Back to Top

Tech, Web, Cloud & Cabling Services

Category: Tips & Info

Tips & Info Category

Windows 10 Anniversary Update: Watch out for these nasty surprises

A major update to Windows 10 is being rolled out. These are the gotchas that are catching out early users.

windows-10-anniversary-update

Windows 10 users are getting the first major update to the operating system in just under a year, with the release of the Anniversary Update.

But alongside the new features and fixes are some more unwelcome changes, ranging from less control for users to frozen machines.

Here are the main gotchas to look out for, as well as some fixes.

Less time to change your mind

With the arrival of the Anniversary Update, those upgrading to Windows 10 from Windows 7 or 8 have less time to switch back to the earlier OS.

Prior to the Anniversary Update, Windows 10 users had 30 days during which they could choose to reset their machine and restore their original OS. However, following the update Microsoft has reduced this period to 10 days.

Microsoft claims it reduced the period after noticing that most users who chose to switch back did so within a few days of upgrading, adding the change will free storage space on users’ machines.

The reduction also coincides with the end of period during which Windows 7 and 8 users could upgrade to Windows 10 for free – meaning those now paying $120 or more to upgrade will likely be less keen to switch back.

Frozen computers and broken systems

When you update software there is always risk that something will break, and that’s exactly what seems to be happening for some who have received the Windows 10 Anniversary Update.

The most common complaint seems to be that the update causes the computer to lock-up soon after loading the desktop.

In response to the problem, Microsoft has been advising users to run Windows 10’s Maintenance Troubleshooter and if that doesn’t work, to perform a clean boot of the system.

Meanwhile, users are reporting the most reliable fix has been to roll back to an earlier build of Windows 10.

Another repeated complaint is that Microsoft’s virtual assistant Cortana is missing from the Task Bar, replaced instead with a search box. In affected systems, Cortana also seems to be disabled inside the Edge web browser.

Some users of Avast and McAfee anti-virus – both widely used products – are also reporting problems after the upgrade, as are gamers trying to use Xbox One controllers.

Cortana is more difficult to get rid of

If you’re not a fan of Microsoft’s virtual assistant Cortana then prepare to dislike the Anniversary Update.

Following the update, it is no longer possible to turn off Cortana from the virtual assistant’s in-built Settings menu.

Instead, if users want to ditch Cortana they will need access to specific admin tools or to edit the registry.

Users can also minimise the information that Cortana collects, although thisdoes require altering various settings.

Harder for admins to block ads

Another less welcome change is that Windows 10 Pro users lose the ability to use admin tools to block ads.

Prior to the update, admins could edit Group Policy settings to stop ads for apps showing in the Start menu and on the lock screen.

However, Windows 10 Pro users will lose that ability, and, following the update, disabling these ads via Group Policy settings will only be available to those running Windows 10 Enterprise, Windows 10 Pro Education, or Windows 10 Education editions.

Individual users should be able to turn off many of these ads by disabling Windows 10 tips, tricks, and suggestions and Windows Store suggestions in the Settings app, however.

Following the Windows 10 Anniversary Update, new installs of Windows 10 will show double the number of ads for Windows Store apps in the Start Menu. Some users have also reported a possible increase in the number of ads shown on the lock screen following the update.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Windows 10 Start menu will soon show twice as many ads. Here’s how to get rid of them

Want to never see a promoted app in the Start menu again? Follow this step-by-step guide for home users and businesses.

windows10giffy

Microsoft is to double the number of adverts for apps that appear in Windows 10’s Start menu.

Windows 10’s Start menu currently has five tiles that display ‘promoted apps’, which are Windows Store apps the user hasn’t installed on their PC. Three of these tiles are links to apps on the Windows Store and two are Windows Store apps that Windows 10 has previously automatically installed on the machine.

In future versions of Windows 10, the number of ‘promoted apps’ tiles in the Start menu will rise to 10. To make room, the number of tiles linking to apps installed on the machine will decrease, from 17 to 12.

Microsoft discussed the changes at the Windows Hardware Engineering Conference in late April, as part of a briefing on new features in the Windows 10 Anniversary Update, due out this summer.

It remains unclear whether all versions of Windows 10 will eventually see the Start menu changes or just new installs. Microsoft has been contacted for clarification.

If you don’t want adverts appearing in your Windows 10 Start menu, here’s how to remove them.

For home users

One option for removing these tiles is to install Classic Shell. The software will allow you to customize the look and feel of Windows, including changing the Start menu to resemble that of Windows 7 or earlier Microsoft operating systems.

If you don’t want to do that, here’s how to manually remove each tile from the Start menu.

In the slides below, you can see which tiles you will want to remove to get rid of promoted apps. Figure A shows the layout of promoted app tiles before the Anniversary Update changes and Figure B shows after.

Figure A
win10before
Figure B
win10after

Depending on which version of Windows you’re running, you’ll want to remove each of the tiles highlighted in Figure A or B. Let’s start by removing promoted apps that are installed on your machine. Right clicking on these tiles will show a drop down menu with an ‘Uninstall’ option at the bottom, as shown in Figure C. Click on this option to remove the app.

Figure C

cons5

Next to get rid of those promoted apps that link to the Windows Store. Right clicking on these apps will again show a drop down menu but this time click ‘Unpin from Start’ at the top, as shown in Figure D.

Figure D

consumerlatest

Finally, to remove suggested apps from the sidebar in the Start menu, you’ll need to make a change in Settings. Go to Settings->Personalization->Start and click the slider to ‘Off’ that sits under ‘Occasionally show suggestions in Start’, as shown in Figure E.

Figure E

consumerremoveads

For businesses

If you are running the Education or Enterprise versions of Windows 10 then promoted apps can also be disabled by changing a Group Policy setting. First open the Local Group Policy Editor. Next, as shown in Figure F, open the following folders in the left hand menu: Administrative templates->Windows Components->Cloud Content.

Figure F

cons4

 

Next double click Turn off Microsoft consumer experiences, as shown in Figure G.

Figure G

biz5

Inside the Turn off Microsoft consumer experiences window, click the radio button marked ‘Disabled’ and then click ‘Ok’ at the bottom of the window, as shown in Figure H.

Figure H

biz3

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Windows 10: Here’s Microsoft’s new look Start menu

Microsoft has changed the look of the Start menu in Windows 10.

The revamped Start menu is due to be added to Windows 10 this summer, as part of a major update coined the ‘Windows 10 Anniversary Edition’.

Microsoft revealed the updated appearance in an early build of the OS, which it released to testers in the Windows 10 Insider program on Friday.

The new look Start menu makes the ‘All Apps’ list visible by default on the left-hand side. In another new addition, a selection of the user’s ‘Most-used’ apps are shown at the top of this permanently visible ‘All Apps’ list. Microsoft says the change should reduce the clicking and scrolling needed to access apps.

The Power, Settings and File Explorer icons are also always visible in the left rail of the Start menu and the ‘Recently added’ section will display three entries, instead of one. Any folders that users have added to the Start menu are now immediately accessible without having to click the hamburger icon.

win10

The old look start menu

updated-startmenu-windows10

The new look start menu

The look of the Start menu in tablet mode has also been overhauled, turning the ‘All Apps’ list into a fullscreen menu, reminiscent of the Windows 8.1 Start screen. Gabe Aul, VP for Microsoft’s engineering systems team, says the switch to fullscreen was a ‘top request from Windows Insiders’, adding that ‘the grid-like implementation of the full-screen ‘All Apps’ list aims to provide efficiency while taking advantage of the additional real estate on the Start screen on a tablet’.

win10tab

The old look ‘All Apps’ list in tablet mode.

full-screen-allapps-windows10

The new look ‘All Apps’ list in tablet mode.

The final Start menu change is designed to make it easier to toggle between pinned tiles and the ‘All Apps’ list, by providing the option to do so in the menu’s left rail.

More helpful Cortana and other changes

The latest Windows Insider build, 14328, also includes a raft of features that will be available to all users following the Anniversary Update.

These new components include Windows Ink, which allows users to more easily write notes on touchscreen PCs and tablets using a digital pen. The addition of Windows Ink to Windows 10 allows users to write on digital sticky notes, draw on digital whiteboards and annotate content in a variety of apps, including Maps, Microsoft Edge, and Office. Microsoft wants support for drawing and writing using a digital pen to be present in many Windows 10 apps and says that adding support for Windows Ink only requires developers to write two lines of code.

Windows 10’s digital assistant Cortana has also been tweaked. Users will no longer have to log into Windows to use Cortana and instead will be able to use voice commands to get Cortana to make notes, play music or set a reminder from the lock screen.

Cortana can now also be used to set photo reminders, for example the user could take a picture of a cheese they want to buy next time they’re in a store, and add reminders based on content from another Windows 10 app, for example telling a user to read an article they flagged as interesting in the Edge browser. Cortana is now also accessible to all users, with Windows 10 no longer requiring users to sign-in before they can ask simple questions of the digital assistant.

Other changes include the ability to search files on OneDrive cloud storage that aren’t synced locally, tweaks to the look of and what is displayed in the Action Center and via notifications, various changes to the Taskbar — including easier access to the calendar and the removal of the File Explorer icon, as well as updates to the Settings app and lock screen.

As this is an early build of Windows 10, some of these features may change before reaching the general public, based on feedback from testers in the Windows Insider program.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Ransomware-as-a-service is exploding: Be ready to pay

RaaS has outgrown smaller targets and now threatens governments, NGOs, and SMBs.

ransomware

It starts with a fast click on a link in a harmless-looking email. Then your PC slows to a crawl. A message suddenly pops up and takes over your screen. “Your files and hard drive have been locked by strong encryption. Pay us a fee in 12 hours, or we will delete everything.” Then a bright red clock begins counting down. No antivirus will save your machine. Pay the fee or lose everything.

You’re the latest victim of a ransomware attack. The scary thing is, you’re not alone. The ransomware market ballooned quickly, from a $400,000 US annual haul in 2012, to nearly $18 million in 2015. The average ransom—the sweet spot of affordability for individuals and SMBs—is about $300 dollars, often paid in cash vouchers or Bitcoin.

The ransomware market scaled up so quickly, claims a recent report by Imperva, due to the rise of ransomware-as-a-service, or RaaS. Here’s how it works:

  • Ransomware authors are marketing on-demand versions of code, using traditional malware distributors in a classic affiliate model.
  • The ransomware author collects the ransom and shares it with the distributor.
  • Malware is distributed through spam email messages, malicious advertisements, and BlackHat SEO sites.
  • According to the Imperva report, “in classical affiliate marketing, the larger cut goes to the possessor of the product. In RaaS … the ransomware author gets a small cut of the funds (5%-25%) while the rest goes to the distributor (affiliate).”
  • Using the deep web, TOR, and Bitcoin, the report says, “this model, based on TOR and Bitcoins, is designed to keep the identity of the author and the distributor hidden from law enforcement agencies.”

Phishing in particular, is a highly effective tactic for malware distribution.

The well-worded email appears to come from a legitimate email address and domain name, and raises very few irregularities. The email comes with a demand for money for an arbitrary service, along with a link that purports to be an “overdue invoice.”

Click that link and open the file (which looks like a Word document), and you’ll become the latest victim of ransomware — that is, malware that encrypts your files and locks you out of your computer until you pay a ransom.

Phishing attacks have also helped ransomware move into the enterprise. In 2015 the medical records system at Hollywood Presbyterian Medical Center was attacked. The hospital paid $17,000 in Bitcoin to unlock the sensitive records. In early 2016 the Lincolnshire County Council was snagged by a phishing scheme and held up for 500 dollars.

To prevent your business from attack, make sure the IT department and communication team are in sync, keep your company’s security systems updated, and remind employees to use caution when clicking on email links from unknown addresses.

If you’ve been hacked, the ransomware rescue kit provides a suite of tools designed to help clean particularly pugnacious malware.

Businesses that suffer ransomware attacks face a tough choice. Paying the fee could restore access to mission-critical data, but there’s no guarantee the extortionists will honor the deal. And of course, paying a ransom provides incentive to hackers and validates the attack.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Windows 10: Ten big things to watch for in 2016

This year will mark the first full year of release for Microsoft’s new OS. A look at what’s in store for Windows 10 this year.

Windows

Windows 10 was described as the “last version of Windows” – an OS that would evolve over time rather than be superceded.

In the few months since Windows 10’s launch Microsoft says it has been installed on more than 110 million devices. But just what lies in store for the OS in 2016, how will it get better and what new devices will it find its way onto?

1. Windows 10 will begin automatically installing on your old machine

Windows 10 is available as a free upgrade to Windows 7 and 8.1 users and Microsoft is getting increasingly aggressive about moving these users to the new OS.

From this year Windows 10 will automatically begin installing on most Windows 7 and 8.1 machines.

Users will still need to confirm the installation manually for it to continue. However, if they choose not to proceed it’s unclear if they can cancel it altogether, with Jeremy Korst, general manager of the Windows and Devices team at Microsoft, saying only that “the customer will have the ability to delay it for some period”.

If users do upgrade but don’t like Windows 10 they will have 31 days to roll back to their previous OS.

The automatic installation, the result of Microsoft changing the status of the Windows 10 upgrade to a Recommended update, will be preceded by increasingly insistent nag messages to upgrade. These notices are already being shown to some Windows users and have been criticised for not offering an easy opt-out.

2. Microsoft Edge will get extensions

Windows 10 launched with Microsoft Edge, a new browser that cast off a lot of the legacy code holding Internet Explorer back.

However, while speedy and capable on paper, the browser suffers from its share of bugs and is missing support for extensions, a key feature found in competitors such as Chrome and Firefox.

Microsoft will rectify this omission “early next year” when Korst said it will add extensions to Edge in test builds of Windows 10, ahead of being made generally available.

Extensions are small software programs, typically written using HTML, CSS and JavaScript, that augment the functionality of a browser.

Earlier this month, Microsoft accidentally published a website announcing the introduction of extensions to test builds of Windows 10. The site, which was taken down, referenced extensions for Pinterest and Reddit.

Microsoft originally planned to add support for extensions to Edge this year.

3. Windows 10 will blur the virtual and real world

Microsoft’s Windows 10-powered augmented reality headset HoloLens will ship to developers in the first quarter of 2016.

The augmented reality headset places 3D virtual images in the wearer’s vision so that they appear part of the real world – for instance, a Minecraft landscape sits on a coffee table or a Skype video sits on the wall.

After trying a demo of the headset this week, TechRepublic senior writer Dan Patterson said that though the headset had a limited “field of vision”, “the 3D animations are smooth, easy to interactive with, and result in only marginal eyestrain”.

The HoloLens doesn’t come cheap, with the developer kit priced at $3,000 – although Microsoft says this early release is meant for developers and commercial customers.

Although HoloLens has obvious consumer and gaming uses, Microsoft is stressing its use for business and is working with NASA, AutoDesk, Volvo, Dassault Aviation, Case Western Reserve University, and other large organisations to develop applications for it.

4. More security for enterprise

The coming year will also see some notable new features added to the enterprise version of Windows 10.

Key among these additions is Enterprise Data Protection, which will allow companies to separate work and personal data on devices using containerisation file techniques. It will also encrypt data as it moves around the organisation – helping to ensure that information isn’t accessed by the wrong people.

The feature will be rolled out to people testing Windows under the Insider Program “early this year”.

5. Testers will get a peek at even earlier builds

Those testing early releases of Windows 10 under the Windows Insider Program will be able to get earlier access to new features from January this year.

Those who choose to be in the “fast” ring of the Insider Program will receive builds of Windows 10 more frequently in 2016, according to Microsoft VP Gabe Aul.

The price of testers getting their hands on early builds more regularly will be that this software will likely include more bugs, he said. Those testers who prefer stability to early access should opt for the “slow” ring, he said.

6. Cortana will be everywhere

Microsoft is planning a major upgrade to Windows 10, codenamed Redstone, next year – with reports the upgrade will put Microsoft’s virtual assistant Cortana at the core of the OS.

An unnamed source told The Verge the new Cortana will help users with a much wider range of tasks inside Windows 10, appearing contextually in documents to provide “information and assistance” and giving Cortana control over a wider range of notifications.

The other major upgrade to Cortana will reportedly be an ability to start a task on one device and pick it up on another, for instance if you get a missed call on an Android phone running the Cortana app you could reply from your Windows 10 PC via text.

7. Microsoft doubles down on Windows 10 phones as desktops

A much touted feature of Windows 10 is its ability to run a desktop OS from a phone.

Microsoft’s new Lumia 950 and 950XL handsets can – wirelessly or via a dock – be hooked up to a monitor, mouse and keyboard and used to run a Windows desktop.

The Windows 10 OS can change the look and feel of certain apps, as well as its own appearance, to suit the phone or the desktop, as well as coping with everyday desktop tasks, such as multitasking and copying files from a USB stick.

The expectation is that Microsoft will further commit to this idea of using your phone as a desktop in 2016, with rumours that Panos Panay and the team behind the high-end Surface Book laptop are working on a Surface Phone that will release next year.

8. No more free upgrade

Windows 10 is available as a free upgrade to everyone running Windows 7 or 8.1 but only for a limited time.

The offer of a free upgrade will expire on 29 July 2016 – after which point it seems that users will have to buy a Windows 10 licence.

However, due to the in-your-face tactics that Microsoft is adopting to persuade people to upgrade, it seems unlikely that Windows 7 and 8.1 users will inadvertently miss out on the offer.

9. Windows 10 replaces its predecessors on new PCs

If you’re not a fan of Windows 10 then you should buy a new PC before October.

From the end of October 2016, PC makers will have to sell new machines with Windows 10, rather than Windows 7 or 8.1.

After that point businesses that want to run older Windows versions on new machines will have to rely on downgrade rights or software assurance rights under volume license agreements.

10. Windows 10 Surface Hub arrives

From January 2016 Windows 10 will power another new piece of hardware,Microsoft’s touchscreen computer the Surface Hub.

The successor to its large-screen Perceptive Pixel displays, the Surface Hub will run a custom version of Windows 10 and various apps needed for workplace communication and collaboration, including OneNote, Skype for Business and Office.

The 55-inch, Intel Core i5-based Surface Hub model will sell for $6,999 (estimated retail price), and the Intel Core i7-based 84-inch version for $19,999 ERP.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

The 10 most important lessons IT learned in 2015

Every year brings with it new challenges, and new lessons, for IT in the enterprise. Here are 10 of the lessons IT learned this past year.

IT lessons

 

The end of a year is always a good time for reflection, especially so if you’re evaluating what your business did right and what you can improve upon. In an increasingly digital world, IT has quickly become one of, if not the most, important aspects of an organization. So, it should be with great care that executives and admins look back on their year and try to glean some wisdom about what can be done differently in the year to come.

Here are 10 of the most important lessons that IT learned in 2015.

1. BYOX is here to stay

As smartphone use grew to near ubiquity in the enterprise, it brought with it the trend of BYOD, or, bring your own device. While that originally referred to mobile devices such as smartphones and tablets, it spawned as host of “bring your own” everything else.

“BYOX is the new mantra with consumers bringing their own applications, cloud sharing tools, social media into the enterprise; essentially bringing their own expectations of which technology they want to use and how and where they want to work in a corporate environment,” said Chuck Pol, president of Vodafone Americas.

2. DevOps is no longer just a buzzword

The term “DevOps” gained huge popularity in 2015 as a reference to an agile method that stresses the collaboration of development and operations. The goal is to connect the writers of the code with those who maintain the systems that run it. However, DevOps continues to evolve and, although it has its own set of challenges, it could be poised to become the method of choice for enterprise IT starting in 2016.

3. Data is currency

Data, especially as it relates to big data has been steadily growing in value but 2015 felt like a tipping point. Tools for both structured and unstructured data exploded in popularity and major data service providers went public, adding credibility to the field and likely creating a better inroad into the enterprise. Also, businesses got better at distinguishing between relevant and irrelevant data.

“It is no longer credible to look at data as big static objects in a deep lake, but rather be considered a set of fast moving assets in a raging river,” said Neil Jarvis, CIO of Fujitsu America. “In 2016 and beyond, companies need to look at the data that creates business-relevant information for today and tomorrow.”

4. Finding talent is problematic

Talent shortages don’t just affect startups on the West Coast. CompTIA CIO Randy Gross said that current estimates suggest there are more than one million IT job opening across the US alone, ranging across skill level from support specialists to network admins. Enterprises are going to have to work harder to attract and retain talent.

“Wise employers with IT jobs to fill have engaged in a self-examination of the tactics and strategies they’re using to attract new talent—and adjusting accordingly,” Gross said. “For some companies, new telecommuting and remote work options have helped them fill their talent gaps.”

5. SMAC is still relevant

The SMAC stack, which stands for social, mobile, analytics, and cloud, is also known by some as the “third platform.” As all of these individual components continue to grow and thrive in the workplace, their interdependencies will grow along with them.

“Senior management must become well versed about these technologies and their possibilities to create new value and new competitive advantages in their own business and markets,” Pol said.

6. Cloud lost its fear factor

Cloud acceptance was a mixed bag for a long time, but 2015 brought a more widespread embrace of cloud technologies and services in the enterprise. In fact, some trends are making it almost a necessity.

“The complete adoption of virtualization, as well as investigation into cloud and other strategies, is far more advanced than expected—particularly amongst SMBs,” said Patrick Hubbard, technical product marketing director at SolarWinds. “Making operating systems and applications truly mobile is redefining how companies think about their IT infrastructure.”

7. The security mindset is changing

Anthem BlueCross BlueShield and Harvard University were among the major organizations that dealt with a public security breach in 2015. With today’s social media, you can almost guarantee any data breach that occurs in the enterprise won’t stay a secret. And, with the risk of a breach high, Intel Security CTO Steve Grobman said that teams must adopt a new way of thinking.

“IT must embrace the mindset that they have already been breached, now how do you protect your environment with this new default outlook?,” Grobman said.

8. Shadow IT is a line item

Shadow IT carries nowhere near the same amount of scorn it once did in the enterprise. Some organizations are even openly embracing it, and making it a foundational part of their IT strategy. And, as shadow IT continues to grow, Pol said, it needs to be properly accounted for in the budget.

“As technology continues to transform business, IT infrastructure will become more complex and more difficult to have a complete view of technology across the business,” Pol said. “The role of IT will need to become more strategic and set clear lines of accountability between IT and line of business budget holders.”

9. Employees are the biggest security risk

When most people think about security risks to their organization, the image of the hooded hacker furiously typing away in a dark room. However, employees themselves pose a real threat to the security of an organization as well. Issues such as poor password practices and using unsecured networks with company devices are a real problem. Kelly Ricker, senior vice president of events and education at CompTIA, said mobile, while helping with agility and productivity, is a cybersecurity nightmare.IT

“Every device that employees use to conduct business—smartphones and smartwatches, tablets and laptops—is a potential security vulnerability,” Ricker said. “Companies that fail to acknowledge and address this fact face the very real risk of becoming a victim of cyber criminals and hackers.”

10. Commoditization is a threat

With the plethora of tools available to build and replicate popular tech, it is increasingly important for organizations to guard against the threat of commoditization.

“As development cycles become shorter and the potential for intellectual property to be recreated and copied increases, it is becoming more difficult to create a sustainable competitive advantage for your products and services,” Pol said.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

BYOD and the danger of litigation

BYOD means you must make a few extra preparations to protect your organization in cases of litigation and eDiscovery.

BYOD devices

It’s a fact that we live in a litigious world. Bring Your Own Device (BYOD) and even corporate-owned mobile devices often are caught up in legal cases. Chris Gallagher, national director for Adecco eQ, a nationwide eDiscovery firm gives an overview of how businesses can navigate eDiscovery when a business has BYOD devices seized as part of a court case.

eDiscovery and mobile devices

BYOD and corporate-owned devices can be put a litigation hold (sometimes called a “preservation order”) when an organization must preserve all forms of relevant information when there’s the anticipation of litigation.

Gallagher’s firm helps legal counsel with data forensic collection, acquisition on mobile devices and PCs. His company processes the data on these devices and uses advanced analytics to locate information pertinent to the litigation

eDiscovery and BYOD: The blurred line

BYOD is still, from a legal perspective, in its infancy, Gallagher said. He said every time his firm does a customer survey, they still hear about strong BYOD activity in the market.

He said, “Of course, from a discovery perspective, from a litigation hold perspective, it makes both the general counsel’s life that much more difficult as well as the law firm’s life more difficult because number one, there’s that blurred line, what is corporate data versus what is personal and individual data, where does that line cease?”

Gallagher points out that anytime you have devices entering and leaving a network there’s a control factor. Companies who master that control have a better (but still not perfect) time when they get called into discovery.

“When you have a device that is not a corporate-owned device that is accessing corporate information, the ownership of that information always comes into question,” Gallagher said.

“When dealing with eDiscovery, part of discovery requests are information that is under your direction and control,” he said. “It’s on a personal device, it’s not owned by the corporation, but it’s corporate-owned data, so is that under your control? Absolutely.”

Litigation holds on BYOD devices can be an added nuance and one more gray area that corporation have to deal with when it comes to BYOD in their enterprise.

Gallagher said you need to ask, ” How do you get that data back? How do you ensure that you’re not losing, not only from a litigation perspective, but the other major issue is corporate information, trademark secrets, corporate secrets, confidential information that you wouldn’t want to enhance?”

He further explained that a litigation hold over a BYOD devices means going beyond the normal things like a desk drawer, files, email, and shared devices. It means you have to ask “Okay, what else have you used to access the corporate network in the last year?

Wearables and eDiscovery

Wearable tech would have minimal impact on eDiscovery. Gallagher said, “Now, if you’re a corporate attorney, if you’re a defense counsel, one of the things you’re going to argue is “Well, the watch, everything that’s available on the watch, it’s just email, weather, that’s available on the server anyway, so you have another place to get it.”

The wearable is a highly discoverable type of device because most of that information is just replicating from somewhere else, Gallagher said. Usually, you are replicating wearable data from your phone so if you have the phone then everything’s replicated.

“For smaller cases, for cases at a location, for criminal cases, or matrimonial cases, where location is important, wearables could come into play,” he said.

Onboarding BYOD devices and eDiscovery

Much of what Gallagher said around BYOD policies is standard fare. I asked Gallagher how a company could protect themselves in the cases of salespeople (the “original BYOD”users) contracts and non-compete agreements. Competitors in highly competitive industries sue each over this kind of stuff all the time.

Career salespeople have their contacts (built from years of selling in an industry) that they keep on their phones. They may have sold to these customers over the years.

From a legal perspective in this scenario, Gallagher recommends that corporations have an addendum added to their standard employment agreement. The addendum should state, “I certify that I am not bringing anything from my former employee. We are hiring you for your knowledge of the industry in general and not any specific contacts that you may or may not have from former employees.

Gallagher said this sort of contract boilerplate puts the responsibility on their shoulders and that you aren’t hiring them for a particular contact.

He also advised that you want to make sure that they abide by their previous non-compete, but you don’t want them downloading or taking anything with them from their previous employer. Gallagher cautioned that you should not place any data from their previous employer on your corporate-owned system. Take, for example, syncing a personally owned smartphone to a corporate-owned laptop. Along with that sync can come corporate data from your competitor. eDiscovery can detect that data.

He further recommends that you have that new sales rep come to you with a clean slate of a cell phone.

Bringing contacts along on a personal device has become much easier legally speaking according to Gallagher. He said, “One of the recent things that’s come out of court cases is if you look at LinkedIn profiles, if you look at customer information but the sales rep proved that most of the information that he had from his ‘client’ was available publicly on their LinkedIn profiles.”

You don’t want them backing up their tablet to their new computer that could result in a breach of their non-compete, and now it’s backed up on your servers according to Gallagher.

Conclusion

Above and beyond the usual BYOD and challenges that enterprises face each day, you may also be navigating a blurred legal line so prepare yourself accordingly with BYOD policies and advice from your counsel to ensure that you are prepared if and when BYOD devices get put on a litigation hold.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

How to upgrade to Windows 10: A step-by-step walkthrough

Windows 10 is now available as a free update. Here is what you can expect when you say “yes” to the update.

Here’s a step-by-step walkthrough of the upgrade process while upgrading Windows 8 machine to Windows 10.

Launch Windows 10 upgrade through Windows Update

Look for the Update screen in Windows 8 and click the Check for Updates link. When the check is over, you will see the screen shown in Figure A.

Figure A

As you can see, it is a 2699.0 MB download. Click the Get Started button and then the screen shown in Figure B will appear.

Figure B

You may be able to get Windows 10 via a free update, but it still requires that you agree to a license/user agreement.

The next screen (Figure C) is very important. Updating takes about 2 hours depending upon the machine. If you cannot afford to be off your computer for that long, it may be a good idea to schedule a time when you can.

Figure C

Installation process

After you start the update process, your PC will immediately restart. From that point on you will just have to wait for the update to finish. During update the screen gets blank for over an hour, so please don’t panic and turn your PC during this seeming lack of activity.

Your PC may also restart several times during the update, but eventually you will reach a screen that asks if you want to do an Express Configuration or a Custom Configuration. Express configuration will be the best choice for most people.

Note that the update does take a bit of bandwidth, so it might be more efficient to update one PC at a time.

When the entire update procedure is complete, you will be presented with the Windows 10 desktop or tablet interface depending on your device as you can see in Figure D.

Figure D

There are new versions of OneDrive and the Snipping Tool in Windows 10. Of course, there is also the new web browser, Microsoft Edge, too.

Get Windows 10 without using Windows Update

If you would like to get Windows 10 without going through the update process, for a clean install for example, then you will have to download the Windows 10 ISO file.

If you have a Windows Vista or Windows XP PC you would like to update, you have to purchase Windows 10. Windows 10 Home will cost you $119, while Windows 10 Pro will cost $199.

As of July 29, 2015, most new devices will be available with either Windows 10 or Windows 8.1, which can be upgraded to Windows 10 for free. If your PC is more than a few years old, it might make more sense to spend money on a new device rather than to update an old one.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Windows Server 2003: Dangerous to use but still surprisingly popular

One in 10 web-facing computers is still running Microsoft Windows Server 2003, according to a report – despite the OS no longer being patched by Microsoft.

Windows 10

Hundreds of thousands of computers are still using the Windows Server 2003 operating system – despite it no longer being patched against hacks.

Internet services found more than 600,000 web-facing computers, together hosting millions of websites, still running the OS that Microsoft ceased supporting in July this year.

The end of support means the OS no longer receives patches against viruses, spyware and other malware that might seek to exploit the system. The US Computer Emergency Readiness Team warns that those running Windows Server 2003 risk “loss of confidentiality, integrity, and or availability of data, system resources and business assets”.

Despite these risks, 175 million websites – what it terms “one-fifth of the internet” – are hosted on machines running Windows Server 2003. The OS also appears to be in use on computers sitting behind web servers for a further 1.7 million sites.

Together accounting for 55 percent, the US and China are home to the bulk of the machines running Windows Server 2003, with 166,000 in the US and 169,000 in China.

The unsupported nature of Windows Server 2003 makes it a tempting target for attackers – which is why it is important for firms to switch away from the OS as soon as possible.

“As time goes by, there will be some vulnerabilities that affect Windows Server 2003 and if those allow things like remote code execution and so on, we’re likely to see a massive number of web-facing computers and a much larger number of websites getting hacked. These could then go on to distribute malware and even be made into botnets to enable other attacks.

“Of course, because Windows Server 2003 is now unsupported, those people who try to find vulnerabilities might even now be particularly focusing on this platform because they know it won’t be fixed.”

Windows Server 2012 R2 is the most recent version of Microsoft’s server-targeted operating system – with a variety of options for licensing. In part, the cost of moving to a more recent Microsoft OS for the proportion of machines still running Windows Server 2003.

“[That proportion] is over 10 percent of all web-facing computers, and shows the true potential cost of migration,” the report states.

Moving a server to a Linux-based OS can be difficult for organisations that have traditionally used Windows Server, Mutton said, particularly if they rely heavily on scripts written for ASP.NET, Microsoft’s server-side web application framework.

The report lists several major firms and banks still running Windows Server 2003 machines, including UK bank NatWest, part of the larger publicly-owned Royal Bank of Scotland (RBS).

However, while Microsoft is no longer supporting the OS for most users, it will offer fixes for the OS to organisations willing to pay for a custom-support deal.

Such a deal was recently struck by the US Navy, which agreed to pay at least $9m to Microsoft to provide ongoing support for Windows XP, Office 2003, Exchange 2003 and Server 2003. A spokesman for RBS said NatWest is also covered by a custom support deal with Microsoft that began in March this year.

Firms without such a custom support deal in place that use Windows Server 2003 to serve sites that handle financial information could be in breach of data security standards, which carries out security testing and assessments for companies.

The requirement under Payment Card Industry Data Security Standard (PCI DSS) 6.2 that “all system components and software to be protected from known vulnerabilities by installing vendor-supplied

“Many merchants still using Windows Server 2003 are likely to be noncompliant and could face fines, increased transaction fees, reputational damage, or other potentially disastrous penalties such as cancelled accounts.”

Microsoft advises several options for machines still running Windows Server 2003 – including switching to Windows Server 2012 R2 or its cloud platform Microsoft Azure. It provides an interactive Windows Server 2003 Migration Planning Assistant.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Microsoft announced Attack Simulator for Office 365 Threat Intelligence

 

Admins can send simulated phishing and attack emails to find security and training weaknesses.

A few weeks ago, Microsoft released a public preview for Attack Simulator for Office 365 Threat Intelligence. On April 17th Microsoft announced that Attack Simulator is now generally available. Attack Simulator for Office 365 Threat Intelligence is available to all Office 365 E5 or Office 365 Threat Intelligence customers.

With Attack Simulator, customers can launch simulated attacks on their end users, determine how end users behave in the event of an attack, and update policies and ensure that appropriate security tools are in place to protect the organization from threats.  The GA of Attack Simulator adds a new HTML editor so realistic looking HTML emails can be sent in simulations of spear-phishing.  Also, two spear-phishing templates are available for immediate use in the spear phishing simulation.

Attack Simulator includes the three attack scenarios from our public preview.

Display Name Spear Phishing Attack: Phishing is the generic term for socially engineered attacks designed to harvest credentials or personally identifiable information (PII). Spear phishing is a subset of this phishing and is more targeted, often aimed at a specific group, individual, or organization.  These attacks are customized and tend to leverage a sender name that generates trust with the recipient.

Password Spray Attack: To prevent bad actors from constantly guessing the passwords of user accounts, often there are account lockout policies.  For example, an account will lockout after a certain number of bad passwords are guessed for a user.  However, if you were to take a single password and try it against every single account in an organization, it would not trigger any lockouts.  The password spray attack leverages commonly used passwords and targets many accounts in an organization with the hope that one of the account holder uses a common password that allows a hacker to enter the account and take control of it.  From this compromised account, a hacker can launch more attacks by assuming the identity of account holder.

Brute Force Password Attack: This type of attack consists of a hacker trying many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found.

 

 

This video demonstrates how Attack Simulator can help organizations educate users to become more secure from cyber threats.  With Attack Simulator, admins can train all their end users, and especially those who are attacked most often.  This proactive training is a powerful way to ensure that your organization can prevent the impact from advanced threats.  Over the coming months, more threat simulations will be added to Attack Simulator so organizations can simulate the most prevalent threat types from the modern threat landscape.

Experience the benefits of Attack Simulator for Office 365 Threat Intelligence by beginning an Office 365 E5 trial today.  Also, learn more about how Microsoft leverages threat intelligence and the value of threat intelligence.

CALL US NOW!