Blog

October 15th, 2014

iPhone_Oct13_BiOS 8 has, like other versions of iOS, added and improved upon features. One of the biggest changes has to be the drastic improvement of the Notifications Center. With the most recent release, this Center has seen a number of changes, including the introduction of widgets that allow users to truly customize how this feature functions.

Customizing Notifications Center with widgets

While the Notifications Center has been an iOS feature for a number of versions now, Apple finally added more functionality to the Center in iOS 8 by turning on widget support. Widgets are essentially small apps that are meant to provide some of the functionality of a main app.

In the case of Apple, widgets can be added to your Notifications Center to enhance the overall look and functionality. For example, if you have Evernote installed on your device, you can add a widget to the Notifications Center that allows you to quickly create a new note or recording without having to open the app. Other widgets allow you to add an enhanced weather forecast or even a calculator.

In iOS 8, widgets have been enabled by default and can be interacted with by swiping down from the top of your screen to open the Notifications Center. From here, you can tap on Today to view relevant information for the day. This information is from a widget Apple calls Today Summary. You can add more widgets to the Center by:

  1. Opening your Notifications Center.
  2. Tapping on Today.
  3. Scrolling down to the bottom of the screen and tapping on Edit.
This will open a screen that lists all of the available widgets. Widgets with a red circle and minus sign beside them are already added to Notifications Center, while apps under DO NOT INCLUDE can be added. Tapping the green circle with the plus sign will add the widget, while tapping the red circle with the minus will remove it.

You can change the order of the widgets too, by tapping on the three lines to the right of the name and moving it up or down. When you are finished hit Done at the top of the screen and you should see the changes implemented immediately. If you are looking for more widgets, you will need to install apps that are widget compatible. We've found that a quick Internet search for "iOS 8 apps with widgets" returns lists of some great apps for you to try.

Customizing notifications for various apps

As you install and update apps, you may find that they start notifying you whenever there is a change, or where it is desired that you pay attention to some new information. Some of these notifications can be quite annoying, especially if you aren't really using the app at the moment, or you deem the notifications to be useless.

You can customize your app's notification settings by:

  1. Opening the Settings app.
  2. Selecting Notifications from the Settings menu.
  3. Tapping on the app you would like to change the notification settings for.
In the screen that pops up you should see a number of options including:
  • Show in Notification Center - The maximum number of notifications to show in the Notification Center.
  • Sounds - Play a sound when you receive a notification from this app.
  • Badge App Icon - Show the app's icon in the notifications.
  • Show on Lock Screen - Show the notification on the device's locked screen.
You can toggle these on and off as you wish.

Turning notifications off

If you would like to turn off all notifications for an app, you can do so by:
  1. Opening the Settings app.
  2. Selecting Notifications from the Settings menu.
  3. Tapping on the app you would like to change the notification settings for.
  4. Sliding the radio to the right of Allow Notifications to Off.
If you are looking to learn more about iOS 8 and how to get the most out of your iDevice, contact us today.
Published with permission from TechAdvisory.org. Source.

Topic iPhone
October 9th, 2014

Security_Oct07_BIn late spring of this year news broke of the biggest security issue to date - Hearbleed. Many companies leapt to secure themselves from this, but the fallout from it is still being felt. That being said, there is a new, even bigger, security problem called Shellshock that all businesses need to now be aware of.

What exactly is Shellshock?

Shellshock is the name applied to a recently uncovered software vulnerability which could be exploited to hack and compromise untold millions of servers and machines around the world. At its heart, the Shellshock vulnerability is based on a program called Bash. This is a Unix-based command program that allows users to type actions that the computer will then execute. It can also read files called scripts that contain detailed instructions.

Bash is run in a text-based window called a shell and is the main command program used by OS X and Unix. If you have a Mac computer and want to see what Bash looks like, simply hit Command (Apple Key) + Spacebar and type in Terminal. In the text-based window that opens in Bash you can enter commands using the Bash language to get your computer to do something e.g., eject a disc, connect to a server, move a file, etc.

The problem with Bash however is that it was recently discovered that by entering a specific line of code '() { :; };)' in a command you could get a system to run any following commands. In other words, when this command is used, Bash will continue to read and execute commands that come after it. This in turn could lead to a hacker being able to gain full, yet unauthorized, access to systems without having to enter a password. If this happens, there is very little you can do about it.

Why is this such a big issue?

To be clear: Shellshock should not directly affect most Windows-based machines, instead it affects machines that use Unix and Unix-based operating systems (including OS X). So why is this so big a deal when the majority of the world uses Windows-based computers? In truth, the majority of end-users will be safe from this exploit. However, the problem lies with bigger machines like Web servers and other devices such as networking devices, and computers that have had a Bash command shell installed.

While most users have Windows-based computers, the servers that support a vast percentage of the Internet and many business systems run Unix. Combine this with the fact that many other devices like home routers, security cameras, Point of Sale systems, etc. run Unix and this is becomes a big deal.

As we stated above, hackers can gain access to systems using Bash. If for example this system happens to be a Web server where important user information is stored, and the hacker is able to use Bash to gain access and then escalate themselves to administrative status, they could steal everything. In turn this could lead to the information being released on to the Web for other hackers to purchase and subsequently use to launch other attacks - even Windows-based systems. Essentially, there are a nearly unlimited number of things a hacker can do once they have access.

If this is not dealt with, or taken seriously, we could see not only increased data breaches but also larger scale breaches. We could also see an increase in website crashes, unavailability, etc.

So what should we do?

Because Shellshock mainly affects back-end systems, there is little the majority of users can do at this time. That being said, there are many Wi-Fi routers and networks out there that do use Unix. Someone with a bit of know-how can gain access to these and execute attacks when an individual with a system using Bash tries to connect to Wi-Fi. So, it is a good idea to refrain from connecting to unsecured networks.

Also, if you haven't installed a Bash command line on your Windows-based machine your systems will probably be safe from this particular exploit. If you do have servers in your business however, or networking devices, it is worthwhile contacting us right away. The developers of Bash have released a partial fix for this problem and we can help upgrade your systems to ensure the patch has been installed properly.

This exploit, while easy to execute, will be incredibly difficult to protect systems from. That's why working with an IT partner like us can really help. Not only do we keep systems up-to-date and secure, we can also ensure that they will not be affected by issues like this. Contact us today to learn how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
October 8th, 2014

iPad_Oct07_BFor iPad 2 and newer users, you are likely already aware of the fact that iOS 8 has been released, and are probably already using it. While the new version of the popular system introduces a number of great changes and features, there has been reports that the update has led to some older devices seeing a drop in their battery life. If you think this is happening to you, it would be a good idea to find out which apps are using the most battery power.

How to see the battery power apps are using on iOS 8

One of the first things you should do when you notice that your battery is draining faster than normal is to look at how much power each app is using. This can be done by:
  1. Tapping on the Settings app.
  2. Selecting General from the menu bar on the left-hand side of the Settings app.
  3. Tapping on Usage which is located in the menu that opens in the right side of the screen. Selecting Battery Usage.
In the window that opens you will be able to see basic battery information like how long you have used the device since its last charge, and how much power has been used. While this is useful in its own right, there is also valuable information about what apps are using the most power.

This data displays apps that are using the most power first, so you can quickly see what apps are power hungry and take action. In iOS 8, a new tab was actually introduced into the Battery Usage tracker, which shows a seven day running average of the most power hungry apps.

Tapping on the tab that says Last 7 Days at the top of the screen will bring this information up. This is useful because it gives you a better view of the truly power hungry apps.

What do I do with apps that are really draining my iPad's battery?

There are a number of things you can do, including:
  • Uninstalling the app: If the app with the highest battery drain isn't overly useful, then possibly the best step to take would be to uninstall it. Another option may be to look for a similar app and give that a try to see if it fares any better on battery use.
  • Change when you use the app: Some apps, like video recording suites, bandwidth or processing-heavy apps like games, drain your battery quickly when they are running. Instead of using them while on battery power, try to use them when your iPad is plugged into a power source.
  • Limit use until the app is updated: If you are experiencing battery drain, there is a good chance that other users are as well. You can either limit the use of the app until an app update is issued, (most updates will usually fix battery issues), or try to contact the developer directly. Take a look on iTunes for the app and you should see developer contact information there.
  • Dim the display: The iPad has a great display, and many apps look good when you have the display's brightness set at its brightest. The issue with this however, is that a super-bright display will drain your battery quickly. Try turning the display brightness down as low as possible in order to slow how fast the battery is drained.
  • Limit network connections: Similar to your display, having Wi-Fi or Bluetooth radios always on will also drain your battery. If you aren't connected to Wi-Fi, or don't have any Bluetooth devices, then it is best to turn them off. The reason for this is because if they are on, they constantly look for a connection which eats up battery power.
If you are looking for more ways to decrease or manage the power drain on your iPad contact us today to see how we can help.
Published with permission from TechAdvisory.org. Source.

Topic iPad
October 8th, 2014

AndroidTablet_Oct07_BOn your Android tablet you likely have a number of messaging apps installed. One of the more common is Google Hangouts, which allows for cross-platform messaging, chatting, and even calling. In recent months, the app has been updated to not only increase usability and looks, but also implement new calling features.

Looking at the new version of Hangouts

In late September, Google launched a new version of Hangouts for Android devices. With it came a new redesign that reflects the upcoming Android L's Material Design look. When you update and launch the app you will notice that it has changed slightly, with a light green bar across the top and three to four icons:
  • A person: Tapping this will show you your connections, ranked by frequent contacts first, then alphabetical after that. Selecting a contact will open up either a new chat (if you have never messaged the person before), or will open up an ongoing chat (if you have messaged them before).
  • A speech bubble: Tapping this will open up existing chats and SMSs (if you have a SIM card for your device) listed in chronological order.
  • A plus sign: Tapping this will allow you to search for a contact to either start a new chat with, or continue chatting with.
  • A phone: This is a new connectable app called Google Hangouts Dialer (more on that below). It may not show up on some devices.
Tapping your name at the top of the bar will slide a menu in from the left with a number of options including: Invites, Archived conversations, Moods, Settings, etc. Overall, the new update makes the app look much better and even easier to navigate.

Looking at Hangouts Dialer

Since 2009, Google has offered VoIP-like calling features through an app called Google Voice. People who signed up for this could make low cost or free calls to anywhere in the US and Canada, and some other countries as well. Like most other VoIP services, they could also call internationally for low rates.

Users in the US could also pick a local number which could be used for incoming calls. When anyone dialed that number, as they would any other mobile or landline number, the call would go over the Internet or data connection. What is interesting about this is that the number was free, so anyone with an existing data connection or Wi-Fi could theoretically obtain a free phone number.

Earlier this year, rumor broke that Google was going to be getting rid of Google Voice. Instead, the company announced that they would be merging it into Google Hangouts, thereby bringing VoIP calling and Google Voice features into the already useful chat app.

In mid September, shortly after the main Hangouts update, the company introduced the Hangouts Dialer app which, when installed, essentially turns the app into a phone. For those with Google Voice accounts, you will be able to migrate your account into Hangouts and continue using the service as you ordinarily would.

Migrating Google Voice to Hangouts

This migration can be done by launching either Hangouts or Voice. You should see a box pop-up on Hangouts asking you if you want to turn on phone calling in Hangouts. If you select yes, you will need to download the Hangouts Dialer app. From here, open the Google Voice app and you should see a blue box at the top asking you if you would like to migrate to Hangouts. Pressing Turn it on! will start the migration.

Once this is complete, you can use either the Hangouts Dialer or Hangouts app to place VoIP or Google Voice calls. For those who don't have Google Voice, or who live in an area where it isn't available, you can still call other contacts using Hangout's VoIP functionality. Just open a chat, and tap on the phone icon at the top of the screen.

This feature, while currently limited to users in the US and Canada, is great for tablet users who are looking for a way to connect to the office, but don't want to shell out for both a tablet and a phone. If you would like to learn more about this app, or how Android tablets can fit into your organization, contact us today.

Published with permission from TechAdvisory.org. Source.

October 2nd, 2014

Security_Sep29_BBusiness owners and managers are becoming increasingly worried about the security of their systems and networks. While the vast majority have implemented some form of security, this may not be enough. In fact, we have helped a number of businesses with flawed security measures in place. The issue is, how do you know if your security is working sufficiently? Here are five common security flaws you should be aware of.

1. Open wireless networks

Wireless networks are one of the most common ways businesses allow their employees to get online. With one main Internet line and a couple of wireless routers, you can theoretically have the whole office online. This method of connecting does save money, but there is an inherent security risk with this and that is an unsecure network.

Contrary to popular belief, simply plugging in a wireless router and creating a basic network won't mean you are secure. If you don't set a password on your routers, then anyone within range can connect. Hackers and criminal organizations are known to look for, and then target these networks. With fairly simple tools and a bit of know-how, they can start capturing data that goes in and out of the network, and even attacking the network and computers attached. In other words, unprotected networks are basically open invitations to hackers.

Therefore, you should take steps to ensure that all wireless networks in the office are secured with passwords that are not easy to guess. For example, many Internet Service Providers who install hardware when setting up networks will often just use the company's main phone number as the password to the router. This is too easy to work out, so changing to a password that is a lot more difficult to guess is makes sense.

2. Email is not secure

Admittedly, most companies who have implemented a new email system in the past couple of years will likely be fairly secure. This is especially true if they use cloud-based options, or well-known email systems like Exchange which offer enhanced security and scanning, while using modern email transition methods.

The businesses at risk are those using older systems like POP, or systems that don't encrypt passwords (what are known as 'clear passwords'). If your system doesn't encrypt information like this, anyone with the right tools and a bit of knowledge can capture login information and potentially compromise your systems and data.

If you are using older email systems, it is advisable to upgrade to newer ones, especially if they don't encrypt important information.

3. Mobile devices that aren't secure enough

Mobile devices, like tablets and smartphones, are being used more than ever before in business, and do offer a great way to stay connected and productive while out of the office. The issue with this however is that if you use your tablet or phone to connect to office systems, and don't have security measures in place, you could find networks compromised.

For example, if you have linked your work email to your tablet, but don't have a screen lock enabled and you lose your device anyone who picks it up will have access to your email and potentially sensitive information.

The same goes if you accidentally install a fake app with malware on it. You could find your systems infected. Therefore, you should take steps to ensure that your device is locked with at least a passcode, and you have anti-virus and malware scanners installed and running on a regular basis.

4. Anti-virus scanners that aren't maintained

These days, it is essential that you have anti-virus, malware, and spyware scanners installed on all machines and devices in your company and that you take the time to configure these properly. It could be that scans are scheduled during business hours, or they just aren't updated. If you install these solutions onto your systems, and they start to scan during work time, most employees will just turn the scanner off thus leaving systems wide-open.

The same goes for not properly ensuring that these systems are updated. Updates are important for scanners, because they implement new virus databases that contain newly discovered malware and viruses, and fixes for them.

Therefore, scanners need to be properly installed and maintained if they are going to even stand a chance of keeping systems secure.

5. Lack of firewalls

A firewall is a networking security tool that can be configured to block certain types of network access and data from leaving the network or being accessed from outside of the network. A properly configured firewall is necessary for network security, and while many modems include this, it's often not robust enough for business use.

What you need instead is a firewall that covers the whole network at the point where data enters and exits (usually before the routers). These are business-centric tools that should be installed by an IT partner like us, in order for them to be most effective.

How do I ensure proper business security?

The absolute best way a business can ensure that their systems and networks are secure is to work with an IT partner like us. Our managed services can help ensure that you have proper security measures in place and the systems are set up and managed properly. Tech peace of mind means the focus can be on creating a successful company instead. Contact us today to learn more.
Published with permission from TechAdvisory.org. Source.

Topic Security
October 1st, 2014

BCP_Sep29_BWhen it comes to business continuity, many business owners are aware of the fact that a disaster can happen at any time, and therefore take steps to prepare for this, usually by implementing a continuity plan. However, the reality is that many businesses implement plans that could lead to business failure. One way to avoid this with your continuity strategy is to know about the common ways these plans can fail.

There are many ways a business continuity or backup and recovery plan may fail, but if you know about the most common reasons then you can better plan to overcome these obstacles, which in turn will give you a better chance of surviving a disaster.

1. Not customizing a plan

Some companies take a plan that was developed for another organization and copy it word-for-word. While the general plan will often follow the same structure throughout most organizations, each business is different so what may work for one, won't necessarily work for another. When a disaster happens, you could find that elements of the plan are simply not working, resulting in recovery delays or worse. Therefore, you should take steps to ensure that the plan you adopt works for your organization.

It is also essential to customize a plan to respond to different departments or roles within an organization. While an overarching business continuity plan is great, you are going to need to tailor it for each department. For example, systems recovery order may be different for marketing when compared with finance. If you keep the plan the same for all roles, you could face ineffective recovery or confusion as to what is needed, ultimately leading to a loss of business.

2. Action plans that contain too much information

One common failing of business continuity plans is that they contain too much information in key parts of the plan. This is largely because many companies make the mistake of keeping the whole plan in one long document or binder. While this makes finding the plan easier, it makes actually enacting it far more difficult. During a disaster, you don't want your staff and key members flipping through pages and pages of useless information in order to figure out what they should be doing. This could actually end up exacerbating the problem.

Instead, try keeping action plans - what needs to be done during an emergency - separate from the overall plan. This could mean keeping individual plans in a separate document in the same folder, or a separate binder that is kept beside the total plan. Doing this will speed up action time, making it far easier for people to do their jobs when they need to.

3. Failing to properly define the scope

The scope of the plan, or who it pertains to, is important to define. Does the plan you are developing cover the whole organization, or just specific departments? If you fail to properly define who the plan is for, and what it covers there could be confusion when it comes to actually enacting it.

While you or some managers may have the scope defined in your heads, there is always a chance that you may not be there when disaster strikes, and therefore applying the plan effectively will likely not happen. What you need to do is properly define the scope within the plan, and ensure that all parties are aware of it.

4. Having an unclear or unfinished plan

Continuity plans need to be clear, easy to follow, and most of all cover as much as possible. If your plan is not laid out in a logical and clear manner, or written in simple and easy to understand language, there is an increased chance that it will fail. You should therefore ensure that all those who have access to the plan can follow it after the first read through, and find the information they need quickly and easily.

Beyond this, you should also make sure that all instructions and strategies are complete. For example, if you have an evacuation plan, make sure it states who evacuates to where and what should be done once people reach those points. The goal here is to establish as strong a plan as possible, which will further enhance the chances that your business will recover successfully from a disaster.

5. Failing to test, update, and test again

Even the most comprehensive and articulate plan needs to be tested on a regular basis. Failure to do so could result in once adequate plans not offering the coverage needed today. To avoid this, you should aim to test your plan on a regular basis - at least twice a year.

From these tests you should take note of potential bottlenecks and failures and take steps in order to patch these up. Beyond this, if you implement new systems, or change existing ones, revisit your plan and update it to cover these amendments and retest the plan again.

If you are worried about your continuity planning, or would like help implementing a plan and supporting systems, contact us today.

Published with permission from TechAdvisory.org. Source.

September 25th, 2014

AndroidPhone_Sep22_BMobile operating systems like Android have a wealth of features that users can take advantage of. However, many of these features are often hidden or not well represented. For example, did you know that on Android devices you can create folders on your home screen for your apps? Here's five tips on how you can create and manage these folders.

Creating folders

On most devices, when you install a new app the icon will be automatically added to your home screen, or onto a screen where there is space. While this is useful, many of us have a large number of apps installed, and it can be a bit of a chore actually finding the icon you are looking for.

The easiest solution is to group icons together into a folder. This can be done by:

  1. Pressing and holding on an app on your device's home screen.
  2. Dragging it over another app and letting go.
You should see both of the icons moved into a circle and kind of hovering over each other. This indicates they are now in a folder. It is important to note that these folders only appear on your home screen. If you combine say Facebook, Twitter, and LinkedIn apps into a folder on your home screen, they will not be put into a folder in your app drawer.

Naming folders

When you create new folders, you will notice that there is no text below the icon as there is with other icons. This is because you need to name the folder, which can be done by:
  1. Tapping on the newly created folder.
  2. Tapping on Unnamed Folder in the pop-up window.
  3. Naming the folder.
  4. Pressing Done at the bottom of the keyboard.
The name you assign to the folder will show up under each icon on your home screen. If you are going to use different folders, it is a good idea to pick names related to the apps they contain. For example, if you put all of your email apps in one folder, call the folder 'Email'. This will make your apps easier to find.

Adding/removing apps from folders

You can easily add apps to folders by either dragging them from the home screen over to the folder and letting go, or:
  1. Opening your device's app drawer (usually indicated by a number of squares).
  2. Finding the app you would like to put into a folder.
  3. Pressing on it, and holding your finger down until the home screen pops up.
  4. Dragging it over the folder you would like it to be placed in.
  5. Letting go.
If done right, the app's icon should be automatically dropped into the folder. You can also remove apps from folders by tapping on the folder where the app is, pressing on the app, then dragging it up to Remove, which should appear at the top of the screen. This will remove it from the home screen, but will not uninstall the app. You can also tap on the app and move it out of the folder to an empty place on the home screen.

Moving folders

You can move a folder's location the same way you do so with an app: Tap and hold on the folder until the screen changes slightly and drag it to where you would like it to be. On newer versions of Android, the apps should all move to make room for the folder.

Deleting folders

Finally, you can delete a folder by either dragging all of the apps out of the folder, or pressing and holding on the folder until the screen changes and dragging it up to Remove. This will remove the folder and all the stored app icons, but it won't delete the apps.

If you have any questions about using an Android device, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

September 24th, 2014

SocialMedia_Sep22_BSocial media has become an integral part of many business strategies, with an ever increasing number of companies adopting a variety of platforms. However, many business owners and managers are often unsure as to exactly how they can, or should, be using these platforms. In order to make things a bit easier, here is an overview of the three most common ways businesses use social media.

1. To be a resource for existing and potential clients

This approach is by far the most popular used by businesses of all sizes. The main idea here is that social media is used as essentially a two-way street where you can pass information about the company, products, and industry to your followers. In turn, they interact with the content and eventually start to turn to your profile and page when they are looking for information.

One of the best ways to be successful with this approach is to provide your followers with information about the company, facts, tips about your products and industry, and links to other relevant content.

By sharing content, users will generally interact with it more and begin to see your company as a reliable source of information. This often translates into enhanced brand awareness and potentially sales.

The downside with this approach however, is that it can be time consuming to constantly develop new content. Most companies eventually reach a point where what they produce and share is pretty much the same, and overall payoffs begin to decrease. One way around this is to work with professionals to come up with dynamic and different content.

2. To provide customer service/support

These days, when someone has a problem with a company's services or products, the first port of call for complaints is often social media, largely because it's the most convenient place to vent where you can get instant reactions.

It therefore makes sense to create support or customer service presence on these channels. Some companies have even taken to launching support-centric profiles, where customers can contact them about anything, from complaints to questions, and receive a personal answer. For many companies this is ideal because it eliminates the hassle of customers having to call a support line and dealing with automated machines.

This approach can prove useful for businesses because it often makes it easier to reach out to disgruntled customers and track overall brand satisfaction. The downside is that you will need someone monitoring services 24/7, and to respond in a timely manner which may be tough to do for many smaller businesses.

3. To sell something

There are an increasing number of businesses who have launched social media profiles with the intent of selling a product or service. The actual sales may not take place through social media but the information on these profiles and platforms channels potential customers to an online store or to contact a company directly. Social media's instantaneous nature makes for a tempting platform, especially when you tie in different advertising features and include content like coupons, and discounts.

While this hard sales line can be appealing to businesses, many users are seemingly put off of companies with profiles that only focus on selling via their platforms. The whole idea of social networking is that it is 'social'; this means real interactions with real people. Profiles dedicated only to trying to sell something will, more often than not, simply be ignored.

What's the ideal use?

One of the best approaches for small to medium businesses is to actually use a combined approach. Most people know that ultimately, businesses with a presence on social media are marketing something, but focusing solely on this could turn customers off.

A successful split that many experts have touted is the 70-20-10 rule. This rule states that you should make 70% of your content and profile focused on relevant information to your audience. 20% of content should be content from other people and 10% of content should be related to selling your products or services e.g., promotional.

If you want to use social media for support as well, it is a good idea to create a separate profile dedicated just to this end. If complaints are lodged or noticed using your main account, direct them towards the support account.

As always, if you are looking for help with your social media strategy, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
September 19th, 2014

Security_Sep15_BToday’s technology advancement has one obvious parallel: increasing security threats. One such issue which has been growing both in number and intensity is data breach. And while many businesses have turned to the cloud in the hope of improving security, there is still a chance of a collision between data breaches and cloud usage. But don’t panic just yet, there are measures you can take to avoid the headache of a cloud and data security breach.

The cloud opens up some great tech advancements for businesses and is here to stay. However, as with all tech developments, you need to also be aware of any vulnerabilities and security issues as they change and develop at the same time too. If you use the cloud and want to proactively prevent cloud-and-data security breaches then here are five tips to follow:

  1. Know your cloud apps: Get a comprehensive view of the business readiness of apps and which ones render you more or less prone to a breach. Ask yourself these questions: Does an app encrypt data stored on the service? Does it separate your data from that of others so that your data is not exposed when another tenant has a breach? The idea here is to know exactly what each cloud service employed offers and how your company uses them.
  2. Migrate users to high-quality apps: Cloud-switching costs are low, which means that you can always change and choose apps that best suit your needs. If you find ones that don’t fit your criteria, take the time to talk to your vendor or switch; now more than ever you have choices, and the discovery process in step one will help you find out what these are.
  3. Find out where your data is going: Take a look at your data in the cloud. Review uploads, downloads, and data at rest in apps to get a handle on whether you have potential personally-identifiable information (PII), or whether you simply have unencrypted confidential data in or moving to cloud apps. You wouldn’t want cloud-and-data breaches with this critical data.
  4. Look at user activities: It’s important to understand not only what apps you use but also your data in the context of user activity. Ask yourself: From which apps are people sharing content? According to tech news source, VentureBeat, one-fifth of the apps they tracked enable sharing, and these aren’t just cloud storage apps, but range from customer-relationship management to finance and business intelligence. Knowing who’s sharing what and with whom will help you to understand what policies to best employ.
  5. Mitigate risk through granular policy: Start with your business-critical apps and enforce policies that matter to your organization in the context of a breach. For example, block the upload of information covered by certain privacy acts, block the download of PII from HR apps, or temporarily block access to vulnerable apps.
The key to preventing a cloud-and-data security breach lies in careful attention to your cloud applications and user activity. Analyzing your apps and looking into user activities might be time consuming, but the minimization of cloud-and-data security breaches makes this task worthwhile. Looking to learn more about today’s security? Contact us and let us manage and minimize your risks.
Published with permission from TechAdvisory.org. Source.

Topic Security
September 17th, 2014

iPhone_Sep15_BSeptember 9 was a day eagerly anticipated by many Apple fans, largely because it was the day the company held their nearly annual announcement of new devices. This year the company announced not only two new iPhones but also a new smartwatch and some new iOS 8 features. If you missed the news then here is an overview of the new devices introduced at the event.

The iPhone 6

Before the September 9 event, rumors were flying for months about a new iPhone that Apple was working on. The company did not disappoint and announced a new version of their staggeringly popular phone. Here's an overview of the iPhone 6 specs which business owners and managers will want to know about.
  • Screen: The iPhone 6 will have a 4.7 inch screen (measured diagonally), and will sport Apple's new display, Retina HD, which has more pixels for a much improved image quality.
  • Size: The phone will be 5.44 x 2.64 inches and .27 inches thick. The device's shape has also been changed slightly with a more rounded body (compared to the iPhone 5's squared body) which should make it easier to hold.
  • Processor: This device will have what Apple calls the A8 processor. This is an improved processor over the one found in previous devices like the iPhone 5, and offers 25% faster speeds and 50% better efficiency. In other words, the device will be able to do more than previous versions, and do it faster.
  • Storage: You can choose either 16GB, 64GB, or 128GB of storage space.
  • Battery life: Apple has noted that the iPhone 6 should have the same, or slightly better, battery life than previous models. While this may not seem like an improvement, you need to take into account the bigger screen which requires more power to run.
  • Pricing: In the US, the iPhone 6 starts at USD 199 for the 16GB of storage. It should be noted that this is the price on a two year contract. If you want to purchase the model outright, prices start at USD 649 for the 16GB. Both the on-contract and outright purchase prices go up USD 100 for each increase in storage.
  • Availability: You could pre-order your device starting September 12, with it being available in many stores September 19. Chances are, the device will sell out quickly, so you may be put on a waiting list if you decide to purchase right away.

The iPhone 6 Plus

Alongside rumors about the impending iPhone 6, there were also rumors that Apple would be introducing a larger version of the iPhone 6 that is designed to compete with the various "phablets" (small tablets with phone capabilities) which are immensely popular these days. They did indeed announce a new, larger version of the iPhone 6 called the iPhone 6 Plus. Here is an overview of the major details that will benefit business owners and managers.
  • Screen: The iPhone 6 Plus will have a 5.5 inch screen (measured diagonally), and will sport Apple's new display, Retina HD, which has more pixels, meaning image quality will be much improved.
  • Size: The phone will be 6.22 x 3.06 inches and .28 inches thick. The device's shape has also been changed slightly with a more rounded body. It may take time to get used to the screen size and some users may not be able to use the device comfortably with one hand.
  • Processor: This device will have what Apple calls the A8 processor. This is an improved processor over the one found in previous devices like the iPhone 5, and offers 25% faster speeds and 50% better efficiency. In other words, the device will be able to do more, faster, than previous versions.
  • Storage: You can choose either 16GB, 64GB, or 128GB of storage space.
  • Battery life: Apple has noted that the iPhone 6 Plus will have a larger battery that supposedly offers 24 hours of talk time. Because this device hasn't been fully tested yet, it's difficult to tell what the actual battery life will be like, but it will likely be enough to get you through a day of moderate use.
  • Pricing: In the US, the iPhone 6 Plus starts at USD 299 for the 16GB of storage. It should be noted that this is the price if you get the device on a two year contract. If you want to purchase it outright, the device starts at USD 749 for the 16GB. Both the on-contract and outright prices go up USD 100 for each increase in storage.
  • Availability: Pre-orders for the device started September 12, but it was quickly sold out. Apple has noted that it should be in many stores as of September 19.

The Apple Watch

Apple wasn't done with just two mobile devices however, they also proved rumors true and announced a new device - the Apple Watch. This is Apple's take on the smartwatch that appears to be gaining traction with many users.

The Apple Watch is a rectangular device that is worn on the wrist and, as the name implies, is a watch. Well, a watch with numerous features that many users will no doubt enjoy. The device has a knob at the top-left which Apple calls the "digital crown", that you use to navigate the device. For example, pressing it opens the device's home screen, while turning it will zoom the face.

You can also interact the device via touch. For example, you will be able to swipe up from the bottom of the screen to open a feature Apple calls Glance. This provides you with useful information like the date, weather, notifications, etc.

Because typing on a device that is on your wrist is pretty much impossible to do accurately, the device supports voice commands and even interaction with Siri. The Apple Watch also has a multitude of sensors including health related ones like a heart rate sensor.

So far, it appears like this device is mainly aimed towards individual users, but business users who are looking for a way to interact with their devices or a different way to keep track of their most important information like calendars, etc. may find it useful too.

If the watch sounds interesting, you are going to have to wait for a while, as Apple has said it won't be released until the spring of 2015. While this may seem like a long time to wait, it could prove to be positive, as it gives the company more time to perfect the device. When released, Apple has noted that the Apple Watch will start at USD 350.

New iOS 8 features

New devices weren't all that was introduced at the event, Apple also talked about some new features that will be introduced in iOS 8.
  • Near Field Communication (NFC) and ApplePay - Both the new iPhone 6s and the Apple Watch will ship with NFC chips in the device. These can be used in conjunction with Apple's new pay service, ApplePay. Like other similar apps, you will be able to use your phone as a wallet, and swipe it over pay terminals to pay for items. Your payment information is stored in Passbook which creates a unique ID for each credit card, but does not store your credit card information.
  • Enhanced navigation - With bigger screens on both of the new iPhones, many users will want to hold the phone in landscape (horizontal) mode for easier viewing of apps. iOS 8 will enable this.
  • New gesture - Reachability - Reachability is a new gesture that will allow users to quickly switch the content at the top of the screen by tapping twice on the Home button.
For those of you who have an existing iPhone or iPad, you should have been asked to upgrade to iOS 8 when it came out September 17.

If you are looking to learn more about the iPhone 6, 6 Plus, Apple Watch, or iOS 8, contact us today.

Published with permission from TechAdvisory.org. Source.

Topic iPhone