Home
About
Contact Us

Home>blog
Thu, 01 Sep 2016/

5 Ways Password Managers Can Help You Become More Organised and Efficient

Password managers are great for generating and storing strong passwords for online accounts. Many password managers, though, have additional features that let you easily store and access other types of information. Here are five ways you can take advantage of those features so that you can be more organised and efficient: 1. Auto-Fill Fields on Web Forms Many password managers can automatically fill in personal information for you on web forms. For example, you can configure a password manager so that it automatically fills in your name, email address, physical address, and phone number. Using this feature instead of typing in your personal data can save you time and hassle. 2. Store Contacts By using a password manager that lets you store contacts, you can quickly access the information you need to keep in touch with customers, employees, service providers, and other people pertinent to your business. If you have a cloud-based password manager with this feature, you will have access to those contacts on any supported device that you use. A few password managers even let you import contacts from various sources (e.g., Microsoft Outlook, vCard files) so that you do not have to manually enter all of them. 3. Store Sensitive Information You can use a password manager to keep track of sensitive business information, such as key codes for software licenses, serial numbers of computing devices, and building security-alarm codes. Plus, if you often travel for business, you can store your ID numbers for the airline, hotel, and car rental loyalty programs you belong to. You can also use a password manager to keep track of sensitive personal information. For example, you can store your driver licence, credit card, and bank account numbers. 4. Store Sensitive Files Contracts, sales ledgers, customer profiles, and similar documents contain sensitive business data. Some password managers let you store sensitive files, which can be particularly useful if you are traveling and need access to them. Many different types of files can be stored, including PDF, image, and Microsoft Office (e.g., Word or Excel) files. 5. Organise and Control Users' Access to Sensitive Information A few password managers let you organise sensitive information into folders and then control access to those folders. For example, you can put any sensitive information that customer service representatives might need into a folder and then give them access to it. Sometimes you can assign roles to users (e.g., user, administrator, super administrator) to control what they can see and do. Contact Multi IT Multi IT and Telephony Solutions are expert IT professionals and can advise you and your organisation on the best practices that can help your business become more efficient.
VIEW MORE
Wed, 27 Jul 2016/

4 IT Trends to Watch in 2016

What is going to happen to the IT world in 2016? While no one knows for sure, it is possible to make a few educated guesses based on current industry IT trends. The following predictions offer both early warnings and potential opportunities for business owners, helping them chart the best course forward. Here are four IT trends business owners should watch in 2016: 1. Ransomware and Other Types of Cyberattacks Will Be on the Rise The number of cyberattacks will continue to increase in 2016, with ransomware being one of the biggest threats, according to McAfee Labs and Trend Micro. Besides increasing in number, ransomware attacks will be harder to detect. New ransomware variants will likely have stealth capabilities, allowing them to encrypt data silently in the background or even encrypt data on the fly, according to McAfee Labs. Plus, Trend Micro predicts that ransomware attacks will become more personalised, exploiting companies' fears of losing their good business reputations. In light of this prediction, you will need to keep abreast of security issues, vulnerabilities, and exploits — if you are not already doing so. There are many ways to track them, such as signing up to receive email alerts issued by Stay Smart Online. 2. Governments and Other Organisations Will Take a More Active Role in Fighting Cybercrime Governments will take a more active role in protecting the Internet and its users in 2016, according toTrend Micro. Besides governments enacting legislation, the Internet security firm predicts that there will be more international cooperation between governments, similar to the 2015 agreement between the United States and Europe to share data during criminal and terrorism investigations. Sharing data and resources will also become more commonplace among other organisations, according to Trend Micro. These organisations will likely try to emulate how the Cyber Defense Institute, INTERPOL, Kaspersky Lab, Microsoft, and Trend Micro took down the SIMDA botnet in 2015. Even if these trends hold true, you should not rely solely on government and outside organisations to protect your business against cyberattacks. You will need to implement security measures to protect your business if you have not done so already. 3. The Wearables Market Will Rapidly Expand The number of wearable computer-powered devices (e.g., smart watches, smart glasses) is expected to grow from 200 million in 2015 to 780 million worldwide by 2018, according to McAfee Labs. Besides growing in number, wearables will likely grow in sophistication, opening the door wider for business use. For example, PwC envisions a retail environment in which clerks use wearables to access information in real time to answer customers' questions and customers receive sale notices on their wearables when they enter stores. Although wearables have the potential to improve employee productivity, increase sales, and provide other benefits for businesses, they have a possible downside as well, according to McAfee Labs. Wearables can expose businesses to security vulnerabilities because they either connect to the Internet directly or connect to smartphones or tablets. So, if you want to take advantage of wearables in your business, you will need to ensure that the connections are secure. You will also need to protect any data you collect from wearables. 4. Companies Will Continue to Migrate to IT Infrastructures in the Cloud despite Fewer Cloud Vendors Offering This Service The migration from onsite physical IT infrastructures to IT infrastructures in the cloud is expected to continue in 2016, according to cloud experts. The potential to save time and money will be fueling this migration. Companies will be able to run their business applications without having to buy or manage the servers, storage devices, networking equipment, and other items needed to host those applications. However, starting in 2016, there will be a rapid consolidation of public cloud vendors that offer IT infrastructure services, according to Technology Business Research. It is predicting that four companies — Amazon Web Services, Google, IBM, and Microsoft — will account for almost half of this market by 2018. So, if you are contemplating running your business applications from an IT infrastructure in the cloud, you may have fewer cloud vendors to choose from. Where to now? Multi IT & Telephony Solutions are trusted advisers in the IT field and will be able to give you insight into what your company is currently doing and where it can improve to compete with your competitors. Contact us now or phone us on 011 435 0450
VIEW MORE
Mon, 25 Jul 2016/

Ransomware warning

Computer users are advised not to click on links or open attachments in uninvited or unexpected emails and be wary about the websites they visit as security researchers identify hazardous new versions of ransomware. They should keep regular backups of important files and store the backups in a location away from a network. Ransomware is a type of malware that blocks access to computer files and forces the user to pay a ransom in order to release them. However, the FBI is reportedly investigating a particularly nasty version of ransomware known as Samas that attempts to encrypt files on computers across an entire network, rather than just individual computers. As reported by Reuters, the FBI has warned businesses that the group behind Samas was utilising an automatic tool to find servers using an out of date version of popular software. They would then take advantage of a weakness in the software to install the ransomware remotely on computers connected to the network. The ransomware is also thought to delete backup files. The most recent attack known as Petya is an email with a link to an infected file claiming to be a resume. Once downloaded and implemented, the malware crashes Windows and overwrites systems on the computer. A payment is demanded upon reboot.  The ransom amount is doubled if the user does not pay by the deadline set by the criminals. How to Stay Safe If your computer has been infected by ransomware, you should update your system and restore the affected files from backup.  I would suggest seeking technical advice if you are unsure about the next steps. I don’t recommend paying any ransom demanded to decrypt files. There is no guarantee the attackers will give you a working decryption tool, and you are also not protected against future attacks. You should also change all of the passwords and usernames on all computers, choosing strong passwords.  Here is some advice on avoiding weak passwords. If you would like to discuss your online security further please contact Multi IT & Telephony Solutions or phone 011 435 0450.
VIEW MORE
Mon, 25 Apr 2016/

The Top 5 Reasons Why Your Business Needs a Strong Firewall

In this age of global connectivity, protecting your business's assets and data is more important than ever. Almost all businesses are connected to the Internet for a wide variety of services. These include email, search, social media, and cloud storage. While much of this traffic is outbound, the fact is that the same Internet connection also allows inbound traffic. That is where having a strong hardware- or software-based firewall comes into play. You can use it to protect your business network from unauthorised access. Here are the top five reasons why your business needs a strong firewall: 1. A Firewall Is Your First Line of Defence against Hackers and Other Unauthorised External Users A firewall acts as a barrier, or shield, between your internal business network and the rest of the Internet. Without a firewall, it is possible for external users to access your private business assets. While many organisations use Network Address Translation (NAT) to bridge Internet and external IP addresses, NAT will not block incoming traffic. Only a firewall can do that. Without a firewall, your organisation's assets and data are at risk. 2. A Firewall Lets You Block Access to Unapproved Websites In addition to stopping unauthorised external users from accessing your network, a firewall can stop your users from accessing specific external websites. For instance, you could set up a policy that blocks access to social media sites like Facebook from your network. 3. A Firewall Can Protect Your Business from Malicious Code Some strong firewalls will inspect the traffic going into and out of your network. They look for and block viruses, worms, spam, and other unwanted Internet traffic. They will also log intrusion attempts as well as other violations to business policies. This enables you to examine unauthorised access attempts and other suspicious activity. Many of these strong firewalls will also let you maintain a list of known malicious applications and known good applications. They will block the malicious applications, while enabling the good ones. 4. You Can Use a Firewall to Meter Bandwidth A firewall can do more than just provide security. You can also use it to meter and limit the network bandwidth flowing through it. For example, you can limit the network bandwidth allowed for things like non-business videos, music, and images, thereby reserving bandwidth for higher priority business traffic. 5. You Can Use a Firewall to Provide VPN Services Many firewalls provide site-to-site connectivity through Virtual Private Network (VPN) services. Through this VPN functionality, mobile device users and users at remote sites can securely access your internal network resources. This enhances productivity, collaboration, and data sharing. The next step in your security Having an IT partner like Multi IT & Telephony Solutions will give you the ability to make an informed decision on which firewall is best for you. We have the most qualified and experienced Cyberoam technicians in the country enabling us to deliver world class firewall and security solutions. Contact us today to discuss your firewall and security requirements.
VIEW MORE
Fri, 22 Apr 2016/

How to Avoid Creating Weak Passwords

You have likely heard that using strong passwords is an integral part of protecting a company's data. But do you know what makes a password strong or weak? To find out, here is a quick weak passwords quiz: Take a look at the list of passwords below. (The quotes are not part of the passwords.) Which of the following are strong passwords? "football" "123456" "qwertyuiop" "passw0rd" "1qaz2ws" The answer is none of them. In fact, all these passwords were on SplashData's "Worst Passwords of 2015" list. Knowing why these passwords are weak can help you avoid making the same mistakes when you create your own passwords. Why they are weak passwords. "football" (No. 7 on the Worst Passwords List) The password "football" is weak on several fronts. First, it includes only lowercase letters instead of a mix of uppercase and lowercase letters. Further, it is a word that you can find in a dictionary. Cybercriminals often use software that systematically tries every word in a dictionary as a password. This is known as a dictionary attack. Besides not using words in the dictionary as passwords, you should not use proper nouns or foreign words. You should also steer clear of creating passwords that incorporate business or personal information. For example, do not use a password based on when and where you started your business, or an activity you enjoy. It is easy for cybercriminals to obtain business and personal information on social networks, such as LinkedIn and Facebook. "123456" (No. 1 on the Worst Passwords List) What is wrong with using a password like "123456"? To begin, it is too short. The shorter the password, the easier it is to crack. More important, it incorrectly uses numbers. Passwords should contain numbers but not in obvious strings (e.g., "7777777"). Cybercriminals often try entering strings of numbers before launching the more time-consuming dictionary attacks. "qwertyuiop" (No. 22 on the Worst Passwords List) While the length of "qwertyuiop" is adequate (10 characters long), this password does not include any numbers or uppercase letters. What is worse is that this password is common, as it is the top row of letters on a computer keyboard. Cybercriminals know which passwords are popular, so they will try them first. "passw0rd" (No. 24 on the Worst Passwords List) This password contains both letters and a number, which is good. However, it does not contain any uppercase letters and it is commonly used. It is not as popular as "password", though, which is No. 2 on the worst passwords list. "1qaz2wsx" (No. 15 on the Worst Passwords List) At first, "1qaz2wsx" might look like it is a strong password, but it is not. Besides containing only lowercase letters, it is a well-known password among cybercriminals. On a computer keyboard, it is the first two columns of keys containing numbers and letters. Guidelines for Creating Strong Passwords When creating a password, follow these guidelines: Think of a long, random password that is hard to guess. At the minimum, the length should be eight characters — the longer, the better. Use numbers but not in a predictable pattern. Use uppercase and lowercase letters. Use special characters (e.g., percent sign, exclamation point, dollar sign) when possible. An example of a strong password is "8%&KY4&$XzwMhfrk". On an average computer, it would take a cybercriminal more than 10,000 centuries to crack this password using a brute-force password-cracking tool, according to Kaspersky Lab. These tools try every possible character combination as a password. Even on the world's fastest supercomputer, Tianhe-2, it would take a cybercriminal a year to crack "8%&KY4&$XzwMhfrk". In contrast, it would take a cybercriminal one second to crack "passw0rd", "qwertyuiop", "football", and "123456" on a home computer. Cracking "1qaz2wsx" would take 33 seconds. As part of your free security evaluation, Multi IT can help you determine whether your organisation's passwords are adequate. If you are having trouble creating strong passwords, please feel free to ask Multi IT & Telephony Solutions for a password manager that you can use. Password managers automatically create strong passwords and securely store them for you. Our Managed Service customers enjoy the benefit of all their passwords being secure and securely stored and managed, giving them peace of mind and world class security. Contact us today to discuss your requirements.
VIEW MORE
Thu, 21 Apr 2016/

5 Ways That Automation Can Save You Time

Automation of routine tasks with applications is more efficient than using manual tools. Yet most companies rely on manual tools, according to a ServiceNow survey. Eighty percent of the 915 surveyed managers reported that their companies still use manual tools and that those tools cause significant delays. On average, the managers said they spend two days every week using them to perform routine administrative tasks instead of pursuing their companies' strategic goals. This drain on productivity is not limited to managers. It also affects other employees who use manual tools. Automation can solve this problem by streamlining the way you do business. Here are five areas in which automation can save you and your employees some time: 1. Document Management Using forms, policies, contracts, and other types of documents is a mainstay in business. Manually tracking, updating, and storing documents can be time-consuming, though. Plus, if you need to update a document that is in a file cabinet in a different office, getting the document can be a hassle. To save time and hassle, you can use a document management solution to get all your documents into digital format and automate the processes you use to manage them. For example, if your staff often needs to update documents, you can have the document management software track all changes and send the updated documents through an approval process. 2. Appointment Scheduling Setting up meetings might seem like a trivial task, but it eats away at your productivity a few minutes at a time. Appointment scheduling software can help you track and schedule meetings with colleagues and customers. Many of these programs synchronise with programs such as Google Calendar and Microsoft Outlook. More advanced appointment scheduling solutions offer additional functionality. For example, some provide online forms that customers can use to request or cancel appointments. 3. Fixed Asset Management A common way to manage fixed assets is to use spreadsheets. For instance, business owners sometimes enter computer serial numbers, software license numbers, and other details about IT assets in spreadsheets. Manually tracking and updating assets is a tedious job that is often postponed or overlooked. To make sure it gets done, you can use asset management software. These applications often use barcodes to track assets and automatically update their details. They can also notify you about upcoming events such as a software license that is about to expire or equipment that needs maintenance. 4. Human Resource Management Small business owners can spend as much as 25 percent of their time handling employee-related paperwork, according to a U.S. Small Business Administration study. You can spend less time if you take advantage of human resource automation. Employee self-service applications are an important part of automating human resource management. With a self-service application, your employees can update phone numbers, addresses, and other personal information on their own. Depending on the application, they might also be able to perform other tasks such as submitting vacation requests and changing benefit options. A human resource automation solution can free up your time in other ways as well. For instance, you can use it to streamline your recruitment, hiring, and performance evaluation processes. 5. Inventory Management Every business has inventory it needs to manage. Even service providers have office supplies they need to track. Inventory management programs automatically track when inventory is received, used, transferred, and sold. Most programs also provide other time-saving tools, such as tools that create purchase orders, issue work orders, and manage shipping processes. Besides saving you time, inventory management software can help you reduce costs. You will be better able to determine how much inventory you need to carry and when you need to reorder it. With this information, you can keep only the inventory you need in stock. The Bottom Line on Automation These five areas are only some of the automation possibilities. In many cases, taking advantage of automation tools does not require a large capital investment. There are many free tools. Plus, some automation solutions cover more than one area. For instance, solutions that automate human resource management often include an appointment scheduling tool. Multi IT & Telephony Solutions can help you find the best automated tools for your business. Contact Multi now to discuss your requirements or any area of business you believe could be automated.
VIEW MORE