Back to Top

Tech, Web, Cloud & Cabling Services

Surface Pro

ms_surface_proThe Surface by Microsoft is a crossover between a laptop and a tablet. The Surface Pro is a business tablet that has a detachable keyboard, stylus and a kickstand. Putting the Surface Pro above other tablets is the aptitude to run Microsoft Office programs including Word, Excel and PowerPoint.

Microsoft released a television commercial for the Surface Pro, “The Vibe”, starring Daniel ‘Cloud’ Campos from the original Surface Commercial.  This enthusiastic campaign includes professional dancers as “business people” showing the capabilities of the Surface Pro. Similar to Windows 8, Metro “Modern” UI; the commercial has the same ambiance.

According to IDC, Microsoft has finally made its way to the Top 5 for Tablets. In the first quarter of 2013, Microsoft has 1.8% Market Share. Unlike the first quarter of 2013, Microsoft has 0% Market Share. Also, ASUS moved up from #4 to #3, knocking Amazon down a space.

TopFiveTabletVendors

 

Microsoft – Retiring TechNet Subscription

Microsoft TechNet Logo color_4

Microsoft TechNet Subscription service is a subscription program and resource center for IT Professionals.  On July 1, 2013 Microsoft announced that as of August 31, 2013, all sales for TechNet Subscription service will be discontinued.  Active accounts will have access for the remainder of their subscription.  Once the subscription period ends, subscribers will no longer have access to the TechNet Subscriptions benefits portal.Microsoft is focusing on developing free offerings for the IT community.

Improved Free Offerings for IT Professionals:

  • TechNet Evaluation Center is a free evaluation software available for 30-180 days with no feature limits. 
  • TechNet Virtual Labs allows you to evaluate software without the need to install bits locally.  For more information or to visit the Virtual Labs click here.
  • TechNet Forums is a free online forums where IT professionals can ask technical questions and receive rapid responses from members of the community. 
  • Microsoft Virtual Academy is a free online learning site, with over 200 expert-led technical training courses across more than 15 Microsoft technologies (additional courses added weekly).

What you need to know about the WannaCry Ransomware

What has happened?

On May 12, 2017 a new variant of the Ransom.CryptXXX ransomware family (detected as Ransom.Wannacry) began spreading widely, impacting a large number of organizations, particularly in Europe.

What is the WannaCry ransomware?

WannaCry encrypts data files and asks users to pay a US$300 ransom in bitcoins. The ransom note indicates that the payment amount will be doubled after three days. If payment is not made after seven days, the encrypted files will be deleted.

Figure 1. Ransom demand screen displayed by the WannaCry Trojan

It also drops a file named !Please Read Me!.txt which contains the ransom note.

Figure 2. Ransom demand note from WannaCry Trojan

It propagates to other computers by exploiting a known SMB remote code execution vulnerability (MS17-010) in Microsoft Windows computers.

Are you protected against this threat?

South Jersey Techies, LLC recommends and offers Symantec Endpoint Protection to its clients. Symantec Endpoint Protection customers are protected against WannaCry using a combination of technologies: Antivirus, SONAR protection, Network-based protection.

All South Jersey Techies Managed IT Services client computers have the latest Windows security updates installed, in particular MS17-010, to prevent spreading. If your business / organization is not on our Managed IT Services plan please check or contact us to ensure that you have the latest updates installed.

Who is impacted?

A number of organizations globally have been affected, the majority of which are in Europe.

Is this a targeted attack?

No, this is not believed to be a targeted attack at this time. Ransomware campaigns are typically indiscriminate.

Can I recover the encrypted files?

Decryption is not available at this time but companies are investigating. South Jersey Techies, LLC does not recommend paying the ransom. Encrypted files should be restored from back-ups where possible. South Jersey Techies offers a number of backup solutions including Carbonite Online Backup and cloud storage solutions. If you are unsure about your computer / server backups, please check or contact us to discuss the best solution for your business.

What are best practices for protecting against ransomware?

  • New ransomware variants appear on a regular basis. Always keep your security software up to date to protect yourself against them.
  • Keep your operating system and other software updated. Software updates will frequently include patches for newly discovered security vulnerabilities that could be exploited by ransomware attackers.
  • Email is one of the main infection methods. Be wary of unexpected emails especially if they contain links and/or attachments.
  • Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content. Unless you are absolutely sure that this is a genuine email from a trusted source, do not enable macros and instead immediately delete the email.
  • Backing up important data is the single most effective way of combating ransomware infection. Attackers have leverage over their victims by encrypting valuable files and leaving them inaccessible. If the victim has backup copies, they can restore their files once the infection has been cleaned up. However organizations should ensure that back-ups are appropriately protected or stored off-line so that attackers can’t delete them.
  • Using cloud services could help mitigate ransomware infection, since many retain previous versions of files, allowing you to “roll back” to the unencrypted form.

Have additional questions?

Feel free to call us at contact us or (856) 745-9990 with any questions you may have.

Keywords in Search Engine Visibility

Finding the Right Keywords in Search Engine Placement

Does the task of finding good keywords for your website seem daunting? Search Engine Placement provides a variety of keyword suggestions from all competition and search volume levels, which makes it easy to pick the best keywords for your site and your goals.

When you’re researching keywords, keep these things in mind:

Low search volume, low competition (known as long tail keywords)
Long tail keywords typically contain 3-5 words in a phrase, and they are the bread and butter of keywords. Generally speaking, it’s easier to rank with these keywords, and they convert clicks to customers at a higher rate because the searcher knows specifically what they are looking for. For example, someone who sells Acrylic Aquariums might use 50 gallon bull nose aquariums.

High volume, low competition (short tail keywords)
Short tail keywords are new keywords or phrases that recently started generating search traffic. You need to be quick to catch them, though. For example, a recent short tail keyword is Susan Boyle.

High volume, high competition (wish list keywords)
Wish list keywords are the words and phrases everyone wants to use, such as real estateaquariums, or cell phones. While wish list keywords do generate a lot of traffic, the conversion levels are generally very low because the words and phrases are too generic.

Take the term aquariums, for example. People searching for that word might want to buy an aquarium, find a local aquarium, or see photos of aquariums around the world. If I sell aquariums, relying on this as my primary keyword would take a huge effort to rank and most of the traffic generated by this keyword would likely be irrelevant.

Our highly trained, courteous support staff is waiting to take your call. Whatever time it takes to assist you, that’s the time you’ll receive. We’ll resolve any issue to your complete satisfaction.

Call (888) 505-1532 to get started now or click here

Microsoft Xbox One

Xbox One can be pre-ordered starting today for the release date in November 2013.  Microsoft has created an All-In-One entertainment system.  Xbox One is more than just a gaming console; it can be used for movies, music, gaming and the ability to connect set-top boxes using HDMI.

This All-In-One system is built with 8GB GDDR3 RAM, 8 Core Microsoft Custom CPU and 500GB Storage.  Connections include Gigabit Ethernet and IEEE 802.11 b/g/n WiFi.  Also built-in are USB ports, Optical Output and HDMI input and output.

Kinect 2 has a 1080p camera and can process 2GB of data per second.  Kinect 2 has “Unparalleled voice, vision, and motion technology lets you reach into games and entertainment like never before.”

Microsoft Smart Glass App is a secondary screen allows you to interact with your Xbox while watching movies, listening to music, surfing the Internet or gaming.  Smart Glass App is available for both Microsoft and Android users.

Above all, the wireless controller is new and improved.  Haptic technology is used to enhance the controller triggers.  Also improved are the thumb sticks and D-Pad.

GoDaddy Hacked, Millions of Sites Down

GoDaddy.com, the largest domain name registrar on the Web, has been taken offline, and a self-proclaimed member of the Anonymous hacktivism collective is taking responsibility.

The administrators of GoDaddy confirmed on Monday that they were suffering from technical issues, which the website TechCrunch reports to be impacting a multitude of websites and their affiliated email accounts that are hosted through the service. Although the company has not discussed the specifics yet, a self-described member of Anonymous says that he or she is responsible, a claim that has not been verified yet.

On Twitter, user @AnonymousOwn3r writes, “the attack is not coming from Anonymous coletive [sic] , the attack it’s coming only from me” and that the the action is being carried out “to test how the cyber security is safe and for more reasons that i can not talk now.”

GoDaddy has tweeted, “We’re aware of the trouble people are having with our site. We’re working on it.”

On Friday, it was reported that the White House is preparing to roll out an cyber security Executive Order that will serve as a surrogate until Congress can come to agreement on a bipartisan legislation to protect America’s computer infrastructure.

Earlier this year, GoDaddy announced that they would be supporting the Stop Online Piracy Act, or SOPA, a controversial legislation that if approved would have greatly changed the US government’s ability to monitor the Internet. The company eventually reversed their stance, but not before a massive protest resulted in many of their clients switching to other domain registrars. The boycott reportedly ended with thousands of GoDaddy’s millions of customers, including Wikipedia, cancelling their accounts.

Founded in 1997, Arizona-based GoDaddy.com is used by millions of customers worldwide, including a large number of small businesses. At 4 p.m. EST, GoDaddy tweeted, “Update: Still working on it, but we’re making progress. Some service has already been restored. Stick with us.”

Other social media accounts affiliated with Anonymous have not confirmed the validity of the alleged culprit’s claim and have largely distanced themselves from the hack. GoDaddy’s 24-hour tech support telephone line has also been inaccessible during the duration of the outage.

CALL US NOW!