19169
blog,paged,paged-32,qode-social-login-1.1.3,qode-restaurant-1.1.1,stockholm-core-1.1,select-child-theme-ver-1.1,select-theme-ver-5.1.8,ajax_fade,page_not_loaded,wpb-js-composer js-comp-ver-6.0.5,vc_responsive
Title Image

Our Blogs

Windows 10 To Get Several New Features

Recently, Microsoft announced that later this year, Windows 10 will get a significant update to be called Windows 10 Version 21H2, which will feature a significant number of updates and enhancements. Among other things, these updates will include a couple of aesthetic enhancements such as a redesigned Start Menu, with a new option added to the “Power” sub menu allowing you to restart apps after signing in when you reboot your device.

Another aesthetic tweak is the addition of a new system font. It isn’t much of a departure from the current font (within the same family), but does solve for legibility issues, no matter how large or small the font is.

In addition to that, Microsoft will enable support for HDR mode in apps that use ICC (International Color Consortium) profiles. This includes programs like CorelDraw, Adobe’s Lightroom Classic, and Adobe Photoshop. In a nutshell, the new feature will enable programs that support it to generate accurate colors and access the full range of your HDR display.

One of the more exciting additions added to the mix is a news feed for the taskbar, which will work a lot like “Google Discover” works on Android devices. Bearing the title “News and Interests,” it will display abbreviated news stories, sports scores, or summaries of articles you may be interested in, based on your interests and physical location.

The news feed will be pinned to the taskbar and users can hover over the weather icon to access it. Additionally, you’ll be able to customize your feed by clicking on the “Manage Interests” button which will launch a customization page in the new Chromium-based Edge browser.

On top of all this, you’ll also find enhancements to your display settings, camera settings and even a new touch-friendly interface for File Explorer. While none of these changes are game changers, taken together, they represent a significant step forward in terms of overall user experience. Kudos to Microsoft. The upcoming enhancements look fantastic and we can hardly wait to start playing with them.

Breaking Bad Habits – 4 Ways Your Employees Are Putting Your Business At Risk Of Cyber-Attack

Several years ago, TechRepublic ran a story with the following headline: “Employees Are Almost As Dangerous To Business As Hackers And Cybercriminals.” From the perspective of the business, you might think that’s simply inaccurate. Your company strives to hire the best people it can find – people who are good at their jobs and would never dream of putting their own employer at risk.

Your employees are instrumental when it comes to protecting your business from cyber threats. But they can also become targets for hackers and cybercriminals, and they might not know it. Here are four ways your employees might be endangering your business and themselves — and what you can do about it.

  1. They’re Not Practicing Safe And Secure Web Browsing. One of the most basic rules of the Internet is to not click on anything that looks suspicious. These days, however, it can be harder to tell what’s safe and what isn’t.

A good rule of thumb is to avoid websites that do not have “https” in front of their web address. The “s” tells you it’s secure – https stands for Hypertext Transfer Protocol Secure. If all you see is “http” – no “s” – then you should not trust putting your data on that website, as you don’t know where your data might end up.

Another way to practice safe web browsing is to avoid clicking on ads or by using an ad blocker, such as uBlock Origin (a popular ad blocker for Google Chrome and Mozilla Firefox). Hackers can use ad networks to install malware on a user’s computer and network.

  1. They’re Not Using Strong Passwords. This is one of the worst IT security habits out there. It’s too easy for employees to use simple passwords or to reuse the same password over and over again or to use one password for everything. Or, worse yet, all of the above.

Cybercriminals love it when people get lazy with their passwords. If you use the same password over and over, and that password is stolen in a data breach (unbeknownst to you), it becomes super easy for cybercriminals to access virtually any app or account tied to that password. No hacking needed!

To avoid this, your employees must use strong passwords, change passwords every 60 to 90 days, and not reuse old passwords. It might sound tedious, especially if they rely on multiple passwords, but when it comes to the IT security of your business, it’s worth it. One more thing: the “tedious” argument really doesn’t hold much water either, thanks to password managers like 1Password and LastPass that make it easy to create new passwords and manage them across all apps and accounts.

  1. They’re Not Using Secure Connections. This is especially relevant for remote workers, but it’s something every employee should be aware of. You can find WiFi virtually everywhere, and it makes connecting to the Internet very easy. A little too easy. When you can connect to an unverified network at the click of a button, it should raise eyebrows.

And unless your employee is using company-issued hardware, you have no idea what their endpoint security situation is. It’s one risk after another, and it’s all unnecessary. The best policy is to prohibit employees from connecting to unsecured networks (like public WiFi) with company property.

Instead, they should stick to secure networks that then connect via VPN. This is on top of the endpoint security that should be installed on every device that connects to your company’s network: malware protection, antivirus, anti-spyware, anti-ransomware, firewalls, you name it! You want to put up as many gates between your business interests and the outside digital world as you can.

  1. They’re Not Aware Of Current Threats. How educated is your team about today’s cybersecurity threats? If you don’t know, or you know the answer isn’t a good one, it’s time for a change. One of the biggest threats to your business is a workforce that doesn’t know what a phishing e-mail looks like or doesn’t know who to call when something goes wrong on the IT side of things.

If an employee opens an e-mail they shouldn’t or clicks a “bad” link, it can compromise your entire business. You could end up the victim of a data breach. Or a hacker might decide to hold your data hostage until you pay up. This happens every day to businesses around the world – and hackers are relentless. They will use your own employees against you if given the chance.

Your best move is to get your team trained up and educated about current threats facing your business. Working with a managed service provider or partnering with an IT services firm is an excellent way to accomplish this and to avoid everything we’ve talked about in this article. Education is a powerful tool and, when used right, it can protect your business and your employees.

Are You Following These Password Best Practices?

Passwords are probably the most important part of keeping accounts secure. That’s why it is so important to follow industry best practices when creating them. Today, we’ll take a look at the standards outlined by the National Institute of Standards and Technology (NIST) in creating the best and most secure passwords.

What Is NIST?

For years, NIST has been the predominant organization in the establishment of password creation standards. They continuously change their advised practices to meet with the current cybersecurity demands. They recently updated their guidelines so we thought we would go over what strategies they suggest, to give you an idea of what makes a secure password. 

New Guidelines

Many corporations are currently using the NIST guidelines and all Federal agencies are expected to utilize them. Let’s go through their newest password guidelines step by step. 

#1 – Longer Passwords are Better than More Complicated Ones

For years, it was preached that the more complicated the password, the more secure the account. Today’s guidelines refute that notion. NIST suggests that the longer the password, the harder it is to decrypt. What’s more, they suggest that organizations that require new passwords meet certain criteria of complexity (letters, symbols, changes of case) actually make passwords less secure. 

The reasoning behind this is two-fold. First, most users, in an attempt to complicate their passwords will either make them too complicated (and forget them) or they will take the cursory step of adding a one or an exclamation point to the end of a password, which doesn’t complicate the password as much, if at all. Secondly, the more complex a user makes a password, the more apt they are to use the same password for multiple accounts, which of course, is not a great idea.

#2 – Get Rid of the Resets

Many organizations like to have their staff reset their password every month or few months. This strategy is designed to give them the peace of mind that if a password were compromised that the replacement password would lock unauthorized users out after a defined set of time. What NIST suggests is that it actually works against your authentication security. 

The reason for this is that if people have to set passwords up every few weeks or months, they will take less time and care on creating a password that will work to keep unwanted people out of the business’ network. Moreover, when people do change their passwords, they typically keep a pattern to help them remember them. If a previous password has been compromised, there is a pretty good chance that the next password will be similar, giving the attacker a solid chance of guessing it quickly. 

#3 – Don’t Hurt Security by Eliminating Ease of Use

One fallacy many network administrators have is that if they remove ease of use options like showing a password while a user types it or allowing for copy and pasting in the password box that it is more likely that the password will be compromised. In fact, the opposite is true. Giving people options that make it easier for them to properly authenticate works to keep unauthorized users out of an account. 

#4 – Stop Using Password Hints

One popular way systems were set up was to allow them to answer questions to get into an account. This very system is a reason why many organizations have been infiltrated. People share more today than ever before and if all a hacker needs to do is know a little personal information about a person to gain access to an account, they can come across that information online; often for free.

#5 – Limit Password Attempts

If you lock users out after numerous attempts of entering the wrong credentials, you are doing yourself a service. Most times people will remember a password, and if they don’t they typically have it stored somewhere. Locking users out of an account, at least for a short period of time is a good deterrent from hackers that use substitution codes to try and guess a user’s credentials. 

#6 – Use Multi-factor Authentication

At Net Activity, we urge our clients to use multi-factor or two-factor authentication on every account that allows them to. According to NIST they want users to be able to demonstrate at least two of three authentication measures before a successful login. They are:

“Something you know” (like a password)

“Something you have” (like a mobile device)

“Something you are” (like a face or a fingerprint)

It stands to reason that if you can provide two out of three of those criteria, that you belong accessing the system or data that is password protected. 

Security has to be a priority for your business, and password creation has to be right up there with the skills everyone should have. If you would like to talk to one of our IT experts about password management and how we can help your business improve its authentication security, give us a call today at 216-503-5150.

Productivity Apps: What Features Do You Really Need?

Businesses need to maximize productivity any way they can. Some look to software to make this happen. When searching for productivity software, it may seem like you are looking at the same thing over and over again. While we admit that many productivity programs are similar, it’s important that you acquire the software that will give your team the tools it needs to succeed. Let’s take a look at how you can find the right productivity apps for your business needs.

Productivity in Software

Productivity software isn’t a flashy item. Every business needs certain apps to do business and most businesses need the same apps. There are a lot of options to choose from, and many of the options might seem pretty similar. What’s important is that you get the tools your business needs. 

Productivity software, which is generally made up of a word processor, a spreadsheet program, a presentation software, note-taking software, and other useful task management tools, isn’t much different from one to another. What is different—and makes a difference—is how the apps are deployed and how they are managed by the developer. It’s fair to say that you get what you pay for, and some productivity apps are just stronger than others. 

What Should You Look For?

When trying to sort out which productivity apps to use, you obviously will want to consult your budget and your needs. As we mentioned above, most word processors are going to do the job you’d expect out of a word processor, but with more innovative solutions, you will get more options that will help your overall productivity. That’s extremely important. Let’s take a look at some variables you should consider:

Reliability 

If your software isn’t reliable, it isn’t worth it, period. Reliability can be measured in several ways. Is it still being developed consistently so you know it isn’t a security risk? Does it have the options you need? Is it easy to use and won’t take a long time to get the hang of? Some apps will promise you benefits that you will never see, but what you can bank on is if the applications cause you a steady stream of problems, you’ve probably made a bad choice. 

Interoperability

If a lot of your team is working remotely on their own computers, you may find that not everyone is going to have the same OS, the same chipset, etc. You will need any productivity app that you choose to work on several different systems. This includes mobile devices. You may think you’re getting a great deal, but if a handful of your workers are working on macOS and the software isn’t compatible with it, you’re going to be kicking yourself. 

Accessibility

As many people continue to work remotely, or in some type of hybrid work system, having apps that work from anywhere is extremely important. Today, a lot of options are available as Software as a Service (SaaS) offerings to help businesses avoid the expense of setting up their own cloud server or remote access tools. Either way, you need to be able to get your remote workers the tools they need to be productive.

Collaboration Features

Speaking of productivity, a lot of businesses are asking their people to do more. We are in unprecedented times and business decisions have to be made down to the dollar. Collaborative features that are built-in can make a world of difference in your productivity software. Workers can work in the same file, share files, and consistently stay up to date on workflows. A lot of the productivity suites available will also come with some form of project management software. This is a good way to oversee your team’s progress on a project and work right alongside them in real-time. 

If you are looking for the latest software to boost productivity for your business, our technicians can help. Give us a call at 216-503-5150 for more information today.

Special Year End Pricing !!

Microsoft Teams Rooms Systems For Small/Medium Meeting Room