CapitalTek May Newsletter Vol. 29

Page 3

y y,p

Virtual appointments in Microsoft Teams, p2 These everyday objects can lead to identity theft, p3 Every company is now a technology company, p4 Technologies to give you an advantage, p5 3 R's of passwords, p6

emonth,p7 StaffHighlight,p8 TechnologyUpdate,p9 Don’tforgetyourphonesecurity,p10 Entertainment,p11

FeaturedCustomer-YourOttawainsurancebroker,p12

AFOUR-DAYWEEKDOESN’T MEANFOUR-DAYSECURITY

Are you one of the many companies around the world that’s looking at a four-day working week? Perhaps you’ve already made the leap.

For lots of businesses, it’s never going to work. But those that have tried it have generally found it to be hugely positive. It improves your employees’ experience, making them more loyal, engaged, and productive. It can help to attract and retain better talent, while improving your brand reputation. And let’s not ignore the cost savings of shutting down the office for an extra day.

But it has to be done right. Forcing people to cram the same amount of work into fewer hours could be a recipe for burnout and exhaustion.

That can lead to corners being cut, which in turn could lead to a cyber security disaster. Even if processes aren’t being intentionally skipped, human error due to a lapse in concentration becomes inevitable. And according to the World Economic Forum’s 2022 Global Risk Report, nearly all cyber security issues can be traced back to human error.

What does that mean for your business?

If you’re considering a four-day week, work closely with your people to make sure they

aren’t experiencing additional pressure.

And never assume that fewer office hours means you can relax your cyber security. You should reassess your measures to make sure they stand up to the change in working patterns, but also revisit your policies so that all routine tasks are still accounted for in the new working week.

Comprehensive security policies become even more important when you change a working routine, so you may also want to beef up your approach.

Consider introducing ‘zero trust’ strategies if you haven’t already These give people access to only the files, software, and systems they need to do their job – and nothing more.

Finally, refresh employees’ cyber security awareness with regular training. If security practices are not followed, it’s often because they are not fully understood.

There’s a lot to think about, but professional advice is always on hand.

If it’s something you’re considering, just get in touch.

1 CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
2023 MAY VOLUME 29 y
"YOUR MONTHLY NEWSLETTER, WRITTEN FOR HUMANS, NOT GEEKS"

WHAT IS APP FATIGUE & WHY IS IT A SECURITY ISSUE?

The number of apps and web tools that employees use on a regular basis continues to increase. Most departments have about 40-60 different digital tools that they use. 71% of employees feel they use so many apps that it makes work more complex.

Many of the apps that we use every day have various alerts. We get a “ping” when someone mentions our name on a Teams channel. We get a notification popup that an update is available. We get an alert of errors or security issues.

App fatigue is a very real thing and it’s becoming a cybersecurity problem. The more people get overwhelmed by notifications, the more likely they are to ignore them.

Just think about the various digital alerts that you get. They come in:

Software apps on your computer

Web-based SaaS tools

Websites where you’ve allowed alerts

Mobile apps and tools

Email banners

Text messages

Team communication tools

Some employees are getting the same notification on two different devices. This just adds to the problem.

This leads to many issues that impact productivity and cybersecurity.

Besides alert bombardment, every time the boss introduces a new app, that means a new password.

Employees are already juggling about 191 passwords.

month.

How Does App Fatigue Put Companies at Risk?

Employees Begin Ignoring Updates

When digital alerts interrupt your work, you can feel like you’re always behind.

This leads to ignoring small tasks seen as not timesensitive.

Tasks like clicking to install an app update.

Employees overwhelmed with too many app alerts, tend to ignore them.

When updates come up, they may quickly click them away. They feel they can’t spare the time right now and aren’t sure how long it will take.

Ignoring app updates on a device is dangerous.

Many of those updates include important security patches for found vulnerabilities.

When they’re not installed, the device and its network are at a higher risk. It becomes easier to suffer a successful cyberattack.

Employees Reuse Passwords (and They’re Often Weak)

(Continued on next page)

CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca NEWS | MAIN STORIES
2

(Continued from page 2 )

Another security casualty of app fatigue is password security.

The more SaaS accounts someone must create, the more likely they are to reuse passwords. It’s estimated that passwords are typically reused 64% of the time.

Credential breach is a key driver of cloud data breaches. Hackers can easily crack weak passwords. The same password used several times leaves many accounts at risk.

Employees May Turn Off Alerts

Some alerts are okay to turn off. For example, do you really need to know every time someone responds to a group thread?

VIRTUAL APPOINTMENTS IN MICROSOFT TEAMS

In today’s fast-paced world, the need for efficient and effective communication has never been more critical.

With the rise of remote work and the increasing reliance on technology, virtual appointments have become an essential tool for businesses and organizations worldwide.

Microsoft Teams, a powerful collaboration platform, has emerged as a game-changer in this arena, offering seamless virtual appointments that redefine the way we connect, collaborate, and communicate.

The Rise of Virtual Appointments

The global pandemic has

accelerated the adoption of remote work, with businesses and organizations scrambling to find ways to maintain productivity and communication while keeping their employees safe.

Virtual appointments have become the go-to solution, allowing teams to connect and collaborate without the need for physical presence.

Microsoft Teams, a platform designed to facilitate teamwork and communication, has risen to the challenge, offering a comprehensive suite of tools that make virtual appointments a breeze.

From video conferencing to file sharing, Microsoft Teams has everything you need to conduct

successful virtual appointments, all in one place.

Benefits of Virtual Appointments in Microsoft Teams

1. Enhanced Collaboration

Microsoft Teams allows users to collaborate in real-time, making it easier than ever to work together on projects, share ideas, and make decisions.

With features like screen sharing, whiteboarding, and file sharing, virtual appointments in Microsoft Teams enable teams to work together seamlessly, no matter where they are located.

NEWS | CONTINUATION OF MAIN STORIES StreamlineYourBusinessApplications HaveYourITTeamSetupNotifications AutomateApplicationUpdates OpenaTwo-WayCommunicationAboutAlerts But,turningoffimportantsecurityalertsisnotgood. Therecomesabreakingpointwhenonemorepush notificationcanpushsomeone overtheedge. What’stheAnswertoAppFatigue? It’snotrealistictojustgobackwardintimebeforeall theseappswerearound.
inchargeoftheirtech,andnottheotherway
Butyoucanputastrategyinplacethatputspeople
around.
3 CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca (Continued
page)
on next

(Continued from page 3)

2. Increased Flexibility

Virtual appointments in Microsoft Teams offer unparalleled flexibility, allowing team members to join meetings from any device, anywhere.

This means that employees can participate in important discussions and decision-making processes even if they’re on the go or working from home.

3. Cost Savings

By eliminating the need for physical meeting spaces and reducing travel expenses, virtual appointments in Microsoft Teams can result in significant cost savings for businesses and organizations.

Additionally, the platform’s robust features and integrations eliminate the need for multiple software subscriptions.

4. Improved Communication Microsoft Teams’ virtual appointments facilitate clear and effective communication, thanks to high-quality video and audio capabilities. The platform also offers features like live captions and translations, ensuring that language barriers and accessibility issues are no longer a hindrance to effective communication

5. Enhanced Security

Microsoft Teams is built on the secure and reliable Microsoft

365 platform, ensuring that your virtual appointments are protected by enterprise-grade security measures. This means that you can conduct your meetings with confidence, knowing that your data and conversations are safe.

THESE EVERYDAY OBJECTS CAN LEAD TO IDENTITY THEFT

You wouldn’t think a child’s toy could lead to a breach of your personal data. But this happens all the time.

What about your trash can sitting outside? Is it a treasure trove for an identity thief?

Many everyday objects can lead to identity theft.

Old Smart Phones

A cybercriminal could easily strike data theft gold by finding an old smartphone. Make sure that you properly clean any old phones by erasing all data.

Wireless Printers

Protect wireless printers by ensuring you keep their firmware updated. You should also turn it off when you don’t need it.

USB Sticks

You should never plug a USB device of unknown origin into your computer. This is an old trick in the hacker’s book. They plant malware on these sticks and then leave them around as bait.

Old Hard Drives

When you are disposing of an old computer or old removable drive, make sure it’s clean. Just deleting your files isn’t enough.

It’s best to get help from an IT professional to properly erase your computer drive. This will make it safe for disposal, donation, or reuse.

Trash Can

Identity theft criminals aren’t only online. They can also be trolling the neighborhood on trash day. Be careful what you throw out in your trash.

Children’s IoT Devices

You should be wary of any new internet-connected kids’ devices you bring into your home. Install all firmware updates and do your homework.

ATMs

This is called skimming. Malicious actors can use hidden devices on ATMs or card readers to steal your card information during transactions.

NEWS | FINISH OF MAIN STORIES CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
4

TECHNOLOGIES TO GIVE YOU AN ADVANTAGE

Customers look for convenience. In today’s world that means technology that makes their life easier

From webforms to POS systems, you need to keep the customer experience in mind in all you do.

When people aren’t happy with their experience interacting with a company, they leave.

And their experience might not have anything to do with your products or services Maybe they found it hard to navigate your website.

Technology is key to converting website visitors into clients

These technologies can give you that edge:

Cloud Forms

Digital Signatures

Smart Chatbot

SMS Notifications

Business Mobile App

FAQ Kiosk

VoIP Phone System

6 THINGS YOU SHOULD DO TO HANDLE

DATA PRIVACY UPDATES

Once data began going digital, authorities realized a need to

protect it. Many organizations have one or more data privacy policies they need to meet.

Industry and international data privacy regulations are just the tip of the iceberg. Here are a few things you should look into to handle data privacy updates:

Identify the Regulations You Need to Follow

Stay Aware of Data Privacy Regulation Updates

Do an Annual Review of Your Data Security Standards

Audit Your Security Policies and Procedures

Update Your Technical, Physical & Administrative Safeguards As Needed Keep Employees Trained on Compliance and Data Privacy

THE COOLEST TECH FROM CES 2023

At the beginning of each year, a group of global innovators meets. They introduce and show off breakthrough technologies at the Consumer Electronics Show (CES).

People love their gadgets. It’s estimated that the global smart home household penetration was 14.2% in 2022. By 2027, it’s expected to more than double to 28.8%.

What new gadgets did innovators introduce at this year’s CES?

Here are a few that you may want

to check out further:

Loona – Intelligent Petbot: Want a pet that doesn’t make a mess?

Ring Car Cam: More than just a dash cam

AtmosGear Electronic Skates: Up to 25km/H of fun Tilt Five Augmented Reality Glasses: Change the way you interact with the world

Jabra Enhance™ Plus: Hearing aids or headphones? A little bit of both

Twinkly Squares: Add a pop of color to any space

Xebec Tri-Screen 2: Dual portable monitors for your laptop

DID YOU KNOW... about Microsoft Edge flags?

Microsoft Edge flags are an experimental feature that can enhance your browsing experience. They make scrolling smoother, enable multiple items to download at once, and even allow you to choose a color profile for your browser.

Enable them by typing edge://flags in your address bar and selecting the flags you’d like to trial.

TECHNOLOGY | TOOLS FOR YOUR BUSINESS 5 CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca

3 R'S OF PASSWORDS 3 R'S OF PASSWORDS

AVOID THESE 3 R'S REDUCE

Make sure you don't reduce passwords to short or simple words. Use at least 11 characters. Consider a passphrase that uses a mix of letters, numbers and symbols.

REUSE

WHAT ARE THE 3 R'S?

Don't recycle old passwords. If a breach occurs, passwords should be changed to something new and different. Instead of changing just a single character, change each password to a completely new passphrase.

Avoid reusing passwords across accounts. If a breach occurs and a cybercriminal gains access to your credentials, the damage could be multiplied if that same password is used for other accounts, as well.

RECYCLE

Don't recycle old passwords. If a breach occurs, passwords should be changed to something new and different. Instead of changing just a single character, change each password to a completely new passphrase.

CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
CYBERSECURITY | PROTECT YOURSELF 6

CYBERSECURITY | PROTECT YOURSELF

VILLAIN OF THE MONTH

Each month we highlight a scam that demonstrates tactics criminals are using RIGHT NOW, to better prepare you when the next scam hits.

Joe was preparing to make a big purchase as a surprise for his wife, so he first checked their bank account balance on their bank's website. Joe typed in the bank name on his search engine and clicked the first search result that came up. The search result included the bank's name and stated it was the official login page.

As the page loaded, Joe noticed that the URL was different than normal and that the lock symbol was missing from the address bar Before Joe could exit the website, it loaded, and his fears were confirmed.

A red pop-up appeared stating, "Your device has been infected with Malware." Joe panicked and clicked out of the website. At first, he was terrified, thinking of all the damage he could have caused. But then, he started thinking of his cybersecurity training. Joe scanned his computer for malware and once it was clean, he changed his bank password and all other passwords that could have been compromised.

DID YOU SPOT THE RED FLAGS?

Joedidn'tchecktheURLbeforeclickingonthewebsite,hejust checkedthenamewhichcanbemodifiedtomimicrealwebsites. Insteadofscrollingdownpasttheads,Joeclickedonthefirst searchresultthatpoppedup.

Joecouldhavetypedinthebankwebsitedirectly,butheentered thenameintothesearchengineinstead.

Type in websites directly and for websites you visit often, bookmark them on your browser to avoid search engine ads.

Avoid ads at the top of search results. Cybercriminals can pay to have their websites posted as ads. Consider using an ad blocker.

Avoidsearchingforwebsitesonyourphoneasitishardertotelliftheyare secure and easier to accidentally click on an unknown link. If you do click on amaliciouslink,alertyourITdepartmentorsomeoneatyourorganization.

Staff highlight: Erickson Gaspar

Erickhasmanyexperiencesin customerservice.Hestarted workingasakitchencrewmember inoneofthefamouspizza restaurantsinPhilippines.After hisgraduationin2015,heworked intechnicalandcustomerservice support. Despiteofthechallenges heencountered,hemanagedto graduallylearnhowtohandle differentpeoplewithdifferent concernsandscenarios.Heknew hewassuccessfulwhileheworked incustomerservicebecauseofthe recognitionhereceived.Hehas someknowledgeofcomputer networkingfundamentalsand howtheywork.Thoughhehas moreinterestinworkingwith computerhardware.Healso enjoysworkingondesigning,such asphotoandimageediting.

Astimewentby,helookedfora morechallengingroleintheIT industrybystartinghiscareerasa helpdeskanalystinoneofthe

biggesthotelchainintheworld. Oneoftheirclients'headquarter isinCanada.He’sbeenworking foralmostfouryearsforother variousclientsandregions.He considersthatheismorefamiliar workingwithAmericanculture andEuropeancountries.Butnow, he’slearningtheCanadianway andhelovesit.

HehadexperiencedwithMSPfor twoyearsbeforehelandedan opportunitytoworkherein CAPITALTEK.

Outsideofwork,heenjoys differentthingslikeoutdoor adventures,suchastraveling,(his goalistovisiteveryprovincein thePhilippines)biking,jogging, driving,andnowhe'stryingto learnanewsport,swimming.He wasmoreofadogpersonbefore butalreadystartedlovingcats, andtreatsthemashisownkids. Therearethingsheknowshe

needs to improve on. And he never stops learning new skills and things in work or personal aspect because it is his purpose.

Watch out for our new company logo as part of the ongoing evolution of our company’s brand. Our business has grown and evolved over the years, and as we celebrate our 15th Anniversary in May 15, we believed it's time for a change. We have refreshed our logo to reflect who we are today and to symbolize our future.

After careful consideration, we chose a new logo that reflects a more modern look and captures our vision of helping businesses take the next step and reach new heights by embracing the evolution of tech support.

Follow our social media accounts for more updates:

MEDIA & ARTS | ANNOUNCEMENT CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
8
Technical
Engineer erick@capitaltek.ca
capitaltek | capitaltek.ca

NEW TO MICROSOFT 365

Working hours and location

New options are coming to Outlook that allow you to set more flexible working hours each day and specify where you’re working from.

TECH FACTS

Everyone can see this so there’s no confusion over when you’re working (and when you’re not.)

Nokia is famous for its phones, but it started out as a paper manufacturer in 1865

INSPIRATIONAL QUOTE OF INSPIRATIONAL QUOTE OF THE THE MONTH MONTH

Think robots are androgynous? Think again. ‘Android’ comes from the Greek for male-like. The female equivalent is ‘Gynoid’

NASA’s internet speed is 91GB per second. That’s about 13,000 times faster than most business’s speed

TECHN LOGY UPDATE

Are you wasting money every month on unused software licenses? Many businesses are, according to new research.

The study looked at more than 30 popular software tools and discovered that a huge 50% of all licenses were not being used. Some of the most commonly lapsed licenses are for Tableau, Trello, and Spotfire.

If you’re not sure how to scan your network to check, get in touch and we’ll help you.

TECHNOLOGY UPDATE | MICROSOFT 365
“Get closer than ever to your customers. So close that you tell them what they need well before they realize it themselves.”
9 CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
Steve Jobs, Co-founder of Apple

DON’T FORGET YOUR PHONE SECURITY

It’s common for people to rely on their personal phones to keep in touch at work.

That’s not always the best idea, and there are lots of good reasons to provide company phones to your team (would you want to own the number and block access to sensitive data if somebody left?)

But whoever owns the device, you need to make security your top priority. Cyber criminals know how much valuable information lives on our mobiles, and they’re making phones a target.

If you don’t already have a mobile security and management strategy in place, it’s time you did. Here are our top 5 ways to keep phones secure:

Set minimum upgrade requirements

Cyber crooks and device manufacturers both work in three-year cycles. That means that, as threats evolve, so do the protections that address them. Upgrade devices to follow this cycle, and even if you’re using BYOD (bring your own device), enforce this rule if employees want to use their personal phone for work.

Implement Mobile Device Management

MDM allows you to track the location of devices, lock/wipe their data remotely, and can help you access remote support for any issues. That means your data stays safe, even in cases of a lost or stolen phone. You can also create a list of apps that are to be blocked for security reasons

Set up MFA Authentication

Make sure a biometric locks or fingerprint I and that all app log in. Only a access to the s they need for th

Always update

Like all your need to have th installed as soo they become have MDM in place, it’s pos updates across at the same ti more info.

Regular aware

You should ho security trainin that includes Your people a link when it com

Keeping them up to speed on security risks can improve compliance

It’s easy to overlook mobile devices when it comes to keeping your data secure, but it’s a vital step in protecting yourself against cyber attacks. For any help or advice, get in touch.

OUR OFFER | AI HIGHLIGHT CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
10

ENTERTAINMENT | PUZZLES AND CROSSWORDS

The Funnies

Tech Quiz

What’s the most widely used coding language for web development?

What do lots of people wrongly think Wi-Fi is short for?

What’s the main function of a router?

What’s the most widely used operating system in the world? What do we use an IP address for?

Q&As

Q: I’ve deleted an important file –can I get it back?

A: If you’ve checked your recycle bin and it’s not there, don’t panic. As long as you have a working backup, your file should be recoverable. Just don’t do anything else call an expert (we can help)

Q: Why do I keep losing connection to the office Wi-Fi?

A: It may be that your router is overloaded Restart your device and try again If that doesn’t work, try connecting on another device –this should tell you if it’s a device or router issue.

4 A painted pole, decorated with flowers, around which people traditionally dance on May Day, holding long ribbons that are attached to the top of the pole.

6. The act of cleaning all of a place, especially your house, very well, including parts you do not often clean.

7. Held annually each May in Ottawa, Ontario, Canada. The festival claims to be the world's largest tulip festival, displaying over one million tulips, with attendance of over 650,000 visitors annually.

8 A celebration honoring the mother of the family or individual,

as well as motherhood, maternal bonds, and the influence of mothers in society.

Down

1. Also called Workers' Day or International Workers' Day, is the day that commemorates the struggles and gains made by workers and the labour movement It is observed in many countries on May 1

2 A genus of spring-blooming

perennial herbaceous bulbiferous geophytes. The flowers are usually large, showy and brightly coloured, generally red, pink, yellow, or white

3 The time of year when most plants that had been dormant over the fall and winter finally began to grow again

5 The third astrological sign in the zodiac. Under the tropical zodiac, the sun transits this sign between about May 21 to June 21.

11 CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca
1. 2. 3. 4. 5 The answers are below 1) Javascript 2) Wireless Fidelity. (Apparently, it doesn’t actually mean anything!) 3) To direct traffic between networks 4) Windows 5) To identify a device on a network ACROSS

YOUR OTTAWA INSURANCE BROKER

In 1922, Tanner Insurance began as a small, family-owned business in Vars, Ontario. Their mission was to connect locals with quality insurance policies. Since their debut, they have offered personalized services, and their customers’ needs have always been prioritized. Four generations and 100 years later, their mission remains the same Still family-owned, they emphasize high-quality and tailored customer service. As a certified licensed broker of the Registered Insurance Brokers of

Ontario, they represent some of the most trusted companies in Canada, ensuring that their customers receive quality insurance policies that fit their needs After three generations, our personal customer service is still renowned.

Finding insurance can be a hassle, and that’s why they make it their job to find the best policies and bring them to you. Their goal when searching for your perfect insurance plan is to maximize your savings. Tanner Insurance offers hard-to-beat, competitive prices on insurance. Whether it’s your home, your car or your business, they can find you an insurance policy that works for you. If you are insuring multiple assets, you can bundle your policies together to create

even more savings It’s just even more savings. It’s just another thing they can do to another thing they can do to make your experience better. make your experience better.

613-227-HELP (4357) help@capitaltek.ca capitaltek.ca

MANAGED IT SERVICES

ABOUT FOUNDER & CEO, SERGEY POLTEV

As the world becomes more

As the world becomes more innovative, so does Tanner innovative, so does Tanner Insurance. We’re making our Insurance. We’re making our services easier to reach every services easier to reach every day for the best customer day for the best customer service experience. You can call service experience. You can call and email us, or use our newly and email us, or use our newly developed MyTannerInsurance developed MyTannerInsurance App, available on Google Play or App, available on Google Play or the App Store. It connects you to the App Store. It connects you to Tanner Insurance and makes it Tanner Insurance and makes it easy for you to view your easy for you to view your coverage details or submit a coverage details or submit a claim. For more information, claim. For more information, contact one of our customer contact one of our customer service representatives. service representatives.

iinfo@tannerinsurance.com nfo@tannerinsurance.com ttannerinsurance.com annerinsurance.com

Award-winning managed IT services for small to medium-sized companies in Ottawa. We combine essentials with a comprehensive platform to keep you running worry-free 24/7.

DATA BACKUP AND RECOVERY WEB HOSTING AND DESIGN

Founder and CEO Sergey Poltev, has been fixing computers since he was a kid. He immigrated to Canada to seek new opportunities, where he launched CALLGEEK (later renamed to CAPITALTEK) in 2008. Sergey was recognized in 2021 with a Forty Under 40 Awards from the Ottawa Board of Trade & Ottawa Business Journal.

FEATURE | CUSTOMER HIGHLIGHT CapitalTek Teknology Insider 613-227-HELP (4357) help@capitaltek ca capitaltek ca NETWORK MANAGEMENT VOIP SERVICES CLOUD SERVICES We're now taking on new clients! Set up a 15 minute discovery video call at www.capitaltek.ca/talk-to-an-expert
12

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.