The beauty of the Cloud is that it brings important files into reach from wherever you are. But the typical rule of thumb with technology is, the more convenient it is the more vulnerable it is. So if you want to be able to work from anywhere, but the files you're using are sensitive. Read on to learn some tips on how to secure sensitive files in the Cloud.\
1. Change your password regularly. Most enterprise grade cloud storage have a feature to create a policy that will force users to change their passwords every 30 to 60 days. But even if it doesn't, create a reoccurring calendar event that reminds you to change your password.
2. Password protect mobile devices. Any device that you use to access the files(phone or laptop) should be password protected. These devices should also be configured to lock themselves if they've been idle for awhile.
3. Encrypt your devices. If your files are synced to your devices hard drive, it's important to encrypt it in case it's lost or stolen. Even if your device is password protected, it's possible to gain access to the files on the hard drive if it's not encrypted. The good news is Windows 10 Pro, OSX and most smart phones have the ability to be encrypted without any additional software.
As always, if you have any questions we're here to help. We hope this is useful!
If you're running Mac OSX 10.13 or "High Sierra" a major security vulnerability was found that could allow anyone with physical access to your computer have full access to it.
What was found was that if you tried to log in with the username "root" and a blank password over and over again it would eventually let you in. In case you don't know "root" is Apple's equivalent of "administrator". So that person would have full permission once in to do what ever they like.
Since then, Apple has released a security update to patch the issue. So it is highly recommended that you check the App Store to make sure you are up to date on all security updates. To do this simply open the App Store and go to the "Updates" tab and install all of the updates until there's no updates available when you refresh the page by hitting command+R.
If you have anymore questions or concerns about your PC or Macs security feel free to reach out and let us know. That's what we're here for.
We hope you enjoy today's post from Solve technician, Erick Collins.
We all know and “love” the general rules we have to follow when creating a password for a new site or program:
•Capital and lowercase letters
•A total of at least 8 characters
•A index finger of your first-born son
The above may be a slight stretch, but you know the usual. Just remember that these rules help to keep hackers from cracking that confidential password and getting into your information. These are easy rules to follow; but difficult passwords to remember. However, for the past several years, password managers have become a useful component for business as well as the personal computer use. Below, are several great applications for password storage:
Password - I have used 1Password personally, with great ease. At about $3/month, I could access all my passwords with one master password from my iPhone, tablet, and PC browsers, like Google Chrome.
LastPass - At $12 per year, LastPass 4.0 Premium is on the low side for a commercial password manager price-wise, but on the high side feature-wise. It spotlights on syncing passwords across all your devices, powerful multi factor authentication, and automated password changing.
Dashlane - Its automated password changer handles many popular sites, and advanced features like emergency access and secure sharing, which keep Dashlane at the top of the heap. It is famed for its slick interface and ease of use. Although it does have a $40/year premium version, it seems they have a free version for use as well.
If you find yourself constantly having to change your passwords due to forgetting them , or misplacing that magical password sticky note, a password manager may be an unknown necessity.
There's a lot of talk anymore about how the NSA has leaked exploits that hackers can use to get into your computers, and how ransom ware viruses are running amok and causing all sorts of problems. But the leading cause of data breaches and computer infections are not exploited software bugs. It's exploited human fear.
Not only is Information Technology a relatively new field, but it's a rapidly changing field. Where the stakes keep getting raised as more and more of our lives and our livelihood is put into the hands of computers and little "clouds" in the internet.
Human psychology 101 is that we tend to fear what we don't understand. So whenever you get a call from someone at Microsoft saying your computer has a virus and all your data is compromised. Or you get a pop up that locks up your whole computer saying that all your files will be deleted unless you call this number in the next 5 minutes. They're all attempts to insight your fear, so that you'll do something or trust someone that you typically wouldn't.
Here's a few pointers to keep in mind. To help you respond, instead of react.
If you have any questions feel free to reach out to us in the contact page. You may not trust your computers, but you can trust us.
Back in April Microsoft began to release the newest build of Windows 10, dubbed the "Creator's Update". And that's when the wheels began to fall off. As the update was pushed out to more and more PC's we began to get more calls about user's having internet issues after the update was installed. Being IT professionals who like to preach keeping PC's up to date, we poured a lot of time into finding a fix for the issue while allowing people to keep the update. But it seems rolling your computer back is the only option to truly fix the internet issues caused by the Creator's Update. Now that news has surfaced that Microsoft has accidentally released experimental versions of a newer Creator's Update that is also causing problems, we thought it was time to bring up the subject.
First off, not everyone who installs the Creator's Update has an issue with it. We haven't been able to find a trend in the PC's that do have an issue. But I would still recommend installing it first to see if you will have any issues.
If you install it and begin to notice issues then you can follow the instructions below to roll back your computer. Then once you do that we will include some instructions on how to defer those builds from installing in the future.
I would certainly suggest calling us, or whoever your IT provider is first. But if you're in a pinch and need a solution now, you're welcome to follow the steps below.
Before you begin rolling back to previous builds, it's crucial that you confirm that you have the Creator's Update. If you do not but think you do and decide to roll your computer back, you could potentially roll your computer back 6 months by accident.
So once you have confirmed that you do have the Creator's Update here's how to remove it.
Now that you know that the Creator's Update has caused issues on your PC and you've removed it. Now let's prevent it from installing again. Don't worry, after you do this you'll continue to get security patches just not the new build.
Everyone agrees that security for your network and PC's is a great idea. Afterall, whether your data is stored at your office or in the cloud, any place it is accessed from could be exploited. So, we manage those PC's closely to protect your data.
But what we tend to forget about are our phones and tablets. We live in a world where we gauge the convenience of a service on if they've developed an app for your phone so you don't have to log in with your computer.
If your phone fell into the wrong hands, they'd probably have access to all your emails and text messages. If you use OneDrive or Dropbox to manage your files, they'd have access to all of those as well.
We can't afford to think of our mobile devices as "lesser technology" anymore. If you're just responsible for yourself or a small team, it may be easy to enforce security measures such as lockscreen passwords. But it's easy for details to slip through the cracks. Especially in large teams.
That's why Office 365 and G Suite have mobile device security policies. These allow you to enforce policies on any mobile device that has email on it such as a mandatory passcode, screen timeouts and even remotely wiping phones that are lost or stolen.
If your email currently is not hosted on Office 365 or G Suite there are other solutions that can allow you to manage the mobile devices in your organization. Either way, at least you can sleep well at night knowing all your bases are covered!
Revoking the admin rights for all of your users could be one of the most secure changes your make to your computer network. It's common to allow all your users to use admin accounts, that way they can install any software and make any changes they need to without issue.
The problem is that 97% of critical vulnerabilities that were found last year specifically require admin rights to be effective. But the good news, is that when you revoke admin rights, that leaves 97% of the critical vulnerabilities from last year harmless.
Even if you give the admin password to everyone so that they have it when they need it. That would still be more secure then having everyone operate with admin rights. If you have any questions, feel free to reach out. That's what we're here for.
Office 365 and Google Apps (now called G Suite) are locked in a very healthy competition to deliver the best office productivity suite to us. But with everything that's provided, it can be pretty overwhelming for the consumer to read through. So here is the Triad Tech Guys breakdown of Office365 and G Suite.
G Suite is relatively simple offering 2 plans:
G Suite Basic - $5 per user per month
G Suite Basic includes:
G Suite Business - $10 per user per month
G Suite Business includes:
Office365 offers many different plan options, ranging from $5 per month per user to $35 per month per user. You can see all the plans they offer with their pricing and offerings here:
Office365 and G Suite both offer excellent email interfaces, the main difference between the two come down to email organization and capacity. G Suite uses a label organization where you can apply multiple labels to one email, whereas Office365 employs the more classic folder filing structure. As far as capacity, G Suite email storage ranges from 30 GB to 1 TB to unlimited, depending on the plan and amount of users. Office 365 offers 50 GB for all it's plans with the exception of one which offers unlimited.
Office365 offers the full Office suite with all of it's plans, with the exception of two email only plans. The difference is some plans only allow the use of the applications on the web while the rest allow the applications to be installed on a computer for offline use. Microsoft has made some good changes to Office in the name of collaboration. But G Suite was built from the ground up to be used online for collaboration and can create and edit any file for Microsoft Office.
4. Video Calls
Here's three things to keep in mind about the differences between video calls:
Hopefully this will be a helpful place to start as you make the right decision for your business. Both of these tools are helpful to any business but depending on your size and needs G Suite and Office365 are very different products.
As computer viruses evolve, their methods become more sophisticated, even going so far as to hold your computer and your data hostage, hence it being called “ransomware”. Ransomware is a new type of virus that is quickly on the rise. There are three types of ransomware, here they are in order of severity:
Depending on the flavor of ransomware you end up getting, these can be extremely costly. Not just if you decide to pay the ransom or not. If mission critical data ends up being tied up, then it can cost business downtime as well as any costs associated with having to recreate business critical data.
Speaking of the ransom, cyber security experts recommend not paying the ransom. Mostly because there is no guarantee that you’ll get your data back. Also it can make you a target for more attacks.
So then how do you protect yourself?
It seems that, as an IT consultant, a lot of my conversations end up circling back to the same questions. What is the “cloud”? And can it be trusted? The first question is way easier to answer then the second.
The cloud is an internet based service that offers anywhere access for an annual fee. Pretty much it means you pay someone to put your stuff on their equipment and let them manage it. Some good examples are file storage options such as Dropbox or Google Drive where they allow you anytime, anywhere access to files. Other examples are Quickbooks Online and Office 365 hosted Exchange.
The pros of these services are extremely enticing. Convenience being at the top of the list. For a monthly fee you are no longer responsible for maintaining these services. No more scheduling downtime for upgrades, no more having to increase storage to keep up with growth. No more having to manage disaster recovery practices. Along with the convenience of less maintenance, you have the convenience of anywhere access. Where at one point you had to go into your office to do your work, now the cloud makes everything you might need in your office available with a laptop and an internet connection. Without a doubt, the monthly fee for cloud services is not just to pay someone to manage your stuff, but it is also to pay for convenience.
The cons mostly revolve around security and reliability. Afterall, paying for cloud services is a lot like buying insurance. You give them money and they give you a promise that they’ll be there whenever you need them. But, at the end of the day, it’s still just a promise. And with data breaches with large companies still on the rise, security should be a big concern. A small company can store their data with a big name cloud provider and lose their advantage of anonymity, if that large cloud provider is hacked.
So what can you do?