MFA is a necessity today.

Why do I have to get a txt message to sign into systems/services? What happened to just entering my username and password?

Answer, Multi-Factor Authentication (MFA). If your systems aren’t using MFA, then you should enable them and start using it. Why? Email is still the number one way hackers are gaining access to sensitive data and using that data to cause other damages. If an attacker gains access to an email account they can perform the following:

  • Send out emails from this account to other users, customers, vendors, etc to gain access to other sensitive information.
  • Send emails to internal financial employees to perform wire transfers to the attacker’s bank account. Since the email is coming from an internal user the request for wire transfer looks legit and is usually performed.
  • Send email to internal security personnel requesting alarm codes.

MFA protects against these types of attacks by requiring the person signing into the system/service to provide a second, or even in some cases a third, piece of information that only the authorized user has access to or possession of. If your email system doesn’t have MFA capabilities, then it’s time to switch!

CBTech Support helps its clients implement MFA, and other security layers, to keep their data secure. This ensures that only authorized users are signing into their email, and other systems, which protects against the myriad of compromises that can develop from the breach. Contact us to learn more http://bit.ly/2pPj4C8

The power of Excel

Are you getting the most out of Excel? Excel is a powerful tool that most people use for displaying data nicely. You can display data in tables, format data using color/size, and organize data to display it in a readable way. However, did you know that Excel can be used to filter, sort, and display data to help you get the most out of data analytics?

Here are some useful things you can use Excel for:

Filtering data

  1. Highlight all cells, and click Data > Filter to enable the Filter function.
  2. Then click at the filter icon on the column you want to filter on, and select Text Filters > Contains.
  3. In the Custom AutoFilter dialog, you can specify the text you want to filter based on.
  4. Click OK. Then only the rows which contain the text string you specified are displayed.

Sorting data

  1. Select one cell in the column you want to sort.
  2. On the Excel Ribbon, click the Data tab.
  3. Click Sort A to Z (smallest to largest) or Sort Z to A (largest to smallest)
  4. Before you do anything else, check the data, to ensure that the rows have sorted correctly.

Delete Text Before Or After Character By Formula In Excel

  1. To remove text before a comma with the data contained in cell A1, select cell A2 and type this formula =RIGHT(A1,LEN(A1)-FIND(“,”,A1)) into it, and press Enter key
  2. To remove text after a comma with the data contained in cell A1, select cell A2 and type this formula =LEFT(A1,FIND(“,”,A1)-1).
  3. To apply the same filter to the remaining data in column A, click and hold the Fill Handle (small black box) on cell A2 and drag down to the range where your data stops.

These are just some of the most underutilized functions in Excel that provide powerful data manipulation. CBTech Support has years of knowledge in supporting user applications. Our clients have this knowledge at their disposal via a phone call away as we offer unlimited remote helpdesk support. Contact us to learn how you can have an IT department, with this and many other benefits, available to your company http://bit.ly/2pPj4C8

Account Takeover and Prevention

Over the past few months we’ve seen a new security attack gain popularity: Account Takeover (ATO). Account Takeover is when an attacker steals a user’s username and password for their email account, most often an Office 365 account. The attacker tricks a user in to giving up their username and password, usually via a file sharing email with a link that takes the user to a page which asks them to log in to their account to see the file. The log in page provides the user’s credentials to the attacker. The attacker then uses those credentials to gain access to the user’s account and take further action. These actions can include:

– Forwarding all the users’s email to an account the attacker controls, while still delivering email to the user’s mailbox. This allows the attacker to not only read all the email, but also to determine a) who the user communicates with on a regular basis, b) what other user’s might be susceptible to an attack, and c) what users might be susceptible to a money wiring request

– Sending attacks via email to more users. Since the account is a “trusted” account, the attack emails are more likely to pass through spam filters without being caught.

– Sending wire requests to members of the finance team at the compromised user’s company. Since the email is coming from a member of the company, it is more likely to be trusted.

There are layers of security that can help minimize Account Takeover attacks, but the number one defense against something like this is user education. Helping users to understand what to look for when reading an email is the first step to preventing Account Takeover attacks. There are several ways to help educate users, from simple checklists all the way to fully managed educational programs. If you are interested in learning more, contact us today.

Is your computer running slow?

You buy a new computer and it’s lightning fast. You’re so excited and your productivity on the computer is allowing you to get things done fast. Over time your computer slows down. You are no longer as productive and you seem to need to wait for your computer to catch up to you. The slowness could be a result of age, additional applications installed, or a technical issue.

  • Age: the computer you bought years ago has reached its lifecycle. It worked great at the time but now new things require more from your computer that was built back when you bought it.
  • Additional Applications: as you install more and more applications, there are additional processes and services that run taking up more resources.
  • Technical issues: there are many technical issues that can happen to cause a computer’s performance to degrade, from corrupt files to failing hardware.

If your computer has reached the end of its lifecycle then it’s simply time to bite the bullet and buy a new computer and get back to being productive and excited about working on your computer. Make sure you are buying a computer with a solid state hard drive in it as it makes a world of difference in computer performance.

If you’ve installed tons of applications, then check your start up items and disable them so that they don’t start automatically. They’ll work fine when you open them as you need them but they won’t affect computer performance while you don’t need them. Review the list of startup applications and disable any you don’t need to start automatically. Here’s how:

  • Windows 10/8: hitting CRTL+ALT+ESC on your keyboard and clicking the Startup tab
  • Windows 7: click the start button then type msconfig then hit enter. Click the start up tab

Computer slowness issues resulting from technical issues require skilled professionals to review and determine the root cause. CBTech Support proactively monitors its client’s computers and servers for any technical issues which would cause performance degradation.

If you’d like to learn more about a specific topic visit our website and let us know http://bit.ly/2sdZFNA.

Malware Targets Consumer Devices

Last month, a strain of malware was found to be infecting the devices that provide people with internet service, known as routers. It targeted mostly consumer devices made by companies like Cisco Linksys, Netgear, and TP-Link. Researchers found that it had the ability to spy on data passing through these devices, as well as the ability to render the device useless (known as “bricking”). Unfortunately, these devices usually don’t have any protection such as an anti-virus program and are not updated frequently, if at all. Additionally, most devices are left with the default usernames and passwords, so exploitation of the device is simple. There was a big push last month to have users reboot these devices to try to counter this malware, but that did not completely clear it out. Researchers now say that the only way to clear a device of the malware is to reset it to its factory defaults. This article by Cisco’s Talos security team describes in detail the malware and its potential effects: http://bit.ly/2K6mCLc.

This type of security incident, which is still ongoing, highlights the lack of security focus on the part of consumer device manufacturers. Security features are typically low on the list of priorities for these devices, and updates to fix flaws are few and far between. Most devices are preconfigured to be plug and play out of the box, with little to no customization on the consumer’s part; this means that default settings are left in place and, since the manufacturers are often international companies, are well known worldwide. PCMag recently posted an article listing the devices affected, along with instructions on how to update them: http://bit.ly/2tgUHSo.

Do you snap?

Did you know that Windows has a feature called Snap? It allows you to easily open two windows side by side on a single monitor. For example, if you are trying to compare two documents, rather than flipping back and forth between them you can use the Snap feature to open them side by side. It’s very easy to use. Simply open a file (document, picture, folder, etc), then click and drag it to either the left or right side of the screen. You will see the pointer icon display a circle around it which will then change to a rectangle that encompasses half of the screen; releasing the mouse button will cause the file to open to exactly half of the screen. You can then open another file and repeat the process to the empty side of the screen. If using the mouse to drag the windows to either side isn’t your cup of tea, you can use a few keyboard shortcuts to accomplish this.

Open a file, the hold the Windows logo key (Windows-key-3)while pressing either the left arrow key (for the left side of the screen) or the right arrow key (for the right side of the screen). keyboard-arrows7Open another file and repeat the process (using the opposite arrow) to fill the empty half of the screen. Voila! You are now a Snap expert!

Business Results

If you’re reading this, the odds are very high that your business relies on technology. The odds are even higher that technology allows you to be more productive and efficient than if your business didn’t use it. But are you getting the results that you want? Your business has a plan and goals, and technology should help your business reach those goals. If your technology is helping you reach your business goals, that’s awesome! We’re always looking to learn more about business, and would love to sit down with you and learn about your business. If you are unsure of your results, or they are not what you want, that’s OK too. We’d love to sit down and see if we can help. Ultimately, our goal is to learn about businesses and to see if the results our clients get are something that you would like to see in your business. Give us a call today at (732) 640-8563 or fill out our contact form here.

Is your head in the cloud? Your data certainly should be.

What is the cloud? The cloud is a marketing term to represent data or services that exist outside of your office. Think of a website, or email, or pictures you have stored in dropbox, Google Drive, OneDrive, etc. All of this information is stored on the internet and accessible from anywhere. It makes it easy to have that information available no matter where you are.

In the old days, remote users needed a direct/secure connection back to the office requiring expensive tools and infrastructure. As time went by, more and more data/information moved to the cloud. This made remote users more effective because they were able to seamlessly have access to data on the road with no need to have a connection back to the office. As this became more popular, business owners decided not to invest capital in expensive onsite equipment but instead invest in Cloud services.

CBTech Support evaluates its clients business and develops a strategy based on business goals to get the most out of the Cloud. Whether it’s moving a part of the business process to the Cloud or moving the entire technology operation to the Cloud. Our clients benefit in the following ways:

– better uptime on technology services

– higher business continuity rates

– better efficiency for mobile users

– revised accounting of technology expendure

 

Contact us to learn more about how we can help get your business in the Cloud.

Can’t find what you’re looking for in Window 10?

Do you spend too much time trying to find photos, programs, documents etc in Windows 10? Where’s that setting? Where’s that app?

In Windows 10 the search capabilities are much improved from previous versions of Windows. Simply click the start button (WindowsLogo) and start typing. Type what you’re looking for in the search box on the taskbar. You’ll get suggestions and answers to your questions, and search results from your PC and the web. To find more results of a certain type, select the “Find results in” icon above the search box for apps, settings, documents, folders, photos, videos, music, email, calendar, people, or the web.

You can also customize the start menu to have easy access to your most recent apps and files. The Start Menu, or simply Start, gives you access to your User Documents, Oft-used and pinned software and apps, File Explorer and so on. Also new is that Start now includes Live Tiles. Live Tiles display real time content from applications such as email, photos, calendar, weather, etc. Read more about Live Tiles here: http://bit.ly/2BFkXL4

In addition to being able to search for what you are looking for and customize the start menu, there are many other tips and tricks for Windows 10. Some examples are:

  • Edge browser tips and tricks
  • Using Internet Explorer in Windows 10
  • Make File Explorer open to This PC instead of Quick Access

You can find detailed information about these and other tips/tricks here: http://bit.ly/2FhZesr

Technology is not set it and forget it!

Is your business plan the same now as it was 1 a year ago? 3 years ago? 5 years ago? Chances are, it has changed since then. That means the technology that you initially set up to support that business plan is no longer supporting your current business plan.

Just like business plans change to reflect your business and personal situation, your technology should also change to support that new plan. What if there was a process to continuously align your technology with your business goals? A process that:

– Learns the ins and outs of your business

– Evaluates your current business plan

– Evaluates your current technology

– Develops a strategy to support your business plan through technology

– Executes the strategy to keep technology in alignment with the business plan

Just like technology is not set it and forget it, this process is not a one-time task. Because technology and business plans are constantly changing, the process is never complete. CBTech Support applies this process throughout the life of a business relationship with our clients.

If you feel your technology is not aligned with your business plan, then give us a call at (732) 640-8563 or fill out our contact us form here