Author: Joseph Squicciarini

30 Jan 2018

OneDrive Perks

Everything I work on is shared on one of four 365 OneDrives. I have my personal terabyte and Quo Vadis has three other 365 Groups of which I am a member. 4Tb of space without any additional cost. This is the wonder of the 365 space.

I’m reminded of Microsoft Word’s first foray into the marketplace. It was a disaster. WordPerfect was king, and it kept that crown for a long time with all its templates and macros to merge docs. But when Microsoft returned with Word 2.0, the world was flipped on its head. WordPerfect was sold to three other companies before finally disappearing.

Microsoft Word became the de facto standard for word processing in the business world. This was followed closely by the downfall of Quattro Pro, Symphony and Lotus 1-2-3 all fell to the mighty Microsoft Excel.

File Move is a new Office 365 feature. With File Move, you can now move files between locations in Office 365 – including personal files and shared sites – while preserving the full fidelity of version history and document metadata.

OneDrive for Business File Hover Card is new. With File Hover Card, as soon as you hover your mouse over a file you will be able to see file details such as access stats like number of views, who viewed, and who modified.

08 Jan 2018

Webroot Updates Coming!

Many of you are now protected by the Webroot anti-malware agent we’ve installed last year. During the month of January we will be activating the features listed below to your devices.  Just like the at the airport, increasing security can have some unintended consequences.  Some of these features could bring to the forefront latent issues that have been around for a while. If that’s the case, give us a call and we will have the matter addressed.

Scan Schedule

Your computer is scanned for malicious software, during a time of reduced activity.  We will be setting your machine to preform a scan at 6PM.  All you need to do is ensure that your PC remains on for the evening and the scan will work fine.  

Firewall

A basic security feature of a computer is the firewall.  This should never be disabled as a fix for ‘something not working right’.  However, we have noticed some PCs have had their firewalls turned off.  Going forward, Webroot will ensure the firewall is always active.

Web Threat Shield

This blocks known threats encountered on the Internet and displays a warning. The Web Shield maintains information on more than 200 million URLs and IP addresses to comprise the most accurate and comprehensive data available for classifying content and detecting malicious sites.

When you run an Internet query such as a Google search, SecureAnywhere shields modify the results display with icons that give you safety information about each website returned as a result of the search.

Identity Shield

The Webroot SecureAnywhere Identity Shield protects you from identity theft and financial loss. It ensures that your sensitive data is protected, while safe-guarding you from keyloggers, screen-grabbers, and other information-stealing techniques. If the shield detects any malicious content, it blocks the site and opens an alert.

Recycle Bin

How long a security scan by Webroot takes is a function a few factors, one being how many files are stored on your PC.  To improve this performance, we have set the recycle bin to be emptied every weekend.  

If you ever receive a pop up which does not make sense to you, please do not hesitate to reach out to us so we can investigate.

08 Jan 2018

How Long Can You Afford?

So much has changed… I recall sitting down with one of our long-time clients and describing the USB backup concept using two USB drives and swapping them out weekly. I explained that the drives would cost less than $100 a piece and there was no monthly fee. Simple and effective (back then.)

I was surprised when he told me that he couldn’t afford it! Really? He had been pounding away on his calculator (yes, he IS a CPA) and confidently knew that his firm could not afford to lose a week’s worth of data. This man knows his business and his profit structure. Few do. We reworked his backup strategy to accommodate his needs. Fast forward a decade or more… The issue now is not whether we have a current backup. The data is no longer the issue. Today we need to reconstruct the environment. Having the QuickBooks data is worthless without a QuickBooks server… Having the SoftPro data is useless without the SoftPro server…

The experts call this concept Maximum Tolerable Downtime (MTD). These experts believe that the threats out there today are inevitable. Whether it’s data theft, misuse, ransomware or failure, it’s going to happen sooner or later. We have our vulnerability scans on sale during 2018 Q1. Cisco did a study in 2016 of how long you can expect your business to be down, in the event of a breach. Odds are you’ll be down for a day…

We view your backup strategy in three phases:

First is data backup. Almost inconsequential now. Our ability to restore a single file or folder of data quickly and easily. The backup window describes how long between each backup. The restore window is more important. It defines how long it would take to restore all of the backed up data. In the case of an encryption virus, this can be a long time.

Second is business continuity. How long can your business be down before losses or reputation damage is irreparable? Mirrored servers and hourly backups allow us to provide near immediate fail-over for your business.

Finally, disaster recovery provides for a complete replacement of your office infrastructure to keep your business going while replacements are made.

Each of these incremental steps have a cost. It’s like buying insurance for your business (a question we often receive) and how much it’s worth. There’s no right or wrong answer, it’s an individual decision, with which you must live. Let’s have an informed conversation about it. Call the Help Desk and choose option 2 for Wise Counsel, or email admin@quo.cc to get a quote.

08 Jan 2018

The EV Revolution

If you haven’t been watching, the automotive world is being rocked. The first successful American automobile manufacturer in 60 years is now worth more than General Motors. Elon Musk’s Tesla is giving the old guard a run for their money.

I purchased a Tesla Model S 100D three months ago. My first two months yielded zero fuel cost. Model S owners have unlimited, lifetime charging for free (at this time.) Tesla has proven that electric cars don’t have to be wimpy or severely limited in distance. My Model S, all wheel drive can go nearly 400 miles on a single charge and goes from 0 to 60 in about 3 seconds. (Which makes my grandkids giggle.)

The Model S is different from any other car I’ve driven. It’s like being on the monorail at the airport, heading to the distant car rental lots. The car is quiet – almost too quiet. The cabin has the sound dynamics of a recording studio. Unlike an ICE (internal combustion engine) car, the Tesla does better in city driving than on the highway. The stop-and-go traffic in the city uses the regenerative brakes to recharge the battery. You can actually head to the store and come back with more charge than when you left the house!

The back seat of the Model S is unbelievably roomy. There’s no hump on the floor in the middle. The back seat floor is flat all the way across. There’s no drive train to hide. In fact, when you open the hood, there’s no engine inside! This is called the “frunk” by Tesla, the front trunk. Open the frunk to add windshield washer fluid – the only fluid in the car. No oil, no brake fluid, no transmission fluid, and best of all – no emissions. The Model S has front and rear storage totaling a massive 32 cubic feet of luggage capacity. That’s more cargo space than the Grand Caravan, Nissan Quest and Kia Sedona. And nearly as much as the Honda Odyssey and Toyota Sienna!

Remote Control

The recent cold spell has me using the Tesla app on my mobile phone to pre-heat the car. This can be done inside the garage because there is no carbon monoxide. In fact, there is no tailpipe! I can use the app to “Summon” the Model S. When summoned, the car opens my garage door, pulls itself onto the driveway, and closes the garage door! Unbelievable. When I get home, it will park itself in the garage, by itself, and close the garage door.

Bio-Weapon Defense Mode?

Model S features a medical grade HEPA air filtration system, which removes at least 99.97% of particulate exhaust pollution and effectively all allergens, bacteria and other contaminants from cabin air. The bioweapon defense mode creates positive pressure inside the cabin to protect occupants. I like that when driving behind the billowy black smoke of some big rigs.

Adaptive Lighting

Model S has full LED adaptive headlamps. 14 three-position LED dynamic turning lights improve visibility at night, especially on winding roads. Great when heading to the mountains for the weekend.

The Model S is a driver’s car. The gem of the interior is the 17 inch touchscreen which looks like a giant iPad. It puts rich content at your fingertips and provides mobile connectivity so you can easily find your destination, favorite song or a new restaurant. Bluetooth connectivity to your mobile phone is a snap. The roof is a solid piece of glass, providing a stunning view of the Carolina blue sky.

The winds of change are upon us, folks. Hop in and take a spin!

08 Jan 2018

It’s All About Security

Everybody and every publication is finally pushing the need for tighter security. What’s lacking in much of what you read is the balance necessary between security and usability. If we make the network so secure that our teams can’t get any work done, it’s useless.

This year, Quo Vadis will be encouraging our clients to embrace Microsoft’s Password Guidance. Many of you may be reading in your own trade journals about the idea of passwords with no expiration. We agree! Our goal is password diversity to provide the best security. Today’s general password policies actually do the opposite of our intended goal.

A University of North Carolina study found 17% of new passwords could be guessed in five tries or less, given the old password. And almost 50% could be guessed in a few seconds of un-throttled guessing! So much for diversity.

Two-factor authentication (2FA) is crucial to the security plans of the future. By way of reminder, two-factor authentication uses two out of three factors to confirm your identity.

  1. Something you know (like your password)
  2. Something you have (like your mobile phone)
  3. Something you are (like your face or fingerprint)

I use 2FA for my Amazon account, my online banking, my email, remote access… everything I can. You should too!

Here are our recommendations to move forward.

  1. Don’t use your business credentials outside work.
  2. Use two-factor authentication whenever possible.
  3. Use biometrics whenever possible.
  4. Invest in a password manager.
  5. Don’t store passwords in your browser.
  6. Don’t reuse passwords!
  7. Keep your operating system and application software updated. (We can do this for you.)

 

We will be reaching out to you shortly to remove your password expirations.

15 Jul 2016

Windows 10 for free?

Windows 10: Quo Vadis strongly recommends a Windows 10 upgrade (if you haven’t already!) – especially in the next 2 weeks while it’s still free!

Remember, Windows 7 is 7 years old, Windows 8 is 5 years old, and Windows 10 is already 2 years old!

Steps to upgrade: Confirm with your mission-critical software vendors that they support Windows 10. If they do, then make a good backup of your data, and upgrade just one computer. Any speed-bumps can be worked out before you upgrade the rest of your office.

Generally, if your workstation will run Windows 7 or 8 comfortably, it’ll run 10 just fine.

Fun fact: Windows 10 includes Microsoft Edge – a built-from-the-ground-up new browser from Microsoft. It has extremely low power consumption, and is currently the only web browser than can stream 1080p.

15 Jul 2016

Do you hate changing your password?

HERE’S A TIP:At Quo Vadis we don’t have to worry about the constant password change. We use 1Password, a helpful, easy-to-use, secure app that stores all your logins, passwords, and more!

Tired of remembering all those passwords? Tired of the constant change? Do you want just one password for everything?

1Password.

Who doesn’t? As hackers become more real and more prevalent, passwords need to be much more complex. If you’ve taken the Security Awareness Class you know the danger, and you know how critical your password security is.

Every one of your businesses are connected to the internet, which makes you a target for cyber-attacks. Unfortunately, small businesses have a misconception that they are an unlikely target, but a quick Google search will produce a number of results showing small and medium businesses are attacked at nearly the same rate as enterprise level. Hackers know many companies don’t take cyber security seriously – and they’re right. It has come to our attention that many of you have simple passwords equivalent to having a key code entry of 1234! This is completely unacceptable.

It may be that, when you signed up for Network Care, you dismissed our counsel to implement strong passwords for your users. It’s time to reconsider. Ensure that you’re using strong passwords! Use these helpful guidelines to help create complex and secure passwords:

  • 8 characters long
  • At least 1 uppercase letter
  • At least 1 lowercase letter
  • At least 1 number
  • Simple enough to remember without writing it down

Of course, additional security measures are always encouraged, like adding special characters and making the password longer. Make sure your password doesn’t include your name, and avoid generic ones like “Password1”. If you’d like us to enforce complex networks in your network or if you have any other questions or concerns, please call the Help Desk to discuss.

10 Jun 2016

Ransomware

If you’ve been following our Facebook page or scrolling through the tech news, you’ll know that Ransomware is running rampant through the business community. For those not ‘in the know’, there are a few common families of the malicious software often dubbed the Locky virus. Don’t let the pleasant sounding ring of Locky fool you. This virus is extremely effective at disrupting businesses by encrypting data as securely as banks do. Upon completion of its mission, the virus then informs you that it has locked your files and allows you to purchase the decryption key for a large sum of money.

The business model has worked and ransomware campaigns are becoming more and more popular, targeting businesses in wealthy countries. The virus has gone through several evolutions and continuously adapts to increase efficaciousness. There is presently no AntiVirus endpoint protection software capable of detecting the presence of Locky on your system. The detection occurs when you attempt to access a file…and can’t. Concerned? You should be.

We’ve helped approximately 20% of our clients recover from the aftermath of these ransomware attacks.  However, you should educate yourself and your staff. Start implementing the following practices to mitigate the effects of an infection:

  • Regular Backups: There are three ways address your encrypted files: (1) Pay the thieves for the decryption, (2) Forget about the data and move on, or (3) Restore your files to the last backup.  If you would like to discuss your current backup strategy, let us know.
  • DON’T enable macros in a document received through email: Microsoft deliberately turned off auto-execution of macros by default many years ago as a security measure. A lot of malware infections rely on persuading you to turn macros back on, so don’t do it!
  • DON’T open attachments or links from unsolicited emails, even if it is from someone you know. It could be that their email account was compromised and the crooks are using it to entice you to open the document.
  • Avoid Mapped Drives: Microsoft no longer recommends using mapped drives and neither do we.  Right now, the only path the virus has to your server is through your mapped drives.  In the image below, you can see that there is a mapped Q drive to QVTools highlighted in blue.  This allows a path for the virus to the server.  The better method is to make a shortcut under the Favorites section (highlighted in yellow).  It may be that you have programs which require mapped drives.  Please let us know if you need any help implementing these changes.
10 Jun 2016

Who’s Using Up The Bandwidth?

We have received many questions about analyzing internet usage. Now, with SonicWALL Analyzer Software we have the ability to give you detailed reports.

The SonicWALL Analyzer is a traffic analytics and reporting tool that provides real-time and historical insight into the health, performance and security of the network.
Organizations of all sizes benefit from enhanced employee productivity, optimized network bandwidth utilization and increased security awareness.With the SonicWALL Analyzer you will receive reports on firewall threats, bandwidth usage statistics, and application traffic analysis, providing visibility into employee productivity and suspicious network activity.

It tracks individual user activities locally or on remote network sites to provide even greater insight into traffic usage across the entire network and, more specifically, application usage, web sites visited, backup activity and VPN connections per user.

The Analytics offer granular reporting on specific types of attacks or intrusion attempts and the source address of the attack to enable administrators to react quickly to incoming threats.

For companies that are subject to audit or simply want to keep an eye on their employees and maintain a secure environment, we strongly recommend this software.

Interested? Good timing. SonicWALL Analyzer Software is on sale in June for just $99 (normally $125)!

GET IT NOW

20 May 2016
Windows 10 Update

Windows 10 Rebooting at the Wrong Time?

If you’ve been using Windows 10 for a while now, you’ll know that updates are automatically downloaded and installed without notifying you, the user. And you may have had the unfortunate situation of Windows 10 rebooting at the most inopportune time- like during that important presentation! If you’d like a little more control, modify the Windows Update settings, to schedule when automatic updates will restart your computer.

In the Settings app, go to Update & Security > Windows Update and then click the Advanced options button. In the drop-down box, switch the setting to “Notify to schedule restart.”
This won’t disable or block Windows Update, but just defer when you need to reboot.