Author: David Shelley

Why Use Cloud Phone Systems – Benefits of Cloud Telephony and VoIP | BVA INC. emPowering Your IT –

Why Use Cloud Phone SystemsWe’re already transferring our data through the cloud, but more and more businesses are moving to cloud phone systems.

From Ring Central to Mitel and Digium, cloud telephony and VoIP give you impressive functionality with a clear recurring cost, often per agent. Unlike traditional fixed line telephony, you can add lines instantly, scale up and down to meet changing demand, and connect to your phone system from anywhere.

Some solutions, like Microsoft Lync, even bring together different types of communication, including email and SMS.

With powerful features available wherever your users go, the growth of cloud phone systems looks set to continue.

Is Your Mobile Device Secure – Mobile Data Encryption | BVA INC. emPowering Your IT –

Is Your Mobile Device SecureWhile smartphones are smart, they’re not always very safe.

We store masses of confidential data on our devices but, unlike a desktop PC or enterprise server, they’re not stored safely in an office. Instead, they’re on the bus, in the car, or in a jacket pocket.

Fortunately, robust encryption can keep your mobile data safe. Apple has recently expanded its 256-bit AES-based encryption across almost all data stored on the device, while Android platforms – by their open nature less secure – can be encrypted using third-party applications.

Of course, no encryption is flawless and, if your mobile device is lost or stolen, you should always make use of remote wipe functionality.

Are Remote Desktop Services Secure – How to Protect Data | BVA INC. emPowering Your IT –

Using a remote desktop solution makes your desktop follow you wherever in the world you go. Simply use a computer, tablet, or smartphone to connect to your original computer over the internet.

But whenever data travels the internet, it is exposed to numerous security threats. For the most part, protecting data against these threats depends on high quality encryption.

Microsoft’s Remote Desktop Services uses the RDP protocol, which is encrypted by default. You can also change the encryption level or implement network level authentication before sessions are created. Similar options are available in every major remote desktop solution.

While transferring data via the internet is by definition less secure that keeping it locally, the right solutions and settings make remote desktops a minimal risk.

Virtualization with Citrix | BVA INC. emPowering Your IT

Virtualization with CitrixDesktop virtualization brings with it some impressive advantages for businesses. With every user desktop running from a centralized server, you can improve security, take control of permissions, and improve system portability.

Citrix offers complete solutions for desktop and application virtualization, with some useful features. Specifically, Citrix’s proprietary HDX protocol is a high-speed transfer method designed to eliminate lag when connecting to virtual desktops.

In addition, Citrix offers wide support for different platforms, including Mac OS X and a Java-based browser client.

Of course, these additional features come with a cost. While Citrix solutions offer quality, it’s worth comparing functionality against your requirements to avoid paying for things you don’t really need.

Box vs. Dropbox: Which is Better? | BVA INC. emPowering Your IT

Box vs. DropboxAs more and more enterprises start working with data in the cloud, the number of cloud storage providers can be overwhelming. Two of the most popular are Dropbox and Box. However, despite their similar names, there are some fundamental differences to consider.

Box was developed from the outset with a focus on the needs of businesses. As a result, it remains ahead of Dropbox in terms of detailed reporting, granular permissions, and advanced user management. Dropbox, meanwhile, retains the ease of use and convenience you’d expect from a solution developed for consumers.

Who is better? The answer depends on who you are and how you’ll be using the cloud.

Mobile Phone Central Management | BVA INC. emPowering Your IT

Good Mobile Device MgmtWhile the world of work goes mobile, it gets harder and harder to maintain control and governance. When an increasingly diverse range of devices go wherever your users do, how do you maintain visibility?

The right mobile phone central management tools are essential. Two of the leading solutions are Good Mobile Device Management (MDM) from Good Technology and MobileIron.

Both solutions give you complete control over mobile devices, from certificate-based security to enforcing your organizational policies. So you can be sure that, wherever users go, the data they access, create, and manipulate is secure.

DirSync on a Domain Controller – Now you Can…

Screen Shot 2014-11-09 at 11.48.07 PM

The Active Directory Sync tool [DirSync] can now be installed on an Active Directory Domain Controller (DC).  You must fist have to install version 6553.0002 or newer. The process of installing DirSync on a DC is mostly the same as for deploying it normally. Keep in mind that the administrator installing the tool will need to log-off and log-on again after the Installation Wizard is complete and before the Configuration Wizard is run. This additional step of logging off and logging back in is necessary to ensure that the Directory Sync tool is installed using the least privileges possible on the DC.

If you forget to follow the above process, the Configuration Wizard will return an “Constraint Violation Error” error. If you face this error, simply log off and log in again and you will be able to proceed. Note that the recommendation is still to deploy DirSync on a member server rather than a DC as it will install FIM 2010 R2 SP1 and SQL Server 2012 Express SP1 by default, which can add overhead to your DC.

Outlook For Mac Gets a New Look | BVA INC. emPowering Your IT

Outlook-for-macMicrosoft rolled out a new version of Outlook for Mac users. Outlook has a fresh new look to the inbox as well as updates to the performance and reliability. You will get a consistent experience on you PC, web and mobile devices, as well as a new threading model that will make your email less of a hassle. Office 365 will be provided to commercial and consumer customers at no extra cost. To boot Microsoft also announced that there will be a new version of Office for Mac users next year as well that will include Word, PowerPoint, Excel and OneNote. For more information click on this Link.

OS X Yosemite Helpful Tricks And Tips | BVA INC. emPowering Your IT

If you have updated your Mac desktop to Apple’s latest free upgrade OS X Yosemite, here are a few tips and tricks to navigate with ease.

  • Sign a PDF using your trackpad- open the PDF document, go to tool bar, click on annotate, signature, then manage signature.
  • Switch to Dark Mode will change your grey menu bar to black. Go to System Preferences, General and select “Use dark menu bar and Dock.”
  • Screen share within the messaging app by clicking on “Details” on the upper right corner then select “screen share”.
  • Find Movie showtimes and locations with Spotlight
  • Create a personal Wi-Fi hotspot
  • View all open tabs in Safari

You can do all of the above and much much more. For more information click on this link.

Beware of Malvertising!! | BVA INC. emPowering Your IT

Last week malvertising also known as malicious advertising made it’s way onto popular websites such as Yahoo finanace, Fantasy Sports sites, realestate.aol.com, theatlantic.com, 9gag.com and match.com. The malvertising was discovered by  Proofpoint and had an impact on visitors who were potentially exposed to this malvertising. The sites themselves were not compromised but the malvertising ads were able to push their way through three major advertising networks and exchanges. The ads were impersonating legitimate ads such as Microsoft  Bing, Fancy and Case Logic. If your computer has outdated plug-ins the malvertising ad puts a ransonware program called CryptoWall 2.0 on the user’s computer. Then you are asked to pay a ransom in Bitcoin cryptocurrency. These attacks received about $25,000.00 a day in Bitcoin. For more information on this blog click on this link.