Category

MSP

Old Mac malware gets a facelift

By | Apple, Managed Service, Managed Technology, MSP, Security

In yet another sign that Apple computers are no longer being ignored by hackers, a successful piece of Windows-based malware has been rewritten for MacOS. Instead of encrypting data and holding it for ransom, OSX.Dok skips the extortion and simply steals your bank account information. Read on to learn what you can do to prevent an infection.

OSX.Dok isn’t new, but it has been improved

Originally, this Mac-based malware looked very different. When OSX.Dok was first reported several months ago, it could infect only older versions of the Apple operating system. Besides being relegated to OS X, it didn’t do much more than simply spy on the internet history of its victims. More recently, however, OSX.Dok was updated to target the newer macOS and to steal banking information.

How does it work?

Like so many malware programs today, this particular threat is distributed via phishing emails. Because the end goal is to acquire private financial information, these emails pretend to have pressing information about taxes or bank statements stored in attachments that actually contain malicious software.

Once any of these attachments are opened, OSX.Dok secretly broadcasts information about the computer and its location to the malware’s authors. Based on that information, hackers can redirect victims that visit banking websites to copycat URLs tailored to their language and location. Almost everything on the copycat sites looks exactly the same, but when you submit your user ID and password, they go straight to hackers.

Worst of all, the latest version of this malware seems to be incredibly advanced. It actively changes the way it hides itself and even modifies system settings to keep the computer from checking for operating system and security updates.

What can I do?

Security experts are still working on a way to combat OSX.Dok, but believe that it will remain a problem for some time to come. For now there are a few things you can do:

Never open attachments from people you don’t know personally, and even then be wary of anything you weren’t expecting.
Pay attention to little details. For example, copyright dates at the bottom of fake banking sites only went to 2013.
Look closely at the lock to the left of URLs in your address bar. Fake websites may have security certificates with names slightly different from those of the sites they mimic.

The best way to stay ahead of threats like OSX.Dok is by partnering with a capable IT provider. That way you can be sure that you have all the latest software and hardware to keep you safe. Even if something managed to slip through, regular audits are sure to find infections sooner than an overburdened in-house team would. Call Simpatico today at 855-476-6347  to find out how we can protect you!

Published with permission from TechAdvisory.org. Source.

What you need to know about malware

By | Managed Service, Managed Technology, MSP, Security

You’ve all heard of viruses, spyware, ransomware and trojans. But did you know that they’re all types of malware? They’re all designed to ruin your digital life, but different types of malware put your computer at risk in different ways. Understanding what sets them apart can keep your business guarded.

Viruses

Once created to annoy users by making small changes to their computers, like altering wallpapers, this type of malware has evolved into a malicious tool used to breach confidential data. Most of the time, viruses work by attaching themselves to .exe files in order to infect computers once the file has been opened. This can result in various issues with your computer’s operating system, at their worst, rendering your computer unusable.

To avoid these unfortunate circumstances, you should scan executable files before running them. There are plenty of antivirus software options, but we recommend choosing one that scans in real-time rather than manually.

Spyware

Unlike viruses, spyware doesn’t harm your computer, but instead, targets you. Spyware attaches itself to executable files and once opened or downloaded, will install itself, often times completely unnoticed. Once running on your computer, it can track everything you type, including passwords and other confidential information. Hackers can then use this information to access your files, emails, bank accounts, or anything else you do on your computer.

But don’t panic just yet, you can protect yourself by installing anti-spyware software, sometimes included in all-purpose “anti-malware” software. Note that most reputable antivirus software also come bundled with anti-spyware solutions.

Adware

Are you redirected to a particular page every time you start your browser? Do you get pop ups when surfing the internet? If either situation sounds familiar, you’re likely dealing with adware. Also known as Potential Unwanted Programs (PUP), adware isn’t designed to steal your data, but to get you to click on fraudulent ads. Whether you click on the ad or not, adware can significantly slow down your computer since they take up valuable bandwidth. Worse still, they’re often attached with other types of malware.

Some adware programs come packaged with legitimate software and trick you into accepting their terms of use, which make them especially difficult to remove. To eradicate adware, you’ll need a solution with specialized adware removal protocols.

Scareware

This type of malware works like adware except that it doesn’t make money by tricking you into clicking on ads, but by scaring you into buying a software you don’t need. An example is a pop up ad that tells you your computer is infected with a virus and you need to buy a certain software to eliminate it. If you fall for one of these tactics and click on the ad, you’ll be redirected to a website where you can buy the fake antivirus software.

Scareware acts more like a diversion from the other malware that often comes with it. A good antivirus solution will help scan for scareware too, but you should patch your operating systems regularly just to be safe.

Ransomware

Ransomware has become increasingly common and hostile. It encrypts your computer files and holds them hostage until you’ve paid a fee for the decryption code. Because ransomware comes with sophisticated encryption, there aren’t many options unless you have backups of your data.

There are some tools that can protect against ransomware but we recommend that you backup your data and practice safe web browsing habits.

Worms

Similar to viruses, worms replicate themselves to widen the scope of their damage. However, worms don’t require human intervention to replicate themselves as they use security flaws to transmit from one computer to the next, making them far more dangerous than your typical virus. They often spread via email, sending emails to everyone in an infected user’s contact list, which was exactly the case with the ILOVEYOU worm that cost businesses approximately $5.5 billion worth of damage.

The easiest ways to protect your network from worms is to use a firewall to block external access to your computer network, and to be careful when clicking on unknown links in your email or unknown messages on social media.

Trojans

Usually downloaded from rogue websites, Trojans create digital backdoors that allow hackers to take control of your computer without your knowledge. They can steal your personal information, your files, or cause your computer to stop working. Sometimes hackers will use your computer as a proxy to conceal their identity or to send out spam.

To avoid trojan attacks, you should never open emails or download attachments from unknown senders. If you’re skeptical, use your antivirus software to scan every file first.

In order to keep malware at bay, you need to invest in security solutions with real-time protection and apply security best practices within your office. If you have any questions or concerns, or simply need advice on how to strengthen your business’s security, just give Simpatico Systems a call at 855-476-6347 and we’ll be happy to help.

Published with permission from TechAdvisory.org. Source.

Avoid customer frustration with these tips

By | Business, Managed Service, Managed Technology, MSP, VoIP

Bad customer service is one of the reasons why customers switch to competitors. It often begins the moment they pick up the phone to report a service issue, only to end up getting frustrated with your phone system. Your on-hold message may seem inconsequential, but it can play a big role in your customer’s dissatisfaction. Avoid giving your customers another reason to switch by following these tips.

Use professionally recorded messages

A small nuisance like minimal static might not cause annoyance, but an unprofessional on-hold message certainly will. Banking on in-house resources such as your employees recording your on-hold messages might seem cost-efficient, but the poor quality of the recording could backfire.

To avoid this, hire professional voice talents for your company’s Interactive Voice Response (IVR) systems. They’ll enhance your company’s brand by conveying messages in a professional, friendly, and pleasant manner. Professionals have impressive enunciation and exceptional voice skills, and they’ll record messages using high-quality equipment.

Keep callers engaged with pleasant on-hold music

Your company’s on-hold music should be relaxing, well modulated (not too loud or too soft), and on-brand. If you don’t have the right recording equipment, hire professionals. Otherwise, your message may end up sounding distorted and the recording may produce static. It’s a small thing, but it can spell the difference between keeping customers and driving them away.

Offer an easy way to speak to a person

To solve time-sensitive issues such as overcharged billing or an ongoing service issue, customers would rather speak to someone who can reverse a charge or file an urgent customer report. Businesses that rely too much on recorded messages that spin a complex web of voice prompts risk frustrating their customers.

Companies that deal with a large volume of inquiries can combine the efficiency of an IVR and personalized assistance by offering an option that lets callers quickly get connected to a customer service representative.

Provide clear, useful information

According to a study, 83% of customers prefer human interaction over automated channels when solving customer service issues. Nevertheless, IVRs offer an efficient way to dispense non-critical information such as business operating hours, special offers, and minor account updates.

Automated responses also offer an appreciable value to businesses that need to funnel their most important customer service calls into the right customer support channels. When deploying an IVR system, your on-hold messages should provide information that’s up-to-date, concise, and useful.

Some of these issues can be solved using advanced VoIP solutions that not only automate and upgrade your customer support functions, but also turn it into a superior messaging system that can appease unhappy clients. Call us now for VoIP solutions that will help you integrate these tips into your customer support system.  855.476.6347

Published with permission from TechAdvisory.org. Source.

How to secure your IoT devices

By | Hardware, Managed Service, Managed Technology, MSP, Security

More firms are using the Internet of Things (IoT) to create new business opportunities. For instance, companies that install smart sensors can automate data entry and monitor their inventory. However, if left unsecured, IoT devices also give hackers an opportunity to breach your network. In order to keep attackers at bay, we advise you take the following precautions with your IoT devices.

SET PASSWORDS

Many often forget they can set passwords for IoT devices. When this happens, they tend to leave their gadgets with default passwords, essentially leaving the door open for hackers. Make sure to set new and strong passwords — preferably with a combination of upper and lower case letters, numbers, and symbols — for each device connected to your network. Then, use a password manager to securely keep track of all your passwords.

Disable Universal Plug and Play (UPnP)

UPnP is designed to help IoT gadgets discover other network devices. However, hackers can also exploit this feature to find and connect to your IoT devices. To prevent them from getting to your network, it’s best to disable this feature completely.

Create a separate network

When you’re dealing with IoT devices, it’s wise to quarantine them in a separate network unconnected to your main office network. By doing this, user gadgets will still have access to the internet but won’t be able to access mission-critical files.

You should also consider investing in device access management tools. These allow you to control which devices can access what data, and prevent unauthorized access.

Update your firmware

If you want to keep your devices secure against the latest attacks, then you need to keep your IoT software up to date. Security researchers are always releasing security patches for the most recent vulnerabilities, so make it a habit to regularly check for and install IoT firmware updates. If you have several gadgets to secure, use patch management software to automate patch distribution and set a schedule to check for updates monthly.

Unplug it

Disconnecting your IoT devices from the internet (or turning them off completely) whenever you don’t need them significantly reduces how vulnerable you are to an attack. Think about it, if there’s nothing to target, hackers won’t be able to make their move. Turning your IoT devices on and off again may not seem like the most convenient strategy, but it does deny unauthorized access to your router.

Unfortunately, as IoT devices become more commonplace in homes and offices, more hackers will develop more cunning ways to exploit them. Getting into the above mentioned security habits can protect you from a wide variety of IoT attacks, but if you really need to beef up your security, then contact Simpatico Systems today at 855.476.6347. We have robust security solutions that keep your hardware safe.

Published with permission from TechAdvisory.org. Source.

Apple iOS 11: Focus on enterprise users

By | Apple, Managed Service, Managed Technology, MSP

The iPad was originally created for individual consumers even though it was later adopted as a viable productivity tool. After several functionality and style changes, Apple has finally released an iPad that could rival the PC: the iPad Pro. The latest update in Apple’s lineup of tablet computers is a vast departure from previous iPad devices, and with the recently announced changes in the upcoming iOS 11, the company looks poised to shift its focus from individual to enterprise users.

From mobile to desktop

Apple’s iOS platform was originally designed for mobile devices, but the company is making its mobile operating system more desktop-friendly. In the upcoming iOS 11, users can expect a user interface (UI) that’s very similar to a Mac desktop UI with substantial capabilities like multi-tasking, which will allow users to view programs in a split/slide view.

The Files app for iOS will be particularly useful for businesses that use various cloud storage platforms such as Box, Dropbox, Google Drive, and OneDrive. With this handy new app in iOS 11, all files can be accessed, downloaded, and shared within one single platform using your iPad. This app will be very similar to the Finder folder in Mac.

Other notable features

Aside from the multi-tasking capability and the Files app, the new enterprise user-friendly OS will provide users with Drag and Drop capability — previously unavailable to iPad. Instead of having all apps displayed on the screen, users can now enjoy a docking system that Mac users will find familiar. Existing Apple enterprise users will find the new iOS more in-tune with their needs, as switching from one device to another will be more seamless.

What businesses can expect

Whether Apple’s major redesign will be enough to convince non-iOS device users to switch is yet to be determined. It’s also uncertain whether more enterprise tools can be expected from later versions. What’s certain is that Apple has introduced enhancements to the iPad Pro that are significant enough to make it a formidable choice as a standalone enterprise computer.

Many businesses already use an iPad in the workplace, and with these enhancements, integration of mobile and desktop functionality will be more seamless across all Apple devices. This may also prove to be a significant shift for the iPad from being a secondary computing device that displays content to being a primary computer that’s used for creating content.

Apple has always been focused on individual preferences rather than an entire market segment. But with the iOS 11, it is enterprise users who have the most to look forward to. If you need intelligent recommendations on device and usability features on both mobile and desktop devices, call us today at 855.476.6347.

Published with permission from TechAdvisory.org. Source.

How 5G data will change VoIP

By | Android, Apple, Google, Managed Service, Managed Technology, MSP, Office, VoIP

Our craving for data seems to increase every year, fueling the constant advancements in wireless technology. The latest is 5G, an abbreviation for the fifth-generation wireless systems, and it is set to transform VoIP for the better. Here are three ways it will do that.

Improved video conferencing
The major factor holding web and video conferencing back is how fast current networks can transmit data. Fortunately, innovations like Web Real-Time-Communications (WebRTC) and 5G networks will enhance VoIP for businesses. Providing open and stable streaming as well as sufficient transfer speeds will soon allow businesses to accommodate higher quality, even 4K and 8K resolution videos.

Virtual and Augmented Reality
With 5G network speeds, virtual and augmented reality will become more common for small- and medium-sized businesses. 5G will blow past 4G’s Gbps (gigabits per second) limit, which is currently holding back the adoption of VR and AR applications.

VR and AR need to process significantly more visual data because of the freedom of movement they allow, and this puts an enormous strain on mobile networks. 5G is also set to ensure a better user experience by lowering latency levels that simplify and smoothen daily business operations, preventing network delays from affecting your bottom line.

Mobile VoIP
VoIP calls rely heavily on sufficient download and upload speeds. For example, when mobile VoIP users on 4G networks are limited to 12Mbps upload and 2Mbps download speeds, they experience unstable and poor call connectivity and clarity. These limitations could also lead to packet loss, which happens when one or more “packets” of data traveling across a computer network fail to reach their destination, typically caused by network congestion.

When businesses decide to adopt the up-and-coming 5G network, businesses can expect to see significant improvements when it comes to VoIP. Ensure the success of your SMB with increased network speeds, better call quality and conversations with consistent connectivity. If you’re looking to set up a VoIP system for your business, call or email us today!

Published with permission from TechAdvisory.org. Source.

How thin and zero clients save money

By | Business, Hardware, Managed Service, Managed Technology, MSP, Office

Businesses are always looking for ways to cut costs without sacrificing growth. For the longest time, many believed that they had to purchase workstations with its own processing power, RAM, and hard drive. But thanks to virtualization, companies can save money and get the computing processes they need with thin and zero clients.

What are thin and zero clients?
Thin clients are stripped-down computers with minimum processing power and memory. They rely on a basic operating system and a network connection to access a more powerful system where almost all computing processes take place.

Zero clients work the same way. The only difference is that there’s no local storage or operating system installed on the device; all the software, storage, and processing power sits on a server until you need it. This setup makes it ideal for cutting costs, and here’s why.

Reduced hardware costs
When it comes to upfront costs, thin and zero clients are the obvious choice. Conventional desktops start at $300 per user, while thin clients can go for as low as $90 per user. And since they have no hard drive or other moving parts, lean devices tend to be more durable and have a longer lifespan than their traditional counterparts.

Simplified IT management
Another benefit of thin clients is that they can be managed from a server. Suppose a new software update was released. Instead of manually downloading the patch on each computer, you can simply install the update on your server and roll it out to all thin clients. Apart from upgrades, you can make backups, security configurations, and application deployments in the data center. This quickens setup, reduces downtime, and increases employee productivity.

Minimized security risks
Thin clients also help you avoid costly malware attacks and data breach incidents. Your employees and poorly managed endpoints are the biggest vulnerabilities with traditional desktops. Thin and zero clients reduce these problems by limiting direct access to the operating system. This prevents employees from copying sensitive data to removable media and installing software, malicious or otherwise.

If your thin client is damaged or corrupted, you don’t have to worry about your data, as it’s originally stored in an impenetrable server.

Decreased energy consumption
Because processing is done locally, traditional desktops generate a lot of heat and require more power, which results in huge power and cooling bills at the end of the month. By contrast, thin and zero clients consume only 4-6.5 watts of power, almost 1/50th of thick client requirements. What’s more, they require little to no cooling, allowing you to enjoy significant cost savings.

When looking for cost-cutting solutions, thin and zero clients should never be overlooked. The reduced hardware costs, power bills, and security risks are just too good to pass up. But if you’re still unsure about this technology, give Simpatico Systems a call at 855.476.6347. We’ll assess your tech needs and determine whether or not thin or zero clients can help you succeed.

Published with permission from TechAdvisory.org. Source.

Automate mundane emails to get more done

By | Business, Managed Service, Managed Technology, MSP, Office

Everyone wishes there were more minutes in a day. Between repetitive emails and seemingly endless meetings, it’s hard to find time for important tasks. Thanks to the increasing affordability of enterprise-level IT however, SMBs can start getting at least half of those problems under control with email automation.

What is email automation?

Usually included in customer relationship management (CRM) software, email automation centers around the idea of combining your business data into emails to customers and prospects. This allows you to draft templates with placeholders for names, addresses, and other variables that the platform will match with individuals from your email list.

Even better however, is personalizing how and when your emails go out to clients. Automatically inserting customer data into an email is great, but it still requires that you draft the content that surrounds it and hit Send. Email automation grants you the ability to create templated emails that are automatically merged with client data and sent when certain conditions are met.

Examples of email automation

To really get an idea of how valuable this solution is, it’s important to see what it looks like in action. Say you own an eCommerce site that sells complementary goods, like golf clubs and golf balls. You could create a campaign wherein anytime someone buys a set of clubs, pre-written emails automatically go out one month later on how high-quality golf balls improve your handicap.

You’re not limited to two-step workflows either. Take a look at this example:

  • Step 1: Send a personalized email with a special offer on golf balls for existing customers.
  • Step 2: Send a follow-up based on how customers interacted with the offer email:
    • If a customer cashed in the offer, send a thank you email.
      • Step 3: Follow it up with a similar offer three months later.
    • If a customer visited the promo page but didn’t convert, send a promo email for another type of product, like golf bags.
      • Step 3: Follow it up with either a thank you email or another promo for golf clothes.
    • If a customer didn’t even open the email, send a survey email asking about their interests.
      • Step 3: Follow it up with email campaigns based on what they selected.

Email automation means there’s no need to micromanage your customer relationships. As long as you define the path to purchase for high-volume products, you can program workflows to nurture customers and prospects automatically.

For as little as a couple hundred bucks a month, your customer outreach campaigns can compete on the same level as your corporate counterparts with little effort from your team. Add in an expert IT provider and you have the ability to blow the competition out of the water. To learn more, contact us today at 855.476.6347!

Published with permission from TechAdvisory.org. Source.

Top-Down vs Bottom-Up Organizations

By | Business, Managed Service, Managed Technology, MSP

Written by:  Nathan Hasse

Top-down Organizations:

In top-down organizations, there is a clearly defined hierarchal order that has a leader on top and all subordinates accounted for with direct reports and assigned responsibilities. This is the business model that we have all become accustomed. Employees are given tasks that are often needed to be completed daily to make the company successful. Marching orders are generated from the top and passed down through the ranks.

For employees below the C-suite, the most common “side effect” of this structure is a general feeling of lack of communication and direction for their position. While this is never the intent, it happens due to the good old fashion game of telephone. It starts with a small group of decision makers on top that are guiding and directing the decisions for the entire company while sometimes not understanding the day to day challenges or ideas that come from the teams doing the jobs. These decisions are passed through many levels of management and even though they are articulated as accurately as possible, information is inevitably lost. To counteract this, upper management often has to watch individual effort closely while continuing to reemphasize the direction to make sure everyone continues along the same path.

This is the most common structure for organizations in the USA. It is even common for the majority of workers to have only ever worked in this style of organization. It would be understanding for most with that experience to feel uneasy seeing a bottom-up org chart. But is bottom-up really as chaotic as it looks?

Bottom-up Organizations:

At first glance of a bottom-up org chart, one may feel that no one has direct responsibility to anyone and this will create chaos in the work environment. This can absolutely be the case if there is a weak leadership team.

Let’s instead assume we have a strong leadership team. This team can focus a lot of their energy on finding “A” players throughout management and staff level teams. At the same time, they would actively start creating this bottom-up structure to challenge these “A” players by communicating an end goal and then directing their staff to work out their own ideas on how to accomplish the goal. This collaborative work environment not only drives creativity but buy-in and ownership among the team skyrockets because they are executing their own ideas, instead of ideas that were crafted and handed to them whether they agree or not.

For example, let’s say your company puts an emphasis on finding an additional 5% total gross margin. While this goal generated from the leadership team, it gets passed to each member of the organization for evaluation and brainstorming within their respective positions or teams on how to make the goal achievable. The ideas to come out of these brainstorming sessions would be discussed with their boss, evaluated and modified through open discourse, then finally delivered to the leadership team for final sign off. When this final sign-off is given, there is no lack of communication or misunderstanding of the direction because it originated with the people who are actually going to be doing the work.

Which makes sense for you?

Every company has to evaluate and find what model best fits their approach, people and culture. My challenge for each of you reading this article would be to think about each company you’ve worked for and write out what each did well and what each did poorly. For those items that the companies didn’t do well, ask yourself if changing the structure would have made a difference.

If you’re looking to apply an organizational change, the good news is you don’t have to wholesale change your entire company. For most, this would be trying the bottom-up strategy. You can start small with a few end goals while coaching your employees on how they should work together to create the directive that they will ultimately work to accomplish.

With diligence and strong employees, the opportunity is there to build and create a much stronger company and culture where buy-in and accountability is key.

The benefits of virtualization in 2017

By | Managed Service, Managed Technology, MSP, Virtualization

The relationship between computer hardware and software can be frustrating. Both require the other to function properly, but both also require individual attention. Virtualization makes this relationship far more flexible, and we’ve got a rundown on a few of the best examples.

More technology uptime

Virtualization vendors use lots of fancy names for the features of their technology, but behind all the technobabble are a number of revolutionary concepts. Take “fault tolerance” for example. When you use virtualization to pool multiple servers in such a way that they can be used as a single supercomputer, you can drastically increase uptime. If one of those servers goes down, the others continue working uninterrupted.

Another example of this is “live migrations,” which is just a fancy way of saying that employee computers can be worked on by technicians while users are still using them. Say you’ve built a bare-bones workstation (as a virtual machine on the server), but you need to upgrade its storage capacity. Virtualization solutions of today can do that without the need to disconnect the user and restart their computer.

Better disaster recovery

Data backups are much simpler in a virtualized environment. In a traditional system, you could create an “image” backup of your server — complete with operating system, applications and system settings. But it could be restored to a computer only with the exact same hardware specifications.

With virtualization, images of your servers and workstations are much more uniform and can be restored to a wider array of computer hardware setups. This is far more convenient and much faster to restore compared to more traditional backups.

More secure applications

In an effort to increase security, IT technicians usually advocate isolating software and applications from each other. If malware is able to find a way into your system through a software security gap, you want to do everything in your power to keep it from spreading.

Virtualization can put your applications into quarantined spaces that are allowed to use only minimum system resources and storage, reducing the opportunities they have to wreak havoc on other components of the system.

Longer technology lifespans

The same features that quarantine applications can also create customized virtual spaces for old software. If your business needs a piece of software that won’t work on modern operating systems, virtualization allows you to build a small-scale machine with everything the program needs to run. In that virtual space, the application will be more secure, use fewer resources, and remain quarantined from new programs.

In addition to software, virtualization also encourages longer life spans of old hardware components. With virtualization, the hardware an employee uses is little more than a window to the powerful virtual machine on the server. Employee computers need only the hardware required to run the virtualization window, and the majority of the processing takes place on the server. Hardware requirements are much lower for employees and equipment can be used for several years.

Easier cloud migrations

There are several ways virtualization and cloud technology overlap. Both help users separate processing power from local hardware and software, delivering computing power over a local network or the internet. Because of these similarities, migrating to the cloud from a virtualized environment is a much simpler task.

There is no debate about the benefits of this technology. The only thing standing between your business and more affordable, efficient computing is an IT provider that can manage it for you. For unlimited technology support, virtualization or otherwise, on a flat monthly fee — get in touch with us today!  855-476-6347

Published with permission from TechAdvisory.org. Source.