Brain Trust Technologies LLC
TOLL FREE: (877) 288-5527
  • Home
  • Why Brain Trust
    • Partners & Certifications
    • Affiliations
  • Services & Solutions
    • Managed Services
    • Hosted Solutions
      • Business Solutions
    • Hardware & Software Sales
    • Professional Services
    • Business Continuity
  • Blog
  • Resources
    • White Papers
    • Brain Trust Reports
    • Case Studies
    • Newsletter Archive
  • About Us
    • Referral Program
    • Contact Us
  • Support
RSS

Enlist IT help when installing CPU updates

January 24, 2018 admin Security 2018january24security_c, chrome, edge, firefox, flaw, ie, Intel, linux, macos, meltdown, safari, security, spectre, vulnerability, windows

When it comes to security updates, time is usually of the essence. The longer you wait to install a fix from a vendor, the higher the risk of being compromised. But in the cases of the Meltdown and Spectre flaws, you might be better off waiting until a more reliable patch is released. Let’s review what’s going on and what the best course of action currently is.

Unsecured data storage

Spectre and Meltdown are the names given to two hardware flaws that allow hackers to see any piece of information stored on your computer. Although slightly different in execution, both take advantage of a hardware feature that computer chips use to access and store private information. For the last 20 years, security experts believed this information could not be stolen or spied on by malicious software, but that assumption was proven false on January 3, 2018.

Now that the Spectre and Meltdown vulnerabilities are public information, hackers can use them to create programs that steal passwords, social security numbers, credit card numbers, and anything else you type into your computer.

Because these problems are hardware-based, none of the updates will be able to secure the vulnerable storage; they’ll simply prevent your computer from storing anything in it. Currently, there are patches for:

  • Operating systems (Windows, macOS, and Linux)
  • Web browsers (Chrome, Firefox, Safari, Edge, and IE)
  • Chip firmware (low-level programs installed on the processor itself)

If you’re using an Apple computer, these updates are relatively easy to install. If you’re using a Windows or Linux-based computer, these patches may cause your machine to freeze, reboot unexpectedly, or significantly slow down.

Why should I wait to install the updates?

Intel, one of the chipmakers responsible for the Spectre and Meltdown flaws, has provided contradictory recommendations on more than one occasion. As recently as January 18, Intel recommended waiting for an updated patch, but in the same announcement also recommended “consumers to keep systems up-to-date.”

Experts believe detecting an attack that is based on one of these flaws will be relatively easy and represent an alternative to installing updates that could render your computer unusable.

What should I do?

IT support experts will be able to quickly and easily assess what is the best option for your computers. For example, our team can determine whether or not your hardware will conflict with the current patches, and either install them or set up a detection strategy that will help you mitigate the risks without ruining your computer.

If you need expert IT support for quick responses and ironclad security — give us a call today.

Published with permission from TechAdvisory.org. Source.

3 simple and easy cyber-security tips!

January 22, 2018 admin Hardware 2018january22hardware_c, authentication, cybersecurity, data protection, easy security, two-factor, webcam

Data security and privacy should be a top priority in this age of constant and downright dangerous cyber attacks. However, in your quest for ultimate security, don’t forget to implement these non-technical steps to shield your business’s IT resources.

Cover up your webcam

There must be some credibility to doing this if Facebook founder, Mark Zuckerberg, former FBI director, James Comey, and NSA whistleblower Edward Snowden all believe their webcams could be compromised. This is not just another paranoid celebrity reaction to ruthless paparazzi, there’s a genuine reason behind it. Kindly take a moment to consider the following scenario: hackers using your webcam to spy on you.

Though it might sound unrealistic, this actually happened on several occasions. Sometimes for purely voyeuristic reasons and sometimes what appeared to be espionage. This is a very real threat with disturbing repercussions. Hackers aim to gain personal information based on your surroundings, deduce your location, as well as spy on the people you’re with, ultimately using this information to hold you ransom, threatening to broadcast your most intimate and vulnerable moments if you don’t pay up.

Fortunately, guarding yourself against such danger is really easy and some painter’s tape over your webcam should do the trick. If you’re not confident about regular tape, you can purchase a cheap webcam cover online or at any hardware store.

Purchase a privacy shield

Think of privacy guards as those iPhone scratch protectors, but with an anti-snooping feature. These are thin covers you put on your computer, laptop or smartphone screen to limit viewing angles. Once installed, anyone trying to look at your screen from anywhere — except straight-on — sees nothing. Privacy filters are commonly used to protect work devices, particularly which display or contain critical files with sensitive data or confidential information. However, less sensitive, personal devices are still vulnerable to ‘shoulder surfing’ — the act of peeking at someone else’s screen, with or without ill intent, which is why we recommend using these protectors on all your devices.

Use a physical authentication key

Requiring more than one set of credentials to access sensitive resources is common sense, and has become standard practice for established online services. With something called two-factor authentication in place, you gain access to your account only after you’ve entered the authentication code, which the website sends to your smartphone once you’ve entered your account credentials. Until recently, two-factor authentication relied mostly on text messages that were sent to mobile phones. But professionals have now realised that phones can be hijacked to redirect text messages.

Moreover, authentication codes can be stolen, or users can be tricked into entering these codes via a convincing phishing website. If you’re looking for authentication services that cannot be hijacked, stolen or lost, your best bet is a USB or Bluetooth key you can carry on your keychain. This means nobody — not even you — will be able to access your account without the physical key. Ultimate security at your fingertips.

If you need help setting up two-factor authentication, or any IT security services, contact our experts and experience true peace of mind as we fortify your data to no end.

Published with permission from TechAdvisory.org. Source.

Should you use UPS for your network gear?

January 18, 2018 admin Business 2018january18business_c, disaster recovery and backup planning, network equipment, productivity, wi-fi

Smart business owners use uninterruptible power supply (UPS) for emergency situations like a storm, fire, or other disasters. Often, a UPS is deployed for desktop computers to give employees ample time to save their work and prevent losing unsaved work. An even better power-saving strategy in emergency situations, however, is to use UPS for networking equipment.

UPS for network equipment

UPS systems provide backup power in case of outages and protect against power surges, which don’t just damage computers but also make you lose unsaved work. Deploying them for Wi-Fi routers and modems allows you to stay connected to the internet in what is typically a chaotic time.

Moreover, it makes sense to not just keep your PCs powered up, but to also have internet access during a disaster. This strategy works relatively well if your staff are predominantly laptop users, as that means you only need to juice up your Wi-Fi gear.

Better than generators

Although generators are indispensable for certain businesses, they also require greater upkeep. Small- and mid-sized businesses may not have enough capacity to maintain them because they typically require a utility crew who can manage high-maintenance equipment.

What’s more, extreme mishaps when misused or mishandled could result in generator-related fatalities. On the other hand, misusing a UPS unit could result in the loss of a day’s work, but it’s unlikely to lead to anything as extreme.

Why internet access is important during a disaster

UPS-supported modems or routers help you stay online for as much as 90 minutes, which should be enough time to get your bearings before power finally runs out. Internet service providers are usually prepared for catastrophes and would normally have an emergency power source to stay operational. And if you can stay online via Wi-Fi during an emergency, you get the following benefits:

  • Internet speed that’s faster than cellular access
  • No extra telecom costs resulting from overreliance on cellular data
  • All devices stay online using a stable Wi-Fi connection
  • Devices don’t have to rely on cellular data-equipped phones for internet connection

Plug in your network gear now

Businesses that aren’t located in disaster-prone areas probably don’t give much thought to installing UPSs for their computers, let alone their modems. But accidents and emergencies are inevitable. And when they happen, you’ll find that having internet access is one of the most important things you need to ensure business continuity.

Think of an emergency power supply source like a UPS as an investment that not just protects your systems from data loss but also keeps your Wi-Fi equipment functioning in emergency scenarios. Call us today for productivity-saving tips and other hardware hacks for your business.

Published with permission from TechAdvisory.org. Source.

Beware of what you save in web browsers

January 9, 2018 admin Security 2018january9security_c, auto-fill, chrome, cybersecurity, firefox, Passwords, privacy, safari, web browsers

Passwords are a double-edged sword. If you make them too simple, they’ll be easy to guess; if you make them too complex, they’ll be impossible to remember. One solution is to create an uncrackable password and save it to your browser. Unfortunately, recent research suggests that tactic could drastically reduce your privacy.

Why auto-fill passwords are so dangerous

In 2015, the average internet user had 90 online accounts, a number that has undoubtedly grown since then. This has forced users to create dozens of passwords, sometimes because they want to practice healthy security habits and other times because the platforms they’re using have different password requirements.

Web browsers and password manager applications addressed this account overload by allowing usernames and passwords to be automatically entered into a web form, eliminating the need for users to hunt down the right credentials before logging in.

The process of tricking a browser or password manager into giving up this saved information is incredibly simple. All it takes is an invisible form placed on a compromised webpage to collect users’ login information without them knowing.

Using auto-fill to track users

Stealing passwords with this strategy has been a tug-of-war between hackers and security professionals for over a decade. However, it has recently come to light that digital marketers are also using this tactic to track users.

Two groups, AdThink and OnAudience, have been placing these invisible login forms on websites as a way to track which sites users visit. These marketers made no attempts to steal passwords, but security professionals said it wouldn’t have been hard to accomplish. AdThink and OnAudience simply tracked people based on the usernames in hidden auto-fill forms and sold that information to advertisers.

One simple security tip for today

Turn off auto-fill in your web browser. It’s quick, easy, and will go to great lengths to improve your account security.

  • If you use Chrome – Open the Settings window, click Advanced, and select the appropriate settings under Manage Passwords
  • If you use Firefox – Open the Options window, click Privacy, and under the History heading select “Firefox will: Use custom settings for history.” In the new window, disable “Remember search and form history.”
  • If you use Safari – Open the Preferences window, select the Auto-fill tab, and turn off all the features related to usernames and passwords.

This is just one small thing you can do to keep your accounts and the information they contain safe. For managed, 24×7 cybersecurity assistance that goes far beyond protecting your privacy, call us today.

Published with permission from TechAdvisory.org. Source.

5 social media trends to watch for!

January 8, 2018 admin Social Media 2018january8socialmedia_c, artificial intelligence, augmented reality, facebook, gen-z, influencer marketing, instagram, twitter

With the tug-of-war between mammoth social media platforms for daily users, 2018 is poised to become the biggest year for technological advancements in the industry. As social norms related to social media change, here are the top 5 trends we expect to become mainstream this year.

  1. The boom of Augmented Reality
    The launch of the new iPhones — both 8 and X — last September brought with it an under-the-radar change to the devices. The incorporation of a new chip provides iPhone users with extraordinary augmented reality (AR) experiences. While most conversations about AR focus on the mobile gaming experience, social media platforms will likely find a way to integrate the new technology as well.
  2. Influencer marketing
    Influencer marketing has proven to be the best way forward for companies to connect with younger audiences. Titanic companies such as The North Face, HubSpot and Rolex are great examples of companies which have profited heavily from social media-based influencer marketing. By contrast, companies that opted for traditional strategies struggled to connect to social media users, indicating that influencer marketing is here to stay and blossom in 2018.
  3. All eyes on Gen Z
    The oldest Gen Z-er is 22 years old and is only just heading into the labor market, meaning they’re going to start spending more money for sometime to come. Brands recognize this, and are aiming to shift their social media strategies to appease the newest customers on the market. Investment in platforms like Snapchat and Instagram is expected to grow exponentially this year.
  4. The growing importance of messaging platforms
    A recent study pointed out that over 2.5 billion people use messaging platforms like WhatsApp, Facebook Messenger and Kik to connect with companies. Rather than simply publishing marketing content to profiles and feeds, companies should focus on making it easier for customers to start one-on-one conversations. Therefore, it is more than likely that artificial intelligence, voice assistants and chatbots will all be integrated into messaging platforms for a more personalized user experience.
  5. Digital hangouts go mainstream
    In 2017, video content — including live broadcasts and chats platforms — was more prominent than ever, and live videos were definitely a successful part of it. This means digitally hanging out with friends and colleagues will become a social norm, as evidenced by the video hangout platform known as Houseparty, which boasts of over one million daily users.

With Gen Z-ers becoming a larger part of the buying marketing, companies will utilize social media platforms to their fullest by incorporating a wide variety of targeted methods to capture their attention. These methods involve technologies that were unimaginable only a few years ago, such as virtual reality and augmented reality. Moreover, investments in optimizing messaging platforms and influencer marketing also signals the start of a newer, more interconnected era between businesses and customers.

Social media marketing is the future. Get in touch with our experts for advice on how you can make 2018 your year. Call today.

Published with permission from TechAdvisory.org. Source.

Manage your IT hardware better in the New Year

January 4, 2018 admin Hardware 2018january4hardware_c, checklist, hardware, technology management, tips

The new year doesn’t have to mean new IT hardware problems. Sure, some headaches are unavoidable, but you can start the year right by giving your computer hardware a little TLC. Let our handy hardware checklist be your guide.

✓ Clean up your computer components
Wipe your monitor with a clean, static-free fabric; remove excess dirt from your mouse’s exterior; and tidy up your keyboard with compressed air. Don’t forget your computer tower! Dust build-up can block your computer’s air vent and affect its performance. Ensure that your workstation is getting adequate ventilation and isn’t directly exposed to sunlight and other heat sources.

✓ Manage your cables
If you’re not giving your computers’ cables the attention they deserve, now’s a good time to do so. Other than wiping the thick coat of dust on computers’ cables, consider using cable management solutions that unclutter and untangle messy wires. These don’t just organize and secure your cables, they also help ensure your PCs run quieter and are less prone to overheating as a result of blocked air vents.

Planning to relocate or upgrade in the near future? Organizing your computers’ cables now makes future relocation and upgrading processes much easier.

✓ Review and update your inventory
Keeping an inventory of all your hardware helps you manage hardware lifecycles and purchases, identify items that are near their end of life, and ensure you avoid duplicate purchases of items already in-stock.

Your inventory list should include all owned and leased devices: PCs and laptops, printers and scanners, tablets and smartphones, and modems and other network hardware. Update all your assets’ serial numbers and keep track of their respective users and location.

✓ Printer maintenance
Clean the interiors and exteriors of your printers, including paper trays, which are sure to have accumulated dirt from years of use. You should also repair and/or replace parts and accessories such as printheads and cartridges that are no longer in good condition. Should you decide to do a complete printer maintenance, check for the latest software updates for your printers and install them immediately.

✓ Implement a hardware policy
This is also a good time to create a technology guideline that your employees can follow to ensure they work efficiently. These guidelines reduce the need to spend on unnecessary repairs, keeping the succeeding year’s checklist shorter. With clear instructions on the proper use, replacement, and storage of your hardware and devices, you’ll be better able to manage your hardware for years to come.

With a more organized IT hardware inventory, you have one less thing to worry about. Want to get more in-depth hardware management recommendations? Call our experts today.

Published with permission from TechAdvisory.org. Source.

2017’s most valuable IT solutions

January 2, 2018 admin Business 2018january2business_c, ai, business value, cloud, cybersecurity, iot, machine learning, mobile payments, ransomware

It’s the perfect time of year to evaluate last year’s technology investments and make adjustments for the year to come. Whether 2017 left you with extra cash in your pocket or desperate for a better way to get work done, here’s a roundup of the best IT news from the past year.

Small businesses love the cloud

According to research from IDC, more than 70% of businesses with 10-99 employees took advantage of cloud technology in 2017, and that number is expected to rise this year. This is largely due to IT providers demonstrating that the cloud is just as, if not more, secure than on-premises solutions. The list of possibilities for what can be hosted in the cloud on a small-business budget is getting longer every day — if you’re not devoting resources to this technology, it’s time to jump onboard.

Mobile payments earn users’ trust

Like the cloud, making credit card purchases using a mobile device suffered from a trust deficit in its early stages. For good reasons, consumers have been conditioned to treat IT security with caution, and storing financial information on a smartphone that could wirelessly transmit that information to cashiers sounded dangerous.

However, after two years of availability without any major incidents, the number of users who have used smartphone-based wallets like Apple Pay has doubled. Accepting these payments is relatively simple for small businesses and opens up new business opportunities.

Cybersecurity becomes affordable for SMBs

Ransomware had yet another year of explosive growth, and small businesses were a primary target. Thankfully, managed IT services providers met the increased demand for cybersecurity services with intelligent data backup and network protection solutions tailored for SMB budgets. There will be even more ransomware attacks in 2018, which means you should be investing in more cybersecurity services than you did last year.

The Internet of Things gains popularity

Just a couple years ago, Internet of Things (IoT) devices were novelty gadgets for people with money to burn. Everything was being connected to WiFi networks: egg trays, pet-activated video chats, belts, you name it. But due to more useful applications in 2017, nearly a third of US businesses are now taking advantage of IoT gadgets. Connected thermostats, door locks, and AI assistants make it easy to save money, increase security, and boost productivity.

“Artificial Intelligence” is widely adopted

Although we’re still far from building computers that can truly think for themselves, 2017 was the year that computers got much better at creatively organizing and interpreting data for us. From digital assistants that answer your phones to customer relationship management platforms that intelligently uncover sales opportunities, IT solutions for business are getting significantly cheaper and smarter. Experts predict that more than 30% of businesses will use AI by next year and we recommend you join their ranks.

Technology investments are no different from any other investment. There will always be risks and you should always consult with an industry expert first. When you’re ready to get more value out of your IT, give us a call and we’ll get started on your 2018 plan!

Published with permission from TechAdvisory.org. Source.

Recent Posts

  • Can AI empower customer service agents?
  • Leave no room for hackers to operate
  • Keep your laptop from overheating

Recent Comments

    Archives

    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    • December 2016
    • November 2016
    • October 2016
    • September 2016
    • August 2016
    • July 2016
    • June 2016
    • May 2016
    • April 2016
    • March 2016
    • February 2016
    • January 2016
    • December 2015
    • November 2015

    Contact Us

    • Email
      billing@braintrusttechnologies.com
    Brain Trust Technologies LLC

    6749 S. Westnedge Ave

    Suite K, #128

    Portage, MI 49002-3556

    Southwest Michigan: (269) 290-7137

    St. Louis: (314) 558-0623

    Toll Free: (877) 288-5527

    © 2022 Brain Trust Technologies, LLC. All Rights Reserved