Blog

September 10th, 2014

iPad_Seo08_AEarlier this year, software giant Microsoft released iPad specific Office apps, which many iPad users have been eagerly awaiting. While these apps bring full-versions of the four most popular Office programs to the iPad, you do need an Office 365 account in order to get the most out of them. Microsoft has also recently updated the Office for iPad apps, introducing in-app subscriptions.

Looking at the recent subscription update

When the iPad versions of the Office apps were released, users could download the apps for free but needed an Office 365 subscription in order to use the full features of the apps. Those who didn't have a subscription were limited to only being able to read and print Office documents, and present using PowerPoint.

Those who wanted to use all the features of the app needed to sign up for an Office 365 account. In order to do this, they had to physically go to the Office 365 site and sign up. They couldn't sign up via the app. While this process isn't overly taxing, it did cause some frustration for some users.

To remedy this, Microsoft has recently announced that users will now be able to sign up for an Office 365 subscription directly from the app. According to an article posted on the Microsoft Office blog, "Starting today [September 2, 2014], you can buy a monthly subscription to Office 365 from within Microsoft Word, Excel, and PowerPoint for iPad."

The subscriptions you can purchase

While Microsoft has noted that you can purchase an Office 365 subscription in-app, you should be aware that the subscriptions are monthly and for the Home or Personal versions of Office 365.

A monthly Office 365 Home subscription costs USD$9.99 a month and can be used on one iPad and up to five PCs or Macs, while an Office 365 Personal plan costs USD$6.99 a month and can be installed on on iPad and one PC or Mac.

What about business users?

For the time being, users can only subscribe to individual Office 365 accounts via the app. If your business has an Office 365 for Business subscription e.g., Office 365 Small Business Premium, etc, you should be able to access the full-version of the iPad app without having to sign up for a Personal or Home subscription, just log in using the same username and password you use to sign into Office 365.

If you don't have an Office 365 subscription, then it may be a good idea to get in touch with us to learn more about Office 365 business plans and how they can be successfully implemented into your business.

Published with permission from TechAdvisory.org. Source.

Topic iPad
September 10th, 2014

Office_Sep08_AHave you ever been working with a list in Excel and had to combine more than two cells into a new cell? The seemingly easiest way to do this is to copy the contents from both cells and paste them into the new cell, then edit them for spacing. But, did you know that there is actually a formula called concatenate that you can use to combine contents and display this in new cells?

Using the concatenate formula to combine cells

If, for example, you have a spreadsheet with first names in column A, last names in column B, and want to combine them into column C to display the full name you can do so by:
  1. Clicking on cell C2 (or the row where the information you want to combine is)
  2. Typing =concatenate(
  3. Clicking on cell A2 and then adding a comma (,)
  4. Clicking on cell B2 and closing the formula with a closing bracket
  5. Hitting Enter
You should see the two cells are now combined in cell C2, with the formula for cell C2 reading:

=CONCATENATE(A2,B2).

The problem is, there will be no space inbetween the letters or numbers, so you will need to edit the formula to read:

=CONCATENATE(A2," ",B2)

The double quotations with a space in between them tells Excel to add a space to the cell in between the contents of A2 and B2.

If you have more than two columns you would like to combine, then simply add a comma after each cell. If for example you have three columns (A1, B1, and C1) you would enter the formula:

=CONCATENATE(A1 " ",B1 " ",C1) in column D1.

Combining two cells without concatenate

While concatenate works well, there is actually a shortcut that you can use which involves the ampersand '&':
  1. Click on cell C2 (or the row where the information you want to combine is)
  2. Type =
  3. Click on cell A2 and then type & in the formula.
  4. Click on B2 and hit Enter
You should see the contents of A2 and B2 combined together in C2. If you click on cell C2 and look at the formula, it should read: =A2&B2.

The only problem is, there won't be a space between the content. To add a space, you can edit the formula so that it reads:

=A2&" "&B2

Note the space between the two quotation marks. This tells Excel to add a space between the contents of A2 and B2.

Once you have the base formula on one cell, you can press the small box at the bottom of the cell and drag it down the row so that the other information can be quickly compiled. This makes it much easier than having to copy and paste the content individually. And, If you would like to learn more Excel tips, contact us today. We can save you valuable time and resources.

Published with permission from TechAdvisory.org. Source.

September 9th, 2014

GoogleApps_Sep08_AIf you are a Google Drive user, you may have noticed that Google has been implementing a number of changes over the past few months. First there was a change to the look of the file sharing service, then to how you accessed files. Now the tech company has announced that they have launched separate sites for their productivity apps.

About the recent change to Drive

In order to make users' lives easier, Google has decided to kind of spin off their productivity apps. What do we mean by this? Well, the company has announced that they are launching individual sites for Docs, Sheets, and Slides. Now, instead of going to Drive to open or create a new Doc, you can do so by going to the Docs site.

Each of the three major productivity apps - Docs, Sheets and Slides - now has their own site, and can be accessed here:

This isn't a full spin off because your files created and edited using the individual app sites are still stored on Drive. The idea here is that this separation is supposed to make it easier for users to interact with each different productivity apps and related files.

When will this shift happen?

Google has started to alert Drive users to the impending switch and has indicated that Docs will be the first to move over to the new system. That being said, you can actually access the three different apps now, or you can still use Drive to create your files for the time being, just be prepared for a shift in the near future.

Getting around the new sites

Each of the three new sites has pretty much the same layout, with the following elements being the most useful:
  • Plus button at the bottom-right: Pressing this will open a new Docs, Sheets or Slides file.
  • Three horizontal bars at the top-left: Will slide a menu in from the left with the options to open either the Docs, Sheets, or Slides sites, along with Settings and Drive.
  • File sorting icons at the top-right: The four horizontal lines button will switch files in between either List or Grid view. The button with A to Z is for sorting options which will allow you to configure how related files are sorted.
  • Folder icon at the top-right: Clicking this will open the File picker which will allow you to quickly navigate to different folders on your Drive, and also upload other files such as Microsoft Office documents or PDFs.
If you are a heavy user of one of the Google Drive apps, then these sites will likely be a welcome addition. The same can be said for those who use the mobile apps which were released earlier this year.

Looking to learn more about Google's systems? Get in touch and make a positive tech change today.

Published with permission from TechAdvisory.org. Source.

September 4th, 2014

Security_Sep02_AWith smartphones playing a larger role in today’s daily business, the need to recharge them while you are on the go increases. And when you’re nowhere near your charger, that public charging kiosk can look pretty promising. But what you might not know is that common traits in smartphone hardware and software design makes recharging phones through public chargers prone to juice jacking. If you're not sure what that is then let’s find out and also discover how you can avoid juice jacking too.

What’s juice jacking?

Regardless of the kind of smartphone you have, whether it’s an Android, iPhone or BlackBerry, there is one common feature across all phones: the power supply and the data stream pass over the same cable. This setup allows for juice jacking during the charging process whereby user access is gained on your phone by leveraging the USB data/power cable to illegitimately access your phone’s data and/or inject malicious code onto the device.

The attack can be as simple as an invasion of privacy, wherein your phone pairs with a computer concealed within the charging kiosk and information such as private photos and contact information are transferred to a malicious device. However, on the other hand, it can also be as invasive as an injection of malicious code directly into your phone. According to security researchers at this year’s Black Hat security conference, your iPhone can be compromised within one minute of being plugged into a harmful charger.

Exposure to a malicious kiosk can also create a lingering security problem even without the immediate injection of malicious code. Once a device is paired to a computer, it can access a host of personal information on the device, including your address book, notes, photos, music, sms database, typing cache, and even initiate a full backup of your phone, all of which can be accessed wirelessly at anytime.

How do I avoid it?

The most effective precautions center around simply not charging your phone using a third-party system. Here are some tips to help you avoid using public kiosk charger:
  • Keep your devices topped off: Make it a habit to charge your phone at your home and office when you’re not actively using it or are just sitting at your desk working.
  • Carry a personal charger: Chargers have become very small and portable, from USB cables to power banks. Get one and throw it in your bag so you can charge your phone anytime you’re at the office or while on-the-go if you use a power bank.
  • Carry a backup battery: If you’re not keen on bringing a spare charger or power bank, you can opt to carry a full spare battery if your device has a removable battery.
  • Lock your phone: When your phone is truly locked as in inaccessible without the input of a pin or equivalent passcode, your phone should not be able to be paired with the device it’s connected to.
  • Power the phone down: This technique only works on phones on a model-by-model basis as some phones will, despite being powered down, still power on the entire USB circuit and allow access to the flash storage in the device.
  • Use power only USB cables: These cables are missing the two wires necessary for data transmission and have only the two wires for power transmission remaining. They will charge your device, but data transfer is made impossible.
Even the tiniest detail like charging your phone from a kiosk charger could affect the security of your device. While there are many substitutes to using a third-party system, ultimately the best defense against a compromised mobile device is awareness. Looking to learn more about today’s security and threats? Contact us today and see how we can help.
Published with permission from TechAdvisory.org. Source.

Topic Security
September 4th, 2014

Hardware_Sep02_AYou undoubtedly use computer monitors daily, whether at work, at home or both. So, you know that they are available in a variety of shapes, designs, and colors. What a lot of people might not know is, based on the technology used to make them, they can be broadly categorized into three types commonly used today.

CRT (cathode ray tube) monitors

These monitors employ CRT technology, which was used most commonly in the manufacturing of television screens. With these monitors, a stream of intense high energy electrons is used to form images on a fluorescent screen. A cathode ray tube is basically a vacuum tube containing an electron gun at one end and a fluorescent screen at another end.

While CRT monitors can still be found in some organizations, many offices have stopped using them largely because they are heavy, bulky, and costly to replace should they break. While they are still in use, it would be a good idea to phase these monitors out for cheaper, lighter, and more reliable monitors.

LCD (liquid crystal display) monitors

The LCD monitor incorporates one of the most advanced technologies available today. Typically, it consists of a layer of color or monochrome pixels arranged schematically between a couple of transparent electrodes and two polarizing filters. Optical effect is made possible by polarizing the light in varied amounts and making it pass through the liquid crystal layer. The two types of LCD technology available are the active matrix of TFT and a passive matrix technology. TFT generates better picture quality and is more secure and reliable. Passive matrix, on the other hand, has a slow response time and is slowly becoming outdated.

The advantages of LCD monitors include their compact size which makes them lightweight. They also don't consume much electricity as CRT monitors, and can be run off of batteries which makes them ideal for laptops.

Images transmitted by these monitors don’t get geometrically distorted and have little flicker. However, this type of monitor does have disadvantages, such as its relatively high price, an image quality which is not constant when viewed from different angles, and a monitor resolution that is not always constant, meaning any alterations can result in reduced performance.

LED (light-emitting diodes) monitors

LED monitors are the latest types of monitors on the market today. These are flat panel, or slightly curved displays which make use of light-emitting diodes for back-lighting, instead of cold cathode fluorescent (CCFL) back-lighting used in LCDs. LED monitors are said to use much lesser power than CRT and LCD and are considered far more environmentally friendly.

The advantages of LED monitors are that they produce images with higher contrast, have less negative environmental impact when disposed, are more durable than CRT or LCD monitors, and features a very thin design. They also don’t produce much heat while running. The only downside is that they can be more expensive, especially for the high-end monitors like the new curved displays that are being released.

Being aware of the different types of computer monitors available should help you choose one that’s most suited to your needs. Looking to learn more about hardware in today’s world? Contact us and see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Hardware
September 3rd, 2014

BCP_Sep02_AMany people wonder why it’s necessary to perform business impact analysis (BIA) when they’ve already invested a large amount of time on a risk assessment. The answer is simple: because the purpose of a BIA is different, and wrong results could incur unnecessary expenses or create inadequate business continuity strategies. To that end, let’s take a look at five tips for successful business impact analysis.

Five tips for successful business impact analysis:

  1. Treat it as a (mini) project: Define the person responsible for BIA implementation and their authority. You should also define the scope, objective, and time frame in which it should be implemented.
  2. Prepare a good questionnaire: A well structured questionnaire will save you a lot of time and will lead to more accurate results. For example: BS (British standard) 25999-1 and BS 2599902 standards will provide you with a fairly good idea about what your questionnaire should contain. Identifying impacts resulting from disruptions, determining how these vary over time, and identifying resources needed for recovery are often covered in this. It’s also good practice to use both qualitative and quantitative questions to identify impacts.
  3. Define clear criteria: If you’re planning for interviewees to answer questions by assigning values, for instance from one to five, be sure to explain exactly what each of the five marks mean. It’s not uncommon that the same event is evaluated as catastrophic by lower-level employees while top management personnel assess the same event as having a more moderate impact.
  4. Collect data through human interaction: The best way to collect data is when someone skilled in business continuity performs an interview with those responsible for critical activity. This way lots of unresolved questions are cleared up and well-balanced answers are achieved. If interviews are not feasible, do at least one workshop where all participants can ask everything that is concerning them. Avoid the shortcut of simply sending out questionnaires.
  5. Determine the recovery time objectives only after you have identified all the interdependencies: For example, through the questionnaire you might conclude that for critical activity A the maximum tolerable period of disruption is two days; however, the maximum tolerable period of disruption for critical activity B is one day and it cannot recover without the help of critical activity A. This means that the recovery time objective for A will be one day instead of two days.
More often than not, the results of BIA are unexpected and the recovery time objective is longer than it was initially thought. Still, it’s the most effective way to get you thinking and preparing for the issues that could strike your business. When you are carrying out BIA make sure you put in the effort and hours to do it right. Looking to learn more about business continuity? Contact us today.
Published with permission from TechAdvisory.org. Source.

September 2nd, 2014

GoogleApps_Sep02_AFor many Google Apps users Google Drive is among the most important and popular app. With a wide scope of features, including document creation, collaboration tools, and cloud-based storage, the app is highly useful for almost any business across any industry. However, like most similar systems, it can still be a challenge to find specific files or folders. One of the best ways to do this is by using the search bar at the top of the screen, but did you know that there are some search operators you can use to make finding your files even easier? Here are four.

Searching for files on Drive

Before we look into the different search operators you can use to find files on Drive, we should clarify that these operators are to employ in the search bar, which is located at the top of the Drive page. If you want to search for a file this works in the same way as the Google Search bar on google.com, only this bar focuses on Drive files, and anything related to Drive.

To use the operators listed below, simply click on the bar that says Search Drive and enter the operator along with the search term, or name of the file/item/keyword you are looking for. For best results you should put the operator before the keyword, however Google also allows users to insert it after the keyword.

1. title:

Sometimes when you are looking for a document, you want to search for the title only, but because of the way Drive's search works, if you enter a keyword it will search for all files that contain that particular word. This means that if you are looking for a document based on its title, you will also see results for documents that contain that keyword too. By using the title: operator you can filter results so that only documents that contain the keyword in the title are displayed.

For example, if you are looking for a document that you know has the words "TPS report" in the title, you would enter: title: "tps report". If you are looking for a title but know only a few keywords that aren't next to each other, you can enter the keywords with quotations around each of the keywords. This will tell Drive to search for files that contain each of the separate keywords in the title.

2. type:

Chances are that with Drive you have created and stored more than just one type of file. Many of us use it to store multiple file types, which can make finding the file you are looking for more challenging.

If you know the type of document you are searching for, enter the operator type: followed by the file type (spreadsheet, document, pdf, presentation, drawing, image, and video) and then add keywords to direct Drive to only display these filtered, related results.

So, if you are looking for a presentation with the keywords "sales team" then you would enter: type:presentation "sales team". Be sure that when you are looking for a file type, there is no space between the operator and the type of file you are searching for.

3. owner:

Drive is highly collaborative and files that you have access to may not be stored on My Drive, or even owned by you. If you are looking for files that you know are owned by other team members try using the owner: operator.

When using this, Drive will present files owned by the email address that you enter beside the operator, and which have been shared with you. If you are looking for a file that is shared with you/on your Drive that is owned by sally@company.com, then you would enter: owner:sally@company.com. You can add keywords before or after the operator (as long as they are separated by a space) to filter results down even further.

4. is:starred

One of the more useful Drive features for users who deal with a large number of files is the ability to star important ones. By simply clicking on Starred on the left-hand horizontal menu bar, you can view all of your starred files. The issue many run across however is that that list does grow over time, making it less useful in finding important files - which kind of defeats the purpose of the feature in the first place.

If this has happened to you, then you can easily search for starred files by entering: is:starred along with keywords in the search field. This will tell Drive to only search for files that contain the keywords and are starred.

These are just a few of the more useful search operators available to Drive users. Do you have one you can't live without? Let us know! And, if you have any questions about Drive for your office, please contact us.

Published with permission from TechAdvisory.org. Source.

August 27th, 2014

socialmedia_Aug26_AHave you ever looked at images and visuals posted by businesses and users on Instagram? While many users take photos using their mobile devices, there are many images that simply look way too good to be taken with a phone camera, especially the ones without filters. Many business owners want to know how they too can take quality images like these too.

The truth behind some of Instagram's best images

Those awesome Instagram photos we see aren't always taken using mobile phones. Instead, many users use digital cameras which offer much better image quality. You can capture some amazing shots with a higher end DSLR cameras with multiple lenses.

If you have one of these cameras and are looking to create high-quality images for Instagram, or any other social media site, you may be slightly confused as to how to get the images onto the platform - especially since many of us use this via the mobile app. To make uploading a little easier, here is a brief guide detailing how to get images from your digital camera onto Instagram.

1. Transfer and process images

Once you have taken photos with your camera, you will need to get them off of your camera's memory and onto your computer's hard drive. Most camera's have apps that allow you to do this, so be sure to follow the instructions in the app that came with it.

When your images have been transferred to your computer, you are likely going to want to process them a little bit. This is especially true if you have a DSLR or other high-end point-and-shoot which takes RAW images. These can be quite large and are not compatible with Instagram.

Most images taken with a camera are quite large in size, so you are going to need to use an image editing program like Adobe Photoshop, or free tools like Pixlr to process them. What you are looking to do is to crop your images so that they are square.

If you are used to the advanced photo editing features, then do your edits before cropping. When you crop your images you should crop or resize them so that they are 640X640 pixels. This is the size of all images taken using Instagram's camera app.

Also, be sure to save the images as JPEGs, as this is the image format used by most smartphone cameras.

2. Save processed images in their own folder

It helps to create a folder somewhere on your hard drive (we recommend in the same folder where you save all of your other folders) that is specifically for images you want to post on Instagram.

When you have processed and edited the images to your liking, save the images here. Try using an easy to use file name like the date and a letter or note so you can easily tell which images are which, so you know which to use.

3. Move the images to your device

You can move images using the cloud or by manually transferring the images to your phone. If you decide to manually transfer your files, you will need to plug your device into your computer.

For users with iPhones, you can open iTunes and click on your device followed by Photos. Then select the box beside Sync photos from. Select the file you created in the step above and then Sync to transfer the images over.

For users with Android devices, plug your phone into the computer and drag the folder you created in the step above into the Photos folder of your Android device.

For Windows Phone users, plug your device into your computer and open My Computer on your desktop. You should see your device listed in the window that opens. Open the file system for your device and drag the image files you created above into the Photos folder of your phone.

If you choose to use the cloud to transfer your files, use the operating system's cloud (e.g., iCloud, Google Drive, or OneDrive) to upload the files. Just be sure to use the same account as the one on your phone.

4. Add images to Instagram

Once the photos are either on your device, or in the cloud, you can now upload them to Instagram. This can be done by:
  1. Opening the app and tapping on the camera icon.
  2. Tapping on the button in the bottom left of the screen.
  3. Selecting where the image is located on your device. E.g., the Gallery app if you placed the photos in your phone's hard drive, or the cloud service you used.
  4. Editing them as you see fit.
Once this is complete, you should be able to post your images as you usually do with any other Instagram image on your phone. Take the time to add filters, and hashtags as well as a good description before you post.

If you would like to learn more about using Instagram to share your images then get in touch and we will show you the advantages of the bigger picture.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
August 26th, 2014

androidphone_Aug26_AWhen you first get your hands on your Android smartphone, you’ll be asked about location services and whether you want to enable them. Google and your carrier will have its own location services that you’ll need to approve as well. But what you might not know is that there are actually a few other options for location services with Android which can affect your smartphone’s security. To that end, let’s take a look at how to change some of these Android settings.

Photos and GPS tagging

Your Android smartphone gives you the ability to attach GPS coordinates to the pictures you take, known as geo-locating or GPS tagging. This lets you arrange pictures in albums by locations, or lets Google+ stitch together stories of your trips. Geo-locating images in itself isn’t a bad thing, but you can get into trouble when you broadcast sensitive locations to the world. For instance, a picture of your expensive watch with a GPS tag of your house isn’t the best idea.

Four ways to control geo-locating photos:

  1. Go to your camera settings and you’ll find an on/off toggle.
  2. Simply go into Settings>Location and from there you can decide if you want the location saved along with your images.
  3. Download an EXIF editor and manually remove the location information from specific images.
  4. You can also turn off location services altogether by going to Settings>Location.

Discrete location settings

Apart from location settings in photos and GPS tagging, Android actually has three discrete location settings which allow you to set how accurately you want location reporting to be. You can find these at Settings>Location, Note that this affects your smartphone’s battery life immensely.
  • High accuracy: This uses the GPS radio in your phone to pinpoint its exact location from satellites while making use of nearby Wi-Fi and cellular networks too.
  • Battery saving: This mode only uses Wi-Fi networks and mobile networks to identify locations, and while it might not be as accurate it will help your phone last longer.
  • Device sensors only: This only uses the GPS radio to find you. It may take a little more time to find your location since it’s not using nearby Wi-Fi and mobile networks to get your general location first. This also uses more battery.
Having your location settings turned off will not only help keep your smartphone’s security intact, but also help strengthen your smartphone’s battery life. Interested in learning more about Android phones and their functions? We have solutions for you and your business.
Published with permission from TechAdvisory.org. Source.

August 26th, 2014

googleapps_Aug25_BWere you aware that when signing up for a new Gmail or Google account, users can only use a specific set of characters and numbers? While this is not an issue for many users, there are some who work with clients or suppliers who have email addresses that do not use these characters, making sending them emails via Gmail difficult. Google has recently announced a change to the characters supported by Gmail, one which could pose a bit of a security issue.

Google's recent character announcement

Until early August, any user who emails from a Gmail account had to use latin characters and numbers e.g., A-Z, and 1-9. While this fits for some users, there are a great number who have names and email addresses that use characters not in the standard English alphabet like 'É' or 'à'. In an effort to make things easier for a greater number of Google users, the company recently expanded support for different characters.

This means that Gmail will now understand addresses that use different scripts from the standard basic Latin alphabet (letters A to Z and numbers 0 to 9). According to Google, "This means Gmail users can send emails to, and receive emails from, people who have these characters in their email addresses."

Some of the scripts now supported include Katakana, Hong Kong (traditional Chinese), accented Latin characters, etc. While users with email addresses can send Gmail users emails, and vice versa, they are currently not supported by Google's account names. In other words, users who want to sign up for a Gmail account still need to use the basic Latin alphabet.

Why is this a potential security risk?

At first glance, this may not seem like the biggest security risk. Especially because many businesses have email addresses that use the basic Latin alphabet. But there is a security threat here, especially when you start to look at the characters used in other languages. Take for example the greek letter for lowercase omicron (ο) which looks a lot like our o.

When we write these letters on paper, they look the same to us, and there is no real harm. But when they are online, computers will read them as different. This is because of what is called Unicode. Unicode is a universal standard that dictates the difference between characters.

To us, the lowercase omicron and our letter 'o' look the same. But to computers, lowercase omicron is represented by the unicode: U+03BF, while the letter 'o' is represented by the unicode: U+006F.

Smart hackers will likely quickly figure out that they can replace basic Latin characters with others, and generate email addresses that take advantage of this. For example, you could see an email come into your Inbox from facebook.com, where one of the characters is actually an omicron. To us, there is no visual difference, but to the computer, the addresses are completely different. The email could have links to malware or tracking software that could lead to a breach in security.

Is anything being done to stop these characters from being exploited?

According to a post on the Google blog, the tech giant realizes this could be a potential security issue. "The Unicode community has identified suspicious combinations of letters that could be misleading, and Gmail will now begin rejecting emails with such combinations. We're using an open standard—the Unicode Consortium's “Highly Restricted” designation—which we believe strikes a healthy balance between legitimate uses of these new domains and those likely to be abused."

According to the Consortium, when applied to Gmail addresses, Highly Restrictive requires that characters must be from a single script, or from the combinations:

  • Latin + Han + Hiragana + Katakana,
  • Latin + Han + Bopomofo,
  • Latin + Han + Hangul
In other words, the overall security and legitimacy of addresses and sites that use other characters should be ensured..

What can we do?

To take it one step further, we also recommend that if you use Gmail, you look carefully at all email addresses. We can often spot the difference between letters and similar symbols used by other languages. If an address looks suspicious, it is a good idea to simply ignore or delete the email.

As with most other security measures, if you receive an email from large companies or institutions, such as banks, with what looks like a legitimate email address, always read the content closely. Almost every business and institution will never ask for you to provide passwords or login information in an email.

Essentially, ensure to be vigilant with email addresses, and if you have any further questions or concerns, contact us today to for our support solutions.

Published with permission from TechAdvisory.org. Source.