Back to Top

Tech, Web, Cloud & Cabling Services

Category: News

Beware downloading some apps or risk

Popular apps on your smartphone can be convenient and fun, but some also carry malicious software known as malware, which gives hackers easy access to your personal information.

A security firm found that between 75 and 80 percent of the top free apps onAndroid phones or iPhones were breached. The number jumps as high as 97 percent among the top paid apps on those devices.

Whether these apps help advertisers target you or help hackers rip you off, you’ll want to do your homework before downloading apps, reports CBS News correspondent Anna Werner.

California’s Susan Harvey said she was a victim after she used a debit card to download a slot machine game app to her cell phone through a Google Play store account.

“It was something you purchased once, for like $15,” Harvey said.

When she went to reload the game, she found hundreds of purchases had been made — by her math, more than $5,000 worth of transactions.

“My heart sank, I just sat there looking at it… I physically, I was sick, because I didn’t know what they were,” Harvey said.

That story’s no surprise to cybersecurity expert Gary Miliefsky, whose company SnoopWall tracks malware. He said certain apps are designed to steal your personal information.

“What are the consequences for me as a consumer?” Werner asked.

“You’re gonna lose your identity. You’re gonna wonder why there was a transaction. You’re gonna wonder how someone got into your bank account and paid a bill that doesn’t exist,” Miliefsky said.

Milifesky said when you download an app, you also give permission for it to access other parts of your phone, like an alarm clock app that can also track phone calls.

“You think an alarm clock needs all those permissions? Access to the Internet over wifi, your call information, calls you’ve made, call history, your device ID? This to me is not a safe alarm clock,” Miliefsky said.

And there’s the weather and flashlight apps that he says exploit legitimate banking apps to capture information, as he showed us in a demonstration of what could happen when someone takes a photo of a check to send to their bank.

“The flashlight app spies on the camera and noticed the check and grabbed a copy of it. Shipped it off to a server somewhere far away,” Miliefsky said.

Last year the group FireEye discovered 11 malware apps being used on iPhones that gathered users’ sensitive information and send it to a remote server, including text messages, Skype calls, contacts and photos Apple fought back by removing the apps and putting stricter security measures in place.

“They get at your GPS, your contacts list…to build a profile on you,” Miliefsky said.

Some apps are simply collecting information for advertising purposes. In 2014, the Federal Trade Commission settled a lawsuit with a company over its popular Brightest Flashlight app, alleging it transmitted consumers’ personal information to third parties without telling them.

But Miliefsky said he’s found another flashlight app that can do much more troubling things.

“This one turns on your microphone in the background, listens in on you, and sends an encrypted tunnel to a server we discovered in Beijing,” Miliefsky described.

“You’re saying that they’re actually listening to people’s conversations and sending that audio back to Beijing?” Werner asked.

“Yeah, we’ve tracked it. I can show you where it does it,” he said.

Miliefsky said it can be traced to a few blocks from Tiananmen Square on Information Drive in Beijing.

He gave a report on that app to the FBI.

“Because to me, it’s spyware at the nth degree,” Miliefsky said.

His recommendation?

“We really have to look at our phone and say, ‘This is really a personal computer that fits in our pocket. Let’s shut down all the apps we don’t use. Let’s delete apps that don’t make sense and reduce the risk of being spied on,'” Miliefsky said.

The creator of the Brightest Flashlight app settled with the FTC, agreeing to change its policy and delete all the information it had gathered.

Harvey sued Google over her alleged hack, but a judge recently dismissed it, saying she and her attorney filed too late. Google said fewer than one percent of Android devices got bad apps in 2014.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Critical iPhone Spyware Fix Released

Apple has updated its software for iPhones to address a critical vulnerability that independent researchers say has been exploited by notorious surveillance software to spy on a Saudi activist.

Researchers from the University of Toronto’s Citizen Lab said the software exploit has been in use since February and has been used to deploy Pegasus, the spyware made by Israeli firm NSO Group that has allegedly been used to surveil journalists and human rights advocates in multiple countries.

The urgent update that Apple (AAPL) released Monday plugs a hole in the iMessage software that allowed hackers to infiltrate a user’s phone without the user clicking on any links, according to Citizen Lab. The Saudi activist chose to remain anonymous, Citizen Lab said.

Apple credited the Citizen Lab researchers for finding the vulnerability.

“Attacks like the ones described are highly sophisticated, cost millions of dollars to develop, often have a short shelf life, and are used to target specific individuals,” Ivan Krsti?, head of Apple Security Engineering and Architecture, said in a statement.

Krsti? said Apple rapidly addressed the issue with a software fix and that the vulnerability is “not a threat to the overwhelming majority of our users.”

Still, security experts encouraged users to update their mobile devices for protection.

In a statement, NSO Group did not address the allegations, only saying, “NSO Group will continue to provide intelligence and law enforcement agencies around the world with life saving technologies to fight terror and crime.”

The firm has previously said its software is only sold to vetted customers for counterterrorism and law enforcement purposes.

Researchers, however, say they have found multiple cases in which the spyware was deployed on dissidents or journalists. In 2019, Citizen Lab analysts alleged that Pegasus was used on the mobile phone of the wife of a slain Mexican journalist.

In a lawsuit filed in 2019, Facebook accused NSO Group of being complicit in a hack of 1,400 mobile devices using WhatsApp. (NSO Group disputed the allegations at the time.)

The proliferation of easy-to-use mobile hacking tools has given governments around the world a new and stealthy means of targeting adversaries. Sophisticated spyware made by NSO Group and other vendors has been reportedly used from Uzbekistan to Morocco.

The surge in spyware prompted a United Nations panel of human rights experts in August to call for a moratorium on the sale of such surveillance tools. The UN panel said the ban should remain in place until governments have “put in place robust regulations that guarantee its use in compliance with international human rights standards.”

Apple’s Red iPhone 7 Supports Charity

iPhone SE gets a storage boost, too.

Apple just made upgrading to an iPhone 7 a philanthropic decision by adding a red special edition to the lineup. The new red aluminum finish, which is available to order for both iPhone 7 and 7 Plus in-store and online on March 24, is a fundraising effort for the Global Fund. Apple will contribute a portion of red iPhone sales to the fight against AIDS and HIV.

The two new red iPhones will come in 128GB and 256GB storage variations and start at $749 in the U.S. Apple will sell the special editions in more than 40 countries by the end of March, with Brazil, Chile, Colombia, India, and Turkey to come in April. If you live in the U.S., U.K., or China and are part of the iPhone Upgrade Program, you’ll be able to snag an unlocked red iPhone with AppleCare+. In the U.S., the 128GB iPhone 7 will start at $37 a month with the ability to upgrade every year.

Apple has a long-standing relationship with the Global Fund and has a variety of products in its red lineup, including iPod’s, cases, headphones, and speakers. Last December, Apple celebrated its decade-long partnership with the Global Fund by donating proceeds from in-app purchases, exclusive downloads, and newly launched accessories to the nonprofit. The company has so far donated more than $130 million to the Global Fund, making it the organizations’s largest corporate donor.

You can snag a flashy new red iPhone 7 on March 24, starting at $749.

iPhone SE gets a bump, too

Apple hasn’t forgotten about the littlest phone in its lineup, the iPhone SE. The company just doubled the 4-inch phone’s storage to 32GB and 128GB, up from 16GB and 64GB. Those models will be phased out and the roomier new options will start at $399 beginning March 24.

While the flashy new color and iPhone SE upgrade aren’t the biggest iPhone news of the year—that will come in September with the 10th anniversary iPhone 8—it’s nice to see Apple add a little something extra to both its existing flagship and its entry-level phones.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Tim Cook: FBI Wanted iOS Backdoor

The most important Tech Case in a Decade

Customer Letter – Apple

February 16, 2016

A Message to Our Customers

The United States government has demanded that Apple take an unprecedented step which threatens the security of our customers. We oppose this order, which has implications far beyond the legal case at hand.

This moment calls for public discussion, and we want our customers and people around the country to understand what is at stake.

Answers to your questions about privacy and security

The Need for Encryption

Smartphones, led by iPhone, have become an essential part of our lives. People use them to store an incredible amount of personal information, from our private conversations to our photos, our music, our notes, our calendars and contacts, our financial information and health data, even where we have been and where we are going.

All that information needs to be protected from hackers and criminals who want to access it, steal it, and use it without our knowledge or permission. Customers expect Apple and other technology companies to do everything in our power to protect their personal information, and at Apple we are deeply committed to safeguarding their data.

Compromising the security of our personal information can ultimately put our personal safety at risk. That is why encryption has become so important to all of us.

For many years, we have used encryption to protect our customers’ personal data because we believe it’s the only way to keep their information safe. We have even put that data out of our own reach, because we believe the contents of your iPhone are none of our business.

The San Bernardino Case

We were shocked and outraged by the deadly act of terrorism in San Bernardino last December. We mourn the loss of life and want justice for all those whose lives were affected. The FBI asked us for help in the days following the attack, and we have worked hard to support the government’s efforts to solve this horrible crime. We have no sympathy for terrorists.

When the FBI has requested data that’s in our possession, we have provided it. Apple complies with valid subpoenas and search warrants, as we have in the San Bernardino case. We have also made Apple engineers available to advise the FBI, and we’ve offered our best ideas on a number of investigative options at their disposal.

We have great respect for the professionals at the FBI, and we believe their intentions are good. Up to this point, we have done everything that is both within our power and within the law to help them. But now the U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone.

Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone’s physical possession.

The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.

The Threat to Data Security

Some would argue that building a backdoor for just one iPhone is a simple, clean-cut solution. But it ignores both the basics of digital security and the significance of what the government is demanding in this case.

In today’s digital world, the “key” to an encrypted system is a piece of information that unlocks the data, and it is only as secure as the protections around it. Once the information is known, or a way to bypass the code is revealed, the encryption can be defeated by anyone with that knowledge.

The government suggests this tool could only be used once, on one phone. But that’s simply not true. Once created, the technique could be used over and over again, on any number of devices. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks — from restaurants and banks to stores and homes. No reasonable person would find that acceptable.

The government is asking Apple to hack our own users and undermine decades of security advancements that protect our customers — including tens of millions of American citizens — from sophisticated hackers and cybercriminals. The same engineers who built strong encryption into the iPhone to protect our users would, ironically, be ordered to weaken those protections and make our users less safe.

We can find no precedent for an American company being forced to expose its customers to a greater risk of attack. For years, cryptologists and national security experts have been warning against weakening encryption. Doing so would hurt only the well-meaning and law-abiding citizens who rely on companies like Apple to protect their data. Criminals and bad actors will still encrypt, using tools that are readily available to them.

A Dangerous Precedent

Rather than asking for legislative action through Congress, the FBI is proposing an unprecedented use of the All Writs Act of 1789 to justify an expansion of its authority.

The government would have us remove security features and add new capabilities to the operating system, allowing a passcode to be input electronically. This would make it easier to unlock an iPhone by “brute force,” trying thousands or millions of combinations with the speed of a modern computer.

The implications of the government’s demands are chilling. If the government can use the All Writs Act to make it easier to unlock your iPhone, it would have the power to reach into anyone’s device to capture their data. The government could extend this breach of privacy and demand that Apple build surveillance software to intercept your messages, access your health records or financial data, track your location, or even access your phone’s microphone or camera without your knowledge.

Opposing this order is not something we take lightly. We feel we must speak up in the face of what we see as an overreach by the U.S. government.

We are challenging the FBI’s demands with the deepest respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications.

While we believe the FBI’s intentions are good, it would be wrong for the government to force us to build a backdoor into our products. And ultimately, we fear that this demand would undermine the very freedoms and liberty our government is meant to protect.

Tim Cook

Answers to your questions about privacy and security

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

8 Ways iPhone 8 Beats Galaxy S8

The Galaxy S8 might be the best phone of 2017, but the year’s not over until the next iPhone makes its debut. Here’s how Apple can take the crown back from Samsung.

If there wasn’t already a mountain of pressure on Apple to deliver something spectacular with this year’s iPhone update, there surely is now. If you haven’t noticed, Samsung has released the Galaxy S8 and S8+, and they’re pretty remarkable. As a former iPhone 7 Plus user, the S8+ might very well be the best phone I’ve ever used, with a stunning screen, speedy processor, and, yes, a gorgeous design.

But what makes the S8 so amazing is how unique it is. For the first time in a while, Samsung is standing alone on the cutting edge with a phone that needs to be seen to be believed. From its barely there bezels to its brilliant wraparound screen, the Galaxy S8 truly gives Apple a run for its money. No joke, it actually makes the iPhone 7 look pretty stale.

But there’s still a lot of time between now and the release of the next iPhone. According to rumors, the lineup this year will consist of the usual S models along with a fantabulous iPhone 8, which looks to adopt a similar aesthetic to the Galaxy S8, with an edge-to-edge OLED display and the removal of the physical home button. But just because it might look similar doesn’t mean it can’t still be better. Here’s how Apple can still steal the crown from Samsung:

The Galaxy S8 has a killer camera but the iPhone 7 is no slouch.

Killer camera

The Galaxy S phones has always had a camera on par with the iPhone, so it was a little surprising that Samsung didn’t upgrade the S8’s all that much. The iPhone 7 Plus is already a step ahead here, with 2X optical zoom and the sublime Portrait Mode, but the iPhone 8 could really separate itself from the S8 by taking it even further. Along with a megapixel bump, Apple could add optical image stabilization to the second lens, which will go a long way toward increasing photo and zoom quality. But what would really set it apart would be a larger sensor and greater ISO range to make it a low-light leader.

The Gear VR is a big part of the S8, but AR could be the iPhone 8’s big play.

AR not VR

While Samsung is going all-in on virtual reality with the Galaxy Gear and the S8, rumors suggest that Apple is more interested in augmented reality. And that could be one of the features that sets the iPhone 8 apart. Smartphones have been slow to incorporate AR into the interface, but if Pokémon Go has taught us anything, it’s that people are way more interested in seeing the world through their screens than strapping a headset to their faces. An AR-fueled iPhone 8 could connect us to the world in fun new ways without separating us from reality.

The Galaxy S8’s fingerprint sensor is just in the worst place.

Well-placed fingerprint sensor

While the Galaxy S8 is one of the best smartphones ever made, one tragic flaw prevented it from being perfect: the placement of the fingerprint sensor. For some god-awful reason, Samsung put it right next to the camera, all but ensuring your finger will not only miss it, but also repeatedly smudge the lens. If the rumors are correct that Apple will also be removing the home button in the iPhone 8, it has two options: under the screen or on the back. A first-of-its-kind in-panel sensor would be revolutionary, but if it’s on the back, Apple needs to learn from Samsung’s mistake and put it lower, like on the Pixel.

Bixby hasn’t exactly exploded out of the gate, but it does a lot that Siri doesn’t do.

Expanded Siri

When Samsung unveiled the S8, a major part of the presentation was spent introducing its new AI assistant, Bixby. However, the new service wasn’t just a competitor to Siri, Alexa, and Google Assistant. Samsung integrated Bixby deep into the interface to let it access apps, fetch information, and cut down on how often we need to touch our phones. It’s a cool idea, except the only problem is it doesn’t really work. If Apple could do something similar with Siri and expand its reach to work inside apps while we’re using them, it could beat Bixby at its own game.

The Galaxy S8’s screen is pretty, but It also uses its software to accentuate it.

iOS 11

One of the biggest gripes people have had about Samsung’s phones has always been its TouchWiz interface. But that’s changed with the S8, as Samsung has crafted an intuitive, refined system that takes full advantage of its superb hardware. If Apple is going to release a radically redesigned iPhone with curved edges and a wraparound screen, the same old iOS isn’t going to do it justice. It might be time to rethink iOS for modern times and give it more than new features and a fresh coat of pixels.

Samsung’s wireless charging supports Qi and PMA standards, and the pad stands up or lies flat. But it’s not long range wireless.

True wireless charging

While Samsung has had wireless charging in the Galaxy S since the S6, Apple has been slow to adopt it for the iPhone. All signs indicate that’s going to change for the iPhone 8, but if Apple wants to top the Galaxy S8 and not just keep pace, it’s going to need something a little more exciting than a pretty charging pad. One of the rumors we’ve read suggests that Apple could adopt true long-range wireless charging for the next iPhone, which would power up the battery whenever you’re within range of the charger, even if it’s in your pocket. That alone would be an S8 killer.

The Galaxy S8 includes a pretty great pair of earbuds.

Bundled AirPods

Samsung didn’t just resist the trend to ditch the headphone jack on S8, it embraced the 3.5mm jack in a big way. Inside the S8 box is a pair of premium AKG-tuned earbuds that are a few steps above the usual build and sound quality you get for free—certainly better than what Apple gives us. But if Apple really wants to embrace the wireless future of the iPhone, it needs to stop including a wired set of EarPods, even if they are Lightning. A pair of AirPods in the box (or a cheaper Beats alternative) would really set it apart from the 3.5mm S8 and make a strong statement.

The battery life on the S8 is really good, but the iPhone 8’s could be even better.

Blow-away battery

Samsung has had its share of battery issues, but the S8 looks to put them in the past with a long-lasting battery that hopefully won’t blow up. But while it can get through the whole day for the most part, the S8 didn’t deliver the the real breakthrough we were hoping for. We’re still waiting for a phone that lets us completely forget about the battery until our day is over, and we’d love to see the iPhone 8 deliver something in the range of 12 hours and truly change the game.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Coming Soon: 5G Explained

Just five years after the first 4G smartphone hit the market, the wireless industry is already preparing for 5G.

5G Wireless

Each of the four nationwide cell phone carriers, as well as smartphone chipmakers and the major network equipment companies are working on developing 5G network technology for their customers.

There are many significant hurdles that all the industry players have to clear before you’ll see a little 5G symbol next to the signal bars on your smartphone screen. For example, it has yet to be determined what 5G even means, let alone what it will look like and when it will get here.

But as consumers use up rapidly growing amounts of 4G bandwidth watching streaming videos on their phones, 5G will soon become a necessity. As telecom engineers work furiously to develop 5G technology, we’re getting a clearer picture of the who, what, where, when and why of 5G.

What is 5G?

5G

The “G” in 3G, 4G and 5G stands for “generation.” So 5G will be the fifth generation of wireless network technology.

The standards for 5G have not yet been set. According to Bill Smith, president of AT&T’s (T, Tech30)network operations, 5G will likely be defined in 2018, and the standards for 5G will codified sometime in 2019 by the standards-setting International Telecommunication Union, a branch of the United Nations. The standards will determine which wireless technologies can be called “5G,” as well as what its characteristics must include, such as how fast it will be.

Still, it’s possible to make a very educated guess about what 5G will look like based on the emerging 5G technologies that the wireless industry is experimenting with.

Here’s the elevator pitch: 5G will be faster, smarter and less power-hungry than 4G, enabling a slew of new wireless gadgets. 5G will let us have faster smartphones, more smart-home devices and longer-lasting wearable gizmos.

How fast will 5G be?

5G

5G has the potential to offer speeds up to 40 times faster than 4G — fast enough to stream “8K” video in 3-D or download a 3-D movie in about 6 seconds (on 4G, it would take 6 minutes).

Unfortunately for consumers, there’s a difference between lab experiments and reality. Peak speeds are fun to dream about, but in the real world, actual speeds are much slower than promised.

Nokia (NOK), one of the biggest 5G players, believes that its 5G technology will allow for real-world speeds of about 100 Megabits per second when the network is most congested — that’s about four times faster than 4G’s top speed.

Another characteristic of 5G is that it will have ultra-low latency, meaning that it could drastically reduce the amount of time it takes for the network to respond to your commands. That could give the appearance of much faster loading websites, apps, videos and messages.

How will it work?

A lot of the wireless companies’ 5G experimentation is taking place in super-high frequencies — as high as 73,000 MHz. Today’s cell phone networks broadcast signal in a range of 700 MHz to 3,500 MHz.

The advantage of high-frequency signals is that they’re capable of providing significantly faster data speeds. The disadvantage is that they travel much shorter distances and they can’t easily penetrate walls. That means thousands — perhaps even millions — of mini cell towers, or “small cells” would need to be placed on top of every lamp post, every building, inside every home and potentially every room.

That presents a host of problems. How can cell phone companies possibly process all that data? There are companies, such as Google’s recently acquired Alpental, that are working on those “backhaul” issues. But they’re not so close to a solution, according to Akshay Sharma, wireless infrastructure analyst at Gartner.

That’s why 5G might complement 4G, rather than outright replace it. In buildings and in crowded areas, 5G might provide a speed boost. But when you’re driving down the highway, 4G could be your only option — at least for a while.

When is 5G coming?

5G

None of these questions are going to be answered any time soon. The industry’s consensus is that it will run 5G experiments in South Korea during the 2018 Winter Olympics, with mass deployments beginning sometime in 2020.

Yet Verizon (VZ, Tech30) has said that it is working on 5G technology with the aim of bringing it to market much sooner — as early as 2017.

With all the questions surrounding 5G and all the wrinkles that need to be ironed out, it’s exceedingly unlikely that anything Verizon does will be widely deployed. For example, the smartphone makers will need to develop chips that are capable of sending and receiving 5G signal without driving costs significantly higher.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

5 Ways to Prep for Hurricane Season

Hurricane season is from June 1 through November 30.  On October 29, 2012 the East Coast was hit with Hurricane Sandy.  Many businesses are still recovering and rebuilding from the largest Atlantic Hurricane on record.  Power outages, high winds and flooding affected many areas in New Jersey and New York.

The Small Business Administration and Agility Recovery hosted “Protect Your Business This Season” webinar.  

oct29_sat

Below are five steps to protect your business before a disaster like Hurricane Sandy:

Evaluate Risks

All types of risks exist such as environmental disasters, organized disruption, loss of service, equipment failure and many more.  Assess your company building for risks (inside and outside).  Also, assess business losses during and after a disaster strikes.

Calculate the cost of interruption

Calculating for  “post-disaster”  consists of many different scenarios.  Creating a plan for up to six months of interruptions for your company.  Another major concern is to design a backup plan with secondary vendors in case all primary vendors cannot provide their specific services. 

Insurance Coverage

Consult with your agent and an insurance expert when buying insurance for your business.  Insurance policies vary, it is important to design a policy that best fits your needs.

Create a communication plan

Gather primary and secondary e-mail addresses for all employees, contractors, vendors and customers to put an e-mail alert system in place.  Businesses could also use Social Media to alert public before and after a disaster.

Telework Policy

If a disaster strikes, employees may not have the ability to travel to the office.  Setting up a Telework Policy will grant employees access to work from home.  This policy can be for all employees or specific employees.  

Need help preparing for Hurricane season?

Contact us at 856-745-9990 or click here.

 

10 Ways Mobile Devices Are Changing Life

mobile devices

Mobile Devices

Humanity is evolving in many ways thanks to mobile devices. But are all the changes for the better?

I was raking leaves in my yard the other weekend when I observed a black SUV slowly idling down the street. I didn’t recognize the vehicle and it looked out of place as though the driver were confused about where to go… or possibly casing houses to rob (hey, I’m a crime writer by nature).

The car pulled up to me and the passenger window went down. An older gentleman politely inquired if I knew where a certain nearby street was located. I told him how to get there and he thanked me profusely then drove off.

That got me thinking that I hadn’t been asked for directions in years, since most people now rely on their mobile devices for maps and directions. I reflected that I wouldn’t have had the pleasant encounter with that grateful driver if he had been using a device to guide him, and that started a train of thought about how mobile devices are changing society. What has improved us, and what are we missing out on?

1. We always know how to get there

It’s great to throw out the paper maps and not have to call people to find out how to get anywhere, nor to be called when they’re coming to my house. All we need is the address and presto! We’re there.

But… we’re also missing out on the unique dialogue we only get from people who know their own neighborhoods. Google Maps won’t tell us that our turn is right after the red mailbox and that it’s a tricky one so slow down. It can also be vague when it directs us through confusing areas like rotaries or 5-way intersections. And as someone who used to get “Triptiks” from AAA, it was pretty cool not only having the entire route for a trip laid out for us by an expert (in a visual form), but to get some one-on-one advice from them such as the best time to travel through D.C. to avoid traffic (trick question, there is no “best time.”) Sure, you can look this up online… where ten different opinions will be available, requiring you to pick and choose the most plausible.

2. We can buy almost anything immediately

Mobile devices are commonly used for purchasing, and according to Adweek.com”smartphones and tablets will account for $1.6 billion in sales on Thanksgiving, Black Friday and Cyber Monday combined.” It’s great that we can buy stuff we’re interested in as we please.

But… this can pose a problem for compulsive shoppers or people who may be less than responsible for their actions (I’m thinking inebriated college students after 2 am). Obviously this is an issue that can impact anyone with low impulse control and mobile devices are simply the conduit for their problem, not the problem itself. But I’ve also found real-life clerks can be extremely helpful in providing advice – the paint guy at my local hardware store, for instance, knows more about paint than anyone I’ve met. Sure, online advice and reviews are available to help you figure out what to buy but the human touch from knowledgeable experts you can talk to in person can’t be replaced.

3. We’re always available

Whether through a phone call, text, email, social media or some other form of communication, we’re always at the beck and call of those we know so long as we have a mobile device with us. Sure, the devices have “mute” functions and off buttons, but the constant flow of input can make many people reluctant to use these options (or to rely on them for long), especially if our mobile devices are used for work or emergency contact from loved ones. In fact, if we contact someone on their cell and they don’t pick up it can be disappointing or irritating. That’s what they’re there for, right?

But… people who want to concentrate and remain focused on a single task at a time have to exert rigid discipline on themselves (and likely those in their inner circle) lest they wander from one interruption to the next, checking that Facebook message a friend just sent or seeing if their spouses replied to that text. It’s like trying to work in an office with the door open while a big party is going on outside in the hallway. I’ve found it’s best to either close the door and focus or knock off for the day (if possible) and officially attend the party; working halfway in between is a recipe for low productivity.

4. No more waiting for the 11 p.m. news

Nowadays if something significant happens (no, but the Kardashians aren’t remotely significant) we whip out our devices and see what’s afoot, whether it’s a weather emergency, a crisis, or some historic moment. Even if the website we’re visiting is overloaded or sluggish there are plenty of others available. It’s all part of our “need to know now” mindset, right?

But… needing to know now can detract from the present moment if the news isn’t exactly earth-shattering. If it’s just another interruption it’s one more thing that takes away from what we’re doing (or trying to get done). I can’t help but feel like many news stories are played up or overemphasized as part of a “Hey! Look over here!” distraction, whether to promote ads, news sources or some other ulterior motive. This only contributes to the short attention span which is becoming a real problem for many people.

5. We’re never bored

Our mobile devices can hold or connect to an endless amount of entertainment. Thanks to streaming audio, video, copious storage capacities and zippy processors, it’s possible to listen to music, watch movies, read e-books, browse the web, engage with others and play games in just a few taps. With this much variety nobody need ever be bored again, right?

But… I think it’s important for people to learn how to handle boredom. So many of us feel like the phrase “I have nothing to do” is something to be feared rather than embraced. I’ve been guilty of it as well, such as during car trips where I was driving while my family slept and I shut the radio off since I didn’t want to disturb them. Being bored is an opportunity to reflect, consider and plan: to revisit the past or map out the future. It can be healthy, not frightening. At the time I was immersed in the TV show “LOST” and used several hours going over all the clues, details and plot elements that had yet to be unraveled (as it turned out, I never got close to the actual story behind the island).

6. We never have to take chances

My wife and I went out the other week and during the course of our evening decided on the spur of the moment to get tickets for the WWII film “Fury.” I lined up tickets on my smartphone at a theater in the next town over – the only one that still had seats for the show – and we picked them up then entered the movie. Great that we didn’t have to just drive over and hope we could get lucky by scoring a pair of seats, right?

But… there is something to be said for just gambling and taking a shot at something without using what is the real-life equivalent of a “cheat code.” Sure, it’s better than getting to the theater to find all the seats sold out, but that would have opened up some other options: see another film? Go somewhere else nearby? View a later show? Don’t get me wrong – if my smartphone can help up my odds of doing something I really want, I’ll play that card, but it does detract from the unpredictability of life with its themes of give and take or wins and losses.

7. We don’t need to know all this useless trivia

Numerous others have discussed this as well: thanks to mobile devices there’s no need to know silly little things like which planet is the sixth one from the sun, who won the War of 1812, or how many digits are in Pi (hint: a lot). We can just look it up right away, so as to save our brains for something more important like what Kim Kardashian is up to (not to beat a dead horse).

But… this access to information also has the capacity to erode our own personal knowledge stores as well as critical thinking ability. If we offload all that data elsewhere and access it only as (or if) needed, we’ll miss out on a lot of interesting and useful things that will hamstring us if we don’t have our mobile devices. In essence, we’re delegating our brain’s skills to an artificial brain, which can’t reason or meaningfully apply its talents to improve our lives or activities – other than just spitting out the facts we ask for. Information is more valuable when applied to the appropriate contexts by a brain actually engaged with what’s happening.

8. We never have to disconnect from friends or family

Social media can truly be amazing. I use it to connect with family across the country whom I’m not able to see regularly. I have built and strengthened friendships with people in my town because of it. And I’ve kept in touch with people who have literally known me all my life; in the era before social media we would simply have fallen out of touch, eventually forgetting each other’s names and all past interactions.

But… stories are rampant about social media wrecking marriages, working relationships and familial ties. Used correctly by well-adjusted folks, it’s a way to bring people together. Used inappropriately by those with underlying issues, it’s a way for them to alienate others (political battles, anyone?) or lose focus on their face-to-face loved ones in favor of their online community. I’m not blaming mobile devices or social media; as with online shopping I’m pointing out that this concept can wind up causing harm to people who misuse it, or misuse others with it.

9. We don’t have to drop off film for processing

Anyone remember Fotomats? If so, you were probably a child of the 80’s. These were drive-thru film processing kiosks where you could drop off your photo film and pick up the processed photos a day later. I haven’t seen one of these in years, and while it’s certainly true that photo film still exists and can be processed at other stores, this is usually done by professional photographers or photography enthusiasts. I’ve been using digital cameras and my smartphone for years now to take pictures; they’re easy to store on my hard drive, they are backed up automatically on my phone, and I can see how the shots turned out instantly.

But… there was something nice about dropping film off knowing it would be ready the next day (unlike in today’s instant gratification society, where we get impatient if something’s not immediately available). There was a sense of anticipation along with the hope all the shots came out OK. We had more patience. And we didn’t waste pictures goofing around, and the ones we kept were generally worth keeping.

Back in the 80’s I probably took one-tenth the pictures I do now, and, while hard drive space is cheap and plentiful, organizing photos by year or occasion (and in some case which one of my kids is involved in the shot) is tedious. I rarely delete digital photos unless they’re blurry or extremely poor quality, so there’s more of a “quantity over quality” element now, whereas it was the reverse back then, at least for me.

10. We don’t ever see payphones or telephone booths around any more

When I was a kid my elementary school had a fantastic old (even for the time) payphone which had three slots at the top for feeding in coins: a nickel slot, a dime slot and a quarter slot. Putting in money and hearing the electronic tones as the coins registered (actually I think it only cost a dime to make a call) was like seeing a magic trick. Now payphones and telephone booths – a famous landmark for Superman fans – have gone the way of the passenger pigeon; I think the last one I saw was in Europe this summer. We just make calls on our smartphones; no hunting for coins, dealing with missing phone books or finding public phones out of order. My kids will likely grow up never having used one of these artifacts.

But… actually, there is no ‘but’. This one was a tongue-in-cheek one; everyone is better off with payphones and phone booths relegated to the dust heaps of history (even the phone carriers are likely making more money off smartphone sales/data plans than they ever raked in with coin-operated telephones). Some progress is truly inarguable.

 

49% of Businesses Hit by Ransomware

Ransom is the top motivation behind cyber attacks, according to a report from Radware, and IT professionals are most concerned about data loss. Here’s what you need to know.

Nearly half of businesses report that they were the subject of a cyber-ransom campaign in 2016, according to Radware’s, Global Application and Network Security Report 2016-2017.

Data loss topped the list of IT professionals’ cyber attack concerns, the report found, with 27% of tech leaders reporting this as their greatest worry. It was followed by service outage (19%), reputation loss (16%), and customer or partner loss (9%).

Malware or bot attacks hit half of all organizations surveyed in the last year. One reason for the pervasive attacks? The Internet of Things (IoT). Some 55% of respondents reported that IoT ecosystems had complicated their cybersecurity detection measures, as they create more vulnerabilities.

Ransomware attacks in particular continue to increase rapidly: 41% of respondents reported that ransom was the top motivator behind the cyber attacks they experienced in 2016. Meanwhile, 27% of respondents cited insider threats, 26% said political hacktivism, and 26% said competition.

While large-scale DDoS attacks dominated the headlines of 2016, this report found that only 4% of all attacks were more than 50 Gbps, while more than 83% of DDoS attacks reported were under 1 Gbps.

“One thing is clear: Money is the top motivator in the threat landscape today,” said Carl Herberger, vice president of security solutions at Radware, in a press release. “Attackers employ an ever-increasing number of tactics to steal valuable information, from ransom attacks that can lock up a company’s data, to DDoS attacks that act as a smoke screen for information theft, to direct brute force or injection attacks that grant direct access to internal data.”

Despite the growth in attacks, some 40% of organizations reported that they do not have an incident response plan in place, the survey found.

The report listed five cybersecurity predictions for 2017:

1. IoT will become an even larger risk. The Mirai IoT Botnet code is available to the public, making it more likely that cyber criminals of all experience levels are already strengthening their capabilities. “In 2017, exponentially more devices are expected to become targeted and enslaved into IoT botnets,” the press release stated. “IoT device manufacturers will have to face the issue of securing their devices before they are brought to market, as botnet attacks from these devices can generate large-scale attacks that easily exceed 1 Tbps.”

2. Ransomware attacks will continue to grow. These attacks will target phones, laptops, and company computers, and will likely take aim at healthcare devices such as defibrillators in the future, the press release stated.

3. Permanent Denial of Service (PDoS) attacks on data centers and IoT operations will rise. PDoS attacks, sometimes called “phlashing,” damage a system to the degree that it requires hardware replacement or reinstallation. These attacks are not new, but Radware predicts they are likely to become more pervasive in 2017 with the plethora of personal devices on the market.

4. Telephony DoS (TDoS) will become more sophisticated. These attacks, which cut off communications in a crisis, “could impede first responders’ situational awareness, exacerbate suffering and pain, and potentially increase loss of life,” the press release stated.

5. Public transportation system attacks will rise. As cars, trains, and planes become more automated, they also become more vulnerable to hackers, Radware stated.

You help your business avoid ransomware attacks and other cyber threats by keeping software up to date, backing up all information every day to a secure, offsite location, segmenting your network, performing penetration testing, and training staff on cyber security practices.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

3 Ways to Boost Password Security

The must-read IT business eNewsletter

Encrypted passwords

“There is no such thing as perfect security,” says Jim Waldron, Senior Architect for Platform Security at HP. If you can access a website or server, consider it vulnerable to security breaches. That’s why so many businesses account for fraud in their business models—they expect to lose a certain amount each year to security leaks, lost IP, and more.

While you can never be 100% secure from hackers while connected to the internet, there are steps you can take to help protect your personal and professional data. All you need to do is activate features that are increasingly common (or easy to manage) on modern business-class PCs: Multi-factor authentication, client-based user authentication, and password best practices.

Multi-factor authentication
Multi-factor authentication is a simple but effective security system that involves the use of at least two factors (or methods) of authentication. It groups different factors together so that even if one is compromised, the data remains protected. Under this system, factors are divided into three domains:

HP support

 

  • Something you know: Password, PIN, etc.
  • Something you have: ATM card, smartcard, etc.
  • Something you are: Fingerprint, iris, etc.

For multi-factor authentication to be successful, you want to pull from at least two different domains, with a maximum of three domains. A common example of multi-factor authentication is when you withdraw cash from an ATM. To do so, you insert your ATM card (something you have) and enter your PIN (something you know). Without both factors you can’t access your account—and neither should anyone else.

Businesses are taking notice too, and multi-factor authentication’s popularity is rising. In 2014, 37% of enterprise organizations surveyed used multi-factor authentication for the majority of their employees, and that number is expected to grow to 56% by 2016.

What you can do now
If you have a business-grade PC, chances are your PC already includes the technologies you need to start using multi-factor authentication. In fact, HP offers multi-factor authentication on all of its business PCs. Consult your manual or HP Support, and identify the factors your PC supports in addition to traditional passwords, such as fingerprint or smartcard readers. Just make sure to choose factors from separate domains.

Client-based user authentication
Every time you log into a system, your identity needs to be authenticated by that system. This process occurs one of two ways: server-side authentication or client-based authentication. With server-side authentication your unencrypted information—such as your password or fingerprint—is sent to a server where it is compared against that server’s records. With client-based authentication, the authentication process—e.g., “Does this fingerprint match the one in our records?”—is performed on the client device, such as your work PC.

While client-based authentication is not as common as its counterpart, it is far more secure. In fact, “In almost all authentication scenarios it is preferable to perform the direct authentication on the client and then communicate an ‘Identity Assurance’ to the relying party,” says Waldron.

Everyone wins when it comes to client-based authentication. The client no longer has to send unencrypted, private information over the internet or store that information on another party’s server, while the relying party no longer has to store sensitive client information on their server—reducing the amount of information that can be stolen if and when a hack occurs.

What you can do now
One of the easiest ways to use client-based authentication is with a hardened fingerprint sensor. The sensor authenticates your fingerprint directly in the hardware, rather than sending it to a server or hard drive, and returns a key that can be used to decrypt password vaults.

Password best practices
As we’ve mentioned before, passwords aren’t perfect. While implementing and using the above features might not seem practical for some of us, everyone can benefit from following basic password best practices. They are quick to implement, and can save you a lot of hassle down the line.

To make the most of your password security, your passwords should be:

  • Long—at least 16 characters. Use a password manager to store unique passwords and fill out log-in forms so that you don’t have to memorize them.
  • Complex—containing symbols, numbers, uppercase letters, lowercase letters, and spaces (if possible)
  • Unique—only use a password once, don’t recycle or repeat across accounts
  • Short-lived—the National Cyber Security Alliance suggests changing your password every 60 days
  • Difficult to guess—avoid common words found in a dictionary, all or part of your name, repeated letters, or combos that align to your keyboard layout, such as “QWERTY” or “123456”

If you are uncertain whether your password is secure enough or if it meets enough of the criteria above, there are several reliable services that will check your password strength for you. Microsoft’s Safety & Security Center offers a free password checker you can access through your browser, while Mac users can access Apple’s Password Assistant through the Keychain Access utility.

What you can do now
The first thing you can do—right this second—is revise your most important passwords to align with password best practices. That includes your work accounts, personal email, bank accounts, and any other services that contain sensitive data. If you need help remembering your new passwords, consider using a password manager such as HP Password Manager. That way you only have to authenticate once to gain access to all your systems. You can also adopt a system to make your passwords easier to remember. Using acronyms, for example, you can turn the phrase “I was born in 1986 and my parents still live on Lake Street!” into “Iwbi1986ampsloLS!”—creating a strong password that’s easy to remember.

Passwords are changing, and while they will never be perfect, they can still provide an effective first layer of defense against hackers and ne’er do wells. The above features and techniques are increasingly common on modern business PCs, making it easier than ever to protect your private data. All you have to do is use them.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

CALL US NOW!