p ,p
Data backup is not enough, p2
Microsoft forms, p3
Every company is now a technology company, p4
Business gadget of the month, p5 Disposing of personal devices securely, p6
Villainofthemonth,p7 StaffHighlight,p8
TechnologyUpdate,p9
What'sallthefussaboutChatGPT?,p10
Entertainment,p11
FeaturedCustomer-OneofthebestroofingcompanyinOttawa,p12
SMARTPHONESARENOWTHE PREFERREDDEVICEFORMOBILEWORK
Smartphones have taken over from laptops as most people’s preferred portable work tool.
They enjoy the flexibility and, perhaps obviously, they’re easier to carry around than a laptop or a tablet.
It means that mobile connectivity and reliable broadband have become two of the largest IT considerations.
In turn, that creates a different set of security risks.
If a number of your people need a phone to do their job, here’s a big thought: Would they be better off using a work-issued phone instead?
If an employee has contact with customers, would you want to own their phone number in case they left?
And there are security considerations that might be best handled on company-issued phones. That includes rolling out security updates, managing secure mobile gateways, and administering passwords.
You should make sure data on the device is encrypted, not only to protect data from cyber criminals, but to make sure your information is safe should the phone be lost or stolen. Can the phone be remotely wiped?
The software installed on the phone should be policed too You may need a policy that limits or blocks the use of third-party software This can also help establish a boundary between work and personal tasks.
As with most tech, this isn’t a case of set it and forget it. You need to make sure updates are run on time, and remotely audit company-issued ected. ur us!
1 CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
2023 APRIL VOLUME 28
"YOUR MONTHLY NEWSLETTER, WRITTEN FOR HUMANS, NOT GEEKS"
DATA BACKUP IS NOT ENOUGH
The need to back up data has been around since floppy disks. Data loss happens due to viruses, hard drive crashes, and other mishaps. Most people using any type of technology have experienced data loss at least once.
There are about 140,000 hard drive crashes in the US weekly. Every five years, 20% of SMBs suffer data loss due to a major disaster. This has helped to drive a robust cloud backup market that continues to grow.
But one thing that’s changed with data backup in the last few years is security. Simply backing up data so you don’t lose it, isn’t enough anymore. Backing up has morphed into data protection.
What does this mean?
It means that backups need more cybersecurity protection. They face threats such as sleeper ransomware and supply chain attacks. Cloudbased backup has the benefit of being convenient, accessible, and effective. But there is also a need for certain security considerations with an online service.
Companies need to consider data protection when planning a backup and recovery strategy. The tools used need to protect against the growing number of threats.
Some of the modern threats to data backups
include:
• Data Center Outage: The “cloud” basically means data on a server. That server is internet accessible. Those servers can crash. Data centers holding the servers can also have outages.
• Sleeper Ransomware: This type of ransomware stays silent after infecting a device. The goal is to have it infect all backups. Then, when it’s activated, the victim doesn’t have a clean backup to restore.
• Supply Chain Attacks: Supply chain attacks have been growing. They include attacks on cloud vendors that companies use. Those vendors suffer a cyberattack that then spreads throughout their clients.
• Misconfiguration: Misconfiguration of security settings can be a problem. It can allow attackers to gain access to cloud storage. Those attackers can then download and delete files as they like.
What to Look for in a Data Protection Backup System
Just backing up data isn’t enough. You need to make sure the application you use provides adequate data protection. Here are some of the things to look for when reviewing a backup solution.
(Continued on next page)
CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca NEWS | MAIN STORIES
2
(Continued from page 2 )
Ransomware Prevention
Ransomware can spread throughout a network to infect any data that exists. This includes data on computers, servers, and mobile devices. It also includes data in cloud platforms syncing with those devices.
95% of ransomware attacks also try to infect data backup systems.
It’s important that any data backup solution you use have protection from ransomware. This type of feature restricts automated file changes that can happen to documents.
Continuous Data Protection
Continuous data protection is a feature that will back up files as users make changes. This differs from systems that back up on a schedule, such as once per day.
Continuous data protection ensures that the system captures the latest file changes. This mitigates data loss that can occur if a system crashes before the next backup. With the speed of data generation these days, losing a day’s worth of data can be very costly.
Threat Identification
Data protection incorporates proactive measures to protect files. Threat identification is a type of malware and virus prevention tool. It looks for malware in new and existing backups. This helps stop sleeper ransomware and similar malware from infecting all backups.
Zero-Trust Tactics
Cybersecurity professionals around the world promote zero-trust security measures. This includes measures such as multi-factor authentication and application safelisting.
MICROSOFT FORMS: ONE OF THE HANDIEST FREEBIES IN MICROSOFT 365
Microsoft 365 is one of the most popular cloud platforms in the world, with about 345 million paid seats.
Users get a stable of over 20 different apps, including the core MS Office suite.
With so many different apps, it’s not uncommon for some to go unused.
Companies may not even be aware they have access to these other helpful tools.
One of the handiest apps you
get with a Microsoft 365 subscription is Microsoft Forms.
What Is Microsoft Forms?
Microsoft Forms is a drag-anddrop form, quiz, and survey creator. It’s simple to use and allows you to send out surveys via a link. Recipients can fill out your form online from any device.
How to Get Started in Forms:
1. Visit Forms.office.com and log into your Microsoft account.
2. Choose “New Form” or “New
Quiz: from the top menu
3. OR you can choose to explore the built-in templates
4. Click “Add New” to add a new form field. You can choose from field types:
Choice (i.e., multiple-choice question)
Text
Rating
Date
Ranking
Likert (a scale that records attitudes/opinions about a topic)
(Continued on next page)
NEWS | CONTINUATION OF MAIN STORIES
3 CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
(Continued from page 3)
Net Promoter Score® (a scale from “not likely” to “extremely likely”) Section (separator that can include a title and image)
5. Enter your questions
6. Once finished, click “Send” at the top. You can distribute the survey using the following options:
Link to a web form
Email
QR code
Embed in a web page
Via Facebook or Twitter
7. View responses on the “Responses” tab
AdvantagesofUsingMicrosoft Forms
It’sIncludedinMicrosoft365 Subscriptions
If you already subscribe to Microsoft 365, then you automatically get access to MS Forms.
ItSavesTime
No emailing attachments back and forth, and Forms collates survey responses automatically.
GetChartedResults
You can quickly see the results of the survey in meaningful graphs.
It’sEasytoUse
There’s a very low learning curve
with Microsoft Forms.
The interface is intuitive and simple, so just about everyone can jump in and start using it.
What Are Some Ways You Can Leverage Microsoft Forms?
Annual Customer Satisfaction Survey
Employee Security Awareness
Quiz
Change Readiness Survey
Event Registrations
Volunteer Registration Form
EVERY COMPANY IS NOW A TECHNOLOGY COMPANY
Whether you sell shoes or run an accounting firm, you need some type of technology to operate. Today’s companies aren’t just in the business of selling their own goods and services anymore. They also must master various types of digital tools.
Technology Is a Critical Part of Business
Customers Expect an Excellent Digital Experience Employees Need Devices to Drive Productivity
AI & Automation Help Companies Stay Competitive Information Is Being Generated at a Rapid Pace Vendors/Suppliers Are Leaving
Legacy Systems Behind
7.It’s Difficult to Grow Without Tech Innovation
8.Business Continuity Needs
6 STEPS TO EFFECTIVE
VULNERABILITY MANAGEMENT FOR YOUR TECHNOLOGY
Technology vulnerabilities are an unfortunate side effect of innovation. When software companies push new updates, there are often weaknesses in the code. Hackers exploit these.
Software makers then address the vulnerabilities with a security patch. The cycle continues with each new software or hardware update.
61% of security vulnerabilities in corporate networks are over 5 years old.
Step 1 Identify Your Assets
Step 2: Perform a Vulnerability Assessment
Step 3: Prioritize
Vulnerabilities by Threat Level
Step 4: Remediate Vulnerabilities
Step 5: Document Activities
Step 6. Schedule Your Next Vulnerability Assessment Scan
NEWS | FINISH OF MAIN STORIES CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
4
3. 4. 5. 6.
1. 2.
WHY YOU NEED TO THINK TWICE BEFORE USING LENSA AI & OTHER SELF-PORTRAIT APPS
It’s a common theme. You begin seeing these amazing CGI images of your friends on Facebook or Instagram.
You think, “How can I make one?”
The latest of these modern vanity marvels to make the rounds is Lensa AI.
You upload about 10 photos so the app can feed that data into its AI algorithm
Then, once it maps your facial features, it generates several
fantasy profile pics. It sounds like a little harmless digital fun, right?
That’s what many companies making apps like this like you to think.
Vanity is an easy sell.
But for Lensa AI and several similar self-portrait apps, you’re paying more than you know
The cost comes from the data privacy rights you’re giving up.
WINDOWS 8.1 JUST LOST ALL SUPPORT. HERE'S WHAT YOU
NEED TO KNOW
The latest operating system to lose all support is Windows 8 1 Microsoft released the OS in 2013, and it was officially retired on January 10, 2023. Microsoft issued the following warning for companies:
“Continuing to use Windows 8.1 after January 10, 2023 may increase an organization’s exposure to security risks or impact its ability to meet compliance obligations.”
DID YOU KNOW... You can apply preferences to Chrome extensions?
Sometimes, you may want to disable certain Google Chrome extensions on one website but have them enabled on another. Sure, you could keep switching them on and off. But who wants to do that?
Soon, you’ll be able to set preferences for sites you visit often, to make disabling and enabling extensions automatic.
Nice Work, Chrome
Business gadget of the month
Here are a few facts you should know:
The OS Will Still Technically Work
Your System Will No Longer Receive Security Patches
Options for Upgrading are Windows 10 or 11
What Happens if you don’t upgrade?
Security & Compliance Issues
Slowed Productivity Incompatibility With Newer Tools
Microsoft Ergonomic Keyboard
Wrist strain is a common problem for regular keyboard users. Ergonomic keyboards are nothing very new, but this latest offer from Microsoft moves things forward with the addition of more programmable ‘favorites’, a dedicated emoji button and lots of customization options to boost your productivity. And it doesn’t break the bank at around $50.
TECHNOLOGY | TOOLS FOR YOUR BUSINESS 5 CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
DISPOSING OF PERSONAL DEVICES SECURELY DISPOSING OF PERSONAL DEVICES SECURELY
OUT WITH THE OLD!
Transferring Data
Before throwing out that old device, it is important to have a plan to transfer data. One easy way is to back up everything to a trusted cloud storage solution. You can also use an external hard drive or SSD drive. If you are buying a new device at a credible store, consider bringing the old device and letting an employee complete the transfer for you.
Wiping Devices
Once everything is properly backed up or transferred, it's time to wipe the old device. This protects the security of your data and ensures a smooth transition to the new device. Most devices have a "factory reset" option that wipes all personal data. For more details, research the best way to wipe your specific device.
Selling Devices
In addition to wiping the device, be sure to initiate a factory reset and remove any SIM cards if you plan on selling. Stick to credible websites and look out for common scams that target online sellers. Consider trade-in options at reputable stores, as well.
Work Devices
For the disposal of work devices, it's best to ask your employer for specific company procedures.
Device
Cleaning Che
Unsubscribe from unwanted email lists. Take saved card info off of accounts. Close old email and website accounts. Review social media privacy settings. Set software to automatically update. Stop browsers fromstoring sensitive data.
CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
CYBERSECURITY | PROTECT YOURSELF 6
CYBERSECURITY | PROTECT YOURSELF
VILLAIN OF THE MONTH
Each month we highlight a scam that demonstrates tactics criminals are using RIGHT NOW, to better prepare you when the next scam hits.
It was a typical day at the office. Connor was checking his inbox when he saw an email from Sarah from HR titled, "Important Dress Code Updates". He was intrigued. Did something happen with the current dress code? What changes were going to be?
Connor opened the message. It said he must sign a document to show he has read the new policy. There was a link in the message to the new policy and a document to sign When he clicked the link, he was brought to a website that asked him to make an account. Connor figured it must be a new website HR was using. He entered his phone number, birth date, and other details to sign up.
Once the information was submitted, the screen didn't show the new dress code policy. Frustrated, Connor went over to Sarah's office to ask her about it in person. After talking to Sarah, Connor was shocked to find out she knew nothing about the email.
DID YOU SPOT THE RED FLAGS?
Connordidn'tcheckthesender'semailaddress.Hesawitwas "SarahfromHR"anddidn'tlookcloser.
Insteadofcheckingwithsomeonefirstaboutthenewwebsite, Connorenteredallofhispersonalinformation.
Connorlethisemotionsgetthebestofhim.Cybercriminalsoften pushustoactwith"important"messagesabouttopicsweexpect toseefromwork.
Always examine the sender's email address closely, even if the name looks familiar. Walk through the SLAM method (sender, links, attachments, message) before acting.
Scammers will create a sense of urgency and call a user to action. Common examples ask a user to sign a document, view an update, or complete an urgent work-related task.
2022sawanincreaseinwork-relatedscamemails Beforeclickinganylinks orattachments,checkwiththepersondirectlytomakesurethemessageis fromthem.Evenifthemessageappearstobefromawebsiteyourcompany uses,itisbesttocheckbeforeclickinganylinksorenteringanyinformation.
Staff highlight: Stepan Poltev
Stepangraduatedfromatechnical universityinRostov-on-Don,acity insouthernRussia,wherehe specializedininformation technology.Duringhistimethere, hedevelopedastrongfoundation insystemadministrationand gainedexperienceworkingon variousprogrammingprojects. Aftercompletinghisstudies,he startedworkingasafreelancerin thefieldofsoftware implementation.Hetookon variousprojects,including implementingsoftwaresystems forretailcompanies,which allowedhimtogainvaluable experienceinmanagingcomplex softwaresystems.
Inhisfreetime,heenjoyed practicingmeditationandyoga, whichhelpedhimmaintainfocus andbalanceinhislife.Healsohad akeeninterestinteaceremonies andwouldoftenpartakein traditionalJapaneseandChinese
teaceremonies.Additionally,he wasanavidsnowboarderand lovedtohittheslopesduringthe wintermonths
Hisexpertiseanddedicationto technologywerehighlyvalued hereatCAPITALTEK.Heowehis achievementstohispassionfor technology,hisexperience workingonvariousprogramming projects,andtheopportunities thatwereprovidedtohimby CAPITALTEK.
Fromdayone,hewasthrown intothefast-pacedworldof systemadministration,working onchallengingprojectsthat requiredcreativityandtechnical skills Heworkedtirelessly, collaboratingwithhisteam,and constantlypushinghisselfto learnandimprove.
Despitecomingfromadifferent countryandworkingasa freelancerinRussia,hewasable
to seamlessly transition in working in Canada, thanks to his expertise and dedication to the field. His passion for technology, coupled with his unique set of skills and experiences, helped him excel in his career and become a valuable asset to the company
MEDIA & ARTS | ANNOUNCEMENT CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
Mayyouhaveawonderfulholy weekfilledwithloveandpeace. Beshoweredwiththeblessings oftheheavensabove.
stepan@capitaltek.ca 8
Network and Server Engineer
TECHNOLOGY UPDATE | MICROSOFT 365
NEW TO MICROSOFT 365
Targeted in-meeting notifications... and a major rebuild Teams keeps the new features coming. Next up, it’s the ability to send messages to specific people while on a call. They
TECH FACTS
can respond and react privately, too.
You can also expect a bunch of new features as they’re rebuilding the app from the ground up for extra speed and reduced battery drain.
48% of malicious email attachments use Microsoft Office file extensions, disguised as an invoice or receipt
43% of employees don’t know that clicking a suspicious link or opening an unknown attachment could lead to a malware infection
1 in 3 employees don’t believe there is a security risk in failing to password-protect their devices
TECHN LOGY UPDATE
Have you done some software research
and now you’re seeing lots of ads?
STOP! Think twice before you click.
Criminals have started to distribute fake adverts for popular apps in order to spread malware – and it’s fooling a lot of people.
The ads look like a link to a legitimate download for
common messaging applications, desktop tools and more But once you click ‘download’, a malware file with the exe extension is installed
The malware is an infostealer and it is bypassing antivirus software thanks to a clever hack that makes the file size appear larger than it is
Of course, there are plenty of perfectly legitimate software advertisements. But you should be extra cautious before you
Will this be helpful for your business, or just another distraction?
start any download. Always check with your IT expert if you’re not sure.
“It’s easy to come up with new ideas; the hard part is letting go of what worked for you two years ago but will soon be out of date.”
9 CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
Roger von Oech, Author
INSPIRATIONAL QUOTE OF INSPIRATIONAL QUOTE OF THE THE MONTH MONTH
WHAT'S ALL THE FUSS ABOUT CHATGPT?
ChatGPT is a chatbot that uses artificial intelligence, allowing you to talk to it in a very human way. It’s been making the news around the world for some of the remarkable possibilities it seems to be creating. But what exactly is it, and why is it making such waves?
ChatGPT is trained on real human language. It can answer questions and even compose documents, like emails, essa and computer code. The exciting thing is the way it allows you to have a natural feeling conversation with it t generate different responses perhaps adding more detail, asking it to use less technica language.
It was created by research company OpenAI, which is funded and managed by som of the most influential name in tech. And while it’s still in research and feedback collection phase, it’s currentl free to use (with limitations)
It’s different to a search engi because it’s designed with conversation in mind. While can answer questions, it doesn’t search the internet f information. Everything is learned from training data (i
has no knowledge past 2021). So, while many people have started using ChatGPT to write essays and articles, the facts may not be accurate. In fact, tech media website CNET recently had to issue multiple major corrections after it created 78 articles using the chatbot.
Because it’s trained on huge amounts of text published online by humans, it’s had
biases – for instance against women and people of color.
It’s not changing the world just yet. But it’s already clear that there is huge potential for both individuals and businesses alike.
Have you tried ChatGPT yet? What are your feelings about using AI in your business? We’d love to hear your thoughts. s article
OUR OFFER | AI HIGHLIGHT Capital capitaltek ca
10
ENTERTAINMENT | PUZZLES AND CROSSWORDS
The Funnies
Tech Quiz
Where was the World Wide Web invented?
In what year did the first virtual event take place?
In 2004, which search engine did Google overtake in popularity?
What was the first item sold on eBay in 1995?
5 The answers are below.
What’s the name of the oldest programming language still in use?
Q&As
Q: What’s the best way to make sure my people are following security best practice?
A: If you have good security in place and you’re regularly training your people – but find you’re still seeing human-error security issues –consider creating a strict policy that sets out the rules they need to follow and the consequences of not doing so
Q: I have an in-house IT tech, but need extra help. Should I outsource it all?
A: It doesn’t have to be an either/or solution. An external IT specialist can work seamlessly with an inhouse team with great results.
ACROSS
3. Christian holiday commemorating the crucifixion of Jesus and his death.
5. 'April Bring May Flowers'
DOWN
1. First of April
2. Also called Paschal eggs, are eggs that are decorated for the Christian feast of Easter
4. A specialized agency of the United Nations that selects a specific health theme for World Health Day
11 CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
1.
2. 3 4.
1) Switzerland
2) 1993
3) Yahoo!
4) A broken laser pointer
5) Fortran
What makes Firon one of the best roofing company in Ottawa
Since 2008, Firon Roofing Inc. has been working hard to provide the Ottawa community with an honest and trustworthy roofing company. Using only the best materials, tried and tested by their own roofing professionals, they ensure their customers a true roofing system they can put long lasting faith in
Their experts take the time to complete a full inspection and hear the needs and wants of the customer, ensuring they are only offered services and products
they need.
As active members of the community, they aim to gain lifetime customers, offering excellent warranties and customer care from the onset of your project and for years to come.
Firon Roofing will conduct a detailed inspection of your roof with each estimate to ensure your project needs are identified and effectively managed
Fully insured, their services are
performed in an environmentally- performed in an environmentallyconscious, cost-efficient and conscious, cost-efficient and timely manner Their customers timely manner. Their customers are an integral part of their are an integral part of their project and are kept up to date project and are kept up to date on the progress, on the progress, challenges and challenges and success of their project. success of their project
Firon believes in ongoing Firon believes in ongoing employee and owner training and employee and owner training and coaching, ensuring their experts coaching, ensuring their are up to date on products, are up to date on products, installation techniques and the installation techniques and the challenges facing Ottawa climate challenges facing Ottawa and our community. and our community
References with digital photos References with digital photos are available by request. Firon are available by request Firon Roofing is covered by a Roofing is covered by a $2,000,000 liability insurance liability insurance policy to protect its customers policy to protect its customers and their property and their property.
MANAGED IT SERVICES
help@capitaltek.ca capitaltek.ca
NETWORK MANAGEMENT VOIP SERVICES CLOUD SERVICES
ABOUT FOUNDER & CEO, SERGEY POLTEV
Founder and CEO Sergey Poltev, has been fixing computers since he was a kid. He immigrated to Canada to seek new opportunities, where he launched CALLGEEK (later renamed to CAPITALTEK) in 2008. Sergey was recognized in 2021 with a Forty Under 40 Awards from the Ottawa Board of Trade & Ottawa Business Journal.
FEATURE | CUSTOMER HIGHLIGHT CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
DATA BACKUP AND RECOVERY WEB HOSTING AND DESIGN
12 We're now taking on new clients! Set up a 15 minute discovery video call at www.capitaltek.ca/talk-to-an-expert Award-winning managed IT services for small to medium-sized companies in Ottawa. We combine essentials with a comprehensive platform to keep you running worry-free 24/7. 613-227-HELP
(4357)