Blog

September 11th, 2014

MobileGeneral_Sep08_BOur mobile devices are quickly becoming so highly integrated into our lives that it can be difficult to imagine life without them. But, there will come a time when you decide to upgrade to a new device. When this does happen, you may consider selling your old device. If you do decide to do this, one thing you should ensure you have done is to deauthenticate your apps.

What exactly is deauthentication?

Some apps, although not all, require that you authenticate your device in order for them to work. Many developers who ask users to authenticate their device do so in order to either prevent copies of the software from being created and utilized, or to ensure that the device and app can communicate securely.

Some examples of apps that ask for authentication include those that use multi-factor authentication, password managers, and apps that require a subscription or credit card information, etc. On some devices you even need to enter a code or key, much like installing software on a new computer, in order to activate all the features of the app.

The main reason many developers require authentication is connected to security. As security is becoming an ever more pressing issue, there is a good chance that we will see more apps asking users to authenticate their devices in the future.

The issue with this is that when you go to sell your device you will likely need to purchase the app again or the buyer of the device won't be able to set up their own account.

Common apps you should deauthenticate

Apps with subscription services: This includes apps like Google Play Music, Spotify, Office for iPad, cloud storage apps that you have linked your device to, etc. These apps are usually either linked with your device or your phone number so it is a good idea to deauthenticate them.
  1. Kindle app: The Kindle app is actually linked to your device and users who want to use the app will likely not be able to if the device is linked to your account. You can unlink devices by going to the Amazon site, logging in and selecting Manage your Content and Devices when you hover over your account name.
  2. Password management apps: These apps usually require that you authenticate your device to use a particular service. If you try to log in on a new device, these apps may not work properly.
  3. Chat apps: Some chat apps like WhatsApp or Line require that you register for the service using your phone number. If you are keeping your number, you shouldn't have to deauthenticate, but if you are getting a new number, you should go into the account settings of each app and unlink your number. WhatsApp for example has a feature that allows you to move your number to a new device.
  4. Any app or service that you have linked credit card information to: While you ordinarily don't have to physically deauthenticate these apps, as the information is usually linked to an account and password, it is a good idea to unlink your credit card with any app on your phone before you hand it over. This will help ensure that credit card information is not stored or accessible.
When it comes to the major app stores, e.g., Windows Phone Store, Google Play, and iTunes, you will often see that your device has been linked to your account. If you are going to sell your device, the best course of action is to reset using the factory reset option. This will delete all data and installed apps on the device. This will often be enough to deauthenticate all apps.

If you are looking to learn more about getting rid of your older devices, contact us today.

Published with permission from TechAdvisory.org. Source.

September 10th, 2014

iPad_Seo08_BMicrosoft has been making a steady push into mobile markets, especially when it comes to apps. One of their biggest, and most helpful, releases has been mobile optimized versions of their popular Office programs. While Office for iPad is useful for many business users, you do need a subscription to access all the features. Microsoft has recently announced that they have updated the iPad apps and added in-app subscriptions.

Looking at the recent subscription update

When the iPad versions of the Office apps were released, users could download the apps for free but needed an Office 365 subscription in order to use the full features of the apps. Those who didn't have a subscription were limited to only being able to read and print Office documents, and present using PowerPoint.

Those who wanted to use all the features of the app needed to sign up for an Office 365 account. In order to do this, they had to physically go to the Office 365 site and sign up. They couldn't sign up via the app. While this process isn't overly taxing, it did cause some frustration for some users.

To remedy this, Microsoft has recently announced that users will now be able to sign up for an Office 365 subscription directly from the app. According to an article posted on the Microsoft Office blog, "Starting today [September 2, 2014], you can buy a monthly subscription to Office 365 from within Microsoft Word, Excel, and PowerPoint for iPad."

The subscriptions you can purchase

While Microsoft has noted that you can purchase an Office 365 subscription in-app, you should be aware that the subscriptions are monthly and for the Home or Personal versions of Office 365.

A monthly Office 365 Home subscription costs USD$9.99 a month and can be used on one iPad and up to five PCs or Macs, while an Office 365 Personal plan costs USD$6.99 a month and can be installed on on iPad and one PC or Mac.

What about business users?

For the time being, users can only subscribe to individual Office 365 accounts via the app. If your business has an Office 365 for Business subscription e.g., Office 365 Small Business Premium, etc, you should be able to access the full-version of the iPad app without having to sign up for a Personal or Home subscription, just log in using the same username and password you use to sign into Office 365.

If you don't have an Office 365 subscription, then it may be a good idea to get in touch with us to learn more about Office 365 business plans and how they can be successfully implemented into your business.

Published with permission from TechAdvisory.org. Source.

Topic iPad
September 10th, 2014

Office_Sep08_BExcel is heavily dependant on formulas, and it seems like there is literally a formula for everything. For example, have you ever been working in Excel and needed to combine the contents of two different cells into a new one without adding them together? While you can copy and paste the content of the different cells you can also use the concatenate formula.

Using the concatenate formula to combine cells

If, for example, you have a spreadsheet with first names in column A, last names in column B, and want to combine them into column C to display the full name you can do so by:
  1. Clicking on cell C2 (or the row where the information you want to combine is)
  2. Typing =concatenate(
  3. Clicking on cell A2 and then adding a comma (,)
  4. Clicking on cell B2 and closing the formula with a closing bracket
  5. Hitting Enter
You should see the two cells are now combined in cell C2, with the formula for cell C2 reading:

=CONCATENATE(A2,B2).

The problem is, there will be no space inbetween the letters or numbers, so you will need to edit the formula to read:

=CONCATENATE(A2," ",B2)

The double quotations with a space in between them tells Excel to add a space to the cell in between the contents of A2 and B2.

If you have more than two columns you would like to combine, then simply add a comma after each cell. If for example you have three columns (A1, B1, and C1) you would enter the formula:

=CONCATENATE(A1 " ",B1 " ",C1) in column D1.

Combining two cells without concatenate

While concatenate works well, there is actually a shortcut that you can use which involves the ampersand '&':
  1. Click on cell C2 (or the row where the information you want to combine is)
  2. Type =
  3. Click on cell A2 and then type & in the formula.
  4. Click on B2 and hit Enter
You should see the contents of A2 and B2 combined together in C2. If you click on cell C2 and look at the formula, it should read: =A2&B2.

The only problem is, there won't be a space between the content. To add a space, you can edit the formula so that it reads:

=A2&" "&B2

Note the space between the two quotation marks. This tells Excel to add a space between the contents of A2 and B2.

Once you have the base formula on one cell, you can press the small box at the bottom of the cell and drag it down the row so that the other information can be quickly compiled. This makes it much easier than having to copy and paste the content individually. And, If you would like to learn more Excel tips, contact us today. We can save you valuable time and resources.

Published with permission from TechAdvisory.org. Source.

September 9th, 2014

Office365_Sep08_BMicrosoft's Office 365 is one of the most popular cloud-based solutions for businesses and has seen continued growth since its release over three years ago. As with most new Microsoft solutions, there are near constant updates introduced that aim to improve the platform. One of the latest changes announced is the ability to customize the theme of Office 365.

Coming soon to Office 365 (if not already): Themes

In early September, Microsoft announced that in the following weeks the company would be rolling out a couple of new options that will allow businesses to personalize the look of Office 365. In fact, there are not one, but two new personalization options available for Office 365 users with business subscriptions.

Option 1: Company-wide custom themes

The idea of establishing company brand is not a new concept to business owners, who realize that one of the factors to success is creating positive brand recognition amongst stakeholders, including employees. One of the best ways to achieve this is to include identifiable visuals and colors repeated in as many places as possible. Almost every company has colors that they use as part of their corporate image and brand identity.

To help cement your brand with your employees, you can now customize the theme of Office 365 so that the theme is applied to all users in your organization. When it comes to customizing your theme Microsoft has noted that you will be able to:

  • Pick the color scheme, which includes a base color and text/icon colors. Set the base as blue for example, and the menu bar across the top will be that color. Set the text as yellow and all icons/text in the menu bar will also be yellow.
  • Set the color of the Office 365 logo. You can pick up to three colors for the Office 365 logo.
  • Upload a custom logo. You can upload your company logo and have it applied to the top-left of all Office 365 menu bars.
  • Make the logo a clickable link. Once you set a logo, you can also make it clickable by adding a custom URL. When a user clicks the logo, they will be taken to the predefined URL.
If you would like to apply your company's brand to Office 365, and have it automatically applied to all users in the company, you will need to be the admin, or to log in as an administrator. Once you are logged on, click on Admin from the main Office 365 screen. Then, click on your company's hyperlink located at the top-right of the Admin screen (right below the menu bar) and select Custom theming.

In the screen that opens, you will be able to set your desired theme, and when you are finished simply hit Save and the theme should be applied.

Option 2: Personalized themes

While company users can set a theme related to their brand, individual users in the organization can also select their own theme from a list of 22 provided by Microsoft. Each theme changes:
  1. The top navigation bar color scheme
  2. Menu colors
  3. Background
  4. Office 365 logo colors
You can change the theme of Office 365 by logging into your account, pressing the Settings cog at the top-right of the screen and clicking Change theme. Once you have selected a theme you like, press Save and it should be applied immediately.

If you are looking to learn more about Office 365 and how you can get the most out of it, contact us today for a chat.

Published with permission from TechAdvisory.org. Source.

September 5th, 2014

HealthcareIT_Sep03_A

As of June 30, 2014, more than 1,000 data breaches affecting more than 500 patients each have been reported to the Department of Health & Human Services - for a total of roughly 32,000,000 people who have had their privacy compromised. And, according to the annual Redspin Breach Report, published in February of 2014, 7.1 million patient records were breached in 2013, a 137.7% increase over 2012.

And, the threat is getting broader. Once caused primarily by snooping or negligent employees, data breaches are now increasingly caused by cybercriminals who realize the potential financial value of medical records. Case in point: The Chinese hacker attack on the 206-hospital Community Health Systems which resulted in the breach of 4.5 million patient records, the second-largest HIPAA breach ever reported.

No physician practice should consider itself immune. While large hospital systems may be most attractive to hackers, Eric Perakslis, executive director of Harvard Medical School's Center for Biomedical Informatics, recently wrote in a New England Journal of Medicine article that 72 percent of cyberattacks have been aimed at hospitals, group practices and other provider organizations.

Perakslis recommends an "active learning approach” that involves real-time surveillance of emerging threats - and that includes an intimate knowledge of one's own network and vigilance at one's own practice. One of the most effective ways you can do this is to work with a company like ours who can help not only ensure security of your systems but also help teach you and your staff about common security issues.

Published with permission from TechAdvisory.org. Source.

September 4th, 2014

Security_Sep02_BEveryone today seems to be constantly relying on their smartphones to help complete daily tasks which has resulted in the need to recharge subsequently increasing. And when you’re far from your charger, public charging kiosks can seem like a good substitute. However, this can lead to juice jacking of your smartphone. If this is news to you then let’s find out what juice jacking is and how you can avoid it.

What’s juice jacking?

Regardless of the kind of smartphone you have, whether it’s an Android, iPhone or BlackBerry, there is one common feature across all phones: the power supply and the data stream pass over the same cable. This setup allows for juice jacking during the charging process whereby user access is gained on your phone by leveraging the USB data/power cable to illegitimately access your phone’s data and/or inject malicious code onto the device.

The attack can be as simple as an invasion of privacy, wherein your phone pairs with a computer concealed within the charging kiosk and information such as private photos and contact information are transferred to a malicious device. However, on the other hand, it can also be as invasive as an injection of malicious code directly into your phone. According to security researchers at this year’s Black Hat security conference, your iPhone can be compromised within one minute of being plugged into a harmful charger.

Exposure to a malicious kiosk can also create a lingering security problem even without the immediate injection of malicious code. Once a device is paired to a computer, it can access a host of personal information on the device, including your address book, notes, photos, music, sms database, typing cache, and even initiate a full backup of your phone, all of which can be accessed wirelessly at anytime.

How do I avoid it?

The most effective precautions center around simply not charging your phone using a third-party system. Here are some tips to help you avoid using public kiosk charger:
  • Keep your devices topped off: Make it a habit to charge your phone at your home and office when you’re not actively using it or are just sitting at your desk working.
  • Carry a personal charger: Chargers have become very small and portable, from USB cables to power banks. Get one and throw it in your bag so you can charge your phone anytime you’re at the office or while on-the-go if you use a power bank.
  • Carry a backup battery: If you’re not keen on bringing a spare charger or power bank, you can opt to carry a full spare battery if your device has a removable battery.
  • Lock your phone: When your phone is truly locked as in inaccessible without the input of a pin or equivalent passcode, your phone should not be able to be paired with the device it’s connected to.
  • Power the phone down: This technique only works on phones on a model-by-model basis as some phones will, despite being powered down, still power on the entire USB circuit and allow access to the flash storage in the device.
  • Use power only USB cables: These cables are missing the two wires necessary for data transmission and have only the two wires for power transmission remaining. They will charge your device, but data transfer is made impossible.
Even the tiniest detail like charging your phone from a kiosk charger could affect the security of your device. While there are many substitutes to using a third-party system, ultimately the best defense against a compromised mobile device is awareness. Looking to learn more about today’s security and threats? Contact us today and see how we can help.
Published with permission from TechAdvisory.org. Source.

Topic Security
September 4th, 2014

Hardware_Sep02_BMost people use computer monitors daily at work and at home. And while these come in a variety of shapes, designs, and colors, they can also be broadly categorized into three types. If you are not sure what these are and would like an introduction to the different types of computer monitors then here we explain the three main types, as well as the pros and cons of each.

CRT (cathode ray tube) monitors

These monitors employ CRT technology, which was used most commonly in the manufacturing of television screens. With these monitors, a stream of intense high energy electrons is used to form images on a fluorescent screen. A cathode ray tube is basically a vacuum tube containing an electron gun at one end and a fluorescent screen at another end.

While CRT monitors can still be found in some organizations, many offices have stopped using them largely because they are heavy, bulky, and costly to replace should they break. While they are still in use, it would be a good idea to phase these monitors out for cheaper, lighter, and more reliable monitors.

LCD (liquid crystal display) monitors

The LCD monitor incorporates one of the most advanced technologies available today. Typically, it consists of a layer of color or monochrome pixels arranged schematically between a couple of transparent electrodes and two polarizing filters. Optical effect is made possible by polarizing the light in varied amounts and making it pass through the liquid crystal layer. The two types of LCD technology available are the active matrix of TFT and a passive matrix technology. TFT generates better picture quality and is more secure and reliable. Passive matrix, on the other hand, has a slow response time and is slowly becoming outdated.

The advantages of LCD monitors include their compact size which makes them lightweight. They also don't consume much electricity as CRT monitors, and can be run off of batteries which makes them ideal for laptops.

Images transmitted by these monitors don’t get geometrically distorted and have little flicker. However, this type of monitor does have disadvantages, such as its relatively high price, an image quality which is not constant when viewed from different angles, and a monitor resolution that is not always constant, meaning any alterations can result in reduced performance.

LED (light-emitting diodes) monitors

LED monitors are the latest types of monitors on the market today. These are flat panel, or slightly curved displays which make use of light-emitting diodes for back-lighting, instead of cold cathode fluorescent (CCFL) back-lighting used in LCDs. LED monitors are said to use much lesser power than CRT and LCD and are considered far more environmentally friendly.

The advantages of LED monitors are that they produce images with higher contrast, have less negative environmental impact when disposed, are more durable than CRT or LCD monitors, and features a very thin design. They also don’t produce much heat while running. The only downside is that they can be more expensive, especially for the high-end monitors like the new curved displays that are being released.

Being aware of the different types of computer monitors available should help you choose one that’s most suited to your needs. Looking to learn more about hardware in today’s world? Contact us and see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Hardware
September 3rd, 2014

BCP_Sep02_BBusiness operators know that when it comes to business continuity, everything is about time. It doesn’t matter if you can recover your business activities if this isn’t achieved in reasonable time. But what is considered “reasonable”? This is what the business impact analysis (BIA) determines. The BIA aims to find out what the recovery time objective is for each critical activity within an organization. With that in mind, let’s take a look at five tips for reliable business impact analysis.

Five tips for successful business impact analysis:

  1. Treat it as a (mini) project: Define the person responsible for BIA implementation and their authority. You should also define the scope, objective, and time frame in which it should be implemented.
  2. Prepare a good questionnaire: A well structured questionnaire will save you a lot of time and will lead to more accurate results. For example: BS (British standard) 25999-1 and BS 2599902 standards will provide you with a fairly good idea about what your questionnaire should contain. Identifying impacts resulting from disruptions, determining how these vary over time, and identifying resources needed for recovery are often covered in this. It’s also good practice to use both qualitative and quantitative questions to identify impacts.
  3. Define clear criteria: If you’re planning for interviewees to answer questions by assigning values, for instance from one to five, be sure to explain exactly what each of the five marks mean. It’s not uncommon that the same event is evaluated as catastrophic by lower-level employees while top management personnel assess the same event as having a more moderate impact.
  4. Collect data through human interaction: The best way to collect data is when someone skilled in business continuity performs an interview with those responsible for critical activity. This way lots of unresolved questions are cleared up and well-balanced answers are achieved. If interviews are not feasible, do at least one workshop where all participants can ask everything that is concerning them. Avoid the shortcut of simply sending out questionnaires.
  5. Determine the recovery time objectives only after you have identified all the interdependencies: For example, through the questionnaire you might conclude that for critical activity A the maximum tolerable period of disruption is two days; however, the maximum tolerable period of disruption for critical activity B is one day and it cannot recover without the help of critical activity A. This means that the recovery time objective for A will be one day instead of two days.
More often than not, the results of BIA are unexpected and the recovery time objective is longer than it was initially thought. Still, it’s the most effective way to get you thinking and preparing for the issues that could strike your business. When you are carrying out BIA make sure you put in the effort and hours to do it right. Looking to learn more about business continuity? Contact us today.
Published with permission from TechAdvisory.org. Source.

August 27th, 2014

socialmedia_Aug26_BMany businesses rely on visuals to sell their products. From bakeries to hotels, an attractive product will bring in the customers and ultimately profits. This is why social media services like Instagram have become so popular. Business owners are increasingly wanting to find out how they too can create high quality images on the mobile platform.

The truth behind some of Instagram's best images

Those awesome Instagram photos we see aren't always taken using mobile phones. Instead, many users use digital cameras which offer much better image quality. You can capture some amazing shots with a higher end DSLR cameras with multiple lenses.

If you have one of these cameras and are looking to create high-quality images for Instagram, or any other social media site, you may be slightly confused as to how to get the images onto the platform - especially since many of us use this via the mobile app. To make uploading a little easier, here is a brief guide detailing how to get images from your digital camera onto Instagram.

1. Transfer and process images

Once you have taken photos with your camera, you will need to get them off of your camera's memory and onto your computer's hard drive. Most camera's have apps that allow you to do this, so be sure to follow the instructions in the app that came with it.

When your images have been transferred to your computer, you are likely going to want to process them a little bit. This is especially true if you have a DSLR or other high-end point-and-shoot which takes RAW images. These can be quite large and are not compatible with Instagram.

Most images taken with a camera are quite large in size, so you are going to need to use an image editing program like Adobe Photoshop, or free tools like Pixlr to process them. What you are looking to do is to crop your images so that they are square.

If you are used to the advanced photo editing features, then do your edits before cropping. When you crop your images you should crop or resize them so that they are 640X640 pixels. This is the size of all images taken using Instagram's camera app.

Also, be sure to save the images as JPEGs, as this is the image format used by most smartphone cameras.

2. Save processed images in their own folder

It helps to create a folder somewhere on your hard drive (we recommend in the same folder where you save all of your other folders) that is specifically for images you want to post on Instagram.

When you have processed and edited the images to your liking, save the images here. Try using an easy to use file name like the date and a letter or note so you can easily tell which images are which, so you know which to use.

3. Move the images to your device

You can move images using the cloud or by manually transferring the images to your phone. If you decide to manually transfer your files, you will need to plug your device into your computer.

For users with iPhones, you can open iTunes and click on your device followed by Photos. Then select the box beside Sync photos from. Select the file you created in the step above and then Sync to transfer the images over.

For users with Android devices, plug your phone into the computer and drag the folder you created in the step above into the Photos folder of your Android device.

For Windows Phone users, plug your device into your computer and open My Computer on your desktop. You should see your device listed in the window that opens. Open the file system for your device and drag the image files you created above into the Photos folder of your phone.

If you choose to use the cloud to transfer your files, use the operating system's cloud (e.g., iCloud, Google Drive, or OneDrive) to upload the files. Just be sure to use the same account as the one on your phone.

4. Add images to Instagram

Once the photos are either on your device, or in the cloud, you can now upload them to Instagram. This can be done by:
  1. Opening the app and tapping on the camera icon.
  2. Tapping on the button in the bottom left of the screen.
  3. Selecting where the image is located on your device. E.g., the Gallery app if you placed the photos in your phone's hard drive, or the cloud service you used.
  4. Editing them as you see fit.
Once this is complete, you should be able to post your images as you usually do with any other Instagram image on your phone. Take the time to add filters, and hashtags as well as a good description before you post.

If you would like to learn more about using Instagram to share your images then get in touch and we will show you the advantages of the bigger picture.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
August 27th, 2014

office365_Aug26_BThere is a good chance that as a business owner or manager you spend a good deal of your time editing or compiling documents, especially Microsoft Word documents. While the popularity of Word is undisputed, users occasionally come across overtype when editing and are unsure how to enable or disable it. If you edit in Word, it can help to be aware of this feature.

Word's two editing styles

Every version of Word used in businesses these days has the same two editing styles or modes:
  1. Insert mode: This is the default editing mode where words are inserted where the blinking cursor is placed. All text that comes to the right of the cursor will be moved to the right with newly typed text coming before it.
  2. Overtype mode: This mode replaces text to the right of the blinking cursor. So when you type new text any existing text to the immediate right will be replaced with the new letters.
While the vast majority of users prefer to use insert mode, overtype mode can be useful when editing documents and replacing words, or rewording paragraphs and keeping track of what needs to be rewritten.

Turning overtype on and off

On some older versions of Word, and on some computers, overtype mode is already enabled, and simply hitting Insert on the numberpad of your keyboard will turn it on. You will know overtype is active by looking at the status bar at the bottom of your document. The words OVR should be visible in bold letters.

If you don't see a status bar, try clicking on File > Preferences > View. Once in the View window, scroll down to the Windows section and tick Status Bar. Finally, press Ok and the bar should pop up at the bottom of the window.

Managing overtype

If you find that overtype cannot be activated, or have received a document where it is already activated and can't figure out how to turn it off, you can manage overtype by:
  1. Right clicking on the status bar at the bottom of the document.
  2. Clicking on Overtype to add it to the status bar.
  3. Clicking on OVR in the status bar to turn it on or off.
You can also activate or deactivate overtype by:
  1. Clicking on File followed by Options.
  2. Selecting Advanced.
  3. Scrolling down to Editing options.
  4. Ticking or unticking Use overtype mode.
If you untick Use overtype mode you will disable the feature, meaning you won't be able to hit Insert to switch between the two editing modes.

Looking to learn more about using Word in your office? Contact us today as we specialize in this area and have great tips, advice and solutions for you.

Published with permission from TechAdvisory.org. Source.