contact us

Use the form on the right to contact us.

 


Naperville, IL 60565
USA

630-639-7372

iPhone-XS-photo.jpg

Blog

Increase Business Cybersecurity Awareness in Light of Russian Invasion of Ukraine

Rowena

Increase Business Cybersecurity Awareness in Light of Russian Invasion of Ukraine

For several decades, Russia has targeted a wide variety of cyberattacks at countries with which it has had disputes. That includes the United States and other Western nations, which have recently levied unprecedented sanctions against Russia after it invaded Ukraine. President Biden has warned that “Russia could conduct malicious cyber activity against the United States” in response, encouraging the private sector to increase the protection of systems and networks. This isn’t theoretical—the US Cybersecurity & Infrastructure Security Agency lists numerous such attacks in the last five years.

It’s tempting to think that your business is too small or unimportant to be targeted in a Russian cyberattack. While that may be true of direct infiltration by individual Russian hackers, many cyberattacks are carried out indiscriminately by bots—the ultimate is the DDoS (distributed denial of service) attack that uses compromised computers and Internet-of-things devices to flood a targeted server or company with an unmanageable amount of random Internet traffic. Plus, a common hacking approach is to compromise an account on one seemingly unrelated system as a stepping stone to another, more secure system.

There’s nothing new here—we’ve been encouraging everyone to take cybersecurity seriously for years now. But the threat is now more serious than ever before. So, here’s what we suggest—if you need help with any of this, don’t hesitate to contact us.

●     Be vigilant: The most common way that hackers gain entry into computer systems is through an employee opening a malicious attachment or being fooled into entering credentials into a fake website. Implement or refresh security awareness training that teaches employees how to recognize suspicious email, identify phishing attempts, and report appropriately. 

●     Use good password practices: Make sure that everyone uses strong, unique passwords that are created, stored, and entered using a password manager. Password managers also identify weak passwords and those that have been compromised in security breaches—ask everyone to audit their passwords and update any that aren’t secure. (But there’s no reason to change good passwords willy-nilly.)

●     Implement 2FA: Whenever possible, require two-factor authentication, which provides extremely strong protection against remote intrusion given that a compromised password is no longer sufficient.

●     Keep software up to date: Install all software and operating system updates on all platforms. In its security update notes, Apple often says that particular vulnerabilities are actively being exploited—it’s crucial to install such updates immediately. If you use anti-malware software (essential for Windows; less so for macOS), keep its signatures current.

●     Backup regularly: Ensure that all systems are backed up regularly, and for your most important data, make sure backups are protected from ransomware encryption by storing them offline or using object locking on a cloud storage service. Be sure to test your backups regularly as well—backing up is the first step, but being able to restore is what’s necessary.

●     Increase monitoring: Keep a centralized record of all employee reports of suspicious behavior to better identify attack patterns and targeted systems. Whenever possible, make sure server and network device logging is enabled so any incidents can be investigated more fully. Turn on any anomaly reporting capabilities in backup and other security-related apps.

Plan for the worst:Develop or revisit business continuity and crisis response plans. For instance, discuss how you’d deal with losing Internet connectivity, being locked out of key online accounts, or having all your data rendered inaccessible by ransomwar

There’s no reason to panic, but the increased threat from Russian cyberattacks is a good excuse to focus more attention on digital security. The Internet makes astonishing things possible, but it also opens us up to attacks that would previously have been inconceivable. Stay safe out there.

(Featured image by iStock.com/BeeBright)


Social Media: The Russian invasion of Ukraine is horrific, but the economic sanctions and other responses from Western nations mean that businesses of all sizes need to be more vigilant about cybersecurity.


Hidden Tricks for Navigating the Mac’s App Switcher More Quickly

Rowena

Hidden Tricks for Navigating the Mac’s App Switcher More Quickly

Although the Mac’s Dock shows all your running apps, it’s often not the most efficient way to switch among them. Instead, turn to the App Switcher. You may know that pressing Command-Tab switches to the last-used app, making it easy to flip back and forth between two apps. However, if you press Command-Tab and continue to hold the Command key down, the App Switcher itself appears, with icons for all running apps. When you let up on the Command key, the App Switcher disappears, and you’ll switch to the selected app. To select an app, while the Command key is down, press Tab or Shift-Tab to cycle through the apps, or hover your pointer over the desired app. You can also click the desired app to switch to it instantly, without letting up on the Command key. And if you want to dismiss the App Switcher without switching apps, press Esc.

(Featured image by iStock.com/SIphotography)

Three Tricks for Dealing with Duplicated Contacts

Rowena

Three Tricks for Dealing with Duplicated Contacts

In today’s world, there’s no reason to remember our contacts’ phone numbers or email addresses—that’s a job for our Macs, iPhones, and iPads. This sort of data is so core to using digital devices that Apple has long provided an ecosystem-wide solution in the form of Contacts and syncing through iCloud.

Unfortunately, it’s all too common to end up with multiple cards for the same person in Contacts, either precise duplicates or versions that contain different details. Further muddying the situation, many of us have multiple contact accounts—such as from Google or Microsoft Exchange—and some contacts may be duplicated across several accounts.

This situation is sufficiently common that Apple has provided three ways to deal with duplicate contacts: manually merging selected contact cards, automatically merging duplicate cards, and linking cards replicated in multiple accounts. The first two can be done only in the Contacts app on the Mac; linking can also be accomplished on an iPhone or iPad.

Merge Contact Cards

Let’s say you’ve ended up with two or more contact cards for the same person in the same account. They’ll usually have the same name, but it doesn’t matter if the names are different. To merge them, which combines the data from each into a single card, select them in Contacts, and choose Card > Merge Selected Cards. You should now see just the single merged card.

Contacts generally does a good job of identifying data that’s identical between the cards (like the iPhone numbers above), though different labels can sometimes trip it up. When there’s a conflict, Contacts creates a new entry for it. Name conflicts are added to the note field.

Look for Duplicates

Merge Selected Cards works if you have a small number of duplicates that you can identify easily. However, many people have found themselves in situations where tens or hundreds of contacts have been duplicated, often due to a hiccup in cloud syncing or importing. To help with that too-frequent occurrence, Apple added a feature that looks at all your contact cards and merges those that it determines are duplicates.

It’s simple to use—just choose Card > Look for Duplicates. After Contacts scans all your cards, it puts up a dialog telling you how many cards it found. Click Merge to combine all the duplicates.

Although merging hundreds of cards can be stressful, it usually works very well, and it’s far faster and easier than the alternative, which is to select each set of duplicates manually and use Merge Selected Cards.

Link Contact Cards

The two previous solutions help when you have duplicate contacts in a single account. Equally annoying can be ending up with contact cards for the same person across multiple accounts. (Check to see what accounts are configured and enabled in Contacts > Preferences > Accounts.) At best, those duplicates will simply clutter your contact list; at worst, you might have to check multiple cards to find the right phone number or email address.

Apple helps you clean up your contact list by linking cards for the same contact across different accounts. (You mustn’t link cards for different people; that can result in people receiving texts meant for others and other confusions.) In essence, this works like Merge Selected Cards, but the separate contact cards remain in their accounts, with Contacts displaying just one card with the combined information.

You can also link contacts using the Contacts or Phone apps on an iPhone or iPad, although the steps are much fussier than in Contacts on the Mac:

1.    Find a person who is replicated across multiple accounts, and view one of their contact cards. 

2.    Tap Edit, scroll to the Linked Contacts section at the bottom of the card and tap the green + button.

3.    In the contact list that appears, find and tap the second card for the person—it should either be showing or require scrolling up slightly.

4.    Tap Link, and in the next screen, tap Done.

If you accidentally link the wrong cards and need to unlink them, edit the linked card and click or tap the red Remove button to break the link.

Changes you make to a combined card are saved to each separate card. However, if you want to edit one of the cards but not the other, you can view and edit each one separately by clicking the account name next to Cards on the Mac or tapping the appropriate card under Linked Contacts on an iPhone or iPad.

Cleaning up your contact list may not be the most exciting thing to do, but it’s worthwhile to eliminate duplicates that could cause confusion later on.

(Featured image by iStock.com/anyaberkut)


Social Media: Everyone eventually seems to end up with duplicates in Apple’s Contacts app. Follow our steps to merge duplicates in the same account or link those in different accounts.