6 Ways to Save Your Eyes If You Stare at a Computer Screen All Day

Staring at a computer screen all day can wreak havoc on your eyes. Irritated eyes, blurry vision, and headaches are some of the common signs of a condition called computer vision syndrome. Around 70 million workers worldwide are at risk of suffering from this syndrome, according to a 2016 study. Apart from the health effects, these workers will also be less productive, according to a study conducted by the University of Alabama at Birmingham.

Although computer vision syndrome is common, you can take measures to avoid it. Here are six ways to reduce the strain on your eyes when working on a computer:

1. Use Proper Lighting

A main cause of eyestrain is improper lighting. Excessively bright light from interior lighting or windows should be avoided. A good rule of thumb is that the ambient lighting in your computer workspace should be about half as bright as that in the rest of the office.

You can cut down on some of the unnecessary light by using lower intensity light bulbs and by having blinds or drapes on the windows. Plus, if possible, position your computer screen to the side of any windows rather than directly in line with them.

2. Place Your Computer Screen in the Optimal Position

You can reduce eyestrain by placing your computer screen around 20 to 26 inches away from your eyes and a little below eye level. This will reduce eyestrain as well as help avoid neck, shoulder, and back pain.

3. Adjust Your Computer Screen Settings

You should adjust the brightness of your computer screen so that it matches the ambient lighting of your workspace. To do this, load a web page that is all or mostly white. If the screen seems dull, the brightness might be too low. If it looks like a light source, the brightness is set too high. If you do not want to manually adjust your screen, there are applications that will automatically adjust its brightness throughout the day based on the ambient lighting.

Text size and contrast are two more issues to consider when making screen adjustments. Both options can be adjusted within your computer's display settings. On Windows devices, the display settings are in Control Panel, while on Apple devices, they are in System Preferences.

4. Exercise Your Eyes

Constantly focusing on your screen can tire out your eyes. This fatigue can cause your eyes' focusing ability to diminish after using a computer for an extended period of time.

Exercising your eyes is a good way to avoid eye fatigue. One exercise to follow is called the 20-20-20 rule. Every 20 minutes, you should look at an object 20 feet away for 20 seconds.

Another eye exercise is to look at a distant object for 10 to 15 seconds and then look at a close object for the same amount of time. Repeating this process 10 times can help reduce eye fatigue.

Remembering to exercise your eyes throughout the day can be difficult. Fortunately, there are a few applications you can use to schedule reminders.

5. Blink More Often

When you work on a computer, you blink significantly less than you normally would. By consciously blinking more often, you can help keep your eyes from drying out and becoming irritated. Using eye drops can also keep your eyes moist.

6. Take Frequent Breaks

Taking more mini-breaks during the day can reduce the risk of eye problems as well as neck, shoulder, and back pain, according to a study by the U.S. National Institute for Occupational Safety and Health. In the study, workers had four 5-minute breaks throughout the day in addition to their normal breaks. The added breaks minimized the workers' eyestrain and discomfort, without impairing their productivity.


Devious Tricks That Cybercriminals Use to Scam Businesses

Cybercriminals have stolen $3.1 billion from businesses since January 2015 — not with high-tech ransomware or stealthy spyware, but rather with low-tech emails. The U.S. Federal Bureau of Investigation (FBI) refers to these attacks as Business Email Compromise (BEC) scams. Since January 2015, more than 22,000 businesses worldwide (including businesses in all 50 U.S. states) have reported falling victim to a BEC scam. There are likely many more businesses that were swindled but did not report it.

Although using emails is a low-tech approach to stealing money, these emails are well crafted. Each BEC email is polished and specific to the business being victimized. The cybercriminals spend a good deal of time creating each email in the hope that its legitimacy will not be questioned.

How Cybercriminals Create the BEC Emails

The cybercriminals behind the BEC scams are digital con-artists. Like regular con-artists, they first study their victims. They identify the individuals and information necessary to carry out the scams. As part of this research, the digital con-artists sometimes send out phishing emails that request details about the businesses or individuals being targeted. Alternatively, the phishing emails might install malware that obtains sensitive business information, such as financial account records. The cybercriminals also use social engineering techniques to get information. For instance, they might visit social media websites (e.g., LinkedIn, Facebook) or call the company.

After the digital con-artists have the information they need to scam a business, they create the BEC email. They try to get both the wording and graphical elements to look like a legitimate email from that business (or from an organization it does business with, such as a supplier). They know that the closer the match, the harder it will be to spot the scam.

The Five Variations of the BEC Scam

When the FBI analyzed the reports of the 22,000+ BEC victims, it discovered that there were five main variations of the BEC scam:

  1. Posing as a business executive, the digital con-artist requests a wire transfer. A cybercriminal hacks or spoofs the email account of a business executive and then uses that account to send an email requesting a wire transfer. Typically, the email is sent to the employee responsible for processing these requests. On occasion, the email is sent directly to the financial institution. The FBI found that the digital con-artists often send these emails when the executives are on business trips.
  2. Pretending to be a business executive, the cybercriminal requests employees' personal information. Using a spoofed or hacked email account of a business executive, the digital con-artist sends an email to the staff member responsible for maintaining employees' personal information (e.g., human resources or accounting staff). In the United States, this variation of the scam was used to get employees' W-2 tax information.
  3. Posing as a supplier, the cybercriminal requests an invoice payment. The digital con-artist usually selects a supplier that the targeted business has used for a long time. After learning who is responsible for processing supplier payment requests at the targeted business, the cybercriminal will send that person a legitimate-looking payment request. The email tells the employee to wire the invoice payment to an alternate, fraudulent account. Occasionally, the invoice payment request is made by fax or phone instead of email.
  4. Pretending to be an employee, the digital con-artist requests invoice payments from vendors. After identifying who works with vendors at the targeted business, the cybercriminal hacks that employee's personal email account, using it to request invoice payments from vendors. This scam is most successful when employees use their personal email accounts for business and they have the vendors listed in their contact list.
  5. Posing as a lawyer or law firm representative, the cybercriminal requests a fund transfer. The digital con-artist emails or calls an executive or another employee in the targeted business, claiming to be handling confidential or time-sensitive legal matters. The cybercriminal tries to pressure the person into transferring funds quickly or secretively.

How to Avoid Falling Victim to a BEC Scam

Knowing about the five BEC scam variations is one of the best ways to avoid falling victim to them. Thus, you need to educate employees at all levels about the scam scenarios so they can spot BEC emails. In addition, employees should be taught how to spot phishing emails since cybercriminals will use them to gather information prior to creating the BEC emails.

Besides training employees, you should take the following measures to avoid being swindled by a BEC scam:

  • Do not use free web-based email accounts (e.g., Hotmail, Gmail) for your business. The FBI found that digital con-artists often target businesses using these email accounts.
  • Consider using two-step verification for business email accounts. If you set up two-step verification (also known as two-factor authentication) for these accounts, they will be much more difficult to hack.
  • Never wire money based on an email without first verifying via telephone or in person conversation.  There have been several instances where someone has taken an email directive from what appears to be the CEO/owner of the company and wired money per the instructions in an email.
  • Be careful about what you post on your business's website. For example, do not post job descriptions or hierarchal information, as this information might prove helpful in determining the best person to target in a BEC scam.
  • Ask employees not to post too many details about their jobs on social media websites. Digital con-artists scour these sites for information about businesses and their employees.
  • Use anti-malware software and regularly update the operating systems and applications on your business's computers. Some cybercriminals use phishing emails that install malware to get information for BEC scams. This malware often relies on known vulnerabilities of the operating system or applications to get onto a computer system.

How to Stop Microsoft from Using Your Bandwidth to Send Updates to Other Computers on the Internet

If you upgraded to Windows 10, Microsoft might be using your computer and Internet connection to send Windows updates and even applications to other computers on the Internet. The Windows Update Delivery Optimization (WUDO) feature is what makes this possible.

When WUDO is enabled, the following occurs:

  • Your computer will receive updates and applications from other computers besides getting them from Microsoft.
  • Your computer will send updates and parts of applications that it downloaded through WUDO to other computers.

To a limited degree, you can choose which computers are involved in sending and receiving updates and applications. You have two options. One option is to keep the exchange limited to computers in your local network. This can reduce the amount of bandwidth needed to keep those computers up-to-date, according to Microsoft. The other option is to let the exchange occur between computers in your local network and computers on the Internet. This option is designed to help people who have a limited or unreliable Internet connection, notes Microsoft.

WUDO is enabled by default. It is set to allow computers in your local network and on the Internet to send and receive updates and applications. If you are not okay with these settings, here is how to change them:

  1. Click the "Start" button and select "Settings".
  2. Select "Update & Security".
  3. Choose "Windows Update" in the left pane.
  4. Click "Advanced options" in the right pane.
  5. Select the "Choose how updates are delivered" option.
  6. If you want to disable WUDO, move the on/off slider to "Off".
  7. If you do not mind the computers in your local network sharing updates and applications, keep the slider to "On" and select the "PCs on my local network" option.

Defending Against Cybersecurity Threats in Your Hotel Room

This July 4th weekend according to AAA is going to be the busiest ever.  A projected 43 million Americans will pack their bags to celebrate the 4th.  Being on the road is typically a stressful affair. Travelers have to worry about making their flight connections or booking reservations to a hotel or restaurant. Just being in an unfamiliar area can make some people anxious. Unfortunately, when sorting out these issues, some travelers don't think about the cybersecurity threats that they may be facing.

Many businesspeople use public Wi-Fi networks when on the road. This practice is particularly unsafe, since hackers can use fake hotspots to break into their targets' computers. Even when a network is legitimate, hackers can still spy on a target's web connection, hijack their data, and infect their computer with malware.

Many hackers have begun to focus their efforts on hotels, since they are typically full of traveling executives. These businesspeople are considered to be high-value targets since they may possess access to company bank accounts or sensitive information. Experts have already uncovered a number of sophisticated cyberattacks that targeted hotels and their guests.

Examples of Cybersecurity Threats in Hotels

Kaspersky Lab, one of the world's leading cybersecurity firms, announced in November 2014 that it had discovered an advanced cyberthreat that targeted several luxury hotels. The threat, which the firm called "Dark Hotel," went unnoticed for 7 years before being uncovered by Kaspersky. Although the attacks were predominantly focused on East Asian countries, researchers discovered instances in the US, Germany, and Ireland as well.

Each Dark Hotel attack began with hackers compromising a hotel's Wi-Fi network. After a guest at the hotel connected to the compromised network, the hackers offered them "updates" to well-known software like Adobe Flash Player. These "updates" contained malware that allowed the hackers to take control of the guest's computer. The malware also included a keylogger program that the criminals used to steal usernames, passwords, and other important pieces of information. They also used phishing techniques to spread their malware, specifically by sending malicious email messages to governmental and nonprofit organizations.

These attackers were quite skilled, as evidenced by the fact that they used previously unknown vulnerabilities in major applications. They were also very careful about not getting caught. Their malware was designed to remain inactive for 6 months after infecting a computer. This made it very difficult to discover. It also had a self-destruct protocol, so researchers would have trouble studying it after detection.

Attackers can also use hotels' vulnerable IT equipment as part of their attacks. These vulnerabilities can be very severe, as the Cylance cybersecurity firm showed in March 2015. The company announced that it had discovered a major vulnerability in a popular network router used by hotels and convention centers around the world. Hackers could have exploited this vulnerability to compromise a hotel's Wi-Fi network, and infect any computers connected to the network with malware capable of stealing data and personal information. The router's manufacturer quickly released a patch that fixed the problem, but the case demonstrated just how insecure hotels' Wi-Fi networks can be.

Compromised wireless networks are not the only cybersecurity threats that one can find at a hotel. Infected computers also represent a serious threat to travelers' online safety. One case in Dallas, Texas, was so severe that the US Secret Service and the Department of Homeland Security had to publish a warning about the threat. The case involved hackers that used keylogger programs on the public computers in the business centers of several major hotels in the area. The authorities noted that even though the attacks required relatively little skill, the hackers were still able to successfully steal a large amount of data, including guests' personally identifiable information (PII) and the login credentials to their online bank accounts.

How to Protect Your Computer When Traveling

The Dallas attacks show just how important it is to avoid online banking on public computers or unsecured Wi-Fi networks. Travelers are especially guilty of breaking this rule while on the road, with many of them connecting to public wireless networks in airports, coffee shops, convention centers, and hotels.

If you need to access your email inbox while traveling, create a throwaway email address and use your smartphone to forward the relevant message or messages to the throwaway email address. This lets you keep your regular email account safe from hackers.

When traveling, make sure that your computer doesn't automatically connect to unknown Wi-Fi networks. Similarly, avoid visiting any websites that are not secured by HTTPS. The encryption provided by this communications protocol protects web traffic from hackers. You can also use a virtual private network to encrypt your web traffic.

You should be using multi-factor authentication measures as well. These tools require you to use multiple forms of identification — such as your password, your fingerprint, or a code sent to your smartphone — in order to access your accounts. This ensures that even if a hacker manages to steal your passwords, they still won't be able to get into your accounts.


7 Ways to Help Your Windows Computer Run Faster

Many different factors can cause computers to become slower and less responsive, no matter their age. Files might take longer to open, and applications might respond to commands at a snail's pace. Fortunately, there are actions you can take to improve a Windows computer's performance.

Here are seven ways to speed up your computer:

1. Uninstall Preloaded Programs That You Do Not Want

Computers often come with preloaded programs (aka bloatware) that computer manufacturers try to push on users. These applications can slow down your computer and take up valuable space on your hard drive. Removing these preloaded programs can help clear up space and boost your computer's performance.

2. Close Applications Not Being Used

Having many software programs running at the same time can bog down your computer. Closing applications that you are not actively using can improve your computer's speed. It also cuts down on distractions, which can help you get your work done more quickly.

3. Use the High Performance Power Plan

Windows Vista and later versions provide three power plans — High Performance, Balanced, and Power Saver — that let you manage how your computer uses power. As the name suggests, the High Performance power plan maximizes performance. However, your computer will use more energy.

By default, Windows computers are set to the Balanced power plan. To change this setting, open Control Panel, select "System and Security" (Windows 7 and later versions) or "System and Maintenance" (Windows Vista), and click "Power Options".

4. Add Random Access Memory (RAM)

Adding more RAM is a good way to give an older computer a performance boost. With newer computers, however, the benefits are less obvious since they typically already have large amounts of memory installed. The more RAM you have, the less an upgrade will boost performance, according to experts. For example, upgrading from 2 gigabytes (GB) to 4 GB will not have as great an impact as upgrading from 1 GB to 2 GB.

The effects of upgrading beyond 4 GB of RAM will depend on the quality of the rest of the hardware. Installing massive amounts of RAM on a cheap system will not help much because you will likely encounter a bottleneck somewhere else.

5. Install Solid State Drives (SSDs)

One of the best ways to improve your computer's performance is to upgrade its hard drive to an SSD. SSDs are faster at reading data than hard disk drives. In most situations, SSDs are also faster at writing data. SSDs have fallen in price, making them a cost-effective solution for greater computer speed.

6. Reinstall Windows

Over time, all kinds of garbage can accumulate in your computer system. For example, uninstalling applications sometimes leaves remnants, such as registry entries, icons, and leftover data. Reinstalling Windows gets rid of all the garbage, which can boost performance. However, it is time-consuming. You need to not only reinstall the operating system but also reinstall all your applications and restore all your files from backups.

7. Refresh Windows

Windows 8.1 and Windows 10 provide the refresh feature, which you can use to remove accumulated garbage. With this feature, the operating system is reinstalled, but personal files, user accounts, and important settings are preserved. With Windows 8.1, applications that came with your computer and any you installed from the Windows Store are automatically reinstalled, but you need to reinstall all others. With Windows 10, you need to reinstall all your applications, except those that came with the computer.

Actions to Avoid

Besides knowing the seven ways to boost a computer's performance, it also helps to know the actions to avoid. Despite what you might read on the Internet, you should avoid disabling startup items and making changes in the registry. If done incorrectly, you can cause some serious problems. Plus, other actions such as defragmenting hard drives and clearing temp files will result in little if any performance gains, so it is not worth the effort. PowerOne can help you decide the best ways to improve the speed of your computer, given its hardware and applications, as well as your usage habits.


How to Uninstall QuickTime for Windows and Why You Should Do So

Are any of your company's computers running Apple's QuickTime for Windows? Unless you need it to play content that no other program can handle, you should seriously consider uninstalling it. Apple stopped supporting this media player/multimedia framework on the Windows platform, which means there will be no more security updates for it. (Apple is still supporting QuickTime on its OS X platform, though.) Apple designed QuickTime for Windows to run on Windows Vista and Windows 7, but it also works on later versions of Windows.

You should uninstall QuickTime for Windows sooner rather than later. In April 2016, the Zero Day Initiative released advisories about two new security vulnerabilities (ZDI-16-241 and ZDI-16-242) discovered in the application. Apple will not patch these vulnerabilities (or any others found in the future) because it no longer supports QuickTime for Windows. There are no known attacks exploiting these vulnerabilities yet. However, cybercriminals often devise and launch new attacks that specifically target unsupported software.

To uninstall QuickTime in Windows Vista, Windows 7, Windows 8, Windows 8.1, and Windows 10, follow these steps:

  1. Type "Control Panel" in the Windows search box.
  2. Click the "Control Panel" program listed in the search results.
  3. Make sure the Control Panel window is being displayed in the Category view. If necessary, change to that view by selecting "Category" in the "View by" drop-down list.
  4. Under Programs, click the "Uninstall a program" link.
  5. In the alphabetized list of installed programs, scroll down until you find the entry for QuickTime and then click it.
  6. A dialog box will appear asking whether you are sure that you want to uninstall QuickTime. Select "Yes".
  7. Another dialog box might appear asking if you want to allow the QuickTime application to remove the software from your PC. If you receive this dialog box, choose "Yes".

As your IT service provider, we can help you select a suitable alternative for QuickTime for Windows. Plus, we can help you find and remove any other unsupported software that cybercriminals might try to exploit.


Planning to Upgrade to Windows 10 for Free? Do It Soon

If you plan on taking advantage of Microsoft's free Windows 10 upgrade offer, there is an important deadline approaching: July 29, 2016. You have until then to upgrade existing Windows 7 and Windows 8.1 devices that qualify for the offer. There is no limit to the number of upgrades, so you can upgrade all the eligible computers in your business. They just need to meet the requirements.

The Requirements

To qualify for the free upgrade offer, your computers need to meet the necessary hardware and software requirements for Windows 10. You can find those requirements on the Windows 10 Specifications page.

Your computers also need to be running Windows 7 Service Pack 1 (SP1) or Windows 8.1 Update. The free upgrade offer does not apply to devices running:

  • Windows RT or Windows RT 8.1
  • Enterprise edition of Windows 7, Windows 8, or Windows 8.1 (there is a separate upgrade program to qualified enterprise customers with active Software Assurance subscriptions)
  • Older versions of Windows, such as Windows XP and Windows Vista

If you have a version that is not eligible for the free upgrade or you miss the offer's deadline, you can buy Windows 10. In the Microsoft Store, Windows 10 Home costs $119.99 and Windows 10 Pro is $199.99 (USD).

Ways to Upgrade

If you are planning to migrate your eligible computers to Windows 10 for free, you can perform the upgrade by using the Get Windows 10 app or by creating your own installation media (e.g., ISO files) with the media creation tool. Installing Windows 10 through the app is much easier than creating your own installation media, so that is the method recommended by Microsoft.

You can access the Get Windows 10 app by clicking the Windows icon in the lower right corner of the Windows 7 or Windows 8.1 screen. In some instances, the icon might not be present, even if the computer is running a qualified Windows version and meets the hardware and software requirements for Windows 10. The icon might be missing for one of these reasons:

  • Windows is not activated with a genuine license.
  • The computer is connected to a domain or was connected to one in the past.
  • The device is connected to a mobile device management (MDM) solution.
  • The computer does not have the prerequisite updates installed. In Windows 7, the KB3035583 and KB2952664 updates are required. In Windows 8.1, the KB2976978 update is needed.

Although Microsoft provides some guidance on how to deal with these scenarios, it is best to contact your IT service provider for help addressing them.

How to Upgrade Using the Get Windows 10 App

To upgrade using the Get Windows 10 app, you first need to reserve a copy of Windows 10. To do so, click the Windows icon in the lower right corner of the computer screen to open the Get Windows 10 app. Besides providing information about Windows 10's new features, the app discusses the upgrade process. It also automatically performs a compatibility check, looking for software and hardware issues that might prevent a successful upgrade. You can view the compatibility report by clicking the stack of three lines in the upper left corner of the app and selecting "Check your PC".

In the Get Windows 10 app, you will see the "Reserve your free upgrade" button. When you click this button, Microsoft will download the Windows 10 setup files to your computer over a period of time. When it has finished, you will receive a notification that your computer is ready for the upgrade.

Before you upgrade your business's computers, though, you should back up the current files on each one. Even though the files will be present after the upgrade, having backups of them is important in case something goes wrong.

You can perform the upgrade immediately or schedule it to occur at a more convenient time through the Get Windows 10 app. Alternatively, you can begin or schedule the upgrade by clicking the "Get started" button in the Upgrade to Windows 10 section in Windows Update. Either way, you will need to accept the terms listed in the End User License Agreement.

According to Microsoft, the upgrade usually takes 90 minutes or less. Once it begins, the computer will immediately restart. It might also restart several more times during the update. Plus, the screen might go blank for a long period of time. It is important not to turn off the computer during the update.

Eventually, you will be asked if you want to do an express or custom configuration. The express configuration is the best choice for most people. When the update is finished, Windows 10 will be up and running. All the applications and files should be present and available for use.

Help Is Available

Although some files are preloaded when you use the Get Windows 10 app, the upgrade still consumes bandwidth. For this reason, you might want to update one computer at a time. PowerOne can help you make this determination as well as help you with the backups and installation of Windows 10 on your business's computers.


5 Ways to Protect Your Business's Email Accounts from Hackers

While CIA Director Brennan was a casualty of a duped service provider there are other ways hackers use to gain access to your email.  See the full story here:  https://www.wired.com/2015/10/hacker-who-broke-into-cia-director-john-brennan-email-tells-how-he-did-it/    A hacked email account is a serious problem. Besides reading emails, cybercriminals can access other types of information associated with the account, such as calendar and contact data. Hackers can also use the account to send out spam or malicious emails, or even access other online accounts. For example, suppose they see a sales confirmation email from an online office supply store in the inbox of the hacked email account. Website login credentials often consist of an email address coupled with a password. The hackers already know the email address, so they might try entering commonly used passwords or running a password-cracking program to find the password.

Here are five ways to protect your business's email accounts from hackers:

1. Require Strong, Unique Passwords for Email Accounts

Both hackers and password-cracking programs are really good at figuring out weak passwords. For this reason, your business's email account passwords must be strong. A strong password:

  • Is at least eight characters long (the longer, the better)
  • Uses uppercase and lowercase letters
  • Includes numbers, but not in a predictable pattern such as 123
  • Uses special characters (e.g., question mark, ampersand, percent sign) when possible

Email account passwords also need to be unique. Hackers know that people reuse passwords, so once they obtain an account's credentials, they try them elsewhere. Since creating and remembering strong, unique passwords is difficult, have employees use a password manager to create and store their credentials.

2. Secure Your Business's Computers

Hackers can use malware to obtain passwords. For instance, they might use malware that logs keystrokes or searches a computer for credentials. To help prevent such malware from infiltrating your business's computers, it is important to use anti-malware software as well as regularly update your operating system and applications.

3. Educate Employees about Phishing and Spear Phishing

Hackers might try to obtain email account passwords through phishing or spear phishing emails, so you need to teach employees how to spot these emails. When doing so, stress the following points:

  • If employees receive an email from someone they do not know, they should not open any attached files or click any links (unless it is a normal part of their job, such as an HR manager opening attached resumes sent by job applicants).
  • If employees receive an email from someone they know but it contains an attachment they were not expecting, they should check with the person first before opening the attachment to make sure he or she sent it.
  • If employees receive an email from someone they do not know and the email contains a link, they should not click the link.
  • If employees receive an email from someone they know and the email contains a link, they should check the link (hover their cursor over it to see the web address) before clicking it.

4. Create an Official Email Policy

Employees are increasingly using their personal smartphones, tablets, and other computing devices for work. You can use an email policy to let employees know whether they are allowed to access work emails from their own devices.

An official email policy can also lay down some ground rules on accessing emails while traveling for business. For example, the policy might state that employees should not access work emails from public computers (keyloggers might be installed) or use public Wi-Fi hotspots (sniffing attacks could occur).

5. Require Two-Step Verification for Email Accounts If Available

More and more email service providers are offering two-step verification, including Gmail, Hotmail, and Outlook.com. Two-step verification adds another layer of security to email accounts. For instance, employees might need to provide a password and a security code to access their email accounts. With two-step verification, hackers cannot access an account even if they have the password.


What You Need to Know about SQL Server 2005's End of Support

Which database management system is running on your company's server units? For end users, it's not something that they put a whole lot of thought into. However, if you completely overlook your Microsoft SQL Server, you may end up running an expired version that puts your data at risk. Case in point, SQL Server 2005, for which Microsoft recently ended support .

Microsoft's support for SQL Server 2005 ended on April 12, 2016. This is not unexpected, as this software is more than a decade old. If you are still using SQL Server 2005, it will continue to function. However, relying on it in the long term might not be the best course of action.

The Pitfalls of Staying with SQL Server 2005

Continuing to use SQL Server 2005 to drive the backend of your business has several drawbacks. The most serious one is that your business will be more vulnerable to cyberattacks. Because Microsoft is no longer providing security updates for SQL Server 2005, your databases will not be protected against new malware or new attack vectors. To make matters worse, many cybercriminals keep track of when versions of popular programs like SQL Server reach their end of support. Once that day arrives, the cybercriminals intentionally launch new attacks that target the unsupported software.

Another downside of sticking with SQL Server 2005 is that it will be increasingly harder to achieve compliance with regulations and standards like the Health Insurance Portability and Accountability Act (HIPAA) and Payment Card Industry Data Security Standard (PCI DSS). Both HIPAA and PCI DSS call for the protection of sensitive data, which databases often contain. If you cannot protect your SQL Server 2005 databases from new cyberattacks, you might be found in noncompliance with HIPAA and PCI DSS. Noncompliance can result in penalties, higher costs, and even lost business.

Although not as serious as the disadvantages just discussed, continuing to use SQL Server 2005 means that you cannot turn to Microsoft for help. The Microsoft Customer Service and Support staff is no longer able to answer any technical questions you might have about SQL Server 2005 or help you troubleshoot any problems. The only assistance that Microsoft offers is its publicly available online content, such as Knowledge Base articles and support webcasts.

You Do Not Have to Make the Decision Alone

Staying with SQL Server 2005 has some obvious benefits — namely, you do not have the hassles and the costs associated with upgrading to a new version. However, you need to keep the pitfalls in mind. PowerOne can help you weigh the pros and cons of each course of action.

If you choose to upgrade, the options include migrating your onsite databases to SQL Server 2014, which requires Windows Server 2012 or Windows 8. Alternatively, you can use SQL Azure Database, Microsoft's cloud-based database service. With this service, you access your databases with the Azure Management Portal. It works on all modern desktop and tablet devices running at least one of the following web browsers: Microsoft Edge, Microsoft Internet Explorer 11, Apple Safari, or Google Chrome. PowerOne can help you determine whether it is more advantageous to keep your databases onsite or move them to the cloud.


7 Convenient Calling Features That Can Boost Productivity

Employees tend to have many responsibilities, especially in small businesses. To handle these responsibilities, they need to manage their time wisely. One way you can help your employees be more productive is by providing calling features designed with convenience in mind.

Here are seven convenient calling features that you might want to look for in a phone system:

1. Sequential Ringing

Employees who are on the move will find sequential ringing helpful. When this feature is enabled, an unanswered call is automatically forwarded to a preset list of phone numbers, but the person calling only has to dial one number. Employees specify the phones to forward their calls to and the number of rings before the call is forwarded. They often set up sequential ringing so that calls go to their desk phone, then their cell phone, and finally voicemail. The possibilities are endless, though. For example, if employees are unable to answer their phone, they can have their calls go to another member of their department, followed by a third department member, and finally the office receptionist.

2. Simultaneous Ringing

With simultaneous ringing, all the phones specified in a list will ring at once when a call comes in. As soon as the call is answered, the ringing stops. Employees often set up simultaneous ringing so that both their desk phone and cell phone ring at the same time. Businesses can even have all the phones in a department set to ring when someone calls that department.

3. Conference Calling

Traveling to a meeting can make an employee's productivity plummet. With conference calling, employees can attend meetings without wasting time getting there. Plus, businesses can save money because they do not have to pay for travel expenses. Conference calling provides a virtual meeting room, which employees enter by using a dial-in number and personal identification number.

4. Three-Way Calling

Three-way calling lets employees participate in impromptu conference calls. During a call, an employee can add another person to the conversation. All the employee needs to do is press the switch hook or flash button, call the third person, and then press the switch hook or flash button again.

5. Enhanced Voicemail

With enhanced voicemail, employees can listen to their voicemails from any phone or through a web application. They can even receive them as MP3 files attached to emails.

6. Voicemail Transcription

Rather than having to listen to and write down information in a voicemail, employees can have an automated system transcribe the message so that they can simply read it. Most often, these automated systems send the transcribed messages to employees via email. In some cases, employees can receive them via a text messaging service.

7. Telemarketer Blocking

Telemarketing calls can waste employees' time. Fortunately, there are features that can detect and block these calls. One such feature works by detecting when telemarketers use a machine that automatically dials every number in a phone directory. Another works by blocking phone numbers that display "Anonymous," "Unknown," "Unavailable," or "Restricted" instead of the phone number on caller IDs.