New Browser War

Mozilla just launched Quantum, the fastest and most feature-laden version of its Firefox browser. Will it be the shot heard ‘round the internet? We think it’s overtaken Chrome and that it’s way ahead of Edge, which Microsoft launched to replace Internet Explorer.

When it was introduced in 2004, Firefox, an open-source darling, shot ahead of Microsoft’s Internet Explorer, but its star faded with the development of Google’s Chrome. By the time it launched Quantum, also known as Firefox 57, Mozilla saw its user base at 6 percent of the browser market. Chrome, which was my browser of choice, had 55 percent of the market, and Safari had 15 percent. In the desktop market, Chrome has had a 64 to 15 percent market advantage over Firefox. Clearly, Mozilla had to make some big changes.

The name Quantum may come from the quantum leap the browser made in speed. The 57th iteration of Firefox is reportedly twice as fast as Firefox 52. Mozilla claims it uses 30 percent less memory than Chrome, which will enable you to run other programs or apps faster on your computer, and it claims to have better privacy features than Chrome. Its new Tracking Protection is a default operation that blocks extensive requests for online user tracking and reportedly reduces the average page loading time by 44 percent.

The new browser supports WebVR, which enables websites to take full advantage of VR headsets, and Mozilla’s Pocket service is now more integrated in the browser and displays trending articles on the new tab page. Last but not least, for those of you who didn’t like being locked into Yahoo as the default search engine for Firefox, you get several choices after entering your search topic.

One drawback might be the loss of add-ons from the old Firefox engine. They allow a lot of customization. Most of the top extensions have been updated, but if you need to retain some of them, you could try Firefox ESR, which will give you the add-ons but at a slower speed. In the meantime, you get plenty of extension, theme and toolbar options to customize it.

Since I’ve installed it, I think Quantum – or Firefox 57 – will give Chrome a run for its money. Firefox says it will have several tweaks over the next year to make the browser even faster. If you want to check it out, download it directly from Mozilla.

If you have questions about Quantum/Firefox 57, call us – 973-433-6676 – or email us for help. We think you’re going to like it.

Automotive Electronics Systems are Flat Tires

In an article about the reliability of automotive brands, in-car electronics systems took the big hits for some big brands. Surprising? Not at all.

We’re putting a lot of pressure on electronics, and they, in turn, are putting pressure on our cars’ batteries and our overall perception of how well our cars are working. Batteries are becoming the most-replaced part in our cars, and it’s no wonder. With all the power accessories we depend on, such as our infotainment systems and power seats, and the increasing replacement of mechanical systems with electrical and electronic systems, we put a lot of strain on our batteries. That’s something those of us in the Northeast might want to note as we head into winter.

Strong batteries, however, won’t solve some inherent problems that I’ve noticed. Our electronic infotainment systems are slow to integrate with other systems, everything from climate control to navigation, radios and Bluetooth connections for phones or music playlists. When we’re driving and depending on our navigation system and the defroster, for example, we need speedy integration. We can’t afford to take our eyes off the road for more than a split second. We also can’t afford a glitch in the performance of either function. When a turn comes up in heavy traffic, we need to be in position to make the turn safely. And, at the same time, we need to be able to see where we’re going. If our system is slow, we get distracted from our driving, and that could cause an accident.

Distraction seems to be a major problem from reports we’ve seen. The big areas of concern are the size of the screens themselves and how the systems integrate with Apple CarPlay (which I have in my Volvo) and Android Auto. Some drivers can’t always be sure whether they’re using their phone’s system or their car’s. That confusion can be a distraction, especially if your car and your phone have you plugged into different navigation systems – and one of them may not be sending you where you want to go.

We should briefly note, too, that some in-car systems are compatible only with Apple or Android systems or can favor one system over the other. That’s something you should know when you set up your car system, your phone or both. For example, we love Waze, but it’s not available through CarPlay. Google Maps has some features that are not available on Apple Maps, and that reflects a larger problem of your car’s system telling you which apps you can or cannot use.

Just to note, there are some current topics related to in-car systems. First, Bluetooth is still an issue when setting it up in older cars or to work as an installed capability with Apple or Android systems. Second, Lexus has decided to develop its own in-car systems. They may or may not work with Apple and Android systems, but the cars will have apps that tie in with your mobile devices, giving you some control or monitoring the car and its operations while you’re not there. A few comments about kids and valet parking come to mind for that.

The other distraction is the visual distraction, and that has two parts.

Some displays are just too big, and one that comes to mind right away is Tesla’s 17-inch touchscreen. That’s bigger than many laptop computers, and there are two problems. First, it’s large area to scan when you need to change something, and that can take more of your attention when you’re driving. This may be less a consideration for a driverless car, but today, you need to drive. It also creates a large reflection or a large bright light that can be a distraction.

The flipside is that a smaller screen can take you too long to pinpoint the place you need to touch for the action you require. That can take up more of your attention, too, and lead to an accident.

Some systems don’t have a screen layout that may be good for you. And while you can overcome some of that by locking the locations of some functions in your memory, the pressure of all the decisions you need to make while driving may negate that.

With all their current problems or shortcomings, in-car electronics will play bigger roles in your car and how you drive – or don’t drive it. Many of the things we see, such as warnings, automatic braking and stopping systems, navigation and self-parking are precursors of automated or driverless cars.

But while we’re still in the present, we can help you set up and integrate Bluetooth, Apple CarPlay, Android Auto and your mobile devices and apps in new or older cars. There are lots of set-up options, and we can help your sort them through and make sure your setup is what you need. Call us -973-433-6676 – or email us to talk about it.

iPhone X is a 10

Naturally, we have our iPhone X, and it’s everything we hoped it would be. Getting it was almost as much fun as using it because the Apple hype machine adds so much more intrigue. I was one of 25 people who showed up at the UPS terminal in Parsippany to get our phones when the counter opened at 7:30 in the morning on a Friday, two weeks ago. The guy at the counter grumbled a bit, but they knew what to expect. We had all been waiting for our phones from the minute we placed our order.

That’s when the fun started. I was able to track my phone before Apple and UPS sent us any kind of information. Working the web, I learned when my phone left the factory in China, when it left Hong Kong for the US, and when it arrived in Anchorage – before going to Louisville and Newark and then on to Parsippany.

In reality, I can’t blame UPS and Apple for being so spare with information. A truck was robbed near San Francisco, and a number of phones were stolen. New iPhones are hot commodities in more ways than one.

So, was it worth all the excitement? Yes.

The iPhone X’s facial recognition is top notch, and I love all the features and the speed. To a geek like me, this is one step closer to heaven. The only difficulty I’ve had is getting used to the absence of a Home button, which has been an iPhone hallmark. I’m still getting used to all the gestures and swipes, and switching back and forth with Danit’s older iPhone makes it harder to settle into a routine. But, hey, I’m not complaining.

If you’re in the market for the iPhone X, the waiting time to get one is three to four weeks. If you’re trying to decide whether to buy it at an Apple store or through your cellular carrier, I’d recommend the Apple store. One big reason is that you can buy the Apple Care insurance program that’s cheaper and better than what the carriers offer.

The coverage is recommended – along with the purchase of a good case for your new phone – because the units have glass fronts and backs and are extremely fragile. They can break very easily, and a replacement screen is $579.

The iPhone X has a lot of outstanding features, and most people will find a learning curve – while getting used to the gestures and no Home button. If you have any questions about the new phone or need any help in getting it set up and integrated into your life, we’re available to help. Just call us – 973-433-6676 – or email us.

Homeland Security’s New Website for Trusted Travelers

If you’re a world traveler for business or pleasure – or plan to be – Homeland Security’s new Trusted Traveler Programs (TTP) System website is your cyber destination for managing Global Entry, NEXUS, SENTRI and The Free and Secure Trade (FAST) programs. The four TTP programs are great time savers for frequent travelers who have been pre-approved and are considered low-risk. They also represent a process of security checks that make it extremely difficult for someone to steal personal identities.

Registering through the TTP site is your one-stop center for all of the programs, although it’s not likely most of you will use all of them. If you have used any of them before, you’ll need to re-register. If you’re not familiar with them, here are quick descriptions:

  • Global Entry is for travel back into the Unites States At selected airports, you go to a designated kiosk, present your machine-readable passport or U.S. permanent resident card, place your fingerprints on the scanner for fingerprint verification and complete a customs declaration. You get a transaction receipt and go to baggage claim and the exit. You must be pre-approved for the program. All applicants undergo a rigorous background check and in-person interview before enrollment.
  • NEXUS expedites processing when entering the United States and Canada. You use dedicated NEXUS kiosks when entering Canada by air and Global Entry kiosks when entering the United States via Canadian Preclearance airports. You also receive expedited processing at marine reporting locations.
  • SENTRI (Secure Electronic Network for Travelers Rapid Inspection) expedites clearance for pre-approved, low-risk travelers upon arrival in the United States. Participants may enter the United States by using dedicated primary lanes into the United States at southern land border ports. It’s primarily for travel from Mexico.
  • FAST (Free and Secure Trade) is a commercial clearance program for known low-risk shipments entering the United States from Canada and Mexico by truck. It expedites processing for commercial carriers who have completed background checks and fulfill certain eligibility requirements. The majority of dedicated FAST lanes are located in northern border ports in Michigan, New York and Washington and at southern border ports from California to Texas. Participation in FAST requires that every link in the supply chain, from manufacturer to carrier to driver to importer, is certified under the Customs-Trade Partnership Against Terrorism (C-TPAT) program.

If you already participate in one of the programs, you’ll have to go through a new registration process, which is an admitted ordeal, and you’ll need your PASSID number, which should be on any membership cards you have for the program or on any notification letters you might have received.

To start the re-registration process, go to https://ttp.cbp.dhs.gov/, log in, go to Manage My Membership and then Consent and Continue. Eventually, you’ll be redirected to a page where you’ll need to create an account. You’ll need to enter your email address, and then you’ll receive a confirmation. If all goes well, you’ll need to enter a password – a strong one – and you’ll need to provide a phone number (mobile is better) as part of the new website’s two-factor authentication process.

Through the process, you’ll be given a “personal key” that you should write down and keep with you. It’s your backup in case something goes wrong in your two-factor authentication scheme. After that, you’ll be redirected to the new TTP registration site, where you’ll need to enter personal information and your PASSID.

It’s a lot of work, but it’s a process that comes as close as anything I’ve seen to having both convenience and protection – once you go through all the gyrations to set it up. It has two-factor authentication and a secure back-up process, and the end result is convenience and time-saving at a place where it’s important for travelers and shippers.

We hope this helps you see the value of two-factor authentication. While secure borders are a top priority for our country, securing your personal data should be a top priority for you. Spending a few minutes early on can pay big dividends later. If you have questions about your security and setting up a two-factor authentication system, call us – 973-433-6676 – or email us for help.

Are You Printing Invitations to Your System?

Printers have been fingered as the weak link in many business and home networks. Most small businesses and home users tend to run their printers into the ground, and the longer they hang around without the latest firmware updates, the more vulnerable they are to a cyber-attack.

You can stop printing invitations to intruders – even with your current, old printer. Let’s start with the firmware. Simply go to your printer manufacturer’s support website and you can see all the firmware and driver updates available for download and installation.

Whether your printer is on a home network or small business network, make sure your firewall software is up to date and that you have a strong, secure network password for each printer. It’s too easy, especially in an office, to use a simple password that everyone can remember and hackers can figure out. And too many, especially in an office, keep their passwords stuck to monitors, where anyone walking by can see them. Your employees and/or family members just need to bite the bullet and remember a strong password – and keep that knowledge to themselves. It’s also worth noting, too, that sometimes the printers don’t even have those default passwords; they have none at all.

You can further restrict access to your printers by properly managing your printer settings and ports. Just as we’ve seen everything related to the IoT, printers can be shipped with default settings controlling printers and default port assignments. Any third-rate hacker can figure them out. You can and should change them immediately when you set the printers up to work on your networks.

Some manufacturers are recognizing the role they can play in protecting your printers. HP recently introduced its Connection Inspector for enterprise systems, and we can only hope the company and other manufacturers start incorporating similar tools for small businesses and homes.

The new tool is designed primarily to combat malware intrusions through printers by looking at unusual behavior on network traffic going to a printer. It learns what “normal” traffic looks like, and when it detects malicious activity, it can immediately go into a protected mode, stopping any further unfamiliar or unusual requests and sending a warning to IT administrators. It can even trigger a reboot of the printer.

We’ll keep an eye on developments in printer security to let you know when tools like Connection Inspector become available for you. There should be an incentive to develop them because more and more professional services corporations and families, especially those with school-age children, rely on remote and/or wireless access to printers to create hard copies of information in a corporate database or a collaborative research project.

In the meantime, we can help you tighten your printer security by looking at your machine’s settings and ports and checking your network’s security, too. We can also help you with the installation of firmware and driver updates. Call us – 973-433-6676 – or email us for an appointment. It’s time to make sure you’re printing documents, not invitations to enter the inner sanctum of your system.

‘KRACKing’ Your Wi-Fi Network

KRACK is an ominously named crypto attack that exploits a flaw in the process of connecting a device and a Wi-Fi network. By allowing network access without the password, effectively it opens up the possibility of exposing credit card information, passwords, and practically any other data on your device. Here’s how to protect yourself – somewhat.

Using WPA2 security, the standard of protection for the past 13 years, is still the way to go, and setting a strong, secure password is just as important as it ever was. But it’s like a lock on your front door. Locks, according to conventional wisdom, keep out honest people. But a lock that’s strong enough to delay a would-be thief was thought to still be effective.

That was until KRACK (Key Reinstallation Attack) was discovered. It exploits a flaw in the four-way handshake process between a user’s device trying to connect and a Wi-Fi network, allowing an attacker to access a network without the password. It’s an equal-opportunity attack, too. It can affect Android, Linux, Apple, Windows, OpenBSD, MediaTek, Linksys and others, but the most current versions of Windows and iOS devices are not as susceptible to attacks because of how Microsoft and Apple implemented WPA2. Linux and Android-based devices are more vulnerable to KRACK.

Fortunately, it’s not a helpless situation. Attacks can only be successful when someone has access to the wireless network you’re on at the time of the attack. That means you need to be especially careful on public networks. You can further help yourself by:

  • Making sure you’re up to date with all available security patches
  • Using a VPN, which will encrypt your internet traffic
  • Visiting only websites that use HTTPS, though it’s not a guarantee you’ll be safe.

We’ll keep you updated on developments against KRACK, and we can help you now by taking a look at your systems and security to make sure you’ve maximized your protection. Call us – 973-433-6676 – or email us for an appointment.

Here’s Lookin’ at Your Password

Passwords are just as painful for companies that require them as they are for you. And, they’re expensive as well as subject to theft. What are we looking at in the near future? The eyes have it.

Microsoft and Apple are moving ahead with facial recognition to replace passwords. The technology is getting better and better, and, let’s face it, once their systems can recognize you and match you up with other records, you won’t have to remember some arcane, complex password – which you could mistype…

Going “password-less” would create a huge economic benefit for the business world. At our recent Microsoft IT conference in Orlando, the company said lost passwords are their biggest IT cost. In the month of July, they spent $686,000 in IT-related costs for restoring forgotten passwords. Annually, the cost is roughly $12 million.

The way systems work, it’s always to your benefit to say you’ve forgotten your password if you risk being locked out of website or application, such as your Office 365 account or a bank account. While their security needs dictate making a password reset more difficult, the complexities raise costs.

Also, in today’s world, all of these systems and interactions can be hacked, and dark-web operatives can change your letters, numbers and special characters once they’ve cracked your code. Your face is another matter. And while someone at some point in the future will figure out a way to defeat facial recognition, I believe this gets us ahead of the curve – for now.

Microsoft has facial recognition tools available for computers that have Windows 10 with Hello installed, and Apple has it for iPhones and iPads. While you can use them now for their own websites and online apps, it will take some time for the rest of the online world to get there. Your bank or credit card company, for example, will need to develop tools that work with all platforms and operating systems, and they will need to make sure online performance doesn’t suffer.

One online security app that some banks encourage their customers to use is Trusteer. While it can be effective as form of two-factor verification, it can slow down a user’s computer. We’ve had numerous incidents of clients calling us about slow computers, and Trusteer has been the problem. Once it’s uninstalled, performance levels return to what they should be.

There are other two-factor authentication methods you can use, but you’ll be up against that issue of whether you want more convenience or more security.

If you have any questions about facial recognition tools or two-factor authentication, call us – 973-433-6676 – or email us. New technologies can be scary, mostly because you can worry about making a mistake somewhere that can lock you out of the info and apps you need for work and life. We can help you navigate the brave new world with confidence.

iOS 11 Has a Lot to Like

Apple has released iOS 11 for mobile phones and tablets, and it has a lot of great features. For cars, we really like the “Do Not Disturb, I’m Driving” response to text messages, and for iPads, we like the drag-and-drop feature.

The “Do Not Disturb” feature has been available on Android phones, and for somebody like me, who spends a lot of business time traveling to clients while always on call, it could be a lifesaver. You can activate in one of three ways: Bluetooth, when your vehicle reaches a specified speed, or manually. I have been able to add a customized message to let texters know that they can call because I can talk while I drive. Because the screen stays dark in this mode, I am looking at the phone a lot less now, and that’s much, much safer.

The camera on the iPhone is getting better, too. You can take Portrait Mode images with optical image stabilization, True Tone flash and HDR. Memory movies are optimized to play in portrait and landscape orientation, and more memories, such as photos of pets or birthdays, are automatically created and a new technology, called High Efficiency Image File Format (HEIF), reduces the file size of every photo taken with iPhone 7 and newer models.

Siri has new male and female voices that are more natural and expressive, adjusting intonation, pitch, emphasis and tempo while speaking, and it can translate English words and phrases into Mandarin, French, German, Italian or Spanish. It uses on-device learning to offer suggestions based on personal usage of Safari, News, Mail, and Messages.

For AR (augmented reality), there’s a new platform for developers to create experiences on phones and tablets using the built-in camera and the latest computer vision technologies. You’ll likely see content for interactive gaming, immersive shopping experiences, industrial design and more.

iPad’s drag-and-drop capability across the entire system makes it easier to move images and text, and when combined with the new Files app, you can keep things in one place, whether you store files locally or in the cloud. Its new, customizable Dock and a redesigned control center give you access to frequently used apps and documents from any screen and let you move documents between apps using a split screen or Slide Over. Apple Pencil lets you draw or add notes from the lock screen through the Instant Notes feature opens Notes by tapping Apple Pencil on the display.

The new screen sharing capability, however, tops off all the new features. It enables two people to share screens in real time on any iOS-powered device. For us, that will increase our capability to help clients troubleshoot problems in a timely manner.

Make the most of your Apple devices by understanding all the features of iOS 11 and how they work. Call us – 973-433-6676 – or email us if you have any questions, and have more fun with your devices or make them more useful.

Tips from Orlando

Although we played as much as anyone who visits Orlando, we got a lot of work done at Microsoft’s annual tech conference. When I looked at my calendar, I had booked 21 sessions for the week, each session some 75 minutes long, and I probably walked some 40 miles in the expo. I narrowly avoided DBP – otherwise known as “Death by PowerPoint – surviving to get some useful information in many places.

As useful as the sessions were, some of the best learning took place offline while walking the expo hall with fellow members of The Crew. I joined The Crew several years ago. We’re all independent IT consultants, and we stay in touch all year long through a variety of ways, including phone calls. We can turn to each other when we have questions, and my Crew members have been an invaluable resource everywhere we go.

That includes Orlando. When one of members gave a presentation at the conference, we turned up to support him – and we wound up helping him out when he experienced “technical issues.”

Walking the expo gave us access to the best and brightest in the Microsoft arena. All of the booths were staffed by software engineers from Microsoft and its affiliated companies, and we got to talk to them in depth. We could talk about problems we’ve experienced or features we like and get more in-depth knowledge. We learned about workarounds for problems and ways to use advanced features in software and hardware.

Here are my three favorite take-aways from the conference.

  1. Many people who use Microsoft One Drive like to use # and % in their file names, but the system would not accept names with those characters. One Drive now allows you that option, so go ahead and # and % to your heart’s content.
  2. The fall update of Windows 10 will include more capabilities for One Drive. You’ll be able to sync large libraries of files on demand and be able to open files without having to download them.
  3. You can add the ability to share calendars in Outlook or native applications on mobile devices. The feature is not automatically available; you need to re-share calendars each time you want to sync them. While it’s a bit of a pain, all you need are valid permissions for sharing, and you can differentiate each person in the group by color. We can help you set it up.

To borrow an old phrase, we passed the last exit on the information super highway light years ago. With conferences like Microsoft’s annual event, we can be the roadside service resource that keeps you moving. Call us – 973-433-6676 – or email us at any time with any questions or service requests.

Shooting Yourself in Your IT Foot

We got a call recently from an MIA client who was trying to save money by relying on their “resident IT expert.” They could have shot themselves in the foot, but somehow, a few dance steps worked in their favor. They dodged this bullet, but not everyone is that lucky.

Our client is a multi-generational company, and one of its long-time employees served as their “resident IT expert.” A couple of members of the younger generation called us in because something didn’t seem to be right with their system. They thought their system was beyond repair for all intents and purposes. What concerned us most were two answers that we got for most of our questions:

  1. “I don’t know.”
  2. “We don’t have that information.”

When we logged into their system, we looked at their router and firewall and started to look at their setup. This time, we got some answers.

“Do you have another office?”

“Yes.”

“Does it connect to your system here?”

“Yes.”

The connection was made through a desktop computer that was sitting in a corner of the office – a computer that nobody ever touched. It was wide open; they allowed remote access to the desktop, and there was no protection against any kind of intruder. The hacker was able to get in and hijack their software by encrypting it.

We made phone calls to all of their application software vendors to learn how everything interacted, and we learned that they used Carbonite to back up their data. Trying to recover it was useless because all the data was corrupted, but we were able to get in. What we saw was eye-opening.

It turned out that they were hosting one small application that opened the door. Then we saw that nothing had been backed up for the entire year – and the ports were wide open. They also had an antiquated email system that was hijacked. Their in-house person never foresaw any issues with their setup and didn’t know the consequences of any settings that were tweaked or ignored.

We recommended they contact the hacker and see what it would cost to ransom their data, but they preferred to re-enter all of their data for the year. They had hard copies.

Before they began their recovery, we installed a new server and firewall, and while working with one of their software companies, we learned they had a copy of the data up to Aug. 1. Before they began any work, we set up a new email system and new log-in credentials.

It looked like they had dodged a hail of bullets, but within a day, their in-house person was already compromising their system by installing a bunch of utilities and other software. We put a stop to that, and that halted their system leaks and plugged their gaps. However, the whole process of investigating their processes and systems and buying and installing their new systems cost them almost $7,000 – plus their internal cost to re-enter what now amounted to one month’s worth of data. You could also add in a cost factor for aggravation.

In today’s age of a hacker-happy internet, you need a security audit to make sure your vulnerabilities are shored up. Call us – 973-433-6676 – or email us to set up your security audit. It will take an hour or two and cost less than $200. Hackers are highly sophisticated. How much could a breach of your system cost you? Don’t be penny wise and pound foolish.