Back to Top

Tech, Web, Cloud & Cabling Services

Author Archives: Website Admin

49% of Businesses Hit by Ransomware

Ransom is the top motivation behind cyber attacks, according to a report from Radware, and IT professionals are most concerned about data loss. Here’s what you need to know.

Nearly half of businesses report that they were the subject of a cyber-ransom campaign in 2016, according to Radware’s, Global Application and Network Security Report 2016-2017.

Data loss topped the list of IT professionals’ cyber attack concerns, the report found, with 27% of tech leaders reporting this as their greatest worry. It was followed by service outage (19%), reputation loss (16%), and customer or partner loss (9%).

Malware or bot attacks hit half of all organizations surveyed in the last year. One reason for the pervasive attacks? The Internet of Things (IoT). Some 55% of respondents reported that IoT ecosystems had complicated their cybersecurity detection measures, as they create more vulnerabilities.

Ransomware attacks in particular continue to increase rapidly: 41% of respondents reported that ransom was the top motivator behind the cyber attacks they experienced in 2016. Meanwhile, 27% of respondents cited insider threats, 26% said political hacktivism, and 26% said competition.

While large-scale DDoS attacks dominated the headlines of 2016, this report found that only 4% of all attacks were more than 50 Gbps, while more than 83% of DDoS attacks reported were under 1 Gbps.

“One thing is clear: Money is the top motivator in the threat landscape today,” said Carl Herberger, vice president of security solutions at Radware, in a press release. “Attackers employ an ever-increasing number of tactics to steal valuable information, from ransom attacks that can lock up a company’s data, to DDoS attacks that act as a smoke screen for information theft, to direct brute force or injection attacks that grant direct access to internal data.”

Despite the growth in attacks, some 40% of organizations reported that they do not have an incident response plan in place, the survey found.

The report listed five cybersecurity predictions for 2017:

1. IoT will become an even larger risk. The Mirai IoT Botnet code is available to the public, making it more likely that cyber criminals of all experience levels are already strengthening their capabilities. “In 2017, exponentially more devices are expected to become targeted and enslaved into IoT botnets,” the press release stated. “IoT device manufacturers will have to face the issue of securing their devices before they are brought to market, as botnet attacks from these devices can generate large-scale attacks that easily exceed 1 Tbps.”

2. Ransomware attacks will continue to grow. These attacks will target phones, laptops, and company computers, and will likely take aim at healthcare devices such as defibrillators in the future, the press release stated.

3. Permanent Denial of Service (PDoS) attacks on data centers and IoT operations will rise. PDoS attacks, sometimes called “phlashing,” damage a system to the degree that it requires hardware replacement or reinstallation. These attacks are not new, but Radware predicts they are likely to become more pervasive in 2017 with the plethora of personal devices on the market.

4. Telephony DoS (TDoS) will become more sophisticated. These attacks, which cut off communications in a crisis, “could impede first responders’ situational awareness, exacerbate suffering and pain, and potentially increase loss of life,” the press release stated.

5. Public transportation system attacks will rise. As cars, trains, and planes become more automated, they also become more vulnerable to hackers, Radware stated.

You help your business avoid ransomware attacks and other cyber threats by keeping software up to date, backing up all information every day to a secure, offsite location, segmenting your network, performing penetration testing, and training staff on cyber security practices.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Is Your Yahoo Password in 450K Leak?

Takeaway: Hackers have posted 450K Yahoo email addresses and passwords online, and hint Gmail, Hotmail, other services are next. How can you check if your users’ accounts are among them?

Hackers posted more than 400,000 Yahoo Voice and email names and passwords and the posting might not be over yet.

Yahoo reps say they are working on the compromised system–not great timing for a beleaguered company enduring what Yahoo chair Alfred Amoroso called a “tumultuous” time for the company. The firm apologized in an online statement and did not comment further at this writing.

Not a Yahoo user? IT pros and security experts worry this most recent hack on Yahoo – allegedly perpetrated by a group calling itself d3dd3 – is likely “way bigger than Yahoo,” said Marcus Carey, in a Reuters report. Hotmail, MSN, Live, Gmail and other personal services are at risk, too, he said.

NOTE: If you want to check your own or other users’ Yahoo emails to see if they are part of the current leak, there’s an easy way to check here at Sucuri Malware Labs. Just type in the email address and search.

Plan for next time

Change passwords. Consider training customers on utilities like Lastpass. IT pros we interviewed across the board said users in enterprises who use open cloud-based email services, or other non-enterprise communication methods like Skype or Google Groups, should, at the very least, be using such utilities, which provide more control and protection in case of events like this one.

With so much data potentially compromised via users relying on such BYOD services as these, “the process (to avoid future attacks) is much easier if (users) have Lastpass,” said John Livingston, a tech pro for the American Red Cross in Savannah, Georgia. “Time to change your Yahoo, Google, Hotmail, and AOL passwords. And with LastPass, each site and service has a unique password, which limits damage if the password does get out. Changing passwords then is quick and easy. Plus if you’re a manager you don’t have to worry about remembering a new password.”

“Once this clears, I will be changing the passwords for Gmail, even though there’s no confirmation on that (hack) yet,” said Brian Geniesse, who works the IT tech desk at his firm in Monominee, Michigan. “Also be careful. Password managers can be hacked just the same.”

Yahoo is to blame ultimately, most IT pros we interviewed told us.

“Shame on Yahoo for not running normal security audits on (its) networks – and services that would have detected the SQL injection vulnerability (reportedly) used in the attack,” adds Dan Phillips, an IT pro in Cambridge, Ontario, Canada.

Geniesse expanded on that with a message that will resound with most IT pros and CTOs. Most people use weak passwords–see below.

“You can preach the use of LastPass and the like until you are blue in the face but users will never change their habits unless you force them,” Geniesse said. And “Yahoo needs to force some kind of password complexity to help protect their users.”

So many folks are checking the hack post, the hackers allegedly responsible are having trouble maintaining traffic load. Due to high traffic on this group’s site, the page with the Yahoo hacked emails and passwords is going up and down. We caught part of it in a cut and paste.

When it was up earlier today, it read in part:

We hope that the parties responsible for managing the security of this subdomain will take this as a wake-up call … not as a threat …

There have been many security holes exploited in webservers belonging to Yahoo … ?that have caused far greater damage than our disclosure (today). Please do not take (the posting) lightly. The subdomain and vulnerable parameters have not been posted to avoid further damage …

The author quotes author Jean Vanier from his book, Becoming Human: “Growth begins when we begin to accept our own weakness,” Vanier wrote.

If you’re a Star Wars, Star Trek or comic book fan, just change your passwords right away, other observers add. And talk your users into it to. Check this out: CNET’s Declan McCullagh wrote a program to analyze the most frequently used passwords using data from the post of 450K email addresses and passwords. He listed:

  • 2,295: The number of times a sequential list of numbers was used, with “123456? by far being the most popular password. There were several other instances where the numbers were reversed, or a few letters were added in a token effort to mix things up.
  • 160: The number of times “111111? is used as a password, which is only marginally better than a sequential list of numbers. The similarly creative “000000? is used 71 times.
  • 780: The number of times “password” was used as the password. Apparently, absolutely no thought went into security in these instances.
  • 233: The number of times “password” was used in conjunction with a few numbers behind it. Apparently, the barest minimum of thoughts went into security here.
  • 437: The number of times “welcome” is used. With a password like that, you’re just asking to be hacked.
  • 333: The number of times “ninja” is used. Pirates, unfortunately, didn’t make the list.
  • 137,559: The number of Yahoo credentials that were leaked.
  • 106,873: The number of Gmail credentials that were leaked. Hotmail, which was the next most frequently cited e-mail service, had fewer than half the number of users hit.
  • 161: The number of times “freedom” is used, suggesting a lot of patriotic users. “America” was used 68 times.
  • 161: The number of times the f-word is used in some combination. There are a lot of angry people out there.
  • 133: The number of times “baseball” appears as a password. It’s the most popular sport on the list, proving that it is indeed America’s national pastime. It just may not be the best password.
  • 106: The number of times “superman” is used as a password. That’s nearly double the amount of times “batman” is used and triple the frequency of “spiderman.”
  • 52: The number of times “starwars” is used. The force is not with this password.
  • 56: The number of times “winner” is used.32: The number of times “lakers” appears. It tied with “maverick,” although fortunately “the_heat” or “celtics” weren’t on this list.
  • 27: The number of times “ncc1701? is used as a password. For those of you who aren’t trekkies, that’s the designation code for the Starship Enterprise. “startrek” is used 17 times, while “ncc1701a,” the designation for the Enterprise used in later Star Trek movies, is used 15 times.

40+ Cloud Terms You Must Know

A familiarity with cloud computing terminology will help you follow the industry’s developments. This glossary offers a rundown of more than 40 cloud terms.

 

CloudSolutions

Advertising-based pricing model

A pricing model whereby services are offered to customers at low or no cost, with the service provider being compensated by advertisers whose ads are delivered to the consumer along with the service.

Amazon Elastic Compute Cloud (EC2)

Part of Amazon Web Services (AWS), EC2 provides scalable computing capacity in the cloud, which developers can use to deploy scalable applications.

Amazon Simple Storage Service (S3)

Part of AWS, S3 allows for the storage and retrieval of data. It can also be used to host static websites.

Apache Hadoop

An open-source software framework for distributed storage and processing of large sets of data.

AWS

The organizational unit of Amazon that provides a variety of cloud services. AWS operates from 11 physical locations across North and South America, Europe, Asia, and Australia.

Content delivery network (CDN)

A distributed system consisting of servers in discrete physical locations, configured in a way that clients can access the server closest to them on the network, thereby improving speeds.

Cloud

A metaphor for a global network, first used in reference to the telephone network and now commonly used to represent the internet.

Cloud portability

The ability to move applications and data from one cloud provider to another. See also Vendor lock-in.

Cloud provider

A company that provides cloud-based platform, infrastructure, application, or storage services to other organizations and/or individuals, usually for a fee.

Cloudsourcing

Replacing traditional IT operations with lower-cost, outsourced cloud services.

Cloud storage

A service that allows customers to save data by transferring it over the internet or another network to an offsite storage system maintained by a third party.

Cloudware

Software that enables creating, deploying, running, or managing applications in the cloud.

Cluster

A group of linked computers that work together as if they were a single computer, for high availability and/or load balancing.

Consumer cloud

Cloud computing offerings targeted toward individuals for personal use, such as Dropbox or iCloud.

Consumption-based pricing model

A pricing model whereby the service provider charges its customers based on the amount of the service the customer consumes, rather than a time-based fee. For example, a cloud storage provider might charge per gigabyte of information stored. See also Subscription-based pricing model.

Content Management Interoperability Services (CMIS)

An open standard for controlling content and document management systems and repositories using web protocols.

Customer self-service

A feature that allows customers to provision, manage, and terminate services themselves, without involving the service provider, via a web interface or programmatic calls to service APIs.

Disruptive technology

A business term that describes innovations that improve products or services in unexpected ways. These innovations change the methods used to accomplish a task, and re-shape the market for that task. Cloud computing is considered a disruptive technology because of its elasticity, flexible pricing models, and maintenance cost compared to traditional IT service provisioning.

Docker

Open-source software that automates the deployment of applications inside virtualized software containers.

Elastic computing

The ability to dynamically provision and deprovision computing and storage resources to stretch to the demands of peak usage, without the need to worry about capacity planning and engineering around uneven usage patterns.

External cloud

Public or private cloud services that are provided by a third party outside the organization.

Google App Engine

A service that enables developers to create and run web applications on Google’s infrastructure and share their applications via a pay-as-you-go, consumption-based plan with no setup costs or recurring fees.

Google Apps

Google’s Software as a Service (SaaS) product includes an office productivity suite, email, calendar, and file storage and sharing. Google Apps for Businessincludes an enterprise administration interface and archiving tools, and support for legal holds document discovery compliance. Google Apps for Education includes additional collaboration and reporting tools for classroom environments.

Hardware as a Service (HaaS)

Also see IaaS.

Hosted application

An internet-based or web-based application software program that runs on a remote server and can be accessed via an internet-connected PC or thin client. See also SaaS.

Hybrid cloud

The combination of a public cloud provider (such as AWS) with a private cloud platform. The public and private cloud infrastructures operate independently of each other, and integrate using software and processes that allow for the portability of data and applications.

Infrastructure as a Service (IaaS)

Cloud infrastructure services in which a virtualized environment is delivered as a service by the cloud provider. This infrastructure can include servers, network equipment, and software, including a complete desktop environment such as Windows or Linux.

Internal cloud

A private cloud instance provided and supported by an IT department for internal use.

Microsoft Azure

Microsoft’s cloud platform that provides a myriad of Platform as a Service (PaaS) and IaaS offerings, including Microsoft-specific and third-party standards, for developers to deploy cloud applications and services.

Microsoft Office 365

Microsoft’s software plus services model that offers Microsoft Office on a subscription-based pricing model, with cloud storage abilities. For business and enterprise use, Office 365 includes email and SNS, with cloud-hosted instances of Exchange Server and Skype for Business, among others.

Middleware

Software that sits between applications and operating systems, consisting of a set of services that enable interoperability in support of distributed architectures by passing data between applications. So, for example, the data in one database can be accessed through another database.

Multitenancy

The existence of multiple clients sharing resources (services or applications) on distinct physical hardware. Due to the on-demand nature of cloud, most services are multi tenant.

On-demand service

A model by which a customer can purchase cloud services as needed; for instance, if customers need to utilize additional servers for the duration of a project, they can do so and then drop back to the previous level after the project is completed.

OpenStack

A free and open-source cloud computing software platform used to control pools of processing, storage, and networking resources in a datacenter.

PaaS

Cloud platform services, whereby the computing platform (operating system and associated services) is delivered as a service over the internet by the provider.

Pay as you go

A cost model for cloud services that encompasses both subscription-based and consumption-based models, in contrast to the traditional IT cost model that requires up-front capital expenditures for hardware and software.

Private cloud

Services offered over the internet or over a private internal network to select users. These services are not available to the general public.

Public cloud

Services offered over the public internet. These services are available to anyone who wants to purchase the service.

Software as a Service (SaaS)

Cloud application services, whereby applications are delivered over the internet by the provider so the applications don’t have to be purchased, installed, and run on the customer’s computers. SaaS providers were previously referred to as application service providers.

Salesforce

An online SaaS company that is best known for delivering customer relationship management (CRM) software to companies over the internet.

Service migration

The act of moving from one cloud service or vendor to another.

Service provider

The company or organization that provides a public or private cloud service.

Service level agreement (SLA)

A contractual agreement by which a service provider defines the level of service, responsibilities, priorities, and guarantees regarding availability, performance, and other aspects of the service.

Social networking service (SNS)

Used in enterprises for collaboration, file sharing, and knowledge transfer; among the most common platforms are Microsoft’s Yammer, and Salesforce’s Chatter. Often called enterprise social software to differentiate between “traditional” SNS platforms such as Facebook or LinkedIn.

Software plus services

The combination of cloud-hosted services with locally running software. This method allows for using the local system for processing power while relying on cloud operations for software license verification, portable identities, syncing between devices, and file storage.

Subscription-based pricing model

A pricing model that lets customers pay a fee to use the service for a particular time period, often used for SaaS services. See also Consumption-based pricing model.

Utility computing

A provisioning model in which services are available as needed, and users are charged for specific usage, in a manner similar to municipal utilities such as electricity or water.

Vendor lock-in

Dependency upon a particular cloud vendor and low ability to migrate between vendors due to an absence of support for standardized protocols, APIs, data structures (schema), and/or service models.

Vertical cloud

A cloud computing environment optimized for use and built around the compliance needs of specialized industries, such as healthcare, financial services, and government operations.

Virtual private data center

Resources grouped according to specific business objectives.

Virtual private cloud (VPC)

A private cloud that exists within a shared or public cloud, e.g., the Amazon VPC that allows Amazon EC2 to connect to legacy infrastructure on an IPsec VPN.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

4 WAYS TO SPEED UP YOUR PC

Speed Up Computer

How to make a computer faster: 4 ways to speed up your PC

By following a few simple guidelines, you can maintain your computer, help increase your PC speed, and help keep it running smoothly. This article discusses how to use the tools installed on your computer, plus a few safe and free downloads, to help make your computer faster, maintain your computer efficiently, and help safeguard your privacy when you’re online.

Note: Some of the tools mentioned in this article require you to be logged on as an administrator. If you aren’t logged on as an administrator, you can only change settings that apply to your user account.

1. Remove spyware, and help protect your computer from viruses

Spyware collects personal information without letting you know and without asking for permission. From the websites you visit to user names and passwords, spyware can put you and your confidential information at risk. In addition to privacy concerns, spyware can hamper your computer’s performance. To combat spyware, you might want to consider using Malwarebytes. This scan is a free service that helps check for and remove viruses. You should also download Microsoft Security Essentials for free to help guard your system in the future from viruses, spyware, adware, and other malicious software (also known as malware). Microsoft Security Essentials acts as a spyware removal tool and includes automatic updates to help keep your system protected from emerging threats.

2. Free up disk space

The Disk Cleanup tool helps you to free up space on your hard disk to improve the performance of your computer. The tool identifies files that you can safely delete and then enables you to choose whether you want to delete some or all of the identified files.

Use Disk Cleanup to:

– Remove temporary Internet files.
– Delete downloaded program files, such as Microsoft ActiveX controls and Java applets.
– Empty the Recycle Bin.
– Remove Windows temporary files, such as error reports.
– Delete optional Windows components that you don’t use.
– Delete installed programs that you no longer use.
– Remove unused restore points and shadow copies from System Restore.

Tip: Typically, temporary Internet files take the most amount of space because the browser caches each page you visit for faster access later.

To use Disk Cleanup:

Windows 7 users

1. Click Start, click All Programs, click Accessories, click System Tools, and then click Disk Cleanup. If several drives are available, you might be prompted to specify which drive you want to clean.

2. When Disk Cleanup has calculated how much space you can free up, in the Disk Cleanup for dialog box, scroll through the content of the Files to delete list.

3.  Clear the check boxes for files that you don’t want to delete, and then click OK.

4.  When prompted to confirm that you want to delete the specified files, click Yes.

After a few minutes, the process completes and the Disk Cleanup dialog box closes, leaving your computer cleaner, performing better, and potentially increasing your PC speed.  For more options, such as cleaning up System Restore and Shadow copy files, under Description, click Clean up system files, and then click the More Options tab.

Windows Vista users

1. In the Start menu, click All Programs, click Accessories, click System Tools, and then click Disk Cleanup.

2. In the Disk Cleanup Options dialog box, choose whether you want to clean up your own files only or all of the files on the computer.

3. If the Disk Cleanup: Drive Selection dialog box appears, select the hard disk drive that you want to clean up, and then click OK.

4. Click the Disk Cleanup tab, and then select the check boxes for the files you want to delete.

5. When you finish selecting the files you want to delete, click OK, and then, to confirm the operation, click Delete files. Disk Cleanup then removes all unnecessary files from your computer. This may take a few minutes.

The More Options tab is available when you choose to clean files from all users on the computer.

Windows XP users

1.  Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Cleanup. If several drives are available, you might be prompted to specify which drive you want to clean.

2.  In the Disk Cleanup for dialog box, scroll through the content of the Files to delete list.

3.  Clear the check boxes for files that you don’t want to delete, and then click OK.

4.  When prompted to confirm that you want to delete the specified files, click Yes.

After a few minutes, the process completes and the Disk Cleanup dialog box closes, leaving your computer cleaner and potentially performing better.

3. Speed up access to data

Disk fragmentation slows the overall performance of your system. When files are fragmented, the computer must search the hard disk as a file is opened (to piece it back together). The response time can be significantly longer.

Disk Defragmenter (sometimes shortened to Defrag by users) is a Windows utility that consolidates fragmented files and folders on your computer’s hard disk so that each occupies a single space on the disk. With your files stored neatly end to end, without fragmentation, reading and writing to the disk speeds up.

When to run Disk Defragmenter
In addition to running Disk Defragmenter at regular intervals (weekly is optimal), there are other times you should run it, too, such as when:

– You add a large number of files.
– Your free disk space totals 15 percent or less.
– You install new programs or a new version of the Windows operating system.

To use Disk Defragmenter:

Windows 7 users

1. Click Start, click All Programs, click Accessories, click System Tools, and then click Disk Defragmenter.

 

2. In the Disk Defragmenter dialog box, click the drives that you want to defragment, and then click the Analyze disk button. After the disk is analyzed, a dialog box appears, letting you know whether you should defragment the analyzed drives.

Tip: You should analyze a volume before defragmenting it to get an estimate of how long the defragmentation process will take.

3.  To defragment the selected drive or drives, click the Defragment disk button. In the Current status area, under the Progress column, you can monitor the process as it happens. After the defragmentation is complete, Disk Defragmenter displays the results.

4.  To display detailed information about the defragmented disk or partition, click View Report.

5.  To close the View Report dialog box, click Close.

6.  You can also schedule the Disk Defragmenter to run automatically. (Your computer might even be set up this way by default.) Under Schedule, it reads Scheduled defragmentation is turned on and then displays the time of day and frequency of defragmentation. If you want to turn off automatic defragmentation or to change the time or frequency, click Configure schedule (or Turn on Schedule, if it is not currently configured to run automatically). Change the settings, and then click OK.

7.  To close the Disk Defragmenter utility, on the title bar of the window, click the Close button.

Windows Vista users

1.  Open Disk Defragmenter: Click the Start button, click All Programs, click Accessories, click System Tools, and then click Disk Defragmenter. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.

2.  In the Disk Defragmenter dialog box, click the drives that you want to defragment and then click the Analyze diskbutton. After the disk is analyzed, a dialog box appears letting you know whether you should defragment the analyzed drives.

Tip: You should analyze a volume before defragmenting it to get an estimate of how long the defragmentation process will take.

3.  To defragment the selected drive or drives, click the Defragment disk button. In the Current status area, under the Progress column, you can monitor the process as it happens. After the defragmentation is complete, Disk Defragmenter displays the results.

4.  To display detailed information about the defragmented disk or partition, click View Report.

5.  To close the View Report dialog box, click Close.

6.  You can also schedule the Disk Defragmenter to run automatically. (Your computer might be set up this way by default.) Click Modify schedule….

7.  In the Disk Defragmenter: Modify Schedule dialog box, choose how often, which day, and at what time of day you want defragmentation to occur, and then click OK.

8.  Click OK again.

Windows XP users

1.  Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Defragmenter.

2.  In the Disk Defragmenter dialog box, click the drives that you want to defragment and then click the Analyze button. After the disk is analyzed, a dialog box appears, letting you know whether you should defragment the analyzed drives.

Tip: You should analyze a volume before defragmenting it to get an estimate of how long the defragmentation process will take.

3.  To defragment the selected drive or drives, click the Defragment button. Note:In Windows Vista, there is no graphical user interface to demonstrate the progress—but your hard drive is still being defragmented.  After the defragmentation is complete, Disk Defragmenter displays the results.

4.  To display detailed information about the defragmented disk or partition, click View Report.

5.  To close the View Report dialog box, click Close.

6.  To close the Disk Defragmenter utility, on the title bar of the window, click the Close button.

Running Disk Cleanup and Disk Defragmenter on a regular basis is a proven way to help keep your computer running quickly and efficiently. If you’d like to learn how to schedule these tools and others to run automatically, please read Speed up your PC: Automate your computer maintenance schedule.

4. Detect and repair disk errors

In addition to running Disk Cleanup and Disk Defragmenter to optimize the performance of your computer, you can check the integrity of the files stored on your hard disk by running the Error Checking utility.

As you use your hard drive, it can develop bad sectors. Bad sectors slow down hard disk performance and sometimes make data writing (such as file saving) difficult or even impossible. The Error Checking utility scans the hard drive for bad sectors and scans for file system errors to see whether certain files or folders are misplaced.

If you use your computer daily, you should run this utility once a week to help prevent data loss.

Run the Error Checking utility:

1.  Close all open files.

2.  Click Start, and then click Computer.

3.  In the Computer window (My Computer in Windows XP), right-click the hard disk you want to search for bad sectors, and then click Properties.

4.  In the Properties dialog box, click the Tools tab.

5.  Click the Check Now button.

6.  In the Check Disk dialog box (called Error-checking in Windows 7), select the Scan for and attempt recovery of bad sectors check box, and then click Start.

7.  If bad sectors are found, choose to fix them.

Tip: Only select the “Automatically fix file system errors” check box if you think that your disk contains bad sectors.

To see the original article in its entirety click here.

3 Ways to Boost Password Security

The must-read IT business eNewsletter

Encrypted passwords

“There is no such thing as perfect security,” says Jim Waldron, Senior Architect for Platform Security at HP. If you can access a website or server, consider it vulnerable to security breaches. That’s why so many businesses account for fraud in their business models—they expect to lose a certain amount each year to security leaks, lost IP, and more.

While you can never be 100% secure from hackers while connected to the internet, there are steps you can take to help protect your personal and professional data. All you need to do is activate features that are increasingly common (or easy to manage) on modern business-class PCs: Multi-factor authentication, client-based user authentication, and password best practices.

Multi-factor authentication
Multi-factor authentication is a simple but effective security system that involves the use of at least two factors (or methods) of authentication. It groups different factors together so that even if one is compromised, the data remains protected. Under this system, factors are divided into three domains:

HP support

 

  • Something you know: Password, PIN, etc.
  • Something you have: ATM card, smartcard, etc.
  • Something you are: Fingerprint, iris, etc.

For multi-factor authentication to be successful, you want to pull from at least two different domains, with a maximum of three domains. A common example of multi-factor authentication is when you withdraw cash from an ATM. To do so, you insert your ATM card (something you have) and enter your PIN (something you know). Without both factors you can’t access your account—and neither should anyone else.

Businesses are taking notice too, and multi-factor authentication’s popularity is rising. In 2014, 37% of enterprise organizations surveyed used multi-factor authentication for the majority of their employees, and that number is expected to grow to 56% by 2016.

What you can do now
If you have a business-grade PC, chances are your PC already includes the technologies you need to start using multi-factor authentication. In fact, HP offers multi-factor authentication on all of its business PCs. Consult your manual or HP Support, and identify the factors your PC supports in addition to traditional passwords, such as fingerprint or smartcard readers. Just make sure to choose factors from separate domains.

Client-based user authentication
Every time you log into a system, your identity needs to be authenticated by that system. This process occurs one of two ways: server-side authentication or client-based authentication. With server-side authentication your unencrypted information—such as your password or fingerprint—is sent to a server where it is compared against that server’s records. With client-based authentication, the authentication process—e.g., “Does this fingerprint match the one in our records?”—is performed on the client device, such as your work PC.

While client-based authentication is not as common as its counterpart, it is far more secure. In fact, “In almost all authentication scenarios it is preferable to perform the direct authentication on the client and then communicate an ‘Identity Assurance’ to the relying party,” says Waldron.

Everyone wins when it comes to client-based authentication. The client no longer has to send unencrypted, private information over the internet or store that information on another party’s server, while the relying party no longer has to store sensitive client information on their server—reducing the amount of information that can be stolen if and when a hack occurs.

What you can do now
One of the easiest ways to use client-based authentication is with a hardened fingerprint sensor. The sensor authenticates your fingerprint directly in the hardware, rather than sending it to a server or hard drive, and returns a key that can be used to decrypt password vaults.

Password best practices
As we’ve mentioned before, passwords aren’t perfect. While implementing and using the above features might not seem practical for some of us, everyone can benefit from following basic password best practices. They are quick to implement, and can save you a lot of hassle down the line.

To make the most of your password security, your passwords should be:

  • Long—at least 16 characters. Use a password manager to store unique passwords and fill out log-in forms so that you don’t have to memorize them.
  • Complex—containing symbols, numbers, uppercase letters, lowercase letters, and spaces (if possible)
  • Unique—only use a password once, don’t recycle or repeat across accounts
  • Short-lived—the National Cyber Security Alliance suggests changing your password every 60 days
  • Difficult to guess—avoid common words found in a dictionary, all or part of your name, repeated letters, or combos that align to your keyboard layout, such as “QWERTY” or “123456”

If you are uncertain whether your password is secure enough or if it meets enough of the criteria above, there are several reliable services that will check your password strength for you. Microsoft’s Safety & Security Center offers a free password checker you can access through your browser, while Mac users can access Apple’s Password Assistant through the Keychain Access utility.

What you can do now
The first thing you can do—right this second—is revise your most important passwords to align with password best practices. That includes your work accounts, personal email, bank accounts, and any other services that contain sensitive data. If you need help remembering your new passwords, consider using a password manager such as HP Password Manager. That way you only have to authenticate once to gain access to all your systems. You can also adopt a system to make your passwords easier to remember. Using acronyms, for example, you can turn the phrase “I was born in 1986 and my parents still live on Lake Street!” into “Iwbi1986ampsloLS!”—creating a strong password that’s easy to remember.

Passwords are changing, and while they will never be perfect, they can still provide an effective first layer of defense against hackers and ne’er do wells. The above features and techniques are increasingly common on modern business PCs, making it easier than ever to protect your private data. All you have to do is use them.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

10 Ways Office 2016 Boosts Productivity

Microsoft wants Office 2016 to be the last office productivity suite you will ever need. Here are 10 things you should know about how it plans to make that happen.

Microsoft Office 2016

On September 22, 2015, Microsoft released Office 2016 to the masses. At first glance, you may not notice much has changed since Office 2013. But when you look deeper, you will find some interesting and productivity-enhancing differences.

For years we’ve been promised wonderful benefits from cloud computing, and Microsoft Office 2016 is trying to deliver on those promises. It’s designed to meet our expectations of what a cloud-based, mobile-ready productivity suite can and should be. Only time will tell if Office 2016 actually delivers the goods, but the initial reviews are promising.

Here are 10 things Microsoft Office 2016 offers as it aspires to be the last productivity suite you are ever going to need.

1: Real-time co-authoring

Co-authoring has been around for a long time for many Office apps, but with Office 2016 that collaboration can now take place in real time. That means you will be able to see what your co-conspirators are doing in a Word document or PowerPoint presentation as they do it—and conversely they will be able to see what you are doing. It won’t even matter where you are or what device you are using.

2: OneNote notebook sharing

OneNote is one of the most useful applications available in Microsoft Office, and it is also one of the least appreciated. Office 2016 allows you to share a OneNote notebook with as many people as you want. And because OneNote works with text, images, worksheets, emails, and just about any other document type you can think of, it can be a great central resource for a team working on a project. That is, if they know to use it.

3: Simplified document sharing

Office 2016 simplifies sharing of documents by adding a Share button to the upper-right corner of your Office apps. Clicking that button will give you one-click access to share your document with anyone in your contacts list. You don’t even have to leave the document to do it. That does sound pretty simple.

4: Smart attachments

If you’re like me, you have to send email attachments just about every day. In previous versions of Office, adding attachments to an email required you to navigate to the location where the document was stored. You can still do that in Office 2016, but if the document in question was one you worked on recently, it will now show up in a list of shareable documents right there in Outlook. Essentially, Office 2016 keeps a universal recently worked on list for you.

5: Clutter for Outlook

Like most of us, you probably get a ton of email every day. Wading through the Outlook inbox to prioritize each email takes time and hampers your ability to be productive. Office 2016 adds a new category to your inbox triage toolbox, called Clutter. You can designate certain emails as low priority and they, and future similar emails, will be deposited automatically into a Clutter folder in Outlook. So now you have four categories for email: important, clutter, junk, and delete.

6: Better version history

Collaboration and creativity can be a messy process, with shared documents changing drastically over time. Office 2016 compensates for potentially lost ideas by keeping past versions of documents and making them available directly from Office applications under the History section of the File menu.

7: New chart types in Excel

The ability to visualize data with an Excel chart has always been a welcome and powerful capability. However, the list of available chart types found in previous versions of Excel needed an update. Office 2016 adds several new chart types to the templates list, including Waterfall, which is great chart if you like to track the stock market. Other new chart types include Treemap, Pareto, Histogram, Box and Whisker, and Sunburst.

8: Power BI

Between the release of Office 2013 and Office 2016, Microsoft spent a great amount of time and capital acquiring technologies that shore up its business intelligence and analytical applications. Power BI, a powerful analytics tool, now comes bundled with your Office 365 subscription. Knowing every little detail about how your business is running is essential information, and Power BI can bring it all together for you.

9: Delve

Delve is another new tool that comes with an Office 365 subscription. The best way to describe Delve is as a central location that gives you access to everything you have created, shared, or collaborated on using Office 2016. It is another recently worked on list, only this version of the list is stored in the cloud—so you can access it from anywhere with any device using the Office 365 Portal.

10: Purchase choices

Office 2016 is generally available only as a subscription. Even if you buy a boxed version of Office 2016, you are buying access to an annual subscription, with one exception. If you purchase the Office Home & Student 2016 box, you pay a one-time fee of $149.99 for just the basic Office apps.

Microsoft has definitely stacked the deck so that the best bang for the buck is a subscription to Office 365, which includes Office 2016 plus all the cloud services. Businesses should be looking at one of the Office 365 for Business subscriptions. It is also going to be your best deal.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

 

HAPPY FALL Y’ALL!

South Jersey Techies invites you to stop by our office our 3rd Annual Holiday Lights-to-Music Display!

This time we are celebrating Halloween! 

Located at 229 North Locust Ave, Marlton NJ.

We hope you enjoy the show and have a Spooktacular time!!

Visit 7pm thru midnight each evening now until Halloween

 

South Jersey Techies

Park and Tune into 89.9FM

 

iOS 9.3: 3 Features Businesses Need

iOS 9.3 offers several features that might appeal to business-oriented Apple users.

Apple introduced a new version of iOS on Monday. The update includes several new features, including updates to CarPlay and HealthKit, as well as a feature to make it easier for iPads to be used in schools for educational purposes. There are several other new features which are particularly appealing to the business-oriented user.

Here are 3 new features business users should check out.

ios93SJTechies

Night Shift

The proliferation of devices like tablets and smartphones means that some sort of screen is never far away. For many, looking at a screen is the first and last thing they do in the morning and evening.

The problem with that is screens emit blue light, which reduces the amount of melatonin produced in the body. Melatonin is a chemical that helps people fall asleep. The light emitted from smartphones can also cause eye strain, which carries symptoms like headaches and blurred vision.

With this latest version of iOS 9, Apple introduced Night Shift, a feature that automatically adjusts the colors of your display at night. You can schedule times for it to go into effect, manually turn it on and off, and adjust colors on a scale of less warm to more warm.

You can access Night Shift through Settings | Display & Brightness, or through the menu that swipes up from the bottom of the device’s screen.

ios9SJTechies

Password-protected Notes

Notes is iOS’ app for taking, well, notes. iOS 9.3 updates it by allowing users a layer of security. Now, users can lock their notes using either a password or the Touch ID, which makes the app that much more useful.

In order to lock a note, tap the button in the top right corner (the one you might use if you were going to email the note) and then tap Lock Note. When prompted, enter a password, confirm it, and decide if you want to enable the Touch ID. A lock button will appear at the top of the note and in the future if you want to open it, enter the password or use the Touch ID.

ios92SJTechies

More personalized News

The News app now offers more personalization for users, and on a range of topics and publications. So for example, you can select a topic like mobile apps or internet privacy. You can access news by opening the News app, or by swiping right from your main screen.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

2021 Holiday Lights to Music Display

Looking for something fun and free to do with the kids this season? Stop by our office, tune into 89.9FM on your car stereo and enjoy our Musical Light Display with the family!

Where: 229 North Locust Ave, Marlton, New Jersey 08053

When: 5pm thru midnight every night now until New Years Eve!

Park and Tune into 89.9FM

 

11 Must-Have Back-to-School Gadgets

Whether you’re just starting high school or about to graduate college, our list of essential gear for students will ensure that you have a productive—and fun—school year.

SchoolGadgets1

New school year, new school gear

With classes back in session (or about to begin), hopefully you already have everything from your back-to-school list. Laptop? Check. The perfect bag for said laptop? Check. Schedule and text books? Check and check. Though your laptop and books are, of course, your school lifeline, there are some other gadgets you can add to your list to make your life easier. From practical picks (mice, keyboards, hard drives) to streaming sticks (hey, it’s all about that work/life balance!), our gear guide is full of recommendations designed to aid you in all the demands of student life.

SchoolGadgets2

Logitech K480 Bluetooth Multi-Device Keyboard

Your standard laptop keyboard is fine, but a wireless Bluetooth keyboard that you can sync with your mobile devices might be more comfortable for serious study work.Logitech’s K480 ($50 MSRP, $30 on Amazon) can be connected to three devices at once on any platform—Mac, PC, iOS, or Android—with familiar shortcut keys for all. It also has a handy groove at the top to prop up your phone or tablet.

SchoolGadgets3

Logitech MX Master

Your laptop’s trackpad, however, is not going to cut it for extended use—you’ll be much more comfortable with a mouse. The MX Master ($100 MSRP, $70 on Amazon), also by Logitech, has customizable buttons, supports trackpad gestures, and is comfortable to use. It’s a wireless mouse; pick between Bluetooth or 2.4GHz radio frequency to connect.

SchoolGadgets4

Bose QuietComfort 35 wireless headphones

A good pair of noise-cancelling headphones is a must—something to block out roommates (If you have them) or excess library/coffee shop sounds as you’re cranking out your midterm paper. Bose’s QuietComfort 35 ($349.95 MSRP, same price onAmazon) is a pricey pair, but worth it—they’re wireless, so they won’t get in the way as you’re moving about. There’s no way to disable the noise-cancelling feature, but that’s okay—they run for 20 hours on a single charge. While the audio quality varies, the noise-cancelling feature is second to none.

SchoolGadgets5

Altec Lansing Mini Life Jacket 3

You’ll want a great-sounding Bluetooth speaker, but one that’s easy to schlep around from party to party, and one that won’t die if it gets into an accident with a red cup.Altec Lansing’s Mini Life Jacket 3 ($100 MSRP, same price on Best Buy) has a rugged exterior that’s also waterproof—it can survive a dunk for up to 30 minutes—so it’s up for the challenge. We were impressed with its good fidelity and sound quality, and loved that it comes with a hardware kit for you to mount the speaker on your bike as you cruise around campus. And at $100, it’s priced for students, too.

SchoolGadgets6

Seagate Backup Plus Slim Portable

A hard drive may not be the most exciting thing on our list, but it’s the most practical—you’ll need something to back up your hard work just in case your laptop crashes.Seagate’s Backup Plus Slim Portable ($50 to $90 MSRP, same price on Amazon) will do just that. It’s compact, comes in a variety of capacities, and is available in four different colors and finishes.

SchoolGadgets7

Fitbit Alta

A smartwatch or fitness tracker is a must-have for maintaining your work-study balance. If you’re looking for a device that handles your push notifications, reminders, and more, then go with an all-around smartwatch that’s an extension of your phone. For iPhone users, that’s easy—go with the Apple Watch ($299 MSRP and up, available at the Apple Store). For Android users, we like the Huawei Watch ($350 MSRP and up, $299 and up on Amazon) for its style, features, and customizable options.

If it’s just the fitness stuff you’re after, you can’t go wrong with the Fitbit Alta ($129.95 MSRP, $119 on Amazon). This sleek activity tracker monitors your workouts, steps, and sleep automatically, and pairs it all within the Fitbit app on your phone (it’s compatible with both iOS and Android phones) so that you can keep an eye on your habits. Reminding yourself to stay active in between study sessions has never been so easy.

SchoolGadgets8

Livescribe 3

Spend one lecture with the Livescribe 3 Smartpen ($150 MSRP, $138.84 on Amazon) and corresponding app for your smartphone, and you’ll never want to go back to a regular old Bic. As you write in the Livescribe’s specialty notebooks, the smartpen sends a digital copy of your hand-written notes to your phone via Bluetooth, so you can access them at any time. It can also record audio notes through the Livescribe app on your smartphone, which get linked to your hand-written notes. When reviewing notes later, tap any word to hear what your professor was saying at that moment. If you’ve left yourself a doodle, abbreviation, or mnemonic device, tapping that word will bring you right back to the lecture. The pen itself can last 14 hours on a single charge.

SchoolGadgets9

Roku Streaming Stick

Your dorm may include a cable hookup for your TV, but it won’t play well with your Netflix subscription. The solution? Roku’s Streaming Stick ($50 MSRP, $39.01 onAmazon) a thumb-sized device that plugs into your TV or monitor’s HDMI port that streams web-based content—Netflix, Hulu, HBO Now, and more. It’s fast, has a dedicated remote, and is compatible with most of the major streaming content players.

SchoolGadgets10

OtterBox Universe Case System

Some school days, you never know what kind of gear you’ll need. Will your smartphone make it through the day without needing a recharge? Will you want to snap a picture of something being presented during lecture? What if you need to quickly transfer a file to a classmate?

OtterBox’s Universe Case System ($49.95 MSRP for the base, modules are extra; $44.95 on Amazon) has extra add-ons that can help you do all of those things. This system consists of various accessory modules that you can attach to your iPhone via its protective case—so you can snap on a battery pack ($50 on Amazon), a flash drive (64GB for $60 on Amazon), a tripod ($30 on Amazon), and more in a pinch.

SchoolGadgets11

Anker PowerCore 20100

A one-device battery pack might not cut it—you may want a dedicated battery pack for a long school day, to power up your tablet or other gear besides your phone. Anker’s PowerCore 20100 ($80 MSRP, $43 on Amazon) is small, light, and powerful, with two USB ports to charge two devices at once. Its whopping 20,000mAh battery can charge your phone seven times, or your iPad mini (or other small tablet) twice.

SchoolGadgets12

Stir Kinetic Desk M1

Standing desks are still having a moment in the health-tech spotlight, so if you’re considering a splurge on a new desk setup, dream big with Stir’s Kinetic Desk M1 ($2,990 MSRP, same price on Amazon). This smart desk is a well-built, comfortable workstation that smoothly adjusts between sitting and standing positions set to your preferences. You can tell the desk how often you’d like to stand up, and it will gently “nudge” you into your standing position by slightly raising up to coax you to move. The future is here, and this desk is proof.

Don’t have an extra $3,000 lying around? Grovemade’s Desk Collection (pictured in first slide) will keep your desk organized—and make it look like a million bucks for a fraction of the cost.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

CALL US NOW!