Home
About
Contact Us

Home>blog
Wed, 23 May 2018/

Meltdown and Spectre fixes cause problems

It’s been three weeks since one of the worst IT security vulnerabilities in history was announced, and consumers are still receiving mixed messages about how to protect themselves. We usually encourage users to install software updates as often as possible, but when it comes to Meltdown and Spectre, that advice comes with an asterisk. Unsecured data storage Spectre and Meltdown are the names given to two hardware flaws that allow hackers to see any piece of information stored on your computer. Although slightly different in execution, both take advantage of a hardware feature that computer chips use to access and store private information. For the last 20 years, security experts believed this information could not be stolen or spied on by malicious software, but that assumption was proven false on January 3, 2018. Now that the Spectre and Meltdown vulnerabilities are public information, hackers can use them to create programs that steal passwords, social security numbers, credit card numbers, and anything else you type into your computer. Because these problems are hardware-based, none of the updates will be able to secure the vulnerable storage; they’ll simply prevent your computer from storing anything in it. Currently, there are patches for: Operating systems (Windows, macOS, and Linux) Web browsers (Chrome, Firefox, Safari, Edge, and IE) Chip firmware (low-level programs installed on the processor itself) If you’re using an Apple computer, these updates are relatively easy to install. If you’re using a Windows or Linux-based computer, these patches may cause your machine to freeze, reboot unexpectedly, or significantly slow down. Why should I wait to install the updates? Intel, one of the chipmakers responsible for the Spectre and Meltdown flaws, has provided contradictory recommendations on more than one occasion. As recently as January 18, Intel recommended waiting for an updated patch, but in the same announcement also recommended “consumers to keep systems up-to-date.” Experts believe detecting an attack that is based on one of these flaws will be relatively easy and represent an alternative to installing updates that could render your computer unusable. What should I do? IT support experts will be able to quickly and easily assess what is the best option for your computers. For example, our team can determine whether or not your hardware will conflict with the current patches, and either install them or set up a detection strategy that will help you mitigate the risks without ruining your computer. If you need expert IT support for quick responses and ironclad security -- give Multi IT a call on 011 435 0450 today.
VIEW MORE
Thu, 24 May 2018/

Understanding Office collaboration tools

Office 365 is chock full of so many apps that it’s sometimes difficult to keep track of them all. Sure, you have the most popular tools like Word and Skype for Business, but there are three tools in the lineup that seem like they could be used the same way: Outlook Groups, Yammer, and Microsoft Teams. Read on to find out what makes these collaboration tools different from each other and when each of them should be used. Outlook Groups With Outlook Groups, every member gets a shared inbox, calendar, project planner, notebook, and document library. You also get the ability to connect to third-party apps -- like Twitter, Trello, and Mailchimp -- so notifications are sent directly to your shared inbox. This means all relevant messages and information are contained in one place, so if a majority of your conversations occur via email then, Outlook Groups is the perfect choice. What’s more, HR and Sales departments that communicate with external parties will also find plenty of uses for its email features. One drawback with Outlook Groups, however, is email overload. Because all messages and notifications are sent to one inbox, users may be overwhelmed by the number of emails they have to sort through every day. Microsoft Teams Then there’s Microsoft Teams, a chat-based collaboration platform similar to Slack. It works with Skype for Business so you can text, call, video chat, and share files with colleagues. And thanks to its seamless integrations with other Office 365 programs, you can even work on shared files without having to leave the app. Unlike Groups, Microsoft Teams is designed for high-velocity collaboration, making it the best of the three for completing projects with tight deadlines or other tasks where employees need immediate feedback. Yammer Much like Groups and Teams, Yammer works well with other Office 365 tools like Outlook and OneDrive. But the big difference is Yammer is a social media app designed to foster open communication and break down barriers between teams. With Yammer, important files and announcements can be shared with the entire company like an office bulletin board. What’s more, users can see the most popular post on their feeds, follow it, and even provide their input by leaving a comment. Yammer also takes design elements and features from popular social media apps like Facebook, making it a popular choice for companies with a significant number of millennials in their workforce. Although we’ve discussed the fundamental differences between Groups, Teams, and Yammer, we’ve barely scratched the surface of what each app can do. To figure out which apps you need, you must understand how your employees work, how they prefer to collaborate, and what you want to achieve. But there’s another way to find the right app for your business. Contact Multi IT today on 011 435 0450 for an IT assessment!
VIEW MORE
Tue, 08 May 2018/

A keylogger found in HP laptops

Are you using an HP laptop? If so, your machine might have a keylogger pre-installed. This means every stroke you hit on your keyboard can be recorded and your passwords and personal details can be exposed. But don’t panic. We’re about to tell you how to remove it while educating you about this sneaky software and how to steer clear from it. What are keyloggers? Keyloggers are hardware devices or software programs that record every key you press on your computer’s keyboard. Most keyloggers can also capture screenshots and send them to a remote computer where someone is waiting to see what you’re up to. And why does this matter? Because hackers can steal your usernames and passwords, keep track of the messages you send via instant messaging apps or emails, and other personal information you disclose on online forms. Imagine what they can do with all that data. A keylogger spotted on hundreds of HP laptops In early December, a security researcher discovered a keylogger pre-installed on an HP laptop. This led to the revelation that more than 460 HP laptop models, including ProBook, Pavilion, EliteBook, and the Envy line include the Synaptics touchpad driver -- which can be used as a keylogger. Even though the keylogger on those HP laptops isn’t activated by default, an attacker who gains access to your laptop can enable it without much difficulty. HP themselves said the keylogger code had been added to the software by mistake and they’ve since released patches to fix the issue. What should HP laptop users do? If you own an HP laptop, check whether you’re affected by referring to this full list of affected models. If your laptop model is on the list, click on the link provided on the right side of the model name and download the security patch immediately to remove the keylogger from your computer. How to protect yourself from keyloggers The standard security measures -- which you should be taking to heart and keeping up to date -- can help protect you from keyloggers. You should avoid suspicious websites and never download files from them, and take extra care when opening attachments, text messages, or social media links from unknown senders since they can be embedded with a keylogger. You should also have antivirus software installed and keep it up to date. Most antivirus software nowadays has already added keyloggers to their databases. It’s also good to be aware of the latest security patches from your hardware manufacturers and software developers since they’re made to fix current vulnerabilities. And to make things even more secure, consider using one-time passwords and two-step verifications when you need to log in to important online services, such as those related to personal finance or services that require sensitive personal data. Need more tips and tricks on how to protect yourself and your business from cyber espionage? Talk to Multi IT's security experts today on 011 435 0450. They will be more than happy to explain IT security issues to you in a language you can understand!
VIEW MORE
Mon, 07 May 2018/

Gmail gets more add-ons!

Add-ons and swim rings share one thing in common -- they both can save your life! While it might not be literal in the case of the former, add-ons do heaps to streamline your everyday tasks and literally save you hours of work. If you use Gmail, you can experience it today! Google’s focus is on productivity services that are already connected to email systems one way or another. This is why they have partnered with Asana, Dialpad, DocuSign (coming soon), Hire (by Google), Intuit QuickBooks, ProsperWorks, RingCentral, Smartsheet, Streak, Trello, and Wrike for their first set of native extensions. What are some features can you expect? While each add-on’s capabilities are slightly different, what they have in common is functionality that allows you to track various tasks right from the Gmail interface. For instance, Gmail users will be able to view tasks and track their progress right from their inboxes when they receive emails from other Asana users. The Trello add-on allows you to turn emails into actionable tasks where you’ll be able to comment and move cards without having to switch to Trello itself. And the RingCentral add-on will let you make outbound calls and view and send SMS messages right from your inbox. What’s more, these integrations work in the mobile Gmail app on Android, too. Google is currently working with Apple to bring these add-ons to iOS and they should be available soon. How to install these add-ons Just head over to G Suite Marketplace and download any extension you want. Then, those add-ons will be visible on the right sidepane of your Gmail interface. Unfortunately, they aren’t available in Inbox by Gmail (Google’s other email client) just yet. However, Google has made it easy for developers to create customized add-ons for their company with guidelines you can find here. With the introduction of Gmail add-ons, it’s exciting to see what other integrations are in store for businesses in 2018. But until then, if you have any questions about how you can use the web and cloud technology to your business's advantage, just give Multi IT a call on 011 435 0450.
VIEW MORE
Fri, 04 May 2018/

Identity and Access Management 101

Whether it be cloud, mobile, or on-premises, every technology you use stores certain confidential data that are accessed by your employees. So how do you guarantee the safety of said data from cyber threats like identity theft, phishing attacks and more? IAM is the answer. What is IAM? Identity and access management is a system that secures, stores, and manages user identities and access privileges. It ensures that users are who they say they are and will grant access to applications and resources only if they have the permission to use them. Some of the most common IAM solutions include single sign-on (SSO), multi-factor authentication (MFA), and access management, all of which can be deployed on-premises or in the cloud. Why is it so important? Modern technology enables businesses to be more agile and efficient than ever before. For instance, the cloud lets your employees work from anywhere at anytime on any device. However, this means that your workforce has moved beyond the protections of on-premise security. That’s why you need to embrace another security solution, one that focuses on identity rather than physical or network security, which is exactly what IAM was designed for. It makes sure that your employees, customers, and partners are who they say they are and are only able to access the resources they need, nothing more. And that’s just scratching the surface on how IAM can benefit your company. Centralise access control Too much access to certain systems are risky and too little can hamper productivity and frustrate users. IAM strikes the perfect balance by letting you set centralised policies for the right access privileges. For example, you can deny your design team access to the accounting system while granting it to your CFO. Each user’s role and attribute can be used to determine which resources they’re allowed to access and to what extent. This not only offers better security but also more flexibility and ease of management. Lower chances of data breaches With SSO and MFA, your employees will no longer have to remember multiple passwords. Instead, they’ll be able to prove their identity using evidence-based authorization such as answering a personal question that only they would know. IAM also comes equipped with advanced encryption tools to protect sensitive data and so reduces the risk of compromised user credentials. Improve user experience Customers today interact with your company across multiple channels, whether in the cloud or via third-party applications. This is where IAM helps provide a better experience through SSO, self-service capabilities, and unified customer profiles that makes communication processes quick and easy. Your employees, on the other hand, will be able to access the information they need securely and conveniently no matter where they are. This means productivity will no longer be confined to their office table. Achieve regulatory compliance Businesses today must meet the constantly changing regulatory requirements concerning data access governance and privacy management. IAM was designed with just that in mind and provides control over who can access data and how it can be used and shared. Reduce IT costs IAM automates and standardizes many aspects of identity, authentication, and authorization management. This means you’ll be able to minimise significant labor costs associated with keeping your business environment secure. Identity and access management solution equips you with much-needed security without compromising on usability and convenience. To operate in today’s digital business environment, it’s not a matter of “if” but “when” you’ll adopt IAM within your company. If you’re looking to enhance company-wide security, whether with IAM or other solutions, why not give Multi IT a call on 011 435 0450? We’re sure we can help.
VIEW MORE
Thu, 03 May 2018/

Facebook Messenger: What’s New?

Over 330 million consumers connected with small businesses via Facebook Messenger in 2017 alone, so it's evident that the ‘phone call’ era is coming to a close. Since consumers now want constant, immediate online connectivity with their local car dealership, pizza joint, and other local businesses, it is only fitting that Facebook Messenger’s latest feature grants consumers even more flexibility in how they contact their local business. The How By installing a plug-in called Customer Chat, retailers can integrate Facebook Messenger with their website, letting their customer support representatives carry on conversations with clients just like they would on Facebook. Customer Chat also saves conversation histories, meaning a user can be talking to a customer representative on their website and then continue the conversation once they shift to Facebook -- without having to start a new conversation. Customer Chat is now open to any business in the form of an ‘expanded public beta.’ Here’s Facebook’s guide detailing how to install Customer Chat. Facebook’s Grand Plan Like all new services, the success depends on the users. Customer Chat’s primary user base seems to be those who lack the time or confidence involved in sending a formal e-mail for a casual business inquiry. Regardless, Facebook has long been developing its platform with an eye on chat's broader benefits to tighten its grip on businesses. A recent stat indicates Facebook Messenger has surpassed 1.3 billion monthly active users. So, What Next? As Facebook seems to be monopolizing and clamping down on the communication realm -- both private and business -- with Facebook Messenger and Whatsapp, the plan is clear: They want to absorb even more of the communications that usually take place over phone calls and e-mail. It is still an uncertainty if the new Messenger feature will have a large impact on Facebook’s grand plan, but it certainly won’t hurt if it ends up working. Customer Chat opens up new avenues of integration, such as sending money, making video calls or even convincing customer service reps to give you a refund. Thus making Facebook the go-to app for anything and everything. Got any questions about Facebook? Let Multi IT help you understand the technicalities. Call us on 011 435 0450 today!
VIEW MORE