19169
blog,paged,paged-28,qode-social-login-1.1.3,qode-restaurant-1.1.1,stockholm-core-1.1,select-child-theme-ver-1.1,select-theme-ver-5.1.8,ajax_fade,page_not_loaded,wpb-js-composer js-comp-ver-6.0.5,vc_responsive
Title Image

Our Blogs

6 Ways To Strengthen Your BYOD Security

Many businesses are adopting bring your own device (BYOD) policies as more employees work from home. The problem is, if you’re not careful, BYOD can expose your company to major cybersecurity risks, including the following.

Loss or theft of devices – Employees often bring their personal devices wherever they go. This means there’s a higher chance of devices, as well as the data stored in them, being lost or stolen.

Man-in-the-middle (MITM) attacks – Cybercriminals can intercept information transmitted from employees’ devices if these are connected to poorly secured public Wi-Fi networks.

Jailbroken devices – Jailbreaking is the process of removing the restrictions imposed by the manufacturer of a device, typically to allow the installation of unauthorized third-party software. This increases the risk of an employee inadvertently installing malicious software on a personal device.

Security vulnerabilities – If employees have outdated operating systems and software on their devices, cybercriminals can exploit unpatched vulnerabilities to gain unfettered access to company systems

Malware – A personal device that has been infected with malware can spread that malware to other devices that are connected to the company network and cause data loss and downtime.

 

To mitigate these risks, you must devise a BYOD security policy that works for the needs of your business as well as the needs of your employees. Here’s what you need to do:

  1. Set passwords on all BYOD devices

Prevent unauthorized access to company data by enforcing the use of passwords on all employee devices and accounts. Passwords should be unique; contain letters, numbers, and symbols; and are at least 12 characters long. It’s also a good idea to implement multifactor authentication to add another method of identity verification such as fingerprint scans or temporary passcodes sent via email.

 

  1. Blacklist unsanctioned applications

Blacklisting involves prohibiting the installation of certain applications on BYOD devices that are used for work purposes. This includes applications like games, social networking apps, and third-party file sharing platforms. The simplest way to blacklist applications is through a mobile device management platform that enables IT administrators to secure and enforce policies on enrolled devices.

 

  1. Restrict data access

Adopt the principle of least privilege on both BYOD and company devices. This means that a user is able to access only the data and software required to do their job. This can reduce the effects of certain types of malware and limit the fallout in the event of a data breach.

 

  1. Invest in anti-malware software

Anti-malware software identifies and removes malware before they cause irreparable harm to a device. The best anti-malware programs are often backed by the latest threat intelligence databases and use behavior-based detection techniques to pick up any traces of malware.

 

  1. Backing up device data

A well-thought-out BYOD policy can go a long way toward minimizing the risk of a security breach, but if something manages to slip past your defenses, you need to have backups prepared. Back up your data in off-site servers and in the cloud to ensure that any data stored locally on a device can be quickly recovered.

 

  1. Educate your staff about security

The vast majority of BYOD-related security risks involve human error. This is why you should educate your employees about proper mobile safety. Train them on spotting apps that could contain malware, sharing security threat updates, and securing their devices beyond enabling default security settings.

 

You should also approach us if you need assistance with protecting your BYOD environment. As a managed IT services provider, Net Activity keeps tabs on the latest trends and innovations related to BYOD and will recommend solutions that work for your company. Contact us today to see how we can help.

6 Ways to Save Energy With Your PC

It may be difficult to save energy when you use your PC every day. In fact, a complete desktop computer setup (i.e., one that includes an internet modem, a pair of loudspeakers, and a printer) that is on for eight hours a day consumes 600 kWh per year. But don’t worry, you can use the following tips to reduce your PC power consumption.

1. Unplug your computer when not in use

When you’re not using your computer, it’s best to shut it down and unplug it. This is because a plugged-in PC — even when switched off — still consumes standby power.

2. Disconnect external devices

When they’re connected to your PC, devices such as printers, headphones, and webcams consume power even when they’re not in use. This is why you should disconnect or remove external devices from your PC once you’re done using them.

3. Alternatively, use a smart strip, especially for computers you cannot turn off

A smart strip is a series of several electrical outlets in one strip, with circuits to monitor and maximize your gadgets’ power consumption. It can electronically unplug any device so that they stop drawing current, which saves energy. By connecting your PC and peripherals (e.g., printers, scanners) to the smart strip, you won’t need to unplug your equipment when you’re not using them.

4. Adjust your computer’s energy settings

Adjusting your PC’s power settings will help you consume less energy. For example, you can opt to put your hard drive and monitor into sleep mode when they’re left idle for a few minutes. Lowering the brightness of your screen also saves electricity.

5. Use a charger only when your laptop is charging

When we charge our laptops, we tend to forget about them, leaving them plugged in for hours. Unfortunately, overcharging degrades the battery over time. Leaving the charger plugged in — even if it’s not connected to your computer — also consumes standby power.

To save energy, make sure to unplug your laptop charger once you’re done charging. Alternatively, you can use a wall outlet with a timer or plug your charger into a smart strip.

6. Choose an Energy Star-compliant PC

Energy Star is the US Environmental Protection Agency’s symbol for energy efficiency. Every product that earns the Energy Star symbol is guaranteed to deliver both quality performance and energy savings. The more stars a product has, the more energy-efficient it is. Studies show that a single Energy Star-compliant computer and monitor can save between $7 and $52 per year in electricity bills.

These tips should help you lower your electricity costs and make smart hardware choices. If you need assistance in choosing the best hardware for your specific needs, give us a call. We’ll be glad to help.

Increase Your Organization’s Productivity With Workplace Analytics

Microsoft Workplace Analytics is a powerful tool that gathers data from Office 365 applications such as Word, Excel, and Outlook, gleaning insights about your employees’ performance. This solution provides a better understanding of how every member of your team spends their time at work and helps improve both employee engagement and productivity.

How does Workplace Analytics work?

A paid add-on to Office 365 enterprise plans, Workplace Analytics extracts behavioral insights from data gathered from emails, calendars, documents, and Office 365 apps. This means any data an employee enters into Office 365 can be used to assess their performance and productivity.

The data from which insights are gleaned are generated by employees themselves — how much time they spend on meetings, who they communicate with, and how much time they spend on productive tasks.

All this data can be viewed on the Workplace Analytics dashboard, where information is sorted using the following metrics:

  • Week in the life provides information on how the entire organization spends time and how employees collaborate with one another.
  • Meetings overview shows the amount of time people spend in meetings.
  • Management and coaching presents information about one-on-one meetings between each employee and their direct manager.
  • The internal networks metric shows how people within your organization communicate and collaborate with one another.
  • External collaboration provides insights into how your employees connect with individuals or teams from third-party organizations.
  • Teams collaboration takes a look at how employees and managers use Microsoft Teams to communicate with their colleagues.

 

What does Workplace Analytics aim to do?

Workplace Analytics is designed to solve businesses’ most common problems, specifically issues related to productivity and engagement.

Using Workplace Analytics data, business leaders can develop effective productivity strategies for the entire company. For instance, if the data shows that employees spend 60% of their time in meetings, managers can come up with a strategy to make meetings shorter or less frequent so staff can focus on productive tasks. Similarly, human resources personnel can use data on employees’ work patterns to identify the causes of burnout — now a widespread issue across businesses and industries — and make recommendations to address it.

Workplace Analytics can be also used to determine how workers collaborate with internal and external parties. Suppose a member of your sales team frequently works and communicates with certain vendors. The sales team’s manager can pull up Workplace Analytics data and use it to assess whether or not this collaboration is helping the team meet targets, or if it’s causing them to miss out on other, more critical opportunities for collaboration and/or making a sale. Based on this information, the manager can also identify which employees are most likely to meet or exceed their targets and set company-wide standards accordingly.

Finally, Workplace Analytics allows managers to determine an employee’s level of engagement, and whether workloads are fairly distributed among workers and/or departments.

To ensure you get the full benefits of Workplace Analytics, partner with a reputable managed IT services provider like us. Net Activity’s experts are highly skilled and experienced in implementing and managing Microsoft programs and services, so you can rest easy knowing your business is in good hands. Reach out to us anytime.

How do sites with HTTPS make web browsing secure?

If you shop online like many people, you need to make sure that the site’s payment page has HTTPS in its URL. Otherwise, entering your personal and financial information on this page can expose you to risks such as identity theft. Read on to find out why HTTPS makes for a safer online browsing experience.

HTTPS encryption

The “S” in HTTPS stands for “secured.” It was introduced in 1995, so older websites that have been left on their own without regular maintenance usually don’t have it. But even to this day, unsecure websites exist, and fraudsters can easily take advantage of them.

When you visit a site with an HTTP connection, everything you type or click on that website is sent without encryption. This means that anyone who intercepts the data transferred between the website and your computer can view them as is. Cybercriminals know this, and they can exploit this fact to gain access to your Social Security number, credit card information, and other personal data. This puts you at risk of identity theft and other fraudulent activities.

HTTPS certificates

When you visit a website, your computer uses an online directory to translate its alphanumeric name into a numerical address. It then saves that information on your computer so that it doesn’t have to check the online directory every time you visit the same website.

In case your computer gets compromised, it could be manipulated into directing a perfectly safe web address like www.google.com to a malicious website. Most of the time, users are sent to sites that look exactly like the legitimate site but are actually fake copies designed to trick them into divulging their credentials.

To prevent such incidents from happening, the online directories mentioned earlier issue an ecosystem of certificates that turn HTTP into HTTPS, making it impossible for anyone to be redirected to a fraudulent website.

How does this affect our daily browsing habits?

We often visit a multitude of websites in a short period of time without checking each one for padlocks and certificates. Unfortunately, we can’t ignore the importance of HTTPS, so here are a few things to consider the next time you browse the internet:

  • If your browser marks a website as “unsafe,” think twice about clicking “Proceed anyway.” Click the prompt only if you are absolutely certain no confidential data will be transmitted.
  • Add web browser extensions such as HTTPS Everywhere that create encrypted connections to unencrypted websites. These extensions encrypt your communication with websites and are compatible with Chrome, Firefox, and Edge browsers.
  • Always be vigilant. Some sites may have HTTPS, but it doesn’t mean they’re safe. For example, goog1e.com (with the “l” replaced with a one) could have a certificate, but the misspelling clearly indicates that it’s an untrustworthy site. Cybercriminals use similar spellings of authentic websites to fool people into thinking that they’re on a secure site. This is called typosquatting or URL hijacking.
  • And perhaps, just follow the easiest step of all: avoid sites that don’t use the HTTPS prefix.

If you want to learn more about safer browsing habits and endpoint security, give our office a call.

Special Year End Pricing !!

Microsoft Teams Rooms Systems For Small/Medium Meeting Room