Back to Top

Tech, Web, Cloud & Cabling Services

Category: Tips & Info

Tips & Info Category

Windows 10: Here’s Microsoft’s new look Start menu

Microsoft has changed the look of the Start menu in Windows 10.

The revamped Start menu is due to be added to Windows 10 this summer, as part of a major update coined the ‘Windows 10 Anniversary Edition’.

Microsoft revealed the updated appearance in an early build of the OS, which it released to testers in the Windows 10 Insider program on Friday.

The new look Start menu makes the ‘All Apps’ list visible by default on the left-hand side. In another new addition, a selection of the user’s ‘Most-used’ apps are shown at the top of this permanently visible ‘All Apps’ list. Microsoft says the change should reduce the clicking and scrolling needed to access apps.

The Power, Settings and File Explorer icons are also always visible in the left rail of the Start menu and the ‘Recently added’ section will display three entries, instead of one. Any folders that users have added to the Start menu are now immediately accessible without having to click the hamburger icon.

win10

The old look start menu

updated-startmenu-windows10

The new look start menu

The look of the Start menu in tablet mode has also been overhauled, turning the ‘All Apps’ list into a fullscreen menu, reminiscent of the Windows 8.1 Start screen. Gabe Aul, VP for Microsoft’s engineering systems team, says the switch to fullscreen was a ‘top request from Windows Insiders’, adding that ‘the grid-like implementation of the full-screen ‘All Apps’ list aims to provide efficiency while taking advantage of the additional real estate on the Start screen on a tablet’.

win10tab

The old look ‘All Apps’ list in tablet mode.

full-screen-allapps-windows10

The new look ‘All Apps’ list in tablet mode.

The final Start menu change is designed to make it easier to toggle between pinned tiles and the ‘All Apps’ list, by providing the option to do so in the menu’s left rail.

More helpful Cortana and other changes

The latest Windows Insider build, 14328, also includes a raft of features that will be available to all users following the Anniversary Update.

These new components include Windows Ink, which allows users to more easily write notes on touchscreen PCs and tablets using a digital pen. The addition of Windows Ink to Windows 10 allows users to write on digital sticky notes, draw on digital whiteboards and annotate content in a variety of apps, including Maps, Microsoft Edge, and Office. Microsoft wants support for drawing and writing using a digital pen to be present in many Windows 10 apps and says that adding support for Windows Ink only requires developers to write two lines of code.

Windows 10’s digital assistant Cortana has also been tweaked. Users will no longer have to log into Windows to use Cortana and instead will be able to use voice commands to get Cortana to make notes, play music or set a reminder from the lock screen.

Cortana can now also be used to set photo reminders, for example the user could take a picture of a cheese they want to buy next time they’re in a store, and add reminders based on content from another Windows 10 app, for example telling a user to read an article they flagged as interesting in the Edge browser. Cortana is now also accessible to all users, with Windows 10 no longer requiring users to sign-in before they can ask simple questions of the digital assistant.

Other changes include the ability to search files on OneDrive cloud storage that aren’t synced locally, tweaks to the look of and what is displayed in the Action Center and via notifications, various changes to the Taskbar — including easier access to the calendar and the removal of the File Explorer icon, as well as updates to the Settings app and lock screen.

As this is an early build of Windows 10, some of these features may change before reaching the general public, based on feedback from testers in the Windows Insider program.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Ransomware-as-a-service is exploding: Be ready to pay

RaaS has outgrown smaller targets and now threatens governments, NGOs, and SMBs.

ransomware

It starts with a fast click on a link in a harmless-looking email. Then your PC slows to a crawl. A message suddenly pops up and takes over your screen. “Your files and hard drive have been locked by strong encryption. Pay us a fee in 12 hours, or we will delete everything.” Then a bright red clock begins counting down. No antivirus will save your machine. Pay the fee or lose everything.

You’re the latest victim of a ransomware attack. The scary thing is, you’re not alone. The ransomware market ballooned quickly, from a $400,000 US annual haul in 2012, to nearly $18 million in 2015. The average ransom—the sweet spot of affordability for individuals and SMBs—is about $300 dollars, often paid in cash vouchers or Bitcoin.

The ransomware market scaled up so quickly, claims a recent report by Imperva, due to the rise of ransomware-as-a-service, or RaaS. Here’s how it works:

  • Ransomware authors are marketing on-demand versions of code, using traditional malware distributors in a classic affiliate model.
  • The ransomware author collects the ransom and shares it with the distributor.
  • Malware is distributed through spam email messages, malicious advertisements, and BlackHat SEO sites.
  • According to the Imperva report, “in classical affiliate marketing, the larger cut goes to the possessor of the product. In RaaS … the ransomware author gets a small cut of the funds (5%-25%) while the rest goes to the distributor (affiliate).”
  • Using the deep web, TOR, and Bitcoin, the report says, “this model, based on TOR and Bitcoins, is designed to keep the identity of the author and the distributor hidden from law enforcement agencies.”

Phishing in particular, is a highly effective tactic for malware distribution.

The well-worded email appears to come from a legitimate email address and domain name, and raises very few irregularities. The email comes with a demand for money for an arbitrary service, along with a link that purports to be an “overdue invoice.”

Click that link and open the file (which looks like a Word document), and you’ll become the latest victim of ransomware — that is, malware that encrypts your files and locks you out of your computer until you pay a ransom.

Phishing attacks have also helped ransomware move into the enterprise. In 2015 the medical records system at Hollywood Presbyterian Medical Center was attacked. The hospital paid $17,000 in Bitcoin to unlock the sensitive records. In early 2016 the Lincolnshire County Council was snagged by a phishing scheme and held up for 500 dollars.

To prevent your business from attack, make sure the IT department and communication team are in sync, keep your company’s security systems updated, and remind employees to use caution when clicking on email links from unknown addresses.

If you’ve been hacked, the ransomware rescue kit provides a suite of tools designed to help clean particularly pugnacious malware.

Businesses that suffer ransomware attacks face a tough choice. Paying the fee could restore access to mission-critical data, but there’s no guarantee the extortionists will honor the deal. And of course, paying a ransom provides incentive to hackers and validates the attack.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Windows 10: Ten big things to watch for in 2016

This year will mark the first full year of release for Microsoft’s new OS. A look at what’s in store for Windows 10 this year.

Windows

Windows 10 was described as the “last version of Windows” – an OS that would evolve over time rather than be superceded.

In the few months since Windows 10’s launch Microsoft says it has been installed on more than 110 million devices. But just what lies in store for the OS in 2016, how will it get better and what new devices will it find its way onto?

1. Windows 10 will begin automatically installing on your old machine

Windows 10 is available as a free upgrade to Windows 7 and 8.1 users and Microsoft is getting increasingly aggressive about moving these users to the new OS.

From this year Windows 10 will automatically begin installing on most Windows 7 and 8.1 machines.

Users will still need to confirm the installation manually for it to continue. However, if they choose not to proceed it’s unclear if they can cancel it altogether, with Jeremy Korst, general manager of the Windows and Devices team at Microsoft, saying only that “the customer will have the ability to delay it for some period”.

If users do upgrade but don’t like Windows 10 they will have 31 days to roll back to their previous OS.

The automatic installation, the result of Microsoft changing the status of the Windows 10 upgrade to a Recommended update, will be preceded by increasingly insistent nag messages to upgrade. These notices are already being shown to some Windows users and have been criticised for not offering an easy opt-out.

2. Microsoft Edge will get extensions

Windows 10 launched with Microsoft Edge, a new browser that cast off a lot of the legacy code holding Internet Explorer back.

However, while speedy and capable on paper, the browser suffers from its share of bugs and is missing support for extensions, a key feature found in competitors such as Chrome and Firefox.

Microsoft will rectify this omission “early next year” when Korst said it will add extensions to Edge in test builds of Windows 10, ahead of being made generally available.

Extensions are small software programs, typically written using HTML, CSS and JavaScript, that augment the functionality of a browser.

Earlier this month, Microsoft accidentally published a website announcing the introduction of extensions to test builds of Windows 10. The site, which was taken down, referenced extensions for Pinterest and Reddit.

Microsoft originally planned to add support for extensions to Edge this year.

3. Windows 10 will blur the virtual and real world

Microsoft’s Windows 10-powered augmented reality headset HoloLens will ship to developers in the first quarter of 2016.

The augmented reality headset places 3D virtual images in the wearer’s vision so that they appear part of the real world – for instance, a Minecraft landscape sits on a coffee table or a Skype video sits on the wall.

After trying a demo of the headset this week, TechRepublic senior writer Dan Patterson said that though the headset had a limited “field of vision”, “the 3D animations are smooth, easy to interactive with, and result in only marginal eyestrain”.

The HoloLens doesn’t come cheap, with the developer kit priced at $3,000 – although Microsoft says this early release is meant for developers and commercial customers.

Although HoloLens has obvious consumer and gaming uses, Microsoft is stressing its use for business and is working with NASA, AutoDesk, Volvo, Dassault Aviation, Case Western Reserve University, and other large organisations to develop applications for it.

4. More security for enterprise

The coming year will also see some notable new features added to the enterprise version of Windows 10.

Key among these additions is Enterprise Data Protection, which will allow companies to separate work and personal data on devices using containerisation file techniques. It will also encrypt data as it moves around the organisation – helping to ensure that information isn’t accessed by the wrong people.

The feature will be rolled out to people testing Windows under the Insider Program “early this year”.

5. Testers will get a peek at even earlier builds

Those testing early releases of Windows 10 under the Windows Insider Program will be able to get earlier access to new features from January this year.

Those who choose to be in the “fast” ring of the Insider Program will receive builds of Windows 10 more frequently in 2016, according to Microsoft VP Gabe Aul.

The price of testers getting their hands on early builds more regularly will be that this software will likely include more bugs, he said. Those testers who prefer stability to early access should opt for the “slow” ring, he said.

6. Cortana will be everywhere

Microsoft is planning a major upgrade to Windows 10, codenamed Redstone, next year – with reports the upgrade will put Microsoft’s virtual assistant Cortana at the core of the OS.

An unnamed source told The Verge the new Cortana will help users with a much wider range of tasks inside Windows 10, appearing contextually in documents to provide “information and assistance” and giving Cortana control over a wider range of notifications.

The other major upgrade to Cortana will reportedly be an ability to start a task on one device and pick it up on another, for instance if you get a missed call on an Android phone running the Cortana app you could reply from your Windows 10 PC via text.

7. Microsoft doubles down on Windows 10 phones as desktops

A much touted feature of Windows 10 is its ability to run a desktop OS from a phone.

Microsoft’s new Lumia 950 and 950XL handsets can – wirelessly or via a dock – be hooked up to a monitor, mouse and keyboard and used to run a Windows desktop.

The Windows 10 OS can change the look and feel of certain apps, as well as its own appearance, to suit the phone or the desktop, as well as coping with everyday desktop tasks, such as multitasking and copying files from a USB stick.

The expectation is that Microsoft will further commit to this idea of using your phone as a desktop in 2016, with rumours that Panos Panay and the team behind the high-end Surface Book laptop are working on a Surface Phone that will release next year.

8. No more free upgrade

Windows 10 is available as a free upgrade to everyone running Windows 7 or 8.1 but only for a limited time.

The offer of a free upgrade will expire on 29 July 2016 – after which point it seems that users will have to buy a Windows 10 licence.

However, due to the in-your-face tactics that Microsoft is adopting to persuade people to upgrade, it seems unlikely that Windows 7 and 8.1 users will inadvertently miss out on the offer.

9. Windows 10 replaces its predecessors on new PCs

If you’re not a fan of Windows 10 then you should buy a new PC before October.

From the end of October 2016, PC makers will have to sell new machines with Windows 10, rather than Windows 7 or 8.1.

After that point businesses that want to run older Windows versions on new machines will have to rely on downgrade rights or software assurance rights under volume license agreements.

10. Windows 10 Surface Hub arrives

From January 2016 Windows 10 will power another new piece of hardware,Microsoft’s touchscreen computer the Surface Hub.

The successor to its large-screen Perceptive Pixel displays, the Surface Hub will run a custom version of Windows 10 and various apps needed for workplace communication and collaboration, including OneNote, Skype for Business and Office.

The 55-inch, Intel Core i5-based Surface Hub model will sell for $6,999 (estimated retail price), and the Intel Core i7-based 84-inch version for $19,999 ERP.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

The 10 most important lessons IT learned in 2015

Every year brings with it new challenges, and new lessons, for IT in the enterprise. Here are 10 of the lessons IT learned this past year.

IT lessons

 

The end of a year is always a good time for reflection, especially so if you’re evaluating what your business did right and what you can improve upon. In an increasingly digital world, IT has quickly become one of, if not the most, important aspects of an organization. So, it should be with great care that executives and admins look back on their year and try to glean some wisdom about what can be done differently in the year to come.

Here are 10 of the most important lessons that IT learned in 2015.

1. BYOX is here to stay

As smartphone use grew to near ubiquity in the enterprise, it brought with it the trend of BYOD, or, bring your own device. While that originally referred to mobile devices such as smartphones and tablets, it spawned as host of “bring your own” everything else.

“BYOX is the new mantra with consumers bringing their own applications, cloud sharing tools, social media into the enterprise; essentially bringing their own expectations of which technology they want to use and how and where they want to work in a corporate environment,” said Chuck Pol, president of Vodafone Americas.

2. DevOps is no longer just a buzzword

The term “DevOps” gained huge popularity in 2015 as a reference to an agile method that stresses the collaboration of development and operations. The goal is to connect the writers of the code with those who maintain the systems that run it. However, DevOps continues to evolve and, although it has its own set of challenges, it could be poised to become the method of choice for enterprise IT starting in 2016.

3. Data is currency

Data, especially as it relates to big data has been steadily growing in value but 2015 felt like a tipping point. Tools for both structured and unstructured data exploded in popularity and major data service providers went public, adding credibility to the field and likely creating a better inroad into the enterprise. Also, businesses got better at distinguishing between relevant and irrelevant data.

“It is no longer credible to look at data as big static objects in a deep lake, but rather be considered a set of fast moving assets in a raging river,” said Neil Jarvis, CIO of Fujitsu America. “In 2016 and beyond, companies need to look at the data that creates business-relevant information for today and tomorrow.”

4. Finding talent is problematic

Talent shortages don’t just affect startups on the West Coast. CompTIA CIO Randy Gross said that current estimates suggest there are more than one million IT job opening across the US alone, ranging across skill level from support specialists to network admins. Enterprises are going to have to work harder to attract and retain talent.

“Wise employers with IT jobs to fill have engaged in a self-examination of the tactics and strategies they’re using to attract new talent—and adjusting accordingly,” Gross said. “For some companies, new telecommuting and remote work options have helped them fill their talent gaps.”

5. SMAC is still relevant

The SMAC stack, which stands for social, mobile, analytics, and cloud, is also known by some as the “third platform.” As all of these individual components continue to grow and thrive in the workplace, their interdependencies will grow along with them.

“Senior management must become well versed about these technologies and their possibilities to create new value and new competitive advantages in their own business and markets,” Pol said.

6. Cloud lost its fear factor

Cloud acceptance was a mixed bag for a long time, but 2015 brought a more widespread embrace of cloud technologies and services in the enterprise. In fact, some trends are making it almost a necessity.

“The complete adoption of virtualization, as well as investigation into cloud and other strategies, is far more advanced than expected—particularly amongst SMBs,” said Patrick Hubbard, technical product marketing director at SolarWinds. “Making operating systems and applications truly mobile is redefining how companies think about their IT infrastructure.”

7. The security mindset is changing

Anthem BlueCross BlueShield and Harvard University were among the major organizations that dealt with a public security breach in 2015. With today’s social media, you can almost guarantee any data breach that occurs in the enterprise won’t stay a secret. And, with the risk of a breach high, Intel Security CTO Steve Grobman said that teams must adopt a new way of thinking.

“IT must embrace the mindset that they have already been breached, now how do you protect your environment with this new default outlook?,” Grobman said.

8. Shadow IT is a line item

Shadow IT carries nowhere near the same amount of scorn it once did in the enterprise. Some organizations are even openly embracing it, and making it a foundational part of their IT strategy. And, as shadow IT continues to grow, Pol said, it needs to be properly accounted for in the budget.

“As technology continues to transform business, IT infrastructure will become more complex and more difficult to have a complete view of technology across the business,” Pol said. “The role of IT will need to become more strategic and set clear lines of accountability between IT and line of business budget holders.”

9. Employees are the biggest security risk

When most people think about security risks to their organization, the image of the hooded hacker furiously typing away in a dark room. However, employees themselves pose a real threat to the security of an organization as well. Issues such as poor password practices and using unsecured networks with company devices are a real problem. Kelly Ricker, senior vice president of events and education at CompTIA, said mobile, while helping with agility and productivity, is a cybersecurity nightmare.IT

“Every device that employees use to conduct business—smartphones and smartwatches, tablets and laptops—is a potential security vulnerability,” Ricker said. “Companies that fail to acknowledge and address this fact face the very real risk of becoming a victim of cyber criminals and hackers.”

10. Commoditization is a threat

With the plethora of tools available to build and replicate popular tech, it is increasingly important for organizations to guard against the threat of commoditization.

“As development cycles become shorter and the potential for intellectual property to be recreated and copied increases, it is becoming more difficult to create a sustainable competitive advantage for your products and services,” Pol said.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

BYOD and the danger of litigation

BYOD means you must make a few extra preparations to protect your organization in cases of litigation and eDiscovery.

BYOD devices

It’s a fact that we live in a litigious world. Bring Your Own Device (BYOD) and even corporate-owned mobile devices often are caught up in legal cases. Chris Gallagher, national director for Adecco eQ, a nationwide eDiscovery firm gives an overview of how businesses can navigate eDiscovery when a business has BYOD devices seized as part of a court case.

eDiscovery and mobile devices

BYOD and corporate-owned devices can be put a litigation hold (sometimes called a “preservation order”) when an organization must preserve all forms of relevant information when there’s the anticipation of litigation.

Gallagher’s firm helps legal counsel with data forensic collection, acquisition on mobile devices and PCs. His company processes the data on these devices and uses advanced analytics to locate information pertinent to the litigation

eDiscovery and BYOD: The blurred line

BYOD is still, from a legal perspective, in its infancy, Gallagher said. He said every time his firm does a customer survey, they still hear about strong BYOD activity in the market.

He said, “Of course, from a discovery perspective, from a litigation hold perspective, it makes both the general counsel’s life that much more difficult as well as the law firm’s life more difficult because number one, there’s that blurred line, what is corporate data versus what is personal and individual data, where does that line cease?”

Gallagher points out that anytime you have devices entering and leaving a network there’s a control factor. Companies who master that control have a better (but still not perfect) time when they get called into discovery.

“When you have a device that is not a corporate-owned device that is accessing corporate information, the ownership of that information always comes into question,” Gallagher said.

“When dealing with eDiscovery, part of discovery requests are information that is under your direction and control,” he said. “It’s on a personal device, it’s not owned by the corporation, but it’s corporate-owned data, so is that under your control? Absolutely.”

Litigation holds on BYOD devices can be an added nuance and one more gray area that corporation have to deal with when it comes to BYOD in their enterprise.

Gallagher said you need to ask, ” How do you get that data back? How do you ensure that you’re not losing, not only from a litigation perspective, but the other major issue is corporate information, trademark secrets, corporate secrets, confidential information that you wouldn’t want to enhance?”

He further explained that a litigation hold over a BYOD devices means going beyond the normal things like a desk drawer, files, email, and shared devices. It means you have to ask “Okay, what else have you used to access the corporate network in the last year?

Wearables and eDiscovery

Wearable tech would have minimal impact on eDiscovery. Gallagher said, “Now, if you’re a corporate attorney, if you’re a defense counsel, one of the things you’re going to argue is “Well, the watch, everything that’s available on the watch, it’s just email, weather, that’s available on the server anyway, so you have another place to get it.”

The wearable is a highly discoverable type of device because most of that information is just replicating from somewhere else, Gallagher said. Usually, you are replicating wearable data from your phone so if you have the phone then everything’s replicated.

“For smaller cases, for cases at a location, for criminal cases, or matrimonial cases, where location is important, wearables could come into play,” he said.

Onboarding BYOD devices and eDiscovery

Much of what Gallagher said around BYOD policies is standard fare. I asked Gallagher how a company could protect themselves in the cases of salespeople (the “original BYOD”users) contracts and non-compete agreements. Competitors in highly competitive industries sue each over this kind of stuff all the time.

Career salespeople have their contacts (built from years of selling in an industry) that they keep on their phones. They may have sold to these customers over the years.

From a legal perspective in this scenario, Gallagher recommends that corporations have an addendum added to their standard employment agreement. The addendum should state, “I certify that I am not bringing anything from my former employee. We are hiring you for your knowledge of the industry in general and not any specific contacts that you may or may not have from former employees.

Gallagher said this sort of contract boilerplate puts the responsibility on their shoulders and that you aren’t hiring them for a particular contact.

He also advised that you want to make sure that they abide by their previous non-compete, but you don’t want them downloading or taking anything with them from their previous employer. Gallagher cautioned that you should not place any data from their previous employer on your corporate-owned system. Take, for example, syncing a personally owned smartphone to a corporate-owned laptop. Along with that sync can come corporate data from your competitor. eDiscovery can detect that data.

He further recommends that you have that new sales rep come to you with a clean slate of a cell phone.

Bringing contacts along on a personal device has become much easier legally speaking according to Gallagher. He said, “One of the recent things that’s come out of court cases is if you look at LinkedIn profiles, if you look at customer information but the sales rep proved that most of the information that he had from his ‘client’ was available publicly on their LinkedIn profiles.”

You don’t want them backing up their tablet to their new computer that could result in a breach of their non-compete, and now it’s backed up on your servers according to Gallagher.

Conclusion

Above and beyond the usual BYOD and challenges that enterprises face each day, you may also be navigating a blurred legal line so prepare yourself accordingly with BYOD policies and advice from your counsel to ensure that you are prepared if and when BYOD devices get put on a litigation hold.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Windows Server 2003: Dangerous to use but still surprisingly popular

One in 10 web-facing computers is still running Microsoft Windows Server 2003, according to a report – despite the OS no longer being patched by Microsoft.

Windows 10

Hundreds of thousands of computers are still using the Windows Server 2003 operating system – despite it no longer being patched against hacks.

Internet services found more than 600,000 web-facing computers, together hosting millions of websites, still running the OS that Microsoft ceased supporting in July this year.

The end of support means the OS no longer receives patches against viruses, spyware and other malware that might seek to exploit the system. The US Computer Emergency Readiness Team warns that those running Windows Server 2003 risk “loss of confidentiality, integrity, and or availability of data, system resources and business assets”.

Despite these risks, 175 million websites – what it terms “one-fifth of the internet” – are hosted on machines running Windows Server 2003. The OS also appears to be in use on computers sitting behind web servers for a further 1.7 million sites.

Together accounting for 55 percent, the US and China are home to the bulk of the machines running Windows Server 2003, with 166,000 in the US and 169,000 in China.

The unsupported nature of Windows Server 2003 makes it a tempting target for attackers – which is why it is important for firms to switch away from the OS as soon as possible.

“As time goes by, there will be some vulnerabilities that affect Windows Server 2003 and if those allow things like remote code execution and so on, we’re likely to see a massive number of web-facing computers and a much larger number of websites getting hacked. These could then go on to distribute malware and even be made into botnets to enable other attacks.

“Of course, because Windows Server 2003 is now unsupported, those people who try to find vulnerabilities might even now be particularly focusing on this platform because they know it won’t be fixed.”

Windows Server 2012 R2 is the most recent version of Microsoft’s server-targeted operating system – with a variety of options for licensing. In part, the cost of moving to a more recent Microsoft OS for the proportion of machines still running Windows Server 2003.

“[That proportion] is over 10 percent of all web-facing computers, and shows the true potential cost of migration,” the report states.

Moving a server to a Linux-based OS can be difficult for organisations that have traditionally used Windows Server, Mutton said, particularly if they rely heavily on scripts written for ASP.NET, Microsoft’s server-side web application framework.

The report lists several major firms and banks still running Windows Server 2003 machines, including UK bank NatWest, part of the larger publicly-owned Royal Bank of Scotland (RBS).

However, while Microsoft is no longer supporting the OS for most users, it will offer fixes for the OS to organisations willing to pay for a custom-support deal.

Such a deal was recently struck by the US Navy, which agreed to pay at least $9m to Microsoft to provide ongoing support for Windows XP, Office 2003, Exchange 2003 and Server 2003. A spokesman for RBS said NatWest is also covered by a custom support deal with Microsoft that began in March this year.

Firms without such a custom support deal in place that use Windows Server 2003 to serve sites that handle financial information could be in breach of data security standards, which carries out security testing and assessments for companies.

The requirement under Payment Card Industry Data Security Standard (PCI DSS) 6.2 that “all system components and software to be protected from known vulnerabilities by installing vendor-supplied

“Many merchants still using Windows Server 2003 are likely to be noncompliant and could face fines, increased transaction fees, reputational damage, or other potentially disastrous penalties such as cancelled accounts.”

Microsoft advises several options for machines still running Windows Server 2003 – including switching to Windows Server 2012 R2 or its cloud platform Microsoft Azure. It provides an interactive Windows Server 2003 Migration Planning Assistant.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

IRS launches iPhone, Android apps for taxpayers

Everyone’s favorite government agency, the Internal Revenue Service, has launched its own mobile application.

Released last week to iPhone and Android users, the free IRS2Go provides a few tidbits of information that could make April 15 a bit less stressful.

Those of us fortunate enough to qualify for a refund can find out exactly when Uncle Sam will be sending out that check. Entering your Social Security number (which the IRS says is masked and encrypted), filing status, and expected refund amount delivers the due date for your payment.

People who file their federal taxes electronically can check their refund status about 72 hours after they get an e-mail from the IRS acknowledging the receipt of their tax return. Those still doing things the old-fashioned way–on paper–will have to wait around three or four weeks after filing before they can learn when their refund check will arrive.

According to the agency, around 70 percent of the 142 million individual tax returns filed last year were done electronically.

Beyond providing the refund status, the app lets you subscribe to tax tips and updates sent each day during tax season and less frequently the rest of the year. IRS2Go also points you to the agency’s own Twitter feed where you can learn even more about filing your taxes.

“This new smart phone app reflects our commitment to modernizing the agency and engaging taxpayers where they want when they want it,” IRS Commissioner Doug Shulman said in a statement. “As technology evolves and younger taxpayers get their information in new ways, we will keep innovating to make it easy for all taxpayers to access helpful information.”

The IRS has increasingly been moving taxpayers toward e-filing and encouraging them to access more information electronically as a way to cut costs. Last year, the agency announced that it would no longer mail paper income tax packages to individuals and businesses since all of that information is freely available online or through libraries and post offices. The IRS is also looking for other ways to take advantage of technology, especially the move toward mobile.

This phone app is a first step for us,” Shulman said. “We will look for additional ways to expand and refine our use of smartphones and other new technologies to help meet the needs of taxpayers.”

To view the original article in it’s entirety, Click Here

South Jersey Techies

Shark Tank host, Barbara Corcoran loses $388,700 in phishing scam

Barbara Corcoran of ABC’s “Shark Tank” has lost nearly $400,000 in a phishing scam this week. Corcoran told “People” that she was tricked as a result of an email scheme sent to her team.

The high-powered businesswoman told People that she received a scam invoice approving a real estate renovation, but she didn’t think twice about verifying it because she invests in real estate. It was only until her bookkeeper caught Corcoran’s assistant’s email was misspelled by 1 letter and it was later found to be the address used by the scammer.

“I was upset at first, but then remembered it was only money,” Corcoran told the magazine.

Corcoran’s assistant Emily Burke told CNN Business that the “Shark Tank” star wouldn’t provide any additional comment “at the advisement of her attorneys until the authorities are done investigating.”

However, Corcoran tweeted: “Lesson learned: Be careful when you wire money!” with a link to a TMZ story.

In addition to being an investor and a judge on the hit ABC show, Corcoran formerly owned the global real estate agency that shares her name. She sold it for $66 million in 2001.

Corcoran fell for a phishing scam. It’s common, too: Nearly 30,000 people reported being a victim of that type of scam last year. Together they reported nearly $50 million in losses, according to the FBI’s 2018 Internet Crime Report.

Phishing attacks are common methods of stealing usernames, passwords and money. Hackers pretend to be a trustworthy source to convince you to share personal data. To be safe, it’s important to make sure the sender is authentic before clicking on a link. Google has rolled out security protections that warns people of potential unsafe emails.

If you or your team have any questions or concerns please contact support at (856) 745-9990.



FAA Reconsiders Electronic Device Policy

FAA could reconsider electronic device policy for flights!

The Federal Aviation Administration is forming an industry group to study when smartphones and tables can be turned on during a flight.

Airline passengers may soon be able to use their smartphones and tablets during flights with fewer interruptions.

The Federal Aviation Administration has formed a committee to reconsider its policy on when electronic devices can be turned on during a flight.

“With so many different types of devices available, we recognize that this is an issue of consumer interest,” Transportation Secretary Ray LaHood said in a statement released today. “Safety is our highest priority, and we must set appropriate standards as we help the industry consider when passengers can use the latest technologies safely during a flight.”

And, travelers who are worried that this may mean they’ll have to listen to the person sitting next to them chat on the phone incessantly don’t need to worry — this policy review will not include allowing calls from cell phones during flights.

Airlines currently prohibit passengers from using devices during takeoff and landing in fear that transmissions would interferer with the airplane’s equipment, but the FAA’s call for comments said consumers expect a much more fluid experience. The formation of an industry group to take on the consumer desire versus safety concern issue comes after the FAA said earlier this year that it was going to research the issue.

The group — which will includes members from the mobile industry, aviation manufacturing, as well as pilot and flight attendant groups, airlines, and passenger associations — will begin soliciting comments from the public tomorrow.

The committee is interested in hearing from aircraft operators, flight crews, security, smartphone and tablet device manufacturers, and passengers.

To View Full Article Click Here

Avoid Phishing Scams with Three Simple Tips

Phishing scams are online messages designed to look like they’re from a trusted source. We may open what we thought was a safe email, attachment or image only to find ourselves exposed to malware or a scammer looking for our personal data. The good news is we can take precautions to protect our important data. Learn to recognize the signs and report phishing to protect devices and data.

 

  1. Recognize Common Signs | Be wary of requests from unknown parties, especially if they ask for money or other sensitive information.

• Urgent or emotionally appealing language
• Requests to send personal or financial information
• Unexpected attachments
• Untrusted shortened URLs
• Email addresses that do not match the supposed sender
• Poor writing/misspellings (less common)

  1. Resist and Report | Report suspicious messages by using the “report spam” feature. If the message is designed to resemble an organization you trust, report the message by alerting the organization using their contact information found on their webpage. You can also forward your email to support@sjtechies.com for one of our Security Team members to review.
  2. Delete | Delete the message. Don’t reply or click on any attachment or link, including any “unsubscribe” link. The unsubscribe button could also carry a link used for phishing. Just delete.

If a message looks suspicious, it’s probably phishing.

 

Have questions?

 

Our team is here to help. Call us at: 856-745-9990 or visit: https://southjerseytechies.net.

 

South Jersey Techies, LLC is a full Managed Web and IT Services Company located in Marlton, NJ providing IT ServicesManaged IT ServicesWebsite Design ServicesServer SupportIT ConsultingVoIP PhonesCloud Solutions Provider and much more. Contact Us Today.

CALL US NOW!