Office 365 Delivers New Tips and Training To Your Users

Office 365 Delivers New Tips and Training To Your Users

Notice: If you receive Office365 through ITonDemand, you and your staff will start receiving emails from Microsoft as part of a special Microsoft Partner program.

 

On Nov. 29th, 2018, Microsoft will start to send these emails. These emails will be tips and training information from Microsoft on their Office 365 suite. 

 

What you can expect

Microsoft will send out regular emails that provide training and tips “aimed at helping users increase their productivity”.  These emails will only be for services that the users have enabled. 

 

 

Value

We believe these tips and training provides value to your staff and we are eager to leverage our longstanding Microsoft Partnership and pass those benefits along.  

 

As always if you have questions regarding these settings or would like some help with the Office 365 service, please feel free to reach out to our helpdesk team.

Other Articles You Might Be Interested In:

Office 365 Delivers New Tips and Training To Your Users

Office 365 Delivers New Tips and Training To Your Users

Notice: If you receive Office365 through ITonDemand, you and your staff will start receiving emails from Microsoft as part of a special Microsoft Partner program.  On Nov. 29th, 2018, Microsoft will start to send these emails. These emails will be tips and training...

read more
Introducing TipsonDemand

Introducing TipsonDemand

Understanding technology doesn’t have to be difficult. At ITonDemand, we are all about making your technology work for you. To help with that, we have started TipsonDemand. What is TipsonDemand?  TipsonDemand is our series of 30-second videos that we release on social...

read more

(800) 297-8293  ·  info@ITonDemand.com

 instagram logo

5 steps to protect yourself from phishing scams on Cyber Monday

5 steps to protect yourself from phishing scams on Cyber Monday

 

Cyber Monday is filled with online deals on products and electronics.  But did you know, Cyber Monday poses the biggest security threat to your data through phishing scams?

 

Opportunistic hackers regularly use heavy online days, like Cyber Monday, to launch phishing scams. 

Here are 5 steps to protect yourself:

 

Don’t Click That Link

Refrain from clicking any links or download any attachments in the suspicious email. Instead, open up your web browser and go to the website in question by typing it into the URL bar.

 

Read The URL

Phishers are known to use company logos and write in a matter that seems legit.  The URL link often times will be very close to the actual site URL with a minor misspelling or change.  If you notice a link that is close but not quite right you could be redirected to a spoofed domain.

 

Never respond to validate your account without you initiating

If you receive an email asking you to validate a login or account, don’t. If you did not initiate a password reset or account validation then you should not receive communication.  If you are still concerned, go to the site in your browser and log in with your credentials.

 

Never open account login email on a public wifi

Information sent through public wifi is highly susceptible to rerouting.  This means a user may think they are logging into a site.  Instead, a user may be rerouted to a duplicate site where their login information is captured.

 

If you can validate verbally

Many sites are now allowing you to confirm your login or credential changes over the phone.  This is used to protect users from the previously listed dangers.  If this option is available to you, use it.

 

All in all, vigilance will save you the headaches and pain of having your accounts hacked.  Your MSP can and should protect your business.  However, there are still precautions you should take to keep your data secure.

 

Other Articles You Might Be Interested In:

Office 365 Delivers New Tips and Training To Your Users

Office 365 Delivers New Tips and Training To Your Users

Notice: If you receive Office365 through ITonDemand, you and your staff will start receiving emails from Microsoft as part of a special Microsoft Partner program.  On Nov. 29th, 2018, Microsoft will start to send these emails. These emails will be tips and training...

read more
Introducing TipsonDemand

Introducing TipsonDemand

Understanding technology doesn’t have to be difficult. At ITonDemand, we are all about making your technology work for you. To help with that, we have started TipsonDemand. What is TipsonDemand?  TipsonDemand is our series of 30-second videos that we release on social...

read more

Have a Question?

How would you generally categorize your question?

Understanding how to keep your WiFi more secure

Understanding how to keep your WiFi more secure

When you log into WiFi at a public place, such as a library, a school, a business, a restaurant, or the like, it’s likely your anti-virus software will warn you of logging into an unsecure network.

But, did you ever think that when logging onto the WiFi at your home or business you may still be facing some security issues? Are you aware of the risks involved with not securing your WiFi? It’s important to keep in mind that WiFi is a target for hackers. Securing your WiFi may be way easier than you think.

Here are a few tips on how to do that.

 

Change the name

One of the first steps is to create a strong name for the WiFi network to replace the default network name, such as xfinitywifi, AT&T or Netgear (My neighbor uses FBI as his network name). Fossbytes says most hackers have access to tools such as “rainbow table” that can break into most any network simply by knowing the default SSID name.

 

Protected Access

Another security measure to use is enabling your WiFi protected access. When setting up the router, the setting can be seen as WPA2 or WPA-PSK. Fossbytes said older routers will have something called WEP, or Wired Equivalent Privacy, but that’s not much of an effective deterrent to modern hackers.

 

Firewalls

One tool to use, if it’s built-in, is a firewall for your router, which can obscure a hacker’s view of the network, Fossbytes said. Another thing to consider is turning off the Universal Plug and Play protocol on the router. Although this is meant to make connecting devices easier, Fossbytes said the use of it makes a potential entry point for hackers.

 

VPN

Another way to protect your WiFi network is to create a Virtual Private Network, which encrypts data traveling between a computer and a server. Through a VPN, even if a computer is logged onto a public WiFi, any hacker paying attention to traffic will only see encrypted data shared, Techify said in a recent article on ways to protect a WiFi network. VPN works by “giving your location anonymity on its server and even creates its own firewall to protect your network traffic,” Fossbytes said.

 

Change your password

Lastly, one simple, but crucial point of protection, and one that we here at ITonDemand stress over and over again, change your password. Using a strong password, or perhaps an even stronger pass phrase, can cut down on a hacker’s ability to penetrate a network or computer.

If you’re still concerned about setting up a secure network, don’t hesitate to reach out to ITonDemand for help. It’s better to be safe than sorry.

 

Other Articles You Might Be Interested In:

Office 365 Delivers New Tips and Training To Your Users

Office 365 Delivers New Tips and Training To Your Users

Notice: If you receive Office365 through ITonDemand, you and your staff will start receiving emails from Microsoft as part of a special Microsoft Partner program.  On Nov. 29th, 2018, Microsoft will start to send these emails. These emails will be tips and training...

read more
Introducing TipsonDemand

Introducing TipsonDemand

Understanding technology doesn’t have to be difficult. At ITonDemand, we are all about making your technology work for you. To help with that, we have started TipsonDemand. What is TipsonDemand?  TipsonDemand is our series of 30-second videos that we release on social...

read more

Have a Question?

How would you generally categorize your question?

(800) 297-8293  ·  info@ITonDemand.com

 instagram logo

How To Find A Missing Desktop Window

How To Find A Missing Desktop Window

The Dreaded Lost or “Rogue” Window

It happened again.  I plugged my second monitor into my laptop and started up a how-to video.  After unplugging my second screen, I now can’t find the video or the window where the video is playing.  I’m stuck with listening to the audio and have no way to find, watch, or close what is called “a rogue window”.

I’m not the only one that has had this problem. The HelpDesk at ITonDemand is regularly faced with questions and problems like this.   We hope to answer some of these common issues over the next few weeks but in the meantime let’s dive into the rogue window.

What Causes A Rogue Window?

A rogue window occurs when it shifts off of the computer screen, leaving you unable to pull it back. How does this happen? And more crucial, how do you get the window back?

How to Geek has a great, easy-to-use guide that covers what to do when you have a rogue window.

Rogue windows usually occur when laptop users hook up to a second monitor or screen. This connection to the second monitor can become unreliable. Especially if you use an older Windows OS and disconnect the laptop before turning off the “extend desktop” setting.

Rogue windows also happen on the latest systems like Windows 8 and 10, designed to be multi-monitor friendly. These new OS systems have an app that, “moves a window” off screen without bringing it back.

Here’s how to fix it:

  1. Right click on the Taskbar, the icon to the right of cortana on Windows 10.
  2. Click “cascade windows” or “show windows stacked”.
  3. This gives you access to all open windows including rogue ones.

The keyboard fix:

  1. With your mouse, select the off-screen window
  2. Press shift and right click the taskbar button
  3. Click “move” command from the taskbar menu.

No go forth and tackle your rogue windows with confidence!

Other Articles You Might Be Interested In:

Office 365 Delivers New Tips and Training To Your Users

Office 365 Delivers New Tips and Training To Your Users

Notice: If you receive Office365 through ITonDemand, you and your staff will start receiving emails from Microsoft as part of a special Microsoft Partner program.  On Nov. 29th, 2018, Microsoft will start to send these emails. These emails will be tips and training...

read more
Introducing TipsonDemand

Introducing TipsonDemand

Understanding technology doesn’t have to be difficult. At ITonDemand, we are all about making your technology work for you. To help with that, we have started TipsonDemand. What is TipsonDemand?  TipsonDemand is our series of 30-second videos that we release on social...

read more

Have a Question?

How would you generally categorize your question?

(800) 297-8293  ·  info@ITonDemand.com

 instagram logo

Public Charging Stations: Are they secure?

Public Charging Stations: Are they secure?

If you have spent any time traveling through an airport, you have seen a public charging kiosk. you might think, how convenient. Especially if your alternative is moving onto the floor closer to an outlet in the terminal.

But before you plug your phone into one of these kiosks, there are some security issues to discuss.

One such security threat is, “juice-jacking”. TechAdvisory.org defines juice-jacking as the process by which, “user access is gained on your phone by leveraging the USB data/power cable to illegitimately access your phone’s data and/or inject malicious code onto the device.”

Juice-jacking can affect any phone, both Android or iPhone. They both have the same weak spot: the charging cable. Data runs through this cable same as the power supply.  Once the hacker has been able to access your data, it doesn’t matter that you have unplugged from the kiosk.

Juice-jacking is a security concern worth noting. But juice-jacking is not as large a problem as getting your phone/tablet stolen or downloading corrupt software by mistake. Still, we all should take precautions. Consider some of the safety measures:

  • Keep your device charged. Have your phone charged and ready to go before making a trip or going to an event. This prevents the need to charge in public.

  • Carry a personal charger. These nifty devices are inexpensive and take up very little space in your bag. You can charge on the go without tethering yourself down to a public kiosk.

  • Keep a spare battery for all of your devices.

  • Lock your phone. If you lock your phone (type in a passcode to open), it will not pair with the kiosk.
    Tip: Make sure you lock your phone before plugging it in. Pairing only takes seconds!

 

If you feel you have a corrupted phone after charging at a public kiosk, we would be glad to assist in solving the issue.

 

Other Articles You Might Be Interested In:

Office 365 Delivers New Tips and Training To Your Users

Office 365 Delivers New Tips and Training To Your Users

Notice: If you receive Office365 through ITonDemand, you and your staff will start receiving emails from Microsoft as part of a special Microsoft Partner program.  On Nov. 29th, 2018, Microsoft will start to send these emails. These emails will be tips and training...

read more
Introducing TipsonDemand

Introducing TipsonDemand

Understanding technology doesn’t have to be difficult. At ITonDemand, we are all about making your technology work for you. To help with that, we have started TipsonDemand. What is TipsonDemand?  TipsonDemand is our series of 30-second videos that we release on social...

read more

Have a Question?

How would you generally categorize your question?