We get it (and IT!)

Phone: 1300-728-259 or .

Category Archives: Security Alert

Friday Funny 30.12.16

The perils of the Google Chrome browser #fridayfunny #techtip 👮

Improve searches with these Google tricks

During the pre-internet era, locating a document or verifying a fact took countless hours, if not days. Now with smartphones and search engines, it takes less than a second to do the same. However, new tech comes new expectations, ones that demand lightning-fast efficiency. We want our information quickly, yet all we give Google Search to work with are a couple of syllables. Enhance the speed as well as the quality of your next search with the following 12 tips:

Get Olympic updates

Get into the spirit of the games by keeping up with the latest medal tally and other interesting news about the 2016 Rio Olympics. Simply type in “rio olympics” and you’ll be greeted with two options:

1. Above the search results, you’ll see a temporary suggestion offering a shortcut on your home screen to quickly look up the latest Olympic news. Ideal if you want to check every now and then.
2. If you prefer immediate notification, simply scroll down a little and click on “Get Olympics updates.” By doing so, notifications will be sent straight to your phone anytime a major event occurs.

Search for exact phrases with quotes

This tip is ideal if you’re looking to locate results that contain a specific phrase. Searching for a phrase in quotes will bring up results that have only the exact words in the same order.

Specify unknown words within quotes

Look up variations of a certain phrase with ease. Simply replace a certain word with an asterisk. It’ll help you determine a song from its lyrics or find the missing words in an incomplete expression.

Utilize the minus sign

Refine search results even further by using the minus sign. That will help filter out results that aren’t of any interest. Figure out what terms you don’t want to see (e.g., Jaguar -car) and refresh your search.

Website keywords

This is similar to the “site:” function that initiates a Google search that sifts through one particular website. For example, if you want to see every time TIME.com is mentioned in Google, use Google site:TIME.com

Go through archives dating back to the mid-1880s

If nostalgia pays you a visit, Google won’t leave you hanging since there’s an option that allows you to search through newspapers from around the world archived centuries ago.

Use “vs” to compare foods

With the myriad of food options available these days, sometimes we just need help deciding. Not sure what to have for dinner? Try typing in “rice vs. quinoa” for a side-by-side nutritional comparison.

Filter search results for recipes

Don’t let dietary restrictions rain on your parade. After looking up your favorite dish, click on Search Tools under the search bar to filter recipes based on ingredients, cook time, and even calories.

DEFINE: the definition

Instead of flicking through dictionaries, save time by entering DEFINE: before any word (slang included). You’ll also see its etymology as well as a graph depicting its linguistic usage over time.

Where is the love?

For those looking to add a little romance into their lives, simply press the mic icon on Google’s search bar and say something sweet like “I love you.” This recently-released love quote generator does all the searching for you. If that doesn’t the stir enough butterflies in your stomach, simply click Try Again below the results bar.

With the right tips, you can save time and locate the needle in today’s virtual haystack with ease. If you still have any questions regarding any of the Google search engine tips mentioned above, don’t hesitate to mail us or give us a call. We are more than happy to accommodate your requests.

Friday Funny 18.11.16

The IT #security prayer.

#fridayfunny #techtip #security

Friday Funny 11.11.16

Everyone should take #privacy seriously 🔐

#fridayfunny #techtip

Friday Funny 21.10.16

The interesting case of Identity Theft… 🔐

#superman #clarkkent #identitytheft #fridayfunny #security

4 ways to print from your Android device

There was once a time when a broken laptop meant your life was flipped upside down. That’s not the case anymore as long as you have an Android device with you. Everyone knows that you can check emails, edit documents stored in the cloud, and make video calls as well. What few seem to realize is that you can also print from your Android too. If that’s what you’re looking to do, here are four options to choose from.

Google Cloud Print to print from your Android

The wonder that is Google Cloud Print allows you to send documents and files from your device to your printer without you being on the same network. To utilize this, make your printer available to Google Cloud Printing by activating it in the Chrome browser settings of the computer it’s attached to. Then, just by connecting your printer and mobile to the same Google account, you can print any document or photo by tapping the share button on your phone or tablet, and choosing Google Cloud Print.

Prynt to print from your Android

If your SMB has any photography needs, this option might be the way to go. Prynt comes in the form of an instant photo printer that connects to your Android device’s charging port. Simply place your smartphone in the Prynt case, snap a picture, order Print, and that’s it. If you feel the need to spruce up your prints, the printer’s native app includes frames, filters, stickers and the addition of text before printing.

Manufacturer apps to print from your Android

Most popular printer manufacturers have their own apps that make printing from an Android device possible. HP has HP ePrint, Samsung comes with itsSamsung Mobile Print, and Epson has Epson iPrint. Make sure to check the Google Play store to see if your printer has an app companion before trying any of the third-party options listed below.

Third party apps

Although it’s not our favorite option, there are third party apps that make it possible to send items from your Android device to your printer. Some apps — like PrinterShare and PrintHand Mobile Print — restrict mobile printing to Bluetooth or local wifi networks. Others — like Cloud Print Plus — untether local requirements so you can print from anywhere. However, it’s always better to try apps owned by hardware manufacturers and Google first. These third party apps should be considered a last resort when other options aren’t available.

Aside from printing wirelessly, Android devices can do just about anything a desktop computer can. If you’re looking for more tips and in-depth guidance on how Android can improve productivity at your business, get in touch with one of our Android experts today. We’re here to help you achieve your mobile technology business goals.

7 things every Windows 10 user should know

Windows 10 stands tall as Microsoft’s best operating system release to date, hands down. But having undergone serious revamping, the OS is ready to rock and scroll. Boasting a myriad of new features, the updated Windows 10 is both efficient and effortless — fully capable of redefining your computing experience for good. Become a Windows 10 power user in no time with these seven tips:

Master virtual desktops

Virtual desktops allow for better utilization of screen space. You can span your applications and windows across multiple “virtual” desktops. Create one by clicking on the “Task View” icon (located at the right of the Cortana bar) on the taskbar, then click “+ New Desktop” in the lower right corner and add as many desktops as you wish. To move an application to a new desktop, merely drag it into the virtual desktop on the bottom.

Next-level screenshotting

The original screenshotting methods on Windows include Windows + Prt Scn, which captures the screen and saves it into the Screenshots folder; and Alt + Prt Scn, which captures the screen and copies it to your clipboard.

Introducing the new built-in Snipping Tool. On top of capturing a full screen screenshot, other capturing options range from a free-form rectangle to a specific aspect ratio or even an entire window as well. You can also set the capture to delay a screenshot by a set interval — this comes in handy when you want to screenshot a YouTube video minus the playback controls.

Shake and minimize

For users who aren’t aware of this trick, you can grab a window by its bar and literally shake your mouse. This causes all the other windows to automatically minimize.

Professional Windows snapping

Snapping windows to certain parts of the screen is ideal for multitasking. You can now organize and monitor different applications more seamlessly. Make the most of your screen space with the following tips:

Drag a window to the right or left to split it in half.
Drag a window to a corner to reduce it to a fourth of its size.
Drag a window to the top to maximize its size.

Record your screen with the Xbox app

After launching the Xbox app, go to the app you wish to record and press Windows + G. You’ll be prompted with a window that asks: “Do you want to open the Game bar?” Click on the “Yes, this is a game” box and let the recording begin!

Talk to Cortana like a person

Aside from typing your requests, you can also use natural language to ask Cortana to locate your vacation photos, or provide directions to your friend’s house. No date needed, just specific words and she’s all set. Cortana is also synced with your calendar, so if you’re ever unsure when your meetings are, Cortana will gladly double-check.

Automatic Battery Saver mode

When activating battery saver in Windows 10, you can limit your portable devices’ background activity and push notifications to prolong battery life. Battery saver also kicks in automatically once your battery life is lower than 20%. To customize your own power threshold as well as which applications you allow to run in the background, go to Settings > System > Battery saver — voilà!

Make the most of Windows 10 with these tips and upgrade your user status from regular to power. Regardless of what you’re using it for — arranging your meetings or planning your vacation — make each computing experience a memorable one. Want to hear more of the latest Windows 10 news and updates? Contact us today.

How hi-tech can healthcare get?

The mere mention of the word “technology” elicits a certain expectation. Namely, that we’re dealing with something that’s modern, and new, and has the potential to change our lives. The word “disruptive” is also indicative of change, so a term like “disruptive technology” may seem redundant. But in healthcare it makes perfect sense as the status quo is constantly under threat.

Technology companies are transforming the healthcare industry perhaps more remarkably than any other industry. Everything from miniaturized pacemakers and mobile stroke units to wearable wellness apps and bed sore-preventing electronic underwear are leading the way to a seemingly sci-fi future in medicine.

And we’re on the cusp of several other game-changing innovations that clearly qualify as “disruptive technology.” They’re things that are likely to derail the healthcare industry’s apple cart, as it were, by introducing completely new ways of diagnosing patients, conducting clinical trials, treating illnesses, and much more.

For medical industry stakeholders, the first step toward embracing these changes is awareness.

The “internet of things”

The “internet of things” literally means that “things” will be connected to the internet. People, cars, buildings, household objects, etc. will all be fitted with sensors and network connectivity that will allow them to send and receive data over the internet.

The implication for healthcare providers is all about data capture and analysis, as this kind of technology will allow physicians to have access to patients’ vital signs on-demand: blood pressure, body temperature, glucose levels, and respiratory rate will be read, analyzed, and recorded, all while patients remain in the comfort of their home. How would you adapt to this kind of patient monitoring scheme if it were to go mainstream?

Machine learning and artificial intelligence (AI)

Computers are programmed to do everything from making coffee to flying planes, and they’re even programmed to learn, as chess master Gary Kasparov knows all too well from having faced Deep Blue in their famous match.

But can corralling “big data” – which in this case amounts to roughly a trillion gigabytes of patients’ health information culled from EHRs, laboratory tests, and the like – lead to machines actually being able to diagnose and treat patientsbetter than highly-trained human doctors?

Many in the industry are betting that it can, and AI start-ups in healthcare have raised more than $870M since 2011. Are there opportunities here for your business?

A virtual healthcare reality

By simply donning a special hi-tech virtual reality headset, a user can be “tricked” into thinking they’re in an environment that they’re not. And the technology is already being used to treat autism and PTSD, as well as conduct training in emergency response and 19patient diagnosis.

But it’s the future possibilities that defy belief: imagine an American doctor being “transported” via VR to a rural clinic in Afghanistan to interact with patients, participate in evaluating them, and even perform their surgeries.

Now try to imagine a patient “virtually” visiting your hospital to meet with your “machine” doctor, who will then read vital signs from nano devices inside the virtual patient’s body, over the internet, in order to schedule their robotic artificial retina surgery?

This sort of scenario isn’t actually as far-fetched as it may sound, and it may not even be that far off, either. So now might not be a bad time to evaluate how these futuristic-sounding advances – these disruptive technologies – might impact your future.

A quick call to a technical expert is one way to get answers… So contact us today.

5 IT security measures made easy

Let’s face it, keeping yourself free from online threats can be a pain: using different passwords for every site, changing them every three months, using advanced encryption, the list goes on and on. You either end up paranoid of being online or give up altogether. We’ve organized 5 simple cybersecurity measures that we promise anyone can implement.

1. Two-Factor Authentication

Did an attacker get your password? With two-factor authentication they’ll still need your mobile device to do any damage. Here’s how it works: every time you log into a service that requires a password, the service will send a code to your mobile device for another layer of authentication. Nowadays, most internet services have this option: Google, Facebook, Twitter, Instagram, Skype, Slack, etc. Check a full list here to see if you could be using two-factor authentication on any of your online accounts.

2. Password Manager

Say goodbye to the bygone era of memorizing a long list of different passwords for the various websites and services you use. Password manager software may have been around for a long time, but it’s still a viable solution for improving your login integrity. After installing it, all you need to do is create one secure master password and let the software do the rest. It will store and encrypt all of your passwords in one place for future reference and help generate random, more secure passwords for any new logins.

3. Keep All Software Up to Date

Update all of your software and your operating system as often as possible — it’s that simple. New versions come with better protection and fix any newly discovered loopholes. If you are too busy or can’t find the time to do it, check for an automatic update option. Any excuse for postponing updates will feel a lot less valid when it means a security breach or system crash.

4. Disable Flash Player

Adobe Flash Player may be what allows you to play Candy Crush during your work breaks, but it has boasted such a poor security record that most experts recommend that users block the plugin entirely. Most internet browsers have the option to block Flash by default, while allowing you to enable blocked content you deem acceptable by simply right-clicking and selecting Run this Plugin.

5. HTTPS Everywhere

When dealing with technology, long acronyms tend to scare off novice users before they even make it to step two. But don’t panic, there’s only one step to this trick. ‘HTTPS Everywhere’ is a browser extension that forces your browser to automatically navigate to sites using a secured encryption, if the site allows it. The thing is, a significant percentage of websites offer HTTPS connections but don’t present them as the default. When that’s the case, ‘HTTPS Everywhere’ gives your browser a gentle nudge in the right direction.

While in-depth security measures need to be implemented and managed by experts, little steps like the ones listed here can be just as important. Check back often for more helpful cybersecurity tips, but if you have more urgent security needs for yourself and your business, our experts are ready and waiting to offer a helping hand — why not reach out to us today?

Don’t let hackers fool you with these tricks

According to several reports, the volume of malicious cyber attacks have increased since the beginning of the Rio Olympics. And even though our devices have the latest network security systems, hackers have a cunning trick up their sleeves — social engineering. Unlike malware and other viruses, social engineering tricks people into divulging sensitive data to hackers. Unfortunately, businesses are also vulnerable to various social engineering tactics. As a business owner, you should be vigilant of these common scams used by hackers.

Phishing
Phishing scams are perhaps the most common type of social engineering attack. Usually seen as links embedded in email messages, these scams lead potential victims into seemingly trustworthy web pages, where they are prompted to fill in their name, address, login information, social security number, and credit card number.

Phishing emails often appear to come from reputable sources, which makes the embedded link even more compelling to click on. Sometimes phishing emails masquerade as government agencies urging you to fill up a personal survey, and other times phishing scams pose as false banking sites. In fact earlier this year, fraudulent Olympics-themed emails redirected potential victims to fake ticketing services, where they would eventually input their personal and financial information. This led to several cases of stolen identities.

Tailgating

What’s the best way to infiltrate your business? Through your office’s front door, of course! Scam artists can simply befriend an employee near the entrance of the building and ask them to hold the door, thereby gaining access into a restricted area. From here, they can steal valuable company secrets and wreak havoc on your IT infrastructure. Though larger enterprises with sophisticated surveillance systems are prepared for these attacks, small- to mid-sized companies are less so.

Quid pro quo

Similar to phishing, quid pro quo attacks offer appealing services or goods in exchange for highly sensitive information. For example, an attacker may offer potential targets free tickets to attend the Olympic games in exchange for their login credentials. Chances are if the offer sounds too good to be true, it probably is.

Pretexting

Pretexting is another form of social engineering whereby an attacker fabricates a scenario to convince a potential victim into providing access to sensitive data and systems. These types of attacks involve scammers who request personal information from their targets in order to verify their identity. Attackers will usually impersonate co-workers, police, tax authorities, or IT auditors in order to gain their targets’ trust and trick them into divulging company secrets.

The unfortunate reality is that fraudsters and their social engineering tactics are becoming more sophisticated. And with the Olympics underway, individuals and businesses alike should prepare for the oncoming wave of social engineering attacks that threaten our sensitive information. Nevertheless, the best way to avoid these scams is knowing what they are and being critical of every email, pop-up ad, and embedded link that you encounter in the internet.

To find out how you can further protect your business from social engineering attacks, contact us today.