Back to Top

Tech, Web, Cloud & Cabling Services

Category: Quick Reference Guides

Quick Reference Guides Category

Office 365 Exchange Online

 

Work smarter, anywhere, with hosted email for business.

Close-up of an email message with a Policy Tip to help prevent sending sensitive info.

Security and reliability

Exchange Online helps protect your information with advanced capabilities. Anti-malware and anti-spam filtering protect mailboxes. Get a Exchange Online Protection Trial or Office 365 Professional Trial to see how good it works. Data loss prevention capabilities prevent users from mistakenly sending sensitive information to unauthorized people. Globally redundant servers, premier disaster recovery capabilities, and a team of security experts monitoring Exchange Online around the clock safeguard your data. And with a guaranteed 99.9% uptime, financially-backed service level agreement, you can count on your email always being up and running.

Stay in control

Maintain control over your environment while gaining the advantage of hosting your email on Microsoft servers. Manage your organization efficiently with the Exchange admin center, an easy-to-use, web-based interface. Run In-Place eDiscovery across Exchange, SharePoint, and Skype for Business data from a single interface through the eDiscovery Center. With mobile device policies, you can create approved mobile device lists, enforce PIN lock, and remove confidential company data from lost phones. And IT-level phone support is available to you 24 hours a day, 7 days a week.

Close-up of the Preview Results page for a search in Exchange Online.

Close-up of a user’s inbox in Outlook Web App.

Easy to use and maintain

It’s easier than ever to provide your users with the business email they need to stay productive. Automatic patching eliminates the time and effort of maintaining your system. Give your users an In-Place Archive, so they can keep all their important data in one place. And provide them with anywhere access to email, calendar, and contacts on all major browsers and across devices. Integration with Outlook means they’ll enjoy a rich, familiar email experience with offline access.

Have questions?

Our Hosted Cloud Solution team is here to help.

Call us at: 856-745-9990 or Visit: https://southjerseytechies.net/

To learn more and how Office 365 Exchange Online can benefit your business please contact South Jersey Techies, LLC. South Jersey Techies, LLC is a certified Small and Midmarket Cloud Solutions Microsoft Partner.

To read this article in its entirety click here.

10 Purchases for Small & Medium-Size Businesses

Saving-Money

Small and Medium-Size Businesses (SMBs) will often take shortcuts to cut costs when purchasing.  To avoid disasters such as a loss of data or work, SMBs are strongly suggested to focus on the ten points below.

Hardware

Considering the rapid change of technology requirements, a pro-active approach for replacing desktops, laptops, servers, and networking hardware is to look five years into the future.

Backup Software

Although built-in backup software and Windows Server backup are adequate, purchasing a third-party backup solution will have the ability to recover from an image.

Internet Connection

Providing your SMB with a consumer-grade DSL line would not be an efficient business plan. Setting up a network that provides your business with more bandwidth than required will prevent a network bottleneck from occuring.

Firewall

Securing your business with only Windows built-in firewall is not ideal.  Configuring a Cisco, Fortinet, or Sonicwall is more secure, reliable and flexible in a SMB environment.

Cloud Storage

Cloud storage provides scalability, reliability and portability.  Cloud storage is divided into three categories:  Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS).  Many companies are transferring to Cloud services for access to data outside the network.

Website

Online presence has become an important key for all businesses.  A solid solution is to have a strong website, blogging and effectively using social media.

Redundancy

Redundancy is an appropriate investment towards ensuring that your SMBs network does not go down.  Similar to backups, redundancy does not affect everyday business but should an incident arise, you’ll be glad it’s there.

Support

IT Support is a necessity, whether it’s an in-house department, third-party service provider, or support for software.

Mobile Devices

The ability to work from outside the office and accessing data from anywhere  is now an important key for businesses.  Setting up a virtual private network enables laptops, tablets and smartphones to connect and work from anywhere.

Printers

Supply your SMB with a printer that has the sustainability and features required for business use.

 

10 Ways to Survive a System Outage

Fact: Something is broken – you need to get to work.

toolbox1.  Stay calm.

Remaining calm is the best strategy to surviving a system outage and keeping your focus on the current task.  Also, remaining calm will produce less emotional and techinical errors in a workplace.  

2.  Notify all users.

Proactively preparing for a system outage would include creating a Notification Plan based on different scenarios.  Using company e-mail, instant messaging, have a Co-Worker announce the outage or put a sign up saying “System is down.  Working on it now!”.

3.  Recruit a “buffer” to answer any questions.

After the initial notification, users will have many questions.  It would be ideal to recruit someone who is available to answers those questions, especially ETA questions.

4.  Be polite and understanding.

Remember to be polite and understanding when it comes to upset users.  In Step 1, keeping your focus on the current task to avoid making errors, also try to avoid “play-by-play” status updates.

5.  Documentation.

Always document each step of the recovery process.  Start with the initial problem or outage, followed by what you find, what commands you used, what errors you received and all attempts to fix the outage.  Lastly, document the steps that resolved the outage.

6.  Present the facts.

During the resolution process and the aftermath, always remain honest and present the facts.  If you caused the problem or outage, do not try to cover it up because it will complicate the process of resolving the outage.

7. Take your time.

Although, time is of the essense when system is down, take your time while troubleshooting.  If you are not sure what will resolve the problem, taking your time and implementing different solutions at a steady pace will allow you to narrow down the exact problem and resolution.

8.  Call Support.

Having product support is an essential tool for IT departments.  Calling support and submitting a ticket may consist of being on hold, waiting for a call back and sometimes an onsite visit can be a smart business decision.

9.  Stay positive.

Staying positive and continue building a knowledge of system events will prepare you for problem situations.  Having strong work relationships with co-workers will be useful for emergency situations.

10.  Be Prepared.

To be prepared for every system problem is almost impossible.  Continue building a knowledge of your environment is the strongest way to prepare for problem situations, previously mentioned in Step 9.

 

Top Smartphones for 2013 Holiday Season

2013smartphone2

iPhone 5s

The iPhone 5S was launched with iOS7.  The updated camera with iPhone 5S has become popular against competitors. Also, the iOS 7 includes many new features including fingerprint identification on the home button, control center, multitasking, enhanced Siri and many more.

The iPhone 5S is available with all major carriers.  Contract prices are $199-399 or without Contract prices are $649-$849.

HTC One

The HTC One runs Android 4.3, a quad-core processor, 2 GB of RAM, 1080p LCD displays and an ultra mega pixel camera.  The most popular feature with HTC One is the front facing speakers and dual microphones.

The HTC One is available with all major carriers.  Contract prices are as low as $50 or without Contract price is $550.

Samsung Galaxy Note 3

The Samsung Galaxy Note 3 is the most prevailing Android device on the market.  The Galaxy Note 3 includes many features, such as, the S Pen, 13 mega pixel camera (rear), microSD storage, a removable battery, LTE and many more.

The Samsung Galaxy Note 3 is available with all major carriers.  Contract price is$299.99 or without Contract price is $699.99.

Nokia Lumia 1520

The Nokia Lumia 1520 runs Windows Phone 8 OS.  The 1520 offers a larger display, faster processor, and lower resolution camera than the Lumia 1020.  Features of the Lumia 1520 include integrated Microsoft Office, 20 mega pixel camera, HD 1080p display and many more.

The Nokia Lumia is only available through AT&T.  Contract price is $199.99 or without Contract price  is$584.99.

Google Nexus 5

The Nexus 5 runs Android 4.4.  The Nexus 5 includes a Snapdragon 800 processor, 8 mega pixel camera, HDR+, wireless charging and many more.

The Nexus 5 prices are $349 (16GB) and $399 (32GB).

Moto X

The Moto X runs Android 4.4.  The Moto X includes many features, such as, 10 mega pixel camera with quick capture, touch-less control, face unlock and many more.

The Moto X is available with all major carriers. Contract price is $99 or without Contract price is $499.

LG G2

The LG G2 runs Android 4.2.2.  The LG G2 has 1080p IPS display, 13 mega pixel camera, power and volume rear keys , clip tray, knock on and many more features.

The LG G2 is available with all the major carriers.  Contract price is $199.99 or without Contract price is $603.99.

Samsung Galaxy S4

The Samsung Galaxy S4 runs Android 4.2.  The Galaxy S4 has a 13 mega pixel camera with Dual shot and Drama Shot, Air View that allows you to control your phone with hovering instead of touch, WatchON, S Health and many more.

The Samsung Galaxy S4 is available with all the major carriers.  Contract price is $199.99 or without Contract price is $627.99.

Motorola Droid Maxx

The Motorola Droid Maxx has outlasting power with a 3,500 mAh capacity battery.  The Droid Maxx features include active notifications, always-on listening, Command Center, wireless charging, 10 mega pixel camera and many more.

The Droid Maxx is only available at Verizon Wireless.  Contract price is $199.99 or without Contract price is $499.99.

Sony Xperia Z1

The Sony  Xperia Z1 is waterproof and dust resistant.  The Xperia Z1 has man features that include 20.7 mega pixel camera, full HD TRILUMINOUS display, quad-core processor, 2GB RAM, microSD card slot, and many more.

The Sony Xperia Z1 is available without a contract for $649.99.

 

New Security Threat: CryptoWall

 

crypt

In October of last year news broke about a new form of malware called Cryptolocker. This malware posed a particularly large threat to many business users and led to many quick and important security updates. Now, almost a year later, it appears that the second version of this – CryptoWall – has been released and is beginning to infect users.

What is Crypto malware?

Crypto malware is a type of trojan horse that when installed onto computers or devices, holds the data and system hostage. This is done by locking valuable or important files with a strong encryption. You then see a pop-up open informing you that you have a set amount of time to pay for a key which will unlock the encryption. If you don’t pay before the deadline, your files are deleted.

When this malware surfaced last year, many users were understandably more than a little worried and took strong precautions to ensure they did not get infected. Despite these efforts, it really didn’t go away until earlier this year, when security experts introduced a number of online portals that can un-encrypt files affected by Cryptolocker, essentially neutralizing the threat, until now that is. A recently updated version is threatening users once again.

Cryptolocker 2.0, aka. CryptoWall

Possibly because of efforts by security firms to neutralize the Cryptolocker threat, the various developers of the malware have come back with an improved version, CryptoWall and it is a threat that all businesses should be aware of.

With CryptoWall, the transmission and infection methods remain the same as they did with the first version: It is most commonly found in zipped folders and PDF files sent over email. Most emails with the malware are disguised as invoices, bills, complaints, and other business messages that we are likely to open.

The developers did however make some “improvements” to the malware that make it more difficult to deal with for most users. These changes include:

  • Unique IDs are used for payment: These are addresses used to verify that the payment is unique and from one person only. If the address is used by another user, payment will now be rejected. This is different from the first version where one person who paid could share the unlock code with other infected users.
  • CryptoWall can securely delete files: In the older version of this threat, files were deleted if the ransom wasn’t paid, but they could be recovered easily. In the new version the encryption has increased security which ensures the file is deleted. This leaves you with either the option of paying the ransom or retrieving the file from a backup.
  • Payment servers can’t be blocked: With CryptoLocker, when authorities and security experts found the addresses of the servers that accepted payments they were able to add these to blacklists, thus ensuring no traffic would come from, or go to, these servers again. Essentially, this made it impossible for the malware to actually work. Now, it has been found that the developers are using their own servers and gateways which essentially makes them much, much more difficult to find and ban.

How do I prevent my systems and devices from being infected?

Unlike other viruses and malware, CryptoWall doesn’t go after passwords or account names, so the usual changing of your passwords won’t really help. The best ways to prevent this from getting onto your systems is:

  • Don’t open any suspicious attachments – Look at each and every email attachment that comes into your inbox. If you spot anything that looks odd, such as say a spelling mistake in the name, or a long string of characters together, then it is best to avoid opening it.
  • Don’t open emails from unknown sources – Be extra careful about emails from unknown sources, especially ones that say they provide business oriented information e.g., bank statements from banks you don’t have an account with or bills from a utilities company you don’t use. Chances are high that they contain some form of malware.

CALL US NOW!