7-bit#, 7-bit#-not PW123 – A Password Primer

This headline depicts how passwords are written and stored in your computing environment. We won’t go into heavy details, but it essentially works this way.

When you put letters – upper and lower case – and numerals and special characters into your password, the storage system records them in a code involving 7 bits and a # symbol. Hackers have learned that if they attack your password in #s, or hashes, they have a shot at cracking your password.

When you change just one special character – or number or letter, you’re only changing one #. You’re actually making your security worse when you do that, especially if you have a really simple password and depend on a &, $ or @ to keep your passwords secure.

Here’s what you need to know about keeping them secure, and if you understand the principles, you’ll know why passwords can’t go away fast enough.

  • Don’t change just one number or special character. If someone has managed to get close to your password, it doesn’t take much run a program that swaps out 10 numerical characters and maybe eight special characters.
  • Don’t use short passwords. A computerized analytics program can run through a short combination of letters and characters faster than you read this sentence.
  • Do use long passwords with combinations of upper- and lower-case letters, numerals and special characters.
  • Do change several numbers and/or special characters when you change your password.
  • Do make your passwords illogical. We all try to keep some semblance of something we can remember because we need to have passwords for so many websites or apps. But if a hacker catches onto your logic, you’re more vulnerable.

We can’t emphasize strongly enough that password and internet security get more critical every day. Hacking and ransomware attacks get more prevalent, and the stakes are higher as we digitize every aspect of our corporate and personal lives. Governments, agencies and school boards – Livingston here in NJ being the latest – have fallen victim to ransomware attacks, and all face the agonizing decision of whether to pay up or try to recover their data. The latter can take longer and be more expensive than the ransom payment, but for some, it’s a matter of principle.

This leads us to four other recommendations when it comes to passwords and internet security:

  1. Use fake answers for the security questions that accompany passwords on many websites. So many of them involve facts that are the matter of public record, including addresses, your first car and your maternal grandmother’s middle name.
  2. Use a password manager program – and let it generate random passwords for every online account you have or ever hope to have. You just need to remember one password, and you can use it to download every password you have if and when you need to know each one.
  3. Have a real backup program for your data. OneDrive and Dropbox are good for storage, and you can recover your data file by file. A backup program such as Azure allows recovery and restoration more efficiently.
  4. Switch from passwords to biometrics whenever and wherever you possibly can. Biometrics are becoming more available, and it makes sense to incorporate them where you can.

Contact us by phone – 973-433-6676 – or email to talk about a good backup program, a password strategy and/or moving to biometrics. And above, practice safe password protection.

Technology Years and Dog Years

Dog owners are used to extrapolating their pet’s age into more human terms by multiplying their age by seven. A 10-year-old dog is roughly the same “age” as a 70-year-old person. A technology year can be more like 20 human years; your 3-year-old computer could be more like a 60-year-old person. If you have a business, old technology can hamper employee retention because there are only so many tricks you can teach an old computer.

It makes good sense to keep your technology younger and more athletic because employees feel old systems hold them back. This is especially true for employees who work remotely, including salespeople. Older systems are not as adaptable for security measures to get to protected data they need to do their jobs better. Nor are they able to accommodate the new ways innovative employees find to do their jobs more efficiently. We’ve talked to many people who have accepted less money at new jobs because they want the opportunity to improve their skills and performance levels in ways that could lead to higher pay later.

The Windows 7 end of life should give business owners with old technology reason to rethink their technology. A 5-year-old system still running Windows 7 is like a 100-year-old person who has really slowed down physically.

That’s well past the retirement age, but even more, it illustrates the problem of old technology. There are no nursing homes for old technology. The industry just doesn’t support old software and old hardware. Technology arteries harden, becoming less flexible and subject to fractures. Even if you have a Windows 10-based system, older versions of office present the same symptoms of aging. Employees are not able take advantage of new features, and that prevents them from increasing their work throughput.

Our clients who have invested in Office 365 subscriptions are benefiting from an improved work environment. Employees are “playing around” with newer, more powerful tools to do their jobs better. The Microsoft Teams tool is a major upgrade over Skype for Business. We’ve seen employees use Teams to set up meetings, share screens and use other collaborative tools, including video conferences, to get more work done faster. Any business that relies on field technicians, for example, can let them use these tools on their cell phones to chat with office-based resources and solve their customers’ problems faster and more efficiently.

If you have Office 365, all these advanced tools are part of your package. Call us – 973-433-6676 – or email us to help you determine the tools and features that are best for your business and to help you set them up with your employees. We can also help you make sure your current hardware has the capacity to help you make use of your new tools.

‘30’ and New Routers

Thirty seems to be the magic number for wireless devices connected to your Wi-Fi network. Many homes can easily have 30 or more devices and getting proper signals to all of them can be like trying to squeeze 10 lanes of traffic into four. Moving to a router that encompasses Wi-Fi 6 capabilities is an electronic way to expand your in-home “information superhighway” to the 10 lanes you need for your devices perform as designed.

Accommodating 30 wireless devices is hardly overkill. In fact, it may be the minimum capacity for the average home. Think about what you might have and what you could have.

At last count, we have 64 wireless devices in our home, including our mailbox. Yes, the USPS mailbox that’s located at the bottom of our steep driveway. I really don’t feel like making several trips down to the street – and back up the driveway – just to see if the mail has been delivered. I can also remotely see every time the mailbox is opened, which can alert us to possible theft.

Even without a connected mailbox, many homes have Alexa devices or smart speakers in multiple rooms, or you may have Sonos speakers in multiple rooms tied to your entertainment center. If you’ve cut the cable cord, you’re streaming video to TVs or other devices – many of them in 4K. Family and friends could be using the internet simultaneously from your network on computers, tablets or phones, and then you may have number of smart devices for home security and convenience. Oh, don’t forget that 5G cellular standards are just around the corner, and they’ll generate a lot more traffic on your network.

If we learned anything from the movie Back to the Future, it’s that you can never anticipate where technology can go. Things that were thought to be way into the future then have been commonplace for several years.

Wi-Fi 6 comes with several upgrades that will significantly improve wireless capabilities. In operation, they improve efficiency by dividing the allotted radio spectrum into smaller units and adding new data channels to handle even more data. Other enhancements include smarter traffic management and less wasted battery life on connected devices. As a result, you’ll get better wireless connectivity, smoother performance and faster speeds for every device on your network.

You can expect the individual changes in Wi-Fi 6 to add up to a maximum throughput of over 10Gbps under ideal conditions. Right now, we consider 1Gbps to be the gold standard. Wi-Fi 6 will be able to keep a step ahead of the diversity of devices in homes to allow simultaneous 4K video streaming, gaming and use by a wide variety of smart home products, such as door locks, thermostats and remotely controlled light switches. And if you have a house full of gamers, we don’t need to tell you how bigger, faster Wi-Fi networks can make life better.

As our population advances, Wi-Fi 6 could even lead to more devices and systems that can help the elderly age in place in their homes. And it could make artificial intelligence (AI) a more effective enhancement for new technological tools. Who knows where it could lead?

As we write this, Wi-Fi 6 routers are just coming on the market – with Wi-Fi 7 lurking in the wings. Here are some router replacement tips to help you take advantage of the still-new Wi-Fi 6 technology.

First, think about if you really need it now. Most of the devices you now have may not be able to take advantage of Wi-Fi 6, even though it will improve your network’s performance. If you don’t find your devices are choking your network, you could wait. There’s also pricing. Even though you’ll see a lot of “special” prices during the holiday shopping season, prices are likely to come down later.

Second, even though the new routers are fast, their speed is still limited by the speed your ISP (internet service provider) delivers. It’s like having a really great road and a not-so-fast car. You won’t be able to go fast enough to take advantage of the possible thrills and chills.

Third, look for things like mesh net capability, the number of ports and the speeds of the ports. Then, try to imagine the number of devices you might add in the next few years and what you’ll ask them to do. You’ll need to think about those things to do a more accurate cost/benefit analysis.

Finally, consider the age of your current router. If it’s more than five years old, it may not be able to support better security measures, and that may be a more important consideration than pure speed.

We can help you decide about your router and replacement options. Call us – 973-433-6676 – or email us to discuss your needs.

Microsoft ‘Ignites’ Tech Initiatives

We’ve all grown along with Microsoft, starting with its DOS operating system and moving through Windows and its many reiterations and the package of Word, Excel and other apps that evolved into Office 365. It’s fair to say the company and its products are entrenched in our daily lives, like it or not. At the Ignite technical conference, they showed how they’re digging deeper.

Delivering the keynote at this year’s Ignite conference, Microsoft CEO Satya Nadella highlighted the company’s latest product and service launches, including new tools and services for the Azure cloud platform. Most of you are familiar with Azure because we’ve built your backup services on it. We’ll talk more about Azure and backup services in Azure – Always at Work in the Background, but Nadella’s talk showed how all the technology is tying together to ultimately give you more computing power.

“We want every organization to be a digital software company. And that means you all need to have the capabilities to be able to turn every organization into a digital company,” Nadella said. “In fact, our goal is to commoditize digital tech. We don’t want it to be just the province of a few companies in the West Coast of the United States or the East Coast of China…we want every company out there to be a tech company in its own right.”

Let that sink in. Whether you are a small business, a home-based business or a family user, Microsoft wants to treat you as a digital company. We can trace our path to this point from the time that Microsoft opened Office 365, OneDrive and Azure to the smaller users. It’s enabled all of us to share in the technological advances made possible by the economies of scale – and it will only get better.

Nadella touted the introduction of Azure Arc as the beginning of a new era in hybrid computing. Boiled down to simple terms, hybrid computing allows data and applications to be shared across public and private cloud environments – server systems. It will, in turn, enable companies – and you, eventually – to switch seamlessly between private servers used for sensitive operations and public servers for less sensitive operations. That will add speed and ultimately let you pay only for the service you need. Nobody will need to build systems to handle spikes in operations because the hybrid system will handle the supply-and-demand needs of users. Everyone will benefit from flexibility, scalability, and cost efficiencies with the lowest possible risk of data exposure. Azure Arc will be enhanced by open-source projects that will allow developers to build and deploy more power applications.

With the introduction of Azure Synapse, Microsoft will offer data warehousing and big-data analytics, using cloud-native memory hierarchy and storage hierarchy to redefine the rules around analytic workloads. It will bring together two separate categories, data warehousing and big data – in ways that integrate analytics systems. Eventually, this capability should filter down to smaller users who need it on an affordable scale.

Two other products that caught our eye are:

  • Project Cortex is an AI (artificial intelligence) initiative that works with Office 365 to classify and categorize content, such as documents and email, to gain greater knowledge within their context. It is expected to be generally available during the first half of 2020.
  • Project Silica will use quartz glass as a storage device. The company is collaborating with Warner Bros., who stored the original 1978 “Superman” on a piece of glass approximately the size of a coaster. Project Silica uses laser optics to encode data in glass and then uses machine-learning algorithms to decode the data. It’s said to be incredibly durable.

As time goes on, we may be able to incorporate some or all these advances into your technology or business operations. Some of these advances may involve new computers, services or networks to help you take advantage of the benefits that apply to you. We can help you plan for these and other developments. Call us – 973-433-6676 – or email us to talk about where your business is heading and how we can plan for the most efficient acquisition and deployment of suitable systems.

Azure – Always at Work in the Background

Microsoft’s Azure platform has been our backup program of choice for clients since Office 365 became a product for small businesses and home offices/users. We like that it’s a living system – one that continues to evolve and grow.

If you read the article Microsoft ‘Ignites’ Tech Initiatives, you couldn’t help but notice that Microsoft is throwing massive resources behind Azure as a technology platform. As we see it, Azure will become an even stronger backup resource as it helps you use your data files and apps more efficiently. That said, you need to make it your backup program – or at least one of your backup programs – if you want to take advantage of advancing technologies.

Backup is a misunderstood term in the context of IT services. We define a backup as an extra copy of data from a computer. Simply putting data in the cloud – even with OneDrive through Office 365 – is not a backup; it’s storage. Now, it can be useful – even vital – to store data in at least one cloud and on some sort of external device that’s separate from a computer or office server. But it’s not backup.

Why is backup critical? Two scenarios come to mind: 1.) a catastrophe that wipes out your computer or cloud-based server and 2.) a rogue employee or hacker getting into your account and deleting files. The big issue in both scenarios is recovery.

Azure solves the recovery issue for us because it works seamlessly with Office 365, including Outlook and its PST files for your email. For some, backing up email may be more important than backing up files.

As an IT professional, I like Azure’s ability to generate reports – with more capabilities coming online all the time. Microsoft constantly uses customer feedback to add more power to the platform. That gives us the ability to go back into our clients’ backup records to trace incidents and to restore files after a catastrophic event. That’s critical because it can be 90 days – sometimes longer – before a hack or data loss is discovered by a client. When that happens, we can go back in time through the power of Azure to find data files that help us help you recover.

As a set of powerful tools, Azure needs to have respect from users. Yes, you can go into Azure, but you can also create havoc with your systems and our work if those tools are misused. One of the things that drives me crazy is when we look like we don’t know what we’re doing when restoring files because somebody messed with the system.

That being said, we believe in educating our clients. If you want to learn more about how your Azure backup is set up and see what it can and can’t do, we’ll be more than happy to give you a remote tour. Call us – 973-433-6676 – or email us to book your tour of your system.

Backup and Security

What happens when you use the cloud to store files encrypted for security instead of backing them up properly? You can face huge expenses, compounded by the consequences of lost data.

Let’s set a scene to show you how things can play out.

When your files are backed up or stored, they can be encrypted. That’s not a bad thing because it can add a layer of security, and it can help your cloud provider make better use of their server space. However, you and anyone who works on your IT system must make sure that all your system software stays intact.

We had a situation with a client that shows how multiple missteps can create exponential problems. The first misstep was that Windows updates had not been installed. We can’t emphasize enough how important it is to install updates, which include security measures and bug fixes. Without the bug fixes, you’ll run into a problem somewhere along the line that causes a performance failure.

The client decided to call in another IT person to fix the problem that arose with their system. During the diagnostic process, that tech erroneously removed a vital part of the system software, which included the encryption key for stored files. The net result was that the data files could not be restored when they thought the problem was fixed.

Fortunately, the client still had their old computer, which had been sitting in the office for a year. It wasn’t ideal, but it helped. Because they had Office 365, they were able to restore their Word and PowerPoint files, but they lost their QuickBooks files and a year’s worth of data because there was no effective backup in place for the files. They had to be recreated – painstakingly – at the cost of time and money.

We see three lessons for everyone based on our client’s experience:

  1. Install your updates. While security updates are top-of-mind for most users because of prevalent hacking, you can’t overlook the bug fixes. Bugs will cause performance problems that you’ll recognize and motivate you to take corrective action, which brings us to the next point.
  2. Use IT consultants who know what they’re doing. Cheaping out on a service provider compounds the effects of not keeping your software up to date. Today’s tech systems are complex, and your IT tech must know where to go and where not to go within your system. When someone uninstalls software, for example, they must have the encryption key to restore software.
  3. Have a good backup program in place. Cheaping out here, too, can have dire consequences. Again, we go back to Azure and Office 365. Together, they store and encrypt your files on secure servers. And because they’re in the cloud, you can access your files from any device that has internet access. Ultimately, that means you should be able to recover your data in the event of a catastrophic event.

We can help you with any technology issues, including system wellness checks, setting up a process for updating your software, and installing and setting up Office 365 with an Azure backup program. Call us – 973-433-6676 – or email us to discuss your needs and their solutions.

Be Aware of Backup Terms & Conditions

If you’re one of our many clients using Office 365, we’ve likely put you on OneDrive, which essentially backs up some or most of your files. You also likely have another backup option or two that includes data storage in the cloud. But do you know what gets backed up to each cloud? Or how long it’s kept on a server? Or what happens in a catastrophic failure? Here’s what to be aware of.

For this article, we’ll focus on Office 365, Dropbox and Google Business Services. And while we believe the cloud is safe for data storage, the question is: How safe is it? There’s a lot we don’t know.

For example, what happens if something goes drastically wrong, such as an employee of the service going rogue, a hacker getting into the server, or a catastrophic system failure?

What happens if you lose your mind and delete a whole bunch of files – and then realize two months later that you need them?

In broad, general terms, the terms and conditions you agree to absolve them from any responsibility for any error that could possibly connected to you or your actions. None of the cloud providers covers your disasters; they only cover theirs. If there is a complete “nuclear meltdown” on the part of your service provider, they’re only required to restore data to the last point where they backed it up. If you back up your system on Wednesdays and the meltdown happens on Tuesday, you’re out six days of data.

One other problem that many small businesses and individuals face is knowing where all of their data is. They may have stored data in some account and haven’t accessed it for years. They may not even remember having the account. In many of the terms and conditions you agree to, a data storage company may have limits on how long they keep data, but let’s assume it’s unlimited. In cases where you forgot all of your access info – or maybe now use a different email address as your user name, it can be tedious, if not impossible, to verify you own the data and retrieve it.

To cover a reasonable number of contingencies, you should answer the following questions:

  • Do you know where all your data is and how to access it?
  • How much data do I need to keep? The amount of data we keep tends to expand as we acquire more storage capacity, and today’s technology makes that capacity virtually unlimited. Only you know what’s important, but your storage decision doesn’t need to be an all-or-nothing proposition. You can prioritize your data and put it in different places.
  • How are you backing up your data? You can do it automatically to a cloud and/or a portable hard drive connected to your computer or server. You can also do it manually. And, you can use any timeframe from real time to once a week – or even less often, though we’d always recommend real time as the first choice.
  • To what extent do you backup your data? You may be backing up only data files, or you may be backing up application software – or both. If you have employees who work remotely, you may have a system in place that backs up their work files or any changes that they may make while using certain applications.

Once you answer those questions, we can help you design a backup and storage program that meets your needs. However, it’s far from simple, especially for small businesses. We constantly go back and forth with vendors and clients about where to back up data and whether it should be more than one cloud. We tend to put our stuff in the cloud because it’s safer, but no cloud can cover human failure (it’s in the terms and conditions).

Security is the biggest human failure. If you or one of your employees with access to data opens a security breach, there’s no cloud service provider who’ll take responsibility for that. That human error is compounded if you go two or three months or longer before you find that data is missing or compromised – and that’s almost always the case.

Our advice is to forget about terms and conditions from your provider and set a few of your own:

  • Look at the data you store and determine how much you really need to keep.
  • If you find data stored in places or accounts you no longer use, transfer everything to a place you use and close out old accounts.
  • Decide where to store your data. Ideally, if you want to cover all of your bases, you should use more than one cloud and have a physical device in your office or home, such as a server or portable hard drive.
  • Develop and institute an automated backup program.
  • Decide who has access to your data – and then institute a process to keep it safe and make sure everyone who uses the process is trained.

We can help you follow through on all the terms and conditions you set for yourself, your employees and your data. Our process includes helping you make sound decisions on what to store and where, closing up all your loose ends, designing and implementing a storage program, training employees and monitoring your storage program. Call us – 973-433-6676 – or email us to discuss your needs and set up an appointment to move forward.


Terms & Conditions and Apps

Many of the companies we do business with online, especially those for purchasing merchandise, like us to use their apps for phones and other devices. We accept their terms and conditions to get it done – and we never bother to find out what data those apps share and with whom. You can sidestep the issue by going to a company’s website for the transaction. And while you’re at it, you might want to delete those unused apps that may be tracking you and feeding info to…whomever. I recently cut my apps from something like 150 to 47 – and I still only use about half of them. I was prompted to do it initially because for years, I suspected an app was screwing up my phone. So now, my phone works better, and even though my data may be shared with unknown parties, there are fewer of them watching me.


The Bluetooth Blues Will Make You See Red

Many people are unaware of all the places that Bluetooth connects your devices to. They’re more than just your phone to your headset. Apple brought this to light in their release of iOS 13, and one of their biggest rivals, Google, and Facebook may be the biggest culprits. Here’s what you need to know.

Of course, one of the reasons Apple has brought this up is that its new iOS 13 enables you to allow which applications can have Bluetooth access to your location. When you deny access, you’ll lose some functionality, but you have the option.

Why are Google, Facebook and others stalking you? It’s obvious: they can promote a product or service for someone to sell you. They’ve been doing it for a while. All they had to do was set up a network of Bluetooth devices that could detect your presence and deliver a popup notification on behalf of a retailer, product manufacturer, restaurant, etc. At the same time, apps such as those for ride sharing and banking also use Bluetooth, and you might not be able to get a ride or complete a transaction without it. But at least now you’ll know who’s tracking you, and you’ll know why because the app has to state its purpose for it.

The infuriating part is that before iOS 13, you never knew when you entered one of their tracking zones, and there was nothing you could do about it. The new OS changes that. It will tell you when an app wants to use Bluetooth to use your location data. You’ll then have the option to allow it or deny it. You’ll also have the option to deny an application access to your location automatically – until you decide to grant access. The process to deny access until you change your mind is straightforward: Go to Settings > Privacy > Bluetooth and toggle apps on or off.

Installing the latest software – iOS 13 for iPhone 6 and later and newer versions of iPad – is one example of why it’s critical to have all of your software up to date. Many people don’t realize that devices in homes and offices have operating-system software, which is known as firmware. This includes smart TVs and the massive copiers that you get from an equipment dealer. Google has many ways to track locations and user data, and you don’t know about them.

If you’re mad as hell about your privacy and don’t want to take invasions from unknown parties anymore, we can help. Call us – 973-433-6676 – or email us to walk you through a software update process or schedule an appointment to do it.

Password123 and Other Common-Sense Anomalies

We continue to be amazed at the utter lack of common sense some people have when choosing strong passwords. Even if you satisfy all the algorithms for an allegedly strong password (upper- and lower-case letters, numerals and special characters), you may leave hints that make all too easy to crack it. Here are some factors to be aware of.

We believe the most important thing anyone has to understand is that nobody – absolutely nobody – is not on the internet. Obviously, you’re an online regular if you’re reading this, but even somebody who has never owned a computer or has paid for everything only in cash has an online profile. Birth certificates, census reports and immigration records from over 100 years ago are available online. Have you ever seen a security question (not one you’ve chosen and answered falsely) that asks about an old, old address of yours or a sibling?

Based on all the available information about you, it defies my logical definition of common sense to know why an attorney uses lawyer123 – or even lawyer123! – as a password. If you promote your profession or business on a website and somebody wants to crack your personal info, they’ll likely try using your profession – with 1234 and a special character.

Use common sense as well as technology’s tools to both make your life convenient and more secure. You can start with a password manager, such as Dashlane, which requires you to know only one really strong, difficult-to-crack password. You use that password to use the password manager, and the program generates random passwords that have no connection to you, your hometown or your first pet.

When you use a GPS system to go someplace, are you always aware of your surroundings in case something just doesn’t look or feel right? Common sense should tell you that you might not be in the right neighborhood or that the system’s algorithms are telling you to make a left turn where you can’t or to go the wrong way on a one-way street. Technology is an imperfect tool. It’s up to you to make sure you have the latest version of your technological tool, which we hope will have fewer imperfections.

Common sense will be society’s best defense in combating the way technology can spread disinformation and misinformation. This is not a political statement. Disinformation and misinformation have been used since before the printing press, but today’s technology makes it much easier to create and distribute words and images. There is no technological tool for critical thinking.

However, we can help you with the tools that can help you enhance your online security and your life. Call us – 973-433-6676 – or email us with any questions you have about better living through technology. It makes sense to be up to date.

Our iPhone Decision

Apple will start accepting pre-orders for its new iPhone 11 this coming Friday, and for the Rosenthal family, this meant going right up until last night to decide who – besides me – would get a new phone and what features would be on it, and who would get an older phone. I’m getting all the bells and whistles, but how did we divide up the rest of our purchases and recycling? Here’s our thought process.

I decided to get the iPhone 11 Pro because I wanted the camera. Danit is undecided, but she is leaning toward the iPhone 11 because she likes the purple case that’s available. Charlie will keep the iPhone XR he got earlier this year, and Leah will get Danit’s iPhone X.

To me, the 11 Pro’s camera is the killer technology. As we travel more, I’m less inclined to drag along my DSLR camera unless we’re going on a major, major trip – where I’ll want high-quality photos that only that type of camera can provide. Using the phone’s camera, I can store pictures directly to my electronic library – my iCloud account – instead of having to download them from the camera’s card.

The big factor on the new phone’s camera is the ultrawide lens option. It’s a triple-camera system with new Ultra Wide, Wide and Telephoto cameras that Apple touts as a pro-level camera experience designed for everyone. The Telephoto camera features a larger ƒ/2.0 aperture to capture 40 percent more light compared to iPhone Xs for better photos and videos. For video, each camera in the triple-camera system records 4K video with extended dynamic range and cinematic video stabilization. With a wider field of view and large focal plane, the Ultra Wide camera should be great for shooting action videos. That’s what Apple says; we’ll see if it’s true.

Audio Zoom is supposed to match the audio to the video framing for more dynamic sound. With iOS 13, we’re supposed to get better video editing tools.

If you have any questions about whether to move to the iPhone 11 or which model to select, we’re happy to discuss your needs vs. the features. Call us – 973-433-6676 – or email us, and we’ll chat about it.