Email (is still) Like a Postcard

Postcard
With all of the advancement in email servers, services, and cloud solutions, fundamentally, email is still like a postcard.

When you mail a postcard, the postal service will make its best attempt to get it delivered in a reasonable period of time.  While most postcards make it, occasionally a few get lost in the mail.

And while your message from vacation, your short message to a friend, or a quick thank you makes its travels, everybody that touches the postcard along the way can read it. Not that everybody, or even anybody will, but they can.

For the type of messages we send on postcards, we do not really care about privacy. Our email messages, however, often contain personal, sensitive, or corporate data that we want or need to keep private.

It is relatively easy for hackers to capture corporate data from emails as it travels across the public Internet. It is also easy for the staff at your MSP or IT service firm to read or intercept messages.

Yes, when we deploy Google Apps and other services, we put technology in place such as policy-based TLS encryption that helps mitigate risks and forced SLL encryption.  Many on-premise email servers have these features active as well.

But for many businesses, this is not enough. Government and industry regulatory requirements, including HIPAA, PCI, and PII, affect nearly every business with employees, that accepts credit cards, or keeps a customer file. Financial firms and publicly traded firms also face regulatory requirements from the SEC, FINRA, and Sarbanes/Oxley.

To meet increasing demands for data privacy and protection, you need message level encryption for at least those employees that deal with sensitive or protected information. If your solution is difficult to use, or inconvenient for recipients, employees will look to circumvent the system or opt not to encrypt messages, customers and partners will complain, and your business will suffer.

When looking at email encryption solutions, evaluate solutions that require little or no user involvement, make it easy for recipients to read encrypted messages, and work well on mobile devices. The good news, is that these solutions are affordable and can be deployed based on need.


For more information, contact us about selecting the right email encryption solution for you and your business.


 

Special Offer on Android Tablets / Play for Education Pilot Kits

Nexus7
Working with a group of vendors and our distributors, we are pleased to offer qualifying districts* more than 50% off a comprehensive Android Tablet/Play for Education Pilot Kit.

With a retail value over $13,900, we are offering the kit on a first-come, first-serve basis for $6,480.

The Android Tablet/Play for Education Pilot Kit includes:

  • 30 Nexus 7 Tablets (16GB Model)
  • 30 Google Play for Education Management Licenses
  • 30 Higher Ground protective cases
  • 1 Ergotron Tablet Cart
  • 1 NEC Projector with DisplayNote Licenses
  • Deployment support from Cumulus Global and Google
  • Android Apps from Google’s Getting Started App Bundle
    • Explain Everything / Book Creator / We Video
      Tynker / Comic Strip It / Drawap
  • Professional Development from Educational Collaborators (2 teachers)

*As the number of Kits is limited, restrictions apply, including:

  • Limit one (1) kit per district
  • Sales are first-come, first serve
  • District student population must be at least 1,000 students
  • Offer is for new Android customers (30 or fewer existing Android tablets)
  • All sales subject to approval by Google.

For more information, please contact our EDU Team.  Or, click here to request pricing and a quote.

 

Ransomware Still Crippling “Protected” Networks

cyrptovirus
The rate of infections from crypto-viruses and other ransom-ware continues to rise. Even networks with traditionally strong malware protection are getting caught.

And while with good backups in place, it is possible to recover without paying the ransom, the process time consuming, frustrating, and expensive.

We outline the reasons for the broad failure of anti-virus/malware protection software in this prior blog post, providing 5 failings of most antivirus solutions.

Now, we are offering a risk-free way to assess if your malware protection is up to par.

The Offer

We will install Webroot Secure Anywhere Endpoint Protection, a cloud-based malware protection service that avoids the 5 failings of other solutions, at no cost for 30 days. Based in the cloud, Webroot will not interfere with your current protections.

At the end of the 30 days, you will see what malware, if any, was caught by Webroot that your existing solution has missed.

If your existing solution is not up to par, and you want better protection, we can activate a full subscription to Webroot for you $18 per year per device or less (more than 25% off).

Simply contact us if you are willing to see if your protection is enough, or if you would like more information.

Chrome Support for Windows XP Ends

As announced by Google in October, 2013, Chrome support for Windows XP will end on April 30, 2015 — a full year after Microsoft discontinued support for the Windows XP operating system.

This means:

  • Chrome will continue to function on Windows XP, but no new features will be added.  Chrome will continue to get updates on Windows XP until (at least) the end of 2015.
  • Google will no longer provide Google for Work support for any issue related to Chrome on Windows XP, including Google Apps for Work, Education, and Government. If you have an issue on an XP machine with Chrome, you will need to reproduce the issue on a supported platform to receive support.

That fact that Google will still provide updates, means Chrome users on Windows XP systems will continue to have a secure and reliable browser, with some additional time to move to a supported platform.

 

 

 

5 Reasons a Crypto Virus May Ruin Your Week

Most businesses run some form of malware protection on their servers, desktops, and laptops. And yet, crypto viruses like cryptowall and cryptolocker still hit these “protected” networks.

Here are 5 reasons your virus protection may fail when it comes to crypto viruses:

1) Limited Virus Profiles

Most anti-virus systems run locally on each device. They compare file changes with patterns related to known viruses as a means of identifying malware. The pattern, or definition, database, however is typically only a few GB in size. With this limitation, it is impossible to detect the many variant forms for viruses.

2) Periodic Virus Updates

Most locally installed anti-virus systems update periodically by connecting to a local distribution server or the anti-virus software vendor’s servers.  Because updates are not real-time, there can be a gap of hours or even days between when your system is unable to detect new viruses or variants.

3) Behavior Analysis

Chances are good that your anti-virus software has some intelligence or heuristics that identify behaviors as likely malware. Chances are equally good that this analysis is triggered by file actions. Few anti-virus solutions monitor systems for virus-like behavior (such as an application rapidly opening and closing files) that are not triggered by user action.

4) Quarantine instead of Rollback

Most anti-virus solutions quarantine files that have known viruses or are likely to be infected. With crypto viruses, however, quarantining the file with the virus does nothing to protect or recover the files that have already been encrypted.

5) Device-Specific

Most anti-virus solutions focus on PC and MAC platforms. But what happens when a virus is saved on a mobile device syncing with your server?

Fortunately, you do have options. Cloud based anti-virus solutions can overcome all five of these limitations. We offer a cloud-based solution that:

  • Has a virus definition database over 2 TB (2,000 GB) in size
  • Updates instantly and continuously when devices are connected to the Internet
  • Analyzes behavior of the system and processes, not just those triggered by human action
  • Will rollback suspicious activity, undoing damage before it can spread
  • Has available protection across MAC, PC, Android, and iOS platforms from a single web-based console.

Here’s your Challenge

As a cloud-based solution with a minimal local footprint, we can install our service without interfering with your current anti-virus software.

Let us install a 30 free, no-obligation trial and see for yourself if your current anti-virus solution is giving you the protection you want or need.

To learn more about your options, or to request a trial, contact us today.

 

 

 

For Students, 1:1 is not about devices, 1:1 is about teacher/student connection

When most schools talk about 1:1 programs, the focus immediately turns to the device or devices. We tend to direct schools to focus on educational outcomes, curricula integration, and other goals and objectives that will lead to the best device decisions and program structure. Maybe, however, we are all missing the point.

1 to 1 programs are really about teacher/student connection and interaction.

We know by informally surveying teachers when we speak at conferences, that Google Apps for Education, its collaboration tools, and Classroom enable teachers to provided 2 to 3 times more individual feedback in about 1/2 the time.

What we may be missing is that the platform can enable a broader teacher/student connection that goes beyond academics.

This video from the EDU team at Google shows us how.

Chrome Extensions, from Google, for the Google Apps User

We are often asked which Chrome extensions we like and recommend for use with Google Apps. While extensions often relate to third party applications and services, here are several extensions from Google we install for most implementations:

  • Application Launcher for Drive
  • Chrome Remote Desktop
  • Docs PDF/PowerPoint Viewer
  • Google Calendar Checker (for some)
  • Google Docs
  • Google Docs Viewer
  • Google Keep (if the user uses Keep)
  • Google+ Notifications
  • Hangouts
  • Office Editing for Docs, Sheets & Slides
  • Save to Google Drive
  • Send from Gmail

These can be added by users or configured and pushed out using the Chrome Management service within the Google Apps Admin Console.


If you want assistance managing chrome extensions and other applications through the admin console, please contact our Service Team.


 

 

 

Special Pricing on the LG Chromebase


Through a special arrangement with LG and our distributors, we are able to offer the LG Chromebase for $294, more than 33% off the list price.

Order 10 or more and the price drops to $289 each.

With the Chrome Management License, the cost is $324 or $319, respectively.

The LG Chromebase is great for:

  • Computer labs
  • Language, math, and other resource centers
  • Kiosks
  • Workstations in Libraries
  • Teacher workstations in classrooms
    • Use Chromecast to connect to a projector

Contact us with any questions, or complete the form, below, for a formal quote:


 

Video Streaming and Your ISP Performance

As you move to the cloud, you will be more dependent on reliable, well-performing, Internet service.

Video Quality ReportOne of the largest services that impacts Internet, and therefore cloud-based service, performance, is video streaming.  The Google Video Quality Report is a free tool that lets you look at the video streaming patterns for your Internet Service Provider (ISP) and others in your area.  By comparing usage patterns, you can better understand your ISP’s performance and can determine if your ISP, or another, is best for you.

For general monitoring of Internet connection performance, we recommend Ookla’s Speedtest. This site will test Ping response, download speed, and upload speed, which you can then compare to your contract guarantees.  The site will test against the closest server; we recommend testing with several servers in your area to get a better assessment of your speed. Creating an account let’s you save and share your results.


 

 

 

Best Ways to Protect Your Google Apps Account from Being Hacked

We have seen an alarming increase in the number of Google Apps accounts that have been “hacked” across both our business and education customers. Securing your Google Apps account is crucial to protect your sensitive information and prevent unauthorized access.

Google Apps platform security is NOT the issue.  ALL of the hacked accounts are due to compromised user identities.

In every case we have encountered, the users have used their Google Apps email address and password with another service that has had a breach, or has had malware on their computer that provided username and password keystrokes to the hackers.

In both types of incidents, hackers then log in as the user and cause mayhem.

Essential Steps to Make Your Google Apps Account More Secure From Hackers:

1) Educate your users that they are not to use their Google Apps password for any other account not explicitly authorized. Users should also not use their Google Apps email address as the username for personal accounts with other services. It’s also critical to understand the risks of using third-party apps.

2) Check Your Systems for malware and make sure your endpoint protection is up to the task. If not, we recommend Webroot Endpoint Protection and Web Security Services (the link is to our edu site, but the service is available to business and government customers as well).

3)  Implement Two-Factor Authentication (2FA).  In business environments, users should be using 2FA to secure their accounts.  Implementation can be involved if you have other services linked to Google Apps, as you will need to generate service-specific passwords.

4) Use Strong Passwords: Create a strong, unique password for your Google account. Avoid using easily guessable information and include a combination of upper and lower case letters, numbers, and special characters.

5) Review Account Activity: Periodically review the recent activity on your account. Google provides a “Last account activity” feature that allows you to check for any suspicious login attempts.

6) Check Account Permissions: Regularly review the apps and services that have access to your Google account. Remove access for any applications or devices that you no longer use or trust.

7) Beware of Phishing Attempts: Be cautious of phishing emails or websites that attempt to steal your login credentials. Always verify the authenticity of emails and URLs before entering your Google account information.

In education environments, 2FA is not practical for all users, as students and many faculty members may not have mobile devices available to access the Authenticator.  For schools, we recommend any user with partial or full administrative privileges have 2FA active.

FAQs About Keeping Your Google Account Safe from Hackers


Activating 2FA is covered by our support agreements.

For customers and others without support agreements, mention this blog post and we will discount our hourly support fee by 10%; W

We will discount Webroot deployment fees by 50%.  

Both offers expire on December 31, 2014.

Please contact our Service Desk for 2FA assistance; contact Sales regarding Webroot.