Microsoft’s Patch update is breaking Outlook and touch screen machines

Microsoft latest patch Tuesday has caused many issues with users of outlook and touchscreen machines. The Windows KB Update is 3097877 Some of the major issues that have been seen after this update is applied is that computers wont logon, outlook buttons will not work, outlook will not open at all, or emails with certain fonts will crash outlook. Microsoft has release an update to this patch. Call Class Computing if uou need any help 312-262-3930

Missing Just One Of These Could Instantly Open Up Your Computer Network To A Cyber Attack

Welcome to the brave new world of cyber-warfare.

 

Gone are the days when software patches were just for nifty little feature add-ons or updates.

 

Today, a software update notice could mean your whole computer network is suddenly at risk. Dangers include data theft, crippling malware attacks and mischief you may not discover for months, or even years…

 

As with graffiti on your garage door, if you don’t pay attention and clamp down on bad behavior, your problems have likely just begun…

 

And, like those who hire a professional security firm to keep thieves out of the warehouse, thousands of CEOs and business owners are now waking up to the fact that it’s absolutely imperative to hire a pro when it comes to securing your data network.

 

Here’s why you need a professional handling this:

 

#1: Speed is of the essence.

“If you didn’t update to version 7.32 within seven hours, you should assume you’ve been hacked.” That’s what software maker Drupal told millions of its customers around the world last year. It’s just one example of what can happen if you don’t respond with lightning speed.

 

Once a security breach has been identified, hackers rush in. On “Day Zero,” cyber-crooks around the world go after at-risk targets. You’ve got to be quick to patch the gap, or else you risk a system compromise.

 

Unless you have the time, knowledge, experience and tool set to respond instantly, you are far better off leaving this to a professional IT firm you can trust.

 

#2: It’s not just the big boys they’re after.

Sure, the top news stories are about the attacks on companies like Target, Home Depot and Sony…

 

Yet your business is just as vulnerable, if not more so.

Chances are, you simply do not have the resources that giant corporations have to manage a data disaster. The statistics bearing this out are shocking: more than 60% of small businesses close their doors following a serious data breach.

 

The threat is not confined to giant corporations. Small and medium businesses are being attacked every day, and, unfortunately, your business is no exception.

 

#3: Dealing with data breaches requires specialized knowledge, skill and experience

Here are just a few of the things a competent data guardian must be able to do to effectively protect

your systems:

Review documentation and monitor forums. Sometimes your software vendor doesn’t tell the whole story. It’s critical to check online forums and other communities to see if anyone else is having issues with the new patch before jumping in with both feet.

 

Know when to apply a patch immediately and when to wait. Typically, somewhere around 95% of patches work hassle-free. The trick is to spot the 5% that don’t — before installing them. This requires identifying unique patching requirements, and applying exceptions accordingly. For instance:

 

Does the patch deal only with a security issue?

Or does it just add new features or fix non-security-related bugs? Obviously, security issues get top priority.

 

Is the system currently having issues?

If not, and if the patch doesn’t address a security issue your system is vulnerable to, it may be better to heed the old adage “If it ain’t broke, don’t fix it.”

 

What security gaps does it address? How severe is the threat to your particular network? If, for example, the only way a virus can enter your system is through an e-mail attachment and this functionality has been disabled for all users, perhaps the threat needn’t be a great concern.

 

Keep options open in case of complications. Once a patch has been applied, if things aren’t working, it’s critical to restore the data network to pre-patch functionality, with little if any downtime. That means having good backups in place along with a tested and proven recovery process.

Does just thinking about data security give you a headache? We strongly advise that you let us handle this critical part of your business for you.

 

Call (312) 262-3930 and schedule our no-cost Security Update Audit today. You’ll discover how easy it is to rest assured that your network is secure 24/7.

Free Report Download: If You Are Considering Cloud Computing For Your Company—Don’t, Until You Read This…

If you are considering cloud computing or Office 365 to save money and simplify IT, it is extremely important that you get and read this special report, “5 Critical Facts Every Business Owner Must Know Before Moving Their Network To The Cloud.”

 

This report discusses in simple, non-technical terms the pros and cons of cloud computing, data security, how to choose a cloud provider, as well as 3 little-known facts that most IT consultants don’t know or won’t tell you about cloud computing that could end up causing you MORE problems and costing you more money than you anticipated.

 

Even if you aren’t ready to move to the cloud yet, this report will give you the right information and questions to ask when the time comes.

 

Get Your Free Copy Today: http://www.classcomputing.com/cloudreport

 

 

XP and Office 2003 end of life

An URGENT Security Warning For Businesses Running
Windows XP Or Office 2003

If your organization is currently running either Windows XP or Office 2003 on one or more computers in your office, you need to know about a dangerous security threat to your organization that must be addressed within the next 3 months. Please take a moment to read this important announcement.

As your local Microsoft Partner, we are aggressively reaching out to all businesses within Southeastern New England area that use Windows XP and Office 2003 to alert you of this serious security risk to your organization and inform you about what you need to do now to protect your company.

XP And Office 2003 Changes Must Be Made By April 8, 2014

Microsoft has officially announced that it will retire support on the XP operating system and Office 2003 software suite on April 8, 2014. That means any computer with these software programs installed will be completely exposed to serious hacker attacks aimed at taking control of your network, stealing data, crashing your system and inflicting a host of other business-crippling problems you do NOT want to have to deal with.

This is such a serious threat that all companies housing financial and medical information are being required by law to upgrade any and all computer systems running XP or Office 2003 because firewalls and anti-virus software will NOT be sufficient to completely protect them (or you).

Unless you don’t care about cyber criminals running rampant in your company’s server, you MUST upgrade any equipment running these programs.

Don’t think you need to back up your Evernote notebooks? Think again

How safe do you think your data is when you store them in an Evernote notebook? The surprising answer: Less safe as you might think. That’s because Evernote isn’t a true backup service. It’s a synching service.

Is it really necessary?

You may be wondering: Do I need to back up my Evernote notebooks? How-To Geek would answer with an emphatic “yes!” This is because Evernote isn’t a backup system. It’s a synching system. And in a worst-case scenario, Evernote’s remote file store can be wiped. Then, the local file store can be wiped, too.

Protecting yourself

Fortunately, you can protect yourself fairly easily by backing up your Evernote notebooks. As How-To Geek says, you’ll need an installed copy of Evernote’s desktop application for either Windows or OS X, depending on what kind of computer you use.

Export/import

To do this, right-click on any notebook saved in Evernote. Then select the “Export Notes” option. Then you’re able to export the notebook in any of several formats. If you happen to lose the notebook or the information it includes, you can simply choose to import the previously exported notebook. This will bring in a new version of the notebook that can act as a wholesale replacement for the notebook that you lost.

Hate Windows restarting after updates? Time to stop it

Windows is a living thing: It downloads updates routinely. That’s beneficial, especially when these updates include important anti-virus protections meant to keep your computer safe. But there is a frustrating side effect with these updates: Windows wants to restart your computer after every update.

Stop the restarts

As Lifehacker says, the restarts are an aggravation. Nobody likes seeing that message about your computer restarting in 15 minutes. If you don’t want this to occur, though, you can put an end to it. Tech site Lifehacker recently dealt with how to keep the automatic update on hold.

Editing the registry

Start the disabling process by turning on your computer’s “Start” menu. Open the registry by typing “regedit.” Next, start the registry editor. Now you’ll need to find a specific line in the registry: HKEY_LOCAL_MACHINESOFTWAREPoliciesMicrosoftWindowsWindowsUpdateAU. Click on the AU key and, when you see it appear in the right pane, right-click on the empty space and select New >DWORD (32-bit) Value. Now, name the new DWORD: “NoAutoRebootWithLoggedOnUsers”. Finally, double-click on the new DWORD and give it a value of 1.

Reboot

Once you’ve finished this procedure, Windows won’t automatically restart your computer after its automatic updates. This doesn’t mean, though, you shouldn’t reboot your computer manually in the future. Your Windows updates won’t take effect if you don’t do this. And that could leave your computer and software vulnerable.

Do you think Microsoft is going backward with its new logos?

People say that everyone is a critic. You can see this firsthand at the Quora knowledge-sharing Web site. A short time ago, a Quora user took Microsoft to task. This user wasn’t annoyed that Windows 8 was clunky and counter-intuitive. The user wasn’t mad, either, that Internet Explorer didn’t return the best search results. No, this user took Microsoft to task for its lack of artistic ambition. Yes, that’s right.

A Quora Critic

This user believes that Microsoft isn’t putting sufficient time into designing artistic, aesthetically pleasing logos. Instead, the user writes, Microsoft is dashing off simplistic, minimalist logos. These logos, the assertion goes, look like graphics pros dashed them off in five minutes. The user adds that Microsoft is dumbing down their logos since introducing Windows 8 and Office 2013.

The argument

To no one’s surprise – at least to anyone who’s ever used Quora – the user’s argument immediately stirred up debate. A lot of fellow site users stood up for Microsoft, declaring that the logos are actually rather striking in their minimalism. And, indeed, when you look at the logos lined up side by side, the effect is a bit striking. Microsoft’s new, simpler icons, instantly tell you what program you can open by touching them.

A Growing Trend?

The fans of Microsoft’s new logos might be right. The purpose of the icons is to let users know what program will pop up after they click on the icon. And the logos convey this information well. You immediately can recognize which icon will open Microsoft Publisher and which will open Microsoft’s new cloud services. And if a logo does that? Then who cares if it’s simple?

Living Social hack exposes dangers of using one password at multiple sites

Are you guilty of one of the worst bad technology habits possible? Do you ever use the exact same password and login name for a large number of online sites? If so, you might be putting yourself at severe risk. Clever hackers just might crack your password. And when they do, what’s to stop them from using that password to access all of your favorite online sites – including, potentially, your online bank – while pretending to be you?

Major Breach

According to the story, LivingSocial.com — which offers users daily bargains on everything from restaurants and spas to amusement parks and museums — recently suffered a massive security breach. The breach exposed the names, e-mail addresses and password information for up to 50 million LivingSocial users, according to ars technica.

Too Little, Too Late?

After the breach, Tim O’Shaughnessy, chief executive officer of LivingSocial.com, advised the site’s users change the passwords they utilize to access the deals site. He also advised that users change any passwords that they use to access other sites that are the same or similar to what they use to log into LivingSocial. This, as ars technica reports, is a bit of an understatement. If you use the same password to log onto Netflix, LivingSocial.com and your online bank, stop reading this account and immediately go and change these passwords. And do yourself a favor — do not ever reuse a password from one site at another.

Change it Up

It can be difficult to recall dozens of passwords. And there are occasions when you simply want to log onto a site with a password that you’ve used lots of times before as it’s easier than creating, and writing down, a brand-new access code. Don’t fall victim to this urge. If a hacker cracks your password at one site, it’s not overly hard for this cyber criminal to use the same one to gain access to your other Web sites, too, if you’re too lazy to create unique passwords at different sites. Yes, passwords are imperfect. Even so the more creative you are with them — including creating separate passwords for each and every site you visit — the better off you’ll be.

Watch out for these bad tech habits

You might consider yourself a tech-savvy type, one that would not fall victim to some of the bad tech habits that increase your odds of being hacked or getting your smart phone stolen. But you may just be surprised at how many of the worst tech habits you practice. Fortunately, PCWorld recently ran a list of many of the most dangerous tech habits. Study this list, make needed adjustments and guard yourself from hackers and computer failures.

Don’t Make Yourself a Target

Your tablets and smartphones are valuable. So don’t make it so easy for thieves to take them. A lot of people practice the bad tech habit of leaving their devices un monitored at a coffee shop or restaurant booth when they take off to get refills or another cookie. While they’re gone, thieves could easily snatch their devices off the table and easily head out of the restaurant. There are also those folks who perform the bad habit of staring so intently into their smart phone screens that they don’t spare any attention for their surroundings. It’s easier for crooks to sneak up close to these preoccupied folks, sock them and then escape with their smart phones or tablets.

Hurting Your Health

PCWorld also listed several bad tech habits that could hurt your health. For example, if you sit hunched before your computer screen all day, you may create a serious case of carpal tunnel syndrome. And when you stare at your computer screen for far too long, you can develop headaches or damage your eyes. Lastly, if you never leave your desk during the workday, you can develop anything from back pain to eye strain to headaches to fuzzy thinking. Destroy these three bad habits and take short breaks from your computer screen throughout the workday. Your body will appreciate it.

Lost Data, Personal Information

Some of PCWorld’s bad tech habits can leave you lacking your most crucial files or reveal your personal data to hackers. Do you use the same password for multiple Web sites? You could be in deep trouble, then, if a hacker cracks that password and gains access to the personal information you have stored at these sites. Are you guilty of the serious mistake of not backing up your critical files? If your computer’s hard drive should crash, you could possibly lose every one of them.

Google Reader is dead. Are other free Web services next?

Google Reader, the widely used RSS reader, is all but dead. Google revealed that it would eliminate the service once July 1 rolls around. This has hit several of the service’s biggest fans hard. The truth, though, is that there are other choices. Google made a decision to close the service because its user base was steadily decreasing. Nonetheless the closure of Google Reader provides an important lesson to consumers: There’s no guarantee that your chosen, free cloud service won’t vanish, as well.

An ever-changing cloud

In an interesting story on Slate, writer Farhad Manjoo wrote about Google’s promotion of Reader when the company first launched it in 2005. In those days, Google talked about the RSS service as if it would be part of the Google universe forever. Consumers believed them, and quite a few embraced the service. Now, obviously, it is disappearing. And the takeaway? Consumers should never be shocked when one of their preferred free Web-based services does the same.

Disappearing services

This can be considered a downside to the cloud. In the days when software came on discs and we downloaded it to our computers, there was more permanence. Sure, companies would close shop and manufacturers would discontinue software. Nevertheless, you still had access to software, even when the companies behind it terminated it. After all, it was saved on your computer and you still had the discs. This isn’t the situation with the cloud. When something is yanked from the cloud, it’s gone.

Google’s challenge

Consumers aren’t the only ones facing challenging issues with the demise of Reader. Google does, too. As the Economist explains in a recent article, when Google introduces a new product, it expects consumers to flock to it. But why should consumers do that if there’s the possibility that Google will just get rid of the programs? Eliminating Reader may have made financial sense for Google. However, it may cause consumers to hesitate before embracing the company’s next cloud-based service.