CapitalTek April Newsletter Vol. 28

Page 5

p ,p

Data backup is not enough, p2

Microsoft forms, p3

Every company is now a technology company, p4

Business gadget of the month, p5 Disposing of personal devices securely, p6

Villainofthemonth,p7 StaffHighlight,p8

TechnologyUpdate,p9

What'sallthefussaboutChatGPT?,p10

Entertainment,p11

FeaturedCustomer-OneofthebestroofingcompanyinOttawa,p12

SMARTPHONESARENOWTHE PREFERREDDEVICEFORMOBILEWORK

Smartphones have taken over from laptops as most people’s preferred portable work tool.

They enjoy the flexibility and, perhaps obviously, they’re easier to carry around than a laptop or a tablet.

It means that mobile connectivity and reliable broadband have become two of the largest IT considerations.

In turn, that creates a different set of security risks.

If a number of your people need a phone to do their job, here’s a big thought: Would they be better off using a work-issued phone instead?

If an employee has contact with customers, would you want to own their phone number in case they left?

And there are security considerations that might be best handled on company-issued phones. That includes rolling out security updates, managing secure mobile gateways, and administering passwords.

You should make sure data on the device is encrypted, not only to protect data from cyber criminals, but to make sure your information is safe should the phone be lost or stolen. Can the phone be remotely wiped?

The software installed on the phone should be policed too You may need a policy that limits or blocks the use of third-party software This can also help establish a boundary between work and personal tasks.

As with most tech, this isn’t a case of set it and forget it. You need to make sure updates are run on time, and remotely audit company-issued ected. ur us!

1 CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
2023 APRIL VOLUME 28
"YOUR MONTHLY NEWSLETTER, WRITTEN FOR HUMANS, NOT GEEKS"

DATA BACKUP IS NOT ENOUGH

The need to back up data has been around since floppy disks. Data loss happens due to viruses, hard drive crashes, and other mishaps. Most people using any type of technology have experienced data loss at least once.

There are about 140,000 hard drive crashes in the US weekly. Every five years, 20% of SMBs suffer data loss due to a major disaster. This has helped to drive a robust cloud backup market that continues to grow.

But one thing that’s changed with data backup in the last few years is security. Simply backing up data so you don’t lose it, isn’t enough anymore. Backing up has morphed into data protection.

What does this mean?

It means that backups need more cybersecurity protection. They face threats such as sleeper ransomware and supply chain attacks. Cloudbased backup has the benefit of being convenient, accessible, and effective. But there is also a need for certain security considerations with an online service.

Companies need to consider data protection when planning a backup and recovery strategy. The tools used need to protect against the growing number of threats.

Some of the modern threats to data backups

include:

• Data Center Outage: The “cloud” basically means data on a server. That server is internet accessible. Those servers can crash. Data centers holding the servers can also have outages.

• Sleeper Ransomware: This type of ransomware stays silent after infecting a device. The goal is to have it infect all backups. Then, when it’s activated, the victim doesn’t have a clean backup to restore.

• Supply Chain Attacks: Supply chain attacks have been growing. They include attacks on cloud vendors that companies use. Those vendors suffer a cyberattack that then spreads throughout their clients.

• Misconfiguration: Misconfiguration of security settings can be a problem. It can allow attackers to gain access to cloud storage. Those attackers can then download and delete files as they like.

What to Look for in a Data Protection Backup System

Just backing up data isn’t enough. You need to make sure the application you use provides adequate data protection. Here are some of the things to look for when reviewing a backup solution.

(Continued on next page)

CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca NEWS | MAIN STORIES
2

(Continued from page 2 )

Ransomware Prevention

Ransomware can spread throughout a network to infect any data that exists. This includes data on computers, servers, and mobile devices. It also includes data in cloud platforms syncing with those devices.

95% of ransomware attacks also try to infect data backup systems.

It’s important that any data backup solution you use have protection from ransomware. This type of feature restricts automated file changes that can happen to documents.

Continuous Data Protection

Continuous data protection is a feature that will back up files as users make changes. This differs from systems that back up on a schedule, such as once per day.

Continuous data protection ensures that the system captures the latest file changes. This mitigates data loss that can occur if a system crashes before the next backup. With the speed of data generation these days, losing a day’s worth of data can be very costly.

Threat Identification

Data protection incorporates proactive measures to protect files. Threat identification is a type of malware and virus prevention tool. It looks for malware in new and existing backups. This helps stop sleeper ransomware and similar malware from infecting all backups.

Zero-Trust Tactics

Cybersecurity professionals around the world promote zero-trust security measures. This includes measures such as multi-factor authentication and application safelisting.

MICROSOFT FORMS: ONE OF THE HANDIEST FREEBIES IN MICROSOFT 365

Microsoft 365 is one of the most popular cloud platforms in the world, with about 345 million paid seats.

Users get a stable of over 20 different apps, including the core MS Office suite.

With so many different apps, it’s not uncommon for some to go unused.

Companies may not even be aware they have access to these other helpful tools.

One of the handiest apps you

get with a Microsoft 365 subscription is Microsoft Forms.

What Is Microsoft Forms?

Microsoft Forms is a drag-anddrop form, quiz, and survey creator. It’s simple to use and allows you to send out surveys via a link. Recipients can fill out your form online from any device.

How to Get Started in Forms:

1. Visit Forms.office.com and log into your Microsoft account.

2. Choose “New Form” or “New

Quiz: from the top menu

3. OR you can choose to explore the built-in templates

4. Click “Add New” to add a new form field. You can choose from field types:

Choice (i.e., multiple-choice question)

Text

Rating

Date

Ranking

Likert (a scale that records attitudes/opinions about a topic)

(Continued on next page)

NEWS | CONTINUATION OF MAIN STORIES
3 CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca

(Continued from page 3)

Net Promoter Score® (a scale from “not likely” to “extremely likely”) Section (separator that can include a title and image)

5. Enter your questions

6. Once finished, click “Send” at the top. You can distribute the survey using the following options:

Link to a web form

Email

QR code

Embed in a web page

Via Facebook or Twitter

7. View responses on the “Responses” tab

AdvantagesofUsingMicrosoft Forms

It’sIncludedinMicrosoft365 Subscriptions

If you already subscribe to Microsoft 365, then you automatically get access to MS Forms.

ItSavesTime

No emailing attachments back and forth, and Forms collates survey responses automatically.

GetChartedResults

You can quickly see the results of the survey in meaningful graphs.

It’sEasytoUse

There’s a very low learning curve

with Microsoft Forms.

The interface is intuitive and simple, so just about everyone can jump in and start using it.

What Are Some Ways You Can Leverage Microsoft Forms?

Annual Customer Satisfaction Survey

Employee Security Awareness

Quiz

Change Readiness Survey

Event Registrations

Volunteer Registration Form

EVERY COMPANY IS NOW A TECHNOLOGY COMPANY

Whether you sell shoes or run an accounting firm, you need some type of technology to operate. Today’s companies aren’t just in the business of selling their own goods and services anymore. They also must master various types of digital tools.

Technology Is a Critical Part of Business

Customers Expect an Excellent Digital Experience Employees Need Devices to Drive Productivity

AI & Automation Help Companies Stay Competitive Information Is Being Generated at a Rapid Pace Vendors/Suppliers Are Leaving

Legacy Systems Behind

7.It’s Difficult to Grow Without Tech Innovation

8.Business Continuity Needs

6 STEPS TO EFFECTIVE

VULNERABILITY MANAGEMENT FOR YOUR TECHNOLOGY

Technology vulnerabilities are an unfortunate side effect of innovation. When software companies push new updates, there are often weaknesses in the code. Hackers exploit these.

Software makers then address the vulnerabilities with a security patch. The cycle continues with each new software or hardware update.

61% of security vulnerabilities in corporate networks are over 5 years old.

Step 1 Identify Your Assets

Step 2: Perform a Vulnerability Assessment

Step 3: Prioritize

Vulnerabilities by Threat Level

Step 4: Remediate Vulnerabilities

Step 5: Document Activities

Step 6. Schedule Your Next Vulnerability Assessment Scan

NEWS | FINISH OF MAIN STORIES CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
4
3. 4. 5. 6.
1. 2.

WHY YOU NEED TO THINK TWICE BEFORE USING LENSA AI & OTHER SELF-PORTRAIT APPS

It’s a common theme. You begin seeing these amazing CGI images of your friends on Facebook or Instagram.

You think, “How can I make one?”

The latest of these modern vanity marvels to make the rounds is Lensa AI.

You upload about 10 photos so the app can feed that data into its AI algorithm

Then, once it maps your facial features, it generates several

fantasy profile pics. It sounds like a little harmless digital fun, right?

That’s what many companies making apps like this like you to think.

Vanity is an easy sell.

But for Lensa AI and several similar self-portrait apps, you’re paying more than you know

The cost comes from the data privacy rights you’re giving up.

WINDOWS 8.1 JUST LOST ALL SUPPORT. HERE'S WHAT YOU

NEED TO KNOW

The latest operating system to lose all support is Windows 8 1 Microsoft released the OS in 2013, and it was officially retired on January 10, 2023. Microsoft issued the following warning for companies:

“Continuing to use Windows 8.1 after January 10, 2023 may increase an organization’s exposure to security risks or impact its ability to meet compliance obligations.”

DID YOU KNOW... You can apply preferences to Chrome extensions?

Sometimes, you may want to disable certain Google Chrome extensions on one website but have them enabled on another. Sure, you could keep switching them on and off. But who wants to do that?

Soon, you’ll be able to set preferences for sites you visit often, to make disabling and enabling extensions automatic.

Nice Work, Chrome

Business gadget of the month

Here are a few facts you should know:

The OS Will Still Technically Work

Your System Will No Longer Receive Security Patches

Options for Upgrading are Windows 10 or 11

What Happens if you don’t upgrade?

Security & Compliance Issues

Slowed Productivity Incompatibility With Newer Tools

Microsoft Ergonomic Keyboard

Wrist strain is a common problem for regular keyboard users. Ergonomic keyboards are nothing very new, but this latest offer from Microsoft moves things forward with the addition of more programmable ‘favorites’, a dedicated emoji button and lots of customization options to boost your productivity. And it doesn’t break the bank at around $50.

TECHNOLOGY | TOOLS FOR YOUR BUSINESS 5 CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca

DISPOSING OF PERSONAL DEVICES SECURELY DISPOSING OF PERSONAL DEVICES SECURELY

OUT WITH THE OLD!

Transferring Data

Before throwing out that old device, it is important to have a plan to transfer data. One easy way is to back up everything to a trusted cloud storage solution. You can also use an external hard drive or SSD drive. If you are buying a new device at a credible store, consider bringing the old device and letting an employee complete the transfer for you.

Wiping Devices

Once everything is properly backed up or transferred, it's time to wipe the old device. This protects the security of your data and ensures a smooth transition to the new device. Most devices have a "factory reset" option that wipes all personal data. For more details, research the best way to wipe your specific device.

Selling Devices

In addition to wiping the device, be sure to initiate a factory reset and remove any SIM cards if you plan on selling. Stick to credible websites and look out for common scams that target online sellers. Consider trade-in options at reputable stores, as well.

Work Devices

For the disposal of work devices, it's best to ask your employer for specific company procedures.

Device

Cleaning Che

Unsubscribe from unwanted email lists. Take saved card info off of accounts. Close old email and website accounts. Review social media privacy settings. Set software to automatically update. Stop browsers fromstoring sensitive data.

CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
CYBERSECURITY | PROTECT YOURSELF 6

CYBERSECURITY | PROTECT YOURSELF

VILLAIN OF THE MONTH

Each month we highlight a scam that demonstrates tactics criminals are using RIGHT NOW, to better prepare you when the next scam hits.

It was a typical day at the office. Connor was checking his inbox when he saw an email from Sarah from HR titled, "Important Dress Code Updates". He was intrigued. Did something happen with the current dress code? What changes were going to be?

Connor opened the message. It said he must sign a document to show he has read the new policy. There was a link in the message to the new policy and a document to sign When he clicked the link, he was brought to a website that asked him to make an account. Connor figured it must be a new website HR was using. He entered his phone number, birth date, and other details to sign up.

Once the information was submitted, the screen didn't show the new dress code policy. Frustrated, Connor went over to Sarah's office to ask her about it in person. After talking to Sarah, Connor was shocked to find out she knew nothing about the email.

DID YOU SPOT THE RED FLAGS?

Connordidn'tcheckthesender'semailaddress.Hesawitwas "SarahfromHR"anddidn'tlookcloser.

Insteadofcheckingwithsomeonefirstaboutthenewwebsite, Connorenteredallofhispersonalinformation.

Connorlethisemotionsgetthebestofhim.Cybercriminalsoften pushustoactwith"important"messagesabouttopicsweexpect toseefromwork.

Always examine the sender's email address closely, even if the name looks familiar. Walk through the SLAM method (sender, links, attachments, message) before acting.

Scammers will create a sense of urgency and call a user to action. Common examples ask a user to sign a document, view an update, or complete an urgent work-related task.

2022sawanincreaseinwork-relatedscamemails Beforeclickinganylinks orattachments,checkwiththepersondirectlytomakesurethemessageis fromthem.Evenifthemessageappearstobefromawebsiteyourcompany uses,itisbesttocheckbeforeclickinganylinksorenteringanyinformation.

Staff highlight: Stepan Poltev

Stepangraduatedfromatechnical universityinRostov-on-Don,acity insouthernRussia,wherehe specializedininformation technology.Duringhistimethere, hedevelopedastrongfoundation insystemadministrationand gainedexperienceworkingon variousprogrammingprojects. Aftercompletinghisstudies,he startedworkingasafreelancerin thefieldofsoftware implementation.Hetookon variousprojects,including implementingsoftwaresystems forretailcompanies,which allowedhimtogainvaluable experienceinmanagingcomplex softwaresystems.

Inhisfreetime,heenjoyed practicingmeditationandyoga, whichhelpedhimmaintainfocus andbalanceinhislife.Healsohad akeeninterestinteaceremonies andwouldoftenpartakein traditionalJapaneseandChinese

teaceremonies.Additionally,he wasanavidsnowboarderand lovedtohittheslopesduringthe wintermonths

Hisexpertiseanddedicationto technologywerehighlyvalued hereatCAPITALTEK.Heowehis achievementstohispassionfor technology,hisexperience workingonvariousprogramming projects,andtheopportunities thatwereprovidedtohimby CAPITALTEK.

Fromdayone,hewasthrown intothefast-pacedworldof systemadministration,working onchallengingprojectsthat requiredcreativityandtechnical skills Heworkedtirelessly, collaboratingwithhisteam,and constantlypushinghisselfto learnandimprove.

Despitecomingfromadifferent countryandworkingasa freelancerinRussia,hewasable

to seamlessly transition in working in Canada, thanks to his expertise and dedication to the field. His passion for technology, coupled with his unique set of skills and experiences, helped him excel in his career and become a valuable asset to the company

MEDIA & ARTS | ANNOUNCEMENT CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
Mayyouhaveawonderfulholy weekfilledwithloveandpeace. Beshoweredwiththeblessings oftheheavensabove.
stepan@capitaltek.ca 8
Network and Server Engineer

TECHNOLOGY UPDATE | MICROSOFT 365

NEW TO MICROSOFT 365

Targeted in-meeting notifications... and a major rebuild Teams keeps the new features coming. Next up, it’s the ability to send messages to specific people while on a call. They

TECH FACTS

can respond and react privately, too.

You can also expect a bunch of new features as they’re rebuilding the app from the ground up for extra speed and reduced battery drain.

48% of malicious email attachments use Microsoft Office file extensions, disguised as an invoice or receipt

43% of employees don’t know that clicking a suspicious link or opening an unknown attachment could lead to a malware infection

1 in 3 employees don’t believe there is a security risk in failing to password-protect their devices

TECHN LOGY UPDATE

Have you done some software research

and now you’re seeing lots of ads?

STOP! Think twice before you click.

Criminals have started to distribute fake adverts for popular apps in order to spread malware – and it’s fooling a lot of people.

The ads look like a link to a legitimate download for

common messaging applications, desktop tools and more But once you click ‘download’, a malware file with the exe extension is installed

The malware is an infostealer and it is bypassing antivirus software thanks to a clever hack that makes the file size appear larger than it is

Of course, there are plenty of perfectly legitimate software advertisements. But you should be extra cautious before you

Will this be helpful for your business, or just another distraction?

start any download. Always check with your IT expert if you’re not sure.

“It’s easy to come up with new ideas; the hard part is letting go of what worked for you two years ago but will soon be out of date.”
9 CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
Roger von Oech, Author
INSPIRATIONAL QUOTE OF INSPIRATIONAL QUOTE OF THE THE MONTH MONTH

WHAT'S ALL THE FUSS ABOUT CHATGPT?

ChatGPT is a chatbot that uses artificial intelligence, allowing you to talk to it in a very human way. It’s been making the news around the world for some of the remarkable possibilities it seems to be creating. But what exactly is it, and why is it making such waves?

ChatGPT is trained on real human language. It can answer questions and even compose documents, like emails, essa and computer code. The exciting thing is the way it allows you to have a natural feeling conversation with it t generate different responses perhaps adding more detail, asking it to use less technica language.

It was created by research company OpenAI, which is funded and managed by som of the most influential name in tech. And while it’s still in research and feedback collection phase, it’s currentl free to use (with limitations)

It’s different to a search engi because it’s designed with conversation in mind. While can answer questions, it doesn’t search the internet f information. Everything is learned from training data (i

has no knowledge past 2021). So, while many people have started using ChatGPT to write essays and articles, the facts may not be accurate. In fact, tech media website CNET recently had to issue multiple major corrections after it created 78 articles using the chatbot.

Because it’s trained on huge amounts of text published online by humans, it’s had

biases – for instance against women and people of color.

It’s not changing the world just yet. But it’s already clear that there is huge potential for both individuals and businesses alike.

Have you tried ChatGPT yet? What are your feelings about using AI in your business? We’d love to hear your thoughts. s article

OUR OFFER | AI HIGHLIGHT Capital capitaltek ca
10

ENTERTAINMENT | PUZZLES AND CROSSWORDS

The Funnies

Tech Quiz

Where was the World Wide Web invented?

In what year did the first virtual event take place?

In 2004, which search engine did Google overtake in popularity?

What was the first item sold on eBay in 1995?

5 The answers are below.

What’s the name of the oldest programming language still in use?

Q&As

Q: What’s the best way to make sure my people are following security best practice?

A: If you have good security in place and you’re regularly training your people – but find you’re still seeing human-error security issues –consider creating a strict policy that sets out the rules they need to follow and the consequences of not doing so

Q: I have an in-house IT tech, but need extra help. Should I outsource it all?

A: It doesn’t have to be an either/or solution. An external IT specialist can work seamlessly with an inhouse team with great results.

ACROSS

3. Christian holiday commemorating the crucifixion of Jesus and his death.

5. 'April Bring May Flowers'

DOWN

1. First of April

2. Also called Paschal eggs, are eggs that are decorated for the Christian feast of Easter

4. A specialized agency of the United Nations that selects a specific health theme for World Health Day

11 CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
1. 2. 3 4. 1) Switzerland 2) 1993 3) Yahoo! 4) A broken laser pointer 5) Fortran

What makes Firon one of the best roofing company in Ottawa

Since 2008, Firon Roofing Inc. has been working hard to provide the Ottawa community with an honest and trustworthy roofing company. Using only the best materials, tried and tested by their own roofing professionals, they ensure their customers a true roofing system they can put long lasting faith in

Their experts take the time to complete a full inspection and hear the needs and wants of the customer, ensuring they are only offered services and products

they need.

As active members of the community, they aim to gain lifetime customers, offering excellent warranties and customer care from the onset of your project and for years to come.

Firon Roofing will conduct a detailed inspection of your roof with each estimate to ensure your project needs are identified and effectively managed

Fully insured, their services are

performed in an environmentally- performed in an environmentallyconscious, cost-efficient and conscious, cost-efficient and timely manner Their customers timely manner. Their customers are an integral part of their are an integral part of their project and are kept up to date project and are kept up to date on the progress, on the progress, challenges and challenges and success of their project. success of their project

Firon believes in ongoing Firon believes in ongoing employee and owner training and employee and owner training and coaching, ensuring their experts coaching, ensuring their are up to date on products, are up to date on products, installation techniques and the installation techniques and the challenges facing Ottawa climate challenges facing Ottawa and our community. and our community

References with digital photos References with digital photos are available by request. Firon are available by request Firon Roofing is covered by a Roofing is covered by a $2,000,000 liability insurance liability insurance policy to protect its customers policy to protect its customers and their property and their property.

MANAGED IT SERVICES

help@capitaltek.ca capitaltek.ca

NETWORK MANAGEMENT VOIP SERVICES CLOUD SERVICES

ABOUT FOUNDER & CEO, SERGEY POLTEV

Founder and CEO Sergey Poltev, has been fixing computers since he was a kid. He immigrated to Canada to seek new opportunities, where he launched CALLGEEK (later renamed to CAPITALTEK) in 2008. Sergey was recognized in 2021 with a Forty Under 40 Awards from the Ottawa Board of Trade & Ottawa Business Journal.

FEATURE | CUSTOMER HIGHLIGHT CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
DATA BACKUP AND RECOVERY WEB HOSTING AND DESIGN
12 We're now taking on new clients! Set up a 15 minute discovery video call at www.capitaltek.ca/talk-to-an-expert Award-winning managed IT services for small to medium-sized companies in Ottawa. We combine essentials with a comprehensive platform to keep you running worry-free 24/7. 613-227-HELP
(4357)

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.