Blog

March 20th, 2014

Security_Mar17_CAny business that employs technology in any aspect will eventually begin to worry about how secure their systems are. In order to ensure security, many companies implement a security strategy. While these strategies are a great way to ensure the security of your business systems and data, there is one element that many business owners forget: The audit.

Auditing and the security security strategy

Auditing your company's security is important, the only problem business owners run across is where and what they should be auditing. The easiest way to do this is to first look at the common elements of developing security strategies.

These elements are: assess, assign, audit. When you develop a plan, or work with an IT partner to develop one, you follow the three steps above, and it may be obvious at the end. In truth however, you should be auditing at each stage of the plan. That means you first need to know what goes on in each stage.

During the assessment phase you or your IT partner will need to look at the existing security you have in place. This includes on every computer and server and also focuses on who has access to what, and what programs are being used. Doing an assessment should give you an overview of how secure your business currently is, along with any weak points that need to be improved.

The assignment phase looks at actually carrying out the changes you identified in the assessment phase. This could include adding improved security measures, deleting unused programs or even updating systems for improved security. The main goal in this phase is to ensure that your systems and networks are secure.

Auditing happens after the changes have been made and aims to ensure that your systems are actually secure and have been implemented properly. Throughout the process you will actually need to continually audit and adjust your strategy.

What exactly should be audited?

When conducting an audit, there are three factors you should focus on:
  1. The state of your security - Changing or introducing a security plan usually begins with an audit of sorts. In order to do this however, you need to know about how your security has changed in between audits. Tracking this state and how it changed in between audits allows you to more efficiently audit how your system is working now and to also implement changes easier. If you don't know how the state of your security has changed in between audits, you could risk implementing ineffective security measures or leaving older solutions open to risk.
  2. The changes made - Auditing the state of your security is important, but you should also be auditing the changes made to your systems. For example, if a new program is installed, or a new firewall is implemented, you will need to audit how well it is working before you can deem your security plan to be fully implemented. Basically, you are looking for any changes made to your system that could influence security while you are implementing a new system. If by auditing at this point, you find that security has been compromised, you will need to go back to the first step and assess why before moving forward.
  3. Who has access to what - There is a good chance that every system you have will not need to be accessed by every employee. It would be a good idea that once a security solution is in place, that you audit who has access to what systems and how often they use them. This stage of the process needs to be proactive and constantly carried out. if you find that access changes or system access needs change, it would be a good idea to adapt your the security strategy; starting with the first stage.
If you are looking for help developing a security strategy for your business, contact us today to see how our managed solutions can help.
Published with permission from TechAdvisory.org. Source.

Topic Security
March 20th, 2014

Hardware_Mar17_CWhether you have a brick-and-mortar or Internet based business, you’ll surely need to print out some documents at one time or another. The question is, do you even have a printer? There are an increasing number of businesses who don't. Considering how everything is setup on the Web nowadays, it kind of makes one wonder what type or printers are being used in the offices these days?

These three printers below are the most common printers found in offices these days.

Multi Function Printers (MFP)

Multi Function Printers are also commonly known as all-in-one printers. With this type of device, your printing, scanning, faxing and photocopying needs are covered! These printers usually come in a variety of sizes with many being small enough to fit onto a small desk.

Aside from the multi function features that MFPs have, these are the common benefits that business owners can gain from this type of printer.

  • They take up less room.
  • They are usually lower in cost. Though it may seem expensive compared to the other types of printers, if you consider buying a fax machine, scanner, photocopier and a printer, you’ll find that buying an MFP is actually a lot more affordable.

Inkjet Printers

Inkjets print documents by spraying ink onto paper, and can usually produce prints with a resolution of 300dpi (dots per inch) with some actually able to print documents as high as 600dpi. This makes them ideal for printing saller images and reports.

What most business owners like about inkjet printers is the fact that they are usually affordable, making them an ideal device for businesses that just want printers. Since most offices (if not all) have computers, you’ll most likely see inkjet printers in the majority of offices. Here are some more benefits that people like about inkjet printers.

  • Fast printing speeds.
  • Can produce really high quality print.
  • Easy to use.
  • They can produce vivid colors.

Laser Printers

If there’s one very notable feature that you’ll love about laser printers, it would be the printer's capability of producing very high quality documents. In fact, laser printers can produce copies with a resolution of 600 dpi - 1200 dpi.

One of the main differences that laser printers have is the fact that they use toner (colored or black powder) instead of the inks that are used in most other printers.

Laser printers offer users many enticing benefits including:

  • Very high resolution.
  • Fast results.
  • High volume printing.
  • No smears at all.

What type of printer should my business get?

If you are looking for a new printer, it can be a little confusing as to which you should get. If you don't have a scanner or fax machine, it would be a good idea to look into a Multi Function Printer. Looking to print smaller or shorter documents or only occasionally? An Inkjet would probably be a better choice. If you need to print on a regular basis, or print in mass quantities a laser printer could be the best choice.

With all the types of printers available in the market, choosing a specific printer to use in your office can be quite confusing. If you need help in choosing which printer to go for, then give us a call and we’ll give you our expert advice on the matter.

Published with permission from TechAdvisory.org. Source.

Topic Hardware
March 19th, 2014

BCP_Marc17_CIsn’t it disturbing how a disaster (whether man made or natural) can devastate your business? While disasters are inevitable, you can mitigate risks and lessen the damage to your business in the event of one through a DRP (Disaster Recovery Plan). While it may not seem important to some businesses, especially if yours has never been faced with a disaster, a DRP would be a good idea.

While there are several facets to a DRP that are going to determine whether it will be effective or not, making sure that you’ve considered these 5 tips is definitely a good start.

1.) Commitment from management

Because the managers are the ones who will coordinate the development of the plan and be the central figures who implement the recovery plan, it’s crucial that they are committed to it and are willing to back it up.

They will also be responsible for setting an allocated budget and manpower to creating the actual plan. That said, it’s very important that they know the concept behind it and how huge of an impact a DRP can have on a business.

2.) A representative on each department should be available when creating a DRP

It’s unthinkable to believe that your DRP is well optimized when you haven’t had a representative from each department coordinate with you while creating the recovery program.

Considering how they themselves are the front line of your organization with the best knowledge about how their department works, it’s a huge plus that you should take advantage of when creating a DRP.

With the representatives on your team, you’ll be able to see things from their perspective and gain first-hand knowledge from those who do the actual work.

3.) Remember to prioritize

In an ideal world, you should be able to restore everything at the same time after a disaster strikes. But since most businesses usually have a limited amount of resources, you will usually have to recover systems one at a time.

Because of this, you need to have a hierarchy or a sense of priority when determining which systems should be recovered first. That way, the most important systems are immediately brought back up while the less important ones are then queued in order of their importance.

4.) Determining your recovery strategies

This is one of the main focal points of a DRP since this phase tackles the actual strategies or steps that you’ll implement to recover your systems.

When determining your actual strategies, it's important that you brainstorm and think about all the options that you have to recovering your systems. Don’t simply stick with the cheapest possible strategy or even the most expensive ones.

You have to remember though that the simplest strategy to implement is probably the best one. That is, as long as the simplest strategy covers the critical aspects of your system recovery.

That said, avoid over complicating your strategies as you might face unnecessary challenges when it comes to the implementation of the recovery strategy.

5.) Do a dry run at least once a year

Your DRP shouldn’t end with the concept alone. No matter how foolproof you think your strategy is, if you haven’t tested it you most likely have missed something important.

It's during the dry run phase that the need for extra steps (or the removal of one) are made even more evident. You can then start polishing your strategies according to how your dry run plays out. It would also be a good year to practice your plan each year and update it accordingly.

These tips will help you ensure that your DRP will remain effective should a disaster occur. If you’re having a hard time figuring out how to go about the process of creating a DRP, then give us a call now and we’ll help you with the process.

Published with permission from TechAdvisory.org. Source.

March 19th, 2014

OSX_Mar17_CWhy struggle with having a slow Mac computer if there are several ways to speed it up? It’s no secret that having a slow computer can be very limiting (not to mention frustrating) when running your business. It’s because most business transactions and processes are done via the computer that you should make sure that it’s running as fast as it can. These five tips below should help you speed up your Mac.

Uninstall your old and unused programs

If you’re thinking that those old or unused programs aren’t hurting your computer’s performance since you haven’t been using them, you may be shocked to know that they actually can be one of the leading causes of a slow computer. These old programs despite being inactive, actually take up storage space which can cause your Mac to slow down.

This can really become a big issue if you’re running out of room on your hard drive because the less space you have available on your hard drive, the slower your computer will run. Try opening your Applications folder and looking for apps and programs that you no longer use. Simply drag them to the Trash and then empty it to free up space.

On another note, it would be a good idea to empty your trash on a regular basis, because items in the trash still take up storage space leading to a potentially slower computer.

Clean your desktop

Your Mac should run a bit faster if your desktop is clean. We don't mean go in literally clean the desktop, we mean get rid of the shortcuts, programs and files that you don't use. The more icons and stuff on your desktop there are, the slower your computer will run.

Instead of adding new icons, folders, files, etc. to your desktop try storing documents in the documents folder (Click any blank area on your desktop, press Go at the top of your screen and select Documents). Or, create a folder on your desktop for different images of files. Basically you want to minimize how much is on your desktop.

Use a program like Memory Keeper

What these apps do is help you free up more space on your computer by cleaning your computer’s memory. This is similar to the defrag option in Windows where the OS will essentially put files of a similar nature closer together in the hard drive, making them easier and quicker for the processor to access. To us, this means a faster computer!

You can get Memory Keeper free on the Apple Store, but be sure to contact us before you download it as we may have a solution that comes as part of your IT solutions.

Organize/clean your Finder and the files within

Just as you should minimize the files and clutter on your desktop, you should also minimize the clutter and number of icons in the main folders of the Finder. This includes the folders under each user, Downloads, Documents, etc.

It would not be a good idea to delve into the Utilities and Network folders as they usually contain important files that if deleted could cause your computer to stop working.

Upgrade your hardware

If you've tried the suggested tips above and your computer is still running slow, then your last resort should be to have a hardware upgrade.

We take this as the last resort as this may take more time, let alone cost a lot of money.

Consider upgrading your RAM instead of upgrading your processor since doing so is considerably cheaper.

It’s highly suggested to get a minimum of 2 GB of extra RAM but if you’re using some heavy duty programs like Adobe Photoshop, then a minimum of 4 GB RAM would probably suit you better. Before you do upgrade however, check with either Apple or us to ensure that your computer can be upgraded. By asking an IT partner like us, we will be able to better inform you as to what you can upgrade and how you can go about it safely.

Are you looking for more tips on how to speed up your Mac? Then give us a call now and we’ll have our team talk to you about how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Apple Mac OS
March 13th, 2014

WindowsPhone_Mar10_CAre you looking for the best mobile platform for your business? While there are several mobile phones in the market, nothing can compare to the Windows Phone platform and the features that it can offer your business. Not only is it stable and trusted, but it’s also a very intuitive platform that you can easily manage to get things going for your business.

While there’s a plethora of reasons as to why business owners are moving to the Windows platform, these three powerful ones will give you a good idea of why people are making the shift.

Office apps, Lync and Outlook

Windows Phones have access to a number of Windows apps including the powerful Office suite which can turn your phone into a mobile office. By using the various Microsoft Office apps, you can share, access and edit your office documents all in one place. You can then sync all of the documents to SkyDrive, Office 365, or SharePoint sites after you’re done editing.

Are you a huge fan or avid user of Outlook tasks and calendar? If you are, then you’ll love how you can sync your Outlook tasks with your Windows Phone and have access to all of your messages, tasks and calendars at the touch of a button.

Beyond the core Office apps, there are also apps like Lync which allows for voice and video communication. Using Lync Mobile can be a game changer for your business. You can view your colleague’s availability, chat with individuals or groups through Instant Messaging, all from your phone.

Encryption and security

Viruses, hackers or malware can put you in a lot of trouble if left unchecked. Not only is it a good idea for business owners to make sure that their system is well optimized, they need to also make sure that their security is robust as well.

The Windows Phone has a trusted boot process that ensures only validated software runs, meaning that if software hasn't been validated by Microsoft, it won't be allowed to run. It’s also the only phone with native support for Information Rights Management that you can use for your business to protect critical and sensitive data.

Have you misplaced your phone before? If you answered yes, then you won’t have to worry as much if you misplace your Windows Phone as it has several layers of protection against that.

Here are some of the features that you can use:

  • Password or Pin
  • Remote wipe
  • Tools that you can use to find lost phones included in the Windows Phone management site

Have all of your contacts in one place!

The Windows Phone allows you to see all of your contacts on Hotmail, Messenger, Outlook, Facebook, LinkedIn, Twitter, Google and all other compatible email accounts. If you’re a Skype user, you can also see your Skype contacts. The neat part is, you can customize your phone to show from which source the contacts are coming from. So if you want only the contacts from Facebook and Skype to display on your phone, you can customize your phone to show just that and disable the other sources like LinkedIn etc.

Once you tap a name, you can then see a consolidated contact card showing all of the information you have about that specific contact. This includes all the methods to communicate, conversations, recent calls and even their social media activity.

This feature is especially helpful when building relationships with thought leaders and the influencers in your niche. You can easily be updated on what they’re doing giving you some more insight on how you can implement their techniques in your business. Using this to study your competition’s activities is another effective way of using this feature for your business.

A lot of business owners are shifting to the Windows Phone platform and they’re right in doing so. The features mentioned above can give an advantage over the competition and help boost business to greater heights. And the best part is - we’re just on the tip of the iceberg with all the features that Windows Phones have to offer.

Do you want to know more?

If you want to know more about how you can use your Windows Phone to better your business, then give us a call now and we’ll help you.
Published with permission from TechAdvisory.org. Source.

March 13th, 2014

AndroidPhone_Mar10_CSmartphones have become one of the most essential tools a business owner has at their disposal. With an ever expanding number of features, these devices are more mobile computer than phone. That being said, communication features like the text message are still one of the most popular features. While texts are useful, some Android users are unsure about where to find their messages.

On the vast majority of Android devices there is more than one app that supports text messages. Here is an overview of the apps and how you can find text messages on your Android device.

The stock 'Messages' app

On almost all Android devices, especially those that use what's called an overlay (the device manufacturer's take on Android), there is the stock Messages app. When you first set up your phone, this is the app that will allow you to view and send messages by default.

Most devices already have a shortcut to this app on your device's home screen, usually in the drawer at the bottom of the screen. It usually looks like a speech bubble or an envelope with the words Messaging below it.

  1. Tapping on this app will open your text messages allowing you to read, send and reply to any messages. If you can't find this app, try:
  2. Clicking on the Apps icon on the bottom of your phone. It is usually represented by two rows of grey dots.
  3. Looking through the apps that come up. You are looking for an app with any of the icons listed above, or is called Messaging or SMS.
  4. Tapping on the app once you find it.
If you like, you can press on the app's icon for a second or two and then drag it to your device's Home Screen in order to place a shortcut there.

Google Hangouts

On new Google Nexus devices - especially the Nexus 5 - you probably won't find a messaging app. That is because Google has eliminated it, instead turning Google Hangouts into the new text messaging app.

Hangouts started as the instant messaging platform of Google+ and was then introduced as the new version of Google Chat, and finally the messaging platform on Google devices. In other words, Google Hangouts is the one app for instant messaging and texts across Google's platforms.

If you have the Hangouts app installed on your device, your text messages should show up when you open it. If you can't find your messages/would like to use Hangouts as your SMS app you can do so by:

  1. Opening Hangouts and signing in (if you need to) using your Google account.
  2. Pressing the three vertical squares at the top-right of the screen.
  3. Selecting Settings followed by SMS.
  4. Tapping on SMS Enabled followed by Default SMS app in the window that opens.
  5. Selecting Hangouts.
Your text messages should show up within a few seconds in the main hangouts messaging screen.

Which should I use?

This is a question some users have asked, as it can be slightly confusing as to which app they should be using. The true answer to the question is either! The stock apps, and Hangouts both offer full text messaging capabilities, it really comes down to which you prefer. Some apps present SMS messages in a clear and easy to read manner which some people prefer over Hangouts, while Hangouts is preferred by others, especially Google users.

If you are looking to learn more about the features of your Android phone, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

March 12th, 2014

Facebook_Mar10_CFor businesses, the Facebook Page is an important aspect of their overall online presence. In order to ensure that Facebook is used properly, the company set user guidelines. Businesses should pay attention to the Page guidelines, largely because they dictate how businesses should use the platform. The thing with this and many other guidelines is that Facebook does change the from time-to-time. In the past months, the company has changed the guidelines related to Promotions that you should be aware of.

Background on Facebook Promotions

Business that have Facebook profiles orient the majority of their activity around their Page. Much like a user's profile this is where all the content and information about and from the business is posted. When business Pages were first launched many companies started to join and run promotions, often to the point of spamming or at least annoying users.

To curb this, Facebook implemented a series of regulations as to how companies can run promotions. Break these regulations and you could see your posts and content punished in the form of showing up lower on user's News Feeds, or not at all. This is obviously something many companies don't want, so it would be a good idea to keep up with the rules supporting how you can use the platform for promotions.

The problem with this is that it's easier said than done especially since Facebook is known to change regulations on a regular basis, often making it hard for businesses to know whether the promotion they are running meets regulations or not. In recent months, Facebook has actually changed their Page guidelines around promotions, actually eliminating some that you should be aware of. Below are four of the old guidelines along with the recent changes made.

Old guideline 1: Promotions on Facebook must be administered within Apps on Facebook.com, either on a Canvas Page or a Page App.

This guideline meant that if you wanted to run a promotion, you had to use an app from facebook.com, usually on your Page. Facebook dropped this rule in the summer of 2013, and now allows businesses to use third party apps (not developed by Facebook) to host a promotion on their Timeline.

Old guideline 2: You must not condition registration or entry upon the user taking any action using any Facebook features or functionality other than liking a Page, checking in to a Place, or connecting to your app.

This guideline stated that you could not have a promotion where people can enter by using Facebook features, for example liking a post or commenting on it. With the removal of this guideline, you can now encourage people to enter a promotion by liking a post or commenting on it.

You can't however ask your fans to enter a contest by sharing the promotion on their timeline.

Old guideline 3: You must not use Facebook features or functionality, such as the Like button, as a voting mechanism for a promotion.

In conjunction with the change above, Facebook had to also allow users to vote using the established features. The most common example of this is a promotion that encourages users to comment which counts as an entry. Then others vote on the comment they like by pressing Like. The comment with the most likes at the end of the promotion wins.

Old guideline 4: You must not notify winners through Facebook, such as through Facebook messages, chat, or posts on profiles (timelines) or Pages.

This has been removed and Facebook is now allowing businesses to contact promotion winners through a status update or a direct message. You can also use other methods such as direct email, an update on a blog or even another social media service like Twitter.

While Facebook has removed some of the guidelines, they didn't get rid of all of them. It would be a good idea to read their guidelines for Facebook Pages which cover not only how to use promotions but your Page properly.

If you are looking to learn more about using Facebook as a part of your marketing strategy or to represent your business, contact us today.

Published with permission from TechAdvisory.org. Source.

March 12th, 2014

Windows_Mar10_CNo one can refute the benefits to be had in using keyboard shortcuts, especially those for Windows. Not only do they help you save time, but they make it easier to navigate your system. Did you know that Windows allows you to create shortcuts to open apps that are on your desktop? This quick tip could save you time, especially if you have a high number of shortcuts and apps on your desktop.

These steps will help you create keyboard shortcuts which allow you to open apps on your Windows 7 or 8 desktop.

Windows 7

  • Right click on the desktop shortcut of the application.
  • Click Properties and a popup will appear.
  • Click the Shortcut tab.
  • Scroll to the section where it says Shortcut key. Enter a Shortcut key followed by a combination. They key combination should either be ctrl + alt + a number or a letter OR ctrl + shift + a number or a letter.
  • Click the Apply button on the lower right part of the popup box.
Once you have established the shortcut, go to your desktop and give it a try. Be sure that when you establish the shortcut you take note of the key strokes in the section. If you want to use another key aside from Ctrl, press it instead. We recommend Shift or Alt.

Windows 8

  • Go to the start menu
  • Right click and a menu at the bottom will appear. Click the Start Apps button on the lower right part of the page.
  • Right click on the app that you want to assign a keyboard shortcut to and click Open File Location from the menu at the bottom.
  • Right click the shortcut and select Properties.
  • Enter a combo key in the Shortcut Key box. They key combination should either be ctrl + alt + a number or a letter OR ctrl + shift + a number or a letter.
  • Click the Ok button to assign the shortcut.
Keyboard shortcuts used to open programs may not seem to be a big deal to some, but for business owners, knowing these simple tricks can help us focus on the more important things like growing our business.

If you have keyboard shortcuts or tricks for Windows 7 and 8 that you find very useful, please share them in the comments section below.

You can also call or email us for any inquiries, we’d be more than happy to help.

Published with permission from TechAdvisory.org. Source.

March 7th, 2014

Productivity_Mar03_CNo one can refute the positive benefits of creating a to-do list when you really need to get things done. One of the most evident advantages is that it gives people who use it the ability to increase their productivity. A problem many business owners run across is that their lists are hard to follow, leading to a decrease in productivity.

Here are 5 tips which will help you devise an effective to-do list:

Add a notes section

A notes section is a general area for all the tasks in your to-do list. Its main purpose is to provide you with space to add notes about your tasks. Or, instead you can use this area to type in challenges that you encountered when handling specific tasks.

On the flip side, it could also contain the best practices that you employed which enabled you to finish the task effectively and efficiently. These notes are important because by revisiting these jottings you can learn from them and be better able to optimize your way of doing things and your approach.

Prioritize

Ignoring client meetings because you're supposed to be fixing your cabinet, for example, based on what’s written in your to-do list, is a sure fire way of negatively impacting your business.

Your to-do list needs to be devised in such a way that there is a clear sense of priority. The most important tasks should be added to the top most part of your list just to make sure that you don’t miss these and they are tackled and completed first.

Break down your tasks to bite-size activities

Can you imagine writing down 'work' in your to-do list? Having a to-do list with broad topics like this won’t help you in the slightest bit.

You need to break down your lists into more specific tasks so that they provide the clarity that you need to achieve. Here’s a good example of a well-constructed list:

  1. Send 20 outreach emails to prospects.
  2. Discuss with the team the concept of having a systems' mindset.
  3. Review the offer of client X and decide whether to accept it or not.
Notice how the examples above are more tangible compared to simply writing down 'work'? With a list like the one above, you should be able to comfortably tick each task with a clear idea of when it has been completed.

Add a deadline whenever possible

Adding a deadline helps you gauge your output. By being able to see whether you’re lagging behind you can make any necessary changes.

A deadline also prevents you from procrastinating since you’ll be more conscious of time and a definitive end point.

Be realistic

Adding a week's worth of tasks to your daily to-do list will just discourage and frustrate you. Be as realistic as you can when writing up your list. If you honestly think that you can’t finish all of the tasks within one day, then add some of them to the next. That way you won’t be frustrated with a long list of tasks that you haven’t completed at the end of each day.

If you are faced with productivity issues and are struggling to get the kind of output you're hoping for in your business, then put giving us a call at the top of your to-do list.

Published with permission from TechAdvisory.org. Source.

Topic Productivity
March 6th, 2014

Security_May03_CAs a business owner or manager you face important security issues on a daily basis to look after business computers and systems. From malware to bugs in software, there is almost always a security issue to be dealt with and it can be an uphill battle dealing with them. But, knowledge is power and knowing about security threats can help you battle them more effectively. One of the latest threats to come to light is a bug in Apple's software that all Apple users should know about.

About the bug

News broke on many security websites mid-February about a potentially critical security flaw in Apple's systems following the company releasing an update to their mobile operating system, iOS.

The update notes released by Apple noted that the patch "provides a fix for SSL connection verification." This is a fairly common update as it is aimed at improving the security of communications between websites and the device. However, security experts found out that without the update attackers who can connect to a network are able to capture sensitive information being sent in banking sessions, email messages, and even chat messages using what's called an SSL/TSL session.

What exactly is SSL/TSL?

Secure Sockets Layer (SSL) and Transport Layer Security (TSL) are used in networks to essentially establish an encrypted link between a server and your computer. They are most commonly used to secure websites and the transmission of data. Take a look at some websites and you may see a padlock on the URL bar, or https:// in the URL. This indicates that the website is using SSL or TSL encryption to protect the data that is being transmitted e.g., your bank account information on a website.

In other words, SSL and TSL are used to ensure that information is exchanged securely over the Internet.

What was the problem and what software was affected?

It was found that there was a bug in the code Apple's software uses to establish a SSL connection which causes the whole SSL system to fail, potentially exposing data that should have been encrypted to anyone connected to the network with the right tools.

According to security experts, this bug has been found to affect devices running older versions of iOS 7, OS X 10.8 and newer, Apple TV, and possibly iOS 6. It is important to note that the bug is only found in Apple's SSL technology. Any app that uses Apple's version of SSL could be affected.

Has Apple solved this?

Luckily, Apple has released updates to all of their devices that should solve this security exploit. If you have not updated your device or computer since the middle of February you could be at risk.

How do I prevent my systems from being affected?

The first thing you should do is to update all Apple related apps and devices, including all mobile devices. If you are unsure about whether your apps are secure enough, try using another app, especially another browser. The reason for this is because browsers like Chrome and Firefox all use a different SSL technology and are unaffected by this bug.

You should also remain vigilant and not connect to any open or public Wi-Fi connections or even secured Internet connections that could be easy to break through. Basically, as long as you update you should be fine. However, it may be worthwhile using another browser if you are really worried about whether you have a secure connection.

If you are looking to learn more about this security flaw, or how you can secure your business from threats like this, contact us today. We can help.

Published with permission from TechAdvisory.org. Source.

Topic Security