While some things in the tech world -- laptop and notebook computers, for instance -- continue to trend smaller and smaller, computer monitor screen sizes are definitely trending in the opposite direction. We can never get enough real estate on our computer screens.
Last time in this space, I discussed why businesses should be looking at Multi-Factor Authentication (MFA) to protect themselves, and why MFA is a far better protector of your online identity than just a password. I also promised to report on a new type of "password-less" MFA that Microsoft is now rolling out to its business Office 365 customers.
Passwords Are Terrible Protection
For most of us, nearly all the "stuff" we have access to online - I'm talking about years' worth of emails, our company's servers, files on cloud services, online shopping accounts - is protected by a username/password combination, probably a poor one if statistics are any indication.
Microsoft's Ignite conference is going on this week in Orlando, and as always, there are new features, new products, and new initiatives being announced. We've picked a few to highlight that we think may be important for small businesses in the coming year.
As the summer draws to a close and as the kids head back to school with new supplies, new books and new teachers, it might be an opportune time to look at some new ways of doing things at work, too. I came across a blog post from Microsoft about some of the new developments they've been working on for their Office 365 subscribers.
When I first started working in IT, I would occasionally hear someone refer to their mirrored hard drive in their server as a "backup". I would explain to them that backups are a very different thing from hardware redundancy. A mirror will protect you if one of the hard drives fails, but offers no protection from accidental deletions, or file system corruption, or any number of problems that can destroy your data, such as ransomware, for example.
The New Year's Eve confetti had barely been swept up when the first headline-grabbing computer security problem of 2018 made the news. As you may have seen, on January 3rd of this year, it was revealed that a set of security flaws affects nearly every processor made by Intel, AMD, ARM, and Qualcomm over the past 20 years.
As I write this, we are approaching Christmas and nearing the end of Hanukkah. For our friends celebrating the Jewish Festival of Lights, we hope you had a Happy Hanukkah. And may it be a joyous Christmas for all those celebrating Jesus's birth. For everyone reading, we wish all of you much happiness and success in the coming new year!
Is Alexa under the tree?
As this is a technology-focused blog, I thought I'd touch on a piece of technology that is destined to be given as a gift many times over this season, if current sales numbers are any indication.
One of the things our company has made our goal since 2002 is to help "level the playing field" by bringing big-company style solutions to smaller businesses. Back then, server-hosted solutions were the norm, which sometimes required substantial investment, especially for solutions that were considered "enterprise" software.
Last week I spoke to two different groups of business leaders, giving a presentation on CyberSecurity. Even though Halloween was still a couple weeks away, I think I successfully scared the heck out of them. On both days, though, the executives in attendance were asking some great questions; it's obviously a topic that is a concern for many people, especially those running businesses.