Hillary Clinton’s infamous email server: 6 things you need to know

Hillary Clinton’s use of a private email server when she served as US secretary of state has been a major issue for the 2016 presidential candidate. Here are the six most critical facts about it.

hillary_clinton3_3_3

The FBI recently wrapped up its investigation into Hillary Clinton’s use of a personal email server while she was serving as secretary of state. FBI director James Comey called the actions “extremely careless,” but recommended that no charges be brought against Clinton.

She is now the presumptive Democratic nominee for the upcoming presidential election in November, and her actions relative to the email server have become a hot-button issue among her opponents. The situation, however, is nuanced; and there are a lot of details to understand about the scenario. Here are the most important facts.

1. What happened?

While serving as secretary of state under President Barack Obama, Hillary Clinton used multiple private email servers to communicate regarding government business, according to the State Department. Additionally, it was revealed that Clinton never had a government (.gov) email address while she was serving in her post—we’ll talk about which email address she used in a moment—and her aides did not take any actions to preserve the emails sent through her personal account. This prompted an investigation by the FBI to determine if Clinton intentionally put classified information at risk.

2. Why does it matter?

Clinton handed over 30,000 emails to the State Department, of which 110 contained classified information at the time they either were sent or received, according to the FBI’s findings. During the investigation, though, Clinton asserted that none of the emails she sent or received were classified at the time. The biggest implication has been the potential threat to national security. While the contents of the emails have not fully been released, if they had contained sensitive information it could have possibly fallen into the wrong hands. As noted by the New York Times, Comey said it was “possible” that enemy foreign governments had accessed Clinton’s personal email account.

The second biggest implication is that of transparency. The Federal Records Act requires that all communication in certain branches of government be recorded on government servers, and it forbids the use of a personal email account for government business, unless those emails are then copied and archived. However, there are a lot of technicalities involved, and there is evidence that other government officials had violated the act. As Alex Howardwrote for the Sunlight Foundation, there is also evidence that Clinton tried to control the discoverability of the emails under the Freedom of Information Act (FOIA), which could set a precedent for limiting public access to government records. It is also believed that Clinton deleted 31,000 emails deemed personal in nature before turning the emails over to the State Department.

3. When did it start?

When she was appointed secretary of state in 2009, Clinton began using the email address hdr22@clintonmail.com, tied to a personal server. Clinton’s personal email server was first discovered in 2012, by a House committee investigating the attack on the American Consulate in Benghazi. In 2013, hacker Guccifer claimed to have accessed Clinton’s personal email account and released emails that were allegedly related to the Benghazi attack.

The next year, in the summer of 2015, the State Department began asking Clinton for her emails correspondence, and she responded by delivering boxes containing more than 30,000 printed emails. In early 2015, the New York Times reported that Clinton had been using her personal email exclusively, and never had a government email address. A federal watchdog group issued an 83-page report condemning the “systemic weaknesses” of Clinton’s email practices in May. On Tuesday, the FBI concluded its investigation and recommended against any charges.

4. What tech was used

When Clinton was running for president in 2008, she had a private server installed at her home in Chappaqua, New York. The domains clintonemail.com, wjcoffice.com, and presidentclinton.com, which were registered to a man named Eric Hoteham, all pointed to that server. In 2013, a Denver-based IT company called Platte River Networks was hired to manage the server, but wasn’t cleared to work with classified information. The company executivesreceived death threats for taking on the contract. It was later discovered that multiple private servers were used for Clinton’s email.

Clinton used a BlackBerry phone to communicate during her tenure as secretary of state, including sending and receiving emails through her private server in New York. The State Department expressed concern about the security of the device. Clinton had requested the NSA provide a strengthened BlackBerry, similar to the one used by President Obama. But, her request was denied. Instead, the NSA requested that Clinton use a secure Windows Phone known as the Sectera Edge, but she opted to continue using her personal BlackBerry.

5. Will she be prosecuted?

Right now, it’s too early to tell whether or not Clinton will be charged for her use of private email servers. While Comey’s recommendation that no charges be brought will likely weigh in the decision, it is ultimately up to the US Department of Justice to make the call. However, a recent Politico analysis of multiple, similar cases spanning the past 20 years, seem to point to an indictment being “highly unlikely.” According to a former senior FBI official quoted in the analysis, the Justice Department tends to avoid prosecution in cases that are not “clear-cut.”

6. What can businesses and IT leaders learn?

The first lesson that IT can learn from this situation is that transparency is critical, at all levels in your business. This isn’t to say that the CEO should be broadcasting his or her emails to all employees every week, but steps should be taken to ensure that information can be accessed if need be. As part of adigital leak protection program, security expert John Pironti said that organizations need to know if users are using a personal email account to conduct business.

“This behavior is often a violation of acceptable use policies and can expose an organization’s sensitive information to unsecured systems and e-mail accounts,” Pironti said. “Without this visibility an organization may not be aware that their intellectual property, customer data, or sensitive data assets are not being protected appropriately and they also may be in violation of contractual agreements with their clients regarding the security of their data as well as regulatory requirements.”

The second takeaway for IT is that policies should be enforced from the top down. Sure, a CXO may get their support tickets expedited, but that doesn’t mean that exceptions should be made that could compromise the security or integrity of the organization for the sake of comfort or convenience. Leaders should model the policies that are in place to showcase the importance of adhering to them, especially regarding security and privacy policies.

Finally, the importance of records management should not be overlooked. In Clinton’s case, since multiple servers were used, the FBI had to piece together “millions of email fragments” before they could look into them. Proper labeling and management of all records will make for a more cohesive environment and assist in accountability.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Massive Delta outage highlights need for quality data center power, backup plans

Business leaders must prepare for disasters made by man or Mother Nature with extensive, practiced recovery plans to avoid system shutdowns.

A Delta ground stop was lifted Monday morning following a 2:30 a.m. ET power outage in Atlanta that delayed and cancelled flights worldwide. Businesses should view this as a cautionary tale, highlighting the importance of quality data center power and disaster control systems.

Delta cancelled approximately 300 flights due to the outage. As of 10:30 a.m. ET, it operated 800 of its nearly 6,000 scheduled flights. However, Delta customers heading to the airport on Monday should still expect delays and cancellations, according to a press release. As inquiries are high and wait times are long, there may also be some lag time in the display of accurate flight status from the airline, it warned.

Last month, Southwest Airlines cancelled 1,150 flights after a system outage. Though the system came back online within the day, hundreds of flights were backlogged.

Based on recent research, it’s fair to say that what happened to Delta and Southwest could happen to a number of businesses. Some 57% of small and mid-sized businesses have no recovery plan in the event of a network outage, data loss, or other IT disaster, according to a Symantec study.

“Planning and executing disaster recovery exercises is something that should be done on a regular basis to find out these issues before they may be impactful,” said Mark Jaggers, a Gartner data center recovery and continuity analyst. “The issue, which was also the case with Southwest Airlines, is not planning for partial failure scenarios that are harder to get to the root cause of and work around.”

To avoid shutdowns like Delta’s, company data centers should have redundant power and networking, preferably from a grid and provider, respectively, that are completely independent from the primary ones, Jaggers said.

“Data centers are a huge piece of a disaster recovery plan,” said mission-critical facility management professional Christopher Wade. “To have a reliable infrastructure, you have to minimize single points of failure.” Business leaders should also ask about the experience levels of data center staff, as many of these companies are currently understaffed, Wade added.

Usually, large companies have a primary data center in one location and an alternate in another that is far enough away so the two do not experience the same disaster at the same time, said Roberta Witty, risk and security management analyst at Gartner.

“In today’s world, the business expectation is that you’re up and running quickly after a disaster,” Witty said. “The ‘always on’ driver is changing the way organizations deliver IT in general, and so they are building out their data centers to be more resilient.”

Faster recovery times

About 60% of organizations are moving to a recovery time objective of four hours or less, Witty said. Doing so successfully involves extensive planning. First, determine what business operations are mission critical. Then, consider factors that impact recovery time requirements, such as revenue loss, safety, and brand reputation, and build your recovery infrastructure accordingly. As more companies outsource data operations, a key consideration should be the third party’s ability to meet your recovery requirements, she added.

Crisis management practices, such as the procedures Delta used to notify management and deal with customer fallout, usually get exercised every quarter. “The more you practice your crisis management procedure and communicating with your workforce, customers, suppliers, and partners, the better off you are,” Witty said. “A plan that hasn’t been exercised is not a workable plan.”

Disaster recovery can’t be something a company reviews once a year, Witty said, but rather an ongoing part of every new project.

“Your recovery environment has to stay in sync with production, which is where a lot of organizations fail,” Witty said. “Build disaster recovery into a project lifestyle—whether it’s a new product or a change in management, you have to go back and revisit your recovery plans.”

The 3 big takeaways for readers

  1. Delta experienced a massive networked service stoppage Monday morning after a power outage in Atlanta, which offers a lesson in disaster preparedness and recovery for other businesses and data centers.
  2. About 57% of small and mid-sized businesses have no recovery plan in the event of a network outage, data loss, or other IT disaster, but these plans are key for mitigating natural and manmade disasters and keeping business operations running smoothly.
  3. Companies should build crisis management and proper communication into all new projects and management changes to ensure consistency.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

How to avoid ransomware attacks: 10 tips

As ransomware increasingly targets healthcare organizations, schools and government agencies, security experts offer advice to help IT leaders prepare and protect.

Nigerian princes are no longer the only menaces lurking in an employee’s inbox. For healthcare organizations, schools, government agencies and many businesses, ransomware attacks—an especially sinister type of malware delivered through spear phishing emails that locks up valuable data assets and demands a ransom to release them—are a rapidly-growing security threat.

“We’re currently seeing a massive explosion in innovation in the types of ransomware and the ways it’s getting into organizations,” says Rick McElroy, security strategist for cyber security company Carbon Black Enterprise Response. “It’s a big business, and the return on investment to attackers is there—it’s going to get worse.”

While ransomware has existed for years, 2015 saw a spike in activity. The FBI received 2,453 complaints, with losses of over $1.6 million, up from 1,402 complaints the year before, according to annual reports from the bureau’s Internet Crime Complaint Center. And the numbers are only growing in 2016, the FBIreports.

“The Dark Web and Bitcoin allow almost anyone to sell stolen data without identification—cyber criminals understand they can make easy cash without the risk of being jailed,” says Ilia Kolochenko, CEO of web security company High-Tech Bridge. And hackers—most of which are located in developing countries—are growing more sophisticated, even developing downloadable ransomware toolkits for less-experienced hackers to deploy, according to the 2016 Institute for Critical Infrastructure Technology Ransomware Report.

“The days of grammatically incorrect, mass spam phishing attacks are pretty much over,” says James Scott, senior fellow and co-founder of the Institute for Critical Infrastructure Technology, and co-author of the report. Hackers can now check a victim’s social media accounts, and create a fake email address pretending to be a friend or contact in order to get them to click on an infected link or attachment. “It’s much more targeted, and will exploit a particular vulnerability in a device, application, server or software,” Scott adds.

A typical ransom demand is $300, according to a report from security firm Symantec.

Health threats

The healthcare sector is highly targeted by hacker attacks, due to antiquated or misconfigured computer security systems and the amount of sensitive data they hold, says David DeSanto, director of projects and threat researcher at Spirent Communications.

The large number of employees at most hospitals also makes cyber security safety training difficult, DeSanto says. Experts commonly see attacks occur through spear phishing—targeted emails with attachments with names such as “updated patient list,” “billing codes” or other typical hospital communications that employees may click on if not warned.

In 2015, over 230 healthcare breaches impacted the records of 500-plus individuals, according to data from the U.S. Department of Health and Human Services Office for Civil Rights.

A February ransomware attack launched against Hollywood Presbyterian Medical Center in southern California locked access to certain computer systems and left staff unable to communicate electronically for 10 days. The hospital paid a $17,000 ransom in bitcoin to the cybercriminals, says CEO Alan Stefanek.

Following security best practices can help healthcare organizations protect themselves. “The best way is to make regular backups of all systems and critical data so that you can restore back to a known good state prior to the ransomware being on the system,” DeSanto says.

Without security best practices, healthcare organizations may be left with few options to retrieve information. In these cases, healthcare organizations may choose to pay the ransomware fee. Some make enough money that paying the ransom for a few infected computers is low compared to the cost of maintaining the infrastructure to protect these attacks, DeSanto adds.

Schools and businesses

Hackers are gaining traction and using new methods across other industry verticals as well. In 2014, a large European financial services company (whose name was not disclosed) discovered with the help of High-Tech Bridge that a hacker placed a back door between a web application and a data set.

For six months, the hacker encrypted all information before it was stored in a database, undetected by company staffers. Then, they removed the encryption key, crashing the application, and demanded $50,000 to restore access to the database.

However, the company did not end up paying, thanks to mistakes made by the hackers, Kolochenko says.

Other victims are not as lucky, says Engin Kirda, professor of computer science at Northeastern University. “If the ransomware hacker does the encryption well, once the data is encrypted it’s nearly impossible to decrypt,” he adds.

Such was the case for South Carolina’s Horry County School District this February, when hackers froze networks for 42,000 students and thousands of staff. District technology director Charles Hucks tried to shut down the system, but within minutes, the attackers immobilized 60 percent of Horry County’s computers. The district paid $8,500 in Bitcoin to unlock their systems.

Tips for IT leaders

To prevent a ransomware attack, experts say IT and information security leaders should do the following:

  1. Keep clear inventories of all of your digital assets and their locations, so cyber criminals do not attack a system you are unaware of.
  2. Keep all software up to date, including operating systems and applications.
  3. Back up all information every day, including information on employee devices, so you can restore encrypted data if attacked.
  4. Back up all information to a secure, offsite location.
  5. Segment your network: Don’t place all data on one file share accessed by everyone in the company.
  6. Train staff on cyber security practices, emphasizing not opening attachments or links from unknown sources.
  7. Develop a communication strategy to inform employees if a virus reaches the company network.
  8. Before an attack happens, work with your board to determine if your company will plan to pay a ransom or launch an investigation.
  9. Perform a threat analysis in communication with vendors to go over the cyber security throughout the lifecycle of a particular device or application.
  10. Instruct information security teams to perform penetration testing to find any vulnerabilities.

Mitigating an attack

If your company is hacked with ransomware, you can explore the free ransomware response kit for a suite of tools that can help. Experts also recommend the following to moderate an attack:

  • Research if similar malware has been investigated by other IT teams, and if it is possible to decrypt it on your own. About 30 percent of encrypted data can be decrypted without paying a ransom, Kolochenko of High-Tech Bridge says.
  • Remove the infected machines from the network, so the ransomware does not use the machine to spread throughout your network.
  • Decide whether or not to make an official investigation, or pay the ransom and take it as a lesson learned.

“There is always going to be a new, more hyper-evolved variant of ransomware delivered along a new vector that exploits a newly-found vulnerability within a common-use application,” Scott of ICIT says. “But there are so many technologies out there that offer security—you just have to use them.”

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Ransomware 2.0 is around the corner and it’s a massive threat to the enterprise

The profits from ransomware are making it one of the fastest growing types of malware and new versions could negatively impact entire industries, according to a Cisco report.

ransomware2.0

Despite the efforts made to improve cybersecurity at many organizations, there are too many systems with aging infrastructure and vulnerabilities that leave companies at risk, with ransomware one of the most sinister threats, according to a new Cisco report.

Ransomware is a top concern because it’s become an area of intense focus for cybercriminals due to its effectiveness at generating revenue. Once a cybercriminal hacks into a company’s files and encrypts them, victims have little option but to pay the asking price for the code to decrypt their files. Ransomware is becoming more ominous as new versions are continually being developed.

“The landscape is simple. Attackers can move at will. They’re shifting their tactics all the time. Defenders have a number of processes they have to go through,” said Jason Brvenik, principal engineer with Cisco’s security business group, discussing the Cisco 2016 Midyear Cybersecurity Report.

Cisco used data from its customers to create the report, since there are more than 16 billion web requests that go through the Cisco system daily, with nearly 20 billion threats blocked daily, and with more than 1.5 million unique malware samples daily, which works out to 17 new pieces of malware every second, Brvenik said.

Brvenik has the following recommendations for companies wanting to improve security:

  • Improve network hygiene – Improve aging infrastructure to limit vulnerabilities.
  • Integrate defenses – Use machine learning techniques combined with novel data views.
  • Measure time to detection – Find out how long an attacker can live in your network before they are found.
  • Protect your users everywhere they are – Protect users whether they’re on a laptop, a smartphone, or another device. Don’t just protect networks but protect users. They are the target.

The next step in the evolution of malware will be ransomware 2.0, which Brvenik said “will start replicating on its own and demand higher ransoms. You’ll come in Monday morning and 30% of your machines and 50% of your servers will be encrypted. That’s really a nightmare scenario.”

Ransomware campaigns started out primarily through email and malicious advertising, but now some attackers are using network and server-side vulnerabilities as well. Self-propagating ransomware will be the next step to create ransomware 2.0, and companies need to take steps to prepare and protect their company’s network, Brvenik said.

New modular strains of ransomware will be able to quickly switch tactics to maximize efficiency. For example, future ransomware attacks will evade detection by being able to limit CPU usage and refrain from command-and-control actions. These new ransomware strains will spread faster and self-replicate within organizations before coordinating ransom activities, according to the report.

JexBoxx, an open source tool for testing and exploiting JBoss application services, had been used to allow the attackers to gain access to networks in the targeted companies. Once the attackers had access to the network, they encrypted multiple Windows systems using SamSam.

Overall, in all aspects of cybersecurity, there are too many companies with vulnerabilities that haven’t been addressed. Out of 103,121 Cisco devices connected to the internet that were studied for the report, each device on average was running 28 known vulnerabilities. The devices were actively running known vulnerabilities for an average of 5.64 years, and more than 9 percent had known vulnerabilities older than 10 years, according to the report.

“In April, Cisco estimated that 10% of all JBoss servers worldwide were compromised. And they were compromised using readily available tools and old vulnerabilities. Adobe Flash is still a favorite. It gives a viable attack surface for them. And we see Microsoft Silverlight vulnerabilities. This means to us that people are opportunizing those that work for them,” Brvenik said.

Brevik noted that the nature of the attack is also likely to change, focusing on service-oriented technologies and systems, with teams ready to attack and try to compromise systems. Advertising is a viable model for attack.

“We saw a 300% increase in the use of HTTPS with malware over the past four months. Ad injection is the biggest contributor. Adversaries are using HTTPS traffic to expand time to operate. That’s the attacker opportunity as it exists today,” he said.

It’s no longer reasonable to expect to block 100% of threats, but being able to detect the threat fast, and limit the time the attacker is in your system is key to minimizing the damage. In December 2014, the median time before an attack was detected was 50 hours. In April 2016, it dipped to a median of 13 hours for the previous six months, Brvenik said.

“It is a living number as defenses improve and attackers change. This is good. It says that for the customers that have these systems, when they are compromised, they’re now down to 13 hours as a median time to detect it. I wouldn’t leave the door to my house open for 13 hours; and that’s what you’re doing when you leave your door open to attackers for 13 hours.”

Industries that previously thought they were immune because their business was of little interest to attackers are wrong.

“No industry is safe,” Brvenik said. “Assuming that what you do is of no interest to attackers is not a good way to think of it.”

Three takeaways for the readers

  1. Of more than 100,000 Cisco connected devices studied for the report, an average of 28 vulnerabilities were running on each one.
  2. Self-propagating ransomware is around the corner and companies need to protect themselves from the threat.
  3. Ransomware is giving massive profits to attackers, encouraging them to create even more sinister ways to attack. The average time of attack lasts 13 hours, down from 50 hours in 2014.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Mozilla Joins Google and Facebook in Phasing Out Adobe Flash

Web browsers don’t like the security and stability problems that come with Flash.

Another popular web browser has had it with Adobe Flash.

Mozilla said this week that it plans to gradually wean its Firefox web browser from Adobe’s ADBE -1.07% multimedia player. In August, Firefox will no longer support “certain Flash content” that it deems “not essential to the user experience,” although Mozilla did not specify what type of Flash content it was referring to.

Mozilla will still support “legacy Flash content” for an unspecified time, but the company urged websites that use Flash or Microsoft MSFT -0.25% Silverlight, another multimedia web player similar to Flash, for their videos or online games to adopt newer “HTML technologies as soon as possible.”

In May, Google GOOG -0.59% detailed its plans to end support of Flash for its Chrome web browser, and it hopes to completely rid itself of Flash advertisements by the beginning of 2017.

Google, like Adobe, is urging website operators to switch to the HTML5 coding language to display multimedia like video on their sites.

Flash is notoriously buggy and prone to many security vulnerabilities. Firefox believes that by ending support for Flash, its users will see “enhanced security, improved battery life, faster page load, and better browser responsiveness.”

Still, Mozilla is not totally cutting ties with Adobe. Mozilla said it would “continue to work closely with Adobe to deliver the best possible Flash experience for our users” as it phases the multimedia player out, and said that an engineering partnership between the two companies has improved some performance and stability in Firefox when it displays Flash content.

Last summer, Facebook’s FB -0.27% chief security officer Alex Stamos urged Adobe via Twitter to disable Flash because of its security vulnerabilities.

In April, Adobe issued an emergency update to Flash after security researchers found a flaw that allowed hackers to distribute so-called ransomware to owners of Microsoft Windows personal computers. Ransomware is basically a form of malware that lets hackers block people from accessing their computer or related computer networks so that a hacker can demand payment in return for access.

In 2010, legendary Apple AAPL -1.32% CEO Steve Jobs wrote a 1,700 word essay on Flash and why Apple’s problems with the multimedia player, which he claimed hurt the “reliability and security of our iPhones, iPods and iPads.”

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Windows 10 Anniversary Update: Watch out for these nasty surprises

A major update to Windows 10 is being rolled out. These are the gotchas that are catching out early users.

windows-10-anniversary-update

Windows 10 users are getting the first major update to the operating system in just under a year, with the release of the Anniversary Update.

But alongside the new features and fixes are some more unwelcome changes, ranging from less control for users to frozen machines.

Here are the main gotchas to look out for, as well as some fixes.

Less time to change your mind

With the arrival of the Anniversary Update, those upgrading to Windows 10 from Windows 7 or 8 have less time to switch back to the earlier OS.

Prior to the Anniversary Update, Windows 10 users had 30 days during which they could choose to reset their machine and restore their original OS. However, following the update Microsoft has reduced this period to 10 days.

Microsoft claims it reduced the period after noticing that most users who chose to switch back did so within a few days of upgrading, adding the change will free storage space on users’ machines.

The reduction also coincides with the end of period during which Windows 7 and 8 users could upgrade to Windows 10 for free – meaning those now paying $120 or more to upgrade will likely be less keen to switch back.

Frozen computers and broken systems

When you update software there is always risk that something will break, and that’s exactly what seems to be happening for some who have received the Windows 10 Anniversary Update.

The most common complaint seems to be that the update causes the computer to lock-up soon after loading the desktop.

In response to the problem, Microsoft has been advising users to run Windows 10’s Maintenance Troubleshooter and if that doesn’t work, to perform a clean boot of the system.

Meanwhile, users are reporting the most reliable fix has been to roll back to an earlier build of Windows 10.

Another repeated complaint is that Microsoft’s virtual assistant Cortana is missing from the Task Bar, replaced instead with a search box. In affected systems, Cortana also seems to be disabled inside the Edge web browser.

Some users of Avast and McAfee anti-virus – both widely used products – are also reporting problems after the upgrade, as are gamers trying to use Xbox One controllers.

Cortana is more difficult to get rid of

If you’re not a fan of Microsoft’s virtual assistant Cortana then prepare to dislike the Anniversary Update.

Following the update, it is no longer possible to turn off Cortana from the virtual assistant’s in-built Settings menu.

Instead, if users want to ditch Cortana they will need access to specific admin tools or to edit the registry.

Users can also minimise the information that Cortana collects, although thisdoes require altering various settings.

Harder for admins to block ads

Another less welcome change is that Windows 10 Pro users lose the ability to use admin tools to block ads.

Prior to the update, admins could edit Group Policy settings to stop ads for apps showing in the Start menu and on the lock screen.

However, Windows 10 Pro users will lose that ability, and, following the update, disabling these ads via Group Policy settings will only be available to those running Windows 10 Enterprise, Windows 10 Pro Education, or Windows 10 Education editions.

Individual users should be able to turn off many of these ads by disabling Windows 10 tips, tricks, and suggestions and Windows Store suggestions in the Settings app, however.

Following the Windows 10 Anniversary Update, new installs of Windows 10 will show double the number of ads for Windows Store apps in the Start Menu. Some users have also reported a possible increase in the number of ads shown on the lock screen following the update.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Research: Apple rated highest for security on mobile devices

Mobile devices are almost universal in the enterprise in 2016. Tech Pro Research conducted a survey to see what devices employees are using for work, and how safe these devices are.

In new research conducted by Tech Pro Research, 98% of respondents said they use mobile devices for work. Smartphones and laptops were the most common, with 94% of respondents who use mobile devices using them. 74% of mobile device users said they work with tablets. Wearables haven’t found a widespread usage base in the workplace, with only 14% reporting using them. When users rated the security of devices based on vendors, Apple got the best ratings in all categories.smartphones

For smartphones Apple’s high ratings could be partially attributed to familiarity since 67% of respondents said employees at their company use iPhones. Only Samsung was close to Apple in terms of prevalence, and the company was way behind Apple in security ratings.

tablets

Apple also had the largest share of tablet use, and the highest security rankings, among respondents. 53% said they and their colleagues use iPads and 46% of users ranked security as very good or excellent.

laptops

Dell was the most popular brand among respondents, in terms of use for work, but it got third place in security ratings.

wearables

Security on wearables appears to still be developing, based on the mediocre security ratings among all brands, and the fact that security feature usage isn’t the norm for wearables yet.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

10 reasons why you shouldn’t upgrade to Windows 10

The end of Microsoft’s free Windows 10 upgrade offer is right around the corner. But while Windows 10 is great, there are valid reasons to reject it.

windows-7-to-windows-10

An offer you can refuse

The clock is ticking, folks. If you want to upgrade to Windows 10 for free, you only have until July 29, 2016 to do so. And most people should! Windows 10 is the best Windows yet, chock full of handy new features, sleek under-the-hood improvements, andheadache-killing extras.

But it’s not for everybody. There are some very real, very valid reasons not to upgrade to Windows 10.

If you’re on the fence about whether to accept or reject Microsoft’s freebie, read on for some concrete justifications for staying put.

windows-media-center

No Windows Media Center or DVD support

Before we dig into the meatier stuff, let’s take a look at what you’ll potentially give up if you upgrade to Windows 10, starting with some robust media playback options.

Windows 10 kills Windows Media Center off completely, after Windows 8 pushed it into a dark corner. There’s a reason for that: Windows Media Center is fairly niche, and not a lot of people use it. But if you do, you won’t want to upgrade to Windows 10 unless you’re prepared to dive into alternatives like Kodi, Plex, and DVR workarounds.

Oh, and if you’re on Windows 7, be aware that Windows 10 doesn’t offer native DVD playback, though there are no-cost alternatives you can use.

windows-gadgets

No desktop gadgets or widgets

Likewise, if you’re a big fan of Windows 7’s gadgets and widgets for the desktop, they aren’t available in Windows 10. Which is good, because they’re horribly insecure. Whether you choose to stay on Windows 7 or upgrade to Windows 10, you’d probably be better off using Rainmeter’s seriously slick interactive desktop software.

onedrive

No OneDrive placeholders

Windows 8.1 offered a handy feature for hardcore OneDrive users: placeholders. Placeholders showed everything stored in your OneDrive account in the Windows 8.1 file system, but only downloaded files to your PC when you opened them. It was a wonderful way to stay on top of your cloud-stored files without downloading all of them to every Windows device you logged into with your Microsoft account, especially if you’ve stashed dozens of gigabytes’ worth of stuff into OneDrive.

Unfortunately, users found it confusing, and Microsoft ripped placeholders out of Windows 10. There are hints that a similar feature may make an appearance someday, but it hasn’t yet, so if placeholders are a must-have feature for you, you’ll want to avoid upgrading to Windows 10. The new operating system’s less granular selective sync options just aren’t the same.

windows-10-updates

No control over Windows Updates

Aaaaaand here’s the biggie. Windows 10 utterly eradicates the ability to manually control your system updates. Windows 10 Pro will let you defer updates for a few months, but that’s the extent of it. If Microsoft pushes out an update, your system willinstall it eventually (though identifying your Wi-Fi connection as “metered” lets youchoose when updates download, at least).

This isn’t a big deal for people who stuck with Windows 7 and 8’s default Windows Update options, which downloaded patches automatically. But if you like to control your own update destiny, this could be a showstopper.

privacy

Privacy concerns

That segues nicely into another controversial Windows 10 “feature.” Microsoft’s new operating system tracks you far more closely than previous versions of Windows, especially if you use the express settings during the initial setup. The search bar utilizes Cortana, Windows 10’s digital assistant, and sends all your queries to Microsoft servers. Your Windows Store app usage is tracked for ad targeting. Windows 10 tracks your typing, location, Edge browser behavior, program installations and more.

It’s a lot. To be fair, a lot of the concern roaring around this is overblown; most of Windows 10’s potential privacy concerns can be disabled. But there’s no way to turn off some of the telemetry data Windows 10 collects about your system and beams back to the mothership. Microsoft executives don’t consider this a privacy issue. If you do, Windows 10 isn’t for you.

get-office-windows-10-pop-up

Ads and more ads

Windows 10 doesn’t only track your Windows Store app usage for improved ad targeting; it frequently pushes ads of its own at you. By default, you’ll see pop-up notification ads imploring you to get Skype or Office (even if you have Office), ads for suggested Windows Store apps slipped into your Start menu, and even occasional full-screen lockscreen ads for high-profile Windows Store releases.

I loathe the idea that my paid-for operating system—and yes, Windows 10 isn’t truly free—is pushing ads in my face. Fortunately, all of the offenders can be disabled. But doing so requires diving into arcane system settings located in different far-flung corners of the operating system.

Microsoft’s aggressive upgrade tactics

Microsoft’s been acting pretty shady in its aggressive quest to push Windows 7 and 8 users to Windows 10, employing unstoppable pop-ups, malware-like tactics, forced upgrades, intrusive full-screen takeovers, and nasty tricks to coax—and sometimes outright deceive—people into adopting the new OS. It eventually became so heavy-handed that some users have disabled Windows Updates entirely rather than suffer the barrage.

But you know that. If you’re still considering upgrading to Windows 10, you’ve lived through it.

None of that detracts from Windows 10’s underlying awesomeness. But it may have detracted from your desire to upgrade to Windows 10—and rightfully so. If you’re unhappy with Microsoft’s ethics and tactics in handling Windows 10 upgrades, you’re well within your rights to stay put where you’re at.

Software compatibility

In the wake of those forced upgrades, dozens and dozens of readers reached out to me with tales of woe, many revolving around software that simply doesn’t work with Windows 10. As my colleague Glenn Fleishman recently pointed out at Macworld, old software isn’t inherently bad software—but some of it won’t work in Windows 10.

If you rely on particular pieces of software, do a quick Google search to make sure they’ll work in Windows 10 before you upgrade. Office 2003—the last pre-Ribbon UI Office—isn’t compatible, for instance, nor is software that requires the use of Windows 7’s “XP Mode” compatibility, which isn’t available in Windows 10. Microsoft’s upgrade advisor is supposed to let you know if any software won’t work with Windows 10, but users report that it isn’t very reliable. Doing some homework now could save you some big headaches in the future.

printers

Hardware compatibility

Similarly, you’ll want to make sure Windows 10 works with your PC, too. No matter whether you’re running Windows 7 or Windows 8.1, I’d recommend running Microsoft’s hardware compatibility tool to scan your system. To do so, open the Get Windows 10 app—the taskbar icon that’s been tossing out all the upgrade pop-ups—and click on the compatibility report option.

But wait! That’s not all. The tool only checks your core PC reliably. Some people who upgrade to Windows 10 discover that their hardware peripherals won’t work, particularly older printers and scanners. If you have any aging peripherals connected to your PC, be it a printer or a beloved keyboard, I’d again suggest conducting some quick Google searches to ensure your gear won’t become paperweights if you decide to upgrade.

 windows-10-samsung-laptop

Ain’t broke, don’t fix it

This final reason applies more to people who resist change or aren’t very technically savvy. Yes, Windows 10 is stellar and absolved Windows 8’s worst sins. Getting used to the new operating system shouldn’t be too difficult for many PC users—but the transition isn’t entirely seamless. From Cortana to the introduction of the Edge browser to the radically new-look Start menu, and Windows 10’s evolution into being a more cloud-centric operating system, there are some big changes you’ll need to wrap your head around.

Do Windows 10’s new features and under-the-hood improvements make upgrading worthwhile? I think so. But if you aren’t comfortable dealing with changes on your computer, you might want to stay put. I know several less technically inclined people who paid technicians to revert their PCs to Windows 7 after they couldn’t wrap their heads around Windows 10.

Conversely, if you’ve perfected your workflow on your current operating system and don’t see much benefit in marquee Windows 10 features such as Cortana, the Windows Store, DirectX 12, and virtual desktops, it may not be worth the hassle to switch over to Windows 10.

Have questions?

Get answers from Microsoft Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

 

Windows 10: Reasons not to upgrade; 5 good resume apps

From privacy to compatibility and control, these are the reasons why you might want to give the upgrade to Windows 10 a miss.

getwindows10

At the end of this month Windows 10 will, at least for now, cease to be available as a free upgrade to Windows 7 and 8 users.

Microsoft is engaged in a final push to get users to upgrade, stressing the new OS introduces fresh features to Windows and overhauls its design. However, is Windows 10 right for you? Here are some of the reasons you might not want to upgrade.

1. You’re worried about privacy

By default Windows 10 collects more data than many users are comfortable with. This includes information about how Windows and Windows apps are used, what you type, your contacts, your location, calendar appointments and more. If the virtual assistant Cortana is enabled, this data extends to web browsing history, voice commands and even more information about your activity.

Users of Home and Pro versions of Windows 10 can only reduce this data collection to the “Basic” level. On this setting, Windows 10 collects information about security settings, quality-related info (such as crashes and hangs), and application compatibility. Microsoft describes this information as being essential for maintaining and improving the quality of Windows 10 and says that only “anonymous identifiers” are transmitted.

However, questions remain about the information that Windows 10 sends back to Microsoft, even when you turn the data gathering settings down a minimum. Tech website Arstechnica found that even with the virtual assistant Cortana disabled, Windows 10 sends a request to www.bing.com that appears to contain a random machine ID that persists across reboots. Similarly, even when Microsoft OneDrive cloud storage was disabled and Windows 10 was not tied to a Microsoft account, the OS still seemed to be sending information to a server connected to OneDrive. While Microsoft stressed there is no query or search data being sent, Arstechnica queried the inclusion of a machine ID.

ZDNet’s Ed Bott has said the very basic telemetry data collected by Microsoft is anonymized and doesn’t reveal anything more than very high-level information along the lines of an unidentified Windows 10 user ran a particular app for half an hour.

However, for some users, even the gathering of anonymized usage data is more than they’re willing to put up with.

2. It might cause pain for older machines

Windows 10 can run on a computer with relatively modest specs, working on many older PCs that shipped with Windows 7. But just because you can run Windows 10 on paper, you may not be able to in practice.
While the Get Windows 10 app that schedules the upgrade from Windows 7 or 8.x should check your system compatibility, some users that pass this test complain the upgrade still fails or devices don’t work properly.

As Microsoft states: “The upgradability of a device includes factors beyond the system specification.”

Microsoft gives you the option to rollback your machine to its previous OS, but there are reports from multiple people who claim the upgrade left their machine virtually unusable. In these cases either the rollback feature didn’t work or it did work but the earlier OS is no longer stable, with previously working programs crashing.

f the upgrade process completes successfully, missing driver and firmware support has also caused difficulties for some Windows 10 users. Those affected cite problems such as monitors not working at their native resolution. Some of the Intel integrated graphics chips used in older laptops are also incompatible with Windows 10, though Windows 10 should warn of this fact.

These problems don’t seem to affect the majority of upgraders, but it’s worth being aware they exist, particularly if upgrading an older machine.

On a less serious level, upgrading to Windows 10 may not break your machine but it could mess with your settings. Microsoft has come under fire for Windows 10 changing users’ default settings in a number of areas, such as swapping the default browser to its own Microsoft Edge.

3. Less control over updates

Windows 10’s update process happens both more frequently and less obviously, with Windows Home and Pro users automatically receiving updates when they’re available.

Windows Home users have less control over how long they can postpone updates for, and less easily-available information about what changes these updates will make.

The lack of control that Home users have over when updates are applied led to a group of users petitioning Microsoft to let them delay and refuse these downloads. Their reasoning was that since forced updates can crash machines, for instance via bad firmware or driver updates, all users need control over how updates are applied.

Another core concern for some users when it comes to Windows 10’s frequent updates is the amount of data downloaded, with updates often weighing in at hundreds of megabytes. However, Windows 10 does allow users to block all but essential updates by toggling on ‘metered connection’ in the WiFi settings.

4. You don’t like the new look

As much as Windows 10 has won people over by bringing back elements of the classic Windows desktop and Start menu — anyone fresh from Windows 7 will need to adjust to Windows 10’s new look.

Unlike Windows 7, Windows 10’s Start Menu takes up far more room, thanks to a menu full of tiles that is bolted onto the side. While most users should be able to quickly adjust to these cosmetic and layout changes, other alterations may grate more. Perhaps the most controversial tweak to the Start Menu is theinclusion of adverts for apps in the Windows Store. These promoted apps are tiles that link to the Windows Store or to apps that have been automatically installed on your PC by Microsoft. With the latest Anniversary Update, the number of these promoted apps will double, from five to 10.

And while it can be argued that Windows 10 is arguably easier to navigate, with its search function built directly into the Taskbar, the new OS introduces some significant changes that may confuse new users.

Whereas Windows 7 allowed users to adjust their system settings using the Control Panel, Windows 10 has both the Control Panel and Settings pages — with some configuration options exclusive to one or the other. This mix and match approach has been described as disorientating by some users.

5. Missing features

Windows 10 may add many new features — the virtual assistant Cortana, the new Edge browser — but it also lacks some key elements of earlier Windows operating systems.

Perhaps the biggest omission are the placeholders for Microsoft’s OneDrive cloud storage service. In Windows 8.1, placeholders, also called smart files, let users see all of the files stored in the OneDrive service, whether those files were stored on the device or not. This feature was removed from Windows 10.Microsoft appears to be working on reintroducing placeholders, although there is still uncertainty about when they will be brought back.

Windows Media Center, the software for TV, music and movie playback is also gone from Windows, so if you are particularly attached, and not willing to mess around with an unofficial version, you may want to pass on the upgrade.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Uninstall now! Apple abandons QuickTime for Windows despite lingering critical flaws

Apple is giving up on QuickTime for Windows.

Yet another program is joining Java 6 and Windows XP as big-name software you do not want running on your PC. Security firmTrend Micro and the U.S. Department of Homeland Security are advising all Windows users to uninstall Apple’s QuickTime as soon as possible. (The advisory does not affect Mac users.)

The reason for getting rid of QuickTime for Windows is twofold. First, Apple told Trend Micro it is deprecating the software and will no longer deliver security updates for it. Second, there are two known critical vulnerabilities that could allow an attacker to take control of a system running QuickTime.

That’s a hellacious combo.

Apple was unavailable for comment at this writing, but a quick look at QuickTime’s download page shows the software is still publicly available. It hasn’t been updated since at least January, however.

Trend Micro says it does not yet know of any instances where the two potential security threats are being used in the wild but that could change. Trend Micro’s Zero Day Initiative recently published some technical details about the vulnerabilities. ZDI did this because its disclosure policy requires it to publish threat information when a “vendor indicates that the product is deprecated,” and thus won’t be patched.

If you’re a longtime user of iTunes you may be running QuickTime. To dump the program, open the Control Panel on your PC and then from the “category” view go to Programs > Uninstall a program. Once the list of installed programs populates, scroll down until you find QuickTime. Select it with your mouse, and then click Uninstall towards the top of the window. A pop-up window will then appear asking to confirm that you want to uninstall the program. Click Yes and you’ll be QuickTime-free in no time.

A survey published by Secunia Research in late 2015 found that Apple software is among the programs that are updated the least often by Windows users.

Why this matters: Whenever software is about to be abandoned it’s always a good idea to move away from it—or at least start planning to. That goes double for software with known flaws that allow the bad guys to execute code on your machine. QuickTime used to be an important piece of software for Windows users. But these days you don’t need it to watch movie trailers on Apple’s site and it’s no longer used by iTunes to play media on Windows. There’s little reason for the vast majority of Windows users to keep QuickTime on their PCs.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.