Get more done on Google Drive with these tips

By EDITOR 

Google Drive provides flexibility and accessibility for organizations across the country. But whether you’re new to the platform or a long-time user, you may not be using the service to its maximum abilities. If you’re unsure whether or not this applies to you, read on to discover some Google Drive tips you may not be aware of.

Use keyboard shortcuts

Keyboard shortcuts are all the rage these days, and Google Drive is not immune to this phenomenon. Here are a few that are quite helpful:

  • n: rename a selected item
  • d: show or hide the details pane
  • /: search Drive
  • z: move selected item to a folder
  • Shift + s: add a new spreadsheet
  • Shift + p: add a new presentation
  • Shift + t: add a new document

For a complete list of all Google Drive shortcuts, check out the official Google page.

Utilize revisions

Perhaps you want to see the revisions a coworker made to one of your documents. Or perhaps you hate your latest draft and want to recover an older version of it. With Google Drive, it’s all possible. Simply open the desired document, click File>See revision history, and all your revisions will appear in a sidebar to the right of the document. Then click on the revision you wish to see. If you’d like to revert to an older version, instead of your current draft, click on Restore this revision in the right sidebar.

Benefit from Suggesting mode

If you’re collaborating with another person on a document, Suggesting mode allows you to make suggestions to it without actually changing the text. Your suggestions will be seen by the initial writer, and he or she can then either approve or disapprove of them. To switch to Suggesting mode, click on the pencil shaped icon in the upper right corner of a document. When the drop down menu appears, click on Suggesting (Edits become suggestions).

Share large files

There has likely been an occasion where you wanted to send a very large file to another colleague, friend or family member, and were unable to do so through a free service. Google Drive offers a workaround for this dilemma. To take advantage of it, create a shared folder and upload your file to that folder. Once complete, you can share the file with whomever you wish by right-clicking on it, selecting Share, and then entering the person’s email address of who you wish to share it with. They’ll receive an email with the link to the file, and can access it from there.

Try Google Drive add-ons

Add-ons have become quite popular with Google Drive. To discover the wonderful world of Google Drive add-ons for yourself, click Add-ons in between Table and Help in the upper menu (above the toolbar). There are plenty of helpful add-ons to choose from, including tools such as writing aids, mind mapping, charts, music notation and more. Once you install an add-on, it will appear in your Add-ons drop down menu.

If you follow these five Google Drive tips, you are one step closer to getting the most out the service. If you’d like to learn how else you can leverage Google’s products to better your business, don’t hesitate to get in touch with our Lanlogic experts.

Posted in Uncategorized | Leave a comment

Cloud: 4 common myths debunked

By EDITOR 

Overhyped reports of cloud hacks and server failures can lead some small business owners to be wary of a service that has so much to offer. So what are these common misconceptions about cloud computing? Here are a few myths people believe about the cloud.

#1. Cloud infrastructures are unsecure

Information security is a necessity for every business. And the most prevalent misconception about the cloud is the idea that cloud services lack appropriate security measures to keep data safe from intruders. Most users also think that the data stored in the cloud can be easily accessed by anyone, from anywhere, and at any time.

But the truth is it’s actually more secure for small businesses to use cloud services. Small companies usually can’t afford to hire an IT department let alone train them to deal with online security threats. Cloud providers, on the other hand, offer services such as multi-layered security systems and antivirus protection that not only specialize in keeping infrastructures safe from hackers but are available at a price that is much lower than you would pay for in-house IT staff.

Additionally, large cloud-based services such as G Suite and Office 365 are supported by an infrastructure that constantly installs updates and patches, which helps manage security breaches. This frees you from the burden of installing the updates yourself and managing the overall security of your system.

Users should understand that no company is completely safe from security threats regardless of their IT infrastructure. But data is likely to be more secure in the hands of cloud providers as they are the most prepared and qualified to protect your digital property.

#2. The cloud lacks proper encryption

Most people misunderstand how encryption is implemented to keep your data safe. For example, encryption is generally used for data in transition, where data is protected from anyone seeing it as it travels from one internet address to another. But encryption can also be applied to data at rest, where data is encrypted on a storage drive.

With this in mind, you should understand what types of encryption your business and its data require. When it comes to choosing the right cloud service, it is best to inform yourself about the security measures that a cloud infrastructure implements and look at how it can protect your company’s digital property.

#3. With the cloud you are no longer responsible for data security

While cloud security is important, protecting data ultimately rests on the users who have access to it. Misplacing unlocked mobile devices can leave your data vulnerable and compromise your entire cloud infrastructure. This is why we recommend strong verification mechanisms in place for devices that are used to access the cloud.

#4. The cloud is never faulty

Like many IT services, cloud-based services are not immune to technical difficulties. For example, some cloud businesses have suffered outages and server failures which corrupted files and may have lost data in the process.

Hacking is another reason why some cloud services fail. Using a less than optimal cloud service that is vulnerable to attacks can lead to stolen or deleted data, which would be near impossible to recover if you did not have any offline backups.

Before signing up for any type of cloud service, clarify with its provider what is guaranteed. Most cloud providers make promises about a service’s uptime or its safety from provider-related breaches.

Security is truly one of the biggest barriers to the adoption of cloud computing in a small business. But as cloud services expand and encryption technologies advance, cloud adoption is increasingly becoming the most cost-effective solution to meet the small business owner’s IT demands. Contact Lanlogic today to learn how your business can take advantage of all the cloud has to offer.

 

Posted in Uncategorized | Leave a comment

New Spectre-style attack discovered

By EDITOR 

Security experts are constantly discovering new potential threats, and quite recently, they’ve found a new type of Spectre-style attack more dangerous than the original. Here’s a quick rundown of the new Spectre variant.

Spectre 101
For those who don’t know, Spectre is a vulnerability in modern computer chips like Intel and AMD that allows hackers to steal confidential information stored in an application’s memory, including passwords, instant messages, and emails. Malicious code running on a computer or web browser could be used to exploit this vulnerability, but ever since Spectre was discovered, Microsoft, AMD, Intel, and other tech companies released a series of updates to fix it.

What is NetSpectre?
To perform Spectre attacks, malware would have to run on a targeted machine to extract sensitive data. But in late July, Austrian security researchers found a way to launch Spectre-style attacks remotely without locally installed malware. The new attack is called NetSpectre and it can be conducted over a local area network or via the cloud.

So far, it’s impractical for average hackers to use this method to steal data. In tests, researchers were able to steal data at a rate of between 15 to 60 bits per hour, which means it would take days to gather corporate secrets and passwords. As such, NetSpectre will probably be used by hackers who want to target specific individuals but don’t want to resort to obvious methods like phishing scams or spyware.

Experts also warn that while NetSpectre may be impractical now, hackers may develop faster and more powerful variants in the future.

How should you protect your business?
NetSpectre attacks exploit the same vulnerabilities as the original Spectre so it’s important to install the latest firmware and security updates. You should also secure your networks with advanced firewalls and intrusion prevention systems to detect potential NetSpectre attacks.

Last but not least, working with a reputable managed services provider that offers proactive network monitoring and security consulting services can go a long way in protecting your business from a slew of cyberthreats.

If you’re looking for a leading managed security services provider, why not talk to Lanlogic? We provide cutting-edge security software and comprehensive, 24/7 support. Call us today for more information.

 

Posted in Uncategorized | Leave a comment

Lanlogic Partners with 8×8 to Help Companies with Cloud Communications

Lanlogic delivers fast, state-of-the-art, scalable solutions when you need them

LIVERMORE, CA, JULY 16, 2018 Lanlogic, a leader in delivering IT solutions individually-tailored by experienced consultants, today announced that they have entered into a strategic partnership with 8×8, Inc., a leading provider of secure and reliable global cloud communications, contact center and customer engagement solutions.

For over 23 years, Lanlogic has been providing IT solutions and services for 5,000 plus customers across the San Francisco Bay Area. The breadth and depth of expertise of the Lanlogic team enables Lanlogic to deliver IT solutions and services designed to meet your needs now and in the future. Lanlogic’s US-based support team is top tier, providing white glove service to keep your business running, ensuring the ultimate customer experience.

“Our understanding of our customers’ business at any stage of development, whether just starting out as a small business or those at the large enterprise level, we pride ourselves in delivering IT solutions, individually-tailored to meet the desired business operational results.” said Dan Ferguson, President and CEO of Lanlogic. “For our customers looking to migrate over to the cloud or building their cloud infrastructure from scratch, the 8×8 unified cloud communication solution portfolio is a natural fit and we are excited to have 8×8 as one of our key cloud communication partners.”

8×8 X Series offers an integrated cloud platform for communications and contact center solutions to over a million business users worldwide, and was named a Leader in the 2017 Gartner Magic Quadrant for Unified Communications as a Service, Worldwide[1] for the sixth year in a row.

[1] Gartner “Magic Quadrant for Unified Communications as a Service, Worldwide” by Daniel O’Connell, Bern Elliot, Rafael A Benitez, September 6, 2017.

About 8×8, Inc.

8×8, Inc. (NYSE:EGHT) is a leading provider of cloud phone, meeting, collaboration and contact center solutions with over a million business users worldwide. 8×8 helps enterprises engage at the speed of employee and customer expectations by putting the collective intelligence of the organization in the hands of every employee. For additional information, visit www.8×8.com, or follow 8×8 on LinkedIn, Twitter, and Facebook.

About Lanlogic

Lanlogic is an IT Services, Support and Consulting firm located in Livermore, California. Our network management and support services provide peace of mind to organizations that are looking for a comprehensive approach to IT service management. In business since 1995, we offer corporate-level support with an unmatched passion for service and a personal touch.
LinkedIn, Twitter, and Facebook.

Media Contact
Salena Ferguson
Lanlogic, Inc.
925.273.2328
www.lanlogic.com

Posted in Uncategorized | Leave a comment

What we know about Google Pixel 3 so far

By EDITOR 

In terms of hardware and features, the Google Pixel 2 and Pixel 2XL gave other smartphones like the iPhone a run for their money. This year it looks like Google will roll out Google Pixel 3 to compete with the best smartphones on the market. Here’s what we know about the Google Pixel 3 so far, plus a few predictions.

Design
What we’re hearing through the grapevine is that the Pixel 3 will look a lot like its predecessor, featuring its classic backside shade, a USB-C port, and speakers in the bottom bezel. However, the larger Pixel 3 XL model could have a notch for the front-facing camera just like the iPhone X. The Pixel 3 will be around 5.3 inches, while the 3 XL version will be around 6.2 inches.

Google also hinted that there might be a third model released this year that could be a more compact, mid-range model for consumers on a budget.

Wireless charging
Leaked images show that the Pixel 3 has a glass back like the iPhone X and Samsung Galaxy S9 series. Although nothing is set in stone, this could be an indication that the Pixel 3 will have wireless charging features.

Improved camera
While several other companies’ smartphones come with two rear cameras, it looks like Google is sticking with one. However, the single-lens rear camera will probably be powered by Google’s AI camera technology to take higher-quality photos with more background blur.

Faster hardware
Experts anticipate that the Pixel 3 will have significant improvements in its internal components. One leak has revealed that the Pixel 3 model will have at least 4GB of RAM and a modern, 2.8 GHz smartphone processor. That’s as fast as some mid-range laptops today, making the Pixel 3 an attractive option for executives who need a bit more power in their mobile devices.

Release date
Google has typically unveiled Pixel phones in early October, so look for the Pixel 3 and Pixel 3 XL sometime this autumn. It’s also expected to be the first device to come with the highly anticipated Android P operating system, so think of it as an early Christmas present.

But remember, Google is still working on the Pixel 3 and Pixel 3 XL, so there’s plenty of time for more changes and more updates.

To follow all the updates about the Pixel 3 and be the first to hear about the release date, stay tuned to our blog. We stay on top of the latest tech trends to help you sharpen your competitive edge.

 

Posted in Uncategorized | Leave a comment

Windows 10: Tips to make your life easy

By EDITOR 

Perhaps you’re one of the thousands of Windows 8 users who rejoiced in the return of the Start Menu, the improved multitasking feature, and a more prominent Cortana display in Windows 10. But there are more key functions in Windows 10 you probably didn’t know about.

Performance/Power slider

There are two kinds of computer users: those who value battery longevity and those who prefer optimized system performance. The Performance/Power slider in Windows 10 lets you easily toggle between the ‘Best battery life’ (when you’re trying to save battery) and the ‘Best performance’ (when you need your system to perform optimally), or set a balanced battery and system performance setting.

Just click the battery icon in the taskbar and adjust the slider based on your preference.

Night Light

Those who use computers late at night can turn on Night Light to reduce the amount of blue light emitted from the screen. This feature substitutes the blue light with warmer colors, which reduces eye strain and helps you sleep easily.

Night Light is disabled by default, so you need to enable it by following these steps:

  • Click the Start Menu
  • Click the Settings app (or press WIN + I to quickly open Settings)
  • Click the System icon>Display
  • Set Night light to ‘On’ or ‘Off’

Taskbar pin

It takes only a few seconds to open a browser and type a website’s address or click Bookmarks and choose from a list of websites you frequently visit. But Windows 10 offers an even quicker way to access your go-to sites by allowing you to pin websites on the Windows 10 taskbar.

Simply click “Pin this page to the taskbar” on the Microsoft Edge menu, and the site’s icon will appear on the taskbar for easy perusal.

Drag to pin windows

Need to organize your screen but can’t help having many open windows? Reduce screen clutter by dragging any window to a corner so it can take a quarter of the screen. For multiple screens, drag a window to any border and wait for the prompt that tells you to put the window in the selected corner.

Focus Assist

Notifications can be distracting, but Windows 10’s Focus Assist feature can manage the notifications you receive from contacts and applications. This function also lets you customize the list of notifications you wish to prioritize.

To enable Focus Assist, go to:

  • Settings
  • System
  • Focus Assist
  • Adjust the notifications settings based on your preference

If you wish to disable it and receive all notifications, click ‘Off.’

The features we’ve included here are just some of the many Windows 10 functions that save time and add value to business-users’ lives. For more software and productivity recommendations, give our Lanlogic IT consultants a call today.

 

Posted in Uncategorized | Leave a comment

Office 365 will block Flash by 2019

By EDITOR 

Microsoft recently announced plans to eventually stop the activation of Silverlight, Shockwave, and Flash content in Office 365. This is not just the developers disabling bugs with an option to click a link or button to look at content. Within a few months’ time, Flash will be gone from Office 365 for good.

What media will be affected once this is implemented?

Microsoft Silverlight and Adobe Flash or Shockwave content that uses Microsoft’s OLE (Object Linking and Embedding) platform and the “Insert Object” feature will be blocked. However, media that uses the “Insert Online Video” control via an Internet Explorer browser frame will not be affected by this change.

The following timeline shows the various changes that will take full effect by January 2019:

  • Controls in the Office 365 Monthly Channel will be blocked beginning June 2018.
  • Controls in the Office 365 Semi-Annual Targeted (SAT) Channel will be blocked beginning September 2018.
  • Controls in the Office 365 Semi-Annual Channel will be blocked beginning January 2019.

Why did the developers choose to take out the embedded content?

Microsoft pointed out various reasons for making their decision. It cited that malware authors have been exploiting systems through Word, Excel, and PowerPoint files with embedded content, and that most Office 365 users did not use or rarely use the controls anyway.

Aside from this, the developers at Microsoft decided to take action after Adobeannounced that Flash would reach its end-of-life cycle by 2020. Silverlight was discontinued in 2016, where enterprise customers would have support for the medium until 2021.

For businesses that still need to look at or embed Silverlight- or Flash-based content in an Office 365 document, Microsoft has provided a support page to guide users on re-activating the controls.

As more websites are transitioning away from Flash in favor of HTML5, Microsoft’s once-popular platform has experienced a steady decline over the years. According to Google, Chrome users who loaded a single web page per day that has Flash media had gone down from an estimated 80% during 2014 to below 8% in early 2018.

For more information about utilizing Office 365 features and other IT related concerns, feel free to get in touch with Lanlogic today!

Posted in Uncategorized | Leave a comment

Chrome to mark HTTP as ‘not secure’

By EDITOR 

Google Chrome currently marks HTTPS-encrypted sites with a green lock icon and “Secure” sign. And starting in July, Chrome will mark all HTTP sites as “not secure.” Google hopes this move will nudge users away from the unencrypted web. Read on to learn more about the forthcoming changes.

For several years, Google has moved toward a more secure web by strongly advocating that sites adopt the Secure HyperText Transfer Protocol (HTTPS) encryption. And last year, Google began marking some HyperText Transfer Protocol (HTTP) pages as “not secure” to help users comprehend risks of unencrypted websites. Beginning in July 2018 with the release of a Chrome update, Google’s browser will mark allHTTP sites as “not secure.”

Chrome’s move was mostly brought on by increased HTTPS adoption. Eighty-one of the top 100 sites on the web default to HTTPS, and the majority of Chrome traffic is already encrypted.

Here’s how the transition to security has progressed, so far:

  • Over 68% of Chrome traffic on both Android and Windows is now protected
  • Over 78% of Chrome traffic on both Chrome OS and Mac is now protected
  • 81 of the top 100 sites on the web use HTTPS by default

HTTPS: The benefits and difference

What’s the difference between HTTP and HTTPS? With HTTP, information you type into a website is transmitted to the site’s owner with almost zero protection along the journey. Essentially, HTTP can establish basic web connections, but not much else.

When security is a must, HTTPS sends and receives encrypted internet data. This means that it uses a mathematical algorithm to make data unreadable to unauthorized parties.

#1 HTTPS protects a site’s integrity

HTTPS encryption protects the channel between your browser and the website you’re visiting, ensuring no one can tamper with the traffic or spy on what you’re doing.

Without encryption, someone with access to your router or internet service provider (ISP) could intercept (or hack) information sent to websites or inject malware into otherwise legitimate pages.

#2 HTTPS protects the privacy of your users

HTTPS prevents intruders from eavesdropping on communications between websites and their visitors. One common misconception about HTTPS is that only websites that handle sensitive communications need it. In reality, every unprotected HTTP request can reveal information about the behaviors and identities of users.

#3 HTTPS is the future of the web

HTTPS has become much easier to implement thanks to services that automate the conversion process, such as Let’s Encrypt and Google’s Lighthouse program. These tools make it easier for website owners to adopt HTTPS.

Chrome’s new notifications will help users understand that HTTP sites are less secure, and move the web toward a secure HTTPS web by default. HTTPS is easier to adopt than ever before, and it unlocks both performance improvements and powerful new features that aren’t possible with HTTP.

How can small-business owners implement and take advantage of this new interface? Call Lanlogic for a quick chat with one of our experts to get started.

Posted in Uncategorized | Leave a comment

Router malware worse than experts realize

By EDITOR 

In May, security experts discovered one of the most widespread malware infections in history. Now, they’re warning businesses and consumers that it’s even worse than their first assessment. The VPNFilter malware poses a threat to small businesses and requires immediate attention from anyone who hasn’t taken action against it.

VPNFilter recap

A team of security researchers from Cisco released a report that a strain of malware had been discovered on hundreds of thousands of routers and network devices. Originally, researchers believed it affected only Linksys, MikroTik, Netgear, and TP-Link devices.

Like many malware strains, VPNFilter infects devices that use default login credentials. But it’s worse than the average cyberattack because it can destroy router hardware and cannot be removed by resetting infected devices.

As if destroying 500,000 routers wasn’t bad enough, VPNFilter lets its creators spy on networks and intercept passwords, usernames, and financial information.

What’s new

Just two weeks after VPNFilter was discovered, security experts announced that it targets 200,000 additional routers manufactured by ASUS, D-Link, Huawei, Ubiquiti, UPVEL, and ZTE. Worse yet, VPNFilter can alter data passing through infected routers. That means when you enter a username and password into a banking website, hackers could steal that information and show you an incorrect account balance to hide fraudulent deductions.

How to stop VPNFilter

Rebooting a router won’t remove the malware, you need to factory-reset the device. Usually, all this requires is holding down the Reset button on the back of the device for 10-30 seconds. If your router has no reset button or you’re unsure whether pressing it did the trick, contact a local IT provider immediately.

Cybersecurity threats have become so prevalent that even large enterprises struggle to keep their digital assets safe. Outsourcing IT support to a managed services provider like Lanlogic will give you enough capacity to deal with issues like VPNFilter as soon as they arise. Call us today to learn more.

Posted in Uncategorized | Leave a comment

Highlights from the Apple WWDC 2018

By EDITOR 

Apple’s yearly Worldwide Developers Conference (WWDC) has come to a close. Engineers from Apple met and exchanged ideas with developers in the event, while consumers looked forward to updates on existing products and news about future innovations. Here are the highlights that stole the show.

A more personal, faster iOS 12

Apple has focused on improving the operating system’s performance so that iPads and iPhones become more responsive and work faster. The good news is that older devices that can still run iOS 11 will be compatible with iOS 12.

Developers tweaked the software to make apps launch quicker, especially the keyboard and camera. The latest version of iOS is designed to optimize its system when it is under load, so that Apple products run faster when the user demands higher performance.

Fresh features aimed at impressing consumers include the Memoji, an Animoji that users can customize to their preferences. Group Facetime supports video conferences of up to 32 individuals, and these fun tweaks can be used in both Facetime via the Effects camera and in Messages.

A smarter Siri

Apple’s signature digital assistant can now answer queries about motorsports, food, and famous people. There is a new Shortcuts feature integrated in the Workflow app, which allows users to automate various tasks in first- and third-party apps, to be triggered through Siri voice commands.

Both Shortcuts and suggestions by Siri appear on the Lock screen, and third-party Shortcuts integration will let Siri do more when the user pulls the Lock screen down to search. A dedicated Shortcuts app will be available later this year to give users a quick way to build Shortcuts from dozens of preset options.

An alternative to Google Photos

The iOS Photos app may be useful to Apple product users, but it may seem too basic for some. Once iOS 12 is released however, a clever Photos app will showcase most of the features that Google Photos has.

The Search feature has been improved – users can look for images based on general terms such as “park” or even business names, and multiple terms can be searched (such as images from Africa during a particular month). All pictures will be arranged by place and time in case the user wants to perform searches with those variables.

A new tab labeled “For you” will contain the auto-generated albums which Photos makes, and is sorted with any shared albums. Speaking of sharing, the enhanced Photos app will proactively advise users on what images to share according to who is in the pictures.

A refined WatchOS

Apple’s upcoming WatchOS 5 will introduce users to new ways of connecting to the world while staying active. It may not be a radical revision for the wearable device, but the apps and features it provides will be more helpful and fun for the user.

The highlight of WatchOS 5 is the Walkie-Talkie app, an innovative method of communicating by combining the natural flow of messaging with real-time voice discussions. Just like the conventional product that the app is based on, users simply press and hold down a virtual Talk button to converse with friends and family.

Hiking and Yoga have been added to the list of workout types, while users can keep track of their Outdoor Runs more effectively with support for cadence, the custom pace alert, and the rolling mile pace. Automatic workout detection will make sure that the Apple Watch will always stop or start recording user activity while exercising. This feature works with Open Water Swim, Pool Swim, Rower, Elliptical, Indoor Walk, Outdoor Walk, Indoor Run, and Outdoor Run.

To get users motivated to work up a sweat, WatchOS 5 has a Competition feature that allows friends and family to challenge each other in a contest to see who can get the most activity points within a week. The watches will post regular progress reports to let contestants know how they are doing, and the winner will get a special award.

These updates can change at any time, and will be released by Fall this year. If you need more information on making use of Apple devices and software, or if you have other computer-related concerns, feel free to contact Lanlogic today!

Posted in Uncategorized | Leave a comment