Blog

May 30th, 2016

2016May30_Browsers_BAccording to Statcounter’s April web browser usage report, Google Chrome accounts for over 60 percent of the market share. However, out of all those people how many are employing any of the truly helpful extensions offered in Chrome’s web store? The answer is almost certainly less people than the number of those who have problems that could be easily fixed by one of these extensions. Read on to find out if one of our favorite extensions could solve any of your biggest browser complaints.

crxMouse Chrome Gestures

Whether you’re switching between a dozen tabs or hopping around the company website, web navigation can start to feel a bit tedious. If you’ve got two monitors, or just a large screen, moving your mouse to the top of the screen to constantly open and close tabs can really slow down your rhythm. One solution is to learn all of the keyboard shortcuts. An even better one is the “crx Mouse Gestures” extension, which allows you to assign mouse gestures to different browser actions.

Want to go back a page? Right click and drag the mouse to the left. Want to open a new tab? Right click and drag up. Gestures allows you to customize everything, including the motions themselves. In the options menu you can draw custom gestures, for example a box, and tell crx to tie that motion into opening your Gmail inbox in a new tab. It takes no time at all to incorporate the shortcuts into your browsing habits and significantly boosts your browsing efficiency.

Readability

When it’s time to slow down your browsing and read the most recent election article or a recipe you want to try, the page is often cluttered with social sharing buttons, advertisements and stock photos. With the “Readability” extension all of this gets cleared away with the press of a button, leaving you with a clean, text-only page.

In addition to allowing for customization of font, size, and color of your “reader” page, this extension also allows for you to “save for later” and “send to my Kindle”. Readability is a perfect addition for anyone doing a lot of reading who is tired of pages containing more clutter than useful content.

OneTab

After installing the last two extensions you may find yourself with a stack of tabs sandwiched along the top of your screen. Too many open tabs can cripple your available memory. A lot of us open tabs as notes, reminders, and things to check some time in the distant future, which is why you’ll love OneTab. With this extension you can condense all of your open tabs into one page that lists each of them for easy access when you’re ready to return to them.

In addition to reducing your memory usage by up to 95 percent, OneTab will let you share your condensed tab list. If you’re working on research for a client, open all the relevant tabs and with the click of a button OneTab will create a site with a shareable link so you can send them to anyone you’d like.

Black Menu for Google

This extension puts all of Google’s sites, services and apps right in your browser menu. After clicking on the icon, a customizable menu drops down with sites like Drive, YouTube, Gmail and more. But these menu items are more than just links to your inbox and videos. When your mouse hovers over the different options it actually opens a miniaturized window, allowing you to view any of your Google services without opening a new tab or window.

Instead of opening a new tab, navigating to YouTube and searching for a video, clicking on the Black Menu icon will open a miniaturized search function. You don’t even need to open a new window or tab to watch the video; just click play and when you’re finished, clicking outside of the menu will make it like it never happened. For anyone working closely with Drive, Gmail or Google Calendar, this extension can save a lot of time.

Pop-out Youtube

If you love the Black Menu extension, but need a little more functionality out of your YouTube experience, Pop-out YouTube is the next step. This extension allows you to turn any video into a new browserless window that stays on top of all of your other windows. If you need to transcribe something, one click of the extension will pop out the video and you can click a window behind it and start working away without spending 20 minutes trying to perfectly size the window so everything remains visible.

As a quick note, there are dozens of extensions that block ads and those annoying links that overlay your cat videos. Unfortunately, Pop-out Youtube does not include this feature and it’s a good idea to install one of those as well.

Taco

Most of the extensions listed above improve the ease and flow of your internet browsing, but Taco focuses on integration to boost productivity. At its core, this extension replaces your Chrome ‘new tab’ page with a customizable framework for all of your third-party services.

With various templates and layouts, you can organize and combine tasks and notes from over 40 services including Evernote, Google, Salesforce, Trello and more. Any time you’re about to start a new project, open a new tab to search for whatever you need to complete it. But before you hit that ‘Google Search’ button, drag the task item into your ‘doing’ lane and off you go. Finished your work and need to check how your home team is doing in their game? Open a new tab, move the task to your finished lane and check the score.

These are just some of our favorite extensions. If you’d like more suggestions or support for anything Google related, we’re here for you -- don’t hesitate to call.

Published with permission from TechAdvisory.org. Source.

Topic Web & Cloud
May 27th, 2016

2016May27_iPad_BYou may still be on the fence about whether or not to purchase an iPad Pro for your business. While you can find a lot of coverage on Apple’s latest tablet online, you may wonder what actual users think. Today, you’ll discover just that. CIO, a website that delivers the latest news and tips for IT professionals, recently surveyed 11 iPad Pro users to get their feedback. Here’s their thoughts on the good and bad.

The good

  • Great for short, focused bursts of work - The iPad Pro is lightweight, turns on quickly and features some exceptional iOS multitasking features. These qualities make it a perfect alternative to a laptop for short, focused bursts of work. One user surveyed noted that taking out his laptop for thirty minutes or less of work is tiresome and is also unfeasible at times. The iPad Pro solves this problem, allowing him to even get work done in taxis.
  • Speed - When compared to iPad Air 2, the iPad Pro has made huge improvements when it comes to speed. The iPad Air 2 is slow when opening a large file or program and when switching between apps. However, the iPad Pro performs these same tasks lightning fast thanks to Apple’s A9X 64-bit processor and 4GB of RAM.
  • Split View enhances productivity - Let’s face it, we all multi-task to some extent, and Split View has really made it easier than ever. If you’re in a meeting and need to toggle between your email and a note application or web page, Split View eliminates the now unnecessary step of hitting the home button first and then opening the other app. All you have to do is slide your finger across the display to bring up different apps you may want to use.
  • Works wonders for note taking - With the iPad Pro, taking notes is now like the good ol’ days when you sat in class and scratched down on a pad what the teacher said. While back then that pad was made of paper, today’s pad is digital. How is this possible? It’s all because of the Pencil stylus, which acts like a real pencil. Essentially, this turns your iPad Pro into a virtual notepad with the ability to keep all your notes in digital format in one easy and convenient place. What’s more, your notes are automatically accessible from all your devices.

The bad

  • Subpar keyboard - According to one user, there is still much to be desired from Apple’s smart keyboard. It lacks buttons such as the home key and keys to adjust brightness and volume. Also it doesn’t have backlit keys, which can make it difficult to type if you’re in a dark place.
  • Browser too often displays mobile website - The tablet tends to use mobile websites when browsing the web (which could be because the iPad Pro uses iOS 9 instead of a full blown desktop operating system). Obviously, this can be annoying as mobile websites are generally not as functional as the desktop version. With that said, iPad Pro can handle the desktop version perfectly fine, you just have to manually switch over to the desktop version on many occasions.
  • Limited storage - While the Microsoft Surface Pro allows users to add storage via micro SD memory cards, the iPad Pro has no option to increase storage. Of course, you can alternatively store overflow files and data on the cloud; however, keeping sensitive data there is not ideal for many business owners.
  • Fragile screen - The iPad Pro’s retina display is capable of producing beautiful images, but the screen is also incredibly fragile. One user noted that even if you drop it from less than a foot off the ground, you are still likely to break the screen, which is not an inexpensive fix.
We hope this feedback provided by early iPad Pro adapters can help you make an informed decision as to whether or not Apple’s latest tablet is suitable for your business. If you’d like to learn more about Apple products or need to service some of your own, don’t hesitate to get in touch.
Published with permission from TechAdvisory.org. Source.

Topic apple
May 26th, 2016

2016May26_Office365_BNot every business owner who migrates to the cloud achieves great results. As much as the service is touted with words like “freedom”, “productivity” and “collaboration”, realizing the full benefits of these words is not a given. So if you’re thinking about transitioning to the cloud, how can you ensure you optimize the technology for your business? Well, it all starts with your attitude before migration. Here are some mental-shifts you should make before getting started.

Consider cloud value over costs

When considering the cloud, too many business owners get hung up on costs. Instead, it makes more sense to think about how the cloud impacts their business and saves them money. The old saying, “you have to spend money to make money” is ever so true here. And as a business owner, the cloud is no different than any other investment you took to grow your organization. That’s why you should remember the cloud provides you value, such as the ability to work anytime, anywhere, and easier collaboration.

And of course, you shouldn’t just think of how the cloud benefits yourself, but also your IT managers and staff. In fact, before migrating to the cloud, why not go ahead and ask your IT leaders just how the cloud will benefit your business? They’ll likely mention how it can boost the productivity levels of all your employees, while making everyone’s job easier.

Think “strategy” before migration

Once you’ve considered the value the cloud provides, you’ll likely have some ideas of what goals you’ll want it to accomplish at your business. If you haven’t, now is the time to do so - before signing up for the service. Let’s say for example, you want to gain the productivity benefits of your staff being able to work from anywhere at anytime. How can you do this? When you roll out the cloud in your company, have the specific goal of increasing mobile use or adoption among employees. Talk with your IT leaders to devise a plan they can implement.

When it comes to your other cloud goals, clearly define them beforehand and then talk with your IT staff to come up with the nuts and bolts plan to accomplish that goal. By doing this, you’ll achieve much better results with your cloud service.

Learn to love the quickly evolving nature of the cloud

As the cloud is still a new technology, it is rapidly changing. New updates, features and enhancements are rolled out regularly, and if you want to get the most out of your cloud it’s best to keep up. Of course, this is a scary idea for many business owners and IT managers alike as the old way of doing things is rolling out new features and apps over long periods of time.

Some cloud services make it easier than ever to keep up with changes. Let’s take Office 365 for example. Adding users and implementing new changes can take mere minutes. Yes, it may be scary to do so, but remember, Microsoft and your IT managers are in your corner - they are there to support you. Of course, you may still have some bad memories from updating your legacy technology. Let us assure you, updates to Office 365 are nothing like this and require a small learning curve. Most new features are intuitive by nature, making adjustment to these changes painless and problem-free.

One of the best ways to assure your cloud updates go as smoothly as possible is to have an IT leader who’s enthusiastic about the technology be responsible for managing it. A cloud enthusiast is much more likely to be up-to-date on the newest features and enhancements and can quickly share with you whether or not an update will benefit your business.

When it comes to cloud migration for your business, it’s pretty much an all or nothing decision (unless of course you go with virtualization, which is a different topic altogether). The cloud will become an integral part of your business, and you and all of your staff will interact with it on a daily basis. So be prepared for a big transition and a big payoff of higher productivity and connectivity for you and your staff.

Are you ready to embrace the cloud with a solution like Office 365? Give us a call, and talk with us about a cloud migration today.

Published with permission from TechAdvisory.org. Source.

Topic Office
May 25th, 2016

2016May25_Virtualization_BWhether you only need a dozen, or a hundred, the process of deciding on and acquiring software licenses can be very frustrating. Many of us had hoped that cloud computing and virtualization would alleviate some of these headaches. Unfortunately, we’re not there yet, which is why it’s important to understand all of your licensing options when deciding on a virtualized environment -- let’s take a look.

Why are licenses an issue?

Virtualization is a complex topic, so let’s have a quick review. Most people are starting to work the concept of cloud storage into their everyday lives. Think of virtualization as a cloud where your server(s) store their hardware capabilities and your network computers can pull from that cloud as needed.

In this scenario, let’s assume employee A and employee B have two identical desktop computers with barebones hardware. Employee A needs to perform some basic text editing while employee B needs an in-depth scan of your client database. With the right infrastructure management, both employees will connect to your business’ server for the necessary physical processing power and server-hosted software. That means employee A will request the appropriate amount of processing power to edit text (which is likely very little) from the server, while employee B requests a much larger chunk of RAM, processing and harddrive space for scanning the database.

Understand so far? Because it gets really tricky when we start asking how many licenses are required for the server-hosted software. Licensing models were originally based on the number of physical hard drives with installed copies. However, in a virtualized environment that’s not an accurate reflection of usage. Using the most recent platforms, administrators can divide up their CPU into as many virtual machines as the SMB requires.

What do current virtualized licensing models look like?

Sadly, the virtualization and software industries are still deciding what’s the best way to move forward. The very vendors that sell the software required to manage the creation of virtual machines and segmentation of your server disagree about which model to use.

The company behind the popular VMware software has switched to a per-virtual-machine model after a huge response from customers, while other powerhouse vendors like Oracle and Microsoft have stuck with the per-CPU-core model that is based on server hardware capacity.

In any software selection process there is almost always the option of open source software. Under the open source model there are no licenses and usage is free, and just last month, AT&T committed to virtualizing 75 percent of its office under the OpenStack cloud computing platform by 2020.

What should I do?

In the end, software license considerations and total cost of ownership calculations should be a huge factor in how you plan to virtualize your SMB. When discussing the possibility of an infrastructure migration with your IT services provider, make sure to ask about the advantages and disadvantages of different virtualization platforms compared with their licensing models. You may find that paying more for hardware-based models is worth it, or that open source platforms provide you with everything you need.

No matter which platform you choose, remember to list every piece of licensed software in your office. Find out which licenses you can keep, which ones you’ll need to update and most importantly what the license migration will cost you in the short and long run.

This might seem like too much to handle at first. The process of virtualizing your SMB alone is enough to have you reaching for the aspirin. By contacting us you can avoid the headache entirely; we’ll walk you through all of the steps necessary to guide your organization through this next step in modernizing your business model.

Published with permission from TechAdvisory.org. Source.

May 23rd, 2016

2016May23_VoIP_BNot that long ago, VoIP services were a new and revolutionary concept. Nowadays, internet-based voice communication is commonplace among SMBs, which means it’s time to turn our attention toward improving their security. Without a thorough understanding of what is needed to protect your VoIP systems, you could be vulnerable to cyberattacks. Let’s take a closer look at 5 important tips for protecting your web-based communication devices and services.

Types of threats

The majority of VoIP services involve live communications, which often seem far more innocuous than stored data. Unfortunately, your business has just as much valuable information moving across VoIP networks as it does hosted on company servers. Internet-based calls are far more vulnerable to fraud compared to more traditional telephony services and face threats from identity theft, eavesdropping, intentional disruption of service and even financial loss.

24/7 monitoring

A recent study by Nettitude reported that 88 percent of VoIP security breaches take place outside of normal operating hours. This could be attackers trying to make phone calls using your account or gain access to call records that contain confidential information. This can be avoided by contracting outsourced IT vendors to monitor network traffic for any abnormalities or spikes in suspicious activity.

VoIP firewalls

Every VoIP vendor should provide a firewall specially designed for IP-based telephony. These protocols will curb the types of traffic that are allowed, ensure the connection is properly terminated at the end of a session and identify suspicious calling patterns. Consult with your VoIP or IT services provider about which of these features are available and currently in use at your organization.

Encryption tools

One of the reasons that eavesdropping is so common is because a lack of encryption. Inexperienced attackers can easily download and deploy tools to intercept and listen to your calls. Although some services claim built-in encryption, be sure to investigate how effective they really are. Many of these protocols require the same VoIP client on the receiving end of the call -- something that’s much harder to control. Encryption should be compatible with as many other software clients as possible to effectively prevent anyone from undermining the privacy of your calls.

Virtual private network

Virtual private networks (VPNs) create a secure connection between two points as if they were both occupying the same, closed network. It’s like building a tunnel between you and the call receiver. In addition to adding another layer of encryption, establishing a VPN can also overcome complications involving Session Initiation Protocol trunking, a recommended VoIP feature.

Password protection

Usually password protection refers to requiring password authentication to access sensitive information. However, in this case it actually means protecting the passwords themselves. Eavesdropping is one of the easiest, and most common, cyber attacks against VoIP networks and even with all of the protocols above, employees should be instructed to never give out any compromising information during a VoIP call.

VoIP is as important as any of your other network security considerations. It requires a unique combination of protection measures, and we’d love to give you advice on implementing any of these protections or managing your VoIP services. Give us a call today to get started.

Published with permission from TechAdvisory.org. Source.

Topic VoIP
May 20th, 2016

2016May20_BusinessContinuity_BLike all things man-made and otherwise, business continuity plans are not perfect. They too have pitfalls that can result in your business's failure if not accounted for immediately. Don’t blame it all on the IT guy, as often times the way a system is designed can also have loopholes. Here are a few of the reasons why business continuity plans fail.

Over-optimistic testing

The initial testing attempt is usually the most important as it’s when IT service providers can pinpoint possible weak points in the recovery plan. However, what usually happens is a full transfer of system and accompanying operations to the backup site. This makes it difficult to look at specific points of backup with too many factors flowing in all at the same time.

Insufficient remote user licenses

A remote user license is given by service providers to businesses so that when a disaster strikes, employees can log in to a remote desktop software. However, the number of licenses a provider has may be limited. In some cases, more employees will need to have access to the remote desktop software than a provider’s license can allow.

Lost digital IDs

When a disaster strikes, employees will usually need their digital IDs so they can log in to the provider’s remote system while their own system at the office is being restored. However, digital IDs are tied to an employee’s desktop and when a desktop is being backed up, they are not automatically saved. So when an employee goes back to using their ‘ready and restored’ desktop, they are unable to access the system with their previous digital ID.

Absence of communications strategy

IT service providers will use email to notify and communicate with business owners and their employees when a disaster happens. However, this form of communication may not always be reliable in certain cases such as the Internet being cut off or with spam intrusions. There are third-party notification systems available, but they are quite expensive and some providers sell them as a pricey add-on service.

Backups that require labored validation

After a system has been restored, IT technicians and business owners need to check whether the restoration is thorough and complete. This validation becomes a waste of time and effort when the log reports come in a manner that is not easy to compare. This usually happens when IT service providers utilize backup applications that do not come with their own log modules, and have to be acquired separately.

These are just some of the many reasons why business continuity plans fail. It is important for business owners to be involved with any process that pertains to their IT infrastructure. Just because you believe something works doesn’t necessarily mean that it works correctly or effectively. If you have questions regarding your business continuity plan, get in touch with our experts today.

Published with permission from TechAdvisory.org. Source.

Topic business
May 19th, 2016

2016May19_AndroidTablet_BSorry M&M fans, but the codename Android M doesn’t stand for your favorite chocolate after all. Android 6.0, or Android Marshmallow, as it’s officially called, was more than just enhancing user experience with Android Lollipop. Although it looks a bit similar to Lollipop by retaining the Material design theme, the new features that come with it are apparently smarter and well, sweeter. We have rounded up a list of new features that you can expect when your tablet finally updates to Android 6.0.

Now on Tap

Google’s digital personal assistant is being made more efficient in giving you quick answers and in figuring out what you may want to do next. Now On Tap can be activated by pressing on your tab’s home button, which works for both onscreen and the physical button. A short animation or a card will appear that will give you quick information based on the context of what is currently on your screen. For example, you are chatting with a client regarding a new restaurant, Now on Tap can give you directions to the restaurant, its contact information or Yelp review. This deep-linking technology also includes shortcuts to apps on your tablet and is also applicable to voice searches. It’s designed in a way that it appears when you need it and disappears so you can resume what you were previously doing.

Android Pay

With the increasing popularity of mobile payment, Google is trying again after the dismal performance of the Google Wallet. The latter is being changed for peer-to-peer payments only, while Google Pay allows you to pay for both in-store and in-app purchases. Google’s newest mobile payment system lets you purchase goods from 700,000 participating stores by using your tab’s NFC technology. Also, checking out in mobile shopping apps is a walk in the park using Android Pay.

Doze

Don’t you just hate it when after a few hours of taking the tablet off the charger, you’re left with just 2% battery life? With the Doze mode in Android 6.0, it promises to make your tablet last even longer. This new power-saving feature even uses a lot less power than the current Standby mode. In Doze mode, your tablet hibernates when you put it down for a lengthy period. That means your tab will not be disturbed by power hogging apps, but will still be receiving incoming messages, phone calls and important alarms.

Redesigned App Drawer

Marshmallow comes with a new design for the app drawer - that part in your tablet where all your installed apps are located. A search bar at the top makes it even easier to find an app. Google also remembers your app-opening frequency or periods and can make suggestions on what apps you might want to use. Instead of scrolling left and right, the app drawer now scrolls up or down which is reminiscent of older Android versions.

Android for Work

This may not be a very appealing addition to many but for those who bring their tablet as a BYOD (Bring Your Own Device) device at work, this is definitely sexy. Android Marshmallow improves the way it handles security, notifications, VPNs, access and storage. So much so that one device can be used for both home and work purposes.

Fingerprint API

This update may not be all that apparent, but now your Android tab comes with support for a fingerprint reader. This allows you to unlock your tab and its apps, and also to easily verify payments.

App Permissions

Now you can have greater control over the security and privacy of your tablet by approving permission requests on a need-to-use basis. Previously, these apps required carte blanche permission to look at parts of your tablet you actually didn’t want them to. With Android Marshmallow, WhatsApp may not ask for permission to access your photos until you try to take and send one.

However, keep in mind that some apps may not function optimally if you restrict it to resources that it actually needs. Not sure how to proceed when it comes to app permissions? Having problems in updating your tablet’s software? Or are you finding it difficult to integrate your BYOD device with technology at work? Get in touch with one of our experts to assist with any of your technology issues.

Published with permission from TechAdvisory.org. Source.

Topic android
May 18th, 2016

2016May18_HealthcareArticles_AA recent initiative to give healthcare patients access to the notes their doctor or clinician writes about their visit is continuing its meteoric rise across the country. OpenNotes began a few years ago by researching the benefits of allowing patients to have access to their doctor’s notes. Since that initial study, the number of healthcare providers who have agreed to sign on has steadily risen. What is this service and how does it work? Let’s find out.

What is OpenNotes?

OpenNotes allows patients to view their nurse’s and doctor’s notes via online portals that can be accessed from home computers, tablets, or smart phones. Patients receive notifications whenever their doctor adds or modifies a note, a prescription refill is needed, or a follow up appointment is requested. Under the initial study performed by OpenNotes, 99 percent of patients opted to continue using the service, and 100 percent of doctors agreed to continue providing their notes to the patients.

Advocates believe that increasing communication, in this case electronically, results in patients who are “active partners in their care”. Over the years, reaching outside of the doctor’s office and into a patient’s smartphone or computer has resulted in improved medication adherence and reduced the number of note errors. Currently the service claims 7 million patients are in their network.

Is it secure?

All of that sounds great, but how safe is the information that’s being sent back and forth? A recent study by Carestream about patient perceptions of online portals found that, of the respondents who reported an aversion to using the service, the biggest concern (by a very large margin) was security and privacy. The OpenNotes website and press releases try to assuage these concerns by pledging their support during onboarding, but unfortunately threats come in all shapes and sizes nowadays. Often software that requires a lot of security is only as good as the hardware and the protocols you assign to it, and those may be outside of the scope of OpenNotes support staff. Additionally, there is a push for multiple providers to share a single online portal so patients only need one login. With all of this in mind, and the recent string of ransomware attacks on healthcare data, the possibility of an attack is greater than ever before.

Should your practice adopt OpenNotes?

Currently, that decision still depends on the dynamics specific to your practice. However, with more and more providers signing on to OpenNotes, and the government inching toward mandating healthcare information sharing, your network needs to be ready for integration. The healthcare sector has been at the forefront of data collection, and implementing online patient portals of any kind, OpenNotes or otherwise, means a massive increase in online exposure.

OpenNotes has stated that their goal is for 50 million patients to be a part of their network within the next three years. Regardless of whether your practice decides to help them reach that goal, or not, protecting your data needs to be a top priority. For questions and concerns about data security and implementing online patient portals, give us a call.

Published with permission from TechAdvisory.org. Source.

Topic Healthcare
May 18th, 2016

By Darren Hardy

“Everyone looks so much better when they smile.” Jimmy Fallon, host of the legendary The Tonight Show

What a meteoric ride Jimmy Fallon has had to the top!

How did this son of an IBM machine repairman get to the chair once occupied by maybe the most legendary figure in comedy TV for 30 years straight, Johnny Carson?

He did it through exceptional networking.
In the span of about five years, Jimmy went from a Saturday Night Live alum, unsuccessfully navigating Hollywood, to a late-night star and host of NBC’s The Tonight Show, one of the most respected franchises in entertainment. This did not happen by accident…

Fallon’s meteoric rise is partly due to his intense focus on developing relationships with people who could advance his career.

Another key? Fallon worked his butt off.
While still a computer-science major at Albany’s College of Saint Rose, he performed comedy at small clubs and obsessed about the comedy industry.

Through a connection with his former employer at a New York alternative newsweekly, his audition tape reached Hollywood agent Randi Siegel, who had ins with the crowd at Saturday Night Live.

Siegel found 21-year-old Fallon’s performance to be charmingly amateur, but she could see that he was naturally talented. She gave him a call and was surprised to hear, after introducing herself, “Randi Siegel! I know who you are!”

Randi was so impressed by his knowledge of the comedy industry and enthusiasm that she agreed to take him on as a client. With Siegel’s connections, Fallon was able to eventually get hired as a cast member with SNL in 1998.

At SNL he developed the relationship that would define his career.
The show’s creator, Lorne Michaels, is so powerful and respected in the industry that cast members are often intimidated by him. As a rookie, Fallon was no different, but he wanted to befriend Michaels. So after every show, he went over to Michaels and thanked him for the show.

Michaels developed a rare friendship with Fallon. Following the drama of Conan O’Brien’s short stint as host of The Tonight Show, Michaels decided that his trusted Fallon would take the renowned position.

Fallon made a point of connecting with former Tonight Show host Jay Leno and would ask for advice. Leno said, “Most people in show business think they know everything. They don’t really listen to the other person. ‘Respectful’ is the best word I can use for Jimmy.”

His approach worked.
Since starting in February 2014, Fallon has attracted around 4 million viewers each night, with a much higher share of the 18-49 demographic than his predecessor.

What Fallon did is a) he worked hard (let’s not forget that), and b) he networked brilliantly by asking questions of others, listening, acting on their advice, showing gratitude and being a genuinely good human being.

So, who are three connections you dream of networking with in order to boost your success?

 

Darren Hardy is the visionary force behind SUCCESS magazine as the Founding Publisher and Editor, and is the New York Times and Wall Street Journal bestselling author of what has been called “the modern day Think and Grow Rich”: The Compound Effect—Jumpstart Your Income, Your Life, Your Success (www.TheCompoundEffect.com) and the world-wide movement to onboard 10 million new entrepreneurs through his latest book The Entrepreneur Roller Coaster–Why Now is the Time to #JoinTheRide (www.RollerCoasterBook.com). Access Darren: www.DarrenHardy.com and get free daily mentoring: www.DarrenDaily.com

 

Topic Articles
May 17th, 2016

2016May17_Security_BUnfortunately, we’re confronted with new web security threats every day, and today is no different. Experts have exposed a flaw in ImageMagick, one of the internet’s most commonly used image processors, that could put your site in harm’s way. By learning more about this vulnerability you’ll take the first step toward better protecting your content.

What is ImageMagick?

ImageMagick is a tool that allows sites to easily crop, resize, and store images uploaded by third parties. Vendors continue to improve user interfaces and experiences by consolidating functions into all-in-one packages, which means administrators are becoming increasingly unaware of what specific services they are actually utilizing. ImageMagick is deeply integrated into countless web services and many webmasters may not even be aware they are using this unsafe software.

How can an image make my site vulnerable?

Recently, it was discovered that images can be uploaded that force ImageMagick into executing commands and permitting attackers to remotely insert harmful code into vulnerable sites. Images are actually made up of complex code that is translated into photos, icons, etc. Different file extensions use what are called “Magic Numbers” to define their file types. Manipulating these numbers allows attackers to exploit a flaw in ImageMagick. The service scans the uploaded file, and attempts to decode the source information whenever it detects the file is not what it claims to be. Scanning that code and attempting to rectify the file misappropriation can then trigger whatever was hidden inside the image and result in remote command of your site.

How should I protect my site?

ImageMagick has admitted knowledge of the security flaw and promised to release a patch very soon. Until then, experts advise implementing multiple workarounds to keep your systems safe. However, if you're not well acquainted with your web server and its code, then it's wise to consult an expert instead of attempting these changes on your own.

For those who are familiar, follow these steps. The first is to temporarily incorporate lines of code that preemptively block attackers from exploiting these holes. Those lines of code, and where to insert them, can be found here.

The next step is double checking that any image files utilizing the ImageMagick service aren’t hiding any harmful information. This can be accomplished by opening an image file with a text editor, and checking for a specific set of letters and numbers at the beginning of the text that define what type it is. The list of these “Magic Numbers” can be found here, and will reveal if an image is hiding its true purpose.

Ideally, administrators will halt all image processing via ImageMagick until a patch is released from the developers.

Data security is one of the most crucial aspects of any SMB, however, keeping up with the constant flow of security exploits and patches can be overwhelming for administrators of any ability level. Why not contact us to learn more about keeping your network secure and protected from exploits like this one?

Published with permission from TechAdvisory.org. Source.

Topic Security