Blog

July 15th, 2014

Office365_July14_CEarlier this year, Microsoft announced an enhanced document collaboration experience with the Outlook Web App for Office 365 users. With collaboration becoming a vital aspect in most businesses, it’s for a comprehensive view of the added features of Outlook Web App that help simplify your email tasks and boost collaboration.

Side-by-side view of documents and email

When your colleague sends you a document to review, you’ll see the document attached in an email in your Inbox. When you open the attachment, you can now see the contents of that document within the email itself. No more flipping back and forth between windows to get the information you need.

Files supported for viewing in this new feature include Microsoft Word, Excel, PowerPoint files, most types of image files and PDF files. You can perform all of the standard messaging actions right from within this unified view making it easy to review information in the email alongside the attachment itself.

Easy document editing and reply

What do you do when you want to edit the attachment in your email? You download the attachment, make your changes, re-attach the file and send your reply. Now you can say goodbye to all that hassle. With the new side-by-side view, all you have to do is simply click Edit a Copy right above the attachment and message.

When you do this, a draft reply-all message is created for you to store this new edited version of the attachment. Then, a new editable copy of the attachment you received is created and renamed with your name at the end of the filename. This way you can differentiate the new copy of the file from the original one. The new copy of the attachment is live, meaning any changes made are automatically saved. Once you're done editing, simply type a response in the email and click Send. Types of files supported for editing include Word, Excel and PowerPoint files created in Microsoft Office 2007 and above.

Additional enhancements

In addition to the side-by-side view and edit-and-reply enhancements, the attachment user interface has also been updated. Now when you attach files, the overview is bigger and better looking. You can also now download multiple attachments at once in the form of a single zip file, making life a tad easier.

While Outlook Web App's added features might not be a total game changer, you can be sure that the next time you’re looking to collaborate, you’re able to do so faster and easier. Want to learn more about Office 365 and its apps? Contact us today.

Published with permission from TechAdvisory.org. Source.

July 10th, 2014

Security_July07_CA common issue many businesses face, regardless of their size, is that their computer systems and devices get progressively older and slower, unless they are constantly updated. This can frustrate some employees who may have up-to-date personal devices, so much so that they simply start to bring these devices into the office. The idea of BYOD, or Bring Your Own Device, is not all that new, but it is a growing concern and if it's not handled properly it can pose a security risk.

What should I do about BYOD?

The first reaction of many office managers and business owners, worried about security threats that could stem from BYOD, is to impose an outright ban of devices. While telling your staff they are not to use their devices for work may seem like a quick and easy solution, you can be 100% sure that there will be employees who ignore this policy and use their personal devices for work regardless.

This could put your business at a higher security risk if the rule is ignored, especially if you don't implement any security measures to protect your networks and data. In order to minimize the potential threats BYOD can expose your business to, we suggest you do the following:

1. Consider embracing BYOD

Instead of simply banning personal devices in the workplace take a step back and look to see if there are any benefits BYOD can offer. For example, if you operate on razor thin margins and have not replaced hardware in years, there is a good chance your employees will have better systems at hand. This could help you reduce your overall tech costs.

The same goes for phones for your employees. Why not offer to pay for the plan and allow employees to use their own devices? Of course, you are going to want to implement security measures and usage rules, but if this is easily achieved then it may help reduce your overall operating costs. Before you do implement a system like this however, we strongly recommend you read the rest of this article and follow the steps below.

2. Set up separate networks for employee devices

Oftentimes, the main reason employees bring their devices to the office and use them for work purposes, especially when it comes to mobile phones, is because they can happily connect to Wi-Fi for free without using their data plans throughout the day.

Chances are high that because they use the work Wi-Fi on their device for non-work tasks, they simply keep using the device when they are doing work related activities. This could pose a security risk, especially if you run business-critical operations on the same network. You could nip this potential problem in the bud and simply install another Wi-Fi network for mobile devices and non-critical business processes.

It is usually quite affordable to simply purchase another line and the networking equipment to support this, not to mention the fact that it will keep business-critical processes secure from errant malware. As an added bonus, you will likely see increased productivity because the bandwidth demand will be limited, so important data will move quicker.

3. Educate your staff about security

In our experience, the vast majority of BYOD related security risks are exposed by mistake. An employee may have a virus on a personal phone and be unaware of it. When they connect to the network it can then be unintentionally spread to other computers resulting in a potentially massive security breach.

One of the simplest ways to prevent this is to educate your employees about proper mobile safety. This includes how to spot apps that could contain malware, sharing security threat updates, and teaching your employees how to secure their devices. You really need to stress just how important security is to them.

On top of this, contact an IT expert like us for a recommended anti-virus and spyware scanner for mobile devices that users can easily install. Encourage employees to not just install this but to keep it up to date too. Many of these mobile specific scanners are free and just as powerful as desktop versions.

4. Work with an IT partner to establish a solution that works for you

Beyond education and simple network establishment, it is a great idea to work with an IT partner like us. As experts, we keep tabs on the trends and solutions related to BYOD and will work with you to establish a program that works for your company.

It may be that you don't actually need to integrate BYOD but to update hardware or software to newer versions instead. It could be that there is a simple solution to employees feeling frustrated with slow performance of existing systems at work.

If you do implement BYOD, we can help establish security measures and policies that will ensure your networks and employee devices are secure. The best advice we can give however, is to do this before you start allowing BYOD, as it can be far more challenging to implement and enforce changes when employees are already using their devices at work.

Looking to learn more? Contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
July 9th, 2014

OSX_July07_CApple's iCloud has been met, by Apple users at least, with great enthusiasm. This important cloud storage solution has many great strengths. However, one common issue, pointed out by many business users, is that it doesn't feel secure. In an effort to beef up the security of iCloud, Apple has recently introduced two-step authentication.

What exactly is two-step authentication?

Two-factor or two-step authentication as Apple calls it, is a security method whereby you need to supply two different pieces of information in order to access your account. For the majority of systems this means your password and another piece of identification or a code that has been sent to say a mobile phone or generated by a key fob.

The reason two-step authentication has become so popular, and is being implemented in numerous systems, is that it is more secure than just using your password to access your account. Because the majority of platforms choose to use your mobile phone to generate the second code - usually through an SMS - there is a good chance that other people will not be able to access your account.

In the specific case of iCloud, you will need to enter this code when accessing iCloud or iCloud Web apps like Calendar, Contacts, Mail or Notes. When you try to access an app on a new system you will need to enter your password and a four digit code sent to your mobile phone over SMS.

How to set up two-step authentication for iCloud

If you use iCloud or iCloud's Web apps you can enable two-step authentication by following these steps:
  1. Going to the iCloud website and logging in using the username and password you would like to enable the extra authentication for.
  2. Clicking on your account name, which is located at the top-right of the page, and selecting Account Settings.
  3. Clicking on your Apple ID followed by Manage your Apple ID in the new page that opens.
  4. Signing in with your Apple ID again and clicking on Password and Security.
  5. Entering the answer to two of your security questions and then selecting Continue.
  6. Reading the information about two-step authentication on the three following screens and clicking Get started.
  7. Setting a phone number in the following screen. Be sure to use a number tied to a phone that can accept SMS or text messages.
  8. Entering the code that was sent to the phone number you set in the previous step.
  9. Selecting your phone from the list of devices and clicking Verify.
  10. Entering the code that is sent to the device you just selected and clicking Continue.
  11. Printing or copying the verification key in the window that pops up. You will need to keep this in order to access your account if you switch phone numbers.
  12. Re-entering the verification key and clicking Enable two-step verification.
  13. Checking the box to show that you acknowledge the two-step verification and understand what it means.
  14. Clicking Done.
The next time you try to log into iCloud, you should be asked to enter the two-step verification code that will be sent to the mobile device you established in the steps above. It's true that this is a bit of a hassle to set up, but it really does enhance the security of your account and should be enabled, especially if you have connected a credit card or uploaded sensitive information to your account.

If you are looking to learn more about enhancing the security of your Mac laptop or desktop, contact us today to see how our systems can help.

Published with permission from TechAdvisory.org. Source.

Topic Apple Mac OS
July 2nd, 2014

SocialMedia_June30_CFor many businesses, social media is becoming not only relevant but an important element of overall operations. For business owners, managers, and employees one of the most valuable networks is the business oriented LinkedIn. This network encourages business friendly activities like networking and idea sharing, and is seeing ongoing growth as more business owners and managers continue to join. Like all networks, your profile is key to your success and the question then is how to go about creating a great profile.

In this article we will go over eight important steps you need to take in order to build the perfect LinkedIn profile. In fact, we came across a great infographic on Link Humans that could be a big help when following these steps. We strongly suggest you take a look at this when building your profile.

Step 1: Establish your profile

While you don't have to join LinkedIn, it is a good idea if you are looking to connect with other business owners and colleagues through a more professional, business style networking oriented social network. If you do want to connect at this level, the absolute first thing you need to do is to create a profile. This can be done by:
  1. Going to LinkedIn's website (linkedin.com).
  2. Clicking on Join Today.
  3. Entering the relevant information on the following page. We recommend using the name the majority of your customers and clients know you by and your work email address. Personal email addresses are fine if you don't want to fully represent your company.
  4. Selecting Join LinkedIn.
If you use your Facebook account for business, you can also sign up using your Facebook account. Just follow steps 1. and 2. above and click Sign Up with Facebook. You will be asked to log into your account (if don't already have Facebook open in another tab on your browser) then approve the account access rights. Once you've done this you should see your basic profile pop up.

Step 2: Select an appropriate picture

LinkedIn is a work-related network, and to that end you will need to present the right corporate image; this means uploading a professional profile photo. This image should clearly show your face and be cropped to show mainly your head and upper body. The background should be clear or unobtrusive, allowing you to be the main focus.

If you don't have any professional head shots, it might be a good idea to get some taken. Most photographers can snap a few for you, and will be able to provide you with information about how to pose and dress for the shots.

You can add an image to your profile by:

  1. Logging into your profile.
  2. Hovering over Profile which is located in the menu bar at the top of the screen.
  3. Clicking on Edit Profile followed by the camera icon at the top of your profile.
  4. Pressing Change photo and then selecting the image you would like to use as your profile picture from a file on your hard drive.
  5. Ticking Save to set your picture.
The reason a good picture is more important than on other networks is because it has been proven that profiles with professional looking pictures are easier to find and also enhance the potential that other members will want to connect or even recognize you.

Step 3: Fill in your basic information

Once you have a great picture set on your profile go back to the editing screen and add your basic information. This includes your name, role, location, and company. Also, click on the Edit Contact Info tab to the right-hand side of your basic information section. Add as much contact info as you feel comfortable with; we recommend your email address and company website at the very least.

Step 4: Determine who your main audience will be

Before you begin to fill in your profile, you should take time to determine what the purpose of this profile will be. Will it be used to find new colleagues? Or will it be used to connect and communicate with your colleagues? Or, will it used to find prospective clients? Each reason will determine what information you should include in your profile along with the relevant keywords.

For example, if you would like to find new employees you can tailor your profile to show what you do in your job and what makes it so great. You can then also come up with more relevant keywords to use in your content. For example, using the words 'career' and 'job' and including in your summary information about who you are looking for will definitely attract prospective hires. However, this profile likely won't attract colleagues or clients.

Don't feel that you have to limit yourself to one set function however. For example, there are many crossover terms that both clients and prospective employees will search for. So, if you want to use your LinkedIn profile for more than one reason, take some extra time and try to figure out which keywords and ideas you think will work well. The great thing about LinkedIn is that you can always edit everything at any time. So, if you want to switch your audience, you can easily do so by simply editing parts of your profile and changing keywords.

Step 5: Write a solid summary

The summary of your LinkedIn profile is a place where you highlight who you are. Take time to craft this so that you can showcase what you do and your main strengths. Be sure to use relevant industry and position specific keywords and terminology that you believe your audience will be searching for, as this language will make your profile easier to find in searches.

The key here is to write a summary that not only explains what you do and your experience, but showcases who you are. Use active language like 'I', 'my', and 'me', and be sure to include a way for people who don't have a LinkedIn profile to contact you - usually an email, link to your website or a phone number.

Step 6: Add your past and present positions

Once your summary is finished, you should move onto your current and past positions. This section should reflect your resume and highlight the experience you are talking about in your summary. It would be helpful to try and work in some of the keywords you used in the summary or identified earlier in order to really make your experience really stand out.

Chances are you aren't looking for work, so you can deviate a little from your resume here, and highlight what you do best, or how you can help your audience best. Feel free to leave out points that may not be 100% relevant or interesting e.g., how many people you manage, sales goals, etc.

Step 7: Start connecting

Once your profile is mostly complete with experience and a summary, you can start looking for people to connect with. Start by searching for people that you know or work with on a regular basis and inviting them to connect.

Next, join a few groups that are related to your position and industry. These can be found by hovering your mouse over Interests which is located in the menu bar near the top of the window. Select Groups from the menu that drops down and then select Find a group from the right-hand side of the page that opens. Some groups are private and will require you to ask to join them, but don't be afraid of sending in your request.

Once you have joined some groups and started to make connections be sure to be active on the network. It will help to join in on conversations held in your groups and post content on a regular basis. And, if you meet new clients or people don't be afraid of looking them up on LinkedIn and asking to connect with them!

Step 8: Work on your awards and recommendations

Finally, start recommending people that you know. You can do this by going to a colleague's profile and scrolling down to their Skills and Endorsements section. Find skills that you know they possess and press the + Endorse button beside the skill. Most people will also do this for you as well.

If you have won awards in the past, be sure to include these as well, especially if they are relevant to your intended audience. Just be sure to pick the awards that really highlight your skills, as an Employee of the Month award may not be the most relevant.

From here it's really just a matter of tinkering with your profile on a regular basis. Be sure to be active and ensure that your profile really reflects who you are. Doing this will create a stand-up profile you can be proud of.

Looking to learn more about LinkedIn and how to use it for your business? Contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
July 1st, 2014

Office365_June30_CMicrosoft Office 365 is one of the most popular cloud-based solutions for small to medium businesses. With a bevy of powerful features and apps that are immediately familiar to anyone who has used Microsoft's Office apps, utilizing Office 365 is almost a no-brainer. In mid June, Microsoft announced a new program - Office 365 roadmap - that allows you to keep track of upcoming updates.

The Office 365 roadmap

Earlier in 2014, Microsoft announced that they would be moving to a faster rollout schedule for their popular software solutions like Office 365. This means that we can expect to see updates for some software being introduced on a fairly regular basis.

Because of this, it would help to know exactly what Microsoft is working on and when you can expect an update or introduction of new features. To cover this, Microsoft has recently announced an Office 365 roadmap that covers what the company is doing in relation to the business oriented version of Office 365.

You can view the roadmap on this Microsoft website which has been designed to showcase the status of features based on:

  • Launched - Features that have been completed and implemented in various Office 365 apps. These features should be accessible to all Office 365 for Business users.
  • Rolling out - Features that have finished development and are ready to be implemented to the various apps but are not accessible to most users at this time, but will be in the near future.
  • In development - Features that Microsoft developers are working on or testing, but aren't ready to be implemented.
  • Canceled - Features that have been canceled; developers are no longer working on these, and they won't be implemented into Office 365 apps.
When you visit the roadmap site, you can click on the different sections and see the recent features that are relevant to each. For example, if you click on Launched, the recently launched features will drop down. Click on one to see a brief overview of the feature, along with a link to learn more.

This can be a useful site for businesses, especially if you rely on Office 365's features and are interested in which new ones will be introduced. We should stress however that the features listed on the site are relevant only for Office 365 for Businesses and Enterprises. Private and Home users may not necessarily see these features introduced.

Office 365 First Release program

For those users who look at the Rolling Out section of the roadmap site, and would like to have access to fully tested and supported features that are just about ready to roll out, Microsoft has also introduced a new program called First Release.

This program allows Office 365 for Businesses and Education users to sign up and gain access to upcoming features two weeks or more before they are introduced. If you would like to sign up for this program, you can do so as long as you are the admin of your account. If you are the admin for your Office 365 accounts, you can enable First Release by going into the Service Settings area from your management console. You should see an option to enable First Release, which you need to tick to turn on.

Once this is enabled you should be notified within a month letting you know that the first batch of early features is ready to implement. Microsoft has noted that the features implemented early via First Release will apply to the Office 365 user experience, SharePoint Online and Exchange Online. At this time, other apps like Lync Online will not be part of the program, but you can probably expect this program to expand to cover other apps in the coming months and over the next year.

Both the roadmap and First Release features could prove useful for power users of Office 365. If you are looking to learn more about these concepts and how Office 365 can be used successfully in your business, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

June 26th, 2014

Security_June23_CThe increasing number of businesses turning to a virtual environment is parallel with cyber criminals looking to breach that security. While many businesses think their virtual servers are safe and secure, some are unaware of major security myths that can leave your business vulnerable to attack. With that in mind, isn’t it time you familiarized yourself with five common virtualization security misconceptions to keep your virtual environment secure?

Myth No.1: Existing endpoint security will protect our virtual environment

Most traditional endpoint security solutions are virtual-aware and provide low levels of protection. This simply isn’t enough. Depending on the virtualization platform used (VMware, Microsoft, etc.), your traditional endpoint security suite can probably recognize virtual endpoints. However, this physical software often can’t bring its full tool set of anti-malware to the virtual world, meaning it can only perform basic tasks such as on-access scanning.

Therefore what you need is a solution that has been designed to keep both virtual and physical computing environments secure. There are a wide-number of solutions out there, and the best one for your business will depend largely on the virtual environments you employ. We strongly recommend talking to IT experts like us, as we can help determine, or even offer, the strongest security based.

Myth No.2: My existing anti-malware doesn’t interfere with my virtual operations

Performance issues can create security gaps that don't exist in your physical environment. Traditional endpoint security uses an agent-based model where each physical and virtual machine has a copy of the security program’s agent on it. This agent communicates with the server while performing security tasks. This is fine for physical machines, but if you have 100 virtual machines running off of one main environment that has been infected with malware, you’ll also have 100 instances of malware running on the machines.

This high level of duplication can cause massive performance degradation and waste tons of storage capacity. Therefore, you should make an effort to ensure that all of your systems including the main ones are without malware. This not only makes every system secure, but can also speed up overall operations.

Myth No.3: Virtual environments are inherently more secure than physical environments

Sadly, this just isn’t always true. Virtualization is designed to allow software, including malware, to behave as it normally would, and malware writers will target any and all weak points in a business’s network to accomplish their goals. An attacker who compromises one virtual machine and finds a way to jump to the hypervisor - the system that enables the virtualization - then has access to every virtual machine on that host.

Therefore, malware scanners on both the user and main systems would be a good idea. If it does happen to get on a system, the chances of it spreading are drastically reduced.

Myth No.4: Using non-persistent virtual machines effectively secures a network

In theory, any machine that encounters malware is wiped away and recreated cleanly. However, we are now seeing malware that is designed to survive teardown of individual machines by spreading across the virtual network. This allows it to return when new virtual machines are created.

Additionally, being too eager to create new machines on demand can result in virtual machine sprawl, which happens when virtual machines are created but then forgotten. This leads to an unmaintained virtual endpoint operating without your knowledge. Even if the rest of your virtual machines are secure, it’s possible for one machine to eavesdrop on the traffic of another virtual machine, leading to privacy and security risks.

The best solution to this is to employ an IT manager who can track and maintain systems. Many IT partners offer a solution like this, so experts like us may be able to help ensure your systems are secure.

Myth No.5: Specialized virtual security programs are more or less the same

There are various approaches to virtualization security and your network will probably need a blend of available options. This all depends on what you’re trying to protect.

A non-Web-connected server is going to have entirely different security needs than a virtual desktop of a server that manages customer information. Implementing one without the other simply just won’t do in today’s world, where attackers are set on getting their hands on your data.

Proper security is vital in making virtualization a critical component of your business IT infrastructure. Looking to learn more about virtualization and its components? Contact us today and see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
June 25th, 2014

iPhone_June23_CThe iPhone has become one of the most popular mobile devices among business users. It is widely regarded for its usability which stems from the excellent iOS operating system supporting it. In early June, Apple announced that a new version of iOS - iOS 8 - was on its way in the fall, and with it will come a number of developments and features. One interesting update of note is a drastically improved Notification Center.

About the iPhone's Notification Center

The Notification Center feature was introduced with the release of iOS 5 and is available on every Apple mobile device. The idea behind it is that it can show you an overview of alerts and updates from specific applications. On iPhones and iPads this is an area where all of the most important information can be accessed quickly.

You can access your Notifications Center by swiping down from the top of your screen. When it is open you will see three views:

  • Today - Important information about the day, including upcoming calendar events, the weather, and other relevant information.
  • All - All alerts, including emails, messages, and updates from apps like Twitter.
  • Missed - Notifications that you have missed in the past 24 hours.
If you tap on any notification or alert, the app associated with it will be opened and allow you to view the content or update in full. For example, when you get a new email, Notification Center will alert you and show who it's from and even some of the content. Tapping on the message will open the Mail app, allowing you to interact with it directly from the main app.

For many users, this is among the most useful iOS features, but many have commented that it feels unfinished. Sure it provides a way to quickly access important information but it is largely static and limited in use. Apple aims to change this with the release of iOS 8.

Notification Center's iOS 8 update

When Apple introduced iOS 8 in early June, they announced that the Notifications Center will be getting widgets that will help make the Center even more functional - providing you with greater information all in one place. Those who have used an Android device before are likely well aware of widgets. These tiny versions of apps display useful information without having to open the app itself.

For example, on Android devices you can add an email widget to your main screen that allows you to read and reply to emails directly from your home screen without having to open the full version of the app.

Apple has decided to take another path with the implementation of widgets, instead baking them into the Notifications Center. With iOS 8, you will still be able to swipe down to access your Notifications Center, only now there will be way more information. In the example Apple demonstrated, there were widgets showing the latest scores of a baseball team and eBay auctions that you could bid on directly from the screen, without having to open the eBay app.

Of course this was just a demo, but you can bet that when iOS 8 is launched, you will start to see useful apps updated with widgets that you can add to Notification Center. If for example you use a note app like Evernote, there is a good chance that you will be able to create or edit a note in the Notification Center, without having to open the app itself.

It is clear that with the impending update, Apple is striving to implement a better and easier way for you to interact with your phone. For many business users this will mean less time having to open apps and search for the information they need. It will be interesting to see what business-oriented apps developers come up with next in terms of making the iPhone an even more effective business device.

Contact us today to learn more about the iPhone and how it can help improve your business.

Published with permission from TechAdvisory.org. Source.

Topic iPhone
June 18th, 2014

osx_June17_CIt’s been almost a year since Apple’s tenth major operating system the OS X Maverick was released. Now with the Worldwide Developers Conference (WWDC) 2014 having just taken place this month, it’s the perfect time for Apple to introduce its new operating system, the OS X Yosemite. While features on the OS X Yosemite aren’t yet complete, many changes to Apple’s operating system are very much present.

Design

Right from the start you can tell that OS X Yosemite is all about aesthetics. Apple manages to make the operating system look both vastly different yet not entirely unfamiliar. The button and icon design has been flattened so that there are no false contours, making everything look sharper.

For the first time ever, the operating system’s font has been changed from Lucida Grande to Helvetica Neue which is a little easier on the eyes. Finder window menus are now translucent, matching up with the image backgrounds on your desktop. The refreshed dock has gotten a slight makeover with newer flatter-looking icons as well as a new trash can. Yosemite also features a “dark mode”, which gives you the option to eschew translucency for dark gray toolbars.

Notifications

Notification Center has been updated with a new look that borrows its black transparent design from iOS’s pull down notification pane. Apple has divided its Notification Center into two different categories. One shows notifications as you were used to them before, the other shows a “Today” view with a combination of upcoming events, current weather, reminders and stocks. To swap between the two, Apple’s added in tabs at the top to let you minimize the information shown at a glance.

Spotlight

The new Spotlight search and file browsing in general have been greatly improved. Previews of animated GIFs now automatically animate in the preview pane. And if Spotlight is your default application and file launcher, you can hit Command + Space to pull up the search bar and pick out your query instead of hunting for the exact location of the file you’re using. When you go through this, the search pops up in a small pane directly at the center of your screen which makes more sense than the old search bar which was in the top right corner of your screen.

The new update isn’t just conveniently situated, but it could turn Spotlight into your default way of searching for information that you’d normally go to a browser for. You can now convert units, bring up full contact info, look something up on Wikipedia or even search for food nearby. Apple’s even worked Spotlight into the address bar of the revamped Safari browser to give users a one-stop shop for search across the web and local files.

Mail

OS X Yosemite’s Mail app gets a cleaner design as well as a slick new feature, Mail Drop. This allows you to bypass attachment size constraints by uploading files that are too big and sending the recipient a link.

Safari

Safari browser has been updated for continuity with the browser’s window carrying over the translucency seen in other areas of the operating system. Favorites are now hidden by default, but you can access these by clicking on the address bar.

Sharing links to social networks has been simplified with a one-click process and RSS feeds will show in the browser's sidebar.

AirDrop

AirDrop in Yosemite now works with iOS so iPhone owners can easily transfer files to the Mac and back. OS X Yosemite features the ability to recognize work being done in iOS that you might want to continue on the desktop. Once an action is detected on iOS, Yosemite will create an icon on the desktop to remind the user to complete the task. This sensing ability also extends to creating a tethered connection, as your iPhone will now appear as a connection option in the WiFi dropdown.

Make and receive calls

Once connected to your iPhone, Yosemite will prompt you with notifications to answer or ignore incoming calls, both audio and video. The OS will even allow users to click on a number within a website to dial it directly.

OS X Yosemite isn’t finished, but overall it demonstrates a more mature and subtle approach in its user interface as well as a more versatile operating system. For now, Apple is making OS X Yosemite available as beta for developers, but you can expect the full version this fall, when you will be able to download it for free. Looking to learn more about Apple and their products? Call us today for a chat.

Published with permission from TechAdvisory.org. Source.

Topic Apple Mac OS
June 17th, 2014

office365_June16_CWouldn’t it be nice if there existed an application with features that can help predict and identify risks and opportunities for your business products or services? Microsoft has turned this concept into reality with Office 365 Power BI’s latest upgrade, which features predictive forecasting. Now that you are able to, it might be time you familiarize yourself with what predictive forecasting is and how it can help your business.

Predictive forecasting uses a variety of statistical techniques, from modeling to data mining, that analyze current and historical facts to make predictions about the future.

The predictive forecasting function of Office 365 provides users with the skills to generate reports, interactive charts, and 3D visualizations of business performance. Simply put, users can perform advanced forecasting without the complexity that usually accompanies these kinds of processes.

The new forecasting tool utilizes built-in predictive forecasting models to automatically detect seasonality in the data. It also enables users to see how results are affected by adjusting the parameters of the time or confidence interval assigned to be analyzed.

Power BI’s predictive forecasting can also help fill in gaps with data. Power View, an interactive data exploration and presentation tool, fills in missing values from a data set before carrying out a forecast for a more accurate result.

A few things you need to keep in mind before using the feature:

  1. The line chart has to have one line as multiple line charts won’t work.
  2. The line chart has to have fewer than 1,000 values.
  3. The x-axis value needs to have a date/time format or be a uniformly increasing whole number. It cannot contain text or decimal numbers, and the interval between values has to be at least one day.

How to use predictive forecasting in Office 365:

  1. Simply upload a workbook with a Power View time series line chart to Power BI for Office 365.
  2. Open the file in Power BI and switch to Power View in HTML 5 by clicking Try the HTML 5 version of Power View in the lower-right corner.
  3. Click on the forecast arrow or drag the forecast dot in the line chart and you’ll see the forecasting options appear in the analysis pane to the right of your report.
Do keep in mind that Power View automatically detects what appears to be the seasonality of the data. In other words, a complete cycle of peaks and drops. Note that this works best if the chart has at least four times more values than the data cycle.

Here’s how to override automatic seasonality detection:

  1. Start a forecast by dragging the forecast handle in a line chart.
  2. The Analysis pane will automatically pop up on your right hand side. If you can’t find it, look for Analysis in the upper-right corner.
  3. In the Analysis area, manually set the seasonality to 0, 2, 3, 4, 5, 6, 7, 12, 24, 52, or 365.
Predictive forecasting, if used properly, can immensely help with the overall strategic planning, market penetration and operation of your business.

Looking to learn more about Office 365 and its features? Call us today for a chat.

Published with permission from TechAdvisory.org. Source.

June 13th, 2014

security_June13_CThe parallel rise of technological advancement and malicious Internet activity is evident. With advances in technology comes an increase in security threats which, if not taken care of right away, can severely affect your business’ efficiency and overall success. With that in mind, it’s time you familiarized yourself with the top security best practice guidelines which will go a long way to ensuring your business is safe and secure.

10 Security practice guidelines for businesses

  1. Encrypt your data: Encryption of stored data, filesystems, and across-the-wire transfers is essential to protect sensitive data as well as to help prevent data loss due to equipment loss or theft.
  2. Use digital certificates to sign all of your sites: You should obtain your certificates from a trusted Certificate Authority, and instead of saving your certificates on the Web server, save them to hardware devices like routers or load balancers.
  3. Implement a removable media policy: Devices like USB drives, external hard disks, external DVD writers or any writeable media facilitate security breaches coming into or leaving your network. Restricting the use of those devices is an effective way to minimize security threats.
  4. Implement DLP and auditing: Be sure to use data loss prevention and file auditing to monitor, alert, identify, and block the flow of data into and out of your network.
  5. Use a spam filter on your email servers: Using a time-tested spam filter such as SpamAssassin will remove unwanted email from entering your inbox and junk folders. It is important that you identify junk mail even if it’s from a trusted source.
  6. Secure websites against MITM and malware infections: Start using Secure Sockets Layer (SSL) which creates a secure connection between a user and server, over which any amount of data can be sent securely. Through SSL, you’ll be able to scan your website daily for malware, set the Secure flag for all session cookies, as well as use SSL certificates with Extended Validation.
  7. Use a comprehensive endpoint security solution: Using an antivirus software alone is not enough to provide defense against today’s security threats. Go for a multi-layered product to prevent malware infections on your devices.
  8. Network-based security hardware and software: Start using firewalls, gateway antivirus, intrusion detection devices, and monitoring to screen for DoS attacks, virus signatures, unauthorized intrusion, and other over-the-network attacks.
  9. Maintain security patches: Make sure that your software and hardware defenses stay up-to-date with new anti-malware signatures and the latest patches. If your antivirus program doesn’t update on a daily basis, be sure to set up a regular scan and a remediation plan for your systems.
  10. Educate your employees: As simple as it sounds, this might be the most important non-hardware, non-software solution available. An informed user will more likely behave more responsibly and take fewer risks with valuable company data resulting in fewer threats to your organization.
Businesses cannot afford to take chances with security. Why? Because doing so can trigger a domino effect, causing a cascade of problems that can lead to operational outages, data loss, security breaches, and the subsequent negative impact to your company's bottom line. Looking to learn more about security for your business? Call us today for a chat.
Published with permission from TechAdvisory.org. Source.

Topic Security