Home
About
Contact Us

Home>blog
Tue, 09 Jun 2020/

The basics on 2-step and 2-factor authentication

Cybersecurity is a vital component to businesses these days. You need to make sure that criminals cannot just hack into your network. When it comes to verifying users’ identity, there are two types of authentication used: two-step and two-factor. These two are so similar, many confuse one with the other. Learn the difference between the two, so you’re more knowledgeable on keeping your network secure. If you want to improve your business's cybersecurity for you and your customers, you should look at your authentication process. Two-step and two-factor authentication are two of the most commonly used options in cybersecurity. Many businesses use the terms two-step and two-factor authentication interchangeably. There are, however, subtle differences between the two. Two-step authentication A two-step authentication process requires a single-factor login (such as a password or bio-metric reading) as well as another similar type of login that is essentially sent to the user. For example, you may have a password for your first step and then receive a one-time-use code on your cell phone as the second step. Two-step authentication adds an extra step in the verification process, making it more secure than single-step authentication (i.e., just the password). However, if a person or business is hacked, it won't be enough to stop hackers from getting a hold of whatever they are looking for. Two-factor authentication On the other hand, there is two-factor authentication (sometimes referred to as multi-factor authentication), which is significantly more secure. This type of authentication requires two different types of information to authenticate a user’s identity. For example, it could be a combination of a fingerprint or retinal scan as well as a password or pass-code. Because the types of information are different, it would require a hacker a great deal more effort to obtain both forms of authentication. The difference between the two In essence, every two-factor authentication is a two-step authentication process, but the opposite is not true. With this information in mind, make sure that you are using the right type of authentication in your business to keep your company and customer information as secure as possible. Your network needs the best security technology has to offer. The type of authentication you should use is just one of hundreds of choices that must be made to achieve that end. To take the stress out of securing and protecting your network, call Multi IT & Telephony Solutions today in Johannesburg on 011 435 0450 or in Cape Town on 021 879 1950 for all the help you could ever ask for. You can also send us a message and we will contact you
VIEW MORE
Sun, 31 May 2020/

How to protect yourself from cryptojacking

Hackers use cryptojacking to mine cryptocurrencies, and this process can cause PCs to run below optimal speeds.  If you have a relatively new computer but are experiencing performance problems after clicking a link or visiting a website, you might be a victim of cryptojacking. Here’s what to do. Hijacked hardware Instead of paying for computing power themselves, hackers opt to secretly use thousands of compromised computers to generate cryptocurrency. They gain control of a victim’s PC by using phishing emails to lure them into clicking on a link, which then runs malicious cryptomining programs on the computer. Any cryptocurrency produced then gets delivered to the hackers’ private server. But wait, there’s a more insidious tactic hackers use: infecting websites with ads and plugins that run cryptojacking code. By doing so, any visitor who loads the web page instantly gets infected with the malware, which sends their computer’s processor into overdrive as it tries to generate cryptocurrency. If there’s a silver lining here, it’s that cryptojacking software won’t compromise your data unlike most malware do. However, it will hijack your hardware’s processing power, so you’ll experience decreased PC performance while your electricity bills increase. Surge in cryptojacking The biggest reason why cryptojacking is becoming so popular is that it’s a low-risk, high-reward scheme. Instead of extorting money directly from the victim, hackers can secretly generate digital currencies without the victim knowing. And even if it’s detected, it’s almost impossible to track down who initiated the attack. Moreover, since nothing was actually “stolen” (other than a portion of computing power), victims have little incentive to apprehend the culprit. Cryptojacking is also a cheap investment. For as little as $30, anyone can purchase a cryptojacking kit from the dark web to force other computers to generate Bitcoin or Monero for them. And while it’s difficult to tell how much exactly are hackers earning by cryptojacking, we can only surmise that it’s more than the initial $30. Because of these reasons, there’s a good chance that this type of attack will be as popular as ransomware was in 2017. According to several reports, even sites like The Pirate Bay, Openload, and OnlineVideoConverter are allegedly using cryptojacking exploits to diversify their revenue streams. Prevention and response Prevention is always better than cure, so include cryptojacking in your monthly security training sessions. If employees practice extra caution in dealing with unsolicited emails and suspicious links, then hackers will have no way into your systems. Using ad-blocker or anti-cryptomining extensions on web browsers is also a great way to stay protected. Beyond prevention, network monitoring solutions should also be used to detect any unusual computer behavior. For example, if you notice a significant number of PCs running slower than usual, assume that cryptojacking is taking place. And once it’s confirmed, advise your staff to close browser tabs and update browser extensions as soon as possible. Because cryptojacking doesn’t steal data, it may seem less threatening than some malware, but in reality, its effects are just as severe — it can incur real power, cooling, and performance costs to your business when several systems are compromised. To make sure your business stays in top form (and that you don’t end up enriching any hackers), contact us today. Our hardware solutions and cybersecurity tips will keep your business safe and sound. Get in touch with Multi IT & Telephony Solutions Johannesburg on 011 435 0450 or Cape Town on 021 879 1950. Alternatively contact us and we will get in touch with you.
VIEW MORE
Thu, 28 May 2020/

How Microsoft Teams Can Benefit Your Organisation

In business, communication is everything. Even if you’re running a one-person outfit, you still need to collaborate with your clients and customers to deliver optimal outcomes. However, most small and medium-sized companies are composed of collaborative teams- and those teams need to be able to communicate and coordinate with maximum bandwidth and clarity. That’s where Microsoft Teams comes in. What is Microsoft Teams? “Teams,” the business collaboration software suite by Microsoft, is a chat-based intra-office communication system that allows people working on a common project to have instant access to each other’s work, contributions, and progress. It lets them chat, talk, and share via digital correspondence or in real time. It’s Microsoft’s response to Slack and includes the next evolution of Skype for Business and much more. If you’re totally new to this kind of software, you might think of it as a combination of the capabilities of Facebook, Google Docs, and Google Hangouts all in one streamlined and easy to use collaboration toolset. Teams lets members of a team (workers assigned to a common project) exchange text, view shared documents, and engage in video chat sessions for face-to-face communications. Of course, we compared Teams to a combination of Facebook, Google Docs, and Google Hangouts- but in reality- it’s more than that. Because with Teams you get all of the capabilities of these major networking platforms in one streamlined package with a Swiss Army knife of time-tested business applications. Best of all, Microsoft Teams is a Software as a Service (SaaS) product. That means it comes to you through the cloud. You do not have to install Teams on your local network. In other words, with Teams- you get all these amazing collaborative benefits with none of the lag and downtime of a legacy-style application. The Power of Microsoft Teams Teams does a lot of things, and it does them very well. With Teams, your office will: • Communicate More Effectively - You and your staff will enjoy instant communication in a variety of formats, including web calls, chat, and web conferences. All these options without the delays and worries your intended recipient won’t receive the message make it all but certain that information is exchanged accurately, meaningfully, and easily. • Boost Productivity - With the ability to share documents and files with Teams’ integrated Office 365 business productivity suite- complete with SharePoint, PowerPoint, and more- you have all hands-on deck from start to finish. • Add a Layer of Security - With end-to-end administrative control, compliance, and security- Teams adds a welcome additional barrier between your sensitive data and would be hackers. Bringing it all Together with Microsoft Teams With robust, delay-free communication and collaboration- augmented by top of the line productivity tools- Teams eliminates communications lag and miscommunication. You’ll enjoy added security and compliance. On top of all of this, you also get robust and responsive remote administration services and support. Microsoft Teams is intuitive to use, easy to deploy, and incredibly powerful. To learn more about this powerful SaaS product, get in touch with the IT experts at Multi IT & Telephony Solutions today You can contact the team at 011 435 0450 in Johannesburg and 021 879 1950 in Cape Town.
VIEW MORE
Tue, 26 May 2020/

Avoiding Office 365 migration failure

Office 365, the cloud-based version of Office, is one of the most popular software suites used by small- to medium-sized businesses (SMBs) today. With an ever-increasing number of companies migrating to this solution, it’s not surprising that many others are considering making the move. However, there’s always a chance of migration failure. Learn how to avoid this by knowing the five most common ways that Office 365 migration can fail. 1. Slow internet connection speeds To avoid this, ask an Office 365 provider like Multi IT & Telephony Solutions to test your existing network connections to ensure that your internet connection can handle the migration and day-to-day operation of Office 365. If not, they should be able to offer you a more efficient solution. Because Office 365 is primarily cloud-based, you are going to need a connection with a solid bandwidth. When migrating your files and system over to Office 365, you will likely need to consume a large quantity of bandwidth. This demand will often be enough to tax most small business lines, resulting in slower internet speeds all around during the process. Employees might struggle to do their jobs properly if they’re reliant on the internet, so it is recommended to do migrations during off hours. Beyond this, Office 365 is most often delivered over an internet connection, rather than in-house servers. This means that the day-to-day demand for bandwidth will increase. If you are already noticing slow speeds and service interruptions before implementing Office 365, you will likely see these issues compounded after implementation. 2. Mailboxes and files are too big While the business versions of Office 365 come with 100 GB of email storage and over 1 TB of file storage per user, getting your emails and files online could take a while, especially if you have users whose inboxes are approaching the storage limit. As a general rule of thumb, larger files will cause the migration of files to take longer. If you don’t prepare for this, then you could see migration affecting work or even causing recurring issues of unavailable data when it’s needed. To avoid this, encourage your staff to archive their email inboxes and either delete or remove emails with large attachments that aren’t necessary. 3. Uninformed users The average Office 365 migration takes around one to three days, depending on the size of the business and the amount of data being carried over. If you start migration without informing users that some files and emails won’t be accessible during this period, or that some systems may not be working, you could end up with employees unable to do their jobs and creating resentment for the new platform. Instead, inform your employees about how the migration will run and what they can expect during the process. Beyond this, you should run training sessions on how to use the new systems to ensure that everyone is briefed before they start to use them. This will increase the overall chance that the platform migration and subsequent use will be successful. Older, less compatible software installed on systems While many versions of Office 365 do come with subscriptions to the latest version of Microsoft Office, there’s built-in support for systems that are running slightly older versions of Office. If your business is using a version older than Office 2010 (e.g., Office 2003), you won’t be able to properly use Office 365. Beyond this, you’ll also need to use the latest version of your internet browser. If you use Chrome or Firefox, this won’t be a problem. However, if you use Internet Explorer, you may run into issues, as Microsoft has already discontinued the program in favour of Microsoft Edge. The good news about Office 365 is that actual systems requirements are low, so almost every business will be able to integrate it. We recommend that in order to be able to use all of Office 365's features, ask your provider to ensure that your software and systems are compatible with it. 5. DIY migrations On paper, migrating to Office 365 is a fairly simple and straightforward process. What many companies find when they do the migration themselves is that the process is much more difficult than expected. They come across unexpected issues that require an IT expert to solve. In order to ensure a smooth migration, it’s a good idea to work with an IT provider like us at Multi IT & Telephony Solutions. We can ensure that your systems are ready and the migration is smooth with minimal disruption. Contact us today to learn more.
VIEW MORE
Thu, 30 Apr 2020/

Office 365 Features that can help you

Need help getting some work done? Microsoft constantly releases new Office 365 features that can help you get an edge over the pile of work on your computer. With some of the new Office 365 features, you can Skype over a document with your coworkers, plot charts into Excel with ease, and even sign for a document electronically with any device. So treat yourself and use these features to increase your productivity in the workplace. Simultaneously edit a document with other people With Office 365, people can work together on any Word, PowerPoint, or Excel document in real time. This means multiple people can edit a document and figure out what changes have been made and who made them. So if your employees are still creating documents by themselves, sending them over to their coworkers by email, and silently waiting for a reply, then this Office 365 feature can help cut down on unnecessary email waiting time. Skype over a document with your coworkers In addition to being able to work together on a single document, you can also verbally discuss the edits over Skype. This application lets you talk to everyone who is working on the document with a simple click of a button. You can also keep talking to your coworkers even after you’ve left the Office document session. Link to files, don’t attach them Is the file you’re sending too big? With the business editor of Office 365, you won’t have to worry about compressing your documents before sending them over email. You can simply copy a link to the cloud file in your email and people with access to the link can immediately begin editing. Let Bing find presentation images for you Sometimes you just need that second opinion when you’re picking images for your presentation. That’s where Office Sway comes in. Basically, the application employs Bing image search to locate possible images that you can use for your presentation based on the words in the document. Laser pointer mouse icon Forgot your laser pointer on the day of your presentation? Simply go into presentation mode and hold Ctrl and the left mouse button to replace your cursor with a laser pointer. Change your electronic scribbles into text This OneNote feature allows you to convert your electronic scribbles into text in just a few steps. Simply choose the Lasso Select tool, circle the area you want edited, and click the Ink to Text option. Electronic signatures Printing out a document to sign it and then scanning it back to digital format is a bit outdated. With the Docusign app, you can set up your own electronic signature and sign documents easily from any device. Create Excel charts with ease Office 365 has built in new features that will allow Excel to better present and format your data. Simply select the cells that you would want in a graph or table, open the Quick Analysis tool, and pick how you would like to visually represent your information. Voila! Instant chart. Turn data from Excel into a map Provided that your data takes note of geographic locations, the Power Map feature can immediately distribute your recorded facts and figures over a 3D map. Create and convert PDF Files You have a variety of choices when it comes to creating PDF files from Word documents. Exporting your Word documents into PDF files can be done by going to File > Export > Create PDF/XPS. You also have the option of saving just a portion of a file by indicating the pages you want to be converted into a PDF. On the other hand, if you would like to edit a PDF, just open the file as a Word document. From there, you can copy and edit any content, images, or diagrams. Consider utilising some or all of these features to make the most out of Office 365 and make your life a bit easier. If you’d like to know more about other features that Office 365 has to offer, give us a call on 011 435 0450 or contact us now.
VIEW MORE
Mon, 20 Apr 2020/

Warning signs your computer has malware

With the rise of eCommerce and online banking, cyber-crime has evolved. Like criminals who pull smash-and-grab jobs, they go where the money is. However, unlike bank robbers, cyber criminals do their best to avoid detection by letting malware do the work for them. Viruses and ransomware sneak into PCs to quietly steal passwords, financial credentials, and other personal information to be sold on the black market for profit. Not all malware is stealthy though. Here are some telltale signs. Slow computer Are your operating systems and programs taking a while to start up? Is your data bandwidth suspiciously slow? If so, your computer may potentially have a virus. However, just because your PC is running slower than usual doesn’t necessarily mean that it’s infected, as there could be other causes to your computer slowing down. First, check if you’re running out of RAM. For Windows, open task manager (press Ctrl + Shift + Esc) and go to the Performance tab and check how many gigabytes of RAM are used up under the Memory section. For Mac OS users, you can open the Activity Monitor app and, under System Memory, you should be able to find out your RAM usage. Other causes could include lack of space on your hard drive or even damaged hardware. Once you’ve ruled out other possible causes, then malware may have infected your device. Blue screen of death (BSOD) If your PC crashes regularly, it’s usually either a technical problem with your system or a malware infection. You might not have installed the latest drivers for your device or the programs you’re running could possibly be incompatible with your hardware. If none of these problems are apparent in your PC, then a virus could be clashing with other programs and causing your crashes.To check what caused your last BSOD, go to Control Panel > System and Security > Administrative Tools > Event Viewer and select Windows Logs. Those marked with “error” are your recorded crashes. For troubleshooting solutions, consult forums or your IT department to figure out what to do next. Lack of storage space There are several types of malware that can manipulate and corrupt the files saved on your computer. Most tend to fill up your hard drive with suspicious files. Ransomware, for example, is a notorious type of malware that denies you access to your data until you pay a so-called ransom. There are more aggressive forms of ransomware, like NotPetya, known for exploiting security holes to infect computers without needing to trick users. If you find any unknown programs that you have never installed before, notify IT personnel in person immediately (do not email them) and have them handle the situation for you. Your device might not be the only one in your network that is infected with suspicious programs. Suspicious modem and hard drive activity Combined with the other warning signs, if your hard disk is working excessively while no programs are currently running or if you notice that your external modem is always lit, then you should scan your computer for viruses. Pop-ups, websites, toolbars, and other unwanted programs Pop-ups come from clicking on suspicious pages, such as those where users are asked to answer survey questions to access a website’s service or install free applications. While they’re inherently harmless, they could be downright annoying. Refrain from clicking pop-up pages and just close them instead. Run malware scans and update your browsers. You might think that downloading free applications is harmless, but the installation process can inject malware into your device. When you’re installing a program from the internet or even app stores, it’s easy to just skim over the terms and conditions page and repeatedly press next. This is where they get you. In the process of skipping over certain installation steps, you might have agreed to accepting a new default browser and opening unwanted websites and other programs filled with viruses. Be cautious when downloading something for free. You’re sending out spam If your friends are telling you that you’ve been sending them suspicious messages and links over social media or email, you might be a victim of spyware. Warn your friends not to open anything that appears to be spam and make sure to reset your passwords across all your devices and enable multi-factor authentication. Knowing how malicious software affects your computer can help you take the necessary precautions and steps to rectify the situation as soon as possible. Regardless of whether or not your system has experienced these symptoms, it’s always smart to perform regular malware scans to ensure your business is safe. To find out more about malware and IT security, contact our team of IT experts today or give us a call on 011 435 0450.
VIEW MORE