Category Archives: Uncategorized

Give Yourself A Valentine At Work

Remember back in grade school, the excitement of giving and receiving valentines from classmates? Bright red paper cards with Peanuts, Scooby Doo, and Bugs Bunny on them and hoping for Hershey’s Kiss from that special someone you had a crush on? Well, now that we are adults, Valentine’s Day may have lost some of the magic, but there is still some love we can show ourselves every day at work.

Drink Lots of Water

Our brains are about 70% water, and our bodies around 50–75% water, depending on age and gender. It’s not surprising being inadequately hydrated can affect how we feel and perform at work. Research has shown even a reduction in dehydration levels of as little as 2% of body weight can influence mood, lead to greater feelings of fatigue and reduced levels of alertness. So, start your day off with a tall glass of water, and drink it thought the day.

Maintain Good Posture

It’s easy to get your back and neck out of whack when sitting at a desk all day. All your nerves run through your spine. If any of your nerves are depressed, you may experience a dip in your performance. Ensuring you have an ergonomic arrangement, sitting up straight, and aligning your head properly with your screen can help you maintain a healthy spine and healthy body.

Stand Whenever Possible

One study from the European Heart Journal found excessive sitting was associated with worse health, but if participants replaced two hours a day with standing, they showed lower blood sugar levels, lower cholesterol, and lower risk of heart disease.

Don’t forget to give some love to your computer, too.

  • Keep it clean! Nothing shows wear and tear like having a dirty screen and keyboard. Dust, dirt, and grime can cause PCs to malfunction and keyboard keys to stick. Fans clogged with dirt can cause your machine to overheat. A dirty screen can and will affect the display, so wipe down your machine, use a keyboard vacuum or canned air to remove dirt from your keyboard and PC fan.
  • Get a surge protector. An electrical surge can fry your hard drive. If you are in an area prone to storms or electrical surges due to fluctuating power supplies, get a surge protector. Invest in a good one, otherwise, you might find yourself buying another machine.

Remembering, giving a little love to yourself and your computer each day will help you both work better and may help you both “live” a bit longer.

Think your password is secure? Think again

A password policy designed for federal agencies must be secure, right? Surprisingly, that hasn’t been the case, according to the National Institute of Standards and Technology (NIST). The NIST created many of the password best practices you probably loathe — the combination of letters, numbers, and special characters — but it now says those guidelines were misguided and has changed its stance on the matter. Find out why and how it involves you.

The problem

The issue isn’t necessarily that the NIST advised people to create passwords that are easy to crack, but it steered people into creating lazy passwords, using capitalization, special characters, and numbers that are easy to predict, like “P@ssW0rd1.”

This may seem secure, but in reality, these strings of characters and numbers could easily be compromised by hackers using common algorithms.

To make matters worse, NIST also recommended that people change their passwords regularly, but did not define what it actually means to “change” them. Since people thought their passwords were already secure with special characters, most only added one number or symbol.

NIST essentially forced everyone to use passwords that are hard for humans to remember but easy for computers to guess.

Recently, the institution admitted that this scheme can cause more problems than solutions. It has reversed its stance on organizational password management requirements, and is now recommending banishing forced periodic password changes and getting rid of complexity requirements.

The solution

Security consultant Frank Abagnale and Chief hacking officer for KnowBe4 Kevin Mitnick both see a future without passwords. Both security experts advise enterprises to utilize multifactor authentication (MFA) in login policies.

This requires users to present two valid credentials to gain access to their data. For instance, a code texted to an employee’s smartphone can serve as an added security measure to thwart hackers.

Moreover, Mitnick recommended implementing long passphrases of 25 characters or more, such as “correcthorsebatterystaple” or “iknewweretroublewhenwalkedin5623”. These are much more difficult to guess and less prone to hacking. As for the frequency of changing passphrases, it will depend on a company’s risk tolerance.

Simply put, passwords should be longer and include nonsensical phrases and English words that make it almost impossible for an automated system to make sense of.

Even better, you should enforce the following security solutions within your company:

  • Single sign-on – allows users to securely access multiple accounts with one set of credentials
  • Account monitoring tools – recognizes suspicious activity and locks out hackers

When it comes to security, ignorance is the biggest threat. If you’d like to learn about what else you can do, just give us a call.Published with permission from TechAdvisory.org. Source.

Productivity-boosting tips for PC users

We all want to become more productive. Business gurus always emphasize the importance of time management and taking breaks to avoid burnout. But aside from motivating yourself to work more efficiently, there are plenty of tools that increase your daily output. If you use a computer all day, check out these productivity-boosting tips.

Monitor productivity levels

Start by tracking how much work you complete on an average day. There are useful apps for this such as Google Chrome Extensions like RescueTime, which record your most frequently visited sites and track how much time you spend away from your computer. Running the app will provide you with a productivity rating and a detailed log of how you spend your time at work.

If you discover you’re wasting a huge portion of your time on social networking and other productivity killers, you’re more likely to make conscious adjustments on how you manage your time.

Get rid of clutter

You can also decrease distractions and increasing output by deleting old files, uninstalling unused programs, and organizing documents into appropriately labeled folders. This makes files easier to find and improves your computer’s performance.

As for the clutter in your email inbox, Gmail and Outlook both have features that filter out unimportant messages. Simply enable Priority Inbox on Gmail or Clutter on Outlook to get a clean, spam-free inbox.

Block time-wasting sites

Visiting non-work-related websites hinders productivity. A quick five-minute break to check your Facebook feed may not seem like much, but a few of those per day add up to a lot of time.

If you and your employees have trouble staying away from social media sites like Facebook, Instagram, and Twitter, it’s a good idea to block access to them using URL filters.

Alternatively, you can use apps like StayFocusd or Strict Workflow. These allow you to set a limit on how long and how many times users can visit non-work-related sites.

Stay on track with to-do lists

To-do lists help you break down large projects into manageable, bite-sized tasks. Crossing things off the list is surprisingly satisfying since it gives you and your employees a sense of accomplishment and total visibility of your progress.

You can choose from a wide variety of digital to-do lists like Google Tasks or Trello. These platforms allow you to set deadlines for small tasks and write clear instructions for each. What’s more, they’re incredibly easy to use and are great for keeping track of your workflow.

Use keyboard shortcuts

Mastering keyboard shortcuts will make it easier to perform simple functions. There are more than a hundred useful shortcuts, but some that you should always keep in mind are:

  • Ctrl + C, Ctrl + V, Ctrl + X – to copy, paste, and cut selected items
  • Ctrl + Z – to undo changes
  • Ctrl + T – to open a new tab on your web browser
  • Alt + Tab – to switch between open windows
  • Alt + F4 – to close the program

For many more like these, take a look at this list of advanced shortcuts for Windows.

In this digital age of short attention spans, focus is key to achieving business success. Drop us a line today if you’d like to know more about how tech can induce focus and improve overall productivity.Published with permission from TechAdvisory.org. Source.

Amazing improvements in Office 365

If you’re an Office 365 subscriber, you’re in for some souped-up enhancements. Most involve artificial intelligence (AI) making sense of your data for you, so you spend less time and effort manually processing it. Here are a few of the latest enhancements that’ll give you more time for value-added tasks (and for coffee breaks and power naps, too).

Office

Write and draw with digital ink

Typing is easy on desktops and laptops, but when you’re on touch-enabled devices, keyboards are cumbersome to use, whether they are extra hardware or as space invaders on your screen. Now, the Draw tab is available on your favorite Office programs so you can use your finger, a stylus, or a mouse to doodle and write. You can automatically convert your handwriting to text in Word or OneNote by implementing the handwriting input function of your Windows 10 touch keyboard.

Chat with colleagues right inside the app

Now available exclusively to Office 365 subscribers, the chat function lets team members message one another within a Word document, PowerPoint presentation, or Excel spreadsheet as they work on it together.

Word

Write with your voice

Ever wished you had a personal secretary who could type dictation for you? As an Office 365 subscriber, you won’t need one. Sign into your account, turn on your microphone, then go to Home > Dictate (in Outlook, go to Message > Dictate instead). Once the Dictate icon turns red, you can start writing your document just by speaking. It’s that easy! Now available in Word for Office 365, Outlook for Office 365, PowerPoint for Office 365, and OneNote for Windows 10.

Edit documents with natural gestures

With your handwriting and voice digitized into standard text, editing your document is easy, thanks to natural gestures. It’s like using a pen to insert or cross out words on printouts, but immediately seeing your edits afterward! Other magical things you can do include inserting spaces and paragraph breaks, stringing broken-up words together, and circling text to select it. Now available in Word for Office 365 and Word Mobile.

PowerPoint

Transform your scribbles

Sometimes you need to draw or write by hand to get stuff down quickly. Using digital ink can be the quickest way to communicate, but turning scribbles into editable text or easy-to-manipulate shapes for a slideshow presentation later on is time-consuming.

Or rather, that was the case, because now Ink to Text and Ink to Shape can convert your handwriting and hand drawings into standard text or shapes, respectively. Now available for PowerPoint for Office 365, PowerPoint for iPad, and PowerPoint for iPhone. Ink to Shape is also available exclusively to Office 365 subscribers on Excel for Office 365, Word for Office 365, Excel 2016, Word 2016, and Visio Online Plan 2.

Excel

“Ideas” literally let you work smarter

Pie charts, bar graphs, scatter diagrams — with so many ways to visualize data, it can become troublesome to implement the right graph. Thankfully, the upcoming Ideas will let AI come up with the most apt graphs for you. Just click on a cell in a data table, click the Ideas button on the Home tab, then voila! Excel comes up with charts for you to choose from. It can even set trend lines, recognize outliers, and create summaries for you — all without having to write an unwieldy formula! Coming soon to Excel for Office 365, Excel for Office 365 for Mac, and Excel Online.

A picture is worth a thousand data points

Since optical character recognition software is already a couple of decades old, it’s about time we’re able to extract data tables from pictures. Soon, the Insert data from picture function will let us encode ingredients lists from recipes and digitize printed receipts by taking their photos. Coming soon to Excel for Android tablets and Excel for Android phones.

One formula, many values

For so long, Excel users had to enter a formula and copy it to get multiple values (known as an array) from their data tables. With dynamic arrays, however, all you have to do is write a formula once, press Enter, and you’ll instantly get values for entire columns or tables instantly, which means faster processing with fewer errors. To illustrate, you can use a dynamic array to fill up entire multiplication tables, and when you change or add more factors, the array will recalculate and resize automatically. Coming soon to Excel for Office 365 and Excel for Office 365 for Mac.

Outlook

Quickly create tasks

Outlook now lets you create tasks and to-do lists the way you write emails. Just click Tasks > New Tasks, type the name of the task in the Subject box, and add task details in the body. You can also set its priority, start and due dates, and even a reminder for it.

Additionally, you can create tasks out of emails by dragging an email to Tasks on the navigation bar. This is way faster than copy-pasting email contents onto the body of a task, though keep in mind that email attachments aren’t carried over to the newly made task.

Make the most out of Office 365! If you’re already a subscriber or are currently looking into it, let us help you configure and implement it for maximum productivity.Published with permission from TechAdvisory.org. Source.

Reasons to back up your mobile devices

Companies such as Apple, Samsung, and others have turned mobile phones into mini-computers that can serve as a substitute for your laptop, or as a storage device. If you’re using a smartphone as a communications and storage device, backing up now would be a wise move.

Malware on mobile

More than two-thirds of the world’s population use a mobile phone with internet connection, so dangers in these handy devices are to be expected. Scarier than the thought of being offline is being online and exposed to malware.

If you use your mobile devices as extensions of your work computers, backing them up is a must. Mobile phones have become as vulnerable to malware as laptops and desktops are, especially if you consider the fact that many professionals and business owners use them for emailing confidential documents and storing business-critical files.

Device disasters

Malware isn’t the only disaster that can hurt your smartphone. Because you carry it wherever you go, your device can easily be stolen, misplaced, or damaged. They may be easily replaceable, but the data they contain is not. Here are some security threats to look out for:

  • Data leakage
    Something as simple as transferring files onto a public cloud storage service, or pasting confidential information in the wrong place could compromise your business. In fact, according to specialist insurance provider Beazley, “unintended disclosure” accounted for 41% of data breaches reported by healthcare organizations during the first three quarters of 2017.
  • Social engineering
    Tricking people online into handing over their personal and financial data is no longer confined to desktops, as this trend is already happening on mobile devices. In a report by IBM, it was found out that users are three times more vulnerable to fall for phishing attacks on mobile devices compared to desktops. This is because phones are where people will most likely see a message first, making them a popular attack vector by cybercriminals.
  • Wi-Fi interference
    When we connect our devices to public Wi-Fi networks, we are putting critical information at risk. According to Wandera, nearly a quarter of devices in 2017 connected to potentially insecure networks, and some even encountered a man-in-the-middle attack, where someone anonymously intercepts communication between two parties.
  • Out-of-date devices
    A vast majority of manufacturers, most particularly on the Android front, are ineffective at providing updates for their devices. This can inconvenience end users, as this exposes them to the many threats lurking online. Some smartphones and tablets may receive a security patch from time to time, but manufacturers eventually stop doing so after a while.
  • Physical device breaches
    While this may seem unlikely for some, lost or unattended devices can still become a major security risk, especially if they are not employing proper security measures such as PIN codes and encryption.

Backup options

Performing backups on iOS and Android devices is a quick and painless process. For example, companies that use Office 365 or Google’s G Suite enable company-wide backup settings from a single dashboard. Apple’s backup settings usually need to be configured on each device, but it’s a pretty simple process.

There are also robust third-party options to back up all your organization’s mobile devices. The best of these are cloud backup services that sync devices and back up contacts, photos, videos, and other critical files in one neat system. These mobile backup tools are offered on monthly or lifetime subscription schemes, which provides small businesses with enough flexibility to ensure long-term protection.

Our experts can provide practical advice on security for your business’s computers and mobile devices. Call us to ask about mobile backup and other security solutions today.Published with permission from TechAdvisory.org. Source.

How to protect your Office 365 data

Office 365 is a complete cloud solution that allows you to store thousands of files and collaborate on them, too. In addition to its productivity features, the service comes with security and compliance solutions that will help businesses avoid the crushing financial and legal repercussions of data loss. However, even with its comprehensive security tools, the service has some data security risks that need to be addressed. The following tips will keep your business data private and secure.

Take advantage of policy alerts
Establishing policy notifications in Office 365’s Compliance Center can help you meet your company’s data security obligations. For instance, policy tips can warn employees about sending confidential information anytime they’re about to send messages to contacts who aren’t listed in the company network. These preemptive warnings can prevent data leaks and also educate users on safer data sharing practices.

Secure mobile devices
Since personal smartphones and tablets are often used to access work email, calendar, contacts, and documents, securing them should be a critical part of protecting your organization’s data. Installing mobile device management features for Office 365 enables you to manage security policies and access permissions/restrictions, and remotely wipe sensitive data from mobile devices if they’re lost or stolen.

Use multi-factor authentication
Don’t rely on a single password to safeguard your Office 365 accounts. To reduce the risk of account hijacking, you must enable multi-factor authentication. This feature makes it difficult for hackers to access your account since they not only have to guess user passwords, but also provide a second authentication factor like a temporary SMS code.

Apply session timeouts
Many employees usually forget to log out of their Office 365 accounts and keep their computers or mobile devices unlocked. This could give unauthorized users unfettered access to company accounts, allowing them to steal sensitive data. By applying session timeouts to Office 365, email accounts, and internal networks, the system will automatically log users out after 10 minutes, preventing hackers from opening company workstations and accessing private information.

Avoid public calendar sharing
Office 365’s calendar sharing features allow employees to share and sync their schedules with their colleagues. However, publicly sharing this information is a bad idea because it helps attackers understand how your company works, determine who’s away, and identify vulnerable users. For instance, if security administrators are publicly listed as “Away on vacation,” an attacker may see this as an opportunity to unleash malware on unattended computers.

Employ role-based access controls
Another Office 365 feature that will limit the flow of sensitive data across your company is access management. This lets you determine which user (or users) have access to specific files in your company. For example, front-of-house staff won’t be able to read or edit executive-level documents, minimizing data leaks.

Encrypt emails
Encrypting classified information is your last line of defense to secure your data. If hackers intercept your emails, encryption tools will make files unreadable to unauthorized recipients. This is a must-have for Office 365, where files and emails are shared on a regular basis.

While Office 365 offers users the ability to share data and collaborate, you must be aware of potential data security risks at all times. When you work with us, we will make sure your business keeps up with ever-changing data security and compliance obligations. If you need help securing Office 365, we can assist you, too! Contact us today for details.Published with permission from TechAdvisory.org. Source.


Simple tips to increase cloud affordability

Moving to the cloud can save you a considerable amount of money, which explains its rise in popularity over the years. What many business owners fail to realize is that some cloud services come with hidden costs. And while they might seem insignificant at first, they can add up to a staggering amount if left unchecked. Minimize your cloud expenditures with these five tips:

No standalones

Cloud services come in various shapes and sizes, many of which are standalone platforms with rates that increase over time. Opt for a service provider that offers a suite of products that all work together. They are often less expensive than a group of standalone products. Another benefit of working with a cloud provider is that you receive a single point of contact to resolve your issues quickly and effectively.

Experience matters

If you plan on integrating a standalone cloud service into your system, make sure you hire an experienced integration consultant to facilitate a smooth transition. Integration mishaps can cause serious downtime and cost a lot of money.

Backups are important

Unnecessary or inefficient backups will waste cloud storage space. Examine your cloud storage data by asking the following questions:

  • How many versions of this data do I need to store long-term? The more versions you store, the more it costs.
  • What regulatory demands do I need to meet? Some data may need to be accessible for up to three years, whereas other data can be deleted after 30 days.
  • How quickly do I need to access my backups? If it can wait for a day or two, archive that data to a less expensive service or offline at the provider’s data center.

Remove users

Many cloud service providers charge by the number of users in your system. By neglecting to manage the list of users, you could end up paying for people who no longer work for you. Implement processes that remove users when they are terminated and consider scheduling a regular audit. Ideally, this should be once every six months to a year, to ensure your cloud user list is up-to-date.

Monitor proactively

Ask your cloud provider whether they can proactively monitor your account and notify you of potential issues before they cause problems. This is especially important if you have a pay-as-you-go license that charges based on resource or storage consumption.

Utilizing the right technology resources is vital to your business’s success, and so is knowing how to prevent them from racking up an overwhelming monthly bill. If you wish to enjoy all the benefits of cloud computing without breaking the bank, give us a call and we’ll be happy to help.Published with permission from TechAdvisory.org. Source.

The perks of being an Office Insider

Office 365 is already packed with the latest productivity features, but for premium perks, opt for the Office Insider program. This gives Office subscribers a heads up on upcoming Microsoft releases and updates before other companies do. Here’s why Office Insider is perfect for business owners.

Early Access

Subscribing to Office Insider gives you access to new innovations, security updates, and bug fixes months before they are released to the public. This insider feature is available in two levels: the fast ring where updates are rolled out more frequently, but come with a few bugs, and the slow ring where updates are released slower, but come with little to no software bugs.

What’s new for Office Insiders?

  1. Ideas in Excel
    Ideas is a bolt-shaped icon at the top right corner of the screen that helps you understand your data through high-level summaries, trends, and patterns. It will analyze your data and create attractive visuals about it in the task pane.
  2. Animated 3D graphics
    Animated 3D graphics like beating hearts, orbiting planets, and rampaging T-rex are now available on Powerpoint. You can insert 3D models from the internet and animate them with the Runner badge to spice up your PowerPoint slides.
  3. New proofreading tools
    Editor can now mark issues on spelling, grammar, and style with red, blue, and gold underlines. It provides suggestions to improve your writing in the Editor pane, which even explains the suggestions to better help you pick the best one.
  4. New look for the ribbon icons
    Ribbon icons now have crisp, clean lines, are visually optimized for all devices, and automatically updated.
  5. Coming Soon
    Outlook occasionally releases dramatic new features and for some people, it can be a little bit overwhelming. The Coming Soon feature allows you to have a window of time to try out new features before they become permanent.

Competitive Advantage

By being an Office 365 Insider, you can test the waters and get acquainted with the features way ahead of your competition.

Reserving a meeting room can be a lot easier now through Outlook. Misspelled search terms are now automatically managed by Outlook. Also, with the new supercharged VLOOKUP, HLOOKUP, and MATCH functions, you can easily find answers to your queries.

Feedback

Subscribing to the Insider program also allows you to give your feedback directly to the Microsoft product team. It will help you to accustom yourself with the features earlier, and you’ll contribute to making Office 365 better for other users worldwide. You’ll be a part of the ongoing process of Office improvement.

Office Insider can open up your company to a wide variety of productivity-boosting features. The only question you have to ask yourself now is: Do I want to be at the cutting edge of tech innovations?

Contact us today to find out how you can get on the inside and know the latest Office updates.Published with permission from TechAdvisory.org. Source.


Hybrid clouds make SMBs more flexible

Cloud computing has become an indispensable component in business IT because it’s cost-effective, flexible, and secure. Thanks to hybrid cloud solutions, organizations have access to even more agile computing resources.

Hybrid clouds are a combination of private and public clouds. In the former, data and applications that require tighter controls are hosted either internally or privately in an offsite facility. Public clouds are managed externally by third-party providers with the express purpose of reducing a company’s IT infrastructure.

A recent study indicates that 75% of companies have adopted hybrid cloud solutions, mainly because of their numerous benefits. Here are the four most significant advantages of moving to a hybrid cloud environment.

Adaptability

Having the ability to choose between on-site/privately-hosted cloud servers and public ones let you pair the right IT solution with the right job. For example, you can use the private cloud to store sensitive files, while utilizing more robust computing resources from the public cloud to run resource-intensive applications.

Scalability

The hybrid cloud allows you to “scale up” or “scale down” computing resources on an as-needed basis. So if there are last-minute computing demands that your hardware can’t support, or if you’re planning for future expansion, hybrid cloud solutions allow for on-demand increases or decreases in capacity.

Cost efficiency

Does your business struggle to meet seasonal demands? With a hybrid cloud solution, you’ll be able to easily handle spikes in demand by migrating data from insufficient on-premise servers to scalable, pay-as-you-go cloud servers whenever needed, without incurring extra hardware and maintenance costs.

Security

Last but not least are the security advantages of a hybrid cloud solution. You can host sensitive data such as an e-commerce details or an HR platform within the private cloud, where it will be protected by your security systems and kept under close watch. Meanwhile, routine forms and documents can be stored in the public cloud and protected by a trusted third-party.

Here’s how SMBs can set up a hybrid cloud model based on their requirements and the providers available to them:

  1. By employing one specialized cloud provider who offers comprehensive hybrid solutions
  2. By integrating the services of a private cloud provider with those of a separate public cloud provider
  3. By hosting a private cloud themselves and then incorporating a public cloud service into their infrastructure

Our experts can help you transition to a hybrid cloud solution without interruption and without the huge costs. Contact us today to learn more about the benefits that a hybrid cloud can bring to your business.Published with permission from TechAdvisory.org. Source.

5 Cybersecurity measures anyone can master

Avoiding malware and online scams takes a lot of work. You have to treat every email with suspicion, manage a long list of convoluted passwords, and avoid public WiFi networks. Ideally, you follow several other cybersecurity best practices, but many users don’t believe they’re worth the time. If you’re one of those people, here are five ways to stay safe that won’t eat up all your time.

1. Multi-factor authentication (MFA)

This tool earns the number one spot on our list because it can keep you safe even after a hacker has stolen one of your passwords. That’s because MFA requires more than one form of identification to grant access to an account.

The most common example is a temporary code that is sent to your mobile device. Only someone with both the password and access to your smartphone will be able to log in. Almost any online account provider offers this service, and some let you require additional types of verification, such as a fingerprint or facial scan.

2. Password managers

Every online account linked to your name should have a unique password with at least 12 characters that doesn’t contain facts about you (avoid anniversary dates, pet names, etc.). Hackers have tools to guess thousands of passwords per second based on your personal details, and the first thing they do after cracking a password is to try it on other accounts.

Password manager apps create random strings of characters and let you save them in an encrypted list. You only need one complex password to log into the manager, and you’ll have easy access to all your credentials. No more memorizing long phrases, or reusing passwords!

3. Software updates

Software developers and hackers are constantly searching for vulnerabilities that can be exploited. Sometimes, a developer will find one before hackers and release a proactive update to fix it. Other times, hackers find the vulnerability first and release malware to exploit it, forcing the developer to issue a reactive update as quickly as possible.

Either way, you must update all your applications as often as possible. If you are too busy, check the software settings for an automatic update option. The inconvenience of updating when you aren’t prepared to is nothing compared to the pain of a data breach.

4. Disable flash player

Adobe Flash Player is one of the most popular ways to stream media on the web, but it has such a poor security record that most experts recommend that users block the plugin on all their devices. Flash Player has been hacked thousands of times, and products from companies like Microsoft, Apple, and Google regularly display reminders to turn it off. Open your web browser’s settings and look for the Plugins or Content Settingsmenu, then disable Adobe Flash Player.

5. HTTPS Everywhere

Just a few years ago, most websites used unencrypted connections, which meant anything you typed into a form on that site would be sent in plain text and could be intercepted with little effort. HTTPS was created to facilitate safer connections, but many sites were slow to adopt it or didn’t make it the default option.

HTTPS Everywhere is a browser extension that ensures you use an encrypted connection whenever possible and are alerted when one isn’t available on a page that requests sensitive information. It takes less than one minute and a few clicks to install it.

If you run a business with 10 or more employees, these simple tips won’t be enough to keep you safe. You’ll need a team of certified professionals that can install and manage several security solutions that work in unison. If you don’t have access to that level of expertise, our team is available to help. Give us a call today to learn more.Published with permission from TechAdvisory.org. Source.