Blog

Hidden Gems in Apple iOS Notes  

The Apple iOS Notes application is a great tool with so many practical features.  However, many don’t know about these hidden tools to extend the Notes experience.  Check them out here.    

The Apple’s Notes application is built into all versions of iOS. Ever since the release of the original iPhone in 2007, it’s been the perfect way to handle word processing on-the-go.

Apple IOS Notes

Notes will get a significant overhaul when iOS 11 is released in the fall of 2017. If beta versions are any indication, you’ll be impressed with the new capabilities Notes provides.   Here are just a few of them:

Notes Stationary

With Notes, iOS 11 you’ll be able to change the default stationary—select yours from a range of lined and gridded paper styles.  Change the default style for all your notes, or on a note-by-note basis. Just tap the “New Note” button and select the “Share” arrow. Or from your computer keyboard hit “CMD” + “N”. Once you select the “Lines & Grids” option, you see all the styles to choose from.

Superior Organization

The iOS 11 version of the Notes app has some great options for organizing. Until now, Notes appeared on one screen. You could create folders, but extensive organization wasn’t a possibility—Until now, that is.

In iOS 11, all you have to do is swipe the title of a note with your finger to open up a new list of organizational options. In addition to moving and deleting notes, you can password-protect a note. This is perfect for people in enterprise environments who share devices like iPads.

Pinning

You can also pin a note to the top of your list, so it’s always within reach. To do this, simply swipe right on the name of the note, and release. The note will be pinned in place so it can’t be moved even if you organize by date created, or alphabetize by title, etc.

Moving and Deleting Notes

Previous versions of Notes allowed you to quickly delete a note or move it into a folder with a few swipes of your finger. This basic functionality remains in the iOS 11 version—However, it’s gotten a significant makeover.

Now, when you swipe on a note and select “Move,” you won’t see a list of all the folders you created. Instead, you’ll see icons that represent things like attachments and images.  This lets you quickly view your options so you can move your note. All you have to do is tap on the folder and the selected note will move there instantly. This won’t take more than a few seconds.

However, when you attempt to delete or move a password-protected note, you’ll now be prompted to enter the password (or use Touch ID depending on the settings on your device). You won’t be able to do anything unless you provide the proper credentials, which, again, helps to keep your confidential information private.

If at any point you make a mistake when it comes to moving and organizing your notes, all you have to do is physically shake your iPhone or iPad for a second or two to undo it. You don’t need to go through the menu system.

More New Features

The new iOS 11 Notes app comes with advanced features that add value for enterprise users in particular. If you own an iPad Pro and an Apple Pencil, you can now sketch anywhere in any note, at any time. Certain text tools that were only in the macOS version of Notes, will now be available in iOS 11.

Use the camera on your device to scan paper notes and save them in Notes until you move them to the folder of your choice. Previously, this feature was only available in third-party apps, most of which will now be unnecessary.

These are just a few of the new, hidden features in Notes iOS 11.  If you’d like to learn more for your business in Omaha contact InfiNet Solutions at (402) 895--5777 or [email protected].

Hidden Gems in Apple iOS Notes   Read More »

Everything You Need To Know About World Wide Web Day

World Wide Web day is a chance to celebrate the way the Internet has created an environment for collaboration and business growth.

World Wide Web Day

How often do you start your days by signing into your email account, scanning your social media accounts, or reading the latest headlines? For over two decades people across the world have enjoyed the Internet and all that it has to offer. From staying connected, to increase revenue streams, to helping businesses grow, World Wide Web Day is a global celebration dedicated to web browsing, the online activity that brings a wealth of knowledge to your fingertips.

A Look Into The Origins Of World Wide Web Day
CERN scientist Tim Berners-Lee wrote a proposal in March 1989 regarding the future development of a distributed system for the laboratory and scientists across the globe. By December 1990 the world’s first server and website were on the precipice of going live at CERN. From its birth to initial inception, the World Wide Web was designed as the system to inspire communication via hyperlinks. Today, the web has exponentially grown to allow people from all over the world to communicate, share knowledge, learn, connect, and grow. In many ways it has become the catalyst for change within our society as doors that would have been previously unimaginable are being opened.

A Brief History Of The Internet
The invention of the internet is attributed to Tim Berners-Lee, a British scientist who in 1989 first conceived of the idea at CERN in Geneva, Switzerland. The idea grew out of a necessity for nearly instantaneous and automatic knowledge-based sharing between scientists across the globe. Until the birth of the World Wide Web, a scientists ability to share information quickly and accurately was minimal at best; needless to say, if progress was to continue to develop at a rapid pace, then a better, more innovative communication platform needed to be developed.

The world’s first website was hosted on Berners-Lee’s NeXT computer and was dedicated to the World Wide Web project. The site described the features of the web; how to set up your own personal server; and how to access other people’s shared documents. As time progressed and the popularity of the World Wide Web sky rocketed, the need for larger and faster servers quickly arose; however, the original NeXT machine can still be found at the CERN laboratory.

By April 30, 1993 CERN had decided to make the World Wide Web software a public domain. Over the next months CERN issued a release that was made available with an open license to further spread the use of the World Wide Web to those outside of the scientific community. Through these steps, CERN ensured that the use of the World Wide Web would continue; its growth would flourish; and people from all walks of life would be able to enjoy the mass amount of knowledge that would soon be stored, displayed, shared, and published. By making the software needed to run a web server freely available, CERN also helped to create the platform needed for future open source software development ventures, which have resulted in some of the greatest digital technological advancements of our time.

How Can You Celebrate World Wide Web Day?
In 2013, CERN decided that it wanted to raise additional awareness regarding the initial origins of the World Wide Web project. As part of this initiative, CERN reinstated the world’s first website, going so far as to use the site’s original address. Today, we can celebrate World Wide Web Day on August 1, 2017 in a multitude of fashions. We can celebrate by logging into our email accounts, posting on social media platforms, debating in online forums, posting a blog, streaming live music, backing up our data servers, reading blog posts (such as this one), or completing any of the myriad of actions that the World Wide Web has placed at the tips of our fingers. No matter what actions you choose to take remember to honor the original mission of the World Wide Web by creating, sharing, and publishing valuable information that can be enjoyed by people throughout the world. Partake in World Wide Web day and discover how emerging technologies can benefit your business when you contact InfiNet Solutions located in Omaha via [email protected] or (402) 895--5777.

Everything You Need To Know About World Wide Web Day Read More »

How serious is Your Company about Securing its Data?

This article will discuss data security at most companies. It will look at some of the biggest mistakes company makes when securing data and some possible solutions.  

Today we use technology in almost every aspect of our lives. While that can be a good thing, there is a negative side to it. Anyone with the right technical know how can gain access to your company’s data, which they can use to destroy your business empire.

No matter the size of your company, you will need to create a plan that ensures all the data generated is secure. This plan is known as a security program. The program provides the framework that helps to keep the whole organization safe.

Some of the Biggest Mistakes that You Can Make in Securing Data:

  • Lack of a System on Where to Store Important Data.

When a system is not in place on where sensitive data should be stored, it increases the chances of it ending up in an unsecured location. One way to solve this is if a company creates a policy that categorizes what type of data is considered sensitive.

  • Cloud Misuse.

When a company stores data on the cloud, they are essentially storing their data on a hired computer. That means they have no control over it. If the data is of a sensitive nature, then it needs to be encrypted before being placed on the cloud. It is also important to understand the policy of the cloud services provider. It is especially so if you are required to share encryption keys with them.

  • Failure to Protect from Internal Threats.

One of the best examples of this kind of leak was the “Snowden” leak. The issue of the leak was because of weak governance issues. For instance, in this leak, the person managed to copy many gigabytes of data without any hindrance. Organizations need to be careful about giving employees access to data when they do not need it.

To fight off any chances of internal leaks, an organization needs to address the insider threats with appropriate controls. The controls need to be able to identify the damage and tell how much data has been stolen.

  • Trusting Technology.

One of the biggest mistakes a company can make is to have faith in its technology. It is important to note that as you work to improve security, hackers are also working. They are designing new and creative ways on how to get past your security. It is thus important that you have experts who conduct regular tests on your system. That way, they can help identify any potential leaks before they occur.

  • Failing to Invest Enough in Data Security.

When a business faces a data security challenge, it will most times look for a one size fits all solution. In such a case, the company may end spending too little to protect the data effectively. However, a business has to be willing to go further than this. It has to look for the most secure means of keeping its data secure.

  • Failure to Protect Physical Devices.

One of the easiest ways to hack a network is by using a device that is already accepted into the system. However, some organizations do not have measures in place to deal with the loss of physical devices. A good organization should have a mechanism that ensures stolen devices can no longer be allowed to access the system.

  • Failing to Take Care of the Human Factor.

An organization will spend a lot of money implementing the most complex security measures. However, most organizations drop the ball when handling the human factor. The staff is not well-trained on how to stay secure. There needs to be a training program for both new and existing employees. As changes are made to the security program, employees need to receive additional training.

Some of the most important Tips to Stay Secure.

If these measures are not being implemented at your organization, you need to start implementing them if you want to stay safe.

1. Make Use of Strong Passwords.

One of the easiest ways of keeping your organization secure is by implementing a strong password. Ensure that everyone who has access to your network makes use of a strong password. Use a combination of all character types on your keyboard for the best password. You should also ensure that your password is at least 8 characters long.

Never use any personal data as your password. Additionally, avoid using variations of personal data to create your password. Besides that, ensure that you change your password after every 90 days. It is also important everyone to have his or her own password and username. Having a generic password for everyone is dangerous.

2. Make Regular Software Updates.

Another simple but effective measure to keep your data safe is to keep all programs updated often. There is little use in installing the latest software if you will not make regular updates to it. Data is only as safe as the most recent updates to the system.

3. Encrypt Portable Devices.

Portable devices such as laptops are quite easy to steal. It is thus important that you take the extra step to ensure they are safe, even when stolen. One of the easiest measures to keep them safe is to encrypt them. The encryption software will make data on your hard drive unreachable unless they have a password.

4. Make Regular Backups.

Ensure that all company data is backed up to a secure offsite storage facility. Thus, even when your systems are compromised, your data will still be secure. The general rule of thumb is that backups should happen once a week. Getting data corrupted is painful but failing to have a backup can be even more painful.

Conclusion.

When creating any security measures, the top leadership must lead by example. They must be willing to spend money on programs that help to educate employees. It is important to note that data security is an ongoing process that will require regular revisions.

How serious is Your Company about Securing its Data? Read More »

A New Strain of Ransomware Attacks a Michigan Hospital System.

On July 5th, 2017, disaster struck a series of hospital networks in Michigan. Caro Community Hospital, Caro Medical Clinic and Caro Quick Care all lost access to not only their desktop and laptop computers, but also phones, email services and even patient records. A message on a computer screen confirmed administrators’ worst fears—They were a victim of ransomware.

Ransomware Hits Michigan Hospital System

According to Caro CEO, Marc Augsburger, the ransom note provided a single email address to use to determine the payment required to recover the locked data. The hacker specified a payment of $120,000 should be made in Bitcoin!

Instead of paying the hacker, hospital administrators decided to quickly shut down all electronics following the attack. This caused a great deal of disruption, but the damage was mitigated due to IT policies and procedures that were already in place. Hospital staff were well trained on keeping paper-based records in the event that such an incident occurred. All computers and other devices were also backed up remotely on a regular basis, so it was only a matter of time before Caro could get its systems back up and running.

What made this ransomware attack so unique was the extent of the machines affected.

Traditional ransomware strategies seem to be one of quantity over quality. The files on a single infected machine are quickly encrypted, and the ransom is typically a few hundred dollars. This particular strain didn’t just affect servers, computers and other devices, everything connected to the Caro network was affected, including the VoIP phone systems that were operated by those computers.

Make no mistake—The disruption was absolutely a bad thing, but the situation could have been far worse were it not for these policies. They also helped guarantee that no personal information of employees or patients was compromised during the attack.

It took nearly two weeks to get all hospital operations back up and running. Caro administrators contacted both the FBI and the local police in the immediate aftermath, both of which are still searching for the person or people responsible. The FBI indicated that this was a brand-new strain of ransomware, and one that they would continue to watch out for in the future.

The State of Malware  

As the Caro hospital staff discovered, ransomware is the “latest trend” in terms of cyberattacks. To say that the digital world is getting more dangerous is something of an understatement:

  • There were 22 million new malware samples in the first quarter of 2017 alone.
  • A new malware specimen is emerging every 4.2 seconds, a pace that’s getting faster all the time. To put this into perspective, there were only about 6.8 new malware samples discovered in the entirety of 2016.
  • In 2015, attacks occurred at a rate of about 1,000 per day. Fast-forward just a year later, and that number climbed to about 4,000 per day – an increase of 300%!
  • The number of phishing emails is also on the rise. In the first quarter of 2016, 92% of phishing emails contained some form of ransomware. Just a few months later, that number grew to 97.25%.

Learning as much about ransomware and other forms of malware is the key to ensure your organization doesn’t suffer the same fate.   

If you had to make a list of the worst cybersecurity threats facing businesses today, it’s this particular strain of malware that can encrypt all of the files on a computer and network. This means that every kilobyte of data on a machine is lost forever, unless you’re willing to pay a hefty fee to the criminal holding your data hostage.

According to a study conducted by Friedrich-Alexander University, most of these attacks are successful because of overconfident users. 78% of people claim to be aware of the risks associated with clicking on unknown links in emails, and of phishing in general—Yet they go on to click on these links anyway.

Because ransomware infections are most often the result of accidentally downloading a malicious file, many assume it’s a situation where a little common sense goes a long way. Recent events have proven this isn’t enough.

As a business leader, it’s important for you to understand that ransomware is just one of the many types of digital threats that should concern you. Hackers are getting more sophisticated all the time, and the key to staying protected involves making an effort to stay one step ahead of them. Cybersecurity training for your employees is essential.

If you’re in Omaha and would like to find out more about cybersecurity issues, OR if you’re interested in cybersecurity training for your staff, please don’t delay—Contact InfiNet Solutions at [email protected] or (402) 895--5777.

A New Strain of Ransomware Attacks a Michigan Hospital System. Read More »

Why You Must Replace Your “Subpar” IT Service Company.

The technological resources that your small business uses on a daily basis are more than just “tools” in the traditional sense. In many ways, they’re the very foundation from which your 21st-century operations are built.

  • IT is how you communicate with your clients, guaranteeing that you can perform the type of work that meets their needs and exceeds their expectations.
  • It’s how your employees communicate with one another, and come together to form something much more powerful than any one of them could have on their own.
  • It’s also how you address the challenges of today while getting ready for the demands of tomorrow—Carving out a competitive advantage for your business that will carry you through into the next decade and beyond.

However, none of this makes any difference if your subpar IT service company is killing your chances.

Bad IT Services

Many IT service companies get a low score from their clients. Lengthy response times, reactive approaches to technology, excessive turnover rates and high prices with poor value are all among the many factors that small businesses have just “learned to deal with.” But you shouldn’t!

Here are a number of reasons why you should replace your subpar IT service company with a competent one.  

They’re Not the Only Ones Who Know Your Network.

One of the major reasons small business owners are hesitant to look for alternative IT service companies is the fear that they won’t be able to find another that knows their network like their existing provider does. Regardless of the quality of your relationship, you can’t argue that it’s taken time to build. Third-party representatives have come in and examined your system, what you need, and what you’re trying to do. It will be difficult, if not next to impossible, to start all over again. Right?  Wrong.

In truth, your service provider should be documenting every aspect of your IT infrastructure in detail. Diagrams, passwords and asset documentation should all be readily available to you. All of this information can be turned over to your new provider, giving them an excellent starting place to make your IT foundation stronger than it was before.

Your IT Isn’t as Unique as You Think It Is.

We’re not saying that your business isn’t unique in the marketplace. Undoubtedly, there are things you do that nobody else can match — This is likely why you have such a strong relationship with your customers in the first place.

Luckily, this doesn’t extend to your IT infrastructure. Sure, things were built with your specific business in mind. However, a true IT expert will have seen it all before. Competent network engineers are ready for anything and everything they encounter.

The Transition Won’t Be as Tough as You’re Anticipating.

High-quality IT service providers are used to taking over for competitors who aren’t living up to their customers’ expectations. While it’s true that there is always the potential for some risk, it’s nothing that good short- and long-term planning can’t resolve. Remember that you’re bringing a new company into the fold—So leverage the power of their experience to your advantage.

The Benefits Outweigh Any Potential Disadvantages.

All of this gives way to the most important factor of all—the fact that the benefits will far, outweigh any perceived negatives you may be worried about. Sticking with your subpar service company isn’t just killing the return on investment for your IT assets, it’s literally stifling the growth of your business.

  • It’s making it harder, not easier, to do the essential work you’re responsible for.
  • It’s causing you to lose hours of productivity due to unintelligent infrastructure design and unnecessary catastrophes like server failure.
  • It’s causing you to play catch-up because you’re being reactive rather than proactive.

A truly great IT service company is more than just a solutions provider. They’re a partner in your business success.  They’re not just proactively maintaining your IT environment, repairing small problems today before they have a chance to become bigger and more expensive ones later—They’ll act as your virtual CIO, providing you with the expert insight and advice you need to align IT with your long-term strategy.

Absolutely none of this will be possible if you stick with your subpar service company. If so, you’re hurting your chances of successful growth for your business.

Even though the decision to switch is appropriate, replacing your subpar IT service company can be stressful. Luckily, the hardworking team at InfiNet Solutions is ready to stand by your side every step of the way. If you’re in Omaha and would like to find out more about this or other IT related topics, please don’t delay — Contact us by phone at (402) 895--5777 or by sending us an email to: [email protected]

Why You Must Replace Your “Subpar” IT Service Company. Read More »

Call Now Button