What Are The Top Gifts For The Techie On Your Christmas List?

Christmas Gift Tech

New tech can be fun and fascinating, but most importantly it solves a need in a person’s life. If you’re trying to choose a Christmas gift for the techie in your life, consider the little problems they’ve been commenting about. Solve that problem with a new piece of technology and you’ll find an innovative holiday gift that won’t be quickly forgotten.

Christmas Gift Tech

New Tech for Getting Fit

Fitness buffs are fascinated with recording results and improving their game. The new Fitbit Charge 3 will help them to do just that. This advanced fitness tracker includes a 24/7 heart rate monitor, a smart touchscreen, goal-based exercise modes, and smartphone notifications. Getting fit isn’t just about working out; eating right is also an important component. The Greater Goods Digital Food Scale will not only weigh food servings, but it also tells nutritional information for 2,000 built-in foods, tracks daily macro totals like fats, carbs, and calories, and adapts to your personal diet. For the most personal gift of all, give her the Muhdo genetic profiling kit. Once the profile has been done, Muhdo will do DNA testing and devise an artisan fitness and nutrition plan based on her personal genetic markers.

Tech for Increasing Productivity

Time seems increasingly short for both executives and independent business owners, so anything that increases productivity will improve both their bottom line and their attitude. With the Equil Smartpen 2, he can doodle, sketch, or take notes on any piece of paper that’s handy, then transfer it into digital form via the pen. If keeping track of keys or other objects is slowing down mornings, he’ll appreciate TrackR Stickers. They affix to any flat surface and will beep when activated by a smartphone app. Is lack of attention slowing her down in boring meetings? The Fidgi Pen has enough stealth fidget points to keep anyone alert during the latest budget overview. For anyone who spends massive amounts of time working elaborate programs, the Packed Pixels Multi Laptop Windows is a multi-window attachment for his laptop that turns it into a computer with three monitors.

Gadgets for Better Visuals

Photography is a growing hobby, and manufacturers have come up with a wide variety of great devices for both amateurs and professionals, alike. For the most casual user, the Amir Clip-On Smartphone Lens will turn any basic iPhone into a high-quality camera. He’ll shoot close-ups, wide angle shots, and super-clear portraits with this easily-attached lens collection. The FujiFilm Instax Minicamera is the hottest instant around in a generation. She can toss it in the office for impromptu group photos, or use it on road trips for ice-breaking sessions. For executives who unwind by going to the extremes, the Polaroid Cube+ is the ideal lifestyle action camera. He can attach it to a helmet, handlebars, a surfboard, or any other piece of sports equipment. For the more casual adventure photographer who never seems to remember a tripod, the Poying Bottle Mount will save the day. He can attach the mount to the bottom of any small camera, then screw the mount onto any commercial bottle of water. Instant tripod!

Tech That Upgrades the Home

Being at home should be as relaxing as possible, and these tech gifts make sure that happens. The iRobot Roomba automatically vacuums the floor by rolling around the house picking up dirt, then moves back to it’s home to charge up for the next trip. The NEST Hello doorbell’s ultra-clear camera shows everything that happens on your front porch. It’s 24/7 streaming HD video that’s always on, streaming both to your smartphone and straight to the cloud for safety. The Echo Plus smart home hub connects all your Internet of Things to form one intelligent, connected unit she can run from voice commands or a smartphone. And the VicTsing Bluetooth waterproof shower speaker adds incredible stereo sound for both invigorating morning showers and relaxing evening baths.

Tech For Relaxation

Everyone needs to have a little fun in their life, no matter how driven they are to succeed. New tech products make it easy to find new hobbies and enjoy small bits of free time throughout the day. Apple Airpods give excellent stereo sound in a wireless design. Airpods are always attached to Siri, to make your life even easier. The Retroduck Retro iPhone Dock turns your iPhone into a 60’s-style television that sits on your desk. It includes a stand and a trio of rabbit-ear antennas to complete the look. The Urban Outfitters Folding Massage Chair reminds you of aluminum lawn chairs on your grandparents’ lawn, but with a considerable upgrade. Your gift recipient will love the deep-tissue massage with three pressure settings and four massage modes.

Are Your Employees Your Largest Cybersecurity Risk?

Employee Cybersecurity

Regardless of the money businesses invest in cybersecurity, technology is only part of the cybersecurity puzzle. Regardless of new hardware, updated software and the best IT support team, cybersecurity is an ongoing commitment. Cybersecurity must be on the minds of every employee every hour of every day.

Employee Cybersecurity

A Chain Is Only As Strong As Its Weakest Link.

This idiom is attributed to Thomas Reid who wrote “Essays on the Intellectual Powers of Man” in 1786. It first appeared in print in 1868 in the Cornhill Magazine. Simply put, it means that a group of people can only be as strong or successful as the weakest or least successful member.

Email is a favored method of cybercriminals – email is used to transmit ransomware, viruses and other harmful software.

Each email that each employee opens represents a cybersecurity threat. Only with a continuous and ongoing employee awareness program can you have an effective cybersecurity solution. It only takes one employee opening one email to expose your business to a cyber-attack.

Employees come and go – make sure that critical passwords are changed when an employee leaves. Be sure that new hires understand your cybersecurity policies and know to whom they should report potential risks.

What Can Businesses Do to Ensure Employees Don’t Pose a Security Risk?

First, ensure that you have a firewall, up-to-date anti-virus software and a spam filter. Always make sure that every new computer, laptop or tablet is up-to-date on these items before it is given to an employee.

Email 101. Teach email safety. These simple questions will help employees evaluate emails that originate from unknown senders.

  • Who is this email from? Virtually every email should be originating from a fellow employee, a supplier or a customer.
  • Why am I getting this email? Emails should relate to an employee’s job description.
  • Are attachments safe to open? Have you taught your employees how to decide what types of files are safe to open?
  • Does an email threaten to cancel a credit card or close an account if you don’t pay money? Employees need to understand this might be ransomware.
  • Is an email really from someone known? Teach employees how to spot suspicious “look-alike” email addresses.
  • Does anything just not seem right about an email? Neither the IRS nor the FBI sends emails to employees.

Continuing Education for your Employees. People are people, and they forget. Employees need ongoing training about email safety. Keep the training short and exciting to keep their attention.

  • Weekly mini sessions – perhaps by the department.
  • Utilize a speaker from your IT provider.
  • Weekly email “Cybersecurity Tip of the Week.”
  • Share actual case studies (specific to your industry is ideal).
  • Monthly E-newsletter – could be part of your IT partner’s service.
  • Simulated phishing attack conducted by your IT partner.

The Power of Human Error

In spite of educating your employees, human error accounts for almost 50 percent of data breaches. The accidental loss of a device or a misplaced document may be the cause of a severe security breach. Shred-It vice president Monu Kalsi observes that the smallest bad habits may result in substantial security risks. Examples include:

  • Leaving a work computer unsecured while on break or in a meeting.
  • Leaving sensitive documents out on a desk overnight.
  • Accidentally leaving sensitive documents on an airplane (the Homeland Security Super Bowl debacle).
  • Leaving sensitive documents within view of others in a public space.
  • Using public Wi-Fi.
  • Sharing company-issued computer with family or friends.

Draft a written policy to provide each employee who works remotely from home or when traveling.

Another potential source of human error may come from sub-contractors or vendors who have access to your facilities and/or employees. The Shred-It study showed that 20-25 percent of security breaches were caused by vendors. Ensure that when a vendor relationship ends that all ties are severed – change codes for keyed entrances when there is a vendor change.

Attention to small details may save your company lots of money.

The Bottom Line …

Employees are human. They make mistakes or commit errors in judgment. They also forget. Invest in updates for firewalls, security software and well-trained IT personnel. Regular cybersecurity training for your employees protects your business from damaging cyber-attacks.

  • Update policies. Incorporate a clean desk policy to prevent unauthorized copying or theft of critical document. Develop and institute a vendor policy and a remote employee policy.
  • Go paperless whenever possible. Invest in technology that scans essential documents into PDFs that are emailed to the owner of the document. Shred the document immediately after scanning.
  • Hard drive disposal. Destroy obsolete hard drives. Never throw them away because even deleted information can be retrieved by smart cybercriminals.
  • Lost device policy. Designate someone that employees can tell immediately if the equipment is lost or stolen.

Mobile Technology Opportunities and Challenges in Healthcare

Mobile Technology in Healthcare

Forms of mobile communications and their frequency of use in healthcare have increased significantly over the past decade, as they have across virtually all economic sectors. Today, hospitals support their medical care units with various kinds of modern communications technology. Of course, increased adoption and varieties of technology use in the healthcare industry comes with new challenges for healthcare professionals. That means new opportunities for technology services providers to collaborate with them on the development of insightful and thorough solutions.

Mobile Technology in Healthcare

Understanding the communications technology needs of modern healthcare providers and how to approach solutions to their unique challenges in clinical, administrative and remote contact environments yields a wealth of possibilities for new cross-applications of telecommunications tools.

Here is some information to help in collaborations to facilitate the quickest and most effective, convenient, and secure communications at every turn for physicians, nurses, administrators and other healthcare industry professionals.

Mobile Policies and Adoption Levels in Healthcare Organizations

These days, mobile policies are not yet fully adopted and enforced across many large healthcare institutions. Others have advanced much farther down the path to optimizing their organizations’ communications systems and utilization practices. Some are even developing their patient-care and patient-relations protocols to extend the use of mobile technology to enable more accessible and thorough information sharing with patients.

The news may seem to be a pretty mixed bag, regarding the progress of communications across the healthcare sector. But, the overriding reality is that overall utilization rates of mobile technologies across the industry have multiplied over the past ten years.

There are challenges in developing viable cellular and Wi-Fi infrastructures, and special security issues are brought on by “Bring Your Own Device” (BYOD) allowances in many organizations that are otherwise on exceptionally cautious about information systems security. Nevertheless, BYOD practices are increasingly used in even some relatively sensitive information handling in healthcare systems. There are additional issues of mobile policy and generally lacking mobile strategies that present both significant problems and opportunities for healthcare organizations and mobile services consultants.

Altogether, mobile devices have become a standard tool throughout the healthcare industry, now used in roles spanning the entire broad field of specializations, including by physicians, nurses, medical technicians, other clinicians, lab managers, executives, pharmacists, healthcare business analysts, social workers, patient services reps, risk management professionals and healthcare IT staff.

Mobile Strategies Across Today’s Healthcare Industry

Strategies for mobile communications implementation must involve formalizing an organization’s policies on technologies, security, and forms of communication permitted in various healthcare contexts and for various purposes. Of course, each healthcare organization has its own variation on ordinary policy allowances, restrictions, and other entailments based on the unique needs of their team’s healthcare activities.

Healthcare organization policies on mobile devices and their use should actually be understood as representing an integral component of comprehensive strategies for delivery of more efficient, higher-quality healthcare, to improve both patients’ and healthcare providers’ levels of satisfaction with their experience in the healthcare system. Mobile strategies that serve these over-arching goals are naturally more successful, such as devices that automatically alert doctors and nurses and improve response time.

Establishing policies that set forth controls, in combination with built-in auto-controls for HIPAA compliance, among others, protect patients as well as healthcare organizations and their employees from exposure of patient data and other security issues. With the IoT now accounting for seemingly countless devices connected through worldwide networks, unapproved access and cyber-crime are ever-more common, impactful to operations, and costly to resolve.

HealthIT.gov advises that healthcare organizations’ mobile use policies include safeguards for patients’ health information in language that specifies requirements for management of mobile devices and that is clear on restrictions of device use and training requirements for users. It further emphasizes the importance of clarifying security settings requirements, and other recommended mobile device policies. It also offers much useful information on current health IT developments, regulations and information resources.

Healthcare Industry Mobile Technology Transition

The most recent Hospital Consumer Assessment of Healthcare Providers and Systems (HCAHPS) (2017) survey asked patients questions about the responsiveness of hospital staff during their treatment. The Centers for Medicare & Medicaid Services (CMS) Consumer Assessment of Healthcare Providers & Systems (CAHPS) also asks such questions of patients in their information gathering programs used in the agency’s evaluations of healthcare institutions. Healthcare organizations are sensitive to these particular reviews and understand the need to work to improve the patient experience to prevent the risk of CMS resistance to reimbursements and other dreaded consequences of issues with responsiveness to patients’ needs.

So, it makes sense, just based on those concerns, that hospitals are now implementing mobile policies for doctors, nurses, and other healthcare team members who provide direct care to patients. Increasing efforts around clarification of types of workflows that can be safely and effectively managed using mobile devices point to a growing preference for maximal utilization of these tools to facilitate work that directly affects patients’ overall satisfaction with the care they receive.

Updating Mobile Strategy in Healthcare Systems

As in any type of organization, strategic plans must be revised to accommodate new alternatives. Mobile strategies in healthcare organizations require updates to include newly discovered concepts for improving methods to satisfy needs of patients and of technology users on staff, for modifications of clinical process flows, for adopting new technologies that come on the market, and so on.

Today, changes of software and devices are happening at rates with which few other technologies in hospitals are keeping pace. Commensurately, mobile strategies and policies should be reviewed routinely, to be sure that they are appropriate for current patient care processes and technology solutions available on the market.

A large majority of healthcare organizations now utilize smartphones and internet-enabled phones. Onsite pagers, wide-area pagers and encrypted pagers have declined in popularity, with the increasing use of mobile phones. Tablets in clinical settings and in various patient communications contexts are gradually increasing in use.

Updating your organization’s mobile strategy to increase the efficiency of the healthcare delivery process empowers technology-enabled clinical and administrative teams to implement needed mobile security and compliance changes. It also enables or facilitates their efforts to:

  • Improve their effectiveness in meeting the needs of patients.
  • Streamline clinical workflows.
  • Overcome challenges in full-scope mobile adoption.
  • Expand their capabilities through applicable consumer apps.
  • Phase out out-moded systems with new technologies.
  • Acquire new capabilities that complement EHR applications.
  • Incorporate new mobile technologies already on the market.
  • Make changes that better support the organization’s financial sustainability.

Mobile Technology Challenges and Solutions

Even the best and most secure devices are only as good as the network connection upon which their users must rely for access to critical information and to communicate with other members of the team. However, reliable Wi-Fi coverage continues to cause the most frequent issues for mobile users in healthcare institutions, followed by cellular coverage. Managing compliance and data security are others of the most common difficulties.

Undependable connectivity can result in issues of patient safety if a doctor or nurse does not receive critical information when needed. Further, frustrations can lead to attrition among healthcare team members forced to continuously find ways to work around technology deficiencies to complete essential processes in patient care.

Technology challenges must be resolved with permanent solutions. However, hospitals with connectivity problems may not have performed a comprehensive assessment of their wireless coverage, or have pursued remediation.

For those institutions, correcting these essential technology performance issues is an area of opportunity to improve the quality of their organization’s overall experience for patients and families and healthcare workers. Solutions that can be explored to enhance network coverage for Wi-Fi, cellular or/and paging may include:

  • Mapping weak signal spots, and pursue options to increase coverage.
  • Add more antennas, repeaters, or other reception devices.
  • Boosting Wi-Fi connections/increasing coverage.
  • Installing more Wi-Fi and various repeater access points.
  • Upgrading routers.
  • Extending distributed antenna systems (DAS).
  • Adding more cell towers to accommodate hospitals (to include all major cell service carriers)
  • Amplifying the RF signal for pagers.

Additional Mobile Technology Opportunities and Challenges in Healthcare

Secure Texting — Secure texting has become an essential communications component in many healthcare organizations. It can be especially valuable when fully integrated to utilize directories, scheduling, lab reporting and other operational systems needed in time-sensitive situations. Hospitals that are still not using this tool appear to be missing an opportunity to significantly increase efficiency in critical moments. Note: Be aware of legislated restrictions on patient care information that can and cannot be shared by secure text. Also know about requirements, such as secure sign-on (SSO), messaging encryption, and others that are applicable in some healthcare industry contexts.

Security Advancements — Keeping protected health information (PHI) secure continues to be one of the top concerns for every healthcare organization. All are aware by now of the risks of costly downtime due to security breaches, potential data exposure or loss, viruses and ransom incidents. At the 2019 Health IT Conference (HIMSS18) discussions were centered on actively preparing for cyber-attacks, instead of on preventive measures, as in the past.

A major component of a PHI security program is successfully managing device security. Relying only on policy adherence and employee education invites security issues. Going forward, healthcare IT consultants should be collaborating with client organizations on mobile security solutions, as a priority.

Patient and Family Use of Mobile Tools — Many hospitals now provide personal portals for their patients to use for receiving everything from lab test results to billing statements. Some physicians even incorporate the setup of portal access and review of its information features during patients’ visits.

Benefits of Mobile Communications in Healthcare

The number and variety of mobile devices used by healthcare team members these days make it clear enough that the technology has become an essential tool for collaboration and coordination of patient care. The value of mobile technology tools for healthcare team members efforts to improve the quality of patient care include:

  • More efficient collaboration between clinical staff members.
  • Faster access to information at critical times.
  • Immediate awareness and faster response to alerts.
  • Improved safety.
  • Convenient access to EHR.
  • Convenient access to reference materials.
  • Increased overall efficiency for doctors and nurses.
  • Better outcomes resulting from increased efficiency.
  • Enhanced patient experience with 24/7 access to information.

The Near Future of Disruptive Healthcare Industry IT

Even as many healthcare institutions are still trying to fully incorporate already proven technologies into their processes in ways that fully realize the advantages they offer, newer technologies await broader adoption.

Since the advent of the revolutionary electronic health record (EHR), new technologies recognized for their potential to further change the way healthcare is delivered in the U.S. over the next several years include:

  • Secure texting
  • Smartphones
  • Security (anti-virus, hacking, ransomware)
  • Auto-alerts
  • Increased cellular coverage and reduced latency (5G)
  • Google Glass™
  • Real-time information access via portals for patients
  • Increased patient engagement in their healthcare
  • Artificial intelligence
  • Telemonitoring
  • Video phone communications
  • Teleconferencing
  • Internet of Things (IoT)
  • Voice-controlled virtual assistants (ex: Alexa®)

These and other new technologies will further increase efficiency in working with patients and allow healthcare teams to work together more closely, with everyone on the team receiving essential information simultaneously. Teams can make better decisions and take more fully-considered actions, through improved opportunities for consultation and collaboration. Caregivers will have more time to spend with their patients. Patients and families can receive more timely and complete updates.

Keeping Pace with Changes in Healthcare Communications

Throughout the process of healthcare delivery, today’s healthcare professionals and organizations have endless opportunities to leverage mobile communication technologies to improve outcomes for patients. Many healthcare organizations have already made significant progress in integrating mobile technologies and overcoming the attendant challenges.

Still, there are many problems to be resolved. Unreliable cellular and Wi-Fi connectivity can discourage broader adoption and can even lead to safety issues. Functionally, the usefulness and benefits of advanced mobile communication technologies, with their capacity to capture details from directories, schedules, test results, etc., and to auto-send clinical alerts, and so much more are severely reduced by the connectivity problem. These issues can seriously impact patient care and PPI security, which fact makes diligently updating mobile policy documentation and validating training on updates as they are made a continual imperative.

As the use of mobile devices has revolutionized the way people live and communicate throughout modern society, healthcare team members have developed now very familiar skills in working with those technologies, which they can adeptly apply to workplace challenges.

To enable the safest and fullest application of the many new opportunities for improving healthcare methods and practices through mobile technology, healthcare institutions must continue to more completely iterate policies that define appropriate usage of mobile technologies in the healthcare environment. They must also, of course, diligently monitor to ensure that technology usage does not become an obstacle to optimum patient care through face-to-face interaction.

Mobile technology is now a permanent fixture in the healthcare industry. Therefore, healthcare organizations must align their primary goals with their staff members’ modes of communicating in the care of patients.

Disruptive new mobile technologies will continue to present vast opportunities and significant challenges for healthcare team members and organizations. The perspective to keep is that these state-of-the-art technologies are incomparably powerful communication and information tools for healthcare team members to use in their daily efforts to provide optimum quality care for their patients.

Tech Tips: Top 10 Free Windows Applications

Free Windows Applications

Sure, you can purchase Windows applications for a price. With some — like Microsoft Office and Adobe Photoshop — it’s impossible to get around.

Free Windows Applications

But there are also many Windows applications out there that are 100% free. Some of them can even replace most of the features of your favorite paid programs (Microsoft Office and Adobe Photoshop included). Or, if you’re considering buying the paid versions of these programs, you can first download the free version to ensure you like the layout, options, and fluidity.

Below, we go over 10 of the best free Windows applications for download. These applications aren’t trials, and they aren’t limited to things like watermarks or other incomplete features. They are absolutely free, downloadable applications that you can use for … well, forever.

Let’s get started!

1. DaVinci Resolve

DaVinci Resolve is one of the most professional video editors on the market. Functionality is excellent, and you have a range of options when editing video in nearly any form. With this program, however, you’ll need to keep in mind two things.

First, in order to properly run DaVinci Resolve, you’ll have to have at least 8 GB of RAM, 1 GB of graphics memory, and a 64-bit version of Windows.

Second, there are two versions of this software: DaVinci Resolve (free version) and DaVinci Resolve Studio. The latter is a paid version and, naturally, has more capabilities and features. If you don’t want the paid version, choose the option on the left when downloading this program. And remember that for basic editing practices (with some added keen features), the free version of DaVinci Resolve is still quite capable completely worth it.

2. Blender

Blender is another of the best free applications for Windows. It is an open source 3D modeling package. Use it to create amazingly-professional 3D images of any kind; if you like, you can even translate your designs to a 3D printer. Blender can also be utilized to create animations.

In addition to its 3D imagery modeling capabilities, Blender also features video editing capabilities (basic) and has an integrated compositor.

3. Apache OpenOffice

When Microsoft Office is too pricey of an option for your word and data processing needs, Apache OpenOffice is an excellent alternative. It has been downloaded over two hundred million times.

This program includes a word processor, database, drawing package, presentation package, and spreadsheet maker. All of these programs are compatible with the paid version of Microsoft Office.

A sub-option of OpenOffice is another free Office package called LibreOffice. They are essentially comparable with only a few features that differentiate them.

4. Audacity

In terms of sound applications, Audacity is one of the most widely-used and professional multi-track audio editors out there. It is also a recorder. Volunteers created this super easy-to-use program to be completely open source. It can record and edit an entire album, has multiple themes and playback options, and allows you to edit and use effects just like a professional program.

5. SketchUp Make

SketchUp is a modeling program and is used often by those interested in 3D printing; the software can create all types of models that can later be translated to a 3D printer. It is extremely easy to use.

There are two SketchUp programs, and this is the free version. The professional (and paid) version is called SketchUp Pro. As a result of this, it is essential that you state that you are only going to use SketchUp for personal projects at the time of your free download.

6. GIMP

GIMP is an image editor and is completely open source. This program is an excellent alternative to Adobe Photoshop for editing photographs and other images. Even though the program has quite a steep learning curve, it’s definitely possible to get used to the platform and reap amazing benefits from the program — especially if you’re not ready to shell out for Photoshop.

7. Krita

Krita is a painting program and is open source. It was created by artists and is geared toward artists. You can download the program from the Krita website. The program allows you to create drawings on your computer, much in the way that real drawings (with paper and pen or pencil) are created. If you have a Graphics tablet, the program works especially well.

8. Sculptris

Sculptris is a 3D sculpting program available from Pixologic. It uses technology that professional 3D-modeling sculptors use. The whole package is a pared-down version of an all-in-one-digital sculpting solution called ZBrush (also by Pixologic), but this doesn’t mean it’s not possible to use Sculptris to create some pretty amazing things — great for those thinking about investing in ZBrush, who want to see how the software works.

9. Inkscape

A vector graphics editor, Inkscape allows you to “Draw Freely” as the advertising proclaims. It is comparable to Adobe Illustrator.

The program was created by developers for professionals and amateurs alike. Those who can benefit from this software include classic designers, web designers, illustrators, and anyone else interested in vector imagery. A broad array of structured drawing tools are available for a clean and neat final presentation.

10. Scribus

Scribus is a desktop publishing package that can produce a range of excellent results in terms of type- and image-setting. It is a top-notch DPT program for PDF and animated presentations as well. Create and arrange typesetting, layout, and much more.

Keep in mind that many of these applications can also be used on Macs or with Linux. Applications that are Mac compatible include:

  • Sculptris
  • Krita
  • Scribus
  • Inkscape
  • Audacity
  • SketchUp Make
  • GIMP
  • Blender
  • DaVinci Resolve
  • Apache OpenOffice

Applications that are Linux compatible include:

  • Krita
  • Scribus
  • Inkscape
  • Audacity
  • GIMP
  • Blender
  • Apache OpenOffice

Are There Any Other Free Application Options?

In addition to the ten free applications listed above, there are also two other, runner-up free applications you might consider.

Bonus App #1: Fusion from Blackmagic Design

This is a motion graphics program and compositor for both 2D and 3D design. Just make sure that you have strong enough capabilities with your PC as this program has specific requirements.

Bonus App #2: Autodesk 123D

Finally, here’s another 3D modeling option that is free for users of all ages. Autodesk 123D offers a variety of packages for assistance with 3D modeling that can create jewelry, home décor, Minecraft models and other toys, and much more. For industry, the models created with Autodesk 123D can be used in a variety of settings as well.

If you are interested in any of the areas listed above — illustrating, 3D modeling or sculpting, sound editing, video editing, image editing, or word and data processing — be sure to give these free applications a try on your Windows computer. These free versions were created by professionals to be open source for use by everyone and anyone, so take advantage of the technology and get creative!

Cape Cod Community College Hit With $800,000 Phishing Attack

Cape Cod Ransomware Attack

Hackers Know How to Steal Money Anonymously

In West Barnstable, Massachusetts, Cape Cod Community College recently fell victim to a phishing scam that resulted in the school losing more than $800,000. The money was taken out of the school’s bank accounts. While this kind of scam is common these days, there are measures a business can take to prevent it. In the case of Cape Cod Community College, experts believe endpoint security solutions using next-generation technology would have prevented the monetary loss for the school.

Cape Cod Ransomware Attack

The hackers of today are quite sophisticated, and if a business falls victim to one of their scams, there is often very little they can do about it. Hackers know how to remain anonymous, and leave few if any, digital footprints to follow. This means the likelihood of recovering one’s money is little to none. That is why it is so vital to prevent these things before they happen by using proper technology.

The president of Cape Cod Community College, John Cox, revealed the financial loss via a digital theft to the staff and faculty of the school in an email on December 7. By working with the bank at which the school’s accounts were held, the school has been able to recover about $300,000 of what was stolen, which is more than most smaller businesses would be able to do. It is unlikely they will be able to recover the entire $800,000, but they might be able to get some more of the money back by working closely with the bank, as they are doing.

Details of the Digital Theft

Cox gave an interview with a local newspaper after informing the workers at the college of the theft. In the interview, he revealed many interesting details about the theft, including:

  • The email that allowed hackers access to the school’s bank account information appeared to come from another college, so it seemed safe to open the attachment that came with it.
  • After opening the attachment, the person who initially opened the email believed the attachment was suspicious and alerted the school’s IT department. Alerting the IT department is standard protocol at the school when it comes to suspicious emails and attachments.
  • When the IT department did a diagnostic on the attachment, they found a polymorphic computer virus embedded in it. They quarantined the virus, but it had already gotten into the school’s computer network.
  • The scammers had a fake URL that seemed to go to TD Bank, where the college has its accounts. By placing phony calls to school employees to validate transactions, the scammers were able to make nine transfers out of the college’s bank accounts, totaling $807,103.
  • The scammers attempted 12 transfers, but workers at TD Bank recognized three of them as suspicious and did not allow them to go through.
  • Cape Cod Community College has recently installed next-generation endpoint protection software, but only on some of their computer networks. If it had been installed on all of them, the hackers likely would not have been able to gain access to the school’s bank account information and use it to transfer out the money.

Other Schools Have Had This Issue, As Well

Cape Cod Community College is not the only school to have this kind of issue in recent times. In June of 2018, hackers stole around $1.4 million from 21 account holders in the Connecticut Higher Education Trust.

Hackers are not just after money, either. They are out to cripple the schools they target. Sometimes, they don’t steal any money at all, but instead, generate outages of the computers at a particular school. This happened to a college in Wisconsin in June of 2018, and it resulted in classes having to be canceled for three days because the computer infrastructure to support the classes, students, and employees wasn’t there.

It hasn’t just been colleges being targeted, either. K-12 schools are also targets. A public K-12 school in New Jersey lost $200,000 in September of 2018 in a phishing incident similar to the one experienced at Cape Cod Community College.

Technology Companies are Stepping Up to Help Prevent This

Technology companies are stepping up in light of such incidents, creating phishing simulators to help schools teach their employees to avoid allowing their workplaces to become the next phishing victims. They are also reaching out to schools to increase awareness of the need for next-generation endpoint protection software, and to help schools install and use it.

Happy National App Day: December 11th

National App Day

Even though the word App is relatively new, it has become popular in everyday terminology as its uses have changed lives in the modern world. Almost all mobile phones are now smartphones, so even those individuals who were apprehensive about using new technology now use apps on a daily basis. That is why we now celebrate National App Day every year on December 11.

National App Day

What is an App?

The word “App” was listed as the word of the year by the American Dialect Society in just 2010, showing just how quickly apps have become a regular part of society. But people already use the word so much they don’t really think of where it comes from. While the term “app” is short for “application,” common usage has changed the meaning.

An app is actually a kind of computer software or a program, and now usually refers to a very small one used on mobile devices like smartphones and tablets. Initially, the term could have meant any mobile or desktop application, but the term has quickly evolved to conform to the way people use it. Now there are thousands of apps, and some individuals and businesses design and run their own apps to make specific tasks easier.

Kinds of Apps and Main Uses

There are three basic kinds of apps, but Web Application Apps are used through a browser and Hybrid Apps have characteristics of both Web Application Apps and Native Apps. Native Apps are the ones used on mobile devices, and they only work on certain devices and have a special source code.

Of course, once someone understands how apps work they can create a new one to perform specific functions. Apps are available on Google Play for Android users, Apple’s App Store, the Windows Phone Store and BlackBerry App World. There are currently millions of apps, and prices range as widely as uses. Some apps are entirely free, while others have a recurring rate.

  • Apps can be used for communication, including encrypted phone calls or video phone.
  • Apps can be used for entertainment, providing movies, books and music.
  • Travel apps provide needed information and tools, helping with everything from transportation to finding the closest restaurant.
  • Many people use apps for games, playing simple games like solitaire or complicated games with players around the world.
  • Many apps provide important tools, helping people organize their homes or perform essential functions at work.

There is no reason to think the proliferation of apps will slow down any time soon, if ever. It only remains to be seen how many people will adopt these handy tools to perform more and more specific jobs. Hopefully, people will be thinking of the endless possibilities as they celebrate National App Day on December 11.

Is Your Tech Firm Conducting Quarterly Technology Reviews?

Quarterly Business Reviews

No matter the line of business you’re in, outsourcing your IT services to a managed service provider (MSP) provides a world of benefits. Both your internal systems and your online presence will be optimized and streamlined, tech problems will be taken care of right away, and you’ll have more time to focus on what matters.

Quarterly Business Reviews

Aside from providing excellent customer care and competency in their field, great MSPs employ the best IT experts, are there for you when you need them, stay up-to-date on new technology, and … they do one other important thing.

They conduct Quarterly Technology Reviews.

What are Quarterly Technology Reviews?

Quarterly Technology Reviews or QTRs are meetings your IT services company regularly conducts with you to assess the effectiveness of your current tech investments and themyour managed service provider.

A QTR occurs quarterly or four times per year, and it’s up to your MSP to book the appointment; you shouldn’t have to. When you see that your MSP is taking the initiative with QTRs, it’s a great sign that you’re working with a leading company. At a QTR meeting, you’ll be able to provide feedback to your MSP about the service they’ve been providing and the technology you’ve been investing in.

What are the specific benefits of a Quarterly Technology Review?

For you, the client, the benefits of QTRs are numerous. You’ll have an open platform to discuss any bugs or issues you’ve been having with your technology or possible problems with computer systems, email, the website, etc. Just remember that for immediate problems, you shouldn’t wait for the QTR and should merely contact your MSP right away — that’s what they’re there for.

In the end, if your MSP conducts QTRs with you, your business will see the following benefits:

  • Improved current technologies and/or the implementation of new systems where needed
  • Saved money when you limit spending where it’s not required
  • Enhanced compliance with regulations and security
  • Improved productivity
  • Streamlined efficiency

For your MSP, the most significant benefit of Quarterly Technology Reviews is showing you that they care and are monitoring your success. This goes a long way in maintaining their clientele.

QTRs also allow a tech firm or MSP to highlight your company’s return on investment or ROI (your investment being them, for the most part). As a client, they want you to be alerted to the fact that their company cares about you and that their services are worth it. Whether there are problems to fix at a QTR meeting or not, your MSP wants to reiterate that you need them.

This isn’t necessarily a bad thing for you, the client. After all, you hired them and are paying them for their services. Allow them to show off for you, and don’t be hesitant about voicing any issues you have so that they can be fixed quickly. A tech firm who conducts QTRs with you wants to keep you as a client.

When will your first QTR meeting be as a new client?

Naturally, as a new client, you won’t have a quarterly technology review right away.

Even after a few months post-contract signing, there just won’t be enough time to verify that your new systems, technologies, and other implementations are working correctly and providing you with the necessary benefits.

Therefore, your MSP will likely schedule your first QTR for at least 90 days after you go live.

But keep in mind that your MSP shouldn’t wait too long to conduct your first QTR. After all, the first review meeting is the most important because most problems will have become evident at this time.

While you can certainly contact your MSP right away whenever you need them throughout the first 90 days, as a client, it’s likely you’ll feel better bringing up issues in a formal meeting — especially when the problems are rather large or pervade several types of technology.

You want to know that your MSP is on the ball and ready to ameliorate any issues right away.

Where are most QTRs held?

In a perfect world, you’d meet one-on-one, face-to-face with your MSP for your quarterly technology review. However, this won’t necessarily be possible, and that’s probably okay.

After all, if your MSP has numerous clients and is conducting QTRs with everyone, they would always be at QTR meetings. And on your end, too, you’ve got work to do and may not have time to schedule formal sit-down meetings four times a year — just to check-in on technology that’s already been established and working.

Instead, it’s likely your first QTR will be face-to-face, if possible. If you’re a large client, your MSP should definitely make this effort. After that, however, most QTRs are held via video or phone conference.

In the end, Quarterly Technology Reviews remain one of the absolute best ways to stay in touch with your MSP about the efficacy and benefits of your current technological investments. As you search for a high-quality managed service provider in your area, be sure to ask about QTRs. Those companies who provide them are likely to take a better interest in their clients’ success — and that means good things for you.

How Does Managed IT Services Save You Time & Money?

Managed Services Saving Money

Anyone who owns or runs a business knows that there is always more work that could be done, and there are almost endless ways to improve or help the business. Running a business is a full-time enterprise, and a good leader will need to learn how to be efficient to meet the company’s goals.

Managed Services Saving Money

The bottom line is crucial to keeping any business alive. Resources are by nature limited, so it is essential in saving money without sacrificing quality or results. IT is one of the areas which, if not managed correctly, can cost unnecessary time and money and lead to problems down the road. Using managed IT services is a way that many businesses save time and money, protecting their investment while offering more efficient services.

How Managed IT Services Save You Time

As a manager, you need to use your time in your business. Your business is your business, and other issues and problems keep you from doing the important and necessary work you do every day. Companies have become increasingly dependent on tech, using it for everything from human resources to security to finance or manufacturing. Unless your business is IT, you probably don’t know how to manage, troubleshoot and upgrade all those systems without help.

You are probably like most people who try to fix computer problems yourself first. If your solution doesn’t work, you may have made it worse, and you may have just wasted time spent trying to diagnose your own computer problems. If you use specific IT vendors for certain tasks, you probably spend too much time talking to them and trying to get them to fix your problems.

With managed IT services, you have a system where problems are assigned to technicians who are professional in their field. They don’t spend as much time working on a solution, because they have experience with those kinds of problems and have a pool of experts to call on. Your business isn’t left waiting while you try to solve computer issues. Perhaps more importantly, your clients and customers don’t see the chaos which can be created when you are struggling with problems outside your area of expertise.

How Managed IT Services Save You Money

While your company has its own values which define it, such as the core values which define your vision, you also cannot stay in business forever if you’re not making money. That means not funneling money down an endless black hole when you encounter a security breach or a problem with your hardware or software.

When you use managed IT services, you get the benefit of all the experience your IT service has. With the best IT jobs being competitive, you can choose an IT company which has recruited the best of the best. Instead of paying these top techs full-time salaries with benefits, you only have to pay for the services you specifically order. The IT company makes sure they are compensated as needed so they can help a broader range of clients.

You can choose the level of service you want and what kinds of problems you need help with. When you need an upgrade or new software, the IT company can seamlessly install the new product and assist if training is required.

Employee Tech Preferences

Surprisingly, the people who work at your business probably already have brand loyalty as far as the kinds of tech they enjoy using. Many of those who work in business bring in their own tech when possible, or introduce tech they are already familiar with to the company. This is especially true for those who work from home.

As long as everyone is able to communicate their needs, this is actually a positive thing. If employees collaborate, they can usually find common ground and solve their problems more efficiently. Almost half of professionals or business team members have introduced technology into the workplace, meaning they brought in products which work for them and which they’re comfortable with.

Flexibility is an excellent quality to have while working out any conflicts you have when personal tech is integrated into the workflow. In the end, you may have to make compromises or force some changes. Using managed IT services may also solve some of these problems as the wide variety of experienced techs may have more familiarity with popular alternatives. The most important thing is making sure that you are taking advantage of the resources you have while giving your employees the job satisfaction they deserve.

A Quick Guide For Buying A New Home Computer

Purchasing a new home computer

Looking for a new computer for your home office?

Purchasing a new home computer

Year-end sales and tax returns often lead to boosted sales in computers. But purchasing a new computer can feel overwhelming. The technology changes quickly and the jargon can be confusing. Here is an explanation of what you want to consider when looking at getting a new home computer.

Central Processing Unit: The faster the CPU (central processing unit), the faster your computer can complete tasks. Currently, the i5 and i7 for Intel are the best choices for average users. The i9 is likely too expensive for the value, but the i3 is pretty low end. The number of cores tells how many parts are doing different functions, so getting a CPU with multiple cores is a good thing. The CPU is really the backbone of the entire computer and an inferior processor is going to limit any other features you get. Start with a robust system.

Storage/Disk Space: The disk space on your computer is what stores your information. There are both solid state drives (SSD) and hard disk drives (HDD). The SSD is far faster than HHD and purely electrical (no moving parts). You want to get a drive that is at least double the amount of space you are currently using, with most getting 500GB or 1TB (1,000GB) of storage. You can also get external drives that plug in when needed and store information or pictures in a second location as a backup or to free up space on your computer.

Memory (RAM): To support newer OS and programs, you will want at least 8GB of RAM. This is how your computer operates temporary tasks quickly. If the RAM is used up because the computer too many things are running at once, a temporary working space has to be set up in the storage system. Too little RAM and you will notice the sluggishness. You can’t have too much and there are options for 24GB, 32GB, 64GB or more.

Operating System: Whether you are going with Mac or Microsoft, you will want to make sure you get an updated version on your system. For MS, Windows 10 offers Home or Professional versions. You really only need the professional OS if you are joining your computer to a corporate network. The operating system is going to dictate a lot of the programs you can use, the control you have as the computer administrator and the interface you are working with on the computer.

Support: You can get warranty protection when you are purchasing your machine. You will want to look over what the fine print says and what the warranty includes. A one-year warranty is enough in most cases—just something to make sure the computer isn’t wired wrong. A security system for anti-virus protection is also something you should have included. Some of the excellent AV systems include, Panda, MS, Trend Micro, Bitdefender, Webroot, ESET and F-Secure. Watch out because many anti-virus software is subscription based and you will only be given one year of a subscription before you have to decide if you are going to pay for the security service or not.

Extras: Depending on what you want to use the computer for, you will want to consider what extra features come with your system. The optical drive is going to include CD, DVD, Blu-ray or a combo. Some computers now aren’t including drives at all since so much is downloaded, but buying an external drive is relatively cheap and plugs in quickly when you need it. Some computers come with special graphics cards for gaming or art programs. Many computers now offer WiFi connectivity, but not all provide a hardwired port for a direct internet connection. The programs you need are another point to consider and some computers will even come with some software pre-loaded. Most computer deals are really going to try to wow you with the “extras” you receive. Most of the time, the extra software is only going to be a subscription for one free year. One year after the computer is purchased, you may lose your access to those programs and have to pay to get them operating again on the computer.

If you are looking for IT support, call {company} first. We help small home businesses and large corporate offices outsource their tech for additional support as needed. Let us make your computing smoother, easier and more efficient.

Thinking About A New Home Computer? Tips & Ideas

New Computer For Home

As the year-end sale adverts come flooding into our Inboxes and delivered to us in print form, it can often be confusing as to which computer you want to buy.  Here is an explanation of most of the jargon you’ll want to compare when looking at pre-built computers.

New Computer For Home

Processor / CPU: This is the “Central Processing Unit” or otherwise the “main chip” of the computer.  The faster the CPU is, the overall greater speed at which the computer can complete tasks.  The CPU speed is measured in gigahertz (GHz).  Modern CPUs will have a number of “cores” built into them.  Grotesquely oversimplifying it, a core is a processing unit of CPU.  One physical CPU chip, that you can hold in your hand, will have multiple cores.  All cores work together to complete the functions the computer has to do (running Word, browsing the web) – think of the phrase “many hands make for short work”.  It’s common for a CPU to have 4, 8 or more cores.  Each core can also support multiple “threads”.  Think of a core as a person and each person can do up to two things at once.  It’s easy to get too deep in the weeds.  You will want an Intel i5 or i7 CPU.  Intel makes an i3 CPU but it’s low end.  Intel is on their 9th generation of CPUs: i3, i5, i7 and new this year, the i9.  It doesn’t make sense to get an i9 CPU.  Sure, it has the fastest running speed at 5GHz but speed:price is extremely high.  An i5 or i7 running at/near 3GHz+ is what you’re looking for.  AMD is Intel’s direct competition.  The CPU to look for from AMD is their Ryzen family of CPUs.

Hard Drive Storage:  Disk space for storing user-generated content (Word, Excel, Outlook files) and installing programs to is what I’m referring to here.  Not to be confused with RAM.  RAM is volatile – meaning, when you turn off the computer, everything in RAM is erased.  Disk storage is non-volatile.  The two types of disk storage are solid state drives (SSD) and hard disk drives (HDD).  SSDs are new in the past few years and are extremely fast compared to a (now what we call “legacy”) platter, aka HDD, drive.  HDDs are mechanical – meaning, they have little platters that look like CDs that are enclosed within the disk enclosure and a head, sort of like a record player, reads the content off the platter as the platter spins at 5,400, 7,200, 10,000 or 15,000 RPMs.  Desktop HDDs are in the slower range of RPMs.  Even a fast HDD can’t compare to the speed of a SSD.  SSDs are purely electrical – no moving parts.  Navigating and playing an MP3 is faster than navigating and playing content on a reel-to-reel system.  Once again, mechanical vs electrical.  When looking for a new computer, spend a few extra dollars and opt for an SSD.  Storage capacity is measured in gigabytes (not to be confused with gigabits) or GB for short.  If your home PC has 1,000GB, also called 1TB (terabyte) for storage and you’re using 50% of that or, 500GB (roughly) then when you get another PC, you’ll want to get an SSD with 500GB or more.  Manufactures are still using the “Hard Drive” nomenclature to describe SSDs as well as SSD’s replacements: M.2 drives.  Briefly: M.2 are basically the same as SSD – just a much smaller physical size and usually faster than SSDs.

Memory (RAM): With Windows 10 you’ll want at least 8GB of RAM.  RAM is the temporary work space the CPU uses to perform tasks in very quickly.  When the RAM is all used up (meaning the computer is working on a lot of different things all at once and it needs temporarily space to work in) it then creates temporary working space within the storage system.  Ideally, you’ll want enough RAM to never have to use your disk storage as RAM but often times the consumer doesn’t want to purchase 24GB, 32GB,64GB of RAM, or more, to accomplish this goal.  Years ago, when HDDs were “king”, you could always tell the time when the computer began to use temporary swap space on the HDD because the machine felt “slow”.  Now with the introduction of SSDs, this is hardly ever noticed.  RAM is faster than SSDs.  RAM is also measured in gigabytes (GB), the capacity, and megahertz (MHz), the speed at which it runs.  You can never have too much RAM but you’ll definitely feel it when you have too little.  Start with 8GB as the minimum.

Video Card:  With general business use, excluding CAD, medical and other specialized fields, the built-in video card of the computer is sufficient for use.  The exception comes in when you want to hook up multiple monitors to the computer.  It can get confusing when hooking up a new monitor to an old computer and vice-versa.  With today’s modern computers you’ll want to make use of HDMI or DisplayPort connections.  These are digital and send a very clear, crisp picture to the monitor.  If the monitor supports this format then you’ll want cables for this.  Most computers will have the ancient VGA, analog, output port as well as a modern type plug.  Some monitors still support VGA and some only support new hook up types.  You’ll need to pay attention to this: computer output vs monitor input.  There are always adapters to convert if needed.  Next is the video card itself.  If the computer has discrete graphics, meaning an add-on card, it will either be from Nvidia or AMD.  In the NVidia family you’ll want something in the GeForce 1050+ family.  In the AMD camp, you’ll look for Radeon 500 series.  And of course, the graphics card also has RAM on it.  This really only gets important when you’re gaming or using one of the specialized fields mentioned above.  Built-in graphics, meaning the graphics chip is soldered to the motherboard, are usually of the Intel brand, but others do exist, including AMD and Nvidia.  For the Intel family of built-in video cards, you’ll want something in the 600 series.

Operating System: Windows 10 – do you go with Home or Professional?  The difference is that if you’ll be joining the computer to a corporate network, you’ll need Pro.  Otherwise, stick with Home.  There are no performance gains or losses for either version.  I doubt you’ll find a new computer with Windows on it that is not 64-bit, but I’ll just throw this in to make you aware of it.  You’ll want the 64-bit version of Windows.

Optical drive: This is in reference to your CD, DVD, Blu-ray or combo there of drive.  It used to be common to always include an optical drive in a new computer but now everything is downloaded so use of this technology is fading – fast.  More than likely the computer manufacturer will include this in their build.  If you absolutely need an optical drive and the PC you want doesn’t have it, it’s simple to buy an external unit and plug it in when needed.  If you keep important backup files on CD or DVD, you’ll have to have an optical drive (optical drive means it shoots a laser at the media in order to access data stored there on.  Not to be confused with a hard disk drive which uses magnetism to access data on its medium.).

Office:  You will want to get Office 365 Home.  It allows you to have the Office suite of applications at your fingertips.  It allows for 5 installs of the suite using one license.  It’s $99/year.  If you don’t want the recurring payment and if staying current for the latest version of Office isn’t important then do a one-time buy of Office 2016 or latest version, 2019.  That will cost you approximately $230 to $400 depending on which Office suite you need.  These can both be purchased from the Microsoft store after time of purchase.  Amazon also carries the one-time-purchase version of Office.

Wireless:  Wireless connectivity makes connecting to your home network easy if a wire doesn’t already exist.  Wireless, by nature, will incur a slight lag in the connection compared to a hard-wired system.  Will you notice that lag?  Really only if you’re playing an online game.

Warranty Support:  Personally, I never buy the “big box” add-on warranty at time of purchase.  The only warranty I will ever get is from the manufacturer.  If purchasing your computer directly from the manufacturer, read the fine print on what each warranty plan includes.  Normally, a one-year warranty is enough: if the PC doesn’t die within 90 days of turning it on, it holds a strong chance it will live many more years.  This used to be especially important and true of computers with, legacy, HDDs.  If the price is good on the warranty, go for it.  With Dell, and probably with others, you can buy a machine from a big box store and then purchase an additional warranty from Dell just as you could if you were to have bought from Dell direct.

Anti-Virus:  Go with a good anti-virus (AV) system right off the bat.  What are good anti-virus systems?

Webroot, ESET, Panda, F-Secure, Trend Micro, Bitdefender and believe it or not, the Microsoft built in AV.  Microsoft has really stepped up their game of late.  Ones to avoid: McAfee, Quick Heal, Emisoft, Kaspersky Lab, K7, Norton, Symantec.