Lingows Blog

Top Tech News

By Matthias Moore 14 Nov, 2017
As of 11/06/2017, Google simplified inserting images in Google Docs, Slides, and Keep.

As it turns out, a picture is not worth a thousand words unless you can access it with ease... this is especially true when you can add it to your presentation, document or notes quickly and easily. For this reason, Google made improvements to the image insertion process within Google Docs, Slides, and Keep.

Moving forward, when you select Insert > Image or click the Image button in
Docs, Slides, or Drawings on the web, you'll see the following options:
Upload from computer / Search the web / Drive / Photos by URL

We have all been a part of a presentation and while taking notes, we realize there's not enough time to jot everything down before the speaker moves on to the next slide? What do we do next, either lose the information or pull out your smartphone and take a photo? That photo is later lost in the sea of images that range from family to business and accidental images that you didn't even realize you were taking that photo. That said, when you take a photo, how do you link that to the notes? With Google Doc's and Keep, you can type all of your notes, and add images inside of your notes. It's a brilliant way to keep everything in one place and since it's stored in the cloud, you can access this information 24/7 from any device!

If you select "Upload from computer," you'll be taken to your computer's file manager. If you select "Search the web," "Drive," or "Photos," you'll be taken to a menu on the right-hand side of your screen that is easier to navigate and more intuitive to use. You can also drag and drop images directly from this menu into your document. If you select "By URL," you'll be given the option to input the specific URL for an image.
These options should make it easier to enhance your documents, presentations, and drawings with images.

I use this all of the time. Sometimes I wonder if people think I am not paying attention, but the reality is I am getting some seriously good notes which I am using to grow our business! You never know, that million dollar idea may have been in the slide that was lost somewhere in your images or that piece of paper you jotted it down on.
By Matthias Moore 12 Nov, 2017
Google and Salesforce are partnering on cloud computing's most powerful partnerships yet-- one that is sure to shake things up in the business arena.  "This is a first of its kind partnership, that we view as the best of both worlds," says Ryan Aytay, an executive vice president of business development and strategic accounts at Salesforce. "It brings our companies together with one priority: to make our customers smarter and more productive."

This powerful collaboration was revealed on Monday, Salesforce and Google disclosed plans to integrate Google's office application suite called G-Suite with Salesforce's core platform, and an integration of Google Analytics right into Salesforce's advertising and marketing application. The partnership will make use of each other's product offerings and strengths moving forward. Salesforce will most certainly make use of Google's cloud infrastructure for expansion of its core services as part of the agreement, which is a significant win for Diane Greene and her cloud team at Google.

Google is  planning to make use of this strategic partnership to drive adoption of its own workplace platform, G Suite, which competes largely with Microsoft Office 365 and Dropbox. Google is offering a promo to any Salesforce customer not making use of G-Suite to obtain the service complimentary for one year. If you need help getting set up, please call us today. At prices as low as $5 per user, it's an inexpensive and wise decision to give your business a turbo charge.

The combination of Google Analytics and Salesforce Marketing was already in high demand by both Google and Salesforce clients in recent months, claims Google Analytics senior director Babak Pahlavan. While Google offered APIs for companies to build on top of Google Analytics in the past, it's never opened their doors to such a deep integration, claims Google Cloud president Tariq Shaukat. Incorporating the two powerhouses will certainly shake things up in the business world.

Google is winning with another high profile partnership for Google, which announced a partnership with Cisco in October and a multi-year deal with Marketo in August.  Fans of Google Cloud, like ourselves, will certainly commemorate the excitement about Salesforce and Google, a match made in heaven. When two powerhouses come together, it's a force to be reckoned with.

By Matthias Moore 26 Oct, 2017
A recent survey discovers traditional IT decisions are significantly impacting company profits. The commonality was not adopting modern technologies and keeping old-school tech, such as their on-premise servers and outdated software. Most importantly, is that they are not leveraging the cloud. Not only were the companies not informed of the massive benefits that the cloud would bring to their organization, their in-house IT departments or the companies managing their infrastructure are found to resist the cloud and not teach the true benefits of how and why the cloud would benefit their company. Migrating to the cloud saves companies money, time and future IT headaches. Have you ever wondered why most IT "professionals" avoid mentioning a cloud solution or why they resist the idea of cloud adoption? Unfortunately, it's likely because once they remove your servers and complicated software, they will not be able continue collecting checks to come repair and maintain broken down systems, thus directly impacting their own bottom line. If you are told its because of security risks, you are being misinformed. The security features of the cloud far exceed those of standard in-house methods because it adds another layer of security, above and beyond your existing security. Don't be mislead or misinformed of the advantages of moving your business to the cloud.   

Additionally, the study had shown that 65 percent surveyed, believe  they could bring better technology to their business if they had the right cloud environment. Another 85 percent that have entered into the cloud, had claimed after migrating their business into the cloud they have recuperated the return on their investment ten fold. It's important to note, the right cloud infrastructure will land most companies in the savings arena from day one.

Almost 50 percent of IT decision makers claimed they found it difficult to find and hire knowledgeable professionals to manage their company's cloud platform. While 30% of businesses are already jumping into the cloud, that number is expected to increase by double that number in just the next few years. I would expect you will see more IT professionals following that trend in the coming years, but it is incredibly important that they are experienced and properly trained in current and upcoming cloud technologies. We have experience with several cloud companies offerings, but we stand behind Google's G-Suite series because it has proven to offer the most competitive and best comprehensive platform at a fraction of the price of its competitors. We have seen a decrease in costs by 70% and an increase in workflow and profits of nearly double that number. Many of our cloud clients have seen as much as 300% increase in production!

If you are unsure if the cloud is right for you,  just ask us. One of our cloud specialists would be happy to evaluate and educate you on how it can help accelerate your business above the competition while saving you money.

Prices start as low as $5 per month . No hidden fees, no extra software licenses needed and 1000's of free apps to help automate and run your business!

Call Us Today To Get Started

Lingows: 720-378-8970

By Matthias Moore 23 Oct, 2017
There has been a massive amount of press coverage concerning the news that Avast's Piriform CCleaner was unlawfully hacked during the development process resulting in a backdoor access point. Their initial top priority is the dedication to the security and safety of their millions of users, as well as, sustaining their brand-new acquisition, Piriform.

Given the late disclosure of the massive Equifax data breach, customers and media are on extreme alert, as they ought to be. Therefore, as soon as Avast knew of this breach, they jumped right in and resolved it. Within roughly 72 hrs of the breach, the problem was fixed by Avast without it affecting Piriform consumers. The objective of this write-up is to clarify what actually occurred, correct some misinformed info that is presently circulating, and summarize the actions Avast took and plans to take moving forward.

Avast acquired Piriform, the manufacturer of CCleaner , on July 18, 2017, due to the fact that Piriform had an excellent product and remarkable supporters. Avast still stands behind that statement today. Just what they didn't know was that prior to the purchases completion, the cyberpunks were most likely already in the process of hacking the Piriform systems. The hacking process likely began on July 3rd. The web server was provisioned previously in 2017 as well as the SSL certificate. The corresponding https interaction had a timestamp of July 3, 2017. They strongly believe that Piriform was being targeted while they were running as a standalone business, before the Avast acquisition. The compromised version of CCleaner was launched on August 15th and also went undiscovered by any kind of security for four weeks, highlighting the sophistication of the attack. In their opinion, it was a well-prepared operation and the reality that it did not create harm to users is an extremely excellent end result for Avast.

Shortly after the initial news, a series of the press released misinformation regarding exactly what took place based on assumption. Several of the write-ups implied that 2 billion customers were impacted with an additional 5 million each week. This originated from a number of downloads that CCleaner had; 2 billion times with 5 million a week being downloaded and installed, as stated on their website. Nonetheless, this is vastly different from the actual affected users. As just 2 smaller sized distribution products (the paid versions) were compromised, therefore the real number affected by this breach was 2.27 M. As a result of the aggressive response by Avast, 730,000 users may still be using the affected version 5.33.6162. These individuals must update despite the fact that they are not at risk as the malware was disabled on the server side. Even so, Avast consumers are encouraged to update to the latest version of CCleaner, which certainly removed the backdoor code from their systems. As of now, CCleaner 5.33 received an alert suggesting them to execute the update.

Avast took complete responsibility and also expressed that they deeply recognized the severity of the situation, as they do with all security of their products. Additionally, they took proactive measures as well as took the server down prior to any harm was done to customers. Good thing Avast acquired the company otherwise the outcome might have been vastly different.
By Matthias Moore 19 Oct, 2017

An announcement was made this week that there was a major breach in WPA2-- the protection criterion that secures all modern-day Wi-Fi networks. What follows is a brief review of what exactly goes to risk below, who's most at-risk from this vulnerability, as well as exactly what companies and people can do concerning it.

Short for Wi-Fi Protected Access II, WPA2 is the security procedure made use of by a lot of networks today. Researchers have found and released an imperfection in WPA2 that enables any person to crack this security design and also steal information moving between your wireless devices and the targeted Wi-Fi network, such as passwords, chat messages as well as photos.

Krack works against all protected Wi-Fi networks. Depending on the network arrangement, it is also feasible to control data. "For instance, the attacker may be able to infuse ransomware or various other malware into websites. The weak points remain in the Wi-Fi itself, as well as not in products or executions. As a result, any type of all WPA2 is most likely affected.

What that suggests is, the vulnerability possibly impacts a vast array of tools including those running operating systems from Android, Apple, Linux, OpenBSD and Windows.

As scary as this attack sounds, there are numerous mitigating variables at play. To begin with, this is not an attack that can be managed remotely: An attacker would need to be within range of the wireless signal between your devices and a nearby wireless access point.

More urgently, most sensitive communications that might be obstructed these days, such as interactions with your banks or searching email, are most likely currently shielded end-to-end with Secure Sockets Layer (SSL) file encryption that is different from any kind of security added by WPA2-- i.e., any connection in your internet browser that starts with "https://".

Additionally, the announcement about this safety and security breach was held for weeks in order to provide Wi-Fi equipment suppliers an opportunity to generate security updates. The Computer Emergency Readiness Team has a running checklist of equipment vendors that are known to be impacted by this, as well as links to available advisories and also patches.

“There is no evidence that the vulnerability has been exploited maliciously, and Wi-Fi Alliance has taken immediate steps to ensure users can continue to count on Wi-Fi to deliver strong security protections,” reads a statement published today by a Wi-Fi industry trade group. “This issue can be resolved through straightforward software updates, and the Wi-Fi industry, including major platform providers, has already started deploying patches to Wi-Fi users. Users can expect all their Wi-Fi devices, whether patched or unpatched, to continue working well together.”

Appears great, however, in practice, a great lots of products on the CERT checklist are presently marked "unidentified" whether they are vulnerable to this problem. I would expect this checklist to be updated in the coming days and also weeks as more details can be found in.

Some readers have asked if MAC address filtering system will safeguard against this assault. Every network-capable tool has a hard-coded, one-of-a-kind "media gain access to control" or MAC address, as well as many Wi-Fi routers, have a feature that allows you just allow access to your network for defined MAC addresses.

However, since this attack compromises the WPA2 protocol that both your wireless devices and wireless access point use, MAC filtering system is not an especially effective deterrent against this attack. Likewise, MAC addresses can be spoofed fairly conveniently.

Those most at risk from this vulnerability are organizations that have actually refrained from doing a great task separating their cordless networks from their enterprise, wired networks.

I don't see this ending up being a significant threat to the majority of users unless and also until we begin seeing the schedule of easy-to-use attack devices to exploit this imperfection. Those tools could emerge faster rather than later on, so if you're extremely concerned that this strike will impact you, better to be safe than sorry, perhaps the most effective technique in the short run is to link any type of tools on your network to the router through an ethernet cable television (presuming your gadget still has an ethernet port). Lingows can help as well so feel free to give us a call 720-378-8970.

From reading the advisory, it shows up that one of the most recent variations of Windows as well as Apple's iOS are either not at risk to this defect or are just revealed in very details situations. Android devices, on the other hand, are most likely to require some patching, and soon.

If you see that a CERT advisory update is available or your computer, wireless device or desktop or wirless access point, make sure to review and the instructions on updating those gadgets prior to updating. Failing to do so can result in expenses and unusable devices.

Lastly, consider surfing the Web with an extension or browser add-on like HTTPS Everywhere, which requires any kind of website that sustains https:// links to encrypt your communications with the Web site-- regardless of whether this is their default for that site or not.

Tags: , KRACK , MAC, Linux, Android,  Wi-Fi, Wi-Fi network, WPA susceptibility, WPA2 attack,  Lingows , IT News,  HTTPS Everywhere

Share by: