Categories
Casserly Consulting Blog

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

ponzi_pyradmid_money400.jpg

Do you know what a botnet is and how it works? It’s basically a network of infected computers that can be used to perform Distributed Denial of Service attacks, overloading target networks and forcing them to endure downtime. They can also be used to distribute malware and other threats. What’s worse than this, you ask? Hackers can purchase botnets on the black market to use against their targets, but a new type of botnet strain is changing the way this works.

The black market is no stranger to sketchy sales. Users can pay with Bitcoin for the development of malware and other threats without knowing the first thing about hacking or technology. However, this convenience comes at a price, as any users of the new Cobian botnet now know. The malware involved–njRAT–surfaced in 2015 and includes a lot of terrifying features. Hackers can use a keylogger, webcam control, remote code execution, and even screensharing, just by shelling out some Bitcoins to a fellow hacker.

What these would-be hackers don’t know is that the developers include encrypted code which allows them access to the master control switch of the botnet. In other words, while users are purchasing their own botnets to use for whatever they want, full control of any botnets purchased is held solely by the developer of Cobian.

NakedSecurity describes the way that the botnet masks its presence, as well as how the threat activates when it’s time for its master to take over: “Cobian’s executable payload disguises itself as a Microsoft Excel file. Cobian’s secondary payload then checks to see if the second-level operator is online. If so, then the code that enables the author to acquire master control operates to evade detection. If the second-level operator is offline, the secondary payload acquires the address of the author’s command and control servers from Pastebin.”

It just goes to show that you can never trust a hacker–but you probably already knew that. This story should be a lesson for businesses that don’t suspect they are at threat of a hacking attack. If anyone can access threats like a botnet, you’ll need to step up your defenses to keep your business safe. COMPANYNAME can help with this task–to learn more, reach out to us at PHONENUMBER.

Categories
Casserly Consulting Blog

Don’t Underestimate The Value Of Managed IT

managed_it_services_good_for_your_business_400.jpg

Have you had to make substantial technology investments in the past year? How much money do you think you will spend this year? If you have a solid technology budget in place, you’ll know how much you expect to spend, but what happens if critical systems fail? Are you prepared to cover the cost of new technology, the management of that technology, and the staff that you’ll need to do so? If you are even a little unsure about it, managed IT services could have plenty of value for your business.

There are two critical facets to every IT strategy. The first is based in demand. What technology does your business need to be MOST successful? Do you need one server to deploy the software that your company uses? Three? Five? What do you do for communications? What do you do for storage? There are a lot of variables at work when deciding how to deploy technology solutions, and since there is so much cost associated with these systems, many businesses cut corners to provide their organization with technology solutions but end up putting their overall sustainability at risk.

The second facet, and often most costly, is based in supply. Your supply of technology has to be monitored, managed, and maintained to provide you a reasonable ROI on your technology investments. Typically, the cost of onboarding, training, and deploying a proficient technician far outweighs the cost of new technology; and, to make matters worse, the more technology your organization deploys, the more resources you need to have to ensure that all is running efficiently, and as intended. After all, the downtime that comes with fledgling technology, is a major problem for any organization.

COMPANYNAME can often provide a substantial cost reduction, better services, better technology, and a better return on your technology and management investments than buying new technology all the time, and hiring people to manage it. We utilize industry-leading remote monitoring and management software, leverage automation, and dispatch certified technicians to help businesses like yours build and maintain robust technology. We also have partnerships with some of the industry’s best vendors to ensure that every client has access to the technologies they need to build an efficient and secure IT infrastructure.

By delivering comprehensive IT management, our managed IT services are exceptionally valuable. If you run an AREASERVED business that is looking to improve your processes, deploy powerful technologies, and manage the technology you have, call us today at PHONENUMBER.

Categories
Casserly Consulting Blog

Tip of the Week: Use Microsoft Word To Create Envelopes For Your Contacts

Wordlogo400.jpg

Microsoft Office has long been a valuable asset for all types of businesses, but would you be surprised to hear that most organizations don’t take full advantage of it? All of the most recent editions of programs like Microsoft Word, Excel, and PowerPoint are designed with powerful, user-friendly interfaces that allow your business to do lots of neat things. In fact, you can create a professional envelope for your organization, add a list of contacts from a CSV file or from Outlook, and so much more.

Step 1: Open a New Document
Blank Page

Step 2: Access the Layout Menu
Layout

Step 3: Change the Size of the Page
You want the page to be set to the proper envelope size. If you need to know what size your envelopes are, try checking the box. #10 is generally the traditional letter envelope.
Envelope 10

Step 4: Check the Layout
Before proceeding, make sure that the layout has changed to the proper size.
Envelope 10 Resize

Step 5: Go to the Insert Tab and Select Text Box
Insert Tex Box

Step 6: Use the Simple Text Box Option
This will be used for your return address.
Insert Tex Box2

Step 7: Update the Address and Draft the Text to the Desired Location.
Drag to Position

Step 8: Remove the Border Around the Text Box
You can do this by right-clicking the box and selecting Format Shape. Switch the radial button from Solid Line to No Line.
Remove Border

Step 9: Style and Brand Your Return Address
You can use the Font options to customize the appearance of your return address. Make sure you don’t forget your logo.
BrandingAddress

Step 10: Start Your Mail Merge
First, let’s add another Text Box. You should remove the standing text and leave the cursor right where it is in the box.
Mail Merge 5

Step 11: Load Your Contacts
To do this, access Select Recipients and check the source of your contacts. You’ll need a CSV file for this next step.
Mail Merge 1

Step 12: Select Address Box. This appears in the text box that you created earlier.
Mail Merge 6

Step 13: Follow the Directions to Format Your Address
Mail Merge 4

Step 14: Preview Your Results
Use the Preview Results option to check that the addresses are displaying properly, are simple to read, and fit on the envelope. This might change depending on how many recipients you have. Just scroll through them to ensure that the formatting remains the same throughout them all.
Mail Merge 7

Step 15: Save or Print
That just about wraps it up. You can finish your work or print them out as you see fit.
Mail Merge 8

For more great tips and tricks, subscribe to COMPANYNAME’s blog.

Categories
Casserly Consulting Blog

Why Windows Ink Is So Useful In The Business Setting

windowsinkofficiallogo400.jpg

While computers, laptops, and tablets are incredible tools for productivity, there are many who miss the ability to scrawl out their ideas by hand. However, Microsoft has developed a means for your business to enjoy the benefits of both approaches with Windows Ink.

You may be familiar with the digital tablets that many artists use to transpose their ideas directly into their computer. The concept behind Windows Ink is very much the same. The primary difference is that, rather than using a separate tablet that you plug in via a USB connection, Windows Ink enables you to take notes right on the screen of your device with specialized writing utensils.

Naturally, as a Windows (and by extension, Microsoft) tool, Windows Ink is particularly suited to working with Microsoft Office products.

  • Microsoft Word: Windows Ink not only allows you to mark up documents, but allows you to edit them with different settings and gestures. Among other features, you can turn your stylus into a high-precision highlighter, or delete unwanted words or sections with a quick strikethrough.
  • Microsoft OneNote: With Windows Ink, OneNote turns into a freehand calculator. If you write an equation in the workspace, you can get the answer instantly–or, if you want to polish your math skills, OneNote will take you through the process step-by-step.
  • Microsoft PowerPoint: If you have ever used PowerPoint and wished that you could do more than what the toolbar allows you to do, Windows Ink is for you. Using the built-in ruler that comes with Windows Ink, you can draw with more precision than ever. Plus, Windows Ink gives you the ability to replay whatever notes others have made on a PowerPoint file.

Of course, there’s more that Windows Ink can do than work with the various programs of Microsoft Office. For instance, if you use Windows Ink to jot an address on a sticky note, Maps will step in to find you the best route. Another useful utility Windows Ink offers is its ability to take screenshots that you can then put notes on, allowing your reaction to be more easily understood.

The utility of Windows Ink in an office setting should be clear. Communications can be condensed from emails that list out the edits that a document needs, to contextual notes being made directly on the document itself. Windows Ink can essentially turn your device into an interactive notebook, allowing you improved utility and increased potential for productivity.

To learn more about Windows Ink and other useful solutions for your business, reach out to COMPANYNAME at PHONENUMBER.

Categories
Casserly Consulting Blog

Essential Cybersecurity Tips From The FBI

fbi_cybersecurity_400.jpg

In 2016 former President of the United States Barack Obama passed the Cybersecurity National Action Plan that implemented near-term action and developed a longer-term strategy of bringing awareness and protections to public computing systems connected to the Internet. The strategy is to make an immediate effort to empower citizens to protect their own privacy, while also maintaining public safety and national and economic security, as many of the most critical systems this nation utilizes are networked on the web.

For the average small business, it is more crucial than ever to avoid the pitfalls that lay on the internet. Victims of cybercrime deal with an endless number of issues, including drops in revenue, data loss, downtime, and fines/restitution if they are unable to keep their networks secure. Below are a number of line-items that the Federal Bureau of Investigation recommends to keep your data secure, and to avoid becoming a victim of the most pressing malware on the Internet today: ransomware.

  • Raise Awareness: Ensure that you make a point to make your staff cognizant of the threat of a ransomware infection.
  • Updates and Patches: Make sure to patch your operating systems, software, and firmware on all of your digital assets.
  • Auto Update Security Software: Lean on enterprise-level antivirus and anti-malware software to conduct regular scans and catch potential malware.
  • Limit Super Users: Ensure that you don’t just hand out administrator access to your mission-critical systems. Managing access is one of the best ways to keep untrustworthy entities out of your network.
  • Access Control: As stated above, access control is essential to ensure that you know who can and should be in parts of your network. If your users only need read-specific information, they don’t need write-access to files or directories, mitigating risk.
  • Filters and Application Control: Deploy software restrictions to keep programs from executing from location where ransomware may be found. This includes temporary folders found to support Internet browsers and compression/decompression programs.
  • Data Backup & Disaster Recovery Plan: Create data redundancy by having a comprehensive backup and recovery plan in place.
  • Multiple Storages: Ensure that each storage unit is stand-alone to avoid major problems with backups and other forms of storage.

Governments absolutely have to have a strategic plan on how to deal with cybercrime, and as a solid practice, businesses should follow suit. If you want to make sure your strategies are top-level, visit https://www.fbi.gov/investigate/cyber/news to see what the FBI is doing to protect their computing infrastructure. For more great security information, subscribe to our blog.

Categories
Casserly Consulting Blog

Tip of the Week: Miss The Start Menu From Windows 8? Here’s How To Bring It Back

start_menu_tips_400.jpg

Remember how when Windows 8 came out, it had that slick tiled Start screen? If you are one of the people who miss that interface, you are in luck. While Windows 10 returned the nostalgia of the traditional Start menu, you can emulate the experience of Windows 8’s tiled screen relatively easily in Windows 10.

First thing’s first–open your Start menu and select the Settings icon. This is the gear-shaped one. Alternatively, you can simply use the Windows key and the I key for a keyboard shortcut. Next, you’ll want to navigate to Personalization > Start. You should see the option for Use Start full screen. Once you’ve turned on this setting, your Start menu should open into the full-screen mode.

While it doesn’t quite look exactly like its Windows 8 counterpart, it has some similar functionality built into it. You’ll see icons for all of the usual suspects, including apps that you use on a regular basis, and icons for opening up various menus. You’ll also be able to see your pinned tiles in an easy way. Another note is that this can actually make navigation a little bit easier if you are using Windows 10 on your tablet.

If you want to just use the normal Start menu and change the size of it without going full-size, you can do that as well. Just open your Start menu and click on the edge. You can click and drag your Start menu to suit your specific size needs. You’ll see more tiles depending on how large you make it.

Speaking of Windows 8, are you still using it for your business’s needs? If so, you should really consider upgrading to Windows 10. If your business is struggling to implement the latest and greatest software solutions, or you just want all of the best tips and tricks, reach out to COMPANYNAME at PHONENUMBER.

Categories
Casserly Consulting Blog

Your Guide To Mobile Device Management as an SMB

mobile_device_management_400.jpg

The use of mobile and personal devices for work purposes can be beneficial to your business operations. When handled, and supported properly, they have been shown to improve communication methods and increase productivity. However, the popularity of mobile computing, as well as the Internet of Things’ rapid expansion, means it’s more important than ever to make sure that you don’t allow dangerous devices to access your network. To keep your network safe, there are a few Mobile Device Management best practices that you should begin enforcing.

Define Acceptable Devices and Limitations: To prevent the abuse of your network, it’s a good idea to define which type of devices are allowed. Even though there have been some improvements in IoT security, many devices still have no defense and put your network at risk when connected. A good way to protect your data and network is to only allow network access to devices that can be used in a professional capacity.

Of course, there is also a distraction-factor when there is an excessive use of these devices – even if they’re technically allowed. For example, if you have several employees with smartphones, laptops, tablets, and wearable devices that are all constantly sending and receiving data, the likelihood of interruption increases and productivity decreases. Consider limiting the number of devices per person that are allowed to access your network at one time.

Develop Access Policy: One of the biggest reasons for data loss is accidental human error. To make your employees aware of the dangers of abusing the use of mobile devices on your network, it’s a good idea to create a policy that makes them aware of their role. The policy should include password requirements, antivirus expectations, privacy terms, data loss security reporting process, and even things like penalties of texting and driving while using a company device.

Mobile Device Management Solutions: To take that extra step beyond developing/enforcing a policy regarding the use of mobile devices, a mobile device management solution (MDM) gives your company more control over mobile devices on your network. MDM applications enforce proper use, as well as requiring maintenance and security patches to be up-to-date. Many of these MDM solutions have the ability to remotely wipe data from the device in the event it’s lost or stolen.

Studies show that employees who are allowed to use their personal mobile devices for work are more satisfied with their job. Smartphones and mobile devices are a permanent part of business technology and can’t be ignored. With the constant threat of cybercrime, SMBs need to be vigilant about allowing only authorized users to connect mobile devices on their network. Questions on keeping your network safe or if an MDM solution is right for you? Contact us at PHONENUMBER.

Categories
Casserly Consulting Blog

Microsoft Word Makes Collaboration Easier With Co-Authorship

microsoft_office_collaboration_400.jpg

Does your workforce have the option of working together on a document in Microsoft Word? This type of collaboration is something that is much desired in business today. One of the best ways to take advantage of this collaboration is through Microsoft Office 365’s built-in sharing features, which allow your workforce to work together on various initiatives.

Cooperate and Collaborate
If you need multiple users to access the same document, you can use Microsoft Office 365 to allow for it. You can review and edit documents in real time, but before doing so, you need to allow access to these documents by your staff. 

First, open a new document in Word 2016 or Word Online. Once you’ve done so, select Share, and then Save to cloud. You can share the document in OneDrive or in a SharePoint Online location. Once you press Save, you’ll be able to share your document. Just select the Share panel and you’ll have several options for doing so. You can select Invite people to summon additional assistance from others in your organization, or Get a sharing link to send the invite out through email or instant message.

Once the invitations are sent and accepted, your team can then access the Word document and make changes. If you allow these changes to be made automatically, everyone will be able to see them as they happen.

Communication is Critical
You can’t have collaboration without communication. There are plenty of solutions available that help your business keep in touch while working together on a project. Microsoft Office 365 has a leg up on the competition because of its built-in integration with Skype for Business, allowing you to send messages or talk to anyone while working in a document.

Word also keeps a complete record of any changes made to your document so that you always have access to various versions of your documents. This makes it quite an excellent way to see who has made which changes, and when. Of course, the best collaboration happens when your workforce knows the endgame of the project, and they can then work toward a common goal moving forward.

In fact, many of these features are also available in other Microsoft products, including Publisher, Excel, PowerPoint, and more.

Which of these features do you use most often in Office 365? Let us know in the comments, and be sure to subscribe to our blog for more great tips and tricks.

Categories
Casserly Consulting Blog

Tip of the Week: Drag and Drop Between Android and Windows

android_file_transfer_400.jpg

Smartphones have proven to be excellent devices for enhancing an employee’s ability to be productive while mobile. However, this approach often means that company work is now on an employee’s mobile device, instead of on your network. This issue can be easily resolved if the mobile device in question runs the Android OS. We’ll go over how for this week’s tip.

Android-to-PC File Transfers
Due to the fact that an Android device allows you direct access to its file system, it can essentially serve the same purpose as your standard external hard drive. Just as you would plug an external hard drive into a computer to move data, you can most likely use the charging cable for your device to connect it to your workstation.

Once your smartphone is connected and unlocked, you should be able to find a notification informing you that the device is charging. Tapping the notification will bring up a menu of the USB connection capabilities, for which one option is “Transfer files.” With that enabled, open File Explorer on your workstation. Your Android device should be accessible through the File Explorer menu.

Accessing your device this way will allow you to browse through your files and copy them over to your PC.

Safely Leveraging BYOD
Of course, security should always be your first concern when implementing a new process. Even a process as small and simple as transferring files from a mobile device needs to be approached mindfully for the business’ safety. A Bring Your Own Device, or BYOD, strategy may be tempting to implement to help cut the costs of equipping your entire staff with company mobile devices. However, if you elect to enact BYOD practices, you need to be sure that you are properly prepared to deal with any risks associated with them. That’s where we come in.

COMPANYNAME can help you to establish a BYOD strategy that meets the needs of your business–without exposing it to undue risk. Call PHONENUMBER to get started.

Categories
Casserly Consulting Blog

3 Reasons VoIP Is An Improvement Over Traditional Telephony

virtual_telephone_400.jpg

Do you still rely on a traditional telephone system to keep in touch with clients and internal departments? This can be a severe issue for your operational budget. While your employees might be accustomed to having the physical phone on their desks, virtual phones are becoming a major contender to replace them for all different types of businesses.

Voice Over Internet Protocol, also known as VoIP, has a surprising amount of benefits over its traditional contemporary. Here are some of the best features of VoIP that make it a dynamic and flexible choice for your organization.

Flexibility
Have you ever had to step away from your desk while you’re on the phone? With the static lines tied to the corded phones of old, this was an impossibility. Even if it is a cordless phone, chances are that it’s limited to a certain range, even within your office. VoIP can completely change the way you look at a telephone solution.

VoIP has options that lets your employees take their duties on the road, allowing them to communicate with any connected device. You can use VoIP applications on a laptop, smartphone, or even a desktop. All you need is the right software installed. Your employees can take their conversations on the road, be it for a business trip, a walk down the street, or burning the midnight oil at the home office to meet an important deadline.

Functionality
Knowing what your phone system can do is incredibly important. Sometimes your phone system will come with various other services like your Internet or television packaged together. When this happens, service providers tend to nickel-and-dime you for everything they can get for simple conferencing solutions. Depending on what your services come attached to, you may need additional features that aren’t already included.

VoIP allows your organization to spend fewer resources on services that you may not want or need, and free up more funds to spend on what you absolutely need. For example, you can get all of the services that you want and need with VoIP, including call forwarding and conference calling, but without going all-in on a service that forces you to pay for television or other services. This helps your business be more productive and lucrative without dropping more than necessary on unused services.

Cost
Your traditional telephone system will wind up costing you more in the long run thanks to its plethora of services and features that don’t do anything for your bottom line. Since these companies require various services to be purchased in a bundle, they cause more trouble than they are worth–particularly in regard to long-distance charges. It might seem like you’re getting a great, varied service, but you’re just spending money on things that you don’t need.

Unlike traditional telephone systems, VoIP lets your organization benefit from significant cost savings. Since you’re only using your business’ Internet connection, you’ll spend less on implementation fees and running wires around your office. All you need to think about is your bandwidth, but that’s easy enough to figure out compared to all of the headaches that come from a traditional telephone service. We can help you work out a plan where you get all of the services that you want, all budgeted into a monthly payment that works for your specific needs.

Does your business need a new communications solution? COMPANYNAME can help. Your organization can take full advantage of VoIP to augment communications and change the way you do business. To learn more, reach out to us at PHONENUMBER.