Is Bing the right search engine for you?
Have you ever tried asking your search engine something to no avail? With many of us facing this problem, Bing has been updated with four new features that give users more thorough answers and enable it to respond to broader search terms.
Validating answers using many websites
Before the recent update, Bing would answer questions based on what it found on a single website. Now, it scours several sites and aggregates results before replying to your query. For questions that have two different perspectives, answers from both sides will be compiled and displayed at the top of the search page. A compilation of answers will also be given for questions with numerous answers.
Analogies
Have you ever gotten an answer you couldn’t comprehend? Search engines have a relatively easy time finding answers, but they don’t always display the simplest ones. For example, knowing that Syria is 71,498 square miles isn't the same as learning that Syria is approximately as big as Florida, but depending on where you live one is much better than the other.
With Bing now providing relevant analogies and comparisons, information has become easier to understand. Answers are based on things search engine users are familiar with, making the search experience far more user-friendly and empathetic.
Clarifying questions
Bing is now able to provide a more specific answer when being asked broad or conversational questions. To accomplish this, the search engine will ask the user follow-up questions to refine search results.
Microsoft has also an advanced image search, which allows users to search based on specific objects within images. For example, if you wish to purchase a shirt you saw in a picture, Bing’s advanced image search allows you to select it and locate a store that sells it.
Partnering with Reddit
Bing has also partnered with Reddit to display information from its threads to Bing’s search page. What this means for users is that certain topics in Reddit or subreddits can be searched through Bing search. Answers found in the site will also be displayed on the search page.
With these four new features in Bing, searching for your answers has never been easier. To find out more about other web and cloud services, give Multi IT a call today on 011 435 0450.
VIEW MORE
Is your browser safe from Spectre?
The Chrome, Safari, Microsoft Edge, and Firefox browsers may not be as safe as you think. Security researchers recently discovered that computer chips manufactured in the past two decades contain major security vulnerabilities. One can be used by hackers to gain access to sensitive data. Read on to learn more.
What is Spectre?
To understand this unprecedented vulnerability, you need to know some computer chip basics. Modern chips try to speed up their work by storing information related to predictable and repetitive processes. Whenever CPUs perform calculations ahead of time that end up being unnecessary, the data is thrown away into a supposedly secure storage cache.
Hackers can gain access to the discarded data by using malware to create digital backdoors. From there, they can simply sneak in, sift through the private information, and even trick the processor into throwing away even more sensitive information. This is known as a Spectre attack.
Though the exploit is highly technical and difficult to execute, researchers said Spectre affects all modern processors, including those developed by Intel, AMD, and ARM.
How does it affect browsers?
As mentioned, hackers would need to install malware on a device to perform a Spectre attack. One tactic experts found effective is if hackers build a malicious program and embed it on a website. Should anyone visit the rogue website, their browser will automatically run the malicious program.
Once inside, the attacker can use Spectre to gain full access to keystrokes, encryption keys, and login credentials.
So far, there is no evidence of Spectre attacks actively being used to steal data from web browsers, but they are difficult to detect. Experts also predict hackers will likely develop specialized malware now that this information is available to the public.
Is there a way to protect myself?
Fortunately, major browser developers were quick to release updates as soon as the Spectre attack was discovered.
Mozilla also has security features to prevent some Spectre attacks, but announced a full-blown solution is in the works.
As for Chrome, users can expect an update as early as January 23. But for the time being Google recommends enabling the Site Isolation feature, which limits how much access browser plugins have to your computer. This feature can be enabled by going to your address bar and entering: chrome://flags/#enable-site-per-process.
Even though the updates may affect browser performance, it’s a small price to pay compared with having your credit card or social security number stolen.
Like it or not, Spectre is just one of the many threats targeting your web browsers. That’s why you should call Multi IT today on 011 435 0450. We offer expert advice and cutting-edge solutions to make sure your browsing experience is a pleasant and safe one.
VIEW MORE
Google reviews: how to make them count
Google has recently modified their search results to display ratings from review sites like Facebook and Yelp. While this may seem like a small change, it has actually made reviews more important than ever in terms of SEO. With the following tips, your company can shine in the Google search results.
How Google changed search results
Google’s new search algorithm is designed to lead people to high-quality products and services. For instance, if you search "Acme Group Inc.", Google will show you something called a Knowledge Panel. Displayed on the right side of the search results, this panel includes information like address, hours, web address and more.
Over the last year, Google has been automatically aggregating and including online reviews to display in the Knowledge Panel.
Which review sites does Google include?
Relevant sites vary from industry to industry, so if you manage a restaurant, reviews from Yelp or Zagat will likely be displayed next to your online listings. If your business is a bit more niche, however, there are a few steps to determine which review sites affect you.
Go to Google and search for the following:
“[your company name] reviews” - to locate sites that already have reviews on your business
“[industry] reviews” - to determine industry review sites that you should be listed on
“[industry + location] reviews” - to find review boards where you can boost your local presence
Then, record all the review sites you found on the first page of each search query and categorize them based on their search ranking and the current rating your company has on them.
Once you’ve produced a comprehensive list, write down an objective for each review site. This can range from getting listed on the site to improving your rating.
To narrow it down even further, focus your review generating efforts on the five most popular websites on your list, especially any that include disappointing reviews.
Getting reviews
Of course, all this doesn’t matter if people aren’t writing reviews about your products and services. With that in mind, here are a few strategies that encourage people to rave about your business.
1. Send follow-up emails
After a customer has made a purchase, it’s a good idea to send a thank you email that includes a request to review your service.
2. Simplify the review process
Many customers opt to skip writing a review because there are too many steps to express their opinion. Simplify this process by having a review site already opened on your smart tablet and asking your customers to comment on your service before they leave your venue.
3. Offer rewards for reviews
Another way to encourage people to rate your business is by presenting them with a chance to win free goods or services if they submit a review.
Though there’s a lot of steps involved in managing your online reputation, starting early will enhance your SEO, attract new customers, and improve your bottom line.
If you need more advice on climbing up Google’s search rankings or tips on social media management, Multi IT today on 011 435 0450.
VIEW MORE
How Do Your Customers Relate To Your Auto Attendant?
It is said that you never get a second chance at a first impression. When your customers call your business, what is their first impression? How many buttons do they need to press to answer the question they are asking? Do they get lost in the key pad maze of voice mail prompts and computerized voices that is all to frequent as Attendant Maze try to offload customer service to the auto attendant? It is very important to pay close attention to what your customers experience when they call your business.
Below are 10 good items to think about when setting up your business incoming call flow and your business auto attendant:
How many options are you going to provide in the prompts?
Is your auto attendant a backup to calls being answered by a live person when they are busy or otherwise?
Does the auto attendant greeting sound professional?
If the receptionist is busy, how many rings should a customer have before the auto attendant engages?
Do you have an afterhours auto attendant that provides callers a way to reach someone in the office after the receptionist leaves? i.e. Dial by name directory?
If you have multiple offices, does your business have a consistent message at each office?
Music on hold is a way to let customers know that their call has not been dropped. Are you using the ‘canned” music that comes with your phone system? How is the sound quality?
What do callers experience when calls are forwarded to other users? Do you provide your callers a warm transfer or does the receptionist just forward calls directly to the extension?
Can the receptionist provide the caller options in cases like the called party is on the phone or would you like to leave a message in their voicemail?
Have you changed the canned auto attendant greetings? When I call customers and here a greeting, many times I can tell what phone system or voice mail system a customer is using. Example: “You have reached our ShoreTel Voice Mail, please leave a message for John Doe”
It pays for every business to spend a little extra time on their their company greeting. Fine tuning your auto attendant, individual voicemails and music on hold will provide a good overall customer experience for inbound callers. Contact Multi IT on 011 435 0450 to improve your company's first impression.
VIEW MORE
Hackers exploit vulnerable Office feature
As the world’s most popular productivity suite, Microsoft Office tends to receive much attention from cybercriminals. Generally, hackers embed malware in authentic Office files to trick users into unleashing it onto their machines. However, the most recent exploit proves to be much more dangerous than any Office hack we’ve seen.
What’s the new Office threat?
The Office exploit takes advantage of Microsoft’s Dynamic Data Exchange (DDE), a protocol that sends messages and data between applications. For example, DDE can be used to automatically update a table in a Word document with data collected in an Excel spreadsheet.
The problem with this is hackers can create DDE-enabled documents that link to malicious sources rather than to other Office apps. Theoretically, this allows hackers to launch scripts that download Trojan viruses from the internet and execute it before the user is even aware of the attack.
And unlike most malware-embedded Office files, which are usually blocked by security protocols from Microsoft, DDE exploits are instant. Once a compromised Word file is opened, it automatically executes the hack.
Outlook at risk
What’s even more alarming are the DDE vulnerabilities in Outlook. Recent reports found that hackers can embed malicious code in the body of an email or calendar invite, allowing them to perform phishing scams without a file attachment.
Fortunately, Outlook DDE attacks are not as automated as Word or Excel DDE attacks. Two dialog boxes will usually appear when you open the email asking if you want to update a document with data from linked files and start a specific application. Simply clicking ‘No’ on either of these boxes will stop the attack from executing.
Defending against DDE attacks
Beyond saying no, you can protect yourself by following these security best practices:
Evaluate the authenticity of unsolicited emails before interacting with them and don’t open attachments from unfamiliar contacts.
View emails in plain text format to completely stop DDE attacks embedded directly in emails from running. Note that this will also disable all original formatting, colors, images, and buttons.
Use a strong email security system that prevents phishing emails, spam, and other unwanted messages from reaching your inbox.
Get in the habit of checking for Microsoft updates, as they're usually quick to release patches after vulnerabilities have been discovered.
Last but not least, consider working with our team. We’re Microsoft Office experts who can keep you safe from the latest threats. Call Multi IT today on 011 435 0450 to get started!
VIEW MORE
KRACK hacks: What you need to know
You’ve heard of ransomware, denial-of-service attacks, and even phishing, but one hacking technique you may not have heard of is the KRACK exploit. This attack takes advantage of a vulnerability in WiFi networks, which puts any device with a wireless connection at risk. Here’s everything you need to know about KRACK.
What is KRACK?
Simply put, KRACK, short for ‘key reinstallation attack,’ allows hackers to bypass WPA2 -- a security protocol used by routers and devices to encrypt activity -- and intercepts sensitive data passing between the mobile device and the wireless router, including login details, credit card numbers, private emails, and photos.
In extreme cases, KRACKed devices can be remotely controlled. For example, hackers can log in to your surveillance systems and shut them down.
What’s worse, Internet of Things devices -- like smart thermostats and IP cameras -- rarely receive security fixes, and even if some are available, applying patches are difficult, as these devices tend to have complex user interfaces.
The good news, however, is you can do several things to mitigate the risks.
Download patches immediately
According to recent reports, security patches have already been released for major platforms, including iOS, Windows, and Android. Router manufacturers such as Ubiquiti, Mikrotik, Meraki, and FortiNet have also issued firmware updates, so make sure to install them as soon as possible.
Although IoT patches are rare, consider getting your smart devices from reputable vendors that push out updates regularly. It’s also a good idea to contact a managed services provider to install the updates for you.
Use Ethernet connections
Some wireless routers don’t yet have a security patch, so while you’re waiting, use an Ethernet cable and disable your router’s wireless setting. Turn off the WiFi on your devices as well to make sure you’re not connecting to networks susceptible to KRACK.
Stay off public networks
Free public WiFi networks -- even ones that are password-protected -- in your local cafe should also be avoided because they usually don’t have holistic security measures in place, making them easy targets for cybercriminals.
Connect to HTTPS websites
If you do need to connect to a public WiFi hotspot, visit websites that start with “HTTPS,” and stay away from ones that are prefaced with “HTTP.” This is because HTTPS websites encrypt all traffic between your browser and the website, regardless of whether the connection is vulnerable to KRACK
Hop on a Virtual Private Network (VPN)
You can also use a VPN service to hide all network activity. Simply put, VPNs encrypt your internet connection so that all the data you’re transmitting is safe from prying eyes.
Although the potential impact of a KRACK hack is devastating, security awareness and top-notch support are the best ways to stay safe online. Want more security tips? Contact Multi IT today on 011 435 0450.
VIEW MORE