Blog

July 29th, 2015

Web_Jul29_BRelying on the power of WhatsApp to hold the fabric of your life together? If you’re a regular user of the messaging app and can’t quite bring yourself to imagine carrying on without all the valuable messages that live inside it, you’ll breathe a sigh of relief when you learn about WhatsApp’s new integration with Google Drive. Added in April, it allows you to backup your messages and more, so that you’re covered come what may. Here are the facts.

The introduction of Google Drive as a backup option within the app will prove a relief in the event that you need to reinstall your existing WhatsApp account - either on your existing phone or a new one. Once activated, a backup takes place at 4am at the frequency selected in your app’s settings; it’s also possible to manually force a backup at the time of your choosing.

WhatsApp makes its backups locally before moving the data across to Google Drive. Each backup is incremental, meaning that the first one WhatsApp makes will be of all your account’s data - including messages and photos but not, for the time being at least, videos - and will subsequently update that backup with any new files and changes to existing data. This is presumably intended to keep the size of each backup transfer to a minimum; though you should still anticipate that first attempt taking quite some time, and chugging through a lot of data if you’re doing it over your cellular connection rather than wi-fi.

Once the data is safely within your Google Drive account, it’s hidden and only accessible from within WhatsApp, in order to populate a new account. In the event that you need to use it, after logging into WhatsApp with your phone number the app will search for backups both locally and on Google Drive. Assuming it finds something, it will then give you the opportunity to transfer it back across.

Google Drive integration has been available since the release of WhatsApp version 2.12.45 for Android, which debuted in April. The feature isn’t yet available on Apple devices, however. It’s simple to enable - just follow these steps:

Enter the app’s Settings menu. Select Chat Settings. Select Chat Backup. The screen will display your last backup time and a selection of grayed-out Google Drive settings. Adjust the frequency from Off to the option of your choice. Select the Google account you’d like to use, and whether to use your wi-fi connection alone to conduct the backups, or combined with cellular data.

Want to learn how to implement messaging services like WhatsApp in your business, as well as how to protect your organization’s data? Give us a call to find out more.

Published with permission from TechAdvisory.org. Source.

Topic Web
July 27th, 2015

AndroidPhone_Jul27_BAndroid phone users can expect a new OS coming soon with Google’s announcement at this year’s Google I/O, its annual software developer conference. While they did not announce which dessert it will be named after yet, the Android M as they are calling it at the moment comes with many improvements worth mentioning. To that end, let’s take a look at the new features you can expect to see in the next Android OS.

Custom Chrome Tabs

If you’re annoyed by having to switch to the Chrome browser while you’re in a particular app, you’ll be glad that those days are over. Android M delivers a better web experience with Chrome Custom Tabs that allow you to include Chrome web view within an app making it easy to multitask. The Chrome browser will run atop your app in case you click on any link within the app, and features automatic sign-in, saved passwords and autofill.

Android Pay

Android Pay is Google’s new mobile payments system designed to make the checkout process easier and faster. Set to be available at 700,000 stores across the United States, Android Pay will work at any payment terminal equipped with NFC. Using it is simple; just unlock your phone and place it in front of an NFC-compatible POS terminal.

Fingerprint Support

Google aims to standardize support for fingerprint scanners on all phones running on Android M. This new function will allow fingerprint scanners to be used to unlock phones as well as for making purchases using Android Pay.

Google Now on Tap

With Android M, Google Now will become smarter than ever before. You’ll be able to get contextual information on anything you have running on your phone’s screen. For instance, if you’re watching a video on YouTube, holding down the home button will provide you with more information about someone in that video.

Doze Mode

This feature uses your device’s motion sensors, be it your phone or tablet, to detect when a device has no activity for a period of time, and to then automatically shut down certain processes in order to help save battery life. While in the Doze state, the system can still be activated by alarms and high-priority notifications. According to Google, Doze helped increase the standby time on the Nexus 9 by almost double when compared to the Android 5.0 Lollipop.

App Permissions

Currently, you have to accept all permissions when you install an app, which could lead to a security breach. With Android M, you can decide which permissions you want to allow or revoke, based on when those particular functions are used. For example, you can give WhatsApp access to your camera but not your microphone.

App Links

With Android M, it will be easier than ever to link from one app to another without having to land on a web page in-between. How? A special verification method ensures that app-specific links go to the right place; for instance, clicking a Facebook link in an email will take you directly to the Facebook app instead of a redirected Facebook web page that you’ll likely have to sign in to.

Direct Share

This new feature lets you share content with your most frequent contacts or apps with a single click. Android M will learn which app you share content with the most and place it at the top of a list, as well as letting you also share content with the people you contact more often. Everything will be placed directly in the share sheet for your convenience.

Simplified Volume Control

This new simplified volume control will let you independently change ringtones, media or alarm volume directly from the volume rocker instead of having to go into different settings.

Auto App Backups

Accidentally deleted an app? Not to worry; auto app backups allow you to download it again and set it up like it was before. For now, Google is limiting the backup size to 25MB per app, though this space is not counted towards the free 15GB storage space offered in Google Drive.

Android M is expected to be released later this year but you can download the Developer Preview here now if you have a Nexus 5, Nexus 6, Nexus 9 or Nexus Player. Interested in learning more about how an Android Phone could benefit you? Just give us a call; we’re sure we can help.

Published with permission from TechAdvisory.org. Source.

July 24th, 2015

164_iPhone_BIt’s Friday night, and you’re getting ready to go out for the evening. You’ve got your wallet, keys, and extra cash - you’re good to go. You quickly glance at your iPhone to check the time, and that’s when you notice the problem all iOS users dread. You have 20% battery! While you do have access to the power supply in your car for the next 15 minutes or so, after that you’re on your own. So what can you do to get the most out of your charge in a limited amount of time? Here are four steps below that can help.

Put your iPhone in Airplane mode

The key ingredient to supercharging your iPhone in the shortest amount of time is to switch it to Airplane mode. By doing this, you essentially shut your phone off from the outside world so it’s unable to receive calls, texts, push notifications or other information. Additionally, your iPhone will be unable to search for a wireless network or better signal while in this mode. And because it’s not wasting power with any of these processes, that electricity is instead directed to your iPhone’s battery which in turn allows it to charge faster.

Take off your iPhone case

Funny as it may sound, your iPhone case may actually be slowing down the speed of your battery charge. Apple’s consumer website notes that their products don’t do well in the heat. And when it comes to iPhone, certain cases can create excess heat - which can have an effect on your battery capacity. What does this mean for you? If you have a case on your iPhone, take it off when you’re charging it.

Use an iPad adaptor

An iPad adaptor, which is about twice the size of the small adaptor that’s included with your iPhone, reportedly charges an iPhone 40% faster than its native counterpart. Therefore, if you have an iPad charger, use it.

Turn off your display, and don’t use your iPhone

As already mentioned with Airplane mode, the more your iPhone is in use the less power it will have leftover to store in your battery. While Airplane mode prevents outside forces from sucking up power, you too can also not use your phone during this time to maximize the rate at which the battery charges. To do this, make sure you turn off your display, and then simply set your iPhone aside and leave it alone.

Want more tips to get the most out of your iPhone? Curious to learn about the latest iPhone news and updates? Get in touch now.

Published with permission from TechAdvisory.org. Source.

Topic iPhone
July 24th, 2015

164_B_MacThis autumn, Apple will release their new operating system currently known as El Capitan. And if the mere thought of waiting months to get your hands on it leaves you with a sinking feeling in your stomach, Apple has released a beta version for those interested in testing it out now. To do so, simply head to Apple’s website and sign up for the Apple Beta Software Program. However, for those who’d rather learn a bit more about El Capitan’s features first, here are four that people are getting excited about.

Find your cursor more easily

While not the most difficult of problems computer users face, many of us have all probably ran into the situation where we lose the cursor and have to carefully scan the screen and wiggle the mouse to find it. El Capitan resolves this minor annoyance in a fun way. Now if you lose your cursor, you can wiggle your finger on the trackpad and the cursor will blow up to a larger size which makes it easier to spot instantly.

Better Spotlight feature

El Capitan’s new version of Spotlight now allows you to search news and information from the Internet. For example, you can use it to find the weather forecast, sports scores, stock market information and even videos from Vimeo and YouTube.

Another useful feature of the updated Spotlight is the ability to use natural language to find files on your Mac. That means you can search for locally stored files with phrases such as “video I edited last week”, which will then bring up results for any videos you edited in that time period.

Run apps side by side in a split screen

Deciding how to best handle multiple windows on your display can be a daily annoyance. If you have too many open, your screen can become a disorganized mess that leaves you less productive and perhaps even with a headache. Split view aims to bring order to your display by allowing you to go full screen with a pair of apps running side by side. Similar to the Windows 8 split-screen app, you can also resize each window to your liking.

More functional Notes app

With El Capitan, the Notes application has also gotten a makeover and now allows you to add a variety of types of content. For instance, you can drop in videos, pictures, PDFs and other file types directly into the application. Even better, you can sync Safari with Notes. This means that with a simple click of your trackpad, you can send content from a web page directly to the app.

Last but not least, Notes now gives users the ability to create checklists easily. With a single click, you can turn a bulleted list into an interactive checklist. So whether you’re looking to create a to-do list, grocery list or wish list, Notes has you covered.

While it’s worth noting that none of these new features are revolutionary, these small improvements will come as a welcome upgrade of Yosemite for many Mac users.

Want more of the latest Mac news? Need to service your Apple IT? Feel free to give us a call today.

Published with permission from TechAdvisory.org. Source.

Topic Apple Mac OS
July 22nd, 2015

164_Sec_BSince many of us out there have been using the internet for decades, it’s likely that most of us have had our systems infected by malware at one point or another. But how many of us actually know what the differences are between malware, viruses, trojans, and other online threats? For those without a clue, here’s a description of four of the most common ones and the security measures you can take to keep your business protected.

Malware

Malware is the short version of the word malicious software. And this is a general term that encompasses many types of online threats including spyware, viruses, worms, trojans, adware, ransomware and more. Though you likely already know this, the purpose of malware is to specifically infect and harm your computer and potentially steal your information.

But how do the different types of malware differ from one another? How can you protect your business from them? Let’s take a look at four of the most common forms of malware below.

Virus - like a virus that can infect a person, a computer virus is a contagious piece of code that infects software and then spreads from file to file on a system. When infected software or files are shared between computers, the virus then spreads to the new host.

The best way to protect yourself from viruses is with a reliable antivirus program that is kept updated. Additionally, you should be wary of any executable files you receive because viruses often come packaged in this form. For example, if you’re sent a video file, be aware that if the name includes an “exe” extension like .mov.exe, you’re almost certainly dealing with a virus.

Spyware - just like a spy, a hacker uses spyware to track your internet activities and steal your information without you being aware of it. What kind of information is likely to be stolen by Spyware? Credit card numbers and passwords are two common targets.

And if stealing your information isn’t bad enough, Spyware is also known to cause PC slowdown, especially when there is more than one program running on your system - which is usually the case with a system that’s infected.

A common mistake many people make is they assume their antivirus software automatically protects them from Spyware. This is not always true as some antivirus isn’t designed to catch spyware. If you’re unsure if your antivirus prevents Spyware, get verification from your vendor. And for those that are already suffering from Spyware infestation, two programs that work wonders to clean it out are Malwarebytes and SuperAntiSpyware.

Worms - similar to viruses, worms also replicate themselves and spread when they infect a computer. The difference, however, between a worm and a virus is that a worm doesn’t require the help of a human or host program to spread. Instead, they self-replicate and spread across networks without the guidance of a hacker or a file/program to latch onto.

In addition to a reliable antivirus software, to prevent worms from infecting your system you should ensure your firewall is activated and working properly.

Trojan - like the trojan horse from ancient greek mythology, this type of malware is disguised as a safe program designed to fool users, so that they unwittingly install it on their own system, and later are sabotaged by it. Generally, the hacker uses a trojan to steal both financial and personal information. It can do this by creating a “backdoor” to your computer that allows the hacker to remotely control it.

Similar to the other malware mentioned above, antivirus software is a dependable way to protect yourself against trojans. For further safety, it’s wise to not open up suspicious attachments, and also ensure that your staff members aren't downloading any programs or applications illegally at the office - as this is a favorite place hackers like to hide trojans.

Curious to learn about other common malware that can cause trouble for business owners? Want to upgrade your existing network security system? Give us a call today, we’re sure we can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
July 17th, 2015

iPad_Jul17_BApple holds their Worldwide Developers Conference (WWDC) each year to introduce their new products and platforms. This year, the tech giant has announced the arrival of the latest iOS version, which contains several application additions and revamps, as well as changes to design and interface. The new iOS 9 is coming soon to all Apple mobile devices, and iPad users seem to benefit most from this release - here’s what you need to know.

Design changes

There’s a minor change in the typography, where Apple has replaced the ‘Helvetica Neue’ system font with a font called ‘San Francisco’. Apple also deploys its typography in a clearer way, with more space around the lettering. Although these are subtle changes, the new font should be easier to read as well as remaining easy on the eye.

Interface changes

Following complaints from users, Apple has made a small modification to its ambiguous Shift key system. The former version is hard to use, since only a change in the Shift key’s color indicated the letter’s case change - when it’s on, it looks off and when it’s off, it looks on. When you press the new Shift key, however, all the letters on the screen will change to uppercase. This will put an end to the frustration at having to delete letters because you mistakenly type an uppercase letter instead of a lowercase one, and vice versa.

The new features

Apple has revealed a number of new features in the WWDC, and has released a public beta of iOS 9 for developers to test drive its capabilities. Here are some of the new features that Apple users can benefit from.
  • Split View - This long-awaited feature is exclusively available on iPads. iOS 9 finally allows two applications to coexist on one display, making multitasking possible. You can activate Split View simply by swiping inwards from the right hand side, and you’ll be offered a range of apps that can run in the activated sidebar. You can have your email stay on the side while you browse for information in Safari, or catch up on the latest news. The possibilities are endless!
  • Picture in Picture - While using a live video chat or watching a video, you can press the Home button to activate this feature and scale down your video screen to a corner of your display. You can now chat with your friends or watch your favorite shows while you reply to emails. What’s more, you can move the video screen to wherever you prefer with a swipe, adjust the size by pinching, and close the screen by tapping the close button.
  • On-screen Trackpad - The default keyboard that pops up when you type on-screen is now equipped with an extra function. Now you can hold two fingers down on the keyboard to turn it into a trackpad, which allows you to easily navigate through the text without having to tap the exact spot on the screen. This makes document navigation much faster, especially when writing or replying to emails.
  • News app - This fresh addition will draw news stories from various sources that you can choose, from Daily Mail to Bloomberg Business, CNN, The New York Times, and more. The News app is intelligent; it is able to learn about your interests based on what you are reading, and will show you articles from sources you didn’t select if they match your interests. So basically, the more you read, the more personalized your news becomes.

When will it be available?

For Apple fans, and especially iPad users, the new features alone in iOS 9 are worth waiting for. The first public beta testing version of iOS 9 is available now, and Apple will most likely release the final version of the software in September 2015.

With the new iOS 9 release, iPad business users can be more productive than ever. Want to learn how to best implement the iPad in your business? Get in touch today.

Published with permission from TechAdvisory.org. Source.

Topic iPad
July 16th, 2015

164_B_O365Microsoft recently announced its plans to phase out their current Office 365 E4 suite and replace it with a new, premium package known as E5. While a release date has yet to be specified, Microsoft has stated that they intend to make the product available by the end of this year. What does this mean for current E4 users and those thinking about signing up for an Office 365 package? Well, get the full scoop below.

What’s included in E5?

According to Microsoft’s Office Blogs July 13th post, the tech giant announced that the E5 plan will include the following new capabilities:
  • Skype for Business services with support for features including Cloud PBX and PSTN Conferencing
  • Analytic features such as Delve Organizational Analytics and Power BI Pro
  • Advanced security features like Customer Lockbox, eDiscovery, Advanced Threat Protection and Data Loss Protection
With these new service offerings, Microsoft believes that business owners will be able to reach new customers and increase value for their existing ones.

The cost?

While Microsoft’s Office 365 current E4 package costs $22 a month in the US, there was no official announcement of the price for the E5 version.

However, since E5 will include services such as Advanced Threat Protection, which currently costs an additional $2 per user/month, as well as Power BI Pro, which is priced at $9.99 per user/month, a price increase seems inevitable - and very well could be significant.

Your options

Because E4 will be retired when E5 is released, that means that current E4 users will have to either upgrade to E5, or change to E3 plus Cloud PBX.

For those who have yet to sign up for Office 365, however, you’ll also have the additional options to choose an E1 or E3 package with available upgrades.

Is it worth it to upgrade to E5?

That all depends on your business, and likely the price of the upgrade. However, the question you need to ask is, “will the new capabilities enhance your organization enough to justify the higher cost? If you need additional help understanding how E5’s new features and capabilities can create value in your business, we’re happy to assist you.

Curious to learn more about the Office 365 E5 package? Get your questions answered, and give us a call today.

Published with permission from TechAdvisory.org. Source.

July 10th, 2015

Facebook_Jul10_BFacebook has grown rapidly in the past decade, and now boasts over one billion monthly active users. These users are constantly liking, sharing, commenting, and posting on the platform. Many businesses see this as an opportunity to grow their customer base, and so implemented Facebook advertising into their marketing strategies. While Facebook marketing is on the rise among businesses, there are a few things you need to watch out for. Here’s a list of the most common Facebook marketing mistakes you should avoid.

Mistake #1: Treating Facebook like a one-way communication tool

The content you post on Facebook should encourage followers to express their thoughts. Think of it this way - Facebook is a social media network, which means that people use it to connect with friends and communicate with family members. They don’t want to be showered with advertising messages! Instead of speaking at customers, create dialogues that promote engagement and feedback. Try asking probing questions, sharing fun quizzes, or posting images and videos that get your followers talking. Remember that engaging content has a better chance of going viral and attracting more followers to your profile.

Mistake #2: Ignoring follower metrics

There’s no telling whether your content is going to appeal to your followers or not. All audiences are different, and the only way to find out what’s going to work for them is to head over to Facebook Insights in your admin panel. Take a look at the metrics there to determine if your posts are resonating with your readers. Some of the best insights include your top posts, where you can find the types of posts that rank high on the list (they can either be text, links, images, or videos). You can analyze the statistics and pick up things from there.

Mistake #3: Targeting ads poorly

It is true that Facebook has more than one billion active users. But guess what? Most of these people don’t want to see your ads! So don’t waste time and money to show them ads when you can use Facebook’s powerful set of audience targeting tools. Facebook allows you to choose potential ad viewers based on their location, age, education, interest, and more. You can easily weed out people who are unlikely to click on your ads. You can create multiple ad groups to be displayed at different times to various audience groups. This is a method to test and see which ones work best.

Mistake #4: Abandoning your audience

This is probably one of the worst things you can do. When it comes to Facebook marketing, consistency matters. People won’t be very impressed if they visit your page and see that your last post was a few months ago. When you post at regular times, on the other hand, your followers will get into the habit of expecting posts from you - they’ll even look forward to them if the content is really good! If you find it hard to stick to a schedule, try using tools that can automate your posting for you like Hootsuite.

If you’re not using Facebook to expand your online business presence, you’re missing out on one of the most powerful marketing tools out there. Want more tips on how to expand your business through Facebook? Get in touch today and our experts will be happy to help.

Published with permission from TechAdvisory.org. Source.

July 8th, 2015

164_Sec_BA picture is worth a thousand words - and now a selfie may even be worth more. Later this year, MasterCard plans to jump into the facial recognition-based trend of online security with an app that allows users to verify online purchases with a selfie. But is this technology secure? Will it replace traditional passwords for good? Here’s what you need to know.

At the beginning of this autumn, MasterCard will acquire the help of 500 customers to test out a new application that enables people to verify their identity and authenticate online transactions with a facial scan. What does this mean? Instead of using a traditional password at the online checkout, MasterCard wants to give you the option to snap a selfie instead. According to the credit card giant, they’ve partnered with every smartphone company in the business to make this mode of identity verification possible.

Why is this happening?

A quote from Ajay Bhalla, security expert at MasterCard, suggests this is an attempt by the credit card giant to appeal to a younger crowd of digital natives. "The new generation, which is into selfies...I think they'll find it cool. They'll embrace it," Bhalla recently said.

That said, the “cool” appeal to youth is likely not the only reason for this change. The firm is likely attempting to make online purchases both more secure and more convenient.

How it works

To use this technology, users will have to download a dedicated app, which they can then use to take a photo of themselves at checkout. But how does MasterCard prevent a thief from using a photo of you to fake your verification? Simple - the app requires you to blink to prove that you’re a living, breathing human being.

However, it’s been noted by critics that, in today’s technological world, even a blink can be animated on a static photo. This leaves those of us with security concerns wondering whether MasterCard will make this app more secure before it’s released.

Note as well, though, that MasterCard is not getting rid of traditional passwords completely. Users will still have the option of the more conventional method of verification, as well as the choice of fingerprint scanning to check your identity.

Is this where the future of online security is headed?

With the release due later this year of a similar Windows 10 security application to identify users using biometrics, it appears that this is where the future of online security is headed. And with ever more applications and online services requiring a password, it is becoming increasingly difficult for the average web user to create one that is both unique and secure for each individual service. So whether it’s facial recognition, a fingerprint scan or some other technology that’s yet to be perfected, it seems as though some sort of more advanced security solution is inevitable.

Want more of the latest security news? Looking to implement new security to protect your IT infrastructure from cyber threats? Get in touch today.

Published with permission from TechAdvisory.org. Source.

Topic Security
July 3rd, 2015

164_Soc_BIf you’ve been at the social media game for quite some time and yet have seen little to no results, there may be a number of reasons behind this. It could be inconsistent branding, poor quality content, insufficient engagement with your audience, or pushing sales on every status update. However, there is one common trap that both new and seasoned social media marketers can easily fall into. And that starts with your content creation.

Don’t recycle content

Google any recent news story, and you’re likely to find anywhere from a few to several dozen articles on the same subject. And unfortunately, the content is so similar that you can barely differentiate one from the next.

If you want to stand out from others on the social media scene, find something new to talk about. In general, if you want to get noticed by new customers or followers, it’s best to avoid widely covered topics. Everyone and their grandma will be writing about it, which creates much more competition for your version.

If you must create content about mainstream topics, make sure you take the time to come up with a fresh perspective, and share valuable information that hasn’t been touched on yet.

Be fearless in your content

Similarly, it’s absolutely essential that, across all the content that you produce, you share a unique perspective. Many people end up parroting the same thing as everyone else because they are afraid to offer their true opinion. Don’t be afraid to speak up and be controversial. If you’re going to develop a social media persona that stands out, you need to develop your own voice - and a thick skin. There is always going to be someone who disagrees with you, especially on the web where it is easy to remain anonymous.

Additionally, there’s a reason that the saying “there’s no such thing as bad publicity” is famous. In fact, when you write polarizing content that will have a fair share of supporters and naysayers, people are hardwired to react to it. This is for the same reason that humanity as a whole shares a universal love of stories - whether that’s in the movies, in a novel or around a campfire. A story is nothing without conflict. When you produce content that creates a real life conflict of opinions, you have a better chance of it making some noise on social media.

But - be honest and show integrity

Don’t say something controversial just for the sake of it. Give your honest opinion. The key to every aspect of sales is developing trust. That means that with any customer or potential follower you come into contact with, whether through social media or other means, you should show your true self. You’ll have a better chance of gaining a customer or follower for life.

Controversy or not, always be professional

There’s no reason to start a flame war, or resort to name calling and insults. People are going to have strong feelings about controversial content. Emotions are going to come up and people can say some pretty mean things - especially on the internet. Don’t get caught up in the comments and negativity. If you do, it is sure to leave a bad taste in the mouths of your current customer base and followers.

Want more insights into growing your social media presence? Speak up today.

Published with permission from TechAdvisory.org. Source.

Topic Social Media