Category : Email.Mail and Messaging

How can I recover deleted items in Outlook 2011?

recovering-deleted-files-1Easily! When you delete a message from your inbox, it is moved to a deleted folder. How often have you cleared this folder only to think, oh shoot, I needed that one email!! Not to worry, once this folder is cleared, the messages are removed from your inbox but remain potentially recoverable for 28 days.

Go to the Deleted Items folder and select the email you would like to recover. You can also select multiple emails at a time by holding down the ctrl button as you click. In the menu above, click the Move icon and select the folder that you would like to restore the email to, such as “Inbox“.

Another means to recover such emails is through the Outlook Web App, exchange.sussex.ac.uk/owa/ .

Login and right click on the Deleted Items folder and select Recover Deleted Items. This will open a list of recovered deleted items for you to choose from. Once you find the messages you would like to recover, click Recover and then select the folder you would like to move the recovered email to.

Voila!


If you would like to educate yourself in more detail about the information presented in this blog post please visit : http://www.sussex.ac.uk/its/help/faq?faqid=2277

 

Lets agree to not use Yahoo anymore

Yahoo Breach

A hacker responsible for breaches of both LinkedIn and MySpace, has reportedly stolen 200 million login credentials for Yahoo accounts.  The hacker goes by the name peace_of_mind and claims to have also stolen credentials for Tumblr as well.  He is selling the Yahoo information on the darknet in a marketplace called TheRealDeal, where for 3 bitcoins, or US $1,824 anyone can buy them. Motherboard reported that a Yahoo spokesperson told them that the company was aware of the credentials being stolen online, but did not confirm whether Yahoo itself had been hacked in order to obtain the login credentials.

In a statement to Motherboard Yahoo states,

“We are committed to protecting the security of our users’ information and we take any such claim very seriously,” a Yahoo spokesperson said. “Our security team is working to determine the facts.”

The biggest oddity of the news appears to be the credibility of the login credentials. Many of the accounts appear to be disabled or otherwise inactive when Motherboard attempted to test 100 of the posted email addresses, most came back “undeliverable”. When Motherboard contacted peace_of_mind  posting on TheRealDeal, he explained most of the stolen credentials were from 2012. Peace_of_mind has posted a sample of the stolen Yahoo database, including passwords and email addresses that have been hacked using the MD5 algorithm.

As many may remember, this is not the first time Yahoo has been put in a bad spot due to a security breach. In 2012 a breach exposed 453,000 passwords while in 2014 a breach involved what the company called a “coordinated effort” to gain access to Yahoo email accounts. In May of this year the United States House of Representative  blocked Yahoo access on it’s network due to concern that the company was a target for hackers. Rightfully so apparently.

The company told PCmag in a statement,

“[Yahoo] works hard to keep our users safe, and we always encourage our users to create strong passwords, or give up passwords altogether by using Yahoo Account Key, and use different passwords for different platforms.”

Regardless of whether or not Yahoo confirms the breach, users should most certainly change there credentials, and in my own opinion, jump ship to Gmail.

 

 

 


 

If you would like to educate yourself in more detail about the information presented in this blog post please visit : www.pcmag.com  www.pcworld.com

VMware takes on the big boys with Boxer app for AirWatch

VMware launched a new version of the Boxer iOS app earlier this month and its pretty awesome. The app is for companies using VMware to manage their employee’s mobile devices VMware Boxer is available for both AirWatch and Workspace One customers. The app includes some attractive features, not surprising as Boxer is intended to replace the preloaded Mail feature on the Apple iPhone and iPad.

screen-shot-2015-10-15-at-9-03-16-amThe new app allows for preference customization such as change of sound when new emails arrives. You can also take different actions by swiping email messages, and easily bulk edit messages. The app combines email and calendar taking away the need to navigate away from Boxer in order to see your calendar events. Similar to other applications put forth by Microsoft and Google in terms of functionality.

Boxer VMware will be made free for AirWatch users on the orange, blue and yellow plans. For those who have already committed their email needs to VMware, no need to worry. If you are one of the many that still want VMware purely for email management, VMware will release a special build on the app that will let consumers more more slowly and provide more time between updates. Most consumer and commercial users will be presented with rapid release updates as they are made available, but the extra feature for businesses that wish to update at a slower pace is an attractive option.


 

If you would like to educate yourself in more detail about the information presented in this blog post please visit: VMware goes after Outlook with Boxer email app for Airwatch

 

Ransomware

 

Ransomware Malware Ransomware is the devilish and extremely debilitating program designed to lock and encrypt files in order to extort money from consumers, business owners, and even government officials. It seems that no one is safe in the fight against ransomware. Most ransomware programs are targeted at the most popular operating system, Windows. Ransomware programs can and will target other systems such as Android applications, Mac OS X and possibly even smart TVs in the near future. Not only is this an unsettling forecast for consumers, but also a call to action for preventative measures to protect your most important data files.

What can be done? Most users have learned the hard way that it is better to back up sensitive data to an external hard drive. However, this type of malware is tuned in to this. When a ransomware program infiltrates a computer, it infects all accessible drives and shared networks, encrypting all files found. This makes for a very irritating discovery of locked data across the board.

Rather than rely on the external hard drive method for backups, it is suggested that consumers adopt a new best practice. Ensure at least three copies of sensitive data are made, and stored in two different formats. At least one of these copies should be stored off-site or offline. This way if ransomware locks files away consumers are not forced into a sticky situation of deciding whether to risk paying for the data retrieval or losing the data forever.

What to do when faced with ransomware? Not much can be done once ransomware has attacked. Most security researchers advise not paying for files to be unlocked, as there is no guarantee that the hackers will provide the deception key once paid. Security vendors also worry about the implications for fueling the fire. The more consumers give in and pay for the safe return of their data, the further encouraged ransomware criminals become to continue this practice of extortion.

If I haven’t said it enough already, I will say it again. Prevention is key. Know how ransomware reaches your computer. Be especially careful of email attachments, word documents with macro code, and malicious advertisements. Always keep the software on your computer up to date. It is especially important to ensure that OS, browsers such as Flash Player, Adobe Reader, and Java are always updated when available. Unless you have verified the senders, never enable the execution of macros in documents. Finally and most importantly, perform daily activities from a limited user account rather than an administrative one. And always, always, utilize a well running and up to date antivirus program.

If you would like to educate yourself in more detail about material presented in this blog post please visit:

http://www.pcworld.com/article/3041001/security/five-things-you-need-to-know-about-ransomware.html

Advantages of Voice Over IP and Unified Communication For Small Business – Should Small Biz Use VoIP | BVA IT Consulting Blog

Voice over Internet Protocol, or VoIP, is the delivery of voice communication or multimedia sessions through your internet network rather than a phone landline and the term Unified communications refers to a mixture of multiple types of communications such as video conferencing, email, and instant messaging.  Generally these two terms are used fittingly together, but how are they related together and in accordance to your small business?HostedVOIP

VoIP is essentially a type of Unified Communication and small businesses can greatly benefit from the use of such UC. With full integration of UC, you have the harmonious ability to switch from email to phone. Customer data from a phone representative will be consistent with that of an employee providing email support; therefore, information regarding a customer’s name, what has been purchased, or even problems they may have encountered will entirely be available and shared amongst your representatives for a seamless communicating infrastructure.  Another benefit from UC is a potential in improving productivity by condensing training. You can train your employees on learning one unified platform rather than multiple applications.  Customers will benefit from the utilization of UC in your small business because of the simplicity it will provide your employees to assist them. UC is useful for consolidating data, skipping any disarray that may come with multiple unconnected lines of communication, making it easy for your customers to contact and communicate with your representatives in the most convenient way possible. Whether it is email, phone call, or chat, your customers will have the option to do so and your employees will have to the tools to easily make it possible.

DirSync on a Domain Controller – Now you Can…

Screen Shot 2014-11-09 at 11.48.07 PM

The Active Directory Sync tool [DirSync] can now be installed on an Active Directory Domain Controller (DC).  You must fist have to install version 6553.0002 or newer. The process of installing DirSync on a DC is mostly the same as for deploying it normally. Keep in mind that the administrator installing the tool will need to log-off and log-on again after the Installation Wizard is complete and before the Configuration Wizard is run. This additional step of logging off and logging back in is necessary to ensure that the Directory Sync tool is installed using the least privileges possible on the DC.

If you forget to follow the above process, the Configuration Wizard will return an “Constraint Violation Error” error. If you face this error, simply log off and log in again and you will be able to proceed. Note that the recommendation is still to deploy DirSync on a member server rather than a DC as it will install FIM 2010 R2 SP1 and SQL Server 2012 Express SP1 by default, which can add overhead to your DC.

Single sign-on for to the Cloud

Single sign-on for to the Cloud

Screen Shot 2014-10-28 at 12.30.04 PM

Have the ability of signing in once for all web-based applications is valuable.  All we have is passwords for everything, email, personal and business applications, document shares…. The number of Web services will only increase, and keeping them all straight and secure things s only going to get worse. Trying to manage all these individual passwords is a major problem for security. Many end users cope by re-using their passwords, which exposes all sorts of security holes. One solution is a single sign-on (SSO) tool to automate the logins of enterprise applications and also beef up password complexity, without taxing end users to try to remember dozens of different logins. What is exciting is that there are several products now combine both cloud-based software as a service logins with local desktop Windows logins, and add improved two-factor authentication and smoother federated identity integration.

Troubleshooting Lync for Mac Sign-in Fails with Apple OSX Yosemite | BVA INC. emPowering Your IT –

Screen Shot 2014-10-20 at 9.22.50 AM

There is a known issue with Lync clients with new Apple OS called Yosemite.  The Lync for Microsoft Office 2011 (with Office 365 or Lync on premise) no longer will sign in, the potential fix is listed below.

Primary Symptom: when you attempt to log into Lync, it appears to sign you in just fine, but after briefly displaying your Lync contacts, it immediately signs you out and gives you a generic error message that either the server is unavailable or some unknown error has occured.

Recommended Resolution:

  • Make sure you have all Mac for Office updates and are running the very latest updates
  • Go into Settings, Language & Region
  • Change the language from “English-Primary” (or whatever the language is set to) to “English-US”
  • Reboot
  • Go back into Settings, Language & Region
  • Change the language back to “English-Primary”
  • Reboot
  • Open Lync and you should be able to log in just fine this time

Bluetooth Enabled Stylus

My search for a stylus for my iPad is finally over!  I have owned at least a dozen different models of stylus over the years, and have not been thrilled with any of them.  Usually, they would tap on the screen without trouble, but dragging things across the screen was a total fail!  Now I am using a Bluetooth enabled “Pencil” by 53 and I couldn’t be happier!  There are currently 2 models available ranging in price from $59.95 – $74.95 plus you get full access to their app…appropriately called “Paper.”  This stylus is great for the creative types who want to draw or paint on their iPad or for the techie who just wants to have the best option currently available! 

Outlook.com – is it Better than Gmail?

Outlook.com – is it Better than Gmail?
Outlook.com replaced Hotmail. It has a very clean interface, plenty of storage, advertising isn’t as obtrusive as it once was and it’s filled with lots of features. Outlook.com offers more advanced features that Gmail. Is it better? Depends on what you’re looking to do with your email. Below are some of the features in Outlook.com that Gmail does not offer. From there you’ll have to decide if it’s worth the switch for you.
1 – You can Undelete a message in Outlook where you can’t in Gmail.
2 – Blocking unwanted email is quick and easy.
3 – You can sort emails by file size.
4 – Social media integration is offered for Facebook, Google+, LinkedIN and Twitter.
5 – Integrated Photo View
6 – Limitless hard drive space.
7 – You can have several alias added to Outlook.com
8 – Outlook.com supports keyboard shortcuts as well as Gmail shortcuts.
9 – You can have folders and category labels in Outlook.com