Blog

September 3rd, 2014

BCP_Sep02_AMany people wonder why it’s necessary to perform business impact analysis (BIA) when they’ve already invested a large amount of time on a risk assessment. The answer is simple: because the purpose of a BIA is different, and wrong results could incur unnecessary expenses or create inadequate business continuity strategies. To that end, let’s take a look at five tips for successful business impact analysis.

Five tips for successful business impact analysis:

  1. Treat it as a (mini) project: Define the person responsible for BIA implementation and their authority. You should also define the scope, objective, and time frame in which it should be implemented.
  2. Prepare a good questionnaire: A well structured questionnaire will save you a lot of time and will lead to more accurate results. For example: BS (British standard) 25999-1 and BS 2599902 standards will provide you with a fairly good idea about what your questionnaire should contain. Identifying impacts resulting from disruptions, determining how these vary over time, and identifying resources needed for recovery are often covered in this. It’s also good practice to use both qualitative and quantitative questions to identify impacts.
  3. Define clear criteria: If you’re planning for interviewees to answer questions by assigning values, for instance from one to five, be sure to explain exactly what each of the five marks mean. It’s not uncommon that the same event is evaluated as catastrophic by lower-level employees while top management personnel assess the same event as having a more moderate impact.
  4. Collect data through human interaction: The best way to collect data is when someone skilled in business continuity performs an interview with those responsible for critical activity. This way lots of unresolved questions are cleared up and well-balanced answers are achieved. If interviews are not feasible, do at least one workshop where all participants can ask everything that is concerning them. Avoid the shortcut of simply sending out questionnaires.
  5. Determine the recovery time objectives only after you have identified all the interdependencies: For example, through the questionnaire you might conclude that for critical activity A the maximum tolerable period of disruption is two days; however, the maximum tolerable period of disruption for critical activity B is one day and it cannot recover without the help of critical activity A. This means that the recovery time objective for A will be one day instead of two days.
More often than not, the results of BIA are unexpected and the recovery time objective is longer than it was initially thought. Still, it’s the most effective way to get you thinking and preparing for the issues that could strike your business. When you are carrying out BIA make sure you put in the effort and hours to do it right. Looking to learn more about business continuity? Contact us today.
Published with permission from TechAdvisory.org. Source.

September 3rd, 2014

OSX_Sep02_AToday's operating systems offer a vast array of different features, some of which users find essential, and some that are deemed non-essential but are still handy. One such feature is the ability to take a screenshot. There is a good chance that you probably have taken screenshots before, but have you ever wished that there was a better way to take them? Here are four tips for better screenshots on OS X.

1. Know the shortcuts

As a Mac user, you likely know that the system is shortcut heavy. From navigating, to switching screens, to even opening programs, there is a shortcut for almost everything, including screenshots. With OS X there are a number of shortcuts associated with screenshots, and it is worthwhile knowing them:
  • Command + Shift + 3: Takes a screenshot of the entire screen.
  • Command + Ctrl + Shift + 3: Captures the entire screen and copies it to the clipboard. If you select Paste in a program like a word processor, it should paste the image.
  • Command + Shift + 4: Allows you to select the screenshot area and save it.
  • Command + Ctrl + Shift + 4: Allows you to select the screenshot area and copy it to the clipboard.
  • Command + Shift + 4 followed by spacebar: Captures an open window, folder, menu bar or desktop icon and saves it.
  • Command + Ctrl + Shift + 4 followed by spacebar: Captures an open window, folder, menu bar or desktop icon and copies it to the clipboard.
With Command + Shift + 4, you can also press and hold the spacebar once you have drawn a shape to move it around and select a different area. Also, pressing esc will cancel the screenshot selection if you have say selected too big of an area.

2. Including the cursor

Sometimes you may want to capture the mouse cursor pointing at something within a screenshot. You can do this by:
  1. Opening the Utilities folder on your computer. The quickest way to do this is to hit Command + Spacebar and typing Utilities.
  2. Scrolling down to the Grab app and opening it.
  3. Selecting Grab from the top right of your screen, followed by Preferences.
  4. Clicking on the cursor you would like to show up in your screenshots.
When you take the screenshot, the pointer will appear where you left it when the screenshot was taken.

3. Using Preview to take screenshots

If you have documents or files that contain images or text stored on your hard drive that you would like to take a screenshot of, the shortcuts will work fine, but did you know that you can use the Preview app to take screenshots as well?

If you right-click on the file that contains the information that you would like to take a screenshot of and select Open with followed by Preview, you will see the file open in preview mode. Clicking on File from the menu bar along the top followed by Take screenshot will allow you to capture the image.

When using this feature, you can select either:

  • From Selection… - Will allow you to draw a box to capture the screenshot.
  • From Window… - Will save the whole open window.
  • From Entire Screen… - Will capture the open window plus anything else on your screen.

4. Using the Grab app

Did you know that there is actually an app already installed on your computer that allows you to take screenshots? Most users rely on the shortcuts listed above, but these are actually related to the Grab app which is located in the Utilities folder.

If you open Grab (press Command + spacebar and type in 'Grab', select Grab under Applications), you can manually take screenshots using the app by:

  1. Clicking Capture.
  2. Selecting the type of screenshot from the drop-down menu.
The types of screenshot you can take with Grab include:
  1. Selection - Draw a box around the area of your screen you would like to capture.
  2. Window - Allows you to select a window to capture. Simply open the window and select Choose Window from the pop-up box.
  3. Screen - Will snap a screenshot of your entire screen.
  4. Timed Screen - Will start a timer then take an image of the screen in 10 seconds.
Looking to learn more about using OS X? Contact us today!
Published with permission from TechAdvisory.org. Source.

Topic Apple Mac OS
September 2nd, 2014

Web_Sep02_AAt any given time there are a nearly countless number of technology related trends popping up. Many come and go, but one of the most important that many business owners are focusing on is the cloud. Owners and managers know they ought to be using "the cloud" but it can be confusing as to what exactly it is and the different types of services available. To help, here is an overview of three of the most common cloud service models used in small to medium businesses.

1. SaaS

SaaS, or software as a service, is a cloud service that revolves around, you guessed it, software. Easily the largest and most well known cloud-based service, SaaS uses the cloud to deliver software to users, which is then usually accessed via your Web browser. Unlike physical software that you install on your computer, SaaS solutions are hosted on a provider's servers.

This means that the provider is responsible for software maintenance and updates, which translates to the fact that users will all be using the same version of software and get updates at the same time. As a business owner this means that actually managing the software on all of your computers is made not only easier, but more affordable. Combine this with the fact that companies like us can manage these solutions for you and you can see why SaaS is highly popular with many companies.

If you are looking for a new software solution, many major types of software now also have SaaS options including: Office document creation suites, accounting software, email, HR solutions, content management, customer relationship management, and more.

2. PaaS

PaaS, or platform as a service, is a cloud-based service that provides users with computing platforms. Most companies who utilize PaaS do so to either host or develop their own software solutions, or to provide support for software used by employees.

The main reason many companies integrate PaaS is because it drastically reduces the costs and complexity often associated with buying, developing, configuring, installing, and managing the hardware and software solutions that are necessary for the custom-built applications that many businesses rely on.

While PaaS is gaining in popularity with many small businesses, most won't have a lot of first-hand interaction with this type of cloud, especially those who work with IT providers like us. Essentially, most providers will utilize PaaS in order to deliver custom applications and solutions to the end-user.

3. IaaS

IaaS, or infrastructure as a service, is essentially cloud-based computers and resources. The most popular and well known type of IaaS is the virtual machine which is a digital version of a computer or server that is accessed over an Internet connection. The infrastructure is physically kept off site, and usually managed by a provider, but you access and interact with it as if it is located on your computer or in your office.

In other words, if you are looking to virtualize your systems via the cloud, IaaS could be a good place to start as it allows you to move existing support systems into the cloud. Other solutions can then be migrated or introduced as needed.

While the cloud can offer a wide variety of benefits and solutions to companies, it can be a chore to choose the service which is best for your company's needs. We highly recommend that if you are considering a cloud solution, you get in contact with us. We can help find the best solution for the needs of your business and to also manage it, thereby ensuring proper migration and implementation, leaving you to focus on running your business.

Contact us today to learn more.

Published with permission from TechAdvisory.org. Source.

Topic Web
September 2nd, 2014

GoogleApps_Sep02_AFor many Google Apps users Google Drive is among the most important and popular app. With a wide scope of features, including document creation, collaboration tools, and cloud-based storage, the app is highly useful for almost any business across any industry. However, like most similar systems, it can still be a challenge to find specific files or folders. One of the best ways to do this is by using the search bar at the top of the screen, but did you know that there are some search operators you can use to make finding your files even easier? Here are four.

Searching for files on Drive

Before we look into the different search operators you can use to find files on Drive, we should clarify that these operators are to employ in the search bar, which is located at the top of the Drive page. If you want to search for a file this works in the same way as the Google Search bar on google.com, only this bar focuses on Drive files, and anything related to Drive.

To use the operators listed below, simply click on the bar that says Search Drive and enter the operator along with the search term, or name of the file/item/keyword you are looking for. For best results you should put the operator before the keyword, however Google also allows users to insert it after the keyword.

1. title:

Sometimes when you are looking for a document, you want to search for the title only, but because of the way Drive's search works, if you enter a keyword it will search for all files that contain that particular word. This means that if you are looking for a document based on its title, you will also see results for documents that contain that keyword too. By using the title: operator you can filter results so that only documents that contain the keyword in the title are displayed.

For example, if you are looking for a document that you know has the words "TPS report" in the title, you would enter: title: "tps report". If you are looking for a title but know only a few keywords that aren't next to each other, you can enter the keywords with quotations around each of the keywords. This will tell Drive to search for files that contain each of the separate keywords in the title.

2. type:

Chances are that with Drive you have created and stored more than just one type of file. Many of us use it to store multiple file types, which can make finding the file you are looking for more challenging.

If you know the type of document you are searching for, enter the operator type: followed by the file type (spreadsheet, document, pdf, presentation, drawing, image, and video) and then add keywords to direct Drive to only display these filtered, related results.

So, if you are looking for a presentation with the keywords "sales team" then you would enter: type:presentation "sales team". Be sure that when you are looking for a file type, there is no space between the operator and the type of file you are searching for.

3. owner:

Drive is highly collaborative and files that you have access to may not be stored on My Drive, or even owned by you. If you are looking for files that you know are owned by other team members try using the owner: operator.

When using this, Drive will present files owned by the email address that you enter beside the operator, and which have been shared with you. If you are looking for a file that is shared with you/on your Drive that is owned by sally@company.com, then you would enter: owner:sally@company.com. You can add keywords before or after the operator (as long as they are separated by a space) to filter results down even further.

4. is:starred

One of the more useful Drive features for users who deal with a large number of files is the ability to star important ones. By simply clicking on Starred on the left-hand horizontal menu bar, you can view all of your starred files. The issue many run across however is that that list does grow over time, making it less useful in finding important files - which kind of defeats the purpose of the feature in the first place.

If this has happened to you, then you can easily search for starred files by entering: is:starred along with keywords in the search field. This will tell Drive to only search for files that contain the keywords and are starred.

These are just a few of the more useful search operators available to Drive users. Do you have one you can't live without? Let us know! And, if you have any questions about Drive for your office, please contact us.

Published with permission from TechAdvisory.org. Source.

August 27th, 2014

socialmedia_Aug26_AHave you ever looked at images and visuals posted by businesses and users on Instagram? While many users take photos using their mobile devices, there are many images that simply look way too good to be taken with a phone camera, especially the ones without filters. Many business owners want to know how they too can take quality images like these too.

The truth behind some of Instagram's best images

Those awesome Instagram photos we see aren't always taken using mobile phones. Instead, many users use digital cameras which offer much better image quality. You can capture some amazing shots with a higher end DSLR cameras with multiple lenses.

If you have one of these cameras and are looking to create high-quality images for Instagram, or any other social media site, you may be slightly confused as to how to get the images onto the platform - especially since many of us use this via the mobile app. To make uploading a little easier, here is a brief guide detailing how to get images from your digital camera onto Instagram.

1. Transfer and process images

Once you have taken photos with your camera, you will need to get them off of your camera's memory and onto your computer's hard drive. Most camera's have apps that allow you to do this, so be sure to follow the instructions in the app that came with it.

When your images have been transferred to your computer, you are likely going to want to process them a little bit. This is especially true if you have a DSLR or other high-end point-and-shoot which takes RAW images. These can be quite large and are not compatible with Instagram.

Most images taken with a camera are quite large in size, so you are going to need to use an image editing program like Adobe Photoshop, or free tools like Pixlr to process them. What you are looking to do is to crop your images so that they are square.

If you are used to the advanced photo editing features, then do your edits before cropping. When you crop your images you should crop or resize them so that they are 640X640 pixels. This is the size of all images taken using Instagram's camera app.

Also, be sure to save the images as JPEGs, as this is the image format used by most smartphone cameras.

2. Save processed images in their own folder

It helps to create a folder somewhere on your hard drive (we recommend in the same folder where you save all of your other folders) that is specifically for images you want to post on Instagram.

When you have processed and edited the images to your liking, save the images here. Try using an easy to use file name like the date and a letter or note so you can easily tell which images are which, so you know which to use.

3. Move the images to your device

You can move images using the cloud or by manually transferring the images to your phone. If you decide to manually transfer your files, you will need to plug your device into your computer.

For users with iPhones, you can open iTunes and click on your device followed by Photos. Then select the box beside Sync photos from. Select the file you created in the step above and then Sync to transfer the images over.

For users with Android devices, plug your phone into the computer and drag the folder you created in the step above into the Photos folder of your Android device.

For Windows Phone users, plug your device into your computer and open My Computer on your desktop. You should see your device listed in the window that opens. Open the file system for your device and drag the image files you created above into the Photos folder of your phone.

If you choose to use the cloud to transfer your files, use the operating system's cloud (e.g., iCloud, Google Drive, or OneDrive) to upload the files. Just be sure to use the same account as the one on your phone.

4. Add images to Instagram

Once the photos are either on your device, or in the cloud, you can now upload them to Instagram. This can be done by:
  1. Opening the app and tapping on the camera icon.
  2. Tapping on the button in the bottom left of the screen.
  3. Selecting where the image is located on your device. E.g., the Gallery app if you placed the photos in your phone's hard drive, or the cloud service you used.
  4. Editing them as you see fit.
Once this is complete, you should be able to post your images as you usually do with any other Instagram image on your phone. Take the time to add filters, and hashtags as well as a good description before you post.

If you would like to learn more about using Instagram to share your images then get in touch and we will show you the advantages of the bigger picture.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
August 27th, 2014

office365_Aug26_AAs a manager or business owner the chances are good that you spend a fair amount of time editing or compiling documents your employees have created. Many of us use ever popular Microsoft Word to do this, especially when it comes to writing reports or other content. A common issue you may run across when editing is overtype. While this might be your preference, you may also inadvertently toggle it, so it helps to be aware of this function.

Word's two editing styles

Every version of Word used in businesses these days has the same two editing styles or modes:
  1. Insert mode: This is the default editing mode where words are inserted where the blinking cursor is placed. All text that comes to the right of the cursor will be moved to the right with newly typed text coming before it.
  2. Overtype mode: This mode replaces text to the right of the blinking cursor. So when you type new text any existing text to the immediate right will be replaced with the new letters.
While the vast majority of users prefer to use insert mode, overtype mode can be useful when editing documents and replacing words, or rewording paragraphs and keeping track of what needs to be rewritten.

Turning overtype on and off

On some older versions of Word, and on some computers, overtype mode is already enabled, and simply hitting Insert on the numberpad of your keyboard will turn it on. You will know overtype is active by looking at the status bar at the bottom of your document. The words OVR should be visible in bold letters.

If you don't see a status bar, try clicking on File > Preferences > View. Once in the View window, scroll down to the Windows section and tick Status Bar. Finally, press Ok and the bar should pop up at the bottom of the window.

Managing overtype

If you find that overtype cannot be activated, or have received a document where it is already activated and can't figure out how to turn it off, you can manage overtype by:
  1. Right clicking on the status bar at the bottom of the document.
  2. Clicking on Overtype to add it to the status bar.
  3. Clicking on OVR in the status bar to turn it on or off.
You can also activate or deactivate overtype by:
  1. Clicking on File followed by Options.
  2. Selecting Advanced.
  3. Scrolling down to Editing options.
  4. Ticking or unticking Use overtype mode.
If you untick Use overtype mode you will disable the feature, meaning you won't be able to hit Insert to switch between the two editing modes.

Looking to learn more about using Word in your office? Contact us today as we specialize in this area and have great tips, advice and solutions for you.

Published with permission from TechAdvisory.org. Source.

August 26th, 2014

androidphone_Aug26_AWhen you first get your hands on your Android smartphone, you’ll be asked about location services and whether you want to enable them. Google and your carrier will have its own location services that you’ll need to approve as well. But what you might not know is that there are actually a few other options for location services with Android which can affect your smartphone’s security. To that end, let’s take a look at how to change some of these Android settings.

Photos and GPS tagging

Your Android smartphone gives you the ability to attach GPS coordinates to the pictures you take, known as geo-locating or GPS tagging. This lets you arrange pictures in albums by locations, or lets Google+ stitch together stories of your trips. Geo-locating images in itself isn’t a bad thing, but you can get into trouble when you broadcast sensitive locations to the world. For instance, a picture of your expensive watch with a GPS tag of your house isn’t the best idea.

Four ways to control geo-locating photos:

  1. Go to your camera settings and you’ll find an on/off toggle.
  2. Simply go into Settings>Location and from there you can decide if you want the location saved along with your images.
  3. Download an EXIF editor and manually remove the location information from specific images.
  4. You can also turn off location services altogether by going to Settings>Location.

Discrete location settings

Apart from location settings in photos and GPS tagging, Android actually has three discrete location settings which allow you to set how accurately you want location reporting to be. You can find these at Settings>Location, Note that this affects your smartphone’s battery life immensely.
  • High accuracy: This uses the GPS radio in your phone to pinpoint its exact location from satellites while making use of nearby Wi-Fi and cellular networks too.
  • Battery saving: This mode only uses Wi-Fi networks and mobile networks to identify locations, and while it might not be as accurate it will help your phone last longer.
  • Device sensors only: This only uses the GPS radio to find you. It may take a little more time to find your location since it’s not using nearby Wi-Fi and mobile networks to get your general location first. This also uses more battery.
Having your location settings turned off will not only help keep your smartphone’s security intact, but also help strengthen your smartphone’s battery life. Interested in learning more about Android phones and their functions? We have solutions for you and your business.
Published with permission from TechAdvisory.org. Source.

August 26th, 2014

googleapps_Aug25_BWere you aware that when signing up for a new Gmail or Google account, users can only use a specific set of characters and numbers? While this is not an issue for many users, there are some who work with clients or suppliers who have email addresses that do not use these characters, making sending them emails via Gmail difficult. Google has recently announced a change to the characters supported by Gmail, one which could pose a bit of a security issue.

Google's recent character announcement

Until early August, any user who emails from a Gmail account had to use latin characters and numbers e.g., A-Z, and 1-9. While this fits for some users, there are a great number who have names and email addresses that use characters not in the standard English alphabet like 'É' or 'à'. In an effort to make things easier for a greater number of Google users, the company recently expanded support for different characters.

This means that Gmail will now understand addresses that use different scripts from the standard basic Latin alphabet (letters A to Z and numbers 0 to 9). According to Google, "This means Gmail users can send emails to, and receive emails from, people who have these characters in their email addresses."

Some of the scripts now supported include Katakana, Hong Kong (traditional Chinese), accented Latin characters, etc. While users with email addresses can send Gmail users emails, and vice versa, they are currently not supported by Google's account names. In other words, users who want to sign up for a Gmail account still need to use the basic Latin alphabet.

Why is this a potential security risk?

At first glance, this may not seem like the biggest security risk. Especially because many businesses have email addresses that use the basic Latin alphabet. But there is a security threat here, especially when you start to look at the characters used in other languages. Take for example the greek letter for lowercase omicron (ο) which looks a lot like our o.

When we write these letters on paper, they look the same to us, and there is no real harm. But when they are online, computers will read them as different. This is because of what is called Unicode. Unicode is a universal standard that dictates the difference between characters.

To us, the lowercase omicron and our letter 'o' look the same. But to computers, lowercase omicron is represented by the unicode: U+03BF, while the letter 'o' is represented by the unicode: U+006F.

Smart hackers will likely quickly figure out that they can replace basic Latin characters with others, and generate email addresses that take advantage of this. For example, you could see an email come into your Inbox from facebook.com, where one of the characters is actually an omicron. To us, there is no visual difference, but to the computer, the addresses are completely different. The email could have links to malware or tracking software that could lead to a breach in security.

Is anything being done to stop these characters from being exploited?

According to a post on the Google blog, the tech giant realizes this could be a potential security issue. "The Unicode community has identified suspicious combinations of letters that could be misleading, and Gmail will now begin rejecting emails with such combinations. We're using an open standard—the Unicode Consortium's “Highly Restricted” designation—which we believe strikes a healthy balance between legitimate uses of these new domains and those likely to be abused."

According to the Consortium, when applied to Gmail addresses, Highly Restrictive requires that characters must be from a single script, or from the combinations:

  • Latin + Han + Hiragana + Katakana,
  • Latin + Han + Bopomofo,
  • Latin + Han + Hangul
In other words, the overall security and legitimacy of addresses and sites that use other characters should be ensured..

What can we do?

To take it one step further, we also recommend that if you use Gmail, you look carefully at all email addresses. We can often spot the difference between letters and similar symbols used by other languages. If an address looks suspicious, it is a good idea to simply ignore or delete the email.

As with most other security measures, if you receive an email from large companies or institutions, such as banks, with what looks like a legitimate email address, always read the content closely. Almost every business and institution will never ask for you to provide passwords or login information in an email.

Essentially, ensure to be vigilant with email addresses, and if you have any further questions or concerns, contact us today to for our support solutions.

Published with permission from TechAdvisory.org. Source.

August 25th, 2014

Security_Aug18_AIt seems like nearly every week, and in some cases nearly every day, there is some security breach announced. The vast majority of these assaults tend to revolve around online user accounts, where password, account information, and even usernames are stolen. Over the years, there has been a general trend where the number of accounts breached or compromised is growing, and in early August news broke about possibly the biggest breach to date.

The latest big-scale breach

In early August, it emerged that a Russian hacker ring had amassed what is believed to be the biggest known collection of stolen account credentials. The numbers include around 1.2 billion username and password combinations, and over 500 million email addresses.

According to Hold Security, the company that uncovered these records, the information comes from around 420,000 sites. What is particularly interesting about this particular attack is that such a wide variety of sites were targeted when compared this with other attacks which tend to either attack large brand names or smaller related sites.

How did this happen?

Despite what many believe, this was not a one-time mass attack; all sites that were compromised were not attacked at the same time. Instead, the hacker ring – called the Cyber Vor – was likely working on amassing this data over months or longer. How they were able to amass this much information is through what’s called a botnet.

Botnets are a group of computers infected by hackers. When the hackers establish a botnet, they attack computers with weak network security and try to infect them with malware that allows the hacker to control the computer. If successful, users won’t even know their computer has been hacked and is being used by hackers.

Once this botnet is established, the hackers essentially tell the computers to try to contact websites to test the security. In this recent case, the computers were looking to see if the websites were vulnerable to a SQL injection. This is where hackers tell the computers in the botnet to look for fillable sections on sites like comment boxes, search boxes, etc. and input a certain code asking the website’s database to list the stored information related to that box.

If the Web developer has restricted the characters allowed in the fillable text boxes, then the code likely would not have worked. The botnet would notice this, and then move onto the next site. However, if the code works, the botnet notes this and essentially alerts the hacker who can then go to work collecting the data.

So, is this serious and what can I do?

In short, this could be a fairly serious problem. While 420,000 sites may seem like a large number, keep in mind that the Internet is made up of billions of websites. This means that the chances of your website’s data being breached by this ring are small. That being said, there is probably a good chance that one of the sites related to your website may have been breached.

So, it is a cause for concern. However, you can limit the chance of hackers gaining access to your information and a website’s information.

1. Change all of your passwords

It seems like we say this about once a month, but this time you really should heed this warning. With 1.2 billion username and password combinations out there, there is a chance your user name for at least one account or site has been breached.

To be safe, change all of your passwords. This also includes passwords on your computer, mobile devices, and any online accounts – don’t forget your website’s back end, or hosting service. It is a pain to do, but this is essential if you want to ensure your data and your website is secure from this attack.

2. Make each password different

We can’t stress this enough, so, while you are resetting your password you should aim to ensure that you use a different one for each account, site, and device. It will be tough to remember all of these passwords, so a manager like LastPass could help. Or, you could develop your own algorithm or saying that can be easily changed for each site. For example, the first letter of each word of a favorite saying, plus the first and last letter of the site/account, plus a number sequence could work.

3. Test your website for SQL injunctions

If you have a website, you are going to want to test all text boxes to see if they are secure against SQL injunctions. This can be tough to do by yourself, so it’s best to contact a security expert like us who can help you execute these tests and then plug any holes should they be found.

4. Audit all of your online information

Finally, look at the information you have stored with your accounts. This includes names, addresses, postal/zip codes, credit card information, etc. You should only have the essential information stored and nothing else. Take for example websites like Amazon. While they are secure, many people have their credit card and billing information stored for easy shopping. If your account is hacked, there is a good chance hackers will be able to get hold of your card number.

5. Contact us for help

Finally, if you are unsure about the security of your accounts, business systems, and website, contact us today to see how our security experts can help ensure your vital data is safe and sound.

Published with permission from TechAdvisory.org. Source.
Topic Security
August 22nd, 2014

Productivity_Aug18_AThese days many of us have integrated various apps and programs on our computers and mobile devices into our daily lives. The problem many of us face, however, is that apps and programs are all different and many don't work all that well together, so we need to take time to transfer information or even share the same content. To make things easier, there is a great app called If This Then That (IFTTT), that could help make your devices just that much smarter.

What is If This Then That?

IFTTT is a Web and mobile app that was developed to connect different Web apps like Google Apps, DropBox, Facebook, Instagram, etc, together into one general system. In general, the service runs on conditional statements - or recipes - that fit the IFTTT statement.

The service is set up on a number of different conditional statements that make up what the developers of the app call a recipe. Each recipe is broken down into two different sections:

  • This - Also referred to as a trigger. Each trigger in a recipe is kind of like a requirement in that the set trigger has to happen for the recipe to start working.
  • That - That refers to an action that happens when a 'this' condition is triggered.
Once you have set up a number of recipes, the app runs in the background to check for triggers and then will automatically execute the action when it notices a trigger.

Examples of IFTTT recipes

There are a wide variety of recipes out there that you can create. For example, some of the more useful IFTTT recipes for businesses include:
  • If a photo is posted on the business Instagram account, then it is shared with Twitter and Facebook.
  • If a Square payment is processed, then this creates a line in a specific spreadsheet.
  • If a contact is added to a phone's address book, then this information is placed on Evernote.
  • If an article is posted on a specific blog, then the post is shared on Twitter, Facebook, and Google+.
  • If an email is starred on Gmail, then a reminder is set on my phone to review starred emails.
  • If I enter the office, then my phone is muted.
  • If a client emails an attachment, then a copy is saved to DropBox.
  • If my device is in the office, then my office lights are turned on (if you have Phillips Hue bulbs).
There are a wide variety of supported apps that allow you to create recipes for nearly anything you can think of. The developers are constantly adding support for new channels (apps), including many from the Internet of Things.

How to sign up for this

Because you can access IFTTT from the Web and via an app on your mobile device, we recommend first thinking about how you are going to use it. If you are going to be using recipes for your mobile device, then we recommend downloading the app onto your device. Regardless of how you are going to use it, you can create an account by:
  1. Going to the IFTTT website (https://ifttt.com/)
  2. Clicking Join IFTTT.
  3. Setting a username and password and clicking Create account.
From there, you will be able to log in and start creating rules. If you do want to use your mobile device, you should then download the free app for your device - Windows Phone, Android, iPhone - and then log in using the account information you just created. When you first log in you should see a number of channels (apps) related to your system have been activated. This means you can now start creating recipes.

Creating recipes from your browser

  1. Go to the IFTTT website (https://ifttt.com/) and press Sign in.
  2. Press Create.
  3. Press This and select your trigger - try picking your app first, then click on it to get a list of actions.
  4. Press Create Trigger.
  5. Click That and select an action channel.
  6. Select Create Recipe.
You can also click Browse from the menu bar at the top to find and activate already created recipes.

Creating recipes from your mobile device

  1. Open the app.
  2. Press the mortar and pestle icon at the top-right.
  3. Press the + followed by the + besides If on the next screen.
  4. Select the app from the icons at the top of the screen, and select the related trigger.
  5. Tap the + beside Then and select an action or app.
  6. Press Finish to activate the new recipe.
If you are looking for a cool way to connect different apps, and even save yourself time, then this could be something worth looking into. And, if you are looking to learn more about how you can increase your productivity, contact us today to see how our systems can help.
Published with permission from TechAdvisory.org. Source.

Topic Productivity