1815
paged,page-template,page-template-blog-large-image,page-template-blog-large-image-php,page,page-id-1815,page-parent,paged-13,page-paged-13,qode-social-login-1.1.3,qode-restaurant-1.1.1,stockholm-core-1.1,select-child-theme-ver-1.1,select-theme-ver-5.1.8,ajax_fade,page_not_loaded,wpb-js-composer js-comp-ver-6.0.5,vc_responsive
Title Image

Blog

How Smart is Your Smart Technology When It Comes to Network Security?

Smart devices have brought about unprecedented amounts of connectivity in aspects of running a business or owning a home that never could have been dreamed of in the past. People can now unlock their front doors, turn up their thermostats, and even switch the lights on and off through their smartphones. Unfortunately, the part that people don’t like to talk about with these applications and devices is security—big surprise, right?

Most consumers tend to lean toward technology that makes their living spaces easier to manage, but these technologies present their own set of problems and challenges, chief among them being security.

Connectivity Through the Cloud

Smart technology works by sending and receiving data from the chosen smart device, be it a thermostat or a video surveillance system, to your smartphone. It does this through the cloud, but there’s a catch—these connections are often unencrypted and unsecured, meaning that anyone who knows where to look can hijack the transmission and steal that data. If you are going to implement smart technology for your company or home, be sure to look for solutions that come with encryption capabilities, thus securing your connectivity through the cloud.

Be Careful About Permissions

Depending on the application, you might notice that it asks for permissions to use various other applications or hardware on your device, like the camera, microphone, or other data found on your device. Be very careful with these permissions. You must be sure of what permissions you are granting before you actually do so. Depending on what permissions are granted, you might accidentally opt into data harvesting. Furthermore, the more permissions you grant without understanding what they are doing, the more likely you are to get hacked, so it’s always better to err on the side of caution with smart technology.

You may have already noticed, but many of the challenges presented above can be mitigated through understanding the nature of what technology you are implementing and how you are using it. Always understand the details for any device you implement on your infrastructure before doing so, and if you don’t, consult professionals who make it their life’s work to help people like you improve their relationship with technology.

Net Activity can help you implement smart technology solutions for your office, but we can do so in a way that prioritizes security in all senses of the word. To learn more about what we can do to help you protect your business and its assets, reach out to us at 216-503-5150.

Disk Cleanup can make your slow PC fast again

The Disk Cleanup tool is a nifty feature that weeds out unneeded files such as cached web pages, temporary files, and deleted items in your Recycle Bin. Disk Cleanup can also determine which files can be removed from your hard disk to free up space. If you notice your Windows PC slowing down or performing below its optimal level, such files are likely the culprit. Here’s how to revitalize a slow PC.

How to run the Disk Cleanup tool

Disk Cleanup can easily be accessed through the Start menu or by searching Disk Cleanup. The tool selects Drive C by default, so make sure to choose the correct drive you want to clean out. Next to each file location is information about how much space it is taking up in your hard disk.

To access this tool on Windows 10, go to the Start menu, scroll to Windows Administrative Tools, then click Disk Cleanup.

Each file location has a corresponding checkbox that needs to be selected in order to delete the unnecessary files it contains. Upon clicking a file location, a description of the files it contains will appear at the bottom of the window so you will see the types of files you’ll be removing.

When Disk Cleanup is finished, you’ll need to restart your system to remove unnecessary Windows Update files. Remember, the Disk Cleanup tool only removes those Update files that are no longer needed, hence usually very few are deleted.

The benefits of Disk Cleanup

Why use Disk Cleanup when you can simply upgrade or replace your hard drive? That’s because doing so offers the following advantages:

  • Maximizes your drive’s memory – The ultimate benefits of cleaning up your disk are maximized computer storage space, increased speed, and improved functionality. These enable you to use your device at peak performance levels.
  • Makes your computer more reliable and secure – Some programs that are downloaded through the internet are often infected with viruses that can decrease your computer’s reliability. The Disk Cleanup tool can clean your computer and rid it of unwanted programs as well.
  • Saves time and increases efficiency – The traditional way of opening folders to find old files to delete may be enough for some, but not for those who prioritize productivity. Although files can be deleted manually, Disk Cleanup is simply much faster.
  • Saves money – Instead of buying and configuring a new drive, you can maximize the useful life of your current one.

 

The Disk Cleanup tool is as handy to launch and operate as any basic program. If you are looking to further improve the speed of your systems, contact Net Activity to learn more about our IT services.

How Does Microsoft 365 Defender Fight Phishing?

Phishing remains one of the top cyber threats to businesses today. To combat such attacks, Microsoft has armed Microsoft 365 Defender with powerful cybersecurity features. Let’s take a look at some of them.

 

  1. Anti-phishing

The most dangerous types of phishing scams involve emails that are disguised to appear like it’s from an entity. An attacker may use cunning tactics, such as referring to the victims by their nickname. They may even take over actual email accounts and use these to trick their victims.

Through machine learning, Defender creates a list of contacts that users normally communicate with. It then employs an array of tools, including standard anti-malware solutions, to differentiate acceptable from suspicious behaviors.

 

  1. Anti-spam

Since common phishing campaigns utilize spam emails to victimize people, blocking spam is a great way to protect your company from such attacks.

Defender’s anti-spam technology addresses the issue by examining both an email’s source and its contents. If an email is found to come from an untrustworthy source or has suspicious contents, it is automatically sent to the Spam folder. What’s more, this feature regularly checks the activity of people in your company to ensure that none of them sends out spam emails.

 

  1. Anti-malware

Malware, such as ransomware and spyware, can spread via phishing emails. Ransomware locks systems and files from users until a ransom is paid. Spyware, on the other hand, steals data by recording keystrokes, copying clipboards, and taking screenshots, among other methods.

Defender employs a multilayered defense against both known and unknown types of malware. This covers the different stages of email transmission security, including filtering potentially harmful attachments, and real-time threat response. Microsoft also regularly deploys new definition updates to keep its defenses armed against the latest threats.

 

  1. Sandbox

It’s not uncommon for some users to accidentally open a malicious email attachment, especially if they’re not careful.

Defender resolves this issue by opening all attachments in a sandbox first. This sandbox is an isolated environment, so if the attachment is malicious, it will only infect the sandbox and not your actual system. Microsoft will then warn you not to open the file. If it’s safe, you will be able to open it normally.

 

  1. Safe Links

Instead of attachments, some phishing emails contain URLs that lead to fraudulent websites — often made to look like legitimate ones — that require victims to provide their personal information. Some of these URLs also lead to pages that download malware into a computer.

Through a process called URL detonation, Safe Links protects users by scanning the links in their emails and checking for malicious behavior, such as the transmission of malware. If the link opens a malicious website, Microsoft Defender will warn users not to visit it. Otherwise, users can open the destination URL normally. Even so, the service will rescan the link in the succeeding days and report any suspicious changes.

What’s great about Safe Links is that it also scans links in emails from people within your company and works on files uploaded to Microsoft Teams and SharePoint.

 

  1. User Submissions

Defender allows you to set a specific mailbox to send emails you deem a threat. The User Submissions feature lets you set criteria for both malicious and safe email and identify mailboxes besides your spam folder to keep these messages in. This feature gives your administrators greater control over which emails to flag and which to report to Microsoft.

 

  1. Enhanced Filtering

If your company uses third-party services to route emails to your on-premises environment before they are sent to Microsoft 365, you will benefit from Enhanced Filtering for Connectors. Defender uses inbound connectors to determine the trustworthiness of email sources. The more complex your routing scenario is, the more likely that an email’s inbound connectors will not reflect its real source.

Enhanced Filtering preserves authentication signals that may have been lost over the course of routing emails. This maximizes the effectiveness of Microsoft 365’s overall filtering capabilities, helping it detect spam and phishing emails.

If you need an email service that promotes efficiency while protecting your business, Net Activity can deploy and manage Microsoft 365 for you. Call us today to get started.

Google My Business App Changing to Google Business Profile

The Google My Business application has assisted business owners in managing their online presence for some time now, having gone through numerous name changes in its time. However, Google has one final change planned for its application. 

Frankly, there will no longer be a Google My Business service before very long. Instead, business owners will have access to a web-based Google Business Profile sometime in 2022.

Google Business Profile is Intended to Simplify Things for Businesses

With the transition from a standalone application to an integrated Google Business Profile, all it will take for a business owner to access their online tools is to enter their company’s name into the Google Search Box. Doing so will return the typical results one might expect as well as the business-centric tools that Google has to offer.

With Google Business Profile in place, you’ll be able to do more to manage your online presence. For instance:

  • Google Search and Google Maps will be usable as a means of verifying your Google Business Profile.
  • Google Search can also be used to chat with customers through your Business Profile, with read receipts being controlled through Search and Maps.
  • Google is also experimenting with call history features and call forwarding.

This will also make any online marketing activities you undergo through Google easier for you to manage, with new tools like the local search campaign budget Performance Planner.

What Features are You Looking Forward to Most?

 

While this rebranding/migration will take a while to fully implement, it’s always good to remain apprised of these kinds of developments so you are in the best position to benefit from them. We’ll be there so you can be sure that you have the technology necessary to take full advantage of any opportunities that come your way.

Find out what Net Activity can do for your IT; give us a call at 216-503-5150 today.

Microsoft Windows 7 And 8 OneDrive Support Is Ending

Are you a OneDrive user running Windows 7, Windows 8, or Windows 8.1? If so be aware that on January 1st, 2022 your OneDrive desktop application will reach end of support.

The company offered the following by way of explanation:

“In order to focus resources on new technologies and operating systems and to provide users with the most up-to-date and secure experience beginning January 1, 2022, updates will no longer be provided for the OneDrive desktop application on your personal Windows 7, 8, and 8.1 devices.

Personal OneDrive desktop applications running on these operating systems will stop syncing to the cloud on March 1, 2022. After March 1st, 2022 your personal files will no longer sync and should be uploaded/accessed directly on OneDrive for web.”

The good news is that your OneDrive files aren’t going anywhere. So you don’t have to worry about finding a new cloud-based file storage system. This is definitely more than a minor inconvenience and yet another reason to strongly consider upgrading your PC and your OS to something more modern.

As things stand the clock is ticking for extended support for the OSes mentioned above. It won’t be long before you lose the protection offered by periodic security updates. Before that happens you need to be thinking in terms of steps to protect yourself and all your data regardless of where it lives.

Although it is highly inconvenient for people running those older Operating Systems it’s completely understandable that Microsoft is taking this stance. Though the company has deep pockets it also has a sprawling catalog of products to maintain. At a certain point they simply have to say goodbye to older applications. Upgrade before the clock runs out.

7 Ways To Work Smarter In Outlook

Microsoft Outlook comes with a raft of features that make managing your busy schedule and boosting your productivity easier. If you find Outlook’s myriad capabilities a little overwhelming, don’t worry — these tips and tricks will have you using Outlook like a pro in no time.

Organize your inbox

Is your Outlook inbox getting a little too cluttered for your liking? Use the Clean Up feature to tidy up your inbox.

From your inbox, click the Home tab and choose from one of three Clean Up options:

  • Clean Up Conversation – reviews an email thread or a conversation and deletes redundant messages
  • Clean Up Folder – reviews conversations in a selected folder and deletes redundant messages
  • Clean Up Folder & Subfolders – reviews all messages in a selected folder and any subfolders, and deletes redundant messages in all of them

Ignore conversations

Besides redundant messages, group conversations that aren’t relevant to you can clutter up your inbox. The Ignore button helps you organize your inbox and focus on relevant emails.

To activate this feature, select a message, then click Home > Ignore > Ignore Conversation. Alternatively, you can open a message in a new window and click Ignore under the Delete function. You can easily revert this action by going to the Deleted Items folder and clicking Ignore > Stop Ignoring Conversation.

Send links to files

This function is especially useful when you need to send large files to your coworkers or clients. You can send a link to the file instead of the file itself as well as set permissions to allow recipients to edit and collaborate on linked files in real time.

To do this, upload the file you wish to send to OneDrive. Then from the message box, click Attach File > Browse web locations > OneDrive.

Tag contacts

To get the attention of a specific person in a group email or meeting invite, use the @Mention function. This works particularly well for emails sent to multiple recipients or if you want to convey the urgency of your message.

In the body of your email or invite message, type the @ symbol followed by the name of the person you want to tag (e.g., @johndoe). Doing so will highlight the name in the message and automatically add it to the To line of your message.

You can also search for messages you’re tagged in by selecting Filter Email from the Home tab, and then clicking Mentioned.

Add notes to emails

With Outlook, you can add sticky notes to specific parts of an email. To add a sticky note, simply drag your cursor to highlight your chosen text in the email, and then release the mouse button to trigger a pop-up object menu. On that object menu, select Add Note. This will open a OneNote feed within Outlook, where you can add text or images to your sticky note.

Schedule a Teams meeting

Teams is Microsoft’s unified communication and collaboration platform, and it includes the Outlook add-in. This feature allows you to set up Teams meetings directly from Outlook. It also lets you view, accept, or join meetings while in either app.

To schedule a Teams meeting on Outlook, follow these steps:

  1. Switch to the calendar view on Outlook. Click the New Teams Meeting tab.
  2. Add individual participants or entire contact groups to the Required or Optional fields.
  3. Type in the topic, start time, and end time of the meeting. There’s no need to add the dial-in phone numbers and conferencing IDs to the invite, as Outlook does this automatically for you.
  4. Create a message inviting the recipients to the meeting, then click Send.

Share emails to Teams

With Outlook, you can easily share an email from your inbox directly to a specific Teams channel. To do that, follow these steps:

  1. Select the email you want to share.
  2. Click the Share to Teams button.
  3. On the Share to Microsoft Teams pop-up menu, type the name of the person or channel you want to share to. Check the “Include attachments” tickbox if you want to include the email’s attachments.

 

These are just some things you can do to improve your Outlook experience. For more on how to get the most out of Outlook and other Microsoft products, reach out to Net Activity today.

Special Year End Pricing !!

Microsoft Teams Rooms Systems For Small/Medium Meeting Room