October 9th, 2015

Browsers_Oct8_CDid you know that you’ve been giving away personal information while browsing the web? Are you aware that social media platforms like Facebook and Twitter can track your personal information even when you’re not on their site? This is exactly why protecting your online privacy is crucial if you don’t want to risk falling victim to data breaches or attacks. To that end, let’s take a look at the best browser extensions that will allow you to browse the web with complete peace of mind.

AdBlock Plus (Chrome/Firefox/Safari)

AdBlock Plus blocks ads, scripts and popups on your browser. It kills third-party scripts and widgets that send your data to who-knows-where. Be careful you use it properly, the extension can break the sites you read, which is why you have to first figure out what to allow and what to block. AdBlock Plus also stops you from visiting known malware-hosting domains, and it allows power users to play with different subscription lists while basic users can just enable it and walk away. Best of all, it is completely free.

Disconnect (Chrome/Firefox/Safari)

Disconnect Private Browsing protects you from tracking, malware and malvertising while offering secure Wi-Fi and bandwidth optimization features. Third party tracking cookies become a thing of the past, and you can enjoy total control over all site scripts and elements from a user-friendly toolbar menu. You’re completely guarded from ads injected by malware or ad networks that are hijacked by embedded malware.

Disconnect also protects you from tracking by social networks like Facebook, Twitter and Google, which use your browsing experience even when off-site in order to collect data about you. What’s more, you’ll never have to worry about sidejacking, which is where an attacker uses stolen cookies to access your personal data without having to know your password. Available in free version and Premium, the main difference is that Premium adds mobile malware blocking and tracking to its arsenal, too.

HTTPS Everywhere (Chrome/Firefox/Opera)

One of the must-have tools for your browsing experience, HTTPS Everywhere shunts your connection to SSL whenever possible, and will try to find secure versions of the sites you visit. This protects your browsing experience and online privacy without you really having to do anything. Updates have also just been rolled out to keep you safe on thousands more sites around the web, and this extension is free for download.

Tunnelbear (Chrome)

This Virtual Private Network (VPN) encrypts all of your internet traffic, secures your browser data, and offers robust protection from prying eyes. Best of all, this won’t cost you a dime. Unfortunately, though, Tunnelbear is only available on Chrome at the moment; Safari and Firefox users will have to wait a little longer for this extension to come their way.

Web of Trust (Chrome/Firefox/Safari/IE)

Web of Trust (WOT) is a free extension that ranks sites by reputation and shows you whether a specific site has been known to host malware, or is loaded with tracking cookies and scripts that could wreak malware or adware havoc on your system.

If you’ve been browsing the web without any protection, or feel like your online privacy is at risk, talk to one of our experts and we’ll be happy to help.

Published with permission from Source.

Topic Browsers
October 7th, 2015

Security_Oct2_CNews that a potential security threat in the web-based version of WhatsApp left up to 200 million of its users with their data exposed to hackers and malware acts as a reminder to us all to be vigilant in our online interactions. While the bug affected the popular instant messaging app’s web-based version rather than the mobile app itself, and was remedied by WhatsApp after being detected by an Israeli IT firm, it’s nonetheless a worry for those of us who rely on WhatsApp for both business and pleasure. Here’s the lowdown.

The web-based version of the WhatsApp app was only launched a few months back, initially for WhatsApp accounts on Android and Windows Phone devices and later for those on iPhones, but has already grown in popularity. The recent security vulnerability related to vCards, electronic business cards shared by WhatsApp users, and effectively amounted to a kind of phishing.

An error in the WhatsApp web client meant that less-than-innocuous vCard business cards created by hackers were not properly filtered out by the app. As a result, these phishing-style cards made it through to users who, if they clicked them, were at risk of the cards converting themselves to more harmful executable scripts once downloaded - and potentially accessing and playing foul with users’ personal data. There are even reports of a ransomware approach being taken by hackers in this case, with attempts being made to extort cash from WhatsApp users in exchange for restored access to their infected devices and hijacked data.

WhatsApp put a fix in place, by releasing an updated version of the app, prior to making public news of the security vulnerability. It’s worth making sure you have the latest version of WhatsApp installed on your phone, if you haven’t checked recently - WhatsApp’s phone and web versions are linked to one another, so ensuring you are up-to-date on your phone is the way to ensure you’re safe when using the web client too. The patch is also available directly through the web client, though this won’t update your phone’s version of the app at the same time.

The whole affair also serves as a timely reminder that it pays to be vigilant when it comes to using WhatsApp and other instant messaging platforms - including email. Avoid opening links or downloading files that you’re not expecting to receive, and proceed with caution even if you were anticipating them. It’s better to double check with the sender that they’re consciously passing a file to you, and that they’re fully aware of its contents, than to wait until your device has been infected and damage has potentially been inflicted on your vital data.

Want to learn how to keep your devices safe from phishing attempts and other potential security vulnerabilities? Give us a call and let us equip you with tamperproof solutions.

Published with permission from Source.

Topic Security
October 5th, 2015

Office_Sep29_COne of the biggest buzzwords going in the IT industry these days is collaboration. But it’s more than merely a buzzword - effective collaboration among colleagues, clients and partners can mean the difference between a team that performs sluggishly and one delivering at its peak. So it’s no real wonder Microsoft has made collaboration a focal point of the recently released Office 2016. Here’s what you need to know.

Real-time collaborative editing

Office 2016 adds the collaborative feature that arguably makes its rivals as good as they are - it is now possible to co-author Office documents with colleagues in real time. Known as real-time presence, the feature works for documentations and presentations across both Word and PowerPoint. It also functions across multiple devices; an internet connection and access to Office 2016 are all that you need. In Word, you can also see others’ changes as they make them; to work in either application, though, the document must be stored on either OneDrive or SharePoint, rather than locally.

Simplified sharing

You can finally wave goodbye to the back-and-forth email tag that has been the mainstay of document sharing and collaboration for too long. You send your colleague a document by way of an email attachment, they download it and make their changes, save the file with a new name and then send it back - and so on and so forth. It’s enough to give even the most organized and tech-savvy among us a major headache. Office 2016 relieves this pain, and makes it simple to save files online with SharePoint or OneDrive, right from Office’s in-built ribbon pane.

More efficient email

Of course, for all the file-sharing features in the world, you’ll still need to email your business contacts on a regular basis. Office 2016’s Outlook makes it easy to filter out unwanted messages so that you can quickly see the emails that matter to you. Its Clutter feature learns from the way you use your email, and the way you deal with specific messages, to move to a special folder those messages that you are unlikely to need to deal with immediately. You can then navigate to the Clutter folder at your convenience in order to check through your emails to see which ones you need to take action on - daily and weekly notifications let you know what’s been decluttered on your behalf. Though Clutter won’t begin to do anything until it has a thorough understanding of your email behaviors (in order to avoid it incorrectly classifying useful messages as being of low importance), it’s of course possible to use it as another junk filter, keeping distracting messages out of view and you focused on your job.

While collaboration is at the center of the new developments built into Office 2016, the release includes plenty more besides that you’ll find useful. To discover more about Office 2016 and how to put it to use as a force for increased productivity in your business, just give us a call.

Published with permission from Source.

October 5th, 2015

BusinessIntelligence_Oct5_CBusiness intelligence (BI) tools offer valuable insights into an organization’s data and allow key decision makers to make faster and more informed strategic choices. But technology is evolving rapidly, and with it comes a new and more efficient BI practice - the self-service approach. Many organizations are now shifting towards this new form of BI, due to its advantages over the traditional system.

What is self-service business intelligence?

Self-service BI is a reporting and analytics platform that business users with limited IT knowledge and experience can use for themselves. Simply put, if an end user trying to find an answer to a business question can access, use, and generate reports without bothering the IT department or data analysts, then they’ve done self-service BI.

The end goal of self-service BI is to eliminate redundant processes where users have to request access and assistance from data analysts and technology experts. With self-service BI, users are able to gather information, analyze it, and share the reports with others, without having to know the technical protocols required to access the data.

Traditional vs. self-service

In traditional BI systems, analysts create reports based on input data, and deliver them to key decision makers. In the case where the decision makers need more detail or different data, or change their business questions, analysts have to adapt the report or create new ones.

Self-service BI is designed to eliminate this time-consuming reporting process, placing much of the responsibility for report creation on end users. It opens the door to data exploration and new possibilities. Instead of asking analysts to generate reports, end users have the ability and tools to find the answers to their own business questions whenever they want.

How self-service BI can benefit your business

Self-service BI helps improve organizations in various key areas. Here are just some of the benefits it has for your business.
  • It saves time - most likely there are far more people asking business questions than there are IT experts creating reports to answer them. By removing the dependency on data analysts and technical staff, companies are able to improve the efficiency of their analytical process and save time, as end users can find the answers to their questions themselves.
  • It eliminates mistakes - the more decisions users have to make, the less likely they are to make the right ones. Self-service BI helps ease the decision-making process by delivering nearly instant reports and visualizations that are easy to understand. Users can analyze their data from any angle and deduce answers without having to consult specialists.
  • It reduces costs - since end users are able to utilize self-service BI with little to no training, training and support costs are significantly lower than other BI solutions. What’s more, self-service BI platforms can be accessed from anywhere and at any time, without the need to install expensive hardware and servers, allowing businesses to save money.
There are plenty of benefits of adopting self-service BI. As more employees are able to analyze and explore data by themselves, decisions can be made much faster and at a far lower cost. Want to learn more about business intelligence and how you can implement it in your organization? Give us a call today.
Published with permission from Source.

September 30th, 2015

Virtualization_Sep30_CEvery IT company around wants to save you money and increase your efficiency. A lot of these solutions are pretty straightforward, but others, like virtualization, can be more complex. You’ve probably heard of the benefits of virtualization by now, but might still have concerns. Let’s separate the fact from fiction when it comes to the benefits of virtualization.

Virtualization involves the creation of a virtual version of your operating systems, servers storage devices or network resources so here's what you need to know.

All virtualization is the same

FICTION - All virtualization is not the same. In fact, you will need to discuss with your IT person the aspects of your business you want to virtualize, in order to see what works best for you. For some companies, it only makes sense to virtualize servers and nothing else. On the other hand, some businesses will want to virtualize their desktops but keep their servers on-site. There are many different scenarios, and you need to find the one that works best for your business.

You can keep your current hardware/software/applications

FACT - Just because you virtualize one or more aspects of your IT doesn’t mean you will lose access to your current hardware, software or applications. As with anything, there are a few exceptions to this, but by and large it shouldn’t be a problem.

Technology flexibility is increased

FACT - Arguably the biggest benefit of virtualization is the flexibility you will have to put up and take down new servers as demand dictates. Like most companies, your business probably has peaks and valleys throughout the year; yet with physical servers, you have your capacity set regardless of if you're using them or not.

This can create a problem for businesses, as often times they end up with a server capacity that isn’t large enough to handle the peak season, but is too much for slow periods. With virtualized servers you are able to customize your capacity throughout the year, giving you unmatched flexibility.

Managing IT is easier

FICTION - You will still need dedicated IT personnel who know what they are doing, regardless of whether you embrace virtualization or not. Like every other aspect of IT, virtualized equipment must be maintained and looked after accordingly. If not, it can fail. If you decide to go through with virtualization, managing your IT won’t necessarily be easier - just different.

Virtualization will save you money

FACT and FICTION - Virtualization can save you money depending on what aspect of your business you decide to virtualize. The greatest savings come with server virtualization, which sees pricey physical servers phased out, and the corresponding electricity costs associated with them removed as well. Of course, virtualized servers might bring more operational costs with them as the infrastructure becomes more complex.

You should perform a cost-benefit analysis before switching over to virtualized desktops. If your company just invested in new computers a year or two a go, switching them for virtual machines probably isn’t the best use of money. However, if it is time to replace your desktops anyway, then going with virtual machines as part of a wide-sweeping office virtualization might a great way to save.

At the end of the day, virtualization is complex, and its benefits will vary from company to company. The positives can be quite exceptional under the right circumstances, but it isn’t the right technology for everyone.

If you're curious to see whether virtualization can help your business, or if you are looking for other IT solutions, contact us today for assistance.

Published with permission from Source.

September 28th, 2015

164_C_SMDo you ever feel like you’re the only business owner who struggles to market their company through social media? Are you confused as to why you’re not gaining any traction? Well, you’re not alone. A recent survey reveals that many small business owners struggle gaining a return on their social media marketing efforts. Here’s how to avoid the mistakes of the majority.

Survey details

The survey was conducted by a small business directory and support network known as Manta. They surveyed 540 of their small business members with the aim of learning how much ROI these companies are gaining from social media marketing.

The results

Based on data on the 540 participants, 41% of businesses are receiving a return from social media marketing, which leaves nearly 60% with nothing to show for their investment of time and money. And as for the businesses that are gaining a return, over 80% earn less than $1,000 a month from their social media efforts. More surprisingly, close to half bring in less than $100 a month.

As a small business owner, should these numbers be cause for alarm? According to the CEO of Manta, John Swanciger, part of the reason the return is so low for most businesses is that their social media priorities are misguided. He notes that social media is less about bringing in new customers, and more about community building. "For a long time, the mantra was that social media could bring in new customers,” he says. “In reality, social media is a community builder, and your biggest fans are your already-loyal customers. When small businesses treat social media as the new word-of-mouth community, the real return will follow."

One of the oldest marketing tactics around is word-of-mouth marketing. Every day, people recommend products, restaurants and businesses they love to friends and family members. And social media is the perfect platform to cultivate your fans’ love of your brand. But according to the Manta survey, less than 8% of business owners cited building community as their primary social media goal.

So how do you build a community on social media?

Besides the obvious investments of time and money, here are a few quick tips to get you started:
  • Regularly post content that is valuable to your social media following - the keyword here being valuable.
  • Ask your followers questions to start conversations, and then engage with them. This builds a connection between your brand and customers.
  • Show your followers that you genuinely care about them, and they’ll likely do the same for you with glowing recommendations to friends and family.
Of course there is much more to it than this, but these quick tips can help you get started. If you’re struggling with your own social media efforts and would like to learn more, we’re happy to point your business in the right direction. Call us today to speak with one of our experts.
Published with permission from Source.

Topic Social Media
September 24th, 2015

164_Gcare_AWhile many small businesses mistakenly think they’re immune to data breaches because of their size, and therefore put minimum protection in place, healthcare organizations can't ever risk taking this laissez-faire approach - and they'd be in trouble if they did. After all, there are rules and regulations when it comes to healthcare IT systems, and huge fines if you don't meet certain standards. Health practices are tempting targets for hackers, who appreciate the high cost of patient treatment and the wealth of personal information stored by doctors. This is why malicious attacks are carried out on healthcare centers all the time. Two separate 2015 surveys, performed by the Ponemon Institute and the global corporation KPMG, produced some alarming statistics. Here’s what they discovered.

The 2015 KPMG Healthcare Cybersecurity survey

This survey of 223 chief healthcare executives revealed that 81 percent of healthcare organizations have been breached in the last two years. What may come as even more disturbing news is that 25% of these executives noted that their organizations were attacked anywhere from one to five times a week.

And the organizations which are aware they’re being attacked are actually the lucky ones. According to Greg Bell, KPMG’s leader of the firm’s Cyber Practice, "The experienced hackers that penetrate a vulnerable health care organization like to remain undetected as long as they can before extracting a great deal of content, similar to a blood-sucking insect." That means the longer a cyber attack goes unnoticed, the more damage it can do to your practice.

The survey also revealed the greatest threats facing today’s healthcare organizations by type, according to the respondents:

  • 65% - external attacks: cyber attacks are more sophisticated and well funded than ever. With healthcare organizations as prime targets, they are increasingly difficult to prevent.
  • 48% - sharing data with third parties: because it’s easy to distribute ePHI over the Internet and mobile devices, it’s more likely for this data to fall into the wrong hands.
  • 35% - employee breaches: an unhappy employee steals or alters your practice’s critical information.
  • 27% - insufficient firewalls: a firewall blocks viruses, worms and hackers. If yours is inadequate, it’s easier for these threats to break into and corrupt your network.

The Ponemon study

Released in early 2015, the Ponemon Institute’s Fifth Annual Benchmark Study on Privacy and Security of Healthcare Data may come as even more of a shock than KPMG’s survey. According to this study, 91% of healthcare organizations have experienced at least one data breach in the last two years, 39% have had two to five breaches, and 40% have had more than five.

So what’s the real reason for all these data breaches? The report claims that "cyber criminals recognize two critical facts of the healthcare industry: 1) healthcare organizations manage a treasure trove of financially lucrative personal information and 2) healthcare organizations do not have the resources, processes, and technologies to prevent and detect attacks and adequately protect patient data."

Although the information revealed by these two surveys is anything but positive, that doesn’t mean there’s nothing you can do. To protect your practice, there are five key steps you can take:

  1. Prevention - just as integral to data security as it is to your patients’ health
  2. Monitoring your network - so you know when and if your organization is under attack
  3. Management - of passwords, applications, and staff policies
  4. Compliance - it's your legal duty to be compliant with all rules and regulations in the industry, such as HIPAA
  5. Penetration testing - find the holes in your security that a hacker could exploit, and close them
These are just the basics of what you should be doing if you run any sort of healthcare center. Protecting the data of your patients, both personal and financial, is of paramount importance; failure to do so will result in fines or, worse still, the loss of your reputation. ISN Global has years of experience in designing, deploying and maintaining IT services and solutions tailored for the healthcare industry. To learn more about how you can protect the data of your healthcare practice, get in touch with us today.
Published with permission from Source.

September 23rd, 2015

AndroidTablet_Sep22_CBuying a top-of-the-range tablet for personal use can be expensive enough - it’s likely to set you back a good few hundred dollars. So imagine the cost of kitting out your entire team of staff with new tablets; it’s what holds back plenty of businesses from doing just that, despite the obvious benefits to efficiency and productivity from employees who can work flexibly and remotely. But Amazon’s new $50 Android tablet could be about to change it all.

The seven-inch Amazon Fire tablet is due to launch on September 30, meaning it will be available just in time for the holiday season - great for individuals looking to treat themselves or loved ones, but also good news for businesses looking to use technology to increase efficiency ahead of the busy peak period.

Given the tablet’s budget positioning - with likenesses to Google’s stripped-back Chromebook, which performs basic functions but is of only limited use without an internet connection - it’s not surprising that it isn’t as powerful as more popular options. While its software is based on Android, the device actually runs on Amazon’s Fire OS 5 Bellini operating system. That means it does not support the Google Play apps used on the vast majority of Android tablets - which will be a drawback for some users - but it does work with the Amazon app store. Other key specs include a 1,024x600 pixel display, a 1.3Ghz quad-core processor, 1GB of RAM, and 8GB of internal storage that can be increased further by using a microSD card. According to Amazon, the Fire supports seven hours of battery life during moderate usage.

Perhaps most interesting, though, is the fact that the Fire comes with built-in advertising-based screensavers displaying Amazon promotions; a small additional payment is required to switch these off. Again, it’s hardly a shock to hear that there’s a semi-catch of this kind when the tablet itself only costs $50. It might also represent a shift in the market positioning of tablet devices, with more focus on business models similar to those of no-frills budget airlines and hotels, where extra payments are required for meals, seat selection, windows, towel rental and so on.

Either way, the Amazon Fire could be the way into tablet use for companies that need their employees to have the ability to work remotely and flexibly, but which don’t require the more intensive capabilities of pricier higher-end devices. To learn more about adapting mobile technology in your business in order to boost efficiency and productivity, give us a call.

Published with permission from Source.

September 23rd, 2015

WindowsPhone_Sep23_CBrace yourselves, Windows Phone fans - Microsoft is about to launch the latest Lumia 950 smartphone at its annual event this coming October 6th. For the best part of 2015, Microsoft has directed its focus on the affordable segment of the smartphone market. But not for much longer - this new Lumia 950 release is expected to possess powerful hardware and specs, as well as a premium all-metal design.

Microsoft has been working hard on developing the Lumia 950, the first smartphone to utilize its Windows 10 Mobile operating system. The rumors about the Microsoft Lumia 950, codenamed “Talkman”, have been around for a good while now. Here’s what you need to know about the tech giant’s latest smartphone product.

Design and display

Rumor has it that the latest Lumia 950 will come with a metal frame, coated with matte white or black polycarbonate, with a thickness of just 8.89mm thickness. The device will sport a 5.2-inch screen display, with a Quad HD resolution of 2,560 x 1,440 pixels.


The Lumia 950 is going to boast a 64-bit Hexa core, most likely the Qualcomm Snapdragon 808 processor, as well as 3GB of RAM and an internal storage capacity of 32GB. Users have the option of expanding the memory with a microSD card.


Microsoft will integrate a powerful 20-megapixel PureView primary rear camera, capable of shooting high-definition video, and a 5-megapixel front-facing camera. Additional features include optical image stabilization, autofocus, and social media geotagging.


It is said that Microsoft’s new Lumia 950 will incorporate Qualcomm’s Quick Charge 2.0 technology, allowing for faster battery charging (up to 60% within just 30 minutes). The Lumia 950 will be equipped with a detachable 3,000mAh battery, so you can expect it to last for a full day, even with heavy use.

Price and release date

Although Microsoft hasn’t yet revealed the exact price or a release date for the upcoming Lumia 950, the price point is expected to rival that of the iPhone 6s. The release date is most likely to be on October 10, the very same day Microsoft plans to launch its brand new operating system for smartphones, Windows 10 Mobile.

Overall, the Lumia 950 comes with plenty of improvements that Windows Phone fans will love. It is faster, lasts longer, and is more stable. Want to learn more about Windows Phone and how to use it in your office? Get in touch today.

Published with permission from Source.

September 21st, 2015

Business_Continuity_Sep21_CDisasters can come in all shapes and sizes. No matter what happens, your business can be prepared by creating a Business Continuity Plan (BCP). It’s important for your BCP to address the roles of your staff members, so that they are able to assist in keeping the company running during these stressful occasions. Make sure your employees are always prepared by following these steps.

Step 1 - Prepare

What good is a BCP if your employees don’t understand or even know about it? Saving your data and information is important during times of emergency, but so is making sure your employees can execute their day-to-day functions. Guarantee they understand what is expected from them during a disaster by explaining this in a dedicated meeting. This will also provide a forum for your staff to ask questions and better understand how they fit into the BCP as a whole.

Among the most important things to include in the formulation of any planning are clearly defined roles and open lines of communication. Everyone should know who they report to, as well as who his or her backup is. This will help ensure your company has all its bases covered if a disaster should strike.

Step 2 - Give them the right tools

You can’t expect employees to work from home during a disaster if they do not have the proper tools to succeed. Of course, these also have to be cost effective as well; it’s not feasible to simply hand out workstations to everyone to store at home in case of emergency. For starters, investing in cloud-based solutions will help make it possible to keep service interruptions to a minimum. Microsoft Office 365, for instance, lets users access its programs and files from anywhere and on any device. This means that, if your office is no longer accessible, staff can keep working on their existing projects at home from their own device.

Cloud-based VoIP is another tool that can keep employees up and running from home. These systems can make sure all calls to your office are forwarded to your employees’ cell phones. This allows for communication between your clients and employees to continue uninterrupted even if your office is closed.

Step 3 - Practice

Have each employee take a day to work from home so they are able to get hang of how the process will go if a disaster strikes. This will get them comfortable with the workings of everything, as well as seeing if there are any issues that crop up. Rarely, if ever, does anything go perfectly on the first attempt, so practicing before a disaster can help eliminate any problems that might occur during the real thing.

Make sure you take the time to review how it went with each employee. This will give you an opportunity to see how practical this aspect of your BCP is, and which areas can be made stronger. The idea of the exercise is to allow each employee to feel confident in his or her ability to work during a disaster, and to give you the reassurance that they understand their role as it relates to the wider BCP.

Step 4 - Be alert

Finally, it’s important to keep an eye on possible events that could force you to shut down your office, and make sure your staff is also aware of the situation. The more time they have to prepare to work from home, the more ready they will be. Of course, not every event is possible to predict ahead of time, but if the a blizzard is forecast or there have been protests nearby, alert your staff of the possibility that your BCP may go into effect.

A comprehensive Business Continuity Plan can be the difference between your business surviving or failing if a disaster occurs. Let our experts find a BCP that ensures your company can carry on through thick and thin.

Published with permission from Source.