Categories
Casserly Consulting Blog

A Brief Dive into Digital Signatures

sign_digitally_400.jpg

Think for a minute the power a signature has. Signatures have started and ended wars, they have committed whole nations of people to rule of law, and they are attached to birth and death. For the individual, the signature is one of the most powerful possessions. You can use it to acquire money, property, and transportation. You use it to enter agreements and to end agreements. With so much importance squarely focused on the signature, it seems curious how people today are now signing documents digitally; but, with the security behind this solution, people won’t have to be on hand to sign with theirs.

Nowadays, businesses often choose to utilize electronic documents to reduce printing costs, and to provide remote workers the ability to sign mandatory documents without the need for postage or travel. Besides, more businesses are attempting to go paperless and do away with their bulky filing cabinets, ensuring that finding documents is an easier task.

Up until recently, if something was to be signed “electronically” it would still have to be printed out, signed, and returned to the organization that needed the signature, either by mail, or by scanning the document after a signature was completed. Now things have progressed to the point where many PDF editing software titles provide a perfect solution to this problem through their digital signature features.

Understanding the Digital Signature
Since official documents aren’t worth much without a signature, it was important for people to develop a way to sign documents remotely, since people can’t always be in the same place all the time. The old print, sign, and scan method may as well be called the print, sign, and scam method. It would be simple for people to forge the signature onto an important document, setting in motion a series of unfortunate events.

PDF software mitigates this risk since a digital signature is more than a graphical representation of a signature. It is rooted in cryptography, the same technology that protects nearly every secure transaction that happens over the Internet. It works like this: the digital signature uses digital keys to confirm the attachment of your identity to the document that is being signed. In fact, these encrypted digital signatures are far more difficult to forge than a typical paper document as long as the keys that were used to create the field are kept secure.

Just as a physical signature, inside a digital signature solution, you will see the graphical representation of your signature, a common name of your choosing, the location where you signed the document from, and of course, a time stamp displaying the date and time you applied the signature to the file.

Not all PDF software solutions provide the full variety of features needed to create digital signatures. Without one, however, your organization will be less flexible, and as a result, move slower than it would with a dedicated electronic signature solution. By pairing the features the modern PDF program has with an electronic signature, it will cut down on postage and printing costs and help your business move faster.

For more information about digital signatures, contact our IT professionals at PHONENUMBER today.

Categories
Casserly Consulting Blog

Tip of the Week: Seven Extensions to Add to Chrome

chrome_extensions_400.jpg

Google Chrome is the most popular web browser in the world, and for good reason. The browser has many useful features, largely due to the user’s ability to install ‘extensions’–applications that add to the browser’s functionality or the user’s experience. Once an extension is added to the browser’s toolbar, it is ready for the user to use whenever they need.

Here are a few examples of Chrome extensions that offer a user a useful function.

Select and Speak (SpeakIt!)
By leveraging the human-quality text-to-speech abilities of iSpeech, Select and Speak (SpeakIt!) can read out any text that has been selected in the browser. The user can select a language from a considerable list and adjust the voice and speed of the program to make the best use of the reader for their needs. However, this extension is clearly annotated as being for personal use, so make sure to contact the developer to obtain a license to use it in any other fashion.

Download Select and Speak (SpeakIt!) here:
https://chrome.google.com/webstore/detail/select-and-speak-text-to/gfjopfpjmkcfgjpogepmdjmcnihfpokn?hl=en

Readism
It isn’t uncommon for many jobs to require an employee to read articles online. It also isn’t uncommon for a user to suddenly realize that the article they’ve committed to reading is considerably longer than first estimated. Readism takes the guesswork out of the user’s hands by scanning a page for content and delivering an estimated reading time.

Download Readism here:
https://chrome.google.com/webstore/detail/readism-article-reading-t/bmiolhceebkeljaikojgcoeefblcihje

Honey
How often do you do your shopping online? If you’re like many people, it’s fairly frequently. Honey gives you an added bonus as you shop online by providing you with coupon codes for the site you’re browsing. Honey currently supports retail sites in the U.S., Canada, Australia, the United Kingdom and India, plus global websites–and more websites are always being added to their databases. For the avid online shopper, Honey helps keep money in your pocket and the balance on your credit card down.

Download Honey here:
https://chrome.google.com/webstore/detail/honey/bmnlcjabgnpnenekpadlanbbkooimhnj?hl=en-US

Unshorten.Link
Shortened URLs can be a double-edged sword. On the one hand, they make it more convenient to browse the Internet, but they can also be used to hide URLs that could put you and your system at risk. This extension, as its name states, will un-shorten shortened URLs and check them for malware, giving you a clearer picture of exactly where the link will send you. This extension even removes known tracking cookies from the URL, keeping you that much safer.

Download Unshorten.Link here:
https://chrome.google.com/webstore/detail/unshortenlink/gbobdaaeaihkghbokihkofcbndhmbdpd

ColorZilla
ColorZilla is a comprehensive tool for analyzing the color of web content, giving you the code for the precise shade and hue you find. With a color picker, eyedropper and gradient generator included in the same tool, ColorZilla gives you a clearer view of what you’re looking at, without taking up too many of your resources.

Download ColorZilla here:
https://chrome.google.com/webstore/detail/colorzilla/bhlhnicpbhignbdhedgjhgdocnmhomnp?hl=en

SessionBuddy
As a session and bookmark manager, SessionBuddy helps to avoid browser clutter and frees up your computer’s memory. By saving open tabs, this extension allows you to restore your tabs after a crash or unexpected shutdown.

Download SessionBuddy here:
https://chrome.google.com/webstore/detail/session-buddy/edacconmaakjimmfgnblocblbcdcpbko?hl=en

MightyText – SMS from PC & Text from Computer
This extension effectively turns your Chrome browser into another means of sending SMS and MMS messages. Any messages and texts you send will still be transmitted using your phone, and therefore, its number. What makes this extension different is the fact that you can still use your smartphone to text as well.

Download MightyText – SMS from PC & Text from Computer here:
https://chrome.google.com/webstore/detail/mightytext-sms-from-pc-te/dkfhfaphfkopdgpbfkebjfcblcafcmpi?hl=en

Google Chrome is constantly improving with each new extension that is added to help its users. Which extensions do you feel are most valuable? Which ones should have made our list? Leave a comment to let us know!

Categories
Casserly Consulting Blog

Security Terms That Every User Needs To Know

patching_information_400.jpg

Chances are that you’ve seen quite a lot of stories on the Internet, or in the news, about the many security threats out there. Some of these, including ransomware, exploits, and reluctance to update software, might fly over your head if they’re not part of your everyday business vocabulary. Knowing what these terms mean is of the utmost importance in today’s workplace. We’re here to help you understand what some of these security terms mean for your organization.

Ransomware like WannaCry are one of the primary reasons why it’s so important to understand how network security works, and all of the terminology behind it. After all, hackers understand how to exploit your network’s weaknesses, so you’ll want to know all about the primary way to protect your business’s data from them: security patches.

These patches are issued by software developers to resolve certain issues or troubles found in their products. For example, a patch might be designed to address a recently found vulnerability in the program’s code, or resolve a particularly troublesome issue with the user interface. Understanding how these patches work is critical if you want to ensure the security of your business, your personal computer, and everything in between. Here are five of the most common terms used when speaking of security patches.

Patch Tuesday
Even if you allow your computers to update and install patches automatically, you should still have an idea when these patches are installed. Microsoft has a set schedule that they use to release these patches. They are released on specific days of the week, including the second Tuesday of each month, and sometimes the fourth as well. Perhaps in the future, data exchange will allow newer operating systems to be updated more frequently, or at the very least in real time, keeping your systems more secure.

Security Patching
Patches are basically issued to fix something that’s wrong with a computer application or program. It is these patches and updates that are provided on all of the official patch days, like Patch Tuesday. Of course, immediate patches to imminent threats of Microsoft’s software are issued for release as soon as one is created. These zero-day threats are so dangerous that they need to be resolved as soon as possible, making them top-priority for your organization.

Hotfixes
These are sometimes called quick fix updates, quick-fix engineering updates, and general distribution releases. These hotfixes generally include a patch that fixes just one small thing wrong with your application. These small issues are usually important enough that they need to be issued immediately without waiting for the next batch of patches. Even though Microsoft has long since forsaken the term “hotfix” specifically, it’s still used as a common way to refer to these fixes in the technology sector.

Zero-Day Threats
These types of weaknesses are those that are being used by hackers even before they are discovered by security professionals. The name “zero-day” refers to the fact that the software developers have no time, or zero days, to develop a patch to resolve the issue. These are some of the most dangerous threats out there, and need to be a priority for companies trying to keep damage to a minimum.

Whitelisting
Whitelisting is the process through which a patch or application is deemed secure or safe for your business. This allows your whitelisted app to access information found on your network. Contrary to whitelisting, blacklisting is the process of banning network access to certain apps. Whitelisting was a popular term used to discuss the security patch resolving the issue with the WannaCry ransomware, as IT departments wanted the patch to be “whitelisted” first to guarantee that the patch would be enough to stop it.

Is your business security-savvy enough to identify major problems with your network infrastructure? To learn more about how you can protect your business, reach out to us at PHONENUMBER.

Categories
Technology

Don’t Worry, Your Samsung Phone “Winking” at You is Just a Cool Feature

b2ap3_thumbnail_samsung_smart_stay_400.jpg If you’re a Samsung smartphone user, have you ever seen a little eyeball symbol appear at the top of the screen? You might notice that it will show up for a minute, and then disappear again. Since this kind of activity usually makes users question what’s going on with their device, let’s get down to the bottom of this weird occurrence.

To assuage your fears that you’re being watched by some sort of malware or spyware, know that this eyeball icon doesn’t mean you’ve been hacked. Instead, it’s a feature called Smart Stay created by Samsung. When the eye appears, the feature is activated.

What is Smart Stay?
Smart Stay uses your front facing camera to tell whether or not you’re looking at the device. While this sounds a bit creepy, the camera can use your face to keep the screen from turning off while you’re looking at it–like, say, when you’re reading an article on the Internet that’s particularly long. This actually overrides any screen timeout settings, so it’s a great way to finish off whatever you are reading without having to press a button every now and again to keep it lit up.

To change the settings of Smart Stay, you just go through to Menu > Settings > My Device > Smart screen. All you have to do is uncheck the Smart Stay box to turn it off. Depending on how helpful you find this feature, you might actually prefer to keep it on.

How You Know You Have Something to Worry About
While Samsung’s Smart Stay isn’t something to worry about, there are other symptoms of hacking attacks on your mobile device that you want to keep in mind should the need arise. Depending on the type of problem, the symptoms will vary, but keep the following in mind if you suspect something out of the ordinary.

  1. Unfamiliar charges on your carrier’s statement.
  2. Data access patterns that you don’t recognize.
  3. Your battery drains quicker than normal.
  4. You find apps that are downloaded from a third-party app store.
  5. Strange notifications start appearing, especially related to finding and downloading new apps and games.
  6. Your device has been rooted (aka jailbroken).
  7. Your antivirus has been disabled.
  8. You actually see the hacker’s remote actions of opening apps and navigating your phone.

If you ever have reason to suspect that your phone has been hijacked, make sure that the first thing you do is turn off the device’s Internet connection and power it down as soon as possible. Once you’ve done this, consult your trusted IT professionals at COMPANYNAME. We can remove the threat before it causes any more damage to your device.

A little healthy skepticism never hurt anyone, so be sure to approach issues with your device with a grain of salt. To learn more about how your business can identify troubles with technology, reach out to us at PHONENUMBER.

Categories
Technology

What Your Software Has in Common With the Food in Your Fridge? An (EOL) End of Life Date

b2ap3_thumbnail_expiring_software_400.jpg It’s a well-known fact that nothing in this world lasts forever (other than Twinkies), and this pertains to your technology more than perhaps anything else. The same solutions that you’ve been working with for years will also need regular updates and improvements in order to stay relevant to your organization.

When you think about it, making sure that your software solutions are always up to date is sort of like keeping your kitchen cabinet full of foodstuffs that haven’t spoiled. Both the software developer and the food producer offer resources that are absolutely crucial in the modern world, and both create products that frequently need to be replaced in order to function as intended. Both offer sustenance to something or another; yet, how similar are they really?

A food producer will tend to focus on offering delectable foods that taste great and offer nutritional value, while a software developer will work toward creating user-friendly solutions and patching up vulnerabilities. Any improvements made tend to be focused on security, but often times the developer will add new features or improve the user interface to offer a better experience as a whole. Primarily, the patches issued resolve problems that hackers can take advantage of to infiltrate your organization and cause trouble.

These improvements are one of the reasons why you might receive notifications about updates available every so often. In fact, they are so frequent that if you don’t implement them as they are released, you could quickly fall behind on network maintenance.

Returning to the food analogy, let’s take a look at a convenience that most businesses have: a break room fridge. If each of your employees keeps a single cup of yogurt in this fridge, and it goes uneaten, it will naturally spoil. However, if you keep this spoiled yogurt in the fridge, despite it being practically inedible, someone will eventually try it out. This could result in employees getting sick.

Whether it’s poor productivity from being ill all day or software that’s missing critical software updates, the result is the same: the potential for a really bad time. If you have someone whose responsibility is to “restock the fridge,” you can keep your organization from being exposed by the sudden, gut-wrenching sickness of a hacking attack.

COMPANYNAME can be the ones to keep an eye out for anything that needs updates or patches on your network, and better yet, we can do all of it ourselves without interrupting operations. This keeps you from taking valuable time out of the day to do it yourself, and you can know for certain that your software solutions are being handled with the care they deserve. To make sure that your business’s network security doesn’t reach its expiration date, reach out to us at PHONENUMBER.

Categories
Cloud

Your Plate is Full Enough. Updating Software Shouldn’t Be on It

b2ap3_thumbnail_enterprise_software_updates_400.jpg Making sure that your company’s software solutions are up-to-date is something that should take priority, but it’s a chore that’s difficult to perform without a little help. How can you make sure that security patches and updates are always implemented, without sacrificing all of the time and effort required to do so? Even if you don’t think you need them, we promise that they are worth your time–or that of your IT staff.

There’s no way around the importance of implementing software updates, no matter how hard you look for it. In terms of preventing threats from taking advantage of existing vulnerabilities in your software, applying patches is one of the best countermeasures that you can take. You want to make sure that you are taking a calculated approach to your updates so as to make sure there are no cut corners or mistakes being made.

Having a Maintenance Routine is Crucial
From a break-fix IT standpoint, your business will only get much-needed software updates when something goes wrong with your IT infrastructure. This is counterproductive, as you want software patches and security updates to be installed as soon as possible, following their release. Plus, it’s just bad business for a break-fix IT company to do something for you that would keep your technology from working properly. After all, their entire business model relies on your technology not working as intended, so why would they go out of their way to update your software?

Having someone be in charge of implementing software updates is the best way to make sure that this task actually happens. This also presents another important question: do you have employees who have time to do all of this? Keep in mind that software updates need to be done in a timely manner, and it’s likely that they will need to be performed after-hours, so as not to disturb daily operations.

So… How Do You Do It?
For organizations that have an in-house IT department, the responsibility of software updates will usually fall to their technicians. Considering how many things can go wrong if this doesn’t go according to plan, you want to make sure that this process is only handled by professionals. For businesses that don’t have the technical know-how, managed service providers allow for outsourced maintenance–including the remote implementation of security patches and updates. This means that you don’t have to use your company’s time and resources to implement software updates, allowing you to focus on keeping operations running.

Even businesses that do have an internal IT department can benefit from a remote monitoring and management solution. If you find that your IT staff is overworked and they don’t have time for mundane, time-consuming tasks like applying updates, COMPANYNAME can provide co-managed IT care to help your team. While your IT staff is busy innovating, we can take care of the tasks that nobody really wants to do, like issuing software updates to all workstations on your network.

Besides updating your workstations, other available updates for your technology can also be handled relatively easily by our team. Here are a few examples that you’ll want to keep in mind as you decide how you want to implement your software updates.

  • Operating systems: Remember the fiasco from a couple years ago when Microsoft stopped supporting its popular operating system, Windows XP? This is what can happen if you don’t routinely update your operating systems. You’ll no longer receive security updates and you’ll put your company’s sensitive data in jeopardy.
  • Legacy applications: When you rely on mission-critical software, you might be hesitant to implement patches or upgrade the software. Therefore, you need the assistance of technical experts who can help you either move away from legacy applications or install updates in a way that won’t cause downtime.
  • Hardware quality: Thinking beyond just software, your hardware needs regular attention as well, if you want to make sure operations aren’t hindered by unnecessary downtime. Hardware refreshes should be considered in tandem with your software updates, as there’s no reason to update the operating system on a failing piece of hardware when you can kill two birds with one stone by simply ordering a new workstation.

Does all of this sound intimidating? Reach out to COMPANYNAME and you’ll never have to worry about software updates again. To learn more about what we can do for your SMB, reach out to us at PHONENUMBER.