Back to Top

Tech, Web, Cloud & Cabling Services

Category: Tips & Info

Tips & Info Category

10 Tips for CyberSecurity Recommended By The FCC

Cybersecurity is of paramount importance in today’s digital age as it plays a crucial role in safeguarding sensitive information, ensuring the privacy of individuals, and maintaining the integrity of critical systems and infrastructure. The Federal Communications Commission (FCC) in the United States recognizes the significance of cybersecurity and has provided recommendations and guidelines to help individuals, businesses, and organizations protect themselves from cyber threats. Here are some key points highlighting the importance of cybersecurity along with recommendations from the FCC:

 

  • Train employees in security principles – Establish basic security practices and policies for employees, such as requiring strong passwords, and establish appropriate Internet use guidelines that detail penalties for violating company cybersecurity policies. Establish rules of behavior describing how to handle and protect customer information and other vital data. We offer Security Awareness Training as an option for continuous security training for staff.
  • Protect information, computers, and networks from cyber attacks – Keep clean machines: having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online threats. Set antivirus software to run a scan after each update. Install other key software updates as soon as they are available. We offer Managed Services & Support as an option for preventing cyber-attacks.
  • Provide firewall security for your Internet connection – A firewall is a set of related programs that prevent outsiders from accessing data on a private network. Make sure the operating system’s firewall is enabled or install free firewall software available online. If employees work from home, ensure that their home system(s) are protected by a firewall. We offer a Managed Network Services & Support as an option for firewall security.
  • Create a mobile device action plan – Mobile devices can create significant security and management challenges, especially if they hold confidential information or can access the corporate network. Require users to password-protect their devices, encrypt their data, and install security apps to prevent criminals from stealing information while the phone is on public networks. Be sure to set reporting procedures for lost or stolen equipment. We offer Mobile Device Management as an option for a mobile device action plan.
  • Make backup copies of important business data and information – Regularly backup the data on all computers. Critical data includes word processing documents, electronic spreadsheets, databases, financial files, human resources files, and accounts receivable/payable files. Backup data automatically if possible, or at least weekly and store the copies either offsite or in the cloud. We offer various Backup & Recovery Solutions as an option for business continuity & disaster.
  • Control physical access to your computers and create user accounts for each employee – Prevent access or use of business computers by unauthorized individuals. Laptops can be particularly easy targets for theft or can be lost, so lock them up when unattended. Make sure a separate user account is created for each employee and require strong passwords. Administrative privileges should only be given to trusted IT staff and key personnel. We offer Multi-Form Authentication Solutions as an option for computer login security.
  • Secure your Wi-Fi networks – If you have a Wi-Fi network for your workplace, make sure it is secure, encrypted, and hidden. To hide your Wi-Fi network, set up your wireless access point or router, so it does not broadcast the network name, known as the Service Set Identifier (SSID). Password protect access to the router. We offer Managed Network Services & Support is an option for Wi-Fi security.
  • Employ best practices on payment cards – Work with banks or processors to ensure the most trusted and validated tools and anti-fraud services are being used. You may also have additional security obligations pursuant to agreements with your bank or processor. Isolate payment systems from other, less secure programs and don’t use the same computer to process payments and surf the Internet. Risk Intelligence is an option we offer to identify potential vulnerabilities.
  • Limit employee access to data and information, limit authority to install software – Do not provide any one employee with access to all data systems. Employees should only be given access to the specific data systems that they need for their jobs, and should not be able to install any software without permission. We offer Network & Security Assessments that can scan data repositories for user permissions, security and much more.
  • Passwords & authentication – Require employees to use unique passwords and change passwords every three months. Consider implementing multi-factor authentication that requires additional information beyond a password to gain entry. Check with your vendors that handle sensitive data to see if they offer multi-factor authentication for your account. We offer Cloud Security Assessments which are used to ensure proper password & security practices are in place.

Download the 10 Tips Below

SJT-QR-CyberSecurity-10 Tips

If you have any questions, please email us at support@sjtechies.com or call us at (856) 745-9990.

Quick Reference CyberSecurity Guide

In today’s digital age, cybersecurity is at the forefront of technology, both at the workplace and in our personal lives. With the increasing frequency and sophistication of cyber threats, it is essential that we all play a role in protecting sensitive information both business and personal.

 

To help you stay informed and vigilant about cybersecurity best practices, we have created a Quick Reference Guide for Cybersecurity to be shared with your users as a courtesy to better protect themselves from cyber threats and contribute to a safer digital environment.

Please Download Our Quick Reference Cyber Security Guide Below

Quick Reference CyberSecurity Guide

If you have any questions, please email us at support@sjtechies.com or call us at (856) 745-9990.

Zero-Day Security Vulnerability in Chrome, Firefox and Others

Google Chrome, Microsoft Edge, Mozilla Firefox and Apple’s Safari browser have all been impacted by a single zero-day vulnerability. The flaw, tracked as CVE-2023-4863, is caused by a heap buffer overflow in the WebP code library. Once exploited it can lead to system crashes and arbitrary code execution, where hackers can gain control over an infected device.

Where Does it Originate?

CVE-2023-4863 was first identified by researchers at The Citizen Lab, a research arm of the University of Toronto. The institution subsequently informed Google and Apple of the vulnerability’s existence. Both companies have now released patches. They were joined by Mozilla, which released its own advisory on CVE-2023-4863 yesterday and updates for several versions of its Firefox browser and Thunderbird email client, and Microsoft.

 

Vulnerability Originates In Webp Reader. Users of the affected browsers should update to the most up-to-date version in order to ensure the zero-day vulnerability is patched on their machines. The problem isn’t with the browsers — the vulnerability originates in the WebP Codec. Many applications use the WebP codec and libwebp library to render WebP images.

 

In more detail, a heap buffer overflow in WebP allowed attackers to perform an out-of-bounds memory write. A heap buffer overflow allows attackers to insert malicious code by “overflowing” the amount of data in a program. Since this particular heap buffer overflow targets the codec (essentially a translator that lets a computer render WebP images), the attacker could create an image in which malicious code is embedded. From there, they could steal data or infect the computer with malware. The vulnerability was first detected by the Apple Security Engineering and Architecture team and The Citizen Lab at The University of Toronto on September 6.

How Dangerous Is This Flaw?

Since many browsers, including Microsoft Edge, Brave, Opera, and Vivaldi are built on the Chromium platform, the same platform that Chrome is based on, this could affect their users as well. The same risk is also applicable for Firefox browser clones.

 

Such a widespread exploit in ubiquitously used software is dangerous, widening the attack surface for most organizations.

 

Patching will mitigate the risk, but users must act quickly as hackers will already be at work. Attackers will be working over the coming days and weeks to make the exploit more reliable meaning remote code execution will be more likely. Modern web browsers are exceptionally good at pushing out security updates rapidly and applying them as quickly as practicable, so users will shortly be protected.

 

The biggest risk is to organizations which don’t allow automatic updates and push out updates at their own release schedule.

What Steps Should You Take?

Google, Mozilla, Brave, Microsoft and Tor have released security patches for this vulnerability. Individuals running those apps should update to the latest version. In the case of other applications, this is an ongoing vulnerability for which patches may not exist; NIST noted that the vulnerability has not yet received full analysis.

 

If you are already a Managed Services client, please follow the steps below to check for updates

 

Google Chrome – Click the 3 dots in the top right corner for the menu and choose Help->About Google Chrome.  Chrome will check and install updates automatically from this screen.

 

Microsoft Edge – Click the 3 dots in the top right corner for the menu and choose Help and feedback->About Microsoft Edge.  Edge will check and install updates automatically from this screen.

 

Mozilla Firefox – Click the 3 lines in the top right corner for the menu and choose Help->About Firefox.  Firefox will check and install updates automatically from this screen.

 

 

If you have any questions, please email us at support@sjtechies.com or call us at (856) 745-9990

Microsoft Office 2013 End of Life: What You Need to Know

Microsoft Office 2013 was a popular productivity suite that included several essential tools such as Word, Excel, PowerPoint, and Outlook. It was released in 2013 and was widely used by individuals, businesses, and organizations of all sizes. However, like all software products, Microsoft Office 2013 has reached its end of life, and users are now advised to upgrade to Microsoft 365, the cloud-based version of Microsoft Office.

drawing of a man holding a laptop in front of a very large laptop with "update" on the screen and a wrench in front

What Does End of Support Mean?

End of life, or EOL, refers to the point in time when a software product is no longer supported by the manufacturer. In the case of Microsoft Office 2013, this means that Microsoft will no longer provide technical support, bug fixes, security updates, or new features for this product. This makes the software more vulnerable to cyberattacks, viruses, and malware. Continuing to use Microsoft Office 2013 after the end of life date could result in data loss, security breaches, and other serious problems.

  • This means that Microsoft will no longer provide any updates or support for this software product beyond this date. Users who continue to use Microsoft Office 2013 after this date do so at their own risk.

If you’re using Office 2013, it’s probably a good time to upgrade your version of Microsoft Office.

Upgrade Options

The best way to protect yourself and your organization is to upgrade to a newer version of Office:

  • Cloud upgrade: Subscriptions to Microsoft 365
  • Box Version: Microsoft Home And Business 2021

Microsoft 365

Microsoft 365 is an all-in-one cloud solution with a number of different licensing options to fit your organization’s needs. The best part about cloud-based applications is that you no longer have to worry about retirements, patches, and end of support. Cloud licenses are automatically updated with new features, new applications, and security updates. Many cloud subscriptions also include installed (or desktop) versions of the application, so you can have the same look and feel of the Office applications you are accustomed to using, but built with more robust features and benefits.

Microsoft Home And Business 2021

Office Home and Business 2021 is for families and small businesses who want classic Office apps and email. It includes Word, Excel, PowerPoint, and Outlook for Windows 11 and Windows 10. A one-time purchase installed on 1 PC or Mac for use at home or work.

 

If you have any questions, please email us at support@sjtechies.com or call us at (856) 745-9990.

Atari’s Ataribox console will run Linux

Cost $250-$300, if it ever materializes

Now it just needs an E.T. game.

Atari announced in June that it was getting back into the hardware business, with plans for an upcoming “Ataribox” console. Of course, it didn’t release any actual details at the time—only a slick-looking render of a retro-styled box, complete with real wood paneling. Oh, plus a promise to crowdfund the upcoming console.

If alarm bells just started ringing in your head, visions of another Ouya-style disaster, well we can’t say those fears are unfounded. This week Atari further detailed the Ataribox to GamesBeat, and the plan seems even weirder than before.

According to Ataribox creator Feargal Mac, we’re looking at a device that will a) run Linux and b) cost in the neighborhood of $250 to $300. Featuring a custom AMD processor and launching alongside a catalog of classic Atari games, GamesBeat writes, “the idea is to create a box that makes people feel nostalgic about the past, but it’s also capable of running the independent games they want to play today, like Minecraft or Terraria.”

You know what? Best of luck to them. If Valve couldn’t make the Linux-centric living room PC a hot item, though, We’re not sure that Atari will be able to. And that’s all this is—a very cheap Steam Machine, cheaper even than Alienware’s quaint little model.

Is that enough? Probably not. The problem, as always, is the games. Linux gaming is worlds better than it was a few years ago, especially if Atari focuses on the indie scene. Still, we’re talking a pretty small subset of available titles. Atari’s trotted out the ol’ Valve line of “You can install Windows on it if you want,” and that’s not a great omen in my mind.

And even a $250 Ataribox is still plenty expensive considering this thing won’t run any big-budget games. You can buy an Xbox One S for $250 right now on Amazon, and a PlayStation 4 is only $50 more expensive. Sure, it’s a console, but it’ll at least play Wolfenstein II just as easily as it’ll play Terraria.

Atari’s also been quiet about how you’ll control the Ataribox. GamesBeat mentions a “user interface [Atari is] customizing for TVs,” so I assume a controller, but every photo of the Ataribox is just the console on its own. Hell, for all we know Atari will be buying Steam Controllers in bulk and packaging them with the system. Might as well. Those who want to get into the system level and tinker, though, will probably need a keyboard and mouse, which isn’t very living room-friendly.

One last red flag: It’s still being crowdfunded. Plans are for an Indiegogo campaign later this fall, with a release scheduled for Spring 2018. We’ll keep you updated.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

What Terms You Need to Know to Get Your Business GDPR-Ready

 

What Is EU GDPR? 

The EU GDPR is a law designed to protect and empower residents of the EU by guiding business usage of personal data. In essence, it is reshaping the way corporations handle personal data by controlling its collection, use, and storage. It will replace the regulations and frameworks of the existing 20-year-old directive (95/46/EC).

 

Who Is the GDPR Protecting and Empowering? 

The data subject: This is any individual that can be directly or indirectly identified or uniquely singled out in a group of individuals, from any stored data.

 

What Is the GDPR Protecting? 

Personal data: This is any information relating to an individual, whether in reference to their private, professional, or public life. It includes things like names, photos, email addresses, location data, online identifiers, a person’s bank details, posts on social networking websites, medical information, work performance details, subscriptions, purchases, tax numbers, education or competencies, locations, usernames and passwords, hobbies, habits, lifestyles, or a person’s computer’s IP address.

 

Who Is the GDPR Regulating? 

The data controller: This is the person who, alone or jointly with others, determines the purposes for, and means of, processing personal data. A data controller is not responsible for the act of processing (this falls to the data processor); they can be defined as the entity that determines motivation, condition, and means of processing.

Generally, the role of the controller is derived from the organization’s functional relation with the individual. That is, a business is the controller for the customer data it processes in relation to its sales, and an employer is the controller for the employee data they process in connection with the employment relationship.

 

Who Else Is the GDPR Regulating? 

Data processors: This is the person who processes personal data on behalf of the controller. Typical processors are IT service providers (including hosting providers) and payroll administrators. The processor is required to process the personal data in accordance with the controller’s instructions and take adequate measures to protect the personal data. The GDPR does not allow data processors to use the personal data for other purposes beyond providing the services requested by the controller.

 

What Does the GDPR Consider “Processing?” 

Processing refers to any operation or set of operations performed upon personal data, whether or not by automatic means—such as collection, recording, organization, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, blocking, erasure, or destruction. Processing must be fair and lawful, although transparency is significantly strengthened. The processor may not use the personal data for their own purposes.

 

What Rights Do the Data Subjects Have? 

Under the GDPR, data subjects can request the following:

  • To be informed about the data processing
  • To consent to the processing of their personal data (opt in) or object to the processing of their personal data (opt out)
  • To obtain their personal data in a structured and commonly used format in order to transfer that data, in certain circumstances, to another controller (data portability)
  • To not be subject to fully automated data processing or profiling
  • To know what data is processed (right of access)
  • To correct where any data is incorrect
  • To have data erased under certain circumstances, for example, where the retention period has lapsed or where consent for the processing has been withdrawn (referred to commonly as the “right to be forgotten”) and to register a complaint with the supervisory authority

 

Other Key Elements to Consider in Preparing for GDPR

We’re not done yet. There are four more important elements to consider with GDPR as you become ready.

 

1) Data Breach Notification

For controllers, GDPR requires that breach notice must be provided, where feasible, within 72 hours of becoming aware of a breach; processors need to provide notice to controllers without undue delay. Any data breaches must be documented.

2) Data Minimization

This requires the level and type of data being processed to be limited to the minimum amount of data necessary. This requires you to ensure that the purpose in which the data is agreed and the purpose in which the data was collected are materially similar. The processors should ensure that individuals’ privacy is considered at the outset of each new processing, product, service, or application, and only minimum amounts of data are processed for the specific purposes collected and processed.

3) Data Pseudonymization

The GDPR defines pseudonymization as “the processing of personal data in such a way that the data can no longer be attributed to a specific data subject without the use of additional information.” To pseudonymize data, the “additional information” must be “kept separately and subject to technical and organizational measures to ensure non-attribution to an identified or identifiable person.” In other words, it is a strategy designed to enhance protection and privacy for applicable identifying data.

Although similar, anonymization and pseudonymization are two distinct techniques that permit data controllers and processors to use de-identified data. The difference between the two techniques rests on whether the data can be re-identified.

4) Fair Processing of Personal Data

This requires the processing of personal data to be fair and lawful. Generally, only the level and type of data collected should be limited to the minimum amount of data necessary (see data minimization above). There are a number of methods in which the data may be processed, including: express consent (which may be withdrawn at any time), legitimate interest basis (the subject of which legitimacy may be challenged by the data subject), honoring obligations under the agreement with the data subject, or any other legal basis that may apply.

 

What We Can Do to Help

We know this information can be overwhelming, but taking the proper steps now will save you headaches later. SolarWinds provides products that can help you with getting ready. Our Risk Intelligence software is one of them, providing you with hard data on:

  • A business’ quantified financial risk
  • Personally identifiable information (PII)
  • Protected health information
  • Payment information located in storage
  • Access permissions for sensitive data

Search your ‘data at rest’ for risk areas and start the data mapping you need to get ready for GDPR.

National Cyber Security Awareness Month Tips

360px-US_Department_of_Homeland_Security_Seal.svg

October is National Cyber Security Awareness Month by Department of Homeland Security.

National Cyber Security Awareness Month encourages vigilance and protection by sharing tips and best practices in regard to how to stay safe.

Small businesses are a large target for criminals because they have limited resources dedicated to information system security.  Cyber criminals look for access to sensitive data.

Create a cyber security plan

The Federal Communications Commission offers a Cyber Planner for small businesses.  The planner guide allows specific sections to be added to your guide, including Privacy and Data Security, Scams/Fraud, Network Security, Website Security, Email, Mobile Devices, Employees, Facility Security, Operational Security, Payment Cards, Incident Response/Reporting and Policy Development/Management.

Generate a personalized Small Biz Cyber Planner Guide.

Establish Rules and Educate Employees

Create rules and guidelines for protecting information.  Educate employees on how to post online in a way that does not share intellectual property.  Clearly explain the penalties for violating security policies.

Network Protection

Deploy and update protection software, such a antivirus and antispyware software, on each computer within your network.  Create a regularly scheduled full computer scan.

Manage and assess risk

Cyber criminals often use small businesses that are less-protected to get to larger businesses.  Being a victim of a cyber-attack can have a huge impact on any business including financial issues, loss of possible business partner(s) and many more issues.

Download and install software updates

Installing software updates from vendors can protect your network for unwanted viruses and malware.  Vendors frequently release patches/updates for their software to improve performance and fine-tune software security.  (Example:  Adobe Reader, Adobe Flash and Java updates are critical for protection.)

Backup important business data and information

Create a backup plan for all data including documents, databases, files, HR records and accounting files.  A regularly scheduled backup can be a full, differential or incremental.

  • Full Backup:  Backup of all data.
  • Differential Backup:  Backup of all data that has changed since the last full backup.
  • Incremental Backup:  Backup of all data that has changed since the last full or incremental backup.

Control physical access

Protecting physical property is a very important role in protecting intellectual data.  Create a physical security plan to prevent unauthorized access to business computers and components. 

Secure Wi-Fi

Securing your Wi-Fi network consists of a few configurations.  Configure a device administrator password for your wireless access point (WAP) or router, require a password for Wi-Fi access and do not allow the WAP or router to broadcast the Service Set Identifier (SSID), also known, as network name.

 

Get an early look at the new Office 365 admin center

Tracking and reporting activity in Office 365 using the built-in admin tools is about to get much better. Here’s what the revamped admin center has to offer.

Office365adminSJTechies

Gathering usage information about Microsoft Office 365 in an enterprise is limited by the available admin tools. To make matters worse, as Microsoft adds new applications to Office 365, the ability to track if, and how, users were consuming the new features has been even more difficult. But with the rollout of the new Office 365 admin center in March 2016, those limitations are quickly disappearing.

Reporting

At first glance, you may think the main activity for any Office 365 admin is adding and subtracting employees from the active roster. But a good admin should be doing much more.

As the number of applications in Office 365 has grown substantially in recent years, the need to track all Office 365 activity has also grown. This need to track activity is especially important in larger enterprises where mishandled resources can raise overall costs significantly.

For example, knowing how many employees actually use Yammer on a weekly basis, and when, could help admins predict when resources will be taxed the most. Or tracking how users are actually using collaboration tools like Skype and Delve may lead an admin to conclude that more training on those applications is needed because the apps are underutilized. These are the sort of questions the new Office 365 admin center is looking to answer.

By simplifying the interface and creating ready-to-use dashboards, Microsoft is trying to streamline the reporting process. Tracking email activity and other peak usage data is just a few clicks away. And as the new Office 365 admin center is rolled out, there will also be tools admins can use to create custom reports.

Speaking from personal experience, the new admin dashboard interface is a welcome improvement. Navigation in the new admin center closely matches the familiar navigation system of other Office 365 apps. The previous admin center, with its heavy use of linked text, looked almost tacked on as an afterthought.

officeadmin365-SJTechies

Rollout

The new Office 365 admin center is rolling out in the United States right now and will be the default reporting experience very soon. The new center will roll out to other parts of the world in April 2016.

If you’re not ready for the change, you can roll back to the old admin system during this introductory phase. On the other hand, if you’re anxious for a change, you can click the Get A Sneak Peek link at the top of the old Office 365 admin center to force the installation of the new system.

Bottom line

For most users, administering Office 365 is someone else’s responsibility, but that does not diminish its importance to an enterprise.

A good admin should be able to track what activity is taking place within Office 365 and, more important, what activity is not taking place. Knowing who uses what applications for how long, and when, is essential information. Armed with that knowledge, administrators can determine how to better allocate resources and where new training for users may be required.

With the rollout of the new Office 365 admin center, Microsoft is using feedback received from its customers to create tools and dashboards that it hopes will make the tracking of vital activity data in Office 365 an easily achieved reality.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

3 new iOS 9.3 features business users will love

iOS 9.3 offers several features that might appeal to business-oriented Apple users.

Apple introduced a new version of iOS on Monday. The update includes several new features, including updates to CarPlay and HealthKit, as well as a feature to make it easier for iPads to be used in schools for educational purposes. There are several other new features which are particularly appealing to the business-oriented user.

Here are 3 new features business users should check out.

ios93SJTechies

Night Shift

The proliferation of devices like tablets and smartphones means that some sort of screen is never far away. For many, looking at a screen is the first and last thing they do in the morning and evening.

The problem with that is screens emit blue light, which reduces the amount of melatonin produced in the body. Melatonin is a chemical that helps people fall asleep. The light emitted from smartphones can also cause eye strain, which carries symptoms like headaches and blurred vision.

With this latest version of iOS 9, Apple introduced Night Shift, a feature that automatically adjusts the colors of your display at night. You can schedule times for it to go into effect, manually turn it on and off, and adjust colors on a scale of less warm to more warm.

You can access Night Shift through Settings | Display & Brightness, or through the menu that swipes up from the bottom of the device’s screen.

ios9SJTechies

Password-protected Notes

Notes is iOS’ app for taking, well, notes. iOS 9.3 updates it by allowing users a layer of security. Now, users can lock their notes using either a password or the Touch ID, which makes the app that much more useful.

In order to lock a note, tap the button in the top right corner (the one you might use if you were going to email the note) and then tap Lock Note. When prompted, enter a password, confirm it, and decide if you want to enable the Touch ID. A lock button will appear at the top of the note and in the future if you want to open it, enter the password or use the Touch ID.

ios92SJTechies

More personalized News

The News app now offers more personalization for users, and on a range of topics and publications. So for example, you can select a topic like mobile apps or internet privacy. You can access news by opening the News app, or by swiping right from your main screen.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Surface Pro 4 and Surface Book race ahead of iPad Pro and Pixel C at the high end

Microsoft gave its high-end Surface a leap forward on Tuesday with the unveiling of the Surface Pro 4 and the surprise launch of the Surface Book, the company’s first laptop.

surface-4-surface-book

Microsoft’s love affair with hardware just got more intense. If there were any doubts about the software juggernaut staying in the devices game, they were erased on Tuesday with one of the biggest and broadest hardware announcements in the company’s history.

Microsoft showed off a fleet of new and freshly updated Windows 10-powered devices in New York. The stars of the show were the Surface Pro 4 and the new Surface Book laptop, which were a potent answers to Apple’s recently unveiled iPad Pro and Google’s newly announed Pixel C.

According to Microsoft Devices lead engineer Panos Panay there are nearly 110 million devices running Windows 10. Most of the products Microsoft unveiled at Tuesday’s press event were intended to show how important mobile hardware and software integration with Windows 10 is to the company.

The event’s biggest surprise, the Surface Book, and the new Surface Pro 4 are powerful machines, and both aim to connect with both enterprise users and creative professionals. They succeed big time in the specs department. In terms of usability and adoption, we’ll know more after both are released on October 26.

The Surface Book is Microsoft’s first laptop, and it’s a fiery, ambitious device. The specs are decked, particularly given that the price is comparable to a Macbook Pro. The Surface Book starts at $1499, and comes with a full Intel Core i5 or i7 processor, 1TB of storage, 16GB RAM, and a GPU designed for gaming and multimedia editing by the Xbox team. Additionally, the 13.5-inch screen (3000 x 2000 resolution) can detach to become a stand-alone tablet.

The Surface Pro 4 tablet runs Windows 10 and, like its predecessors, can serve as a full-fledged laptop replacement. The Surface Pro 4 is, as expected, somewhat thinner and 30 percent faster than the previous model. It has 16GB of RAM, and comes with up to a terabyte of storage, and a 12.3-inch screen (2736 x 1824 resolution). Microsoft cloud and productivity apps Cortana, Windows Hello, Microsoft Office, and OneDrive are deeply integrated. The Surface Pro 4 starts at $899.

When the Surface debuted in 2012 running Windows 8, the tablet seemed like an awkward, out-of-place device. Today, the Surface Pro has been owning and innovating in the high-end tablet space. It’s become a favorite of design professionals, IT administrators, and others who want a productivity tablet.

Arguably, the success of the Surface Pro helped pull Apple and Google into the high-end professional tablet market. Google’s comparable new Pixel C is similarly powerful, features a keyboard cover, and is deeply tied to the Google cloud ecosystem. Yet, Google’s device does not feel as durable as the Surface Pro 4, and Office is still often an essential tool for business users looking for a full laptop replacement.

Apple’s iPad Pro is a powerful professional and creative tool. Apple’s high-end tablet is larger and slightly more expensive than the Surface Pro 4. Microsoft is banking that the integration of Windows 10 and universal apps will help the Surface stand on par with the iPad Pro.

Microsoft’s attention to detail with peripheral devices like the Type Pro cover and the Surface Pen stylus may lend them a slight edge in the professional tablet market. The new Surface Pro Type Cover, notable for its “precision glass trackpad” is a significant refinement over the previous generation. The cover still costs 130 dollars, but is lighter, more responsive, and features more space between the keys than the previous version.

Microsoft has worked hard to make the stylus seem useful and cool. The new Surface Pen is intended to feel like writing on paper. The stylus features a tip with 1,024 points of pressure sensitivity, an eraser (yes, an eraser!), year-long battery life, and comes in five colors. When not in use the pen is held snugly to the top of the tablet by magnets. Microsoft took great care to display the tablet tilted in portrait mode like a clipboard, with a pen resting on top. The company emphasized the tablet itself “just fades into the background” when used by office workers, doctors, architects, and musicians.

surface-book-two

As with the Surface Pro 4 and Surface Book, the new Lumia 950 and 950 XL phones are powered by Windows 10, with special consideration to mobile productivity. The devices measure at 5.2 and 5.7 inches respectively, and feature an upgraded camera with a dedicated shutter release button.

The most unique and innovative announcement from Microsoft may have been the Display Doc. Intended to maximize workplace flexibility, and uncouple the enterprise user from the constraints of a laptop, the Microsoft Display Doc was initially announced at last spring’s Build conference as the Continuum docking station. The Display Doc is a small, square device that connects to any compatible Windows 10 mobile device like the Lumia 950 using three USB Type-3 ports, a DisplayPort and HDMI. When connected to a monitor using Display Doc, the phone will present a traditional Windows home screen, complete with the familiar Start button and icon tray. Though not as robust as a true desktop PC, the experience resembles desktop Windows and is able to manage productivity tasks like mail and messaging, document creation and sharing, and web browsing.

Windows 10 is at the core of the new Microsoft device environment. The company also announced updates to the Windows 10 universal app ecosystem [LINK], and a launch partnership with Facebook to expand the core Facebook, Messenger, and Instagram applications.

CEO Satya Nadella closed the event by stressing the importance of Windows 10 as a unified platform. Every device Microsoft released on Tuesday is a step towards fulfilling that vision. As impressive as the devices were, the biggest thing standing in their way perhaps is the stability of Windows 10

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

CALL US NOW!