You are on page 1of 29

FOR: http://www.mytechster.

com
*1. How to easily resize large images for email attachments
http://www.howtogeek.com/216037/how-to-resize-large-image-attachments-in-outlook
/
6 Easy Steps to Resize
*2. How to protect your data when getting rid of old hardware
http://www.howtogeek.com/213295/how-to-wipe-securely-erase-your-devices-before-d
isposing-of-or-selling-them/
-->Protecting Sensitive Data when Getting Rid of Old Hardware
*3. Skipping the start screen in office applications
http://www.howtogeek.com/215115/how-to-bypass-or-completely-disable-the-start-sc
reen-in-office-applications/
-->How to skip
*4. Costing Saving Printing Methods For Businesses
https://plus.google.com/u/0/b/115540011809868265512/115540011809868265512/about
5. Cyber security threats faced by small businesses
http://www.biztechmagazine.com/article/2015/05/cybersecurity-threat-small-busine
sses-face
================================================================================
==============================================================
Cost-saving Printing Methods for Businesses
In today s Digital World, printers are still the workhorses of offices. From offic
e memos to marketing pamphlets and invoicing documents, printers are relied upon
by businesses to circulate information. Yet improper printing methods can lead
to unwanted cost.

Intro
I.) Use Technology to Minimize Paper use
-->A study by Brother International Corporation found that 36% of businesses in
the US are implementing workflow that is paperless. Right now, offices cannot be
entirely paperless nor will it be in the foreseeable future. But businesses hav
e the option to use technology in order to reduce paper consumption, decrease pr
inting cost and still maximize efficiency.
Cloud storage services like Dropbox and Google Drive and apps for document captu
re and sharing can be used to circulate documents and lessen the use of paper.
-->Use technology

II.) Track Printing Activity


III.) Draft printing
IV.) Use Print Preview
- Use Print Preview and Shrink to Fit
- Change PC settings (change your computer s default settings so that you can put
more text on each page.)

VI.) Save & Recycle


-->Buy recycled printer cartridges
--> Refill Your Own Printer Cartridges
-->Reuse paper
VII.) Print only when needed
Think twice if you really need to print
if it is necessary
to print make sure you print on both sides (duplex).
- Use better information systems
- Conduct paper-less meetings (projectors, device, etc.)
=======================================================================
Topic: Biggest cyber security threats for small businesses

Intro:
Big cash comes from big fish. So if you're a small fish, you're safe from cyber
threats, right? No, you're not.

I.) Why SMBs are targetted


- Cybercriminals know there s nothing small about SMBs. In addition to creating 64
percent of net new jobs in the U.S.2 , these economic mainstays account for 54
percent of all U.S. sales and about half of all private-sector payrolls.
*- According to the Verizon 2013 Data Breach Investigations Report, small and mi
dsize businesses suffered data breaches more often than larger firms.
- By the end of 2014, according to NSBA's Year-End Economic Report, fully half o
f small businesses reported having been the victim of a cyber- attack (up from 4
4 percent in 2013). Of those, 61 percent say an attack had occurred within the l
ast year. This is a problem."
He went on to cite the skyrocketing cost of dealing with cyber attacks: small fi

rms today cite the average cost of a cyber attack at $20,752 per attack, up from
$8,699 two years ago.
(http://www.prnewswire.com/news-releases/nsba-president-cybersecurity-a-major-is
sue-for-small-firms-300070369.html)
Your business could be one mouse click away from closing its doors forever. That s
the conclusion of a 2012 study by the National Cyber Security Alliance, which f
ound that 60 percent of small firms go out of business within six months of a da
ta breach.

WHY?
-->
Security vendor Kaspersky has noted that, larger enterprises have become better d
efended so cybercriminals are moving down the business food chain.
(https://www.watchguard.com/docs/wg_kaspersky_smb.pdf)
II.) Top Cyber threats
1. Ransomware
-->McAfee:
"We predict ransomware variants that manage to evade security software installed
on a system will specifically target endpoints that subscribe to cloud-based st
orage solutions such as Dropbox, Google Drive, and OneDrive. Once the endpoint h
as been infected, the ransomware will attempt to exploit the logged-on user's st
ored credentials to also infect backed-up cloud storage data," McAfee report on
2015 cyber risks noted.
how to prevent:
What you can do
Be sure you have redundancy in backups of your critical data.
Make security awareness a company culture to reduce the chances of an employee a
llowing the malware to access your network (National Cybersecurity Institute)
2. IOT (Internet of Things)
How to prevent (National Cybersecurity Institute)
)
3. Cyber theft
4. Mobile Device Malware
5. Weak Passwords and Flawed Password Retrieval Processes
6. Social Media attacks

7. Inside Job (Rogue Insiders)


Even in small businesses, there are disgruntled employees as well as friends and
relatives of employees that will exploit an employee.
III.) How to prevent
Attack on IoT (Internet of Things)
While there s a reason to be happy for the increasing complexity and availability
of Internet of Things (IoT) technology that connects physical devices to the Int
ernet, small businesses should also exercise precaution on this technology. Whit
eHat Security WhiteHat Labs VP Robert Hansen said they re seeing an increasing numb
er of vulnerabilities in internet capable devices, like TVs, home security syste
ms, automation. https://www.whitehatsec.com McAfee said in its report that attack
s on devices using IoT will increase due to the proliferation of the technology
and improper security measures.

http://www.entrepreneur.com/article/245102
1. Manage email security and validate potential threats.
2. Enforce strict password policies.
3. Further train your employees on the warning signs.
4. To protect your computer network, install a small business security suite and
implement a strong encryption plan
5. Do a security audit every month
6. Make sure your business software is up-to-date
7. Consult an IT security firm
=======================================================================
Office Online Vs. Office 2013 Vs. Google Docs
http://pcunleashed.com/tips-and-tricks/microsoft-office-online-%E2%80%93-how-doe
s-it-compare-to-office-2013-and-google-docs/
Title: Office OnlineOffice 2013 -- What are the differences?
Key Differences among Office Online, Office 2013 and Google Docs
Intro:
,
Then came the mid users are presented with other options to boost productivity:
Google Docs and Office Online.

Transition

*I.) Key feature 1: Compatibility

- 2013
Most Windows 8 tablets don t actually include Microsoft Office, so you ll have to pa
y for it separately.
Using Office is simple on Windows 8 tablets. You can purchase the full desktop v
ersion of Microsoft Office and use it on your Windows 8 tablet, just as you d use
it on a Windows 8 laptop. Office only runs in desktop mode, so you ll have to use
your tablet s desktop to take advantage of it. It isn t the ideal interface for a to
uch screen, but it is the full version of Microsoft Office that you d use on a des
ktop PC.

-->limited to where it is installed


- Online
-->flexible: You can open Office Online on anything that has a browser
- Google: Same
*II.) Key feature 2: Working on the go
- Online
-->If you want to create a document on Office installed on your computer and the
n continue to work on it online on a tablet or anything else, Office Online allo
ws it.
- Office 2013
- Google
*III.) Real-time collaboration
-->Document collaboration is a critical element to working effectively as a team
in your enterprise.
However you collaborate on your documents, the days of forwarding attachments in
e-mail are history.
- Online
-->Office Online is more powerful than computer-based Office 2013. It allows rea
l-time collaboration - multiple people can access the same online document and m
ake edits. All edits are visible to all other collaborators in real time.
-- Real-time collaboration
- Office 2013: not

- Google Docs:
Same, but longer - a capability its main rival Google Docs has had for more tha
n two years.
IV.) Offline functionality
- Online
-->none
- Office 2013
--> Yes
- Google Docs
-->yes: view and edit
You can work on files on a Chrome browser even when you re not connected to the In
ternet. Chrome automatically syncs files in Drive, Docs, Sheets, and Slides so y
ou can view and edit files offline.
What to choose
-->depends on preference
Online if:
If you are used to the Microsoft Office interface, you will definitely prefer Of
fice Online to Google Docs. It is almost exactly the same as regular Office. Off
ice Online is also far more predictable in the way it handles standard Office fi
le formats - .docx, .pptx, .xlsx, and so on. Google Docs can produce unpredictab
le results with the formats sometimes.
However: Office Online is less deep than regular Office or Office 365. To begin,
it only includes Word, Excel, PowerPoint and OneNote. You don't get Access. The
applications that are on offer are stripped down, too. If you need some of the
deeper features in Office - macros or mail merge, for instance - they aren't ava
ilable. If you simply need to do regular work, though, Office Online is just as
good as Office 365 or regular Office 2013. Of course, you do need a connection t
o the Internet at all times.
Google Doc: If very busy, work offliine
=======================================================================
Differences between Windows 10 and Windows 8
http://www.howtogeek.com/219098/heres-whats-different-about-windows-10-for-windo
ws-8-users/
Title: Comparing Windows 8 and Windows 10 - 5 Essential Points of Difference
Intro:
Thought Windows 8 was revolutionary? Windows 10 takes the evolution of Microsoft
OS a step further by introducing significant changes.

Here are five of the essential differences between Windows 10 and Windows 8:
I.) Return to classic desktop interface
*- The Start Menu is Back
-->The Start menu has been present in every Windows OS version before Windows 8.
So imagine the shock of Windows users when Windows 8 took that away. Fortunatel
y (OWN)
-->There's now a pop-up Start menu for desktop users
-->works much like the old version did, but also added Windows 8 s tiles to the mi
x. The tiles are movable and re-sizable, and the Start menu is highly customizab
le overall.

- No more charms bar


-->charms bar and app switcher hot corners are eliminated ( prevent the app switch
er and charms from appearing when you move your mouse to the corners of the scre
en in Windows 8)
-->Touchpad gestures have been rethought, so you won t end up seeing the charms af
ter accidentally sliding your finger of the right side of the touchpad
- Tablet mode is only optional
-->There s a tablet mode optimized for touch devices, but Windows 10 never forces yo
u into this mode on a desktop PC
II.) Multi-tasking friendly desktop
In Windows 8 and 8.1, apps from the Windows Store took up the whole screen, whic
h made multitasking more difficult.
Virtual Desktop
If you ve used Linux or Mac, you know this can be a very useful feature. If you o
pen a lot of programs at once, this feature allows you to keep them organized.
The virtual desktops feature in Windows 10 is called
he Taskbar.

Task View

and is located on t

III.) Changes in cloud storage option


*- no more placeholder feature
-->placeholders act like shortcuts to your OneDrive cloud storage.
-->lets you see and access all you files through the local File Explorer, withou
t having to store them on your local drive
-->This is a genius solution for devices with limited storage space, but it bec
omes a problem when you don t have Internet access
*Why change?

-->Microsoft said they did this because the placeholder files in Windows 8.1 wer
e buggy and incompatible with some Windows desktop programs.
New option
Microsoft changed things in Windows 10. OneDrive will work just how it did on Wi
ndows 7. Like with competing services like Dropbox and Google Drive, placeholder
files are no more. You ll have to choose what to sync ahead of time.
IV.) Modified interface for touch device users
- no app switcher
- no charms bar
- New-style universal apps
- Tablet Mode
V.) Improved Command Prompt
It s not all about improving functionality for every user. Microsoft clearly still
has a place in its heart for the power user. Among the developer and power user
tools that will be updated is the Command Prompt. If you haven t used it before,
you probably won t be impressed to know that functionality like copy and paste has
been added. However, if you re a seasoned Command Prompt veteran, you ll be glad to
know that it s getting some love too. There are a large number of new options and
hot-keys which make it even easier to execute commands and launch programs.
- Resizable window (Command Prompt window works like all the other windows in th
e operating system)
- text selection and copy-paste feature
With Quick Edit Mode enabled, you can highlight the exact text that you want wit
h the mouse pointer (Figure B). Once you've highlighted some text in a Command P
rompt window, press [Ctrl]+[C] to copy the text to the clipboard -- just like in
any other application.

- Transparency
I never thought that I would see this feature natively supported in a Command Pr
ompt. Using the slider on the Experimental tab, you can drop the opacity of the
Command Prompt windows down from 100% to 30% or anywhere in between. Thus, it al
lows you to keep tabs on any window that happens to be behind the Command Prompt
window
=======================================================================
Recover Files within Office
http://pcunleashed.com/tips-and-tricks/lost-an-important-file-here%E2%80%99s-how
-you-go-about-recovering-it/
Title: Lost An Important File? Here s How You Go About Recovering It
Churned:

Intro:
I.) Auto-recover option MS Word
II.) Check backup
- cloud backup
- automatic backup
-File history Windows 8; Windows 7
-->Other manufacturers leave them turned off
you have to turn them on yourself i
f you wish to have Windows create automatic backups. When you lose a file, it is
a good idea to check if one of these tools has created an automatic backup for
you to recover your data from.
How to:
Windows 8 vs 7 (restore previous versions)
III.) file-recovery software
when files on a regular magnetic hard drive are deleted, they aren t actually eras
ed.
If you use file recovery software soon after you delete a file on a traditional
hard drive, chances are excellent that you haven t done anything that could requir
e reusing the space occupied by file.
Unfortunately, magnetic traditional hard drives are quickly being replaced by ch
eap and fast solid-state drives these days.
Solid-state drives on modern operating systems like Windows 7 and 8 execute a co
mmand called TRIM (this is not an acronym) to truly erase files once you hit Del
ete .
HOW:
Since keeping the computer turned on opens you to the risk of having something w
ritten to the location on your hard disk that contains the file, you should shut
the computer down immediately. Even installing file recovery software could be
risky the software could install on top of the lost file.
To recover the file, you should use a file recovery tool that runs directly off
a CD or DVD instead of your hard drive. The usual method is to run an Ubuntu liv
e CD to fire up an operating system and to then use portable tools like Photorec
or Ntfsundelete.
If the file you need isn t important enough to justify such serious methods, you c
ould simply find good file recovery software to install directly on Windows and
then try your luck.

Closing:
If the file you ve lost is extremely important and you don t wish to spend on hiring
a professional data recovery service, you should use the most effective methods
available to try to recover it.
=======================================================================
1. Office Online Vs. Office 2013 Vs. Google Docs
Image URL:
http://depositphotos.com/10716064/stock-photo-computer-work.html?sst=0&sqc=57&sq
m=224628&sq=2ftbpb
http://www.infosecnotes.com/google-vs-microsoft-vulnerability-disclosure-war/
2. Differences between Windows 10 and Windows 8
Image URL:
http://depositphotos.com/26429241/stock-photo-desktop-computer-with-touchscreeninterface.html?sqc=0&sqm=100908&sq=289l77
http://tech.firstpost.com/news-analysis/microsoft-windows-10-everything-you-need
-to-know-269364.html?utm_source=recommended
3. Recover Files within Office
Image
URL:
https://pixabay.com/en/hard-disk-drive-head-storage-30576/
=======================================================================
TITLE: 10 Windows 8 tips (from a very unlikely source)
http://christianmediamagazine.com/technology-mobile/10-mictosoft-windows-8-tipsand-tricks/
Churned: Work More Efficiently with Windows 8: 10 Tips

Intro:
For all the flak it has taken from loyal Windows users, Microsoft's Windows 8 is
still a good OS. The problem is that most users were accustomed to features whi
ch all previous Windows OS shared. For users who prefer classic Windows OS featu
res, Microsoft has come up with its new OS Windows 10 that brings together the b
est attributes of Windows 8 and its predecessors. But before you transition to t
his new OS, you might want to know several tips that will make your day at work
with Windows 8 easier.

Browse below to check out 10 tips that can help you work efficiently with Window
s 8:

*I.) Go Directly to your Desktop


- talk first about Lock screen Tap the Lock Screen to Start Working
(skip the Start Screen)
says .
*II.) Picture Password
-->more security
*III.) Search in a Breeze
*IV.) Make use of Windows logo key
*V.) See Entire Apps in a Flash
*VI.) Close an App or System Fast
*
Shut it Down -- Fast!
Close an App in an Instant
*VII.) Refresh in an Instant
VIII.) Personalize your System
IX.) Navigate with Charm
X.) Clutter-free and Eye-pleasing Start Screen
- minimize tiles
- categorize files
=======================================================================
Title: Top five tips for small businesses to get technology right first time
Joyce: 5 Tech Tips for Small Businesses (there's already a blog of that title)
Churned: Five IT Tips New Small Businesses Should Follow
Intro:
*I. Know what you'll use technology for (4)

-->Once you know what business tasks you will be using your IT for, you can calc
ulate how much you need to spend.
Benefits: There are products and services for all sizes of business so you don t h
ave to spend more than you need to
II. Hire an IT Professional for Advice (5)
-->It can seem cheap and easy to rely on friends and family for help setting up
your IT and when there is a problem. However, this can often lead to more delays
and increased costs in the long run if things do not go to plan.

*III. Be Mobile (2)


-->Small business owners and employees spend a lot of time out of the office and
on the move so the ability to stay connected and continue working on the move i
s important for productivity.
-->Smartphones, laptops, and tablets
- for business owners
- for employees also:
sales representatives can deliver more effective pitches, designers can easily s
howcase their work at out-of-office client presentations; and consultants can qu
ickly edit and send documents to clients while on-the-go.
-->But what you might not know is the cloud can also put a world of new technolo
gy right at your fingertips. As storage computing power moves from local servers
to remote data centres, enterprise-grade solutions that were previously too com
plex or costly for small businesses, are now available as cloud-based offerings.
*TELUS Business Connect, for example, is a cloud-based phone system with a robus
t set of features, like an automated attendant and call routing; audio and video
conferencing; call flip, and a single number that can be used across multiple d
evices, that can be subscribed to on a per-user basis
*IV. Be Social (3)
-->Many small businesses find social media to be a really helpful way of communi
cating, as it is a cheap and easy way of marketing your business and getting not
iced
-->reviews, feedback
*V. Keep your Information Safe (Secure your data) (1)
-- > Create Reliable Data Backup & Disaster Recovery
how:
A lost laptop is bad enough, but it can be even worse if it contains confidentia
l business information. Protect your business data by backing up files, setting
passwords on your computers and individual documents and changing them regularly

.
Cloud: individual products such as Microsoft Office 365, Google Drive and Dropbo
x offer access to an unlimited range of storage and email options, you need to c
reate an integrated cloud strategy if you are to successfully drive your busines
s forward.
=======================================================================
Microsoft Office Now Available on Android
http://www.cnet.com/news/microsoft-office-apps-arrive-for-free-on-android-smartp
hones-finally/
Image URL:
Option 1:
http://www.freedigitalphotos.net/images/smart-phone-photo-p229441
http://www.shutterstock.com/pic.mhtml?id=182053310&tpl=39115-42119&irgwc=1
http://www.shutterstock.com/pic.mhtml?id=220531183&tpl=39115-42119&irgwc=1
Churned: Microsoft Office Now Available on Android
-->After launching a version of Office for Android tablets in January,
Intro:
Workaholic Android smartphone users have a reason to be happy: now you can use M
icrosoft Word, Powerpoint and Excel on your beloved smartphone for free.
Previously available only on iPhone and Windows Phone, Microsoft revealed last J
une 24 that its Office suite will also be available to users of Android smartpho
nes. (Link of Microsoft's site: https://blogs.office.com/2015/06/24/office-forandroid-phone-is-here/)
The move is another milestone this 2015 for Android users after Microsoft made i
ts productivity suite available for Android tablets in January of this year.

Features of the app


-->These apps aren t for creating documents, however, but rather for accessing and
making quick edits to ones you ve made from your tablet or desktop PC.
-->apps look and work much like the software designed for Apple's iPads and iPho
nes, meaning you can edit Word documents and wirelessly run PowerPoint presentat
ions from your phone.
the app is nearly identical to its attractive iOS counterpart, letting the user
get quick drafts and edits done on their phone.
While full-featured, the app suite still isn't meant handle your entire workload
. Rather, it allows for simple edits to documents, tables, and presentations. Wo
rd, Excel, and Powerpoint's mobile versions all also feature full Dropbox and On
eDrive support for storing files.
Cloud
With your phone, you can access Office documents that are stored on OneDri
ve, OneDrive for Business, or SharePoint.

Recent Documents
Office Mobile is cloud-connected. The documents you ve recently v
iewed on your computer are readily available on your phone in the recent documen
ts panel.
Email Attachments
You can view and edit Office documents attached to email messa
ges.
-->Subscription:
Unlocking more mobile features and using the software's desktop versions require
s an annual subscription to Office 365.
Where to download? How to download?
are available for download (for free) from the Google Play Store. Google Play St
ore.

Microsoft also said:


We ve partnered with over 30 global, regional and local OEMs such as Samsung, Sony
, LG and many more, to pre-load these apps on Android devices. Many of these dev
ices will be landing in retail stores later this year.
Word - 104MB (177MB when unpacked, excluding documents and other data);
Excel - 93.27MB (168MB when unpacked);
PowerPoint - 91.07MB (166MB when unpacked).
=======================================================================
Title: Is Your Backup Plan Obsolete?
Image URL :
http://www.freedigitalphotos.net/images/backup-cloud-usb-drive-means-data-storag
e-or-safe-copy-photo-p265391
Churned
Intro:

Knowing when it's time to upgrade your backup plan


-->SAMPLE: The right data backup solution can save your business from what most
in the industry consider to be all but inevitable; the catastrophic loss of crit
ical business data due to disaster, hardware failure, or software corruption.
I.) How to know if your backup plan is still updated?
- - evaluate your backup plan as often as you do your smart phone or computer.
II.) How to get the ideal plan

- strike a balance between cost, features, and your business s current needs.
--> 1.) Needs
Inventory your needs
- What are Current deficiencies
- What's the nature of the applications supported? Are they mostly file-based so
lutions, databases or a near-equal mix? Do you use specialized databases, such a
s Teradata, that may require special consideration?
- how much data you need to backup (own)
--> the amount of data that must be retained, on-site or off-site, multiplied by
the amount of time you are required to maintain the data
-->2.)features
- cloud, onsite, etc.
-->3.) Cost
This can include month-to-month charges, the flat-out purchase of hardware and s
oftware, and vendor support / warranty fee s. Cost is generically proportional to
the amount of data you need protected. The more data you have, the more the so
lution will cost.

CLOSING: Importance of consulting ITIn experts


-->CLOSE SALE:
Everon monitors all of the backup devices we offer, 24/7. If a problem arises, w
e quickly address the issue to ensure your data remains protected. Monthly plans
start at only $169, hardware included. Contact us today if you would like to di
scuss finding the right backup solution for your business! 888-244-1748 or info@
everonit.com. We re here for you.
=======================================================================
Title: Computer tips for small companies Six computer tips for small companies
This may need to be groomed a little bit after Ryan sends it over, but a lot of
the tips on here could be potential action items for Techster
Image URL: http://www.freedigitalphotos.net/images/Internet_g170-World_Technolog
y_Background_p66994.html
http://www.freedigitalphotos.net/images/Other_science_and_te_g342-Laptop_Mail_On
_A_White_Background_p120914.html

Churned:
Intro:
The impact of computers in small companies cannot be taken for granted. With the
plethora of information now available through online, businesses can get many t
asks done faster and more efficiently with the help of computers. It's therefore
important for small companies to invest in technology and services that will en
sure their computers are up-to-date and properly maintained.
Below are some computer tips which small companies may find helpful:
*I.) Put in place a backup plan
*II.) Beware of low-priced computers
*III.) Check software compatibility when upgrading
*IV.) Always ensure software and computers are updated
-- Small companies get hold of sensitive files in the course of conducting busin
ess, including, personal and financial information of customers.
V.) Take advantage of open source and free software
VI.) Ask help from IT specialists
=======================================================================
Title:
Finding the right computer for your small company
Image URL:
Intro:
No company, no matter how small, can do business today without a computer. Just
as it was impossible to do business without a typewriter 50 years ago, it is equ
ally unthinkable to perform office tasks these days without a computer. How will
you encode those important files? How will you communicate with your employees
and clients?
Computers make business happen, so it is very important for small comapnies to b
e cautious when it comes to buying new computers.
To help you find the right computer for your business, we have listed a few poin
ters that you should bear in mind:

I.) Know the processing power you need (What processor will keep my business run
ning?)
Dual-core

-->Dual-core processors, particularly AMD A4 or Intel Core i3 models, are the no


rm in business PCs.
Quad-core
--> is an option for the users, like graphic artists, hard-core number crunchers
, and other gearheads who stress over the speed of their PCs.

*II.) Settle on the right RAM (How much memory is enough?)


TIP: Look for at least 4 gigabytes of RAM, and the more memory the better.
More memory allows you to do two things: Open up more programs and windows at on
ce and perform multimedia processes (like editing photos) faster. Windows is a r
esource hog, particularly with the integrated graphics commonly found in busines
s PCs, so 4GB is a minimum.
*III.) Laptop vs Desktop - Make a Choice (Do I need a laptop or a desktop?)
-->mobility
If you take it with you to meetings and trips or use it for presentations, then
a laptop is a great option
-->Also factor in connectivity: laptops tend to have fewer USB ports than deskto
ps, but low-cost USB hubs can expand those capabilities.
-->cost & durability
Desktops are generally cheaper for similar hardware (this is a rule of thumb and
is not written in stone). Desktops are hardier, more easily repaired, and easil
y upgraded.

ALTERNATIVE:
Don't need multiple hard drives and/or multiple graphics cards for your users? C
onsider deploying all-in-one systems instead of tower PCs.
All-in-one desktops have the benefit of a built-in screen without the theft and
travel breakage risks that business laptops face everyday.
While many come with high-end performance processors like the Intel Core i5 or C
ore i7 for your demanding users, there are also models are available with energy
-saving processors for everyone else.
Touch screens are useful for certain applications (Kiosk, POS, and information r
etrieval come to mind), and the all-in-one form factor lends itself to touch-scr
een computing.
IV.) Don't be too obsessed with storage space
-->Business PCs require less storage than consumer PCs, since you're less likely
to sync your iPod or download lots of video to them.

-->With many businesses storing files on central servers or in the cloud


and sin
ce hard disk drives are easily upgradable
this is one of your least important co
nsiderations when purchasing a computer
What is enough?
--> Since storage is so inexpensive these days, a hard drive with 300GB to 500GB
of space is a good balance between economy and space. Frankly, 40GB to 60GB of
available storage could be enough for just about all the PowerPoint, Word, and E
xcel documents you use on a day-to-day basis.
V.) Other Considerations
i.) don't be cheap
ii.) pick an OS
https://pixabay.com/en/computer-desktop-modern-device-154114/
=======================================================================
Title:
Why you need to upgrade to Windows 8.1
-->This can be a shorter post and doesn't really need all of the screenshots or
instruction. Just a quick filler post with some valuable information
Intro:
Still using Windows 8? Well, Microsoft says you can upgrade to Windows 10 for fr
ee (within a year from its launch), but you better upgrade to Windows 8.1 and in
stall updates. It may take a lot of your time, but you won't regret it as Window
s 10 combines features of both Windows 7 and 8 so that you'll experience the bes
t of both worlds.
IMAGE URL:
http://www.freedigitalphotos.net/images/agree-terms.php?id=100291050
http://www.freedigitalphotos.net/images/agree-terms.php?id=100214107
Reasons:
KB3035583
=======================================================================
Title: 4 WAYS TO IMPROVE YOUR MEDICAL TECHNOLOGY SECURITY
Joyce: Tips to Help you Boost IT Security in your Medical Office
IMAGE:
http://www.freedigitalphotos.net/images/agree-terms.php?id=100297431
Intro:
Ensuring the safety of patient personal health information is essential for any

establishment in the medical industry. Security breaches and inadvertent loss of


data can be deterimental in keeping this objective.
With strict HIPPA rules now in place, it is a must for a medical office to safeg
uard personal health information. Below are five tips that can help you in attai
ning such objective:
Tip 1: Keep your Firewall in Shape
Tip 2: Get those Patches for your OS
Tip 3: Improve Email Security
Tip 4: Protect Data in the Cloud
TIP 5: Let your Staff Know
The HIPAA security standards require your practice to have written security poli
cies and procedures, including those that cover personnel training and sanctions
for security policy violations. Your office staff and colleagues must truly und
erstand basic security logic and take their role in protecting patients privacy v
ery, very seriously. Most security breeches occur when insiders
people working f
or the organization exercise faulty judgment or fail to follow protocols in whic
h they ve been trained.
=======================================================================
Title: Why Registering Multiple Domains is Good for Your Business
Joyce: How Registering Multiple Domains For Your Business Can Help
Intro: Having a website is indenpensable for any business these days. But would
it be enough to simply get one domain for your website? No, it's not and here ar
e the reasons why:
Image Link:
http://www.freedigitalphotos.net/images/biz-com-net-shows-websites-internet-andseo-photo-p284791
1.) Stop others from benefiting from your brand (Protecting Your Brand Online Pr
otects Your Business)
One reason for this is that Google is giving lesser emphasis to domain names tha
t do not contain keywords that is being searched for by a customer
--> Improve traffic to your site
- It s an inexpensive way of protecting your brand and can improve your traffic at
the same time.
XXX2.) You will own your market space.
3.) Build brand value dollar value.
4.) You will rank higher.

5.) Get more exposure


How to:
*protecting an online brand is to identify common misspellings of the domain nam
e and registering those typos as domains.
*- These additional domains can easily be set up to forward visitors to your mai
n website, ensuring they end up at their intended destination
your site. Look at
google.com as an example: They ve registered gogle.com and googel.com as typo dom
ains that redirect the user to the main Google website.
- If you re providing products or services to customers in specific countries, I h
ighly recommend registering your domain name under the country code domain exten
sion for the specific countries or regions you are marketing to, such as .us and
.ca for the United States or Canada, or .eu and .asia for the European and Asia
Pacific regions.
(Marketing Opportunities with Multiple Domains)
- If your products have unique and catchy names, it s a good idea to register thos
e product names as domains. You can set up the domains to resolve to specific la
nding pages on your site, providing potential customers immediate information ab
out that product.
Apple does this with iphone.com, which takes the user right to the iPhone page o
n their website.
- If your brand has a catchphrase or slogan associated with it, you can also str
engthen that relationship by registering it as a domain that brings visitors to
your site, as Nike does with justdoit.com.
======================================================================
Title: 5 Ways Small Business Can Improve Cyber Security Today
Joyce: 5 Ways Small Business Can Improve Cyber Security
Mine: Five Ways Cyber Security for Small Business can be Enhanced
Image URL: http://www.freedigitalphotos.net/images/cyber-security-indicates-worl
d-wide-web-and-searching-photo-p334882
Intro:
TIPS
1. Impose Security Policies (Create Internal Policies)
An African prover states, "If there's no enemy within, the enemy outside can do
us no harm." It may come as a shock, but the biggest risk with it comes to cyber
security is a business' own employees. Malwares from cyber criminals often brea
ch a business' network through employees who inadvertently clicked on email link
s or have used passwords that are weak.
So one of the best and cheapest way for you to protect your network is to simply

establish security policies for the observance of your staff. Impose a policy o
n passwords. Keep yourself updated of new malwares and schemes and inform your e
mployees how to deal with those.
=======================================================================
TITLE: 10 Top Password and Cyber Security Tips for Every Small Business
JOyce: 10 Password and email related tips
Mine:
Image URL: http://www.freedigitalphotos.net/images/agree-terms.php?id=100207531
Intro: Passwords are ever-present in today's work environment. For small busines
ses, the ability to keep passwords safe is perhaps the primary line of defense a
gainst security breach.

Strong passwords are among the first line of defense when it comes cyber securit
y.

"The ability for employees to keep secrets such as passwords and access codes fo
rm the foundation for organizational secure networks. "
"Your first line of defense on the Web is creating the strongest password possib
le to protect your computer, your data and your online accounts. That may sound
like common sense, but hackers have become increasingly sophisticated at passwor
d cracking. What may have been considered a strong password a year ago may now be
considered an open window to your computer. Internet security is based on a weake
st link principle; hackers are constantly searching to find the weakest link poss
ible to give them access to a network or computer. Often that weak link is a wea
k password."
Passwords are far more important
1. Prevention
Prevention is the first layer of defense when securing a network. Making sure al
l anti-virus software programs are up to date and a system firewall is on is a n
ecessity. Regular scheduled maintenance and updates to this software is vital to
preventing a system breach.
2. Update your software
To ensure compliance and to instil a habit of keeping confidential information
a secret
It may be advisable to emphasize in your policy that employees are going to be h
eld accountable in case of security breach arising from non-observance of your c
onfidentiality policy.
=======================================================================
Title: New Ransomware Becomes a Growing Threat for Small Business

Churned:
Image URL: https://pixabay.com/en/code-hacker-data-security-707069/

What?
*---> New Ransomware Becomes a Growing Threat for Small Business
- - - This new version of malware literally holds your computer hostage until yo
u pay the ransom or has someone with very sophisticated knowledge of computers,
viruses, and malware as well as many hours on their hands try to unlock the comp
uter.

When
-->when discovered
Who?
--> ransomware in general
- - The thing which makes any malware Ransomware is that it extorts direct payment
from the victims. There are different types of Ransomware.
-- Some ransomware may be more upfront. These may go deep into your computer sys
tem and display message saying that this will only go away when you pay some mon
ey to the creators of ransomware. This malware type can be removed by using malw
are removal tools or just by reinstalling your operating system.
-- Why ransomware becoming common
--> Cyber-thieves usually demand anywhere from $US200 to $US5,000 as an initial
payment and give the victim detailed instructions about how to pay the ransom, a
ccording to the FBI. And if the victim doesn t pay within a certain period of time
, the ransom may double or the files on the infected device will be completely d
estroyed.
-- story of a dentist

-->new ransomware
***-- In fact, there was a 165% increase in new ransomware during the first quar
ter of 2015, according to a data published Tuesday by the security firm McAfee.
(http://www.businesswire.com/news/home/20150608006729/en/McAfee-Labs-Report-Sees
-Ransomware-Surge-165#.Vb2U9PlCrDd)
*--> CTB-Locker family and its affiliate program, a new ransomware family called
Teslacrypt, and new versions of CryptoWall, TorrentLocker and BandarChor
**-- new ransomware driven largely by the new, hard-to-detect CTB-Locker ransomw
are family, a new ransomware family called Teslacrypt, and the emergence of new
versions of CryptoWall, TorrentLocker and BandarChor. McAfee Labs attributes CTB

-Locker s success to clever techniques for evading security software, higher-quali


ty phishing emails, and an affiliate program that offers accomplices a percentage
of ransom payments in return for flooding cyberspace with CTB-Locker phishing me
ssages.
*WHat is the CTB locker?
-- CTB-Locker is a variant of CryptoLocker, which was the big ransomware last ye
ar. It is especially dangerous because it s very hard to detect. Often times the r
ansomware comes in the form of email spam that looks legitimate. It can also be
spread in newsgroup postings, peer-to-peer networks and internet relay chat, acc
ording to McAfee s report.
To make matters worse, CTB-Locker is even able to get around security software b
y hiding in a .zip file within a .zip file and unpacks as a screensaver file. On
ce a computer or device is infected, a scary looking message like the one below
appears.
NEW GIMMICKs - Windows 10
--> Cisco's security team has noticed a new spamming campaign attempting to spre
ad the CTB-Locker ransomware using emails purporting to come from Microsoft, tel
ling people they are ready to download Windows 10. The emails mimic the actual W
indows 10 messages Redmond has been sending out (with some minor text mistakes)
and have spoofed the originating address to read as update@microsoft.com, althou
gh the sender's IP address can be traced back to Thailand. There's also a Micros
oft disclaimer, and a message claiming the files have been cleared as virus-free
by Mailscanner. (http://blogs.cisco.com/security/talos/ctb-locker-win10)
- Now these days, Ransomware is getting more sophisticated. For example, as soon
as it enters into computer, it starts encrypting your files; thus, preventing a
ccess to the files without knowing the encryption key. After locking up your ess
ential files, it will show you a message that your files are locked; now you hav
e to pay $200 in order to get the encryption key. After paying that amount, they
will provide you the key.
*-COMPANY EMAIL
Stefanick said the email was masked so that it appeared to come from a company h
is company was doing business with and the attachment dealt with a subject his e
mployee was working on at the time.
"They had enough knowledge about this business that we were doing to know how to
mask the email so it would make it easier to open," said Stefanick.
Stefanick said what followed was a ransom demand; pay $400 and get the files dec
rypted or don't pay and stay locked out.
HOW TO PREVENT (TIPS)
-- It is not a good idea to pay an amount to the cyber criminals to recover your
files, but businesses that don t want to lose their only copy of important data m
ay be tempted to take the risk. So, it is good to prevent your computer from the
Ransomware because prevention is always better than cure.
-- > McAfee Labs suggests organizations and individuals make it a priority to le
arn how to recognize phishing emails
=======================================================================

Joyce: Work Faster in MS Outlook


Article Title: 12+ Tips and Tricks to Work Faster in Microsoft Outlook
Churned: Work Faster in MS Outlook
Image URL: http://www.freedigitalphotos.net/images/Business_people_g201-Young_Ex
ecutive_Running_For_Office_p68823.html

Intro:
Managing emails, calendars, and the usual office tasks can slow down work -- if
you don't have MS Outlook and if you don't know how to make use of its features.
MS Outlook is used by millions and rightfully so as this email client can boost
productivity if the user knows how to use it the right way.
=======================================================================
Joyce: Using Auto-Recover
Title: How to Use AutoRecover to Automatically Save Your Word Documents and Reco
ver Lost Changes
Churned:
Image URL: http://www.freedigitalphotos.net/images/folder-with-document-photo-p1
92381
Intro:
How does it feel to spend considerable time and effort working on a Word documen
t only to start all over again because you were unable to save changes you've ma
de? It's definitely one of the most upsetting and annoying things than can happe
n to you at work.
Fortunately, Windows got an AutoRecover feature which you can use to save yourse
lf the inconvenience of working again from scratch. Here's how you can do it:
======================================================================
Joyce: Always Remove Formatting When Pasting Texting in Word
Title: Get MS Word To Remove Formatting When Pasting Text From The Browser
Churned:
Image URL: https://pixabay.com/en/clipboard-copy-paste-image-27405/
Intro:
=======================================================================
Joyce: 15 Office Shortcuts everyone should know
Title: The 15 function-key strokes everyone should know to zip around Microsoft
Office

Image URL: http://www.freedigitalphotos.net/images/agree-terms.php?id=100163046


Intro:
Everything has a purpose.
We all know control keys can be used to make our day with Microsoft Office easie
r. But what about those function (Fn) keys? Those keys are there for a purpose:
to make you work faster.
We have compiled in this blog post the most important Office Fn keystrokes that
you will find helpful when using Word, Excel, and Outlook:
=======================================================================
Joyce: Disable Typing Animation in Office 2013
Title: Disable Typing Animation In All Office 2013 Applications
Image URL:
Intro:
For all its improvements, Office 2013 seems to have this one annoying drawback:
the typing animation. Just in case you're not into this new addition, here's how
you can disable it:
=======================================================================
Joyce: Free Up Space On Your Android
Title: 5 Ways to Free Up Space on Your Android Device
Image URL:
Intro:
Less is more. The less space you have on your Android phone or tablet, the more
efficient you will be in whatever task you'll perform on it -- whether work-rela
ted or not.
So we've compiled a list of tips that can help your Android device free up space
:
Tips:
*1. Make use of the built-in tool to clean up files (Use Android s Built-in Storag
e Tool)
Delete older files
Uninstall apps
View Folders and Files Taking Up the Most Space
*2. Erase temporary data
*3. Add an SD Card and Move Data There
*4. Move Apps to the SD Card

*4. Back up your files (Upload Photos)


5. Consolidate home screens
6. Factory Reset
===========================
IMAGE URL
1. Free Up Space On Your Android
Image URL: http://www.freedigitalphotos.net/images/bare-concrete-room-photo-p198
519
2. The Best Windows Defrag
Image URL: http://www.freedigitalphotos.net/images/cleaning-computer-hard-drivephoto-p220731
=======================================================================
Joyce: How to create read only documents without a password
Title: How to Create Read-Only Documents You Can Open without a Password in Word
Image URL: http://www.freedigitalphotos.net/images/file-with-padlock-shows-secur
u?
ity-photo-p214106
=======================================================================
Joyce: Apple Vs Android - Closed vs Open
Title: Android Is

Open and iOS Is

Closed

But What Does That Mean to You?

Image URL: http://www.freedigitalphotos.net/images/Ideas_and_decision_m_g409-Whi


te_Doors_In_The_Sky_p47577.html
INTRO:
Android is an open OS and iOS is a closed one. That's what we here from tech gur
us,
Howbut
willwhat
youdobenefit
they really
from Android
mean bybeing
that an
distinction?
open and iOS being a closed?
Below are some points which may help you decide which OS would suit you best:
*I.) From the Source Point of View
i.) Android
-->Make a new OS
ii.) iOS
--> Can't make new OS

*II.) As to personalization and being flexible


i.) Android
--> Android apps have access to a full file system, can communicate each other v
ia the Share feature, change the home screen launcher, swap out your keyboard, s
et themselves as default apps, and do many, many other things.
ii.) iOS
--> Apps don t have as much power available to
icating with each other. Over the years, Apple
more in the background and iOS 8 adds a share
nd widgets that run in the notification center

them and are restricted from commun


has improved on this. Apps can do
feature, third-party keyboards, a
rather than on the home screen.

-->: iOS is still more limited, but features like widgets, sharing between apps,
apps running in the background, and third-party keyboards have now arrived in i
OS
-->However, Apple s iOS still doesn t allow you to choose your default web browser,
email client, mapping app, and other default apps
that s still a bit of an annoyan
ce if you prefer other apps.
*III.) As to apps that can be installed
i.) Android
--> lets you install applications from outside Google Play, which is Google s app
store
ii.) iOS
--> On iOS, you can only install applications from Apple s App Store
disadvtange:
. For example, Apple s app store doesn t allow video game emulators, BitTorrent clie
nts, and other types of apps they consider controversial. For example, Apple ban
s games with controversial content from the app store.
IV. As to unlocking superuser potentials
(Advantages of rooting include the possibility for complete control over the loo
k and feel of the device. As a superuser has access to the device's system files
, all aspects of the operating system can be customized with the only real limit
ation being the level of coding expertise.)
-->Rooting is jailbreaking for Androids and allows users to dive deeper into a p
hone s sub-system. Essentially, it ll allow you to access the entire operating syste
m and be able to customize just about anything on your Android
-->With root access, you can get around any restrictions that your manufacturer
or carrier may have applied. You can run more apps, you can overclock or undercl
ock your processor, replace the firmware.

i.) Android
-->rooting
ii.) iOS
-->jailbreak
Conclusion
==========================================================
Joyce: 10 mistakes small businesses make when it comes to IT
Title: 10 tech mistakes small businesses make (and how IT
consultants can help clients avoid them)
Image URL: http://www.freedigitalphotos.net/images/agree-terms.php?id=100263432
==========================================================
Joyce: How to manually back up your iPhone
Title: How to Manually Backup Your iPhone (in Preparation for iOS 9)
Image URL: http://www.freedigitalphotos.net/images/Computers_g62-Backup_On_Smart
phone_Shows_Contacts_Recovery_p128893.html
Intro:
Planing to update to the newest iOS version without losing important contacts? D
on't want to lose pictures, videos, or other important files on your iPhone in c
ase of an inadvertent system issue? Well, you can avoid those tiresome scenarios
by manually back up your iPhone.
In this post, we have outlined two ways you can use to back your iPhone up:
Methods
1. Backup with iCloud (iCloud Backup)
2. Backup with iTunes (iTunes Backup)
==========================================================
Joyce: Getting the most out of your laptop battery
Title: 9 Tips for Longer Laptop Battery Life
Image URL: http://www.freedigitalphotos.net/images/agree-terms.php?id=10053175
Intro:
Time, as they say, is everything. Like when you need to finish and send a docume
nt to your boss, time is everything you'd hope for in case your laptop battery i
s nearing zero level. Sure, you can just plug your lappy into an outlet to juice
it up, but what if there's none available?
There's always an answer to everything and that's what we'll going to cover here

. Check out below some of the ways you can use to extend the life of your laptop
battery:
I.) Short-term Solutions
==========================================================
PRESS RELEASE:
Ryan, this is an old but exciting news that we hadn't written about back then:
For this, please focus on the team's victory and visit to the white house and th
e Tonight Show. the team is managed by our engineer Oscar Castro.
TITLE: Recounting the Little League World Series Victory of the Team Managed by
AgilisIT Engineer
Intro: Six years ago, a little league baseball team managed by a former AgilisIT
Systems Engineer went on to bring honor to the City of San Diego.

What?
*-->Victory
- Of the 42 California teams to grace the championship game at the Little Leagu
e Baseball World Series in South Williamsport, Pa., just four have hailed from t
he San Diego area, the county s last title coming in 1961.
*- The team went on to win the whole thing, giving San Diego its first major wor
ld title in any sport.

-->White House Visit


When?
-->Little League Championship
-->The Tonight Show
Who?
--> The Team
--> The manager (Oscar Castro)
- Systems Engineer for AgilisIT (Jan 2009 - December 2010)
Comments:
For me, it s great, said West region manager Oscar Castro. We re one of the first teams
from San Diego [to get here] in a long time, so it s huge for us.

You might also like