Make Reading a Habit

We’re so overloaded with emails, texts, WhatsApp and other communications that we’ve fallen into the bad habit of skimming messages and probably doing the same with websites and documents. It’s time to get back into the habit of reading things more closely because not everything is as it seems.

For example, you may be expecting to get a payment from a customer or a client, or you may be asking someone for help. When you get an email that appears to be responding to your expectation, many people tend to click on something without reading all the details closely. That’s when disaster strikes because that click opens the door for a hacker.

Hackers have taken really good advantage of artificial intelligence (AI). They can use it to create exact matches for corporate logos and write messages with perfect spelling and the most appropriate language for their target. This makes phishing attacks easier to carry out, and phishing attacks are the most common means of hacking an email account.

The obvious way to combat AI-generated phishing attacks is to use your own RI – real intelligence. Read the sender’s address very carefully. Is it the real address that you know, or is there a slight misspelling, such as an extra letter, a missing letter, or transposed letters? Does it make sense to you that the sender has included an attachment or link?

If you’ve skimmed over a phishing email and didn’t catch a warning sign, you may have provided a hacker with an opening to your personal information and the ability to access your financial accounts. If you’ve skimmed legitimate invitations to use two-factor authentication (2FA) for websites and – especially – your email login credentials, you may have provided an opening for hackers.

Protecting your email login credentials is critical to your online security. If a hacker steals access to your email and you have no 2FA, they can go to your bank’s website, for example, and use the “forgot password” process to reset your password. Signs your email account has been hacked include the inability to log in with your correct password, notifications about changes to your account settings or messages sent from your account that you didn’t initiate.

The start of the year is a good time to get a security audit and initiate strong security procedures, such as 2FA measures and the use of a password manager with unique passwords for every website you and your employees or family members access. Call us – 973-433-6676 – or email us to set up an appointment.

Copilot is My God?

We likely don’t realize how much AI plays a role in our daily lives. You know those annoying phone trees, the ones that don’t seem to ask the right questions for your problem or offer a good answer or access to a real human being? That’s AI at work. They drive me nuts, but what keeps me awake is who has access to my data?

Many of our customers are turning to Microsoft Copilot to access the power of AI, and if you’re thinking about doing it, here are a couple of things to consider.

As you’ll discover upfront, there’s a free version and a paid version. The main difference is that free Copilot is a basic AI assistant with web-grounded chat and limited image creation. The paid Copilot Pro and Microsoft 365 Copilot offer deeper integration with Microsoft apps, priority access to advanced models, and higher usage limits. I can use ChatGPT to create Excel formulas for my data, but it’s the paid version that accesses my data.

AI carries a number of risks, including data poisoning, adversarial attacks, and privacy leakage, which can compromise a model’s integrity and sensitive data. There’s also the potential for model theft and vulnerabilities in the supply chain and APIs. Let’s focus on risks related to data, privacy, and model integrity.

  • Privacy Leakage: AI models trained on sensitive data may inadvertently leak that information through their outputs. This includes data inversion and membership inference attacks, where attackers try to extract private information about the training data.
  • Model Stealing: Attackers can reverse-engineer or replicate an AI model by analyzing its outputs, which can be used for malicious purposes or to steal intellectual property.
  • Data Breaches: AI systems often require large amounts of data, making them attractive targets for data theft. A breach can expose sensitive personal, financial, or proprietary information.

Whether you use AI or not, Windows 11 and your computer play key roles in your security. All computers are not created equal. If you do a lot of work with Copilot, your computer may not cut it. You should have a computer with a neural processing unit (NPU) capable of processing 40 TOPS – 40 trillion operations per second. Anything less than that will require your computer to offload data from your CPU and graphics card by sending it to the cloud.

Sending it to the cloud involves a security risk, no matter how small the risk may be, and that’s a breach opportunity. Sending data to the cloud also slows you down. If your computer can keep all your work local, it’s faster and more private.

Windows-based computer chips that run 40+ TOPS or more are the specialized Neural Processing Units (NPUs) in new “Copilot+ PCs,” which include processors from Intel’s Lunar Lake series and upcoming Qualcomm Snapdragon X Elite/Plus chips. These are not standard CPUs like the Intel Core Ultra 7 155H, which does not meet the requirement.

Computers capable of 40 TOPS start at around $600 to $700. More powerful and versatile models can cost more than $1,000, but prices could be much higher, depending on the NPU or if it uses a more expensive, high-performance GPU, which can add significant cost for graphics-intensive tasks. In addition, you likely will have licensing fees depending on what you’re doing and how many computers are doing the work.

We can help you assess your AI needs and sort through myriad options for Copilot licenses and the computers needed to accomplish the tasks you require. AI can require a large investment, which requires intensive investigation. Contact us by phone – 973-433-6676 – or email to set up an appointment to start the investigation process.

 

Fools and Their Money: A Seasonal Shopping Guide

“A fool and his money are soon parted” is a saying often attributed to Thomas Tusser, an English poet and farmer, who first wrote a version of it in his 1573 book Five Hundreth Pointes of Good Husbandrie. If only he could have envisioned today’s internet. AI will test your ability this year to differentiate the fake from the real more than ever.

As we scour the internet for bargains, hard-to-find items, and the best possible shipping terms, charities are making their annual push for donations, including major online solicitation campaigns. Scammers of all sizes are also using all sorts of AI tools to get between you and the companies you want to buy from or donate to.

Succumbing to a scam doesn’t make you a fool; the scammers and their tools are really, really good. AI helps them create exceptionally good graphic and video deep fakes. It helps them replicate flawless logos and improve their grammar, spelling, and syntax, all of which used to be dead giveaways of a scam.

But it would be foolhardy not to raise your antennae and harden your common sense with renewed vigilance. The cardinal rule remains the same: If something looks too good to be true, something is likely wrong.

Let’s look at some things that should raise a red flag:

  • Links: Whether in an email or especially on a website popup, don’t click on a link from a person or entity you don’t know or can’t verify. It’s the quickest way to allow a bad actor to plant malicious code that can compromise your data and that of anyone in your contact list.
  • Emails from Businesses, Charities or People You Don’t Recognize: The sender’s name may look legitimate, but you can hover your mouse over the sender’s name and see the real email address. If you’re not sure about anything you see, you have two options:
    • Delete the email.
    • Open a new browser window and type in the name of the business or charity as you know it to be. You should be able to find a phone number to call to verify if it’s from a legitimate organization.
  • Unsolicited Text Messages: This is another form of phishing known as smishing. Treat them the same as an email.

Be careful of really good prices when shopping for all products and services. Prices that are too good to be true may be outright fraudulent or carry terms and conditions that are extremely unfavorable to you. Check closely to make sure a product or even an airline ticket or hotel room is not offered by a gray-market or third-party provider. Read the terms and conditions and look for authentic user reviews. Again, if something looks funny, it should raise a red flag.

No matter what you’re looking to do online, it’s more important than ever to use two-factor authentication (2FA) for all the websites you can. While a code sent to your computer or phone is better than nothing, more advanced forms of 2FA, such as authenticator apps or biometrics, rely more on information stored on a specific device, making them more secure.

If you think you may have been hacked, call us – 973-433-6676 – as soon as you possibly can to assess the breach and take steps to close up your security holes.

If You Know All Your Passwords…

If you know all your passwords, your cybersecurity can be breached. Why? Anything that’s easy for you to remember follows a logical pattern that AI is getting better at picking up. A strong password has no logic. You must have a password manager, and you must let it generate a password for each online account.

You all know the drill by now. A strong password combines upper and lower case letters, numbers, and special characters in strings that generally are 12 to 16 characters long. We won’t say it’s impossible for a human being to create and remember 100 or more strong passwords. But it’s highly unlikely.

The best part of a password manager is that you only need to remember one strong master password. The downside is that if you lose or forget the password, you may not be able to access the app, or you’ll need to jump through a lot of hoops to gain access.

AI is making passwords weaker and weaker. Remember that at its core, AI is massive computing power. Anyone who tries to crack passwords can run an untold number of scenarios for as long as they need to crack a code or give up – momentarily. If you have a password that follows some kind of publicly available personal information and/or a pattern, the hacker’s computer will eventually pick it. The computer-generated password from a password manager doesn’t use any of that information, and it’s not readily machine readable.

In addition to giving you a strong password, a password manager does away with any need to reuse a password. There’s a tendency to reuse a password because you can remember it, especially if we fear it may be difficult to access the password manager. This can be true with a smartphone, where you can only view one screen at a time. However, you can copy a password from your password manager app and paste it into your smartphone’s browser.

As you all know, reusing passwords poses a significant risk if a password is cracked at one site. Again, using AI, the hacker can quickly apply the password to every website they know you access, and chances are good that they’ll get a hit and get in.

Just about any top-rated password manager works across all platforms and should give you the option to choose a family/friends subscription for personal use and a corporate subscription. It should be mandatory for everyone in your family and for all employees using corporate online accounts to have and – more important – use the password manager.

We can help you select a password manager that meets your needs and make sure that everyone in the program is properly set up. We can also make sure that everyone knows how to download their passwords and make a hard copy, which protects everyone if they lose or forget their password or if you want to change password managers. Call us – 973-433-6676 – or email us for an appointment.

New Outlook has Mixed Benefits

Classic Outlook has aged like a good wine, but Microsoft is pushing more users to the New Outlook for managing emails, contacts and calendars. Some features are gone from the New Outlook, and some are hidden.

Deciding whether to hang in with the Classic Outlook or go to the New version depends on how you use the app. However, keep in mind that Microsoft is like Lola. What Microsoft wants, Microsoft eventually gets – and at some point, they’ll stop supporting Classic Outlook to force everyone into New Outlook.

Microsoft touts a more minimalist interface for New Outlook that it says is more in line with Windows 11 and AI and handles email, calendars and contacts better. One of the specific benefits is they claim is the use of AI to help you write better emails, but you can turn off the autofill. They also claim New Outlook can let you access your emails – including Gmail, Yahoo, and even your “shopping account” – from one spot on every Windows device. And you can organize your appointments, share availability and events with a click, and ensure time for important people and events.

However, Microsoft took away a number of key functions that they may or may not restore. These include features involving multiple mailbox accounts and ways in which accounts can be shared from SharePoint. Some “take-aways” are scheduled to be restored, and some are still under investigation. The company says it’s looking for user feedback in deciding what to restore and when that might happen.

Quite honestly, we think this hurts Microsoft’s credibility, but it also shows where all major software companies are headed. They will make changes seemingly on a whim without regard to how those changes affect our ability to maximize our production. Features might come back – or they might not.

Together, we need to be flexible in how we use software such as Outlook, but on the other hand, we can force the issue somewhat. We can look specifically at how you use Outlook and determine what Classic features we may be able to recapture some things that were lost or help you find ways to make better use of New Outlook.

As much as we might yearn for the “good old days” of apps like Classic Outlook, it’s likely we’ll all be using New Outlook sooner rather than later. So, let’s get a head start on adapting to it. Call us – 973-433-66765 – or email us to see how you can bridge the Classic and the New to make Outlook work better for you.

Computer or Tablet?

Our world is changing fast. Computing and business experts tell us that by 2028, the cloud will be a necessity. AI (artificial intelligence) will have us using so much data that only the cloud will handle the workload. We’ll need more computing power, but at the same time, we’re demanding the ability to access that data quickly and from anywhere – even while traveling. Tablets are looking more and more like replacements for laptops.

We’ve seen a steady switch to smaller devices with greater portability. From being tied to desktop computers that were impossible to move, we increased our mobility when we found ways to access our stationary laptops with an internet connection. Using a laptop, we could essentially access our apps and files and modify them – or even create new files – and find everything up to date when we returned to our desks. The penalty was speed, but it wasn’t a prohibitive penalty.

The next step in the progression was to hook our laptops into docking stations, a step that still works for many who work in the office and remotely. You could have your big monitor and a regular keyboard in the office, but you could use the same computer – with all the same apps and files – working at home or in a hotel room.

The power of tablets and cell phones combined with the expansion of the cloud has made it possible to work on the road without a computer. A vast number of business applications have versions for computers and mobile devices, and you actually can access and edit files with a lightweight device that’s easy to carry outside the office. The newest tablets and phones actually have more powerful processors than many laptops still in use because the mobile devices contain NPUs, Neural Processing Units, that give you faster processing and better photo/video capabilities.

So, as you decide what platform to use as your main computing device, you have a lot of options. Your choice will depend on how you work, and it’s a personal decision for every user.

Computers, on one hand, give you better multitasking capability. You can keep multiple files and web browsing windows open at one time on multiple screens and monitors. It’s a lot easier to move among all those apps and views on multiple screens than it is on a single mobile device screen.

Mobile devices, on the other hand, can process data, including photo and video files, faster, and if you need to work on an Excel, Word, or PowerPoint file, you can tie your device to a portable keyboard. But you can’t use multiple screens. That may be outweighed by the ability to carry a cell phone in your pocket or pocketbook or carry a tablet (and keyboard) in a small backpack. Road warriors, field workers and anyone who needs to access data away from a desk will appreciate this.

If you need to work in public places, you should use a tablet that can work on a cellular network just like your phone. I will never tell you unequivocally that a cellular connection is hack-proof, but it is far more secure than a Wi-Fi network. With the availability of unlimited-data cellular plans, it doesn’t make sense to rely on Wi-Fi in the US.

If your PC has an eSIM, you might be able to add your device to your current mobile account by using the Mobile Plans app in Windows 10 (not available in all computers) and 11. The app connects you to your mobile operator’s website so you can get a data plan for your device and connect to their cellular network.

Whatever devices you use, make sure your operating system (OS) software and apps are up to date. If your device can’t accommodate the latest OS and app software, we urge you to replace the device. Keep in mind the realities of today’s technology environment and how it will change in the near future:

  • We will be making more use of the cloud. By 2028, the vast amounts of data needed to work with AI will require cloud storage because it will be the way to meet your capacity needs.
  • Your device must be capable of processing more data faster to work with AI.
  • Your device must be capable of using the latest security technology. Cybercriminals are spending big money to find a hole in your system – in hopes it will lead them to holes in bigger systems.
  • Remember the number 244. That’s how many days it takes on average to detect a security breach. You can best protect your system by being well-prepared and vigilant.

We can help you choose and configure the devices that best fit the individual needs and corporate needs of everyone in your organization to maximize performance and security. Call us – 973-433-6676 – or email us to set up an appointment to discuss your needs and available options and costs.

Do You Speak ‘Search’?

The New Outlook’s web-based email client has powerful search functions to help you cut through the sheer volume of messages we store and don’t always sort. Taking advantage of them will require you to learn about “search” language, which has its roots in Boolean searches that offer precise options to find information. They use AND to expand a search, OR to introduce options, and NOT to exclude information.

Boolean searches are rooted in an algebraic method developed in the mid-19th century by the English mathematician George Boole. It’s fundamental to modern computing, and today’s database searches are based mainly on Boolean logic, which allows us to specify parameters in detail. If you think of your email inbox as a database, Boolean concepts apply to your searches.

Fortunately, we don’t need to remember our high school or middle school algebra to search our Outlook inboxes. Cheap data storage (it really is cheap even if you balk at paying for it) lets us keep messages for years…and years…and years. We can have hundreds of thousands of messages in one big folder or dozens of subfolders across several email accounts.

In a typical search, you likely type in a statement (the instructions for the search) that consists of the sender’s name, and often you’ll see a list of options that ties the sender to a subject line or specific content. The computing power harnessed by AI presents you with choices based on what your computer thinks you are looking for. It’s not an efficient way to search your emails for specific information. It’s more like using terms like “hot” and “cold” when looking for a hidden object.

Using Boolean terms, you can give your computer more specific instructions. For example, if you have written me emails for advice on antivirus and malware software, you can pinpoint my responses by typing Norman Rosenthal AND antivirus into the search box. You can also type it in this way: Norman Rosenthal +antivirus.

If you’re not sure whether the subject was spelled antivirus or anti-virus, you can type in: Norman Rosenthal AND antivirus OR anti-virus. If we had email exchanges about antivirus software or malware and want to restrict it to just antivirus, you could type in: Norman Rosenthal AND antivirus NOT malware or Norman Rosenthal +antivirus -malware.

That’s essentially how Boolean searches can work in your email boxes, but they’re not the only kind of search you might need. You can use a statement to find all the unread emails in your inbox. Unread emails can cover several days and pile up when you’re especially busy.

Note that the same search techniques and languages apply to searching your Sent Items.

The New Outlook has removed Unread as a category of messages you can click on. But you can still find them by typing this into the search box: isread:no. This will give you a list of unread messages. There is also a prompt for unread messages when you open the search box, but the list may differ from the list generated by the isread:no statement.

With the increase in the use of email, email manageability and security will become more tightly intertwined, especially for offices with multiple people collaborating on servicing the same accounts, clients, or patients. Good practice for subject lines on outgoing emails will help manage searches for your inbox and messages you’ve sent. The subject line may also influence how email spam and security filters handle your email (see Quarantined Messages and Email Security).

We’ve hit the highlights here. Every organization or person has specific email handling needs. Call us – 973-433-6676 – or email us with specific questions about email management. We all have a ton of emails; don’t let them weigh you down.

Where is Technology Going?

Apple just introduced Apple Vision Pro, and it’s as revolutionary as anything we’ve ever seen. In short, it’s a set of goggles that can immerse you in a totally new environment, and it makes Apple’s innovations like the mouse, click wheel (iPod,) and multi-touch (iPhone) seem primitive by comparison. See for yourself how immersive it is, and then step back into reality. Will technology be a tool or a controlling force?

The technical term for Apple’s new technology is spatial computing, and their promotional video will give you a sensual rush. The technology behind the mouse, iPod, and iPhone changed how we looked at computing and forced other technology companies to step up their games, too. In our eyes, Apple has upped the ante again with a quantum leap in technology that will open unimaginable vistas to the public – once we get over the $3,499 price tag and once the price drops.

So what, in essence, is spatial computing? In this case, using Apple Vision goggles and technology enables you to use your eyes, hands and even thoughts to create a screen in front of you that’s as big as you want it to be (larger than life, if you like) and open and use apps as you would from an iPhone, iPad, or Mac computer.

While that might be great for editing photos or videos or really zooming in on a map or satellite view of a place you’re going to visit, just think of what it would be like to watch a movie or sporting event in your kitchen or on an airplane. It can become a totally immersive experience. Likewise, think of what it can do for teams of surgeons or infrastructure repair technicians who need the same detailed visual information to complete delicate tasks in tight places. They can take this technology right to where they’re working.

One of the features that separates Apple Vision from VR (virtual reality) goggles is that you’ll still be able to see the space you physically inhabit, such as the room you’re in, and people will be able to see you. That helps for collaborative efforts professionally, and it doesn’t seem as isolating on a personal level.

However, it’s yet another move away from face-to-face human interaction, and that’s what’s bothering us. We already sit in rooms together, each of us busy with our cell phones. If we’re talking about something, at least one of us is consulting the internet to answer a question, provide more information, or order a pizza for delivery. The smartphone is an extension of each of us.

Where will it go with Apple Vision? Will we sit in the same room – and even look at the same things – but still be in our own little VR cocoons? Will we sit in conference rooms and look at the same presentation through our own set of goggles? That will totally defeat the benefits of eye contact and body language in learning some fine points that go into the decision-making process.

We know that’s taking an extreme view, but technology seems to remove more and more human interaction from every transaction. How often have you called a business’s customer service department and gone through exasperating menus before getting a human being to help you solve a problem in a few short minutes? More automation, it seems, makes our experiences more complicated and time-consuming.

Personally, I don’t like where we’re heading with technology. AI and chats don’t do it for me. We still need human interaction. What are your thoughts? Leave a comment.