Other Blog

Clipboard History – No More Losing Text You’ve Cut or Copied!

Clipboard History – No More Losing Text You’ve Cut or Copied!

Have you ever cut and paste several times in rapid succession and accidentally cut twice in a row without pasting?  Unfortunately, now you’ve lost some of your work!  Or maybe you copy and pasted something an hour ago and realize you would like to use the same text in your current work.  In a newer version of Windows 10, Microsoft has implemented a clipboard history.  Clipboard history has a record of everything you have cut or copied since the last time you rebooted your computer.

Clipboard history is disabled by default, but you can easily enable it.  Simply go to a Word document and press the Windows Key + v.  The Windows Key is found on the bottom-left of your keyboard, between Ctrl and Alt. If you haven’t enabled clipboard history or haven’t copied anything to your clipboard since enabling it, you’ll see a message telling you that you either need to enable the feature or copy something before continuing.  If you have previously enabled it, you will be able to see all the items you copied or cut and can paste them again.  Currently, this clipboard history supports text, HTML, and images less than 4MB in size.  Larger items you copy will not be stored in the history.

Router Considerations While Working from Home

Router Considerations While Working from Home

While working from home, you may have noticed some things about your internet connectivity. It may even bother you so much that you’ve become curious to how you can improve it.  Here are some things to consider:
  1. Security – password
  2. The Upload and Download Speed
  3. Signal Strength
Before we begin any improvement discussion, it may seem odd to begin with security. We want to make sure attackers don’t impact the administration of your router or your home network. Security: Change the default password Your router is sent from your ISP with a “default” username/password. This information is usually labeled on the router, but this can also be easily looked up by googling “default router password for <Your Internet Provider Here>”.  Hackers rely on this unintended slip in securing your home network. For this reason, we always recommend changing the default administrator password to something unique. Instructions can be found online or contact your internet service provider for help. Upload and download speed If you’re a family of 4, each with 3 or more devices connected to WiFi your bandwidth could be impacted.  So, the question to ask yourself is “Am I getting the needed upload and download speed?” First, let’s define them. The upload speed refers to how many megabits of data per second of information you can send to another device or server on the internet. This impacts how well you can send big files via email or use video-chat (since you send your video feed to them).   Download speed refers to how many megabits of data per second it takes to download data from a server in the form of images, videos, text, and more. Activities such as streaming music and movies or downloading large files all require you to download data.  Are you curious about what your internet speed is, speedtest.net will give you the answer? So, what are the right upload and download speed for you? It depends on so many factors (i.e. number of connected devices in your home, your use of the internet). Here is a suggestion in a chart from TomsGuide.com.

How many Mbps do you really need?

Number of devices

Use Cases

Recommended Download Speed

1-2

 

Web surfing, email, social networking, moderate video

 

Up to 25 Mbps

 

3-5

 

Online multiplayer gaming, 4K streaming

 

50 - 100 Mbps

 

More than 5

 

All of the above plus sharing large files and live streaming video

 

150 to 200 Mbps

 

Boosting signal strength If your signal regularly drops or appears to have only a few WiFi strength bars, then it may be time to consider a WiFi repeater/extender. A WiFi Extender is a device that repeats the wireless signal from your router to expand its coverage. It functions as a bridge, capturing the WiFi from your router and rebroadcasting it to areas where the WiFi is weak or nonexistent, improving the performance of your home WiFi. You can find different brands (Netgear, Lynksys, D-Link) on Amazon. Read the reviews before purchasing, it is important. by John Henry McDonald

Security – Stay Alert

Clipboard History – No More Losing Text You’ve Cut or Copied!

Have you ever cut and paste several times in rapid succession and accidentally cut twice in a row without pasting?  Unfortunately, now you’ve lost some of your work!  Or maybe you copy and pasted something an hour ago and realize you would like to use the same text in your current work.  In a newer version of Windows 10, Microsoft has implemented a clipboard history.  Clipboard history has a record of everything you have cut or copied since the last time you rebooted your computer.

Clipboard history is disabled by default, but you can easily enable it.  Simply go to a Word document and press the Windows Key + v.  The Windows Key is found on the bottom-left of your keyboard, between Ctrl and Alt. If you haven’t enabled clipboard history or haven’t copied anything to your clipboard since enabling it, you’ll see a message telling you that you either need to enable the feature or copy something before continuing.  If you have previously enabled it, you will be able to see all the items you copied or cut and can paste them again.  Currently, this clipboard history supports text, HTML, and images less than 4MB in size.  Larger items you copy will not be stored in the history.

Analytics are critical for effective data backups

Collecting data is vital for keeping records, tracking performance, and delighting customers. With so much on the line, it’s never been more important to have backups of all your files. If your data is growing at a rate that’s hard to keep up with, analytics tools are an awesome way to figure out which backups matter most and how to prioritize them.

An excess of information

Nowadays, too much data may sound like a good thing. But for many organizations, creating backups in real-time isn’t economical. So if you’ve wondered how you should structure your backup plan to prioritize the critical files, we have an answer: Analytics tools.

Analyzing vast amounts of data quickly and affordably has never been easier for small- and medium-sized businesses (SMBs). The key is working with experienced IT professionals to customize a solution to meet your needs. As an MSP (managed IT services provider), we’ve spent years designing business continuity and disaster recovery plans, often for SMBs that couldn’t create backups every hour.

A smarter solution

Depending on your needs, we can set up sophisticated analytics tools that determine what is most essential to your business’s day-to-day operations. These solutions prioritize data in order of importance and translate that to a backup structure that ensures the right data is safe and sound should disaster strike.

These tools integrate with your existing data-backup solution but provide it with a map of what to save first, and what to leave for later. That results in faster recovery times in the event of untimely outages or disruptions. Furthermore, using analytics increases efficiency and decreases overall backup costs by providing a better picture of what is unimportant versus what is unnecessary.

SMBs have been the drivers of innovation for decades because, as they say, “necessity is the mother of invention.” So whether you’re interested in top-of-the-line IT solutions or just need to get a better handle on disaster recovery, we’re ready to create a customized backup solution, just for you. Take a second to analyze that, then give us a call.

Published with permission from TechAdvisory.org. Source.

Tips to reduce risks after a security breach

No company is completely safe from data breaches. For proof, look no further than companies like Yahoo, AOL, and Home Depot, which compromised millions of personal customer information. That said, no business is completely helpless, either. The following steps can minimize the risks to your business in the event of a large-scale data breach.

Determine what was breached

Whether its names, addresses, email addresses, or social security numbers, it’s critical to know exactly what type of information was stolen before determining what steps to take. For example, if your email address were compromised, you’d take every precaution to strengthen your email security, which includes updating all your login credentials.

Change affected passwords immediately

Speaking of passwords, change yours immediately after any breach, even for seemingly safe accounts. Create a strong password comprised of alphanumeric and special characters, and make sure you never reuse passwords from your other accounts.

Once you’ve changed all your passwords, use a password manager to help you keep track of all your online account credentials.

If the website that breached your information offers two-factor authentication (2FA), enable it right away. 2FA requires two steps to verify security: usually a password and a verification code sent to a user’s registered mobile number.

Contact financial institutions

In cases where financial information was leaked, call your bank and credit card issuers to change your details, cancel your card, and notify them of a possible fraud risk. That way, banks can prevent fraud and monitor your account for suspicious activity.

Note that there are different rules for fraudulent transactions on debit cards and credit cards. Credit card transactions are a bit easier to dispute because they have longer grace periods. Debit card fraud, on the other hand, is more difficult to dispute, especially if the fraudulent transactions happened after you’ve notified the bank.

Place a fraud alert on your name

Hackers who have your personal information can easily commit identity fraud. To avoid becoming a victim, contact credit reporting bureaus like EquifaxExperian, or Innovis and request that a fraud alert (also called credit alert) be added to your name. This will block any attempt to open a credit account under your name and prevent unauthorized third parties from running a credit report on you.

Putting a credit freeze on your name might result in minor inconveniences, especially if you have an ongoing loan or credit card application. Still, doing so will greatly reduce your risks of getting defrauded.

These steps will ensure you don’t fall victim to identity theft in the event of a large-scale data breach. If you want to take a more proactive approach to protect your sensitive information against breaches, contact our cybersecurity experts today.

Published with permission from TechAdvisory.org. Source.

Cybersecurity and Today’s CFO

CFOs can no longer respond with “that’s not my department” when it comes to cybersecurity. In a recent article by Harvard Business Review, CFOs were outed for not taking an active role in their organization’s cybersecurity efforts. Today’s financial executive must focus on more than managing financial risk—they must become an engaged member of the security team.

Data breaches are extremely damaging, costing executives their jobs, destroying brands and causing vital information to be lost. CFOs need to start becoming more competent in cybersecurity methods and implementing practical solutions for keeping data safe and managing risk.

To start building a cybersecurity plan, schedule a free onsite consultation with us to discuss performing a penetration and vulnerability test for your organization. This assessment will help you identify holes in your defenses and uncover areas that hackers can exploit and access critical data. Using the results of these tests, we can work together to fix existing issues and create a cybersecurity plan that protects your people, processes and data.

This article was written for Association TRENDS. Check out the original posting HERE.