Home
About
Contact Us

Home>blog
Tue, 09 Jul 2019/

Are autocomplete passwords safe?

Advertisements and suggestions based on our internet browsing habits are sources of online tracking. However, autocomplete passwords are also another source of online tracking. This sneaky tactic comes with serious security risks. Here’s how you can stop it from targeting you. Why autocomplete passwords are so dangerous As of December 2018, there are 4.1 billion internet users in the world. This means users have to create dozens of passwords, either to protect their account or simply to meet the password-creation requirements of the platform they're using. Unfortunately, only 20% of internet users have different passwords for their multiple online accounts.Certain web browsers have integrated a mechanism that enables usernames and passwords to be automatically entered into a web form. On the other hand, password manager applications have made it easy to access login credentials. But these aren't completely safe.Tricking a browser or password manager into giving up this saved information is incredibly simple. All a hacker needs to do is place an invisible form on a compromised webpage to collect users’ login information. Using auto-fill to track users For over a decade, there's been a password security tug-of-war between hackers and cybersecurity professionals. Little do many people know that shrewd digital marketers also use password auto-fill to track user activity. Digital marketing groups AdThink and OnAudience have been placing these invisible login forms on websites to track the sites that users visit. They've made no attempts to steal passwords, but security professionals said it wouldn’t have been hard for them to do. AdThink and OnAudience simply tracked people based on the usernames in hidden auto-fill forms and sold the information they gathered to advertisers. One simple security tip for today A quick and effective way to improve your account security is to turn off auto-fill in your web browser. Here's how to do it: If you’re using Chrome – Open the Settings window, click Advanced, and select the appropriate settings under Manage Passwords.If you’re using Firefox – Open the Options window, click Privacy, and under the History heading, select “Firefox will: Use custom settings for history.” In the new window, disable “Remember search and form history.”If you’re using Safari – Open the Preferences window, select the Auto-fill tab, and turn off all the features related to usernames and passwords. This is just one small thing you can do to keep your accounts and the information they contain safe. For managed, 24×7 cybersecurity assistance that goes far beyond protecting your privacy, contact Multi IT or call us today on 011 435 0450
VIEW MORE
Tue, 02 Jul 2019/

Save on printing costs with these 5 tips

Managing your print infrastructure efficiently will minimize your IT budget. It sounds impossible, but it can be done. Many small and big enterprises don't realize that they are using ineffective printing models, but you can make a difference if you follow these tips. Replace outdated printers Outdated and cheap printers may be functional, but they are putting a huge dent in your IT budget. Any piece of equipment that is seven years old (or older) requires frequent repairs and causes more trouble than it’s worth. Because old printers are no longer under warranty, fixing them is more costly and challenging. It’s also difficult to replace parts for old printers because manufacturers have stopped carrying them for models that have been phased out. When you replace outdated equipment with newer, multi-functional printers, you’re investing in hardware that will pay for itself with increases in productivity and efficiency. Avoid purchasing unnecessary supplies A poorly managed printer environment could result in a stockpile of cartridges, toners, and reams of paper. This happens when, for example, an employee uses a printer that’s about to run out of ink and makes an unnecessary request for new ink or toner. This is more common than you may think, and definitely more expensive. In the absence of a dedicated printer manager, you can avoid this situation by automating supply replacement. Assign a point person to proactively place orders when supplies are about to run out, so your company can avoid needless purchases. Impose strict process workflows Submitting expense reports, filing reimbursements, and other administrative tasks require a proper document workflow. Without a guideline, employees and administrative staff tend to print an unnecessary amount of documents. Automate your company’s document-driven processes to reduce or prevent redundant print jobs that result in stacks of abandoned documents. Not only are these printouts wasteful, they're also a security and privacy concern. Go paperless Designing a document management solution that reduces paper consumption is the best way to save money. It may not be possible in every department, but those who can do their jobs without printing should be encouraged to do so by management. Printing lengthy email chains that can be discussed in a meeting is just one example of a wasteful practice that should be avoided. Reduce IT support calls for printing issues Calling your company’s IT guys to assist with problems like paper jams, printer Wi-Fi issues, and other concerns reduces employee frustration. You and your IT personnel could avoid dealing with these productivity killers by identifying the problem areas of your print environment. Then, you can work on solutions specific to your office, such as drafting a printing workflow, or getting help from document management experts who can recommend time- and budget-saving solutions. Having a group of experts manage your IT workflow can make your day-to-day operations more efficient and help you save on printing costs. Our experts will gladly recommend best practices and tips on document management. Contact Multi IT today or give us a call on 011 435 0450
VIEW MORE
Tue, 25 Jun 2019/

Virtualisation is different from the cloud

Virtualisation and cloud computing can be confusing, especially to business owners who are not familiar with them. But when you understand their differences, you’ll be able to best take advantage of these technologies. Virtualisation Imagine a company with five servers, each assigned a single task such as storage, email, etc. If there were a spike in email traffic, it would overwhelm the email server, causing it to slow down. Adding another server would solve this problem, but it would be expensive and inefficient on days with less traffic.With virtualisation software, you can combine the resources of all five servers in our example. So if the email server gets bogged down, it can borrow resources from any of the other servers with extra capacity. The process is not as simple as it sounds, and businesses often turn to an experienced IT service provider to set up a virtualisation environment.Because virtualisation software can be installed on a server in your office, it is totally independent of cloud technology. Sometimes, people misunderstand the difference because the vast majority of cloud solutions use virtualisation to improve their services.Cloud computingWith cloud computing, users can edit documents, save files, and interact with apps that aren’t actually on their computer. Instead, they access these items by connecting to a server via a network or internet connection. To carry out its purpose, a cloud platform sometimes uses several virtualised servers to provide users with a simple system that appears to be on its own, even though it’s actually shared with several other users and servers. There’s no need to purchase additional servers, and you can also save valuable office space by not having to deploy bulky equipment.Obviously, scalability is critical in today’s ever-changing business conditions. Cloud computing makes it easier to manage business tasks to maximise productivity. And it helps streamline operations, as more cloud services are integrated. Businesses don’t have to worry about infrastructure maintenance because it is covered by the cloud service provider.Virtualisation and cloud computing are both economical technologies that small businesses should take advantage of. If you want to see what they can do for you, Contact Multi IT Today or call us on 011 435 0450 to discuss your computing needs.
VIEW MORE
Tue, 18 Jun 2019/

How to make the most out of your CRM

Building rapport with customers has never been easier with customer relationship management (CRM) software. You can keep track of contact information, buying preferences, and sales patterns. It’s a must-have for all sales and marketing teams. If you want to know how to make the most out of your CRM, follow these tips. Always update customer informationA CRM system is only effective when the data it provides is current. If the customer’s address, company name, or preferred method of contact has changed, your staff should update the information immediately, so your sales and marketing teams are always equipped with the right information and will know how to respond accordingly. Use purchasing history for upselling opportunitiesIt’s easier to sell to existing customers than acquiring new ones. With your CRM, you can boost your sales performance by analyzing your existing clients’ purchasing history and designing promotions or events just for them. For example, if they recently purchased a razor from your online store, you can program your CRM to recommend related products like shaving cream or aftershave. Not only does this widen your profit margins, but it also makes your customers’ lives a lot easier and promotes repeat business. Automate your processesSince many of the tasks associated with data entry can be automated, take advantage of the workflow automation features in CRM apps to eliminate time-consuming and repetitive functions. For instance, when new leads are added to your CRM (via newsletter subscriptions or website visits), you can program your CRM to send follow-up emails, offer promotions, and push other marketing efforts to keep your business at the forefront of their attention and to help them remember your brand. This saves you from writing the same canned responses while also making sure that you’re engaging your clients throughout the entire sales process. Learn from analyticsCRM can analyze customer trends and behavior. If you notice a spike in demand for certain products and services during the holidays, be more aggressive in pushing them out the next year. If certain email campaigns were more successful than others (e.g., higher open rates, click-through-rates, and potential customers), understand what elements were responsible for that success, and try to replicate them the next time you send a newsletter.Customer data should also be used to shape sales and marketing tactics. A salesperson that already knows the client’s name, location, and preferences can deliver more targeted sales pitches and has a better chance of closing a deal. The point is this: If you’re not learning from your data, your business growth will be limited. Integrate CRM with other business softwareIncorporating CRM software to other programs makes it even more powerful. Integration with accounting software combines customer and financial data, eliminating redundant manual data entries and providing more insightful reports. When used alongside a VoIP system, your staff will get relevant customer information from multiple databases displayed on one screen when they’re about to make a call. Get some CRM supportWork with a CRM provider that offers 24/7 support. Ideally, your provider should keep your data safe, update your software regularly, and advise you on how to use complex CRM features.This may seem like a lot but remember: like every technology investment, CRM requires active participation from executives, managers, and frontline staff. If you need more advice on keeping customers happy or want to know what technologies can add value to your business, give Multi IT a call today on 011 435 0450 for support.
VIEW MORE
Tue, 11 Jun 2019/

Don’t Let The Super Bowl Be Your Big Day Of Cybercrime

The Super Bowl is coming to Atlanta’s Mercedes Benz Stadium on February 3rd. Whether you’re going to the game or yelling at the TV somewhere else with friends, there are a host of cyber security concerns to consider. Cyber criminals thrive on the excitement and chaos surrounding big events which create the best conditions for easily distracted prey. Concerts, inaugurations, parades, college playoffs, The Olympics, DragonCon, holidays and any crowded situation where people are working under tight deadlines all provide opportunities. Just think of all the looting that takes place in tropical environments during flooding and hurricane emergencies. The Super Bowl has all these elements in abundance. More than 112 million people watched the Super Bowl last year, with an estimated 7 million streaming it online. Don’t even get me started on the additional millions who were probably streaming it illegally. When you combine a huge audience with alcohol, game day power eating and numerous related festivities, highly skilled cyber crooks are poised to shoot the proverbial fish in a barrel.Here are a few tips to keep you safe: Ticket Scams Counterfeit tickets are rampant. There are no “print at home” tickets. So, if you are going to try to buy last-minute, too-good-to-be-true tickets from an online seller, Ticketmaster has a few tips: Buy from an official source and be wary of “official sounding sources.”If you do buy from a third-party site, beware of too-good-to-be-true deals. And don’t pay with a cashier’s check, cash or money wires…or Bitcoin. Use a method that is traceable.Make sure the URL of the site you are buying from is not a look-alike or spoofed; be sure it is an encrypted site. Phishing Don’t click on any email that says, “Tell us who you think will win the Super Bowl and get a free gift card.” I suspect the famous Nigerian Prince scam died and was reincarnated with this offer. Be very wary of unsolicited contest emails using the Super Bowl in the subject or as an incentive. This is generally illegal. If it does come from a trusted source, look at the domain at least three times. And make sure you know how to spot a phishing email. One more thing; roughly 5 billion was bet on last year’s game. Mostly illegally. Are you prepared to deal with the potential of your financial data being sold or phished through an illegitimate gambling site? On the illegal markets you have no way of protecting your data. Software Updates With the likes of Spectre and Meltdown, make sure you’ve updated your phone to the latest version of its software. Outdated software is a leading entry point for criminals. Wifi Stay off free wifi. Seriously. That is your safest bet. If you can’t be dissuaded, be very aware of the network you plan to use. It is common for scammers to create a spoofed wifi network which has the same look and feel as a legitimate network. And you’re not only vulnerable to this threat at the big game itself, but also at your local sports bar or other venues, where free wifi may be easily hacked or left unsecured. You must also be on the look-out for viruses. While skilled cyber security teams are monitoring all systems at the game, 49% of fans connected to the free wifi last year which is a 41% increase year over the year before. And this connection trend is not slowing down. A reported 100,000 threats took place last year with only 19 considered serious. However, increased traffic will only move the needle upward on higher risk outbreaks. Bluetooth Worse than wifi – make sure you turn off your Bluetooth before you head to the game. You don’t want to make it too easy. State Sponsored Threats Anyone remember the 15-minute blackout from Super Bowl XVLII? Recall anything Jack Bauer had to deal with on “24”? With security getting in and out of the stadium as tight as can be, a malicious actor, maybe even a state actor, could attack the grid or security systems to create panic, and cause billions in damages. With the Internet of Things (“IoT”), everything is connected; which is one of the reasons why Iranian operatives were able to hack into a dam in New York State a few years ago. Authorities are generally prepared for these eventualities and have contingency plans in place, but there are always new exceptions. Streaming While TV viewership has remained flat over the past decade, streaming is increasing. It’s not too far-fetched to predict that a record number of people will livestream the Super Bowl this year, but many may also be streaming illegally. Illegal streaming sites are notorious for all kinds of threats. Malicious links, phishing, exploits, ransomware; it’s all there, and only one impulsive click away. If you still want to go down this path, consider whether using an illegal streaming site is worth the risk. Pardon my unsolicited opinion in advance. It’s not. Check If You’ve Been Hacked After The Game You might not know it, but you might have an exploit lying on your phone or computer. If you are using all the right technology, you are probably okay. But if you’ve been browsing odd sites trying to get more info on the special event (or replay any of the funny and ridiculously expensive Super Bowl commercials), at least consider having periodic scans run shortly thereafter. To Sum It All Up Keep your devices up to dateAvoid public wifiTurn off BluetoothDon’t open that unidentified emailBe sure to run regular scansIf it seems too good to be true…you know the restDon’t drink and gambleMay the best team win Give Multi IT a call today on 011 435 0450 for support.
VIEW MORE
Tue, 04 Jun 2019/

Single Sign-On: The key to user management

Making passwords can be tedious. From complexity requirements to minimum lengths, creating a password for each new account brings its own set of headaches. If this problem is reaching a boiling point, Single Sign-On (SSO) solutions can help. These techniques are secure, easy-to-manage, and do away with the need to manage a long list of usernames and passwords. What is SSO? Single Sign-On solutions allow you to create one username and one password that thousands of websites will recognize. If you’ve ever clicked “Login with Google” on a non-Google website, you’ve already enjoyed the benefits of SSO. It’s faster, simpler, and more secure. Now, small businesses can accomplish the same level of efficiency between their employees and cloud platforms. Instead of asking everyone in the office to track separate accounts for Office 365, Slack, Quickbooks, and whatever other cloud apps your company relies on, you can give them one set of credentials and manage what they have access to remotely. Employees come to work, enter their designated username and password, and they’re all set for the day. Why is SSO more secure? There are a number of ways to set up a small business SSO solution, but most of them focus on removing login information from your servers. Usually, you’ll provide your employees’ logins to an SSO provider (sometimes referred to as an Identity-as-a-Service provider) and each employee will receive a single login paired with a secondary authentication — like a fingerprint or an SMS to a personal device. Every time one of your employees visits a cloud platform, such as Office 365 or Google Apps, the SSO provider will verify the user’s identity and the security of the connection. If anything goes out of place, your IT provider will be notified. Should your network or any of its devices be compromised, hackers would find nothing but logins to your SSO accounts, which are meaningless without fingerprints or mobile devices. How to get started with SSO The first step when setting up a Single Sign-On solution is making sure you have a healthy and responsive Multi IT support in place. You need a team that is constantly available to review suspicious alerts and troubleshoot employee issues. If you don’t currently have that capacity, give Multi IT a call today on 011 435 0450.
VIEW MORE