Interactive Solutions

3 New Windows 10 Features

Tech Quick Tips by Interactive Solutions, LLC

 

1. The Start Menu

For you Windows 7 users, rest easy, because this is here to stay. For the Windows 8 users, the start menu is back with its full functionality – and then some. The aesthetics of the new start menu combine the basics of the start menu from Windows 7 with the sleek tiles that were a part of Windows 8. The customization of this helps you to access what you need much faster and boosts productivity. Open the Start Menu, click on Settings, Personalization, and then Start. Make the Start Menu work for you. Microsoft created a helpful onboarding resource for this feature as well.

 

 

2. Microsoft Edge

Although this is the new web browser, do not worry – Internet Explorer 11 will be available by default in your upgrade. It is worth noting that many business applications remain untested with Microsoft Edge. If you find that Microsoft Edge is popping up as your default browser, this article will help you with that. Remember that super awesome Start Menu we spoke about above? Click in the search bar right next to it, and type “Default Programs.” Open that up, find Internet Explorer on the left, and click on it. There will now be an option to click that states “Set this program as default.”

 

3. Search Enhancements

Find anything on your PC. No, really. On the bottom left, to the right of the Start Menu, type a term in that search box. If it doesn’t automatically populate, click on the “My Stuff” icon on the bottom of that pop-up window. Your machine will be scanned for files, applications, pictures – just about anything – containing any or all of that search term within that file name. Don’t catch yourself drilling down through menus trying to find something. Don’t waste your time digging and trying to find that one file you thought you’d never need again. Use this search function to help save time.

 

 

 

 

Phishing Attack


Phishing
—An attempt to acquire sensitive information like usernames, passwords, and credit card details for malicious purposes by masquerading as a trustworthy entity in a digital environment.

interactive-solutions-it-services-phishing-attack

Phishing is a type of social engineering that attempts to trick someone into clicking a link and/or entering data into a controlled source from a malicious person or group. Phishing has become more of an individually customized targeted attack rather than a broad or group attack. An individual can receive a specific targeted email (or other source) that is intended for that person or position.  The Phishing attack is a delivery vector or mechanism that would then deliver a payload or retrieve information from the user that can be used then or at a later time and even combined with other attacks. Phishing has become sophisticated. See an example below:

 

 

 

 

5 Ways to Stay Secure Online

Tech Quick Tips by Interactive Solutions, LLC

 1. Hook up to a network that you know.

Free Wi-Fi is tempting, but be sure that you consider who is providing the connection. Public connections at the local coffee shop are usually unsecured and leave your machine open to outsiders. While these networks provide a convenience, there are risks to be aware of.

 

2. Bank and shop with caution.

Shopping from familiar websites is a good place to start. Stick with the reputable sites that are tried and true – like Amazon or eBay. Also, when checking out and finalizing the purchase, look for the ‘padlock’ symbol or the abbreviation ‘https’ in the address bar at the top of your browser. This will ensure that you are on a secure, encrypted part of this webpage. Keeping an eye on your bank statements for suspicious activity is always a good idea, among these other best practices for shopping online.

 

 

3. Use secure passwords.

Passwords for logging into any website should contain a mix of letters, numbers, and special characters – as well as be different for each website that you log into. It can definitely be a pain to remember all of these passwords, but ask yourself which is more of a pain – remembering these, or recovering stolen personal information.

 

 

4. Lock Your Computer.

When you walk away from your machine, lock it. In Windows, it is as easy as pressing the Windows key + L. On an Apple Mac, pressing “Control+Shift+Eject” will do the trick (unless you do not have an optical drive, then you can hit the “Power” key instead of “Eject”). This practice would be the equivalent to deadbolting the front door of your home. It acts as a deterrent to the bad guys as well as a line of defense. It may even be worth setting up a password lock on your Apple or Windows machine as well.

 

5. Do not click on anything unfamiliar.If an offer is too good to be true, it probably is. If you get an email from an unknown source, do not click any of the links within it – and immediately report it to your IT Team. If a window pops up while browsing a website, immediately close it. Familiarity is always your friend. Using your judgment and trusting your gut is the ultimate defense when online. Always play it safe!

 

Web filtering and reporting for security and employee productivity.

Yep it happens, you stumble upon a website that you shouldn’t be on. We have a solution for it, Website protection and filtering, but it’s much more than that. Our solution is a key part in a cybersecurity framework of layers to help protect you, your company, and your employees from unsafe browsing.

Today, you can catch all kinds of nasty bugs, viruses, malware without even clicking a thing. Drive-by-downloads can cause your PC to download a program without you even being aware. Beyond the firewall website protection helps by keeping you away from the nasty sites. Even better if you have categories of websites you’d rather not have employees accessing during business hours, we have that covered as well. Let us know if you’d like to see how we can help decrease employee downtime and increase employee productivity with our interactive solutions.  Contact Us Today!