-- particles

Google Releases New Business Extensions for Gmail Users

Google has just released a handful of new extensions for their Gmail client aimed to help aid professionals that use Gmail for their day-to-day business. Here?s a brief look into the new extensions, and what they can do to help rev up your productivity. Asana ? Allows you to turn important emails into tasks and assign specific responsibilities and track them directly through Gmail. With Asana you can create tasks, assign team members to the task, set due dates, and include attachments. Any updates will be synced automatically without having to leave the mailbox. Dialpad ? A business communication tool that allows you to call or text directly from Gmail. You can use these features on a variety of devices, and even switch a call from desktop to mobile if you?re on the go. You can also view history, or save contacts directly from a Gmail message. DocuSign (Coming Soon) – Allows you to sign and execute any business documents, such as contracts or agreements. Hire ? A recruitment tool that allows you to distribute job opportunities, find the right candidates, and manage the interview process from the Gmail client. It integrates with many of the other Google solutions, including Google Search, Calendar, Docs, Sheets, and Hangouts. QuickBooks Invoicing ? Enables you to send Quickbook invoices directly into a GMail message, allowing your clients to pay online with credit cards or bank transfers. ProsperWorks ? A CRM tool focused on design, usability, and automation that lets users use Gmail as the core of their workflow. The Add-on allows users to view contact and activities directly on your email, and works on a variety of different platforms. RingCentral ? This extension chooses contextual information within a user?s Gmail threads. It also allows you to see the online/offline status of contacts, review call history, make calls, and send SMS messages. Smartsheet ? Helps users keep track of important emails and add attachments to new or existing rows in Smartsheet. Streak ? Another CRM tool that lets you run the entire sales process through your email. It is flexible enough to aid with sales, recruiting, customer support, project management and even fundraising. Trello ? A list-making tool that can turn emails into to-do?s automatically. This can be used for tracking sales leads, managing customer feedback, event planning, and more. Wrike ? A project management extension that allows you to write, view, and edit tasks. You can also write and receive Wrike comments directly from you Gmail account.

Virtualization

The age-old proverb ?There?s more than one way to skin a cat? is especially relevant when budgeting for IT services. With the right technology consulting and support, any business can afford customized solutions that employ creative methods to achieve its end goals. As just one example, let?s review all the ways you can use virtualization technology! What is the core concept of virtualization? By virtualizing any of the items below, you can trick software into recognizing hardware when none actually exists. The easiest way to explain this is with examples from the most common type of this technology: hardware virtualization. If you had one high-powered computer processor, virtualization would allow you to split it up and run four separate operating systems (Windows, Apple OS, etc.), each seemingly running on a standalone, low-powered processor. Conversely, virtualization could also be used to connect four high-powered processors to create what your operating system would recognize as one ultra-fast piece of hardware. This technology can be applied in a number of ways to create opportunities for more efficient resource utilization and cost savings. Desktop virtualization Sometimes referred to as cloud desktops, this form of virtualization grants you access to a fully functioning computer that you access via a local network or the internet. Somewhere, a server has allocated a portion of its hardware resources for your virtual desktop. With a keyboard, monitor, mouse, and extremely low-end computer, you can connect to this virtual desktop and utilize all the processing power and storage the server has set aside for it. Application virtualization By installing a program on a server hard drive, your employee workstations can use their computing resources to run the program, but restrict data from being stored on their hard drives. The program and the documents it creates will never leave the server hard drive, making it much harder for hackers to compromise them. With more advanced virtualization solutions, your server can also allocate the computing resources necessary to run the program, meaning your workstations are merely a window to your server. Storage virtualization Similar to hardware virtualization, this strategy makes it easy to organize how your data is stored. In addition to combining hard drives across several computers into a massive virtual drive, storage virtualization also stores data based on how important it is. Frequently used documents are saved to your fastest drives and can be automatically backed up to the cloud. Network virtualization If your office has more than 10 workstations, it makes sense to consider network virtualization, which allows you to separate vulnerable devices. For example, if you had one server that handles a lot of web traffic and another that stored sensitive documents, you might want to connect them to different networks to avoid a cross contamination. Network virtualization would allow you to do that without buying any new hardware! Even with our simplified explanations, virtualization is still a complicated subject. Rather than try to figure it out in a few hundred words, give us a call and we?ll show you in person!

Three Tips to Help Keep Your Data Safe on the Internet

The public internet is vast, with over one billion websites already established, and more and more created every day. While being connected to the internet has its undeniable benefits, there is also a constant threat that puts our sensitive information at risk: hackers. These cyber criminals will do anything they can to try and steal your personal information, and once they have it, it can be difficult to recover. Luckily, there are a few simple methods every internet user can utilize to keep themselves safe from a hack attack. Enable Two-Factor Authentication Where Available Many popular sites such as Facebook, Twitter, and Ebay are now embracing an extra layer of login security with their two-factor authentication methods. This process is activated when you try to login to your account using a device that isn?t recognized by the site. In order to confirm your identity, the user will get sent an authentication code through a verified contact point such as email or text message. This ensures that no un-recognized source can access your information unless they also had access to your second form of contact. Secure a Site Using HTTPs These days we don?t often type out the full website address we are looking for, as most browsers will automatically fill in the correct address or send you to a search engine to point you in the right direction. However, there is a hidden benefit to typing out an address, and it can be as easy as adding a single letter. When adding a ?s? to the end of http (hypertext transfer protocol,) the browser will encrypt any and all information sent between the server and the user. While many modern browsers add the ?s? to a site?s address on their own, you can ensure that you?ll always have a secure connection by downloading apps or programs that will automatically make the switch for you. Keep Browsers and Devices Updated Typically, updates are direct responses to issues or vulnerabilities that have been discovered on your program or device. Therefore, it is critically important that you always run trusted updates as quickly as possible. Outdated versions of browsers or mobile operating systems are often an easy entry-point for hackers, allowing them to exploit the known security holes. If you?re not sure whether or not you?re completely updated, many browsers and operating systems have a service that will automatically update as soon as new versions are released. Worried about the safety of your sensitive data being sent over the public internet? Contact Info Advantage today at (585) 254-8710 to speak to a security professional about how you can strengthen your network security!

4 Rules Every Remote-Worker Should Follow

With today?s great technology solutions, working remotely is no longer just a dream. Many businesses have either a partial or a complete remote staff, and it?s all held together by modern technology solutions. However, even with the latest tech, the remote worker still has to invest in their own success. If you work remotely, here are four ways that you can maximize your productivity and keep yourself from getting in the way of your best work. Have a Dedicated OfficeYou might have your own cubicle or office space at your workplace, but when you work remotely, you often have to get creative. You could turn a booth at a restaurant into a workspace, or your living room sofa into your office. However, this is often counterproductive and distracting. Instead of hoping to get work done away from your desk, you should arrange to have a dedicated home office with lots of space and privacy. This should be the place where you go to get good, solid work done; where all of your files and technology solutions are located. Also, it helps to avoid working in busy public places whenever possible, like coffee shops and restaurants. Set Specific Rules for Your Family and VisitorsIf you?re going to work remotely, this will often mean setting up a home office where you can go to get your best work done. If you have a family that?s always at home, it can be distracting. You need to set clear boundaries so that they know when it?s a good time to drop by your office. Furthermore, it?s a good idea to limit what you should be doing during the workday. It?s one thing to take a short break to handle some minor chores, but another entirely to get distracted by multiple large tasks. Working remotely is a privilege, and as such, you need to stay productive in order to retain this flexibility. Keep Working Until the End of Your ShiftWhen you work remotely, you might have the impression that taking an early-out might not be a big issue. However, this can be a slippery slope; one day you?ll start taking more and more time off of the end of the day, and before you know it, your work performance will suffer and you won?t have anyone to blame but yourself. Plus, if you continuously abuse this privilege, you might ruin the opportunity to work remotely for the rest of your coworkers. Use the Right Technology SolutionsRemote workers are only as effective as the tools that they use to get work done. This is why businesses often have to implement proper technology solutions, like virtual private networks and Voice over Internet Protocol communications, to ensure maximum protection for their investments and productivity for their employees. If your organization could use a tech revamp to accommodate remote workers, Info Advantage can help. For more information about how to keep your remote workers productive, contact us at (585) 254-8710.

ShadowBrokers: The Group Behind WannaCry

The WannaCry ransomware attack was created by hacking amatures who copied from a famous hacker group known as the shadow brokers. While WannaCry is no longer a threat with the latest security update, a recent announcment shows that the hacker group is going to continue to release dangerous security exploits for anyone to use, at the right price. Who are the ShadowBrokers? There are a few theories about who makes up the membership of the ShadowBrokers group. These theories range from official National Security Agency employees to Russian spies. However, all these theories are based on unreliable information, so not much is actually known about the group. The only thing known for certain is that the ShadowBrokers use social media to sell cybersecurity secrets to amatures. What do they sell? The ShadowBrokers? first started to auction off security secrets in August of 2016. They promised the highest bidder would receive cycbersecurity vulnerabilities that work just as well as government cyber weapons. Over the next year, the ShadowBrokers used a variety of different means to sell their secrets: auctions, crowdfunding, and direct sales. In April of 2017, their fifth release of information went public, which included the ETERNALBLUE Windows vulnerability that allowed WannaCry to infect over 300,000 computers in a single day. The Latest Release The ShadowBrokers have recently announced a subscription service that would include access to bi-monthly security exploit releases in early September 2017. The first package they sold included an NSA exploit titled UNITEDRAKE, which allows hackers to remotely monitor or control a computer running any Microsoft OS between Windows XP and Windows 8.The exploit can also discreetly record audio from your microphone, video from your webcam and anything that is typed on the keyboard. It can also remotely remove itself from the target computer, leaving no signs of a breach. How to protect yourself from ShadowBrokers releases Luckily, all the security exploits that the ShadowBrokers have released targeted older, outdated versions of software.The best way to protect your computers is make sure your operating system is properly upgraded and patched. Advanced network monitoring can detect suspicious activity, but that requires a significant amount of time and IT knowledge, making it difficult for small- to medium-sized businesses who usually don?t have the resources to handle around-the-clock maintenance. This is where Info Advantage can help. If you are worried about the ShadowBrokers releases, or have any other cyber security concerns, contact Info Advantage today at (585) 254-8710 today to learn more about how we can help keep your network safe.