Categories
Blog

Apps Robbing You of Privacy?

We all know that there are millions of free apps available for download for both Apple and Android devices. That’s great when looking for helpful assistants and entertaining games, but just because they are free, doesn’t mean they don’t come with a price. That price just might be your privacy!

Apps Privacy

Listed below are 7 apps that, according to the PrivacyGrade, are low scoring and users should think twice before installing them onto their devices:

  1. Words with Friends

This popular game has been scored a D by PrivacyGrade, and although it is a wonderfully fun way to brush up on vocabulary skills, there are many privacy concerns associated with using the app. Not only does the app include several advertising libraries, but it uses the “use phone status and identity” permission to provide information to advertisers, including your phone number, carrier information, signal strength, and more. It also uses the “location” permission to deliver you local advertisements.

  1. Draw Something Free

This free app is a fun version of Pictionary that can be played with friends. Because it is from the same developer as the aforementioned Words with Friends, it has many of the same privacy concerns, and for these reasons has also been scored a D by PrivacyGuard.

  1. GO Locker

This app is a screen lock for your phone that boasts to be more secure and smarter than any devices built in lock. Because of these added capabilities, it requires a lot of information, and requires permission on just about everything from your location details to granting the app permission to read your text messages, effectively earning their D score.

  1. GO Weather Forecasts and Widgets

Another GO app that has earned a D grade. The same developer as the GO Locker brings you this weather and forecasting app. This app has the same concern over requiring endless permissions and providing your details to other app stores. A little background research has revealed that essentially any app associated with GO suffers the same privacy concerns and should all be steered clear of.

  1. Angry Birds

This beloved bird launching game scores slightly better than some of the aforementioned apps, but still has a concerning grade on PrivacyGuard of C. This game has had more than 2 billion downloads since the initial release in 2009, and it as well as the many spin offs and sequels have not fared well in regard to privacy. Most of the Angry Bird apps have several targeted libraries that grab phone identity information including your signal, phone call logs, device ID and number, and carrier details.

  1. My Talking Tom

Another app with a PrivacyGuard score of D is My Talking Tom, hugely popular with children. It is a harmless little app where users can adopt and care for a kitten, but in actuality, it is a privacy nightmare. This app not only has 8 targeted ad libraries, but in addition, requires your phone’s identity information. And even more concerning, because it is a simple children’s app, it sends advertisers audio from the microphone on the device.

  1. Camera360 Ultimate

Camera360 Ultimate is an app that promises its users exclusive filters, more camera modes, facial recognition, free cloud storage and a slew of other fantastic features to take the typical camera app to the next level. Although the app does not include any ad targeting libraries, it still has a Privacy Guard score of D because of other privacy related shortcomings.

The app demands a lot of user information and also has the Baidu search engine library built in. Consumers may wonder why a Chinese search engine needs the ability to turn Wi-Fi connectivity on and off. In addition to this all in app purchases are powered by Alipay, a Chinese payment system that may not be ideal.

Categories
Blog

Browse The Web On Your iPhone or iPad?

Discover a Sensational Way of Browsing the Web on Your iPhone/iPad…

What Does FireFox Have in Store for Apple Device Users?

Until late last year, Mozilla believed that Apple’s mobile OS was too closed off for a third party browser. But that’s over and done – and its time for the first public preview of FireFox for iPhone and iPad. This move will undoubtedly tap Mozilla into a far larger iOS market. That is if they aren’t too late to the party…

Users in New Zealand Get First Crack at Public Preview

Mozilla has begun reaching out to users in New Zealand by offering them the first public preview of their browser for iPhones and iPads in the hopes of receiving valuable feedback, before they expand to a full global preview due for later this year. This public preview contains an option in the settings screen that allows the trial users to send their feedback directly to the company.

tablet browsing

A Sneak Peek of What to Expect

Although adding their browser to iPhone/iPad is a smart and necessary move for Mozilla, they may find themselves in somewhat of an uphill battle in terms of catching up to their competitors, Apple’s Safari and Google Chrome in particular, whom already have a large and seemingly loyal mobile user audience.

So what can we expect from this iOS version of FireFox? Mozilla’s recent blog mentions a few of its key features so far:

  • Intelligent search that allows users to choose a default search provider
  • An account feature that allows users to sync FireFox passwords, tabs, and browser history from desktop to iPhone/iPad
  • Suggested search results
  • Visual tabs with thumbnails of your open tabs

Additional features will surface over time based on user feedback while Mozilla readies itself for FireFox’s worldwide release. Will you be using FireFox on your mobile device when it becomes available?

Categories
Services

Managed IT Services in Dallas

Get your business the level of care and services it needs and watch your operations improve immediately – like magic!

{company} is committed to giving our clients in Dallas & Fort Worth the best IT services and support possible. We offer unique, comprehensive packages so you’re able to choose the level of services you need.

We work with you to plan strategically, ensuring you’re getting the best solutions and support to push your business forward.

From innovative tools that increase productivity and improve your output, to security solutions that keep your data safe; {company} helps ensure you’re getting the best return on your investment and that you’re always functioning at your absolute best.

Reach out to our team of experts at {email} or (469) 635-5500 to discuss how our managed services will help your business thrive.

Silver Package: Data Magic Computer Services – Managed IT Services

Silver Package Monitoring Services include:

  • Whitelisted patches and security
  • Asset Inventory
  • LogMeIn full version
  • Anti-virus
  • And more

Gold Package: Data Magic Computer Services – Managed IT Services

Gold Package Monitoring Services include:

  • Everything included in Silver Package
  • Unlimited remote support
  • Unlimited remote log-in
  • Trouble ticketing

Platinum Package: Data Magic Computer Services – Managed IT Services

Platinum Package Monitoring Services include:

  • Everything included in Silver and Gold Packages
  • Unlimited onsite support

Diamond Package: Data Magic Computer Services – Managed IT Services

Diamond Package Monitoring Services include:

  • Everything included in Silver, Gold and Platinum Packages
  • Unlimited onsite support
  • A dedicated onsite technician at a discounted rate immediate and in-depth assistance with any technology issues

Our team of technicians monitor your network around the clock to ensure you’re always protected against emerging threats. We’ll help you decide on the best level of services and support for your unique needs.

With a little bit of magic, the possibilities for your business are absolutely endless.

Connect With Dallas’ Top Managed IT Services Company

Get in touch with {company} at {email} or (469) 635-5500 to discuss our managed services and package offerings for your business.

Categories
Services

Office 365 Backup Services Dallas

We Provide Office 365 Backup Services through Backupify/Datto

Mistakes happen. Sometimes files get accidentally erased or overwritten. If you don’t back up your files before these mistakes occur, such accidents could cost you hours and hours of progress on assignments, and those are hours you’ve already invested in (and now get nothing in return for) through the wages and benefits you dedicate to your employees.

We use the most secure and reliable Office 365 backup tool available, Backupify from Datto, to make sure you never lose your business-critical documents, emails, slideshows, spreadsheets, and whatever else you have up on the cloud through Office 365.

And Backupify does more than just back up your files; it makes it easier to find what you’re looking for, too. The intuitive Backupify dashboard allows you to manage your backups, view restores, and sort through emails and calendar invites without any hassle. Also, robust search parameters allow you to quickly locate files and folders even when you can’t remember the name.

The less time employees spend trying to find files, the more time they’ll have to work through tasks, collaborate on projects, and ultimately produce more revenue.

Keeping You Compliant

Every business across every industry benefits from using Backupify, but for some businesses the consequences of losing data go beyond lost productivity.

An effective data backup solution is necessary for many businesses to comply with industry security regulations (healthcare organizations have HIPAA, financial organizations face audits from the FDIC and SEC, anyone who accepts credits cards must comply with PCI DSS, etc.).

Backupify is HIPAA compliant, and the built-in encryption and other security measures go beyond industry standards and are strong enough that Backupify is also certified by the Cloud Security Alliance and TRUSTe.

Categories
Blog

Only 3% of Data Loss Occurs Due to Natural Disaster… 97% Happens Because of Employees!

You’ve heard data loss horror stories before… but do you know how many ways data loss can occur?

So many businesses still believe they’re not targets for cybercrime. Why spend money on solutions for something that’s not likely to happen?

86% of companies experience data loss!

data loss

Think you’re not at risk? Think again! Here’s just a few ways you can lose data:

  • Dropbox:

Dropbox, an incredibly popular file sharing service, has very limited security features, and because you’re unable to monitor what files are being accessed and synced, you’re completely unaware when files fall into the wrong hands.

  • Mobile devices:

Smartphones and laptops are easily lost or stolen, which leaves any data stored on these devices at risk. An average 1,000 laptops are reported lost in airports every day! If you’re letting your employees access confidential data on mobile devices, make sure the appropriate safeguards are in place.

  • USB drive:

Files copied onto USB drives can be another easy way to transport files outside your office. One of the best ways we’ve seen a hacker get into a network was to put remote access software on a USB drive that had the company logo on it. Then leave a bunch of those USB drives on a table in the reception area. Many employees grabbed them and plugged them into their computers and BAM! They were infected from inside the network and containing that took months.

  • Hackers:

You might think your network is safe, but unless you have comprehensive security solutions in place, as well as proper employee policies and procedures, your network is likely at risk – and guess what? It’s not difficult to hack. Just check out this list of hacking tools that’s readily available!

Categories
Blog

Microsoft Releases Emergency Patch for a Dangerous Vulnerability in Windows

Security researchers from Google’s Project Zero and FireEye have discovered a critical flaw in various versions of Windows, and Microsoft has released an emergency out-of-band patch to deal with the situation.

microsoft warning

In a statement of advisory on Monday (July 20), Microsoft informed customers about the issue, warning that the vulnerability could “allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded OpenType fonts.”

They continued, “An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.”

Basically, if the vulnerability were exploited, you’d be inadvertently handing operational control of your computer over to a cybercriminal. The potential issues stemming from that are limitless, especially for businesses storing sensitive data on their machines.

Users working with Windows Vista, Windows 7, 8, 8.1 or Windows RT are all affected – that includes users running Windows Server 2008 or later. It should be noted that Microsoft has deemed the software update “critical” for those users. As of now, Microsoft says they believe the flaw is public, but they have no evidence to suggest it’s being actively exploited.

The patch is available now through any typical update methods, including Windows Update. For your protection, it’s crucial to make the update as soon as possible to prevent any issues with your system.

Categories
Blog

5 Steps to Better Secure Your Network

We all know that there are viruses out there, but just how expansive is the threat landscape, exactly?

Cyber SecurityWell, according to Verizon’s 2015 Data Breach Investigations Report, 317 million new pieces of malware were created in 2014, and that total is expected to be even higher for 2015.

That’s a lot of threats… but why should you care?

The effect that a malware infection could have on your bottom line should grab your attention, as the financial consequences of an online security breach are absolutely devastating. Losing other people’s sensitive information that’s stored on your network could cost you millions through class-action lawsuits and regulatory fines (healthcare organizations have HIPAA, financial organizations face SEC and FDIC audits, anyone who accepts credit cards must comply with PCI DSS, etc.).

There’s also your reputation to consider: a breach will ruin many of your current relationships and drive away potential clients. It’s nothing personal; they just don’t want to risk compromising their data by trusting it to a network that’s known to be vulnerable.

Following these 5 steps will make your network better protected from all the threats that are out there:

  1. Keep Up with the Latest Updates and Patches

With hundreds of millions of new pieces of malware introduced every year, it’s getting harder and harder for those fighting the cybercriminals to keep up.

The major software companies do try though, and they’re always releasing updates and patches for their products that correct vulnerabilities and protect users from the latest known threats.

The problem is that oftentimes these updates aren’t automatic, so it’s up to you to seek them out and download them yourself.  Doing so will go a long way towards protecting your sensitive data.

  1. Long and Strong Passwords

There’s a reason why some sites won’t even let you create a password unless you throw in some numbers and special characters. It’s for your own good, as there are programs out there that run through dictionaries at incredible speeds and can find any simple password by trial-and-error, so you need more than just letters.

Length is another factor: generally, you want to shoot for at least 8 characters. And do something more creative than just adding “1” to the end of a normal word, because many password-cracking programs are on to that, too.

In addition to good length and using a mix of letters, numbers, and special characters, you should also make sure that your password isn’t inspired by any information that could be found publicly on your Facebook or other social media accounts. Favorite movies, music, quotes… your password shouldn’t be anything that you’ve ever mentioned online. Don’t use anything that can be found outside your head.

  1. Only Open Attachments and Follow Links from Emails you’re Entirely Sure Are Legitimate

One of the most popular ways for malware to spread is through deceptive emails. We’ve all heard about Nigerian princes and know to avoid such obvious schemes, but many phishers are more sophisticated with their craft and can be reasonably convincing, tricking their victims into following a link or downloading an attachment that actually infects their computer with a virus.

For example, recently there’s been an email floating around that offers a free upgrade to Windows 10. Although Microsoft does offer free upgrades to Windows 10 (on the condition that you’re already running Windows 7 or Windows 8), they’re not sending anyone emails about it.

No, when people follow that link for the “free upgrade”, they end up infecting their computer instead of getting that promised upgrade, in this case with ransomware. That’s a particularly frustrating problem, as ransomware will encrypt your most important files (documents, photos, videos, databases, the works) and offer to decrypt them only if you send over some money, usually totaling somewhere between a few hundred to a couple thousand dollars. If you don’t pay up, your files are gone forever.

You can avoid these threats by simply not opening any attachment or following any link from a source you’re not 100% sure about.

  1. Stay Safe on Public Wi-Fi

There are many benefits to cloud computing, with one of the most valuable benefits being that the cloud mobilizes your workforce. Employees can access their tech tools and business data anywhere they can find an internet connection instead of being limited to the office, and more availability means they can get more work done, finish projects faster, and produce more revenue.

But if you’re not careful, the convenience of the cloud can open you up to some serious security risks. Especially if you’re using unsecured public Wi-Fi at a coffee shop, hotel lobby, or wherever else you find it, as anyone else could be using that connection, too. Maybe even a cybercriminal who knows how to turn a shared connection into a golden opportunity by using it to intercept your data, and we already warned you about the consequences of data loss (class-action lawsuits, regulatory fines, etc.).

Using strong encryption protocols and virtual private networks (VPNs), among other mobile security technologies and techniques, will allow you to take advantage of the benefits of the cloud without putting your sensitive data at risk.

  1. See a USB Stick in the Parking Lot? Don’t Pick It Up

Not all attacks are web-based.

One of the more clever breach methods we’ve seen pop up recently is for a cybercriminal to strategically place a USB stick, loaded with malware of course, between your parking lot and your entrance.

More often than not an employee will notice the thumb drive, pick it up, and then plug it into a work computer just to see what’s on it. And once that drive is in, your network is infected. This trick is even more effective if the perpetrator goes through the effort of printing your company logo on the thumb drive.

They say curiosity killed the cat. Well, turns out it can also lead to a security breach. Train your employees to think critically about what they introduce to work computers, whether it is USB sticks or the phishing links and attachments we mentioned earlier, in order to avoid such social engineering attacks.

Categories
Blog

Mapping A Network Drive In Microsoft Office 365

Here’s How to Make the Most of Office 365 by Mapping a Network Drive to a Shared Folder

network drive Office 365

By configuring a network drive to a shared document folder in Office 365, you can set up better access to a drive and its content for you and any other authorized users. This allows for increased ease of use and access to files for those working remotely. By following these simple instructions, you can map a network drive to a shared document through your Office 365 SharePoint site:

  1. Open Internet Explorer (IE is necessary for this process).
  2. Go to your SharePoint Online/O365/OneDrive site.
  3. Navigate to Tools > Internet Options.
  4. Navigate to the Security Tab and click Trusted sites, then click Sites.
  5. Click Add, then Click Close.
  6. Click OK at the Internet Options Page.
  7. At the site to which you would like to map the drive, click Library and then click Open in Explorer.
  8. When Windows Explorer opens, copy the link from the address bar
  9. For Windows Vista/7/8, paste the link from step #8 in the Map Network Drive wizard, then click Finish.

For more tips and tricks on how to get the most out of your favorite productivity programs, including Office 365, feel free to contact {company} at (469) 635-5500 or send us an email: {email}.

Categories
Services

IT Staff Augmentation

Already have an in-house IT department? Our team provides a bit of extra magic to maximize your capabilities and improve your operations.

In-house IT departments can certainly be beneficial for some businesses – but often, their shortcomings are quite apparent. Whether they don’t have an expansive knowledge of the latest technology or their support skills simply aren’t cutting it, {company} offers co-managed services, working along with your already-existing technology team to improve your operations.

With {company} on your side, you have peace of mind knowing that your IT infrastructure is receiving the utmost care. Your business will have access to more resources, reliable support and the most effective technology services for your industry.

Get in touch with our team of IT experts by calling us at (469) 635-5500 or sending us an email to {email} to discuss how co-managed services will work for your business.

  • When you’re not getting everything you need from your already-existing IT department, {company} is eager to provide the IT staff augmentation services and support you need to really thrive.
  • In addition to offering several different levels of services, we work with you to plan strategically for your future. Our goal is to help you leverage the full power of our IT to push your business to the next level.
  • With some magic on your side, issues start disappearing, and your productivity soars as we pro-actively prevent issues rather than reacting once it’s too late.
  • With more knowledge, expertise, and support available, you have peace of mind knowing that all of your technology needs are being taken care of.

Get in touch with {company} to discuss the benefits of co-managed services for your business.

Our team of technicians is eager to help align our services with your unique needs, maximizing your investment and giving your workforce the push it needs. Contact us at {email} or (469) 635-5500.

Skip to content