Back to Top

Tech, Web, Cloud & Cabling Services

Author Archives: Website Admin

5G Wireless is coming…But what is 5G?

Just five years after the first 4G smartphone hit the market, the wireless industry is already preparing for 5G.

5G Wireless

Each of the four nationwide cell phone carriers, as well as smartphone chipmakers and the major network equipment companies are working on developing 5G network technology for their customers.

There are many significant hurdles that all the industry players have to clear before you’ll see a little 5G symbol next to the signal bars on your smartphone screen. For example, it has yet to be determined what 5G even means, let alone what it will look like and when it will get here.

But as consumers use up rapidly growing amounts of 4G bandwidth watching streaming videos on their phones, 5G will soon become a necessity. As telecom engineers work furiously to develop 5G technology, we’re getting a clearer picture of the who, what, where, when and why of 5G.

What is 5G?

5G

The “G” in 3G, 4G and 5G stands for “generation.” So 5G will be the fifth generation of wireless network technology.

The standards for 5G have not yet been set. According to Bill Smith, president of AT&T’s (T, Tech30)network operations, 5G will likely be defined in 2018, and the standards for 5G will codified sometime in 2019 by the standards-setting International Telecommunication Union, a branch of the United Nations. The standards will determine which wireless technologies can be called “5G,” as well as what its characteristics must include, such as how fast it will be.

Still, it’s possible to make a very educated guess about what 5G will look like based on the emerging 5G technologies that the wireless industry is experimenting with.

Here’s the elevator pitch: 5G will be faster, smarter and less power-hungry than 4G, enabling a slew of new wireless gadgets. 5G will let us have faster smartphones, more smart-home devices and longer-lasting wearable gizmos.

How fast will 5G be?

5G

5G has the potential to offer speeds up to 40 times faster than 4G — fast enough to stream “8K” video in 3-D or download a 3-D movie in about 6 seconds (on 4G, it would take 6 minutes).

Unfortunately for consumers, there’s a difference between lab experiments and reality. Peak speeds are fun to dream about, but in the real world, actual speeds are much slower than promised.

Nokia (NOK), one of the biggest 5G players, believes that its 5G technology will allow for real-world speeds of about 100 Megabits per second when the network is most congested — that’s about four times faster than 4G’s top speed.

Another characteristic of 5G is that it will have ultra-low latency, meaning that it could drastically reduce the amount of time it takes for the network to respond to your commands. That could give the appearance of much faster loading websites, apps, videos and messages.

How will it work?

A lot of the wireless companies’ 5G experimentation is taking place in super-high frequencies — as high as 73,000 MHz. Today’s cell phone networks broadcast signal in a range of 700 MHz to 3,500 MHz.

The advantage of high-frequency signals is that they’re capable of providing significantly faster data speeds. The disadvantage is that they travel much shorter distances and they can’t easily penetrate walls. That means thousands — perhaps even millions — of mini cell towers, or “small cells” would need to be placed on top of every lamp post, every building, inside every home and potentially every room.

That presents a host of problems. How can cell phone companies possibly process all that data? There are companies, such as Google’s recently acquired Alpental, that are working on those “backhaul” issues. But they’re not so close to a solution, according to Akshay Sharma, wireless infrastructure analyst at Gartner.

That’s why 5G might complement 4G, rather than outright replace it. In buildings and in crowded areas, 5G might provide a speed boost. But when you’re driving down the highway, 4G could be your only option — at least for a while.

When is 5G coming?

5G

None of these questions are going to be answered any time soon. The industry’s consensus is that it will run 5G experiments in South Korea during the 2018 Winter Olympics, with mass deployments beginning sometime in 2020.

Yet Verizon (VZ, Tech30) has said that it is working on 5G technology with the aim of bringing it to market much sooner — as early as 2017.

With all the questions surrounding 5G and all the wrinkles that need to be ironed out, it’s exceedingly unlikely that anything Verizon does will be widely deployed. For example, the smartphone makers will need to develop chips that are capable of sending and receiving 5G signal without driving costs significantly higher.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

The 10 most important lessons IT learned in 2015

Every year brings with it new challenges, and new lessons, for IT in the enterprise. Here are 10 of the lessons IT learned this past year.

IT lessons

 

The end of a year is always a good time for reflection, especially so if you’re evaluating what your business did right and what you can improve upon. In an increasingly digital world, IT has quickly become one of, if not the most, important aspects of an organization. So, it should be with great care that executives and admins look back on their year and try to glean some wisdom about what can be done differently in the year to come.

Here are 10 of the most important lessons that IT learned in 2015.

1. BYOX is here to stay

As smartphone use grew to near ubiquity in the enterprise, it brought with it the trend of BYOD, or, bring your own device. While that originally referred to mobile devices such as smartphones and tablets, it spawned as host of “bring your own” everything else.

“BYOX is the new mantra with consumers bringing their own applications, cloud sharing tools, social media into the enterprise; essentially bringing their own expectations of which technology they want to use and how and where they want to work in a corporate environment,” said Chuck Pol, president of Vodafone Americas.

2. DevOps is no longer just a buzzword

The term “DevOps” gained huge popularity in 2015 as a reference to an agile method that stresses the collaboration of development and operations. The goal is to connect the writers of the code with those who maintain the systems that run it. However, DevOps continues to evolve and, although it has its own set of challenges, it could be poised to become the method of choice for enterprise IT starting in 2016.

3. Data is currency

Data, especially as it relates to big data has been steadily growing in value but 2015 felt like a tipping point. Tools for both structured and unstructured data exploded in popularity and major data service providers went public, adding credibility to the field and likely creating a better inroad into the enterprise. Also, businesses got better at distinguishing between relevant and irrelevant data.

“It is no longer credible to look at data as big static objects in a deep lake, but rather be considered a set of fast moving assets in a raging river,” said Neil Jarvis, CIO of Fujitsu America. “In 2016 and beyond, companies need to look at the data that creates business-relevant information for today and tomorrow.”

4. Finding talent is problematic

Talent shortages don’t just affect startups on the West Coast. CompTIA CIO Randy Gross said that current estimates suggest there are more than one million IT job opening across the US alone, ranging across skill level from support specialists to network admins. Enterprises are going to have to work harder to attract and retain talent.

“Wise employers with IT jobs to fill have engaged in a self-examination of the tactics and strategies they’re using to attract new talent—and adjusting accordingly,” Gross said. “For some companies, new telecommuting and remote work options have helped them fill their talent gaps.”

5. SMAC is still relevant

The SMAC stack, which stands for social, mobile, analytics, and cloud, is also known by some as the “third platform.” As all of these individual components continue to grow and thrive in the workplace, their interdependencies will grow along with them.

“Senior management must become well versed about these technologies and their possibilities to create new value and new competitive advantages in their own business and markets,” Pol said.

6. Cloud lost its fear factor

Cloud acceptance was a mixed bag for a long time, but 2015 brought a more widespread embrace of cloud technologies and services in the enterprise. In fact, some trends are making it almost a necessity.

“The complete adoption of virtualization, as well as investigation into cloud and other strategies, is far more advanced than expected—particularly amongst SMBs,” said Patrick Hubbard, technical product marketing director at SolarWinds. “Making operating systems and applications truly mobile is redefining how companies think about their IT infrastructure.”

7. The security mindset is changing

Anthem BlueCross BlueShield and Harvard University were among the major organizations that dealt with a public security breach in 2015. With today’s social media, you can almost guarantee any data breach that occurs in the enterprise won’t stay a secret. And, with the risk of a breach high, Intel Security CTO Steve Grobman said that teams must adopt a new way of thinking.

“IT must embrace the mindset that they have already been breached, now how do you protect your environment with this new default outlook?,” Grobman said.

8. Shadow IT is a line item

Shadow IT carries nowhere near the same amount of scorn it once did in the enterprise. Some organizations are even openly embracing it, and making it a foundational part of their IT strategy. And, as shadow IT continues to grow, Pol said, it needs to be properly accounted for in the budget.

“As technology continues to transform business, IT infrastructure will become more complex and more difficult to have a complete view of technology across the business,” Pol said. “The role of IT will need to become more strategic and set clear lines of accountability between IT and line of business budget holders.”

9. Employees are the biggest security risk

When most people think about security risks to their organization, the image of the hooded hacker furiously typing away in a dark room. However, employees themselves pose a real threat to the security of an organization as well. Issues such as poor password practices and using unsecured networks with company devices are a real problem. Kelly Ricker, senior vice president of events and education at CompTIA, said mobile, while helping with agility and productivity, is a cybersecurity nightmare.IT

“Every device that employees use to conduct business—smartphones and smartwatches, tablets and laptops—is a potential security vulnerability,” Ricker said. “Companies that fail to acknowledge and address this fact face the very real risk of becoming a victim of cyber criminals and hackers.”

10. Commoditization is a threat

With the plethora of tools available to build and replicate popular tech, it is increasingly important for organizations to guard against the threat of commoditization.

“As development cycles become shorter and the potential for intellectual property to be recreated and copied increases, it is becoming more difficult to create a sustainable competitive advantage for your products and services,” Pol said.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Microsoft prices high-end Office 365 E5 at $420 per user per year

Microsoft begins selling its new highest-end Office 365 business plan, E5, on December 1 for $420 per user per year. Here’s what’s included.

Ofice 365-Plans

Microsoft will charge users $35 per user per month, or $420 per year, for its new highest-end Office 365 business plan.

Microsoft officials went public with the pricing for Office 365 E5, its top-of-the-line commercial Office 365 offering, on November 30 during the company’s Convergence EMEA conference. Office 365 E5 is available to customers for purchase starting, December 1.

Office 365 E4 — the current high-end version of Microsoft’s Office 365 line — sells for $22 per user per month, or $264 per user, per year.

The Office 365 E5 SKU will include Skype for Business (Lync) with support for features including Cloud PBX and Meeting Broadcast; new analytics features, like Power BI Pro and Delve Organizational Analytics; and new advanced security features, such as eDiscovery, Customer Lockbox, and Safe Attachments.

Office 365 E4 includes Skype for Business with Enterprise Voice and unified messaging; the full suite of locally downloadable Office apps; and Power BI for Office 365 (which is being superseded by Power BI pro).

Microsoft is planning to retire E4 and replace it with E5. However, Office 365 E4 will remain on the price list till June 30, 2016, Microsoft officials have said.

The E1 and E3 versions of Office 365 will retain their current prices of $8 per user per month, and $20 per user per month, respectively.

Office 365 E1 users will get new work-management capabilities, as well as Skype for Business’s Meeting Broadcast functionality added to their plans for no additional charge. Office 365 E3 users will get those same two new features, as well as the option to purchase Equivio Analytics for eDiscovery. (Microsoft bought Equivio in January 2015.)

Skype Meeting Broadcast enables users to broadcast of a Skype for Business meeting on the Internet to up to 10,000 people, who can attend in a browser.

Office 365 E5 users get all the features that E1 and E3 users get, plus other analytics and networking functionality, including Cloud PBX and PSTN Conferencing.

The Skype for Business Cloud PBX with PSTN Calling service provides users with the ability to make and receive traditional phone calls in their Skype for Business client, and to manage these calls using hold, resume, forward and transfer.

PSTN Conferencing is initially available to 15 countries on December 1, with a phased roll out to international markets in the future. Cloud PBX is available worldwide starting December 1. PSTN Calling is available in the U.S. starting December 1, with a phased roll out to international markets in the future.

The fine print: PSTN Conferencing users may incur additional per-minute consumption charges, but customer can disable this feature to avoid additional billing. PSTN Calling is paid add-on for E1, E3 and E5. For E5 users, PSTN Calling costs $24 extra (per user, per month) for international and domestic calling, and $12 for domestic calling only. For E1 and E3, the international and domestic calling plan is $32 extra.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

 

CISCO VPN CLIENT & WINDOWS 8 (32BIT & 64BIT) – REASON 442: FAILED

FAILED TO ENABLE VIRTUAL ADAPTOR –

HOW TO FIX IT

The Cisco VPN client is one of the most popular Cisco tools used by administrators, engineers and end-users to connect to their remote networks and access resources.

With the introduction of Windows 8, Cisco VPN users are faced with a problem – the Cisco VPN software installs correctly but fails to connect to any remote VPN network.

When trying to connect to a VPN network through a Windows 8 operating system (32 or 64 bit), the Cisco VPN client will fail to connect. As soon as the user double-clicks on the selected Connection Entry, the VPN client will begin its negotiation and request the username and password.

As soon as the credentials are provided, the VPN client shows the well-known “Securing communications channel” at the bottom of the windows application:

cisco-vpn-client-windows8-fix-

After a couple of seconds the Cisco VPN client will timeout, fail and eventually the connection is terminated. The user is then greeted by a pop up window explaining that the VPN failed with a Reason 442: Failed to enable Virtual Adaptor error:cisco-vpn-client-windows8-fix

INTRODUCING THE FIX – WORKAROUND

Thankfully the fix to this problem is simple and can be performed even by users with somewhat limited experience.

Here are 4 easy-to-follow steps to the solution:

1. Open your Windows Registry Editor by typing regedit in the Run prompt.

2. Browse to the Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CVirtA

3. From the window on the right, select and right-click on DisplayName and choose Modify from the menu. Alternatively, double-click onDisplayName:

cisco-vpn-client-windows8-fix

4. For Windows 8 32bit (x86) operating systems, change the value data from @oem8.inf,%CVirtA_Desc%;Cisco Systems VPN Adapter to Cisco Systems VPN Adapter.

For Windows 8 64bit (x64) operating systems, change the value data from @oem8.inf,%CVirtA_Desc%;Cisco Systems VPN Adapter for 64-bit Windows to Cisco Systems VPN Adapter for 64-bit Windows (shown below):cisco-vpn-client-windows8-fix

When done editing the Value data, click on OK and close the Registry Editor.

You can now run the Cisco VPN Client and connect to your VPN network.  Changes performed do not require a system restart.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

BYOD and the danger of litigation

BYOD means you must make a few extra preparations to protect your organization in cases of litigation and eDiscovery.

BYOD devices

It’s a fact that we live in a litigious world. Bring Your Own Device (BYOD) and even corporate-owned mobile devices often are caught up in legal cases. Chris Gallagher, national director for Adecco eQ, a nationwide eDiscovery firm gives an overview of how businesses can navigate eDiscovery when a business has BYOD devices seized as part of a court case.

eDiscovery and mobile devices

BYOD and corporate-owned devices can be put a litigation hold (sometimes called a “preservation order”) when an organization must preserve all forms of relevant information when there’s the anticipation of litigation.

Gallagher’s firm helps legal counsel with data forensic collection, acquisition on mobile devices and PCs. His company processes the data on these devices and uses advanced analytics to locate information pertinent to the litigation

eDiscovery and BYOD: The blurred line

BYOD is still, from a legal perspective, in its infancy, Gallagher said. He said every time his firm does a customer survey, they still hear about strong BYOD activity in the market.

He said, “Of course, from a discovery perspective, from a litigation hold perspective, it makes both the general counsel’s life that much more difficult as well as the law firm’s life more difficult because number one, there’s that blurred line, what is corporate data versus what is personal and individual data, where does that line cease?”

Gallagher points out that anytime you have devices entering and leaving a network there’s a control factor. Companies who master that control have a better (but still not perfect) time when they get called into discovery.

“When you have a device that is not a corporate-owned device that is accessing corporate information, the ownership of that information always comes into question,” Gallagher said.

“When dealing with eDiscovery, part of discovery requests are information that is under your direction and control,” he said. “It’s on a personal device, it’s not owned by the corporation, but it’s corporate-owned data, so is that under your control? Absolutely.”

Litigation holds on BYOD devices can be an added nuance and one more gray area that corporation have to deal with when it comes to BYOD in their enterprise.

Gallagher said you need to ask, ” How do you get that data back? How do you ensure that you’re not losing, not only from a litigation perspective, but the other major issue is corporate information, trademark secrets, corporate secrets, confidential information that you wouldn’t want to enhance?”

He further explained that a litigation hold over a BYOD devices means going beyond the normal things like a desk drawer, files, email, and shared devices. It means you have to ask “Okay, what else have you used to access the corporate network in the last year?

Wearables and eDiscovery

Wearable tech would have minimal impact on eDiscovery. Gallagher said, “Now, if you’re a corporate attorney, if you’re a defense counsel, one of the things you’re going to argue is “Well, the watch, everything that’s available on the watch, it’s just email, weather, that’s available on the server anyway, so you have another place to get it.”

The wearable is a highly discoverable type of device because most of that information is just replicating from somewhere else, Gallagher said. Usually, you are replicating wearable data from your phone so if you have the phone then everything’s replicated.

“For smaller cases, for cases at a location, for criminal cases, or matrimonial cases, where location is important, wearables could come into play,” he said.

Onboarding BYOD devices and eDiscovery

Much of what Gallagher said around BYOD policies is standard fare. I asked Gallagher how a company could protect themselves in the cases of salespeople (the “original BYOD”users) contracts and non-compete agreements. Competitors in highly competitive industries sue each over this kind of stuff all the time.

Career salespeople have their contacts (built from years of selling in an industry) that they keep on their phones. They may have sold to these customers over the years.

From a legal perspective in this scenario, Gallagher recommends that corporations have an addendum added to their standard employment agreement. The addendum should state, “I certify that I am not bringing anything from my former employee. We are hiring you for your knowledge of the industry in general and not any specific contacts that you may or may not have from former employees.

Gallagher said this sort of contract boilerplate puts the responsibility on their shoulders and that you aren’t hiring them for a particular contact.

He also advised that you want to make sure that they abide by their previous non-compete, but you don’t want them downloading or taking anything with them from their previous employer. Gallagher cautioned that you should not place any data from their previous employer on your corporate-owned system. Take, for example, syncing a personally owned smartphone to a corporate-owned laptop. Along with that sync can come corporate data from your competitor. eDiscovery can detect that data.

He further recommends that you have that new sales rep come to you with a clean slate of a cell phone.

Bringing contacts along on a personal device has become much easier legally speaking according to Gallagher. He said, “One of the recent things that’s come out of court cases is if you look at LinkedIn profiles, if you look at customer information but the sales rep proved that most of the information that he had from his ‘client’ was available publicly on their LinkedIn profiles.”

You don’t want them backing up their tablet to their new computer that could result in a breach of their non-compete, and now it’s backed up on your servers according to Gallagher.

Conclusion

Above and beyond the usual BYOD and challenges that enterprises face each day, you may also be navigating a blurred legal line so prepare yourself accordingly with BYOD policies and advice from your counsel to ensure that you are prepared if and when BYOD devices get put on a litigation hold.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

The 15 most frightening data breaches

data breaches

 

Ashley Madison (2015)

All data breaches are scary, but some just have that extra scream factor.

In arguably the most embarrassing data breach of the bunch, a group calling itself “The Impact Team” stole 37 million records from adultery website Ashley Madison, including many records that customers had paid to have deleted.

Virtually all of the company’s data was stolen in the hack, including records that suggest most female accounts on the site are fake, and that the company used female chat bots to trick men into spending money.

LivingSocial (2013)

Daily deals company LivingSocial had its network compromised in 2013, with hackers stealing roughly 50 million names, email addresses, birthdays, and encrypted passwords from its SQL database.

Sony PlayStation Network (2011)

Game over, man. In April 2011, hackers raided Sony’s PlayStation Network (PSN) service, stealing personally identifiable information from more than 77 million gamers.

Sony was further criticized for delaying the release of public information about the theft and for storing customer data in an unencrypted form.

The attack took Sony’s PSN out of service for 23 days.

Internal Revenue Service (2015)

Nigerian scammers pilfered more than $50 million from the U.S. Treasury via an embarrassingly simple 2015 hack of the Internal Revenue Service website.

Information scraped from previous data hacks was used to steal Americans’ identities and request copies of past tax returns on the IRS website. The crooks then filed new tax returns with falsified data, requesting big refunds.

The hack caused massive nightmares for the estimated 334,000 people whose records were stolen before the IRS shut down the transcript request service.

Target (2013)

Hackers installed point-of-sale malware on Target’s computer network sometime in 2013, resulting in the theft of more than 70 million customer records. Stolen data included payment card numbers, expiration dates, and CVV codes.

The retailer reached out to affected customers by offering free data monitoring (standard practice) and a 10% off discount on a future shopping trip. But it was too little, too late; same-store sales slid in the quarter following the hack.

Anthem (2015)

Anthem, the United States’ second largest for-profit health insurer, disclosed in February 2015 that it had lost 78.8 million unencrypted customer records to criminals. Names, social security numbers, email addresses, and income data was stolen.

The rare piece of good news: Financial and medical records were not affected.

Adobe (2013)

Adobe revealed in October 2013 that hackers had stolen 38 million active customer IDs and passwords, forcing the company to send out a wave of password reset warnings.

Weeks after, the news got worse for the company: The thieves also made off with the source code for its popular Adobe Photoshop software.

eBay (2014)

Talk about an inside job: In 2004, online auction house eBay suffered the largest hack in U.S. history, losing 145 million login credentials to a hacker using an internal eBay corporate account.

Names, email and street addresses, phone numbers, and birth dates were compromised, but thankfully, passwords were stored in encrypted form.

Home Depot (2014)

In September 2014, Home Depot admitted that it fell prey to hackers who installed antivirus-evading malware on its self-checkout registers. An estimated 56 million sets of customer payment card data were stolen in the attack.

The company’s losses related to the event are expected to top $1 billion when all of the lawsuits are finally settled. Only $100 million of that will be covered by insurance.

JP Morgan Chase (2014)

The September 2014 breach of JP Morgan Chase proved that even the largest U.S. banks are vulnerable to data theft. Online banking login details were not stolen, but crooks did get their hands on 76 million sets of names, emails, addresses, and phone numbers of bank customers, creating serious phishing concerns.

A group of Russian hackers is believed to be responsible for the attack.

PNI Digital Media (2015)

PNI Digital Media, the company that handles online photo printing for CVS, Walgreens, Rite Aid, Costco, and many more national chains, lost an unknown number of customer records to hackers in 2015.

Given that the company boasted more than 18 million transactions in 2014, it’s likely that this breach affected tens of millions of Americans.

Heartland (2008)

Credit and debit card processing firm Heartland Payment Systems became one of the largest data breach victims in U.S. history when hackers compromised more than 130 million accounts in 2008.

The criminal ring involved in the Heartland data theft was also found to be responsible for the 2005 hack of TJX Companies involving 94 million records.

TJX Companies (2005)

In a 2005 scheme dubbed “Operation Get Rich or Die Tryin,” a group of hackers used an unsecured Wi-Fi network at a Marshalls store to break into parent TJX Companies’ computer system and steal 94 million customer records, including payment card data.

Albert Gonzalez, the ringleader of the hack, is serving a 20-year sentence in Leavenworth.

U.S. Office of Personnel Management (2015)

Earlier this year, the United States Office of Personnel Management admitted that hackers had taken 21.5 million records belonging to those who had undergone government background checks or otherwise applied for federal employment. The hackers stole a wealth of sensitive data, including security clearance information and fingerprint data belonging to secret agents.

The Washington Post reported that the attack is believed to have originated in China.

Zappos (2012)

In January 2012, online shoe retailer Zappos stated that cybercriminals had stolen data of 24 million customers, including names, addresses, and the last four digits of their payment cards.

After the announcement, Zappos had to disconnect its phone lines to keep upset customers from calling in and overloading its phone system.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Five ways Microsoft plans to get you to upgrade to Windows 10

To achieve its goal of getting one billion people onto Windows 10, Microsoft is getting more forceful in how it pushes Windows 7 and 8.1 users towards its new OS.

Windows10

Microsoft wants Windows 10 on one billion devices by 2018 – and its tactics for hitting that ambitious goal are about to get more aggressive.

From next year, Microsoft will be more direct in pushing Windows 7 and 8.1 users to upgrade to its latest OS, in an attempt to bolster the 110 million-strong Windows 10 userbase.

Here’s how Microsoft is about to crank up the pressure to make the switch.

1. Windows 10 will automatically begin installing itself

From “early next year”, Microsoft will change the status of the free Windows 10 upgrade so it is classified as a Recommended Update.

Given that most home machines are set up to install Recommended Updates automatically, the change to Windows 10’s update status will lead to most Windows 7 and 8.1 machines beginning the upgrade.

However, Microsoft says that before Windows 10 is installed users will need to manually confirm the installation, giving them a chance to pull out.

Business users should be able to prevent the upgrade from automatically starting using tools such as Windows Server Update Services.

For those on metered connections, Terry Myerson, Microsoft’s executive VP of the Windows and Devices Group, said people “have the option of turning off automatic updates” before going on to say that such a move is unwise because of “the constant risk of internet threats”.

Those who don’t like the new OS will have 31 days to roll back to their previous version of Windows. To go back, select “Start Button->Settings->Update and Security->Recovery and Uninstall Windows 10”.

2. Upgrade notifications will be made more obvious

Despite Microsoft sticking a ‘Get Windows 10’ icon on the taskbar of most Windows 7 desktops, many customers apparently still can’t figure out how to initiate the upgrade.

Myerson says since launching Windows 10 the number one complaint has been ‘How do I get my upgrade?’.

To address the difficulty some users are having, Myerson said Microsoft will change “our notifications to be more approachable and hopefully clear, and sometimes fun”.

3. Upgrades will happen immediately

The process of initiating the upgrade to Windows 10 has also been streamlined.

In the weeks after Windows 10’s launch earlier this year, Microsoft required users to first reserve a Windows 10 upgrade, which would then be installed at a later date.

Microsoft has now replaced that two-step process with an immediate upgrade. Users clicking on the ‘Get Windows 10’ icon will now be given the option to ‘Upgrade Now’ to begin the upgrade process straightaway.

4. Simpler upgrade from unsanctioned copies of Windows

Myerson admits surprise at how many people running copies of Windows 7 and 8.1 that have not been authenticated then go on to buy Genuine copies of Windows 10.

Based on this experience, Microsoft plans to make it a “one-click” process for people running unsanctioned copies of the OS to “get Genuine” via the Windows Store or by entering an activation code bought elsewhere. The offer will be trialled in the US and, if successful, may be extended to other countries.

5. Upgrading multiple machines to Windows 10 will be easier

Those looking to upgrade several Windows 7 and Windows 8.1 machines to Windows 10 will soon find the process gets more straightforward.

Microsoft’s Media Creation Tool is used to create an image that can be run off a DVD or USB stick to upgrade qualifying machines to Windows 10.

According to Myerson, you will soon be able to use the tool to create a single image that will allow any number of 32-bit or 64-bit, Home or Pro machines to be upgraded and which will also allow for clean installs “wherever you have a Windows license”.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Google may be declaring war against Microsoft and Office 365

Microsoft Office 365 has taken market share from Google Apps and Google isn’t taking it lying down. Are we looking at the start of a price war?

Google apps vs Microsoft

According to an August 2015 report, Microsoft Office 365 has surpassed Google Apps and now controls more than 25% of the enterprise market—triple the enterprise market share the company held just a year ago. That is some serious growth and it hasn’t gone unnoticed by the folks at Alphabet (aka Google).

Details

On October 19, 2015, Rich Rao, head of global sales for Google Apps for Work announced a new program specifically designed to turn the tide against Microsoft Office 365’s advance.

In a nutshell, enterprises with preexisting contracts for a competitor’s office suite (read Office 365) looking to switch to Google Apps can do so and not pay any additional fees until the competitor’s contract has run its course. In essence, switching enterprises will pay Microsoft’s contract while they use Google Apps.

When the preexisting contract is over, enterprises sign a new contract with Google Apps. The announcement also suggests that Google will pay some of the transition costs through a special program offered by its Google for Work Partners service.

This is a bold move by Google and it signals that the company is reeling from the sudden surge of Microsoft Office 365. I don’t think Google was expecting this level of competition for its Google Apps suite.

Microsoft’s response

The ball is now in Microsoft’s court. There should be some kind of serious strategic response offered by Microsoft—that is, if it intends to maintain the growth of Office 365 in the enterprise market. Letting the tremendous advances in its market share over the last year erode would be irresponsible.

One strategy Microsoft may consider is lower subscription prices.

The basic enterprise version of Google Apps carries a subscription price of $5 per user. The basic enterprise version of Office 365 carries a subscription price of $8 per user. That $3 difference can really add up for a large enterprise and there may be some wiggle room for Microsoft to lower the per-user price for its service.

Cola wars. Pizza wars. We have seen major international companies take part in price wars in the past, and in the end, not much has been resolved. So I don’t think lowering their subscription prices is really the best strategy for Microsoft.

There is another way.

It’s all about collaboration

The basic applications offered by Office 365 and Google Apps—word processing, spreadsheets, emails, calendar, etc.—are similar. Office 365’s applications do have more features and deeper capabilities. Of course, Google Apps claims its lack of features is a good thing because its apps are simpler to use.

However, in this day and age, the real battleground for enterprise markets exists in features outside the basic office suite. The real battleground lies in cloud and collaboration services, including collaboration tools, storage, video communication, and document sharing. The cloud is where Microsoft and Google are going to fight their battle for productivity suite superiority.

And cloud is where Microsoft has been winning handily for the past year or so. I believe the new cloud and collaboration emphasis of Office 365 has taken Google by surprise. I think Google has realized that Microsoft has upped its game and that it can’t coast into increased enterprise market share by merely offering a lower-price, simpler productivity suite.

It may have been an indirect battle before, but Microsoft and Google are now engaged in a mano a mano fight for enterprise market share in the productivity software category. It will be interesting to see how this strategic battle between two superpowers plays out. I just hope each side takes appropriate steps to avoid collateral damage.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Office 365 – the easiest way to get the new Office.

Microsoft
Partner Network

Office 2016

Now, there’s more opportunities than ever to build your business.Office 216 is the latest addition to Office 365—taking the work out of working together. The new Office is built for teamwork. Perfect for Windows 10. Smart. Secure. Full of new features.

Consider the opportunities.

Exciting new advances in Office open new opportunities for you to deepen your role as trusted advisor and to expand your practice—and your revenue potential. Here are a few paths to consider:

  • Reach new customers by leveraging the innovative user experiences in Office 2016 apps
  • Grow your hybrid practice with cloud-inspired infrastructure in Office 2016 servers
  • Capitalize on Office 2016 launch momentum to renew or upsell Office 365

We think that Office 2016 is an important step in empowering every organization on the planet to achieve more. Action Pack and Competency partners can get started right away by using your internal use rights (IUR) benefits to download Office 365. Once you’re familiar with the new Office you can show your customers how to get the most from the new features.

Quick steps to get started:

Let’s do great work together.Your Microsoft Partner Network Team

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

CALL US NOW!