on your computer, laptop or smartphone screen to limit viewing angles. Once installed, anyone trying to look at your screen from anywhere – except straight-on – sees nothing. Privacy filters are commonly used to protect work devices, particularly which display or contain critical files with sensitive data or confidential information. However, less sensitive, personal devices are still vulnerable to ‘shoulder surfing’ – the act of peeking at someone else’s screen, with or without ill intent, which is why we recommend using these protectors on all your devices.

Use a Physical Authentication Key

Requiring more than one set of credentials to access sensitive resources is common sense, and has become standard practice for established online services. With something called two-factor authentication in place, you gain access to your account only after you’ve entered the authentication code, which the website sends to your smartphone once you’ve entered your account credentials. Until recently, two-factor authentication relied mostly on text messages that were sent to mobile phones. But professionals have now realised that phones can be hijackedto redirect text messages.

Moreover, authentication codes can be stolen, or users can be tricked into entering these codes via a convincing phishing website. If you’re looking for authentication services that cannot be hijacked, stolen or lost, your best bet is a USB or Bluetooth key you can carry on your keychain. This means nobody — not even you — will be able to access your account without the physical key. Ultimate security at your fingertips.

If you need help setting up two-factor authentication, or any IT security services, contact our experts at 800-421-7151 and experience true peace of mind as we fortify your data to no end.

The Risks of Auto-Complete Passwords

If you’re disturbed by advertisements and “helpful” suggestions that are based on your internet browsing habits, recent research has found yet another source of online tracking. It’s a sneaky tactic that also comes with serious security concerns. Let’s take a look at what you can do to stop it from targeting you.

Why auto-fill passwords are so dangerous

In 2015, the average internet user had 90 online accounts, a number that has undoubtedly grown since then. This has forced users to create dozens of passwords, sometimes because they want to practice healthy security habits and other times because the platforms they’re using have different password requirements.

Web browsers and password manager applications addressed this account overload by allowing usernames and passwords to be automatically entered into a web form, eliminating the need for users to hunt down the right credentials before logging in.

The process of tricking a browser or password manager into giving up this saved information is incredibly simple. All it takes is an invisible form placed on a compromised webpage to collect users’ login information without them knowing.

Using auto-fill to track users

Stealing passwords with this strategy has been a tug-of-war between hackers and security professionals for over a decade. However, it has recently come to light that digital marketers are also using this tactic to track users.

Two groups, AdThink and OnAudience, have been placing these invisible login forms on websites as a way to track which sites users visit. These marketers made no attempts to steal passwords, but security professionals said it wouldn’t have been hard to accomplish. AdThink and OnAudience simply tracked people based on the usernames in hidden auto-fill forms and sold that information to advertisers.

One simple security tip for today

Turn off auto-fill in your web browser. It’s quick, easy, and will go to great lengths to improve your account security.

  • If you use Chrome – Open the Settings window, click Advanced, and select the appropriate settings under Manage Passwords
  • If you use Firefox – Open the Options window, click Privacy, and under the History heading select “Firefox will: Use custom settings for history.” In the new window, disable “Remember search and form history.”
  • If you use Safari – Open the Preferences window, select the Auto-fill tab, and turn off all the features related to usernames and passwords.

This is just one small thing you can do to keep your accounts and the information they contain safe. For managed, 24×7 cybersecurity assistance that goes far beyond protecting your privacy, call us today at 800-421-7151.

2018: The Year of Social Media

Big-name social media platforms such as Instagram, Facebook and Snapchat are more interactive and responsive than ever. However, these platforms now have a plan to move another step forward in 2018. Here are the top 5 trends you should watch out for this year.

  1. The boom of Augmented Reality
    The launch of the new iPhones – both 8 and X – last September brought with it an under-the-radar change to the devices. The incorporation of a new chip provides iPhone users with extraordinary augmented reality (AR) experiences. While most conversations about AR focus on the mobile gaming experience, social media platforms will likely find a way to integrate the new technology as well.
  2. Influencer marketing
    Influencer marketing has proven to be the best way forward for companies to connect with younger audiences. Titanic companies such as The North Face, HubSpot and Rolex are great examples of companies which have profited heavily from social media-based influencer marketing. By contrast, companies that opted for traditional strategies struggled to connect to social media users, indicating that influencer marketing is here to stay and blossom in 2018.
  3. All eyes on Gen Z
    The oldest Gen Z-er is 22 years old and is only just heading into the labor market, meaning they’re going to start spending more money for sometime to come. Brands recognize this, and are aiming to shift their social media strategies to appease the newest customers on the market. Investment in platforms like Snapchat and Instagram is expected to grow exponentially this year.
  4. The growing importance of messaging platforms
    A recent study pointed out that over 2.5 billion people use messaging platforms like WhatsApp, Facebook Messenger and Kik to connect with companies. Rather than simply publishing marketing content to profiles and feeds, companies should focus on making it easier for customers to start one-on-one conversations. Therefore, it is more than likely that artificial intelligence, voice assistants and chatbots will all be integrated into messaging platforms for a more personalized user experience.
  5. Digital hangouts go mainstream
    In 2017, video content – including live broadcasts and chats platforms – was more prominent than ever, and live videos were definitely a successful part of it. This means digitally hanging out with friends and colleagues will become a social norm, as evidenced by the video hangout platform known as Houseparty, which boasts of over one million daily users.

With Gen Z-ers becoming a larger part of the buying marketing, companies will utilize social media platforms to their fullest by incorporating a wide variety of targeted methods to capture their attention. These methods involve technologies that were unimaginable only a few years ago, such as virtual reality and augmented reality. Moreover, investments in optimizing messaging platforms and influencer marketing also signals the start of a newer, more interconnected era between businesses and customers.

Small Business IT Hardware Checklist

It’s frustrating to return to the office after a long holiday only to be greeted by a disorganized workstation. If having clean, hassle-free technology is one of your company’s New Year’s resolutions, this technology hardware checklist can help.

✓ Clean up your computer components
Wipe your monitor with a clean, static-free fabric; remove excess dirt from your mouse’s exterior; and tidy up your keyboard with compressed air. Don’t forget your computer tower! Dust build-up can block your computer’s air vent and affect its performance. Ensure that your workstation is getting adequate ventilation and isn’t directly exposed to sunlight and other heat sources.

✓ Manage your cables
If you’re not giving your computers’ cables the attention they deserve, now’s a good time to do so. Other than wiping the thick coat of dust on computers’ cables, consider using cable management solutions that declutter and untangle messy wires. These don’t just organize and secure your cables, they also help ensure your PCs run quieter and are less prone to overheating as a result of blocked air vents.

Planning to relocate or upgrade in the near future? Organizing your computers’ cables now makes future relocation and upgrading processes much easier.

✓ Review and update your inventory
Keeping an inventory of all your hardware helps you manage hardware lifecycles and purchases, identify items that are near their end of life, and ensure you avoid duplicate purchases of items already in-stock.

Your inventory list should include all owned and leased devices: PCs and laptops, printers and scanners, tablets and smartphones, and modems and other network hardware. Update all your assets’ serial numbers and keep track of their respective users and location.

✓ Printer maintenance
Clean the interiors and exteriors of your printers, including paper trays, which are sure to have accumulated dirt from years of use. You should also repair and/or replace parts and accessories such as printheads and cartridges that are no longer in good condition. Should you decide to do a complete printer maintenance, check for the latest software updates for your printers and install them immediately.

✓ Implement a hardware policy
This is also a good time to create a technology guideline that your employees can follow to ensure they work efficiently. These guidelines reduce the need to spend on unnecessary repairs, keeping the succeeding year’s checklist shorter. With clear instructions on the proper use, replacement, and storage of your hardware and devices, you’ll be better able to manage your hardware for years to come.

With a more organized IT hardware inventory, you have one less thing to worry about. Want to get more in-depth hardware management recommendations? Call our experts today at 800-421-7151.

What are Virtual Containers?

Virtual containers have recently gained prominence with the open-source container platform, Docker. It promises to change the way IT operations are carried out, just like virtualization technology did a few years ago. Read on to know more about this revolutionary breakthrough and how it can help your business.

What are containers and why are they so popular?

Virtual containers are similar to shipping containers, which have made the transport of bulky goods much easier.

Prior to the introduction of containers, virtual workstations and servers granted users access to software and computing power across a local network or the internet. This is what has become known as “cloud computing,” as it created entire desktop experiences over the internet.

However, there was room for improvement, as virtual machines are known to take up a lot of system resources.This is because they run a virtual copy of an operating system alongside a virtual copy of all the hardware that the operating system needs to run. Such heavy load on one machine quickly takes up a lot of RAM and CPU cycles, slowing processes down.

Containers improve on the inefficiencies of cloud computing by promising developers that their software will run smoothly, regardless of the type of computer their end users are running.

How do they improve on virtual desktops?

Virtual desktops deliver thousands of applications to meet the needs of your business. These applications also use different languages, databases, and tools. To deploy, configure, manage and deliver these complex machines takes a lot of time and money.

Containers are essentially a better way to package these applications and their components. This technology helps organizations become more consistent and agile by extracting the host’s underlying operating system, meaning applications can be packaged with all their dependencies. This in turn, allows developers to choose the right environments and tools that best suit their projects.

As of now, only a few types of software create and deliver containers, with the most popular being Docker. Container technology had been around for a while before the introduction of Docker, but it was complex to implement and manage. With the popularity of virtualization services, software vendors gained resources to develop and offer simple, user-friendly container solutions.

Although containers have improved enterprise computing as a whole, virtual machines have not been made obsolete, and can still be used under certain circumstances. Regardless, both solutions — containers and virtual machines — can repurpose old hardware to utilize software hosted in the cloud. All you need to get started is an internet connection and an experienced IT professional by your side.

Want to maximize your business potential through virtualization and containers but don’t have an IT professional to consult? Call us today.

It’s Not Too Late to Cash In on 2017’s IT Trends

“Fad” is a dirty word for many small-business owners. Whether it’s what they’re selling or what they’re investing in, business owners need long-term and reliable investments to secure their future. With 2017 in the rearview mirror, we finally know what was a fad and what was a smart investment. See for yourself!

Small Businesses Love the Cloud

According to research from IDC, more than 70% of businesses with 10-99 employees took advantage of cloud technology in 2017, and that number is expected to rise this year. This is largely due to IT providers demonstrating that the cloud is just as, if not more, secure than on-premises solutions. The list of possibilities for what can be hosted in the cloud on a small-business budget is getting longer every day — if you’re not devoting resources to this technology, it’s time to jump onboard.

Mobile Payments Earn Users’ Trust

Like the cloud, making credit card purchases using a mobile device suffered from a trust deficit in its early stages. For good reasons, consumers have been conditioned to treat IT security with caution, and storing financial information on a smartphone that could wirelessly transmit that information to cashiers sounded dangerous.

However, after two years of availability without any major incidents, the number of users who have used smartphone-based wallets like Apple Pay has doubled. Accepting these payments is relatively simple for small businesses and opens up new business opportunities.

Cybersecurity Becomes More Affordable

Ransomware had yet another year of explosive growth, and small firms and medium sized and businesses were a primary target. Thankfully, managed IT services providers met the increased demand for cybersecurity services with intelligent data backup and network protection solutions tailored for SMB budgets. There will be even more ransomware attacks in 2018, which means you should be investing in more cybersecurity services than you did last year.

The Internet of Things Gains Popularity

Just a couple years ago, Internet of Things (IoT) devices were novelty gadgets for people with money to burn. Everything was being connected to WiFi networks: egg trays, pet-activated video chats, belts, you name it. But due to more useful applications in 2017, nearly a third of US businesses are now taking advantage of IoT gadgets. Connected thermostats, door locks, and AI assistants make it easy to save money, increase security, and boost productivity.

“Artificial Intelligence” is Widely Adopted

Although we’re still far from building computers that can truly think for themselves, 2017 was the year that computers got much better at creatively organizing and interpreting data for us. From digital assistants that answer your phones to customer relationship management platforms that intelligently uncover sales opportunities, IT solutions for business are getting significantly cheaper and smarter. Experts predict that more than 30% of businesses will use AI by next year and we recommend you join their ranks.

Technology investments are no different from any other investment. There will always be risks and you should always consult with an industry expert first. When you’re ready to get more value out of your IT, give us a call at 800-421-7151 and we’ll get started on your 2018 plan!

Do You Really Want The Cheapest Working On Your Company’s Network?

These days, firms and small businesses are more dependent on IT systems than at any other time in history. Because of this, even the slightest technological hiccups in our cyberspace-centered workflow can have expensive, lasting consequences. Perhaps the most dramatic illustration of this occurred back in 2013, when Amazon went dark for half an hour. Sure, it was a paltry 30 minutes, no big deal, until you consider the megagiant was theoretically hemorrhaging $66,240 every 60 seconds, based on their quarterly revenue.

Of course, your company probably isn’t a staple of international commerce like Jeff Bezos’s beloved brainchild. Because of this, many small business owners think that a downed server or small security breach here and there won’t matter too much for their bottom line. For these unlucky few, IT takes a back seat to more “pressing” issues, and they go the cheap route with their provider. This cost-cutting solution seems like the idea of the year, and will undoubtedly work great for the business – until it doesn’t.

Maybe your long-time technicians fail to notice a piece of outdated equipment, and your server gives up the ghost during peak business hours. Virtually all work grinds to a halt, and your employees are forced to wile away the two hours shooting three-pointers into the trash bins. Add up the two hours of wasted wages for your entire team, the financial cost of missed business, and the much more intangible loss of customer goodwill as they struggle with diminished service on a workday, and you’ll come up with a sum that disabuses any business owner of their illusions about “cheap” IT.

And that’s not even close to the worst-case scenario. Imagine, for a minute, that your technicians assure you, despite the lack of regular monitoring and maintenance, your network is secure. These words of comfort sound nice until the day a team of expert hackers actually attempt to access your systems, and find outdated, ramshackle security solutions in place — basically, a front door left wide open. At that moment, your business becomes a criminal’s playground. They’re free to access financial information and personal data of your customers and employees, hijack your business to send out floods of malicious software and spam, hold nearly every aspect of the company ransom for thousands of dollars, and cause chaos to their heart’s content.

The fact is, fixing problems is a lot more expensive than preventing them. When you cut corners and utilize subpar IT professionals (if any at all), you’re paying for an array of shoddy, Band-Aid solutions that will be applied piecemeal, and usually too late, like a finger plugging a hole in a dam. But when you make a substantial investment in your IT support, you’re investing in the most basic aspects of the future of your company.

Robust network security, dependable computers and servers, consistent Internet access, and other fundamental components of your company network are far from luxury items. These days, technology forms the scaffolding upon which businesses run. If any piece of the operation fails, the whole system suffers, usually accompanied by a fat financial penalty.

There is an ever-growing, endless list of potential technological pitfalls that can have permanent consequences for your business: teams of hackers zeroing in on vulnerable small businesses, rogue employees with a grudge, lost laptops, aging and unreliable hardware, fire, natural disasters, and IT “professionals” that have no idea what they’re doing, to name just a few. As technology progresses, and companies depend increasingly on it to stay competitive, it simply doesn’t make sense to relegate IT to the neglected corners of your budget.

When it comes to business, there’s a lot to worry about these days. A total collapse of your company’s technological infrastructure doesn’t need to be one of them. Invest in a robust, managed IT package from tried-and tested professionals, and leave the worrying to the experts. You can rest assured that our IT team of experts truly has you covered. Call us today at 800-421-7151.

New add-ons for Gmail!

Google is giving people an early Christmas present this year with the launch of several third-party add-ons for Gmail. This might not be the most exciting news from the technology giant, but as with the majority of its new feature launches, you can expect them to make life much easier.

Google’s focus is on productivity services that are already connected to email systems one way or another. This is why they have partnered with Asana, Dialpad, DocuSign (coming soon), Hire (by Google), Intuit QuickBooks, ProsperWorks, RingCentral, Smartsheet, Streak, Trello, and Wrike for their first set of native extensions.

What are some features can you expect?

While each add-on’s capabilities are slightly different, what they have in common is functionality that allows you to track various tasks right from the Gmail interface.

For instance, Gmail users will be able to view tasks and track their progress right from their inboxes when they receive emails from other Asana users. The Trello add-on allows you to turn emails into actionable tasks where you’ll be able to comment and move cards without having to switch to Trello itself. And the RingCentral add-on will let you make outbound calls and view and send SMS messages right from your inbox.

What’s more, these integrations work in the mobile Gmail app on Android, too. Google is currently working with Apple to bring these add-ons to iOS and they should be available soon.

How to install these add-ons

Just head over to G Suite Marketplace and download any extension you want. Then, those add-ons will be visible on the right sidepane of your Gmail interface. Unfortunately, they aren’t available in Inbox by Gmail (Google’s other email client) just yet.

However, Google has made it easy for developers to create customized add-ons for their company with guidelines you can find here.

With the introduction of Gmail add-ons, it’s exciting to see what other integrations are in store for businesses in 2018. But until then, if you have any questions about how you can use the web and cloud technology to your business’s advantage, just give us a call at 800-421-7151.

Understanding Virtualization Strategies

If the phrase “virtualization technology” either stresses you out or puts you to sleep, this article is for you. We’re going to explain once and for all how this emerging trend works and how small businesses can take advantage of it.

What is the core concept of virtualization?

By virtualizing any of the items below, you can trick software into recognizing hardware when none actually exists. The easiest way to explain this is with examples from the most common type of this technology: hardware virtualization.

  • If you had one high-powered computer processor, virtualization would allow you to split it up and run four separate operating systems (Windows, Apple OS, etc.), each seemingly running on a standalone, low-powered processor.
  • Conversely, virtualization could also be used to connect four high-powered processors to create what your operating system would recognize as one ultra-fast piece of hardware.

This technology can be applied in a number of ways to create opportunities for more efficient resource utilization and cost savings.

Desktop virtualization

Sometimes referred to as cloud desktops, this form of virtualization grants you access to a fully functioning computer that you access via a local network or the internet. Somewhere, a server has allocated a portion of its hardware resources for your virtual desktop. With a keyboard, monitor, mouse, and extremely low-end computer, you can connect to this virtual desktop and utilize all the processing power and storage the server has set aside for it.

Application virtualization

By installing a program on a server hard drive, your employee workstations can use their computing resources to run the program, but restrict data from being stored on their hard drives. The program and the documents it creates will never leave the server hard drive, making it much harder for hackers to compromise them.

With more advanced virtualization solutions, your server can also allocate the computing resources necessary to run the program, meaning your workstations are merely a window to your server.

Storage virtualization

Similar to hardware virtualization, this strategy makes it easy to organize how your data is stored. In addition to combining hard drives across several computers into a massive virtual drive, storage virtualization also stores data based on how important it is. Frequently used documents are saved to your fastest drives and can be automatically backed up to the cloud.

Network virtualization

If your office has more than 10 workstations, it makes sense to consider network virtualization, which allows you to separate vulnerable devices. For example, if you had one server that handles a lot of web traffic and another that stored sensitive documents, you might want to connect them to different networks to avoid a cross contamination. Network virtualization would allow you to do that without buying any new hardware!

Even with our simplified explanations, virtualization is still a complicated subject. Rather than try to figure it out in a few hundred words, give us a call at 800-421-7151 and we’ll show you in person!

Do More with Microsoft Office!

Have you been putting off learning about all the features in Microsoft Word, Excel, or PowerPoint? We don’t blame you. But mastering them can be extremely beneficial. That said, here are some free training videos that will help you get more out of Microsoft Office.

Office Basics is a series of free Office training videos from Microsoft which cover different features and functionality.

Intro to Office Basics

This training video will help you use templates to create professional documents, learn the ins and outs of SmartArt and Charts to express complex data and ideas, and collaborate in shared documents whether you’re working online, offline, or simultaneously with others.

What is Office 365?

Discover the features and upgrades within Office 365 that aren’t available anywhere else, and learn how cloud versions of applications like Word, Excel, and Outlook differ from their desktop counterparts.

Word Training

These training videos will show you how to create and edit documents as well as create and format tables in just a few clicks. They also cover document makeovers, how to organize documents, creating mailing lists, and how to translate text instantly.

Excel Training

Creating, organizing, and analyzing data from charts and tables can be quite complicated, which is why these training videos are perfect for anyone looking to design workbooks, add text and data, format and analyze charts, and create pivot tables and formulas. Other tips include how to slice data and locate them using VLOOKUP.

PowerPoint Training

There’s more to PowerPoint than adding text to slides. These training videos will show you how to create presentations, add and format text, design presentations, add audio, video, and animations, and format images. You’ll also learn about nifty features such as how to match slide colors using the Eyedropper and how to export slides to videos.

Outlook Training

Organize your Outlook inbox with ease and learn how to add and format text and images, manage contacts, calendars, meetings, and to-do lists, as well as other tips such as how to spice up your email signature, keep your inbox clean, and hold meetings using Skype and OneNote.

Microsoft’s new training videos might not be jaw-dropping, but they will surely help users do more with Office. If you’d like to learn more about the benefits of Microsoft Office for small businesses, just give us a call at 800-421-7151 and we’ll be happy to help!

What you need to know about VPNs for Personal Use

With stories of large-scale data breaches and internet service providers tracking internet habits, online privacy is becoming a rare commodity. Incognito mode and private browsing features may be able to cover up your browsing history, but they don’t completely protect your online activities. You need a Virtual Private Network (VPN).

What is VPN?

Simply put, a VPN is a group of servers you connect to via the internet. Once you’ve established a connection, your computer acts as if it’s on the same local connection as the VPN, making it seem like you moved to a different location.

When you surf the web through a VPN, all the data transmitted and received is also encrypted, preventing anyone — from hackers to government agencies — from monitoring your online activities.

Why should you have one?

Of course, security and privacy are major reasons why you would want a VPN. For example, if you’re connected to a public WiFi network — like the ones you typically see in local cafes and airports — using a VPN encrypts the information you’re sending or accessing online. This means things like credit card details, login credentials, private conversations, or other sensitive documents can’t be intercepted by a third party.

VPNs are also useful for accessing geo-restricted websites. If you’re traveling abroad and certain US websites are blocked in that region, you can simply connect to a VPN located in the US to access the sites you need.

Which VPN should you choose?

Given the increasing demand for secure online privacy, VPNs are surging in popularity. The following considerations can help you find the right one.

1. Cost
While free VPNs are available, we strongly suggest you avoid them. These keep logs of your internet activity, and in some cases sell them to the highest bidder. Maintaining a VPN service is also expensive, which means the free ones will likely plaster ads on your browser to make a quick buck.

Paid VPNs like SurfEasy and StrongVPN often come with more robust features and configurations that keep you secure. What’s more, they don’t keep a record of the sites you visit and hound you with pop-ups that lead to dangerous websites.

2. Location
The physical location of VPN servers is important if you want to access region-blocked websites. So if you’re planning on accessing your VPN service while traveling, your VPN provider must at least have servers installed or accessible in the locations you will be in.

3. Capacity
Read through a VPN provider’s terms of service to determine how much data you’re allowed to use. If possible, find out how many servers a VPN provider has. If they have plenty of servers online, you can rest assured that they have the capacity to support your internet browsing.

4. Device compatibility
Another important factor to consider is whether the VPN can be used across multiple devices. Nowadays, employees work on laptops, tablets, and smartphones, so you’ll want a VPN that’s compatible with all these.

5. IP leaking
Finally, a great way to evaluate a VPN service is to sign up for their free trial service and visit https://ipleak.net/, which will allow you to check whether your real IP address is actually being leaked. If it manages to track your physical location, you need to opt for a more reliable VPN service.

The VPN services described in this article are for personal and private usage for home computers and personal laptops. These services may or may not integrate or work with corporate VPN’s that your firm or enterprise may currently be using.

VPNs are now a vital component of cybersecurity, and if you need help selecting the right VPN for your business or personal usage, consult with our security experts today by calling 800-421-7151 or emailing info@wamsinc.com. We also offer comprehensive cybersecurity services so no hacker or third party can get their hands on your data.

What’s New with the Chrome Cleanup Tool?

Even if you’re sure that the websites you visit are safe, harmful software can still slip through, especially when you download and install free programs and applications. As the world’s most popular browser, Chrome is especially prone to infection. Fortunately, Google has improved Chrome’s Cleanup tool for Windows by integrating the following security features.

Detect Hijacked Settings

Many users prefer to enhance their browsing experience by installing extensions or plug-ins, some of which could be malicious. When these extensions are installed, they could inject harmful ads into web pages or allow access to third-party servers without the user’s consent.

Google’s new hijacked settings detection function prevents this from happening. Once it detects an attempt by a third party to change your browser’s settings, it will automatically revert to Chrome’s default settings. And in case you suspect any unauthorized change in your browser, you can manually reset settings in Chrome.

Simplify Cleanup

You probably don’t remember downloading many of the files in your Downloads folder, but these are actually software and other attachments that were bundled with the software that you do use.

Chrome Cleanup’s newly simplified feature makes it easier for you to determine harmful files, easing the pain of sorting through and deleting tons of downloaded files. Whenever it detects a malicious software, users will get a pop-up message that offers them an easy way to remove the potential threat, get more details about it, or disregard it in case of false detection.

Maximize Removal of Nonessential Software

Aside from the simplified interface, Google also made some much-needed improvements in Chrome Cleanup’s performance, so it’s now capable of eliminating more junkware.

Tricking users into installing a program without their consent is one of the many characteristics of unwanted software that Google lists under its Unwanted Software Policy. To help fight against this and other browser security risks, the company has partnered with an IT security team to strengthen Chrome’s ability to detect and remove unwelcome add-ons.

It’s important to note that these upgrades don’t affect Chrome’s performance and speed because they work in the background. In addition, these changes are now available in Windows devices but will soon roll out to other platforms. In the meantime, if you want to find out more about browser and application security, contact our security specialists today at 800-421-7151!

Tips and Tricks to Prolong Laptop Battery Life

A laptop would just be a cold piece of aluminum with a flat battery if you don’t have a power socket at hand. It’s hard to get any work done when you’re peppered with pop-ups and warning messages when the battery power gets low. So here are some tips you can use to prolong the life of your precious laptop battery.

Some truths about your laptop battery

Batteries in many devices nowadays are lithium-based — either lithium-ion or lithium-polymer — so users must take note of the following guidelines for their proper maintenance:

  • They can’t be overcharged, even though you leave your battery plugged in for a long period of time. When the battery hits 100%, it’ll stop charging.
  • Leaving your battery completely drained will damage it.
  • Batteries have limited lifespans. So no matter what you do, yours will age from the very first time you charge it. This is because as time passes, the ions will no longer be able to flow efficiently from the anode to the cathode, thereby reducing its capacity.

What else can degrade your battery

Besides its being naturally prone to deterioration, your battery can degrade due to higher-than-normal voltages, which happens when you keep your battery fully charged at all times. Even though a modern laptop battery cannot be overcharged, doing so will add a stress factor that’ll harm your battery.

Both extremely high temperatures (above 70°F) and low temperatures (between 32-41°F) can also reduce battery capacity and damage its components. The same goes for storing a battery for long periods of time, which can lead to the state of extreme discharge. Another factor is physical damage. Remember that batteries are made up of sensitive materials, and physical collision can damage them.

How to prolong your battery life

Now that you know some facts about your laptop battery, it’s time to learn how to delay its demise:

  • Never leave your battery completely drained.
  • Don’t expose your battery to extremely high or low temperatures.
  • If possible, charge your battery at a lower voltage.
  • If you need to use your laptop for a long period of time while plugged into a power source, it’s better to remove the battery. This is because a plugged-in laptop generates more heat which will damage your battery.
  • When you need to store your battery for a few weeks, you should recharge your battery to 40% and remove it from your laptop for storage.

These are just a few tips on extending the life of your hardware. There are many more ways you can maximize your hardware efficiency and extend its longevity. Call our experts today to find out more at 800-421-7151!

Cybercriminals Confess

 The Top 5 Tricks, Sneaky Schemes And Gimmicks They Use To Hack Your Computer Network

The contemporary world is rife with digital thieves. They’re penetrating the complicated data structures of huge credit-monitoring companies like Equifax, scooping up the personal information of millions of people. They’re releasing sensitive customer data to the public from discreet businesses like Ashley Madison. They’re watching webcam feeds of our celebrities without them knowing; they’re locking down the systems of public utilities like the German railway system; they’re even managing to steal thousands of gigabytes of information directly from high-profile government entities like the CIA.

They’re also targeting small businesses exactly like your own and extorting them for thousands and thousands of dollars. When running a company, it’s vital to have a dedicated security team, equipped with the most up-to-the-minute security technology, on your side to protect you from these malicious cyberthreats. But it’s not enough to leave it to somebody else. You also need to be informed. Here are five of the most common ways hackers infiltrate your network:

1 Phishing Scams

You receive an e-mail in your work inbox coming directly from a high-ranking employee with whom you’ve been

working on a project. Inside is a link he needs you to click to access some “vital information,” but when you click it, it rapidly installs a host of malware on the computer, spreads through the network and locks out everyone in the company.

Phishing scams are the oldest trick in a hacker’s book – ever received one of those “Nigerian Prince” scams? – but they’re still wildly successful. Not only that, but they’re becoming increasingly more sophisticated. As Thomas Peters writes for “Newsweek,” “The best messages look like they’re trying to protect the company. One well-meaning system administrator even offered to post a PDF that could deliver malware on an internal server because it was called, ‘How to avoid a phishing attack.’” How’s that for irony?

2 Social Engineering

Social engineering is a type of “hacking” that uses real, well-intentioned people to carry out its schemes, rather than intricate lines of code. This is especially effective for gathering sensitive information that can later be used

in another type of attack – e-mail passwords used for phishing scams, for example. Maybe your IT guy receives a call from the “secretary” of one of your clients, pretending that they’re experiencing problems with your

service due to some firewall, a problem that your IT professional is more than happy to help out with. Before you know it, the caller knows the ins and outs of your entire security system, or lack thereof. Social engineers have been known to use phone company customer service departments, Facebook and other services to gather Social Security or credit card numbers, prepare for digital robbery and even change the passwords to your central data network security.

3 Password Hacking

You may think that your passwords are clever and complicated, filled with exclamation points and random numbers, but it’s rarely enough. With information gathered carefully from social engineering or a simple check on your employees’ social media accounts, hackers can easily use brute-force to figure out that your password

is the name of the family dog, followed by your anniversary (for example). That’s if they didn’t already manage to steal your password through one of the techniques listed above.

4 Fault Injection

Sophisticated hackers can scan your business’s network or software source code for weak points. Once they’re

located, they can surgically attempt to crash the system through snippets of code they splice in expressly for that purpose. Different commands can do different things, whether they want to deliver a devastating virus,

redirect links on your website to malicious malware or steal and erase vast swathes of information.

5 USB-based Malware

At the last conference you attended, someone probably handed out free branded USB sticks to keep their business top-of-mind. Hackers will sometimes covertly slip a bunch of infected USB sticks into a company’s stash. The instant somebody tries to use one, their computer is taken over by ransomware.

So What Can I Do About It?

It’s a scary world out there, with virtually everyone left vulnerable to digital attack. Knowing the strategies hackers deploy is half the battle. But, frankly, these techniques are constantly changing; it’s impossible to keep up by yourself.

That’s why it’s so important to utilize only the most up-to-date security solutions when protecting your business. Hackers move fast. You and your security technology need to stay one step ahead, and WAMS will help you to do just that. Give us a call at 800-421-7151 to find out how.

Benefits of Serverless Computing

“Serverless computing” sounds like a dream come true. It conjures images of a world where business owners don’t need to worry about purchasing expensive hardware or configuring complex software. But serverless computing isn’t just a dream, it’s the next big thing in cloud computing.

What is it?

Outsourcing workloads to the cloud — like websites and apps — requires just as much hardware as if the computations were performed in an on-site server. The only difference is the location of the server.

Office 365 or Google Docs are great examples of this model. Thousands of servers are set up to run these apps so there is always enough capacity to handle the millions of people who use these apps at any given moment. Microsoft and Google need to manage and maintain these servers 24/7 to keep up with demand so they’re always on and always ready to handle more workloads, even during off-peak hours.

Serverless computing changes everything by allowing developers to create apps and websites that use cloud resources only when they’re needed. So, if you were to create a web app, you wouldn’t need to pay for a dedicated cloud server. The cloud provider would host your app’s programming code and run it only when a user requested it. The cloud provider would take care of allocating the appropriate resources and charge by the second for what you use.

Who can benefit from it?

Serverless computing is for users who use cloud resources for processing power. If you’re using the cloud only to store files, serverless services aren’t going to help you. However, if you use the cloud to process information and turn it into something more useful, serverless computing will help you immensely.

An everyday example of this is Amazon’s Alexa. Every command the AI assistant responds to is nothing more than an app that sits dormant until a user tells Alexa to run it. Small businesses are creating apps in Amazon’s cloud that can be processed by the voice assistant without the burden of setting up a dedicated server.

Serverless computing isn’t about getting rid of servers; it’s about using their raw computing power without being forced to fine tune them first. It falls under the umbrella of virtualization technology and is another step in the right direction for small businesses working with limited budgets.

For more information about how virtualization can help you lower costs and increase efficiencies, give us a call today at 800-421-7151.

Google Weighs in on Account Hijacking

According to experts, passwords shouldn’t be the only way you defend your accounts. After all, hackers have plenty of tricks and tools to steal them. So to help businesses fully understand the risks involved, Google conducted a study on the causes of account hijacking.

The results
From March 2016 to March 2017, Google and UC Berkeley researchers examined three main ways hackers hijack accounts:

Keylogging software – a malicious program that records computer users’ keystrokes
Phishing emails – to lead people into dangerous websites
Stolen passwords – available to the highest bidder
In just one year, Google found 788,000 successful keylogging attacks, 12.4 million victims of phishing attacks, and 1.9 billion accounts exposed via login credentials sold on the black market.

Researchers suggest the reason so many accounts are hacked is because people tend to reuse their passwords, which means if one set of login credentials is exposed, other accounts could be compromised.

Phishing is also a big threat because it targets users — the weakest links in your cybersecurity. The strongest password or security system won’t mean anything if your employees constantly fall for online scams.

Protecting your accounts

There are several things you can do thwart account hijacking. For starters, you should set strong and unique passwords for each account to minimize data breaches.

While the general rule in the past was to set a complex password — a mix of letters, numbers, and symbols — recent studies suggest that longer, 20-character “passphrases” are much tougher to crack. If you find it difficult to remember several passwords, consider using a password manager, which not only stores all your passwords, but can generate strong passwords, too.

To deal with phishing attacks, you should activate multi-factor authentication on your accounts. This adds an extra layer of identity verification to your password (e.g., a fingerprint scan or a temporary security key sent to your phone), making your login details ‘unphishable.’

Security training is also crucial. This includes teaching your employees about what phishing attacks look like and instructing them on password protection best practices so they never fall victim to account hijacking.

The bottom line is not only that strong password security requires strong defense mechanisms; you and your employees must be vigilant, too.

Need more advice on keeping your business safe? Call us today at 800-421-7151! We provide critical security updates and comprehensive support services to help you stay well ahead of cybercriminals.

Beware of Sneaky Microsoft Office Malware

Cybersecurity systems are getting better at identifying and preventing attacks coming from all directions. At the same time, hackers are coming up with new ways to bypass these systems. While online scams are the most common ways to do this, cybercriminals have discovered a new attack method using Microsoft Office.

What’s the new Office threat?
The Office exploit takes advantage of Microsoft’s Dynamic Data Exchange (DDE), a protocol that sends messages and data between applications. For example, DDE can be used to automatically update a table in a Word document with data collected in an Excel spreadsheet.

The problem with this is hackers can create DDE-enabled documents that link to malicious sources rather than to other Office apps. Theoretically, this allows hackers to launch scripts that download Trojan viruses from the internet and execute it before the user is even aware of the attack.

And unlike most malware-embedded Office files, which are usually blocked by security protocols from Microsoft, DDE exploits are instant. Once a compromised Word file is opened, it automatically executes the hack.

Outlook at risk
What’s even more alarming are the DDE vulnerabilities in Outlook. Recent reports found that hackers can embed malicious code in the body of an email or calendar invite, allowing them to perform phishing scams without a file attachment.

Fortunately, Outlook DDE attacks are not as automated as Word or Excel DDE attacks. Two dialog boxes will usually appear when you open the email asking if you want to update a document with data from linked files and start a specific application. Simply clicking ‘No’ on either of these boxes will stop the attack from executing.

Defending against DDE attacks

Beyond saying no, you can protect yourself by following these security best practices:

-Evaluate the authenticity of unsolicited emails before interacting with them and don’t open attachments from unfamiliar contacts.
-View emails in plain text format to completely stop DDE attacks embedded directly in emails from running. Note that this will also disable all original formatting, colors, images, and buttons.
-Use a strong email security system that prevents phishing emails, spam, and other unwanted messages from reaching your inbox.

Get in the habit of checking for Microsoft updates, as they’re usually quick to release patches after vulnerabilities have been discovered.
Last but not least, consider working with our team. We’re Microsoft Office experts who can keep you safe from the latest threats. Call us today to get started at 800-421-7151!