Office 365 and The Cloud

The recent Office 365 outage highlighted reasons why using the cloud exclusively is not always the ideal solution for everyone. It’s great to be able to pull data from anywhere in the world, but if you can’t place an order or send out an invoice, the cloud has rained on your parade.

Most of you likely didn’t notice effects from a recent Office 365 outage that affected getting email on your computer or mobile device. You have had trouble getting and sending email, but hey, we always seem to have problems. Still, it’s no reason to give up on Office 365, which we like a lot, or give up on the cloud. The cloud enables a business of any size to access records and all sorts of data files, use applications, and collaborate to conduct business from anywhere. It’s the engine that drives virtual offices and connects a company’s workers and clients or customers in the same way, regardless of whether you’re in 2 or 200 locations and cover 2 or 2 million people.

When you’re at the smaller end of the spectrum, Office 365, for example, gives Microsoft a large enough customer base to provide the same resources that you’d find in an international conglomerate. By leveling the technology field, it gives more people access to the world of commerce.

To break it down and probably oversimplify the technology, Microsoft Azure makes it all happen. In a company of any size – or even a family of home users – it syncs everyone’s passwords to access email, applications and data. It provides multiple layers of security, and through a process known as SSO (single sign on), Azure makes all of those levels of security talk to each other. That communication, which is transparent to non-technical users, is what makes it so easy and convenient to use the internet.

As the tech industry develops better artificial intelligence, Azure and similar services will also drive innovations that will lead to the elimination of passwords while increasing security. AI looks at patterns and can analyze whether an abnormality is a one-time event or if there are multiple occurrences that demand a quicker, harder examination.

For all those reasons, we believe a hybrid computing environment may make sense for small offices and home users. Office 365 with a backup of data files to Azure puts a vast amount of resources to work for you to maximize your efficiency for work or play – and to keep your identity and data secure.

But if you are a business that requires a lot of employees to access sensitive data, you may want to keep the data and applications local – on a server – to keep access away from the internet. Keeping it all inside minimizes the risk that one person’s carelessness or mistake will open a breach in your security. You can still have your server send data to the cloud as an effective backup process, and you can still allow certain employees to access files on your server or in the cloud from remote locations, but strict controls will minimize opportunities to breach your security.

We can advise you on whether to implement a cloud-based technology system, a hybrid system or a strictly on-site system and help you implement it. Call us – 973-433-6676 – or email us to talk about it.

The 5G Promise

5G is just about here, and the telecom carriers are pushing it out. Android devices, made by numerous manufacturers, are about to come on the market – even if networks are in the development stage. Rumors abound that Apple will hold back until 2020 to introduce 5G devices, and that’s a good decision for a number of reasons.

Continue reading

It’s All About the Switch

As data pipelines and Wi-Fi networks get bigger and faster, you need to pay attention to the switch, the connector that brings the service into your office or home and sends it to your network. You may need a hybrid system that includes an up-to-date switch and some hardwiring to unleash the full power of the internet service that you pay for.

Continue reading

The Azure Workaround

When Azure, Microsoft’s storage cloud, was hit with a problem that rolled around the world, it affected some of our clients who use it for storing and accessing data and apps, especially with remote access such a key need. Microsoft hasn’t been the only cloud provider hit, and this won’t be the last problem. But nothing needs to shut you down.

The Azure problem essentially locked people and businesses out of their data and apps. In the most basic terms, any Azure customer using Dev Ops and Office 365 who depended on two-factor authorization to protect their Azure accounts couldn’t log in. We were affected as a customer of both services.

At the time we were affected, we were doing a setup at a client and needed to get a big file, which we store through Azure. When I logged in to get it, I got no access; I just got a message they would send a text. I had an external hard drive with an old version of the file, and that was not suitable. Transferring the file remotely from my office computer would have taken too long. We solved the immediate problem by transferring the file from my computer to my Dropbox account and then downloading it from there.

We worked around the problem, but we operated in a vacuum. As an IT service provider, we got no information about anything that was happening, and that was frustrating. We later learned – along with the rest of the world – the problem started in Asia and made its way westward as organizations in Europe, Africa and the Americas began their workdays.

It took a few days for explanations and suggestions to reach everyone, and it didn’t take long (in the grand scheme of things) to return to normal operations. The problem centered around a breakdown in the two-factor authentication process. We and our client were fortunate that I had the capability – files stored on a computer I could access and Dropbox – to initiate a solution. But not every user has the resources I had.

Two-factor authentication is one of the key ways we can protect our data and app security, and the technology is evolving as we move toward password-less access to cloud servers and other websites that house highly sensitive info, such as banks, shopping sites and healthcare organizations. As hackers get better, our industry needs to stay ahead of them.

We don’t believe that shutting off two-factor authentication is a good solution to a random-access problem, but when it comes to your Microsoft accounts, you can turn it on and off as needed. That might be an effective workaround.

Microsoft’s website has step-by-step instructions for all who have a Microsoft account.

  1. Login to https://account.live.com/
  2. On the home page, click “Security & Privacy”.
  3. On the “Security & Privacy” Page, click on “Manage advanced security” link.
  4. Look for a page where you will find a link to “Set up two-step verification” or “Turn Off” Two-step verification

If you have any questions about the process or need a walkthrough, contact us by phone – 973-433-6676 – or email. We can also help you with two-factor authentication with other systems and help you with other solutions to maximize your data and app access and security.

By the way, this is not a Microsoft-specific issue. Other cloud services, including Google and Amazon, have had access problems. Service outages will happen again because we will continue to use cloud-based services and because…stuff happens. Looking at big picture, the cloud has too many advantages, such as access from any internet connection and the best possible security measures available, to pull everything back to individual computers and servers

New Company, Old Stuff…Old Company, New Solutions

A recent acquisition of a company by one of our clients illustrates the problems you can face with old software as well as old hardware. And our onboarding of a new client illustrates the problems that compound each other after neglect and poor shortcuts. Here’s how we tackled them together.

The software issue, which involved an old, old version of QuickBooks, drove home the benefits of keeping applications up to date. Our client, an accounting firm, recently acquired another firm, and we knew the technology had lapsed, and we even developed a budget number to bring it all up to date. Our question was whether to implement our project now or wait until after the upcoming tax season.

Wanting to do it right, we decided to move forward. Based on the problems we encountered, we made the right decision – because it was not a simple file conversion process. The old version of QuickBooks was from 2008; 2019 is the current version. There was an interim version is 2012. As with Microsoft Windows updates, we had to go through numerous updates because each update was built on a previous update.

In addition to the QuickBooks updates, we had to work with various versions of Windows and aged computers that couldn’t run Windows 10 and the current QuickBooks. Complications arose when people didn’t know the administrative emails and passwords required to set codes and perform updates. We tried numerous combinations, but the problem was solved by talking to the owner of the acquired company, who recalled a Hotmail account for QuickBooks. We had to work through additional emails and passwords – and inconsistencies on security questions.

We finally got it all done after several extra hours of time and another access issue. Our client is set for tax season, but we can’t help but wonder about the cost difference between software updates and the time and expense of the extra work.

Similarly, with old and new, we recently added a client who had been disenchanted with the managed services (monthly fee) program of their previous IT provider. We bid against another company that also offered managed services.

We don’t offer managed services because we believe it shortchanges clients. They pay a monthly fee but never know what the provider is doing for them. When we bill for the hours we work, we always provide a detailed description of our services.

We also don’t like to scare new clients into buying and installing new equipment, such as a server, until we take a deep dive into their systems and their needs. The bidder said the client needed a new one ASAP, which was logical because the server was eight years old. But when we talked to people there and learned how they work, they hadn’t been using the server, which had an old firewall that had never been registered. We registered the firewall and upgraded the software, putting off their need for a new server, which they were using to scan files to send to their printer.

Going forward, we’ll show them a different way of doing things without a server, and it should save them several thousand dollars.

We pride ourselves on being trustworthy, and we build our business on that trait. If you know a company or individual who’s looking for a new IT service provider, we hope you’ll refer us. And if you need a look at your systems, you can rely on us for an assessment that will show you the most cost-effective options. Contact us by phone – 973-433-6676 – or email to set up an appointment for you or a referral.

Tech Upgrades for New Year

New technology is a great value. You can improve the performance and cost-efficiency of business and home systems by investing in new hardware and upgrading application software. Consider some of these upgrades.

December is always a good time for businesses to look at technology investments because it can affect your taxes. Your CPA or tax advisor can tell whether a year-end expense can help reduce your taxes while increasing your capabilities, and we can tell what might work best for you to make those capability increases a reality.

First, look at your operating system. If you are on Windows 7, remember that Microsoft’s support of this ancient OS will go away in a year. They’ll no longer provide security updates and bug fixes. Cybercriminals salivate when they see any outmoded system because they can likely pull a hacking technique off the shelf and get into your system.

Yes, there will be some workarounds for you to continue to use Windows 7, but why do it? Windows 10 is much more efficient and secure, and Microsoft is dedicated to supporting it. Most common business apps running Windows 7 are easily upgradeable to run on Windows 10. If you have customized software from a publisher that’s still supporting it, they should be able to help with a conversion to the newer OS. If not, you may want to move to a new app, especially for the security aspects.

You should also look at your hard drives for business and home computers. Solid state drives (SSDs) have come way down in price this year, and while they’re not necessarily Walmart specials, they are good values.

SSDs are faster and more reliable than mechanical hard drives. The mechanical drives have moving parts that can wear out and crash, putting your data in jeopardy. They also require more space to move files around, and as they become fuller, they are less efficient. SSDs have no moving parts and don’t physically move around files. That makes them immune from physical crashes, and you only need a drive half the size to hold the same amount of data.

Call us – 973-433-6676 – or email us with questions about technology upgrades or to help you install new technology. You can hit the ground running in 2019 or get up to speed early on in the new year.

Using Alternatives to Passwords

We have harped…and harped ad infinitum…about having strong passwords simply because those strings of upper- and lower-case letters, numbers and special characters offered the best chances of staying ahead of the hackers. But we’ve always reminded you that something better is needed because the bad guys have a vested interest in developing better systems to crack passwords and in finding more ways to exploit vulnerabilities in anybody’s electronic vaults that store vital personal and corporate info.

When one of our clients got hacked, we installed a password-less system to offer them better security. Our solution, which uses Microsoft Azure, is one of the emerging technologies to replace passwords with biometrics, one-time codes, hardware tokens and other multi-factor authentication options. What they do is exchange tokens and certificates without users – you, your employees and your customers – needing to remember anything. The new pathway to better protection even bypasses the password managers that many of you use.

IT industry figures show that more than 80 percent of security breaches involve stolen passwords and credentials. We all pick passwords that are too simple and easy to guess, or we store and reuse a few complex passwords that we can remember. That problem is exacerbated by forcing regular password changes even without evidence of breach. If password reset systems rely on people, they can be fooled by social engineering. Password-less technologies can combine certificates with contextual security policies that require less from you. They rely more on trusted devices and connections, and they can add layers of complexity as risks rise. New security can be based on the value of the content and factors such as user behavior, device location and connection, or the state of the device.

You can already set up password-less access using Microsoft’s Azure AD Conditional Access. Many of you who use our backup services already have Azure accounts, and you can use the technology to manage:

  • Sign-in risk to identify who’s signing in and determine who’s a risk.
  • Network location to determine if access is being attempted from a network location that is not under your control or the control of your IT department.
  • Device management for accessing cloud apps from a broad range of devices including mobile and personal devices.
  • Client application to manage cloud access using different app types, such as web-based, mobile, or desktop.

There are some cross-platform technologies available for going password-less, but it all starts with the Microsoft Authenticator app. It uses key-based authentication to create a user credential that’s tied to a device and uses a PIN or biometric. Instead of using a password to sign in, users see a number code to enter into the Authenticator app, where they have to enter their PIN or provide a biometric.

Password-less sign-in for Microsoft accounts with the Microsoft Authenticator app is already available, and support for signing into Azure AD is now in public preview. Right now, the app can only cover a single account registered with Azure AD in one tenant, but support for multiple accounts is planned in the future. It covers Office 365 and Azure and works with a variety of other apps.

If you’re ready to go password-less, we can help you decide what’s right for you and set up your accounts and devices. Just give us a call – 973-433-6676 – or email us to set up an appointment.

Choose the Right Router

As we add more traffic to our Wi-Fi networks in the office and at home, choosing the right router is critical for performance and security. If your router is more than a few years old, the combination of improved technology and the probable loss of full power due to wear and tear means you should consider investing in a new system. The good news is that you don’t have to spend a fortune.

How do you know it’s time for a new router? The first sign is sluggish performance, and it’s a subjective call. Whether you use your router for business or home entertainment, you can notice that data just isn’t moving throughout your location as fast as you’d like. With today’s demands for moving more data faster, your router could be worn out or not have the capacity to meet your needs.

Routers do wear out over time. Heat can damage internal components, and that slows them down. Newer routers have fresher components, and they meet better performance protocols. This is especially true when it comes to dual-band routers. Older routers tend to operate on the 2.4 GHz wireless band, where they share space with your other household products, such as cordless phones and even your garage-door opener. That creates a lot of interference that affects network performance. This problem is more likely to affect home offices and small retail systems. In some homes, whether used for home offices or as converted office space, multiple stories and thicker walls require more powerful routers to send signals where needed.

Dual-band routers work on both the 2.4 and 5 GHz wireless bands, and that gives you options. You can set some systems to run on the 2.4 GHz band and use the 5GHz band for managing bigger data capacities. Some routers even allow you to run on two 5GHz bands. For a home office, a home with multiple devices (computers, mobile devices and smart TVs), a business in a converted home, or a small retail space, this allows you to dedicate bands to specific uses. Think of it as having a slow lane, an express lane, and a lane dedicated to buses and trucks.

For a home or small office or retail use, look for a router with at least four 10/100/1000 (Gigabit) Ethernet ports to connect wired devices such as desktop PCs, network-attached storage drives and home-automation hubs. A USB port makes it easy to plug in a printer or a USB drive and share it across the network, but with two ports you can do both.

You can manage how your Wi-Fi network is being used with parental controls, Quality of Service (QoS) options, and a guest-network feature. Parental controls and QoS are for home use. The latter helps you assign network priorities for applications and clients, such as downloading files, running printers or managing streaming to TVs or devices. You can also manage priorities for gaming systems.

A guest network for a home or business lets you create a separate network to offer Wi-Fi connectivity to guests without leaving your entire network vulnerable. This lets them connect to the Internet, but doesn’t give them access to your files, printers, and other connected devices.

Wireless routers for businesses have improved tremendously. To meet the complexity and requirements of running a wireless network these days, routers now have a much more varied feature set, including hardware that is often found in computers. You can find systems with dual- and triple-band connectivity, as well as a slew of other features usually found on far more expensive enterprise-grade models.

Priorities for business users differ from most consumer users. Security, support, remote access, business-grade VPN, WAN redundancy, connectivity options and scalability are critical. However, this doesn’t mean that some consumer routers cannot be used as business routers, especially in a home office environment.

We can help you find a router that meets your networking needs and help you find the best location and configurations to maximize performance. Call us – 973-433-6676 – or email us to answer your questions about router selection and help you with setup and settings configurations.

Hack Attack Continues vs. Businesses and People

While government-sponsored hacking and disinformation makes big news, don’t take your eye your eye off the ball when it comes to protecting your personal and corporate data. A report from a consulting firm, Positive Technologies, painted a dark, dark picture, saying the second quarter of 2018 showed a 47 percent increase over 2017. You need to remain vigilant, even when events are beyond your control. Nobody is immune.

As reported in Tech Republic, Positive Technologies said the most common methods of cyberattack are:

  • Malware (49%), with spyware or remote administration malware being the most widely used forms of infection.
  • Social engineering (25%) is the term for manipulating users into believing a message, link, or attachment is from a trusted source, and then infecting targeted systems with malware, stealing money, or accessing confidential information.
  • Hacking (21%) exploits vulnerabilities in software and hardware, causing the most damage to governments, banks, and cryptocurrency platforms.
  • Credential compromise (19%) targets password managers used for storing and keeping track of passwords.
  • Web attacks (18%) are online racketeering attempts to extort website operators for profit, sometimes by threatening to steal client databases or shut down the website.
  • DDoS (5%) tends to be the weapon of choice for business rivals, disgruntled clients, and hacktivists. Political events can drive attacks on government institutions. Criminals can use DDoS attacks to take websites offline and demand payment from the victims.

Attacks can be made in tandem, such as the common duo of using phishing emails to trick users into downloading malware.

Financial and healthcare institutions, retailers, and government databases remain prime targets, but higher education institutions and even school districts are being attacked. Wired reports that this past March, the Department of Justice indicted nine Iranian hackers in alleged attacks on 144 US universities and 176 in 21 other countries. They were also cited for attacking 47 private companies.

Hackers are homing in on the money. Positive Technologies said targeted attacks are outnumbering mass campaigns, with attacks directed at companies and their clients, as well as cryptocurrency exchanges. Data theft is driving an increasing number of attacks, with many criminals seeking personal data (30%), credentials (22%), and payment card information (15%). To steal this data, hackers are compromising online platforms, including e-commerce websites, online ticketing systems, and hotel booking sites.

The scary part for us is the report you can never be sure that criminals don’t have your credit card number from one source or another. Even a brand-new smartphone in a store can have pre-installed malware.

People and businesses can take steps to keep their data safe by installing updates for operating systems and application software and installing antivirus protection on all systems and endpoints and keeping it up to date.

Businesses can encrypt all sensitive information, perform regular backups, minimize the privileges of users and services as much as possible, and use two-factor authentication. Enforcing a password policy with strict length and complexity requirements, and requiring password changes every 90 days, can also help protect systems.

We offer security audits for businesses, and we can answer any questions individuals have about protecting themselves from cyberattacks. Call us – 973-433-6676 – or email us to set up an appointment.