Entries by Bob Appleby (1518)

Friday
Apr212023

Microsoft’s Support For Office 2013 Has Concluded

What does this mean for you? If you are still running Office 2013 as of April 11th 2023 Microsoft has stopped issuing patches for the product. One of the problems in the future is how Office 2013 products will integrate with Office 365. We have seen in the past that the connectors have stopped working for earlier versions of office with the Office 365 hosted e-mail functions. So, this could happen with Office 2013 as well. The larger problem for organizations continuing to use this product, though, could be security issues, as Microsoft isn't obligated to patch those problems as well.

Microsoft's goal is to move everyone to their subscription services instead of using perpetual licensing. The benefit to you as a user of this type of product is that your software is always being updated. The downside is that you have a monthly or annual payment commitment to Microsoft for using this subscription.

Office 2016 and Office 2019 those will reach their end of support phases on October 10th 2023. Office 2016 followed the traditional 10 years of support model, but office 2019 got truncated to seven years of support. These are not the only products from Microsoft whose support is expiring this year. Windows Server 2012r2 is also expiring this Fall as well.

Thursday
Apr202023

Worth a Read: “7 cybersecurity mindsets that undermine practitioners and how to avoid them”

A recent article posted in CSOonline by Matthew Tyson, “7 cybersecurity mindsets that undermine practitioners and how to avoid them”, outlines 7 points to remember when dealing with Cybersecurity. He discusses that cybersecurity jobs are burning people out because of the high-pressure environment. He goes on to state that one of the underlying causes of this is the way we think about cybersecurity.

Both Business Owners and Cybersecurity Professionals need to rethink security in different ways. This may help to reduce the stress of the continual striving to achieve and see it as a process that must be continuously worked on and that you never finished with.

Responsibility must be shared by everyone with the success of this process not just by those in charge of securing your systems. We must realize that the attackers are getting smarter and are building on their successes and learning from their failures. We need to be quick in response to newly identified problems daily. We need to understand that security cannot be achieved from just one tool but many that work together. The more layers of security that you can put in place the better your chances of having success. One of the reasons for having to continually work on battling attackers is that they are driven by the success of their crimes. The better they get, the more successful events they achieve the richer they will get. Measuring your success and failures is important as well. How else can you determine if you are moving in the right direction? Be honest with your results and remember that security is a thankless job.

The results of failure are much harsher than the results of success. Realize this and don’t take it to heart when you are not being patted on the back every day for not allowing the failure in security.

Wednesday
Apr192023

Microsoft Loop Environment vs Microsoft Teams: What are the main differences?

Microsoft Loop Environment and Microsoft Teams are both collaboration platforms that enable users to work together on projects, documents, chats, meetings, and more. However, they have some key differences that make them suitable for different scenarios and workflows. In this article, I will compare and contrast these two platforms, especially in terms of how they facilitate communication among users.

Microsoft Loop Environment is a new platform that was announced in October 2021 as part of the Microsoft 365 suite. It is designed to be a flexible and fluid workspace that allows users to create and edit content collaboratively in real time, using various components such as text, tables, lists, images, diagrams, and more. Users can also chat and comment within the same workspace, as well as integrate with other Microsoft 365 apps such as Outlook, OneNote, SharePoint, and Power BI. Microsoft Loop Environment aims to reduce the friction and complexity of switching between multiple apps and tools, and to enable users to work more creatively and productively.

Microsoft Teams is a well-established platform that was launched in 2017 as a hub for teamwork in Microsoft 365. It is designed to be a unified communication and collaboration platform that allows users to chat, call, meet, share files, and access apps within Teams and Channels. Users can also create and edit documents using Office apps such as Word, Excel, PowerPoint, and OneNote within Teams. Microsoft Teams aims to improve the efficiency and effectiveness of teamwork, and to enable users to communicate and collaborate securely and seamlessly.

One of the main differences between Microsoft Loop Environment and Microsoft Teams is how they approach communication. Microsoft Loop Environment focuses on asynchronous communication, meaning that users can communicate at their own pace and convenience, without having to be online at the same time. Users can chat and comment within the same workspace where they create and edit content, and they can also use @mentions to notify specific people or groups. Microsoft Loop Environment also supports synchronous communication, meaning that users can communicate in real time, by using voice or video calls within the workspace.

Microsoft Teams focuses on synchronous communication, meaning that users can communicate in real time using chat, voice calls, video calls, or meetings within teams and channels. Users can also use @mentions to notify specific people or groups. Microsoft Teams also supports asynchronous communication, meaning that users can communicate at their own pace and convenience by using chat or email within teams and channels.

Another difference between Microsoft Loop Environment and Microsoft Teams is how they organize content. Microsoft Loop Environment organizes content by workspaces, which are collections of components that users can create and edit collaboratively. Workspaces can be shared with anyone within or outside the organization, and they can be accessed from any device or browser. Users can also create sub-workspaces within workspaces to group related components together.

Microsoft Teams organizes content by teams and channels, which are groups of people who work together on a common topic or project. Teams can be private or public within the organization, and they can have multiple channels for different purposes or conversations. Users can also create tabs within channels to access files or apps related to the channel.

Both Microsoft Loop Environment and Microsoft Teams are powerful platforms that offer different ways of working together and communicating with others. Depending on the needs and preferences of the users, they can choose the platform that best suits their scenario and workflow.

Tuesday
Apr182023

Ransomware Attacks: How Sophos CIXA MDR Can Help You Stay Secure

Ransomware attacks are one of the most serious threats to businesses today. They can cripple your operations, damage your reputation, and cost you a fortune in ransom payments and recovery expenses. According to a recent report by Sophos, the average ransom paid by organizations in 2020 was $170,404, and the total recovery cost was $1.85 million.

To protect yourself from ransomware attacks, you need more than just antivirus software or firewalls. You need a comprehensive solution that can detect, respond, and recover from these sophisticated attacks. That's why PAconnect recommends Sophos CIXA MDR (Managed Detection and Response) to our clients.

Sophos CIXA MDR is a cloud-based service that combines advanced endpoint protection, threat intelligence, and 24/7 expert monitoring and response. It leverages artificial intelligence and machine learning to identify and stop ransomware attacks before they can encrypt your data or spread to other devices. It also provides you with a dedicated team of security experts who can help you contain, investigate, and remediate any incidents.

With Sophos CIXA MDR, you can benefit from:

 Enhanced visibility and control over your endpoints

  • Reduced risk of data loss and downtime
  • Improved compliance and regulatory requirements
  • Lower total cost of ownership and operational complexity

 If you want to learn more about how Sophos CIXA MDR can help you protect your business from ransomware attacks, contact PAconnect today. We are a certified Sophos partner with years of experience in delivering IT solutions and services to our clients. We can help you assess your security needs, implement Sophos CIXA MDR, and provide ongoing support and guidance.

Don't let ransomware attacks ruin your business. Trust PAconnect and Sophos CIXA MDR to keep you secure.

Monday
Apr172023

Overview comparison between Foxit and Adobe Acrobat Reader

Adobe Acrobat Reader and Foxit are two popular PDF readers that offer different features and benefits for users. I was recently approached to take a look at the Foxit and I am currently in the middle of trying out the application to see the positive and negative differences between the two products. In future articles I may get into more detail of what I see the benefits are of replacing Adobe Acrobat with Foxit if I determine that it is a good fit for some of our clients.

Adobe Acrobat Reader is the official PDF reader from Adobe, the company that created the PDF format. It is free to download and use, and it supports a wide range of PDF functions, such as viewing, printing, commenting, signing, filling forms, and more. It also integrates with Adobe's cloud services, such as Adobe Document Cloud and Adobe Creative Cloud, which allow you to access and edit your PDF files from any device and collaborate with others online. However, Adobe Acrobat Reader also has some drawbacks, such as its large file size, slow performance, frequent updates, and limited editing capabilities.

Foxit is a lightweight and fast PDF reader that claims to be more secure and reliable than Adobe Acrobat Reader. It also offers many features for viewing, printing, commenting, signing, filling forms, and more. Additionally, it has some advanced features that Adobe Acrobat Reader lacks, such as OCR (optical character recognition), PDF creation and conversion, document protection and encryption, digital signatures, and more. Foxit also has a cloud service called Foxit PhantomPDF Online, which allows you to edit and share your PDF files online. However, Foxit also has some disadvantages, such as its less intuitive interface, compatibility issues with some PDF files, and limited support for multimedia and interactive elements.

In conclusion, Adobe Acrobat Reader and Foxit are both powerful and versatile PDF readers that can suit different needs and preferences. Adobe Acrobat Reader is more suitable for users who want a standard and official PDF reader that integrates well with Adobe's cloud services. Foxit is more suitable for users who want a fast and secure PDF reader that offers more editing and creation features. Ultimately, the best way to choose between these two programs is to try them out yourself and see which one works better for you.

Friday
Apr142023

Use Pocket to enhance your Feedly experience!

Yesterday I talked about using Feedly as my RSS Reader but I also use Pocket to save the articles that I really want to delve on.

Pocket is a great app that lets you save articles from any website or app with just one click. You can then access them offline on any device and read them in a clean and distraction-free interface. You can use Pocket and Feedly together to get the best of both worlds? Here's how:

  • First, you need to connect your Pocket account to your Feedly account. To do this, go to Feedly settings, then Integrations, then Pocket. Click on Connect and follow the instructions.
  • Next, you need to enable the Pocket button in your Feedly app. To do this, go to Feedly settings, then Appearance, then Reading Options. Toggle on the Pocket button and save your changes.
  • Now, whenever you find an article in Feedly that you want to save for later, just tap on the Pocket button and it will be added to your Pocket list.
  • You can also use the reverse integration: whenever you save an article to Pocket from another app or website, it will show up in your Feedly app under the Saved for Later section. This way, you can keep track of all your saved articles in one place.

Using Pocket and Feedly together has helped me improve my reading habits and productivity. I can easily find new content that matches my interests, save it for when I have time to read it, and enjoy it in a distraction-free environment. If you're looking for a way to manage your online reading better, I highly recommend giving these two apps a try. Get Pocket

Thursday
Apr132023

The benefits of using Feedly as your RSS feeder of choice

If you're like me, you probably follow a lot of blogs, news sites, podcasts, and other sources of information on the web. But keeping track of all the updates and new content can be overwhelming and time-consuming. That's why I use Feedly as my RSS feeder of choice.

RSS stands for Really Simple Syndication, and it's a way of subscribing to websites and getting notified when they publish new content. You can use an RSS feeder app like Feedly to organize your subscriptions, browse through headlines, read articles, save them for later, share them with others, and more.

Feedly has many benefits that make it stand out from other RSS feeders. Here are some of them:

  • Feedly has a beautiful and intuitive interface that makes reading a pleasure. You can customize the layout, fonts, colors, and themes to suit your preferences. You can also switch between different views, such as magazine, title-only, or card.
  • Feedly lets you discover new sources of information based on your interests and topics. You can browse through curated collections of feeds, or search for keywords and hashtags. You can also follow other Feedly users and see what they are reading and recommending.
  • Feedly integrates with many other apps and services that you use every day. You can easily save articles to Pocket, Evernote, OneNote, or Dropbox. You can also share them on social media platforms like Twitter, Facebook, LinkedIn, or Pinterest. You can also use Feedly to listen to podcasts, watch videos, or read newsletters.
  • Feedly has a powerful and flexible system of organizing your feeds. You can create categories and subcategories to group your feeds by topic, genre, source, or any other criteria. You can also use tags and keywords to filter and sort your feeds. You can also mark articles as read or unread, favorite them, or archive them.
  • Feedly has a smart learning algorithm that adapts to your reading habits and preferences. It learns from your actions and feedback, and suggests relevant articles and sources that you might like. It also highlights the most popular and trending articles in your feeds, so you don't miss anything important.

Feedly is more than just an RSS feeder. It's a personal news assistant that helps you stay informed and inspired. It's also free to use for up to 100 sources and 3 devices. If you want more features and options, you can upgrade to Feedly Pro or Feedly Teams for a reasonable price.

If you haven't tried Feedly yet, I highly recommend you give it a shot. You'll be amazed by how much easier and enjoyable it is to keep up with the web. Trust me, you won't regret it. Get Feedly

Wednesday
Apr122023

Paconnect suggests Sophos Central Email Protection Plus

If you are looking for a reliable and advanced email security solution for your organization, PAconnect suggests considering Sophos Email Protection Advanced. This is a cloud-based service that integrates with Microsoft 365 and other email platforms to provide comprehensive protection against malware, phishing, impersonation, data loss, and encryption.

Sophos Email Protection Advanced uses artificial intelligence (AI) to detect and block new and emerging threats, such as ransomware, zero-day attacks, and business email compromise (BEC). It also leverages Sophos Labs threat intelligence and cloud sandboxing to analyze email attachments and URLs for malicious behavior. Additionally, it offers advanced impersonation protection that can identify phishing attempts that try to spoof trusted senders or domains.

Sophos Email Protection Advanced also helps you secure sensitive data and comply with regulations by offering policy-driven email encryption. You can choose from different encryption options, such as TLS, attachment and message encryption (PDF and Office), or full web portal encryption. You can also create multi-rule data loss prevention (DLP) policies to scan emails and attachments for financials, confidential contents, health information, and personally identifiable information (PII). Sophos Email automatically encrypts messages that contain sensitive data or allows users to encrypt their own messages using an Outlook plugin or an O365 add-in.

Sophos Email Protection Advanced is easy to set up and manage from a single console in Sophos Central. You don't need to redirect your MX records or install any hardware or software. You can also synchronize your email protection with other Sophos products, such as endpoint, firewall, mobile device security, zero trust, and public cloud security. This gives you a unified view of your security posture and enables you to respond faster to threats.

Sophos Email Protection Advanced is a powerful and flexible email security solution that can protect your organization from the most sophisticated email threats. You can try it for free for 30 days or request a quote from Sophos. Sophos has over 30 years of experience in data protection and supports over 27,000 organizations with advanced email threat protection and data security.

Tuesday
Apr112023

How to Use the Voice to Text Function in Microsoft Word

If you are looking for a way to speed up your writing process, you might want to try the voice to text function in Microsoft Word. This feature allows you to dictate your words instead of typing them, which can save you time and effort. Here are some steps to help you use the voice to text function in Microsoft Word.

  1. Make sure you have a microphone connected to your computer or device. You can use a built-in microphone, a headset, or an external microphone. The quality of your microphone will affect the accuracy of the voice recognition.
  2. Open a new or existing document in Microsoft Word. You can use the voice to text function in any document type, such as a letter, a report, or an essay.
  3. Click on the Home tab and then click on the Dictate button. It is located on the right side of the ribbon, next to the Language button. You will see a red dot indicating that the microphone is on and ready to listen.
  4. Start speaking clearly and naturally into your microphone. You can use punctuation commands, such as "comma", "period", or "question mark", to insert punctuation marks into your text. You can also use editing commands, such as "delete", "undo", or "select", to make changes to your text.
  5. When you are done speaking, click on the Dictate button again to turn off the microphone. You will see a check mark indicating that the dictation is complete.
  6. Review your text and make any necessary corrections. You can use your keyboard, mouse, or voice commands to edit your text. You can also use the Read Aloud button to listen to your text and check for errors.

Using the voice to text function in Microsoft Word can help you write faster and more efficiently. However, you should always proofread your text before finalizing it, as there may be some errors or inaccuracies in the voice recognition. You can also adjust the settings of the voice to text function to suit your preferences and needs.

Monday
Apr102023

Why PAconnect should be part of your cybersecurity solution

Cybersecurity is one of the most important aspects of any business in the digital age. With the increasing threats of hackers, malware, ransomware, phishing, and other cyberattacks, it is essential to have a reliable and effective cybersecurity solution that can protect your data, systems, and reputation. However, not all cybersecurity providers are created equal. Some may offer outdated or inadequate services, charge exorbitant fees, or fail to meet your specific needs and expectations. That's why you need PAconnect, the leading cybersecurity company that offers comprehensive and customized solutions for all your cybersecurity needs.

PAconnect is a trusted partner for hundreds of businesses across various industries and sectors. We have a team of highly qualified and experienced cybersecurity experts who can assess your current security posture, identify your vulnerabilities and risks, and design and implement a tailored cybersecurity strategy that meets your goals and budget. We use the latest tools and technologies to monitor, detect, prevent, and respond to any cyber threats that may compromise your business operations or data. We also provide ongoing support and maintenance to ensure that your cybersecurity solution is always up to date and effective.

Here are some of the significant reasons why you should hire PAconnect to provide all your cybersecurity needs:

  • PAconnect has a proven track record of delivering high-quality cybersecurity services to clients of all sizes and industries. We have helped our clients achieve compliance with various standards and regulations, such as PCI DSS, HIPAA, GDPR, NIST, ISO 27001, and more. We have also helped our clients recover from cyber incidents and minimize their impact on their business continuity and reputation.
  • PAconnect offers a comprehensive range of cybersecurity services that cover all aspects of your security needs. Whether you need vulnerability assessment, penetration testing, network security, endpoint security, cloud security, email security, web security, or any other security service, we have you covered. We can also provide you with security awareness training, incident response planning, disaster recovery planning, and other consulting services to help you improve your security culture and resilience.
  • PAconnect provides customized solutions that fit your specific needs and expectations. We understand that every business is unique and has different security requirements and challenges. That's why we work closely with you to understand your business objectives, processes, systems, data, and risks. We then create a customized cybersecurity solution that aligns with your business goals and budget. We also provide you with regular reports and feedback to keep you informed of your security status and performance.
  • PAconnect offers competitive pricing and flexible payment options for our cybersecurity services. We believe that cybersecurity should be affordable and accessible for every business. That's why we offer competitive pricing that reflects the value and quality of our services. We also offer flexible payment options that suit your cash flow and preferences. You can choose to pay monthly, quarterly, annually, or per project basis. You can also adjust your service level or scope as your business needs change.

If you are looking for a reliable and effective cybersecurity provider that can protect your business from cyber threats and help you achieve your security goals, look no further than PAconnect. Contact us today to get a free quote or consultation on our cybersecurity services. We look forward to working with you.

Friday
Apr072023

PAConnect, Sophos and Cowbell: A Strategic Partnership for Cybersecurity

Cybersecurity is one of the most pressing challenges for businesses in the digital age. As cyber threats become more sophisticated and frequent, organizations need to protect their data, systems and reputation from potential breaches and attacks. However, cybersecurity is not a one-size-fits-all solution. Different businesses have different needs, risks and budgets when it comes to securing their digital assets.

That's why PAConnect, a leading IT solutions provider, has partnered with Sophos and Cowbell, two of the most innovative and trusted names in the cybersecurity industry. Together, they offer a comprehensive and customized cybersecurity package that combines cutting-edge technology, expert services and tailored insurance coverage.

Sophos is a global leader in next-generation cybersecurity solutions that protect millions of users across 150 countries. Sophos offers a range of products and services that cover endpoint protection, network security, cloud security, mobile security and more. Sophos also provides 24/7 threat intelligence and response through its SophosLabs and Sophos Managed Threat Response teams.

Cowbell is a cyber insurance company that leverages artificial intelligence and data science to assess and mitigate cyber risks. Cowbell offers cyber insurance policies that are tailored to each business's unique risk profile and exposure. Cowbell also provides proactive risk management tools and resources to help businesses improve their cybersecurity posture and resilience.

By partnering with Sophos and Cowbell, PAConnect can offer its clients a holistic and integrated approach to cybersecurity that covers prevention, detection, response and recovery. PAConnect can help its clients select the best Sophos products and services for their specific needs and budget, as well as provide installation, configuration, maintenance and support. PAConnect can also help its clients obtain the optimal Cowbell cyber insurance policy that covers their potential losses in case of a cyber incident.

With this strategic partnership, PAConnect, Sophos and Cowbell aim to provide businesses with the peace of mind that they are protected from cyber threats at all levels. Whether it's a ransomware attack, a data breach, a phishing scam or any other cyber risk, PAConnect, Sophos and Cowbell have the solutions to help businesses stay secure and resilient.

Thursday
Apr062023

Sophos MDR: Why It Matters for Your Company's Security

Cybersecurity is a critical issue for any business in today's digital world. Cyberattacks can cause significant damage to your reputation, productivity, and bottom line. That's why you need a comprehensive and proactive solution that can protect your network, devices, and data from various threats.

One of the best solutions available is Sophos Managed Detection and Response (MDR). Sophos MDR is a service that combines the power of Sophos' award-winning endpoint protection platform (EPP) and extended detection and response (XDR) capabilities with the expertise of Sophos' security analysts. Sophos MDR provides you with 24/7 monitoring, threat hunting, incident response, and remediation services that can help you prevent, detect, and respond to cyberattacks faster and more effectively.

Here are some of the key benefits of Sophos MDR for your company's security:

  • Enhanced visibility: Sophos MDR gives you a complete and granular view of your network activity, device health, and user behavior. You can see what's happening across your endpoints, servers, cloud workloads, firewalls, and mobile devices. You can also access rich threat intelligence and contextual information that can help you understand the nature and scope of any attack.
  • Reduced complexity: Sophos MDR simplifies your security operations by providing you with a single pane of glass for managing your security posture. You don't have to worry about deploying, integrating, or maintaining multiple security tools or platforms. You also don't have to deal with the noise and false positives that can overwhelm your IT team. Sophos MDR handles all the heavy lifting for you and only alerts you when there is a confirmed threat that requires your attention.
  •  Improved efficiency: Sophos MDR saves you time and resources by automating many of the tasks that would otherwise require manual intervention. Sophos MDR leverages artificial intelligence (AI) and machine learning (ML) to analyze huge volumes of data and identify suspicious patterns and anomalies. Sophos MDR also uses behavioral analytics and threat intelligence to hunt for hidden or emerging threats that may evade traditional security solutions. Sophos MDR can also take action on your behalf to isolate, contain, or neutralize threats before they cause more damage.
  • Expert guidance: Sophos MDR gives you access to a team of certified and experienced security analysts who can provide you with round-the-clock support and advice. Sophos MDR analysts can help you with incident investigation, root cause analysis, threat mitigation, and recovery strategies. They can also provide you with best practices and recommendations on how to improve your security posture and resilience.

Sophos MDR is a powerful and cost-effective way to enhance your company's security and reduce your risk exposure. By choosing Sophos MDR, you can benefit from the latest technology, the best talent, and the most reliable service in the industry. Contact us today to learn more about how Sophos MDR can help you protect your business from cyberthreats.

Wednesday
Apr052023

PR: Sophos Named the Only Leader Across MDR, XDR, EDR, Endpoint Protection, and Firewall by G2

OXFORD, United Kingdom, April 05, 2023 (GLOBE NEWSWIRE) -- Sophos, a global leader in innovating and delivering cybersecurity as a service, today announced it is named the only Leader across the G2 Grid® Reports for Managed Detection and Response (MDR)Extended Detection and Response (XDR) PlatformsEndpoint Detection and Response (EDR)Endpoint Protection Suites, and Firewall Software in the G2 Spring 2023 Reports. These categories include the enterprise, mid-market and small business segments, and rankings are based on validated customer reviews.

“As adversaries become more sophisticated and elusive, defenders at organizations of all sizes should implement a defense-in-depth strategy that includes protection, detection and response at every point along the attack chain and covers their entire environment. This layered approach should be inclusive of endpoint security, network security, email security, and cloud security, and augmented by threat hunting and remediation services by subject matter security experts. Attackers have refined their methods so much that this range is necessary to stay secure,” said Raja Patel, senior vice president of products at Sophos. “The fact that IT and security professionals recognize Sophos as the Leader across these key categories is validation that Sophos delivers the best and most comprehensive set of products and services required for modern day cybersecurity.”

Tuesday
Apr042023

Google removes 5 million file creation cap for Drive after backlash

I didn't report on when they implamented because I was curious as to what the impact was going to be. 

First, who is storing that many files to Google Drive? That number is pretty crazy. But on April 4th we see that Google is changing its mind and is rolling this limit back. They stated that the limits were put in place "to preserve stability and optimize performance". That actually made sense to me. I can't imagine the impact of that many files on their system.

I don't disagree with their intent but their lack of communication about the inital implementation wasn't done very well. Hopefully when they approach this again with whatever new approach they are going to use they will do so with a little more information in advance.

Monday
Apr032023

Tablet Afterthoughts

I will be returning periodically to review this adventure I have embraced with the new E- Ink technology of my Boox Note Air 2 Plus tablet.

I am finding ways to make myself more efficient. The last 6 weeks I am totally off my MS Surfacebook for meetings. This tablet is providing 99 % of what I need to document and access what I need to make more productive during the meetings and I am hauling around a lot less equipment.

Now I have spent some time to really think about how I can make myself more efficient. One of those steps was to move back to one of my favorite APPS, One Note.
For our weekly meetings, this allows to create agenda to follow and quickly share that info our big screens and have people add to the documentation of the meeting live that we can all add to. As everyone gets more involved this will only get better. It shows what has made impression what need to follow up .
One of the new things that I doing is to add back some of the other meeting notes that I am taking. with vendors so that I can share them with others well put them in context with
what I am doing on a daily basis.
The capture and sharing of this information is an important part of business week.
Capturing and sharing of data is hard to accomplish effectively.
By the way, this article was completely written on my Boox Air Note 2 Plus.
Friday
Mar312023

More Articles on the 3CX Compromise

CSO has a good report and responsible things to do to keep yourself safe.It is worth a read.

Computer Weekly also had an article you can read here.

An updated report from Sophios can be found here. Sophos is one of the first security companies finding, protecting. and reporting on this problem. They are again proving to be on the front edge of the security business.

Thursday
Mar302023

3CX Desktop Attack: Sophos Customer Information

Here is a good article from Sophos that describes what is going on.

3CX CEO Nick Galea is urging users to uninstall the affected software, which includes versions 18.12.407 and 18.12.416 of the Windows app. The company is working on an update to fully resolve the threat. In the meantime, 3CX says users can use its web-based app as a substitute.

I have moved back to an earlier version of the app in the meantime but we have heard that another update should be available shortly to take care of this issue.

Wednesday
Mar292023

Welcome to the new era of Microsoft Teams! | S7 E7

Microsoft YouTube video to discuss the next chapter of the Microsoft Teams story, with the public preview of the new Microsoft Teams app for Windows. In this episode, Derek Snyder speaks with Jeff Teper, President of Collaborative Apps & Platforms about what this means for the future.
Tuesday
Mar282023

Sign up for Adobe’s Firefly AI Image Generator

If you want to get into the trial for Adobe's Firefly AI image generator you will need to request access to the program. In jumping to this site you will need to fill out your information as well as how you think you're going to use the application. There is no cost involved in doing this. Videos that were shown on the site on using the application are very exciting and I can't wait to have access to Adobe Firefly product.

Two of the features that they are showing are text to image and text effects and they have videos that will demonstrate the use of them. This is not a finished product but a trial of a product in beta testing so they're going to ask you for some feedback. It does appear that you will have some Photoshop type capabilities. It looks like a lot of fun!

Page 1 ... 2 3 4 5 6 ... 76 Next 20 Entries »