Blog

May 30th, 2014

voip_May26_CImplementation of a VoIP solution can offer businesses many tangible benefits. However, without proper management and IT support for VoIP solutions, you could see a negative impact on your productivity. You may experience limited communication from both customers and employees, especially when it comes to mobile or remote workers. The challenge is how you can expand your VoIP capabilities to become effective on-the-go.

To benefit from the positives that VoIP can bring to businesses it is necessary that VoIP works with the reality of your business needs. When it comes to catering for out-of-office workers, there are a variety of ways you can help expand the mobility of your VoIP services.

1. Look into Unified Communications

If your employees are able to bring their own personal mobile device to work, your IT administrators likely rely heavily on users complying with your company’s policies. It is up to you to establish good security and compliance measures in order to meet the needs of both your customers and employees.

A solid solution is to look into Unified Communications (UC), which integrates real-time communication services such as instant messaging, telephony, data sharing, and video conferencing. In other words, UC helps bridge the gap between VoIP and other computer-related communication technologies, as well as help control presence, a status indicator that conveys willingness to communicate and single number reach.

2. Employ easy to use apps

Believe it or not, most top-rated business apps began as user-focused tools to help people find data more independently. Some of these apps have transformed into more customized tools to keep focus on specific business needs. The one problem with this is that satisfying these needs often sacrifices overall usability. If your employees are struggling to use the mobile version of your VoIP solution, then they likely won't.

What this can lead to, especially when a mobile solution is required, is use of unauthorized apps. The problem then is that this can lead to an increased security risk. To avoid this, try implementing an app or tool that is easy to use, easy to navigate and easy to manage.

3. Work with an experienced solution manager

When looking to expand existing VoIP solutions, or implement new ones, it can be tough to actually manage the solution and ensure that it works when you need it to. One of the best ways to achieve this is to work with an IT partner like us. The perk to outsourcing management of a solution to us is that you can have us get your apps and solution set up and then take over administration of your mobile services once his is established.

4. Cloud support

Having on-premise equipment and support for your VoIP solution is a good idea. However, the problem here is your existing IT team may not be ready for the challenge of providing cloud-based mobile app or voice support. We recommend you go for a hosted VoIP solution, which delivers the same cost-effective, network-based service but where the equipment is based at a provider’s site rather than in your data center. This eliminates the cost of on-premise gear, maintenance costs, and overall management, while increasing the overall effectiveness of your mobile solution.

Expanding VoIP mobile capabilities can enhance business productivity by effectively keeping both your customers and employees in contact with your business more easily. If you’re interested in learning more about VoIP solutions, don’t hesitate to contact us today.

Published with permission from TechAdvisory.org. Source.

Topic VoIP General
May 21st, 2014

AndroidTablet_May19_CAndroid has become a far-reaching system, found on almost every type of mobile device. Tablets are among the most useful of these devices, and many Android tablet owners use Google's apps like Drive. In an effort to make Drive even more accessible, Google has recently released standalone versions of Drive's productivity apps.

A tiny problem with Google Apps

While the number of companies using Google Apps is certainly on the rise, there is a slight issue with the way the office productivity apps are set up. In order to access them on your mobile device, you have to first either open Drive in your browser or open the app. From there you can access the different files and open and read or edit them.

If, for example, you want to create a new spreadsheet, you have to open the Drive app and then create the spreadsheet on there. While this setup is great for many users, if you are a heavy user of Drive, and want to find this spreadsheet later on down the road, you are possibly going to have to search for it in Drive, potentially wading through hundreds of files.

This makes the productivity suite on mobile devices like tablets slightly less efficient, and could extend the time you need to take to work on a project. To many tablet users, this is counterintuitive to the main reason people use tablets in the first place - the device and the apps are meant to speed up work or at the very least accelerate efficiency.

Google's solution

Google has realized this issue and set out to fix it. Their simple solution was to create standalone versions of their popular productivity apps. What this means is you can now download the Docs, Sheets, and in the near future Slides, app. Opening each individual app will show all of your related files.

When you open the Docs app, for example, you will be presented with a list of all of your Docs, with the last opened or edited at the top. At the top of each app is a menu bar. Pressing the magnifying glass will allow you to search for a Doc while the other buttons rearrange the viewing order of your files.

Press the file folder and the folders on your Drive that contain Docs (if you are in the Docs app) or Sheets (if you are in the Sheets app) will be displayed. Finally, pressing the plus sign will allow you to create a new file. The files that you open using this app can be read and edited just as they would be in Drive.

The best feature of these apps

While these apps are ideal for mobile users, the best feature of the standalone versions is that support for offline creation and editing of files is built in. This means that if you aren't connected to the Internet, you can still open the app and create a new file or even edit existing ones. This is regardless of whether you have selected them to be available offline from the browser or mobile version of Drive. If you open the app, it should update all documents automatically to their last backup.

Where can I get these apps?

The apps are currently available for free on the Google Play store. You can find the Docs app here, and the Sheets app here. Keep your eyes peeled for the Slides app, which Google has noted will be out soon.

Looking to learn more about Google's mobile products? Contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

May 13th, 2014

Security_May13_CThe tool that allows the vast majority of businesses to utilize the Internet in order to carry out their day-to-day operations is the browser. While there are numerous browsers available, many businesses rely on Internet Explorer (IE). This browser comes pre-installed on all machines using Windows. However, if you use IE, there is a new exploit that you should be aware of.

What exactly is a zero-day flaw?

A zero-day flaw is a security vulnerability that is taken advantage of by hackers on the day it is discovered. In other words, there are zero days between the discovery of the vulnerability and people taking advantage of it.

The way most software programs work is if a user finds a security flaw, they will usually inform the developer who will then develop a fix and release it in a patch that users download. The problem is, sometimes it is a hacker who discovers this vulnerability. Instead of reporting it, they start to capitalize on the flaw, exploiting it to attack other users before the developer becomes aware of it and has a chance to fix it.

The IE zero-day flaw

In late April, news broke that a zero-day flaw had been discovered in Internet Explorer's code. The flaw affects IE versions 6-11 - essentially every supported version of the browser. Hackers had found a previously unknown flaw that allowed them to gain the same access rights as a user.

How it worked is that the hackers sent emails to users with links to a website that hosts a malicious code. These emails were largely phishing in nature, meaning they aimed to get the user to click on a link in the email. Some of the subject lines used in attacks included:

  • Welcome to Projectmates!
  • Refinance Report
  • What's ahead for Senior Care M&A
  • UPDATED GALLERY for 2014 Calendar Submissions
In these emails there was a link to a website that hosted a code which could then be executed if the user visited the site using IE. When executed this could potentially expose the user's system. Once vulnerable, the hackers could install malicious software without the user's knowledge.

How do I guard against this exploit?

The good news is that Microsoft has released a patch that fixes this exploit. This has definitely been welcomed, and what is really interesting is that Microsoft has actually released the update for XP users as well - this coming after the cessation of support for XP.

To guard against the exploit you should firstly update the version of Internet Explorer that you are using. The easiest way to do this is to go to the Internet Explorer website and download the latest version - version 11 - of the browser. Version 11 can run on both Windows 7 and 8, so the vast majority of users should already be running this latest version.

If you are using an older version, Microsoft has pushed the patch out via both IE's automatic update feature - so restarting the browser should install the update. The other option is Windows Update. Simply running the Update program and installing the updates should ensure that the latest version of IE is installed.

For Windows 7 and 8 users, you can do this by:

  • Opening the Control Panel on your system.
  • Clicking on System or Performance and Maintenance followed by System.
  • Selecting Automatic Updates from the menu in the window that opens.
  • Following the instructions in the new window that opens.
Once installed, you should restart your computer if you aren't asked to do so. If you noticed that Automatic Updates was already ticked, try restarting your computer and this should install the updates.

If you are using XP, you can visit the Microsoft Update website using Internet Explorer and following the instructions.

Aside from updating your browser, you should ensure that your anti-virus and malware scanners are up to date and scheduled to scan your system on a regular basis. Be sure to look at all emails closely as well, if one seems a bit dodgy, or you receive one from someone you don't know, it is best to ignore it and delete it right away.

Businesses who are using XP should seriously consider updating because Microsoft will not be introducing security updates in the future, leaving your systems at greater risk of attack. At the very least, it may also be a good idea to switch to another browser like Firefox or Chrome, both of which will work on XP and are updated regularly.

Worried that your systems are not secure enough, or still running XP? Contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
May 8th, 2014

AndroidPhone_May06_CWith the advent of Heartbleed, Bluebox released the Bluebox Heartbleed Scanner, a tool that can help smartphone users see if they are vulnerable to the Heartbleed bug. Despite the fact that around two-thirds of the Web is vulnerable, nobody knows the full extent of the problems it has caused yet. The sooner you learn more about Bluebox the better you can protect yourself against the threat that it poses.

The whole Internet community was thrown into chaos as soon as word about Heartbleed leaked out. Major companies were quick to respond and released updates to counter Heartbleed. It is a threat that you need to be aware of.

How Heartbleed works

Heartbleed is a weakness in the OpenSSL software which allows any attacker to steal information directly from the memory space of an application. This information includes private keys which keep data securely coded as it travels in the Internet.

This problem may seem insignificant to some but it’s important to note that the kind of information that can be stolen may include login data and online financially related accounts like PayPal and other money transferring sites.

The extent of damage caused by Heartbleed

Given the popularity of OpenSSL, the extent of damage expected is high. In fact, it did not come as a surprise that this threat even reached mobile devices through installed mobile apps. This is because mobile apps have built-in encryption to allow users to log-in safely.

Smartphones and the Heartbleed threat

Apple has claimed that its iOS is safe and Heartbleed cannot cause any problem to iOS devices. The same cannot be said though for all Android devices. Google has admitted that almost all versions of Android from 4.1 up contain vulnerable versions of OpenSSL. These devices are relatively safe though since all but Android 4.1.1 had the heartbeat feature turned on by default. However, the possibility of some OEMs switching the heartbeat feature back on in their phones is not remote, making the threat still very much real for all.

Bluebox and the Bluebox Heartbleed Scanner

In response to this threat, security software company Bluebox has developed an app that can scan your phone, available on the Google Play Store. When the Android major master key vulnerability was discovered in the past it was also Bluebox that stepped in and released a similar tool to address the issue.

This latest scanner allows smartphone users to check their devices to see whether they are safe or not. The Bluebox Heartbleed Scanner looks for apps installed within a device that carry their own OpenSSL versions. In turn, it checks the versions of the library to see if heartbeat is enabled.

The user’s part in addressing the problem

It is important to remember that once the scanner has detected apps that show vulnerability, the user need to do two things. Firstly, you need to report this in the apps review section of Google Play Store. This warns other users of an app's vulnerability. Secondly, you need to send an email to the developers. This notifies them and allows them to address this problem in their next update releases.

If you have any questions regarding the security of your devices, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

May 6th, 2014

SocialMedia_May06_CMarketing is an integral part of business operations and there are some useful strategies that can be employed, with one of the most effective being content marketing. This is creating your own branded content and sharing it on various platforms. When carried out successfully, businesses can see increased brand recognition and many more benefits. The question is how exactly a business can be successful with content marketing.

In a recent infographic published on LinkedIn, a number of interesting facts were highlighted about what the most successful content marketers have in common. Here are some of the findings from the infographic and the related reports it is based on.

What do successful content marketers have in common?

Regardless of the industry, the more successful content marketeers have the following four traits in common:
  1. They have a content marketing strategist - According to the statistics, almost 86% of the successful companies have a dedicated content marketing strategist.
  2. They have a strategy - While not 100% necessary, over 66% of successful companies have a content strategy and plan, or roadmap, that dictates what content is produced and when.
  3. They spend a lot more of their marketing budget - It can be tough to split any budget, but the more successful companies spend nearly 40% of their marketing budget on content marketing, as opposed to the least successful who only spend up to 16%.
  4. They find creating content far easier - This one is kind of silly at first glance - of course it follows that whatever you find easier you will be more successful at. However, if you hire a strategist who knows what they are doing, creating content will be easier, and more likely more successful.

How exactly are they successful?

From the figures from the infographic it is easy to see what the successful content marketers have in common, but the question we really should be asking is, "What makes them so successful?"

1. Use lots of social media

The main thrust of content marketing is to get the word out in as many ways as possible. Social media is the best and most versatile way to do this, and that's why over 87% of businesses use this platform. But for a truly successful strategy you need to use more than one site and in fact the most successful use seven sites at least to share their content.

This makes sense as the more platforms you use the higher the chance that your content will be viewed. So which platforms are the most popular? LinkedIn, Twitter and Facebook are the three most popular but other platforms like YouTube, Pinterest and Google+ can also prove effective.

2. Diversify your content

In many cases diversification of services or ideas can be one of the best ways of driving a business forward. This is especially true with regard to content marketing, where the best marketeers use an average of 13 different tactics. In descending order, the five most popular tactics are:
  1. Social media
  2. Articles on your website
  3. e-newsletters
  4. Blogs
  5. In-person events
Some other tactics used include, publishing books, ebooks, and branded content tools.

While 13 may seem like a large amount, especially for small businesses, the message is clear: To be successful with content marketing, you should diversify and utilize a number of different tactics as possible.

3. Have specific goals for your campaigns

As with most aspects of business, you need a clear direction in order to be successful. Without a goal there is a good chance that your content initiatives will be somewhat aimless and lacking in overall effectiveness. There are a near endless number of targets businesses can set for their content initiatives. The three most common are:
  1. Raising brand awareness
  2. Lead generation
  3. Customer acquisition

4. It's not all digital

One interesting finding was that one of the most effective ways to drive a content marketing strategy was through face-to-face events. In fact, over 70% of content marketeers believe that these in-person approaches are effective.

What this indicates is that while digital strategies are useful, and can be a great way to reach a wide number of different customers, these can go hand-in-hand with traditional style marketing. As well as focusing on producing digital content you might want to integrate this with some good old fashioned physical collateral.

At the very least, you should be attending events that are relevant to your industry, as well as networking. By getting your name out in person, you can encourage other to connect to you on the Web where they can view your content on various platforms and interact with you online, increasing the overall effectiveness and reach of your content.

Looking to learn more about content marketing and how our various solutions can help you deliver? Contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
May 1st, 2014

Security_Apr28_CAs everyone knows, we use passwords to prevent anyone getting access to our personal accounts and gadgets. But, with ever-growing numbers of hackers determined to grab our data, people need to be extra vigilant. These cyber criminals are using sophisticated technology to steal information whenever there is a slight hint of opportunity. So don't give them a chance. Your passwords are your first defence. Use these tips to stay safer online.

Observe proper web security

With the rapid advancements in technology comes sophistication of methodologies used by hackers to steal data and destroy web security. Cyber crime is continuously evolving as new programs are made to unlock accounts and combine numbers, letters and special characters to determine passwords. The big question for internet users is – how to choose a strong password that can drive hackers away?

Passwords should have at least eight characters. It is highly recommended that you use a combination of uppercase, lowercase and special characters. “P@s$w0Rd45%” is a thousand times better than “Password1”. Veer away from using passwords that are found in dictionaries. Furthermore, avoid using your name, a family member’s name, phone number, birth date, social security number or any public information. Hackers have found a way to crack passwords with the aid of the many databases out there.

To create even more secure passwords, try using a password that is a full sentence, with random words. For example "I am a purple donkey" (with the spaces) will take a long time to crack, which means it's more secure then even the examples above.

Keep malware off your system

Malware are malicious programs that have been crafted in such a way that they appear authentic and trustworthy. Be careful not to click on pop-ups and links that will redirect you to that place where your security walls are torn down. And do not open email attachments from anonymous users. Mechanisms are often embedded in these programs to gain control of your system.

Get professional help by installing security software from a trusted name in the industry. Build your defences as early as possible. Remember the cliché – better to be be safe than sorry – and nowhere is this more true than in computer system and web security.

Keep your passwords private

While this may seem to be a no-brainer, sadly, a lot of people still tend to share their passwords with their office mates or friends. If you’re one of them, then it’s high time that you change your habits and your password again. Think like James Bond -passwords are for your eyes only.

In the event that you need to give your password to a co-worker to get an important document or presentation, make sure that you change them as soon as possible. Never use the same combination again.

Change password regularly

It also helps if you schedule a regular password change. Within a period of 30 to 60 days, you should update passwords across multiple sites. Moreover, never use the same passwords for different websites. If you use the same passwords, you are putting all of your accounts at a high level risk. Hackers are relentless. Once is never enough for them and they can come back time after time.

It’s an unsafe online world out there. These online troublemakers will never be satisfied. So never let yourself or your organization fall prey to hackers. Take note of these safety measures and strengthen your web security arsenal.

Published with permission from TechAdvisory.org. Source.

Topic Security
April 25th, 2014

AndroidTablet_Apr22_BAndroid tablets are one of the more popular mobile devices for business and Google Apps users. A popular reason for this is because of the large variety of apps available to users. The number of apps will only continue to grow and criminals know this. One thing criminals do is they create fake apps that look like legitimate ones, but contain malicious code, potentially exposing important data or more.

So, how can people protect themselves and make sure that their tablet is only running applications that are safe and secure?

Downloading from a trusted source

Downloading an app from well-known and legitimate sources, like Google Play, Samsung or Amazon, used to be good indicators that a site could be trusted. Since these sites are routinely monitored and scanned for fraudulent apps, you can feel assured that any app you buy from these stores are safe to use. But a recently isolated incident involving an app called “Virus Shield”, which sold on Google Play, has lead users to reevaluate their downloading habits.

“Virus Shield” became a top selling app with several 5-star ratings on Google Play. It was bought and downloaded by over 30,000 Android users, who went on to discover that the app offered no functionality whatsoever. Dubbed as fake and a scam, the app has since been deleted from the store.

Taking more vigilant measures

To avoid becoming a victim in situations like this, there are several effective ways you can make sure your tablet is not vulnerable to fake applications.
  • Be informed when downloading from a trusted source, read about and research the application before making a purchase. Most people tend not to bother reading the small print and reviews that are published online, or on the store's site itself. These will give you the information you need to protect yourself risk.
  • Change the security settings of your tablet, and enable or disable features as you see fit. The Android operating system is supposed to come with built-in features that will help detect or prevent any threats. If activated or set accordingly, the system will usually alert users when there is abnormal behaviour from the apps installed in the device.
  • Update your software. Some users may find this an inconvenience and forego updates when they come in. But patches from these updates can fix any bug or vulnerabilities of the tablets, which is why it is highly recommended. Sometimes, updates don’t come automatically, so to check online for this, you can simply go to the setting and find the option for system update.

Use third party anti-virus software

Because the market for tablets is growing, companies offering effective anti-virus solutions are increasingly becoming more reliable. If you are not too sure about downloading free anti-virus software from stores like Google Play, for example, then you should purchase separate third-party software for your Android device, from well-established companies that offer good after-purchase customer service.

Third party anti-virus software may come with monthly or yearly subscriptions, as well as different premium rates for different types of security measures. But do consider the benefits versus the cost carefully, before you make any purchase.

If you are looking to learn more about protecting your Android tablet, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

April 23rd, 2014

SocialMedia_Apr22_CLinkedIn is a social networking site for professionals that was first introduced in 2003. With millions of users from over 200 countries all over the globe, this is a site that business owners, employees and job hunters join to build their connections. As with any other social networking site, an impressive profile is vital as this the first thing that people see when they click on you. And it's worth knowing that it's possible to customize your profile’s URL and this is recommended if you are using the site a lot or seeking work.

Why customize your LinkedIn URL?

When you sign up for a LinkedIn account, there is a default URL set on your profile. It contains random letters and numbers that would be impossible for anyone but a savant to remember. The good news is that you can customize this URL and use something unique and memorable. Before going through the steps on how to do this, let’s first look at the reasons why it's a good idea to personalize your LinkedIn URL.
  • It’s easier to remember - This is one of the top reasons why you need to customize your URL. As we've said, the random line of letters and numbers you get on signing up can't really be remembered. So it you want to grow your connections and find more business or job opportunities, Having a more memorable URL is a very good idea. People can access your profile easily or recommend it to others if they remember it in the first place.
  • It can be used in your email signature and business cards - To increase your exposure even more, you may include your LinkedIn URL in your email signature and business cards. It would look unprofessional and, let's face it, slightly ridiculous if you print the default URL randomly onto a card. The name of your company or your personal moniker looks much more professional.
  • It’s more searchable online - LinkedIn profiles are not only searchable on the site itself. They also appear in the results when queries are made on search engines. You’ll have better chances of being found if part of your URL was searched.

How to customize the URL of your LinkedIn profile

Before customizing the URL of your LinkedIn profile, it’s best to ensure that all vital information is posted since it serves as your online resume. Think of the name that you wish to use in your URL. It must be composed of 3 to 30 numbers or letters. Special characters and spaces are not accepted.
  1. Log in to your LinkedIn account.
  2. Hover your mouse on “Profile”, which can be found on the top part of the screen, then click “edit profile”.
  3. Look below your photo and you’ll see your profile’s URL. Click the “edit” link next to it.
  4. Under “Your public profile URL” on the lower right side of the window, click the “customize your public profile URL” link.
  5. Enter your preferred URL name in the field.
  6. Click “Set Custom URL”.
That’s how you customize your LinkedIn URL. For instance, if you entered “SamJones”, your URL will be “http://www.linkedin.com/in/SamJones”. LinkedIn URL can only be customized up to three times within six months. If you’ve changed it three times in less than six months, you must wait for the said period to pass before you can change your URL again.
Published with permission from TechAdvisory.org. Source.

Topic Social Media
April 11th, 2014

Security_Apr11_CThe security of your systems and communication, especially those that utilize the Internet should be paramount for any business. Over the past few weeks a massive new security flaw has been uncovered. This flaw, codenamed Heartbleed, could potentially expose all your vital data and communications that flows between your computer and websites online. All businesses and Internet users should be aware of this Heartbleed so that they can take steps to stay safe.

Background info about secure transmission of information on the Web

Most sites on the Internet rely on Secure Sockets Layer (SSL) technology to ensure that information is transmitted securely from a computer to server. SSL and the slightly older Transport Layer Security (TLS) are the main technology used to essentially verify that the site you are trying to access is indeed that site, and not a fake one which could contain malware or any other form of security threat. They essentially ensure that the keys needed to confirm that a site is legitimate and communication can be securely exchanged.

You can tell sites are using SSL/TLS by looking at the URL bar of your browser. If there is a padlock or HTTPS:// before the Web address, the site is likely using SSL or TLS verifications to help ensure that the site is legitimate and communication will be secure. These technologies work well and are an essential part of the modern Internet. The problem is not actually with this technology but with a software library called OpenSSL. This breach is called Heartbleed, and has apparently been open for a number of years now.

About Heartbleed

OpenSSL is an open-source version of SSL and TSL. This means that anyone can use it to gain SSL/TSL encryption for their site, and indeed a rather large percentage of sites on the Internet use this software library. The problem is, there was a small software glitch that can be exploited. This glitch is heartbleed.

Heartbleed is a bug/glitch that allows anyone on the Internet to access and read the memory of systems that are using certain versions of OpenSSL software. People who choose to exploit the bugs in the specific versions of OpenSSL can actually access or 'grab' bits of data that should be secured. This data is often related to the 'handshake' or key that is used to encrypt data which can then be observed and copied, allowing others to see what should be secure information.

The problem with Heartbleed

There are two major problems with this bug. The first being that if an attacker can uncover the SSL handshake used by your computer and the server that hosts the site when you login or transmit data they will be able to see this information. This information usually is made up of your login name, password, text messages, content and even your credit card numbers. In other words, anything that gets transmitted to the site using that version of SSL can be viewed.

Scary right? Well, the second problem is much, much bigger. The hacker won't only be able to see the data you transmit, but how the site receiving it employs the SSL code. If a hacker sees this, they can copy it and use it to create spoof sites that use the same handshake code, tricking your browser into thinking the site is legitimate. These sites could be made to look exactly same as the legitimate site, but may contain malware or even data capture software. It's kind of like a criminal getting the key to your house instead of breaking the window.

But wait, it gets worse. This bug has been present in certain versions of OpenSSL for almost two years which means the sites that have been using the version of OpenSSL may have led to exposure of your data and communication. And any attacks that were carried out can't usually be traced.

Am I affected by this?

What makes this so different from other security glitches is that OpenSSL is used by a large percentage of websites. What this means is that you are likely affected. In fact, a report published by Netcraft cited that 66% of active sites on the Internet used OpenSSL. This software is also used to secure chat systems, Virtual Private Networks, and even some email servers.

We have to make it clear here however: Just because OpenSSL is used by a vast percentage of the Internet, it doesn't mean every site is affected by the glitch.

The latest versions of OpenSSL have already patched this issue and any website using these versions will still be secure. The version with Heartbleed came out in 2011. The issue is while sites may not be using the 2011 version now, they likely did in the past meaning your data could have been at risk. On the other hand, there are still a wide number of sites using this version of OpenSSL.

What should I do?

This is a big issue, regardless of whether a website uses this version of OpenSSL or not. The absolute first thing you should do is go and change your passwords for everything. When we say everything, we mean everything. Make the passwords as different as possible from the old ones and ensure that they are strong.

It can be hard to tell whether your data or communications were or are actually exposed or not, but it is safe to assume that at some time or another it was. Changing your passwords should be the first step to ensuring that you are secure and that the SSL/TSL transmissions are secure. Another thing you should be aware of is what sites are actually using this version of OpenSSL. According to articles on the Web some of the most popular sites have used the version with the bug, or are as of the writing of this article, using it. Here are some of the most popular:

  • Facebook
  • Google
  • Gmail
  • Yahoo
  • Yahoo Mail
  • Instagram
  • Pinterest
  • Amazon Web Services
  • GoDaddy
  • Intuit
It would be a good idea to visit the blogs of each service to see whether they have updated to a new version of OpenSSL. As of the writing of this article, most had actually done so but some were still looking into upgrading. For a full list of sites, check out this Mashable article.

If you have a website that uses SSL/TSL and OpenSSL you should update it to the latest version ASAP. This isn't a large update but it needs to be done properly, so it is best to contact an IT partner like us who can help ensure the upgrade goes smoothly and that all communication is infact secure.

Contact us today to see how we can help ensure that your company is secure.

Published with permission from TechAdvisory.org. Source.

Topic Security
April 10th, 2014

AndroidPhone_Apr07_CThe release of Office on mobile devices allows users to view and edit their files while on the go. Office Mobile 2013, the latest version of the mobile suite was recently updated for the Android platform. However, prior to the update a subscription to Office 365 was needed in order to use it. This is no longer the case and you can now use Office on your Android device for free.

Free you say? Is it time to ditch Office 365?

Not so fast! If you are a business owner, it's not advisable to ditch your Office 365 subscription. This is because the Office app is free for home use, but if you have an Office 365 business account, you need to have a paid Office 365 Business subscription to edit and save documents.

The benefits of using Office on your Android

The Microsoft Office Mobile suite is a collection of mobile versions of the popular Microsoft Office. Since it’s now available for free, you may want to take advantage of what the programs have to offer.

One of the benefits of having Office on your device is that you can access or create files while on the go. Even if you’re not in front of your computer, you can still be productive as you work on important files anytime, anywhere. It is integrated with OneDrive so your files are synced, allowing you to continue working on your computer after working on your mobile device.

Office on your Android supports popular Word, Excel, and PowerPoint formats so you won't have problems opening and editing files. Office Mobile is also optimized for tablets and phones, making it convenient to use even on a small screen.

Office Mobile core applications

Office Mobile is a stripped down version of the Office Suite. Limited applications and features are available to make it work smoothly on mobile devices. Word Mobile, Excel Mobile and PowerPoint Mobile are the three programs that come with it.

Word Mobile

Word Mobile can be generally used like its desktop counterpart. While the desktop version supports more file formats, the mobile version is still be able to open a Word file that has an unsupported format without editing options. To enable editing, you must first save the file as a .DocX file which is supported by the mobile version.

Images, tables and lists can be added to a Word Mobile document. Other features that you can use include: find and replace, word count, and spell checker, though some fonts are not supported. For example, page breaks, footers, headers, endnotes, and footnotes cannot be used, though these will be kept if the original file contains them.

PowerPoint Mobile

PowerPoint Mobile was the last application to join the Office Mobile suite. On the Android version you can open, as well as edit presentations using PowerPoint, whether from the desktop or Web version. When it comes to authoring, it is only possible to edit text and add notes.

Excel Mobile

This application is compatible with its desktop counterpart. The Android version lets you open, save, edit, and create spreadsheets in '.xlsx' format. Files saved in '.xls' can also be viewed but not edited or saved. Using Excel Mobile, you can create graphs and charts, format cells and use formulas for simple calculations. Split panes and full screen mode are also supported.

Mobile Office is a fantastic addition to your Android apps, especially now that it comes for free for home users, and for business users with paid Office 365 subscriptions. You can now have the flexibility of accessing documents or working on important files anytime, using your mobile device.

If you have questions about Mobile Office connect with us and we will help you find productivity boosting solutions.

Published with permission from TechAdvisory.org. Source.