Steve Thomas - IT Consultant

BusinessValue_July28_ATechnology has allowed businesses to get more work done with less time and expense. When properly implemented, it serves as a great tool that allows your employees to work remotely, collaborate more efficiently, and manage their time more effectively. If you want to thrive in today’s competitive marketplace, you need to make technology work for you. Here are some things you can do to make your employees more productive.

Change office communication

In order to increase efficiency, set up instant messaging software such as Skype on your employees’ workstations. This allows them to send instant messages to correspondents instead of having to get up from their desks to see whether the person is available. Of course, if you need to discuss big projects or issues, face-to-face communication is likely the best choice. But you can simply send a quick message for more trivial conversations, saving precious minutes and allowing you to get more work done.

Install video conferencing

Traveling to offsite meetings and training sessions takes time and, all too often, time spent on the road is time lost. Rather than commuting for hours outside your office, opt for a networked phone solution that offers video calls and conferencing. This way you can hold a video conference to discuss business matters from the comfort and convenience of your office. You can also take things up a notch and equip the conference room with tools to pull up documents and have them displayed on a big screen, so that everyone in the meeting can follow the conversation with ease.

Upgrade workstations

Outdated technologies and workstations limit your business’s progress, and are a hindrance to developing clued-up, efficient employees. Aging phone systems and slow networks can frustrate your team and bring productivity to a standstill. So it’s important to take the time to assess your current workstations, applications, hardware, and tools. This doesn’t mean that you have to buy a set of entirely new workstations. But you should replace obsolete equipment with more up-to-date machines. In addition, make sure all software and applications are up-to-date to ensure maximum efficiency and employee satisfaction.

Implement ERP software

Enterprise Resource Planning (ERP) is business process management software that allows organizations to automate processes and centralize data in order for employees to collaborate more efficiently. ERP software provides employees with up-to-date business information that they can easily access and make use of. What’s more, ERP also eliminates redundant data entry and reduces the number of spreadsheets that are used to record critical business data, by storing information in a centralized database.

To get the maximum return on your technology investment, it’s also important to partner with a knowledgeable and reliable service provider. Get in touch with our tech experts today to find out how we can implement technology to help your employees become more efficient and productive.

AndroidPhone_Jul27_AAt this year’s Google I/O, its annual software developer conference, the tech giant announced the Developer Preview of the next version of its Android operating system. Unofficially called the Android M, the latest OS is packed with many new features worth getting excited about. With that in mind, let’s take a look at the features you can expect to see in your next Android phone’s OS.

Custom Chrome Tabs

If you’re annoyed by having to switch to the Chrome browser while you’re in a particular app, you’ll be glad that those days are over. Android M delivers a better web experience with Chrome Custom Tabs that allow you to include Chrome web view within an app making it easy to multitask. The Chrome browser will run atop your app in case you click on any link within the app, and features automatic sign-in, saved passwords and autofill.

Android Pay

Android Pay is Google’s new mobile payments system designed to make the checkout process easier and faster. Set to be available at 700,000 stores across the United States, Android Pay will work at any payment terminal equipped with NFC. Using it is simple; just unlock your phone and place it in front of an NFC-compatible POS terminal.

Fingerprint Support

Google aims to standardize support for fingerprint scanners on all phones running on Android M. This new function will allow fingerprint scanners to be used to unlock phones as well as for making purchases using Android Pay.

Google Now on Tap

With Android M, Google Now will become smarter than ever before. You’ll be able to get contextual information on anything you have running on your phone’s screen. For instance, if you’re watching a video on YouTube, holding down the home button will provide you with more information about someone in that video.

Doze Mode

This feature uses your device’s motion sensors, be it your phone or tablet, to detect when a device has no activity for a period of time, and to then automatically shut down certain processes in order to help save battery life. While in the Doze state, the system can still be activated by alarms and high-priority notifications. According to Google, Doze helped increase the standby time on the Nexus 9 by almost double when compared to the Android 5.0 Lollipop.

App Permissions

Currently, you have to accept all permissions when you install an app, which could lead to a security breach. With Android M, you can decide which permissions you want to allow or revoke, based on when those particular functions are used. For example, you can give WhatsApp access to your camera but not your microphone.

App Links

With Android M, it will be easier than ever to link from one app to another without having to land on a web page in-between. How? A special verification method ensures that app-specific links go to the right place; for instance, clicking a Facebook link in an email will take you directly to the Facebook app instead of a redirected Facebook web page that you’ll likely have to sign in to.

Direct Share

This new feature lets you share content with your most frequent contacts or apps with a single click. Android M will learn which app you share content with the most and place it at the top of a list, as well as letting you also share content with the people you contact more often. Everything will be placed directly in the share sheet for your convenience.

Simplified Volume Control

This new simplified volume control will let you independently change ringtones, media or alarm volume directly from the volume rocker instead of having to go into different settings.

Auto App Backups

Accidentally deleted an app? Not to worry; auto app backups allow you to download it again and set it up like it was before. For now, Google is limiting the backup size to 25MB per app, though this space is not counted towards the free 15GB storage space offered in Google Drive.

Android M is expected to be released later this year but you can download the Developer Preview here now if you have a Nexus 5, Nexus 6, Nexus 9 or Nexus Player. Interested in learning more about how an Android Phone could benefit you? Just give us a call; we’re sure we can help.

AndroidPhone_Jul27_BAndroid phone users can expect a new OS coming soon with Google’s announcement at this year’s Google I/O, its annual software developer conference. While they did not announce which dessert it will be named after yet, the Android M as they are calling it at the moment comes with many improvements worth mentioning. To that end, let’s take a look at the new features you can expect to see in the next Android OS.

Custom Chrome Tabs

If you’re annoyed by having to switch to the Chrome browser while you’re in a particular app, you’ll be glad that those days are over. Android M delivers a better web experience with Chrome Custom Tabs that allow you to include Chrome web view within an app making it easy to multitask. The Chrome browser will run atop your app in case you click on any link within the app, and features automatic sign-in, saved passwords and autofill.

Android Pay

Android Pay is Google’s new mobile payments system designed to make the checkout process easier and faster. Set to be available at 700,000 stores across the United States, Android Pay will work at any payment terminal equipped with NFC. Using it is simple; just unlock your phone and place it in front of an NFC-compatible POS terminal.

Fingerprint Support

Google aims to standardize support for fingerprint scanners on all phones running on Android M. This new function will allow fingerprint scanners to be used to unlock phones as well as for making purchases using Android Pay.

Google Now on Tap

With Android M, Google Now will become smarter than ever before. You’ll be able to get contextual information on anything you have running on your phone’s screen. For instance, if you’re watching a video on YouTube, holding down the home button will provide you with more information about someone in that video.

Doze Mode

This feature uses your device’s motion sensors, be it your phone or tablet, to detect when a device has no activity for a period of time, and to then automatically shut down certain processes in order to help save battery life. While in the Doze state, the system can still be activated by alarms and high-priority notifications. According to Google, Doze helped increase the standby time on the Nexus 9 by almost double when compared to the Android 5.0 Lollipop.

App Permissions

Currently, you have to accept all permissions when you install an app, which could lead to a security breach. With Android M, you can decide which permissions you want to allow or revoke, based on when those particular functions are used. For example, you can give WhatsApp access to your camera but not your microphone.

App Links

With Android M, it will be easier than ever to link from one app to another without having to land on a web page in-between. How? A special verification method ensures that app-specific links go to the right place; for instance, clicking a Facebook link in an email will take you directly to the Facebook app instead of a redirected Facebook web page that you’ll likely have to sign in to.

Direct Share

This new feature lets you share content with your most frequent contacts or apps with a single click. Android M will learn which app you share content with the most and place it at the top of a list, as well as letting you also share content with the people you contact more often. Everything will be placed directly in the share sheet for your convenience.

Simplified Volume Control

This new simplified volume control will let you independently change ringtones, media or alarm volume directly from the volume rocker instead of having to go into different settings.

Auto App Backups

Accidentally deleted an app? Not to worry; auto app backups allow you to download it again and set it up like it was before. For now, Google is limiting the backup size to 25MB per app, though this space is not counted towards the free 15GB storage space offered in Google Drive.

Android M is expected to be released later this year but you can download the Developer Preview here now if you have a Nexus 5, Nexus 6, Nexus 9 or Nexus Player. Interested in learning more about how an Android Phone could benefit you? Just give us a call; we’re sure we can help.

164_iPhone_AIf you’ve owned an iPhone for more than a few months, maybe even weeks, you’ve likely been caught in a situation where you need to charge your battery fast but have only a limited amount of time to access a power supply. While the obvious solution is to simply plug it into the nearest outlet and hope it powers up quickly, there’s actually a few simple steps you can take to speed up the rate at which your battery charges. Here’s what you can do.

Put your iPhone in Airplane mode

The key ingredient to supercharging your iPhone in the shortest amount of time is to switch it to Airplane mode. By doing this, you essentially shut your phone off from the outside world so it’s unable to receive calls, texts, push notifications or other information. Additionally, your iPhone will be unable to search for a wireless network or better signal while in this mode. And because it’s not wasting power with any of these processes, that electricity is instead directed to your iPhone’s battery which in turn allows it to charge faster.

Take off your iPhone case

Funny as it may sound, your iPhone case may actually be slowing down the speed of your battery charge. Apple’s consumer website notes that their products don’t do well in the heat. And when it comes to iPhone, certain cases can create excess heat – which can have an effect on your battery capacity. What does this mean for you? If you have a case on your iPhone, take it off when you’re charging it.

Use an iPad adaptor

An iPad adaptor, which is about twice the size of the small adaptor that’s included with your iPhone, reportedly charges an iPhone 40% faster than its native counterpart. Therefore, if you have an iPad charger, use it.

Turn off your display, and don’t use your iPhone

As already mentioned with Airplane mode, the more your iPhone is in use the less power it will have leftover to store in your battery. While Airplane mode prevents outside forces from sucking up power, you too can also not use your phone during this time to maximize the rate at which the battery charges. To do this, make sure you turn off your display, and then simply set your iPhone aside and leave it alone.

Want more tips to get the most out of your iPhone? Curious to learn about the latest iPhone news and updates? Get in touch now.

164_iPhone_BIt’s Friday night, and you’re getting ready to go out for the evening. You’ve got your wallet, keys, and extra cash – you’re good to go. You quickly glance at your iPhone to check the time, and that’s when you notice the problem all iOS users dread. You have 20% battery! While you do have access to the power supply in your car for the next 15 minutes or so, after that you’re on your own. So what can you do to get the most out of your charge in a limited amount of time? Here are four steps below that can help.

Put your iPhone in Airplane mode

The key ingredient to supercharging your iPhone in the shortest amount of time is to switch it to Airplane mode. By doing this, you essentially shut your phone off from the outside world so it’s unable to receive calls, texts, push notifications or other information. Additionally, your iPhone will be unable to search for a wireless network or better signal while in this mode. And because it’s not wasting power with any of these processes, that electricity is instead directed to your iPhone’s battery which in turn allows it to charge faster.

Take off your iPhone case

Funny as it may sound, your iPhone case may actually be slowing down the speed of your battery charge. Apple’s consumer website notes that their products don’t do well in the heat. And when it comes to iPhone, certain cases can create excess heat – which can have an effect on your battery capacity. What does this mean for you? If you have a case on your iPhone, take it off when you’re charging it.

Use an iPad adaptor

An iPad adaptor, which is about twice the size of the small adaptor that’s included with your iPhone, reportedly charges an iPhone 40% faster than its native counterpart. Therefore, if you have an iPad charger, use it.

Turn off your display, and don’t use your iPhone

As already mentioned with Airplane mode, the more your iPhone is in use the less power it will have leftover to store in your battery. While Airplane mode prevents outside forces from sucking up power, you too can also not use your phone during this time to maximize the rate at which the battery charges. To do this, make sure you turn off your display, and then simply set your iPhone aside and leave it alone.

Want more tips to get the most out of your iPhone? Curious to learn about the latest iPhone news and updates? Get in touch now.

164_iPhone_CIf you’re like most iPhone users, you’ve likely found yourself in the sticky situation where you need to charge your phone quickly, but only have access to a power supply for a short duration. While this can be a high anxiety producing situation for many, there is actually a way to speed up the rate at which your iPhone powers up. Curious to know more? Follow these four steps below to get an extra jolt to your next iPhone charging session.

Put your iPhone in Airplane mode

The key ingredient to supercharging your iPhone in the shortest amount of time is to switch it to Airplane mode. By doing this, you essentially shut your phone off from the outside world so it’s unable to receive calls, texts, push notifications or other information. Additionally, your iPhone will be unable to search for a wireless network or better signal while in this mode. And because it’s not wasting power with any of these processes, that electricity is instead directed to your iPhone’s battery which in turn allows it to charge faster.

Take off your iPhone case

Funny as it may sound, your iPhone case may actually be slowing down the speed of your battery charge. Apple’s consumer website notes that their products don’t do well in the heat. And when it comes to iPhone, certain cases can create excess heat – which can have an effect on your battery capacity. What does this mean for you? If you have a case on your iPhone, take it off when you’re charging it.

Use an iPad adaptor

An iPad adaptor, which is about twice the size of the small adaptor that’s included with your iPhone, reportedly charges an iPhone 40% faster than its native counterpart. Therefore, if you have an iPad charger, use it.

Turn off your display, and don’t use your iPhone

As already mentioned with Airplane mode, the more your iPhone is in use the less power it will have leftover to store in your battery. While Airplane mode prevents outside forces from sucking up power, you too can also not use your phone during this time to maximize the rate at which the battery charges. To do this, make sure you turn off your display, and then simply set your iPhone aside and leave it alone.

Want more tips to get the most out of your iPhone? Curious to learn about the latest iPhone news and updates? Get in touch now.

164_A_MacLater this fall, Apple will be releasing their new operating system, El Capitan. For all those Mac lovers who are anxiously chomping at the bit to test out this new OS, you’re in luck. A beta version has been released, and users can sign up to try it out through the Apple Beta Software Program. Though if you’d rather learn about the features first, here are four exciting ones people are talking about.

Find your cursor more easily

While not the most difficult of problems computer users face, many of us have all probably ran into the situation where we lose the cursor and have to carefully scan the screen and wiggle the mouse to find it. El Capitan resolves this minor annoyance in a fun way. Now if you lose your cursor, you can wiggle your finger on the trackpad and the cursor will blow up to a larger size which makes it easier to spot instantly.

Better Spotlight feature

El Capitan’s new version of Spotlight now allows you to search news and information from the Internet. For example, you can use it to find the weather forecast, sports scores, stock market information and even videos from Vimeo and YouTube.

Another useful feature of the updated Spotlight is the ability to use natural language to find files on your Mac. That means you can search for locally stored files with phrases such as “video I edited last week”, which will then bring up results for any videos you edited in that time period.

Run apps side by side in a split screen

Deciding how to best handle multiple windows on your display can be a daily annoyance. If you have too many open, your screen can become a disorganized mess that leaves you less productive and perhaps even with a headache. Split view aims to bring order to your display by allowing you to go full screen with a pair of apps running side by side. Similar to the Windows 8 split-screen app, you can also resize each window to your liking.

More functional Notes app

With El Capitan, the Notes application has also gotten a makeover and now allows you to add a variety of types of content. For instance, you can drop in videos, pictures, PDFs and other file types directly into the application. Even better, you can sync Safari with Notes. This means that with a simple click of your trackpad, you can send content from a web page directly to the app.

Last but not least, Notes now gives users the ability to create checklists easily. With a single click, you can turn a bulleted list into an interactive checklist. So whether you’re looking to create a to-do list, grocery list or wish list, Notes has you covered.

While it’s worth noting that none of these new features are revolutionary, these small improvements will come as a welcome upgrade of Yosemite for many Mac users.

Want more of the latest Mac news? Need to service your Apple IT? Feel free to give us a call today.

164_B_MacThis autumn, Apple will release their new operating system currently known as El Capitan. And if the mere thought of waiting months to get your hands on it leaves you with a sinking feeling in your stomach, Apple has released a beta version for those interested in testing it out now. To do so, simply head to Apple’s website and sign up for the Apple Beta Software Program. However, for those who’d rather learn a bit more about El Capitan’s features first, here are four that people are getting excited about.

Find your cursor more easily

While not the most difficult of problems computer users face, many of us have all probably ran into the situation where we lose the cursor and have to carefully scan the screen and wiggle the mouse to find it. El Capitan resolves this minor annoyance in a fun way. Now if you lose your cursor, you can wiggle your finger on the trackpad and the cursor will blow up to a larger size which makes it easier to spot instantly.

Better Spotlight feature

El Capitan’s new version of Spotlight now allows you to search news and information from the Internet. For example, you can use it to find the weather forecast, sports scores, stock market information and even videos from Vimeo and YouTube.

Another useful feature of the updated Spotlight is the ability to use natural language to find files on your Mac. That means you can search for locally stored files with phrases such as “video I edited last week”, which will then bring up results for any videos you edited in that time period.

Run apps side by side in a split screen

Deciding how to best handle multiple windows on your display can be a daily annoyance. If you have too many open, your screen can become a disorganized mess that leaves you less productive and perhaps even with a headache. Split view aims to bring order to your display by allowing you to go full screen with a pair of apps running side by side. Similar to the Windows 8 split-screen app, you can also resize each window to your liking.

More functional Notes app

With El Capitan, the Notes application has also gotten a makeover and now allows you to add a variety of types of content. For instance, you can drop in videos, pictures, PDFs and other file types directly into the application. Even better, you can sync Safari with Notes. This means that with a simple click of your trackpad, you can send content from a web page directly to the app.

Last but not least, Notes now gives users the ability to create checklists easily. With a single click, you can turn a bulleted list into an interactive checklist. So whether you’re looking to create a to-do list, grocery list or wish list, Notes has you covered.

While it’s worth noting that none of these new features are revolutionary, these small improvements will come as a welcome upgrade of Yosemite for many Mac users.

Want more of the latest Mac news? Need to service your Apple IT? Feel free to give us a call today.

164_C_MacIf you have yet to hear, Apple will be releasing their new Mac OS later this year known simply as El Capitan. For some, the best news is that you don’t have to wait till the fall to try it out. Apple has released a beta version that is available to test now by signing up on their website for the Apple Beta Software Program. But if you’d rather learn a bit about it first, we’ve compiled a list of four of El Capitan’s coolest features that people are talking about.

Find your cursor more easily

While not the most difficult of problems computer users face, many of us have all probably ran into the situation where we lose the cursor and have to carefully scan the screen and wiggle the mouse to find it. El Capitan resolves this minor annoyance in a fun way. Now if you lose your cursor, you can wiggle your finger on the trackpad and the cursor will blow up to a larger size which makes it easier to spot instantly.

Better Spotlight feature

El Capitan’s new version of Spotlight now allows you to search news and information from the Internet. For example, you can use it to find the weather forecast, sports scores, stock market information and even videos from Vimeo and YouTube.

Another useful feature of the updated Spotlight is the ability to use natural language to find files on your Mac. That means you can search for locally stored files with phrases such as “video I edited last week”, which will then bring up results for any videos you edited in that time period.

Run apps side by side in a split screen

Deciding how to best handle multiple windows on your display can be a daily annoyance. If you have too many open, your screen can become a disorganized mess that leaves you less productive and perhaps even with a headache. Split view aims to bring order to your display by allowing you to go full screen with a pair of apps running side by side. Similar to the Windows 8 split-screen app, you can also resize each window to your liking.

More functional Notes app

With El Capitan, the Notes application has also gotten a makeover and now allows you to add a variety of types of content. For instance, you can drop in videos, pictures, PDFs and other file types directly into the application. Even better, you can sync Safari with Notes. This means that with a simple click of your trackpad, you can send content from a web page directly to the app.

Last but not least, Notes now gives users the ability to create checklists easily. With a single click, you can turn a bulleted list into an interactive checklist. So whether you’re looking to create a to-do list, grocery list or wish list, Notes has you covered.

While it’s worth noting that none of these new features are revolutionary, these small improvements will come as a welcome upgrade of Yosemite for many Mac users.

Want more of the latest Mac news? Need to service your Apple IT? Feel free to give us a call today.

164_Sec_CEver been infected by malware or a virus? For most internet users, the answer is probably yes. But what is the difference between all the cyber threats out there? What makes a virus different from a trojan or worm? And how can you protect your critical data and your business from these threats? If you’ve never been able to answer these questions, here’s the explanation you’ve been waiting for.

Malware

Malware is the short version of the word malicious software. And this is a general term that encompasses many types of online threats including spyware, viruses, worms, trojans, adware, ransomware and more. Though you likely already know this, the purpose of malware is to specifically infect and harm your computer and potentially steal your information.

But how do the different types of malware differ from one another? How can you protect your business from them? Let’s take a look at four of the most common forms of malware below.

Virus – like a virus that can infect a person, a computer virus is a contagious piece of code that infects software and then spreads from file to file on a system. When infected software or files are shared between computers, the virus then spreads to the new host.

The best way to protect yourself from viruses is with a reliable antivirus program that is kept updated. Additionally, you should be wary of any executable files you receive because viruses often come packaged in this form. For example, if you’re sent a video file, be aware that if the name includes an “exe” extension like .mov.exe, you’re almost certainly dealing with a virus.

Spyware – just like a spy, a hacker uses spyware to track your internet activities and steal your information without you being aware of it. What kind of information is likely to be stolen by Spyware? Credit card numbers and passwords are two common targets.

And if stealing your information isn’t bad enough, Spyware is also known to cause PC slowdown, especially when there is more than one program running on your system – which is usually the case with a system that’s infected.

A common mistake many people make is they assume their antivirus software automatically protects them from Spyware. This is not always true as some antivirus isn’t designed to catch spyware. If you’re unsure if your antivirus prevents Spyware, get verification from your vendor. And for those that are already suffering from Spyware infestation, two programs that work wonders to clean it out are Malwarebytes and SuperAntiSpyware.

Worms – similar to viruses, worms also replicate themselves and spread when they infect a computer. The difference, however, between a worm and a virus is that a worm doesn’t require the help of a human or host program to spread. Instead, they self-replicate and spread across networks without the guidance of a hacker or a file/program to latch onto.

In addition to a reliable antivirus software, to prevent worms from infecting your system you should ensure your firewall is activated and working properly.

Trojan – like the trojan horse from ancient greek mythology, this type of malware is disguised as a safe program designed to fool users, so that they unwittingly install it on their own system, and later are sabotaged by it. Generally, the hacker uses a trojan to steal both financial and personal information. It can do this by creating a “backdoor” to your computer that allows the hacker to remotely control it.

Similar to the other malware mentioned above, antivirus software is a dependable way to protect yourself against trojans. For further safety, it’s wise to not open up suspicious attachments, and also ensure that your staff members aren’t downloading any programs or applications illegally at the office – as this is a favorite place hackers like to hide trojans.

Curious to learn about other common malware that can cause trouble for business owners? Want to upgrade your existing network security system? Give us a call today, we’re sure we can help.

164_Sec_BSince many of us out there have been using the internet for decades, it’s likely that most of us have had our systems infected by malware at one point or another. But how many of us actually know what the differences are between malware, viruses, trojans, and other online threats? For those without a clue, here’s a description of four of the most common ones and the security measures you can take to keep your business protected.

Malware

Malware is the short version of the word malicious software. And this is a general term that encompasses many types of online threats including spyware, viruses, worms, trojans, adware, ransomware and more. Though you likely already know this, the purpose of malware is to specifically infect and harm your computer and potentially steal your information.

But how do the different types of malware differ from one another? How can you protect your business from them? Let’s take a look at four of the most common forms of malware below.

Virus – like a virus that can infect a person, a computer virus is a contagious piece of code that infects software and then spreads from file to file on a system. When infected software or files are shared between computers, the virus then spreads to the new host.

The best way to protect yourself from viruses is with a reliable antivirus program that is kept updated. Additionally, you should be wary of any executable files you receive because viruses often come packaged in this form. For example, if you’re sent a video file, be aware that if the name includes an “exe” extension like .mov.exe, you’re almost certainly dealing with a virus.

Spyware – just like a spy, a hacker uses spyware to track your internet activities and steal your information without you being aware of it. What kind of information is likely to be stolen by Spyware? Credit card numbers and passwords are two common targets.

And if stealing your information isn’t bad enough, Spyware is also known to cause PC slowdown, especially when there is more than one program running on your system – which is usually the case with a system that’s infected.

A common mistake many people make is they assume their antivirus software automatically protects them from Spyware. This is not always true as some antivirus isn’t designed to catch spyware. If you’re unsure if your antivirus prevents Spyware, get verification from your vendor. And for those that are already suffering from Spyware infestation, two programs that work wonders to clean it out are Malwarebytes and SuperAntiSpyware.

Worms – similar to viruses, worms also replicate themselves and spread when they infect a computer. The difference, however, between a worm and a virus is that a worm doesn’t require the help of a human or host program to spread. Instead, they self-replicate and spread across networks without the guidance of a hacker or a file/program to latch onto.

In addition to a reliable antivirus software, to prevent worms from infecting your system you should ensure your firewall is activated and working properly.

Trojan – like the trojan horse from ancient greek mythology, this type of malware is disguised as a safe program designed to fool users, so that they unwittingly install it on their own system, and later are sabotaged by it. Generally, the hacker uses a trojan to steal both financial and personal information. It can do this by creating a “backdoor” to your computer that allows the hacker to remotely control it.

Similar to the other malware mentioned above, antivirus software is a dependable way to protect yourself against trojans. For further safety, it’s wise to not open up suspicious attachments, and also ensure that your staff members aren’t downloading any programs or applications illegally at the office – as this is a favorite place hackers like to hide trojans.

Curious to learn about other common malware that can cause trouble for business owners? Want to upgrade your existing network security system? Give us a call today, we’re sure we can help.

164_Sec_AOver the decades of the internet’s existence, cyber threats have evolved at a rapid pace. When once there were only viruses and malware to watch out for, now you have to protect your business from worms, trojans, ransomware and dozens of other online threats. But what’s the difference between all of them? Let’s take a look. Here are four of today’s most common cyber threats and the tips you need to protect your business from them.

Malware

Malware is the short version of the word malicious software. And this is a general term that encompasses many types of online threats including spyware, viruses, worms, trojans, adware, ransomware and more. Though you likely already know this, the purpose of malware is to specifically infect and harm your computer and potentially steal your information.

But how do the different types of malware differ from one another? How can you protect your business from them? Let’s take a look at four of the most common forms of malware below.

Virus – like a virus that can infect a person, a computer virus is a contagious piece of code that infects software and then spreads from file to file on a system. When infected software or files are shared between computers, the virus then spreads to the new host.

The best way to protect yourself from viruses is with a reliable antivirus program that is kept updated. Additionally, you should be wary of any executable files you receive because viruses often come packaged in this form. For example, if you’re sent a video file, be aware that if the name includes an “exe” extension like .mov.exe, you’re almost certainly dealing with a virus.

Spyware – just like a spy, a hacker uses spyware to track your internet activities and steal your information without you being aware of it. What kind of information is likely to be stolen by Spyware? Credit card numbers and passwords are two common targets.

And if stealing your information isn’t bad enough, Spyware is also known to cause PC slowdown, especially when there is more than one program running on your system – which is usually the case with a system that’s infected.

A common mistake many people make is they assume their antivirus software automatically protects them from Spyware. This is not always true as some antivirus isn’t designed to catch spyware. If you’re unsure if your antivirus prevents Spyware, get verification from your vendor. And for those that are already suffering from Spyware infestation, two programs that work wonders to clean it out are Malwarebytes and SuperAntiSpyware.

Worms – similar to viruses, worms also replicate themselves and spread when they infect a computer. The difference, however, between a worm and a virus is that a worm doesn’t require the help of a human or host program to spread. Instead, they self-replicate and spread across networks without the guidance of a hacker or a file/program to latch onto.

In addition to a reliable antivirus software, to prevent worms from infecting your system you should ensure your firewall is activated and working properly.

Trojan – like the trojan horse from ancient greek mythology, this type of malware is disguised as a safe program designed to fool users, so that they unwittingly install it on their own system, and later are sabotaged by it. Generally, the hacker uses a trojan to steal both financial and personal information. It can do this by creating a “backdoor” to your computer that allows the hacker to remotely control it.

Similar to the other malware mentioned above, antivirus software is a dependable way to protect yourself against trojans. For further safety, it’s wise to not open up suspicious attachments, and also ensure that your staff members aren’t downloading any programs or applications illegally at the office – as this is a favorite place hackers like to hide trojans.

Curious to learn about other common malware that can cause trouble for business owners? Want to upgrade your existing network security system? Give us a call today, we’re sure we can help.