-1
archive,paged,author,author-netactivity,author-2,paged-6,author-paged-6,qode-social-login-1.1.3,qode-restaurant-1.1.1,stockholm-core-1.1,select-child-theme-ver-1.1,select-theme-ver-5.1.8,ajax_fade,page_not_loaded,wpb-js-composer js-comp-ver-6.0.5,vc_responsive
Title Image

Author: Netactivity

  • Sort Blog:
  • All
  • Cloud Computing
  • Disaster Recovery Management
  • IT Security Services
  • Managed IT Services
  • Office 365
  • Our Blogs
  • Press Releases
  • Uncategorized
  • VOIP Services

Managing Your Windows Arrangement

The modern worker (or really, the modern person) spends a lot of their time looking at a computer screen. Considering this, it only makes sense that their screens and the items displayed on them are arranged in a way that they like.  Our tip covers a few shortcuts to help you arrange and manage your windows arrangement so you can view the items on your workstation a little quicker.

Switching Between Monitors
Multi-monitor setups are becoming increasingly popular in many workspaces. While windows and applications can be dragged from one screen to another, there is an easy shortcut that allows you to quickly switch the application’s location back and forth. With the window you want transferred to your other display selected, press Windows Key + Shift + Left/Right (depending on which way the window needs to go).

This shortcut also allows you to quickly dock an active window to either side of its current monitor, with one easy change: Windows Key + Left/Right.

Screen Zoom In/Out
Sometimes, you want your entire screen to zoom in and zoom out to better show what you are looking at. There are a few ways to accomplish this. You can either zoom in and out by pressing CTRL + (+) and CTRL + (-) respectively, or simply CTRL + Scroll Wheel to zoom in and out freely. When you want to return to the default screen view, you can do so quickly by pressing CTRL + 0. This will reset the screen magnification.

Quick Settings
Have you ever found that one setting is driving you nuts, and you want, no, need to change it? A quick way to pull up Windows settings is to press Windows Key + I.

Switching Applications
There are times when a person can hit a real groove as they work, and their productivity really hits a high point. The next time you feel this is happening to you, you can try out a shortcut for switching active applications without even needing to take your hands off the keyboard. Holding Alt + Tab will bring up miniaturized versions of all of your open windows, from where the directional keys can be used to select the window you want to work in next.

Becoming a Windows power user is easier than it sounds, all it takes is practicing the use of these kinds of shortcuts until they’re second nature. Do you have a shortcut that you use all the time? Share it in the comments!

Microsoft Seeks To Replace Text Passwords With Biometrics

For almost as long as computers have existed, various companies have promised that passwords would eventually be a thing of the past.

Over the years, a variety of different technologies have been introduced that promised to kill the humble and ubiquitous password.  Everything from biometric sensors to facial recognition have been attempted.

To date, none of those technologies have delivered on their promise.

True, most of these new technologies have found niches in the market and have been embraced by a growing percentage of the population. However, invariably, these other technologies are used in tandem with text-based passwords rather than replacing them.  If Microsoft has anything to say about the matter, that may finally change.

The most recent Windows 10 update makes it easier than ever to log into devices and a variety of online services without having to worry about passwords at all.  The secret to the company’s success lies in the fact that Windows Hello has just received FIDO2 certification, which means that Hello PINs and biometric signatures are now seen as secure authenticators.

The official press release from the FIDO Alliance, reads, in part, as follows:

“FIDO2 is a set of standards that enables easy and secure logins to websites and applications via biometrics, mobile devices and/or FIDO Security Keys. FIDO2’s simpler login experiences are backed by strong cryptographic security that is far superior to passwords, protecting users from phishing, all forms of password theft and replay attacks.”

In an accompanying statement release by Microsoft, the company observed that “no one likes passwords (except hackers).”

While all of that is true, it remains to be seen whether this latest attempt to dethrone the text-based password will succeed or not.  Even if it does, if the past is any sort of guide at all, it’s only a matter of time before clever hackers find the chinks in the armor of this new paradigm.

Office 365 simplifies calendar sharing

Office 365 receives updates so often that they’re hard to track. But the software suite’s basic calendar functions will always be among the most popular. If you’d like to let people outside of your organization see your calendar, all it takes is a few clicks.

Share an Office 365 calendar with specific people

Click the Share button from the Home menu along the top of your Office 365 calendar. This will open an email window where you can enter the addresses of people you want to see your calendar.

From that window, you can limit how much of your calendar they see by choosing from Availability Only, Limited Details, or Full Details. The latter two will show recipients the meeting names and participants of events on your calendar, whereas Availability Only will simply display scheduled events as Busy. After you’ve sent the invitation, recipients receive an email with a link to view your calendar in a web browser.

Make an Office 365 calendar public

If you’d prefer to have a link that you can share in a variety of channels whenever you’d like, click the Publish Online button from the Home menu along the top of your Office 365 calendar. From the dropdown menu, first click Publish This Calendar, then Configure This Published Calendar. This will create a link that you can give to collaborators outside your organization. As long as you don’t change your calendar’s visibility, they’ll be able to open that URL and view your availability.

Share your calendar so others can manage it

Users who have administrative control over their Office 365 calendar can set up special sharing settings that allow someone else to send and respond to invitations. From the Account Settings window, click on the Delegate Access button. This window lets you add or remove delegators and configure how much control they have over your calendar.

Even something as simple as sharing your calendar outside your organization has the potential to increase office productivity and efficiency. If you have questions or concerns about managing various aspects of Office 365, get in touch with Net Activity today.

4 Ways you might find yourself using Alexa in the Office

Amazon’s Alexa can do more than just receive calls and messages, provide weather forecasts, play music, and control your smart devices at home. Her developers are setting her up to be a next-generation AI technology that has many features for home and office users. Here is how Alexa can become more relevant in an office setting.

1. Create and manage to-do and shopping lists

You have meetings to attend and deadlines to meet. Alexa has a straightforward To-do List feature that helps you stay on top of all your tasks. It’s ideal for busy professionals who prefer a no-frills checklist that allows them to simply view completed items, or to edit or delete items on the list.

You can also seamlessly sync third-party applications like Any.do and Todoist. Those apps offer more features for organizing tasks, adding subtasks and folders, creating reminders, setting due dates, attaching files, and prioritizing items.

To connect to a third-party app:

  • Go to alexa.amazon.com or access the Alexa app
  • Go to Settings > List, click Get Skill
  • Click Enable
  • Log in to authorize the app

Alexa also has a default Shopping List that works exactly like the To-do List. It lets you add or delete items that can be browsed in the Amazon store or searched for in Bing.

2. Reorder office supplies

Ordering supplies on an Amazon smart home device is especially convenient because you would already have an Amazon account. When voice shopping with Alexa, you can either add items to your Amazon cart (“Alexa, add toner to my cart”) or directly order a single item (“Alexa, reorder toner”) without having to lift a finger.

When you place an order, Alexa checks product availability, walks you through Amazon search results, and asks you to confirm or cancel the order. Voice shopping is enabled by default, but it can be disabled in Settings > Voice Purchasing in the Alexa app.

3. Sync your calendars

One of the best ways to maximize Alexa in the office is to sync it with your calendars. You can view scheduled appointments, set meetings, or have Alexa read the day’s entries with simple commands like “Alexa, what time is my next meeting?” or “Alexa, when is the company barbecue?”.

To add a calendar:

  • Go to alexa.amazon.com or access the Alexa app
  • Click Settings > Calendar
  • Select a calendar from the available platforms: Google (Gmail and G Suite), Apple (iCloud), or Microsoft (Office 365 or Outlook)
  • Log in to your account

4. Set a timer

A Pomodoro timer is a productivity enhancement tool that works by prescribing ideal work intervals and breaks. For example, you can set a timer that reminds you to take a 15-minute break for every hour worked, and setting this up in Alexa is easy.

To set a single timer:

  • Say “Alexa, set a work timer for 60 minutes.”
  • After the timer goes off, say “Alexa, set a break time for 15 minutes.”

To set several timers at once, say:

  • “Alexa, create a work timer for 60 minutes.”
  • “Alexa, create a break timer for 15 minutes.”

The commands we’ve included here work for simple instructions, but you can modify them and use tons of other Alexa commands to suit your purposes. If you need recommendations on how you can work smarter with AI and other productivity tools, get in touch with Net Activity today.

New Ransomware Looks Like An Anti-Virus Installation

Dharma is a highly successful ransomware strain.

It recently has been made even more successful by a change in the way the hackers controlling it are deploying it.

The first part of their latest campaign remains unchanged. They rely on well-crafted phishing emails to lure employees in.

The key difference, however, lies in the particulars of the newly crafted emails.

In a nutshell, the group has begun imploring email recipients to protect their systems by installing the latest antivirus software. The emails include a helpful link to the antivirus, which of course doesn’t point to antivirus software at all. Rather, it is the ransomware they’re trying to deploy inside corporate networks.

Worst of all, the emails claim to be from Microsoft, one of the biggest, most recognizable and most trusted names in the industry. So, there’s a good chance that at least one of your employees will take the bait. In a bid to be good, proactive employees, they will seek to install what they think is antivirus software.

Once they start the installation, the damage is done. It will lock every file on the victim’s system, demand ransom, and seek to spread itself to as many other systems inside your network as it can reach.

Raphael Centeno, a security researcher at Trend Micro had this to say about the new twist on the malware strain:

“As proven by the new samples of Dharma, many malicious actors are still trying to upgrade old threats and use new techniques. Ransomware remains a costly and versatile threat.”

As ever, the best way to guard against this type of threat starts with employee education. Employees should not be in the habit of installing their own antivirus software in the first place, so a gentle reminder to that effect should go a long way toward limiting the threat, but it still pays to be very much on your guard.

Is Windows Lite Microsoft’s Answer to Google’s Chrome OS?

Microsoft is working on a new operating system — Lite — with a different look that’s designed for the casual computer user while targeting Google’s Chrome OS  

Windows Lite is the oft-rumored, highly anticipated stripped-down operating system that Microsoft is reportedly working and could be unveiled sometime in the spring of 2019. What exactly is Windows Lite and why is Microsoft investing in it?

What Is Windows Lite?

Rumors began to surface in late 2018 that Microsoft was working on a new version of its Windows 10 operating system. While details have spotty at best, it appears that Windows Lite is intended to be Microsoft’s latest attempt to compete with Google’s Chrome OS, the driver of its popular Chromebook product line.

Windows Lite reportedly will be faster and leaner than other Windows operating systems. In fact, some reports indicate that the new operating system will be so different from other Windows products that Microsoft may remove the “Windows” name from it altogether.

How Will Windows Lite Work?

The new operating system reportedly will only run apps from the Universal Windows Platform (UWP) downloaded from the Microsoft store. It will also allow progressive web apps, which are applications that are run through an online service but operate like an offline app. Microsoft is exploring whether Lite will eventually be able to support Win32 apps as well.

Windows Lite will also be instantly on and always connected. It will be designed to work with multiple CPUs, providing flexible options for device manufacturers and consumers.

The focus is on building a product that emphasizes simple interactions and maintenance.

It’s expected that Windows Lite will not be available directly to consumers but rather to OEMs as a way to offer an alternative to the increasingly popular Chromebook. Instead, it will come pre-installed on laptops marketed to the home user and students.

The product is designed for users who only need “light” computing without the power, complexity and strength of traditional Windows operating systems. For users who need to write an essay, chat with friends or listen to music, Windows 10 is a bit of overkill.

Will It Look Like Windows?

The Lite OS will likely look very little like Windows. The interface is expected to be cleaner and more modern. The Start button is in the middle of the screen, for example. The search box is reminiscent of Chrome OS, with suggested and pinned applications listed prominently.

That said, there are some familiar components. File Explorer is still there and foundational components like Settings are present at this time.

The divergence from Windows is why some believe that Microsoft will remove the Windows branding entirely from the new product. Why would Microsoft intentionally move away from the established, decades-long Windows brand?

For one, ‘Windows’ carries with it certain expectations about functionality and capabilities. Microsoft may well want to begin reshaping how people think about what an operating system is, what it looks like and its user interface. It could be the beginning of a new direction for the company.

It could also be a way to circumvent the notion that Windows is too complex, complicated or fully featured, attracting those who have sworn off Windows operating systems in the past.

When Will Windows Lite Be Available?

There has been no official announcement or scheduled release date published. Given that hints about the new operating system are beginning to appear in Windows Insider builds, it’s likely that Microsoft is quite far along in its development. One possible target for an unveiling would be at the Microsoft Build 2019 conference in May 2019. Wider testing could begin this summer.

Chrome Will Offer More Ways To Control Web Tracking

Google announced a pair of important security features of upcoming versions of its Chrome browser at this year’s I/O Developer Conference.

Both changes are designed with the same goal in mind:

To give users some additional tools to block or at least mitigate the threat of online tracking.

The first of the two new features is called Improved SameSite Cookies, and as the name suggests, it’s an attempt to improve cookie handling.  As you probably know, cookies are created when a user visits a particular website.  Cookies are the mechanism by which that site remembers information about a user’s visit. It stores information such as preferred language, items you may have in your shopping cart (if the site has an eCommerce element), your login information, and the like.

Unfortunately, cookies are often used to identify users and track their movement and activities. That is not only by the owners of the site, but also by any third-party the site shares data with.  As an example, cookies are the reason that re-targeting ad strategies work. Worse, there’s currently no good way to categorize and identify how websites are using cookies.  To every browser in use today, they’re all considered to be the same thing. That is why when you go into your browser settings page and clear your cookies, it automatically logs you out of all websites where you’ve saved your login credentials.

Google’s new feature would change that, allowing you to selectively delete cookies based on what they’re doing. That means you’d be able to preserve your saved logins while blocking or deleting cookies used for other purposes. In a similar vein, the company’s planned Fingerprinting Protection feature seeks to make it harder to fingerprint people that are using the Chrome browser. That is a tactic commonly used to track user activity without their knowledge and consent.

It remains to be seen how robust these new features will be, but if they live up to expectations, they’ll be two powerful new additions to Google’s growing suite of user controls.  That’s a very good thing.

How to Protect Yourself from Cryptojacking

Hackers use cryptojacking to mine cryptocurrencies, and this process can cause PCs to run below optimal speeds.  If you have a relatively new computer but are experiencing performance problems after clicking a link or visiting a website, you might be a victim of cryptojacking. Here’s what to do.

Hijacked hardware

Instead of paying for computing power themselves, hackers opt to secretly use thousands of compromised computers to generate cryptocurrency. They gain control of a victim’s PC by using phishing emails to lure them into clicking on a link, which then runs malicious cryptomining programs on the computer. Any cryptocurrency produced then gets delivered to the hackers’ private server.

But wait, there’s a more insidious tactic hackers use: infecting websites with ads and plugins that run cryptojacking code. By doing so, any visitor who loads the web page instantly gets infected with the malware, which sends their computer’s processor into overdrive as it tries to generate cryptocurrency.

If there’s a silver lining here, it’s that cryptojacking software won’t compromise your data unlike most malware do. However, it will hijack your hardware’s processing power, so you’ll experience decreased PC performance while your electricity bills increase.

Surge in cryptojacking

The biggest reason why cryptojacking is becoming so popular is that it’s a low-risk, high-reward scheme. Instead of extorting money directly from the victim, hackers can secretly generate digital currencies without the victim knowing. And even if it’s detected, it’s almost impossible to track down who initiated the attack. Moreover, since nothing was actually “stolen” (other than a portion of computing power), victims have little incentive to apprehend the culprit.

Cryptojacking is also a cheap investment. For as little as $30, anyone can purchase a cryptojacking kit from the dark web to force other computers to generate Bitcoin or Monero for them. And while it’s difficult to tell how much exactly are hackers earning by cryptojacking, we can only surmise that it’s more than the initial $30.

Because of these reasons, there’s a good chance that this type of attack will be as popular as ransomware was in 2017. According to several reports, even sites like The Pirate Bay, Openload, and OnlineVideoConverter are allegedly using cryptojacking exploits to diversify their revenue streams.

Prevention and response

Prevention is always better than cure, so include cryptojacking in your monthly security training sessions. If employees practice extra caution in dealing with unsolicited emails and suspicious links, then hackers will have no way into your systems. Using ad-blocker or anti-cryptomining extensions on web browsers is also a great way to stay protected.

Beyond prevention, network monitoring solutions should also be used to detect any unusual computer behavior. For example, if you notice a significant number of PCs running slower than usual, assume that cryptojacking is taking place. And once it’s confirmed, advise your staff to close browser tabs and update browser extensions as soon as possible.

Because cryptojacking doesn’t steal data, it may seem less threatening than some malware, but in reality, its effects are just as severe — it can incur real power, cooling, and performance costs to your business when several systems are compromised. To make sure your business stays in top form (and that you don’t end up enriching any hackers), contact us today. Our hardware solutions and cybersecurity tips will keep your business safe and sound.

Scammers Now Use Google Ads To Steal Information

There’s a new scam afoot that involves using Google Ads.

We’re frankly surprised that it’s working, but apparently, it’s drawing some unsuspecting customers in. It appears to be an organized campaign.

The unknown scam artists are creating ads with phrases like:

  • “Amazon.com – Best place to get dream products. Best deals – Best support – Best price.”
  • “Paypal.com – Discover how easy and safe it is to pay for goods and shop. Free Return Shipping.  180-day Refund Windows.  No funds needed.”
  • “Ebay.com – Find the best selling Cell Phone Cases, Covers and Skins. Get the best deals for cell phones and smartphones.  Dream Garage Spring Event…”

These ads contain phone numbers with an invitation given to ad viewers to call them.  Of course, the numbers displayed in the ads aren’t the real support numbers for those companies. If a user should call one, he’ll be greeted by someone claiming to work for the support department of the company displayed in the ad.

Early on in the conversation, the scammer will announce some type of problem with the user’s account, and inform them that they can fix the issue, but to do so, they’ll need a code found on the back of a Google Play Store gift card.

Why this doesn’t raise an immediate red flag to users is a mystery. Apparently some users are handing over the information if they have a gift card, which the scammers promptly make use of. For Google’s part, they are working to remove the ads but it’s a bit like playing Whack-A-Mole.  For every one they identify and take down, a new one seems to appear.

In any case, the company did issue an official statement which reads as follows:

“We have strict policies that govern the kinds of ads we allow on our platform, and ads that conceal or misstate information about their business are prohibited on our platform.  When we find ads that violate our policies, we remove them.”

Boost your Online Security with Browser Extensions

Protecting yourself, your employees, and your business when you’re using the internet is necessary if you want to remain safe, productive, and profitable. Given the proliferation of phishing attacks, hacks, and online fraud, we all need to ramp up our online security measures. Here are some ways to bolster security using browser extensions.

Prevent browser tracking

If you don’t like the idea of a third party being able to track your browsing habits, try installing a tool that offers private browsing. These programs offer protection against tracking by blocking third-party cookies as well as malware. Some extensions also boast secure Wi-Fi and bandwidth optimization and can guard against tracking and data collection from social networking sites such as Twitter or Facebook. Some examples include Disconnect, uBlock Origin, and Ghostery.

Blocking ads

While online ads may seem harmless, the truth is that they can contain processes that might send your data back to a third party. A decent ad blocking program, like AdBlock Plus and uBlock Origin, will block banner, rollover, and pop-up ads, and also prevent you from inadvertently visiting a malicious site. Many blockers contain additional features such as the ability to disable cookies and scripts used by third parties on websites, the option to block specific items, and even “clean up” Facebook, and hide YouTube comments. The major blockers work with Google Chrome, Safari, and Firefox, and you’ll be able to find everything from user-friendly solutions to more advanced tools that are customizable down to the tiniest degree.

Consider installing a VPN

A VPN (virtual private network) browser extension is a simple way to connect your web browser to a VPN server. VPNs encrypt your internet traffic, effectively shutting out anyone who may be trying to see what you’re doing, and then routes it through the server to hide your location and IP address. Commonly used in countries such as China where the internet is heavily censored by the government, a VPN enables users to access blocked sites — in China’s case, that’s anything from blogs criticizing the government to Facebook and Instagram. There are a huge number of VPN browser extensions in the market, like NordVPN and ExpressVPN, so do a little research and find one that suits you best.

If you’d like to know more about staying safe on the internet or would like to schedule a security assessment for your company, get in touch with us today.

 

Special Year End Pricing !!

Microsoft Teams Rooms Systems For Small/Medium Meeting Room