Blog

September 11th, 2014

MobileGeneral_Sep08_CSmartphones and tablets have become one of the most essential devices for businesses and individuals alike. It's difficult to imagine life without one really, but there will come a time when we all need to replace a device. If you are considering this then you may entertain the idea of selling your old device too. However, before you do, you should ensure that you deauthenticate your apps first.

What exactly is deauthentication?

Some apps, although not all, require that you authenticate your device in order for them to work. Many developers who ask users to authenticate their device do so in order to either prevent copies of the software from being created and utilized, or to ensure that the device and app can communicate securely.

Some examples of apps that ask for authentication include those that use multi-factor authentication, password managers, and apps that require a subscription or credit card information, etc. On some devices you even need to enter a code or key, much like installing software on a new computer, in order to activate all the features of the app.

The main reason many developers require authentication is connected to security. As security is becoming an ever more pressing issue, there is a good chance that we will see more apps asking users to authenticate their devices in the future.

The issue with this is that when you go to sell your device you will likely need to purchase the app again or the buyer of the device won't be able to set up their own account.

Common apps you should deauthenticate

Apps with subscription services: This includes apps like Google Play Music, Spotify, Office for iPad, cloud storage apps that you have linked your device to, etc. These apps are usually either linked with your device or your phone number so it is a good idea to deauthenticate them.
  1. Kindle app: The Kindle app is actually linked to your device and users who want to use the app will likely not be able to if the device is linked to your account. You can unlink devices by going to the Amazon site, logging in and selecting Manage your Content and Devices when you hover over your account name.
  2. Password management apps: These apps usually require that you authenticate your device to use a particular service. If you try to log in on a new device, these apps may not work properly.
  3. Chat apps: Some chat apps like WhatsApp or Line require that you register for the service using your phone number. If you are keeping your number, you shouldn't have to deauthenticate, but if you are getting a new number, you should go into the account settings of each app and unlink your number. WhatsApp for example has a feature that allows you to move your number to a new device.
  4. Any app or service that you have linked credit card information to: While you ordinarily don't have to physically deauthenticate these apps, as the information is usually linked to an account and password, it is a good idea to unlink your credit card with any app on your phone before you hand it over. This will help ensure that credit card information is not stored or accessible.
When it comes to the major app stores, e.g., Windows Phone Store, Google Play, and iTunes, you will often see that your device has been linked to your account. If you are going to sell your device, the best course of action is to reset using the factory reset option. This will delete all data and installed apps on the device. This will often be enough to deauthenticate all apps.

If you are looking to learn more about getting rid of your older devices, contact us today.

Published with permission from TechAdvisory.org. Source.

September 10th, 2014

iPad_Seo08_CA common feature in many new apps is enabling users to purchase or subscribe to features in-app. This is especially true for developers like Microsoft and their Office for iPad apps which require a subscription in order to use the full versions. In a recent announcement from the Redmond tech giant, Office for iPad users can now subscribe via the app.

Looking at the recent subscription update

When the iPad versions of the Office apps were released, users could download the apps for free but needed an Office 365 subscription in order to use the full features of the apps. Those who didn't have a subscription were limited to only being able to read and print Office documents, and present using PowerPoint.

Those who wanted to use all the features of the app needed to sign up for an Office 365 account. In order to do this, they had to physically go to the Office 365 site and sign up. They couldn't sign up via the app. While this process isn't overly taxing, it did cause some frustration for some users.

To remedy this, Microsoft has recently announced that users will now be able to sign up for an Office 365 subscription directly from the app. According to an article posted on the Microsoft Office blog, "Starting today [September 2, 2014], you can buy a monthly subscription to Office 365 from within Microsoft Word, Excel, and PowerPoint for iPad."

The subscriptions you can purchase

While Microsoft has noted that you can purchase an Office 365 subscription in-app, you should be aware that the subscriptions are monthly and for the Home or Personal versions of Office 365.

A monthly Office 365 Home subscription costs USD$9.99 a month and can be used on one iPad and up to five PCs or Macs, while an Office 365 Personal plan costs USD$6.99 a month and can be installed on on iPad and one PC or Mac.

What about business users?

For the time being, users can only subscribe to individual Office 365 accounts via the app. If your business has an Office 365 for Business subscription e.g., Office 365 Small Business Premium, etc, you should be able to access the full-version of the iPad app without having to sign up for a Personal or Home subscription, just log in using the same username and password you use to sign into Office 365.

If you don't have an Office 365 subscription, then it may be a good idea to get in touch with us to learn more about Office 365 business plans and how they can be successfully implemented into your business.

Published with permission from TechAdvisory.org. Source.

Topic iPad
September 10th, 2014

Office_Sep08_CIf you use Excel there is a good chance that you have used a wide variety of formulas. But, when it comes to working out how to combine the content of different cells into a new one, without adding them together, many users will simply cut and paste. Did you know though that the concatenate formula can also do this for you?

Using the concatenate formula to combine cells

If, for example, you have a spreadsheet with first names in column A, last names in column B, and want to combine them into column C to display the full name you can do so by:
  1. Clicking on cell C2 (or the row where the information you want to combine is)
  2. Typing =concatenate(
  3. Clicking on cell A2 and then adding a comma (,)
  4. Clicking on cell B2 and closing the formula with a closing bracket
  5. Hitting Enter
You should see the two cells are now combined in cell C2, with the formula for cell C2 reading:

=CONCATENATE(A2,B2).

The problem is, there will be no space inbetween the letters or numbers, so you will need to edit the formula to read:

=CONCATENATE(A2," ",B2)

The double quotations with a space in between them tells Excel to add a space to the cell in between the contents of A2 and B2.

If you have more than two columns you would like to combine, then simply add a comma after each cell. If for example you have three columns (A1, B1, and C1) you would enter the formula:

=CONCATENATE(A1 " ",B1 " ",C1) in column D1.

Combining two cells without concatenate

While concatenate works well, there is actually a shortcut that you can use which involves the ampersand '&':
  1. Click on cell C2 (or the row where the information you want to combine is)
  2. Type =
  3. Click on cell A2 and then type & in the formula.
  4. Click on B2 and hit Enter
You should see the contents of A2 and B2 combined together in C2. If you click on cell C2 and look at the formula, it should read: =A2&B2.

The only problem is, there won't be a space between the content. To add a space, you can edit the formula so that it reads:

=A2&" "&B2

Note the space between the two quotation marks. This tells Excel to add a space between the contents of A2 and B2.

Once you have the base formula on one cell, you can press the small box at the bottom of the cell and drag it down the row so that the other information can be quickly compiled. This makes it much easier than having to copy and paste the content individually. And, If you would like to learn more Excel tips, contact us today. We can save you valuable time and resources.

Published with permission from TechAdvisory.org. Source.

September 5th, 2014

HealthcareIT_Sep03_A

As of June 30, 2014, more than 1,000 data breaches affecting more than 500 patients each have been reported to the Department of Health & Human Services - for a total of roughly 32,000,000 people who have had their privacy compromised. And, according to the annual Redspin Breach Report, published in February of 2014, 7.1 million patient records were breached in 2013, a 137.7% increase over 2012.

And, the threat is getting broader. Once caused primarily by snooping or negligent employees, data breaches are now increasingly caused by cybercriminals who realize the potential financial value of medical records. Case in point: The Chinese hacker attack on the 206-hospital Community Health Systems which resulted in the breach of 4.5 million patient records, the second-largest HIPAA breach ever reported.

No physician practice should consider itself immune. While large hospital systems may be most attractive to hackers, Eric Perakslis, executive director of Harvard Medical School's Center for Biomedical Informatics, recently wrote in a New England Journal of Medicine article that 72 percent of cyberattacks have been aimed at hospitals, group practices and other provider organizations.

Perakslis recommends an "active learning approach” that involves real-time surveillance of emerging threats - and that includes an intimate knowledge of one's own network and vigilance at one's own practice. One of the most effective ways you can do this is to work with a company like ours who can help not only ensure security of your systems but also help teach you and your staff about common security issues.

Published with permission from TechAdvisory.org. Source.

September 5th, 2014

GeneralHealthcare_Sep03_AThe Drug Enforcement Administration (DEA) is making it more difficult for physicians to prescribe opioids, and in doing so, has necessitated changes to e-prescribing.

The issue stems from titles II and III of the Comprehensive Substance Act (CSA), under which controlled substances are classified into one of five schedules based on potential for abuse and likelihood of dependence. The DEA has rescheduled hydrocodone-combination products (HCPs) from schedule III to schedule II in an attempt to curtail abuse and dependence.

But, the regulations around schedule II drugs are much more restrictive than those around schedule III drugs. There will be only two ways to prescribe HCPs after the rule change becomes effective October 6: with a paper-based prescription handed to the patient or e-prescribing. Any other means of prescribing, such as phone calls or faxes, are not allowed.

For e-prescribing, some changes may be necessary at the electronic medical record (EMR) level and at medical practices as well as at pharmacies. EMR vendors and practices will have to implement the security that's required by the DEA in regards to identity management and factor authentication. As for pharmacies, currently only about two-thirds are ready to receive electronic prescriptions of controlled substances; the others will have to make some changes.

If you are one of the practices that needs to make these changes in order to meet DEA requirements, contact us today to see how our systems can help.

Published with permission from TechAdvisory.org. Source.

September 4th, 2014

Security_Sep02_CWhat do you do when your smartphone needs to be charged but your charger is not at hand? A handy solution is to turn to a public charging kiosk. But what you might not be aware of is the fact that this can lead to juice jacking of your smartphone. To avoid this security threat, it’s time to get a comprehensive view of what juice jacking is and how you can protect your smartphone from it.

What’s juice jacking?

Regardless of the kind of smartphone you have, whether it’s an Android, iPhone or BlackBerry, there is one common feature across all phones: the power supply and the data stream pass over the same cable. This setup allows for juice jacking during the charging process whereby user access is gained on your phone by leveraging the USB data/power cable to illegitimately access your phone’s data and/or inject malicious code onto the device.

The attack can be as simple as an invasion of privacy, wherein your phone pairs with a computer concealed within the charging kiosk and information such as private photos and contact information are transferred to a malicious device. However, on the other hand, it can also be as invasive as an injection of malicious code directly into your phone. According to security researchers at this year’s Black Hat security conference, your iPhone can be compromised within one minute of being plugged into a harmful charger.

Exposure to a malicious kiosk can also create a lingering security problem even without the immediate injection of malicious code. Once a device is paired to a computer, it can access a host of personal information on the device, including your address book, notes, photos, music, sms database, typing cache, and even initiate a full backup of your phone, all of which can be accessed wirelessly at anytime.

How do I avoid it?

The most effective precautions center around simply not charging your phone using a third-party system. Here are some tips to help you avoid using public kiosk charger:
  • Keep your devices topped off: Make it a habit to charge your phone at your home and office when you’re not actively using it or are just sitting at your desk working.
  • Carry a personal charger: Chargers have become very small and portable, from USB cables to power banks. Get one and throw it in your bag so you can charge your phone anytime you’re at the office or while on-the-go if you use a power bank.
  • Carry a backup battery: If you’re not keen on bringing a spare charger or power bank, you can opt to carry a full spare battery if your device has a removable battery.
  • Lock your phone: When your phone is truly locked as in inaccessible without the input of a pin or equivalent passcode, your phone should not be able to be paired with the device it’s connected to.
  • Power the phone down: This technique only works on phones on a model-by-model basis as some phones will, despite being powered down, still power on the entire USB circuit and allow access to the flash storage in the device.
  • Use power only USB cables: These cables are missing the two wires necessary for data transmission and have only the two wires for power transmission remaining. They will charge your device, but data transfer is made impossible.
Even the tiniest detail like charging your phone from a kiosk charger could affect the security of your device. While there are many substitutes to using a third-party system, ultimately the best defense against a compromised mobile device is awareness. Looking to learn more about today’s security and threats? Contact us today and see how we can help.
Published with permission from TechAdvisory.org. Source.

Topic Security
September 4th, 2014

Hardware_Sep02_CBusinesses today rely heavily on technology on a daily basis. And regardless of the industry you’re involved in, an essential piece of hardware is the computer monitor, whether used at work or in the home. While computer monitors come in a variety of shapes, designs, and colors, did you know that they can also be categorized broadly into three different types based on the technology used to make them?

CRT (cathode ray tube) monitors

These monitors employ CRT technology, which was used most commonly in the manufacturing of television screens. With these monitors, a stream of intense high energy electrons is used to form images on a fluorescent screen. A cathode ray tube is basically a vacuum tube containing an electron gun at one end and a fluorescent screen at another end.

While CRT monitors can still be found in some organizations, many offices have stopped using them largely because they are heavy, bulky, and costly to replace should they break. While they are still in use, it would be a good idea to phase these monitors out for cheaper, lighter, and more reliable monitors.

LCD (liquid crystal display) monitors

The LCD monitor incorporates one of the most advanced technologies available today. Typically, it consists of a layer of color or monochrome pixels arranged schematically between a couple of transparent electrodes and two polarizing filters. Optical effect is made possible by polarizing the light in varied amounts and making it pass through the liquid crystal layer. The two types of LCD technology available are the active matrix of TFT and a passive matrix technology. TFT generates better picture quality and is more secure and reliable. Passive matrix, on the other hand, has a slow response time and is slowly becoming outdated.

The advantages of LCD monitors include their compact size which makes them lightweight. They also don't consume much electricity as CRT monitors, and can be run off of batteries which makes them ideal for laptops.

Images transmitted by these monitors don’t get geometrically distorted and have little flicker. However, this type of monitor does have disadvantages, such as its relatively high price, an image quality which is not constant when viewed from different angles, and a monitor resolution that is not always constant, meaning any alterations can result in reduced performance.

LED (light-emitting diodes) monitors

LED monitors are the latest types of monitors on the market today. These are flat panel, or slightly curved displays which make use of light-emitting diodes for back-lighting, instead of cold cathode fluorescent (CCFL) back-lighting used in LCDs. LED monitors are said to use much lesser power than CRT and LCD and are considered far more environmentally friendly.

The advantages of LED monitors are that they produce images with higher contrast, have less negative environmental impact when disposed, are more durable than CRT or LCD monitors, and features a very thin design. They also don’t produce much heat while running. The only downside is that they can be more expensive, especially for the high-end monitors like the new curved displays that are being released.

Being aware of the different types of computer monitors available should help you choose one that’s most suited to your needs. Looking to learn more about hardware in today’s world? Contact us and see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Hardware
September 3rd, 2014

BCP_Sep02_CWhile it’s important for businesses to perform risk assessments, it’s equally important to initiate a business impact analysis (BIA) in order to maximize business continuity. Why? Simply because the crux of any recovery is about whether it is achieved in a reasonable time, and BIA, if performed effectively, will determine exactly that. Knowing this, isn’t it time you for you to have a look at some tips for successful business impact analysis?

Five tips for successful business impact analysis:

  1. Treat it as a (mini) project: Define the person responsible for BIA implementation and their authority. You should also define the scope, objective, and time frame in which it should be implemented.
  2. Prepare a good questionnaire: A well structured questionnaire will save you a lot of time and will lead to more accurate results. For example: BS (British standard) 25999-1 and BS 2599902 standards will provide you with a fairly good idea about what your questionnaire should contain. Identifying impacts resulting from disruptions, determining how these vary over time, and identifying resources needed for recovery are often covered in this. It’s also good practice to use both qualitative and quantitative questions to identify impacts.
  3. Define clear criteria: If you’re planning for interviewees to answer questions by assigning values, for instance from one to five, be sure to explain exactly what each of the five marks mean. It’s not uncommon that the same event is evaluated as catastrophic by lower-level employees while top management personnel assess the same event as having a more moderate impact.
  4. Collect data through human interaction: The best way to collect data is when someone skilled in business continuity performs an interview with those responsible for critical activity. This way lots of unresolved questions are cleared up and well-balanced answers are achieved. If interviews are not feasible, do at least one workshop where all participants can ask everything that is concerning them. Avoid the shortcut of simply sending out questionnaires.
  5. Determine the recovery time objectives only after you have identified all the interdependencies: For example, through the questionnaire you might conclude that for critical activity A the maximum tolerable period of disruption is two days; however, the maximum tolerable period of disruption for critical activity B is one day and it cannot recover without the help of critical activity A. This means that the recovery time objective for A will be one day instead of two days.
More often than not, the results of BIA are unexpected and the recovery time objective is longer than it was initially thought. Still, it’s the most effective way to get you thinking and preparing for the issues that could strike your business. When you are carrying out BIA make sure you put in the effort and hours to do it right. Looking to learn more about business continuity? Contact us today.
Published with permission from TechAdvisory.org. Source.

September 3rd, 2014

OSX_Sep02_CAs a business owner or manager there will be times when you need to take screenshots. While many of us know how to take a simple screenshot on our Macs, there are actually steps you can follow to take even better shots. If you have ever struggled with capturing an image, here are four tips that can help you achieve better screenshots.

1. Know the shortcuts

As a Mac user, you likely know that the system is shortcut heavy. From navigating, to switching screens, to even opening programs, there is a shortcut for almost everything, including screenshots. With OS X there are a number of shortcuts associated with screenshots, and it is worthwhile knowing them:
  • Command + Shift + 3: Takes a screenshot of the entire screen.
  • Command + Ctrl + Shift + 3: Captures the entire screen and copies it to the clipboard. If you select Paste in a program like a word processor, it should paste the image.
  • Command + Shift + 4: Allows you to select the screenshot area and save it.
  • Command + Ctrl + Shift + 4: Allows you to select the screenshot area and copy it to the clipboard.
  • Command + Shift + 4 followed by spacebar: Captures an open window, folder, menu bar or desktop icon and saves it.
  • Command + Ctrl + Shift + 4 followed by spacebar: Captures an open window, folder, menu bar or desktop icon and copies it to the clipboard.
With Command + Shift + 4, you can also press and hold the spacebar once you have drawn a shape to move it around and select a different area. Also, pressing esc will cancel the screenshot selection if you have say selected too big of an area.

2. Including the cursor

Sometimes you may want to capture the mouse cursor pointing at something within a screenshot. You can do this by:
  1. Opening the Utilities folder on your computer. The quickest way to do this is to hit Command + Spacebar and typing Utilities.
  2. Scrolling down to the Grab app and opening it.
  3. Selecting Grab from the top right of your screen, followed by Preferences.
  4. Clicking on the cursor you would like to show up in your screenshots.
When you take the screenshot, the pointer will appear where you left it when the screenshot was taken.

3. Using Preview to take screenshots

If you have documents or files that contain images or text stored on your hard drive that you would like to take a screenshot of, the shortcuts will work fine, but did you know that you can use the Preview app to take screenshots as well?

If you right-click on the file that contains the information that you would like to take a screenshot of and select Open with followed by Preview, you will see the file open in preview mode. Clicking on File from the menu bar along the top followed by Take screenshot will allow you to capture the image.

When using this feature, you can select either:

  • From Selection… - Will allow you to draw a box to capture the screenshot.
  • From Window… - Will save the whole open window.
  • From Entire Screen… - Will capture the open window plus anything else on your screen.

4. Using the Grab app

Did you know that there is actually an app already installed on your computer that allows you to take screenshots? Most users rely on the shortcuts listed above, but these are actually related to the Grab app which is located in the Utilities folder.

If you open Grab (press Command + spacebar and type in 'Grab', select Grab under Applications), you can manually take screenshots using the app by:

  1. Clicking Capture.
  2. Selecting the type of screenshot from the drop-down menu.
The types of screenshot you can take with Grab include:
  1. Selection - Draw a box around the area of your screen you would like to capture.
  2. Window - Allows you to select a window to capture. Simply open the window and select Choose Window from the pop-up box.
  3. Screen - Will snap a screenshot of your entire screen.
  4. Timed Screen - Will start a timer then take an image of the screen in 10 seconds.
Looking to learn more about using OS X? Contact us today!
Published with permission from TechAdvisory.org. Source.

Topic Apple Mac OS
August 26th, 2014

androidphone_Aug26_CWhile location services on your Android smartphone make it easier for you to use certain apps or functions like photo tagging, sometimes it’s best to hide your location since they can affect your device’s security. With that in mind, isn’t it time you took a look at how to change different location settings on your Android smartphone to enhance its security?

Photos and GPS tagging

Your Android smartphone gives you the ability to attach GPS coordinates to the pictures you take, known as geo-locating or GPS tagging. This lets you arrange pictures in albums by locations, or lets Google+ stitch together stories of your trips. Geo-locating images in itself isn’t a bad thing, but you can get into trouble when you broadcast sensitive locations to the world. For instance, a picture of your expensive watch with a GPS tag of your house isn’t the best idea.

Four ways to control geo-locating photos:

  1. Go to your camera settings and you’ll find an on/off toggle.
  2. Simply go into Settings>Location and from there you can decide if you want the location saved along with your images.
  3. Download an EXIF editor and manually remove the location information from specific images.
  4. You can also turn off location services altogether by going to Settings>Location.

Discrete location settings

Apart from location settings in photos and GPS tagging, Android actually has three discrete location settings which allow you to set how accurately you want location reporting to be. You can find these at Settings>Location, Note that this affects your smartphone’s battery life immensely.
  • High accuracy: This uses the GPS radio in your phone to pinpoint its exact location from satellites while making use of nearby Wi-Fi and cellular networks too.
  • Battery saving: This mode only uses Wi-Fi networks and mobile networks to identify locations, and while it might not be as accurate it will help your phone last longer.
  • Device sensors only: This only uses the GPS radio to find you. It may take a little more time to find your location since it’s not using nearby Wi-Fi and mobile networks to get your general location first. This also uses more battery.
Having your location settings turned off will not only help keep your smartphone’s security intact, but also help strengthen your smartphone’s battery life. Interested in learning more about Android phones and their functions? We have solutions for you and your business.
Published with permission from TechAdvisory.org. Source.