Selecting The Right Business VoIP Provider [2019 Guide]

Business Phone Systems

Business Phone Systems

To experience growth and stay relevant in their given industries, companies rely on productivity-enhancing and cost-effective communication systems that provide a robust, efficient platform for critical interactions, both internal and external.

Voice over Internet Protocol (VoIP) systems have risen to the forefront as a viable communication solution for businesses of all sizes, replacing traditional telephone systems and securing a spot as a standard for communication in the professional world. While VoIP systems require an Internet connection to operate, they can support high-quality long-distance calls while offering a number of other modern features, including integrated video conferencing, file sharing, and call recording.

Selecting a suitable service provider to set up and manage your VoIP system is an important decision, but if you know what you are looking for, the process becomes significantly simpler. We have organized the following list of criteria to guide you in picking the best VoIP service provider for your company.

Affordable Cost

Cost is an important factor in the decision-making process. Different vendors will have varying prices for the system hardware and installation, as well as a range of rates for managing, updating and maintaining a VoIP system. You should take stock of your company’s communication needs, as well as the budget you have available for meeting them. Keep in mind that with a quality service provider, you should not have to pay hidden service fees or extra chargers for standard features, including conference bridges, voicemail boxes, auto attendants, custom messages, and ring groups. Avoid VoIP providers who are not upfront about the costs associated with their technology and services.

Robust Cyber Security

Advanced security features should be a given. Even small- and medium-sized businesses can be targets of cyber attacks, including malware, phishing scams, and other viruses, which threaten their infrastructure and information. According to the U.S. Computer Emergency Readiness Team, VoIP, which relies on an Internet connection, “may be vulnerable to many of the same problems that face your computer and even some that are specific to VoIP technology.” Your VoIP service provider should be well aware of risks associated with this type of technology and ensure you have access to cutting-edge security features that protect your organization from cyber threats.

Call Management

A basic feature offered by top-notch VoIP providers is call management. This can include a number of functions that benefit your business, including call waiting for service, caller ID, call forwarding, voicemail, dial-in directories, call blocking, and other basic calling options. When shopping around for a provider, find out what call management options they offer that will be convenient and helpful for your organization’s employees.

Reliable Support

You should be able to access and use your VoIP system for business operations consistently and without delay. That is why a quality VoIP provider will emphasize a high level of uptime and round-the-clock technical support, which includes monitoring and maintenance. You should be able to reach your provider via email, phone call, or live chat when you need assistance with your service or encounter technical difficulties. Another important aspect of customer support is a plan for disaster recovery, in case you experience a system failure or other emergency. VoIP providers should have intensive protocols in place to quickly address the issue and get you back on track without losing valuable time or important information.

Intricate Integration

Any cost-worthy VoIP service should offer organizations more than the simple ability to make calls. To enhance productivity and efficiency, you should be able to integrate company smartphones, since many people rely on their mobile devices to do business outside of the office. You also should pick a VoIP provider that allows you to integrate your system with existing third-party processes, applications and extensions, including Google Drive, Dropbox, Salesforce, Desk.com, and office software, among others. Without easy integration, you could face the resource-intensive task of transferring business data or creating new databases.

Unified Communication

Unified communication is another industry standard that you should keep in mind when searching for the right VoIP solution for your company. Unified communication is a feature that allows you to integrate a variety of communication methods into a single system, mitigating your need to open separate apps or windows. Some of the communication methods you will likely want to access from your unified platform include email, video call, voicemail, and conference calls.

Local Area Codes and E911

You do not want clients, business partners, or other individuals to incur a charge when they call you on a traditional telephone system. That means you could look for a VoIP system that supports local area codes. Additionally, your provider should offer enhanced 911 (or e911) service, which enables emergency service dispatchers to automatically locate a caller’s geographic location.

Sound Quality

In this day and age, there is no excuse for subpar audio when using modern technology for business communications. Quality VoIP providers should be able to ensure high sound quality, as well as a guarantee to address technical problems if you experience choppy audio.

Obviously, there are numerous factors to consider when you are searching for the best VoIP system and service provider for your organization. Working alongside experienced IT consultants or information service providers can help you select an option that fits well with your existing communication systems, serves your professional needs, and stays within budget.

How Advanced eDiscovery In Microsoft 365 Helps Manage Data

Microsoft Office 365 eDiscovery

 

Do you have a lot of data?

Are you able to organize your data in a convenient logical way and then search for it with ease and/or with advanced search criteria so that the results are not in the hundreds but in the tens or less?

Is managing it or finding specific data at any given time proving time-consuming? Does that consumption of time eat into your budget?

If any of this is true, you may need an advanced program, something like Advanced eDiscovery that you can use via your Microsoft 365 subscription. It’s great for lawyers and it’s great for just about anyone else in any other industry who needs a better way of managing data.

Here’s how

Advanced eDiscovery helps people like you manage data.

What is Advanced eDiscovery?

First, what is Advanced eDiscovery? You may already be familiar with eDiscovery. eDiscovery is software that helps you process and collect information in a digital form or from digital sources. Examples include:

  • Emails
  • SMS
  • File Shares
  • Web pages
  • Social media
  • Other online documentation

eDiscovery allows you to search and put together information and unstructured data with relative ease. You can also search, tag, review, organize, analyze, and/or export it whenever necessary.

Office 365 Advanced eDiscovery is the next level — it fills many of the gaps left by eDiscovery and incorporates Equivio Zoom technology — Microsoft acquired Equivio in January 2015. Advanced eDiscovery, by optimizing the powerful tools provided by Equivio technology, makes managing data and gathering things like evidence much more efficient and intuitive.

What features does it offer?

The powerful features presented by Advanced eDiscovery include some of the following capabilities:

  • Powerful search capabilities that allow you to:
    • search documents stored within Office 365 as well as information and data outside of Office 365,
    • search using keywords and/or specific conditions defined by the program or added by the user,
    • identify information that is redundant or duplicative,
    • determine the relevance of using advanced predictive coding, and
    • apply tags to in effect label certain documents under one theme.
  • Intuitive organizational capabilities that allow you to:
    • cluster or group information from relevant topics,
    • define who has access to the data or allow only certain persons to view information, and
    • set up notifications.
  • Extensive analysis, reporting, and exporting capabilities that allow you to:
    • analyze data using different criteria,
    • filter information into a specific package using tags or labels that the user created, and
    • generate reports that can be submitted to government agencies or other legal institutions.

How does Microsoft Office 365 Advanced eDiscovery help manage your data?

Managing data is all about the above-mentioned features. Using these features, you can prepare a case, process it, analyze information and data, determine and save what is relevant, create reports, and export information, data, and/or reports.

The following is a breakdown of steps you would typically take when using Microsoft Office 365 Advanced eDiscovery to manage a new set of data:

  • Step 1: Conduct a search and pair down the information by about 60%. You can use different modes and themes to narrow the search.
  • Step 2: Click on the Relevance tab to mark each entry as R (relevant), NR (not relevant), or Skip (for later determination).
  • Step 3: Decide if you should move forward by clicking on the Decide tab.
  • Step 4: If you want to create a package to send to another party, you click on the export tab.

Microsoft Office 365 eDiscovery

Advanced eDiscovery is all about helping users assess their position, protect data and information, and respond to requests for data, information, or compliance issues, among many other uses. There’s a lot to learn about Office 365 programs. It offers a lot of tools, but you can’t build if you do not know how to use the tools. Return to this blog regularly to learn more about these tools to make your professional life more efficient and productive.

Can 2 or More Monitors Increase Staff Productivity?

Multiple Monitors

Multiple Monitors

Looking for ways to help your team accomplish more? Consider equipping their workspaces with additional monitors. Skeptics are likely shaking their heads at this, wondering, “Will that really improve productivity, or only give my employees an extra incentive to stream videos or play games? Aren’t more screens just a recipe for distraction?” Believe it or not, business leaders recommend providing your employees with two or more monitors. Here are just a few reasons why multiple monitors should be on your radar screen:

Digital Decluttering

It’s well-known that a messy workspace typically leads to chaos and confusion. Working at a crowded or disorganized desk requires you to navigate piles of paperwork or jumbles of office supplies to get things done. A cluttered desktop computer has the same effect. An abundance of icons and open tabs creates headaches for your team, while a second monitor keeps apps and programs organized.

Higher Productivity

Industry leaders report that productivity increases with two or more monitors. Users can navigate multiple applications efficiently, view more information simultaneously, and customize each monitor’s layout– with different landscapes and resolutions– to optimize ease-of-use.

Most modern computers are designed with multiple-monitor systems in mind. That means your employees can enjoy the benefits of added data availability without having to learn a new software program or spend valuable time configuring a new system. Those advantages alone are enough to boost productivity and streamline workflows. It’s also worth mentioning that Windows automatically “remembers” which monitor you last used to open a program, defaulting to that screen when you need to access the program again. When you’re multitasking or working on a big project, you can keep application accessibility consistent to maximize efficiency.

Versatility

Multiple screens prove invaluable in a variety of occupations– from graphic design to market analysis and stock-trading. You can easily make use of multiple applications and copy, paste, and edit data and images when you have access to more than one monitor. If your marketing team uses social media to promote your brand, they can reserve one screen for Twitter and Instagram and keep other documents open on another.

Likewise, if you must frequently respond to email, you can glance up from your work occasionally to check the other monitor for new inbox arrivals, rather than having to toggle back and forth within one screen, which can make digital correspondence more of a distraction than it has to be.

Workstations with extra monitors are also helpful for people who use laptops and need to frequent multiple workspaces throughout the day. Some companies provide “docking stations” where employees can connect a laptop to multimedia equipment– such as a monitor, speakers, and wireless keyboards– to access data, utilize a particular application, or perform other tasks. This is more cost-effective and efficient than providing each employee with a desktop and a laptop.

Data-Sharing and Referencing

When meeting with colleagues, you can effectively keep them “in the know” by enabling them to view the same information simultaneously. Whether you’re presenting information to a small group or a larger crowd, multiple monitors can be adjusted to display information from different angles, making it highly-visible to everyone. Similarly, if you are communicating with clients and vendors, you can track inventory or an order’s status without putting people on hold while you look up the information.

When preparing reports, you can have a PDF or HTML file open on one screen for reference while you create a Word document or Excel spreadsheet on another. If you have more than two monitors, you can keep other pertinent information within easy reach, too, allowing you to transition more smoothly from one task to the next.

Collaboration

When teleconferencing via Skype or a similar app, you can make your data visible to colleagues while still communicating almost as though you were face-to-face. Displaying data on one screen while video-chatting on another allows you to keep the interaction personal without compromising data accessibility.

The idea of providing multiple monitors for your staff may seem counterintuitive at first, but the advantages outweigh potential drawbacks. When you make dual-monitor systems a staple of your workplace, using them will become second-nature, especially when you see how they make it possible to move so effortlessly from one application to another. This low-maintenance solution gives your team the opportunity to get more accomplished in less time and paves the way for better communication and collaboration. All these benefits can go a long way toward improving morale and serving as a catalyst for enhanced creativity and innovation.

A Look At The 2018 Cybercrime Stats

2018 Cybercrime Stats

2018 Cybercrime Stats

What Is the Big Picture in Terms of Cybercrime in 2018?

The past few years have revealed trends that show us cybercrime won’t just go away. The following stats put the breadth of the threat into perspective:

  • Cybercrime was the 2nd largest crime in terms of the number of incidents reported.
  • Cybercrime accounts for more than half all criminal activity in the U.K.
  • An attacker is present in a network an average of 146 days before getting caught. That’s enough time to get what they need without getting caught.

What Did Cybercrime Cost in 2018?

With technology continuing to advance in favor of cybercrime, 2019 is likely to see its share of hacking headlines. The Cyber Security Breaches Survey revealed that 43 percent of businesses experienced some kind of cybersecurity breach in 2018. California alone lost $214 million to cybercriminals.

VPNs are one way people try to protect their online privacy, but user behavior continues to counteract the best firewalls and security strategies. For example, despite knowing the risks of clicking an unknown link or email, many people do so anyway.

What is a Cybercrime Platform?

The cybercrime economy mimics the global economy’s shift towards a platform model. This mirrors the legitimate shift to social media, Amazon and Google. Platforms connect retailers and consumers and give people a place to interact in other ways. Unfortunately, this has given unscrupulous people an opportunity to get to know how these systems work and use that knowledge to commit cybercrimes.

What Is the Most Common File Format Used By Cyber Criminals?

Hackers love Microsoft Office file extensions. They know people trust them and are more likely to click on them. Emails are the most common way that cybercriminals defraud their victims, and they do so by sending files with familiar extensions to mask malware and spyware. People use emails every day for all kinds of communications, including very sensitive information. Unfortunately, it’s relatively easy for bad actors to send you an email that opens you up to viruses, identity theft and other risks.

How Are Cyber Criminals Making Money Off Your Computing Power?

Some hackers aren’t interested in your personal information or causing havoc with your sensitive files. Believe it or not, some cyber criminals break into your computer to steal your computing power. They may use these unauthorized resources to mine cryptocurrencies, for example.

One of the latest threats involves the use of your computer or other devices for bitcoin mining. Symantec has reported an increase of 8,500 percent in the number of people caught coin-mining. This indicates that there are hackers dedicated to accessing and using a victim’s computer resources in lieu of stealing personal data.

How Much Money Can a Cybercriminals Make?

The short answer to this is that an individual with the right skills can earn far more via cybercrime than most legitimate lines of work. Individuals can earn about half a million dollar a year by selling stolen data. There are several levels involved, however. Low-level hackers may be happy with petty crimes that put extra cash in their pocket. Highly specialized hackers can make millions working alone or as a team. Generally, though, hackers make about 15 percent more than those in traditional crime brackets. High earners bring home about$167,000 a month, mid-level earners rake in $75,000 a month and at the low end of the spectrum, petty cybercriminals make $3,500 a month. For instance, someone managing multiple card data forums can bring in millions each month.

How Do Hackers Use Existing Platforms to Make Money?

Just turn on the news any given night and you can find stories on data breaches, the bread and butter of cyber thieves. Personal data can be sold as is or used to created bank accounts and apply for credit cards, which are sold for small or large fortunes. Theft isn’t the only crime possible. Major platforms are targeted for the myriad of data they collect. Even Facebook is not immune. It was in the news for a significant data leak in 2018. Yahoo also had a major breach that compromised 3 billion user profiles. Cybercriminals aren’t shy about going after these giants, so it’s up to you to increase your vigilance at home and at the office.

Are Smart Homes Vulnerable to Cyber Attacks?

Smart home devices usually connect to your home network from an outside network. If your router is adequated protected, you’re opening the front door of your home for cybercriminals. With smart home devices becoming more common, savvy criminals are learning to take advantage of their vulnerabilities.

How Construction Companies Can Benefit From Managed IT Services

Construction IT Services

Construction IT Services

Construction companies have specific IT requirements. Time is money in any business, but that’s especially true in the construction industry. You need excellent communication and coordination between management and workers and the ability to oversee contractors and order materials quickly. For that, you need top construction planning software and your company needs a comprehensive IT strategy. Just as you subcontract out certain work in your construction projects because it’s more efficient, your IT needs are usually better served by those who can deliver at less cost and more efficacy.

State-of-the-Art Technology

A managed service provider (MSP) offers clients access to state-of-the-art technology. There is no need for constant tech upgrading and the additional cost on the part of your company when you use managed IT. When your company goes the managed IT route, you also won’t experience any unpleasant surprises when it comes to charges. You pay a fixed fee every month, according to your contract. You can also design the right type of IT management for your construction company, as the MSP does not deal with companies on a one-size-fits-all basis when it comes to IT.

State-of-the-Art Skills

When hiring an MSP, you are hiring expertise. You know that, but you may not realize that circumstances may arise in which your business requires an IT specialist in a particular field. If you rely on an in-house team in which no one has this specific skill, you must either pay for training or hire an expert for this certain task. That’s not an issue with managed IT, as you are dealing with a team with state-of-the-art skills that can deal with your company’s problems as needed. Managed IT offers advantages not only over the costs of an in-house team but means you don’t have to outsource to another entity when problems arise.

Security Issues

Your construction company needs top IT support for security. It’s likely that you have an in-house team  especially one consisting of just a few employees  that does not have the expertise to deal with the latest threats. That means your company’s computer systems are far more vulnerable than you might think. Just as your construction business involves core competencies, security is a core competency of any managed IT company.

How an Outside IT Firm Saves Money

It makes no sense for a smaller construction company to hire an in-house IT expert, but it really does not make sense for most larger construction companies, either. When you have in-house IT professionals, you must pay salaries and benefits. When you hire an outside IT firm to provide services, those items are not your concern. A third party IT provider is probably more aware of the latest viruses, malware, cyber threats and other factors that can harm your system than an in-house team. For those providers, staying abreast of current threats is a vital part of their business. If your system is hacked or otherwise compromised, the outside firm is available 24/7. That means reduced downtime when a problem arises.

Even if you do have an in-house IT tech team, a third-party IT provider is not working on the same projects, and this frees up your employees to focus on your business needs and your bottom line rather than dealing with typical IT administrative tasks or outages. A third-party IT provider deals with troubleshooting, upgrades and new tech implementation, allowing your IT employees to concentrate on your construction projects.

With the money saved by outsourcing your IT requirements, you can direct those funds toward areas most needed by your company.

Company Expansion

Managed IT allows for easier company expansion, especially across state lines or nationally. Managed IT with a cloud strategy avoids many of the difficulties construction companies face if relying on their own technology when expanding. You no longer have to worry about primary office connectivity and loss of productivity due to a local power outage.

Peace of Mind

All sorts of factors affect your construction business and your bottom line. Whether it is a common situation such as materials delivery, the weather, permit delays or equipment failure, or the more exotic, such as discovering human remains or artifacts during digging, you know that complications occur on projects. With all that you must deal with on a daily basis, using a managed IT service for your construction company gives you peace of mind for that crucial aspect of your business.

Australian MPs Concerned After Recent Cyber Attack

Australian CyberAttack

Australian CyberAttack

What happens when Australia faces a cyber attack? The Members of Parliament (MP) jump into action. They are concerned about the breach and they want answers. The MPs require that top officials come before Parliament and the Intelligence and Security Committee to discuss how hackers potentially breached Politicians’ network systems and email.

Anthony Byrne, who is the Labor Member of Parliament, insisted that an explanation be given to him by the Department of Parliamentary Services, the Australian Signals Directorate Director-General, Mike Burgess, and Alastair MacGibbon who is the head of Australian Cyber Security Centre.

What Really Happened?

Despite their best efforts and using all possible resources, Speaker of the House of Representatives Tony Smith and Senate President Scott Ryan said identifying the cause of the incident would take time in a joint statement they issued. Also in the statement, they said at this time, there was no evidence that any data was accessed or taken; however, an investigation would continue to ensure the safety of everyone’s information. The investigation has not determined if the attack was from a foreign entity, but they do know it was a robust attack and not a kid in his basement.

There is great concern that this breach was intended to interfere with Australia’s political process similar to what occurred in elections in the US and France. There has been no proof that this was intended to impact the results of the processes occurring in Parliament. There was also no proof of an intent to influence election outcomes.

Other concerns expressed by the MP is that email went down at three o’clock in the morning, however, no one was notified about the breach until the system was already back online, which was not until nine o’clock that same morning. In addition, they were notified by email about the breach, but they weren’t able to get into their email system.

Actions Taken as a Result of Breach

Everyone has watched on the world stage as countries such as the US have experienced email breaches and the possibility of foreign countries negatively impacting their election outcomes. Even if there hasn’t been breaches, just the threat of them have caused morale problems in the country. Feelings of mistrust are already starting in Australia as many are concerned as a result of the attack and have lost faith that the Department of Parliamentary Services are able to handle these growing threats. They feel as though they may not have the expertise to handle these situations.

It was suggested to all politicians that they change their passwords within the expenses system. This is the system that tracks usage of funding received from the public for work purposes. This action was purely a preventative measure. Many measures have been taken over the years to tighten the cyber defences of Parliament. Despite this, the MPs are greatly concerned about their data.

Are There Other Concerns?

This is not the first time Australian politicians and systems have been targeted by cyber attacks. In 2011, the Australian Prime Minister Julia Gillard’s computers were attacked and Chinese intelligence agencies were thought to be responsible. In 2013, Chinese hackers were blamed for stealing blueprints of Australia Security Intelligence Organisation headquarters, presumably to tap into phone and computer lines. In 2017, defense data was hacked and stolen. In 2018, Australian government took aim at Russia for a previous router attack.

In early 2018, the Australian Cyber Security Centre analysed a cyber attack and found that eight Australian web hosting companies were compromised and allowed bad actors the ability to hack into their customers’ websites. In December 2018, the US Justice Department and UK officials charged Chinese government hackers with indictments. At that time, Alastair MacGibbon, the head of the Australian Cyber Security Centre told thousands of Australian businesses that they may have been hacked by the Cloudhopper epidemic that was plaguing heavy-hitting global IT companies like IBM. Last month, the Australian Cyber Security Centre shared some of their findings, which is that data attacks are on the rise in Australia. In the last quarter of last year, there were 262 breaches and 168 of those were considered criminal.

Most likely, Australian officials won’t publicly place blame, but through media leaks, it may come out that China is to blame for this latest cyber attack on politicians. It has been known for a long time that Beijing has an entire unit in their military that handles these type of attacks as well as stealing secrets. Despite being a covert operation, their name is known. It’s the People’s Liberation Army Unit 61398. Even though it will take a significant amount of time to determine who is behind the attack, because of all the known data and frequent accusations from other governments, it is easy to speculate that Beijing is the attacker.

Whoever is behind the cyber attack, it is believed that they could be trying to gather information on a particular party possibly to discredit them, or just to get what they believe is provocative gossip. They also could be intending to derail a particular campaign’s agenda. Quite possibly, it could be used simply to discredit the entire governing body and create distrust within the general public.

How Compliance Manager With Microsoft Office 365 Works

Compliance Manager

Companies today operate under strict regulatory conditions. Complying with those regulations can be daunting, but failure to do so has serious implications. Managing compliance, therefore, is imperative. Microsoft offers Compliance Manager, a unique cross-Microsoft-Cloud tool, that allows organizations to manage and navigate the complex terrain of regulations. Here is how Compliance Manager works to help your company comply with the law and applicable regulations and standards.

Who is Compliance Manager For?

Compliance Manager is for any company or organization that needs a comprehensive and proactive tool to assess, track, verify regulatory compliance and assign tasks related to the same. Anyone who must comply with regulations or standards like the following would benefit from this tool:

  • EU General Data Protection Regulation (GDPR)
  • Health Information Portability and Privacy Act (HIPAA)
  • International Organization for Standardization (e.g., ISO 27001 and ISO 27018)
  • National Institute of Standards and Technology (NIST)

Essentially, the tool allows you to protect data and meet regulatory requirements via Microsoft cloud services.

What are Compliance Manager’s built-in features?

Compliance Manager features various tools to help your organization comply with regulations and standards pertinent to data protection and security. Here are three specific capabilities featured:

  1. Assessment. The tool allows you to assess compliance from one place. Risk assessments are conducted on an ongoing basis.
  2. Protection. Users can protect data across all devices, applications, and cloud services by using encryption, controlling access, and implementing information governance.
  3. Response. Users can respond to regulatory requests through the incorporation of eDiscovery and auditing tools that allow you to locate relevant data for meaningful responses.

Through these features, Compliance Manager works to help you stay in and proactively manage compliance.

How does Compliance Manager Work?

Compliance Manager works by utilizing a single dashboard to see compliance stature. The dashboard provides summaries of your company’s assessments and action items. From those summaries, you can access controls and tools like exporting data to Excel.

You create assessments for the regulations and/or standards that matter to your company using Office 365, Azure, or Dynamic 365.

From these assessments, you receive actionable insights and detailed information about what Microsoft does to secure your data and help you comply with regulations.

Assessments

On the Assessments page, you are provided snapshots of your company’s compliance with specific regulations and standards — like those listed above — assessments of each.

For instance, compliance snapshots of your company will identify your company’s overall compliance with regulations like GDPR or standards associated with NIST or ISO. Each category is provided a “Compliance Score,” and the higher the score, the better your compliance stature.

On the same page, you are also provided with snapshots of assessments for each of these same categories. An Assessment Status is provided to let you know the status of the current assessment (e.g., in progress).

Under each of these snapshots, whether it is for compliance or assessment, you are additionally informed of:

  • The created date;
  • The modified date;
  • The number of customer-managed actions and the number of those actions that have been addressed; and
  • The number of Microsoft managed actions and the number of those actions that have been addressed.

Action Items

This page provides guidance on actions that could or should be taken to increase your Compliance Score. These are recommendations and are up to the company to implement.

Controls

Controls are the core of how Compliance Manager works. There are two controls: Microsoft and Customer.

Microsoft managed controls is a family of controls that align your company assessments with the standards and regulations. They are managed controls used to implement the assessment and assess compliance. Customer-managed controls, on the other hand, are controls that you as an organization manage. Here, you can implement actions recommended by Microsoft to increase your Compliance Score.

Compliance Manager

Compliance Manager is a tool to simplify compliance for organizations. It offers real solutions to a complex problem.

Facebook Finally Allows Users To Delete Sent Messages

Facebook Messenger

Facebook Messenger

Users of Facebook Messenger, which number over 1.2 billion people worldwide, now have a new feature that makes life a bit easier after making an “oops.” An oops is a mistake in an instant message that is immediately noticed, right after sending it, by the person who wrote it. It could be that a message includes a goofy typo. Typos are usually much easier to see right after sending a message than before sending it. This is a psychological thing.

The need for message deletion could also come from a message intended for one person that might be accidentally sent to the wrong person or incorrectly to a group. It could be that a group message was sent to someone who should not be included.

One thing that is helpful with this new feature is the ability to remove a photo that was sent in error. If the person receiving the message with the photo does not make a copy of it, it is possible that the mistake goes away when deleted by using the new unsend feature.

This may save considerable embarrassment. There is probably nothing more unfortunate than sending an explicit photo to your mother by accident. Hopefully, she does not see it before you get a chance to unsend it and send her a new message with the correct photo attached.

Ten Minutes to Change Your Mind

Now, for up to ten minutes after being sent, Facebook Messenger allows a person to delete a message. It disappears and then in its place appears the notation that the message was deleted.

Be aware, that there is no delay in sending the message out. Perhaps, if the receiver of the message is not paying close attention to their Facebook Messenger, the message may go unread. However, if a person already read the message, they know what it was about. The time limit of ten minutes for deletion also means that a message is not changeable the next day after a late night, drunken, message-sending binge.

Everyone Has Zuckerberg Unsend Power Now

The idea for message deletion on Facebook Messenger came from users who noticed that some of Mark Zuckerberg’s messages would disappear after a certain amount of time expired. Zuckerberg had this power to remove the messages if he changed his mind about the content with an afterthought. This was a superpower built into Mark Zuckerberg’s Facebook account that allowed him or his assistants to delete messages but was not part of the overall Facebook Messenger software’s capabilities.

Facebook Messenger users in droves petitioned the company to give them this unsend power for their accounts. The company agreed to do this and leaks came out during 2018 that this upgrade was underway.

Facebook also owns WhatsApp. Facebook bought WhatsApp for $14 billion in October 2014. On the WhatsApp system, it is possible to delete a message for up to an hour after it was created. This WhatsApp feature was extended to Facebook Messenger.

Adding this feature to all the Facebook Messenger accounts was not trivial. It took nine months of software retooling to get this feature working for all of Facebook users. Finally, in February 2019, it became available to everyone in the latest Facebook Messenger software release and upgrade.

What’s Next for Facebook Messenger?

Behind the scenes at Facebook, there is an ongoing effort to integrate all the messenger apps into one. Adding this unsend feature is heading in that direction of making Facebook Messenger blend with WhatsApp.

Facebook also owns Instagram, which it bought in 2012 for the bargain price of only $1 billion. Instagram was considered a startup at that time. Instagram has about one billion users now. About 80% of them live outside of the United States. The plans for 2019/2020 are to continue the integration of Facebook Messenger, WhatsApp, and Instagram with a redesigned interface that is simpler to use and elegant.

Until now, WhatsApp operated independently of Facebook Messenger. It has features, like message encryption, that Facebook Messenger does not have. There are also plans to make WhatsApp a payment gateway to challenge payment services like PayPal.

One significant problem is that Facebook is suffering from a serious diminishing of public trust. Many users have been leaving the system and deleting their Facebook accounts. Some do not trust Facebook’s influence over WhatsApp and think that Facebook can be persuaded to put a “backdoor” in the WhatsApp system to allow law enforcement the easy ability to spy on the encrypted communications of the WhatsApp users.

This is not so far-fetched because of the revelations that Facebook allowed its users’ data to be hacked and private information of its users to be misused by hostile foreign governments. The Facebook system was gamed in an attempt to influence the American elections.

Facebook has quite a way to go in order to rebuild trust with the public. There is no point in using any encryption service if the encryption protection can be bypassed by anyone, especially governments. Facebook may find that it loses WhatsApp users by trying to convert them to Facebook Messenger users, since, at this time, most WhatsApp users do not even realize that the service is owned by Facebook.

The Facebook Messenger Behemoth Rises

The New York Times reports Facebook wants to integrate the underlying system structure of Facebook Messenger with WhatsApp and Instagram while keeping the public interface of these three systems appear to be operating as stand-alone apps. This will aggregate the instant messaging of over 3.2 billion users. This move to integrate the three services by the Zuckerberg team brings up serious anti-trust issues and more concerns about privacy and security. Can Facebook really be trusted with all of our most private conversations?

To address privacy concerns, adding point-to-point encryption is one of the main goals for the integration of all three services during 2019 and 2020. The challenge for Facebook may not be convincing its users that it is serious about protecting their privacy as much as being able to avoid having to introduce a “backdoor” in the encryption software to allow government spying on the messages.

The new anti-encryption legislation, which just passed during December 2018 in Australia, suggests that this backdoor policy may become a new standard of government intrusion on privacy. A backdoor makes systems vulnerable to abuse and exploitation. Criminals may gain unauthorized access by exploiting the vulnerability of having a backdoor. Government workers may misuse private data that they can access.

The project requires thousands of Facebook programmers to work on it. Facebook estimates that the upgrade and integration of Facebook Messenger with the other systems will take over one year to complete. That timeline may be overly optimistic when it took nine months for Facebook just to add the unsend feature.

While the unsend feature may keep others from continuing to see a message if deleted within ten minutes, it does not permanently delete the record of the message from the system. Beware that Facebook will continue to store that embarrassing photo you mistakenly sent to your mom forever.

What Is Customer Lockbox And Privileged Access Management In Office 365

Customer Lockbox Office 365

 

Microsoft Office 365 is a suite of services that includes Customer Lockbox and Privileged Access Management. Both tools to assist customers in meeting their compliance obligations and maximizing data security and privacy. These tools are currently only available for customers with Office 365 Enterprise and Advanced Compliance SKUs.

Privileged accounts are being compromised more rapidly every day and sensitive data can be exposed in shorter and shorter periods of time. Therefore, organizations must establish multiple regulations, procedures, and compliance obligations that must be followed before access is provided by anyone. Microsoft Office 365 understands this and has built-in Privileged Access Management to meet these higher levels of security. Lockbox and Privileged Access Management provide granular task-based access control within an approval workflow so organizations can gather privileged access as well as monitor and control sensitive tasks.

Multiple Layers of Protection

Microsoft 365 Customer Lockbox and Privileged Access can assist organizations to meet their compliance obligations through a built-in set of tools offering multiple layers of protection to:

1. access their compliance posture

2. protect sensitive data

3. respond to requests

4. maintain business continuity

5. efficiently reduces costs

This is accomplished by ensuring there is a regulated process flow to handle incoming requests. Virtually all Microsoft operations are fully automated unless during very rare circumstances requiring human involvement that is necessary to troubleshoot and correct a problem. If this intervention is needed, an approval request is generated, and then the approval group is notified by email. The request can either be approved or denied and even blocked. If the request is approved, the task is processed and checked against the privileged access policy and then logged in the Office 365 Security and Compliance Center.

Customer Lockbox Controls

Customer Lockbox allows users to control how Microsoft support engineers access data and features special procedures for explicit data access authorization. This keeps your information secure while the problem is being fixed. Customer Lockbox works with Exchange Online, SharePoint Online and OneDrive For Business.

There are multiple levels of approvals from the Lockbox system before access is granted, so your information remains secure. The request must be very specific and include role, data location details, the specific reason for the access and the duration of the access. There is also an expiration time on all requests, so the content access is removed after the engineer has fixed the problem. The majority of problems do not require Customer Lockbox access, but it is available and very secure. The Customer Lockbox feature can be turned off in the Admin Center.

Microsoft Office 365 Customer Lockbox

Refer to this informational video to learn more about how Customer Lockbox And Privileged Access Management In Office 365 can help you keep your information secure.

The Risks Of Using Auto-Complete For Passwords

Autocomplete Passwords

Autocomplete Passwords

The auto-fill feature that makes it easy to enter in usernames and passwords on various websites may be putting your information at risk.

While auto-fill is a convenient way to keep track of the many combinations of letters, numbers and special characters you need to access sites, the feature is also being used by advertisers and hackers. That’s why many security experts are suggesting turning off the auto-complete feature in your web browser.

Password manager programs embedded in browsers are a simple way to get access to a password-protected website. The password manager auto-fills your details, giving you one-click access to account information meant to be kept private.

How Hackers Get Access

If hackers get access to a compromised website, they can put an invisible form on the site and easily collect users’ login information. If your browser automatically enters this information when it sees the appropriate boxes on a web form, it adds the info everywhere those boxes are found on a page, whether they’re seen by the user or not.

Because most web users use the same username and password for multiple sites, the theft of this information on just one website can expose your information on many others.

Not Just Hackers

It may come as a surprise to learn that hackers are not the only ones trying to use your login information. Some ad networks are using tracking scripts to grab email addresses stored in your password manager for auto-filling. That tech can be used to grab passwords too, whether stored on a browser or an independent password management site.

The ad networks are using the same technique as hackers — an invisible form that captures your credentials provided by the password manager. Here’s a helpful demo page that shows you how it works.

Ad networks are using this information not to hack your data, but to understand what sites you navigate to better target ads to you. And while they claim to only be grabbing email addresses, the potential for further abuse is there.

What Computer Users Can Do

Password managers by themselves are still useful tools, especially given the number of codewords we need to go about daily web browsing. It’s the auto-fill mechanism that needs to be disabled. That’s simple to do.

On Chrome

  • Go to Settings
  • Search for Passwords and click on the Passwords arrow
  • Toggle the Auto Sign-In tab to the left (it should be grayed out not blue)
  • For more protection, you can stop Chrome from saving any passwords by toggling the Offer to save passwords to the left

On Firefox

  • Open Options
  • Click on Privacy & Security in the left-hand navigation
  • Click on History
  • Select Firefox will: Use custom settings for history
  • A new submenu will appear
  • Unclick on Remember search and form history
  • To fully disable saving any passwords, go to the Logins & Passwords section (just above History) and unclick Ask to save logins and passwords for websites

On Safari (Desktop)

  • Open the Preferences window
  • Click on the Auto-fill tab
  • Turn off all features related to usernames and passwords

On Safari (iOS)

  • Go to Settings
  • Scroll down to Passwords & Accounts and click on it
  • Toggle the AutoFill Passwords tab to the left

Disabling the auto-fill features means spending a little more time finding and entering usernames and passwords manually. However, these steps protect you from prying eyes looking to gain more information about you and your accounts.