Blog

September 5th, 2014

Security_Sep02_CWhat do you do when your smartphone needs to be charged but your charger is not at hand? A handy solution is to turn to a public charging kiosk. But what you might not be aware of is the fact that this can lead to juice jacking of your smartphone. To avoid this security threat, it’s time to get a comprehensive view of what juice jacking is and how you can protect your smartphone from it.

What’s juice jacking?

Regardless of the kind of smartphone you have, whether it’s an Android, iPhone or BlackBerry, there is one common feature across all phones: the power supply and the data stream pass over the same cable. This setup allows for juice jacking during the charging process whereby user access is gained on your phone by leveraging the USB data/power cable to illegitimately access your phone’s data and/or inject malicious code onto the device.
Read more.
Topic Security
September 5th, 2014

Hardware_Sep02_CBusinesses today rely heavily on technology on a daily basis. And regardless of the industry you’re involved in, an essential piece of hardware is the computer monitor, whether used at work or in the home. While computer monitors come in a variety of shapes, designs, and colors, did you know that they can also be categorized broadly into three different types based on the technology used to make them?

CRT (cathode ray tube) monitors

These monitors employ CRT technology, which was used most commonly in the manufacturing of television screens. With these monitors, a stream of intense high energy electrons is used to form images on a fluorescent screen. A cathode ray tube is basically a vacuum tube containing an electron gun at one end and a fluorescent screen at another end.
Read more.
Topic Hardware
September 4th, 2014

How-to by Andrew Zhelezko

I have five performance tips to help you make sure you’ve done everything right to optimally configure Veeam® Backup & Replication™ with Microsoft Hyper-V so they work better together!
Read more.

Topic Veeam
September 4th, 2014

BCP_Sep02_CWhile it’s important for businesses to perform risk assessments, it’s equally important to initiate a business impact analysis (BIA) in order to maximize business continuity. Why? Simply because the crux of any recovery is about whether it is achieved in a reasonable time, and BIA, if performed effectively, will determine exactly that. Knowing this, isn’t it time you for you to have a look at some tips for successful business impact analysis?

Five tips for successful business impact analysis:

  1. Treat it as a (mini) project: Define the person responsible for BIA implementation and their authority. You should also define the scope, objective, and time frame in which it should be implemented.
  2. Prepare a good questionnaire: A well structured questionnaire will save you a lot of time and will lead to more accurate results. For example: BS (British standard) 25999-1 and BS 2599902 standards will provide you with a fairly good idea about what your questionnaire should contain. Identifying impacts resulting from disruptions, determining how these vary over time, and identifying resources needed for recovery are often covered in this. It’s also good practice to use both qualitative and quantitative questions to identify impacts.
  3. Define clear criteria: If you’re planning for interviewees to answer questions by assigning values, for instance from one to five, be sure to explain exactly what each of the five marks mean. It’s not uncommon that the same event is evaluated as catastrophic by lower-level employees while top management personnel assess the same event as having a more moderate impact.
  4. Collect data through human interaction: The best way to collect data is when someone skilled in business continuity performs an interview with those responsible for critical activity. This way lots of unresolved questions are cleared up and well-balanced answers are achieved. If interviews are not feasible, do at least one workshop where all participants can ask everything that is concerning them. Avoid the shortcut of simply sending out questionnaires.
  5. Determine the recovery time objectives only after you have identified all the interdependencies: For example, through the questionnaire you might conclude that for critical activity A the maximum tolerable period of disruption is two days; however, the maximum tolerable period of disruption for critical activity B is one day and it cannot recover without the help of critical activity A. This means that the recovery time objective for A will be one day instead of two days.
More often than not, the results of BIA are unexpected and the recovery time objective is longer than it was initially thought. Still, it’s the most effective way to get you thinking and preparing for the issues that could strike your business. When you are carrying out BIA make sure you put in the effort and hours to do it right. Looking to learn more about business continuity? Contact us today.
Published with permission from TechAdvisory.org. Source.

Read more.
September 1st, 2014


Read more.

Topic Nintex
August 28th, 2014

socialmedia_Aug26_CBusinesses in many industries rely on visuals to sell their products. From that bicycle shop on the corner to the bakery down town, and even the local electronics retailer, having high quality images of your products will help attract customers. What many business owners want to know is how some businesses have such appealing images and how they can add these quality visuals on platforms such as Instagram.

The truth behind some of Instagram's best images

Those awesome Instagram photos we see aren't always taken using mobile phones. Instead, many users use digital cameras which offer much better image quality. You can capture some amazing shots with a higher end DSLR cameras with multiple lenses.
Read more.
Topic Social Media
August 28th, 2014

office365_Aug26_CChances are high that you spend a good amount of time editing or compiling Microsoft Word documents. Regardless of what you are editing, there will come a time when you are working on a file and the words are replaced as you type new ones. This could cause some problems, especially if you are unsure how to turn this feature off.

Word's two editing styles

Every version of Word used in businesses these days has the same two editing styles or modes:
  1. Insert mode: This is the default editing mode where words are inserted where the blinking cursor is placed. All text that comes to the right of the cursor will be moved to the right with newly typed text coming before it.
  2. Overtype mode: This mode replaces text to the right of the blinking cursor. So when you type new text any existing text to the immediate right will be replaced with the new letters.
While the vast majority of users prefer to use insert mode, overtype mode can be useful when editing documents and replacing words, or rewording paragraphs and keeping track of what needs to be rewritten.

Turning overtype on and off

On some older versions of Word, and on some computers, overtype mode is already enabled, and simply hitting Insert on the numberpad of your keyboard will turn it on. You will know overtype is active by looking at the status bar at the bottom of your document. The words OVR should be visible in bold letters.
Read more.
August 26th, 2014

Security_Aug18_CSince the advent of the Internet, hackers have been actively trying to exploit it. Over the past few years, many have targeted different websites to obtain user account details like usernames and passwords. There seems to be a trend where the number of accounts compromised with each new security announcement is rising. In early August, news broke that possibly the largest breach to date has been uncovered.

The latest big-scale breach

In early August, it emerged that a Russian hacker ring had amassed what is believed to be the biggest known collection of stolen account credentials. The numbers include around 1.2 billion username and password combinations, and over 500 million email addresses.
Read more.
Topic Security
August 25th, 2014

For a limited time: Save 10% and get a FREE upgrade to NEW v8

Buy before Sept. 30, 2014 and save 10% on Enterprise Plus Edition of Veeam Backup & Replication™, Veeam Backup Management Suite™ or Veeam Backup Essentials™.
Read more.

Topic Veeam
August 23rd, 2014

Productivity_Aug18_CThe world is becoming increasingly connected, especially when you look at all the different apps on your device and computer. The problem for some though is that all these apps simply aren't connected enough, and it takes time to share information across devices or services. One tool that may help, while also helping increase productivity is If This Then That (IFTTT).

What is If This Then That?

IFTTT is a Web and mobile app that was developed to connect different Web apps like Google Apps, DropBox, Facebook, Instagram, etc, together into one general system. In general, the service runs on conditional statements - or recipes - that fit the IFTTT statement.
Read more.
Topic Productivity