Blog

August 25th, 2014

Security_Aug18_BThe idea of Internet security is almost always being called into question. It seems like nearly every month there is a security breach where important information like usernames and passwords are stolen. The trend appears to be increasing, with an ever expanding number of accounts being hacked. In early August, news broke of possibly the biggest breach to date.

The latest big-scale breach

In early August, it emerged that a Russian hacker ring had amassed what is believed to be the biggest known collection of stolen account credentials. The numbers include around 1.2 billion username and password combinations, and over 500 million email addresses.

According to Hold Security, the company that uncovered these records, the information comes from around 420,000 sites. What is particularly interesting about this particular attack is that such a wide variety of sites were targeted when compared this with other attacks which tend to either attack large brand names or smaller related sites.

How did this happen?

Despite what many believe, this was not a one-time mass attack; all sites that were compromised were not attacked at the same time. Instead, the hacker ring - called the Cyber Vor - was likely working on amassing this data over months or longer. How they were able to amass this much information is through what's called a botnet.

Botnets are a group of computers infected by hackers. When the hackers establish a botnet, they attack computers with weak network security and try to infect them with malware that allows the hacker to control the computer. If successful, users won't even know their computer has been hacked and is being used by hackers.

Once this botnet is established, the hackers essentially tell the computers to try to contact websites to test the security. In this recent case, the computers were looking to see if the websites were vulnerable to a SQL injunction. This is where hackers tell the computers in the botnet to look for fillable sections on sites like comment boxes, search boxes, etc. and input a certain code asking the website's database to list the stored information related to that box.

If the Web developer has restricted the characters allowed in the fillable text boxes, then the code likely would not have worked. The botnet would notice this, and then move onto the next site. However, if the code works, the botnet notes this and essentially alerts the hacker who can then go to work collecting the data.

So, is this serious and what can I do?

In short, this could be a fairly serious problem. While 420,000 sites may seem like a large number, keep in mind that the Internet is made up of billions of websites. This means that the chances of your website's data being breached by this ring are small. That being said, there is probably a good chance that one of the sites related to your website may have been breached.

So, it is a cause for concern. However, you can limit the chance of hackers gaining access to your information and a website's information.

1. Change all of your passwords

It seems like we say this about once a month, but this time you really should heed this warning. With 1.2 billion username and password combinations out there, there is a chance your user name for at least one account or site has been breached.

To be safe, change all of your passwords. This also includes passwords on your computer, mobile devices, and any online accounts - don't forget your website's back end, or hosting service. It is a pain to do, but this is essential if you want to ensure your data and your website is secure from this attack.

2. Make each password different

We can't stress this enough, so, while you are resetting your password you should aim to ensure that you use a different one for each account, site, and device. It will be tough to remember all of these passwords, so a manager like LastPass could help. Or, you could develop your own algorithm or saying that can be easily changed for each site. For example, the first letter of each word of a favorite saying, plus the first and last letter of the site/account, plus a number sequence could work.

3. Test your website for SQL injunctions

If you have a website, you are going to want to test all text boxes to see if they are secure against SQL injunctions. This can be tough to do by yourself, so it's best to contact a security expert like us who can help you execute these tests and then plug any holes should they be found.

4. Audit all of your online information

Finally, look at the information you have stored with your accounts. This includes names, addresses, postal/zip codes, credit card information, etc. You should only have the essential information stored and nothing else. Take for example websites like Amazon. While they are secure, many people have their credit card and billing information stored for easy shopping. If your account is hacked, there is a good chance hackers will be able to get hold of your card number.

5. Contact us for help

Finally, if you are unsure about the security of your accounts, business systems, and website, contact us today to see how our security experts can help ensure your vital data is safe and sound.
Published with permission from TechAdvisory.org. Source.

Topic Security
August 22nd, 2014

Productivity_Aug18_BA common problem many business owners and employees run across with the Internet and smartphones is that the apps and programs are often too disparate, and not connected enough. This can be a drag for productivity, especially if you have to keep repeating the same tasks. One tool that may help automate these is If This Then That (IFTTT).

What is If This Then That?

IFTTT is a Web and mobile app that was developed to connect different Web apps like Google Apps, DropBox, Facebook, Instagram, etc, together into one general system. In general, the service runs on conditional statements - or recipes - that fit the IFTTT statement.

The service is set up on a number of different conditional statements that make up what the developers of the app call a recipe. Each recipe is broken down into two different sections:

  • This - Also referred to as a trigger. Each trigger in a recipe is kind of like a requirement in that the set trigger has to happen for the recipe to start working.
  • That - That refers to an action that happens when a 'this' condition is triggered.
Once you have set up a number of recipes, the app runs in the background to check for triggers and then will automatically execute the action when it notices a trigger.

Examples of IFTTT recipes

There are a wide variety of recipes out there that you can create. For example, some of the more useful IFTTT recipes for businesses include:
  • If a photo is posted on the business Instagram account, then it is shared with Twitter and Facebook.
  • If a Square payment is processed, then this creates a line in a specific spreadsheet.
  • If a contact is added to a phone's address book, then this information is placed on Evernote.
  • If an article is posted on a specific blog, then the post is shared on Twitter, Facebook, and Google+.
  • If an email is starred on Gmail, then a reminder is set on my phone to review starred emails.
  • If I enter the office, then my phone is muted.
  • If a client emails an attachment, then a copy is saved to DropBox.
  • If my device is in the office, then my office lights are turned on (if you have Phillips Hue bulbs).
There are a wide variety of supported apps that allow you to create recipes for nearly anything you can think of. The developers are constantly adding support for new channels (apps), including many from the Internet of Things.

How to sign up for this

Because you can access IFTTT from the Web and via an app on your mobile device, we recommend first thinking about how you are going to use it. If you are going to be using recipes for your mobile device, then we recommend downloading the app onto your device. Regardless of how you are going to use it, you can create an account by:
  1. Going to the IFTTT website (https://ifttt.com/)
  2. Clicking Join IFTTT.
  3. Setting a username and password and clicking Create account.
From there, you will be able to log in and start creating rules. If you do want to use your mobile device, you should then download the free app for your device - Windows Phone, Android, iPhone - and then log in using the account information you just created. When you first log in you should see a number of channels (apps) related to your system have been activated. This means you can now start creating recipes.

Creating recipes from your browser

  1. Go to the IFTTT website (https://ifttt.com/) and press Sign in.
  2. Press Create.
  3. Press This and select your trigger - try picking your app first, then click on it to get a list of actions.
  4. Press Create Trigger.
  5. Click That and select an action channel.
  6. Select Create Recipe.
You can also click Browse from the menu bar at the top to find and activate already created recipes.

Creating recipes from your mobile device

  1. Open the app.
  2. Press the mortar and pestle icon at the top-right.
  3. Press the + followed by the + besides If on the next screen.
  4. Select the app from the icons at the top of the screen, and select the related trigger.
  5. Tap the + beside Then and select an action or app.
  6. Press Finish to activate the new recipe.
If you are looking for a cool way to connect different apps, and even save yourself time, then this could be something worth looking into. And, if you are looking to learn more about how you can increase your productivity, contact us today to see how our systems can help.
Published with permission from TechAdvisory.org. Source.

Topic Productivity
August 21st, 2014

BValue_Aug18_BMany countries around the world require businesses to implement systems and tools, which often includes technology, that meets the needs of all employees. This includes employees who have disabilities or special requirements. Because of this, it has become nearly essential for companies to develop an accessible technology plan for when certain technology needs arise.

What is accessible technology?

Accessible technology, also commonly referred to as assistive technology, is the idea of creating or implementing technology and systems that cater to employees with disabilities. While not every company will have or require accessible technology, it is required by many countries that businesses meet the needs of disabled employees.

To that end, it is a good idea to develop a plan on how to implement accessible technology. To help, here are five steps you could take:

1. Defining your strategy

The accessible technology strategy should be the first thing you develop as it will be the foundation of the overall plan. When looking at your strategy you should define how accessible technology fits into your overall organization plan and how it will fit with your existing strategies.

What you are looking to do is to figure out how this form of technology will fit with existing systems and increase overall operating effectiveness. From here, you can define the overall objectives, budget, and vision for the plan.

2. Identifying requirements

In this step, you should look closely at existing technology in the organization and the needs of your employees. Because each company is different and the needs of employees are different you should be careful to also identify the technology needs of your employees.

When looking at both the needs and existing systems you can work to come up with an overall set of requirements, along with a general priority. For example, will you need to modify existing computers or purchase new ones?

The key idea here is that you need to figure out exactly what you need.

3. Picking the new technology

Once you have identified what changes you need to implement, what new technology you will need, and your budget, you can then begin looking for the best solutions. The most effective way to do this is to work with it experts like us who can help you find and integrate the best technology and changes that will meet your adaptive technology needs.

4. Implementing and training

Once you have defined the changes, and new technology to integrate, you need to implement it. This may include altering physical devices and machines where necessary, and then testing the systems to make sure they are working properly.

It is also be a good idea to train your employees who will be using the systems, and the team who will be managing the systems.

5. Maintaining

As with all tech systems, it is important to realize that the solution you implement will not work forever, and will eventually require maintenance, updating, or even replacing. You should take steps to audit systems on a regular basis to ensure they are still meet the needs of your company and employees.

This can be a time consuming and potentially costly step, especially if you neglect it. We strongly recommend working with a company like ours, who can help manage your solution and ensure that updates and any necessary changes are implemented when they are needed, and that should needs change, systems are subsequently updated to meet the new requirements.

If you are looking to implement accessible technology in your business, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

August 20th, 2014

iPhone_Aug18_BToday, more than ever before, business owners and managers are relying on their iPhone to keep contact information on hand. But depending solely on your iPhone to store vital data has its drawbacks as people move and change their numbers all the time. So here are five essential apps that’ll keep your iPhone’s address book versatile for contact management and recovery.

Five essential apps to boost your iPhone address book’s capabilities:

  1. Contacts+ (Free): This app lets you sort contacts into groups and import personal information from Facebook and LinkedIn. A quick tap lets you jump to a contact’s social networking profile, or even map a live route to their home or office. It also adds birthdays to your contact list.
  2. Sync.ME (Free): Sync.ME brings widgets to your iPhone’s Contacts app, adding a powerful set of tools that let you do everything from capturing business cards by photograph to recording some phone calls. This is particularly helpful when it comes to recalling previous conversations and connecting names with faces.
  3. Cloze (Free): Cloze compiles Twitter updates, Facebook posts, LinkedIn snippets, text messages and emails from each of your contacts, then combines all of it into one master feed, organized by person rather than by time. It automatically figures out who the most important people in your network are and puts their information at the top of the feed.
  4. ABBYY Business Card Reader (USD $5.99): Contrary to today’s digital world, old-school business cards are still an essential. And while transcribing cards into digital data is time consuming, ABBY does exactly that in a flash. Just snap a photo of each card and this scanning system instantly does the translation work, bringing contact information on business cards right into your iPhone’s address book.
  5. iCloud (Free): iCloud is Apple's cloud storage app that everyone with an Apple account has access to. Chances are high that when you first setup your device, you signed up for an Apple account in order to purchase/download apps from iTunes. On your device, open the Settings app and select iCloud. Enable it and login with your Apple account and you should be able to backup important data, including contacts. If you lose your device, or get a new one, simply log into your account again, and your contacts should pop right up.
While iPhone’s address book is a convenient tool for contact management, proofing it with these applications will not only make it more powerful but also more secure, so you won’t have to worry about losing your contact information or missing out on updated information again. Looking to learn more about iPhone and its features? Contact us today and see how we can help.
Published with permission from TechAdvisory.org. Source.

Topic iPhone
August 19th, 2014

Facebook_Aug18_BMost of our News Feeds on Facebook are a constantly changing mesh of links, posts, shares, and likes. If you see something interesting on your News Feed, for example a link to an article, you likely need to click on it right away or you won't be able to find it again with the influx of posts and information. In an effort to remedy this problem, Facebook has introduced the Save feature.

About the Save feature

The idea behind the Save feature is that it allows users to save longer-form content like articles posted on a News Feed. So, if someone has posted a link to an article on your favorite blog and you would like to read it later, you can now save it.

While this feature is similar to various apps like Pocket and Readability, which allow users to save content on the Web to read later, Facebook's version goes a little deeper. In a blog article announcing the feature, the company noted that the Save feature allows users to, "Save items like links, places, movies, TV and music."

Let's say you are at work, and during your break you quickly check Facebook. You come across a post where your friends have shared a link to a restaurant's Facebook Page. If you don't have time to visit the page right at that moment you can save it to view later.

While this feature will prove useful for many users, it is worth noting that when you save content, e.g., an article, you will need to have an Internet connection to access it in the future. Knowing Facebook however, they may integrate a feature like this in the future.

How to save content for later

Facebook has integrated this feature into all versions of Facebook, including the mobile app and browser-based versions. You can save content and links by:
  1. Scrolling through your News Feed until you find an article, link, Place, etc. that you would like to save for later.
  2. Clicking on the downward facing grey arrow at the top-right of the post.
  3. Selecting Save 'content name'. Note: The name will be based on the name of the link in the post.

Accessing your saved content

If you are looking at Facebook in your browser, then you should see a tab called Saved show up in the upper part (the area just below your profile image) of the left-hand vertical bar of the page. For users who access Facebook via the mobile app, press the three horizontal bars at the top-right of the app (located just below the magnifying glass) and you should see a section called Saved under Favorites.

When you click on Saved you should see a new screen open with the content you have saved. It will be divided into different types including:

  • All
  • Links
  • Places
  • Music
  • Books
You can interact with each item by either:
  • Tapping on it - This will open the page, link, or content.
  • Sliding it to the left - This will allow you to archive the content or press More to review, share or Like the content.
If you are looking to learn more about the Save feature, or Facebook in general and how it can be used effectively in your business, contact us today.
Published with permission from TechAdvisory.org. Source.

August 14th, 2014

iPad_Aug11_BThe iPad has become one of the most favorite devices of business owners and managers the world over. While the usability and mobility of these devices is almost unparalleled, there are some common issues that crop up. One of the biggest, is that it can be somewhat confusing to keep track of all the apps you've installed. If you have come across this issue, here are three ways you can find your apps.

1. Finding installed apps via Settings

While there is no set section of the iPad's Settings that allows you to view installed apps, you can actually view installed apps by looking at the Usage section. This section tells users how much storage space installed apps are using, therefore giving you a list of installed apps.

You can access the Usage section of Settings by:

  1. Opening the Settings panel on your iPad.
  2. Tapping on General.
  3. Selecting Usage.
This will list the apps you have installed, organized by how much hard drive space they are using. What's great about this method is that you can not only see the apps you have installed but also see if there are apps you aren't using, or apps that are taking up valuable space. You can also select apps to learn more about how much memory they are using and even uninstall an app should you not need it anymore.

2. Finding installed apps via Spotlight

If you have iOS 7 on your iPad you can view all installed apps via the Spotlight feature. Spotlight allows you to search your iPad for files, folders, apps, and more, and can be accessed by swiping down from the top of the screen when looking at the Home screen.

You can see what apps you have installed using Spotlight by:

  1. Opening Spotlight by sliding down from the top of your iPad's screen.
  2. Tapping on the blank spot beside the magnifying glass.
  3. Typing "." (period/full stop) without the quotations.
You should see a list of your installed apps come up, though there is no apparent way they are organized. If you tap on an app name, it will open.

3. Finding installed apps via iTunes

The other way you can find out the apps you have installed is via iTunes. You can do this by:
  1. Plugging your iPad into your computer via the cord that came with the device.
  2. Opening iTunes, if it doesn't open automatically when you connect it.
  3. Clicking on the device's name under Devices.
  4. Selecting Apps.
You will be able to search for apps, or you should see a full list of installed apps. The great thing about this feature is that if you search for apps, you should see where they are on your device's screen. From there you can move the apps around, or even delete them.

If you are looking to learn more about using the iPad, please contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic iPad
August 13th, 2014

AndroidTablet_Aug11_BAndroid is steadily gaining popularity with business users around the world. One issue many holdouts have with the system however is that it's often too open to be completely managed by the office, or it's too open to ensure security. In an effort to increase usability for businesses, Google has announced a new feature - Google Work - which will have a number of work-specific features.

What exactly is Android Work?

Android Work is a program that is being developed by Google that will be introduced in the next version of Android - Android L. Because of the overall open and somewhat fragmented nature of Android, many businesses have been struggling to manage devices. In an effort to attract business customers, device manufactures have come up with their own business-centric suite of features that boost device security and manageability.

While there are a number of options out there, Samsung has had the most success with KNOX. This is essentially a secure version of Android that can be managed by businesses. With devices running KNOX, administrators can separate personal and work features, as well as manage and secure business apps and content on a user's device.

The best way to think of this program is that it enables a completely separate business profile, that can be managed by a company, on a personal device. Users with a system like this will be able to separate work and personal apps, content, and data, but still be able to use the same device. This is what mobile experts refer to as containerization - business apps and data are essentially stored in a container that is kept within the overall Android system.

Google found this idea of being able to separate personal lives and work on the same device to be something worth investing in, and have subsequently developed Android Work based on the KNOX platform. This will allow all Android users, not just users with Samsung devices, to take advantage of this program.

When launched there will be a number of key business oriented features beyond just the KNOX support. Here are two of the most talked about.

Seamless transition between personal and work data

Containerization is usually referred to as creating a separate system on one device, kind of like having a work and personal profile on your computer. While this is great, it can be annoying to switch between profiles on your device. So, Google has decided to modify the way containers work, making them more seamless.

With Android Work, IT will be able to install and manage apps on a user's device - they have to agree to this of course. Only, these apps will appear on the device beside personal apps and will be useable just like any other app. In the background however, the Android Work managed apps will sit in their own container. This container will apply heavy encryption to related data going in and out of the device, and restrict what users can do with the app (based on whatever rules the IT admin has set).

The key here is that while the apps and security are separate, the user will not notice any major difference and will be able to interact with both personal and business apps from the same profile. They will be able to tell the difference between work and personal apps as apps installed, managed or related to Android Work will have an identifying badge on the icon.

Easier deploying and managing of apps

With Android Work, IT admins or managers will be able to bulk purchase apps from the Google Play store and have them automatically installed on user's devices. If you use separate apps, or have developed apps for use in-house, you will also be able to push these to devices.

Beyond that, there will be admin panels that can push updates to apps on all devices, or even bulk manage existing apps. While the user will see no real difference, the apps in the Work container are managed by the administrator, not the user.

Will Work be useful?

Many business owners have been asking this question over the past few months, and the answer really depends on how you use devices in the office. If you support BYOD (Bring Your Own Device), you will be able to easily manage the apps, data, and security of just the business related apps, while still allowing personal apps and data to be installed on the same device.

Companies who provide their employees with mobile phones or tablets will also find Android Work useful as it will enable easier management and enhanced security across a variety of Android devices.

When will Android Work be available?

As of now, Android Work is still in development, but Google has noted that it will be released as a feature of the next version of Android, which is slated to be released this fall.

If you are looking to learn more about Android Work, or how to manage Android devices, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

August 13th, 2014

Offie_Aug11_BIt’s undeniable that Microsoft Excel is one of the most popular spreadsheet applications used by businesses today. Not only does it simplify the process of creating spreadsheets with complex built-in formulas and colorful, descriptive charts, but it also allows you to add headers and footers. Let’s take a look at what headers and footers are and how you can make use of them in Excel.

What are headers and footers?

As with Word, Headers and footers are lines of text that print at the top (header) and bottom (footer) of each page in an Excel spreadsheet. They often contain descriptive text such as titles, dates, or page numbers displayed in page layout views and on printed pages.

Headers and footers are useful in providing quick information about your document or data in a predictable format and also help set out different parts of a document. Simply put, they make calculations, graphs, and pivot tables much easier to read and follow.

How to add and remove headers and footers:

  1. Select the spreadsheet for which you want to add headers or footers.
  2. On the Insert tab in the Text group, click Header & Footer; this displays the spreadsheet in page layout view.
  3. To add a header or footer, click on the left, right or center of the Header or Footer text box at the top or bottom of the spreadsheet page.
  4. You can now add a preset header or footer to your document, or create a custom header and footer.
  5. To start a new line in a header or footer text box, press ENTER; to include a single ampersand (&) in the text of a header or footer, use two ampersands. When you are done, click anywhere in the spreadsheet to close Header or Footer.
  6. Return to Normal page view by clicking on the View tab and Normal button.
  7. To remove the header or footer from a spreadsheet, select the View tab and click on Page Layout. Delete the information you want to remove.
The next time you need to repeat text on a page to make information more organized and easier to digest, you can simply do so with Excel's header and footer feature. Looking to learn more about Microsoft Office and its features? Contact us today and see how we can help.
Published with permission from TechAdvisory.org. Source.

August 7th, 2014

Security_Aug05_BWhen it comes to business security, many small to medium business owners and managers often struggle to ensure that their systems and computers are secure from the various attacks and malware out there. While there are a million and one things you can do to secure systems, one of the most useful approaches is to be aware of common security threats. To help, here are five common ways your systems can be breached.

1. You are tricked into installing malicious software

One of the most common ways a system's security is breached is through malware being downloaded by the user. In almost every case where malware is installed the reason is because the user was tricked into downloading it.

A common trick used by hackers is to plant malware in software and then place this software on a website. When a user visits the site, they are informed that they need to download the software in order for the site to load properly. Once downloaded, the malware infects the system. Other hackers send emails out with a file attached, where only the file contains malware.

There are a nearly limitless number of ways you can be tricked into downloading and installing malware. Luckily, there are steps you can take to avoid this:

  • Never download files from an untrusted location - If you are looking at a website that is asking you to download something, make sure it's from a company you know about and trust. If you are unsure, it's best to avoid downloading and installing the software.
  • Always look at the name of the file before downloading - Many pieces of malware are often disguised with file names that are similar to other files, with only a slight spelling mistake or some weird wording. If you are unsure about the file then don't download it. Instead, contact us as we may be able to help verify the authenticity or provide a similar app.
  • Stay away from torrents, sites with adult content, and movie streaming sites - These sites often contain malware, so it is best to avoid them altogether.
  • Always scan a file before installing it - If you do download files, be sure to get your virus scanner to scan these before you open the apps. Most scanners are equipped do this, normally by right-clicking on the file and selecting Scan with….

2. Hackers are able to alter the operating system settings

Many users are logged into their computers as admins. Being an administrator allows you to change any and all settings, install programs, and manage other accounts.

If a hacker manages to access your computer and you are set up as the admin, they will have full access to your computer. This means they could install other malicious software, change settings or even completely hijack the machine. The biggest worry about this however, is if a hacker gets access to a computer that is used to manage the overall network. Should this happen, they could gain control over all the systems on the network and do what they please on it.

In order to avoid this, you should ensure that if a user doesn't need to install files or change settings on the computer, they do not have administrator access. Beyond this, installing security software like anti-virus scanners and keeping them up to date, as well as conducting regular scans, will help reduce the chances of being infected, or seeing infections spread.

3. Someone physically accesses your computer

It really feels like almost every security threat these days is digital or is trying to infect your systems and network from the outside. However, there are many times when malware is introduced into systems, or data is stolen, because someone has physically had access to your systems.

For example, you leave your computer on when you go for lunch and someone walks up to it, plugs in a USB drive with malware on it and physically infects your system. Or, it could be they access your system and manually reset the password, thereby locking you out and giving them access.

What we are trying to say here is that not all infections or breaches arrive via the Internet. What we recommend is to ensure that you password protect your computer - you need to enter a password in order to access it. You should also be sure that when you are away from your computer it is either turned off, or you are logged off.

Beyond that, it is a good idea to disable drives like CD/DVD and connections like USB if you don't use them. This will limit the chances that someone will be able to use a CD or USB drive to infect your computer.

4. It's someone from within the company

We have seen a number of infections and security breaches that were carried out by a disgruntled employee. It could be that they delete essential data, or remove it from the system completely. Some have even gone so far as to introduce highly destructive malware.

While it would be great to say that every business has the best employees, there is always a chance a breach can be carried out by an employee. The most effective way to prevent this, aside from ensuring your employees are happy, is to limit access to systems.

Take a look at what your employees have access to. For example, you may find that people in marketing have access to finance files or even admin panels. The truth is, your employees don't need access to everything, so take steps to limit access to necessary systems. Combine this with the suggestions above - limiting admin access and installing scanners - and you can likely limit or even prevent employee initiated breaches.

5. Your password is compromised

Your password is the main way you can verify and access your accounts and systems. The issue is, many people have weak passwords. There has been a steady increase in the number of services that have been breached with user account data being stolen. If a hacker was to get a hold of say your username, and you have a weak password, it could only be a matter of time before they have access to your account.

If this happens, your account is compromised. Combine this with the fact that many people use the same password for multiple accounts, and you could see a massive breach leading to data being stolen, or worse - your identity.

It is therefore a good idea to use a separate password for each account you have. Also, make sure that the passwords used are strong and as different as possible from each other. One tool that could help ensure this is a password manager which generates a different password for each account.

If you are looking to learn more about ensuring your systems are secure, contact us today to learn about how our services can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
August 7th, 2014

Hardware_Aug05_BHave you ever taken your laptop to a presentation or meeting and forgotten your power bar? Many laptops have batteries that really won't last all that long when you really need them to, and it can be a pain to run out of battery at an inopportune moment. Luckily, there are a number of ways in which you can extend your battery life when it's running low. Here are six.

1. Adjust the brightness of your screen

A brighter screen will cause your battery life to decrease faster. If you are running low on power, try turning the brightness of the screen down as low as it can go while still remaining visible.

Many laptops, including most PCs and all Macs, have shortcuts on the keyboard that allow you to modify the brightness of your screen. On almost all laptops, screen brightness is indicated by a sun icon, and pressing the smaller sun will decrease the brightness. On most laptops you can either just press the key with the brightness labels on it to decrease the brightness, while others will require that you press the FN key and the key with the label.

2. Activate your laptop's battery saver mode

Most laptops have a built in battery management feature that allows you to enable different profiles based on how you are using the laptop. One of the more useful settings is Battery Saver or Eco Mode. These modes have been developed to help extend the battery life when your battery is running low.

When activated, they will often manually override settings like screen brightness and turn off unnecessary services or connections like BlueTooth. To activate this on PCs, you can usually click on the battery icon in the lower-right bar of the main Windows screen and select your power saving mode.

If you have a Mac, press the battery icon at the top and select Open Energy Saver Preferences. This will allow you to modify how your laptop saves energy, including when to turn the screen and hard drives off.

3. Unplug connected devices

Many USB devices you plug into your laptop like hard drives, mice, phones, etc. are actually powered by your computer. Therefore, if you are running off of the battery, you will likely see increased drain if devices are plugged in.

When you are running low on power, try unplugging devices connected by USB. This is especially important if you have plugged your mobile phone or tablet into your laptop to charge.

You should also look to make sure other connection methods like Bluetooth are off. Disconnecting devices should allow your laptop to last a bit longer.

4. Turn off keyboard backlighting

A common feature of many newer laptops is a backlit keyboard. While useful when you are in a low light situation and need to see what keys you are hitting, the backlight does use battery power and can decrease your battery life.

Most laptops allow you to turn the backlight off from the keyboard, much like the screen brightness. The location of these buttons will be different for each laptop, so be sure to consult your user manual if you can't find them.

5. Close unnecessary apps

When working on the computer, many of us will have more than one program open at the same time. Some of these programs aren't 100% necessary to the task at hand, and keeping them open will usually increase the drain on battery.

So, when your battery starts to get low, try closing apps and programs you aren't using. This is especially true for apps that require larger amounts of computer resources like Photoshop or any graphics heavy program. Closing these will give you a precious few extra minutes, or more, of power.

6. Simplify your activities

Finally, along with closing apps that you aren't using, try simplifying what you are doing. What we mean here is focus on one task. If you are writing a blog article, close everything not related to writing including communication apps like email, instant messaging, etc.

The goal here is to try and stay in the same window or program, as switching programs will increase the drain of the battery. Sure, it won't be a massive spike in battery usage, but staying in the same window or app will help increase the time you'll be able to use your laptop on battery.

If you have a laptop and are looking for ways to get more out of your battery, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Hardware