Blog

September 2nd, 2015

iPad_Sep2_BFor millions of happy users all over the world, the iPad is fantastic just as it is. It’s easy to use, and there are literally over a million apps to choose from and enjoy on the App Store. But there are also people who want to escape Apple’s restrictions. They resort to jailbreaking, a process of altering Apple’s software to remove the limitations placed upon it. Jailbreaking can open up new tweaks that allow for more flexibility in how you use your iPad, but it can also present a myriad of problems, including security concerns. Here’s what you need to know about jailbreaking, and why you should never attempt it on your iPad.

What is jailbreaking?

In a nutshell, jailbreaking is the act of removing hardware and software restrictions on Apple’s iOS, or otherwise making modifications to the device without Apple’s authorization. When you jailbreak your iPad you can install third-party software from external sources, and also manually download files from the Internet. You can change your iPad’s default look, too, and feel, as well as make a number of system tweaks that render your device more useful.

Why you should NOT jailbreak

We advise against jailbreaking. But this is not just our opinion - even Apple says the same in its technical support base articles addressing the issue. Here are some of the reasons jailbreaking is a bad idea.

1. Third-party apps are dangerous - Apple closely monitors its App Store for good reason: because malicious apps can wreak havoc on your device. Downloading and installing applications that haven’t been approved by Apple is risky in many ways. Unofficial apps may contain malware that could slow your device down, steal your sensitive information, eavesdrop on private communications - the list goes on.

2. Say goodbye to warranty cover - Although it’s perfectly legal to jailbreak your iPad, Apple has made it clear that jailbroken devices will no longer be protected under their warranty service coverage. If you mess up the process and can’t restore the device yourself, you’re basically on your own.

3. No more iOS updates - When you jailbreak your iOS device, you’re unable to update to the latest iOS versions. Technically you can, but you’ll lose your jailbreak, meaning you have to re-jailbreak your device and then re-install all your jailbroken apps and extensions. What’s more, if you decide to update your iOS you may have to sit out and wait for an updated jailbreak version to become available, which could take days, weeks, or even months.

4. Device instability - This is one of the biggest reasons why you should stay away from jailbreaking; it can lead to random reboots, and devices not working properly. You may find that your iPad crashes more often, that certain key features and apps no longer work as they normally would, and that your battery life becomes much shorter.

5. The need for jailbreaking is diminishing - The main benefit of jailbreaking, in most cases, is to modify the system in ways which Apple wouldn’t normally allow. But as Apple adds more features to iOS, the same need for jailbroken apps which provide those features is no longer there. For instance, some jailbreak tweaks allow for inter-app data sharing and split-screen multitasking, both of which are being introduced in the latest iOS version.

The detrimental effects of jailbreaking far outweigh the benefits, so why jailbreak your iPad for some minor tweaks when you can wait for Apple to release a more stable update? If you want more iPad tips, get in touch with us today.

Published with permission from TechAdvisory.org. Source.

Topic iPad
September 2nd, 2015

In a December 2014 survey by the National Small Business Association, 61% of small businesses reported being victims of a cybercrime within the past 12 months.

The average cost to recover from a cyber-attack skyrocketed from $8,699 per attack in 2013 to $20,752 per attack in 2014. And, of the businesses targeted, 68% said they’d been hacked more than once.

Experts agree, as cybercrooks become ever more sophisticated, the threat to small businesses is going to get worse before it gets better…

So what can you do to beat the bad guys?

Here are three common ploys used by hackers – and how you can fend them off:

Phishing – A really legitimate-looking e-mail urges you to click a link or open a file that triggers a malware installation on your computer.

Best Defense: Don’t let anyone in your company open files or click links in an e-mail unless they’re certain who it came from.

Cracking Your Password – Hackers can run programs 24/7 testing password combinations. The easier your password is to guess, the more likely it is they’ll crack it.

Best Defense: Consider using a password manager that generates and stores tough-to-crack passwords. For extra security, use unique passphrases for financial accounts in case the manager gets hacked.

Drive-By Download – You visit what appears to be an innocent site; yet when you click, your device gets hacked – and you may never know it, until it’s too late.

Best Defense: Make sure your browser is up-to-date, or use one that updates automatically, such as Firefox or Chrome. Internet Explorer users have been found to be most vulnerable to these attacks.

Unfortunately, these three examples are just a small sampling of the dozens of ever more ingenious ways cybercriminals are breaking down the doors and destroying unprepared businesses.

Let us help! Through September 30, call our office and receive a FREE 15-Point Cyber-Security Audit to uncover gaps in your company’s online security.

Our highly trained team of IT pros will come to your office and conduct this comprehensive audit. We’ll then prepare a customized “Report Of Findings” that reveals specific vulnerabilities and a Prioritized Plan Of Attack for getting any problems addressed fast.

To take advantage of this limited-time offer, just call our office at 203-268-5947 x101 or visit www.CrestviewIT.com/SecurityAudit to schedule yours today.

Topic Articles
August 31st, 2015

The Ashley Madison hack is simply the latest case of a big time company having valuable data stolen. It’s a trend that shows no signs of subsiding, so you would be foolish to not pay attention to it. Want to know what your business should learn about security from this scandal? Here are three important takeaways from the Ashley Madison hack that your company should take note of.

1. Make sure your company’s security data is actually secure

You probably tell clients their information is secure, but just about every company makes that claim. One of the biggest mistakes made by Ashley Madison was the failure to know if its data was truly secure. The company publically lauded its security, but it now seems like those claims were rather hollow. In fact, it appears as if no one at Ashley Madison knew a whole lot about its security practices until it was too late.

Don’t simply pass off your business’s security to the IT department. Being involved will allow you to see how it works. You don’t need to be a tech expert to understand how your data is being secured. Your security provider, whether it be in-house or via a managed services provider, should be able to explain security practices in layman’s terms. This will allow you to ask questions and be proactive because chances are if you see a weakness, others will notice it as well.

2. Beware of your employees and their email and Internet activities

Another takeaway from this scandal was the fact many employees, both from private companies and government offices, were using business email accounts to sign-up for Ashley Madison and office Internet connections to access the site. Putting the ethical questions aside for a moment, public sentiment is undoubtedly negative and companies with employees who used Ashley Madison at work have been exposed to the scandal’s backlash.

By placing the appropriate email and Internet security solutions in place at your business, you can reduce the amount of risk your company is exposed to by employees. No one really wants to put restrictions on their employees’ Internet and email access, but it is important to be smart. Being connected to scandals like this can bring unwanted publicity to your business. Worst of all, your employees might not even realize they are putting your company in harm’s way when they access this type of content at work.

3. Be prepared for data loss

As the Ashley Madison case has shown us, massive data theft or loss can be the end of your business. When clients trust your business with their data, they are confident in your ability to protect it. Of course, things do happen and if your data does go missing, it’s important to have a plan of action ready. While it’s unlikely your company’s data breach is unlikely to garner the attention of Ashley Madison, it means a whole lot more to you, your company and your employees. Just because your company isn’t big doesn’t mean it’s invincible.

A disaster recovery plan can help your company ensure it has backups and even backups of your backups. If you believe your data has been stolen by hackers, it is important to act immediately. You’ll need to quickly assess what information has been stolen and inform the appropriate parties so they can take the necessary steps to protect themselves. From there, you will want to re-secure your company closing any security loopholes that have been found. Finally, access your backups and make sure your business continues to operate as close to normal during the crisis.

Worried about your security? We can show you how to protect yourself. Contact us today for more information on how to keep your company safe.

Published with permission from TechAdvisory.org. Source.

Topic Security
August 28th, 2015

Healthcare_Aug28_AAs a business owner in the healthcare sector, you'll be familiar with “Electronic Medical Records” (EMR). But implementing an EMR system into your practice is a big decision, and will only work if you have the full cooperation of a majority of staff members, if not all. To avoid the struggles, and headaches EMR implementation, here are some tips to prepare your employees for EMR.

1. Make a clear announcement

Announcing the transition is an extremely important part of the success of your implementation. Start off by presenting the need for a change in a formal, referenced way which proves the advantages of switching over to a paperless system. Every staff member should understand what is happening, what their tasks are, and what is to be expected of them during and after implementation.

The presentation should highlight the many benefits of EMR and how the initial expenses can be justified with the long-term cost savings down the road not to mention more streamlined operations. Once equipped with all the facts, your team will likely be more receptive to new technology.

2. Focus on top staff members

You should focus on gaining acceptance from the top tier of staff, especially senior physicians and administrators. The entire implementation process can be made so much easier with support from the staff who carry authority and have the relevant knowledge.

3. Designate super users

It is more practical to identify one or two super users, who will be the go-to people for any EMR questions other staff in your company may have. Equip them with the knowledge and skills they need to provide tips and guidance to others. But you can’t just choose anyone for the job - you need people who have high computer literacy and are able to quickly keep up with changing technology. If you don’t have any super users in mind, you can identify these people by conducting an internal job search and select those that qualify for the position.

4. Conduct feedback sessions

Once your EMR has been successfully installed and you begin using it with patients, you’ll probably come across a few problems along the way - whether it’s a function that your staff don’t understand, or workflow processes that needs to be redesigned. The only way to quickly resolve this is to ask staff for feedback. Schedule a weekly or bi-monthly feedback session to discuss with your staff about how they’re handling the changes, and whether anyone can highlight areas of that could be improved.

5. Take advantage of online resources

A super user would have answers to any EMR-related questions that come up, but this isn’t always the case. In these circumstances, you can browse educational materials provided by your EMR vendor. They are a valuable source of information that contain training manuals, video tutorials, community forums, and webinars.

Implementing a new EMR system brings about many challenges for your practice. By following the tips outlined above, you can avoid employee resistance and even accelerate the transition process. Want to integrate an EMR system into your business? Get in touch with our technicians today and find out how we can help.

Published with permission from TechAdvisory.org. Source.

August 26th, 2015

Browsers_Aug20_BEven the most fanatical Google fan has cause to use browsers other than Chrome from time to time. After all, while Chrome might have crept a long way up the popularity scale, there are still alternatives out there - among them Firefox, Safari and even Internet Explorer. Whether you prefer to use another browser on a particular device or just haven’t got around to installing Chrome on it, you’ll still want to have your Chrome bookmarks handy in order to speed up your work. Here’s how to go about accessing your bookmarks from elsewhere.

Whereas in the past it was possible to sync bookmarks saved in Chrome to your Google Docs account, this ceased with the transition from Google Docs to Google Drive. You can still save your bookmarks, but they are now only accessible on other devices if you use Chrome there too. Go online with Firefox or one of the other alternatives and you’ll be left without the easy bookmark access you rely on. The alternative is to use the Bookmarks Anywhere browser extension, which syncs your Chrome bookmarks to your other browsers and updates them live as you add to the list. Here’s how to do it:

  1. Within Chrome on the device that contains the bookmarks you want to sync, download the Bookmarks Anywhere extension from the Chrome Web Store.
  2. Once the extension has been added, a popup will appear. If you’re not already logged in, sign in to the Google account you use in Chrome; you’ll then need to grant Bookmarks Anywhere the browser permissions it requires.
  3. Your Chrome bookmarks will now be synced to the Bookmarks Anywhere site. To access them from non-Chrome browsers on your other devices, just sign in to www.bookmarksany.com using your Google account and a list of your bookmarks will appear. You can also manually add new bookmarks from this page, though these don’t appear to sync back to your Chrome bookmarks menu.
If you want to discover other simple ways to boost your productivity through better use of IT, give us a call and we’ll show you how.
Published with permission from TechAdvisory.org. Source.

Topic browsers
August 26th, 2015

Windows_Aug26_COne of the most underrated aspects of Windows 10 is Cortana. This do-it-all personal assistant is going to revolutionize the way you use your computer. Cortana operates in the same manner as Siri and other digital voice assistants, but on your laptop or PC. We’ll dig a little deeper to show you how to set up Cortana and what you can do to maximize her uses.

If you are using Windows 10, it’s likely you have come across Cortana at least once or twice. While you might fear that the effort involved in setting up the feature isn’t worth the time you will save once Cortana is up and running, you would be mistaken. Configuring her is quite simple and she is more helpful than you might realize.

Setup

For starters, you will want to have your microphone turned on if you plan on using voice commands, and all the privacy and locations settings enabled. Cortana will not work if these have not been activated. From there, she will give you a brief overview of her capabilities and ask you a few questions to get to know you better.

Once that is completed, you are going to want to spend a few minutes testing her out and seeing what she can do for you. This awkward, getting-to-know-you stage might seem like a waste of time but, once you have a good feel for Cortana, you’ll be more inclined to use her in the future.

Maximize Cortana

Now that Cortana is ready to assist you, it’s important to utilize her as a personal assistant. Here are a few areas she can really come in handy:

Find that document - Ever saved a document somewhere to later forget where it was stored? Simply ask Cortana to look for it by saying, “Hey Cortana, find (file name),” and she will bring it up for you. Let’s say you are looking for Word documents located in multiple folders on your computer; all you have to say is, “Hey Cortana, find my Word documents,” to have her pull up all your Word files.

Easily start tasks - Football season is nearly upon us and that means fantasy football season is here. Utilizing Cortana could give you the extra edge needed to win your league this year. If you want to check on Tony Romo’s status, say, “search for Tony Romo injury,” and the search results will pop up for you. Want to make a sneaky trade offer to John before your rivals? Say “email John Fantasy Football,” and a window with his e-mail address will pop-up. Of course, these features are universal and you don’t have to like or even know what fantasy football is to use them.

Answer your questions - One of the coolest features about Cortana is the fact that when you ask her a question she will not only show you the answer, but speak it as well. Want to know what the weather is like in Denver? Just say, “Hey Cortana, what’s the weather in Denver,” and she’ll give you the lowdown on it. Need to know when your next meeting is taking place? Ask Cortana and she’ll reply with the answer. This is especially nice when you’re in your office but away from the computer.

Talking to Cortana is nice, but speaking with a person about your IT is better. Contact us today for all your technology needs.

Published with permission from TechAdvisory.org. Source.

August 26th, 2015

BusinessIntelligence_Aug25_BAs you seek to better understand your customers and make more informed business decisions, dashboards are a critical addition to your business intelligence toolbox. But there are many types of dashboards out there, each with unique purposes - how do you determine which one is best for your company? We’ve listed three of the most widely used dashboards below.

Strategic dashboards

Ideal for senior managers and executives, strategic dashboards are designed to help identify potential opportunities for business expansion and improvement. This type of dashboard doesn’t provide information in-depth enough to make complex decisions, and is typically is updated once a month or quarter.

Benefits of strategic dashboards As the name suggests, strategic dashboards are designed to provide strategic guidance. The dashboards give a bird’s-eye view of your business. They can contain anything from overall sales numbers to sales and revenue comparisons, or inventory levels, making it easy for executives to understand the overall health of the organization.

Analytical dashboards

This type of dashboard provides users with insights from a volume of data collected over time, enabling you to understand why certain things are happening, and what changes should be made in the future in order to accommodate them. The data presented in analytical dashboards tends to be complex, and usually requires advanced training to use. That’s why they are generally used by business analysts, instead of being widely deployed to other employees and across all departments.

Benefits of analytical dashboards When it comes to creating and implementing strong business strategies, understanding the trends and events in your data is crucial. Analytical dashboards provide detailed information that allows you to compare current against historic data. Implementing analytical dashboards allows you to enjoy in-depth analysis, identify patterns and opportunities in your data, and determine why processes are working in certain departments.

Operational dashboards

Operational dashboards are used to monitor the real-time operations of employees, allowing them to measure the effectiveness and efficiency of their work performance. This type of dashboard is commonly found in departments where it’s essential to respond to critical information quickly, such as those working in sales and marketing.

Benefits of operational dashboards Business owners rely on operational dashboards to track their employees’ progress, and to be notified of issues as they come up in order to respond quickly. What’s more, the dashboards provide up-to-date information, all bundled in one place, making it easy for employees to make quick decisions without having to dig through large amounts of data.

Dashboards concentrate all data, metrics, and parameters in one place, bringing a totally new dimension to business intelligence. Your company can significantly benefit from the right dashboard. If you’re looking to implement dashboards for the first time, or to enhance the functionality of your current dashboard, get in touch with us today.

Published with permission from TechAdvisory.org. Source.

August 26th, 2015

You regularly back up your computers (or at least you should), but do you do the same with your smartphone? Given the massive amounts of contact information, photos, videos and other data we all carry around on smartphones, it’s critical to back them up or risk losing all that data forever. There are two basic ways to back up your phone: automatically to the cloud or manually to your computer.

 

To The Cloud. Cloud backups are secured with your password-protected account. They can easily be configured to run automatically so you can “set it and forget it.” Apple users can use iCloud to back up photos, contacts, calendars and other data. Turn on and configure iCloud Backup by going to Settings > iCloud. Android users can back up to Google servers in much the same way, using a Google account. Configure your preferences by going to Settings > Backup.

 

To Your Computer. Both Apple and Android users also can back up data directly to a computer manually. Generally, connecting the phone to the computer by cable is the quickest way to do this. Apple users can also use iTunes Wi-Fi Sync to wirelessly back up phone data to a computer. Remember, though, when backing up your smartphone to a computer, your data is only as safe as that computer. Be sure to back up the computer regularly as well.

August 21st, 2015

As technology continues to evolve in the healthcare industry, new developments are being made to improve the quality of delivering patient care. Breakthroughs in treatments, communication systems, and information gathering have provided healthcare practitioners with new tools to better serve patients. With that said, here are some of the biggest impacts technology has made in healthcare.

Enhanced information access

There’s no doubt that more and more people are using the Internet to research their medical issues. The introduction of Internet has allowed countless people to look up symptoms, exploring treatments and medicines on the web. Now that’s not to say that paying a visit to a doctor is a bad idea. But browsing for information online has enabled patients to understand what kind of symptoms they’re having, and allowed them to make better decisions about what to do next.

Better treatments and less suffering

Technology has also brought about new and innovative machines, medicines, and treatments that have the potential to save lives and improve the chance of recovery for billions. Not only can sophisticated technologies help patients heal and recover directly, they have also assisted researchers to make healthcare even more effective.

Take surgery for example. The invention of new medical tools and treatments, such as anesthetics, has enabled doctors to perform operations that were not possible before. They can undertake surgeries slowly and carefully, without worrying that their patients might feel pain or have their body give up altogether.

Improved patient care and staff efficiency

Electronic medical records have made patient care safer and more reliable than ever before. Physicians and nurses use portable devices to store patients’ medical records and check that they are administering the correct treatment. What’s more, results of lab tests, medicine orders, and patient information are all electronically stored in the main database, allowing for future reference.

Healthcare staff also benefit from technology - they have instant access to thousands of case studies, medical textbooks, and detailed patient history. Technology has also created telemedicine, a practice that enables doctors to consult with professionals from all over the world to diagnose, treat, and research conditions more effectively.

Medical trends prediction

Major search engines are now capable of predicting medical trends such as epidemics and flu outbreaks, based on the health information that users search for. Although not everyone who searches for “flu” is actually sick, these search queries tend to be popular when flu season is happening. The queries are added together to estimate how much flu is circulating in countries around the world. Medical experts are able to apply this information to take preventative measures and respond to outbreaks quickly.

Technology is paving the way for patients to live healthier lives. If you’re looking for efficient technology solutions to propel your healthcare business forward, don’t hesitate to contact our experts today - we have the perfect tools for all your needs.

Published with permission from TechAdvisory.org. Source.

August 20th, 2015

InternetSocialNetworkingandReputationManagement_Aug18_BOnline Reputation Management (ORM) is something ever more companies are investing in. Even small and medium-sized businesses are getting in on the act. In today’s world, a company’s online reputation is more likely than ever to make or break them. The good news is setting up your company’s ORM is probably easier than you think.

ORM is still a relatively new concept, and one that small and medium-sized business owners may not yet be familiar with. Simply put, ORM is the monitoring and protecting of your company’s reputation online. Not only are you looking out for what your company is producing, but also what other people are saying about you.

You only control a limited amount of your company’s message. Consumers using social media control the rest and can often times make or break your company. That is why more and more businesses are investing resources in ORM. While many companies choose to handle their ORM in-house, there are ORM service providers who can take care of the process for you.

Search for your company

Once you’ve determined who will be looking after your ORM, it’s important to see how your business stacks up. The first thing you should do is search for your company on Google. The results are often telling for your business. Being at the top of the search results is a good sign, and shows your website has strong SEO terms and social media presence. If your company doesn’t appear on the first two pages of search results, or the results that come up aren’t what you want people to see, it’s time for your ORM team to get to work.

Bolster your online presence

Creating quality content - to boost where your business shows up in the search results, or push down negative content - is the next step for your ORM. Remember, most people only bother with the first two pages of Google search results, so you want to own those. Other ways to bolster your online presence include registering with online business directories like Yelp or Yellowpages.com. These sites almost always rank very well in search results.

Another positive step would be to expand your social media portfolio to include sites you might not think of right away, like Google+, YouTube, Pinterest and even Tumblr. Being active on just a couple of these channels can further improve your exposure.

Set up a monitoring system

Finally, setting up a monitoring system will ensure your ORM is always up to date with your company's online profile. Signing up for Google Alerts can guarantee you are always informed of new brand or keyword mentions, while tools like Tagboard and TweetBinder will search various social networks for keywords and hashtags related to your business. These are valuable tools to ensure you’re on top of what's happening to your business online.

At the end of the day, your online reputation needs to be not only robust, but sterling as well. That is why dedicating resources to ORM can not only protect your business, but help it grow as well. Clients will find your business easily when they search for it, and the results they do find will be the things you want them to see.

Want to know more about ORM or anything else internet-related? Contact us and we can help your business today.

Published with permission from TechAdvisory.org. Source.